Last update: Sat Dec 21 08:01:51 MST 2024
Volume 1, Number 1, January, 1992A. Jefferson Offutt Investigations of the software testing coupling effect . . . . . . . . . . . . 5--20 Kurt M. Olender and Leon J. Osterweil Interprocedural static analysis of sequencing constraints . . . . . . . . . 21--52 Victor R. Basili and Gianluigi Caldiera and Giovanni Cantone A reference architecture for the component factory . . . . . . . . . . . 53--80 Carmen J. Trammell and Leon H. Binder and Cathrine E. Snyder The automated production control documentation system: a case study in cleanroom software engineering . . . . . 81--94 Robert A. Ballance and Susan L. Graham and Michael L. Van de Vanter The Pan language-based editing system 95--127
G. Engels and C. Lewerentz and M. Nagl and W. Schäfer and A. Schürr Building integrated software development environments. Part I tool specification 135--167 James D. Kiper Structural testing of rule-based expert systems . . . . . . . . . . . . . . . . 168--187 G. Michael Schneider and Johnny Martin and W. T. Tsai An experimental study of fault detection in user requirements documents . . . . . 188--204
Eduardo Ostertag and James Hendler and Rubén Prieto Díaz and Christine Braun Computing similarity in a reuse library system: an AI-based approach . . . . . . 205--228 Kevin J. Sullivan and David Notkin Reconciling environment integration and software evolution . . . . . . . . . . . 229--268 Shmuel Tyszberowicz and Amiram Yehudai OBSERV --- a prototyping language and environment . . . . . . . . . . . . . . 269--309 Wuu Yang and Susan Horwitz and Thomas Reps A program integration algorithm that accommodates semantics-preserving transformations . . . . . . . . . . . . 310--354
Don Batory and Sean O'Malley The design and implementation of hierarchical software systems with reusable components . . . . . . . . . . 355--398 David Harel and Chaim-arie Kahana On statecharts with overlapping . . . . 399--421 Steven J. Zeil and Faten H. Afifi and Lee J. White Detection of linear errors via domain testing . . . . . . . . . . . . . . . . 422--451
Manfred Broy Functional specification of time-sensitive communicating systems . . 1--46 Gail E. Kaiser and Simon M. Kaplan Parallel and distributed incremental attribute evaluation algorithms for multiuser software development environments . . . . . . . . . . . . . . 47--92 James A. Whittaker and J. H. Poore Markov analysis of software specifications . . . . . . . . . . . . . 93--106
Richard A. DeMillo and A. Jefferson Offutt Experimental results from an automatic test case generator . . . . . . . . . . 109--127 Yishai A. Feldman and Haim Schneider Simulating reactive systems by deduction 128--175 P. Klint A meta-environment for generating programming environments . . . . . . . . 176--201
Paolo Ciancarini Coordinating rule-based software processes with ESP . . . . . . . . . . . 203--227 William G. Griswold and David Notkin Automated assistance for program restructuring . . . . . . . . . . . . . 228--269 M. Jean Harrold and Rajiv Gupta and Mary Lou Soffa A methodology for controlling the size of a test suite . . . . . . . . . . . . 270--285 Andy Podgurski and Lynn Pierce Retrieving reusable software by sampling behavior . . . . . . . . . . . . . . . . 286--303
Laura K. Dillon A visual execution model for Ada tasking 311--345 Farn Wang and Aloysius K. Mok and E. Allen Emerson Distributed real-time system specification and verification in APTL 346--378 Pamela Zave and Michael Jackson Conjunction as composition . . . . . . . 379--411
Rolf Adams and Walter Tichy and Annette Weinert The cost of selective recompilation and environment processing . . . . . . . . . 3--28 István Forgács Double iterative framework for flow-sensitive interprocedural data flow analysis . . . . . . . . . . . . . . . . 29--55 Angelo Morzenti and Pierluigi San Pietro Object-oriented logical specification of time-critical systems . . . . . . . . . 56--98
Roong-Ko Doong and Phyllis G. Frankl The ASTOOT approach to testing object-oriented programs . . . . . . . . 101--130 L. K. Dillon and G. Kutty and L. E. Moser and P. M. Melliar-Smith and Y. S. Ramakrishna A graphical interval logic for specifying concurrent systems . . . . . 131--165 Francesco Parisi-Presicce and Alfonso Pierantonio An algebraic theory of class specification . . . . . . . . . . . . . 166--199
Philip J. Bernhard A reduced test suite for protocol conformance testing . . . . . . . . . . 201--220 Yoonsik Cheon and Gary T. Leavens The Larch/Smalltalk interface specification language . . . . . . . . . 221--253 Bingchiang Jeng and Elaine J. Weyuker A simplified domain-testing strategy . . 254--270
Christian Creveuil and Gruia-Catalin Roman Formal specification and design of a message router . . . . . . . . . . . . . 271--307 Miguel Felder and Angelo Morzenti Validating real-time systems by history-checking TRIO specifications . . 308--339 S. Duri and U. Buy and R. Devarapalli and S. M. Shatz Application and experimental evaluation of state space reduction methods for deadlock analysis in Ada . . . . . . . . 340--380
David Binkley and Susan Horwitz and Thomas Reps Program integration for languages with procedure calls . . . . . . . . . . . . 3--35 W. E. Howden and Yudong Huang Software trustability analysis . . . . . 36--64 Michal Young and Richard N. Taylor and David L. Levine and Kari A. Nies and Debra Brodbeck A concurrency analysis tool suite for Ada programs: rationale, design, and preliminary experience . . . . . . . . . 65--106
Daniel Jackson Aspect: detecting bugs with abstract dependences . . . . . . . . . . . . . . 109--145 Amy Moormann Zaremski and Jeannette M. Wing Signature matching: a tool for using software libraries . . . . . . . . . . . 146--170 Mauro Pezz\`e and Richard N. Taylor and Michal Young Graph models for reachability analysis of concurrent programs . . . . . . . . . 171--213 Bevin R. Brett Comments on ``The cost of selective recompilation and environment processing'' . . . . . . . . . . . . . . 214--216 Walter Tichy and Rolf Adams and Annette Weinert Authors' response . . . . . . . . . . . 217--219
Stanley M. Sutton and Dennis Heimbigner and Leon J. Osterweil APPL/A: a language for software process programming . . . . . . . . . . . . . . 221--286 H. Rebecca Callison A time-sensitive object model for real-time systems . . . . . . . . . . . 287--317
Gregory D. Abowd and Robert Allen and David Garlan Formalizing style to understand descriptions of software architecture 319--364 Daniel Jackson Structuring Z specifications with views 365--389
Mark van den Brand and Eelco Visser Generation of formatters for context-free languages . . . . . . . . . 1--41 Premkumar T. Devanbu and David S. Rosenblum and Alexander L. Wolf Generating testing and analysis tools with Aria . . . . . . . . . . . . . . . 42--62 Roger Ferguson and Bogdan Korel The chaining approach for software test data generation . . . . . . . . . . . . 63--86
Elaine J. Weyuker Using failure cost information for testing and reliability assessment . . . 87--98 A. Jefferson Offutt and Ammei Lee and Gregg Rothermel and Roland H. Untch and Christian Zapf An experimental determination of sufficient mutant operators . . . . . . 99--118 Francesco Bergadano and Daniele Gunetti Testing by means of inductive program learning . . . . . . . . . . . . . . . . 119--145 Gregor Snelting Reengineering of configurations based on mathematical concept analysis . . . . . 146--189
Gianpaolo Cugola and Elisabetta Di Nitto and Alfonso Fuggetta and Carlo Ghezzi A framework for formalizing inconsistencies and deviations in human-centered systems . . . . . . . . . 191--230 Constance L. Heitmeyer and Ralph D. Jeffords and Bruce G. Labaw Automated consistency checking of requirements specifications . . . . . . 231--261 Gail C. Murphy and David Notkin Lightweight lexical source model extraction . . . . . . . . . . . . . . . 262--292
David Harel and Amnon Naamad The STATEMATE semantics of statecharts 293--333 Shing Chi Cheung and Jeff Kramer Context constraints for compositional reachability analysis . . . . . . . . . 334--377 Daniel J. Barrett and Lori A. Clarke and Peri L. Tarr and Alexander E. Wise A framework for event-based software integration . . . . . . . . . . . . . . 378--421 Anonymous Author Index . . . . . . . . . . . . . . 422--423
Pamela Zave and Michael Jackson Four dark corners of requirements engineering . . . . . . . . . . . . . . 1--30 L. E. Moser and Y. S. Ramakrishna and G. Kutty and P. M. Melliar-Smith and L. K. Dillon A graphical environment for the design of concurrent real-time systems . . . . 31--79 Laura K. Dillon Task dependence and termination in Ada 80--110
Scott Henninger An evolutionary approach to constructing effective software reuse repositories 111--140 Premkumar Devanbu and Mark A. Jones The use of description logics in KBSE systems . . . . . . . . . . . . . . . . 141--172 Gregg Rothermel and Mary Jean Harrold A safe, efficient regression test selection technique . . . . . . . . . . 173--210
Robert Allen and David Garlan A formal basis for architectural connection . . . . . . . . . . . . . . . 213--249 Gruia-Catalin Roman and Peter J. McCann and Jerome Y. Plun Mobile UNITY: reasoning and specification in mobile computing . . . 250--282 Vincenzo Ambriola and Reidar Conradi and Alfonso Fuggetta Assessing process-centered software engineering environments . . . . . . . . 283--328 Alexandre Petrenko Comments on ``A reduced test suite for protocol conformance testing'' . . . . . 329--331
Amy Moormann Zaremski and Jeannette M. Wing Specification matching of software components . . . . . . . . . . . . . . . 333--369 Rajiv Gupta and Mary Lou Soffa and John Howard Hybrid slicing: integrating dynamic information with static analysis . . . . 370--397 Andreas Zeller and Gregor Snelting Unified versioning through feature logic 398--441
John C. Doppke and Dennis Heimbigner and Alexander L. Wolf Software process modeling and execution within virtual environments . . . . . . 1--40 Adam Porter and Harvey Siy and Audris Mockus and Lawrence Votta Understanding the sources of variation in software inspections . . . . . . . . 41--79 Luciano Baresi and Mauro Pezz\`e Toward formalizing structured analysis 80--107
Robert W. Bowdidge and William G. Griswold Supporting the restructuring of data abstractions through manipulation of a program visualization . . . . . . . . . 109--157 Gail C. Murphy and David Notkin and William G. Griswold and Erica S. Lan An empirical study of static call graph extractors . . . . . . . . . . . . . . . 158--191 James J. Hunt and Kiem-Phong Vo and Walter F. Tichy Delta algorithms an empirical analysis 192--214
Jonathan E. Cook and Alexander L. Wolf Discovering models of software processes from event-based data . . . . . . . . . 215--249 Huo Yan Chen and T. H. Tse and F. T. Chan and T. Y. Chen In black and white: an integrated approach to class-level testing of object-oriented programs . . . . . . . . 250--295 Judith Crow and Ben Di Vito Formalizing space shuttle software requirements: four case studies . . . . 296--332 Robert Allen and David Garlan Errata: ``A formal basis for architectural connection'' . . . . . . . 333--334
Anthony Hunter and Bashar Nuseibeh Managing inconsistent specifications: reasoning, analysis, and action . . . . 335--367 Maria Letizia Jaccheri and Gian Pietro Picco and Patricia Lago Eliciting software process models with the E3 language . . . . . . . . . . . . 368--410 Alfonso Fuggetta and Luigi Lavazza and Sandro Morasca and Stefano Cinti and Giandomenico Oldano and Elena Orazi Applying GQM in an industrial software factory . . . . . . . . . . . . . . . . 411--448 James J. Hunt and Walter F. Tichy Addendum to ``Delta algorithms: an empirical analysis'' . . . . . . . . . . 449--449
Jonathan S. Ostroff Composition and refinement of discrete real-time systems . . . . . . . . . . . 1--48 Shing Chi Cheung and Jeff Kramer Checking safety properties using compositional reachability analysis . . 49--78 Emanuele Ciapessoni and Piergiorgio Mirandola and Alberto Coen-Porisini and Dino Mandrioli and Angelo Morzenti From formal models to formally based methods: an industrial experience . . . 79--113
Peter J. McCann and Gruia-Catalin Roman Modeling mobile IP in mobile UNITY . . . 115--146 Jonathan E. Cook and Alexander L. Wolf Software process validation: quantitatively measuring the correspondence of a process to a model 147--176 Premkumar T. Devanbu GENOA --- a customizable, front-end-retargetable source code analysis framework . . . . . . . . . . . 177--212
E. Damiani and M. G. Fugini and C. Bellettini A hierarchy-aware approach to faceted classification of objected-oriented components . . . . . . . . . . . . . . . 215--262 Andy Podgurski and Wassim Masri and Yolanda McCleese and Francis G. Wolff and Charles Yang Estimation of software reliability by stratified sampling . . . . . . . . . . 263--283 Jean-Marc Jézéquel Reifying variants in configuration management . . . . . . . . . . . . . . . 284--295
Steven P. Reiss The Desert environment . . . . . . . . . 297--342 Klaus Pohl and Klaus Weidenhaupt and Ralf Dömges and Peter Haumer and Matthias Jarke and Ralf Klamma PRIME --- toward process-integrated modeling environments: 1 . . . . . . . . 343--410 D. Richard Kuhn Fault classes and error detection capability of specification-based testing . . . . . . . . . . . . . . . . 411--424 E. Damiani and M. G. Fugini and C. Bellettini Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components . . . . . . . 425--472
Tevfik Bultan and Richard Gerber and Christopher League Composite model-checking: verification with type-specific symbolic representations . . . . . . . . . . . . 3--50 James C. Corbett Using shape analysis to reduce finite-state models of concurrent Java programs . . . . . . . . . . . . . . . . 51--93 Carl A. Gunter Abstracting dependencies between software configuration items . . . . . . 94--131
A. Prasad Sistla and Viktor Gyuris and E. Allen Emerson SMC: a symmetry-based model checker for verification of safety and liveness properties . . . . . . . . . . . . . . . 133--166 P. Ciancarini and F. Franzé and C. Mascolo Using a coordination language to specify and analyze systems containing mobile components . . . . . . . . . . . . . . . 167--198 Panagiotis Louridas and Pericles Loucopoulos A generic model for reflective design 199--237
Paola Inverardi and Alexander L. Wolf and Daniel Yankelevich Static checking of system behaviors using derived component assumptions . . 239--272 Naftaly H. Minsky and Victoria Ungureanu Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems . . . . . . . . . . 273--305 Kevin L. Mills and Hassan Gomaa A knowledge-based method for inferring semantic concepts from visual models of system behavior . . . . . . . . . . . . 306--337
Dan S. Wallach and Andrew W. Appel and Edward W. Felten SAFKASI: a security mechanism for language-based systems . . . . . . . . . 341--378 Philip W. L. Fong and Robert D. Cameron Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking . . . . . . . . . . . . 379--409 Andrew C. Myers and Barbara Liskov Protecting privacy using the decentralized label model . . . . . . . 410--442 E. M. Clarke and S. Jha and W. Marrero Verifying security protocols with Brutus 443--487 Antonio Durante and Riccardo Focardi and Roberto Gorrieri A compiler for analyzing cryptographic protocols using noninterference . . . . 488--528
F. Tip and T. B. Dinesh A slicing-based approach for locating type errors . . . . . . . . . . . . . . 5--55 Huo Yan Chen and T. H. Tse and T. Y. Chen TACCLE: a methodology for object-oriented software testing at the class and cluster levels . . . . . . . . 56--109 Gregg Rothermel and Margaret Burnett and Lixin Li and Christopher Dupuis and Andrei Sheretov A methodology for testing spreadsheets 110--147
John Bible and Gregg Rothermel and David S. Rosenblum A comparative study of coarse- and fine-grained safe regression test-selection techniques . . . . . . . 149--183 Todd L. Graves and Mary Jean Harrold and Jung-Min Kim and Adam Porter and Gregg Rothermel An empirical study of regression test selection techniques . . . . . . . . . . 184--208 Saurabh Sinha and Mary Jean Harrold and Gregg Rothermel Interprocedural control dependence . . . 209--254
Angelo Gargantini and Angelo Morzenti Automated deductive requirements analysis of critical systems . . . . . . 255--307 Dewayne E. Perry and Harvey P. Siy and Lawrence G. Votta Parallel changes in large-scale software development: an observational case study 308--337 Gian Pietro Picco and Gruia-Catalin Roman and Peter J. McCann Reasoning about code mobility with mobile UNITY . . . . . . . . . . . . . . 338--395
J.-R. Beauvais and E. Rutten and T. Gautier and R. Houdebine and P. Le Guernic and Y.-M. Tang Modeling statecharts and activitycharts as signal equations . . . . . . . . . . 397--451 Angela Bonifati and Fabiano Cattaneo and Stefano Ceri and Alfonso Fuggetta and Stefano Paraboschi Designing data marts for data warehouses 452--483
Nenad Medvidovic and David S. Rosenblum and David F. Redmiles and Jason E. Robbins Modeling software architectures in the Unified Modeling Language . . . . . . . 2--57 Tatsuhiro Tsuchiya and Tohru Kikuno On fault classes and error detection capability of specification-based testing . . . . . . . . . . . . . . . . 58--62 Idit Keidar and Roger Khazan and Nancy Lynch and Alex Shvartsman An inheritance-based technique for building simulation proofs incrementally 63--91 Michael Schrefl and Markus Stumptner Behavior-consistent specialization of object life cycles . . . . . . . . . . . 92--148
Miguel Felder and Mauro Pezz\`e A formal design notation for real-time systems . . . . . . . . . . . . . . . . 149--190 Don Batory and Clay Johnson and Bob Macdonald and Dale Von Heeder Achieving extensibility through product-lines and domain-specific languages: a case study . . . . . . . . 191--214 Yannis Smaragdakis and Don Batory Mixin layers: an object-oriented implementation technique for refinements and collaboration-based designs . . . . 215--255 Daniel Jackson Alloy: a lightweight object modelling notation . . . . . . . . . . . . . . . . 256--290
Alexander P. Pons Temporal abstract classes and virtual temporal specifications for real-time systems . . . . . . . . . . . . . . . . 291--308 Audris Mockus and Roy T. Fielding and James D. Herbsleb Two case studies of open source software development: Apache and Mozilla . . . . 309--346 Donglin Liang and Mary Jean Harrold Equivalence analysis and its application in improving the efficiency of program slicing . . . . . . . . . . . . . . . . 347--383
Anonymous Obituary: Ole-Johan Dahl, 1931--2002; Edsger Wybe Dijkstra, 1930--2002; Kristen Nygaard, 1926--2002 . . . . . . 385--385 Marco Bernardo and Paolo Ciancarini and Lorenzo Donatiello Architecting families of software systems with process algebras . . . . . 386--426 R. M. Hierons Comparing test sets and criteria in the presence of test hypotheses and fault domains . . . . . . . . . . . . . . . . 427--448 Alexander Egyed Automated abstraction of class diagrams 449--491
Carlo Ghezzi and Jeffrey N. Magee and Dieter Rombach and Mary Lou Soffa Editorial . . . . . . . . . . . . . . . 1--2 Amy P. Felty and Kedar S. Namjoshi Feature specification and automated conflict detection . . . . . . . . . . . 3--27 Christian Nentwich and Wolfgang Emmerich and Anthony Finkelstein and Ernst Ellmer Flexible consistency checking . . . . . 28--63 Antónia Lopes and Michel Wermelinger and José Luiz Fiadeiro Higher-order architectural connectors 64--104 ACM Transactions on Software Engineering and Methodology staff Reviewers 2002 . . . . . . . . . . . . . 105--105
Alberto Coen-Porisini and Matteo Pradella and Matteo Rossi and Dino Mandrioli A formal approach for designing CORBA-based applications . . . . . . . . 107--151 Mark G. J. Van Den Brand and Paul Klint and Jurgen J. Vinju Term rewriting with traversal functions 152--190 Martin P. Robillard and Gail C. Murphy Static analysis to support the evolution of exception structure in object-oriented systems . . . . . . . . 191--221 Luca Durante and Riccardo Sisto and Adriano Valenzano Automatic testing equivalence verification of spi calculus specifications . . . . . . . . . . . . . 222--284
Yossi Cohen and Yishai A. Feldman Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation . . 285--316 Franco Zambonelli and Nicholas R. Jennings and Michael Wooldridge Developing multiagent systems: The Gaia methodology . . . . . . . . . . . . . . 317--370
Marsha Chechik and Benet Devereux and Steve Easterbrook and Arie Gurfinkel Multi-valued symbolic model-checking . . 371--408 Tim Miller and Paul Strooper A framework and tool support for the systematic testing of model-based specifications . . . . . . . . . . . . . 409--439 Gian-Luigi Ferrari and Stefania Gnesi and Ugo Montanari and Marco Pistore A model-checking verification environment for mobile processes . . . . 440--473
Pamela Zave Address translation in telecommunication features . . . . . . . . . . . . . . . . 1--36 Sebastian Uchitel and Jeff Kramer and Jeff Magee Incremental elaboration of scenario-based specifications and behavior models using implied scenarios 37--85 Nalini Venkatasubramanian and Carolyn Talcott and Gul A. Agha A formal model for reasoning about adaptive QoS-enabled middleware . . . . 86--147
Tankut Akgul and Vincent J. Mooney III Assembly instruction level reverse execution for debugging . . . . . . . . 149--198 Alessandro Orso and Saurabh Sinha and Mary Jean Harrold Classifying data dependences in the presence of pointers for program comprehension, testing, and debugging 199--239 Roshanak Roshandel and André Van Der Hoek and Marija Mikic-Rakic and Nenad Medvidovic Mae---a system model and environment for managing architectural evolution . . . . 240--276
Gregg Rothermel and Sebastian Elbaum and Alexey G. Malishevsky and Praveen Kallakuri and Xuemei Qiu On test suite composition and cost-effective regression testing . . . 277--331 Stefan Kramer and Hermann Kaindl Coupling and cohesion metrics for knowledge-based systems using frames and rules . . . . . . . . . . . . . . . . . 332--358
Matthew B. Dwyer and Lori A. Clarke and Jamieson M. Cobleigh and Gleb Naumovich Flow analysis for verifying properties of concurrent software systems . . . . . 359--430 Gennaro Costagliola and Vincenzo Deufemia and Giuseppe Polese A framework for modeling and implementing visual notations with applications to software engineering . . 431--487
Ana Milanova and Atanas Rountev and Barbara G. Ryder Parameterized object sensitivity for points-to analysis for Java . . . . . . 1--41 Luciano Baresi and Mauro Pezz\`e Formal interpreters for diagram notations . . . . . . . . . . . . . . . 42--84 Ian Sommerville and Jane Ransom An empirical study of industrial requirements engineering process assessment and improvement . . . . . . . 85--117
Carlo Ghezzi Editorial . . . . . . . . . . . . . . . 119--123 Jean Berstel and Stefano Crespi Reghizzi and Gilles Roussel and Pierluigi San Pietro A scalable formal method for design and automatic checking of user interfaces 124--167 Martin Erwig and Zhe Fu Software reuse for scientific computing through program generation . . . . . . . 168--198 Eric M. Dashofy and André van der Hoek and Richard N. Taylor A comprehensive approach for the development of modular software architecture description languages . . . 199--245 ACM Transactions on Software Engineering and Methodology staff Acknowledgement of referees 2004 . . . . 246--246
Man F. Lau and Yuen T. Yu An extended fault class hierarchy for specification-based testing . . . . . . 247--276 Vincenzo Gervasi and Didar Zowghi Reasoning about inconsistencies in natural language requirements . . . . . 277--330 Paul Klint and Ralf Lämmel and Chris Verhoef Toward an engineering discipline for grammarware . . . . . . . . . . . . . . 331--380
Leon Osterweil and Carlo Ghezzi and Jeff Kramer and Alexander Wolf Editorial . . . . . . . . . . . . . . . 381--382 Jacky Estublier and David Leblang and André van der Hoek and Reidar Conradi and Geoffrey Clemm and Walter Tichy and Darcy Wiborg-Weber Impact of software engineering research on the practice of software configuration management . . . . . . . . 383--430 Barbara G. Ryder and Mary Lou Soffa and Margaret Burnett The impact of software engineering research on modern programming languages 431--477 Marcelo F. Frias and Carlos G. López Pombo and Gabriel A. Baum and Nazareno M. Aguirre and Thomas S. E. Maibaum Reasoning about static and dynamic properties in alloy: a purely relational approach . . . . . . . . . . . . . . . . 478--526
Rik Eshuis Symbolic model checking of UML activity diagrams . . . . . . . . . . . . . . . . 1--38 David Basin and Jürgen Doser and Torsten Lodderstedt Model driven security: From UML models to access control infrastructures . . . 39--91 Colin Snook and Michael Butler UML-B: Formal modeling and design aided by UML . . . . . . . . . . . . . . . . . 92--122
Steve Counsell and Stephen Swift and Jason Crampton The interpretation and utility of three cohesion metrics for object-oriented design . . . . . . . . . . . . . . . . . 123--149 Marc Fisher II and Gregg Rothermel and Darren Brown and Mingming Cao and Curtis Cook and Margaret Burnett Integrating automated test generation into the WYSIWYT spreadsheet testing methodology . . . . . . . . . . . . . . 150--194 Wei Zhao and Lu Zhang and Yin Liu and Jiasu Sun and Fuqing Yang SNIAFL: Towards a static noninteractive approach to feature location . . . . . . 195--226
R. M. Hierons Avoiding coincidental correctness in boundary value analysis . . . . . . . . 227--241 Avik Sinha and Carol Smidts HOTTest: a model-based test design technique for enhanced testing of domain-specific applications . . . . . . 242--278 Amy L. Murphy and Gian Pietro Picco and Gruia-Catalin Roman LIME: a coordination model and middleware supporting mobility of hosts and agents . . . . . . . . . . . . . . . 279--328
Philippe Thiran and Jean-Luc Hainaut and Geert-Jan Houben and Djamal Benslimane Wrapper-based evolution of legacy information systems . . . . . . . . . . 329--359 Marco Brambilla and Stefano Ceri and Piero Fraternali and Ioana Manolescu Process modeling in Web applications . . 360--409 Gregor Snelting and Torsten Robschink and Jens Krinke Efficient path conditions in dependence graphs for software safety analysis . . 410--457
David Notkin Editorial . . . . . . . . . . . . . . . 1:1--1:?? Carlo Ghezzi Editorial . . . . . . . . . . . . . . . 2:1--2:?? Martin P. Robillard and Gail C. Murphy Representing concerns in source code . . 3:1--3:?? Qing Xie and Atif M. Memon Designing and comparing automated test oracles for GUI-based software applications . . . . . . . . . . . . . . 4:1--4:?? Manfred Broy and Ingolf H. Krüger and Michael Meisinger A formal model of services . . . . . . . 5:1--5:??
