This program is tentative and subject to change.
Sun 27 AprDisplayed time zone: Eastern Time (US & Canada) change
07:00 - 19:00 | Ready Room SundayICSE Social, Networking and Special Rooms at 209 The Ready Room will be available throughout the week. There will be some tables with computers where people can edit presentations (bring on a USB stick) and upload presentations to the presentation rooms through the Contact 1 website. There will also be AV technicians to help if needed. You do not need to use the Ready Room: You have several choices: You can upload your presentation from your own computer in advance of your session (days in advance even) at the Contact 1 website (you will be sent a link). Or you can plug your computer in using an HDMI cable when you are starting your presentation. This last option is available but not recommended, since it increases the chance of delays. There will be some tables and couches in the Ready Room where you can get work done, or have small get-togethers with people. This room will not be ‘quiet’. If you want a quiet place to work or chill out (library quiet, no talking) then Room 209 will be available much of the time. The Ready Room will also have some poster boards. | ||
09:00 - 12:30 | Child Care Sunday AMICSE Social, Networking and Special Rooms at 102 Child Care Child Care at ICSE is free, but you must have registered for child care when you registered for the conference. If you need to add child care to your registration, please contact the registration desk. | ||
09:00 - 10:30 | |||
09:00 50mKeynote | Theories of Program Comprehension in the Age of LLMs ICPC Keynotes | ||
09:50 10mTalk | Combining Language and App UI Analysis for the Automated Assessment of Bug Reproduction Steps Research Track Junayed Mahmud University of Central Florida, Antu Saha William & Mary, Oscar Chaparro William & Mary, Kevin Moran University of Central Florida, Andrian (Andi) Marcus George Mason University Pre-print | ||
10:00 10mTalk | Effectively Modeling UI Transition Graphs for Android Apps via Reinforcement Learning Research Track Wunan Guo School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Zhen Dong Fudan University, Liwei Shen Fudan University, Daihong Zhou School of Computer Science and Information Engineering, Shanghai Institute of Technology, Bin Hu Fudan University, Chen Zhang Fudan University, Hai Xue University of Shanghai for Science and Technology | ||
10:10 10mTalk | Characterizing Bugs in Login Processes of Android Applications: An Empirical Study Research Track Zixu Zhou McGill University, Rufeng Chen McGill University, Junfeng Chen Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology, Lili Wei McGill University | ||
10:20 10mLive Q&A | Session's Discussion: "App Comprehension" Research Track |
10:30 - 11:00 | |||
10:30 30mCoffee break | Sunday Morning Break ICSE Catering |
11:00 - 12:30 | Vulnerabilities, Technical Debt, DefectsEarly Research Achievements (ERA) / Research Track / Replications and Negative Results (RENE) at 205 | ||
11:00 10mTalk | CalmDroid: Core-Set Based Active Learning for Multi-Label Android Malware Detection Research Track Minhong Dong Tiangong University, Liyuan Liu Tiangong University, Mengting Zhang Tiangong University, Sen Chen Tianjin University, Wenying He Hebei University of Technology, Ze Wang Tiangong University, Yude Bai Tianjin University | ||
11:10 10mTalk | Towards Task-Harmonious Vulnerability Assessment based on LLM Research Track Zaixing Zhang Southeast University, Chang Jianming , Tianyuan Hu Southeast University, Lulu Wang Southeast University, Bixin Li Southeast University | ||
11:20 10mTalk | Slicing-Based Approach for Detecting and Patching Vulnerable Code Clones Research Track Hakam W. Alomari Miami University, Christopher Vendome Miami University, Himal Gyawali Miami University | ||
11:30 6mTalk | Revisiting Security Practices for GitHub Actions Workflows Early Research Achievements (ERA) | ||
11:36 6mTalk | Leveraging multi-task learning to improve the detection of SATD and vulnerability Replications and Negative Results (RENE) Barbara Russo Free University of Bolzano, Jorge Melegati Free University of Bozen-Bolzano, Moritz Mock Free University of Bozen-Bolzano Pre-print | ||
11:42 10mTalk | Leveraging Context Information for Self-Admitted Technical Debt Detection Research Track Miki Yonekura Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Bin Lin Hangzhou Dianzi University, Kenji Fujiwara Nara Women’s University, Hajimu Iida Nara Institute of Science and Technology | ||
