


default search action
43rd ICSE 2021: Madrid, Spain
- 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22-30 May 2021. IEEE 2021, ISBN 978-1-6654-4831-4
- Mohammed Alhamed, Tim Storer:
Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. 1-12 - Jihyeok Park
, Seungmin An, Dongjun Youn
, Gyeongwon Kim, Sukyoung Ryu:
JEST: N+1 -version Differential Testing of Both JavaScript Engines and Specification. 13-24 - Shahar Maoz, Rafi Shalom
:
Unrealizable Cores for Reactive Systems Specifications. 25-36 - Rashmi Mudduluru, Jason Waataja, Suzanne Millstein, Michael D. Ernst:
Verifying Determinism in Sequential Programs. 37-49 - Peilun Zhang, Yanjie Jiang, Anjiang Wei
, Victoria Stodden, Darko Marinov, August Shi:
Domain-Specific Fixes for Flaky Tests with Wrong Assumptions on Underdetermined Specifications. 50-61 - Dong Jae Kim, Nikolaos Tsantalis
, Tse-Hsun Peter Chen
, Jinqiu Yang:
Studying Test Annotation Maintenance in the Wild. 62-73 - Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller:
Semantic Patches for Adaptation of JavaScript Programs to Evolving Libraries. 74-85 - Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. 86-98 - Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung
, Na Meng, Hai Yu, Zhiliang Zhu:
HERO: On the Chaos When PATH Meets Modules. 99-111 - Ansong Ni, Daniel Ramos
, Aidan Z. H. Yang, Inês Lynce, Vasco Manquinho, Ruben Martins, Claire Le Goues
:
SOAR: A Synthesis Approach for Data Science API Refactoring. 112-124 - Chengcheng Wan
, Shicheng Liu, Henry Hoffmann, Michael Maire, Shan Lu:
Are Machine Learning Cloud APIs Used Correctly? 125-137 - Fengcai Wen, Emad Aghajani, Csaba Nagy, Michele Lanza
, Gabriele Bavota
:
Siri, Write the Next Method. 138-149 - Seohyun Kim, Jinman Zhao, Yuchi Tian, Satish Chandra:
Code Prediction by Feeding Trees to Transformers. 150-162 - Rosalia Tufano
, Luca Pascarella
, Michele Tufano, Denys Poshyvanyk
, Gabriele Bavota
:
Towards Automating Code Review Activities. 163-174 - Yanjie Gao, Yonghao Zhu, Hongyu Zhang
, Haoxiang Lin
, Mao Yang:
Resource-Guided Configuration Space Reduction for Deep Learning Models. 175-187 - Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu:
An Evolutionary Study of Configuration Design and Implementation in Cloud Systems. 188-200 - Chuan Luo, Jinkun Lin, Shaowei Cai, Xin Chen, Bing He, Bo Qiao
, Pu Zhao, Qingwei Lin, Hongyu Zhang
, Wei Wu, Saravanakumar Rajmohan, Dongmei Zhang:
AutoCCAG: An Automated Approach to Constrained Covering Array Generation. 201-212 - Xianhao Jin, Francisco Servant
:
What helped, and what did not? An Evaluation of the Strategies to Improve Continuous Integration. 213-225 - Swaroopa Dola, Matthew B. Dwyer
, Mary Lou Soffa:
Distribution-Aware Testing of Neural Networks Using Generative Models. 226-237 - Yiming Tang
, Raffi Khatchadourian
, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja:
An Empirical Study of Refactorings and Technical Debt in Machine Learning Systems. 238-250 - Mohammad Wardat
, Wei Le, Hridesh Rajan:
DeepLocalize: Fault Localization for Deep Neural Networks. 251-262 - Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen
, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. 263-274 - David Shriver
, Sebastian G. Elbaum, Matthew B. Dwyer
:
Reducing DNN Properties to Enable Falsification with Adversarial Attacks. 275-287 - Weisi Luo, Dong Chai, Xiaoyue Run, Jiang Wang, Chunrong Fang
, Zhenyu Chen:
Graph-based Fuzz Testing for Deep Learning Inference Engines. 288-299 - Jingyi Wang, Jialuo Chen
, Youcheng Sun
, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. 300-311 - Teodora Baluta
, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena:
Scalable Quantitative Verification For Deep Neural Networks. 312-323 - Jinfeng Lin, Yalin Liu, Qingkai Zeng, Meng Jiang, Jane Cleland-Huang:
Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models. 324-335 - Antonio Mastropaolo
