Mon 15 MayDisplayed time zone: Hobart change
09:00 - 10:30 | Conference Introductions / MIP Talk / Documentation and Stack OverflowDiscussion / Research / Opening / Journal First / MIP Talk at Meeting Room 106 Chair(s): Christoph Treude University of Melbourne, Akhila Sri Manasa Venigalla IIT Tirupati | ||
09:00 15mDay opening | Conference Opening Opening G: Christoph Treude University of Melbourne, P: Raula Gaikovina Kula Nara Institute of Science and Technology, P: Bonita Sharif University of Nebraska-Lincoln, USA | ||
09:15 40mTalk | MIP Talk on ICPC 2013 Paper titled "Automatic generation of natural language summaries for Java classes" MIP Talk Laura Moreno CQSE America, Jairo Aponte Universidad Nacional de Colombia, Giriprasad Sridhara IBM Research Labs, Andrian Marcus University of Texas at Dallas, Lori Pollock University of Delaware, USA, K. Vijay-Shanker | ||
09:55 9mFull-paper | QTC4SO: Automatic Question Title Completion for Stack Overflow Research Yanlin Zhou School of Information Science and Technology, Nantong University, ShaoYu Yang School of Information Science and Technology, Nantong University, Xiang Chen Nantong University, Zichen Zhang School of Information Science and Technology, Nantong University, Jiahua Pei School of Information Science and Technology, Nantong University Pre-print | ||
10:04 9mTalk | A Study of Update Request Comments in Stack Overflow Answer Posts Journal First Mohammad Sadegh Sheikhaei School of Computing, Queen's University, Yuan Tian Queens University, Kingston, Canada, Shaowei Wang University of Manitoba Link to publication | ||
10:13 9mTalk | Machine Translation-based Fine-grained Comments Generation for Solidity Smart Contracts Journal First Chaochen Shi Deakin University, Yong Xiang Deakin University, Jiangshan Yu Monash University, Keshav Sood Deakin University, Longxiang Gao Qilu University of Technology | ||
10:22 8mPanel | Discussion 1 Discussion |
13:45 - 15:15 | Human Aspects, Testing and LogsTool Demonstration / Discussion / Journal First / Early Research Achievements (ERA) / Research at Meeting Room 106 Chair(s): Michael J. Decker Bowling Green State University | ||
13:45 9mFull-paper | Understanding initial API comprehension Research | ||
13:54 5mShort-paper | Evaluating a Language Workbench: from Working Memory Capacity to Comprehension to Acceptance Early Research Achievements (ERA) Giovanna Broccia ISTI-CNR, FMT Lab, Alessio Ferrari CNR-ISTI, Maurice ter Beek ISTI-CNR, Pisa, Italy, Walter Cazzola Università degli Studi di Milano, Luca Favali University of Milan, Francesco Bertolotti | ||
13:59 5mShort-paper | Conversation Disentanglement As-a-Service Tool Demonstration Edoardo Riggio Software Institute - USI, Lugano, Marco Raglianti Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano | ||
14:04 5mShort-paper | Slicito: Using Computational Notebooks for Program Comprehension Tool Demonstration | ||
14:09 9mTalk | Selection of human evaluators for design smell detection using dragonfly optimization algorithm: An empirical study Journal First Sultan M. Al Khatib Department of Software Engineering, Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University (BAU), Al-Salt, 19117, Jordan, Khalid Alkharabsheh Department of Software Engineering, Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University (BAU), Al-Salt, 19117, Jordan, Sadi Alawadi Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118, Halmstad, Sweden | ||
14:18 5mShort-paper | SYN: Ultra-Scale Software Evolution Comprehension Tool Demonstration Gianlorenzo Occhipinti Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Roberto Minelli Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano | ||
14:23 5mShort-paper | Microusity: A testing tool for Backends for Frontends (BFF) Microservice Systems Tool Demonstration Pattarakrit Rattanukul Mahidol University, Chansida Makaranond Mahidol University, Pumipat Watanakulcharus Mahidol University, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Tanapol Nearunchorn Lineman Wongnai, Vasaka Visoottiviseth Mahidol University, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University | ||
14:28 5mShort-paper | WebEV: A Dataset on the Behavior of Testers for Web Application End to End Testing Early Research Achievements (ERA) Fuad Mridha University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
