Write a Blog >>
Dates
Tue 11 Oct 2022
Wed 12 Oct 2022
Thu 13 Oct 2022
Tracks
ASE Doctoral Symposium
ASE Industry Showcase
ASE Journal-first Papers
ASE Keynotes
ASE Late Breaking Results
ASE MIP Awards
ASE NIER Track
ASE Plenary
ASE Research Papers
ASE Social
ASE Tool Demonstrations
Plenary
Hide plenary sessions
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 11 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:30 - 10:00
08:30
30m
Day opening
Welcome from the Chairs
Plenary
P: Julia Rubin University of British Columbia, Canada, P: Shahar Maoz Tel Aviv University, Israel, G: Marouane Kessentini Oakland University, USA
09:00
60m
Keynote
Autonomous Systems: How to address the Dilemma between Autonomy and Safety
Keynotes
K: Lionel Briand University of Luxembourg; University of Ottawa
10:30 - 12:30
Technical Session 1 - AI for SE IResearch Papers / Industry Showcase at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:30
20m
Research paper
B-AIS: An Automated Process for Black-box Evaluation of AI-enabled Software Systems against Domain Semantics
Research Papers
Hamed Barzamini , Mona Rahimi Northern Illinois University
11:10
20m
Research paper
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft DesignVirtual
Research Papers
Houssem Ben Braiek École Polytechnique de Montréal, Ali Tfaily Bombardier Aerospace, Foutse Khomh Polytechnique Montréal, Thomas Reid , Ciro Guida Bombardier Aerospace
Pre-print
11:30
20m
Research paper
Unveiling Hidden DNN Defects with Decision-Based Metamorphic TestingVirtual
Research Papers
Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology
11:50
20m
Research paper
Patching Weak Convolutional Neural Network Models through Modularization and CompositionVirtual
Research Papers
Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang University of Newcastle
12:10
20m
Research paper
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software DeploymentVirtual
Research Papers
Jie Zhu Peking University, Leye Wang Peking University, Xiao Han Shanghai University of Finance and Economics
DOI Pre-print
10:30 - 12:30
Technical Session 2 - Debugging and TroubleshootingResearch Papers / Industry Showcase / Late Breaking Results at Banquet A
Chair(s): Andrew Begel Carnegie Mellon University, Software and Societal Systems Department
10:30
20m
Research paper
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints
Research Papers
Arianna Blasi Meta; prev. Università della Svizzera italiana, Alessandra Gorla IMDEA Software Institute, Michael D. Ernst University of Washington, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology
10:50
20m
Research paper
CoditT5: Pretraining for Source Code and Natural Language Editing
Research Papers
Jiyang Zhang University of Texas at Austin, Sheena Panthaplackel UT Austin, Pengyu Nie University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Milos Gligoric University of Texas at Austin
Pre-print
11:30
20m
Research paper
Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness
Research Papers
Haoye Tian University of Luxembourg, Xunzhu Tang University of Luxembourg, Andrew Habib SnT, University of Luxembourg, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xin Xia Huawei Software Engineering Application Technology Lab, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg
Pre-print
10:30 - 12:30
Technical Session 3 - Fuzzing IResearch Papers / Tool Demonstrations / NIER Track at Banquet B
Chair(s): Aravind Machiry Purdue University
10:30
20m
Research paper
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
Research Papers
Yang Sun Singapore Management University, Singapore, Chris Poskitt Singapore Management University, Jun Sun Singapore Management University, Yuqi Chen ShanghaiTech University, China, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc
DOI Pre-print
10:50
20m
Research paper
Fuzzle: Making a Puzzle for FuzzersACM SIGSOFT Distinguished Paper Award
Research Papers
Haeun Lee KAIST, Soomin Kim KAIST, Sang Kil Cha KAIST, South Korea
11:20
20m
Research paper
HTFuzz: Heap Operation Sequence Sensitive FuzzingVirtual
Research Papers
Yuanping Yu Institute of Software, Chinese Academy of Sciences, Xiangkun Jia Institute of Software Chinese Academy of Sciences, Yuwei Liu Institute of Software, Chinese Academy of Sciences, Yanhao Wang Qi An Xin Group Corp., Qian Sang Institute of Software, Chinese Academy of Sciences, Chao Zhang Tsinghua University, Purui Su Institute of Software/CAS China
11:40
20m
Research paper
Efficient Greybox Fuzzing to Detect Memory ErrorsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Jinsheng Ba National University of Singapore, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
12:00
20m
Research paper
Griffin: Grammar-Free DBMS FuzzingVirtual
Research Papers
Jingzhou Fu School of Software, Tsinghua University, Jie Liang School of Software, Tsinghua University, Zhiyong Wu Tsinghua University, China, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University
