


default search action
38th ICSME 2022: Limassol, Cyprus
- IEEE International Conference on Software Maintenance and Evolution, ICSME 2022, Limassol, Cyprus, October 3-7, 2022. IEEE 2022, ISBN 978-1-6654-7956-1

- Issam Sedki, Abdelwahab Hamou-Lhadj

, Otmane Aït Mohamed, Mohammed A. Shehab
:
An Effective Approach for Parsing Large Log Files. 1-12 - Moses Openja, Amin Nikanjam

, Ahmed Haj Yahmed, Foutse Khomh, Zhen Ming Jack Jiang:
An Empirical Study of Challenges in Converting Deep Learning Models. 13-23 - Negar Hashemi, Amjed Tahir, Shawn Rasheed:

An Empirical Study of Flaky Tests in JavaScript. 24-34 - Tarek Makkouk, Dong Jae Kim, Tse-Hsun Peter Chen

:
An Empirical Study on Performance Bugs in Deep Learning Frameworks. 35-46 - Fiorella Zampetti, François Belias, Cyrine Zid, Giuliano Antoniol, Massimiliano Di Penta:

An Empirical Study on the Fault-Inducing Effect of Functional Constructs in Python. 47-58 - Forough Majidi

, Moses Openja, Foutse Khomh, Heng Li:
An Empirical Study on the Usage of Automated Machine Learning Tools. 59-70 - Ting Zhang

, Ivana Clairine Irsan, Ferdian Thung, DongGyun Han
, David Lo
, Lingxiao Jiang
:
Automatic Pull Request Title Generation. 71-81 - Chi Yu, Guang Yang

, Xiang Chen, Ke Liu, Yanlin Zhou:
BashExplainer: Retrieval-Augmented Bash Code Comment Generation based on Fine-tuned CodeBERT. 82-93 - Zejian Shi, Yun Xiong, Xiaolong Zhang, Yao Zhang, Shanshan Li, Yangyong Zhu:

Cross-Modal Contrastive Learning for Code Search. 94-105 - Wendell Mendes, Oton Pinheiro, Emanuele Santos, Lincoln S. Rocha, Windson Viana

:
Dazed and Confused: Studying the Prevalence of Atoms of Confusion in Long-Lived Java Libraries. 106-116 - Wai Kin Wong, Huaijin Wang

, Pingchuan Ma, Shuai Wang, Mingyue Jiang, Tsong Yueh Chen
, Qiyi Tang
, Sen Nie, Shi Wu:
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs. 117-128 - Mohammed Alhamed, Tim Storer:

Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. 129-138 - Farshad Kazemi

, Maxime Lamothe, Shane McIntosh:
Exploring the Notion of Risk in Code Reviewer Recommendation. 139-150 - Thanh-Dat Nguyen, Thanh Le-Cong

, Duc-Minh Luong, Van-Hai Duong, Xuan-Bach Dinh Le, David Lo
, Quyet-Thang Huynh:
FFL: Fine-grained Fault Localization for Student Programs via Syntactic and Semantic Reasoning. 151-162 - Mitchell Olsthoorn

, Arie van Deursen
, Annibale Panichella:
Guiding Automated Test Case Generation for Transaction-Reverting Statements in Smart Contracts. 163-174 - Jiamou Sun, Zhenchang Xing, Xiwei Xu, Liming Zhu, Qinghua Lu:

Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching. 175-186 - Lingyu Zhang, Huiyan Wang, Chang Xu, Ping Yu

:
INFuse: Towards Efficient Context Consistency by Incremental-Concurrent Check Fusion. 187-198 - Zhuo Zhang, Yan Lei, Xiaoguang Mao

, Meng Yan
, Xin Xia:
Improving Fault Localization Using Model-domain Synthesized Failing Test Generation. 199-210 - Gunnar Kudrjavets

, Jeff Thomas, Nachiappan Nagappan, Ayushi Rastogi
:
Is Kernel Code Different From Non-Kernel Code? A Case Study of BSD Family Operating Systems. 211-222 - Xinrong Lin, Baojian Hua, Qiliang Fan:

On the Security of Python Virtual Machines: An Empirical Study. 223-234 - Alexandre Decan, Tom Mens, Pooya Rostami Mazrae, Mehdi Golzadeh:

On the Use of GitHub Actions in Software Development Repositories. 235-245 - Dylan Lee, Austin Z. Henley

, Bill Hinshaw, Rahul Pandita:
OpenCBS: An Open-Source COBOL Defects Benchmark Suite. 246-256 - Yihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li, Xiaoguang Mao

, Tegawendé F. Bissyandé:
Peeler: Learning to Effectively Predict Flakiness without Running Tests. 257-268 - Alexander Schultheiß, Paul Maximilian Bittner, Thomas Thüm, Timo Kehrer:

Quantifying the Potential to Automate the Synchronization of Variants in Clone-and-Own. 269-280 - Di Cui, Siqi Wang, Yong Luo, Xingyu Li, Jie Dai, Lu Wang, Qingshan Li:

RMove: Recommending Move Method Refactoring Opportunities using Structural and Semantic Representations of Code. 281-292 - Benedikt Severin

, Marc Hesenius
, Florian Blum, Michael Hettmer, Volker Gruhn:
Smart Money Wasting: Analyzing Gas Cost Drivers of Ethereum Smart Contracts. 293-304 - Evelien Boerstra

, John Ahn, Julia Rubin:
Stronger Together: On Combining Relationships in Architectural Recovery Approaches. 305-316 - Déaglán Connolly Bree

, Mel Ó Cinnéide:
The Energy Cost of the Visitor Pattern. 317-328 - Qing Sun, Lili Xu, Yang Xiao, Feng Li, He Su, Yiming Liu, Hongyun Huang, Wei Huo:

VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis. 329-339 - Diego Marcilio, Carlo A. Furia:

What Is Thrown? Lightweight Precise Automatic Extraction of Exception Preconditions in Java Methods. 340-351 - Sarra Habchi, Guillaume Haben

, Jeongju Sohn
, Adriano Franci, Mike Papadakis, Maxime Cordy, Yves Le Traon:
What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. 352-363 - Hind Bangui, Bruno Rossi, Barbora Buhnova:

A Conceptual Antifragile Microservice Framework for Reshaping Critical Infrastructures. 364-368 - Shahla Shaan Ahmed, Shaowei Wang, Haoxiang Zhang, Tse-Hsun Chen

, Yuan Tian:
A First Look at Information Highlighting in Stack Overflow Answers. 369-373 - Fuwei Tian, Christoph Treude

:
Adding Context to Source Code Representations for Deep Learning. 374-378 - Tim Puhlfürß

, Lloyd Montgomery, Walid Maalej:
An Exploratory Study of Documentation Strategies for Product Features in Popular GitHub Projects. 379-383 - A. Eashaan Rao, Sridhar Chimalakonda:

Apples, Oranges & Fruits - Understanding Similarity of Software Repositories Through The Lens of Dissimilar Artifacts. 384-388 - Pascal Marc André, Quentin Stiévenart

, Mohammad Ghafari:
Developers Struggle with Authentication in Blazor WebAssembly. 389-393 - Rosalia Tufano

, Emad Aghajani, Gabriele Bavota
:
Don't Reinvent the Wheel: Towards Automatic Replacement of Custom Implementations with APIs. 394-398 - Yuan Jiang, Christian Kästner, Shurui Zhou:

Elevating Jupyter Notebook Maintenance Tooling by Identifying and Extracting Notebook Structures. 399-403 - Victoria Bogachenkova, Linh Nguyen, Felipe Ebert, Alexander Serebrenik, Fernando Castor

:
Evaluating Atoms of Confusion in the Context of Code Reviews. 404-408 - Hrishikesh Karmarkar

, Raveendra Kumar Medicherla, Ravindra Metta, Prasanth Yeduru:
FuzzNT : Checking for Program Non-termination. 409-413 - Jesse Nyyssölä

, Mika Mäntylä, Martín Varela:
How to Configure Masked Event Anomaly Detection on Software Logs? 414-418 - Misoo Kim

, Youngkyoung Kim
, Jinseok Heo, Hohyeon Jeong, Sungoh Kim, Eunseok Lee
:
Impact of Defect Instances for Successful Deep Learning-based Automatic Program Repair. 419-423 - Jeewoong Kim, Shin Hong:

Inferring Fine-grained Traceability Links between Javadoc Comment and JUnit Test Code. 424-428 - Naveen Ganesh Muralidharan, Vera Pantelic, Victor Bandur, Richard F. Paige:

Integrating Software Issue Tracking and Traceability Models. 429-433 - Eric Ribeiro, Ronan Nascimento, Igor Steinmacher, Laerte Xavier, Marco Aurélio Gerosa, Hugo de Paula, Mairieli Wessel:

Together or Apart? Investigating a mediator bot to aggregate bot's comments on pull requests. 434-438 - Giuseppe Cascavilla

, Gemma Catolino, Felipe Ebert, Damien A. Tamburri, Willem-Jan van den Heuvel:
"When the Code becomes a Crime Scene" Towards Dark Web Threat Intelligence with Software Quality Metrics. 439-443 - Saumendu Roy, Gabriel Laberge, Banani Roy, Foutse Khomh, Amin Nikanjam

, Saikat Mondal:
Why Don't XAI Techniques Agree? Characterizing the Disagreements Between Post-hoc Explanations of Defect Predictions. 444-448 - Olivier Nourry, Yutaro Kashiwa, Bin Lin

, Gabriele Bavota
, Michele Lanza
, Yasutaka Kamei:
AIP: Scalable and Reproducible Execution Traces in Energy Studies on Mobile Devices. 449-453 - Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, David Lo