11:52 6mTalk | Personalized Code Readability Assessment: Are We There Yet? Replications and Negative Results (RENE) Antonio Vitale Politecnico di Torino, University of Molise, Emanuela Guglielmi University of Molise, Rocco Oliveto University of Molise, Simone Scalabrino University of Molise | ||
11:58 6mTalk | Automated Refactoring of Non-Idiomatic Python Code: A Differentiated Replication with LLMs Replications and Negative Results (RENE) Pre-print | ||
12:04 10mResearch paper | Sonar: Detecting Logic Bugs in DBMS through Generating Semantic-aware Non-Optimizing Query Research Track Shiyang Ye Zhejiang University, Chao Ni Zhejiang University, Jue Wang Nanjing University, Qianqian Pang zhejang university, Xinrui Li School of Software Technology, Zhejiang University, xiaodanxu College of Computer Science and Technology, Zhejiang university | ||
12:14 6mTalk | A Study on Applying Large Language Models to Issue Classification Replications and Negative Results (RENE) | ||
12:20 10mLive Q&A | Session's Discussion: "Vulnerabilities, Technical Debt, Defects" Research Track |
12:30 - 14:00 | |||
12:30 90mLunch | Sunday Lunch ICSE Catering |
14:00 - 15:30 | Education, Debugging, Dynamic AnalysisResearch Track / Early Research Achievements (ERA) / Replications and Negative Results (RENE) / Tool Demonstration at 205 | ||
14:00 10mTalk | JavaWiz: A Trace-Based Graphical Debugger for Software Development Education Research Track Markus Weninger JKU Linz, Simon Grünbacher Institute for System Software; Johannes Kepler University Linz, Austria, Herbert Prähofer Johannes Kepler University Linz | ||
14:10 10mTalk | Pinpointing the Learning Obstacles of an Interactive Theorem Prover Research Track Sára Juhošová Delft University of Technology, Andy Zaidman Delft University of Technology, Jesper Cockx Delft University of Technology Pre-print | ||
14:20 10mTalk | AI-based automated grading of source code of introductory programming assignments Research Track Jayant Havare Indian Institute of technology - Bombay, Varsha Apte Indian Institute of technology - Bombay, Kaushikraj Maharajan Indian Institute of technology - Bombay, Nithin Chandra Gupta Samudrala Indian Institute of technology - Bombay, Ganesh Ramakrishnan Indian Institute of technology - Bombay, Srikanth Tamilselvam IBM Research, Sainath Vavilapalli Indian Institute of Technology - Bombay | ||
14:30 10mTalk | An Analysis of Students' Program Comprehension Processes in a Large Code Base Research Track Anshul Shah University of California, San Diego, Thanh Tong University of California, San Diego, Elena Tomson University of California, San Diego, Steven Shi University of California, San Diego, William G. Griswold University of California San Diego, Gerald Soosairaj University of California, San Diego | ||
14:40 6mTalk | OVERLORD: A C++ overloading inspector Tool Demonstration Botond Horváth ELTE Eötvös Loránd University, Budapest, Hungary, Richárd Szalay Eötvös Loránd University, Faculty of Informatics, Department of Programming Languages and Compilers, Zoltán Porkoláb ELTE Eötvös Loránd University, Budapest, Hungary | ||
14:46 6mTalk | Optimizing Code Runtime Performance through Context-Aware Retrieval-Augmented Generation Early Research Achievements (ERA) Manish Acharya Vanderbilt University, Yifan Zhang Vanderbilt University, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University | ||
14:52 6mTalk | Investigating Execution-Aware Language Models for Code Optimization Replications and Negative Results (RENE) Federico Di Menna University of L'Aquila, Luca Traini University of L'Aquila, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Vittorio Cortellessa University of L'Aquila Pre-print | ||
14:58 6mTalk | Understanding Data Access in Microservices Applications Using Interactive Treemaps Early Research Achievements (ERA) Maxime ANDRÉ Namur Digital Institute, University of Namur, Marco Raglianti Software Institute - USI, Lugano, Anthony Cleve University of Namur, Michele Lanza Software Institute - USI, Lugano Pre-print | ||
15:04 6mTalk | Divergence-Driven Debugging: Understanding Behavioral Changes Between Two Program Versions Early Research Achievements (ERA) Rémi Dufloer Univ. Lille, Inria, CNRS, Centrale Lille, UMR 9189 CRIStAL, F-59000 Lille, France, Imen Sayar Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59000 Lille, France, Anne Etien Université de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL, Steven Costiou INRIA Lille | ||
