


default search action
ICSE 2019: Montreal, QC, Canada
- Joanne M. Atlee, Tevfik Bultan, Jon Whittle:

Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019. IEEE / ACM 2019, ISBN 978-1-7281-0869-8
Automated program repair 1
- Kui Liu

, Dongsun Kim
, Tegawendé F. Bissyandé, Tae-young Kim, Kisub Kim, Anil Koyuncu, Suntae Kim, Yves Le Traon
:
Learning to spot and refactor inconsistent method names. 1-12 - Seemanta Saha

, Ripon K. Saha, Mukul R. Prasad:
Harnessing evolution for multi-hunk program repair. 13-24 - Michele Tufano, Jevgenija Pantiuchina, Cody Watson, Gabriele Bavota

, Denys Poshyvanyk
:
On learning meaningful code changes via neural machine translation. 25-36
Mining of software properties and patterns
- Musfiqur Rahman

, Dharani Palani, Peter C. Rigby:
Natural software revisited. 37-48 - Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Di Yang, Pedro Martins, Hitesh Sajnani, Pierre Baldi, Cristina V. Lopes:

Towards automating precision studies of clone detectors. 49-59
Security 1
- Xiaoning Du, Bihuan Chen, Yuekang Li

, Jianmin Guo, Yaqin Zhou, Yang Liu
, Yu Jiang:
Leopard: identifying vulnerable code for vulnerability assessment through program metrics. 60-71
Static analysis
- Gang Fan, Rongxin Wu

, Qingkai Shi
, Xiao Xiao, Jinguo Zhou, Charles Zhang:
Smoke: scalable path-sensitive memory leak detection for millions of lines of code. 72-82 - Erik Krogh Kristensen, Anders Møller

:
Reasonably-most-general clients for JavaScript library analysis. 83-93 - Kihong Heo, Hakjoo Oh, Hongseok Yang:

Resource-aware program analysis via online abstraction coarsening. 94-104
Continuous integration
- Carmine Vassallo, Sebastian Proksch, Harald C. Gall

, Massimiliano Di Penta:
Automated reporting of anti-patterns and decay in continuous integration. 105-115
Debugging and fault localization
- Zhijian He, Yao Chen, Enyan Huang, Qixin Wang

, Yu Pei
, Haidong Yuan
:
A system identification based Oracle for control-CPS software fault localization. 116-127 - Yu Zhao, Tingting Yu, Ting Su, Yang Liu

, Wei Zheng, Jingzhi Zhang, William G. J. Halfond:
ReCDroid: automatically reproducing Android application crashes from bug reports. 128-139
DevOps and logging
- Anunay Amar, Peter C. Rigby:

Mining historical test logs to predict bugs and localize faults in the test logs. 140-151 - Zhenhao Li, Tse-Hsun (Peter) Chen

, Jinqiu Yang, Weiyi Shang:
Dlfinder: characterizing and detecting duplicate logging code smells. 152-163
Security 2
- Akond Rahman

, Chris Parnin, Laurie A. Williams:
The seven sins: security smells in infrastructure as code scripts. 164-175 - Shirin Nilizadeh, Yannic Noller

, Corina S. Pasareanu:
DifFuzz: differential fuzzing for side-channel analysis. 176-187
Test generation
- Manish Motwani, Yuriy Brun

:
Automatically generating precise Oracles from structured natural language specifications. 188-199
Agile development
- Todd Sedano, Paul Ralph

, Cécile Péraire:
The product backlog. 200-211
Analysis and verification
- Minxue Pan, Shouyu Chen, Yu Pei

, Tian Zhang, Xuandong Li:
Easy modelling and verification of unpredictable and preemptive interrupt-driven systems. 212-222 - Sora Bae, Sungho Lee, Sukyoung Ryu

:
Towards understanding and reasoning about Android interoperations. 223-233 - Richard Rutledge, Sunjae Park, Haider Adnan Khan

, Alessandro Orso, Milos Prvulovic, Alenka G. Zajic
:
Zero-overhead path prediction with progressive symbolic execution. 234-245
Mobile apps
- Taeyeon Ki, Chang Min Park, Karthik Dantu, Steven Y. Ko, Lukasz Ziarek:

Mimic: UI compatibility testing system for Android apps. 246-256 - Xusheng Xiao

, Xiaoyin Wang
, Zhihao Cao, Hanlin Wang, Peng Gao:
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. 257-268
Model-based software engineering
- Tianxiao Gu, Chengnian Sun, Xiaoxing Ma, Chun Cao, Chang Xu, Yuan Yao, Qirun Zhang

, Jian Lu, Zhendong Su
:
Practical GUI testing of Android applications via model abstraction and refinement. 269-280 - Lefan Zhang

, Weijia He
, Jesse J. Martinez
, Noah Brackenbury, Shan Lu, Blase Ur:
AutoTap: synthesizing and repairing trigger-action programs using LTL properties. 281-291
Program comprehension and reuse
- Aishwarya Sivaraman, Tianyi Zhang, Guy Van den Broeck, Miryung Kim:

Active inductive logic programming for code search. 292-303 - Rabee Sohail Malik, Jibesh Patra

, Michael Pradel:
NL2Type: inferring JavaScript function types from natural language information. 304-315 - Tianyi Zhang, Di Yang, Cristina V. Lopes, Miryung Kim:

Analyzing and supporting adaptation of online code examples. 316-327 - Eric Horton, Chris Parnin:

DockerizeMe: automatic inference of environment dependencies for python code snippets. 328-338
SE datasets, research infrastructure, and methodology
- David A. Tomassi, Naji Dmeiri, Yichen Wang, Antara Bhowmick, Yen-Chuan Liu, Premkumar T. Devanbu, Bogdan Vasilescu

, Cindy Rubio-González:
BugSwarm: mining and continuously growing a dataset of reproducible failures and fixes. 339-349 - Dehai Zhao, Zhenchang Xing, Chunyang Chen

, Xin Xia, Guoqiang Li:
ActionNet: vision-based workflow action recognition from programming screencasts. 350-361
Studying developers
- Jonathan Eyolfson, Patrick Lam:

How C++ developers use immutability declarations: an empirical study. 362-372 - Souti Chattopadhyay

, Nicholas Nelson
, Yenifer Ramirez Gonzalez, Annel Amelia Leon, Rahul Pandita, Anita Sarma
:
Latent patterns in activities: a field study of how developers manage context. 373-383 - Nahla J. Abid

, Bonita Sharif
, Natalia Dragan, Hend Alrasheed
, Jonathan I. Maletic:
Developer reading behavior while summarizing Java methods: size and context matters. 384-395 - Yu Huang, Xinyu Liu

, Ryan Krueger, Tyler Santander
, Xiaosu Hu
, Kevin Leach, Westley Weimer:
Distilling neural representations of data structure manipulation using fMRI and fNIRS. 396-407
Test selection and prioritization
- Adithya Abraham Philip, Ranjita Bhagwan, Rahul Kumar, Chandra Shekhar Maddila, Nachiappan Nagappan:

FastLane: test minimization for rapidly deployed large-scale online services. 408-418 - Emilio Cruciani, Breno Miranda, Roberto Verdecchia

, Antonia Bertolino
:
Scalable approaches for test suite reduction. 419-429 - Chenguang Zhu

, Owolabi Legunsen, August Shi, Milos Gligoric:
A framework for checking regression test selection tools. 430-441
Requirements
- Zahra Shakeri Hossein Abad

, Vincenzo Gervasi
, Didar Zowghi
, Behrouz H. Far:
Supporting analysts by dynamic extraction and classification of requirements-related knowledge. 442-453
Software analytics
- Deeksha M. Arya

, Wenting Wang, Jin L. C. Guo, Jinghui Cheng:
Analysis and detection of information types of open source software issue discussions. 454-464
Tool taxonomy and adoption
- Emerson R. Murphy-Hill, Edward K. Smith, Caitlin Sadowski, Ciera Jaspan, Collin Winter, Matthew Jorde, Andrea Knight, Andrew Trenk, Steve Gross:

Do developers discover new tools on the toilet? 465-475 - David Kavaler, Asher Trockman, Bogdan Vasilescu

