


default search action
17th ESEC / 26th SIGSOFT FSE 2018: Lake Buena Vista, FL, USA
- Gary T. Leavens, Alessandro Garcia, Corina S. Pasareanu:

Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04-09, 2018. ACM 2018, ISBN 978-1-4503-5573-5
Invited Papers
- Erik Meijer:

Behind every great deep learning framework is an even greater programming languages concept (keynote). 1 - Stéphane Glondu

, Lingxiao Jiang
, Zhendong Su:
Ten years of hunting for similar code for fun and profit (keynote). 2
Concurrency and Races
- Jie Lu, Feng Li, Lian Li, Xiaobing Feng:

CloudRaid: hunting concurrency bugs in the cloud via log-mining. 3-14 - Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu:

Testing multithreaded programs via thread speed control. 15-25 - Dileep Kini, Umang Mathur

, Mahesh Viswanathan:
Data race detection on compressed traces. 26-37 - Christoffer Quist Adamsen, Anders Møller, Saba Alimadadi, Frank Tip:

Practical AJAX race detection for JavaScript web applications. 38-48
Log Mining
- Hen Amar, Lingfeng Bao, Nimrod Busany, David Lo

, Shahar Maoz
:
Using finite-state models for log differencing. 49-59 - Shilin He, Qingwei Lin, Jian-Guang Lou, Hongyu Zhang

, Michael R. Lyu, Dongmei Zhang:
Identifying impactful service system problems via log analysis. 60-70
Performance
- Pooyan Jamshidi

, Miguel Velez, Christian Kästner, Norbert Siegmund:
Learning to sample: exploiting similarities across environments to learn performance models for configurable systems. 71-82 - Alexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye:

Performance comprehension at WiredTiger. 83-94 - Junhee Lee, Seongjoon Hong, Hakjoo Oh:

MemFix: static analysis-based repair of memory deallocation errors for C. 95-106
Software Analysis I
- Santanu Kumar Dash

, Miltiadis Allamanis, Earl T. Barr
:
RefiNym: using names to refine types. 107-117 - Michail Basios, Lingbo Li, Fan Wu

, Leslie Kanthan, Earl T. Barr
:
Darwinian data structure selection. 118-128 - Yue Li, Tian Tan, Anders Møller, Yannis Smaragdakis:

Scalability-first pointer analysis with self-tuning context-sensitivity. 129-140
Deep Learning
- Gang Zhao, Jeff Huang:

DeepSim: deep learning code functional similarity. 141-151 - Vincent J. Hellendoorn, Christian Bird, Earl T. Barr

, Miltiadis Allamanis:
Deep learning type inference. 152-162 - Jordan Henkel, Shuvendu K. Lahiri, Ben Liblit, Thomas W. Reps:

Code vectors: understanding programs through embedded abstracted symbolic traces. 163-174 - Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama:

MODE: automated neural network model debugging via state differential analysis and input selection. 175-186
Developer Studies
- Sebastian Baltes, Stephan Diehl:

Towards a theory of software development expertise. 187-200 - Achyudh Ram, Anand Ashok Sawant, Marco Castelluccio

, Alberto Bacchelli
:
What makes a code change easier to review: an empirical investigation on code change reviewability. 201-212
Testing I
- Jiayi Wei, Jia Chen, Yu Feng

, Kostas Ferles, Isil Dillig:
Singularity: pattern fuzzing for worst case complexity. 213-223 - Subhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu:

Bug synthesis: challenging bug-finding tools with deep faults. 224-234 - Rachel Tzoref-Brill, Shahar Maoz

:
Modify, enhance, select: co-evolution of combinatorial models and test plans. 235-245
Security
- James C. Davis

, Christy A. Coghlan, Francisco Servant
, Dongyoon Lee
:
The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale. 246-256 - Feng Dong, Haoyu Wang, Li Li

, Yao Guo
, Tegawendé F. Bissyandé, Tianming Liu
, Guoai Xu, Jacques Klein
:
FraudDroid: automated ad fraud detection for Android apps. 257-268
Mobile Apps
- Gang Hu, Linjie Zhu, Junfeng Yang:

AppFlow: using machine learning to synthesize robust, reusable UI tests. 269-282 - Ehsan Noei, Daniel Alencar da Costa, Ying Zou:

Winning the app production rally. 283-294
Software Maintenance I
- Yang Zhang

, Bogdan Vasilescu
, Huaimin Wang
, Vladimir Filkov:
One size does not fit all: an empirical study of containerized continuous deployment workflows. 295-306 - Feifei Tu, Jiaxin Zhu, Qimu Zheng, Minghui Zhou:

Be careful of when: an empirical study on time-related misuse of issue tracking data. 307-318 - Ying Wang, Ming Wen, Zhenwei Liu

, Rongxin Wu
, Rui Wang, Bo Yang, Hai Yu
, Zhiliang Zhu, Shing-Chi Cheung
:
Do the dependency conflicts in my project matter? 319-330
Software Analysis II
- Felix Pauck

, Eric Bodden, Heike Wehrheim:
Do Android taint analysis tools keep their promises? 331-341 - Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau:

Neural-augmented static analysis of Android communication. 342-353 - Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Pierre Baldi, Cristina V. Lopes:

Oreo: detection of clones in the twilight zone. 354-365
Symbolic Execution and Constraint Solving
- Qiuping Yi, Jeff Huang:

Concurrency verification with maximal path causality. 366-376 - Shengjian Guo, Meng Wu, Chao Wang:

Adversarial symbolic execution for detecting concurrency-related cache timing leaks. 377-388 - Sergey Mechtaev

, Alberto Griggio
, Alessandro Cimatti, Abhik Roychoudhury
:
Symbolic execution with existential second-order constraints. 389-399 - Abdulbaki Aydin, William Eiers

, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. 400-410
Mining
- Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai

:
NAR-miner: discovering negative association rules from code for bug detection. 411-422 - Daniel DeFreez, Aditya V. Thakur, Cindy Rubio-González:

Path-based function embedding and its application to error-handling specification mining. 423-433
Models
- Xiao He, Zhenjiang Hu:

Putback-based bidirectional model transformations. 434-444 - Regina Hebig

, Christoph Seidl, Thorsten Berger, John Kook Pedersen, Andrzej Wasowski
:
Model transformation languages under a magnifying glass: a controlled experiment with Xtend, ATL, and QVT. 445-455 - Di Chen, Wei Fu, Rahul Krishna, Tim Menzies

:
Applications of psychological science for actionable analytics. 456-467
Estimation and Prediction
- Liyan Song

, Leandro L. Minku
, Xin Yao
:
A novel automated approach for software effort estimation based on data augmentation. 468-479 - Qingwei Lin, Ken Hsieh, Yingnong Dang, Hongyu Zhang

, Kaixin Sui, Yong Xu, Jian-Guang Lou, Chenggang Li, Youjiang Wu, Randolph Yao, Murali Chintalapati, Dongmei Zhang:
Predicting Node failure in cloud service systems. 480-490
Repair and Synthesis
- Andrew Wood, Paige Rodeghero, Ameer Armaly, Collin McMillan:

Detecting speech act types in developer question/answer conversations during bug repair. 491-502 - Andrea Stocco

, Rahulkrishna Yandrapally, Ali Mesbah
:
Visual web test repair. 503-514 - Xujie Si, Woosuk Lee, Richard Zhang, Aws Albarghouthi, Paraschos Koutris, Mayur Naik:

Syntax-guided synthesis of Datalog programs. 515-527
Software Maintenance II
- Jackson Maddox, Yuheng Long, Hridesh Rajan

:
Large-scale study of substitutability in the presence of effects. 528-538 - Yu Gao, Wensheng Dou, Feng Qin, Chushu Gao

, Dong Wang
, Jun Wei, Ruirui Huang, Li Zhou, Yongming Wu:
An empirical study on crash recovery bugs in large-scale distributed systems. 539-550 - Thanh Van Nguyen, Ngoc M. Tran, Hung Phan, Trong Duc Nguyen, Linh H. Truong, Anh Tuan Nguyen, Hoan Anh Nguyen, Tien N. Nguyen:

Complementing global and local contexts in representing API descriptions to improve API retrieval tasks. 551-562
Probabilistic Reasoning
- Sayali Kate, John-Paul Ore

, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu:
Phys: probabilistic physical unit assignment and inconsistency detection. 563-573 - Saikat Dutta

, Owolabi Legunsen, Zixin Huang, Sasa Misailovic:
Testing probabilistic programming systems. 574-586 - Yamilet R. Serrano Llerena

, Marcel Böhme, Marc Brünink, Guoxin Su, David S. Rosenblum:
Verifying the long-run behavior of probabilistic system models in the presence of uncertainty. 587-597
Debugging and Bug Localization
- Masatomo Hashimoto

, Akira Mori, Tomonori Izumida:
Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes. 598-609 - Daniel Lehmann

, Michael Pradel:
Feedback-directed differential testing of interactive debuggers. 610-620 - Mohammad Masudur Rahman

, Chanchal K. Roy:
Improving IR-based bug localization with context-aware query reformulation. 621-632 - Titus Barik, Denae Ford, Emerson R. Murphy-Hill, Chris Parnin:

How should compilers explain problems to developers? 633-643
Ecosystems and Crowdsourcing
- Marat Valiev, Bogdan Vasilescu

, James D. Herbsleb:
Ecosystem-level determinants of sustained activity in open-source projects: a case study of the PyPI ecosystem. 644-655
Testing II
- Junjie Chen, Yiling Lou, Lingming Zhang, Jianyi Zhou, Xiaoleng Wang, Dan Hao

, Lu Zhang:
Optimizing test prioritization via test distribution analysis. 656-667 - Peipei Wang, Kathryn T. Stolee:

How well are regular expressions tested in the wild? 668-678 - Mijung Kim, Shing-Chi Cheung

, Sunghun Kim:
Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF. 679-690
Energy
- Hailong Zhang, Haowei Wu, Atanas Rountev:

Detection of energy inefficiencies in Android wear watch faces. 691-702 - Anthony Canino, Yu David Liu, Hidehiko Masuhara:

Stochastic energy optimization for mobile GPS applications. 703-713
NIER I
- Lisa Nguyen Quang Do, Eric Bodden:

Gamifying static analysis. 714-718 - Paulo Salem:

The case for experiment-oriented computing. 719-723 - Vincent J. Hellendoorn, Premkumar T. Devanbu, Mohammad Amin Alipour

:
On the naturalness of proofs. 724-728 - Andrew McNamara, Justin Smith

, Emerson R. Murphy-Hill:
Does ACM's code of ethics change ethical decision making in software development? 729-733 - Liang Xu, Wensheng Dou, Jiaxin Zhu, Chushu Gao

, Jun Wei, Tao Huang:
How are spreadsheet templates used in practice: a case study on Enron. 734-738 - Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, Jiaguang Sun:

DLFuzz: differential fuzzing testing of deep learning systems. 739-743 - Sayem Mohammad Imtiaz, Tanmay Bhowmik:

Towards data-driven vulnerability prediction for requirements. 744-748
NIER II
- Chu-Pan Wong, Jens Meinicke, Christian Kästner:

Beyond testing configurable systems: applying variational execution to automatic program repair and higher order mutation testing. 749-753 - Yuriy Brun

, Alexandra Meliou
:
Software fairness. 754-759 - Elena Sherman

, Robert Dyer
:
Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS). 760-764 - Mikhail Y. R. Gadelha, Felipe R. Monteiro, Lucas C. Cordeiro

, Denis A. Nicole:
Towards counterexample-guided k-induction for fast bug detection. 765-769 - Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng

:
Salient-class location: help developers understand code change in code review. 770-774 - Jinglei Ren, Hezheng Yin, Qingda Hu, Armando Fox, Wojciech Koszek:

Towards quantifying the development value of code contributions. 775-779 - Davoud Mougouei

, Harsha Perera
, Waqar Hussain, Rifat Ara Shams
, Jon Whittle:
Operationalizing human values in software: a research roadmap. 780-784
Formal Analysis
- Niloofar Mansoor, Jonathan A. Saddler, Bruno Vieira Resende e Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor:

Modeling and testing a family of surgical robots: an experience report. 785-790 - Darius Foo, Hendy Chua, Jason Yeo, Ming Yi Ang, Asankhaya Sharma:

Efficient static checking of library updates. 791-796
Security
- Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue

, Yang Liu
, Lihua Xu:
Are mobile banking apps secure? what can be improved? 797-802 - Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi

, Jiaguang Sun:
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation. 803-808 - Jie Liang, Yu Jiang, Yuanliang Chen, Mingzhe Wang, Chijin Zhou

, Jiaguang Sun:
PAFL: extend fuzzing optimizations of single mode to industrial parallel mode. 809-814 - Sunny Wong, Anne Woepse:

Software development challenges with air-gap isolation. 815-820
End User Programming and Financial Applications
- Vladimir Ivanov, Vladislav Pischulin, Alan Rogers, Giancarlo Succi

, Jooyong Yi, Vasilii Zorin:
Design and validation of precooked developer dashboards. 821-826 - Víctor A. Braberman, Diego Garbervetsky, Javier Godoy

, Sebastián Uchitel, Guido de Caso, Ignacio Perez, Santiago Pérez
:
Testing and validating end user programmed calculated fields. 827-832 - Jie Zhang, Shi Han, Dan Hao

, Lu Zhang, Dongmei Zhang:
Automated refactoring of nested-IF formulae in spreadsheets. 833-838 - Qingshun Wang, Lintao Gu, Minhui Xue

, Lihua Xu, Wenyu Niu, Liang Dou, Liang He, Tao Xie:
FACTS: automated black-box testing of FinTech systems. 839-844
Test Automation
- Ahmet Çelik, Young-Chul Lee, Milos Gligoric:

Regression test selection for TizenRT. 845-850 - Vidroha Debroy, Senecca Miller, Lance Brimble:

Building lean continuous integration and delivery pipelines by applying DevOps principles: a case study at Varidesk. 851-856 - Md Tajmilur Rahman, Peter C. Rigby:

The impact of failing, flaky, and high failure tests on the number of crash reports associated with Firefox builds. 857-862
Testing
- Muhammad Ali Gulzar, Siman Wang, Miryung Kim:

BigSift: automated debugging of big data analytics in data-intensive scalable computing. 863-866 - Hongxu Chen, Yuekang Li

, Bihuan Chen, Yinxing Xue, Yang Liu
:
FOT: a versatile, configurable, extensible fuzzing framework. 867-870 - Rico Angell, Brittany Johnson, Yuriy Brun

, Alexandra Meliou
:
Themis: automatically testing software for discrimination. 871-875 - Andrea Stocco

, Rahulkrishna Yandrapally, Ali Mesbah
:
Vista: web test repair using computer vision. 876-879
Bugs
- Anastasia Reinhardt

, Tianyi Zhang, Mihir Mathur, Miryung Kim:
Augmenting stack overflow with API usage patterns mined from GitHub. 880-883 - Junwen Yang, Cong Yan, Pranav Subramaniam, Shan Lu, Alvin Cheung

:
PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE. 884-887 - Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid:

SketchFix: a tool for automated program repair approach using lazy candidate generation. 888-891 - Louis-Philippe Querel, Peter C. Rigby:

WarningsGuru: integrating statistical bug models with static analysis to provide timely and specific bug warnings. 892-895
Mining
- Tien-Duy B. Le, Lingfeng Bao, David Lo

:
DSM: a specification mining tool using recurrent neural network based language model. 896-899 - Han Liu, Zhiqiang Yang, Chao Liu, Yu Jiang, Wenqi Zhao, Jiaguang Sun:

EClone: detect semantic clones in Ethereum via symbolic transaction sketch. 900-903 - Cuiyun Gao, Jichuan Zeng, David Lo

, Chin-Yew Lin, Michael R. Lyu, Irwin King
:
INFAR: insight extraction from app reviews. 904-907 - Davide Spadini, Maurício Finavaro Aniche, Alberto Bacchelli:

PyDriller: Python framework for mining software repositories. 908-911
Models
- Daejun Park, Yi Zhang, Manasvi Saxena

, Philip Daian, Grigore Rosu:
A formal verification tool for Ethereum VM bytecode. 912-915 - Kaiyuan Wang, Allison Sullivan

, Darko Marinov, Sarfraz Khurshid:
ASketch: a sketching framework for Alloy. 916-919 - Ferhat Erata

, Arda Goknil, Ivan Kurtev
, Bedir Tekinerdogan
:
AlloyInEcore: embedding of first-order relational logic into meta-object facility for automated model reasoning. 920-923 - Lingfeng Bao, Zhenchang Xing, Xin Xia

, David Lo
, Shanping Li:
VT-revolution: interactive programming tutorials made possible. 924-927
Doctorial Symposium
- Davide Spadini:

Practices and tools for better software testing. 928-931 - Mattia Fazzini

:
Automated support for mobile application testing and maintenance. 932-935 - Sarah Fakhoury:

Moving towards objective measures of program comprehension. 936-939 - Mitra Bokaei Hosseini:

Semantic inference from natural language privacy policies and Android code. 940-943 - Cheng Zhou:

Intelligent bug fixing with software bug knowledge graph. 944-947 - Afsoon Afzal:

Quality assurance automation in autonomous systems. 948-951 - Caius Brindescu:

How do developers resolve merge conflicts? an investigation into the processes, tools, and improvements. 952-955
Student Research Competition
- Bruno Lima

:
Automated scenario-based integration testing of distributed systems. 956-958 - Xinyuan Sun:

Towards learning-augmented languages. 959-961 - Kamill Gusmanov:

On the adoption of neural networks in modeling software reliability. 962-964 - Ameya Ketkar:

Type migration in large-scale code bases. 965-967 - Francesco Nocera:

Reshaping distributed agile and adaptive development environment. 968-970 - Irina Erofeeva:

How Dance(Sport) can help to produce better software. 971-973 - Son Nguyen:

Feature-interaction aware configuration prioritization. 974-976 - Vaastav Anand:

Dara: hybrid model checking of distributed systems. 977-979 - David A. Tomassi:

Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs. 980-982 - Daniel DeFreez:

Mining error-handling specifications for systems software. 983-985 - Neill Robson:

Diversity and decorum in open source communities. 986-987

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














