![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
21st ESEC / 30th SIGSOFT FSE 2022: Singapore
- Abhik Roychoudhury, Cristian Cadar, Miryung Kim:
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2022, Singapore, Singapore, November 14-18, 2022. ACM 2022, ISBN 978-1-4503-9413-0
Keynotes
- Sumit Gulwani:
AI-assisted programming: applications, user experiences, and neuro-symbolic techniques (keynote). 1 - Marsha Chechik:
On safety, assurance, and reliability: a software engineering perspective (keynote). 2
Impact Award Paper Keynote
- Gail C. Murphy, Mik Kersten:
Task modularity and the emergence of software value streams (impact award paper keynote). 3
Invited Tutorials
- Andreas Zeller:
Academic prototyping (invited tutorial). 4 - Zhi Jin:
Multi-perspective representation learning for source code analytics (invited tutorial). 5
Machine Learning I
- Mengdi Zhang, Jun Sun:
Adaptive fairness improvement based on causality analysis. 6-17 - Saikat Chakraborty, Toufique Ahmed, Yangruibo Ding, Premkumar T. Devanbu, Baishakhi Ray:
NatGen: generative pre-training by "naturalizing" source code. 18-30
Software Testing I
- Guannan Lou, Yao Deng, Xi Zheng
, Mengshi Zhang, Tianyi Zhang:
Testing of autonomous driving systems: where are we and where should we go? 31-43 - Yinlin Deng, Chenyuan Yang, Anjiang Wei, Lingming Zhang:
Fuzzing deep-learning libraries via automated relational API inference. 44-56 - Penghui Li, Wei Meng, Kangjie Lu:
SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution. 57-69 - Ali Reza Ibrahimzada
, Yigit Varli, Dilara Tekinoglu, Reyhaneh Jabbarvand:
Perfect is the enemy of test oracle. 70-81 - Yao Deng, Xi Zheng
, Mengshi Zhang, Guannan Lou, Tianyi Zhang:
Scenario-based test reduction and prioritization for multi-module autonomous driving systems. 82-93 - Haoxiang Tian, Yan Jiang, Guoquan Wu, Jiren Yan, Jun Wei, Wei Chen, Shuo Li, Dan Ye:
MOSAT: finding safety violations of autonomous driving systems using multi-objective genetic algorithm. 94-106
Empirical I
- Lin Shi, Fangwen Mu, Xiao Chen, Song Wang, Junjie Wang, Ye Yang, Ge Li, Xin Xia, Qing Wang:
Are we building on the rock? on the importance of data preprocessing for code summarization. 107-119 - Norman Peitek, Annabelle Bergum, Maurice Rekrut, Jonas Mucke, Matthias Nadig, Chris Parnin, Janet Siegmund, Sven Apel
:
Correlates of programmer efficacy and their link to experience: a combined EEG and eye-tracking study. 120-131 - Zhiyuan Wan, Xin Xia, Yun Zhang, David Lo
, Daibing Zhou, Qiuyuan Chen, Ahmed E. Hassan:
What motivates software practitioners to contribute to inner source? 132-144
Community
- Stefan Winter, Christopher Steven Timperley, Ben Hermann
, Jürgen Cito, Jonathan Bell, Michael Hilton, Dirk Beyer:
A retrospective study of one decade of artifact evaluations. 145-156 - Liang Wang, Ying Li, Jierui Zhang, Xianping Tao:
Quantifying community evolution in developer social networks. 157-169 - Jenny T. Liang
, Thomas Zimmermann, Denae Ford:
Understanding skills for OSS communities on GitHub. 170-182
Software Evolution
- Mehran Jodavi, Nikolaos Tsantalis:
Accurate method and variable tracking in commit history. 183-195 - Paul Maximilian Bittner, Christof Tinnes
, Alexander Schultheiß, Sören Viegener, Timo Kehrer, Thomas Thüm:
Classifying edits to variability in source code. 196-208 - Luca Di Grazia
, Michael Pradel:
The evolution of type annotations in python: an empirical study. 209-220 - Yi Li, Shaohua Wang, Tien N. Nguyen:
UTANGO: untangling commits with context-aware, graph-based, code change clustering learning model. 221-232
Program Analysis I