10:30 - 12:30
Technical Session 4 - Mobile Apps IResearch Papers / NIER Track / Industry Showcase / Journal-first Papers / Tool Demonstrations at Gold A
Chair(s): Jacques Klein University of Luxembourg
10:30
20m
Research paper
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
Research Papers
Xiaoyu Sun Monash University, Xiao Chen Monash University, Yanjie Zhao Monash University, Pei Liu Monash University, John Grundy Monash University, Li Li Monash University
DOI Pre-print
11:40
20m
Research paper
MalWhiteout: Reducing Label Errors in Android Malware DetectionVirtual
Research Papers
Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Yulei Sui University of Technology Sydney
12:10
20m
Research paper
A Comprehensive Evaluation of Android ICC Resolution TechniquesVirtual
Research Papers
Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Shixin Zhang Beijing Jiaotong University, China, Yepang Liu Southern University of Science and Technology, Xi Deng Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI Pre-print
14:00 - 15:30
Technical Session 5 - Code AnalysisTool Demonstrations / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Vahid Alizadeh DePaul University
14:00
20m
Research paper
Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationACM SIGSOFT Distinguished Paper Award
Research Papers
Oskar Haarklou Veileborg Aarhus University, Georgian-Vlad Saioc Aarhus University, Anders Møller Aarhus University
Link to publication
15:10
20m
Research paper
SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsVirtual
Research Papers
He Ye KTH Royal Institute of Technology, Matias Martinez Université Polytechnique Hauts-de-France, Xiapu Luo Hong Kong Polytechnic University, Tao Zhang Macau University of Science and Technology (MUST), Martin Monperrus KTH Royal Institute of Technology
14:00 - 15:30
Technical Session 6 - Source Code ManipulationNIER Track / Research Papers / Late Breaking Results at Banquet A
Chair(s): Collin McMillan University of Notre Dame
14:10
20m
Research paper
Automated Feedback Generation for Competition-Level Code
Research Papers
Jialu Zhang Yale University, De Li The MathWorks, Inc., John C. Kolesar Yale University, Hanyuan Shi N/A, Ruzica Piskac Yale University
14:50
20m
Research paper
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Aryaz Eghbali University of Stuttgart, Germany, Michael Pradel University of Stuttgart
15:10
20m
Research paper
Low-Resources Project-Specific Code SummarizationVirtual
Research Papers
Rui Xie Peking University, Tianxiang Hu Peking University, Wei Ye Peking University, Shikun Zhang Peking University
14:00 - 15:30
Technical Session 7 - Fuzzing IIResearch Papers at Banquet B
Chair(s): Karine Even-Mendoza Imperial College London
14:00
20m
Research paper
So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackVirtual
Research Papers
Clement Poncelet Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Nicolas Tsiftes RISE Research Institutes of Sweden
DOI Pre-print
14:20
20m
Research paper
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures
Research Papers
Ashwin Kallingal Joshy Iowa State University, Wei Le Iowa State University
14:40
20m
Research paper
QATest: A Uniform Fuzzing Framework for Question Answering SystemsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zixi Liu Nanjing University, Yang Feng Nanjing University, Yining Yin Nanjing University, China, Jingyu Sun Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University
15:00
20m
Research paper
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingVirtual
Research Papers
Jianzhong Su Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Lingjun Zhao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
14:00 - 15:30
Technical Session 8 - Mobile Apps IIResearch Papers / Tool Demonstrations at Gold A
Chair(s): Wei Yang University of Texas at Dallas
14:00
20m
Research paper
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps
Research Papers
Forough Mehralian University of California at Irvine, Navid Salehnamadi University of California at Irvine, Syed Fatiul Huq University of California, Irvine, Sam Malek University of California at Irvine, USA
14:20
20m
Research paper
Groundhog: An Automated Accessibility Crawler for Mobile Apps
Research Papers
Navid Salehnamadi University of California at Irvine, Forough Mehralian University of California at Irvine, Sam Malek University of California at Irvine, USA
14:40
20m
Research paper
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews
Research Papers
Fahimeh Ebrahimi Louisiana State University, Anas "Nash" Mahmoud Louisiana State University
15:10
20m
Research paper
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsVirtual
Research Papers
Yuhui Su Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Shoubin Li ISCAS, Qing Wang Institute of Software at Chinese Academy of Sciences
Pre-print