, Simone Scalabrino, Nathan Cooper, David Nader-Palacio, Denys Poshyvanyk
, Rocco Oliveto, Gabriele Bavota
:
Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks. 336-347 - Antonio Guerriero
, Roberto Pietrantuono
, Stefano Russo
:
Operation is the hardest teacher: estimating DNN accuracy looking for mispredictions. 348-358 - Xiaoyu Zhang, Juan Zhai
, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. 359-371 - Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. 372-384 - Linghan Meng, Yanhui Li
, Lin Chen, Zhi Wang, Di Wu, Yuming Zhou, Baowen Xu:
Measuring Discrimination to Boost Comparative Testing for Multiple Deep Learning Models. 385-396 - Zan Wang, Hanmo You, Junjie Chen, Yingyi Zhang, Xuyuan Dong, Wenbin Zhang:
Prioritizing Test Inputs for Deep Neural Networks via Mutation Analysis. 397-409 - Pinjia He, Clara Meister, Zhendong Su:
Testing Machine Translation via Referential Transparency. 410-422 - Yan Zheng
, Yi Liu
, Xiaofei Xie
, Yepang Liu, Lei Ma, Jianye Hao, Yang Liu
:
Automatic Web Testing Using Curiosity-Driven Reinforcement Learning. 423-435 - Giovanni Rosa, Luca Pascarella
, Simone Scalabrino, Rosalia Tufano
, Gabriele Bavota
, Michele Lanza
, Rocco Oliveto:
Evaluating SZZ Implementations Through a Developer-informed Oracle. 436-447 - N. C. Shrikanth, Suvodeep Majumder, Tim Menzies
:
Early Life Cycle Software Defect Prediction. Why? How? 448-459 - Amir Makhshari, Ali Mesbah
:
IoT Bugs and Development Challenges. 460-472 - Fariha Nusrat, Foyzul Hassan, Hao Zhong
, Xiaoyin Wang:
How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects. 473-485 - Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? 486-498 - Larissa Braz, Enrico Fregnan, Gül Çalikli
, Alberto Bacchelli
:
Why Don't Developers Detect Improper Input Validation? '; DROP TABLE Papers; -. 499-511 - Marvin Wyrich, Andreas Preikschat, Daniel Graziotin, Stefan Wagner
:
The Mind Is a Powerful Place: How Showing Code Comprehensibility Metrics Influences Code Understanding. 512-523 - Norman Peitek, Sven Apel
, Chris Parnin, André Brechmann, Janet Siegmund:
Program Comprehension and Code Complexity Metrics: An fMRI Study. 524-536 - Anastasia Danilova, Alena Naiakshina, Stefan Horstmann
, Matthew Smith
:
Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers. 537-548 - Lukas Moldon, Markus Strohmaier, Johannes Wachs
:
How Gamification Affects Software Developers: Cautionary Evidence from a Natural Experiment on GitHub. 549-561 - Yaza Wainakh, Moiz Rauf, Michael Pradel:
IdBench: Evaluating Semantic Representations of Identifier Names in Source Code. 562-573 - Yi Li, Shaohua Wang, Tien N. Nguyen:
A Context-based Automated Approach for Method Name Consistency Checking and Suggestion. 574-586 - Reem S. Alsuhaibani, Christian D. Newman, Michael John Decker, Michael L. Collard, Jonathan I. Maletic:
On the Naming of Methods: A Survey of Professional Developers. 587-599 - Madeline Endres
, Zachary Karas, Xiaosu Hu, Ioulia Kovelman
, Westley Weimer:
Relating Reading, Visualization, and Coding for New Programmers: A Neuroimaging Study. 600-612 - An Ju, Hitesh Sajnani, Scot Kelly, Kim Herzig:
A Case Study of Onboarding in Software Teams: Tasks and Strategies. 613-623 - Courtney Miller
, Paige Rodeghero, Margaret-Anne D. Storey, Denae Ford, Thomas Zimmermann:
"How Was Your Weekend?" Software Development Teams Working From Home During COVID-19. 624-636 - Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida
, Germán Regis, Marcelo F. Frias
, Nazareno Aguirre, Hamid Bagheri:
FLACK: Counterexample-Guided Fault Localization for Alloy Models. 637-648 - Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques. 649-660 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Fault Localization with Code Coverage Representation Learning. 661-673 - Zhenpeng Chen
, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu
:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. 674-685 - Yanjie Jiang, Hui Liu, Nan Niu, Lu Zhang, Yamin Hu:
Extracting Concise Bug-Fixing Patches from Human-Written Patches in Version Control Systems. 686-698 - Rahul Gopinath, Hamed Nemati
, Andreas Zeller:
Input Algebras. 699-710 - Luca Borzacchiello, Emilio Coppa
, Camil Demetrescu:
Fuzzing Symbolic Expressions. 711-722 - Vasudev Vikram
, Rohan Padhye
, Koushik Sen:
Growing A Test Corpus with Bonsai Fuzzing. 723-735 - Andrew Truelove, Eduardo Santana de Almeida, Iftekhar Ahmed:
We'll Fix It in Post: What Do Bug Fixes in Video Game Update Notes Tell Us? 736-747 - Tianming Zhao
, Chunyang Chen
, Yuanning Liu, Xiaodong Zhu:
GUIGAN: Learning to Generate GUI Designs Using Generative Adversarial Networks. 748-760 - Bo Yang, Zhenchang Xing, Xin Xia, Chunyang Chen
, Deheng Ye, Shanping Li:
Don't Do That! Hunting Down Visual Design Smells in Complex UIs against Design Guidelines. 761-772 - Hideaki Hata
, Raula Gaikovina Kula
, Takashi Ishio
, Christoph Treude
:
Same File, Different Changes: The Potential of Meta-Maintenance on GitHub. 773-784 - Rangeet Pan, Vu Le, Nachiappan Nagappan, Sumit Gulwani, Shuvendu K. Lahiri, Mike Kaufman:
Can Program Synthesis be Used to Learn Merge Conflict Resolutions? An Empirical Analysis. 785-796 - Qinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, Dinghao Wu:
Abacus: Precise Side-Channel Analysis. 797-809 - Jingbo Wang, Chungha Sung
, Mukund Raghothaman
, Chao Wang:
Data-Driven Synthesis of Provably Sound Side Channel Analyses. 810-822 - Wei Song, Mengqi Han, Jeff Huang:
IMGDroid: Detecting Image Loading Defects in Android Applications. 823-834 - Xinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem:
Fast Parametric Model Checking through Model Fragmentation. 835-846 - Claudio Menghi
, Enrico Viganò, Domenico Bianculli
, Lionel C. Briand:
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap. 847-859 - Seunghoon Woo
, Sunghan Park, Seulbae Kim
, Heejo Lee, Hakjoo Oh:
Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse. 860-872 - Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. 873-884 - Yaohui Wang, Guozheng Li, Zijian Wang, Yu Kang, Yangfan Zhou, Hongyu Zhang
, Feng Gao, Jeffrey Sun, Li Yang, Pochian Lee, Zhangwei Xu, Pu Zhao, Bo Qiao
, Liqun Li, Xu Zhang, Qingwei Lin:
Fast Outage Analysis of Large-scale Production Clouds with Service Correlation Mining. 885-896 - Wei Ma, Thierry Titcheu Chekam, Mike Papadakis
, Mark Harman:
MuDelta: Delta-Oriented Mutation Testing at Commit Time. 897-909 - Goran Petrovic, Marko Ivankovic
, Gordon Fraser, René Just:
Does mutation testing improve testing practices? 910-921 - Huayao Wu, Wenjun Deng, Xintao Niu, Changhai Nie:
Identifying Key Features from App User Reviews. 922-932 - Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao
, Xiapu Luo, Peng Gao, Yao Guo
:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. 933-945 - Shengcheng Yu, Chunrong Fang
, Zhenfei Cao, Xu Wang, Tongyu Li, Zhenyu Chen:
Prioritize Crowdsourced Test Reports via Deep Screenshot Understanding. 946-956 - Nathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro
, Kevin Moran, Denys Poshyvanyk
:
It Takes Two to TANGO: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports. 957-969 - Marlo Haering, Christoph Stanik, Walid Maalej:
Automatically Matching Bug Reports With Related App Reviews. 970-981 - Edson Dias, Paulo Meirelles
, Fernando Castor
, Igor Steinmacher, Igor Wiese, Gustavo Pinto:
What Makes a Great Maintainer of Open Source Projects? 982-994 - Tapajit Dey
, Andrey Karnauch, Audris Mockus
:
Representation of Developer Expertise in Open Source Software. 995-1007 - Pankajeshwara Nand Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger
:
Extracting Rationale for Open Source Software Development Decisions - A Study of Python Email Archives. 1008-1019 - Yu Huang, Denae Ford, Thomas Zimmermann:
Leaving My Fingerprints: Motivations and Challenges of Contributing to OSS for Social Good. 1020-1032 - Armstrong Foundjem, Ellis E. Eghan