, Vladimir Filkov:
Tool choice matters: JavaScript quality assurance tools and usage outcomes in GitHub projects. 476-487
Unit testing
- Yibiao Yang

, Yuming Zhou, Hao Sun, Zhendong Su
, Zhiqiang Zuo, Lei Xu, Baowen Xu
:
Hunting for bugs in code coverage tools via randomized differential testing. 488-498 - Julien Delplanque, Stéphane Ducasse, Guillermo Polito, Andrew P. Black, Anne Etien

:
Rotten green tests. 500-511
Automated repair 2
- Xuezheng Xu, Yulei Sui

, Hua Yan, Jingling Xue
:
VFix: value-flow-guided precise program repair for null pointer dereferences. 512-523 - Xuan-Bach Dinh Le, Lingfeng Bao, David Lo

, Xin Xia, Shanping Li, Corina S. Pasareanu:
On reliability of patch correctness assessment. 524-535
Crowdsourced knowledge and feedback
- Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang

, Jens Grossklags:
How reliable is the crowdsourced knowledge of security implementation? 536-547 - Bin Lin

, Fiorella Zampetti, Gabriele Bavota
, Massimiliano Di Penta, Michele Lanza
:
Pattern-based mining of opinions in Q&A websites. 548-559
Dependencies
- Negar Ghorbani, Joshua Garcia

, Sam Malek:
Detection and repair of architectural inconsistencies in Java. 560-571 - Ying Wang, Ming Wen, Rongxin Wu

, Zhenwei Liu
, Shin Hwei Tan, Zhiliang Zhu, Hai Yu, Shing-Chi Cheung
:
Could I have a stack trace to examine the dependency conflict issue? 572-583 - Di Cui, Ting Liu, Yuanfang Cai, Qinghua Zheng, Qiong Feng, Wuxia Jin, Jiaqi Guo

, Yu Qu
:
Investigating the impact of multiple dependency structures on software defects. 584-595
Requirements engineering for mass-market software
- Sen Chen, Lingling Fan, Chunyang Chen

, Ting Su, Wenhe Li, Yang Liu
, Lihua Xu:
StoryDroid: automated generation of storyboard for Android apps. 596-607
Trends and challenges in SE
- Keyur Joshi

, Vimuth Fernando, Sasa Misailovic:
Statistical algorithmic profiling for randomized approximate programs. 608-618
Concurrency
- Raffi Khatchadourian

, Yiming Tang
, Mehdi Bagherzadeh, Syed Ahmed:
Safe automated refactoring for intelligent parallelization of Java 8 streams. 619-630 - Xiaoning Chang, Wensheng Dou, Yu Gao, Jie Wang, Jun Wei, Tao Huang:

Detecting atomicity violations for event-driven Node.js applications. 631-642 - Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:

Parallel refinement for multi-threaded program verification. 643-653
Defect prediction
- Suraj Yatish, Jirayus Jiarpakdee, Patanamon Thongtanunam, Chakkrit Tantithamthavorn:

Mining software defects: should we consider affected releases? 654-665 - George G. Cabral, Leandro L. Minku

, Emad Shihab, Suhaib Mujahid
:
Class imbalance evolution and verification latency in just-in-time software defect prediction. 666-676
Developer biases and trust
- Amanda Lee, Jeffrey C. Carver:

FLOSS participants' perceptions about gender and inclusiveness: a survey. 677-687 - Huilian Sophie Qiu

, Alexander Nolte
, Anita Brown, Alexander Serebrenik
, Bogdan Vasilescu
:
Going farther together: the impact of social capital on sustained participation in open source. 688-699 - Nasif Imtiaz, Justin Middleton, Joymallya Chakraborty, Neill Robson, Gina R. Bai

, Emerson R. Murphy-Hill:
Investigating the effects of gender bias on GitHub. 700-711
Fuzzing
- Wei You, Xuwei Liu

, Shiqing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang:
SLF: fuzzing without valid seed inputs. 712-723 - Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu

:
Superion: grammar-aware greybox fuzzing. 724-735 - Jaeseung Choi

, Joonun Jang
, Choongwoo Han, Sang Kil Cha:
Grey-box concolic testing on binary code. 736-747 - Vaggelis Atlidakis, Patrice Godefroid, Marina Polishchuk:

RESTler: stateful REST API fuzzing. 748-758
Machine learning in static analysis
- Facundo Molina

, Renzo Degiovanni
, Pablo Ponzio, Germán Regis, Nazareno Aguirre, Marcelo F. Frias
:
Training binary classifiers as data structure invariants. 759-770 - Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu:

Graph embedding based familial analysis of Android malware using unsupervised learning. 771-782 - Jian Zhang, Xu Wang, Hongyu Zhang

, Hailong Sun, Kaixuan Wang, Xudong Liu:
A novel neural source code representation based on abstract syntax tree. 783-794 - Alexander LeClair, Siyuan Jiang, Collin McMillan:

A neural model for generating natural language summaries of program subroutines. 795-806
Mining software changes and patterns
- Ralf Ramsauer, Daniel Lohmann

, Wolfgang Mauerer:
The list is the process: reliable pre-integration tracking of commits on mailing lists. 807-818 - Hoan Anh Nguyen, Tien N. Nguyen, Danny Dig, Son Nguyen, Hieu Tran

, Michael Hilton
:
Graph-based mining of in-the-wild, fine-grained, semantic code change patterns. 819-830
Software product lines
- Max Lillack, Stefan Stanciulescu, Wilhelm Hedman, Thorsten Berger, Andrzej Wasowski

:
Intention-based integration of software variants. 831-842 - Ruben Heradio

, David Fernández-Amorós
, Christoph Mayr-Dorn, Alexander Egyed:
Supporting the statistical analysis of variability models. 843-853 - Sami Lazreg, Maxime Cordy, Philippe Collet, Patrick Heymans, Sébastien Mosser

:
Multifaceted automated analyses for variability-intensive embedded systems. 854-865
API analysis
- Ming Wen, Yepang Liu, Rongxin Wu

, Xuan Xie
, Shing-Chi Cheung
, Zhendong Su
:
Exposing library API misuses via mutation analysis. 866-877 - Lili Wei

, Yepang Liu, Shing-Chi Cheung
:
Pivot: learning API-device correlations to facilitate Android compatibility issue detection. 878-888 - Shiyou Huang, Jianmei Guo, Sanhong Li, Xiang Li, Yumin Qi, Kingsum Chow, Jeff Huang:

SafeCheck: safety enhancement of Java unsafe API. 889-899
Crowdsourcing in software engineering
- Rui Hao, Yang Feng, James A. Jones, Yuying Li, Zhenyu Chen:

CTRAS: crowdsourced test report aggregation and summarization. 900-910 - Junjie Wang, Ye Yang, Rahul Krishna, Tim Menzies

, Qing Wang:
iSENSE: completion-aware crowdtesting management. 912-923
Human factors
- Xin Xia, Zhiyuan Wan, Pavneet Singh Kochhar, David Lo

:
How practitioners perceive coding proficiency. 924-935 - Farhana Sarker

, Bogdan Vasilescu
, Kelly Blincoe
, Vladimir Filkov:
Socio-technical work-rate increase associates with changes in work patterns in online projects. 936-947 - Ann Barcomb

, Klaas-Jan Stol, Dirk Riehle, Brian Fitzgerald:
Why do episodic volunteers stay in FLOSS communities? 948-954
IDEs
- Vincent J. Hellendoorn, Sebastian Proksch, Harald C. Gall

, Alberto Bacchelli:
When code completion fails: a case study on real-world completions. 960-970 - Jürgen Cito, Philipp Leitner

, Martin C. Rinard, Harald C. Gall
:
Interactive production performance feedback in the IDE. 971-981
Performance
- Pengfei Su, Shasha Wen, Hailong Yang, Milind Chabbi, Xu Liu:

Redundant loads: a software inefficiency indicator. 982-993 - Junwen Yang, Cong Yan, Chengcheng Wan

, Shan Lu, Alvin Cheung
:
View-centric performance optimization for database-backed web applications. 994-1004 - Weihang Wang