Wed 12 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:00 - 09:30
08:00
15m
Paper
Modeling bug report quality
MIP Awards
A: Pieter Hooimeijer Engineering Manager, Facebook Inc., A: Westley Weimer University of Michigan
Link to publication DOI
08:15
15m
Paper
Towards automatically generating summary comments for Java methods
MIP Awards
A: Giriprasad Sridhara IBM Research Labs, A: Emily Hill Drew University, A: Divya Muppaneni , A: Lori Pollock University of Delaware, USA, A: K. Vijay-Shanker
Link to publication DOI
08:30
60m
Keynote
From Automating Software Engineering to Empowering Software Developers
Keynotes
K: Margaret-Anne Storey University of Victoria
10:00 - 12:00
Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East
Chair(s): Wei Yang University of Texas at Dallas
10:00
20m
Research paper
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage
Research Papers
Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London
10:20
20m
Research paper
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Research Papers
Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano
DOI Pre-print
11:00
20m
Research paper
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Research Papers
Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland
11:20
20m
Research paper
An Empirical Study of Automation in Software Security Patch Management
Research Papers
Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide
11:40
20m
Research paper
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Research Papers
Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore
10:00 - 12:00
Technical Session 10 - Testing IResearch Papers / Industry Showcase / Tool Demonstrations at Banquet A
Chair(s): Gordon Fraser University of Passau
10:00
20m
Research paper
Inline Tests
Research Papers
Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric University of Texas at Austin
Pre-print
10:30
20m
Research paper
Sorry, I don't Understand: Improving Voice User Interface Testing
Research Papers
Emanuela Guglielmi University of Molise, Giovanni Rosa University of Molise, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise
11:10
20m
Research paper
VITAS : Guided Model-based VUI Testing of VPA AppsVirtual
Research Papers
Suwan Li Nanjing University, Lei Bu Nanjing University, Guangdong Bai University of Queensland, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Hanlin Wei The University of Queensland
10:00 - 12:00
Technical Session 12 - Builds and VersionsResearch Papers at Banquet B
Chair(s): Yi Li Nanyang Technological University
10:00
20m
Research paper
HyperAST: Enabling Efficient Analysis of Software Histories at ScaleACM SIGSOFT Distinguished Paper Award
Research Papers
Quentin Le-dilavrec Univ. Rennes, IRISA, INRIA, Djamel Eddine Khelladi CNRS, France, Arnaud Blouin Univ Rennes, INSA Rennes, Inria, CNRS, IRISA, Jean-Marc Jézéquel Univ Rennes - IRISA
10:20
20m
Research paper
Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic DifferencingACM SIGSOFT Distinguished Paper Award
Research Papers
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Bihuan Chen Fudan University, China, Yang Liu Nanyang Technological University
10:40
20m
Research paper
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis
Research Papers
Sheikh Shadab Towqir Virginia Tech, Bowen Shen Virginia Tech, Muhammad Ali Gulzar Virginia Tech, USA, Na Meng Virginia Tech
11:00
20m
Research paper
SmartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesVirtual
Research Papers
Chao Wang School of Informatics, Xiamen University, Rongxin Wu Xiamen University, Haohao Song School of Informatics, Xiamen University, Jiwu Shu School of Informatics, Xiamen University, Guoqing Li Xiamen Meiya Pico Information Co., Ltd.
11:20
20m
Research paper
Accelerating Build Dependency Error Detection via Virtual BuildVirtual
Research Papers
Rongxin Wu Xiamen University, Minglei Chen School of Informatics, Xiamen University, Chengpeng Wang The Hong Kong University of Science and Technology, Gang Fan Ant Group, Jiguang Qiu Xiamen Meiya Pico Information Co., Ltd., Charles Zhang Hong Kong University of Science and Technology
11:40
20m
Research paper
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsVirtual
Research Papers
Chen Zhang Fudan University, Bihuan Chen Fudan University, China, Junhao Hu Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University, China
10:00 - 12:00
Technical Session 11 - Analysis and TypesResearch Papers / NIER Track / Late Breaking Results at Gold A
Chair(s): Thiago Ferreira University of Michigan - Flint
10:00
20m
Research paper
SA4U: Practical Static Analysis for Unit Type Error Detection
Research Papers
Max Taylor The Ohio State University, Johnathon Aurand The Ohio State University, Feng Qin Ohio State University, USA, Xiaorui Wang The Ohio State University, Brandon Henry Tangram Flex, Xiangyu Zhang Purdue University
10:30
20m
Research paper
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models
Research Papers
José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Martin Weyssow DIRO, Université de Montréal, Jesús Sánchez Cuadrado , Houari Sahraoui Université de Montréal
Link to publication Pre-print
11:00
20m
Research paper
Static Type Recommendation for PythonVirtual
Research Papers
Ke Sun Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University
11:20
20m
Research paper
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeVirtual
Research Papers
Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhiqiang Yuan School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing Australian National University, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
11:40
20m
Research paper
Jasmine: A Static Analysis Framework for Spring Core TechnologiesVirtual
Research Papers
Miao Chen Beijing University of Posts and Telecommunications, Tengfei Tu Beijing University of Posts and Telecommunications, Hua Zhang Beijing University of Posts and Telecommunications, Qiaoyan Wen Beijing University of Posts and Telecommunications, Weihang Wang University of Southern California
13:30 - 15:30
Technical Session 13 - Application DomainsNIER Track / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
13:30
20m
Research paper
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications
Research Papers
Hoan Anh Nguyen Amazon, Hung Phan , Samantha Syeda Khairunnesa Bradley University, Son Nguyen The University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Hridesh Rajan Iowa State University, Tien N. Nguyen University of Texas at Dallas
14:00
20m
Research paper
Automatically Detecting Visual Bugs in HTML5 <canvas> Games
Research Papers
Finlay Macklon University of Alberta, Mohammad Reza Taesiri University of Alberta, Markos Viggiato University of Alberta, Stefan Antoszko University of Alberta, Natalia Romanova Prodigy Education, Dale Paas Prodigy Education, Cor-Paul Bezemer University of Alberta
14:30
20m
Research paper
Empirical Study of System Resources Abused by IoT AttackersVirtual
Research Papers
Zijing Yin Tsinghua University, Yiwen Xu Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
15:10
20m
Research paper
Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsVirtual
Research Papers
