


default search action
34th ASE 2019: San Diego, CA, USA
- 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11-15, 2019. IEEE 2019, ISBN 978-1-7281-2508-4

Main Track
- Hong Jin Kang

, Tegawendé F. Bissyandé, David Lo
:
Assessing the Generalizability of Code2vec Token Embeddings. 1-12 - Yao Wan, Jingdong Shu, Yulei Sui

, Guandong Xu, Zhou Zhao, Jian Wu, Philip S. Yu:
Multi-modal Attention Network Learning for Semantic Source Code Retrieval. 13-25 - Christoph Gladisch, Thomas Heinz, Christian Heinzemann, Jens Oehlerking, Anne von Vietinghoff, Tim Pfitzer:

Experience Paper: Search-Based Testing in Automated Driving Control Applications. 26-37 - Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang

:
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation. 38-41 - Jun-Wei Lin, Reyhaneh Jabbarvand, Sam Malek:

Test Transfer Across Mobile Apps Through Semantic Mapping. 42-53 - Farnaz Behrang, Alessandro Orso:

Test Migration Between Mobile Apps with Similar Functionality. 54-65 - Tianming Liu

, Haoyu Wang, Li Li, Guangdong Bai
, Yao Guo
, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. 66-78 - Yibiao Yang

, Yanyan Jiang, Zhiqiang Zuo, Yang Wang, Hao Sun, Hongmin Lu, Yuming Zhou, Baowen Xu
:
Automatic Self-Validation for Code Coverage Profilers. 79-90 - Ariel Godio, Valeria S. Bengolea, Pablo Ponzio, Nazareno Aguirre, Marcelo Fabian Frias

:
Efficient Test Generation Guided by Field Coverage Criteria. 91-101 - Linghui Luo

, Eric Bodden, Johannes Späth:
A Qualitative Analysis of Android Taint-Analysis Results. 102-114 - Duling Lai, Julia Rubin:

Goal-Driven Exploration for Android Applications. 115-127 - Onur Sahin, Assel Aliyeva, Hariharan Mathavan, Ayse K. Coskun, Manuel Egele:

RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation. 128-138 - Yueming Wu

, Xiaodi Li
, Deqing Zou, Wei Yang, Xin Zhang, Hai Jin:
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis. 139-150 - Xiaoxue Ren, Zhenchang Xing, Xin Xia, Guoqiang Li, Jianling Sun:

Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites. 151-162 - Cuiyun Gao, Jichuan Zeng, Xin Xia, David Lo, Michael R. Lyu, Irwin King

:
Automating App Review Response Generation. 163-175 - Zhongxin Liu, Xin Xia, Christoph Treude

, David Lo
, Shanping Li:
Automatic Generation of Pull Request Descriptions. 176-188 - Nikolas Havrikov

, Andreas Zeller
:
Systematically Covering Input Structure. 189-199 - Devika Sondhi, Rahul Purandare

:
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs. 200-212 - Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang, Xiaodong Liu, Yunhuai Liu:

Detecting Error-Handling Bugs without Error Specification Input. 213-225 - Jonathan Osei-Owusu, Angello Astorga, Liia Butler, Tao Xie, Geoffrey Challen:

Grading-Based Test Suite Augmentation. 226-229 - Yi Wang:

Emotions Extracted from Text vs. True Emotions-An Empirical Evaluation in SE Context. 230-242 - C. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy:

Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets. 243-254 - Jiajun Jiang, Luyao Ren, Yingfei Xiong, Lingming Zhang:

Inferring Program Transformations From Singular Examples via Big Code. 255-266 - Dongjie He

, Haofeng Li
, Lei Wang, Haining Meng, Hengjie Zheng, Jie Liu, Shuangwei Hu, Lian Li, Jingling Xue
:
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis. 267-279 - Haoyu Wang, Hongxuan Liu, Xusheng Xiao