14:33 5mShort-paper | Towards a Classification of Log Parsing Errors Early Research Achievements (ERA) Issam Sedki Concordia University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Otmane Ait-Mohamed Concordia University, Naser Ezzati Jivan | ||
14:38 37mPanel | Discussion 3 Discussion |
15:45 - 17:15 | Code Summarization and VisualizationReplications and Negative Results (RENE) / Discussion / Research at Meeting Room 106 Chair(s): Banani Roy University of Saskatchewan, Akhila Sri Manasa Venigalla IIT Tirupati | ||
15:45 9mFull-paper | An Extensive Study of the Structure Features in Transformer-based Code Semantic Summarization Research Kang Yang , Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Yihao Qin National University of Defense Technology, Yao Lu National University of Defense Technology, Tanghaoran Zhang , Kamal Al-Sabahi University Of Technology and Applied Sciences-ibra Pre-print | ||
15:54 9mFull-paper | Label Smoothing Improves Neural Source Code Summarization Research Sakib Haque University of Notre Dame, Aakash Bansal University of Notre Dame, Collin McMillan University of Notre Dame Pre-print | ||
16:03 9mFull-paper | Interpretation-based Code Summarization Research Mingyang Geng National University of Defense Technology, Shangwen Wang National University of Defense Technology, Dezun Dong NUDT, Haotian Wang National University of Defense Technolog, Shaomeng Cao Peng Cheng Laboratory, Kechi Zhang Peking University, China, Zhi Jin Peking University Pre-print | ||
16:12 9mFull-paper | Naturalness in Source Code Summarization. How Significant is it? Replications and Negative Results (RENE) | ||
16:21 9mFull-paper | Comparing 2D and Augmented Reality Visualizations for Microservice System Understandability: A Controlled Experiment Research Amr Elsayed Baylor University, Tomas Cerny Baylor University, Davide Taibi Tampere University , Sira Vegas Universidad Politecnica de Madrid DOI Pre-print | ||
16:30 9mFull-paper | ChameleonIDE: Untangling Type Errors Through Interactive Visualization and Exploration Research Shuai Fu Monash University, Tim Dwyer Monash University, Peter J. Stuckey Monash University, Jackson Wain Monash University, Jesse Linossier Monash University Pre-print | ||
16:39 36mPanel | Discussion 4 Discussion |
Tue 16 MayDisplayed time zone: Hobart change
11:00 - 12:30 | Empirical Studies and RecommendationsResearch / Discussion / Early Research Achievements (ERA) / Journal First at Meeting Room 106 Chair(s): Issam Sedki Concordia University, Vittoria Nardone | ||
11:00 9mFull-paper | REMS: Recommending Extract Method Refactoring Opportunities via Multi-view Representation of Code Property Graph Research Di Cui , Qiangqiang Wang Xidian University, Siqi Wang , Jianlei Chi , Jianan Li Xidian University, Lu Wang Xidian University, Qingshan Li Xidian University | ||
11:09 9mFull-paper | Automating Method Naming with Context-Aware Prompt-Tuning Research Jie Zhu Institute of Software, Chinese Academy of Sciences;University of Chinese Academy of Sciences, Lingwei Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Li Yang Institute of Software at Chinese Academy of Sciences, Xiaoxiao Ma Institute of Software, Chinese Academy of Sciences, Chun Zuo Sinosoft Pre-print | ||
11:18 9mFull-paper | Generation-based Code Review Automation: How Far Are We? Research Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Bowen Xu North Carolina State University, DongGyun Han Royal Holloway, University of London, Junda He Singapore Management University, David Lo Singapore Management University Pre-print | ||
11:27 9mFull-paper | Reanalysis of Empirical Data on Java Local Variables with Narrow and Broad Scope Research Dror Feitelson Hebrew University Pre-print | ||
11:36 9mTalk | Predicting vulnerability inducing function versions using node embeddings and graph neural networks Journal First ecem mine özyedierler Istanbul Technical University, Ayse Tosun Istanbul Technical University, Sefa Eren Sahin Faculty of Computer and Informatics Engineering, Istanbul Technical University | ||
11:45 5mShort-paper | Properly Offer Options to Improve the Practicality of Software Document Completion Tools Early Research Achievements (ERA) Zhipeng Cai School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China Media Attached | ||
11:50 40mPanel | Discussion 6 Discussion |
13:45 - 15:15 | Programming Languages, Types, and ComplexityDiscussion / Research / Replications and Negative Results (RENE) / Journal First at Meeting Room 106 Chair(s): Vittoria Nardone | ||