Ju Qian Nanjing University of Aeronautics and Astronautics, Yingwei Ma Nanjing University of Aeronautics and Astronautics, Chenghao Lin Nanjing University of Aeronautics and Astronautics, Lin Chen Nanjing University
13:30 - 15:30
Technical Session 14 - Bug Prediction and LocalizationJournal-first Papers / Research Papers / NIER Track / Industry Showcase at Banquet A
Chair(s): David Lo Singapore Management University
13:30
20m
Research paper
How Useful is Code Change Information for Fault Localization in Continuous Integration?
Research Papers
An Ran Chen Concordia University, Tse-Hsun (Peter) Chen Concordia University, Junjie Chen Tianjin University
14:40
20m
Research paper
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationVirtual
Research Papers
Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Xihao Zhang School of Computer Science, Wuhan University, Quanming Liu School of Computer Science, Wuhan University, Ruizhi Gao Sonos Inc.
13:30 - 15:30
Technical Session 15 - Compilers and LanguagesJournal-first Papers / Research Papers / Industry Showcase at Banquet B
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
13:30
20m
Research paper
Cornucopia: A Framework for Feedback Guided Generation of Binaries
Research Papers
Vidush Singhal Purdue University, Akul Abhilash Pillai Purdue University, Charitha Saumya Purdue University, Milind Kulkarni Purdue University, Aravind Machiry Purdue University
14:10
20m
Research paper
Compiler Testing using Template Java ProgramsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhiqiang Zang University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin
DOI Pre-print
14:50
20m
Research paper
TransRepair: Context-aware Program Repair for Compilation ErrorsVirtual
Research Papers
Xueyang Li SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Shangqing Liu Nanyang Technological University, Ruitao Feng Nanyang Technological University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Singapore, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University
15:10
20m
Research paper
Enriching Compiler Testing with Real Program from Bug ReportVirtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
13:30 - 15:30
Technical Session 16 - Software VulnerabilitiesResearch Papers / Journal-first Papers at Gold A
Chair(s): Mohamed Wiem Mkaouer Rochester Institute of Technology
13:30
20m
Research paper
Data Leakage in Notebooks: Static Detection and Better Processes
Research Papers
Chenyang Yang , Rachel A Brower-Sinning Carnegie Mellon Software Engineering Institute, Grace Lewis Carnegie Mellon Software Engineering Institute, Christian Kästner Carnegie Mellon University
13:50
20m
Research paper
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeVirtual
Research Papers
Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon
Pre-print
14:30
20m
Research paper
Precise (Un)Affected Version Analysis for Web VulnerabilitiesVirtual
Research Papers
ShiYoukun Fudan University, Yuan Zhang Fudan University, Tianhan Luo Fudan University, Xiangyu Mao Fudan University, Min Yang Fudan University
14:50
20m
Research paper
Leveraging Practitioners' Feedback to Improve a Security LinterVirtual
Research Papers
Sofia Reis Instituto Superior Técnico, U. Lisboa & INESC-ID, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Marcelo d'Amorim Federal University of Pernambuco, Daniel Fortunato INESC-ID, University of Porto
15:10
20m
Research paper
Insight: Exploring Cross-Ecosystem Vulnerability ImpactsVirtual
Research Papers
Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, China, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
16:00 - 18:00
Technical Session 19 - Formal Methods and Models IResearch Papers / Journal-first Papers / Tool Demonstrations at Ballroom C East
Chair(s): Michalis Famelis Université de Montréal
16:00
20m
Research paper
Automatic Comment Generation via Multi-Pass Deliberation
Research Papers
Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences
16:40
20m
Research paper
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksVirtual
Research Papers
Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Si Liu ETH Zurich, Jing Liu East China Normal University, Min Zhang East China Normal University
17:00
20m
Research paper
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationVirtual
Research Papers
Yunfan Zhang Peking University, Ruidong Zhu Peking University, Yingfei Xiong Peking University, Tao Xie Peking University
17:40
20m
Research paper
Detecting Semantic Code Clones by Building AST-based Markov Chains ModelVirtual
Research Papers
Yueming Wu Nanyang Technological University, Siyue Feng Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
16:00 - 18:00
Technical Session 18 - Testing IIResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
16:10
20m
Research paper
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems
Research Papers
Tomasz Kuchta Samsung Electronics, Bartosz Zator Samsung Electronics
DOI Pre-print
17:00
20m
Research paper
Natural Test Generation for Precise Testing of Question Answering SoftwareVirtual
Research Papers
Qingchao Shen Tianjin University, Junjie Chen Tianjin University, Jie M. Zhang King's College London, Haoyu Wang College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Menghan Tian College of Intelligence and Computing, Tianjin University
Pre-print
17:40
20m
Research paper
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationVirtual
Research Papers
Zhichao Zhou School of Information Science and Technology, ShanghaiTech University, Yuming Zhou Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University, Yutian Tang ShanghaiTech University
DOI Pre-print
16:00 - 18:00
Technical Session 17 - SE for AIResearch Papers / Late Breaking Results / NIER Track / Tool Demonstrations at Banquet B
Chair(s): Tim Menzies North Carolina State University
16:10
20m
Research paper
A Light Bug Triage Framework for Applying Large Pre-trained Language Model
Research Papers
Jaehyung Lee Pohang University of Science and Technology, Pohang , Hwanjo Yu Pohang University of Science and Technology, Pohang, HanKisun Samsung Research
16:40
20m
Research paper
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureACM SIGSOFT Distinguished Paper Award
Research Papers
Vikram Nitin Columbia University, Shubhi Asthana IBM Research, Baishakhi Ray Columbia University, Rahul Krishna IBM Research
Pre-print
17:10
20m
Research paper
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsVirtual
Research Papers
Xianchang Luo University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Zhenchang Xing Australian National University, Jiamou Sun Australian National University
16:00 - 18:00
Technical Session 20 - Web, Cloud, NetworkingJournal-first Papers / Late Breaking Results / Research Papers / Tool Demonstrations / Industry Showcase at Gold A
Chair(s): Karine Even-Mendoza Imperial College London
16:30
20m
Research paper
Exploiting Epochs and Symmetries in Analysing MPI Programs
Research Papers
Rishabh Ranjan IIT Delhi, Ishita Agrawal IIT Delhi, Subodh Sharma IIT Delhi
17:10
20m
Research paper
Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsVirtual
Research Papers
Zilong He Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yu Luo Tencent Inc., Qiuyu Yan Tencent Inc., Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Guangba  Yu Sun Yat-Sen University, Fangyuan Li Tencent Inc.

