


default search action
27th SANER 2020: London, ON, Canada
- Kostas Kontogiannis, Foutse Khomh, Alexander Chatzigeorgiou, Marios-Eleftherios Fokaefs, Minghui Zhou:

27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020. IEEE 2020, ISBN 978-1-7281-5143-4 - Fang Lv, Hao Li, Lei Wang, Ying Liu, Huimin Cui, Jingling Xue

, Xiaobing Feng:
Referee: A Pattern-Guided Approach for Auto Design in Compiler-Based Analyzers. 1-12 - Pascal Gadient

, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. 13-22 - Yuyao Zhang, Siqi Ma

, Juanru Li, Kailai Li, Surya Nepal
, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. 23-34 - Zachary Eberhart, Alexander LeClair, Collin McMillan:

Automatically Extracting Subroutine Summary Descriptions from Unstructured Comments. 35-46 - Yan Cai, Yutian Tang

, Haicheng Li, Le Yu, Hao Zhou
, Xiapu Luo, Liang He, Purui Su:
Resource Race Attacks on Android. 47-58 - Scott Brisson, Ehsan Noei, Kelly A. Lyons:

We Are Family: Analyzing Communication in GitHub Software Repositories and Their Forks. 59-69 - C. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy:

Exploring Type Inference Techniques of Dynamically Typed Languages. 70-80 - Zhaoxu Zhang

, Hengcheng Zhu
, Ming Wen, Yida Tao, Yepang Liu, Yingfei Xiong:
How Do Python Framework APIs Evolve? An Exploratory Study. 81-92 - Manishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:

Associating Code Clones with Association Rules for Change Impact Analysis. 93-103 - Wei Tang, Ping Luo, Jialiang Fu, Dan Zhang:

LibDX: A Cross-Platform and Accurate System to Detect Third-Party Libraries in Binary Code. 104-115 - Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma

:
EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. 116-126 - Hongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei:

Sequence Directed Hybrid Fuzzing. 127-137 - Ariel Afonso, Altigran S. da Silva, Tayana Conte, Paulo Martins

, João M. B. Cavalcanti, Alessandro Garcia:
LESSQL: Dealing with Database Schema Changes in Continuous Deployment. 138-148 - Alvi Mahadi, Karan Tongay, Neil A. Ernst

:
Cross-Dataset Design Discussion Mining. 149-160 - Antonio Carvalho, Welder Pinheiro Luz, Diego Marcilio, Rodrigo Bonifácio, Gustavo Pinto, Edna Dias Canedo

:
C-3PR: A Bot for Fixing Static Analysis Violations via Pull Requests. 161-171 - Bo Chen, Zhenkun Yang, Li Lei, Kai Cong, Fei Xie:

Automated Bug Detection and Replay for COTS Linux Kernel Modules with Concolic Execution. 172-183 - Paolo Boldi, Antoine Pietri, Sebastiano Vigna, Stefano Zacchiroli:

Ultra-Large-Scale Repository Analysis via Graph Compression. 184-194 - Jonathan A. Saddler, Cole S. Peterson, Sanjana Sama, Shruthi Nagaraj, Olga Baysal, Latifa Guerrouj, Bonita Sharif

:
Studying Developer Reading Behavior on Stack Overflow during API Summarization Tasks. 195-205 - Victor Oliveira, Leopoldo Teixeira, Felipe Ebert:

On the Adoption of Kotlin on Android Development: A Triangulation Study. 206-216 - Marco Couto

, João Saraiva
, João Paulo Fernandes
:
Energy Refactorings for Android in the Large and in the Wild. 217-228 - Sarah Nadi, Christoph Treude

:
Essential Sentences for Navigating Stack Overflow Answers. 229-239 - Manishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:

HistoRank: History-Based Ranking of Co-change Candidates. 240-250 - Kijin An, Eli Tilevich

:
D-Goldilocks: Automatic Redistribution of Remote Functionalities for Performance and Efficiency. 251-260 - Wenhan Wang, Ge Li, Bo Ma, Xin Xia, Zhi Jin:

Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. 261-271 - Guanhua Li, Yijian Wu, Chanchal K. Roy, Jun Sun, Xin Peng, Nanjie Zhan, Bin Hu, Jingyi Ma:

SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU Acceleration. 272-283 - Jing Kai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu

:
CORE: Automating Review Recommendation for Code Changes. 284-295 - Renhao Xiong, David Lo

, Bixin Li:
Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. 296-307 - Béla Vancsics, Attila Szatmári

, Árpád Beszédes
:
Relationship between the Effectiveness of Spectrum-Based Fault Localization and Bug-Fix Types in JavaScript Programs. 308-319 - Johannes Härtel

, Ralf Lämmel:
Incremental Map-Reduce on Repository History. 320-331 - Marcel Steinbeck, Rainer Koschke, Marc O. Rüdel:

How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments. 332-343 - Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen, Lingxiao Jiang

:
Are the Code Snippets What We Are Searching for? A Benchmark and an Empirical Study on Code Search with Natural-Language Queries. 344-354 - Fiorella Zampetti, Alexander Serebrenik

, Massimiliano Di Penta:
Automatically Learning Patterns for Self-Admitted Technical Debt Removal. 355-366 - Aline Brito, André C. Hora, Marco Túlio Valente

:
Refactoring Graphs: Assessing Refactoring over Time. 367-377 - Filipe Falcão, Caio Barbosa, Baldoino Fonseca, Alessandro Garcia, Márcio Ribeiro, Rohit Gheyi:

On Relating Technical, Social Factors, and the Introduction of Bugs. 378-388 - Daniel San Martín, Bento R. Siqueira, Valter Vieira de Camargo, Fabiano Cutigi Ferrari:

Characterizing Architectural Drifts of Adaptive Systems. 389-399 - Samridhi Choudhary, Christopher Bogart

, Carolyn P. Rosé
, Jim Herbsleb:
Using Productive Collaboration Bursts to Analyze Open Source Collaboration Effectiveness. 400-410 - Basma S. Alqadi

, Jonathan I. Maletic:
Slice-Based Cognitive Complexity Metrics for Defect Prediction. 411-422 - Nathan Cassee

, Bogdan Vasilescu
, Alexander Serebrenik
:
The Silent Helper: The Impact of Continuous Integration on Code Reviews. 423-434 - Lannan Luo:

Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification. 435-446 - Qing Huang, An Qiu, Maosheng Zhong, Yuan Wang:

A Code-Description Representation Learning Model Based on Attention. 447-455 - Adelina Ciurumelea, Sebastian Proksch, Harald C. Gall

:
Suggesting Comment Completions for Python using Neural Language Models. 456-467 - Árpád Beszédes

, Ferenc Horváth, Massimiliano Di Penta, Tibor Gyimóthy:
Leveraging Contextual Information from Function Call Chains to Improve Fault Localization. 468-479 - Guangjie Li, Hui Liu, Jiahao Jin, Qasim Umer

:
Deep Learning Based Identification of Suspicious Return Statements. 480-491 - Brent van Bladel, Serge Demeyer:

Clone Detection in Test Code: An Empirical Evaluation. 492-500 - Valentina Lenarduzzi

, Francesco Lomio
, Heikki Huttunen
, Davide Taibi
:
Are SonarQube Rules Inducing Bugs? 501-511 - Rrezarta Krasniqi

, Jane Cleland-Huang:
Enhancing Source Code Refactoring Detection with Explanations from Commit Messages. 512-516 - Leonel Merino

, Mircea Lungu, Christoph Seidl:
Unleashing the Potentials of Immersive Augmented Reality for Software Engineering. 517-521 - Dae-Kyoo Kim, Ming Hua, Lunjin Lu:

Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features. 522-526 - Syed Fatiul Huq

, Ali Zafar Sadiq, Kazi Sakib:
Is Developer Sentiment Related to Software Bugs: An Exploratory Study on GitHub Commits. 527-531 - Mingzhe Hu

, Yu Zhang
:
The Python/C API: Evolution, Usage Statistics, and Bug Patterns. 532-536 - Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan

, Qinghua Zheng, Ting Liu:
Revisiting the Challenges and Opportunities in Software Plagiarism Detection. 537-541 - Zhensu Sun