David Notkin Editorial . . . . . . . . . . . . . . . 6:1--6:?? Shriram Krishnamurthi and Kathi Fisler Foundations of incremental aspect model-checking . . . . . . . . . . . . . 7:1--7:?? David Binkley and Nicolas Gold and Mark Harman An empirical study of static program slice size . . . . . . . . . . . . . . . 8:1--8:?? Abdoulaye Gamatié and Thierry Gautier and Paul Le Guernic and Jean-Pierre Talpin Polychronous design of embedded real-time applications . . . . . . . . . 9:1--9:??
Kalpesh Kapoor and Jonathan P. Bowen Test conditions for fault classes in Boolean specifications . . . . . . . . . 10:1--10:?? Richard F. Paige and Phillip J. Brooke and Jonathan S. Ostroff Metamodel-based model conformance and multiview consistency checking . . . . . 11:1--11:?? Samik Basu and Scott A. Smolka Model checking the Java metalocking algorithm . . . . . . . . . . . . . . . 12:1--12:??
Andrea De Lucia and Fausto Fasano and Rocco Oliveto and Genoveffa Tortora Recovering traceability links in software artifact management systems using information retrieval methods . . 13:1--13:?? Gary Wassermann and Carl Gould and Zhendong Su and Premkumar Devanbu Static checking of dynamically generated queries in database applications . . . . 14:1--14:?? Luciano Baresi and Sandro Morasca Three empirical studies on estimating the design effort of Web applications 15:1--15:??
David Notkin Editorial . . . . . . . . . . . . . . . 1:1--1:2 Timothy M. Meyers and David Binkley An empirical study of slice-based cohesion and coupling metrics . . . . . 2:1--2:27 Marius Marin and Arie Van Deursen and Leon Moonen Identifying Crosscutting Concerns Using Fan-In Analysis . . . . . . . . . . . . 3:1--3:37 Marcelo F. Frias and Carlos G. Lopez Pombo and Juan P. Galeotti and Nazareno M. Aguirre Efficient Analysis of DynAlloy Specifications . . . . . . . . . . . . . 4:1--4:34
David Notkin Editorial . . . . . . . . . . . . . . . 5:1--5:?? David Notkin and Mauro Pezz\`e Introduction to the special section from the ACM international symposium on software testing and analysis (ISSTA 2006) . . . . . . . . . . . . . . . . . 6:1--6:?? Jamieson M. Cobleigh and George S. Avrunin and Lori A. Clarke Breaking up is hard to do: an evaluation of automated assume-guarantee reasoning 7:1--7:?? Christoph Csallner and Yannis Smaragdakis and Tao Xie DSD-Crasher: a hybrid analysis tool for bug finding . . . . . . . . . . . . . . 8:1--8:?? Stephen J. Fink and Eran Yahav and Nurit Dor and G. Ramalingam and Emmanuel Geay Effective typestate verification in the presence of aliasing . . . . . . . . . . 9:1--9:?? Stephen F. Siegel and Anastasia Mironova and George S. Avrunin and Lori A. Clarke Combining symbolic execution with model checking to verify parallel numerical programs . . . . . . . . . . . . . . . . 10:1--10:?? Amrit Tiwana Impact of classes of development coordination tools on software development performance: a multinational empirical study . . . . . . . . . . . . 11:1--11:??
David Notkin Editorial . . . . . . . . . . . . . . . 12:1--12:?? Parastoo Mohagheghi and Reidar Conradi An empirical investigation of software reuse benefits in a large telecom product . . . . . . . . . . . . . . . . 13:1--13:?? Johannes Henkel and Christoph Reichenbach and Amer Diwan Developing and debugging algebraic specifications for Java classes . . . . 14:1--14:?? Cigdem Gencel and Onur Demirors Functional size measurement revisited 15:1--15:?? Tsong Yueh Chen and Robert Merkel An upper bound on software testing effectiveness . . . . . . . . . . . . . 16:1--16:??
Pankaj Jalote and Brendan Murphy and Vibhu Saujanya Sharma Post-release reliability growth in software products . . . . . . . . . . . 17:1--17:?? Martin P. Robillard Topology analysis of software dependencies . . . . . . . . . . . . . . 18:1--18:?? Wolfgang Emmerich and Mikio Aoyama and Joe Sventek The impact of research on the development of middleware technology . . 19:1--19:?? Tanja M. Gruschke and Magne Jòrgensen The role of outcome feedback in improving the uncertainty assessment of software development effort estimates 20:1--20:??
Marcel R. Karam and Trevor J. Smedley and Sergiu M. Dascalu Unit-level test adequacy criteria for visual dataflow languages and a testing methodology . . . . . . . . . . . . . . 1:1--1:?? Panagiotis Louridas and Diomidis Spinellis and Vasileios Vlachos Power laws in software . . . . . . . . . 2:1--2:?? Ond\vrej Lhoták and Laurie Hendren Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation . . . . 3:1--3:??
Atif M. Memon Automatically repairing event sequence-based GUI test suites for regression testing . . . . . . . . . . . 4:1--4:?? Travis D. Breaux and Annie I. Antón and Jon Doyle Semantic parameterization: a process for modeling domain descriptions . . . . . . 5:1--5:?? Shan Shan Huang and David Zook and Yannis Smaragdakis Domain-specific languages and program generation with meta-AspectJ . . . . . . 6:1--6:?? Qing Xie and Atif M. Memon Using a pilot study to derive a GUI model for automated testing . . . . . . 7:1--7:??
David Notkin Editorial . . . . . . . . . . . . . . . 8:1--8:?? Lujo Bauer and Jay Ligatti and David Walker Composing expressive runtime security policies . . . . . . . . . . . . . . . . 9:1--9:?? Tracy Hall and Nathan Baddoo and Sarah Beecham and Hugh Robinson and Helen Sharp A systematic review of theory use in studies investigating the motivations of software engineers . . . . . . . . . . . 10:1--10:?? Phil McMinn and David Binkley and Mark Harman Empirical evaluation of a nesting testability transformation for evolutionary testing . . . . . . . . . . 11:1--11:?? Dick Hamlet Tools and experiments supporting a testing-based theory of component composition . . . . . . . . . . . . . . 12:1--12:??
Ankit Goel and Abhik Roychoudhury and P. S. Thiagarajan Interacting process classes . . . . . . 13:1--13:?? Robert M. Hierons Verdict functions in testing with a fault domain or test hypotheses . . . . 14:1--14:?? Marco Mamei and Franco Zambonelli Programming pervasive and mobile computing applications: The TOTA approach . . . . . . . . . . . . . . . . 15:1--15:??
Eli Tilevich and Yannis Smaragdakis J-Orchestra: Enhancing Java programs with distribution capabilities . . . . . 1:1--1:?? Chun Ouyang and Marlon Dumas and Wil M. P. Van Der Aalst and Arthur H. M. Ter Hofstede and Jan Mendling From business process models to process-oriented software systems . . . 2:1--2:?? Hridesh Rajan and Kevin J. Sullivan Unifying aspect- and object-oriented design . . . . . . . . . . . . . . . . . 3:1--3:??
Hee Beng Kuan Tan and Yuan Zhao and Hongyu Zhang Conceptual data model-based software size estimation for information systems 4:1--4:?? Wes Masri and Andy Podgurski Measuring the strength of information flows in programs . . . . . . . . . . . 5:1--5:?? Nirmit Desai and Amit K. Chopra and Munindar P. Singh Amoeba: a methodology for modeling and evolving cross-organizational business processes . . . . . . . . . . . . . . . 6:1--6:??
David Notkin Editorial . . . . . . . . . . . . . . . 7:1--7:?? Jon Whittle and Praveen K. Jayaraman Synthesizing hierarchical state machines from expressive scenario descriptions 8:1--8:?? Chang Xu and S. C. Cheung and W. K. Chan and Chunyang Ye Partial constraint checking for context consistency in pervasive computing . . . 9:1--9:?? Antonio Brogi and Razvan Popescu and Matteo Tanca Design and implementation of Sator: a Web service aggregator . . . . . . . . . 10:1--10:??
Julien Ponge and Boualem Benatallah and Fabio Casati and Farouk Toumani Analysis and applications of timed service protocols . . . . . . . . . . . 11:1--11:?? Jamie Payton and Christine Julien and Gruia-Catalin Roman and Vasanth Rajamani Semantic self-assessment of query results in dynamic environments . . . . 12:1--12:?? Chunqing Chen and Jin Song Dong and Jun Sun and Andrew Martin A verification system for interval-based specification languages . . . . . . . . 13:1--13:??
Friedrich Steimann and Thomas Pawlitzki and Sven Apel and Christian Kästner Types and modularity for implicit invocation with implicit announcement 1:1--1:?? Kieran Conboy and Brian Fitzgerald Method and developer characteristics for effective agile method tailoring: a study of XP expert opinion . . . . . . . 2:1--2:?? Ekwa Duala-Ekoko and Martin P. Robillard Clone region descriptors: Representing and tracking duplication in source code 3:1--3:??
Andrew J. Ko and Brad A. Myers Extracting and answering why and why not questions about Java program output . . 4:1--4:?? Kevin Sullivan and William G. Griswold and Hridesh Rajan and Yuanyuan Song and Yuanfang Cai and Macneil Shonle and Nishit Tewari Modular aspect-oriented design with XPIs 5:1--5:?? Param Vir Singh The small-world effect: The influence of macro-level properties of developer collaboration networks on open-source project success . . . . . . . . . . . . 6:1--6:?? Robert Dyer and Hridesh Rajan Supporting dynamic aspect-oriented features . . . . . . . . . . . . . . . . 7:1--7:??
Simon Miles and Paul Groth and Steve Munroe and Luc Moreau PrIMe: a methodology for developing provenance-aware applications . . . . . 8:1--8:?? Jinjun Chen and Yun Yang Temporal dependency-based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems . . . . . . . . . . . . 9:1--9:?? John Anvik and Gail C. Murphy Reducing the effort of bug report triage: Recommenders for development-oriented decisions . . . . . 10:1--10:?? Lee Naish and Hua Jie Lee and Kotagiri Ramamohanarao A model for spectra-based software diagnosis . . . . . . . . . . . . . . . 11:1--11:?? David W. Binkley and Mark Harman and Kiran Lakhotia FlagRemover: a testability transformation for transforming loop-assigned flags . . . . . . . . . . 12:1--12:?? Zhenyu Chen and Tsong Yueh Chen and Baowen Xu A revisit of fault class hierarchies in general Boolean specifications . . . . . 13:1--13:??
Andreas Bauer and Martin Leucker and Christian Schallhart Runtime Verification for LTL and TLTL 14:1--14:?? Changhai Nie and Hareton Leung The Minimal Failure-Causing Schema of Combinatorial Testing . . . . . . . . . 15:1--15:?? R. A. Gandhi and S. W. Lee Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk . . . . 16:1--16:?? Josh Dehlinger and Robyn R. Lutz Gaia-PL: a Product Line Engineering Approach for Efficiently Designing Multiagent Systems . . . . . . . . . . . 17:1--17:?? Shahar Maoz and David Harel and Asaf Kleinbort A Compiler for Multimodal Scenarios: Transforming LSCs into AspectJ . . . . . 18:1--18:?? Barthélémy Dagenais and Martin P. Robillard Recommending Adaptive Changes for Framework Evolution . . . . . . . . . . 19:1--19:??
Ali Ebnenasir and Sandeep S. Kulkarni Feasibility of Stepwise Design of Multitolerant Programs . . . . . . . . . 1:1--1:?? Matthew Arnold and Martin Vechev and Eran Yahav QVM: An Efficient Runtime for Detecting Defects in Deployed Systems . . . . . . 2:1--2:?? Eli Tilevich and Sriram Gopal Expressive and Extensible Parameter Passing for Distributed Object Systems 3:1--3:?? Susan Elliott Sim and Medha Umarji and Sukanya Ratanotayanon and Cristina V. Lopes How Well Do Search Engines Support Code Retrieval on the Web? . . . . . . . . . 4:1--4:?? Madeline M. Diep and Matthew B. Dwyer and Sebastian Elbaum Lattice-Based Sampling for Path Property Monitoring . . . . . . . . . . . . . . . 5:1--5:?? Martin Erwig and Eric Walkingshaw The Choice Calculus: a Representation for Software Variation . . . . . . . . . 6:1--6:??
David Notkin Editorial . . . . . . . . . . . . . . . 7:1--7:?? Jehad Al Dallal and Lionel C. Briand A Precise Method-Method Interaction-Based Cohesion Metric for Object-Oriented Classes . . . . . . . . 8:1--8:?? Dario Fischbein and Nicolas D'Ippolito and Greg Brunet and Marsha Chechik and Sebastian Uchitel Weak Alphabet Merging of Partial Behavior Models . . . . . . . . . . . . 9:1--9:?? Anders Mattsson and Brian Fitzgerald and Björn Lundell and Brian Lings An Approach for Modeling Architectural Design Rules in UML and its Application to Embedded Software . . . . . . . . . . 10:1--10:?? Devdatta Kulkarni and Tanvir Ahmed and Anand Tripathi A Generative Programming Framework for Context-Aware CSCW Applications . . . . 11:1--11:?? Abhik Roychoudhury and Ankit Goel and Bikram Sengupta Symbolic Message Sequence Charts . . . . 12:1--12:?? Anna Queralt and Ernest Teniente Verification and Validation of UML Conceptual Schemas with OCL Constraints 13:1--13:??
Christian Kästner and Sven Apel and Thomas Thüm and Gunter Saake Type checking annotation-based product lines . . . . . . . . . . . . . . . . . 14:1--14:?? Macneil Shonle and William G. Griswold and Sorin Lerner A framework for the checking and refactoring of crosscutting concepts . . 15:1--15:?? Alessandro Fantechi and Stefania Gnesi and Alessandro Lapadula and Franco Mazzanti and Rosario Pugliese and Francesco Tiezzi A logical verification methodology for service-oriented computing . . . . . . . 16:1--16:?? Jaymie Strecker and Atif M. Memon Accounting for defect characteristics in evaluations of testing techniques . . . 17:1--17:?? Paul Jennings and Arka P. Ghosh and Samik Basu A two-phase approximation for model checking probabilistic unbounded until properties of probabilistic systems . . 18:1--18:?? Dawei Qi and Abhik Roychoudhury and Zhenkai Liang and Kapil Vaswani DARWIN: an approach to debugging evolving programs . . . . . . . . . . . 19:1--19:??
Reid Holmes and Robert J. Walker Systematizing pragmatic software reuse 20:1--20:?? Yuanfang Cai and Kevin Sullivan A formal model for automated software modularity and evolvability analysis . . 21:1--21:?? Alessandro Cimatti and Marco Roveri and Angelo Susi and Stefano Tonetta Validation of requirements for hybrid systems: a formal approach . . . . . . . 22:1--22:?? Denys Poshyvanyk and Malcom Gethers and Andrian Marcus Concept location using formal concept analysis and information retrieval . . . 23:1--23:?? Andrew Meneely and Ben Smith and Laurie Williams Validating software metrics: a spectrum of philosophies . . . . . . . . . . . . 24:1--24:?? Adam Kiezun and Vijay Ganesh and Shay Artzi and Philip J. Guo and Pieter Hooimeijer and Michael D. Ernst HAMPI: a solver for word equations over strings, regular expressions, and context-free grammars . . . . . . . . . 25:1--25:??
David Notkin Editorial --- looking back . . . . . . . 1:1--1:?? David S. Rosenblum Editorial --- looking forward . . . . . 2:1--2:?? Jun Sun and Yang Liu and Jin Song Dong and Yan Liu and Ling Shi and Étienne André Modeling and verifying hierarchical real-time systems using stateful timed CSP . . . . . . . . . . . . . . . . . . 3:1--3:?? Brian Demsky and Patrick Lam Views: Synthesizing fine-grained concurrency control . . . . . . . . . . 4:1--4:?? Tao Yue and Lionel C. Briand and Yvan Labiche Facilitating the transition from use case models to analysis models: Approach and experiments . . . . . . . . . . . . 5:1--5:?? Hadi Hemmati and Andrea Arcuri and Lionel Briand Achieving scalable model-based testing through test case diversity . . . . . . 6:1--6:?? Martin Monperrus and Mira Mezini Detecting missing method calls as violations of the majority rule . . . . 7:1--7:?? Jeff Huang and Jinguo Zhou and Charles Zhang Scaling predictive analysis of concurrent programs by removing trace redundancy . . . . . . . . . . . . . . . 8:1--8:?? Nicolás D'ippolito and Victor Braberman and Nir Piterman and Sebastián Uchitel Synthesizing nonanomalous event-based controllers for liveness goals . . . . . 9:1--9:??
Wei Zhang and Chong Sun and Junghee Lim and Shan Lu and Thomas Reps ConMem: Detecting Crash-Triggering Concurrency Bugs through an Effect-Oriented Approach . . . . . . . . 10:1--10:?? Marcello La Rosa and Marlon Dumas and Reina Uba and Remco Dijkman Business Process Model Merging: An Approach to Business Process Consolidation . . . . . . . . . . . . . 11:1--11:?? Zibin Zheng and Michael R. Lyu Personalized Reliability Prediction of Web Services . . . . . . . . . . . . . . 12:1--12:?? Neil Walkinshaw and Kirill Bogdanov Automated Comparison of State-Based Software Models in Terms of Their Language and Structure . . . . . . . . . 13:1--13:?? Scott D. Fleming and Chris Scaffidi and David Piorkowski and Margaret Burnett and Rachel Bellamy and Joseph Lawrance and Irwin Kwan An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks . . . . . . 14:1--14:?? Sagar Chaki and Christian Schallhart and Helmut Veith Verification across Intellectual Property Boundaries . . . . . . . . . . 15:1--15:??
David S. Rosenblum In memoriam: David Notkin (1955--2013) 16:1--16:?? Guoqing Xu and Atanas Rountev Precise memory leak detection for Java software using container profiling . . . 17:1--17:?? Wei Le and Mary Lou Soffa Marple: Detecting faults in path segments using automatically generated analyses . . . . . . . . . . . . . . . . 18:1--18:?? Shin Yoo and Mark Harman and David Clark Fault localization prioritization: Comparing information-theoretic and coverage-based approaches . . . . . . . 19:1--19:?? Matteo Pradella and Angelo Morzenti and Pierluigi San Pietro Bounded satisfiability checking of metric temporal logic specifications . . 20:1--20:?? Davide Falessi and Lionel C. Briand and Giovanni Cantone and Rafael Capilla and Philippe Kruchten The value of design rationale information . . . . . . . . . . . . . . 21:1--21:?? Kevin Hoffman and Patrick Eugster Trading obliviousness for modularity with cooperative aspect-oriented programming . . . . . . . . . . . . . . 22:1--22:?? Hong Zhu and Ian Bayley An algebra of design patterns . . . . . 23:1--23:?? Mira Balaban and Azzam Maraee Finite satisfiability of UML class diagrams with constrained class hierarchy . . . . . . . . . . . . . . . 24:1--24:?? Guido De Caso and Victor Braberman and Diego Garbervetsky and Sebastian Uchitel Enabledness-based program abstractions for behavior validation . . . . . . . . 25:1--25:?? Beatriz Marín and Giovanni Giachetti and Oscar Pastor and Tanja E. J. Vos and Alain Abran Using a functional size measurement procedure to evaluate the quality of models in MDD environments . . . . . . . 26:1--26:?? Daniel Sinnig and Patrice Chalin and Ferhat Khendek Use case and task models: an integrated development methodology and its formal foundation . . . . . . . . . . . . . . . 27:1--27:??