, I Luk Kim, Yunhui Zheng:
Adjust: runtime mitigation of resource abusing third-party online ads. 1005-1015
Specifications and models
- Shahar Maoz, Jan Oliver Ringert

, Rafi Shalom
:
Symbolic repairs for GR(1) specifications. 1016-1026 - Hung Viet Pham, Thibaud Lutellier

, Weizhen Qi, Lin Tan:
CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries. 1027-1038 - Jinhan Kim, Robert Feldt, Shin Yoo:

Guiding deep learning system testing using surprise adequacy. 1039-1049
APIs
- Phuong Thanh Nguyen

, Juri Di Rocco
, Davide Di Ruscio
, Lina Ochoa, Thomas Degueule
, Massimiliano Di Penta:
FOCUS: a recommender system for mining API function calls and usage patterns. 1050-1060
Code reviews
- Davide Spadini, Fabio Palomba, Tobias Baum, Stefan Hanenberg, Magiel Bruntink, Alberto Bacchelli:

Test-driven code review: an empirical study. 1061-1072 - Adam Alami, Marisa Leavitt Cohn

, Andrzej Wasowski:
Why does code review work for open source software communities? 1073-1083
Configuration and optimization
- Christian Kaltenecker, Alexander Grebhahn, Norbert Siegmund, Jianmei Guo, Sven Apel

:
Distance-based sampling of software configuration spaces. 1084-1094 - Huong Ha

, Hongyu Zhang
:
DeepPerf: performance prediction for configurable software with deep sparse neural network. 1095-1106
Energy consumption in mobile apps
- Shaiful Alam Chowdhury, Abram Hindle, Rick Kazman, Takumi Shuto, Ken Matsui, Yasutaka Kamei:

GreenBundle: an empirical study on the energy impact of bundled processing. 1107-1118 - Reyhaneh Jabbarvand, Jun-Wei Lin, Sam Malek:

Search-based energy testing of Android. 1119-1130
Program transformations
- Xie Wang, Huaijin Wang

, Zhendong Su
, Enyi Tang, Xin Chen, Weijun Shen, Zhenyu Chen, Linzhang Wang, Xianpei Zhang, Xuandong Li:
Global optimization of numerical programs via prioritized stochastic algebraic transformations. 1131-1141 - Ameya Ketkar, Ali Mesbah

, Davood Mazinanian, Danny Dig
, Edward Aftandilian:
Type migration in ultra-large-scale codebases. 1142-1153 - Tanzirul Azim, Arash Alavi

, Iulian Neamtiu, Rajiv Gupta
:
Dynamic slicing for Android. 1154-1164
Reverse engineering
- Hieu Tran

, Ngoc M. Tran, Son Nguyen, Hoan Nguyen, Tien N. Nguyen:
Recovering variable names for minified code with usage contexts. 1165-1175 - Neville Grech, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis:

Gigahorse: thorough, declarative decompilation of smart contracts. 1176-1186 - Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang

, Xiangyu Zhang, Zhiqiang Lin
:
Probabilistic disassembly. 1187-1198
Software documentation
- Emad Aghajani, Csaba Nagy, Olga Lucero Vega-Márquez

, Mario Linares-Vásquez, Laura Moreno, Gabriele Bavota
, Michele Lanza
:
Software documentation issues unveiled. 1199-1210 - Hideaki Hata

, Christoph Treude
, Raula Gaikovina Kula
, Takashi Ishio
:
9.6 million links in source code comments: purpose, evolution, and decay. 1211-1221
Software quality
- Ankit Agrawal

, Seyedehzahra Khoshmanesh
, Michael Vierhauser
, Mona Rahimi, Jane Cleland-Huang, Robyn R. Lutz
:
Leveraging artifact trees to evolve and reuse safety cases. 1222-1233
Testing and analysis: domain-specific approaches
- Nándor Licker, Andrew Rice:

Detecting incorrect build rules. 1234-1244 - Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang:

Adversarial sample detection for deep neural network through model mutation testing. 1245-1256 - Yuting Chen, Ting Su, Zhendong Su

:
Deep differential testing of JVM implementations. 1257-1268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