, Yan Liu, Ziming Cheng, Chen Yang, Pengyu Che:
Req2Lib: A Semantic Neural Model for Software Library Recommendation. 542-546 - Pietro Abate, Roberto Di Cosmo, Georgios Gousios, Stefano Zacchiroli:

Dependency Solving Is Still Hard, but We Are Getting Better at It. 547-551 - Felipe Ebert, Fernando Castor

, Alexander Serebrenik
:
A Reflection on "An Exploratory Study on Exception Handling Bugs in Java Programs". 552-556 - Yu Nong, Haipeng Cai

:
A Preliminary Study on Open-Source Memory Vulnerability Detectors. 557-561 - Haipeng Cai

:
A Reflection on the Predictive Accuracy of Dynamic Impact Analysis. 562-566 - Romulo Nascimento, Aline Brito, André C. Hora, Eduardo Figueiredo:

JavaScript API Deprecation in the Wild: A First Assessment. 567-571 - Aman Yadav, Rishab Sharma, Fatemeh Hendijani Fard

:
A Semantic-Based Framework for Analyzing App Users' Feedback. 572-576 - Rui Zhou, Mohammad Hamdaqa

, Haipeng Cai
, Abdelwahab Hamou-Lhadj
:
MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices. 577-581 - Hajra Naeem, Manar H. Alalfi:

Identifying Vulnerable IoT Applications using Deep Learning. 582-586 - Sajeda Parveen, Manar H. Alalfi:

A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications. 587-591 - Marcus Vinicius Bertoncello, Gustavo Pinto, Igor Scaliante Wiese, Igor Steinmacher:

Pull Requests or Commits? Which Method Should We Use to Study Contributors' Behavior? 592-601 - Ferdian Thung, Stefanus A. Haryono, Lucas Serrano, Gilles Muller, Julia Lawall, David Lo

, Lingxiao Jiang
:
Automated Deprecated-API Usage Update for Android Apps: How Far are We? 602-611 - Kunihiro Noda, Yusuke Nemoto, Keisuke Hotta, Hideo Tanida, Shinji Kikuchi:

Experience Report: How Effective is Automated Program Repair for Industrial Software? 612-616 - Arjan J. Mooij, Jeroen Ketema, Steven Klusener, Mathijs Schuts:

Reducing Code Complexity through Code Refactoring and Model-Based Rejuvenation. 617-621 - Verena Geist, Michael Moser, Josef Pichler, Stefanie Beyer, Martin Pinzger:

Leveraging Machine Learning for Software Redocumentation. 622-626 - Stefan Strobl, Christina Zoffi, Christoph Haselmann, Mario Bernhart, Thomas Grechenig:

Automated Code Transformations: Dealing with the Aftermath. 627-631 - Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:

CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. 632-636 - Muhammad Hilmi Asyrofi, Ferdian Thung, David Lo

, Lingxiao Jiang
:
AUSearch: Accurate API Usage Search in GitHub Repositories with Type Resolution. 637-641 - Shogo Tokui, Norihiro Yoshida, Eunjong Choi

, Katsuro Inoue:
Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones. 642-646 - Marcel Steinbeck:

Mining Version Control Systems and Issue Trackers with LibVCS4j. 647-651 - Michael Rath, Mihaela Todorova Tomova, Patrick Mäder:

SpojitR: Intelligently Link Development Artifacts. 652-656 - Satoshi Yamashita, Shinpei Hayashi

, Motoshi Saeki:
ChangeBeadsThreader: An Interactive Environment for Tailoring Automatically Untangled Changes. 657-661 - Jie Wu, Chengyu Zhang

, Geguang Pu:
Reinforcement Learning Guided Symbolic Execution. 662-663 - Rudolf Ramler, Marko Gattringer, Josef Pichler:

Live Replay of Screen Videos: Automatically Executing Real Applications as Shown in Recordings. 664-665 - Yalda Hashemi, Maleknaz Nayebi, Giuliano Antoniol:

Documentation of Machine Learning Software. 666-667 - Cynthia Dookie:

Building an Inclusive Distributed Ledger System. 668-669

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