Giovanni Denaro and Mauro Pezz\`e and Davide Tosi Test-and-adapt: an approach for improving service interchangeability . . 28:1--28:?? Lorenzo Martignoni and Roberto Paleari and Alessandro Reina and Giampaolo Fresi Roglia and Danilo Bruschi A methodology for testing CPU emulators 29:1--29:?? Hervé Chang and Leonardo Mariani and Mauro Pezz\`e Exception handlers for healing component-based systems . . . . . . . . 30:1--30:?? Xiaoyuan Xie and Tsong Yueh Chen and Fei-Ching Kuo and Baowen Xu A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization . . . . . . . . . . . 31:1--31:?? Dawei Qi and Hoang D. T. Nguyen and Abhik Roychoudhury Path exploration based on symbolic output . . . . . . . . . . . . . . . . . 32:1--32:?? Takaaki Tateishi and Marco Pistoia and Omer Tripp Path- and index-sensitive string analysis based on monadic second-order logic . . . . . . . . . . . . . . . . . 33:1--33:?? Jérôme Vouillon and Roberto Di Cosmo On software component co-installability 34:1--34:?? Leandro L. Minku and Xin Yao Software effort estimation as a multiobjective learning problem . . . . 35:1--35:?? David Lizcano and Fernando Alonso and Javier Soriano and Genoveva Lopez A web-centred approach to end-user software engineering . . . . . . . . . . 36:1--36:?? Collin Mcmillan and Denys Poshyvanyk and Mark Grechanik and Qing Xie and Chen Fu Portfolio: Searching for relevant functions and their usages in millions of lines of code . . . . . . . . . . . . 37:1--37:?? Michael Würsch and Emanuel Giger and Harald C. Gall Evaluating a query framework for software evolution data . . . . . . . . 38:1--38:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 1:1--1:?? Robrecht Haesevoets and Danny Weyns and Tom Holvoet Architecture-centric support for adaptive service collaborations . . . . 2:1--2:?? Andrew F. Tappenden and James Miller Automated cookie collection testing . . 3:1--3:?? Gabriele Bavota and Malcom Gethers and Rocco Oliveto and Denys Poshyvanyk and Andrea de Lucia Improving software modularization via automated analysis of latent topics and dependencies . . . . . . . . . . . . . . 4:1--4:?? Xiao Liu and Yun Yang and Dong Yuan and Jinjun Chen Do we need to handle every temporal violation in scientific workflow systems? . . . . . . . . . . . . . . . . 5:1--5:?? Federico Mari and Igor Melatti and Ivano Salvo and Enrico Tronci Model-based synthesis of control software from system-level formal specifications . . . . . . . . . . . . . 6:1--6:?? Eric Bodden and Éric Tanter and Milton Inostroza Join point interfaces for safe and flexible decoupling of aspects . . . . . 7:1--7:?? Wes Masri and Rawad Abou Assi Prevalence of coincidental correctness and mitigation of its impact on fault localization . . . . . . . . . . . . . . 8:1--8:?? Lionel Briand and Davide Falessi and Shiva Nejati and Mehrdad Sabetzadeh and Tao Yue Traceability and SysML design slices to support safety inspections: a controlled experiment . . . . . . . . . . . . . . . 9:1--9:?? Yuming Zhou and Baowen Xu and Hareton Leung and Lin Chen An in-depth study of the potentially confounding effect of class size in fault prediction . . . . . . . . . . . . 10:1--10:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 11:1--11:?? Kai Pan and Xintao Wu and Tao Xie Guided test generation for database applications via synthesized database interactions . . . . . . . . . . . . . . 12:1--12:?? Giuseppe Scanniello and Carmine Gravino and Marcela Genero and Jose' A. Cruz-Lemus and Genoveffa Tortora On the impact of UML analysis models on source-code comprehensibility and modifiability . . . . . . . . . . . . . 13:1--13:?? Thomas Fritz and Gail C. Murphy and Emerson Murphy-Hill and Jingwen Ou and Emily Hill Degree-of-knowledge: Modeling a developer's knowledge of code . . . . . 14:1--14:?? Lunjin Lu and Dae-Kyoo Kim Required behavior of sequence diagrams: Semantics and conformance . . . . . . . 15:1--15:?? M. Unterkalmsteiner and R. Feldt and T. Gorschek A taxonomy for requirements engineering and software test alignment . . . . . . 16:1--16:?? Dharmalingam Ganesan and Mikael Lindvall ADAM: External dependency-driven architecture discovery and analysis of quality attributes . . . . . . . . . . . 17:1--17:?? Klaas-Jan Stol and Paris Avgeriou and Muhammad Ali Babar and Yan Lucas and Brian Fitzgerald Key factors for adopting inner source 18:1--18:?? Mark Harman and Jens Krinke and Inmaculada Medina-Bulo and Francisco Palomo-Lozano and Jian Ren and Shin Yoo Exact scalable sensitivity analysis for the next release problem . . . . . . . . 19:1--19:?? Mariano M. Moscato and Carlos G. Lopez Pombo and Marcelo F. Frias Dynamite: a tool for the verification of alloy models based on PVS . . . . . . . 20:1--20:??
Mainul Islam and Christoph Csallner Generating Test Cases for Programs that Are Coded against Interfaces and Annotations . . . . . . . . . . . . . . 21:1--21:?? Lucas Layman and Victor R. Basili and Marvin V. Zelkowitz A Methodology for Exposing Risk in Achieving Emergent System Properties . . 22:1--22:?? Guoqing Xu and Nick Mitchell and Matthew Arnold and Atanas Rountev and Edith Schonberg and Gary Sevitsky Scalable Runtime Bloat Detection Using Abstract Dynamic Slicing . . . . . . . . 23:1--23:?? Nicoletta de Francesco and Giuseppe Lettieri and Antonella Santone and Gigliola Vaglini GreASE: a Tool for Efficient ``Nonequivalence'' Checking . . . . . . 24:1--24:?? Razieh Behjati and Shiva Nejati and Lionel C. Briand Architecture-Level Configuration of Large-Scale Embedded Software Systems 25:1--25:?? Kathryn T. Stolee and Sebastian Elbaum and Daniel Dobos Solving the Search for Source Code . . . 26:1--26:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 27:1--27:?? Gail C. Murphy and Mauro Pezzé Introduction to the Special Issue International Conference on Software Engineering (ICSE 2012) . . . . . . . . 28:1--28:?? Anders Mòller and Mathias Schwarz Automated Detection of Client-State Manipulation Vulnerabilities . . . . . . 29:1--29:?? Thanhvu Nguyen and Deepak Kapur and Westley Weimer and Stephanie Forrest DIG: a Dynamic Invariant Generator for Polynomial and Array Invariants . . . . 30:1--30:?? Walid Maalej and Rebecca Tiarks and Tobias Roehm and Rainer Koschke On the Comprehension of Program Comprehension . . . . . . . . . . . . . 31:1--31:?? Pingyu Zhang and Sebastian Elbaum Amplifying Tests to Validate Exception Handling Code: an Extended Study in the Mobile Application Domain . . . . . . . 32:1--32:?? Tracy Hall and Min Zhang and David Bowes and Yi Sun Some Code Smells Have a Significant but Small Effect on Faults . . . . . . . . . 33:1--33:?? Yueqi Li and S. C. Cheung and Xiangyu Zhang and Yepang Liu Scaling Up Symbolic Analysis by Removing $z$-Equivalent States . . . . . . . . . 34:1--34:?? Peter C. Rigby and Daniel M. German and Laura Cowen and Margaret-Anne Storey Peer Review on Open-Source Software Projects: Parameters, Statistical Models, and Theory . . . . . . . . . . . 35:1--35:??
Filippo Ricca and Giuseppe Scanniello and Marco Torchiano and Gianna Reggio and Egidio Astesiano Assessing the Effect of Screen Mockups on the Comprehension of Functional Requirements . . . . . . . . . . . . . . 1:1--1:?? Richard Banach and Huibiao Zhu and Wen Su and Xiaofeng Wu A Continuous ASM Modelling Approach to Pacemaker Sensing . . . . . . . . . . . 2:1--2:?? Guowei Yang and Suzette Person and Neha Rungta and Sarfraz Khurshid Directed Incremental Symbolic Execution 3:1--3:?? Anirudh Santhiar and Omesh Pandita and Aditya Kanade Mining Unit Tests for Discovery and Migration of Math APIs . . . . . . . . . 4:1--4:?? Robert M. Hierons Combining Centralised and Distributed Testing . . . . . . . . . . . . . . . . 5:1--5:?? Dilan Sahin and Marouane Kessentini and Slim Bechikh and Kalyanmoy Deb Code-Smell Detection as a Bilevel Problem . . . . . . . . . . . . . . . . 6:1--6:??
Kaituo Li and Christoph Reichenbach and Christoph Csallner and Yannis Smaragdakis Residual Investigation: Predictive and Precise Bug Detection . . . . . . . . . 7:1--7:?? Gordon Fraser and Andrea Arcuri A Large-Scale Evaluation of Automated Unit Test Generation Using EvoSuite . . 8:1--8:?? Warda El Kholy and Jamal Bentahar and Mohamed El Menshawy and Hongyang Qu and Rachida Dssouli Conditional Commitments: Reasoning and Model Checking . . . . . . . . . . . . . 9:1--9:?? Dan Hao and Lingming Zhang and Lu Zhang and Gregg Rothermel and Hong Mei A Unified Test Case Prioritization Approach . . . . . . . . . . . . . . . . 10:1--10:?? Hassan Eldib and Chao Wang and Patrick Schaumont Formal Verification of Software Countermeasures against Side-Channel Attacks . . . . . . . . . . . . . . . . 11:1--11:?? Juan De Lara and Esther Guerra and Jesús Sánchez Cuadrado When and How to Use Multilevel Modelling 12:1--12:??
Tao Yue and Lionel C. Briand and Yvan Labiche aToucan: an Automated Framework to Derive UML Analysis Models from Use Case Models . . . . . . . . . . . . . . . . . 13:1--13:?? Giuseppe Scanniello and Carmine Gravino and Michele Risi and Genoveffa Tortora and Gabriella Dodero Documenting Design-Pattern Instances: a Family of Experiments on Source-Code Comprehensibility . . . . . . . . . . . 14:1--14:?? Elena Sherman and Brady J. Garvin and Matthew B. Dwyer Deciding Type-Based Partial-Order Constraints for Path-Sensitive Analysis 15:1--15:?? Antonio Carzaniga and Alessandra Gorla and Nicol\`o Perino and Mauro Pezz\`e Automatic Workarounds: Exploiting the Intrinsic Redundancy of Web Applications 16:1--16:?? Wiem Mkaouer and Marouane Kessentini and Adnan Shaout and Patrice Koligheu and Slim Bechikh and Kalyanmoy Deb and Ali Ouni Many-Objective Software Remodularization Using NSGA-III . . . . . . . . . . . . . 17:1--17:?? Jooyong Yi and Dawei Qi and Shin Hwei Tan and Abhik Roychoudhury Software Change Contracts . . . . . . . 18:1--18:?? Pradeep K. Murukannaiah and Munindar P. Singh Platys: an Active Learning Framework for Place-Aware Application Development and Its Evaluation . . . . . . . . . . . . . 19:1--19:?? Peter A. Whigham and Caitlin A. Owen and Stephen G. Macdonell A Baseline Model for Software Effort Estimation . . . . . . . . . . . . . . . 20:1--20:??
Mark Harman and Mauro Pezzé Introduction to the Special Issue on ISSTA 2013 . . . . . . . . . . . . . . . 21:1--21:?? Milos Gligoric and Alex Groce and Chaoqiang Zhang and Rohan Sharma and Mohammad Amin Alipour and Darko Marinov Guidelines for Coverage-Based Comparisons of Non-Adequate Test Suites 22:1--22:?? Gordon Fraser and Matt Staats and Phil McMinn and Andrea Arcuri and Frank Padberg Does Automated Unit Test Generation Really Help Software Testers? A Controlled Empirical Study . . . . . . . 23:1--23:?? Cosmin Radoi and Danny Dig Effective Techniques for Static Race Detection in Java Parallel Loops . . . . 24:1--24:?? Jaideep Nijjar and Ivan Boci\'c and Tevfik Bultan Data Model Property Inference, Verification, and Repair for Web Applications . . . . . . . . . . . . . . 25:1--25:?? Wei Jin and Alessandro Orso Automated Support for Reproducing and Debugging Field Failures . . . . . . . . 26:1--26:??
Matthew B. Dwyer and David S. Rosenblum Editorial: Journal-First Publication for the Software Engineering Community . . . 1:1--1:?? Will Dietz and Peng Li and John Regehr and Vikram Adve Understanding Integer Overflow in C/C++ 2:1--2:29 Sebastian Proksch and Johannes Lerch and Mira Mezini Intelligent Code Completion with Bayesian Networks . . . . . . . . . . . 3:1--3:?? Stefano Di Alesio and Lionel C. Briand and Shiva Nejati and Arnaud Gotlieb Combining Genetic Algorithms and Constraint Programming to Support Stress Testing of Task Deadlines . . . . . . . 4:1--4:?? Mariano Ceccato and Alessandro Marchetto and Leonardo Mariani and Cu D. Nguyen and Paolo Tonella Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency . . . . . . . . . . . . . 5:1--5:?? Seyedeh Sepideh Emam and James Miller Test Case Prioritization Using Extended Digraphs . . . . . . . . . . . . . . . . 6:1--6:?? Robert Dyer and Hoan Anh Nguyen and Hridesh Rajan and Tien N. Nguyen Boa: Ultra-Large-Scale Software Repository and Source-Code Mining . . . 7:1--7:?? Phil Mcminn and Chris J. Wright and Gregory M. Kapfhammer The Effectiveness of Test Coverage Criteria for Relational Database Schema Integrity Constraints . . . . . . . . . 8:1--8:?? Karim Ali and Marianna Rapoport and Ondrej Lhoták and Julian Dolby and Frank Tip Type-Based Call Graph Construction Algorithms for Scala . . . . . . . . . . 9:1--9:?? Anas Mahmoud and Gary Bradshaw Estimating Semantic Relatedness in Source Code . . . . . . . . . . . . . . 10:1--10:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 11:1--11:?? Saba Alimadadi and Sheldon Sequeira and Ali Mesbah and Karthik Pattabiraman Understanding JavaScript Event-Based Interactions with Clematis . . . . . . . 12:1--12:?? Minghui Zhou and Audris Mockus and Xiujuan Ma and Lu Zhang and Hong Mei Inflow and Retention in OSS Communities with Commercial Involvement: a Case Study of Three Hybrid Projects . . . . . 13:1--13:?? Nuno Machado and Daniel Quinta and Brandon Lucia and Luís Rodrigues Concurrency Debugging with Differential Schedule Projections . . . . . . . . . . 14:1--14:?? Petr Bauch and Vojtech Havel and Jirí Barnat Control Explicit-Data Symbolic Model Checking . . . . . . . . . . . . . . . . 15:1--15:?? Esteban Pavese and Víctor Braberman and Sebastian Uchitel Less is More: Estimating Probabilistic Rewards over Partial System Explorations 16:1--16:?? Robert M. Hierons and Miqing Li and Xiaohui Liu and Sergio Segura and Wei Zheng SIP: Optimal Product Selection from Feature Models Using Many-Objective Evolutionary Optimization . . . . . . . 17:1--17:?? Haipeng Cai and Raul Santelices and Douglas Thain DiaPro: Unifying Dynamic Impact Analyses for Improved and Variable Cost-Effectiveness . . . . . . . . . . . 18:1--18:?? Kapil Anand and Khaled Elwazeer and Aparna Kotha and Matthew Smithson and Rajeev Barua and Angelos Keromytis A Stack Memory Abstraction and Symbolic Analysis Framework for Executables . . . 19:1--19:??
Islem Baki and Houari Sahraoui Multi-Step Learning and Adaptive Search for Learning Complex Model Transformations from Examples . . . . . 20:1--20:?? Fei He and Xiaowei Gao and Miaofei Wang and Bow-Yaw Wang and Lijun Zhang Learning Weighted Assumptions for Compositional Verification of Markov Decision Processes . . . . . . . . . . . 21:1--21:?? Jaspreet Bhatia and Travis D. Breaux and Florian Schaub Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition . . . . . . . . . . . . . 22:1--22:?? Ali Ouni and Marouane Kessentini and Houari Sahraoui and Katsuro Inoue and Kalyanmoy Deb Multi-Criteria Code Refactoring Using Search-Based Software Engineering: an Industrial Case Study . . . . . . . . . 23:1--23:?? Ivan Candela and Gabriele Bavota and Barbara Russo and Rocco Oliveto Using Cohesion and Coupling for Software Remodularization: Is It Enough? . . . . 24:1--24:?? Gregory Gay and Ajitha Rajan and Matt Staats and Michael Whalen and Mats P. E. Heimdahl The Effect of Program and Model Structure on the Effectiveness of MC/DC Test Adequacy Coverage . . . . . . . . . 25:1--25:?? Ricardo M. Czekster and Paulo Fernandes and Lucelene Lopes and Afonso Sales and Alan R. Santos and Thais Webber Stochastic Performance Analysis of Global Software Development Teams . . . 26:1--26:?? Chunbai Yang and Shangru Wu and W. K. Chan Hierarchical Program Paths . . . . . . . 27:1--27:??
Artem Polyvyanyy and Wil M. P. Van Der Aalst and Arthur H. M. Ter Hofstede and Moe T. Wynn Impact-Driven Process Model Repair . . . 28:1--28:?? Shams Azad and Peter C. Rigby and Latifa Guerrouj Generating API Call Rules from Version History and Stack Overflow Posts . . . . 29:1--29:?? Vijay Krishna Palepu and Guoqing Xu and James A. Jones Dynamic Dependence Summaries . . . . . . 30:1--30:?? Juan De Lara and Esther Guerra A Posteriori Typing for Model-Driven Engineering: Concepts, Analysis, and Applications . . . . . . . . . . . . . . 31:1--31:??
Daniel Di Nardo and Fabrizio Pastore and Lionel Briand Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes . . . . . . . . . . 1:1--1:?? Alireza Sadeghi and Naeem Esfahani and Sam Malek Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis . . . . . . . . . . 2:1--2:?? Chris Mills and Gabriele Bavota and Sonia Haiduc and Rocco Oliveto and Andrian Marcus and Andrea De Lucia Predicting Query Quality for Applications of Text Retrieval to Software Engineering Tasks . . . . . . . 3:1--3:?? Shin Yoo and Xiaoyuan Xie and Fei-Ching Kuo and Tsong Yueh Chen and Mark Harman Human Competitiveness of Genetic Programming in Spectrum-Based Fault Localisation: Theoretical and Empirical Analysis . . . . . . . . . . . . . . . . 4:1--4:?? Robert M. Hierons and Uraz Cengiz Türker Parallel Algorithms for Generating Distinguishing Sequences for Observable Non-deterministic FSMs . . . . . . . . . 5:1--5:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 6:1--6:?? Giuseppe Scanniello and Michele Risi and Porfirio Tramontana and Simone Romano Fixing Faults in C and Java Source Code: Abbreviated vs. Full-Word Identifier Names . . . . . . . . . . . . . . . . . 6:1--6:?? Luciano Baresi and Angelo Morzenti and Alfredo Motta and Mohammad Mehdi Pourhashem K. and Matteo Rossi A Logic-Based Approach for the Verification of UML Timed Models . . . . 7:1--7:?? Chris Karanikolas and Grigoris Dimitroulakos and Konstantinos Masselos Early Evaluation of Implementation Alternatives of Composite Data Structures Toward Maintainability . . . 8:1--8:??
Paul C. Attie and Saddek Bensalem and Marius Bozga and Mohamad Jaber and Joseph Sifakis and Fadi A. Zaraket Global and Local Deadlock Freedom in BIP 9:1--9:?? Iago Abal and Jean Melo and Stefan Stanciulescu and Claus Brabrand and Márcio Ribeiro and Andrzej Wasowski Variability Bugs in Highly Configurable Systems: a Qualitative Analysis . . . . 10:1--10:?? Joshua Garcia and Mahmoud Hammad and Sam Malek Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware . . . . . . . . . . . . 11:1--11:??
Khanh Nguyen and Kai Wang and Yingyi Bu and Lu Fang and Guoqing Xu Understanding and Combating Memory Bloat in Managed Data-Intensive Systems . . . 12:1--12:41 Andrea De Lucia and Vincenzo Deufemia and Carmine Gravino and Michele Risi Detecting the Behavior of Design Patterns through Model Checking and Dynamic Analysis . . . . . . . . . . . . 13:1--13:?? Yi Xiang and Yuren Zhou and Zibin Zheng and Miqing Li Configuring Software Product Lines by Combining Many-Objective Optimization and SAT Solvers . . . . . . . . . . . . 14:1--14:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 1:1--1:?? Yuming Zhou and Yibiao Yang and Hongmin Lu and Lin Chen and Yanhui Li and Yangyang Zhao and Junyan Qian and Baowen Xu How Far We Have Progressed in the Journey? An Examination of Cross-Project Defect Prediction . . . . . . . . . . . 1:1--1:?? Santiago Vidal and Iñaki Berra and Santiago Zulliani and Claudia Marcos and J. Andrés Díaz Pace Assessing the Refactoring of Brain Methods . . . . . . . . . . . . . . . . 2:1--2:?? Yuanyuan Zhang and Mark Harman and Gabriela Ochoa and Guenther Ruhe and Sjaak Brinkkemper An Empirical Study of Meta- and Hyper-Heuristic Search for Multi-Objective Release Planning . . . . 3:1--3:?? S. S. Emam and J. Miller Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions . . . . . . . . . . 4:1--4:??
Tao Chen and Ke Li and Rami Bahsoon and Xin Yao FEMOSAA: Feature-Guided and Knee-Driven Multi-Objective Optimization for Self-Adaptive Software . . . . . . . . . 5:1--5:?? Adrián Riesco and Kazuhiro Ogata Prove it! Inferring Formal Proof Scripts from CafeOBJ Proof Scores . . . . . . . 6:1--6:?? Marcel Böhme STADS: Software Testing as Species Discovery . . . . . . . . . . . . . . . 7:1--7:?? Yongjie Zheng and Cuong Cu and Richard N. Taylor Maintaining Architecture-Implementation Conformance to Support Architecture Centrality: From Single System to Product Line Development . . . . . . . . 8:1--8:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 9:1--9:?? Tomasz Kuchta and Hristina Palikareva and Cristian Cadar Shadow Symbolic Execution for Testing Software Patches . . . . . . . . . . . . 10:1--10:?? Klaas-Jan Stol and Brian Fitzgerald The ABC of Software Engineering Research 11:1--11:?? Federica Sarro and Alessio Petrozziello Linear Programming as a Baseline for Software Effort Estimation . . . . . . . 12:1--12:?? Javier Troya and Sergio Segura and Jose Antonio Parejo and Antonio Ruiz-Cortés Spectrum-Based Fault Localization in Model Transformations . . . . . . . . . 13:1--13:?? Mario Linares-Vásquez and Gabriele Bavota and Carlos Bernal-Cárdenas and Massimiliano Di Penta and Rocco Oliveto and Denys Poshyvanyk Multi-Objective Optimization of Energy Consumption of GUIs in Android Apps . . 14:1--14:??