, Guozhu Meng, Yao Guo
:
Characterizing Android App Signing Issues. 280-292 - Tamjid Al Rahat

, Yu Feng
, Yuan Tian:
OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications. 293-304 - Junjie Chen, Guancheng Wang

, Dan Hao
, Yingfei Xiong, Hongyu Zhang
, Lu Zhang:
History-Guided Configuration Diversification for Compiler Test-Program Generation. 305-316 - Daniil Stepanov, Marat Akhin

, Mikhail A. Belyaev:
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler. 317-326 - Umair Z. Ahmed, Renuka Sindhgatta

, Nisheeth Srivastava, Amey Karkare
:
Targeted Example Generation for Compilation Errors. 327-338 - Haicheng Chen

, Wensheng Dou, Yanyan Jiang, Feng Qin:
Understanding Exception-Related Bugs in Large-Scale Cloud Systems. 339-351 - Wujie Zheng, Haochuan Lu, Yangfan Zhou, Jianming Liang, Haibing Zheng, Yuetang Deng:

iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service Systems. 352-363 - Junjie Chen, Xiaoting He, Qingwei Lin, Hongyu Zhang

, Dan Hao
, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
Continuous Incident Triage for Large-Scale Online Service Systems. 364-375 - Hao Zhang

, W. K. Chan:
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models. 376-387 - Yang Hu, Umair Z. Ahmed, Sergey Mechtaev, Ben Leong

, Abhik Roychoudhury:
Re-Factoring Based Program Repair Applied to Programming Assignments. 388-398 - Madeline Endres

, Georgios Sakkas, Benjamin Cosman
, Ranjit Jhala, Westley Weimer:
InFix: Automatically Repairing Novice Program Inputs. 399-410 - Padraic Cashin, Carianne Martinez, Westley Weimer, Stephanie Forrest

:
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences. 411-414 - Louis G. Michael IV, James Donohue, James C. Davis

, Dongyoon Lee
, Francisco Servant
:
Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions. 415-426 - James C. Davis

, Daniel Moyer, Ayaan M. Kazerouni
, Dongyoon Lee
:
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study. 427-439 - Elena Sherman

, Andrew Harris:
Accurate String Constraints Solution Counting with Weighted Automata. 440-452 - William Eiers

, Seemanta Saha
, Tegan Brennan, Tevfik Bultan:
Subformula Caching for Model Counting and Quantitative Program Analysis. 453-464 - Liang Bao, Xin Liu, Fangzheng Wang, Baoyin Fang:

ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks. 465-476 - Eric Horton, Chris Parnin:

V2: Fast Detection of Configuration Drift in Python. 477-488 - Son Nguyen, Hoan Nguyen, Ngoc M. Tran, Hieu Tran

, Tien N. Nguyen:
Feature-Interaction Aware Configuration Prioritization for Configurable Code. 489-501 - Jiajun Jiang, Ran Wang, Yingfei Xiong, Xiangping Chen, Lu Zhang:

Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study. 502-514 - Tarannum Shaila Zaman, Xue Han, Tingting Yu:

SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces. 515-526 - Zhilei Ren, Changlin Liu, Xusheng Xiao

, He Jiang, Tao Xie:
Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing. 527-538 - Ahmet Çelik, Karl Palmskog, Marinela Parovic, Emilio Jesús Gallego Arias, Milos Gligoric:

Mutation Analysis for Coq. 539-551 - Jiaxiang Liu

, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verifying Arithmetic in Cryptographic C Programs. 552-564 - Dongwoo Kim, Yunja Choi:

Model Checking Embedded Control Software using OS-in-the-Loop CEGAR. 565-576 - Frédéric Recoules, Sébastien Bardin

, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get Rid of Inline Assembly through Verification-Oriented Lifting. 577-589 - Xiaodong Gu

, Hongyu Zhang
, Sunghun Kim:
CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples. 590-601 - Lin Jiang, Hui Liu, He Jiang:

Machine Learning Based Recommendation of Method Names: How Far are We. 602-614 - Daye Nam

, Amber Horvath, Andrew Macvean, Brad A. Myers, Bogdan Vasilescu
:
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems. 615-627 - Jeremy Lacomis

, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues
, Graham Neubig, Bogdan Vasilescu
:
DIRE: A Neural Approach to Decompiled Identifier Naming. 628-639 - Stefan Mühlbauer

, Sven Apel
, Norbert Siegmund:
Accurate Modeling of Performance Histories for Evolving Software Systems. 640-652 - Boyuan Chen, Zhen Ming Jiang, Paul Matos, Michael Lacaria:

An Industrial Experience Report on Performance-Aware Refactoring on a Database-Centric Web Application. 653-664 - Yida Tao, Shan Tang, Yepang Liu, Zhiwu Xu, Shengchao Qin

:
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks? 665-668 - Jinfu Chen

, Weiyi Shang, Ahmed E. Hassan, Yong Wang, Jiangbin Lin:
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour. 669-681 - Yutian Tang

, Xian Zhan
, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan
:
Demystifying Application Performance Management Libraries for Android. 682-685 - Xiaoyu Liu, LiGuo Huang

, Jidong Ge, Vincent Ng:
Predicting Licenses for Changed Source Code. 686-697 - Lina Gong, Shujuan Jiang, Rongcun Wang, Li Jiang:

Empirical Evaluation of the Impact of Class Overlap on Software Defect Prediction. 698-709 - Son Van Nguyen, Tien N. Nguyen, Yi Li, Shaohua Wang

:
Combining Program Analysis and Statistical Language Model for Code Statement Completion. 710-721 - Zan Wang, Yingquan Zhao

, Shuang Liu, Jun Sun, Xiang Chen, Huarui Lin:
MAP-Coverage: A Novel Coverage Criterion for Testing Thread-Safe Classes. 722-734 - Jiange Zhang, Qing Yi, Damian Dechev:

Automating Non-Blocking Synchronization In Concurrent Data Abstractions. 735-747 - Mingyuan Wu, Lingming Zhang, Cong Liu, Shin Hwei Tan, Yuqun Zhang:

Automating CUDA Synchronization via Program Transformation. 748-759 - Ernest Bota Pobee

, Xiupei Mei
, Wing Kwong Chan:
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs. 760-771 - Yan Zheng

, Changjie Fan, Xiaofei Xie
, Ting Su, Lei Ma, Jianye Hao, Zhaopeng Meng, Yang Liu
, Ruimin Shen, Yingfeng Chen:
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning. 772-784 - Mahdi Nejadgholi, Jinqiu Yang:

A Study of Oracle Approximations in Testing Deep Learning Libraries. 785-796 - Divya Gopinath, Hayes Converse, Corina S. Pasareanu, Ankur Taly:

Property Inference for Deep Neural Networks. 797-809 - Qianyu Guo, Sen Chen, Xiaofei Xie

, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu
, Jianjun Zhao, Xiaohong Li:
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. 810-822 - Vahid Alizadeh

, Mohamed Amine Ouali, Marouane Kessentini, Meriem Chater:
RefBot: Intelligent Software Refactoring Bot. 823-834 - Mirko Köhler

, Guido Salvaneschi
:
Automated Refactoring to Reactive Programming. 835-846 - Benoît Verhaeghe

, Christopher P. Fuhrman, Latifa Guerrouj, Nicolas Anquetil, Stéphane Ducasse:
Empirical Study of Programming to an Interface. 847-850 - Lingfeng Bao, Nimrod Busany, David Lo

, Shahar Maoz:
Statistical Log Differencing. 851-862 - Jinyang Liu

, Jieming Zhu, Shilin He, Pinjia He, Zibin Zheng
, Michael R. Lyu:
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression. 863-873 - Artur Boronat