13:45 9mFull-paper | How Well Static Type Checkers Work with Gradual Typing? A Case Study on Python Research Wenjie Xu Nanjing University, Lin Chen Nanjing University, Chenghao Su Nanjing University, Yimeng Guo Nanjing University, Yanhui Li Nanjing University, Yuming Zhou Nanjing University, Baowen Xu Nanjing University | ||
13:54 9mFull-paper | Too Simple? Notions of Task Complexity used in Maintenance-based Studies of Programming Tools Research Patrick Rein University of Potsdam; Hasso Plattner Institute, Tom Beckmann Hasso Plattner Institute, Eva Krebs Hasso Plattner Institute (HPI), University of Potsdam, Germany, Toni Mattis University of Potsdam; Hasso Plattner Institute, Robert Hirschfeld University of Potsdam; Hasso Plattner Institute | ||
14:03 9mFull-paper | Path Complexity Predicts Code Comprehension Effort Research Sofiane Dissem Harvey Mudd College, Eli Pregerson Harvey Mudd College, Adi Bhargava Harvey Mudd College, Josh Cordova Harvey Mudd College, Lucas Bang Harvey Mudd College | ||
14:12 5mShort-paper | Revisiting Deep Learning for Variable Type Recovery Replications and Negative Results (RENE) Pre-print | ||
14:17 9mTalk | Programming language implementations for context-oriented self-adaptive systems Journal First Nicolás Cardozo Universidad de los Andes, Kim Mens Université catholique de Louvain, ICTEAM institute, Belgium Link to publication DOI Media Attached | ||
14:26 9mFull-paper | Improving Code Search with Multi-Modal Momentum Contrastive Learning Research Zejian Shi Fudan University, Yun Xiong Fudan University, Yao Zhang Fudan University, Zhijie Jiang National University of Defense Technology, Jinjing Zhao National Key Laboratory of Science and Technology on Information System Security, Lei Wang National University of Defense Technology, Shanshan Li National University of Defense Technology Pre-print | ||
14:35 9mFull-paper | Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries Replications and Negative Results (RENE) Pre-print | ||
14:44 31mPanel | Discussion 7 Discussion |
15:45 - 17:15 | Bugs and Machine Learning / Steering Committee Meeting / ClosingResearch / Journal First / Closing at Meeting Room 106 Chair(s): Banani Roy University of Saskatchewan | ||
15:45 9mFull-paper | Mitigating the Effect of Class Imbalance in Fault Localization Using Context-aware Generative Adversarial Network Research Yan Lei Chongqing University, Tiantian Wen , Huan Xie , Lingfeng Fu Chongqing University, Chunyan Liu Chongqing University, Lei Xu Haier Smart Home Co., Ltd., Hongxia Sun Qingdao Haidacheng Purchasing Service Co., Ltd. Pre-print Media Attached | ||
15:54 9mFull-paper | Still Confusing for Bug-Component Triaging? Deep Feature Learning and Ensemble Setting to Rescue Research Yanqi Su Australian National University, Zheming Han , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61 | ||
16:03 9mFull-paper | Understanding Bugs in Multi-Language Deep Learning Frameworks Research Zengyang Li Central China Normal University, Sicheng Wang Central China Normal University, Wenshuo Wang , Peng Liang Wuhan University, China, Ran Mo Central China Normal University, Bing Li Wuhan University Link to publication Pre-print Media Attached | ||
16:12 9mFull-paper | FVA: Assessing Function-Level Vulnerability by Integrating Flow-Sensitive Structure and Code Statement Semantic Research Chao Ni Zhejiang University, Liyu Shen Zhejiang University, Wei Wang Zhejiang University, Xiang Chen Nantong University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Lexiao Zhang School of Software Technology, Zhejiang University | ||
16:21 9mTalk | Event-Aware Precise Dynamic Slicing for Automatic Debugging of Android Applications Journal First Hsu Myat Win University of Technology Sydney (UTS), Shin Hwei Tan Southern University of Science and Technology, Yulei Sui University of New South Wales, Sydney Link to publication | ||
16:30 15mPanel | Discussion 8 Closing | ||
16:45 30mMeeting | Steering Committee Meeting and Closing Closing Alexander Serebrenik Eindhoven University of Technology, Igor Steinmacher Northern Arizona University |
Accepted Papers
Call for Papers
The International Conference on Program Comprehension (ICPC) is the premier venue for work in the area of software program comprehension. It encompasses human activities for comprehending the software as well as methodologies and technologies for supporting such comprehension.