Sergey Mechtaev and Xiang Gao and Shin Hwei Tan and Abhik Roychoudhury Test-Equivalence Analysis for Automatic Patch Generation . . . . . . . . . . . . 15:1--15:?? Abhishek Sharma and Yuan Tian and Agus Sulistya and Dinusha Wijedasa and David Lo Recommending Who to Follow in the Software Engineering Twitter Space . . . 16:1--16:?? Juan De Lara and Esther Guerra Refactoring Multi-Level Models . . . . . 17:1--17:?? Alexander Von Rhein and Jörg Liebig and Andreas Janker and Christian Kästner and Sven Apel Variability-Aware Static Analysis at Scale: an Empirical Study . . . . . . . 18:1--18:??
Mauro Pezz\`e Editorial from the Incoming Editor-in-Chief . . . . . . . . . . . . 1:1--1:?? David S. Rosenblum Farewell Editorial from the Outgoing Editor-in-Chief . . . . . . . . . . . . 1:1--1:?? Chunhui Wang and Fabrizio Pastore and Lionel Briand Oracles for Testing Software Timeliness with Uncertainty . . . . . . . . . . . . 1:1--1:?? Abdul Razzaq and Asanka Wasala and Chris Exton and Jim Buckley The State of Empirical Evaluation in Static Feature Location . . . . . . . . 2:1--2:?? Andrea Arcuri RESTful API Automated Test Case Generation with EvoMaster . . . . . . . 3:1--3:?? Chetan Arora and Mehrdad Sabetzadeh and Shiva Nejati and Lionel Briand An Active Learning Approach for Improving the Accuracy of Automated Domain Model Extraction . . . . . . . . 4:1--4:?? Liyan Song and Leandro L. Minku and Xin Yao Software Effort Interval Prediction via Bayesian Inference and Synthetic Bootstrap Resampling . . . . . . . . . . 5:1--5:??
Samuel J. Ellis and Titus H. Klinge and James I. Lathrop and Jack H. Lutz and Robyn R. Lutz and Andrew S. Miner and Hugh D. Potter Runtime Fault Detection in Programmed Molecular Systems . . . . . . . . . . . 6:1--6:?? Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 6:1--6:?? Yue Li and Tian Tan and Jingling Xue Understanding and Analyzing Java Reflection . . . . . . . . . . . . . . . 7:1--7:?? Dines Bjòrner Domain Analysis and Description Principles, Techniques, and Modelling Languages . . . . . . . . . . . . . . . 8:1--8:?? Stefan Wagner and Daniel Méndez Fernández and Michael Felderer and Antonio Vetr\`o and Marcos Kalinowski and Roel Wieringa and Dietmar Pfahl and Tayana Conte and Marie-Therese Christiansson and Desmond Greer and Casper Lassenius and Tomi Männistö and Maleknaz Nayebi and Markku Oivo and Birgit Penzenstadler and Rafael Prikladnicki and Guenther Ruhe and André Schekelmann and Sagar Sen and Rodrigo Spínola and Ahmed Tuzcu and Jose Luis De La Vara and Dietmar Winkler Status Quo in Requirements Engineering: a Theory and a Global Family of Surveys 9:1--9:?? Jian-Min Jiang and Huibiao Zhu and Qin Li and Yongxin Zhao and Zhong Hong and Shi Zhang and Ping Gong Isolation Modeling and Analysis Based on Mobility . . . . . . . . . . . . . . . . 10:1--10:?? Christoph Czepa and Uwe Zdun How Understandable Are Pattern-based Behavioral Constraints for Novice Software Designers? . . . . . . . . . . 11:1--11:??
Mauro Pezzé Editorial . . . . . . . . . . . . . . . 12:1--12:?? Dennis Reuling and Udo Kelter and Johannes Bürdek and Malte Lochau Automated $N$-way Program Merging for Facilitating Family-based Analyses of Variant-rich Software . . . . . . . . . 13:1--13:?? Feng Sheng and Huibiao Zhu and Jifeng He and Zongyuan Yang and Jonathan P. Bowen Theoretical and Practical Aspects of Linking Operational and Algebraic Semantics for MDESL . . . . . . . . . . 14:1--14:?? Xiaoxue Ren and Zhenchang Xing and Xin Xia and David Lo and Xinyu Wang and John Grundy Neural Network-based Detection of Self-Admitted Technical Debt: From Performance to Explainability . . . . . 15:1--15:?? Pengfei Gao and Jun Zhang and Fu Song and Chao Wang Verifying and Quantifying Side-channel Resistance of Masked Software Implementations . . . . . . . . . . . . 16:1--16:?? Porfirio Tramontana and Domenico Amalfitano and Nicola Amatucci and Atif Memon and Anna Rita Fasolino Developing and Evaluating Objective Termination Criteria for Random Testing 17:1--17:?? Pedro Antonino and Thomas Gibson-Robinson and A. W. Roscoe Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving . . . . . . . . . . 18:1--18:??
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 19:1--19:?? Michele Tufano and Cody Watson and Gabriele Bavota and Massimiliano Di Penta and Martin White and Denys Poshyvanyk An Empirical Study on Learning Bug-Fixing Patches in the Wild via Neural Machine Translation . . . . . . . 19:1--19:?? Carlo Bernaschina and Emanuele Falzone and Piero Fraternali and Sergio Luis Herrera Gonzalez The Virtual Developer: Integrating Code Generation and Manual Development with Conflict Resolution . . . . . . . . . . 20:1--20:?? Juan De Lara and Esther Guerra and Davide Di Ruscio and Juri Di Rocco and Jesús S'nchez Cuadrado and Ludovico Iovino and Alfonso Pierantonio Automated Reuse of Model Transformations through Typing Requirements Models . . . 21:1--21:?? He Jiang and Jingxuan Zhang and Xiaochen Li and Zhilei Ren and David Lo and Xindong Wu and Zhongxuan Luo Recommending New Features from Mobile App Descriptions . . . . . . . . . . . . 22:1--22:?? Yunho Kim and Seokhyeon Mun and Shin Yoo and Moonzoo Kim Precise Learn-to-Rank Fault Localization Using Dynamic and Static Features of Target Programs . . . . . . . . . . . . 23:1--23:?? Cong Tian and Chu Chen and Zhenhua Duan and Liang Zhao Differential Testing of Certificate Validation in SSL/TLS Implementations: an RFC-guided Approach . . . . . . . . . 24:1--24:??
Antoine El-Hokayem and Yli\`es Falcone On the Monitoring of Decentralized Specifications: Semantics, Properties, Analysis, and Simulation . . . . . . . . 1:1--1:57 Robert M. Hierons and Miqing Li and Xiaohui Liu and Jose Antonio Parejo and Sergio Segura and Xin Yao Many-Objective Test Suite Generation for Software Product Lines . . . . . . . . . 2:1--2:46 Lin Chen and Di Wu and Wanwangying Ma and Yuming Zhou and Baowen Xu and Hareton Leung How C++ Templates Are Used for Generic Programming: an Empirical Study on 50 Open Source Systems . . . . . . . . . . 3:1--3:49 Gaogao Yan and Li Jiao and Shuling Wang and Lingtai Wang and Naijun Zhan Automatically Generating SystemC Code from HCSP Formal Models . . . . . . . . 4:1--4:39 Yuan Yuan and Wolfgang Banzhaf Toward Better Evolutionary Program Repair: an Integrated Approach . . . . . 5:1--5:53 Roman Haas and Rainer Niedermayr and Tobias Roehm and Sven Apel Is Static Analysis Able to Identify Unnecessary Source Code? . . . . . . . . 6:1--6:23 Özgür Kafali and Nirav Ajmeri and Munindar P. Singh DESEN: Specification of Sociotechnical Systems via Patterns of Regulation and Control . . . . . . . . . . . . . . . . 7:1--7:50
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 8e:1--8e:1 Haipeng Cai Assessing and Improving Malware Detection Sustainability through App Evolution Studies . . . . . . . . . . . 8:1--8:28 Ivan Beschastnikh and Perry Liu and Albert Xing and Patty Wang and Yuriy Brun and Michael D. Ernst Visualizing Distributed System Executions . . . . . . . . . . . . . . . 9:1--9:38 Shaukat Ali and Paolo Arcaini and Dipesh Pradhan and Safdar Aqeel Safdar and Tao Yue Quality Indicators in Search-based Software Engineering: an Empirical Evaluation . . . . . . . . . . . . . . . 10:1--10:29 Ghanem Soltana and Mehrdad Sabetzadeh and Lionel C. Briand Practical Constraint Solving for Generating System Test Data . . . . . . 11:1--11:48 Ritu Kapur and Balwinder Sodhi A Defect Estimator for Source Code: Linking Defect Reports with Programming Constructs Usage Metrics . . . . . . . . 12:1--12:35 Yangguang Li and Zhen Ming (Jack) Jiang and Heng Li and Ahmed E. Hassan and Cheng He and Ruirui Huang and Zhengda Zeng and Mian Wang and Pinan Chen Predicting Node Failures in an Ultra-Large-Scale Cloud Computing Platform: an AIOps Solution . . . . . . 13:1--13:24
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 14e:1--14e:1 Guanhua Wang and Sudipta Chattopadhyay and Arnab Kumar Biswas and Tulika Mitra and Abhik Roychoudhury KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution . . . . . 14:1--14:31 Farbod Taymouri and Josep Carmona Computing Alignments of Well-Formed Process Models using Local Search . . . 15:1--15:41 Zhendong Wang and Yang Feng and Yi Wang and James A. Jones and David Redmiles Unveiling Elite Developers' Activities in Open Source Projects . . . . . . . . 16:1--16:35 Artem Polyvyanyy and Andreas Solti and Matthias Weidlich and Claudio Di Ciccio and Jan Mendling Monotone Precision and Recall Measures for Comparing Executions and Specifications of Dynamic Systems . . . 17:1--17:41 Breno Miranda and Antonia Bertolino Testing Relative to Usage Scope: Revisiting Software Coverage Criteria 18:1--18:24 Jieshan Chen and Chunyang Chen and Zhenchang Xing and Xin Xia and Liming Zhu and John Grundy and Jinshui Wang Wireframe-based UI Design Search through Image Autoencoder . . . . . . . . . . . 19:1--19:31 Yinxing Xue and Yan-Fu Li Multi-objective Integer Programming Approaches for Solving the Multi-criteria Test-suite Minimization Problem: Towards Sound and Complete Solutions of a Particular Search-based Software-engineering Problem . . . . . . 20:1--20:50 Lingfeng Bao and Zhenchang Xing and Xin Xia and David Lo and Minghui Wu and Xiaohu Yang psc2code: Denoising Code Extraction from Programming Screencasts . . . . . . . . 21:1--21:38
Andrea Arcuri and Juan P. Galeotti Handling SQL Databases in Automated System Test Generation . . . . . . . . . 22:1--22:31 Aleksandr Pilgun and Olga Gadyatskaya and Yury Zhauniarovich and Stanislav Dashevskyi and Artsiom Kushniarou and Sjouke Mauw Fine-grained Code Coverage Measurement in Automated Black-box Android Testing 23:1--23:35 Junjie Wang and Ye Yang and Tim Menzies and Qing Wang iSENSE2.0: Improving Completion-aware Crowdtesting Management with Duplicate Tagger and Sanity Checker . . . . . . . 24:1--24:27 Xihui Zhang and Thomas F. Stafford and Tao Hu and Hua Dai Measuring Task Conflict and Person Conflict in Software Testing . . . . . . 25:1--25:19 Zhipeng Gao and Xin Xia and John Grundy and David Lo and Yuan-Fang Li Generating Question Titles for Stack Overflow from Mined Code Snippets . . . 26:1--26:37 Xiao Liang Yu and Omar Al-Bataineh and David Lo and Abhik Roychoudhury Smart Contract Repair . . . . . . . . . 27:1--27:32 Josie Holmes and Iftekhar Ahmed and Caius Brindescu and Rahul Gopinath and He Zhang and Alex Groce Using Relative Lines of Code to Guide Automated Test Generation for Python . . 28:1--28:38 Jevgenija Pantiuchina and Fiorella Zampetti and Simone Scalabrino and Valentina Piantadosi and Rocco Oliveto and Gabriele Bavota and Massimiliano Di Penta Why Developers Refactor Source Code: a Mining-based Study . . . . . . . . . . . 29:1--29:30 Junjie Chen and Zhuo Wu and Zan Wang and Hanmo You and Lingming Zhang and Ming Yan Practical Accuracy Estimation for Efficient Deep Neural Network Testing 30:1--30:35 Wenhan Wang and Ge Li and Sijie Shen and Xin Xia and Zhi Jin Modular Tree Network for Source Code Representation Learning . . . . . . . . 31:1--31:23
Michele Guerriero and Damian Andrew Tamburri and Elisabetta Di Nitto StreamGen: Model-driven Development of Distributed Streaming Applications . . . 1:1--1:30 Janet Siegmund and Norman Peitek and Sven Apel and Norbert Siegmund Mastering Variation in Human Studies: The Role of Aggregation . . . . . . . . 2:1--2:40 Akond Rahman and Md Rayhanur Rahman and Chris Parnin and Laurie Williams Security Smells in Ansible and Chef Scripts: a Replication Study . . . . . . 3:1--3:31 Huihui Zhang and Man Zhang and Tao Yue and Shaukat Ali and Yan Li Uncertainty-wise Requirements Prioritization with Search . . . . . . . 4:1--4:54 Ahmad Salim Al-Sibahi and Thomas P. Jensen and Aleksandar S. Dimovski and Andrzej Wasowski Verification of Program Transformations with Inductive Refinement Types . . . . 5:1--5:33 Ridwan Salihin Shariffdeen and Shin Hwei Tan and Mingyuan Gao and Abhik Roychoudhury Automated Patch Transplantation . . . . 6:1--6:36 Xiaoxue Ma and Shangru Wu and Ernest Pobee and Xiupei Mei and Hao Zhang and Bo Jiang and Wing-Kwong Chan RegionTrack: a Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces . . . . . . . . 7:1--7:49 Osama Ehsan and Safwat Hassan and Mariam El Mezouar and Ying Zou An Empirical Study of Developer Discussions in the Gitter Platform . . . 8:1--8:39 Roberto Bagnara and Michele Chiari and Roberta Gori and Abramo Bagnara A Practical Approach to Verification of Floating-Point C/C++ Programs with \tt math.h/\tt cmath Functions . . . . . . . 9:1--9:53 Xiaoqin Fu and Haipeng Cai and Wen Li and Li Li SEADS: Scalable and Cost-effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning . . . . . . . . . . . . . . . . 10:1--10:45 Zhipeng Gao and Xin Xia and David Lo and John Grundy Technical Q8A Site Answer Recommendation via Question Boosting . . . . . . . . . 11:1--11:34
Javier Godoy and Juan Pablo Galeotti and Diego Garbervetsky and Sebastián Uchitel Enabledness-based Testing of Object Protocols . . . . . . . . . . . . . . . 12:1--12:36 Wei Ma and Mike Papadakis and Anestis Tsakmalis and Maxime Cordy and Yves Le Traon Test Selection for Deep Learning Systems 13:1--13:22 Xiang Gao and Bo Wang and Gregory J. Duck and Ruyi Ji and Yingfei Xiong and Abhik Roychoudhury Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction 14:1--14:27 Manuel Ohrndorf and Christopher Pietsch and Udo Kelter and Lars Grunske and Timo Kehrer History-based Model Repair Recommendations . . . . . . . . . . . . 15:1--15:46 Hong Jin Kang and David Lo Adversarial Specification Mining . . . . 16:1--16:40 Dunwei Gong and Baicai Sun and Xiangjuan Yao and Tian Tian Test Data Generation for Path Coverage of MPI Programs Using SAEO . . . . . . . 17:1--17:37 Zhenpeng Chen and Yanbin Cao and Huihan Yao and Xuan Lu and Xin Peng and Hong Mei and Xuanzhe Liu Emoji-powered Sentiment and Emotion Detection from Software Developers' Communication Data . . . . . . . . . . . 18:1--18:48 Thierry Titcheu Chekam and Mike Papadakis and Maxime Cordy and Yves Le Traon Killing Stubborn Mutants with Symbolic Execution . . . . . . . . . . . . . . . 19:1--19:23 John-Paul Ore and Carrick Detweiler and Sebastian Elbaum An Empirical Study on Type Annotations: Accuracy, Speed, and Suggestion Effectiveness . . . . . . . . . . . . . 20:1--20:29 Bozhi Wu and Sen Chen and Cuiyun Gao and Lingling Fan and Yang Liu and Weiping Wen and Michael R. Lyu Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation . . . . . . . . . . . . . 21:1--21:29 Haoxiang Zhang and Shaowei Wang and Tse-Hsun (Peter) Chen and Ahmed E. Hassan Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers? . . . . . . . . . . . . . . 22:1--22:31 Deqing Zou and Yawei Zhu and Shouhuai Xu and Zhen Li and Hai Jin and Hengkai Ye Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching . . . . . . . . . 23:1--23:31 Bailey Vandehei and Daniel Alencar Da Costa and Davide Falessi Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes . . . . . . . . . . . . . . . . 24:1--24:35 Qiuyuan Chen and Xin Xia and Han Hu and David Lo and Shanping Li Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction . . . . . . . . . . 25:1--25:29
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 26e:1--26e:1 Pengfei Gao and Hongyi Xie and Fu Song and Taolue Chen A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs . . . . . . . . . . . . . . . . 26:1--26:42 Juan De Lara and Esther Guerra and Jörg Kienzle Facet-oriented Modelling . . . . . . . . 27:1--27:59 Abdullah A. Zarir and Gustavo A. Oliva and Zhen M. (Jack) Jiang and Ahmed E. Hassan Developing Cost-Effective Blockchain-Powered Applications: a Case Study of the Gas Usage of Smart Contract Transactions in the Ethereum Blockchain Platform . . . . . . . . . . . . . . . . 28:1--28:38 Mouna Abidi and Md Saidur Rahman and Moses Openja and Foutse Khomh Are Multi-Language Design Smells Fault-Prone? An Empirical Study . . . . 29:1--29:56 Zohreh Sharafi and Yu Huang and Kevin Leach and Westley Weimer Toward an Objective Measure of Developers' Cognitive Activities . . . . 30:1--30:40 Gias Uddin and Foutse Khomh and Chanchal K. Roy Automatic API Usage Scenario Documentation from Technical Q&A Sites 31:1--31:45 Xiaoyu Sun and Li Li and Tegawendé F. Bissyandé and Jacques Klein and Damien Octeau and John Grundy Taming Reflection: an Essential Step Toward Whole-program Analysis of Android Apps . . . . . . . . . . . . . . . . . . 32:1--32:36 Guoliang Zhao and Safwat Hassan and Ying Zou and Derek Truong and Toby Corbin Predicting Performance Anomalies in Software Systems at Run-time . . . . . . 33:1--33:33 Thiago Castro and Leopoldo Teixeira and Vander Alves and Sven Apel and Maxime Cordy and Rohit Gheyi A Formal Framework of Software Product Line Analyses . . . . . . . . . . . . . 34:1--34:37 Wendy Yánez and Rami Bahsoon and Yuqun Zhang and Rick Kazman Architecting Internet of Things Systems with Blockchain: a Catalog of Tactics 35:1--35:46 Simone Scalabrino and Antonio Mastropaolo and Gabriele Bavota and Rocco Oliveto An Adaptive Search Budget Allocation Approach for Search-Based Test Case Generation . . . . . . . . . . . . . . . 36:1--36:26 Qiuyuan Chen and Chunyang Chen and Safwat Hassan and Zhengchang Xing and Xin Xia and Ahmed E. Hassan How Should I Improve the UI of My App?: a Study of User Reviews of Popular Apps in the Google Play . . . . . . . . . . . 37:1--37:38 Xiao Cheng and Haoyu Wang and Jiayi Hua and Guoai Xu and Yulei Sui DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network . . . . . . . . . . 38:1--38:33 Deqing Zou and Yueming Wu and Siru Yang and Anki Chauhan and Wei Yang and Jiangying Zhong and Shihan Dou and Hai Jin IntDroid: Android Malware Detection Based on API Intimacy Analysis . . . . . 39:1--39:32 Yanjie Zhao and Li Li and Haoyu Wang and Haipeng Cai and Tegawendé F. Bissyandé and Jacques Klein and John Grundy On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection . . . . . . . . . . . . . . . 40:1--40:38
Jianhui Chen and Fei He Leveraging Control Flow Knowledge in SMT Solving of Program Verification . . . . 41:1--41:26 Chris Bogart and Christian Kästner and James Herbsleb and Ferdian Thung When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems . . . . . . . . . . 42:1--42:56 Angelo Ferrando and Louise A. Dennis and Rafael C. Cardoso and Michael Fisher and Davide Ancona and Viviana Mascardi Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems . . . . . . 43:1--43:43 Héctor D. Menéndez and Gunel Jahangirova and Federica Sarro and Paolo Tonella and David Clark Diversifying Focused Testing for Unit Testing . . . . . . . . . . . . . . . . 44:1--44:24 Zhaoqiang Guo and Shiran Liu and Jinping Liu and Yanhui Li and Lin Chen and Hongmin Lu and Yuming Zhou How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study 45:1--45:56 Jingbo Lu and Dongjie He and Jingling Xue Eagle: CFL-Reachability-Based Precision-Preserving Acceleration of Object-Sensitive Pointer Analysis with Partial Context Sensitivity . . . . . . 46:1--46:46 Philipp Paulweber and Georg Simhandl and Uwe Zdun Specifying with Interface and Trait Abstractions in Abstract State Machines: a Controlled Experiment . . . . . . . . 47:1--47:29 Preetha Chatterjee and Kostadin Damevski and Nicholas A. Kraft and Lori Pollock Automatically Identifying the Quality of Developer Chats for Post Hoc Use . . . . 48:1--48:28 Yida Tao and Shan Tang and Yepang Liu and Zhiwu Xu and Shengchao Qin Speeding Up Data Manipulation Tasks with Alternative Implementations: an Exploratory Study . . . . . . . . . . . 49:1--49:28 Nacha Chondamrongkul and Jing Sun and Ian Warren Software Architectural Migration: an Automated Planning Approach . . . . . . 50:1--50:35 Dalia Sobhy and Rami Bahsoon and Leandro Minku and Rick Kazman Evaluation of Software Architectures under Uncertainty: a Systematic Literature Review . . . . . . . . . . . 51:1--51:50 Daniel Russo The Agile Success Model: a Mixed-methods Study of a Large-scale Agile Transformation . . . . . . . . . . . . . 52:1--52:46 Safdar Aqeel Safdar and Tao Yue and Shaukat Ali Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search . . . . . . . . . 53:1--53:36 Yingzhe Lyu and Heng Li and Mohammed Sayagh and Zhen Ming (Jack) Jiang and Ahmed E. Hassan An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions . . . . . . . . . . . 54:1--54:38 Malinda Dilhara and Ameya Ketkar and Danny Dig Understanding Software-2.0: a Study of Machine Learning Library Usage and Evolution . . . . . . . . . . . . . . . 55:1--55:42 Haoye Wang and Xin Xia and David Lo and Qiang He and Xinyu Wang and John Grundy Context-aware Retrieval-based Deep Commit Message Generation . . . . . . . 56:1--56:30