Thu 13 Oct

Displayed time zone: Eastern Time (US & Canada) change

10:00 - 12:00
Technical Session 23 - SecurityTool Demonstrations / Journal-first Papers / Late Breaking Results / Research Papers at Ballroom C East
Chair(s): John-Paul Ore North Carolina State University
11:10
20m
Research paper
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachVirtual
Research Papers
Zhuo Zhang Chongqing University, Yan Lei Chongqing University, Meng Yan Chongqing University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Jiachi Chen Sun Yat-Sen University, Shangwen Wang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
10:00 - 12:00
Technical Session 22 - Code Summarization and RecommendationResearch Papers / NIER Track / Journal-first Papers / Industry Showcase at Banquet A
Chair(s): Houari Sahraoui Université de Montréal
10:00
20m
Research paper
Identifying Solidity Smart Contract API Documentation Errors
Research Papers
Chenguang Zhu The University of Texas at Austin, Ye Liu Nanyang Technological University, Xiuheng Wu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University
Pre-print
10:30
20m
Research paper
Answer Summarization for Technical Queries: Benchmark and New Approach
Research Papers
Chengran Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Ferdian Thung Singapore Management University, Yucen Shi Singapore Management University, Ting Zhang Singapore Management University, Zhou Yang Singapore Management University, Xin Zhou , Jieke Shi Singapore Management University, Junda He Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University
11:40
20m
Research paper
Which Exception Shall We Throw?Virtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
10:00 - 12:00
Technical Session 21 - SE for AI IIResearch Papers / Late Breaking Results / NIER Track / Journal-first Papers at Banquet B
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:00
20m
Research paper
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks
Research Papers
Simin Chen University of Texas at Dallas, USA, Mirazul Haque UT Dallas, Cong Liu University of Texas at Dallas, USA, Wei Yang University of Texas at Dallas
10:30
20m
Research paper
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Xiaoyuan Xie School of Computer Science, Wuhan University, China, Pengbo Yin School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University
11:10
20m
Research paper
Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsVirtual
Research Papers
Lili Quan Tianjin University, Qianyu Guo College of Intelligence and Computing, Tianjin University, Xiaofei Xie Singapore Management University, Singapore, Sen Chen Tianjin University, Xiaohong Li TianJin University, Yang Liu Nanyang Technological University
11:40
20m
Research paper
Toward Improving the Robustness of Deep Learning Models via Model TransformationVirtual
Research Papers
Yingyi Zhang College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Jiajun Jiang Tianjin University, Hanmo You College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University
10:00 - 12:00
Technical Session 24 - Human AspectsResearch Papers / Journal-first Papers / NIER Track at Gold A
Chair(s): Silvia Abrahão Universitat Politècnica de València
10:00
20m
Research paper
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing
Research Papers
Yanqi Su Australian National University, Zheming Han , Zhenchang Xing Australian National University, Xin Xia Huawei Software Engineering Application Technology Lab, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
10:20
20m
Research paper
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication
Research Papers
Mia Mohammad Imran Virginia Commonwealth University, Yashasvi Jain Drexel University, Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University
Pre-print
13:30 - 15:30
Technical Session 25 - Software RepairsNIER Track / Research Papers / Tool Demonstrations at Ballroom C East
Chair(s): Yannic Noller National University of Singapore
13:30
20m
Research paper
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications
Research Papers
Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Guolong Zheng University of Nebraska Lincoln, Hamid Bagheri University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
13:50
20m
Research paper
Repairing Failure-inducing Inputs with Input Reflection
Research Papers
Yan Xiao National University of Singapore, Yun Lin National University of Singapore, Ivan Beschastnikh University of British Columbia, Changsheng SUN , David Rosenblum George Mason University, Jin Song Dong National University of Singapore
14:20
20m
Research paper
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairVirtual
Research Papers
Deheng Yang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xuezheng Xu Academy of Military Sciences, Beijing, China, Yan Lei Chongqing University, David Lo Singapore Management University, Jiayu He National University of Defense Technology, Changsha, China
14:50
20m
Research paper
StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair SystemsVirtual
Research Papers
Wenkang Zhong State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongliang Ge State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongfei Ai State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Chuanyi Li State Key Laboratory for Novel Software Technology, Nanjing University, Kui Liu Huawei Software Engineering Application Technology Lab, Jidong Ge , Bin Luo Software Institute, Nanjing University
13:30 - 15:30
Technical Session 27 - Dynamic and Concolic AnalysisResearch Papers / NIER Track / Journal-first Papers at Banquet A
Chair(s): ThanhVu Nguyen George Mason University
13:30
20m
Research paper
LISSA: Lazy Initialization with Specialized Solver Aid
Research Papers
Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Alessandra Gorla IMDEA Software Institute, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
14:00
20m
Research paper
SymFusion: Hybrid Instrumentation for Concolic Execution
Research Papers
Emilio Coppa Sapienza University of Rome, Heng Yin UC Riverside, Camil Demetrescu Sapienza University Rome
Pre-print
14:20
20m
Research paper
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel
Research Papers
David Fernandez-Amoros UNED, Ruben Heradio UNED (Universidad Nacional de Educacion a Distancia), Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Alexander Egyed Johannes Kepler University Linz
15:00
20m
Research paper
Prioritized Constraint-Aided Dynamic Partial-Order ReductionVirtual
Research Papers
Jie Su Xidian University, Cong Tian Xidian University, Zuchao Yang Xidian University, Jiyu Yang Xidian University, Bin Yu Xidian University, Zhenhua Duan Xidian University
13:30 - 15:30
Technical Session 26 - Testing IIIResearch Papers / Industry Showcase at Banquet B
Chair(s): Owolabi Legunsen Cornell University
13:30
20m
Research paper
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing
Research Papers
Tahmid Rafi University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio
13:50
20m
Research paper
Neuroevolution-Based Generation of Tests and Oracles for Games
Research Papers
Patric Feldmeier University of Passau, Gordon Fraser University of Passau
Pre-print
14:30