The research track provides a quality forum for researchers and practitioners from academia, industry, and government to present and discuss new results in program comprehension. Topics of interest for all tracks include but are not limited to:
- Empirical evaluations of program comprehension tools, techniques, and approaches;
- Human aspects in program comprehension, including collaborative software engineering practices, gender considerations, information processing strategies, the role of emotions, emotional awareness, and more;
- Cognitive theories for program comprehension accompanied by different empirical strategies, including experiments, surveys, and case studies;
- Topics at the intersection between program comprehension and programming education;
- Individual, collaborative, distributed, and global program comprehension;
- Novel visualization or summarization techniques and interfaces to support program comprehension, including searching, browsing, and analyzing;
- Comprehension of specific types of software systems, such as open/closed source, mobile applications, spreadsheets, web-based systems, legacy systems, product lines, libraries, multi-threaded applications, and systems of systems;
- Comprehension in the context of diverse software process models and specific lifecycle activities, such as: maintenance, evolution, re-engineering, migration, security, auditing, and testing;
- Comprehension of software artifacts ranging from requirements documents to test cases and crash logs; from API documentation to models, meta-models and model transformation; and from Stack Overflow questions & answers to GitHub code review messages or video tutorials - all software artifacts and formal or informal documentation that software developers encounter when creating or evolving software;
- Comprehension and legal issues, such as due diligence, intellectual property and licensing, reverse engineering, and litigation; Issues and case studies in the transfer of program comprehension technology to industry;
- Automated tool support for program comprehension.
Awards
A subset of the Research Track papers accepted for presentation at ICPC 2023 will be invited to be revised and extended for consideration in a thematic special issue of the Springer Empirical Software Engineering Journal (EMSE). The best papers of the research track will be awarded with an ACM SIGSOFT Distinguished Paper Award at ICPC. In addition, ICPC 2023 will feature ICPC Honorable Mentions, special awards that will be assigned, on the basis of the program committee reports, to the papers that have applied extremely novel and/or outstanding research methods to the problem of interest.
Format and Submission
Submissions must not be longer than 10 pages for the main text, inclusive of figures, tables, and appendices. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).
Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran}
without including the compsoc or compsocconf options).
Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above. Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.
By submitting to the ICPC Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to ICPC 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICPC 2023. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate actions will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
The ICPC 2023 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
Authors’ names must be omitted from the submission. All references to the author’s prior work should be in the third person. The title of the submission must be different from preprints of the authors on ArXiV or similar sites. During review, authors must not publicly use the submission title. Any submission that does not comply with these requirements may be desk rejected without further review.
The submission must also comply with the authorship policy of the ACM, and the authorship policy of the IEEE. ICPC 2023 follows the ACM SIGSOFT rules on Conflicts of Interest and Confidentiality of Submissions and all authors, reviewers, and organizers will uphold the ACM Code of Ethics and Professional Conduct.
Submissions to the Research Track that meet the above requirements can be made via the ICPC submission site by the submission deadline.
Exclusions
Submissions from the ICPC 2023 General Chair, Program Chairs, their current students and current postdocs are not allowed to any ICPC 2023 track.
Open Science Policy
The research track of ICPC 2023 is striving to abide by Open Science policies. In summary, the steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified.
Upon submission to the research track, authors are asked:
- to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper; or
- to include in the paper an explanation as to why this is not possible or desirable; and
- to indicate if they intend to make their data publicly available upon acceptance.
- Supplementary material can be uploaded via the ICPC submission site or anonymously linked from the paper submission. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.
Review and Evaluation Criteria
Research papers will be reviewed by at least three members of the Program Committee. The reviewers will remain anonymous and signing of reviews will not be permitted in the review.
Submissions will be evaluated based on the following criteria:
-
Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods;
-
Significance: The extent to which the paper’s contributions impact program comprehension, and if needed, under which assumptions;
-
Novelty: The extent to which the contributions are sufficiently original with respect to the state of the art and clearly explained and contrasted against it;
-
Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions;
-
Presentation: The extent to which the paper’s quality of writing meets the standards of ICPC, including clear descriptions and explanations, appropriate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided above.
Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.
Author Response Period
ICPC 2023 will offer an author response period. In this period the authors will have the opportunity to inspect the reviews, and answer specific questions raised by the program committee. This period is scheduled after all reviews have been completed, and serves to inform the subsequent decision making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process.
Withdrawing a Paper
Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICPC 2023 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICPC 2023 as well as any other venue adhering to this policy.
Publication and Presentation
Upon notification of acceptance, all authors of accepted papers will receive further instructions for preparing the camera-ready versions of their submissions. If a submission is accepted, at least one author of the paper is required to register for ICPC 2023, attend the conference and present the paper. All accepted papers will be published in the conference electronic proceedings. The presentation is expected to be delivered in person, unless this is impossible due to travel limitations (related to, e.g., health, visa, or COVID-19 prevention). Details about the presentations will follow the notifications.
The official publication date is the date the proceedings are made available in the ACM or IEEE Digital Libraries. This date may be up to two weeks prior to the first day of ICPC 2023. The official publication date affects the deadline for any patent filings related to published work.
Purchases of additional pages in the proceedings is not allowed.