Andrea Arcuri and Juan P. Galeotti Enhancing Search-based Testing with Testability Transformations for Existing APIs . . . . . . . . . . . . . . . . . . 1:1--1:34 Man Zhang and Andrea Arcuri Adaptive Hypermutation for Search-Based System Test Generation: a Study on REST APIs with EvoMaster . . . . . . . . . . 2:1--2:52 Hui Xu and Zhuangbin Chen and Mingshen Sun and Yangfan Zhou and Michael R. Lyu Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs . . . . . . . . . . . . . . . . . . 3:1--3:25 Davide Falessi and Aalok Ahluwalia and Massimiliano DI Penta The Impact of Dormant Defects on Defect Prediction: a Study of 19 Apache Projects . . . . . . . . . . . . . . . . 4:1--4:26 Birgit Vogel-Heuser and Eva-Maria Neumann and Juliane Fischer MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software . . . . . . . 5:1--5:24 Anders Sundelin and Javier Gonzalez-huerta and Krzysztof Wnuk and Tony Gorschek Towards an Anatomy of Software Craftsmanship . . . . . . . . . . . . . 6:1--6:49 Daniel Graziotin and Per Lenberg and Robert Feldt and Stefan Wagner Psychometrics in Behavioral Software Engineering: a Methodological Introduction with Guidelines . . . . . . 7:1--7:36 Jianyi Zhou and Junjie Chen and Dan Hao Parallel Test Prioritization . . . . . . 8:1--8:50 Irum Rauf and Marian Petre and Thein Tun and Tamara Lopez and Paul Lunn and Dirk Van Der Linden and John Towse and Helen Sharp and Mark Levine and Awais Rashid and Bashar Nuseibeh The Case for Adaptive Security Interventions . . . . . . . . . . . . . 9:1--9:52 Lorena Arcega and Jaime Font and Òystein Haugen and Carlos Cetina Bug Localization in Model-Based Systems in the Wild . . . . . . . . . . . . . . 10:1--10:32 Cuiyun Gao and Wenjie Zhou and Xin Xia and David Lo and Qi Xie and Michael R. Lyu Automating App Review Response Generation Based on Contextual Knowledge 11:1--11:36 Chao Liu and Xin Xia and David Lo and Zhiwe Liu and Ahmed E. Hassan and Shanping Li CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words . . . . . . . . . . . . . . . . . 12:1--12:37 Yaqin Zhou and Jing Kai Siow and Chenyu Wang and Shangqing Liu and Yang Liu SPI: Automated Identification of Security Patches via Commits . . . . . . 13:1--13:27 Amin Nikanjam and Houssem Ben Braiek and Mohammad Mehdi Morovati and Foutse Khomh Automatic Fault Detection for Deep Learning Programs Using Graph Transformations . . . . . . . . . . . . 14:1--14:27 Chao Liu and Cuiyun Gao and Xin Xia and David Lo and John Grundy and Xiaohu Yang On the Reproducibility and Replicability of Deep Learning in Software Engineering 15:1--15:46 Yingzhe Lyu and Gopi Krishnan Rajbahadur and Dayi Lin and Boyuan Chen and Zhen Ming (Jack) Jiang Towards a Consistent Interpretation of AIOps Models . . . . . . . . . . . . . . 16:1--16:38 Owain Parry and Gregory M. Kapfhammer and Michael Hilton and Phil McMinn A Survey of Flaky Tests . . . . . . . . 17:1--17:74
Mauro Pezz\`e Editorial: a Retrospective and Prospective Reflection . . . . . . . . . 18e:1--18e:2 K. Lano and S. Kolahdouz-Rahimi and S. Fang Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example . . . . . . . . . . . . . . . 18:1--18:71 Thomas Bock and Angelika Schmid and Sven Apel Measuring and Modeling Group Dynamics in Open-Source Software Development: a Tensor Decomposition Approach . . . . . 19:1--19:50 Fahimeh Ebrahimi and Miroslav Tushev and Anas Mahmoud Classifying Mobile Applications Using Word Embeddings . . . . . . . . . . . . 20:1--20:30 Luca Ardito and Andrea Bottino and Riccardo Coppola and Fabrizio Lamberti and Francesco Manigrasso and Lia Morra and Marco Torchiano Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing . . . . . . . . . . . . . . 21:1--21:32 Chandra Maddila and Nachiappan Nagappan and Christian Bird and Georgios Gousios and Arie van Deursen ConE: a Concurrent Edit Detection Tool for Large-scale Software Development . . 22:1--22:26 Jevgenija Pantiuchina and Bin Lin and Fiorella Zampetti and Massimiliano Di Penta and Michele Lanza and Gabriele Bavota Why Do Developers Reject Refactorings in Open-Source Projects? . . . . . . . . . 23:1--23:23 Olawole Oni and Emmanuel Letier Analyzing Uncertainty in Release Planning: a Method and Experiment for Fixed-Date Release Cycles . . . . . . . 24:1--24:39 Luca Traini and Daniele Di Pompeo and Michele Tucci and Bin Lin and Simone Scalabrino and Gabriele Bavota and Michele Lanza and Rocco Oliveto and Vittorio Cortellessa How Software Refactoring Impacts Execution Time . . . . . . . . . . . . . 25:1--25:23 Katherine Hough and Jonathan Bell A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships 26:1--26:43 Denae Ford and Margaret-Anne Storey and Thomas Zimmermann and Christian Bird and Sonia Jaffe and Chandra Maddila and Jenna L. Butler and Brian Houck and Nachiappan Nagappan A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic . . . . . . . . . . . 27:1--27:37 Ryan Williams and Tongwei Ren and Lorenzo De Carli and Long Lu and Gillian Smith Guided Feature Identification and Removal for Resource-constrained Firmware . . . . . . . . . . . . . . . . 28:1--28:25 Frank F. Xu and Bogdan Vasilescu and Graham Neubig In-IDE Code Generation from Natural Language: Promise and Challenges . . . . 29:1--29:47 Jiachi Chen and Xin Xia and David Lo and John Grundy Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum . . . . . . . . . . . . . . 30:1--30:37 Patrick Keller and Abdoul Kader Kaboré and Laura Plein and Jacques Klein and Yves Le Traon and Tegawendé F. Bissyandé What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning . . 31:1--31:34 Cody Watson and Nathan Cooper and David Nader Palacio and Kevin Moran and Denys Poshyvanyk A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research . . . . . . . . . . 32:1--32:58 Ritu Kapur and Balwinder Sodhi OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics . . . . . . . . . 33:1--33:35 Jialun Cao and Meiziniu Li and Yeting Li and Ming Wen and Shing-Chi Cheung and Haiming Chen SemMT: a Semantic-Based Testing Approach for Machine Translation Systems . . . . 34e:1--34e:36 Changwei Zou and Xudong Wang and Yaoqing Gao and Jingling Xue Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization . . 35e:1--35e:37 Sabreen Ahmadjee and Carlos Mera-Gómez and Rami Bahsoon and Rick Kazman A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats . . . . . . . . . . 36e:1--36e:45 Silverio Martínez-Fernández and Justus Bogner and Xavier Franch and Marc Oriol and Julien Siebert and Adam Trendowicz and Anna Maria Vollmer and Stefan Wagner Software Engineering for AI-Based Systems: a Survey . . . . . . . . . . . 37e:1--37e:59
Yingfei Xiong and Bo Wang L2S: a Framework for Synthesizing the Most Probable Program under a Specification . . . . . . . . . . . . . 34:1--34:45 Junjie Wang and Ye Yang and Song Wang and Jun Hu and Qing Wang Context- and Fairness-Aware In-Process Crowdworker Recommendation . . . . . . . 35:1--35:31 Yu Zhao and Ting Su and Yang Liu and Wei Zheng and Xiaoxue Wu and Ramakanth Kavuluru and William G. J. Halfond and Tingting Yu ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps . . . . . . . . . . . . . . 36:1--36:33 Luca Di Stefano and Rocco De Nicola and Omar Inverso Verification of Distributed Systems via Sequential Emulation . . . . . . . . . . 37:1--37:41 Bin Lin and Nathan Cassee and Alexander Serebrenik and Gabriele Bavota and Nicole Novielli and Michele Lanza Opinion Mining for Software Development: a Systematic Literature Review . . . . . 38:1--38:41 Daniel Barcelona-Pons and Pierre Sutra and Marc Sánchez-Artigas and Gerard París and Pedro García-López Stateful Serverless Computing with Crucial . . . . . . . . . . . . . . . . 39:1--39:38 Carlo A. Furia and Richard Torkar and Robert Feldt Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality . . . . . . . . . . . . . . . . 40:1--40:38 Bogdan Marculescu and Man Zhang and Andrea Arcuri On the Faults Found in REST APIs by Automated Test Generation . . . . . . . 41:1--41:43 Fabio Calefato and Filippo Lanubile Using Personality Detection Tools for Software Engineering Research: How Far Can We Go? . . . . . . . . . . . . . . . 42:1--42:48 Si Liu All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions . . . . . . . . . . 43:1--43:44 Wenhua Yang and Chong Zhang and Minxue Pan and Chang Xu and Yu Zhou and Zhiqiu Huang Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow . . . . . . . . . . . . . 44:1--44:29 Dusica Marijan and Sagar Sen Industry-Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns . . . . . . . . . . . . . 45:1--45:52 Dalia Sobhy and Leandro Minku and Rami Bahsoon and Rick Kazman Continuous and Proactive Software Architecture Evaluation: an IoT Case . . 46:1--46:54 Xiaofei Xie and Tianlin Li and Jian Wang and Lei Ma and Qing Guo and Felix Juefei-Xu and Yang Liu NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks . . . . . . . . . . . . 47:1--47:27 Gias Uddin and Yann-Gaël Guéhénuc and Foutse Khomh and Chanchal K. Roy An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets . . . . . . . . . . . . . . . . 48:1--48:38 Hao Guo and Sen Chen and Zhenchang Xing and Xiaohong Li and Yude Bai and Jiamou Sun Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions 49:1--49:27 Huangzhao Zhang and Zhiyi Fu and Ge Li and Lei Ma and Zhehao Zhao and Hua'an Yang and Yizhe Sun and Yang Liu and Zhi Jin Towards Robustness of Deep Program Processing Models-Detection, Estimation, and Enhancement . . . . . . . . . . . . 50:1--50:40 Bo Lin and Shangwen Wang and Ming Wen and Xiaoguang Mao Context-Aware Code Change Embedding for Better Patch Correctness Assessment . . 51:1--51:29 Zehao Lin and Guodun Li and Jingfeng Zhang and Yue Deng and Xiangji Zeng and Yin Zhang and Yao Wan XCode: Towards Cross-Language Code Representation with Large-Scale Pre-Training . . . . . . . . . . . . . . 52:1--52:44 Lizhi Liao and Heng Li and Weiyi Shang and Lei Ma An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks . . . 53:1--53:40 Siwei Wu and Lei Wu and Yajin Zhou and Runhuai Li and Zhi Wang and Xiapu Luo and Cong Wang and Kui Ren Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum . . . . . . . . . 54:1--54:33 Benjamin S. Meyers and Sultan Fahad Almassari and Brandon N. Keller and Andrew Meneely Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition . . . . . . . . . . . . . . 55:1--55:25 Yanming Yang and Xin Xia and David Lo and Tingting Bi and John Grundy and Xiaohu Yang Predictive Models in Software Engineering: Challenges and Opportunities . . . . . . . . . . . . . 56:1--56:72
Dirk Beyer and Matthias Dangl and Daniel Dietsch and Matthias Heizmann and Thomas Lemberger and Michael Tautschnig Verification Witnesses . . . . . . . . . 57:1--57:?? Ridhi Jain and Rahul Purandare and Subodh Sharma BiRD: Race Detection in Software Binaries under Relaxed Memory Models . . 58:1--58:?? Jhon Masso and Félix García and César Pardo and Francisco J. Pino and Mario Piattini A Common Terminology for Software Risk Management . . . . . . . . . . . . . . . 59:1--59:?? Yu Zhou and Xiaoqing Zhang and Juanjuan Shen and Tingting Han and Taolue Chen and Harald Gall Adversarial Robustness of Deep Code Comment Generation . . . . . . . . . . . 60:1--60:?? Chanh Duc Ngo and Fabrizio Pastore and Lionel Briand Automated, Cost-effective, and Update-driven App Testing . . . . . . . 61:1--61:?? Hao Yu and Xing Hu and Ge Li and Ying Li and Qianxiang Wang and Tao Xie Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning . . . . . . . . 62:1--62:?? Xing Hu and Qiuyuan Chen and Haoye Wang and Xin Xia and David Lo and Thomas Zimmermann Correlating Automated and Human Evaluation of Code Documentation Generation Quality . . . . . . . . . . . 63:1--63:?? Étienne André and Didier Lime and Dylan Marinho and Jun Sun Guaranteeing Timed Opacity using Parametric Timed Model Checking . . . . 64:1--64:?? Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella Deep Reinforcement Learning for Black-box Testing of Android Apps . . . 65:1--65:?? Tingting Bi and Xin Xia and David Lo and John Grundy and Thomas Zimmermann and Denae Ford Accessibility in Software Practice: a Practitioner's Perspective . . . . . . . 66:1--66:?? Mitchell Joblin and Sven Apel How Do Successful and Failed Projects Differ? A Socio-Technical Analysis . . . 67:1--67:?? Giuseppe De Giacomo and Riccardo De Masellis and Fabrizio Maria Maggi and Marco Montali Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces . . . . . . . . . . . . . 68:1--68:?? Peng Zhang and Yang Wang and Xutong Liu and Yanhui Li and Yibiao Yang and Ziyuan Wang and Xiaoyu Zhou and Lin Chen and Yuming Zhou Mutant Reduction Evaluation: What is There and What is Missing? . . . . . . . 69:1--69:?? Elvira Albert and Pablo Gordillo and Alejandro Hernández-Cerezo and Albert Rubio and Maria A. Schett Super-optimization of Smart Contracts 70:1--70:?? Henrich Lauko and Lukás Korencik and Petr Rockai Verification of Programs Sensitive to Heap Layout . . . . . . . . . . . . . . 71:1--71:?? Junjie Chen and Chenyao Suo Boosting Compiler Testing via Compiler Optimization Exploration . . . . . . . . 72:1--72:?? Jinhan Kim and Juyoung Jeon and Shin Hong and Shin Yoo Predictive Mutation Analysis via the Natural Language Channel in Source Code 73:1--73:?? Umair Z. Ahmed and Zhiyu Fan and Jooyong Yi and Omar I. Al-Bataineh and Abhik Roychoudhury Verifix: Verified Repair of Programming Assignments . . . . . . . . . . . . . . 74:1--74:?? Yuxia Zhang and Hui Liu and Xin Tan and Minghui Zhou and Zhi Jin and Jiaxin Zhu Turnover of Companies in OpenStack: Prevalence and Rationale . . . . . . . . 75:1--75:?? Chao Ni and Xin Xia and David Lo and Xiaohu Yang and Ahmed E. Hassan Just-In-Time Defect Prediction on JavaScript Projects: a Replication Study 76:1--76:?? Haoye Tian and Yinghua Li and Weiguo Pian and Abdoul Kader Kaboré and Kui Liu and Andrew Habib and Jacques Klein and Tegawendé F. Bissyandé Predicting Patch Correctness Based on the Similarity of Failing Test Cases . . 77:1--77:?? Qiang Hu and Yuejun Guo and Maxime Cordy and Xiaofei Xie and Lei Ma and Mike Papadakis and Yves Le Traon An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement . . . . . . . 78:1--78:?? Ferhat Ozgur Catak and Tao Yue and Shaukat Ali Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data . . . . . . . 79:1--79:?? Matteo Biagiola and Paolo Tonella Testing the Plasticity of Reinforcement Learning-based Systems . . . . . . . . . 80:1--80:?? Bianca Trinkenreich and Igor Wiese and Anita Sarma and Marco Gerosa and Igor Steinmacher Women's Participation in Open Source Software: a Survey of the Literature . . 81:1--81:??
Mauro Pezz\`e Editorial: Announcing Six TOSEM Issues Per Year . . . . . . . . . . . . . . . . 1:1--1:?? Marco Robol and Travis D. Breaux and Elda Paja and Paolo Giorgini Consent Verification Monitoring . . . . 2:1--2:?? Pengbo Nie and Chengcheng Wan and Jiayu Zhu and Ziyi Lin and Yuting Chen and Zhendong Su Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations . . . . . . . . 3:1--3:?? Minxue Pan and Yifei Lu and Yu Pei and Tian Zhang and Xuandong Li Preference-wise Testing of Android Apps via Test Amplification . . . . . . . . . 4:1--4:?? Tao Chen and Miqing Li The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering . . . . . . . . . . . . . . 5:1--5:?? Francesco Bertolotti and Walter Cazzola Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension . . . . . . . . . . . . . 6:1--6:?? Zijing Yin and Yiwen Xu and Fuchen Ma and Haohao Gao and Lei Qiao and Yu Jiang Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization . . . . . 7:1--7:?? Yiwen Dong and Zheyang Li and Yongqiang Tian and Chengnian Sun and Michael W. Godfrey and Meiyappan Nagappan Bash in the Wild: Language Usage, Code Smells, and Bugs . . . . . . . . . . . . 8:1--8:22 Xiong Xu and Jean-Pierre Talpin and Shuling Wang and Bohua Zhan and Naijun Zhan Semantics Foundation for Cyber-physical Systems Using Higher-order UTP . . . . . 9:1--9:?? Masaki Waga and Étienne André and Ichiro Hasuo Parametric Timed Pattern Matching . . . 10:1--10:?? Benjamin Rombaut and Filipe R. Cogo and Bram Adams and Ahmed E. Hassan There's no Such Thing as a Free Lunch: Lessons Learned from Exploring the Overhead Introduced by the Greenkeeper Dependency Bot in Npm . . . . . . . . . 11:1--11:?? Danny Weyns and Usman M. Iftikhar ActivFORMS: a Formally Founded Model-based Approach to Engineer Self-adaptive Systems . . . . . . . . . 12:1--12:?? Xueliang Li and Junyang Chen and Yepang Liu and Kaishun Wu and John P. Gallagher Combatting Energy Issues for Mobile Applications . . . . . . . . . . . . . . 13:1--13:?? Milos Ojdanic and Ezekiel Soremekun and Renzo Degiovanni and Mike Papadakis and Yves Le Traon Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution . . . . . . . . . . . . . 14:1--14:?? Sayedhassan Khatoonabadi and Diego Elias Costa and Rabe Abdalkareem and Emad Shihab On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests --- a Mixed-Methods Study of 10 Large Open-Source Projects . . . . 15:1--15:?? Uwe Zdun and Pierre-Jean Queval and Georg Simhandl and Riccardo Scandariato and Somik Chakravarty and Marjan Jelic and Aleksandar Jovanovic Microservice Security Metrics for Secure Communication, Identity Management, and Observability . . . . . . . . . . . . . 16:1--16:?? Aitor Arrieta and Pablo Valle and Joseba A. Agirre and Goiuria Sagardui Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection . . . . . . . . . . . . . . . 17:1--17:?? Jianwei Wu and James Clause Automated Identification of Uniqueness in JUnit Tests . . . . . . . . . . . . . 18:1--18:?? Jiahuei Lin and Mohammed Sayagh and Ahmed E. Hassan The Co-evolution of the WordPress Platform and Its Plugins . . . . . . . . 19:1--19:?? Chang-Ai Sun and Hepeng Dai and Huai Liu and Tsong Yueh Chen Feedback-Directed Metamorphic Testing 20:1--20:?? Aurora Ramírez and Robert Feldt and José Raúl Romero A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning . . . . . . . . . . . . 21:1--21:?? Sihan Xu and Ya Gao and Lingling Fan and Zheli Liu and Yang Liu and Hua Ji LiDetector: License Incompatibility Detection for Open Source Software . . . 22:1--22:?? Shuzheng Gao and Cuiyun Gao and Yulan He and Jichuan Zeng and Lunyiu Nie and Xin Xia and Michael Lyu Code Structure-Guided Transformer for Source Code Summarization . . . . . . . 23:1--23:?? Zarrin Tasnim Sworna and Chadni Islam and Muhammad Ali Babar APIRO: a Framework for Automated Security Tools API Recommendation . . . 24:1--24:?? Imen Sayar and Alexandre Bartel and Eric Bodden and Yves Le Traon An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities . . . . . . 25:1--25:?? Zheyuan He and Shuwei Song and Yang Bai and Xiapu Luo and Ting Chen and Wensheng Zhang and Peng He and Hongwei Li and Xiaodong Lin and Xiaosong Zhang TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts . . . . . . . . . . . . . . . 26:1--26:?? Gyte Tamasauskaite and Paul Groth Defining a Knowledge Graph Development Process Through a Systematic Review . . 27:1--27:??