, Lingxiao Jiang
:
AutoPRTitle: A Tool for Automatic Pull Request Title Generation. 454-458 - Dario Amoroso d'Aragona, Fabiano Pecorelli, Simone Romano

, Giuseppe Scanniello, Maria Teresa Baldassarre, Andrea Janes, Valentina Lenarduzzi
:
CATTO: Just-in-time Test Case Selection and Execution. 459-463 - Mir Sameed Ali, Nikhil Manjunath, Sridhar Chimalakonda:

COBREX: A Tool for Extracting Business Rules from COBOL. 464-468 - Gianmario Voria

, Viviana Pentangelo
, Antonio Della Porta
, Stefano Lambiase
, Gemma Catolino, Fabio Palomba, Filomena Ferrucci:
Community Smell Detection and Refactoring in SLACK: The CADOCS Project. 469-473 - Marco Raglianti

, Csaba Nagy, Roberto Minelli, Michele Lanza
:
DiscOrDance: Visualizing Software Developers Communities on Discord. 474-478 - Stefano Dalla Palma, Dario Di Nucci

, Damian A. Tamburri:
Defuse: A Data Annotator and Model Builder for Software Defect Prediction. 479-483 - Shriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma

, Vikrant Kaulgud:
eTagger - An Energy Pattern Tagging Tool for GitHub Issues in Android Projects. 484-488 - Camilo Velázquez-Rodríguez

, Eleni Constantinou
, Coen De Roover
:
LiFUSO: A Tool for Library Feature Unveiling based on Stack Overflow Posts. 489-493 - Tim Kräuter

, Harald König, Adrian Rutle, Yngve Lamo
:
The Visual Debugger Tool. 494-498 - Tomás Fiedor, Jirí Pavela, Adam Rogalewicz, Tomás Vojnar:

Perun: Performance Version System. 499-503 - Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato

:
RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIs. 504-508 - Kowndinya Boyalakuntla

, Meiyappan Nagappan, Sridhar Chimalakonda, Nuthan Munaiah:
RepoQuester: A Tool Towards Evaluating GitHub Projects. 509-513 - Tim Vahlbrock

, Martin Guddat, Tom Vierjahn:
VSCode Migrate: Semi-Automatic Migrations for Low Coverage Projects. 514-518 - Chao Peng

, Yujun Gao, Ping Yang:
Automated Server Testing: an Industrial Experience Report. 519-522 - Céline Deknop, Johan Fabry, Kim Mens

, Vadim Zaytsev
:
Generating Customised Control Flow Graphs for Legacy Languages with Semi-Parsing. 523-532 - Neela Sawant, Srinivasan H. Sengamedu:

Learning-based Identification of Coding Best Practices from Software Documentation. 533-542 - Chao Peng

, Zhao Zhang, Zhengwei Lv, Ping Yang:
MUBot: Learning to Test Large-Scale Commercial Android Apps like a Human. 543-552 - Batyr Nuryyev, Ajay Kumar Jha, Sarah Nadi, Yee-Kang Chang, Emily Jiang, Vijay Sundaresan:

Mining Annotation Usage Rules: A Case Study with MicroProfile. 553-562 - Gunnar Kudrjavets

, Ayushi Rastogi
, Jeff Thomas, Nachiappan Nagappan:
On Quantifying the Benefits of Dead Code Removal. 563 - Kazumasa Shimari, Masahiro Tanaka, Takashi Ishio

, Makoto Matsushita, Katsuro Inoue, Satoru Takanezawa:
Selecting Test Cases based on Similarity of Runtime Information: A Case Study of an Industrial Simulator. 564-567 - Noah Lee, Rui Abreu

, Mehmet Yatbaz, Hang Qu, Nachiappan Nagappan:
The Engineering Implications of Code Maintenance in Practice. 568-577 - Gunnar Kudrjavets

, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi
:
There Ain't No Such Thing as a Free Custom Memory Allocator. 578-581 - Muslim Chochlov, Gul Aftab Ahmed, James Vincent Patten

, Guoxian Lu, Wei Hou, David Gregg, Jim Buckley:
Using a Nearest-Neighbour, BERT-Based Approach for Scalable Clone Detection. 582-591 - Giovanni Rosa, Simone Scalabrino, Rocco Oliveto:

Assessing and Improving the Quality of Docker Artifacts. 592-596 - Valentina Piantadosi

:
On the Evolution of Code Readability. 597-601 - Kristiina Rahkema, Dietmar Pfahl

:
Quality Analysis of iOS Applications with Focus on Maintainability and Security. 602-606 - Seham Alharbi

, Dimitris S. Kolovos
, Nicholas Matragkas:
Synthesising Linear API Usage Examples for API Documentation. 607-611 - Emanuele Iannone

, Fabio Palomba:
The Phantom Menace: Unmasking Security Issues in Evolving Software. 612-616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