20m
Research paper
Learning to Construct Better Mutation FaultsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Qihao Zhu Peking University, Junjie Yang College of Intelligence and Computing, Tianjin University, Lingming Zhang University of Illinois at Urbana-Champaign
DOI Pre-print
14:50
20m
Research paper
Differentially Testing Database Transactions for Fun and ProfitVirtual
Research Papers
Ziyu Cui Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qianwang Dai Institute of Software, Chinese Academy of Sciences, Jiansen Song , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
13:30 - 15:30
Technical Session 28 - Safety-Critical and Self-Adaptive SystemsIndustry Showcase / Tool Demonstrations / Research Papers / Late Breaking Results / NIER Track at Room 128
Chair(s): Eunsuk Kang Carnegie Mellon University
13:40
20m
Research paper
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsVirtual
Research Papers
Haoxiang Tian Institute of Software, Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences, China, Jiren Yan Institute of Software, Chinese Academy of Sciences, Yan Jiang Institute of Software, Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Shuo Li Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
14:00
20m
Research paper
Consistent Scene Graph Generation by Constraint OptimizationVirtual
Research Papers
Boqi Chen McGill University, Kristóf Marussy Budapest University of Technology and Economics, Sebastian Pilarski McGill University, Oszkár Semeráth Budapest University of Technology and Economics, Daniel Varro McGill University / Budapest University of Technology and Economics
16:00 - 18:00
Technical Session 29 - AI for SE IIResearch Papers / Journal-first Papers at Ballroom C East
Chair(s): Tim Menzies North Carolina State University
16:00
20m
Research paper
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?
Research Papers
Cedric Richter University of Oldenburg, Jan Haltermann University of Oldenburg, Marie-Christine Jakobs Technical University of Darmstadt, Felix Pauck Paderborn University, Germany, Stefan Schott Paderborn University, Heike Wehrheim University of Oldenburg
DOI Pre-print Media Attached File Attached
16:20
20m
Research paper
Learning Contract Invariants Using Reinforcement Learning
Research Papers
Junrui Liu University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Bryan Tan Amazon Web Services, Işıl Dillig University of Texas at Austin, Yu Feng University of California at Santa Barbara
16:40
20m
Research paper
Compressing Pre-trained Models of Code into 3 MB
Research Papers
Jieke Shi Singapore Management University, Zhou Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Hong Jin Kang Singapore Management University, Singapore, David Lo Singapore Management University
DOI Pre-print Media Attached
17:00
20m
Research paper
A Transferable Time Series Forecasting Service using Deep Transformer model for Online SystemsVirtual
Research Papers
Tao Huang Tencent, Pengfei Chen Sun Yat-Sen University, Jingrun Zhang School of Data and Computer Science, Sun Yat-sen University, Ruipeng Li Tencent, Rui Wang Tencent
17:40
20m
Research paper
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsVirtual
Research Papers
Zhong Li Nanjing, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University
16:00 - 18:00
Technical Session 31 - Code Similarities and RefactoringResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Hua Ming Oakland University
16:00
20m
Research paper
Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications
Research Papers
Alexi Turcotte Northeastern University, Mark W. Aldrich Tufts University, Frank Tip Northeastern University
16:40
20m
Research paper
Learning to Synthesize Relational Invariants
Research Papers
Jingbo Wang University of Southern California, Chao Wang USC
17:10
20m
Research paper
TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionVirtual
Research Papers
Yutao Hu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Junru Peng Xidian University, Yueming Wu Nanyang Technological University, Junjie Shan KTH Royal Institute of Technology, Hai Jin Huazhong University of Science and Technology
17:40
20m
Research paper
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingVirtual
Research Papers
Qi Xin Wuhan University, Qirun Zhang Georgia Institute of Technology, Alessandro Orso Georgia Tech
16:00 - 18:00
Technical Session 32 - Formal Methods and Models IITool Demonstrations / Journal-first Papers / Research Papers at Banquet B
Chair(s): Khouloud Gaaloul University of Michigan - Dearborn
16:10
20m
Research paper
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses
Research Papers
Elias Kuiter Otto-von-Guericke-University Magdeburg, Sebastian Krieter University of Ulm, Chico Sundermann University of Ulm, Thomas Thüm University of Ulm, Gunter Saake University of Magdeburg, Germany
16:50
20m
Research paper
Finding and Understanding Incompleteness Bugs in SMT SolversVirtual
Research Papers
Mauro Bringolf ETH Zurich, Dominik Winterer ETH Zurich, Zhendong Su ETH Zurich
17:10
20m
Research paper
Checking LTL Satisfiability via End-to-end LearningVirtual
Research Papers
Weilin Luo School of Computer Science and Engineering, Sun Yat-sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Delong Zhang SUN YAT-SEN UNIVERSITY, Jianfeng Du Guangdong University of Foreign Studies, Hengdi Su SUN YAT-SEN UNIVERSITY
17:30
20m
Research paper
QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksVirtual
Research Papers
Yedi Zhang ShanghaiTech University, Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Fu Song ShanghaiTech University, Min Zhang East China Normal University, Taolue Chen Birkbeck University of London, Jun Sun Singapore Management University
16:00 - 18:00
Technical Session 30 - Builds and DependenciesJournal-first Papers / Research Papers / Tool Demonstrations at Room 128
Chair(s): Christian Kästner Carnegie Mellon University
16:00
20m
Research paper
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem
Research Papers
Wei Tang Tsinghua University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Wu Jiahui Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Yi Li Nanyang Technological University, Ping Luo Tsinghua University, Yang Liu Nanyang Technological University
16:30
20m
Research paper
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM
Research Papers
Jasmine Latendresse Concordia University, Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Emad Shihab Concordia University
16:50
20m
Research paper
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsVirtual
Research Papers
Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Kele Xu National University of Defense Technology, Tao Wang National University of Defense Technology, Huaimin Wang National University of Defense Technology
17:30
20m
Research paper
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryVirtual
Research Papers
Hui Gao Nanjing University, Hongyu Kuang Nanjing University, Kexin Sun Nanjing University, Xiaoxing Ma Nanjing University, Alexander Egyed Johannes Kepler University Linz, Patrick Mäder Technische Universität Ilmenau, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University
Pre-print Media Attached