Christian Birchler and Sajad Khatiri and Pouria Derakhshanfar and Sebastiano Panichella and Annibale Panichella Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments . . . . . . . . . . 28:1--28:?? Richard Banach Graded Refinement, Retrenchment, and Simulation . . . . . . . . . . . . . . . 29:1--29:?? Zhen Yang and Jacky Wai Keung and Xiao Yu and Yan Xiao and Zhi Jin and Jingyu Zhang On the Significance of Category Prediction for Code-Comment Synchronization . . . . . . . . . . . . 30:1--30:?? Lola Burgueño and Paula Muñoz and Robert Clarisó and Jordi Cabot and Sébastien Gérard and Antonio Vallecillo Dealing with Belief Uncertainty in Domain Models . . . . . . . . . . . . . 31:1--31:?? Profir-Petru Pârtachi and David R. White and Earl T. Barr Aide-mémoire: Improving a Project's Collective Memory via Pull Request-Issue Links . . . . . . . . . . . . . . . . . 32:1--32:?? Ahmed Khanfir and Anil Koyuncu and Mike Papadakis and Maxime Cordy and Tegawende F. Bissyandé and Jacques Klein and Yves Le Traon iBiR: Bug-report-driven Fault Injection 33:1--33:?? Chen Zeng and Yue Yu and Shanshan Li and Xin Xia and Zhiming Wang and Mingyang Geng and Linxiao Bai and Wei Dong and Xiangke Liao deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search . . . . . . 34:1--34:?? Chandra Maddila and Sai Surya Upadrasta and Chetan Bansal and Nachiappan Nagappan and Georgios Gousios and Arie van Deursen Nudge: Accelerating Overdue Pull Requests toward Completion . . . . . . . 35:1--35:?? Zhiqiang Zuo and Xintao Niu and Siyi Zhang and Lu Fang and Siau Cheng Khoo and Shan Lu and Chengnian Sun and Guoqing Harry Xu Toward More Efficient Statistical Debugging with Abstraction Refinement 36:1--36:?? Jaekwon Lee and Seung Yeob Shin and Shiva Nejati and Lionel Briand and Yago Isasi Parache Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages . . . . . . . . . . . . . . . . . 37:1--37:?? César Soto-Valero and Thomas Durieux and Nicolas Harrand and Benoit Baudry Coverage-Based Debloating for Java Bytecode . . . . . . . . . . . . . . . . 38:1--38:?? Luke Dramko and Jeremy Lacomis and Pengcheng Yin and Ed Schwartz and Miltiadis Allamanis and Graham Neubig and Bogdan Vasilescu and Claire Le Goues DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class . . . . . . . . . . . . . 39:1--39:?? Bowen Shen and Muhammad Ali Gulzar and Fei He and Na Meng A Characterization Study of Merge Conflicts in Java Projects . . . . . . . 40:1--40:?? Andreea Costea and Abhishek Tiwari and Sigmund Chianasta and Kishore R. and Abhik Roychoudhury and Ilya Sergey Hippodrome: Data Race Repair Using Static Analysis Summaries . . . . . . . 41:1--41:?? Jinhan Kim and Robert Feldt and Shin Yoo Evaluating Surprise Adequacy for Deep Learning System Testing . . . . . . . . 42:1--42:?? Filipe Roseiro Cogo and Xin Xia and Ahmed E. Hassan Assessing the Alignment between the Information Needs of Developers and the Documentation of Programming Languages: a Case Study on Rust . . . . . . . . . . 43:1--43:?? Najd Altoyan and Don Batory On Proving the Correctness of Refactoring Class Diagrams of MDE Metamodels . . . . . . . . . . . . . . . 44:1--44:?? Chao Wang and Hao He and Uma Pal and Darko Marinov and Minghui Zhou Suboptimal Comments in Java Projects: From Independent Comment Changes to Commenting Practices . . . . . . . . . . 45:1--45:?? Jiezhu Cheng and Cuiyun Gao and Zibin Zheng HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems . . . 46:1--46:?? Hichem Belgacem and Xiaochen Li and Domenico Bianculli and Lionel Briand A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms . . . . . . . . . . 47:1--47:?? Zishuo Ding and Heng Li and Weiyi Shang and Tse-Hsun (Peter) Chen Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks . . . . . . . . . 48:1--48:?? Tahereh Zohdinasab and Vincenzo Riccio and Alessio Gambi and Paolo Tonella Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems . . . . . . . . . . . . . . . . 49:1--49:?? Xiaoyu Sun and Xiao Chen and Li Li and Haipeng Cai and John Grundy and Jordan Samhi and Tegawendé Bissyandé and Jacques Klein Demystifying Hidden Sensitive Operations in Android Apps . . . . . . . . . . . . 50:1--50:?? Hugo Araujo and Mohammad Reza Mousavi and Mahsa Varshosaz Testing, Validation, and Verification of Robotic and Autonomous Systems: a Systematic Review . . . . . . . . . . . 51:1--51:?? Andrea Fioraldi and Alessandro Mantovani and Dominik Maier and Davide Balzarotti Dissecting American Fuzzy Lop: a FuzzBench Evaluation . . . . . . . . . . 52:1--52:?? Zenong Zhang and George Klees and Eric Wang and Michael Hicks and Shiyi Wei Fuzzing Configurations of Program Options . . . . . . . . . . . . . . . . 53:1--53:?? Andrea Fioraldi and Alessandro Mantovani and Dominik Maier and Davide Balzarotti Dissecting American Fuzzy Lop --- a FuzzBench Evaluation --- RCR Report . . 54:1--54:?? Zenong Zhang and George Klees and Eric Wang and Michael Hicks and Shiyi Wei Fuzzing Configurations of Program Options --- RCR Report . . . . . . . . . 55:1--55:??
Juan Cruz-Carlon and Mahsa Varshosaz and Claire Le Goues and Andrzej Wasowski Patching Locking Bugs Statically with Crayons . . . . . . . . . . . . . . . . 56:1--56:?? Maha Ayub and Tania Saleem and Muhammad Janjua and Talha Ahmad Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts . . 57:1--57:?? Thomas Laurent and Stefan Klikovits and Paolo Arcaini and Fuyuki Ishikawa and Anthony Ventresque Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty . . . . . . . . . . . . . . 58:1--58:?? Michael Pacheco and Gustavo Oliva and Gopi Krishnan Rajbahadur and Ahmed Hassan Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform . . . . 59:1--59:?? Nikhil Patnaik and Andrew Dwyer and Joseph Hallett and Awais Rashid SLR: From Saltzer and Schroeder to 2021 \ldots 47 Years of Research on the Development and Validation of Security API Recommendations . . . . . . . . . . 60:1--60:?? Fuchen Ma and Meng Ren and Lerong Ouyang and Yuanliang Chen and Juan Zhu and Ting Chen and Yingli Zheng and Xiao Dai and Yu Jiang and Jiaguang Sun Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts 61:1--61:?? Yedi Zhang and Zhe Zhao and Guangke Chen and Fu Song and Taolue Chen Precise Quantitative Analysis of Binarized Neural Networks: a BDD-based Approach . . . . . . . . . . . . . . . . 62:1--62:?? Francisca Pérez and Raúl Lapeña and Ana Marcén and Carlos Cetina How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration . . . . . . 63:1--63:?? Tamara Lopez and Helen Sharp and Arosha Bandara and Thein Tun and Mark Levine and Bashar Nuseibeh Security Responses in Software Development . . . . . . . . . . . . . . 64:1--64:?? Deheng Yang and Yan Lei and Xiaoguang Mao and Yuhua Qi and Xin Yi Seeing the Whole Elephant: Systematically Understanding and Uncovering Evaluation Biases in Automated Program Repair . . . . . . . . 65:1--65:?? Chengpeng Wang and Wenyang Wang and Peisen Yao and Qingkai Shi and Jinguo Zhou and Xiao Xiao and Charles Zhang Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation . . . . . . . . . . . . . . 66:1--66:?? Andrea Di Sorbo and Fiorella Zampetti and Aaron Visaggio and Massimiliano Di Penta and Sebastiano Panichella Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms . . . 67:1--67:?? Tao Chen and Miqing Li Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives . . . . . . . . . 68:1--68:?? Lina Gong and Jingxuan Zhang and Mingqiang Wei and Haoxiang Zhang and Zhiqiu Huang What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories . . . . . . . . . . . . . . 69:1--69:?? Chris Karanikolas and Grigoris Dimitroulakos and Konstantinos Masselos Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability . . 70:1--70:?? Jun-Wei Lin and Navid Salehnamadi and Sam Malek Route: Roads Not Taken in UI Testing . . 71:1--71:?? Zhichao Chen and Junjie Chen and Weijing Wang and Jianyi Zhou and Meng Wang and Xiang Chen and Shan Zhou and Jianmin Wang Exploring Better Black-Box Test Case Prioritization via Log Analysis . . . . 72:1--72:?? Fiorella Zampetti and Damian Tamburri and Sebastiano Panichella and Annibale Panichella and Gerardo Canfora and Massimiliano Di Penta Continuous Integration and Delivery Practices for Cyber-Physical Systems: an Interview-Based Study . . . . . . . . . 73:1--73:?? Christiaan Verwijs and Daniel Russo A Theory of Scrum Team Effectiveness . . 74:1--74:?? Michel Nass and Emil Alégroth and Robert Feldt and Maurizio Leotta and Filippo Ricca Similarity-based Web Element Localization for Robust Test Automation 75:1--75:?? Yuriy Brun and Tian Lin and Jessie Elise Somerville and Elisha M. Myers and Natalie Ebner Blindspots in Python and Java APIs Result in Vulnerable Code . . . . . . . 76:1--76:?? Eric S. Liu and Dylan A. Lukes and William G. Griswold Refactoring in Computational Notebooks 77:1--77:?? Zhuo Zhang and Yan Lei and Ting Su and Meng Yan and Xiaoguang Mao and Yue Yu Influential Global and Local Contexts Guided Trace Representation for Fault Localization . . . . . . . . . . . . . . 78:1--78:?? Mohammed Attaoui and Hazem Fahmy and Fabrizio Pastore and Lionel Briand Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering . . . . . . . . . . . . . . . 79:1--79:?? Zhipeng Gao and Xin Xia and David Lo and John Grundy and Xindong Zhang and Zhenchang Xing I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts . . . . . . . . . . . . . 80:1--80:?? Swaroopa Dola and Matthew B. Dwyer and Mary Lou Soffa Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing . . . . . . . . . . . . 81:1--81:??
Mohan Cui and Chengjun Chen and Hui Xu and Yangfan Zhou SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis . . . . . . . . . . . 82:1--82:?? Benjamin Shreeve and Catarina Gralha and Awais Rashid and João Araújo and Miguel Goulão Making Sense of the Unknown: How Managers Make Cyber Security Decisions 83:1--83:?? Negar Ghorbani and Reyhaneh Jabbarvand and Navid Salehnamadi and Joshua Garcia and Sam Malek DeltaDroid: Dynamic Delivery Testing in Android . . . . . . . . . . . . . . . . 84:1--84:?? Jeongju Sohn and Sungmin Kang and Shin Yoo Arachne: Search-Based Repair of Deep Neural Networks . . . . . . . . . . . . 85:1--85:?? Mitchell Joblin and Barbara Eckl and Thomas Bock and Angelika Schmid and Janet Siegmund and Sven Apel Hierarchical and Hybrid Organizational Structures in Open-source Software Projects: a Longitudinal Study . . . . . 86:1--86:?? Ang Jia and Ming Fan and Wuxia Jin and Xi Xu and Zhaohui Zhou and Qiyi Tang and Sen Nie and Shi Wu and Ting Liu $1$-to-$1$ or $1$-to-$n$? Investigating the Effect of Function Inlining on Binary Similarity Analysis . . . . . . . 87:1--87:?? Vittoria Nardone and Biruk Muse and Mouna Abidi and Foutse Khomh and Massimiliano Di Penta Video Game Bad Smells: What They Are and How Developers Perceive Them . . . . . . 88:1--88:?? Xueling Zhang and John Heaps and Rocky Slavin and Jianwei Niu and Travis Breaux and Xiaoyin Wang DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data . . . . . . 89:1--89:?? Huaijin Wang and Pingchuan Ma and Shuai Wang and Qiyi Tang and Sen Nie and Shi Wu sem2vec: Semantics-aware Assembly Tracelet Embedding . . . . . . . . . . . 90:1--90:?? Mahmoud Alfadel and Diego Elias Costa and Emad Shihab and Bram Adams On the Discoverability of npm Vulnerabilities in \tt Node.js Projects 91:1--91:?? Haoye Tian and Kui Liu and Yinghua Li and Abdoul Kader Kaboré and Anil Koyuncu and Andrew Habib and Li Li and Junhao Wen and Jacques Klein and Tegawendé F. Bissyandé The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches . . . . . . . . . . . . 92:1--92:?? Xianhao Jin and Francisco Servant HybridCISave: a Combined Build and Test Selection Approach in Continuous Integration . . . . . . . . . . . . . . 93:1--93:?? Daniel Venturini and Filipe Roseiro Cogo and Ivanilton Polato and Marco A. Gerosa and Igor Scaliante Wiese I Depended on You and You Broke Me: an Empirical Study of Manifesting Breaking Changes in Client Packages . . . . . . . 94:1--94:?? Liping Han and Shaukat Ali and Tao Yue and Aitor Arrieta and Maite Arratibel Uncertainty-Aware Robustness Assessment of Industrial Elevator Systems . . . . . 95:1--95:?? Kui Liu and Jingtang Zhang and Li Li and Anil Koyuncu and Dongsun Kim and Chunpeng Ge and Zhe Liu and Jacques Klein and Tegawendé F. Bissyandé Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair . . . . . . . . . . . . . . . . . 96:1--96:?? Ting Zhang and Donggyun Han and Venkatesh Vinayakarao and Ivana Clairine Irsan and Bowen Xu and Ferdian Thung and David Lo and Lingxiao Jiang Duplicate Bug Report Detection: How Far Are We? . . . . . . . . . . . . . . . . 97:1--97:?? Chenguang Zhu and Mengshi Zhang and Xiuheng Wu and Xiufeng Xu and Yi Li Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery 98:1--98:?? Akond Rahman and Shazibul Islam Shamim and Dibyendu Brinto Bose and Rahul Pandita Security Misconfigurations in Open Source Kubernetes Manifests: an Empirical Study . . . . . . . . . . . . 99:1--99:?? Mifta Sintaha and Noor Nashid and Ali Mesbah Katana: Dual Slicing Based Context for Learning Bug Fixes . . . . . . . . . . . 100:1--100:?? Dongjie He and Jingbo Lu and Jingling Xue IFDS-based Context Debloating for Object-Sensitive Pointer Analysis . . . 101:1--101:?? Zhaoqiang Guo and Shiran Liu and Xutong Liu and Wei Lai and Mingliang Ma and Xu Zhang and Chao Ni and Yibiao Yang and Yanhui Li and Lin Chen and Guoqiang Zhou and Yuming Zhou Code-line-level Bugginess Identification: How Far have We Come, and How Far have We Yet to Go? . . . . . 102:1--102:?? Nengkun Yu Structured Theorem for Quantum Programs and its Applications . . . . . . . . . . 103:1--103:?? Hazem Fahmy and Fabrizio Pastore and Lionel Briand and Thomas Stifter Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems . . . 104:1--104:?? Houssem Ben Braiek and Foutse Khomh Testing Feedforward Neural Networks Training Programs . . . . . . . . . . . 105:1--105:?? Zhenpeng Chen and Jie M. Zhang and Federica Sarro and Mark Harman A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers . . . . . . . . . . . . . . 106:1--106:?? Deepika Badampudi and Michael Unterkalmsteiner and Ricardo Britto Modern Code Reviews --- Survey of Literature and Practice . . . . . . . . 107:1--107:??
Dulaji Hidellaarachchi and John Grundy and Rashina Hoda and Ingo Mueller The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners' Perspective . . . . . . . . . . . . . . 108:1--108:?? Di Wu and Xiao-Yuan Jing and Hongyu Zhang and Yang Feng and Haowen Chen and Yuming Zhou and Baowen Xu Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries . . . . . . . . . . . . 109:1--109:?? Thomas Wolter and Ann Barcomb and Dirk Riehle and Nikolay Harutyunyan Open Source License Inconsistencies on GitHub . . . . . . . . . . . . . . . . . 110:1--110:?? Katharina Müller and Christian Koch and Dirk Riehle and Michael Stops and Nikolay Harutyunyan Challenges of Working from Home in Software Development During Covid-19 Lockdowns . . . . . . . . . . . . . . . 111:1--111:?? Sofonias Yitagesu and Zhenchang Xing and Xiaowang Zhang and Zhiyong Feng and Xiaohong Li and Linyi Han Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling . . . . . . . . . 112:1--112:?? Qinghua Xu and Shaukat Ali and Tao Yue Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems . . . . . . . . . 113:1--113:?? Luigi Lavazza and Angela Locoro and Geng Liu and Roberto Meli Estimating Software Functional Size via Machine Learning . . . . . . . . . . . . 114:1--114:?? Jia Yang and Cai Fu and Fengyang Deng and Ming Wen and Xiaowei Guo and Chuanhao Wan Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding . . . . . . . . . . 115:1--115:?? Shrikanth N. C. and Tim Menzies Assessing the Early Bird Heuristic (for Predicting Project Quality) . . . . . . 116:1--116:?? Matteo Camilli and Carmine Colarusso and Barbara Russo and Eugenio Zimeo Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment . . . . . . . . . 117:1--117:?? Jaydeb Sarker and Asif Kamal Turzo and Ming Dong and Amiangshu Bosu Automated Identification of Toxic Code Reviews Using ToxiCR . . . . . . . . . . 118:1--118:?? Xuanzhe Liu and Jinfeng Wen and Zhenpeng Chen and Ding Li and Junkai Chen and Yi Liu and Haoyu Wang and Xin Jin FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing . . . . . . . . . . . . . . . 119:1--119:?? Matthew C. Davis and Emad Aghayi and Thomas D. Latoza and Xiaoyin Wang and Brad A. Myers and Joshua Sunshine What's (Not) Working in Programmer User Studies? . . . . . . . . . . . . . . . . 120:1--120:?? Florian Sattler and Sebastian Böhm and Philipp Dominik Schubert and Norbert Siegmund and Sven Apel SEAL: Integrating Program Analysis and Repository Mining . . . . . . . . . . . 121:1--121:?? Man Zhang and Andrea Arcuri and Yonggang Li and Yang Liu and Kaiming Xue White-Box Fuzzing RPC-Based APIs with EvoMaster: an Industrial Case Study . . 122:1--122:?? Hongwei Wei and Xiaohong Su and Cuiyun Gao and Weining Zheng and Wenxin Tao A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces . . . . . 123:1--123:?? Shuncheng Tang and Zhenya Zhang and Yi Zhang and Jixiang Zhou and Yan Guo and Shuang Liu and Shengjian Guo and Yan-Fu Li and Lei Ma and Yinxing Xue and Yang Liu A Survey on Automated Driving System Testing: Landscapes and Trends . . . . . 124:1--124:?? Jialuo Chen and Jingyi Wang and Xingjun Ma and Youcheng Sun and Jun Sun and Peixin Zhang and Peng Cheng QuoTe: Quality-oriented Testing for Deep Learning Systems . . . . . . . . . . . . 125:1--125:?? Yuan Huang and Hanyang Guo and Xi Ding and Junhuai Shu and Xiangping Chen and Xiapu Luo and Zibin Zheng and Xiaocong Zhou A Comparative Study on Method Comment and Inline Comment . . . . . . . . . . . 126:1--126:?? Meiziniu Li and Jialun Cao and Yongqiang Tian and Tsz On Li and Ming Wen and Shing-Chi Cheung COMET: Coverage-guided Model Generation For Deep Learning Library Testing . . . 127:1--127:?? Yongqiang Tian and Wuqi Zhang and Ming Wen and Shing-Chi Cheung and Chengnian Sun and Shiqing Ma and Yu Jiang Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications . . . . . . . . . . . . 128:1--128:?? Hua Qi and Zhijie Wang and Qing Guo and Jianlang Chen and Felix Juefei-Xu and Fuyuan Zhang and Lei Ma and Jianjun Zhao ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks . . . . . . . . . . . . 129:1--129:?? Zibin Zheng and Weili Chen and Zhijie Zhong and Zhiguang Chen and Yutong Lu Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features . . . . . . . . . . . . . . . . 130:1--130:?? Jinfeng Wen and Zhenpeng Chen and Xin Jin and Xuanzhe Liu Rise of the Planet of Serverless Computing: a Systematic Review . . . . . 131:1--131:?? Adrian Herrera and Mathias Payer and Antony L. Hosking DatAFLow: Toward a Data-Flow-Guided Fuzzer . . . . . . . . . . . . . . . . . 132:1--132:?? Adrian Herrera and Mathias Payer and Antony L. Hosking DatAFLow: Toward a Data-flow-guided Fuzzer . . . . . . . . . . . . . . . . . 133:1--133:??
Suvodeep Majumder and Joymallya Chakraborty and Gina R. Bai and Kathryn T. Stolee and Tim Menzies Fair Enough: Searching for Sufficient Measures of Fairness . . . . . . . . . . 134:1--134:?? Junjie Chen and Yihua Liang and Qingchao Shen and Jiajun Jiang and Shuochuan Li Toward Understanding Deep Learning Framework Bugs . . . . . . . . . . . . . 135:1--135:?? Foyzul Hassan and Na Meng and Xiaoyin Wang UniLoc: Unified Fault Localization of Continuous Integration Failures . . . . 136:1--136:?? Mengdi Zhang and Jun Sun and Jingyi Wang and Bing Sun TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination . . . . . . . . . . . . . 137:1--137:?? Thomas Bock and Nils Alznauer and Mitchell Joblin and Sven Apel Automatic Core-Developer Identification on GitHub: a Validation Study . . . . . 138:1--138:?? Man Zhang and Asma Belhadi and Andrea Arcuri JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs . . 139:1--139:?? Chong Wang and Xin Peng and Zhenchang Xing and Yue Zhang and Mingwei Liu and Rong Luo and Xiujie Meng XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph . . . 140:1--140:?? Maram Assi and Safwat Hassan and Stefanos Georgiou and Ying Zou Predicting the Change Impact of Resolving Defects by Leveraging the Topics of Issue Reports in Open Source Software Systems . . . . . . . . . . . . 141:1--141:?? Giovanni Rosa and Simone Scalabrino and Gabriele Bavota and Rocco Oliveto What Quality Aspects Influence the Adoption of Docker Images? . . . . . . . 142:1--142:?? Jia Li and Ge Li and Zhuo Li and Zhi Jin and Xing Hu and Kechi Zhang and Zhiyi Fu CodeEditor: Learning to Edit Source Code with Pre-trained Models . . . . . . . . 143:1--143:?? Man Zhang and Andrea Arcuri Open Problems in Fuzzing RESTful APIs: a Comparison of Tools . . . . . . . . . . 144:1--144:?? Sahil Suneja and Yufan Zhuang and Yunhui Zheng and Jim Laredo and Alessandro Morari and Udayan Khurana Incorporating Signal Awareness in Source Code Modeling: an Application to Vulnerability Detection . . . . . . . . 145:1--145:?? Mohamed Amine Batoun and Ka Lai Yung and Yuan Tian and Mohammed Sayagh An Empirical Study on GitHub Pull Requests' Reactions . . . . . . . . . . 146:1--146:?? Qing Huang and Dianshu Liao and Zhenchang Xing and Zhengkang Zuo and Changjing Wang and Xin Xia Semantic-Enriched Code Knowledge Graph to Reveal Unknowns in Smart Contract Code Reuse . . . . . . . . . . . . . . . 147:1--147:?? Jingxuan Zhang and Junpeng Luo and Jiahui Liang and Lina Gong and Zhiqiu Huang An Accurate Identifier Renaming Prediction and Suggestion Approach . . . 148:1--148:?? Abbas Javan Jafari and Diego Elias Costa and Emad Shihab and Rabe Abdalkareem Dependency Update Strategies and Package Characteristics . . . . . . . . . . . . 149:1--149:?? Zhengyuan Wei and Haipeng Wang and Imran Ashraf and Wing-Kwong Chan DeepPatch: Maintaining Deep Learning Model Programs to Retain Standard Accuracy with Substantial Robustness Improvement . . . . . . . . . . . . . . 150:1--150:?? Canh Minh Do and Yati Phyo and Adrián Riesco and Kazuhiro Ogata Optimization Techniques for Model Checking Leads-to Properties in a Stratified Way . . . . . . . . . . . . . 151:1--151:?? Weifeng Sun and Meng Yan and Zhongxin Liu and Xin Xia and Yan Lei and David Lo Revisiting the Identification of the Co-evolution of Production and Test Code 152:1--152:?? Ran Mo and Yao Zhang and Yushuo Wang and Siyuan Zhang and Pu Xiong and Zengyang Li and Yang Zhao Exploring the Impact of Code Clones on Deep Learning Software . . . . . . . . . 153:1--153:?? Yuheng Huang and Lei Ma and Yuanchun Li PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing . . . . . . . . . . . 154:1--154:?? Wiebke (Toussaint) Hutiri and Aaron Yi Ding and Fahim Kawsar and Akhil Mathur Tiny, Always-on, and Fragile: Bias Propagation through Design Choices in On-device Machine Learning Workflows . . 155:1--155:?? Xuanzhe Liu and Diandian Gu and Zhenpeng Chen and Jinfeng Wen and Zili Zhang and Yun Ma and Haoyu Wang and Xin Jin Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective . . . . 156:1--156:?? Shangwen Wang and Ming Wen and Bo Lin and Yepang Liu and Tegawendé F. Bissyandé and Xiaoguang Mao Pre-implementation Method Name Prediction for Object-oriented Programming . . . . . . . . . . . . . . 157:1--157:?? Shouguo Yang and Zhengzi Xu and Yang Xiao and Zhe Lang and Wei Tang and Yang Liu and Zhiqiang Shi and Hong Li and Limin Sun Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis . . . . . . 158:1--158:?? Mohammad Masudur Rahman and Chanchal K. Roy A Systematic Review of Automated Query Reformulations in Source Code Search . . 159:1--159:?? Shisong Qin and Fan Hu and Zheyu Ma and Bodong Zhao and Tingting Yin and Chao Zhang NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing . . 160:1--160:?? Fan Hu and Shisong Qin and Zheyu Ma and Bodong Zhao and Tingting Yin and Chao Zhang NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing --- RCR Report . . . . . . . . . . . . . . . 161:1--161:??
