Stop the war!
Остановите войну!
for scientists:
default search action
19th ESEC / 28th SIGSOFT FSE 2020: Virtual Event, USA
- Prem Devanbu, Myra B. Cohen, Thomas Zimmermann:
ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020. ACM 2020, ISBN 978-1-4503-7043-1
Analysis
- Changjian Zhang, David Garlan, Eunsuk Kang:
A behavioral notion of robustness for software systems. 1-12 - Sahar Badihi, Faridah Akinotcho, Yi Li, Julia Rubin:
ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code. 13-24 - Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. 25-37 - Mingxue Zhang, Wei Meng:
Detecting and understanding JavaScript global identifier conflicts on the web. 38-49 - Dirk Beyer, Karlheinz Friedberger:
Domain-independent interprocedural program analysis using block-abstraction memoization. 50-62 - Profir-Petru Pârtachi, Santanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr:
Flexeme: untangling commits using lexical flows. 63-74 - Zifan Nan, Hui Guan, Xipeng Shen:
HISyn: human learning-inspired natural language programming. 75-86 - Shivam Handa, Martin C. Rinard:
Inductive program synthesis over noisy data. 87-98 - Shahar Maoz, Rafi Shalom:
Inherent vacuity for GR(1) specifications. 99-110 - Rongchen Xu, Fei He, Bow-Yaw Wang:
Interval counterexamples for loop invariant learning. 111-122 - Vaibhav Sharma, Soha Hussein, Michael W. Whalen, Stephen McCamant, Willem Visser:
Java Ranger: statically summarizing regions for efficient symbolic execution of Java. 123-134 - Bobby R. Bruce, Tianyi Zhang, Jaspreet Arora, Guoqing Harry Xu, Miryung Kim:
JShrink: in-depth investigation into debloating modern Java applications. 135-146 - Sooyoung Cha, Hakjoo Oh:
Making symbolic execution promising by learning aggressive state-pruning strategy. 147-158 - Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, David Wolfe:
Mining assumptions for software components using machine learning. 159-171 - Rahul Gopinath, Björn Mathis, Andreas Zeller:
Mining input grammars from dynamic control flow. 172-183 - Dominik Helm, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini:
Modular collaborative program analysis in OPAL. 184-196 - David Trabish, Timotej Kapus, Noam Rinetzky, Cristian Cadar:
Past-sensitive pointer analysis for symbolic execution. 197-208 - Michael Pradel, Georgios Gousios, Jason Liu, Satish Chandra:
TypeWriter: neural type prediction with search-based validation. 209-220 - Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul L. Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. 221-232
APIs
- Jiawei Wang, Li Li, Kui Liu, Haipeng Cai:
Exploring how deprecated Python library APIs are (not) handled. 233-244 - Enrique Larios Vargas, Maurício Finavaro Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios:
Selecting third-party libraries: the practitioners' perspective. 245-256
Cloud / Services
- Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A principled approach to GraphQL query cost analysis. 257-268 - Alex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first components. 269-280 - Malik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Daniel Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield:
Block public access: trust safety verification of access control policies. 281-291 - Jiazhen Gu, Chuan Luo, Si Qin, Bo Qiao, Qingwei Lin, Hongyu Zhang, Ze Li, Yingnong Dang, Shaowei Cai, Wei Wu, Yangfan Zhou, Murali Chintalapati, Dongmei Zhang:
Efficient incident identification from multi-dimensional issue reports via meta-heuristic search. 292-303 - Yujun Chen, Xian Yang, Hang Dong, Xiaoting He, Hongyu Zhang, Qingwei Lin, Junjie Chen, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, Dongmei Zhang:
Identifying linked incidents in large-scale online service systems. 304-314 - Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei:
Real-time incident prediction for online service systems. 315-326
Configuration
- Carmine Vassallo, Sebastian Proksch, Anna Jancso, Harald C. Gall, Massimiliano Di Penta:
Configuration smells in continuous delivery pipelines: a linter and a six-month study on GitLab. 327-337 - Norbert Siegmund, Nicolai Ruckel, Janet Siegmund:
Dimensions of software configuration: on the configuration context in modern software development. 338-349 - Liu Liu, Sibren Isaacman, Ulrich Kremer:
Global cost/quality management across multiple applications. 350-361 - Qingrong Chen, Teng Wang, Owolabi Legunsen, Shanshan Li, Tianyin Xu:
Understanding and discovering software configuration dependencies in cloud and datacenter systems. 362-374
Documentation
- Samim Mirhosseini, Chris Parnin:
Docable: evaluating the executability of software tutorials. 375-385 - Sahar Mehrpour, Thomas D. LaToza, Hamed Sarvari:
RulePad: interactive authoring of checkable design rules. 386-397
Empirical
- Xin Tan, Minghui Zhou, Zeyu Sun:
A first look at good first issues on GitHub. 398-409 - Phillip Merlin Uesbeck, Cole S. Peterson, Bonita Sharif, Andreas Stefik:
A randomized controlled trial on the effects of embedded computer language switching. 410-420 - Jefferson De Oliveira Silva, Igor Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher:
A theory of the engagement in open source projects via summer of code programs. 421-431 - Jacob Krüger, Thorsten Berger:
An empirical analysis of the costs of clone- and platform-oriented software reuse. 432-444 - Linda Erlenhov, Francisco Gomes de Oliveira Neto, Philipp Leitner:
An empirical study of bots in software development: characteristics and challenges from a practitioner's perspective. 445-455 - Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, Westley Weimer:
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines. 456-468 - Ben Hermann, Stefan Winter, Janet Siegmund:
Community expectations for research artifacts and evaluation processes. 469-480 - Mahnaz Behroozi, Shivani Shirolkar, Titus Barik, Chris Parnin:
Does stress impact technical interview performance? 481-492 - Yvonne Dittrich, Christian Bo Michelsen, Paolo Tell, Pernille Lous, Allan Ebdrup:
Exploring the evolution of software practices. 493-504 - Hemank Lamba, Asher Trockman, Daniel Armanios, Christian Kästner, Heather Miller, Bogdan Vasilescu:
Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem. 505-517 - Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, effort-aware library version harmonization. 518-529 - Jaeseong Lee, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
On the naturalness of hardware descriptions. 530-542 - Umme Ayda Mannan, Iftekhar Ahmed, Carlos Jensen, Anita Sarma:
On the relationship between design discussions and design quality: a case study of Apache projects. 543-555 - Massimiliano Di Penta, Gabriele Bavota, Fiorella Zampetti:
On the relationship between refactoring actions and bugs: a differentiated replication. 556-567 - Hennie Huijgens, Ayushi Rastogi, Ernst Mulders, Georgios Gousios, Arie van Deursen:
Questions for data scientists in software engineering: a replication. 568-579 - Yi Wang, Min Zhang:
Reducing implicit gender biases in software development: does intergroup contact theory work? 580-592 - Sergio García, Daniel Strüber, Davide Brugali, Thorsten Berger, Patrizio Pelliccione:
Robotics software engineering: a perspective from the service robotics domain. 593-604 - Dan Gopstein, Anne-Laure Fayard, Sven Apel, Justin Cappos:
Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion. 605-616 - Yiling Lou, Zhenpeng Chen, Yanbin Cao, Dan Hao, Lu Zhang:
Understanding build issue resolution in practice: symptoms and fix patterns. 617-628 - Ameya Ketkar, Nikolaos Tsantalis, Danny Dig:
Understanding type changes in Java. 629-641
Fairness
- Sumon Biswas, Hridesh Rajan:
Do the machine learning models on a crowd sourced platform exhibit bias? an empirical study on model fairness. 642-653 - Joymallya Chakraborty, Suvodeep Majumder, Zhe Yu, Tim Menzies:
Fairway: a way to build fair ML software. 654-665 - Ye Liu, Yi Li, Shang-Wei Lin, Rong Zhao:
Towards automated verification of smart contract fairness. 666-677
Fuzzing
- Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha:
Boosting fuzzer efficiency: an information theoretic perspective. 678-689 - Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. 690-700 - Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Detecting critical bugs in SMT solvers using blackbox mutational fuzzing. 701-712 - Marcel Böhme, Brandon Falk:
Fuzzing: on the exponential cost of vulnerability discovery. 713-724 - Patrice Godefroid, Bo-Yuan Huang, Marina Polishchuk:
Intelligent REST API data fuzzing. 725-736 - Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray:
MTFuzz: fuzzing with a multi-task neural network. 737-749
Machine Learning
- Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
A comprehensive study on challenges in deploying deep learning based software. 750-762 - José Pablo Cambronero, Jürgen Cito, Martin C. Rinard:
AMS: generating AutoML search spaces from weak specifications. 763-774 - Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. 775-787 - Zan Wang, Ming Yan, Junjie Chen, Shuang Liu, Dongdi Zhang:
Deep learning library testing via effective model generation. 788-799 - Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis:
DeepSearch: a simple and effective blackbox attack for deep neural networks. 800-812 - Simin Chen, Soroush Bateni, Sampath Grandhi, Xiaodi Li, Cong Liu, Wei Yang:
DENAS: automated rule generation by knowledge extraction from neural networks. 813-825 - Yuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong, Shing-Chi Cheung, Tao Xie:
Detecting numerical bugs in neural network architectures. 826-837 - Ziqi Zhang, Yuanchun Li, Yao Guo, Xiangqun Chen, Yunxin Liu:
Dynamic slicing for deep neural networks. 838-850 - Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quanquan Gu, Miryung Kim:
Is neuron coverage a meaningful measure for testing deep neural networks? 851-862 - Shashij Gupta, Pinjia He, Clara Meister, Zhendong Su:
Machine translation testing via pathological invariance. 863-875 - Vincenzo Riccio, Paolo Tonella:
Model-based exploration of the frontier of behaviours for deep learning system testing. 876-888 - Rangeet Pan, Hridesh Rajan:
On decomposing a deep neural network into modules. 889-900 - Zenan Li, Xiaoxing Ma, Chang Xu, Jingwei Xu, Chun Cao, Jian Lu:
Operational calibration: debugging confidence errors for DNNs in the field. 901-913
Mobile
- Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. 914-926 - Reyhaneh Jabbarvand, Forough Mehralian, Sam Malek:
Automated construction of energy test oracles for Android. 927-938 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
Borrowing your enemy's arrows: the case of code reuse in Android via direct inter-app code invocation. 939-951 - Linjie Pan, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan, Jian Zhang:
Static asynchronous component misuse detection for Android applications. 952-963
Performance / QoS
- Yutong Zhao, Lu Xiao, Pouria Babvey, Lei Sun, Sunny Wong, Angel A. Martinez, Xiao Wang:
Automatically identifying performance issue reports with heuristic linguistic patterns. 964-975 - Timur Babakol, Anthony Canino, Khaled Mahmoud, Rachit Saxena, Yu David Liu:
Calm energy accounting for multithreaded Java applications. 976-988 - Christoph Laaber, Stefan Würsten, Harald C. Gall, Philipp Leitner:
Dynamically reconfiguring software microbenchmarks: reducing execution time without sacrificing result quality. 989-1001 - Claudio Mandrioli, Martina Maggio:
Testing self-adaptive software with probabilistic guarantees on performance metrics. 1002-1014
Recommendation
- Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao:
API method recommendation via explicit matching of functionality verb phrases. 1015-1026 - Tam Nguyen, Phong Vu, Tung Nguyen:
Code recommendation for exception handling. 1027-1038 - Arman Shahbazian, Suhrid Karthik, Yuriy Brun, Nenad Medvidovic:
eQual: informing early design decisions. 1039-1051 - Sonal Mahajan, Negarsadat Abolhassani, Mukul R. Prasad:
Recommending stack overflow posts for fixing runtime exceptions using failure scenario matching. 1052-1064 - Chris Brown, Chris Parnin:
Understanding the impact of GitHub suggested changes on recommendations between developers. 1065-1076
Security
- Kripa Shanker, Arun Joseph, Vinod Ganapathy:
An evaluation of methods to port legacy code to SGX enclaves. 1077-1088 - Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boytsov, Yves Le Traon, Anne Goujon:
Search-based adversarial testing and improvement of constrained credit scoring systems. 1089-1100 - Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. 1101-1113
Testing
- Eduard Baranov, Axel Legay, Kuldeep S. Meel:
Baital: an adaptive weighted sampling approach for improved t-wise coverage. 1114-1126 - Giovani Guizzo, Federica Sarro, Mark Harman:
Cost measures matter for mutation testing study validity. 1127-1139 - Manuel Rigger, Zhendong Su:
Detecting optimization bugs in database engines via non-optimizing reference engine construction. 1140-1152 - M. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz:
Efficient binary-level coverage analysis. 1153-1164 - Chu-Pan Wong, Jens Meinicke, Leo Chen, João Paulo Diniz, Christian Kästner, Eduardo Figueiredo:
Efficiently finding higher-order mutants. 1165-1177 - Valerio Terragni, Gunel Jahangirova, Paolo Tonella, Mauro Pezzè:
Evolutionary improvement of assertion oracles. 1178-1189 - Yixue Zhao, Justin Chen, Adriana Sejfia, Marcelo Schmitt Laser, Jie Zhang, Federica Sarro, Mark Harman, Nenad Medvidovic:
FrUITeR: a framework for evaluating UI test reuse. 1190-1201 - Jieshan Chen, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li:
Object detection for graphical user interface: old fashioned or deep learning or a combination? 1202-1214 - Rahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu, Shan Lu:
Understanding and automatically detecting conflicting interactions between smart home IoT applications. 1215-1227 - Alexander Kampmann, Nikolas Havrikov, Ezekiel O. Soremekun, Andreas Zeller:
When does my program do this? learning circumstances of software behavior. 1228-1239
Industry Papers
- Zi Peng, Jinqiu Yang, Tse-Hsun (Peter) Chen, Lei Ma:
A first look at the integration of machine learning models in complex autonomous driving systems: a case study on Apollo. 1240-1250 - Alexander Suh:
Adapting bug prediction models to predict reverted commits at Wayfair. 1251-1262 - Shinobu Saito, Yukako Iimura, Emad Aghayi, Thomas D. LaToza:
Can microtask programming work in industry? 1263-1273 - Bennett Mackenzie, Vera Pantelic, Gordon Marks, Stephen Wynn-Williams, Gehan M. K. Selim, Mark Lawford, Alan Wassyng, Moustapha Diab, Feisel Weslati:
Change impact analysis in Simulink designs of embedded systems. 1274-1284 - Linyi Li, Zhenwen Li, Weijie Zhang, Jun Zhou, Pengcheng Wang, Jing Wu, Guanghua He, Xia Zeng, Yuetang Deng, Tao Xie:
Clustering test steps in natural language toward automating test automation. 1285-1295 - Jiazhen Gu, Jiaqi Wen, Zijian Wang, Pu Zhao, Chuan Luo, Yu Kang, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Bo Qiao, Liqun Li, Qingwei Lin, Dongmei Zhang:
Efficient customer incident triage via linking with system incidents. 1296-1307 - Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang:
Effort-aware just-in-time defect identification in practice: a case study at Alibaba. 1308-1319 - Yu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin, Mao Yang:
Enhancing the interoperability between deep learning frameworks by model conversion. 1320-1330 - Cem Sürücü, Bianying Song, Jacob Krüger, Gunter Saake, Thomas Leich:
Establishing key performance indicators for measuring software-development processes at a large organization. 1331-1341 - Yanjie Gao, Yu Liu, Hongyu Zhang, Zhengxian Li, Yonghao Zhu, Haoxiang Lin, Mao Yang:
Estimating GPU memory consumption of deep learning models. 1342-1352 - Celeste Barnaby, Koushik Sen, Tianyi Zhang, Elena L. Glassman, Satish Chandra:
Exempla gratis (E.G.): code examples for free. 1353-1364 - He Zhang, Huang Huang, Dong Shao, Xin Huang:
Fireteam: a small-team development practice in industry. 1365-1375