:
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling. 874-886 - Nimrod Busany, Shahar Maoz, Yehonatan Yulazari:

Size and Accuracy in Model Inference. 887-898 - Brandon Paulsen, Chungha Sung

, Peter A. H. Peterson, Chao Wang:
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation. 899-911 - Martin Nowack

:
Fine-Grain Memory Object Representation in Symbolic Execution. 912-923 - Dongliang Mu, Wenbo Guo

, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song
:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. 924-935 - Jyothi Vedurada

, V. Krishna Nandivada:
Batch Alias Analysis. 936-948 - Jeffrey Palmerino, Qi Yu

, Travis Desell, Daniel E. Krutz:
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility. 949-961 - Yuqi Chen, Christopher M. Poskitt

, Jun Sun, Sridhar Adepu, Fan Zhang:
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences. 962-973 - Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas

, Yijun Yu
, Andrea Zisman, Bashar Nuseibeh
:
Cautious Adaptation of Defiant Components. 974-985 - Qiong Feng, Yuanfang Cai, Rick Kazman, Di Cui, Ting Liu, Hongzhou Fang:

Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation. 986-997 - Ilias Gerostathopoulos, Stefan Kugele, Christoph Segler, Tomás Bures

, Alois C. Knoll
:
Automated Trainability Evaluation for Smart Software Functions. 998-1001 - Guilherme Cavalcanti, Paulo Borba, Georg Seibt, Sven Apel

:
The Impact of Structure on Software Merging: Semistructured Versus Structured Merge. 1002-1013 - Alberto Trindade Tavares, Paulo Borba, Guilherme Cavalcanti, Sérgio Soares:

Semistructured Merge in JavaScript Systems. 1014-1025 - Kawser Wazed Nafi, Tonny Shekha Kar, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:

CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation. 1026-1037 - Muyue Feng, Zimu Yuan, Feng Li, Gu Ban, Shiyang Wang, Qian Tang, He Su, Chendong Yu, Jiahuan Xu, Aihua Piao, Jingling Xue, Wei Huo:

B2SFinder: Detecting Open-Source Software Reuse in COTS Software. 1038-1049 - Min Wang, Zeqi Lin, Yanzhen Zou, Bing Xie:

CoRA: Decomposing and Describing Tangled Code Changes for Reviewer. 1050-1061
Tool Demonstrations
- Xiaoning Du, Xiaofei Xie

, Yi Li
, Lei Ma, Yang Liu
, Jianjun Zhao:
A Quantitative Analysis Framework for Recurrent Neural Network. 1062-1065 - Shengcheng Yu

, Chunrong Fang
, Yang Feng, Wenyuan Zhao, Zhenyu Chen:
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform. 1066-1069 - Yuanchun Li, Ziyue Yang, Yao Guo

, Xiangqun Chen:
Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing. 1070-1073 - Dirk Beyer

, Thomas Lemberger:
TestCov: Robust Test-Suite Execution and Coverage Measurement. 1074-1077 - Chijin Zhou

, Mingzhe Wang, Jie Liang, Zhe Liu, Chengnian Sun, Yu Jiang:
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization. 1078-1081 - Sadika Amreen, Andrey Karnauch, Audris Mockus

:
Developer Reputation Estimator (DRE). 1082-1085 - Tianjiao Du, Junming Cao, Qinyue Wu, Wei Li, Beijun Shen, Yuting Chen:

CocoQa: Question Answering for Coding Conventions Over Knowledge Graphs. 1086-1089 - Camilo Escobar-Velasquez, Michael Osorio-Riaño, Mario Linares-Vásquez:

MutAPK: Source-Codeless Mutant Generation for Android Apps. 1090-1093 - Goran Piskachev, Lisa Nguyen Quang Do, Oshando Johnson, Eric Bodden:

SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. 1094-1097 - Ayesha Sadiq, Li Li, Yuan-Fang Li