Mauro Pezz\`e Editorial: Toward the Future with Eight Issues Per Year . . . . . . . . . . . . 1:1--1:?? Shouguo Yang and Chaopeng Dong and Yang Xiao and Yiran Cheng and Zhiqiang Shi and Zhi Li and Limin Sun Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge . . . . . . . . . . . . . . . 1:1--1:?? Xuanzhe Liu and Chengxu Yang and Ding Li and Yuhan Zhou and Shaofei Li and Jiali Chen and Zhenpeng Chen Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces 2:1--2:?? Suyu Ma and Chunyang Chen and Hourieh Khalajzadeh and John Grundy A First Look at Dark Mode in Real-world Android Apps . . . . . . . . . . . . . . 3:1--3:?? Jiarong Wu and Lili Wei and Yanyan Jiang and Shing-Chi Cheung and Luyao Ren and Chang Xu Programming by Example Made Easy . . . . 4:1--4:?? Narjes Bessghaier and Mohammed Sayagh and Ali Ouni and Mohamed Wiem Mkaouer What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects 5:1--5:?? Qing Huang and Yanbang Sun and Zhenchang Xing and Min Yu and Xiwei Xu and Qinghua Lu API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model . . . . . . . . . . . . . 6:1--6:?? Jeho Oh and Don Batory and Rubén Heradio Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees . . . . . . . . . . . . . . . 7:1--7:?? Chang-Ai Sun and Hepeng Dai and Ning Geng and Huai Liu and Tsong Yueh Chen and Peng Wu and Yan Cai and Jinqiu Wang An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs 8:1--8:?? Toni Taipalus and Hilkka Grahn Framework for SQL Error Message Design: a Data-Driven Approach . . . . . . . . . 9:1--9:?? Andrew G. Clark and Michael Foster and Benedikt Prifling and Neil Walkinshaw and Robert M. Hierons and Volker Schmidt and Robert D. Turner Testing Causality in Scientific Modelling Software . . . . . . . . . . . 10:1--10:?? Jianzhong Liu and Yuheng Shen and Yiru Xu and Hao Sun and Yu Jiang Horus: Accelerating Kernel Fuzzing through Efficient Host--VM Memory Access Procedures . . . . . . . . . . . . . . . 11:1--11:?? Sina Entekhabi and Wojciech Mostowski and Mohammad Reza Mousavi Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving . . . . . . . . . . . 12:1--12:?? Carlo A. Furia and Richard Torkar and Robert Feldt Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions . . . . . . . . . . . . . . 13:1--13:?? Olivier Nourry and Yutaro Kashiwa and Bin Lin and Gabriele Bavota and Michele Lanza and Yasutaka Kamei The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities . . . . . . . . . . . . . . . 14:1--14:?? Pei Liu and Yanjie Zhao and Mattia Fazzini and Haipeng Cai and John Grundy and Li Li Automatically Detecting Incompatible Android APIs . . . . . . . . . . . . . . 15:1--15:?? Hengcheng Zhu and Lili Wei and Valerio Terragni and Yepang Liu and Shing-Chi Cheung and Jiarong Wu and Qin Sheng and Bing Zhang and Lihong Song StubCoder: Automated Generation and Repair of Stub Code for Mock Objects . . 16:1--16:?? Yongqiang Tian and Xueyan Zhang and Yiwen Dong and Zhenyang Xu and Mengxiao Zhang and Yu Jiang and Shing-Chi Cheung and Chengnian Sun On the Caching Schemes to Speed Up Program Reduction . . . . . . . . . . . 17:1--17:?? Claudio Mandrioli and Max Nyberg Carlsson and Martina Maggio Testing Abstractions for Cyber-Physical Control Systems . . . . . . . . . . . . 18:1--18:?? Wang Fang and Mingsheng Ying and Xiaodi Wu Differentiable Quantum Programming with Unbounded Loops . . . . . . . . . . . . 19:1--19:?? Yuanhang Yang and Wei He and Cuiyun Gao and Zenglin Xu and Xin Xia and Chuanyi Liu TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site . . . . . . . . . . . . . . . . 20:1--20:?? Tianlin Li and Xiaofei Xie and Jian Wang and Qing Guo and Aishan Liu and Lei Ma and Yang Liu Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis 21:1--21:?? Xueqi Dang and Yinghua Li and Mike Papadakis and Jacques Klein and Tegawendé F. Bissyandé and Yves Le Traon GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks 22:1--22:?? Yuhan Zhi and Xiaofei Xie and Chao Shen and Jun Sun and Xiaoyu Zhang and Xiaohong Guan Seed Selection for Testing Deep Neural Networks . . . . . . . . . . . . . . . . 23:1--23:?? Hanyang Guo and Xiangping Chen and Yuan Huang and Yanlin Wang and Xi Ding and Zibin Zheng and Xiaocong Zhou and Hong-Ning Dai Snippet Comment Generation Based on Code Context Expansion . . . . . . . . . . . 24:1--24:?? Qiang Hu and Yuejun Guo and Xiaofei Xie and Maxime Cordy and Mike Papadakis and Yves Le Traon LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing 25:1--25:?? Han Hu and Yujin Huang and Qiuyuan Chen and Terry Yue Zhuo and Chunyang Chen A First Look at On-device Models in iOS Apps . . . . . . . . . . . . . . . . . . 26:1--26:?? Amid Golmohammadi and Man Zhang and Andrea Arcuri Testing RESTful APIs: a Survey . . . . . 27:1--27:?? Michael Weiss and Paolo Tonella Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks . . . . . . . . . . . . . . . . 28:1--28:?? Michael Weiss and Paolo Tonella Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks --- RCR Report . . . . . . . . 29:1--29:??
Yu Zhou and Weilin Zhan and Zi Li and Tingting Han and Taolue Chen and Harald Gall DRIVE: Dockerfile Rule Mining and Violation Detection . . . . . . . . . . 30:1--30:?? Qing Huang and Zhiqiang Yuan and Zhenchang Xing and Xin Peng and Xiwei Xu and Qinghua Lu FQN Inference in Partial Code by Prompt-tuned Language Model of Code . . 31:1--31:?? Jaekwon Lee and Seung Yeob Shin and Lionel C. Briand and Shiva Nejati Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages . . . . . . . . . . . . . . . . . 32:1--32:?? Knut H. Rolland and Brian Fitzgerald and Torgeir Dingsòyr and Klaas-Jan Stol Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development 33:1--33:?? Xiaoye Zheng and Zhiyuan Wan and Yun Zhang and Rui Chang and David Lo A Closer Look at the Security Risks in the Rust Ecosystem . . . . . . . . . . . 34:1--34:?? Claudio Mandrioli and Seung Yeob Shin and Martina Maggio and Domenico Bianculli and Lionel Briand Stress Testing Control Loops in Cyber-physical Systems . . . . . . . . . 35:1--35:?? Sayedhassan Khatoonabadi and Diego Elias Costa and Suhaib Mujahid and Emad Shihab Understanding the Helpfulness of Stale Bot for Pull-Based Development: an Empirical Study of 20 Large Open-Source Projects . . . . . . . . . . . . . . . . 36:1--36:?? Yixuan Zhang and Shangtong Cao and Haoyu Wang and Zhenpeng Chen and Xiapu Luo and Dongliang Mu and Yun Ma and Gang Huang and Xuanzhe Liu Characterizing and Detecting WebAssembly Runtime Bugs . . . . . . . . . . . . . . 37:1--37:?? Zishuo Ding and Yiming Tang and Xiaoyu Cheng and Heng Li and Weiyi Shang LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates . . 38:1--38:?? Weishi Shi and Heather Moses and Qi Yu and Samuel Malachowsky and Daniel E. Krutz ALL: Supporting Experiential Accessibility Education and Inclusive Software Development . . . . . . . . . . 39:1--39:?? Federico Formica and Tony Fan and Claudio Menghi Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions . . . . . . . 40:1--40:?? Jiajun Jiang and Yumeng Wang and Junjie Chen and Delin Lv and Mengjiao Liu Variable-based Fault Localization via Enhanced Decision Tree . . . . . . . . . 41:1--41:?? Wei Huang and Xingyu Zhao and Alec Banks and Victoria Cox and Xiaowei Huang Hierarchical Distribution-aware Testing of Deep Learning . . . . . . . . . . . . 42:1--42:?? Sicong Cao and Xiaobing Sun and Lili Bo and Rongxin Wu and Bin Li and Xiaoxue Wu and Chuanqi Tao and Tao Zhang and Wei Liu Learning to Detect Memory-related Vulnerabilities . . . . . . . . . . . . 43:1--43:?? Elkhan Ismayilzada and Md Mazba Ur Rahman and Dongsun Kim and Jooyong Yi Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair 44:1--44:?? Yuanhang Zhou and Fuchen Ma and Yuanliang Chen and Meng Ren and Yu Jiang CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing . . . . . . . 45:1--45:?? Yi Xiang and Han Huang and Sizhe Li and Miqing Li and Chuan Luo and Xiaowei Yang Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization . . . . . 46:1--46:?? Han Hu and Ruiqi Dong and John Grundy and Thai Minh Nguyen and Huaxiao Liu and Chunyang Chen Automated Mapping of Adaptive App GUIs from Phones to TVs . . . . . . . . . . . 47:1--47:?? Yuejun Guo and Qiang Hu and Xiaofei Xie and Maxime Cordy and Mike Papadakis and Yves Le Traon KAPE: $k$ NN-based Performance Testing for Deep Code Search . . . . . . . . . . 48:1--48:?? Jiamou Sun and Zhenchang Xing and Xin Xia and Qinghua Lu and Xiwei Xu and Liming Zhu Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods . . . . . . . . . . . . . . . . 49:1--49:?? Jiawei Liu and Yuheng Huang and Zhijie Wang and Lei Ma and Chunrong Fang and Mingzheng Gu and Xufan Zhang and Zhenyu Chen Generation-based Differential Fuzzing for Deep Learning Libraries . . . . . . 50:1--50:?? Jiho Shin and Moshi Wei and Junjie Wang and Lin Shi and Song Wang The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks . . . . . . . . . . . . . 51:1--51:?? Siyuan Li and Yongpan Wang and Chaopeng Dong and Shouguo Yang and Hong Li and Hao Sun and Zhe Lang and Zuxin Chen and Weijie Wang and Hongsong Zhu and Limin Sun LibAM: an Area Matching Framework for Detecting Third-Party Libraries in Binaries . . . . . . . . . . . . . . . . 52:1--52:?? Rafael Dutra and Rahul Gopinath and Andreas Zeller FormatFuzzer: Effective Fuzzing of Binary File Formats . . . . . . . . . . 53:1--53:?? Yutao Xie and Jiayi Lin and Hande Dong and Lei Zhang and Zhonghai Wu Survey of Code Search Based on Deep Learning . . . . . . . . . . . . . . . . 54:1--54:?? Quanjun Zhang and Chunrong Fang and Yuxiang Ma and Weisong Sun and Zhenyu Chen A Survey of Learning-based Automated Program Repair . . . . . . . . . . . . . 55:1--55:??
Ya Xiao and Wenjia Song and Salman Ahmed and Xinyang Ge and Bimal Viswanath and Na Meng and Danfeng (Daphne) Yao Measurement of Embedding Choices on Cryptographic API Completion Tasks . . . 56:1--56:?? Daniel Russo and Paul H. P. Hanel and Niels Van Berkel Understanding Developers Well-Being and Productivity: a 2-year Longitudinal Analysis during the COVID-19 Pandemic 57:1--57:?? Andre Lustosa and Tim Menzies Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health . . . 58:1--58:?? Yanming Yang and Xing Hu and Xin Xia and Xiaohu Yang The Lost World: Characterizing and Detecting Undiscovered Test Smells . . . 59:1--59:?? Guang Yang and Yu Zhou and Wenhua Yang and Tao Yue and Xiang Chen and Taolue Chen How Important Are Good Method Names in Neural Code Generation? A Model Robustness Perspective . . . . . . . . . 60:1--60:?? Jiajun Jiang and Junjie Yang and Yingyi Zhang and Zan Wang and Hanmo You and Junjie Chen A Post-training Framework for Improving the Performance of Deep Learning Models via Model Transformation . . . . . . . . 61:1--61:?? Jia Li and Zhuo Li and Huangzhao Zhang and Ge Li and Zhi Jin and Xing Hu and Xin Xia Poison Attack and Poison Detection on Deep Source Code Processing Models . . . 62:1--62:?? Wen Li and Austin Marino and Haoran Yang and Na Meng and Li Li and Haipeng Cai How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software . . . . . . . . . 63:1--63:?? Sangeeth Kochanthara and Tajinder Singh and Alexandru Forrai and Loek Cleophas Safety of Perception Systems for Automated Driving: a Case Study on Apollo . . . . . . . . . . . . . . . . . 64:1--64:?? Armin Zirak and Hadi Hemmati Improving Automated Program Repair with Domain Adaptation . . . . . . . . . . . 65:1--65:?? Wensheng Tang and Dejun Dong and Shijie Li and Chengpeng Wang and Peisen Yao and Jinguo Zhou and Charles Zhang Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions . . . . . . . . . . . . . . . 66:1--66:?? Tingwei Zhu and Zhong Li and Minxue Pan and Chaoxuan Shi and Tian Zhang and Yu Pei and Xuandong Li Deep Is Better? An Empirical Comparison of Information Retrieval and Deep Learning Approaches to Code Summarization . . . . . . . . . . . . . 67:1--67:?? Zhe Zhao and Guangke Chen and Tong Liu and Taishan Li and Fu Song and Jingyi Wang and Jun Sun Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples . . . . . . . . . . . . . . . . 68:1--68:?? Junda He and Xin Zhou and Bowen Xu and Ting Zhang and Kisub Kim and Zhou Yang and Ferdian Thung and Ivana Clairine Irsan and David Lo Representation Learning for Stack Overflow Posts: How Far Are We? . . . . 69:1--69:?? Binhang Qi and Hailong Sun and Hongyu Zhang and Xiang Gao Reusing Convolutional Neural Network Models through Modularization and Composition . . . . . . . . . . . . . . 70:1--70:?? Md Rakib Hossain Misu and Rohan Achar and Cristina V. Lopes SourcererJBF: a Java Build Framework For Large-Scale Compilation . . . . . . . . 71:1--71:?? Zhihao Li and Chuanyi Li and Ze Tang and Wanhong Huang and Jidong Ge and Bin Luo and Vincent Ng and Ting Wang and Yucheng Hu and Xiaopeng Zhang PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation . . . . . . . . . . . . . 72:1--72:?? Matteo Biagiola and Paolo Tonella Testing of Deep Reinforcement Learning Agents with Surrogate Models . . . . . . 73:1--73:?? Luca Giamattei and Antonio Guerriero and Roberto Pietrantuono and Stefano Russo Causality-driven Testing of Autonomous Driving Systems . . . . . . . . . . . . 74:1--74:?? Weisong Sun and Chunrong Fang and Yuchen Chen and Quanjun Zhang and Guanhong Tao and Yudu You and Tingxu Han and Yifei Ge and Yuling Hu and Bin Luo and Zhenyu Chen An Extractive-and-Abstractive Framework for Source Code Summarization . . . . . 75:1--75:?? Will Leeson and Matthew B. Dwyer Algorithm Selection for Software Verification Using Graph Neural Networks 76:1--76:?? Hichem Belgacem and Xiaochen Li and Domenico Bianculli and Lionel Briand Learning-based Relaxation of Completeness Requirements for Data Entry Forms . . . . . . . . . . . . . . . . . 77:1--77:?? Michael Fu and Van Nguyen and Chakkrit Tantithamthavorn and Dinh Phung and Trung Le Vision Transformer Inspired Automated Vulnerability Repair . . . . . . . . . . 78:1--78:?? Pengfei Gao and Fu Song and Taolue Chen Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks . . . 79:1--79:?? Aastha Pant and Rashina Hoda and Simone V. Spiegler and Chakkrit Tantithamthavorn and Burak Turhan Ethics in the Age of AI: an Analysis of AI Practitioners' Awareness and Challenges . . . . . . . . . . . . . . . 80:1--80:?? Johan Cederbladh and Antonio Cicchetti and Jagadish Suryadevara Early Validation and Verification of System Behaviour in Model-based Systems Engineering: a Systematic Literature Review . . . . . . . . . . . . . . . . . 81:1--81:?? Daniel Russo and Paul H. P. Hanel and Niels van Berkel Understanding Developers Well-being and Productivity: a 2-year Longitudinal Analysis during the COVID-19 Pandemic-RCR Report . . . . . . . . . . 82:1--82:??
Mauro Pezz\`e Editorial: ICSE and the Incredible Contradictions of Software Engineering 83:1--83:?? Weifeng Pan and Marouane Kessentini and Hua Ming and Zijiang Yang EASE: an Effort-aware Extension of Unsupervised Key Class Identification Approaches . . . . . . . . . . . . . . . 84:1--84:?? Chidera Biringa and Gökhan Kul PACE: a Program Analysis Framework for Continuous Performance Prediction . . . 85:1--85:?? Peng Zhang and Yang Wang and Xutong Liu and Zeyu Lu and Yibiao Yang and Yanhui Li and Lin Chen and Ziyuan Wang and Chang-Ai Sun and Xiao Yu and Yuming Zhou Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? 86:1--86:?? Alessio Ferrari and Thaide Huichapa and Paola Spoletini and Nicole Novielli and Davide Fucci and Daniela Girardi Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews . . . . . . . . . . . . . . . 87:1--87:?? Sai Anirudh Karre and Y. Raghu Reddy and Raghav Mittal RE Methods for Virtual Reality Software Product Development: a Mapping Study . . 88:1--88:?? Zhe Chen and Rui Yan and Yingzi Ma and Yulei Sui and Jingling Xue A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety . . . . . . . . . . . . . 89:1--89:?? Pablo C. Cañizares and Jose María López-Morales and Sara Pérez-Soler and Esther Guerra and Juan de Lara Measuring and Clustering Heterogeneous Chatbot Designs . . . . . . . . . . . . 90:1--90:?? Bentley James Oakes and Michalis Famelis and Houari Sahraoui Building Domain-Specific Machine Learning Workflows: a Conceptual Framework for the State of the Practice 91:1--91:?? Changjie Shao and Gaolei Li and Jun Wu and Xi Zheng Exploring Semantic Redundancy using Backdoor Triggers: a Complementary Insight into the Challenges Facing DNN-based Software Vulnerability Detection . . . . . . . . . . . . . . . 92:1--92:?? Baharin A. Jodat and Abhishek Chandar and Shiva Nejati and Mehrdad Sabetzadeh Test Generation Strategies for Building Failure Models and Explaining Spurious Failures . . . . . . . . . . . . . . . . 93:1--93:?? Neelofar Neelofar and Aldeida Aleti Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features . . . . . . . 94:1--94:?? Donato Clun and Donghwan Shin and Antonio Filieri and Domenico Bianculli Rigorous Assessment of Model Inference Accuracy using Language Cardinality . . 95:1--95:?? Anshunkang Zhou and Yikun Hu and Xiangzhe Xu and Charles Zhang ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation . . . . . 96:1--96:?? Kai Gao and Runzhi He and Bing Xie and Minghui Zhou Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement . . . . . . 97:1--97:?? Shaiful Chowdhury and Gias Uddin and Hadi Hemmati and Reid Holmes Method-level Bug Prediction: Problems and Promises . . . . . . . . . . . . . . 98:1--98:?? Qunying Song and Emelie Engström and Per Runeson Industry Practices for Challenging Autonomous Driving Systems with Critical Scenarios . . . . . . . . . . . . . . . 99:1--99:?? Mingxuan Zhu and Dan Hao and Junjie Chen Compiler Autotuning through Multiple-phase Learning . . . . . . . . 100:1--100:?? Taijara Loiola De Santana and Paulo Anselmo Da Mota Silveira Neto and Eduardo Santana De Almeida and Iftekhar Ahmed Bug Analysis in Jupyter Notebook Projects: an Empirical Study . . . . . . 101:1--101:?? Zhenfei Huang and Junjie Chen and Jiajun Jiang and Yihua Liang and Hanmo You and Fengjie Li Mapping APIs in Dynamic-typed Programs by Leveraging Transfer Learning . . . . 102:1--102:?? Sungmin Kang and Robert Feldt and Shin Yoo Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders . . 103:1--103:?? Han Wang and Sijia Yu and Chunyang Chen and Burak Turhan and Xiaodong Zhu Beyond Accuracy: an Empirical Study on Unit Testing in Open-source Deep Learning Projects . . . . . . . . . . . 104:1--104:?? Shikai Guo and Dongmin Li and Lin Huang and Sijia Lv and Rong Chen and Hui Li and Xiaochen Li and He Jiang Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction . . . . . . . . . . . 105:1--105:?? Hanyang Guo and Yingye Chen and Xiangping Chen and Yuan Huang and Zibin Zheng Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization 106:1--106:?? Davide Pizzolotto and Stefano Berlato and Mariano Ceccato Mitigating Debugger-based Attacks to Java Applications with Self-debugging 107:1--107:?? Puzhuo Liu and Yaowen Zheng and Chengnian Sun and Hong Li and Zhi Li and Limin Sun Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers . . . . . . . . . . 108:1--108:?? Hashini Gunatilake and John Grundy and Rashina Hoda and Ingo Mueller Enablers and Barriers of Empathy in Software Developer and User Interactions: a Mixed Methods Case Study 109:1--109:?? Xin Tan and Xinyue Lv and Jing Jiang and Li Zhang Understanding Real-Time Collaborative Programming: a Study of Visual Studio Live Share . . . . . . . . . . . . . . . 110:1--110:?? Qiang Hu and Yuejun Guo and Xiaofei Xie and Maxime Cordy and Lei Ma and Mike Papadakis and Yves Le Traon Test Optimization in DNN Testing: a Survey . . . . . . . . . . . . . . . . . 111:1--111:??
