default search action
37th ICSE 2015: Florence, Italy - Volume 1
- Antonia Bertolino, Gerardo Canfora, Sebastian G. Elbaum:
37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1. IEEE Computer Society 2015, ISBN 978-1-4799-1934-5
Keynotes
- Claudio Silenzi:
Software Engineering in Ferrari F1. 3 - Susan Landau:
Mining the Metadata - and Its Consequences. 4-5
Technical Research
Reflections and Studies on Methodologies and Practices I
- Janet Siegmund, Norbert Siegmund, Sven Apel:
Views on Internal and External Validity in Empirical Software Engineering. 9-19 - Paul Ralph:
Developing and Evaluating Software Engineering Process Theories. 20-31 - Kyle Dewey, Lawton Nichols, Ben Hardekopf:
Automated Data Structure Generation: Refuting Common Wisdom. 32-43
Testing I
- Rahulkrishna Yandrapally, Giriprasad Sridhara, Saurabh Sinha:
Automated Modularization of GUI Test Cases. 44-54 - Zebao Gao, Yalan Liang, Myra B. Cohen, Atif M. Memon, Zhen Wang:
Making System User Interactive Tests Repeatable: When and What Should We Control? 55-65 - Fabrizio Pastore, Leonardo Mariani:
ZoomIn: Discovering Failures by Detecting Wrong Assertions. 66-76
Mobile Applications
- Damien Octeau, Daniel Luchaup, Matthew L. Dering, Somesh Jha, Patrick D. McDaniel:
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. 77-88 - Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, Atanas Rountev:
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications. 89-99 - Jiaping Gui, Stuart McIlroy, Meiyappan Nagappan, William G. J. Halfond:
Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers. 100-110
Evolution and Maintenance
- Tianyi Zhang, Myoungkyu Song, Joseph Pinedo, Miryung Kim:
Interactive Code Review for Systematic Changes. 111-122 - Mohsen Vakilian, Raluca Sauciuc, J. David Morgenthaler, Vahab S. Mirrokni:
Automated Decomposition of Build Targets. 123-133 - Mike Barnett, Christian Bird, João Brunet, Shuvendu K. Lahiri:
Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets. 134-144
Analysis I
- Denis Gopan, Evan Driscoll, Ducson Nguyen, Dimitri Naydich, Alexey Loginov, David Melski:
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery. 145-155 - Antonio Carzaniga, Andrea Mattavelli, Mauro Pezzè:
Measuring Software Redundancy. 156-166 - Yao Pan, Jules White, Yu Sun, Jeff Gray:
Gray Computing: An Analysis of Computing with Background JavaScript Tasks. 167-177
Highly Configurable and Adaptive Systems
- Alexander von Rhein, Alexander Grebhahn, Sven Apel, Norbert Siegmund, Dirk Beyer, Thorsten Berger:
Presence-Condition Simplification in Highly Configurable Systems. 178-188 - Shoham Ben-David, Baruch Sterin, Joanne M. Atlee, Sandy Beidu:
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods. 189-199 - Antonio Filieri, Lars Grunske, Alberto Leva:
Lightweight Adaptive Filtering for Efficient Learning and Updating of Probabilistic Models. 200-211
Tools and Environments
- Yun Young Lee, Darko Marinov, Ralph E. Johnson:
Tempura: Temporal Dimension for IDEs. 212-222 - YoungSeok Yoon, Brad A. Myers:
Supporting Selective Undo in a Code Editor. 223-233 - Mohsen Vakilian, Amarin Phaosawasdi, Michael D. Ernst, Ralph E. Johnson:
Cascade: A Universal Programmer-Assisted Type Qualifier Inference Tool. 234-245
Regression Testing
- Valerio Terragni, Shing-Chi Cheung, Charles Zhang:
RECONTEST: Effective Regression Testing of Concurrent Programs. 246-256 - Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang:
A Synergistic Analysis Method for Explaining Failed Regression Tests. 257-267 - Ripon K. Saha, Lingming Zhang, Sarfraz Khurshid, Dewayne E. Perry:
An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes. 268-279
Security and Privacy
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. 280-291 - Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? 292-302 - Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck:
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. 303-313