- Rekha R. Pai, Abhishek Uppar, Akshatha Shenoy, Pranshul Kushwaha, Deepak D'Souza:
Static executes-before analysis for event driven programs. 233-244 - Steven Arzt
:
Security code smells in apps: are we getting better? 245-255 - Xiuhan Shi, Xiaofei Xie
, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li:
Large-scale analysis of non-termination bugs in real-world OSS projects. 256-268 - Marco Edoardo Palma, Pasquale Salza
, Harald C. Gall:
On-the-fly syntax highlighting using neural networks. 269-280 - Haoxian Chen, Gerald Whitters, Mohammad Javad Amiri
, Yuepeng Wang, Boon Thau Loo
:
Declarative smart contracts. 281-293
Human/Computer Interaction
- Mahnaz Behroozi, Chris Parnin, Chris Brown:
Asynchronous technical interviews: reducing the effect of supervised think-aloud on communication ability. 294-305 - Mingwei Liu
, Xin Peng, Andrian Marcus, Christoph Treude
, Jiazhan Xie, Huanjun Xu, Yanjun Yang:
How to formulate specific how-to questions in software development? 306-318 - Peter Robe, Sandeep Kaur Kuttal
, Jake AuBuchon, Jacob C. Hart:
Pair programming conversations with agents vs. developers: challenges and opportunities for SE community. 319-331 - Mulong Xie, Zhenchang Xing, Sidong Feng, Xiwei Xu, Liming Zhu, Chunyang Chen:
Psychologically-inspired, unsupervised inference of perceptual groups of GUI widgets from GUI images. 332-343 - Yang Song, Junayed Mahmud, Ying Zhou, Oscar Chaparro
, Kevin Moran, Andrian Marcus, Denys Poshyvanyk
:
Toward interactive bug reporting for (android app) end-users. 344-356
Machine Learning II
- Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng:
Understanding performance problems in deep learning systems. 357-369 - Moshi Wei, Yuchao Huang, Junjie Wang, Jiho Shin, Nima Shiri Harzevili, Song Wang:
API recommendation for machine learning libraries: how far are we? 370-381 - Chaozheng Wang
, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang, Michael R. Lyu:
No more fine-tuning? an experimental evaluation of prompt tuning in code intelligence. 382-394
Software Testing II
- Cong Li, Yanyan Jiang, Chang Xu:
Cross-device record and replay for Android apps. 395-407 - Alberto Martin-Lopez
, Sergio Segura, Antonio Ruiz-Cortés:
Online testing of RESTful APIs: promises and challenges. 408-420 - Yixue Zhao
, Saghar Talebipour, Kesina Baral, Hyojae Park, Leon Yee, Safwat Ali Khan, Yuriy Brun, Nenad Medvidovic, Kevin Moran:
Avgust: automating usage-based test generation from videos of app executions. 421-433 - Jue Wang, Yanyan Jiang, Ting Su, Shaohua Li, Chang Xu, Jian Lu, Zhendong Su:
Detecting non-crashing functional bugs in Android apps via deep-state differential analysis. 434-446 - Seulbae Kim, Taesoo Kim:
RoboFuzz: fuzzing robotic systems over robot operating system (ROS) for finding correctness bugs. 447-458
Empirical II
- Shu Wang, Henry Hoffmann, Shan Lu:
AgileCtrl: a self-adaptive framework for configuration tuning. 459-471 - Qianhua Shan, David Sukhdeo, Qianying Huang, Seth Rogers, Lawrence Chen, Elise Paradis, Peter C. Rigby, Nachiappan Nagappan:
Using nudges to accelerate code reviews at scale. 472-482 - Enrico Fregnan, Larissa Braz, Marco D'Ambros, Gül Çalikli, Alberto Bacchelli
:
First come first served: the impact of file position on code review. 483-494 - Stefan Stanciulescu, Likang Yin, Vladimir Filkov:
Code, quality, and process metrics in graduated and retired ASFI projects. 495-506 - Yang Hong, Chakkrit Tantithamthavorn, Patanamon Thongtanunam, Aldeida Aleti:
CommentFinder: a simpler, faster, more accurate code review comments recommendation. 507-519
Machine Learning III
- Thanh Le-Cong
, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo
, Xuan-Bach Dinh Le, Huynh Quyet Thang:
AutoPruner: transformer-based call graph pruning. 520-532 - Xinwen Hu, Yu Guo, Jianjie Lu, Zheling Zhu, Chuanyi Li, Jidong Ge, Liguo Huang
, Bin Luo:
Lighting up supervised learning in user review-based code localization: dataset and benchmark. 533-545 - Prahar Pandya, Saurabh Tiwari
:
CORMS: a GitHub and Gerrit based hybrid code reviewer recommendation approach for modern code review. 546-557 - Moayad Alshangiti
, Weishi Shi, Eduardo Lima, Xumin Liu, Qi Yu
:
Hierarchical Bayesian multi-kernel learning for integrated classification and summarization of app reviews. 558-569 - Liming Dong, He Zhang, Wei Liu, Zhiluo Weng, Hongyu Kuang:
Semi-supervised pre-processing for learning-based traceability framework on real-world software projects. 570-582
Formal Methods
- Dominic Steinhöfel
, Andreas Zeller:
Input invariants. 583-594 - Chris Tomy, Tingmao Wang, Earl T. Barr, Sergey Mechtaev:
Modus: a Datalog dialect for building container images. 595-606 - Daniel Riley, Grigory Fedyukovich:
Multi-phase invariant synthesis. 607-619 - Clay Stevens, Hamid Bagheri:
Parasol: efficient parallel synthesis of large model spaces. 620-632 - Mirco Giacobbe, Daniel Kroening, Julian Parsert
:
Neural termination analysis. 633-645
Debugging/Localization
- Poedjadevie Kadjel Ramkisoen, John Businge, Brent van Bladel, Alexandre Decan, Serge Demeyer, Coen De Roover, Foutse Khomh:
PaReco: patched clones and missed patches among the divergent variants of a software family. 646-658 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Fault localization to detect co-change fixing locations. 659-671 - Chao Ni, Wei Wang, Kaiwen Yang, Xin Xia, Kui Liu, David Lo
:
The best of both worlds: integrating semantic features with expert features for defect prediction and localization. 672-683
Mining Software Repositories
- Robert Dyer, Jigyasa Chauhan:
An exploratory study on the predominant programming paradigms in Python code. 684-695 - Zejun Zhang, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu:
Making Python code idiomatic by automatic refactoring non-idiomatic Python code with pythonic idioms. 696-708 - Xiao Yi, Daoyuan Wu, Lingxiao Jiang
, Yuzhou Fang, Kehuan Zhang, Wei Zhang:
An empirical study of blockchain system vulnerabilities: modules, types, and patterns. 709-721 - Yucen Shi, Ying Yin, Zhengkui Wang, David Lo
, Tao Zhang
, Xin Xia, Yuhai Zhao, Bowen Xu:
How to better utilize code graphs in semantic code search? 722-733 - David O'Brien, Sumon Biswas, Sayem Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan:
23 shades of self-admitted technical debt: an empirical study on machine learning software. 734-746
Program Analysis II
- Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray:
NeuDep: neural binary memory dependence analysis. 747-759 - Aryaz Eghbali
, Michael Pradel:
DynaPyt: a dynamic analysis framework for Python. 760-771 - Chaoran Li, Xiao Chen, Ruoxi Sun
, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. 772-783 - Yuandao Cai, Chengfeng Ye, Qingkai Shi
, Charles Zhang:
Peahen: fast and precise static deadlock detection via context reduction. 784-796
Collaboration
- Zixuan Feng, Amreeta Chatterjee, Anita Sarma, Iftekhar Ahmed:
A case study of implicit mentoring, its prevalence, and impact in Apache. 797-809 - Larissa Braz, Alberto Bacchelli:
Software security during modern code review: the developer's perspective. 810-821 - Alexey Svyatkovskiy, Sarah Fakhoury, Negar Ghorbani, Todd Mytkowicz, Elizabeth Dinella, Christian Bird, Jinu Jang, Neel Sundaresan, Shuvendu K. Lahiri:
Program merge conflict resolution via neural transformers. 822-833