Martin P. Robillard and Deeksha M. Arya and Neil A. Ernst and Jin L. C. Guo and Maxime Lamothe and Mathieu Nassif and Nicole Novielli and Alexander Serebrenik and Igor Steinmacher and Klaas-Jan Stol Communicating Study Design Trade-offs in Software Engineering . . . . . . . . . . 112:1--112:?? Raphaël Ollando and Seung Yeob Shin and Lionel C. Briand Learning Failure-Inducing Models for Testing Software-Defined Networks . . . 113:1--113:?? Cuifeng Gao and Wenzhang Yang and Jiaming Ye and Yinxing Xue and Jun Sun sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts . . . . . . . 114:1--114:?? Lin Yang and Junjie Chen and Shutao Gao and Zhihao Gong and Hongyu Zhang and Yue Kang and Huaan Li Try with Simpler --- an Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection . . . . . . 115:1--115:?? Yue Liu and Thanh Le-Cong and Ratnadira Widyasari and Chakkrit Tantithamthavorn and Li Li and Xuan-Bach D. Le and David Lo Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues . . . . . . . . . . . . . 116:1--116:?? Emre Sülün and Metehan Saçakçi and Eray Tüzün An Empirical Analysis of Issue Templates Usage in Large-Scale Projects on GitHub 117:1--117:?? Xinmeng Xia and Yang Feng and Qingkai Shi and James A. Jones and Xiangyu Zhang and Baowen Xu Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing . . . . 118:1--118:?? Jiawei Ren and Yulei Sui and Xiao Cheng and Yuan Feng and Jianjun Zhao Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search . . . . . . . . . . . . . . . . . 119:1--119:?? Fang Liu and Zhiyi Fu and Ge Li and Zhi Jin and Hui Liu and Yiyang Hao and Li Zhang Non-Autoregressive Line-Level Code Completion . . . . . . . . . . . . . . . 120:1--120:?? Marc Miltenberger and Steven Arzt Precisely Extracting Complex Variable Values from Android Apps . . . . . . . . 121:1--121:?? Yu Zhao and Brent Harrison and Tingting Yu DinoDroid: Testing Android Apps Using Deep Q-Networks . . . . . . . . . . . . 122:1--122:?? Yimeng Guo and Zhifei Chen and Lin Chen and Wenjie Xu and Yanhui Li and Yuming Zhou and Baowen Xu Generating Python Type Annotations from Type Inference: How Far Are We? . . . . 123:1--123:?? Yu Cheng and Jieshan Chen and Qing Huang and Zhenchang Xing and Xiwei Xu and Qinghua Lu Prompt Sapper: a LLM-Empowered Production Tool for Building AI Chains 124:1--124:?? Quanjun Zhang and Juan Zhai and Chunrong Fang and Jiawei Liu and Weisong Sun and Haichuan Hu and Qingyu Wang Machine Translation Testing via Syntactic Tree Pruning . . . . . . . . . 125:1--125:?? Yue Liu and Chakkrit Tantithamthavorn and Yonghui Liu and Li Li On the Reliability and Explainability of Language Models for Program Generation 126:1--126:?? Baijun Cheng and Shengming Zhao and Kailong Wang and Meizhen Wang and Guangdong Bai and Ruitao Feng and Yao Guo and Lei Ma and Haoyu Wang Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors . . . . . . . . 127:1--127:?? Guodong Fan and Shizhan Chen and Cuiyun Gao and Jianmao Xiao and Tao Zhang and Zhiyong Feng RAPID: Zero-Shot Domain Adaptation for Code Search with Pre-Trained Models . . 128:1--128:?? Jiaxiang Liu and Yunhan Xing and Xiaomu Shi and Fu Song and Zhiwu Xu and Zhong Ming Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks . . . . . . . . . . . . 129:1--129:?? Mohammed Oualid Attaoui and Hazem Fahmy and Fabrizio Pastore and Lionel Briand Supporting Safety Analysis of Image-processing DNNs through Clustering-based Approaches . . . . . . 130:1--130:?? Xiuwei Shang and Shuai Zhang and Yitong Zhang and Shikai Guo and Yulong Li and Rong Chen and Hui Li and Xiaochen Li and He Jiang Analyzing and Detecting Information Types of Developer Live Chat Threads . . 131:1--131:?? Yinghua Li and Xueqi Dang and Lei Ma and Jacques Klein and Yves Le Traon and Tegawendé F. Bissyandé Test Input Prioritization for $3$D Point Clouds . . . . . . . . . . . . . . . . . 132:1--132:?? Wei Tao and Yucheng Zhou and Yanlin Wang and Hongyu Zhang and Haofen Wang and Wenqiang Zhang KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation 133:1--133:?? Daan Hommersom and Antonino Sabetta and Bonaventura Coppola and Dario Di Nucci and Damian A. Tamburri Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories . . . . . . . . 134:1--134:?? Daniel Russo Navigating the Complexity of Generative AI Adoption in Software Engineering . . 135:1--135:?? Stefanie Betz and Birgit Penzenstadler and Leticia Duboc and Ruzanna Chitchyan and Sedef Akinli Kocak and Ian Brooks and Shola Oyedeji and Jari Porras and Norbert Seyff and Colin C. Venters Lessons Learned from Developing a Sustainability Awareness Framework for Software Engineering Using Design Science . . . . . . . . . . . . . . . . 136:1--136:?? Zhenpeng Chen and Jie M. Zhang and Max Hort and Mark Harman and Federica Sarro Fairness Testing: a Comprehensive Survey and Analysis of Trends . . . . . . . . . 137:1--137:?? Wei-Cheng Wu and Bernard Nongpoh and Marwan Nour and Michaël Marcozzi and Sébastien Bardin and Christophe Hauser Fine-grained Coverage-based Fuzzing . . 138:1--138:?? Wei-Cheng Wu and Bernard Nongpoh and Marwan Nour and Michaël Marcozzi and Sébastien Bardin and Christophe Hauser Fine-grained Coverage-based Fuzzing --- RCR Report . . . . . . . . . . . . . . . 139:1--139:??
Zhifei Chen and Lin Chen and Yibiao Yang and Qiong Feng and Xuansong Li and Wei Song Risky Dynamic Typing-related Practices in Python: an Empirical Study . . . . . 140:1--140:?? Xiaohui Wan and Zheng Zheng and Fangyun Qin and Xuhui Lu Data Complexity: a New Perspective for Analyzing the Difficulty of Defect Prediction Tasks . . . . . . . . . . . . 141:1--141:?? Andrea Arcuri and Man Zhang and Juan Galeotti Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs . . . 142:1--142:?? Emanuela Guglielmi and Giovanni Rosa and Simone Scalabrino and Gabriele Bavota and Rocco Oliveto Help Them Understand: Testing and Improving Voice User Interfaces . . . . 143:1--143:?? Anjana Perera and Burak Turhan and Aldeida Aleti and Marcel Böhme On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing 144:1--144:?? Guofu Zhang and Lei Li and Zhaopin Su and Feng Yue and Yang Chen and Miqing Li and Xin Yao On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation . . . . . . . . . . 145:1--145:?? Emanuele Iannone and Giulia Sellitto and Emanuele Iaccarino and Filomena Ferrucci and Andrea De Lucia and Fabio Palomba Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be? 146:1--146:?? Peixun Long and Jianjun Zhao Testing Multi-Subroutine Quantum Programs: From Unit Testing to Integration Testing . . . . . . . . . . 147:1--147:?? Xu Wang and Hongwei Yu and Xiangxin Meng and Hongliang Cao and Hongyu Zhang and Hailong Sun and Xudong Liu and Chunming Hu MTL-TRANSFER: Leveraging Multi-task Learning and Transferred Knowledge for Improving Fault Localization and Program Repair . . . . . . . . . . . . . . . . . 148:1--148:?? Tingting Bi and Boming Xia and Zhenchang Xing and Qinghua Lu and Liming Zhu On the Way to SBOMs: Investigating Design Issues and Solutions in Practice 149:1--149:?? Congying Xu and Valerio Terragni and Hengcheng Zhu and Jiarong Wu and Shing-Chi Cheung MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases . . . . . . . . . . . . . . . . . 150:1--150:?? Sallam Abualhaija and F. Basak Aydemir and Fabiano Dalpiaz and Davide Dell'Anna and Alessio Ferrari and Xavier Franch and Davide Fucci Replication in Requirements Engineering: The NLP for RE Case . . . . . . . . . . 151:1--151:?? Tahereh Zohdinasab and Vincenzo Riccio and Paolo Tonella Focused Test Generation for Autonomous Driving Systems . . . . . . . . . . . . 152:1--152:?? Kashumi Madampe and Rashina Hoda and John Grundy Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes 153:1--153:?? Yuechen Li and Hanyu Pei and Linzhi Huang and Beibei Yin and Kai-Yuan Cai Automatic Repair of Quantum Programs via Unitary Operation . . . . . . . . . . . 154:1--154:?? Chanh Duc Ngo and Fabrizio Pastore and Lionel Briand Testing Updated Apps by Adapting Learned Models . . . . . . . . . . . . . . . . . 155:1--155:?? Zeyu Sun and Zhenpeng Chen and Jie Zhang and Dan Hao Fairness Testing of Machine Translation Systems . . . . . . . . . . . . . . . . 156:1--156:?? Siyu Jiang and Zhenhang He and Yuwen Chen and Mingrong Zhang and Le Ma Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework . . . . . . . . . . . . . . . 157:1--157:?? Zohreh Aghababaeyan and Manel Abdellatif and Mahboubeh Dadkhah and Lionel Briand DeepGD: a Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks . . . . . . . . . . . . . . . . 158:1--158:?? Zhen Li and Shasha Zhao and Chen Chen and Qian Chen Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation . . . . . . . . . . . 159:1--159:?? Xi Ding and Rui Peng and Xiangping Chen and Yuan Huang and Jing Bian and Zibin Zheng Do Code Summarization Models Process Too Much Information? Function Signature May Be All That Is Needed . . . . . . . . . 160:1--160:?? Daniel Ramos and Inês Lynce and Vasco Manquinho and Ruben Martins and Claire Le Goues BatFix: Repairing language model-based transpilation . . . . . . . . . . . . . 161:1--161:?? Van Nguyen and Trung Le and Chakkrit Tantithamthavorn and John Grundy and Dinh Phung Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection . . . . 162:1--162:?? Han Hu and Han Wang and Ruiqi Dong and Xiao Chen and Chunyang Chen Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey . . . . . . . . . . . . . . . . . 163:1--163:?? Carlos Gavidia-Calderon and Anastasia Kordoni and Amel Bennaceur and Mark Levine and Bashar Nuseibeh The IDEA of Us: an Identity-Aware Architecture for Autonomous Systems . . 164:1--164:?? Haoye Wang and Zhipeng Gao and Tingting Bi and John Grundy and Xinyu Wang and Minghui Wu and Xiaohu Yang What Makes a Good TODO Comment? . . . . 165:1--165:?? Weisong Sun and Chunrong Fang and Yifei Ge and Yuling Hu and Yuchen Chen and Quanjun Zhang and Xiuting Ge and Yang Liu and Zhenyu Chen A Survey of Source Code Search: a $3$-Dimensional Perspective . . . . . . 166:1--166:??
Chengcheng Wan and Shicheng Liu and Sophie Xie and Yuhan Liu and Henry Hoffmann and Michael Maire and Shan Lu Keeper: Automated Testing and Fixing of Machine Learning Software . . . . . . . 167:1--167:?? Suwichak Fungprasertkul and Rami Bahsoon and Rick Kazman Technical Debt Monitoring Decision Making with Skin in the Game . . . . . . 168:1--168:?? Wei Ma and Shangqing Liu and Mengjie Zhao and Xiaofei Xie and Wenhang Wang and Qiang Hu and Jie Zhang and Yang Liu Unveiling Code Pre-Trained Models: Investigating Syntax and Semantics Capacities . . . . . . . . . . . . . . . 169:1--169:?? Muhui Jiang and Jinan Jiang and Tao Wu and Zuchao Ma and Xiapu Luo and Yajin Zhou Understanding Vulnerability Inducing Commits of the Linux Kernel . . . . . . 170:1--170:?? Nicolas Dejon and Chrystel Gaber and Gilles Grimaud and Narjes Jomaa Code to Qed, the Project Manager's Guide to Proof Engineering . . . . . . . . . . 171:1--171:?? Rezvan Mahdavi-Hezaveh and Sameeha Fatima and Laurie Williams Paving a Path for a Combined Family of Feature Toggle and Configuration Option Research . . . . . . . . . . . . . . . . 172:1--172:?? Rong Gu and Eduard Baranov and Afshin Ameri and Cristina Seceleanu and Eduard Paul Enoiu and Baran Cürüklü and Axel Legay and Kristina Lundqvist Synthesis and Verification of Mission Plans for Multiple Autonomous Agents under Complex Road Conditions . . . . . 173:1--173:?? Yao Li and Dawei Yuan and Tao Zhang and Haipeng Cai and David Lo and Cuiyun Gao and Xiapu Luo and He Jiang Meta-Learning for Multi-Family Android Malware Classification . . . . . . . . . 174:1--174:?? Shengcheng Yu and Chunrong Fang and Xin Li and Yuchen Ling and Zhenyu Chen and Zhendong Su Effective, Platform-Independent GUI Testing via Image Embedding and Reinforcement Learning . . . . . . . . . 175:1--175:?? Jaeseong Lee and Simin Chen and Austin Mordahl and Cong Liu and Wei Yang and Shiyi Wei Automated Testing Linguistic Capabilities of NLP Models . . . . . . . 176:1--176:?? Judith Perera and Ewan Tempero and Yu-Cheng Tu and Kelly Blincoe A Systematic Mapping Study Exploring Quantification Approaches to Code, Design, and Architecture Technical Debt 177:1--177:?? Sávio Freire and Alexia Pacheco and Nicolli Rios and Boris Pérez and Camilo Castellanos and Darío Correal and Robert Ramac and Vladimir Mandi\'c and Nebojsa Tausan and Gustavo López and Manoel Mendonça and Davide Falessi and Clemente Izurieta and Carolyn Seaman and Rodrigo Spínola A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It . . . . . . . . . . . . . . . . . . . 178:1--178:?? Elijah Zolduoarrati and Sherlock A. Licorish and Nigel Stanger Harmonising Contributions: Exploring Diversity in Software Engineering through CQA Mining on Stack Overflow . . 179:1--179:?? Yiling Lou and Jun Yang and Samuel Benton and Dan Hao and Lin Tan and Zhenpeng Chen and Lu Zhang and Lingming Zhang When Automated Program Repair Meets Regression Testing --- An Extensive Study on Two Million Patches . . . . . . 180:1--180:?? Wei Liu and Shouvick Mondal and Tse-Hsun (Peter) Chen An Empirical Study on the Characteristics of Database Access Bugs in Java Applications . . . . . . . . . . 181:1--181:?? Xue Jiang and Yihong Dong and Lecheng Wang and Zheng Fang and Qiwei Shang and Ge Li and Zhi Jin and Wenpin Jiao Self-Planning Code Generation with Large Language Models . . . . . . . . . . . . 182:1--182:?? Qing Huang and Zhiwen Luo and Zhenchang Xing and Jinshan Zeng and Jieshan Chen and Xiwei Xu and Yong Chen Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code . . . . . . . . . . . . . . . 183:1--183:?? Yingzhe Lyu and Heng Li and Zhen Ming (Jack) Jiang and Ahmed E. Hassan On the Model Update Strategies for Supervised Learning in AIOps Solutions 184:1--184:?? Hang Xu and Liheng Chen and Shuitao Gan and Chao Zhang and Zheming Li and Jiangan Ji and Baojian Chen and Fan Hu Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing . . 185:1--185:?? Xiaoning Feng and Xiaohong Han and Simin Chen and Wei Yang LLMEffiChecker: Understanding and Testing Efficiency Degradation of Large Language Models . . . . . . . . . . . . 186:1--186:?? Jinqiang Yu and Michael Fu and Alexey Ignatiev and Chakkrit Tantithamthavorn and Peter Stuckey A Formal Explainer for Just-In-Time Defect Predictions . . . . . . . . . . . 187:1--187:?? Dong Huang and Qingwen Bu and Yichao Fu and Yuhao Qing and Xiaofei Xie and Junjie Chen and Heming Cui Neuron Sensitivity-Guided Test Case Selection . . . . . . . . . . . . . . . 188:1--188:?? Yihong Dong and Xue Jiang and Zhi Jin and Ge Li Self-Collaboration Code Generation via ChatGPT . . . . . . . . . . . . . . . . 189:1--189:?? Zhiyu Wang and Sihan Xu and Lingling Fan and Xiangrui Cai and Linyu Li and Zheli Liu Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study . . . . . . . . . . . . 190:1--190:?? Mingxi Ye and Yuhong Nan and Hong-Ning Dai and Shuo Yang and Xiapu Luo and Zibin Zheng FunFuzz: a Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency 191:1--191:?? Anni Peng and Dongliang Fang and Le Guan and Erik van der Kouwe and Yin Li and Wenwen Wang and Limin Sun and Yuqing Zhang Bitmap-Based Security Monitoring for Deeply Embedded Systems . . . . . . . . 192:1--192:?? Zachary Karas and Aakash Bansal and Yifan Zhang and Toby Li and Collin McMillan and Yu Huang A Tale of Two Comprehensions? Analyzing Student Programmer Attention during Code Summarization . . . . . . . . . . . . . 193:1--193:?? Carlos Parra-Calderón and Julián Alberto García-García and Juan Manuel Ramos-Cueli and Celia Alvarez-Romero and Esther Román-Villarán and Alicia Martínez-García and María José Escalona IDE 4 ICDS: a Human-Centric and Model-Driven Proposal to Improve the Digitization of Clinical Practice Guideline . . . . . . . . . . . . . . . 194:1--194:??
Margaret-Anne Storey and Daniel Russo and Nicole Novielli and Takashi Kobayashi and Dong Wang A Disruptive Research Playbook for Studying Disruptive Innovations . . . . 195:1--195:?? Giovani Guizzo and David Williams and Mark Harman and Justyna Petke and Federica Sarro Speeding Up Genetic Improvement via Regression Test Selection . . . . . . . 196:1--196:?? Anwar Ghammam and Rania Khalsi and Marouane Kessentini and Foyzul Hassan Efficient Management of Containers for Software Defined Vehicles . . . . . . . 197:1--197:?? Xiao-Yi Zhang and Yang Liu and Paolo Arcaini and Mingyue Jiang and Zheng Zheng MET-MAPF: a Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms 198:1--198:?? Lorenz Graf-Vlachy and Stefan Wagner Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models . . . . . . . . . . 199:1--199:?? Zhouruixing Zhu and Cheryl Lee and Xiaoying Tang and Pinjia He HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources . . . . . . . 200:1--200:?? Shangqing Liu and Yanzhou Li and Xiaofei Xie and Wei Ma and Guozhu Meng and Yang Liu Automated Commit Intelligence by Pre-training . . . . . . . . . . . . . . 201:1--201:?? Tiehua Zhang and Rui Xu and Jianping Zhang and Yuze Liu and Xin Chen and Jun Yin and Xi Zheng DSHGT: Dual-Supervisors Heterogeneous Graph Transformer-A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities . . . 202:1--202:?? Xiaoyuan Xie and Shuo Jin and Songqiang Chen and Shing-Chi Cheung Word Closure-Based Metamorphic Testing for Machine Translation . . . . . . . . 203:1--203:?? Jia Li and Yunfei Zhao and Yongmin Li and Ge Li and Zhi Jin AceCoder: an Effective Prompting Technique Specialized in Code Generation 204:1--204:?? Yanjie Jiang and Hui Liu and Shing Chi Cheung and Lu Zhang Shortening Overlong Method Names with Abbreviations . . . . . . . . . . . . . 205:1--205:?? Haifeng Ruan and Yannic Noller and Saeid Tizpaz-Niari and Sudipta Chattopadhyay and Abhik Roychoudhury Timing Side-Channel Mitigation via Automated Program Repair . . . . . . . . 206:1--206:?? Fanyi Meng and Ying Wang and Chun Yong Chong and Hai Yu and Zhiliang Zhu Evolution-Aware Constraint Derivation Approach for Software Remodularization 207:1--207:?? Chico Sundermann and Heiko Raab and Tobias Heß and Thomas Thüm and Ina Schaefer Reusing d-DNNFs for Efficient Feature-Model Counting . . . . . . . . . 208:1--208:?? Yasaman Abedini and Abbas Heydarnoori Can GitHub Issues Help in App Review Classifications? . . . . . . . . . . . . 209:1--209:?? Yi Song and Xihao Zhang and Xiaoyuan Xie and Songqiang Chen and Quanming Liu and Ruizhi Gao SURE: a Visualized Failure Indexing Approach Using Program Memory Spectrum 210:1--210:?? Saurabhsingh Rajput and Tim Widmayer and Ziyuan Shang and Maria Kechagia and Federica Sarro and Tushar Sharma Enhancing Energy-Awareness in Deep Learning through Fine-Grained Energy Measurement . . . . . . . . . . . . . . 211:1--211:?? Qing Huang and Yanbang Sun and Zhenchang Xing and Yuanlong Cao and Jieshan Chen and Xiwei Xu and Huan Jin and Jiaxing Lu Let's Discover More API Relations: a Large Language Model-Based AI Chain for Unsupervised API Relation Inference . . 212:1--212:?? Moataz Chouchen and Ali Ouni and Mohamed Wiem Mkaouer MULTICR: Predicting Merged and Abandoned Code Changes in Modern Code Review Using Multi-Objective Search . . . . . . . . . 213:1--213:?? Florian Tambon and Foutse Khomh and Giuliano Antoniol GIST: Generated Inputs Sets Transferability in Deep Learning . . . . 214:1--214:?? Shiwen Yu and Zengyu Liu and Ting Wang and Ji Wang Neural Solving Uninterpreted Predicates with Abstract Gradient Descent . . . . . 215:1--215:?? Dmytro Humeniuk and Foutse Khomh and Giuliano Antoniol Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing . . . . . . . . . . . . 216:1--216:?? Yue Liu and Chakkrit Tantithamthavorn and Yonghui Liu and Patanamon Thongtanunam and Li Li Automatically Recommend Code Updates: Are We There Yet? . . . . . . . . . . . 217:1--217:?? Bianca Trinkenreich and Fabio Santos and Klaas-Jan Stol Predicting Attrition among Software Professionals: Antecedents and Consequences of Burnout and Engagement 218:1--218:?? Ming Xu and Jianling Fu and Hui Jiang and Yuxin Deng and Zhi-Bin Li Termination and Universal Termination Problems for Nondeterministic Quantum Programs . . . . . . . . . . . . . . . . 219:1--219:?? Xinyi Hou and Yanjie Zhao and Yue Liu and Zhou Yang and Kailong Wang and Li Li and Xiapu Luo and David Lo and John Grundy and Haoyu Wang Large Language Models for Software Engineering: a Systematic Literature Review . . . . . . . . . . . . . . . . . 220:1--220:?? Daniel Russo Navigating the Complexity of Generative AI Adoption in Software Engineering --- RCR Report . . . . . . . . . . . . . . . 221:1--221:?? Mauro Pezz\`e Editorial: The End of the Journey . . . 222:1--222:??