Analysis II
- Michael Pradel, Parker Schuh, Koushik Sen:
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript. 314-324 - Frolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah:
Detecting Inconsistencies in JavaScript MVC Applications. 325-335 - Mattia Fazzini, Prateek Saxena, Alessandro Orso:
AutoCSP: Automatically Retrofitting CSP to Web Applications. 336-346
Reflections and Studies on Methodologies and Practices II
- Michael Waterman, James Noble, George Allan:
How Much Up-Front? A Grounded theory of Agile Architecture. 347-357 - Georgios Gousios, Andy Zaidman, Margaret-Anne D. Storey, Arie van Deursen:
Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective. 358-368 - Edward K. Smith, Christian Bird, Thomas Zimmermann:
Build It Yourself! Homegrown Tools in a Large Software Company. 369-379
Refactoring
- Jörg Liebig, Andreas Janker, Florian Garbe, Sven Apel, Christian Lengauer:
Morpheus: Variability-Aware Refactoring in the Wild. 380-391 - Na Meng, Lisa Hua, Miryung Kim, Kathryn S. McKinley:
Does Automated Refactoring Obviate Systematic Editing? 392-402 - Michele Tufano, Fabio Palomba, Gabriele Bavota, Rocco Oliveto, Massimiliano Di Penta, Andrea De Lucia, Denys Poshyvanyk:
When and Why Your Code Starts to Smell Bad. 403-414
Mining
- Jieming Zhu, Pinjia He, Qiang Fu, Hongyu Zhang, Michael R. Lyu, Dongmei Zhang:
Learning to Log: Helping Developers Make Informed Logging Decisions. 415-425 - Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden:
Mining Apps for Abnormal Usage of Sensitive Data. 426-436 - Pavel Avgustinov, Arthur I. Baars, Anders Starcke Henriksen, R. Greg Lavender, Galen Menzel, Oege de Moor, Max Schäfer, Julian Tibble:
Tracking Static Analysis Violations over Time to Capture Developer Characteristics. 437-447
Patching and Fixing I
- Sergey Mechtaev, Jooyong Yi, Abhik Roychoudhury:
DirectFix: Looking for Simple Program Repairs. 448-458 - Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoping Zhou, Bing Xie, Hong Mei:
Safe Memory-Leak Fixing for C Programs. 459-470 - Shin Hwei Tan, Abhik Roychoudhury:
relifix: Automated Repair of Software Regressions. 471-482
Testing II
- Kim Herzig, Michaela Greiler, Jacek Czerwonka, Brendan Murphy:
The Art of Testing Less without Sacrificing Quality. 483-493 - Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
No PAIN, No Gain? The Utility of PArallel Fault INjections. 494-505 - Michael W. Whalen, Suzette Person, Neha Rungta, Matt Staats, Daniela Grijincu:
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics. 506-516
Search-Based
- Christopher Henard, Mike Papadakis, Mark Harman, Yves Le Traon:
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. 517-528 - Daming Zou, Ran Wang, Yingfei Xiong, Lu Zhang, Zhendong Su, Hong Mei:
A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies. 529-539 - Yue Jia, Myra B. Cohen, Mark Harman, Justyna Petke:
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search. 540-550
Collaboration and Coordination
- Thomas D. LaToza, Micky Chen, Luxi Jiang, Mengyao Zhao, André van der Hoek:
Borrowing from the Crowd: A Study of Recombination in Software Design Competitions. 551-562 - Mitchell Joblin, Wolfgang Mauerer, Sven Apel, Janet Siegmund, Dirk Riehle:
From Developer Networks to Verified Communities: A Fine-Grained Approach. 563-573 - Eirini Kalliamvakou, Daniela E. Damian, Kelly Blincoe, Leif Singer, Daniel M. Germán:
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub. 574-585
Analysis Infrastructure
- Cathrin Weiss, Cindy Rubio-González, Ben Liblit:
Database-Backed Program Analysis for Scalable Error Propagation. 586-597 - Caitlin Sadowski, Jeffrey van Gogh, Ciera Jaspan, Emma Söderberg, Collin Winter:
Tricorder: Building a Program Analysis Ecosystem. 598-608 - Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver. 609-619
Symbolic Execution
- Edmund Wong, Lei Zhang, Song Wang, Taiyue Liu, Lin Tan:
DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing. 620-631 - Rui Qiu, Guowei Yang, Corina S. Pasareanu, Sarfraz Khurshid:
Compositional Symbolic Execution with Memoized Replay. 632-642 - Yufeng Zhang, Zhenbang Chen, Ji Wang, Wei Dong, Zhiming Liu:
Regular Property Guided Dynamic Symbolic Execution. 643-653 - Ting Su, Zhoulai Fu, Geguang Pu, Jifeng He, Zhendong Su:
Combining Symbolic Execution and Model Checking for Data Flow Testing. 654-665
Organizational and Human Factors
- Iflaah Salman, Ayse Tosun Misirli, Natalia Juristo Juzgado:
Are Students Representatives of Professionals in Software Engineering Experiments? 666-676 - Mathieu Lavallée, Pierre N. Robillard:
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality. 677-687 - Sebastian C. Müller, Thomas Fritz:
Stuck and Frustrated or in Flow and Happy: Sensing Developers' Emotions and Progress. 688-699 - Paul Luo Li, Amy J. Ko, Jiamin Zhu:
What Makes a Great Software Engineer? 700-710
Specification and Verification
- Luciano Baresi, Mohammad Mehdi Pourhashem Kallehbasti, Matteo Rossi:
Efficient Scalable Verification of LTL Specifications. 711-721 - Daniel Matichuk, Toby C. Murray, June Andronick, D. Ross Jeffery, Gerwin Klein, Mark Staples:
Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification. 722-732 - Germán Regis, Renzo Degiovanni, Nicolás D'Ippolito, Nazareno Aguirre:
Specifying Event-Based Systems with a Counting Fluent Temporal Logic. 733-743 - Ivan Bocic, Tevfik Bultan:
Coexecutability for Efficient Verification of Data Model Updates. 744-754
Programming
- Casey Casalnuovo, Premkumar T. Devanbu, Abílio Oliveira, Vladimir Filkov, Baishakhi Ray:
Assert Use in GitHub Projects. 755-766 - Haitao Steve Zhu, Chaoren Lin, Yu David Liu:
A Programming Model for Sustainable Software. 767-777 - Sebastian Nanz, Carlo A. Furia:
A Comparative Study of Programming Languages in Rosetta Code. 778-788
Prediction Models
- Baljinder Ghotra, Shane McIntosh, Ahmed E. Hassan:
Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models. 789-800 - Fayola Peters, Tim Menzies, Lucas Layman:
LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction. 801-811 - Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Akinori Ihara, Ken-ichi Matsumoto:
The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models. 812-823
Analysis III
- Xiang Yuan, Chenggang Wu, Zhenjiang Wang, Jianjun Li, Pen-Chung Yew, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen, Yong Guan:
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks. 824-834 - Markus Kusano, Arijit Chattopadhyay, Chao Wang:
Dynamic Generation of Likely Invariants for Multithreaded Programs. 835-846 - Jeff Huang, Qingzhou Luo, Grigore Rosu:
GPredict: Generic Predictive Concurrency Analysis. 847-857
Working with APIs
- Anh Tuan Nguyen, Tien N. Nguyen:
Graph-Based Statistical Language Model for Code. 858-868 - Gayane Petrosyan, Martin P. Robillard, Renato De Mori:
Discovering Information Explaining API Types Using Text Classification. 869-879 - Laura Moreno, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus:
How Can I Use This Method? 880-890
Patching and Fixing II
- Van-Thuan Pham, Wei Boon Ng, Konstantin Rubinov, Abhik Roychoudhury:
Hercules: Reproducing Crashes in Real-World Application Binaries. 891-901 - Adrian Nistor, Po-Chun Chang, Cosmin Radoi, Shan Lu:
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes. 902-912 - Hao Zhong, Zhendong Su:
An Empirical Study on Real Bug Fixes. 913-923
Testing III
- Zhongxing Yu, Chenggang Bai, Kai-Yuan Cai:
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests. 924-935 - Mike Papadakis, Yue Jia, Mark Harman, Yves Le Traon:
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. 936-946 - Giovanni Denaro, Alessandro Margara, Mauro Pezzè, Mattia Vivanti:
Dynamic Data Flow Testing of Object Oriented Systems. 947-958
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.