Security
- Shengyi Pan, Jiayuan Zhou, Filipe Roseiro Côgo, Xin Xia, Lingfeng Bao, Xing Hu, Shanping Li, Ahmed E. Hassan:
Automated unearthing of dangerous issue reports. 834-846 - Wen Li, Li Li, Haipeng Cai:
On the vulnerability proneness of multilingual code. 847-859 - Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu
:
Tracking patches for open source software vulnerabilities. 860-871 - Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
DeJITLeak: eliminating JIT-induced timing side-channel leaks. 872-884
Dependability
- Pedro Silva, José N. Oliveira
, Nuno Macedo
, Alcino Cunha
:
Quantitative relational modelling with QAlloy. 885-896 - Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui:
Demystifying the underground ecosystem of account registration bots. 897-909 - Yoav Alon, Cristina David:
Using graph neural networks for program termination. 910-921
Program Repair/Synthesis
- Wonseok Oh, Hakjoo Oh:
PyTER: effective program repair for Python type errors. 922-934 - Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Van Nguyen, Dinh Q. Phung:
VulRepair: a T5-based automated software vulnerability repair. 935-947 - Spandan Garg, Roshanak Zilouchian Moghaddam, Colin B. Clement, Neel Sundaresan, Chen Wu:
DeepDev-PERF: a deep learning-based approach for improving software performance. 948-958 - Chunqiu Steven Xia, Lingming Zhang:
Less training, more repairing please: revisiting automated program repair via zero-shot learning. 959-971 - Zhengkai Wu, Vu Le, Ashish Tiwari, Sumit Gulwani, Arjun Radhakrishna
, Ivan Radicek, Gustavo Soares, Xinyu Wang
, Zhenwen Li, Tao Xie:
NL2Viz: natural language to visualization via constrained syntax-guided synthesis. 972-983
Online Presentations
- Abdulaziz Alshayban, Sam Malek:
AccessiText: automated detection of text accessibility issues in Android apps. 984-995 - Zeyan Li
, Nengwen Zhao, Mingjie Li, Xianglin Lu, Lixin Wang, Dongdong Chang, Xiaohui Nie, Li Cao, Wenchi Zhang, Kaixin Sui, Yanhua Wang, Xu Du, Guoqiang Duan, Dan Pei:
Actionable and interpretable fault localization for recurring failures in online service systems. 996-1008 - Lingwei Li, Li Yang, Huaxi Jiang, Jun Yan, Tiejian Luo, Zihan Hua, Geng Liang, Chun Zuo:
AUGER: automatically generating review comments with pre-training models. 1009-1021 - Jihyeok Park
, Seungmin An, Sukyoung Ryu:
Automatically deriving JavaScript static analyzers from specifications using Meta-level static analysis. 1022-1034 - Zhiyu Li, Shuai Lu, Daya Guo, Nan Duan
, Shailesh Jannu, Grant Jenks, Deep Majumder, Jared Green, Alexey Svyatkovskiy, Shengyu Fu, Neel Sundaresan:
Automating code review activities by large-scale pre-training. 1035-1047 - Yuxia Zhang, Klaas-Jan Stol, Hui Liu, Minghui Zhou:
Corporate dominance in open source ecosystems: a case study of OpenStack. 1048-1060 - Shikai Guo, He Jiang, Zhihao Xu, Xiaochen Li, Zhilei Ren, Zhide Zhou, Rong Chen:
Detecting Simulink compiler bugs via controllable zombie blocks mutation. 1061-1072 - Zhaowei Zhang, Hongyu Zhang, Beijun Shen, Xiaodong Gu:
Diet code is healthy: simplifying programs for pre-trained models of code. 1073-1084 - Yanjie Jiang, Hui Liu, Yuxia Zhang, Weixing Ji, Hao Zhong, Lu Zhang:
Do bugs lead to unnaturalness of source code? 1085-1096 - Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, Haipeng Cai:
Generating realistic vulnerabilities via neural code editing: an empirical study. 1097-1109 - Haofeng Li, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, Lin Gao:
Generic sensitivity: customizing context-sensitive pointer analysis for generics. 1110-1121 - Zhenpeng Chen
, Jie M. Zhang, Federica Sarro
, Mark Harman:
MAAT: a novel ensemble approach to addressing fairness and performance bugs for machine learning software. 1122-1134 - Chijin Zhou
, Quan Zhang, Mingzhe Wang, Lihua Guo, Jie Liang, Zhe Liu, Mathias Payer, Yu Jiang:
Minerva: browser API fuzzing with dynamic mod-ref analysis. 1135-1147 - Simin Chen, Cong Liu, Mirazul Haque, Zihe Song, Wei Yang:
NMTSloth: understanding and testing efficiency degradation of neural machine translation systems. 1148-1160 - Zhiyuan Chang, Mingyang Li, Junjie Wang, Qing Wang, Shoubin Li:
Putting them under microscope: a fine-grained approach for detecting redundant test cases in natural language. 1161-1172 - Guanhong Tao, Weisong Sun, Tingxu Han, Chunrong Fang, Xiangyu Zhang:
RULER: discriminative and iterative adversarial training for deep neural network fairness. 1173-1184 - Chuan Luo, Qiyuan Zhao
, Shaowei Cai, Hongyu Zhang, Chunming Hu:
SamplingCA: effective and efficient sampling-based pairwise testing for highly configurable software systems. 1185-1197 - Xuheng Wang, Xu Zhang, Liqun Li, Shilin He, Hongyu Zhang, Yudong Liu, Lingling Zheng, Yu Kang, Qingwei Lin, Yingnong Dang, Saravanakumar Rajmohan, Dongmei Zhang:
SPINE: a scalable log parser with feedback guidance. 1198-1208 - Wenxi Wang, Yang Hu, Kenneth L. McMillan, Sarfraz Khurshid:
SymMC: approximate model enumeration and counting using symmetry information for Alloy specifications. 1209-1220 - Chenxi Zhang, Xin Peng, Tong Zhou, Chaofeng Sha, Zhenghui Yan, Yiru Chen, Hong Yang:
TraceCRL: contrastive representation learning for microservice trace analysis. 1221-1232 - Yao Wan, Shijie Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Dezhong Yao
, Hai Jin, Lichao Sun
:
You see what I want you to see: poisoning vulnerabilities in neural code search. 1233-1245
Machine Learning
- Chandra Shekhar Maddila, Suhas Shanbhogue, Apoorva Agrawal, Thomas Zimmermann, Chetan Bansal, Nicole Forsgren, Divyanshu Agrawal, Kim Herzig, Arie van Deursen
:
Nalanda: a socio-technical graph platform for building software analytics tools at enterprise scale. 1246-1256 - Qinghua Xu, Shaukat Ali, Tao Yue, Maite Arratibel:
Uncertainty-aware transfer learning to evolve digital twins for industrial elevators. 1257-1268 - Vitaliy Bibaev, Alexey Kalina, Vadim Lomshakov
, Yaroslav Golubev, Alexander Bezzubov, Nikita Povarov, Timofey Bryksin:
All you need is logs: improving code completion by learning from anonymous IDE usage logs. 1269-1279 - Ayan Chatterjee
, Bestoun S. Ahmed, Erik Hallin, Anton Engman:
Testing of machine learning models with limited samples: an industrial vacuum pumping application. 1280-1290 - Junjie Zhu, Teng Long, Wei Wang, Atif M. Memon:
Improving ML-based information retrieval software with user-driven functional testing and defect class analysis. 1291-1301
Empirical
- Lan Cheng, Emerson R. Murphy-Hill, Mark Canning, Ciera Jaspan, Collin Green, Andrea Knight, Nan Zhang, Elizabeth Kammer:
What improves developer productivity at google? code quality. 1302-1313 - Lawrence Chen, Peter C. Rigby, Nachiappan Nagappan:
Understanding why we cannot model how long a code review will take: an industrial case study. 1314-1319 - Lawrence Chen, Rui Abreu, Tobi Akomolede, Peter C. Rigby, Satish Chandra, Nachiappan Nagappan:
Leveraging test plan quality to improve code review efficacy. 1320-1330 - Liping Han
, Tao Yue, Shaukat Ali, Aitor Arrieta, Maite Arratibel:
Are elevator software robust against uncertainties? results and experiences from an industrial case study. 1331-1342
Community
- Patrick Ayoup, Diego Elias Costa, Emad Shihab:
Achievement unlocked: a case study on gamifying DevOps practices in industry. 1343-1354
Software Evolution
- Christof Tinnes
, Wolfgang Rössler, Uwe Hohenstein, Torsten Kühn, Andreas Biesdorf
, Sven Apel
:
Sometimes you have to treat the symptoms: tackling model drift in an industrial clone-and-own software product line. 1355-1366
Program Analysis
- Maria Christakis, Thomas Cottenier, Antonio Filieri, Linghui Luo, Muhammad Numair Mansur, Lee Pike, Nicolás Rosner, Martin Schäf
, Aritra Sengupta, Willem Visser:
Input splitting for cloud-based static application security testing platforms. 1367-1378
Debugging/Localization
- Harshit Kumar, Ruchi Mahindru, Debanjana Kar:
Metadata-based retrieval for resolution recommendation in AIOps. 1379-1389
Collaboration
- Yifen Chen, Peter C. Rigby, Yulin Chen, Kun Jiang, Nader Dehghani, Qianying Huang, Peter Cottle, Clayton Andrews, Noah Lee, Nachiappan Nagappan:
Workgraph: personal focus vs. interruption for engineers at Meta. 1390-1397 - Hyungjin Kim, Yonghwi Kwon
, Sangwoo Joh, Hyukin Kwon, Yeonhee Ryou, Taeksu Kim:
Understanding automated code review process and developer experience in industry. 1398-1407
Dependability
- Ondrej Vasícek
, Jan Fiedor, Tomas Kratochvila, Bohuslav Krena, Ales Smrcka, Tomás Vojnar:
Unite: an adapter for transforming analysis tools to web services via OSLC. 1408-1418 - Michael Schröder
, Katja Kevic, Dan Gopstein, Brendan Murphy, Jennifer Beckmann:
Discovering feature flag interdependencies in Microsoft office. 1419-1429 - Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo
, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. 1430-1440
Repair/Synthesis
- Misoo Kim, Youngkyoung Kim
, Hohyeon Jeong, Jinseok Heo, Sungoh Kim, Hyunhee Chung, Eunseok Lee
:
An empirical study of deep transfer learning-based program repair for Kotlin projects. 1441-1452
Online Presentations
- Minghua Ma, Yudong Liu, Yuang Tong
, Haozhe Li, Pu Zhao, Yong Xu, Hongyu Zhang, Shilin He, Lu Wang, Yingnong Dang, Saravanakumar Rajmohan, Qingwei Lin:
An empirical investigation of missing data handling in cloud node failure prediction. 1453-1464 - Shilin He, Xu Zhang, Pinjia He, Yong Xu, Liqun Li, Yu Kang, Minghua Ma, Yining Wei, Yingnong Dang, Saravanakumar Rajmohan, Qingwei Lin:
An empirical study of log analysis at Microsoft. 1465-1476 - Manish Shetty, Chetan Bansal, Sai Pramod Upadhyayula, Arjun Radhakrishna
, Anurag Gupta:
AutoTSG: learning and synthesis for incident troubleshooting. 1477-1488 - Liu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang
, Shangguang Wang, Xuanzhe Liu:
Demystifying "removed reviews" in iOS app store. 1489-1499 - Andrei Zlotchevski, Dawn Drain, Alexey Svyatkovskiy, Colin B. Clement, Neel Sundaresan, Michele Tufano:
Exploring and evaluating personalized models for code generation. 1500-1508 - Tanakorn Leesatapornwongsa, Xiang Ren, Suman Nath:
FlakeRepro: automated and efficient reproduction of concurrency-related flaky tests. 1509-1520 - Taotao Gu, Xiang Li, Shuaibing Lu, Jianwen Tian, Yuanping Nie, Xiaohui Kuang, Zhechao Lin, Chenyifan Liu, Jie Liang, Yu Jiang:
Group-based corpus scheduling for parallel fuzzing. 1521-1532 - Sijie Shen, Xiang Zhu, Yihong Dong, Qizhi Guo, Yankun Zhen, Ge Li:
Incorporating domain knowledge through task augmentation for front-end JavaScript code generation. 1533-1543 - James Ivers, Robert L. Nord, Ipek Ozkaya, Chris Seifried, Christopher Steven Timperley, Marouane Kessentini:
Industry experiences with large-scale refactoring. 1544-1554 - Runzhe Wang, Qinglong Wang, Yuxi Hu, Heyuan Shi, Yuheng Shen, Yu Zhan, Ying Fu, Zheng Liu, Xiaohai Shi, Yu Jiang:
Industry practice of configuration auto-tuning for cloud applications and services. 1555-1565 - Ying Fu, Meng Yan
, Jian Xu, Jianguo Li, Zhongxin Liu, Xiaohong Zhang, Dan Yang:
Investigating and improving log parsing in practice. 1566-1577 - Emily Rowan Winter, Vesna Nowack, David Bowes, Steve Counsell, Tracy Hall, Sæmundur Óskar Haraldsson, John R. Woodward, Serkan Kirbas, Etienne Windels, Olayori McBello, Abdurahman Atakishiyev, Kevin Kells, Matthew W. Pagano:
Towards developer-centered automatic program repair: findings from Bloomberg. 1578-1588 - Xin Peng, Chenxi Zhang, Zhongyuan Zhao, Akasaka Isami, Xiaofeng Guo, Yunna Cui:
Trace analysis based microservice architecture measurement. 1589-1599
Community
- Raula Gaikovina Kula, Christoph Treude
:
In war and peace: the impact of world politics on software ecosystems. 1600-1604
Machine Learning
- Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang
, James C. Davis:
Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliability. 1605-1609 - Shriram Shanbhag, Sridhar Chimalakonda:
Exploring the under-explored terrain of non-open source data for software engineering through the lens of federated learning. 1610-1614
Debugging/Localization
- Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis:
Reflections on software failure analysis. 1615-1620
Program Analysis
- Haoran Yang, Wen Li, Haipeng Cai:
Language-agnostic dynamic analysis of multilingual code: promises, pitfalls, and prospects. 1621-1626
Online Presentations
- Siyi Gong, Hao Zhong:
A study on identifying code author from real development. 1627-1631 - Paul Ralph, Sebastian Baltes:
Paving the way for mature secondary research: the seven types of literature review. 1632-1636
Community
- Ting Zhang
, Ivana Clairine Irsan, Ferdian Thung, DongGyun Han
, David Lo
, Lingxiao Jiang
:
iTiger: an automatic issue title generation tool. 1637-1641 - Chao Liu, Xuanlin Bao, Xin Xia, Meng Yan
, David Lo
, Ting Zhang
:
CodeMatcher: a tool for large-scale code search based on query semantics matching. 1642-1646
Software Evolution
- Shamsa Abid, Hamid Abdul Basit, Shafay Shamail:
Context-aware code recommendation in Intellij IDEA. 1647-1651 - Jiyang Zhang, Marko Ristin, Phillip Schanely, Hans Wernher van de Venn, Milos Gligoric:
Python-by-contract dataset. 1652-1656
Human/Computer Interaction
- Pedro Orvalho
, Mikolás Janota, Vasco M. Manquinho
:
MultIPAs: applying program transformations to introductory programming assignments for data augmentation. 1657-1661 - Wen Li, Li Li, Haipeng Cai:
PolyFax: a toolkit for characterizing multi-language software. 1662-1666
Software Testing
- Abhilash Gupta, Rahul Gopinath
, Andreas Zeller:
CLIFuzzer: mining grammars for command-line invocations. 1667-1671 - Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang
, David Lo
:
RecipeGen++: an automated trigger action programs generator. 1672-1676
Empirical
- Saad Ezzini, Sallam Abualhaija
, Chetan Arora
, Mehrdad Sabetzadeh:
TAPHSIR: towards AnaPHoric ambiguity detection and ReSolution in requirements. 1677-1681 - Sallam Abualhaija
, Chetan Arora
, Lionel C. Briand:
COREQQA: a COmpliance REQuirements understanding using question answering tool. 1682-1686
Formal Methods
- Shang-Wei Lin, Palina Tolmach, Ye Liu, Yi Li:
SolSEE: a source-level symbolic execution engine for solidity. 1687-1691 - Ye Zheng, Jiaxiang Liu, Xiaomu Shi:
MpBP: verifying robustness of neural networks with multi-path bound propagation. 1692-1696
Debugging
- Kowndinya Boyalakuntla
, Marimuthu Chinnakali
, Sridhar Chimalakonda, K. Chandrasekaran:
eGEN: an energy-saving modeling language and code generator for location-sensing of mobile apps. 1697-1700 - Marius Smytzek, Andreas Zeller:
SFLKit: a workbench for statistical fault localization. 1701-1705
Mining Software Repositories
- Saad Ezzini, Sallam Abualhaija
, Mehrdad Sabetzadeh:
WikiDoMiner: wikipedia domain-specific miner. 1706-1710 - Xuezhi Song, Yun Lin, Yijian Wu, Yifan Zhang, Siang Hwee Ng, Xin Peng, Jin Song Dong, Hong Mei:
RegMiner: mining replicable regression dataset from code repositories. 1711-1715
Program Analysis
- Ezio Bartocci, Leonardo Mariani, Dejan Nickovic, Drishti Yadav
:
FIM: fault injection and mutation for Simulink. 1716-1720 - Thomas Laurent, Paolo Arcaini
, Catia Trubiani, Anthony Ventresque:
JSIMutate: understanding performance results through mutations. 1721-1725
Security
- Truong Giang Nguyen, Thanh Le-Cong
, Hong Jin Kang, Xuan-Bach Dinh Le, David Lo
:
VulCurator: a vulnerability-fixing commit detector. 1726-1730 - Xingqi Cheng, Xiaobing Sun, Lili Bo, Ying Wei:
KVS: a tool for knowledge-driven vulnerability searching. 1731-1735 - Hoang H. Nguyen
, Nhat-Minh Nguyen, Hong-Phuc Doan, Zahra Ahmadi
, Thanh-Nam Doan, Lingxiao Jiang
:
MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddings. 1736-1740 - Haoxin Tu, Lingxiao Jiang
, Xuhua Ding
, He Jiang:
FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers. 1741-1745
Online Presentations
- Jared Q. Widberg, Sashank Narain, Yimin Chen:
Clang __usercall: towards native support for user defined calling conventions. 1746-1750 - Hao He, Haonan Su, Wenxin Xiao, Runzhi He, Minghui Zhou:
GFI-bot: automated good first issue recommendation on GitHub. 1751-1755 - Mingzhe Du, Shengcheng Yu, Chunrong Fang, Tongyu Li, Heyuan Zhang, Zhenyu Chen:
SemCluster: a semi-supervised clustering tool for crowdsourced test reports with deep image understanding. 1756-1759 - Ismet Burak Kadron, Tevfik Bultan:
TSA: a tool to detect and quantify network side-channels. 1760-1764
Session 1
- Xiaoliang Wu:
Blackbox adversarial attacks and explanations for automatic speech recognition. 1765-1769
Session 2
- Deeksha M. Arya:
This is your cue! assisting search behaviour with resource style properties. 1770-1774 - Daniel Sokolowski
:
Infrastructure as code for dynamic deployments. 1775-1779 - Rafael Fresno-Aranda
:
Automated capacity analysis of limitation-aware microservices architectures. 1780-1784
Session 3
- Milos Ojdanic:
Change-aware mutation testing for evolving systems. 1785-1789 - Ahmed Khanfir
:
Effective and scalable fault injection using bug reports and generative language models. 1790-1794 - Martin Eberlein:
Explaining and debugging pathological program behavior. 1795-1799
Session 4
- Nathan Cassee:
Sentiment in software engineering: detection and application. 1800-1804
Online Presentations
- Jiacheng Zhong:
A practical call graph construction method for Python. 1805-1807 - Juan C. Alonso
:
Automated generation of test oracles for RESTful APIs. 1808-1810 - Michael Weiss
:
CheapET-3: cost-efficient use of remote DNN models. 1811-1813 - Yunjeong Lee:
Improving IDE code inspections with tree automata. 1814-1815 - Yi Liu:
RESTInfer: automated inferring parameter constraints from natural language RESTful API descriptions. 1816-1818
Tutorials
- Joanna C. S. Santos, Julian Dolby:
Program analysis using WALA (tutorial). 1819 - Umang Mathur, Andreas Pavlogiannis:
Dynamic data race prediction: fundamentals, theory, and practice (tutorial). 1820 - Mauro Pezzè:
Machine learning and natural language processing for automating software testing (tutorial). 1821 - Robert Dyer, Samuel W. Flint
:
Performing large-scale mining studies: from start to finish (tutorial). 1822
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.