15:10 10mTalk | KotSuite: Unit Test Generation for Kotlin Programs in Android Applications Research Track Feng Yang Wuhan University, Qi Xin Wuhan University, Zhilei Ren Dalian University of Technology, Jifeng Xuan Wuhan University | ||
15:20 10mLive Q&A | Session's Discussion: "Education, Debugging, Dynamic Analysis" Research Track |
15:30 - 16:00 | |||
15:30 30mBreak | Sunday Afternoon Break ICSE Catering |
16:00 - 17:30 | Summarisation, Natural Language GenerationResearch Track / Early Research Achievements (ERA) / Replications and Negative Results (RENE) at 205 | ||
16:00 10mTalk | Optimizing Datasets for Code Summarization: Is Code-Comment Coherence Enough? Research Track Antonio Vitale Politecnico di Torino, University of Molise, Antonio Mastropaolo William and Mary, USA, Rocco Oliveto University of Molise, Massimiliano Di Penta University of Sannio, Italy, Simone Scalabrino University of Molise | ||
16:10 10mTalk | CMDeSum: A Cross-Modal Deliberation Network for Code Summarization Research Track Zhifang Liao Central South University, Xiaoyu Liu Central South University, Peng Lan School of Computer Science and Engineering, Central South University, Changsha, China, Song Yu Central South University, Pei Liu Monash University | ||
16:20 10mTalk | CLCoSum: Curriculum Learning-based Code Summarization for Code Language Models Research Track Hongkui He South China University of Technology, Jiexin Wang South China University of Technology, Liuwen Cao South China University of Technology, Yi Cai School of Software Engineering, South China University of Technology, Guangzhou, China | ||
16:30 10mTalk | DLCoG: A Novel Framework for Dual-Level Code Comment Generation based on Semantic Segmentation and In-Context Learning Research Track Zhang Zhiyang , Haiyang Yang School of Computer Science and Engineering, Central South University, Qingyang Yan Central South University, Hao Yan Central South University, Wei-Huan Min Central South University, Zhao Wei Tencent, Li Kuang Central South University, Yingjie Xia Hangzhou Dianzi University | ||
16:40 10mTalk | Explaining GitHub Actions Failures with Large Language Models: Challenges, Insights, and Limitations Research Track Pablo Valenzuela-Toledo University of Bern, Universidad de La Frontera, Chuyue Wu University of Bern, Sandro Hernández University of Bern, Alexander Boll University of Bern, Roman Machacek University of Bern, Sebastiano Panichella University of Bern, Timo Kehrer University of Bern | ||
16:50 10mTalk | Large Language Models are Qualified Benchmark Builders: Rebuilding Pre-Training Datasets for Advancing Code Intelligence Tasks Research Track Kang Yang National University of Defense Technology, Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Yanlin Wang Sun Yat-sen University, Tanghaoran Zhang National University of Defense Technology, Yihao Qin National University of Defense Technology, Bo Lin National University of Defense Technology, Zhang Zhang Key Laboratory of Software Engineering for Complex Systems, National University of Defense Technology, Yao Lu National University of Defense Technology, Kamal Al-Sabahi College of Banking and Financial Studies | ||
17:00 10mTalk | Extracting Formal Specifications from Documents Using LLMs for Test Automation Research Track Hui Li Xiamen University, Zhen Dong Fudan University, Siao Wang Fudan University, Hui Zhang Fudan University, Liwei Shen Fudan University, Xin Peng Fudan University, Dongdong She HKUST (The Hong Kong University of Science and Technology) | ||
17:10 6mTalk | Using Large Language Models to Generate Concise and Understandable Test Case Summaries Early Research Achievements (ERA) Natanael Djajadi Delft University of Technology, Amirhossein Deljouyi Delft University of Technology, Andy Zaidman Delft University of Technology Pre-print | ||
17:16 6mTalk | Towards Generating the Rationale for Code Changes Replications and Negative Results (RENE) Francesco Casillo Università di Salerno, Antonio Mastropaolo William and Mary, USA, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Vincenzo Deufemia University of Salerno, Carmine Gravino University of Salerno | ||
17:22 8mTalk | Session's Discussion: "Summarisation, Natural Language Generation" Research Track |
Mon 28 AprDisplayed time zone: Eastern Time (US & Canada) change
07:00 - 19:00 | Ready Room MondayICSE Social, Networking and Special Rooms at 209 The Ready Room will be available throughout the week. There will be some tables with computers where people can edit presentations (bring on a USB stick) and upload presentations to the presentation rooms through the Contact 1 website. There will also be AV technicians to help if needed. You do not need to use the Ready Room: You have several choices: You can upload your presentation from your own computer in advance of your session (days in advance even) at the Contact 1 website (you will be sent a link). Or you can plug your computer in using an HDMI cable when you are starting your presentation. This last option is available but not recommended, since it increases the chance of delays. There will be some tables and couches in the Ready Room where you can get work done, or have small get-togethers with people. This room will not be ‘quiet’. If you want a quiet place to work or chill out (library quiet, no talking) then Room 209 will be available much of the time. The Ready Room will also have some poster boards. | ||
09:00 - 10:30 | |||
09:00 - 10:30 | Joint ICPC-MSR Keynote at 214 plus 215 | ||
09:00 90mKeynote | Mining BOMs for Improving Supply Chain Efficiency & Resilience ICPC Keynotes |
10:30 - 11:00 | |||
10:30 30mBreak | Monday Morning Break ICSE Catering |
11:00 - 12:30 | |||
11:00 - 12:30 | Empirical Findings, Future Visions, Recommendations Replications and Negative Results (RENE) / Early Research Achievements (ERA) / Tool Demonstration / Research Track at 205 | ||
11:00 10mTalk | Terminal Lucidity: Envisioning the Future of the Terminal Research Track | ||
11:10 6mTalk | Exploring Code Comprehension in Scientific Programming: Preliminary Insights from Research Scientists Early Research Achievements (ERA) Alyssia Chen University of Hawaii at Manoa, Carol Wong University of Hawaii at Manoa, Bonita Sharif University of Nebraska-Lincoln, USA, Anthony Peruma University of Hawai‘i at Mānoa | ||
11:16 10mTalk | Method Names in Jupyter Notebooks: An Exploratory Study Research Track Carol Wong University of Hawaii at Manoa, Gunnar Larsen University of Hawaii at Manoa, Rocky Huang University of Hawaii at Manoa, Bonita Sharif University of Nebraska-Lincoln, USA, Anthony Peruma University of Hawai‘i at Mānoa | ||
11:26 6mTalk | SCALAR: A Part-of-speech Tagger for Identifiers Tool Demonstration Christian Newman , Brandon Scholten Kent State University, Sophia Testa Kent State University, Joshua Behler Kent State University, Syreen Banabilah Kent State University, Michael L. Collard The University of Akron, Michael J. Decker Bowling Green State University, Mohamed Wiem Mkaouer University of Michigan - Flint, Marcos Zampieri George mason University, Eman Abdullah AlOmar Stevens Institute of Technology, USA, Reem Alsuhaibani Prince Sultan University, Anthony Peruma University of Hawai‘i at Mānoa, Jonathan I. Maletic Kent State University | ||
11:32 6mTalk | How do Papers Make into Machine Learning Frameworks: A Preliminary Study on TensorFlow Early Research Achievements (ERA) Federica Pepe University of Sannio, Claudia Farkas York University, Maleknaz Nayebi York University, Giulio Antoniol Ecole Polytechnique de Montreal, Massimiliano Di Penta University of Sannio, Italy | ||
11:38 4mTalk | Toward Neurosymbolic Program Comprehension Early Research Achievements (ERA) Alejandro Velasco William & Mary, Aya Garryyeva William and Mary, David Nader Palacio William & Mary, Antonio Mastropaolo William and Mary, USA, Denys Poshyvanyk William & Mary | ||
11:42 10mTalk | Combining Static Analysis Techniques for Program Comprehension Using Slicito Tool Demonstration Pre-print | ||
11:52 6mTalk | Mining Code Change Patterns in Ada Projects Replications and Negative Results (RENE) | ||
11:58 6mTalk | Telling Software Evolution Stories With Sonification Early Research Achievements (ERA) | ||
12:04 10mTalk | Attributed Multiplex Learning for Analogical Third-Party Library Recommendation and Retrieval Research Track Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Liang Wang Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University | ||
12:14 6mTalk | LLM2FedLLM - A Tool for Simulating Federated LLMs for Software Engineering Tasks Tool Demonstration Jahnavi Kumar Indian Institute of Technology Tirupati, India, Siddhartha Gandu Indian Institute of Technology Tirupati, Sridhar Chimalakonda Indian Institute of Technology, Tirupati | ||
12:20 10mLive Q&A | Session's Discussion: "Empirical Findings, Future Visions, Recommendations" Research Track |
12:30 - 14:00 | |||
12:30 90mLunch | Monday Lunch ICSE Catering |
14:00 - 15:30 | |||
14:00 - 15:30 | |||
14:00 10mTalk | Code Ranking with Structure Awareness Contrastive Learning Research Track Hailin Huang South China University of Technology, Liuwen Cao South China University of Technology, Jiexin Wang South China University of Technology, Tianchen Yu School of Software Engineering, South China University of Technology, Yi Cai School of Software Engineering, South China University of Technology, Guangzhou, China | ||
14:10 10mTalk | Algorithmic Inversion: A Learnable Algorithm Representation for Code Generation Research Track zhongyi shi Chinese Academy of Science Institute of Software, fuzhang wu Chinese Academy of Science Institute of Software, weibin zeng Chinese Academy of Science Institute of Software, yan kong Chinese Academy of Science Institute of Software, sicheng shen Chinese Academy of Science Institute of Software, Yanjun Wu Institute of Software, Chinese Academy of Sciences | ||
14:20 10mTalk | Studying How Configurations Impact Code Generation in LLMs: the Case of ChatGPT Research Track Benedetta Donato University of Milano - Bicocca, Leonardo Mariani University of Milano-Bicocca, Daniela Micucci University of Milano-Bicocca, Italy, Oliviero Riganelli University of Milano - Bicocca Pre-print | ||
14:30 10mTalk | Quality In, Quality Out: Investigating Training Data's Role in AI Code Generation Research Track Cristina Improta University of Naples Federico II, Rosalia Tufano Università della Svizzera Italiana, Pietro Liguori University of Naples Federico II, Domenico Cotroneo University of Naples Federico II, Gabriele Bavota Software Institute @ Università della Svizzera Italiana | ||
14:40 10mTalk | Advancing Large Language Models in Code Generation: USACO Benchmark and Bug Mitigation Insights Research Track Jacob Trentini Monte Vista High School, Victor Liu Seven Lakes High School, Yiming Peng Vandegrift High School, Ziliang Zong Texas State University | ||
14:50 10mTalk | Enhancing Code Generation for Low-Resource Languages: No Silver Bullet Research Track Alessandro Giagnorio Software Institute @ Università della Svizzera italiana, Alberto Martin-Lopez Software Institute - USI, Lugano, Gabriele Bavota Software Institute @ Università della Svizzera Italiana Pre-print | ||
15:00 10mTalk | COFT: Making Large Language Models Better zero-shot Learners for Code Generation Research Track Weijia Li Institute of Software, Chinese Academy of Sciences, Yongjie Qian Department of Computer Science, North China Electric Power University, Bao ding, Ke Gao Institute of Software, Chinese Academy of Sciences, Haixin Chen Institute of Computing Technology, Chinese Academy of Sciences, Xinyu Wang Institute of Software, Chinese Academy of Sciences, Yuchen Tong Institute of Computing Technology, Chinese Academy of Sciences, Ling Li Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences, Chen Zhao Institute of Software, Chinese Academy of Sciences | ||
15:10 10mTalk | On the Possibility of Breaking Copyleft Licenses When Reusing Code Generated by ChatGPT Research Track Gaia Colombo University of Milano - Bicocca, Leonardo Mariani University of Milano-Bicocca, Daniela Micucci University of Milano-Bicocca, Italy, Oliviero Riganelli University of Milano - Bicocca Pre-print | ||
15:20 10mLive Q&A | Session's Discussion: "Code Generation" Research Track |
15:30 - 16:00 | |||
15:30 30mBreak | Monday Afternoon Break ICSE Catering |
16:00 - 17:30 | |||
16:00 - 17:30 | Log Parsing, Bug Localisation, Review ComprehensionResearch Track / Early Research Achievements (ERA) at 205 | ||
16:00 10mTalk | Developing a Taxonomy for Advanced Log Parsing Techniques Research Track Issam Sedki Concordia University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Otmane Ait-Mohamed Concordia University, Naser Ezzati Jivan | ||
16:10 10mTalk | GELog:A GPT-Enhanced Log Representation Method for Anomaly Detection Research Track Wenwu Xu Institute of Information Engineering, Chinese Academy of Sciences and School of Cyberspace Security, University of Chinese Academy of Sciences, Peng Wang Institute of Information Engineering,Chinese Academy of Sciences, Haichao Shi Institute of Information Engineering,Chinese Academy of Sciences, Guoqiao Zhou Institute of Information Engineering,Chinese Academy of Sciences, Junliang Yao Institute of Information Engineering,Chinese Academy of Sciences, Xiao-Yu Zhang Institute of Information Engineering, Chinese Academy of Science | ||
16:20 10mTalk | Log Parsing using LLMs with Self-Generated In-Context Learning and Self-Correction Research Track | ||
16:30 10mTalk | LLM-BL: Large Language Models are Zero-Shot Rankers for Bug Localization Research Track Zhengliang Li Nanjing University, Zhiwei Jiang Nanjing University, Qiguo Huang NanJing Audit University, Qing Gu Nanjing University | ||
16:40 10mTalk | Improved IR-based Bug Localization with Intelligent Relevance Feedback Research Track | ||
16:50 10mTalk | Towards Enhancing IR-based Bug Localization Leveraging Texts and Multimedia from Bug Reports Early Research Achievements (ERA) Shamima Yeasmin University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada, Kevin Schneider University of Saskatchewan, Masud Rahman Dalhousie University, Kartik Mittal University of Saskatchewan, Ryder Hardy University of Saskatchewan | ||
17:00 10mTalk | Building Bridges, Not Walls: Fairness-aware and Accurate Recommendation of Code Reviewers via LLM-based Agents Collaboration Research Track Luqiao Wang Xidian University, Qingshan Li Xidian University, Di Cui Xidian University, Mingkang Wang Xidian University, Yutong Zhao University of Central Missouri, Yongye Xu Xidian University, Huiying Zhuang Xidian University, Yangtao Zhou Xidian University, Lu Wang Xidian University | ||
17:10 10mTalk | Code Review Comprehension: Reviewing Strategies Seen Through Code Comprehension Theories Research Track Pavlina Wurzel Goncalves University of Zurich, Pooja Rani University of Zurich, Margaret-Anne Storey University of Victoria, Diomidis Spinellis Athens University of Economics and Business & Delft University of Technology, Alberto Bacchelli University of Zurich | ||
17:20 10mLive Q&A | Session's Discussion: "Log Parsing, Bug Localisation, Review Comprehension" Research Track |
Accepted Papers
Call for Papers
The 33rd IEEE/ACM International Conference on Program Comprehension (ICPC) is the premier venue for work in the area of software program comprehension. It encompasses human activities for comprehending the software as well as methodologies and technologies for supporting such comprehension.
The research track provides a quality forum for researchers and practitioners from academia, industry, and government to present and discuss new results in program comprehension. Topics of interest for all tracks include but are not limited to:
- Empirical evaluations of program comprehension tools, techniques, and approaches;
- Human aspects in program comprehension, including collaborative software engineering practices, gender considerations, information processing strategies, the role of emotions, emotional awareness, and more;
- Cognitive theories for program comprehension accompanied by different empirical strategies, including experiments, surveys, and case studies;
- Topics at the intersection between program comprehension and programming education;
- Individual, collaborative, distributed, and global program comprehension;
- Novel visualization or summarization techniques and interfaces to support program comprehension, including searching, browsing, and analyzing;
- Comprehension of specific types of software systems, such as open/closed source, mobile applications, spreadsheets, web-based systems, legacy systems, product lines, libraries, multi-threaded applications, and systems of systems;
- Comprehension in the context of diverse software process models and specific lifecycle activities, such as: maintenance, evolution, re-engineering, migration, security, auditing, and testing;
- Comprehension of software artifacts ranging from requirements documents to test cases and crash logs; from API documentation to models, meta-models and model transformation; and from Stack Overflow questions & answers to GitHub code review messages or video tutorials - all software artifacts and formal or informal documentation that software developers encounter when creating or evolving software;
- Comprehension and legal issues, such as due diligence, intellectual property and licensing, reverse engineering, and litigation; Issues and case studies in the transfer of program comprehension technology to industry;
- Automated tool support for program comprehension.
Awards
A subset of the Research Track papers accepted for presentation at ICPC 2025 will be invited to be revised and extended for consideration in a thematic special issue of the Springer Empirical Software Engineering Journal (EMSE). The best papers of the research track will be awarded with an ACM SIGSOFT Distinguished Paper Award at ICPC. In addition, ICPC 2025 will feature ICPC Honorable Mentions, special awards that will be assigned, on the basis of the program committee reports, to the papers that have applied extremely novel and/or outstanding research methods to the problem of interest.
Format and Submission
Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).
All submissions must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. Accepted papers will be allowed one extra page for the main text of the camera-ready version.
- Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above. Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.
- By submitting to the ICPC Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. Papers submitted to ICPC 2025 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICPC 2025. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
- By submitting your article to an IEEE Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.
- Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2023. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.
- The ICPC 2025 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
- Authors’ names must be omitted from the submission.
- All references to the author’s prior work should be in the third person.
- While authors have the right to upload preprints on ArXiV or similar sites, they must avoid specifying that the manuscript was submitted to ICPC 2025.
- During review, authors should not publicly use the submission title. They should thus use a different paper title for any pre-print in arxiv or similar websites.
- Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page from ICSE.
- By submitting to the ICPC Research Track, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.
Submissions to the Technical Track that meet the above requirements can be made via the Research Track submission site by the submission deadline. Any submission that does not comply with these requirements may be desk rejected without further review.
Submission site: https://icpc2025-technical.hotcrp.com
We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing. It is the sole responsibility of the authors to ensure that the formatting guidelines, double anonymous guidelines, and any other submission guidelines are met at the time of paper submission.
Exclusions
Submissions from the ICPC 2025 General Chair, Program Chairs, their current students and current postdocs are not allowed to any ICPC 2025 track.
Open Science Policy
The research track of ICPC 2025 is striving to abide by Open Science policies. In summary, the steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified.
Upon submission to the research track, authors are asked: - to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper; or - to include in the paper an explanation as to why this is not possible or desirable; and - to indicate if they intend to make their data publicly available upon acceptance. - Supplementary material can be uploaded via the ICPC submission site or anonymously linked from the paper submission. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.
Review and Evaluation Criteria
Research papers will be reviewed by at least three members of the Program Committee. The reviewers will remain anonymous and signing of reviews will not be permitted in the review.
Submissions will be evaluated based on the following criteria:
- Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods;
- Significance: The extent to which the paper’s contributions impact program comprehension, and if needed, under which assumptions;
- Novelty: The extent to which the contributions are sufficiently original with respect to the state of the art and clearly explained and contrasted against it;
- Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions;
- Presentation: The extent to which the paper’s quality of writing meets the standards of ICPC, including clear descriptions and explanations, appropriate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided above.
Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.
Author Response Period
ICPC 2025 will offer an author response period. In this period the authors will have the opportunity to inspect the reviews, and answer specific questions raised by the program committee. This period is scheduled after all reviews have been completed, and serves to inform the subsequent decision-making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process.
Withdrawing a Paper
Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICPC 2025 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICPC 2025 as well as any other venue adhering to this policy.
Publication and Presentation
Upon notification of acceptance, all authors of accepted papers will receive further instructions for preparing the camera-ready versions of their submissions. If a submission is accepted, at least one author of the paper is required to register for ICPC 2025, attend the conference and present the paper in person. All accepted papers will be published in the conference electronic proceedings. The presentation is expected to be delivered in person, unless this is impossible due to travel limitations (related to, e.g., health, visa, or COVID-19 prevention). Details about the presentations will follow the notifications. The official publication date is the date the proceedings are made available in the ACM or IEEE Digital Libraries. This date may be up to two weeks prior to the first day of ICPC 2025. The official publication date affects the deadline for any patent filings related to published work. Purchases of additional pages in the proceedings is not allowed.