, Bram Adams
:
Onboarding vs. Diversity, Productivity, and Quality - Empirical Study of the OpenStack Ecosystem. 1033-1045 - Marco Aurélio Gerosa, Igor Wiese, Bianca Trinkenreich, Georg Link, Gregorio Robles
, Christoph Treude
, Igor Steinmacher, Anita Sarma
:
The Shifting Sands of Motivation: Revisiting What Drives Contributors in Open Source. 1046-1058 - Max Weber, Sven Apel
, Norbert Siegmund:
White-Box Performance-Influence Models: A Profiling and Learning Approach. 1059-1071 - Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel
, Christian Kästner:
White-Box Analysis over Machine Learning: Modeling Performance of Configurable Systems. 1072-1084 - Ruoxi Sun
, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe
, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. 1085-1097 - Steven Arzt
:
Sustainable Solving: Reducing The Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection. 1098-1110 - Zelin Zhao, Yanyan Jiang, Chang Xu, Tianxiao Gu, Xiaoxing Ma:
Synthesizing Object State Transformers for Dynamic Software Updates. 1111-1122 - Lingchao Chen, Yicheng Ouyang, Lingming Zhang:
Fast and Precise On-the-fly Patch Validation for All. 1123-1134 - Simón Gutiérrez Brida
, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias
:
Bounded Exhaustive Search of Alloy Specification Repairs. 1135-1147 - Jordan Henkel, Denini Silva
, Leopoldo Teixeira, Marcelo d'Amorim, Thomas W. Reps:
Shipwright: A Human-in-the-Loop System for Dockerfile Repair. 1148-1160 - Nan Jiang
, Thibaud Lutellier
, Lin Tan:
CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. 1161-1173 - Yuanrui Fan, Xin Xia, David Lo
, Ahmed E. Hassan, Yuan Wang, Shanping Li:
A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping Algorithms. 1174-1185 - Nghi D. Q. Bui, Yijun Yu
, Lingxiao Jiang
:
InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees. 1186-1197 - Junjie Chen, Ningxin Xu, Peiqi Chen, Hongyu Zhang
:
Efficient Compiler Autotuning via Bayesian Optimization. 1198-1209 - Yeting Li
, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung
:
TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-Repair. 1210-1222 - Facundo Molina
, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias
:
EvoSpex: An Evolutionary Algorithm for Learning Postconditions. 1223-1235 - Frédéric Recoules, Sébastien Bardin
, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. 1236-1247 - Lishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni
:
Enabling Software Resilience in GPGPU Applications via Partial Thread Protection. 1248-1259 - Preetha Chatterjee
, Kostadin Damevski
, Lori L. Pollock:
Automatic Extraction of Opinion-based Q&A from Online Developer Chats. 1260-1272 - Kaibo Cao, Chunyang Chen
, Sebastian Baltes, Christoph Treude
, Xiang Chen:
Automated Query Reformulation for Efficient Search based on Query Logs From Stack Overflow. 1273-1285 - Haoye Wang
, Xin Xia, David Lo
, John C. Grundy, Xinyu Wang:
Automatic Solution Summarization for Crash Bugs. 1286-1297 - Christoph Mayr-Dorn, Michael Vierhauser, Stefan Bichler, Felix Keplinger, Jane Cleland-Huang, Alexander Egyed, Thomas Mehofer:
Supporting Quality Assurance with Automated Process-Centric Quality Constraints Checking. 1298-1310 - Xiaozhou Liang, John Henry Burns, Joseph Sanchez, Karthik Dantu, Lukasz Ziarek, Yu David Liu:
Understanding Bounding Functions in Safety-Critical UAV Software. 1311-1322 - Giovani Guizzo
, Justyna Petke
, Federica Sarro
, Mark Harman:
Enhancing Genetic Improvement of Software with Regression Test Selection. 1323-1333 - Gabriel Ferreira, Limin Jia
, Joshua Sunshine
, Christian Kästner:
Containing Malicious Package Updates in npm with a Lightweight Permission System. 1334-1346 - Sumaya Almanee, Arda Ünal, Mathias Payer, Joshua Garcia:
Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code. 1347-1359 - Pei Wang, Julian Bangert, Christoph Kern:
If It's Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening. 1360-1372 - Rajshakhar Paul
, Asif Kamal Turzo
, Amiangshu Bosu:
Why Security Defects Go Unnoticed during Code Reviews? A Case-Control Study of the Chromium OS Project. 1373-1385 - Fabio Massacci, Ivan Pashchenko
:
Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks. 1386-1397 - Jordan Samhi
, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein
:
RAICC: Revealing Atypical Inter-Component Communication in Android Apps. 1398-1409 - Zhiyuan Wan, Xin Xia
, David Lo
, Jiachi Chen
, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. 1410-1422 - Amreeta Chatterjee, Mariam Guizani
, Catherine Stevens, Jillian Emard, Mary Evelyn May, Margaret Burnett, Iftekhar Ahmed, Anita Sarma
:
AID: An automated detector for gender-inclusivity bugs in OSS project pages. 1423-1435 - Jie M. Zhang
, Mark Harman:
"Ignorance and Prejudice" in Software Fairness. 1436-1447 - Lin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, Wenbin Zhang:
Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation. 1448-1460 - Zhenhao Li, Heng Li, Tse-Hsun Peter Chen
, Weiyi Shang:
DeepLV: Suggesting Log Levels Using Ordinal Based Neural Networks. 1461-1472 - Weilin Luo, Hai Wan, Xiaotong Song, Binhao Yang, Hongzhen Zhong, Yin Chen:
How to Identify Boundary Conditions with Contrasty Metric? 1473-1484 - Saad Ezzini
, Sallam Abualhaija
, Chetan Arora
, Mehrdad Sabetzadeh, Lionel C. Briand:
Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements. 1485-1497 - Devika Sondhi, Avyakt Gupta, Salil Purandare, Ankit Rana, Deepanshu Kaushal, Rahul Purandare
:
On Indirectly Dependent Documentation in the Context of Code Evolution: A Study. 1498-1509 - Felix Grund, Shaiful Alam Chowdhury, Nick C. Bradley, Braxton Hall, Reid Holmes:
CodeShovel: Constructing Method-Level Source Code Histories. 1510-1522 - Melina C. Vidoni
:
Evaluating Unit Testing Practices in R Packages. 1523-1534 - Thodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis
:
Data-Oriented Differential Testing of Object-Relational Mapping Systems. 1535-1547 - Song Wang, Nishtha Shrestha, Abarna Kucheri Subburaman, Junjie Wang, Moshi Wei, Nachiappan Nagappan:
Automatic Unit Test Generation for Machine Learning Libraries: How Far Are We? 1548-1560 - Shengcheng Yu, Chunrong Fang
, Yexiao Yun, Yang Feng:
Layout and Image Recognition Driving Cross-Platform Automated Mobile Testing. 1561-1571 - Abdulrahman Alshammari, Christopher Morris, Michael Hilton
, Jonathan Bell:
FlakeFlagger: Predicting Flakiness Without Rerunning Tests. 1572-1584 - Alan Romano
, Zihe Song, Sampath Grandhi, Wei Yang, Weihang Wang
:
An Empirical Analysis of UI-based Flaky Tests. 1585-1597 - KimHao Nguyen, ThanhVu Nguyen:
GenTree: Using Decision Trees to Learn Interactions for Configurable Software. 1598-1609 - Mohammad Bajammal, Ali Mesbah
:
Semantic Web Accessibility Testing via Hierarchical Visual Analysis. 1610-1621 - Jiawei Wang, Li Li, Andreas Zeller:
Restoring Execution Environments of Jupyter Notebooks. 1622-1633 - Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu:
PyART: Python API Recommendation in Real-Time. 1634-1645 - Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, Dimitris Mitropoulos:
PyCG: Practical Call Graph Generation in Python. 1646-1657 - Wardah Mahmood, Daniel Strüber, Thorsten Berger, Ralf Lämmel, Mukelabai Mukelabai:
Seamless Variability Management With the Virtual Platform. 1658-1670 - Siqi Ma
, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal
, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. 1671-1682 - Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. 1683-1694 - Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu
:
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. 1695-1707 - Sungjae Hwang, Sungho Lee, Jihoon Kim, Sukyoung Ryu:
JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMs. 1708-1718

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.