default search action
28th SANER 2021: Honolulu, HI, USA
- 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2021, Honolulu, HI, USA, March 9-12, 2021. IEEE 2021, ISBN 978-1-7281-9630-5
Research Track
- Xiaoyuan Xie, Haolin Yang, Qiang He, Lin Chen:
Towards Understanding Tool-chain Bugs in the LLVM Compiler Infrastructure. 1-11 - Rrezarta Krasniqi, Ankit Agrawal:
Analyzing and Detecting Emerging Quality-Related Concerns across OSS Defect Report Summaries. 12-23 - Yun Peng, Yu Zhang, Mingzhe Hu:
An Empirical Study for Common Language Features Used in Python Projects. 24-35 - Chunyang Ling, Yanzhen Zou, Bing Xie:
Graph Neural Network Based Collaborative Filtering for API Usage Recommendation. 36-47 - Deze Wang, Yue Yu, Shanshan Li, Wei Dong, Ji Wang, Qing Liao:
MulCode: A Multi-task Learning Approach for Source Code Understanding. 48-59 - Aakash Bansal, Zachary Eberhart, Lingfei Wu, Collin McMillan:
A Neural Question Answering System for Basic Questions about Subroutines. 60-71 - Hao He, Yulin Xu, Yixiao Ma, Yifei Xu, Guangtai Liang, Minghui Zhou:
A Multi-Metric Ranking Approach for Library Migration Recommendations. 72-83 - Xiangdong Kong, Yong Tang, Pengfei Wang, Shuning Wei, Tai Yue:
HashMTI: Scalable Mutation-based Taint Inference with Hash Records. 84-95 - Deheng Yang, Yan Lei, Xiaoguang Mao, David Lo, Huan Xie, Meng Yan:
Is the Ground Truth Really Accurate? Dataset Purification for Automated Program Repair. 96-107 - Xumei Li, Lei Sun, Ruobing Jiang, Haipeng Qu, Zhen Yan:
OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing. 108-118 - Di Wu, Xiao-Yuan Jing, Hongyu Zhang, Yuming Zhou, Baowen Xu:
Leveraging Stack Overflow to Detect Relevant Tutorial Fragments of APIs. 119-130 - Tristan Benoit, Jean-Yves Marion, Sébastien Bardin:
Binary level toolchain provenance identification with graph neural networks. 131-141 - Felipe Curty do Rego Pinto, Bruno Costa, Leonardo Murta:
Assessing time-based and range-based strategies for commit assignment to releases. 142-153 - José Carlos Pazos, Jean-Sébastien Légaré, Ivan Beschastnikh:
XSnare: Application-specific client-side cross-site scripting protection. 154-165 - Juan Manuel Florez, Oscar Chaparro, Christoph Treude, Andrian Marcus:
Combining Query Reduction and Expansion for Text-Retrieval-Based Bug Localization. 166-176 - Xin Zhao, Jeff Gray, Taylor Riché:
A Survey-Based Empirical Evaluation of Bad Smells in LabVIEW Systems Models. 177-188 - Zhiyang Zhou, Wensheng Dou, Jie Liu, Chenxin Zhang, Jun Wei, Dan Ye:
DeepCon: Contribution Coverage Testing for Deep Learning Systems. 189-200 - Zack Coker, Joshua Sunshine, Claire Le Goues:
FrameFix: Automatically Repairing Statically-Detected Directive Violations in Framework Applications. 201-212 - Yang Xiao, Zhengzi Xu, Weiwei Zhang, Chendong Yu, Longquan Liu, Wei Zou, Zimu Yuan, Yang Liu, Aihua Piao, Wei Huo:
VIVA: Binary Level Vulnerability Identification via Partial Signature. 213-224 - Bin Hu, Yijian Wu, Xin Peng, Jun Sun, Nanjie Zhan, Jun Wu:
Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures. 225-236 - Anna Maria Eilertsen, Gail C. Murphy:
The Usability (or Not) of Refactoring Tools. 237-248 - Marcel Steinbeck, Rainer Koschke:
Javadoc Violations and Their Evolution in Open-Source Software. 249-259 - Bei Wang, Meng Yan, Zhongxin Liu, Ling Xu, Xin Xia, Xiaohong Zhang, Dan Yang:
Quality Assurance for Automated Commit Message Generation. 260-271 - Sinan Wang, Ming Wen, Yepang Liu, Ying Wang, Rongxin Wu:
Understanding and Facilitating the Co-Evolution of Production and Test Code. 272-283 - Jeongju Sohn, Yasutaka Kamei, Shane McIntosh, Shin Yoo:
Leveraging Fault Localisation to Enhance Defect Prediction. 284-294 - Yihao Qin, Shangwen Wang, Kui Liu, Xiaoguang Mao, Tegawendé F. Bissyandé:
On the Impact of Flaky Tests in Automated Program Repair. 295-306 - Andrea Mambretti, Pasquale Convertini, Alessandro Sorniotti, Alexandra Sandulescu, Engin Kirda, Anil Kurmus:
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers. 307-317 - Junaed Younus Khan, Md. Tawkat Islam Khondaker, Gias Uddin, Anindya Iqbal:
Automatic Detection of Five API Documentation Smells: Practitioners' Perspectives. 318-329 - Sakib Haque, Aakash Bansal, Lingfei Wu, Collin McMillan:
Action Word Prediction for Neural Source Code Summarization. 330-341 - Ling Xu, Huanhuan Yang, Chao Liu, Jianhang Shuai, Meng Yan, Yan Lei, Zhou Xu:
Two-Stage Attention-Based Model for Code Search with Textual and Structural Features. 342-353 - Mohammed Latif Siddiq, Md. Rezwanur Rahman Jahin, Mohammad Rafid Ul Islam, Rifat Shahriyar, Anindya Iqbal:
SQLIFIX: Learning Based Approach to Fix SQL Injection Vulnerabilities in Source Code. 354-364 - Béla Vancsics, Ferenc Horváth, Attila Szatmári, Árpád Beszédes:
Call Frequency-Based Fault Localization. 365-376 - Wesley K. G. Assunção, Thelma Elita Colanzi, Luiz Carvalho, Juliana Alves Pereira, Alessandro F. Garcia, Maria Julia de Lima, Carlos Lucena:
A Multi-Criteria Strategy for Redesigning Legacy Features as Microservices: An Industrial Case Study. 377-387 - Kaylea Champion, Benjamin Mako Hill:
Underproduction: An Approach for Measuring Risk in Open Source Software. 388-399 - Noah Mauthe, Ulf Kargén, Nahid Shahmehri:
A Large-Scale Empirical Study of Android App Decompilation. 400-410 - Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai:
EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report Fields. 411-421 - Amine Barrak, Ellis E. Eghan, Bram Adams:
On the Co-evolution of ML Pipelines and Source Code - Empirical Study of DVC Projects. 422-433 - Mahmood Vahedi, Mohammad Masudur Rahman, Foutse Khomh, Gias Uddin, Giuliano Antoniol:
Summarizing Relevant Parts from Technical Videos. 434-445 - Mahmoud Alfadel, Diego Elias Costa, Emad Shihab:
Empirical Analysis of Security Vulnerabilities in Python Packages. 446-457 - Zeyu Wang, Sheng Huang, Zhongxin Liu, Meng Yan, Xin Xia, Bei Wang, Dan Yang:
Plot2API: Recommending Graphic API from Plot via Semantic Parsing Guided Neural Network. 458-469 - Xiangping Chen, Peiyong Liao, Yixin Zhang, Yuan Huang, Zibin Zheng:
Understanding Code Reuse in Smart Contracts. 470-479 - Tarek Mahmud, Meiru Che, Guowei Yang:
Android Compatibility Issue Detection Using API Differences. 480-490
ERA Track
- Sho Ogino, Yoshiki Higo, Shinji Kusumoto:
Evaluating Bug Prediction under Realistic Settings. 491-495 - Yaroslav Golubev, Viktor Poletansky, Nikita Povarov, Timofey Bryksin:
Multi-threshold token-based code clone detection. 496-500 - Hyuga Horiguchi, Itsuki Omori, Masao Ohira:
Onboarding to Open Source Projects with Good First Issues: A Preliminary Analysis. 501-505 - Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh, Qinghua Lu:
Human-Centric Issues in eHealth App Development and Usage: A Preliminary Assessment. 506-510 - Hailemelekot Demtse Tessema, Surafel Lemma Abebe:
Enhancing Just-in-Time Defect Prediction Using Change Request-based Metrics. 511-515 - Heidi Hokka, Felix Dobslaw, Jonathan Bengtsson:
Linking Developer Experience to Coding Style in Open-Source Repositories. 516-520 - Moeen Ali Naqvi, Merve Astekin, Sehrish Malik, Leon Moonen:
Adaptive Immunity for Software: Towards Autonomous Self-healing Systems. 521-525 - Mahshid Naghashzadeh, Amir Haghshenas, Ashkan Sami, David Lo:
How Do Users Answer MATLAB Questions on Q&A Sites? A Case Study on Stack Overflow and MathWorks. 526-530 - Moataz Chouchen, Ali Ouni, Raula Gaikovina Kula, Dong Wang, Patanamon Thongtanunam, Mohamed Wiem Mkaouer, Kenichi Matsumoto:
Anti-patterns in Modern Code Review: Symptoms and Prevalence. 531-535 - Aquilas Tchanjou Njomou, Alexandra Johanne Bifona Africa, Bram Adams, Marios Fokaefs:
MSR4ML: Reconstructing Artifact Traceability in Machine Learning Repositories. 536-540 - Yuki Ueda, Takashi Ishio, Kenichi Matsumoto:
Automatically Customizing Static Analysis Tools to Coding Rules Really Followed by Developers. 541-545 - Cezar Sas, Andrea Capiluppi:
Using Structural and Semantic Information to Identify Software Components. 546-550
Tool Track
- Simone Romano, Maria Caulo, Matteo Buompastore, Leonardo Guerra, Anas Mounsif, Michele Telesca, Maria Teresa Baldassarre, Giuseppe Scanniello:
G-Repo: a Tool to Support MSR Studies on GitHub. 551-555 - Carmen Coviello, Simone Romano, Giuseppe Scanniello, Giuliano Antoniol:
Gasser. 556-560 - Martin Schröer, Rainer Koschke:
Recording, Visualising and Understanding Developer Programming Behaviour. 561-566 - Daniel Althviz, Kelly Garcés, Jaime Chavarriaga:
ClarchMap: API-oriented reconstruction of architecture for cloud-based systems. 567-571 - Marcel Steinbeck, Rainer Koschke:
TinySpline: A Small, yet Powerful Library for Interpolating, Transforming, and Querying NURBS, B-Splines, and Bézier Curves. 572-576 - Mathias Birrer, Pooja Rani, Sebastiano Panichella, Oscar Nierstrasz:
Makar: A Framework for Multi-source Studies based on Unstructured Data. 577-581
Industry Track
- Pradeep Waychal, Luiz Fernando Capretz, Jingdong Jia, Daniel Varona, Yadira Lizama:
Practitioners' Testimonials about Software Testing. 582-589 - Armando Sousa, Lincoln S. Rocha, Ricardo Britto, Zhixiong Gong, Feng Lyu:
Technical Debt in Large-Scale Distributed Projects: An Industrial Case Study. 590-594 - Ruben Opdebeeck, Johan Fabry, Tim Molderez, Jonas De Bleser, Coen De Roover:
Mining for Graph-Based Library Usage Patterns in COBOL Systems. 595-599 - Hamid Khodabandehloo, Banani Roy, Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider:
A Testing Approach While Re-engineering Legacy Systems: An Industrial Case Study. 600-604 - Sávio Freire, Nicolli Rios, Boris Pérez, Darío Torres, Manoel G. Mendonça, Clemente Izurieta, Carolyn B. Seaman, Rodrigo O. Spínola:
How do Technical Debt Payment Practices Relate to the Effects of the Presence of Debt Items in Software Projects? 605-609
RENE Track
- Jacob Krüger, Gül Çalikli, Thorsten Berger, Thomas Leich:
How Explicit Feature Traces Did Not Impact Developers' Memory. 610-613 - Liming Fu, Peng Liang, Xueying Li, Chen Yang:
Will Data Influence the Experiment Results?: A Replication Study of Automatic Identification of Decisions. 614-617
Workshops
- Eero Kauhanen, Jukka K. Nurminen, Tommi Mikkonen, Matvei Pashkovskiy:
Regression Test Selection Tool for Python in Continuous Integration Process. 618-621 - Siyuan Liu, Luiz Fernando Capretz:
An Analysis of Testing Scenarios for Automated Driving Systems. 622-629 - Stefan Fischer:
A Case Study on the Evolution of Configuration Options of a Highly-Configurable Software System. 630-635 - Stefan Mohacsi, Michael Felderer:
AI-Based Enhancement of Test Models in an Industrial Model-Based Testing Tool. 636-638 - Wei Zheng, Guoliang Liu, Manqing Zhang, Xiang Chen, Wenqiao Zhao:
Research Progress of Flaky Tests. 639-646 - Wei Zheng, Abubakar Omari Abdallah Semasaba, Xiaoxue Wu, Samuel Akwasi Agyemang, Tao Liu, Yuan Ge:
Representation vs. Model: What Matters Most for Source Code Vulnerability Detection. 647-653 - Lili Bo, Jinting Lu:
Bug Question Answering with Pretrained Encoders. 654-660 - Berfin Kucuk, Eray Tuzun:
Characterizing Duplicate Bugs: An Empirical Analysis. 661-668 - Luisanna Cocco, Katiuscia Mannaro:
Blockchain in Agri-Food Traceability Systems: a Model Proposal for a Typical Italian Food Product. 669-678 - Faiz Ul Muram, Muhammad Atif Javed:
Drone-based Risk Management of Autonomous Systems Using Contracts and Blockchain. 679-688 - Sooyeon Lee, Eun-Sun Cho:
Lightweight extension of an execution environment for safer function calls in Solidity/Ethereum Virtual Machine smart contracts. 689-695 - Andrea Pinna, Gavina Baralla, Michele Marchesi, Roberto Tonelli:
Raising Sustainability Awareness in Agile Blockchain-Oriented Software Engineering. 696-700 - Giuseppe Antonio Pierro, Roberto Tonelli:
Analysis of Source Code Duplication in Ethreum Smart Contracts. 701-707 - Giuseppe Antonio Pierro:
Smart-Graph: Graphical Representations for Smart Contract on the Ethereum Blockchain. 708-714 - Nicola Uras, Marco Ortu:
Investigation of Blockchain Cryptocurrencies' Price Movements Through Deep Learning: A Comparative Analysis. 715-722 - Mohamad Kassab, Giuseppe Destefanis:
Blockchain and Contact Tracing Applications for COVID-19: The Opportunity and The Challenges. 723-730
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.