Accepted Papers

Title
Accelerating Build Dependency Error Detection via Virtual BuildVirtual
Research Papers
Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsVirtual
Research Papers
A Comprehensive Evaluation of Android ICC Resolution TechniquesVirtual
Research Papers
DOI Pre-print
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications
Research Papers
A Light Bug Triage Framework for Applying Large Pre-trained Language Model
Research Papers
An Empirical Study of Automation in Software Security Patch Management
Research Papers
Answer Summarization for Technical Queries: Benchmark and New Approach
Research Papers
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?
Research Papers
DOI Pre-print Media Attached File Attached
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Research Papers
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models
Research Papers
Link to publication Pre-print
A Transferable Time Series Forecasting Service using Deep Transformer model for Online SystemsVirtual
Research Papers
Automated Feedback Generation for Competition-Level Code
Research Papers
Automatically Detecting Visual Bugs in HTML5 <canvas> Games
Research Papers
Automatic Comment Generation via Multi-Pass Deliberation
Research Papers
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems
Research Papers
DOI Pre-print
B-AIS: An Automated Process for Black-box Evaluation of AI-enabled Software Systems against Domain Semantics
Research Papers
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsVirtual
Research Papers
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints
Research Papers
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureACM SIGSOFT Distinguished Paper Award
Research Papers
Pre-print
Checking LTL Satisfiability via End-to-end LearningVirtual
Research Papers
CoditT5: Pretraining for Source Code and Natural Language Editing
Research Papers
Pre-print
Compiler Testing using Template Java ProgramsACM SIGSOFT Distinguished Paper Award
Research Papers
DOI Pre-print
Compressing Pre-trained Models of Code into 3 MB
Research Papers
DOI Pre-print Media Attached
Consistent Scene Graph Generation by Constraint OptimizationVirtual
Research Papers
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing
Research Papers
Cornucopia: A Framework for Feedback Guided Generation of Binaries
Research Papers
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication
Research Papers
Pre-print
Data Leakage in Notebooks: Static Detection and Better Processes
Research Papers
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks
Research Papers
Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationACM SIGSOFT Distinguished Paper Award
Research Papers
Link to publication
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis
Research Papers
Detecting Semantic Code Clones by Building AST-based Markov Chains ModelVirtual
Research Papers
Differentially Testing Database Transactions for Fun and ProfitVirtual
Research Papers
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingVirtual
Research Papers
Efficient Greybox Fuzzing to Detect Memory ErrorsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationVirtual
Research Papers
Empirical Study of System Resources Abused by IoT AttackersVirtual
Research Papers
Enriching Compiler Testing with Real Program from Bug ReportVirtual
Research Papers
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationVirtual
Research Papers
Exploiting Epochs and Symmetries in Analysing MPI Programs
Research Papers
Finding and Understanding Incompleteness Bugs in SMT SolversVirtual
Research Papers
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures
Research Papers
Fuzzle: Making a Puzzle for FuzzersACM SIGSOFT Distinguished Paper Award
Research Papers
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsVirtual
Research Papers
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeVirtual
Research Papers
Pre-print
Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsVirtual
Research Papers
Griffin: Grammar-Free DBMS FuzzingVirtual
Research Papers
Groundhog: An Automated Accessibility Crawler for Mobile Apps
Research Papers
Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic DifferencingACM SIGSOFT Distinguished Paper Award
Research Papers
How Useful is Code Change Information for Fault Localization in Continuous Integration?
Research Papers
HTFuzz: Heap Operation Sequence Sensitive FuzzingVirtual
Research Papers
HyperAST: Enabling Efficient Analysis of Software Histories at ScaleACM SIGSOFT Distinguished Paper Award
Research Papers
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications
Research Papers
Identifying Solidity Smart Contract API Documentation Errors
Research Papers
Pre-print
Inline Tests
Research Papers
Pre-print
Insight: Exploring Cross-Ecosystem Vulnerability ImpactsVirtual
Research Papers
Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness
Research Papers
Pre-print
Jasmine: A Static Analysis Framework for Spring Core TechnologiesVirtual
Research Papers
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage
Research Papers
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
Research Papers
DOI Pre-print
Learning Contract Invariants Using Reinforcement Learning
Research Papers
Learning to Construct Better Mutation FaultsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
DOI Pre-print
Learning to Synthesize Relational Invariants
Research Papers
Leveraging Practitioners' Feedback to Improve a Security LinterVirtual
Research Papers
LISSA: Lazy Initialization with Specialized Solver Aid
Research Papers
Low-Resources Project-Specific Code SummarizationVirtual
Research Papers
MalWhiteout: Reducing Label Errors in Android Malware DetectionVirtual
Research Papers
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
Research Papers
DOI Pre-print
Natural Test Generation for Precise Testing of Question Answering SoftwareVirtual
Research Papers
Pre-print
Neuroevolution-Based Generation of Tests and Oracles for Games
Research Papers
Pre-print
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM
Research Papers
Patching Weak Convolutional Neural Network Models through Modularization and CompositionVirtual
Research Papers
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsVirtual
Research Papers
Precise (Un)Affected Version Analysis for Web VulnerabilitiesVirtual
Research Papers
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing
Research Papers
Prioritized Constraint-Aided Dynamic Partial-Order ReductionVirtual
Research Papers
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeVirtual
Research Papers
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksVirtual
Research Papers
QATest: A Uniform Fuzzing Framework for Question Answering SystemsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksVirtual
Research Papers
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachVirtual
Research Papers
Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications
Research Papers
Repairing Failure-inducing Inputs with Input Reflection
Research Papers
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsVirtual
Research Papers
SA4U: Practical Static Analysis for Unit Type Error Detection
Research Papers
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software DeploymentVirtual
Research Papers
DOI Pre-print
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel
Research Papers
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Research Papers
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationVirtual
Research Papers
DOI Pre-print
SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsVirtual
Research Papers
SmartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesVirtual
Research Papers
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft DesignVirtual
Research Papers
Pre-print
So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackVirtual
Research Papers
DOI Pre-print
Sorry, I don't Understand: Improving Voice User Interface Testing
Research Papers
StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair SystemsVirtual
Research Papers
Static Type Recommendation for PythonVirtual
Research Papers
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingVirtual
Research Papers
SymFusion: Hybrid Instrumentation for Concolic Execution
Research Papers
Pre-print
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsVirtual
Research Papers
Pre-print
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Research Papers
DOI Pre-print
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps
Research Papers
Toward Improving the Robustness of Deep Learning Models via Model TransformationVirtual
Research Papers
Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsVirtual
Research Papers
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem
Research Papers
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairVirtual
Research Papers
TransRepair: Context-aware Program Repair for Compilation ErrorsVirtual
Research Papers
TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionVirtual
Research Papers
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses
Research Papers
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsVirtual
Research Papers
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews
Research Papers
Unveiling Hidden DNN Defects with Decision-Based Metamorphic TestingVirtual
Research Papers
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryVirtual
Research Papers
Pre-print Media Attached
VITAS : Guided Model-based VUI Testing of VPA AppsVirtual
Research Papers
Which Exception Shall We Throw?Virtual
Research Papers

Q/A on the Double-Anonymous Policy

If you have questions not answered below, please contact the program chairs at ase2022research@gmail.com.