, Ijaz Ahmed, Sea Ling:
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs. 1098-1101 - Cyrille Artho, Monali Pande, Qiyi Tang

:
Visual Analytics for Concurrent Java Executions. 1102-1105 - Xufan Zhang, Ziyue Yin, Yang Feng, Qingkai Shi, Jia Liu, Zhenyu Chen:

NeuralVis: Visualizing and Interpreting Deep Learning Models. 1106-1109 - Vladislav Tankov

, Yaroslav Golubev
, Timofey Bryksin
:
Kotless: A Serverless Framework for Kotlin. 1110-1113 - Xiao Liu

, Lingmin Fan, Jia Xu
, Xuejun Li, Lina Gong, John C. Grundy, Yun Yang:
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing. 1114-1117 - Ali Ghanbari

, Lingming Zhang:
PraPR: Practical Program Repair via Bytecode Mutation. 1118-1121 - Xutong Ma

, Jiwei Yan
, Yaqi Li, Jun Yan, Jian Zhang:
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs. 1122-1125 - Ignacio Laguna:

FPChecker: Detecting Floating-Point Exceptions in GPU Applications. 1126-1129 - Bruno Castro

, Alexandre Perez, Rui Abreu
:
Pangolin: An SFL-Based Toolset for Feature Localization. 1130-1133 - Dennis Reuling, Udo Kelter, Sebastian Ruland, Malte Lochau:

SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich Software. 1134-1137 - Mohammad Afzal, Asia A, Avriti Chauhan, Bharti Chimdyalwar, Priyanka Darke, Advaita Datar, Shrawan Kumar, R. Venkatesh:

VeriAbs : Verification by Abstraction and Test Generation. 1138-1141 - Da Li, Huiyan Wang, Chang Xu, Ruiqing Zhang, Shing-Chi Cheung

, Xiaoxing Ma:
SGUARD: A Feature-Based Clustering Tool for Effective Spreadsheet Defect Detection. 1142-1145 - David Georg Reichelt

, Stefan Kühne, Wilhelm Hasselbring
:
PeASS: A Tool for Identifying Performance Changes at Code Level. 1146-1149 - Bernd Fischer, Salvatore La Torre, Gennaro Parlato:

VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-threaded Programs with Lazy-CSeq. 1150-1153 - Ruijie Meng, Biyun Zhu, Hao Yun, Haicheng Li, Yan Cai

, Zijiang Yang:
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities. 1154-1157 - Qiang Hu, Lei Ma, Xiaofei Xie

, Bing Yu, Yang Liu
, Jianjun Zhao:
DeepMutation++: A Mutation Testing Framework for Deep Learning Systems. 1158-1161 - Xiaofei Xie

, Hongxu Chen, Yi Li
, Lei Ma, Yang Liu
, Jianjun Zhao:
Coverage-Guided Fuzzing for Feedforward Neural Networks. 1162-1165 - Yihao Huang

, Jincao Feng, Hanyue Zheng, Jiayi Zhu, Shang Wang, Siyuan Jiang, Weikai Miao, Geguang Pu:
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis. 1166-1169 - Yuexing Wang, Guang Chen, Min Zhou, Ming Gu, Jiaguang Sun:

TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis. 1170-1173 - Chi Li, Min Zhou, Zuxing Gu, Ming Gu, Hongyu Zhang

:
Ares: Inferring Error Specifications through Static Analysis. 1174-1177 - Mojtaba Bagherzadeh, Karim Jahed, Nafiseh Kahani, Juergen Dingel:

PMExec: An Execution Engine of Partial UML-RT Models. 1178-1181 - Reza Ahmadi, Karim Jahed, Juergen Dingel:

mCUTE: A Model-Level Concolic Unit Testing Engine for UML State Machines. 1182-1185 - Mark Mossberg, Felipe Manzano, Eric Hennenfent, Alex Groce, Gustavo Grieco, Josselin Feist, Trent Brunson, Artem Dinaburg:

Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. 1186-1189 - Pavan Kumar Chittimalli, Kritika Anand, Shrishti Pradhan, Sayandeep Mitra, Chandan Prakash, Rohit Shere, Ravindra Naik:

BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules. 1190-1193 - Rohit Mehra, Vibhu Saujanya Sharma

, Vikrant Kaulgud, Sanjay Podder
:
XRaSE: Towards Virtually Tangible Software using Augmented Reality. 1194-1197 - Zixin Li, Haoran Wu, Jiehui Xu, Xingya Wang

, Lingming Zhang, Zhenyu Chen:
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract. 1198-1201 - Shufan Zhou, Beijun Shen, Hao Zhong

:
Lancer: Your Code Tell Me What You Need. 1202-1205
Industry Showcase
- Susumu Tokumoto, Kuniharu Takayama:

PHANTA: Diversified Test Code Quality Measurement for Modern Software Development. 1206-1207 - Ahyoung Sung, Sangjun Kim, Yangsu Kim, Younggun Jang, Jongin Kim:

Test Automation and Its Limitations: A Case Study. 1208-1209 - Yang Wen, Jicheng Cao, Shengyu Cheng:

PTracer: A Linux Kernel Patch Trace Bot. 1210-1211 - Kapil Singi, R. P. Jagadeesh Chandra Bose, Sanjay Podder

, Adam P. Burden:
Trusted Software Supply Chain. 1212-1213 - Vibhu Saujanya Sharma

, Rohit Mehra, Sanjay Podder
, Adam P. Burden:
A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery. 1214-1215 - ZhiWei Wu, Jing Liu, Xiang Chen:

Better Development of Safety Critical Systems: Chinese High Speed Railway System Development Experience Report. 1216-1217
Doctoral Symposium
- Shurui Zhou:

Improving Collaboration Efficiency in Fork-Based Development. 1218-1221 - Marina Reich:

Inference of Properties from Requirements and Automation of Their Formal Verification. 1222-1225 - Stephan Lukasczyk

:
Generating Tests to Analyse Dynamically-Typed Programs. 1226-1229 - Mauricio Soto:

Improving Patch Quality by Enhancing Key Components of Automatic Program Repair. 1230-1233 - Kristian Kolthoff:

Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements. 1234-1237 - Vaibhav Sharma:

Automatically Repairing Binary Programs Using Adapter Synthesis. 1238-1241 - Foyzul Hassan:

Tackling Build Failures in Continuous Integration. 1242-1245 - Carmine Vassallo:

Enabling Continuous Improvement of a Continuous Integration Process. 1246-1249
ACM Student Research Competition
- Bolin Wei:

Retrieve and Refine: Exemplar-Based Neural Comment Generation. 1250-1252 - Daye Nam:

API Design Implications of Boilerplate Client Code. 1253-1255 - Martin Kellogg

:
Compile-Time Detection of Machine Image Sniping. 1256-1258 - Xusheng Xiao

:
An Image-Inspired and CNN-Based Android Malware Detection Approach. 1259-1261 - Ali Ghanbari

:
Toward Practical Automatic Program Repair. 1262-1264 - Krishna Murthy Kattiyan Ramamoorthy:

User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications. 1265-1267 - Krishna Neupane:

An Approach for Investigating Emotion Dynamics in Software Development. 1268-1270 - Rashmi Mudduluru:

Verifying Determinism in Sequential Programs. 1271-1273 - Li Yu:

Empirical Study of Python Call Graph. 1274-1276 - Shengcheng Yu

:
Crowdsourced Report Generation via Bug Screenshot Understanding. 1277-1279 - Shuyao Jiang

:
Boosting Neural Commit Message Generation with Code Semantic Analysis. 1280-1282 - Gargi Balasubramaniam:

Towards Comprehensible Representation of Controllers using Machine Learning. 1283-1285 - Kevin Zhang:

A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities. 1286-1288

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