Q: Why Double-Anonymous?

There are many reasons for a submission track to employ a double-anonymous review process, which have become an accepted practice at many Software Engineering conferences over the past several years. This model is standard in many other communities as well. For more information on the motivation for double-anonymous reviewing, see a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.

Q: How to prepare your paper for double-anonymous reviewing?

You must make every reasonable effort to honor the double-anonymous review process but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  • Omit all authors’ names and affiliations from the title page. If you have acknowledgments, do not mention any names or organizations. Take care not to inadvertently include this information in PDF metadata.
  • Refer to your own work in the third person. You should not omit or change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.
  • Try to avoid relying on supplementary material that is impossible to properly anonymize, such as a companion technical report or thesis (see below), your personal website, or a YouTube channel. We do encourage the careful sharing of suitably anonymized code repositories and datasets, such as through anonymous sharing links (doable via DropBox, for example) to a cleaned and anonymized GitHub repository. Check such data files and repositories carefully for any information that could reveal author identities. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.

Q: Can I submit my work on arXiv?

To comply with the double-anonymous reviewing process, we request that the authors postpone publishing their submitted work on arXiv or similar sites until after the notification of acceptance. If the authors have compelling reasons to nevertheless publish a preprint earlier, this publication cannot take place in the two weeks before or after the ASE submission deadline. Another option is to make a tech report at your institution, which allows someone to cite the work, if needed, but does not have the same degree of visibility. If the program chairs get the impression that the authors frivolously share papers and do not live up to the spirit of the double-anonymous reviewing process, the program chairs can decide to (desk) reject the paper.

Q: Can I disseminate a non-anonymous version of my submitted work by discussing it with colleagues, giving talks, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting) but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work specifically with members of the program committee and publicize your work on mailing lists or media that are widely shared and can reach the program committee.

Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?

A paper on arXiv or a tech report is not a peer-reviewed publication. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all. We explicitly discourage “anonymous” references (e.g., “[31] —Reference omitted for double-anonymous review—”: if the cited report is necessary for a reviewer to fully understand the submission, then the relevant material should either be included in the submission, cited in third person, or provided as suitably anonymized supplementary material (such as an anonymized appendix) hosted anonymously. Note that reviewers are not obligated to review such previous material, however, and so you should strive to make your submissions as stand-alone as possible (regardless of the double-anonymous review process).

Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work?

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.

Q: What about a PhD or master’s thesis?

It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution. In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.

This Q/A is based on guidelines from recent editions of ASE, ICSE, and ESEC/FSE.

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2022 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:

  • Requirements and Design
    • requirements elicitation and management, traceability analysis;
    • architecture and design;
    • modeling and model-driven engineering;
    • software product lines;
    • component-based, service-oriented systems;
    • OO/Aspect-oriented;
  • Testing and Analysis
    • regression, mutation, model-based testing;
    • program analysis;
    • program synthesis;
    • program repairs
  • Tools and Processes
    • release engineering and DevOps;
    • configuration and release management;
    • Agile processes
  • Maintenance and Evolution
    • debugging and fault-localization;
    • refactoring and reengineering;
    • reverse engineering;
    • software reuse;
    • API design and management
  • Formal Aspects of Software Engineering
    • formal methods, validation and verification;
    • programming languages;
    • specification languages, DSLs
  • AI and Software Engineering
    • search-based software engineering;
    • recommender systems;
    • autonomous and self-adapting systems;
    • AI for SE;
    • SE for AI
  • Software Analytics
    • mining software repositories;
    • apps and app store analysis
  • Human Aspects of Software Engineering
    • program comprehension;
    • systematic reviews, code inspection;
    • human-computer interface;
    • software visualization;
    • crowd-based software engineering;
    • distributed and collaborative software engineering
  • Social Aspects of Software Engineering
    • green and sustainable technologies;
    • software economics;
    • ethics in software engineering
  • Dependability, Safety, and Reliability
    • privacy and security;
    • reliability;
    • safety;
    • performance

ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.


Submission Categories and Evaluation Criteria

We solicit submissions in two categories:

Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:

  • clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
  • articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
  • show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:

  • clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
  • present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
  • carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.

Papers in both categories should:

  • discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
  • provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
  • include an adequate use of the English language, absence of major ambiguity, and with clearly readable figures and tables;
  • adhere to the formatting instructions provided below.

New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.


Originality

Papers submitted to ASE 2022 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2022. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.


Double-Anonymous Review Process

The ASE 2022 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

  • Authors’ names and affiliated institution names must be omitted from the submission.
  • All references to the author’s prior work should be in the third person.
  • Authors are encouraged to title their submission differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.

Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.


Artifact Availability and Supplementary Material

We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.

Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:

https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2022 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.


ACM Policy on Research Involving Humans

If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects

It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.


Formatting and Submission Guidelines

Abstracts and papers must be submitted electronically through the ASE 2022 HotCRP submission site: https://ase2022.hotcrp.com/. All submissions must be in English.

For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interests. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.

For the full paper submissions, authors are required to upload their paper in the PDF format. It should conform, at time of submission, to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTEX users must use the \documentclass[sigconf,review,anonymous]{acmart} option.

Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.

Authors are encouraged to try out the HotCRP format checker and/or experimental SIGSOFT Submission Checker to detect violations to the formatting and double-anonymous guidelines. Mind that the tools are based on heuristics. Therefore, they may miss violations or raise false alarms. The requirements listed in this call for papers take precedence over the results of the tools when deciding whether a paper meets the submission guidelines.


Accepted Papers

Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.

After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with the paper content.

We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include, but are not limited to, Figshare and Zenodo.

If a submission is accepted, at least one author of the paper is required to register for ASE 2022 and present the paper.


Questions and Comments

If you have any further questions, please contact the PC chairs at ase2022research@gmail.com.

:
: