ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering.
Tue 7 JulDisplayed time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I1-MetastudiesNew Ideas and Emerging Results / Technical Papers / Journal First / Demonstrations at Baekje Chair(s): Michael Vierhauser Johannes Kepler University Linz | ||
07:00 12mTalk | An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical Technical Papers He Zhang Nanjing University, Xin Zhou State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Xin Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Huang Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Muhammad Ali Babar The University of Adelaide |
07:00 - 08:00 | I2-SecurityNew Ideas and Emerging Results / Technical Papers at Goguryeo Chair(s): Andrea Stocco Università della Svizzera italiana | ||
07:00 12mTalk | Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical Technical Papers Pre-print | ||
07:12 12mTalk | HyDiff: Hybrid Differential Software Analysis Technical Papers Yannic Noller Humboldt-Universität zu Berlin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, Marcel Böhme Monash University, Youcheng Sun Queen's University Belfast, Hoang Lam Nguyen Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin Pre-print | ||
07:24 12mTalk | Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical Technical Papers Xiyue Zhang Peking University, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Xiaoning Du Nanyang Technological University, Qiang Hu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University, Meng Sun Peking University Pre-print | ||
07:36 12mTalk | One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical Technical Papers Anastasia Danilova University of Bonn, Alena Naiakshina University of Bonn, Matthew Smith University of Bonn, Fraunhofer FKIE |
08:05 - 09:05 | I4-Clones and ChangesTechnical Papers / Journal First / New Ideas and Emerging Results / Demonstrations at Baekje Chair(s): Chanchal K. Roy University of Saskatchewan | ||
08:05 12mTalk | HARP: Holistic Analysis for Refactoring Python-Based Analytics ProgramsTechnical Technical Papers Weijie Zhou North Carolina State University, Yue Zhao NCSU, Guoqiang Zhang North Carolina State University, Xipeng Shen North Carolina State University | ||
08:17 12mTalk | CC2Vec: Distributed Representations of Code ChangesTechnical Technical Papers Thong Hoang Singapore Management University, Singapore, Hong Jin Kang School of Information Systems, Singapore Management University, Julia Lawall Inria, David Lo Singapore Management University Pre-print |
08:05 - 09:05 | I5-Deep Learning Testing and DebuggingTechnical Papers / Demonstrations at Goguryeo Chair(s): Pooyan Jamshidi University of South Carolina | ||
08:05 12mTalk | DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical Technical Papers Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Jingwei Xu Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University | ||
08:17 12mTalk | White-box Fairness Testing through Adversarial Sampling Technical Papers Peixin Zhang Zhejiang University, Jingyi Wang National University of Singapore, Singapore, Jun Sun Singapore Management University, Guoliang Dong Computer College of Zhejiang University, Xinyu Wang Zhejiang University, Xingen Wang Zhejiang University, Jin Song Dong National University of Singapore, Dai Ting Huawei Corporation | ||
08:35 12mTalk | Taxonomy of Real Faults in Deep Learning Systems Technical Papers Nargiz Humbatova Università della Svizzera italiana, Gunel Jahangirova Università della Svizzera italiana, Gabriele Bavota Università della Svizzera italiana, Vincenzo Riccio Università della Svizzera italiana, Andrea Stocco Università della Svizzera italiana, Paolo Tonella Università della Svizzera italiana | ||
08:47 12mTalk | An Empirical Study on Program Failures of Deep Learning Jobs Technical Papers Ru Zhang Microsoft Research, Wencong Xiao Alibaba, Hongyu Zhang University of Newcastle, Australia, Yu Liu Microsoft Research, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research DOI Pre-print |
08:05 - 09:05 | I6-Empirical Studies and RequirementsJournal First / Software Engineering in Practice / Technical Papers at Silla Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick | ||
08:13 12mTalk | Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnical Technical Papers Lin Shi ISCAS, Mingzhe Xing ISCAS, Mingyang Li ISCAS, Yawen Wang ISCAS, Shoubin Li ISCAS, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
08:33 12mTalk | Context-aware In-process Crowdworker Recommendation Technical Papers Junjie Wang Institute of Software, Chinese Academy of Sciences, Ye Yang Stevens institute of technology, Song Wang York University, Yuanzhe Hu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences |
15:00 - 16:00 | A1-Autonomous Driving SystemsTechnical Papers at Baekje Chair(s): Donghwan Shin University of Luxembourg (SnT) | ||
15:00 12mTalk | SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in Simulink Technical Papers Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington Link to publication DOI Media Attached | ||
15:12 12mTalk | DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical Technical Papers Husheng Zhou The University of Texas at Dallas, Wei Li Southern University of Science and Technology, Zelun Kong The University of Texas at Dallas, Junfeng Guo The University of Texas at Dallas, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang The University of Texas at Dallas, Bei Yu The Chinese University of Hong Kong, Cong Liu UT Dallas | ||
15:24 12mTalk | Misbehaviour Prediction for Autonomous Driving SystemsTechnical Technical Papers Andrea Stocco Università della Svizzera italiana, Michael Weiss Università della Svizzera Italiana (USI), Marco Calzana Università della Svizzera Italiana (USI), Paolo Tonella Università della Svizzera italiana Pre-print | ||
15:36 12mTalk | Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification Technical Papers Claudio Menghi University of Luxembourg, Shiva Nejati University of Ottawa, Lionel Briand SnT Centre/University of Luxembourg, Yago Isasi Parache LuxSpace | ||
15:48 12mTalk | A Comprehensive Study of Autonomous Vehicle BugsTechnical Technical Papers Joshua Garcia University of California, Irvine, Yang Feng Nanjing University, Junjie Shen University of California, Irvine, Sumaya Almanee University of California, Irvine, Yuan Xia University of California, Irvine, Alfred Chen University of California, Irvine |
15:00 - 16:00 | A2-Testing and Debugging 1New Ideas and Emerging Results / Journal First / Technical Papers / Software Engineering in Practice at Goguryeo Chair(s): Na Meng Virginia Tech | ||
15:00 12mTalk | Studying the Use of Java Logging Utilities in the WildTechnical Technical Papers Authorizer link Pre-print | ||
15:12 12mTalk | Causal Testing: Understanding Defects' Root Causes Technical Papers Brittany Johnson University of Massachusetts Amherst, Yuriy Brun University of Massachusetts Amherst, Alexandra Meliou University of Massachusetts Amherst Link to publication DOI Pre-print Media Attached |
15:00 - 16:00 | A3-Code SummarizationTechnical Papers / New Ideas and Emerging Results at Silla Chair(s): Shaohua Wang New Jersey Institute of Technology, USA | ||
15:00 12mTalk | Posit: Simultaneously Tagging Natural and Programming LanguagesTechnical Technical Papers Profir-Petru Pârțachi University College London, Santanu Dash University College London, UK, Christoph Treude The University of Adelaide, Earl T. Barr University College London, UK Pre-print Media Attached File Attached | ||
15:12 12mTalk | CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnical Technical Papers Juan Zhai Rutgers University, Xiangzhe Xu Nanjing University, Yu Shi Purdue University, Guanhong Tao Purdue University, Minxue Pan Nanjing University, Shiqing Ma Rutgers University, Lei Xu National Key Laboratory for Novel Software Technology, Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Lin Tan Purdue University, Xiangyu Zhang Purdue University | ||
15:24 12mTalk | Suggesting Natural Method Names to Check Name ConsistenciesTechnical Technical Papers Son Nguyen The University of Texas at Dallas, Hung Phan , Trinh Le University of Engineering and Technology, Tien N. Nguyen University of Texas at Dallas Pre-print | ||
15:42 12mTalk | Retrieval-based Neural Source Code SummarizationTechnical Technical Papers Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang University of Newcastle, Australia, Hailong Sun Beihang University, Xudong Liu Beihang University Pre-print |
16:05 - 17:05 | A4-Cyber-Physical SystemsSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje Chair(s): Joanne M. Atlee University of Waterloo | ||
16:05 12mTalk | Adapting Requirements Models to Varying EnvironmentsTechnical Technical Papers Dalal Alrajeh Imperial College London, Antoine Cailliau ICTEAM, UCLouvain, Axel van Lamsweerde Université catholique de Louvain | ||
16:17 12mTalk | Comparing Formal Tools for System Design: a Judgment StudyTechnical Technical Papers Alessio Ferrari CNR-ISTI, Franco Mazzanti ISTI-CNR, Davide Basile University of Florence, Maurice H. ter Beek ISTI-CNR, Alessandro Fantechi University of Florence DOI Pre-print |
16:05 - 17:05 | A5-Testing and Debugging 2Demonstrations / New Ideas and Emerging Results / Technical Papers at Goguryeo Chair(s): Marcelo d'Amorim Federal University of Pernambuco | ||
16:05 12mTalk | Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic Execution Technical Papers | ||
16:17 12mTalk | A Study on the Lifecycle of Flaky TestsTechnical Technical Papers Wing Lam University of Illinois at Urbana-Champaign, Kıvanç Muşlu Microsoft, Hitesh Sajnani Microsoft , Suresh Thummalapenta Microsoft | ||
16:38 12mTalk | Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference Technical Papers |
Wed 8 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P9-Bugs and RepairJournal First / Technical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Silla Chair(s): Yingfei Xiong Peking University, China | ||
00:12 12mTalk | On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs Technical Papers Kui Liu Huawei Software Engineering Application Technology Lab, Shangwen Wang National University of Defense Technology, Anil Koyuncu University of Luxembourg, Luxembourg, Kisub Kim University of Luxembourg, SnT, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Peng Wu National University of Defense Technology, Jacques Klein University of Luxembourg, SnT, Xiaoguang Mao National University of Defense Technology, Yves Le Traon University of Luxembourg Pre-print |
01:05 - 02:05 | P10-Stack OverflowJournal First / New Ideas and Emerging Results / Technical Papers at Baekje Chair(s): Emerson Murphy-Hill Google | ||
01:35 12mTalk | Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack OverflowTechnical Technical Papers Alex Cummaudo Applied Artificial Intelligence Institute, Deakin University, Rajesh Vasa Deakin University, Scott Barnett Deakin University, John Grundy Monash University, Mohamed Abdelrazek Deakin University |
01:05 - 02:05 | P11-Natural Language ArtifactsJournal First / Technical Papers at Goguryeo Chair(s): Jane Cleland-Huang University of Notre Dame | ||
01:21 12mTalk | Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnical Technical Papers |
15:00 - 16:00 | A7-Human Aspects 1Technical Papers / Journal First / New Ideas and Emerging Results at Baekje Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
15:14 12mTalk | How Software Practitioners Use Informal Local Meetups to Share Software Engineering KnowledgeTechnical Technical Papers | ||
15:26 12mTalk | Explaining Pair Programming Session Dynamics from Knowledge GapsTechnical Technical Papers DOI Pre-print Media Attached |
15:00 - 16:00 | A8-Machine Learning and ModelsJournal First / Technical Papers at Goguryeo Chair(s): Liliana Pasquale University College Dublin & Lero | ||
15:24 12mTalk | Importance-Driven Deep Learning System TestingTechnical Technical Papers Simos Gerasimou University of York, UK, Hasan Ferit Eniser MPI-SWS, Alper Sen Bogazici University, Turkey, Alper Çakan Bogazici University, Turkey | ||
15:36 12mTalk | Quickly Generating Diverse Valid Test Inputs with Reinforcement Learning Technical Papers Sameer Reddy University of California, Berkeley, Caroline Lemieux University of California, Berkeley, Rohan Padhye Carnegie Mellon University, Koushik Sen University of California, Berkeley |
16:05 - 17:05 | A10-Human Aspects 2Journal First / Technical Papers at Baekje Chair(s): Giuseppe Scanniello University of Basilicata | ||
16:37 12mTalk | Primers or Reminders? The Effects of Existing Review Comments on Code Review Technical Papers Davide Spadini Delft University of Technology, Netherlands, Gül Calikli Chalmers | University of Gothenburg, Alberto Bacchelli University of Zurich DOI Pre-print Media Attached |
16:05 - 17:05 | A11-Performance and AnalysisNew Ideas and Emerging Results / Journal First / Technical Papers / Demonstrations at Goguryeo Chair(s): Pooyan Jamshidi University of South Carolina | ||
16:24 12mTalk | Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet? Technical Papers Zishuo Ding University of Waterloo, Canada, Jinfu Chen Concordia University, Canada, Weiyi Shang Concordia University Pre-print |
16:05 - 17:05 | A12-TestingJournal First / New Ideas and Emerging Results / Demonstrations / Technical Papers at Silla Chair(s): Sasa Misailovic University of Illinois at Urbana-Champaign | ||
16:05 12mTalk | Practical Fault Detection in Puppet Programs Technical Papers Thodoris Sotiropoulos Athens University of Economics and Business, Dimitris Mitropoulos Athens University of Economics and Business, Diomidis Spinellis Athens University of Economics and Business | ||
16:34 12mTalk | Learning from, Understanding, and Supporting DevOps Artifacts for Docker Technical Papers Jordan Henkel University of Wisconsin–Madison, Christian Bird Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Thomas Reps University of Wisconsin-Madison, USA |
Thu 9 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P13-SecurityTechnical Papers / Software Engineering in Practice at Baekje Chair(s): Joshua Garcia University of California, Irvine | ||
00:00 12mTalk | Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return AddressesTechnical Technical Papers | ||
00:24 12mTalk | Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the RescueTechnical Technical Papers Yude Bai Tianjin University, Zhenchang Xing Australia National University, Xiaohong Li TianJin University, Zhiyong Feng Tianjin University, Duoyuan Ma Tianjin University | ||
00:36 12mTalk | SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionTechnical Technical Papers Shengjian Guo Baidu X-Lab, Yueqi Chen The Pennsylvania State University, Peng Li Baidu X-Lab, Yueqiang Cheng Baidu Security, Huibo Wang Baidu X-Lab, Meng Wu Ant Financial, Zhiqiang Zuo Nanjing University, China |
00:00 - 01:00 | P14-TestingTechnical Papers / Software Engineering in Practice at Goguryeo Chair(s): Shin Yoo Korea Advanced Institute of Science and Technology | ||
00:00 12mTalk | Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical Technical Papers Dehai Zhao Australian National University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China | ||
00:12 12mTalk | Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical Technical Papers Xiang Gao National University of Singapore, Singapore, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Laboratories of America, Abhik Roychoudhury National University of Singapore, Singapore | ||
00:36 12mTalk | Testing File System Implementations on Layered ModelsTechnical Technical Papers Dongjie Chen Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University | ||
00:48 12mTalk | A Cost-efficient Approach to Building in Continuous IntegrationTechnical Technical Papers Pre-print |
01:05 - 02:05 | P16-Security and LearningTechnical Papers / Journal First at Baekje Chair(s): Lingming Zhang The University of Texas at Dallas | ||
01:05 12mTalk | Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical Technical Papers Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Keke Hu College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Zhuangzhi Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Qi Xuan Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China, Yi Liu Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Vladimir Filkov University of California at Davis, USA | ||
01:25 12mTalk | How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?Technical Technical Papers Xueling Zhang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio, USA, Rocky Slavin University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Jianwei Niu University of Texas at San Antonio | ||
01:37 12mTalk | Securing UnSafe Rust Programs with XRust Technical Papers | ||
01:49 12mTalk | Is Rust Used Safely by Software Developers?Technical Technical Papers Ana Nora Evans University of Virginia, USA, Bradford Campbell University of Virginia, Mary Lou Soffa University of Virginia |
01:05 - 02:05 | P17-Software DevelopmentJournal First / Technical Papers / Demonstrations at Goguryeo Chair(s): Minghui Zhou Peking University | ||
01:21 12mTalk | Gap between Theory and Practice : An Empirical Study of Security Patches in Solidity Technical Papers | ||
01:33 12mTalk | A Tale from the Trenches: Cognitive Biases and Software Development Technical Papers Souti Chattopadhyay Graduate Student, Nicholas Nelson Oregon State University, Audrey Au Oregon State University, Natalia Morales Oregon State University, Christopher Sanchez Oregon State University, Rahul Pandita Phase Change Software, Anita Sarma Oregon State University |
01:05 - 02:05 | P18-Open Source SystemsJournal First / Technical Papers at Silla Chair(s): John Grundy Monash University | ||
01:21 12mTalk | How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStackTechnical Technical Papers Yuxia Zhang Peking University, Minghui Zhou Peking University, Klaas-Jan Stol University College Cork and Lero, Ireland, Jianyu Wu Peking University, Zhi Jin Peking University Pre-print | ||
01:33 12mTalk | How to Not Get Rich: An Empirical Study of Donations in Open Source Technical Papers Cassandra Overney Olin College of Engineering, Jens Meinicke Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University Pre-print | ||
01:45 12mTalk | Scaling Open Source Communities: an Empirical Study of the Linux kernelTechnical Technical Papers Xin Tan Peking University, Minghui Zhou Peking University, Brian Fitzgerald Lero - The Irish Software Research Centre and University of Limerick Pre-print |
07:00 - 08:00 | I13-Testing and Debugging 1Demonstrations / Technical Papers / Software Engineering in Practice / Journal First at Baekje Chair(s): Shin Hwei Tan Southern University of Science and Technology | ||
07:00 12mTalk | Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous IntegrationTechnical Technical Papers Antonia Bertolino CNR-ISTI, Antonio Guerriero Università di Napoli Federico II, Breno Miranda Federal University of Pernambuco, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II | ||
07:12 12mTalk | Debugging Inputs Technical Papers Lukas Kirschner Saarland University, Ezekiel Soremekun CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security Link to publication DOI Pre-print |
07:00 - 08:00 | I15-Ecosystems 1Technical Papers / Software Engineering in Practice / Journal First at Silla Chair(s): Raula Gaikovina Kula NAIST | ||
07:00 12mTalk | Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical Technical Papers Wanwangying Ma Nanjing University, Lin Chen Nanjing University, Xiangyu Zhang Purdue University, Yang Feng Nanjing University, Zhaogui Xu Nanjing University, China, Zhifei Chen Huawei, Yuming Zhou Nanjing University, Baowen Xu Nanjing University |
08:05 - 09:05 | I16-Testing and Debugging 2Technical Papers / Journal First at Baekje Chair(s): Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID | ||
08:05 12mTalk | Low-Overhead Deadlock PredictionTechnical Technical Papers Yan Cai Institute of Software, Chinese Academy of Sciences, Ruijie Meng University of Chinese Academy of Sciences, Jens Palsberg University of California, Los Angeles | ||
08:49 12mTalk | Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnical Technical Papers Ke Li University of Exeter, Zilin Xiang University of Electronic Science and Technology of China, Tao Chen Loughborough University, Shuo Wang , Kay Chen Tan City University of Hong Kong Pre-print |
08:05 - 09:05 | I17-Contracts and AnalysisDemonstrations / Technical Papers / Software Engineering in Practice / Journal First at Goguryeo Chair(s): Jaechang Nam Handong Global University | ||
08:45 10mTalk | Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts Technical Papers Thomas Durieux KTH Royal Institute of Technology, Sweden, João F. Ferreira INESC-ID and IST, University of Lisbon, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Pedro Cruz IST, University of Lisbon, Portugal Pre-print |
08:05 - 09:05 | I18-APIs and CommitsNew Ideas and Emerging Results / Journal First / Technical Papers at Silla Chair(s): Massimiliano Di Penta University of Sannio | ||
08:19 12mTalk | How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical Technical Papers Hao Xia Fudan University, Yuan Zhang Fudan University, Yingtian Zhou Fudan University, Xiaoting Chen Fudan University, Yang Wang Fudan University, Xiangyu Zhang Purdue University, Shuaishuai Cui Fudan University, Geng Hong Fudan University, Xiaohan Zhang Fudan University, Min Yang Fudan University, Zhemin Yang Fudan University | ||
08:31 12mTalk | An Empirical Study on API Parameter RulesTechnical Technical Papers | ||
08:49 12mTalk | Software Documentation: The Practitioners' PerspectiveTechnical Technical Papers Emad Aghajani Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Switzerland, Mario Linares-Vásquez Universidad de los Andes, Laura Moreno Colorado State University, Gabriele Bavota Università della Svizzera italiana, Michele Lanza Universita della Svizzera italiana (USI), David C. Shepherd Virginia Commonwealth University Pre-print Media Attached |
Fri 10 JulDisplayed time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I19-Code Generation and VerificationTechnical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Baekje Chair(s): Raffi Khatchadourian City University of New York (CUNY) Hunter College | ||
07:06 12mTalk | Automatically Testing String Solvers Technical Papers Pre-print | ||
07:24 12mTalk | Co-Evolving Code with Evolving MetamodelsTechnical Technical Papers Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA |
07:00 - 08:00 | I20-Android TestingTechnical Papers at Goguryeo Chair(s): Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
07:00 12mTalk | Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnical Technical Papers Jiwei Yan Institute of Software, Chinese Academy of Sciences, Hao Liu Beijing University of Technology, Linjie Pan Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences, Bin Liang Renmin University of China, China | ||
07:12 12mTalk | Time-travel Testing of Android Apps Technical Papers Zhen Dong National University of Singapore, Marcel Böhme Monash University, Lucia Cojocaru Politehnica University of Bucharest, Abhik Roychoudhury National University of Singapore, Singapore | ||
07:24 12mTalk | Collaborative Bug Finding for Android AppsTechnical Technical Papers Shin Hwei Tan Southern University of Science and Technology, Ziqiang Li Southern University of Science and Technology Media Attached File Attached | ||
07:36 12mTalk | An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical Technical Papers Sen Chen Nanyang Technological University, Singapore, Lingling Fan Nanyang Technological University, Singapore, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Ting Su ETH Zurich, Switzerland, Jason Minhui Xue The University of Adelaide, Yinxing Xue , Yang Liu Nanyang Technological University, Singapore, Lihua Xu New York University Shanghai Pre-print | ||
07:48 12mTalk | RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical Technical Papers Ju Qian Nanjing University of Aeronautics and Astronautics, Zhengyu Shang Nanjing University of Aeronautics and Astronautics, Shuoyan Yan Nanjing University of Aeronautics and Astronautics, Yan Wang , Lin Chen Nanjing University |
07:00 - 08:00 | I21-Version Control and ProgrammingTechnical Papers / Journal First / Software Engineering in Practice at Silla Chair(s): Sunghun Kim Hong Kong University of Science and Technology | ||
07:44 12mTalk | HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnical Technical Papers Aishwarya Sivaraman University of California, Los Angeles, Jason Lau University of California, Los Angeles, Qian Zhang University of California, Los Angeles, Muhammad Ali Gulzar University of California, Los Angeles, Jason Cong UCLA, Miryung Kim University of California, Los Angeles DOI |
08:05 - 09:05 | I22-TestingTechnical Papers / Demonstrations at Baekje Chair(s): Phil McMinn University of Sheffield | ||
08:08 12mTalk | MemLock: Memory Usage Guided Fuzzing Technical Papers Cheng Wen Xidian University, Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yuekang Li Nanyang Technological University, Shengchao Qin University of Teesside, Yang Liu Nanyang Technological University, Singapore, Zhiwu Xu Shenzhen University, Hongxu Chen Research Associate, Xiaofei Xie Nanyang Technological University, Geguang Pu East China Normal University, Ting Liu Xi'an Jiaotong University DOI Pre-print Media Attached | ||
08:20 12mTalk | Symbolic Verification of Message Passing Interface Programs Technical Papers Hengbiao Yu National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China, Zhendong Su ETH Zurich, Switzerland, Jun Sun Singapore Management University, Chun Huang National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China Pre-print | ||
08:32 12mTalk | SAVER: Scalable, Precise, and Safe Memory-Error Repair Technical Papers Seongjoon Hong Korea University, Junhee Lee Korea University, South Korea, Jeongsoo Lee Korea University, Hakjoo Oh Korea University, South Korea | ||
08:44 12mTalk | A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical Technical Papers Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Chao Zhang Institute for Network Sciences and Cyberspace of Tsinghua University, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Qi Gong Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Min Lin Institute for Network Sciences and Cyberspace of Tsinghua University, Dandan Sun Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Wei Huo Institute of Information Engineering, Chinese Academy of Sciences, Wei Zou Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China |
08:05 - 09:05 | I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo Chair(s): Benoit Baudry KTH Royal Institute of Technology | ||
08:05 12mTalk | Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology | ||
08:17 12mTalk | Pipelining Bottom-up Data Flow AnalysisTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology |
15:00 - 16:00 | A22-CognitionNew Ideas and Emerging Results / Technical Papers / Software Engineering in Practice at Baekje Chair(s): Walid Maalej University of Hamburg | ||
15:00 12mTalk | Recognizing Developers' Emotions while ProgrammingTechnical Technical Papers Daniela Girardi University of Bari, Nicole Novielli University of Bari, Davide Fucci Blekinge Institute of Technology, Filippo Lanubile University of Bari DOI Pre-print | ||
15:12 12mTalk | Neurological Divide: An fMRI Study of Prose and Code Writing Technical Papers Ryan Krueger University of Michigan, Yu Huang University of Michigan, Xinyu Liu University of Michigan, Tyler Santander University of California at Santa Barbara, Westley Weimer University of Michigan, USA, Kevin Leach University of Michigan Pre-print | ||
15:36 12mTalk | Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language? Technical Papers Nischal Shrestha North Carolina State University, Colton Botta North Carolina State University, Titus Barik Microsoft, Chris Parnin North Carolina State University Pre-print |
15:00 - 16:00 | A21-Testing and Debugging 3Journal First / Technical Papers at Silla Chair(s): Tingting Yu University of Kentucky | ||
15:00 12mTalk | Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical Technical Papers Dirk van der Linden University of Bristol, Pauline Anthonysamy Google Inc., Bashar Nuseibeh The Open University (UK) & Lero (Ireland), Thein Tun , Marian Petre The Open University, Mark Levine Lancaster University, John Towse Lancaster University, Awais Rashid University of Bristol, UK | ||
15:36 12mTalk | An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical Technical Papers Sadia Tabassum University of Birmingham, UK, Leandro Minku University of Birmingham, UK, Danyi Feng XiLiu Tech, George Cabral Universidade Federal Rural de Pernambuco, Liyan Song University of Birmingham |
16:05 - 17:05 | A23-RequirementsJournal First / Technical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Dalal Alrajeh Imperial College London | ||
16:05 12mTalk | Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical Technical Papers |
16:05 - 17:05 | A24-Testing and Debugging 4Technical Papers / New Ideas and Emerging Results / Journal First / Demonstrations at Silla Chair(s): Yijun Yu The Open University, UK | ||
16:11 12mTalk | On Learning Meaningful Assert Statements for Unit Test CasesTechnical Technical Papers Cody Watson Washington and Lee University, Michele Tufano Microsoft, Kevin Moran William & Mary/George Mason University, Gabriele Bavota Università della Svizzera italiana, Denys Poshyvanyk William and Mary Pre-print Media Attached | ||
16:23 12mTalk | TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks Technical Papers Guanhong Tao Purdue University, Shiqing Ma Rutgers University, Yingqi Liu Purdue University, USA, Qiuling Xu Purdue University, Xiangyu Zhang Purdue University Pre-print |
Sat 11 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | |||
00:00 12mTalk | Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical Technical Papers Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Cheng Wen Xidian University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Singapore, Shengchao Qin University of Teesside, Hongxu Chen Research Associate, Yulei Sui University of Technology Sydney, Australia Link to publication DOI Pre-print | ||
00:12 12mTalk | sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical Technical Papers Tai D. Nguyen Singapore Management University, Long H. Pham Singapore University of Technology and Design, Jun Sun Singapore Management University, Yun Lin National University of Singapore, Minh Quang Tran Ho Chi Minh City University of Technology | ||
00:24 12mTalk | Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical Technical Papers Caius Brindescu Oregon State University, Iftekhar Ahmed University of California at Irvine, USA, Rafael Leano Oregon State University, Anita Sarma Oregon State University | ||
00:36 12mTalk | Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnical Technical Papers Akond Rahman Tennessee Tech University, Effat Farhana North Carolina State University, Chris Parnin North Carolina State University, Laurie Williams North Carolina State University Pre-print | ||
00:48 12mTalk | JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical Technical Papers Tegan Brennan University of California, Santa Barbara, Seemanta Saha University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara |
00:00 - 01:00 | P26-Deep Learning Testing and DebuggingTechnical Papers at Goguryeo Chair(s): Tim Menzies North Carolina State University | ||
00:00 12mTalk | ReluDiff: Differential Verification of Deep Neural Networks Technical Papers Brandon Paulsen University of Southern California, Jingbo Wang University of Southern California, Chao Wang USC Pre-print | ||
00:12 12mTalk | Structure-Invariant Testing for Machine TranslationTechnical Technical Papers | ||
00:24 12mTalk | Automatic Testing and Improvement of Machine TranslationTechnical Technical Papers Zeyu Sun Peking University, Jie M. Zhang University College London, UK, Mark Harman Facebook and University College London, Mike Papadakis University of Luxembourg, Lu Zhang Peking University, China | ||
00:36 12mTalk | Testing DNN Image Classifier for Confusion & Bias Errors Technical Papers Yuchi Tian Columbia University, Ziyuan Zhong Columbia University, Vicente Ordonez University of Virginia, Gail Kaiser Columbia University, Baishakhi Ray Columbia University, New York | ||
00:48 12mTalk | Repairing Deep Neural Networks: Fix Patterns and Challenges Technical Papers Md Johirul Islam Iowa State University, Rangeet Pan Iowa State University, USA, Giang Nguyen Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University, USA |
00:00 - 01:00 | P27-ApplicationsSoftware Engineering in Practice / Technical Papers at Silla Chair(s): Ganesha Upadhyaya Harmony.one | ||
00:00 12mTalk | Big Code != Big Vocabulary: Open-Vocabulary Models for Source code Technical Papers Rafael-Michael Karampatsis The University of Edinburgh, Hlib Babii Free University of Bozen-Bolzano, Romain Robbes Free University of Bozen-Bolzano, Charles Sutton Google Research, Andrea Janes Free University of Bozen-Bolzano DOI Pre-print | ||
00:24 12mTalk | Managing data constraints in database-backed web applications Technical Papers Junwen Yang University of Chicago, Utsav Sethi University of Chicago, Cong Yan University of Washington, Alvin Cheung University of California, Berkeley, Shan Lu University of Chicago | ||
00:36 12mTalk | Improving Data Scientist Efficiency with Provenance Technical Papers Jingmei Hu Harvard University, Jiwon Joung Harvard University, Maia Jacobs Harvard University, Margo Seltzer University of British Columbia, Krzysztof Gajos Harvard University |
01:05 - 02:05 | P28-Analysis and VerificationSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje Chair(s): Rahul Purandare IIIT-Delhi | ||
01:05 12mTalk | Tailoring Programs for Static Analysis via Program TransformationTechnical Technical Papers | ||
01:20 12mTalk | BCFA: Bespoke Control Flow Analysis for CFA at ScaleTechnical Technical Papers Ramanathan Ramu Iowa State University, Ganesha Upadhyaya Harmony.one, Hoan Anh Nguyen Amazon, Hridesh Rajan Iowa State University, USA | ||
01:32 12mTalk | On the Recall of Static Call Graph Construction in Practice Technical Papers Li Sui Massey University, New Zealand, Jens Dietrich Victoria University of Wellington, Amjed Tahir Massey University, George Fourtounis University of Athens Pre-print |
01:05 - 02:05 | P29-Android and Web TestingDemonstrations / Technical Papers / Software Engineering in Practice at Goguryeo Chair(s): Hironori Washizaki Waseda University | ||
01:05 12mTalk | SLACC: Simion-based Language Agnostic Code Clones Technical Papers George Mathew North Carolina State University, Chris Parnin North Carolina State University, Kathryn Stolee North Carolina State University Pre-print | ||
01:17 8mTalk | Near-Duplicate Detection in Web App Model InferenceTechnical Technical Papers Rahulkrishna Yandrapally University of British Columbia, Canada, Andrea Stocco Università della Svizzera italiana, Ali Mesbah University of British Columbia Pre-print | ||
01:37 12mTalk | Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep Learning Technical Papers Jieshan Chen Australian National University, Chunyang Chen Monash University, Zhenchang Xing Australia National University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China |
01:05 - 02:05 | |||
01:13 12mTalk | Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical Technical Papers Lingchao Chen The University of Texas at Dallas, Foyzul Hassan University of Texas at San Antonio, USA, Xiaoyin Wang University of Texas at San Antonio, USA, Lingming Zhang The University of Texas at Dallas | ||
01:25 12mTalk | Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem Technical Papers Ying Wang Northeastern University, China, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Yibo Wang Northeastern University, Zhenming Li Northeastern University, Chao Wang University of Southern California, Hai Yu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Chang Xu Nanjing University, Zhiliang Zhu Northeastern University, China | ||
01:37 12mTalk | How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical Technical Papers Shurui Zhou Carnegie Mellon University, USA / University of Toronto, CA, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University Pre-print |
15:00 - 16:00 | |||
15:08 12mTalk | ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case CombinationsTechnical Technical Papers Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Chun Cao Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University | ||
15:20 12mTalk | Translating Video Recordings of Mobile App Usages into Replayable Scenarios Technical Papers Carlos Bernal-Cárdenas William and Mary, Nathan Cooper College of William & Mary, Kevin Moran William & Mary/George Mason University, Oscar Chaparro College of William & Mary, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk William and Mary Pre-print Media Attached |
15:00 - 16:00 | A26-Bugs and RepairJournal First / Technical Papers at Goguryeo Chair(s): Davide Falessi California Polytechnic State University | ||
15:00 12mTalk | Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical Technical Papers Mingyuan Wu Southern University of Science and Technology, Yicheng Ouyang Southern University of Science and Technology, Husheng Zhou The University of Texas at Dallas, Lingming Zhang The University of Texas at Dallas, Cong Liu UT Dallas, Yuqun Zhang Southern University of Science and Technology | ||
15:44 12mTalk | DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical Technical Papers Yi Li New Jersey Institute of Technology, USA, Shaohua Wang New Jersey Institute of Technology, USA, Tien N. Nguyen University of Texas at Dallas |
16:05 - 17:05 | A28-Android and Web TestingTechnical Papers / Demonstrations at Baekje Chair(s): Reyhaneh Jabbarvand University of Illinois Urbana-Champaign | ||
16:08 12mTalk | Revealing Injection Vulnerabilities by Leveraging Existing Tests Technical Papers Katherine Hough George Mason University, Gebrehiwet Biyane Welearegai University of Potsdam, Germany, Christian Hammer University of Potsdam, A: Jonathan Bell Northeastern University | ||
16:20 12mTalk | Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways ForwardTechnical Technical Papers Abdulaziz Alshayban University of California, Irvine, Iftekhar Ahmed University of California at Irvine, USA, Sam Malek University of California, Irvine | ||
16:35 12mTalk | Extracting Taint Specifications for JavaScript LibrariesTechnical Technical Papers Cristian-Alexandru Staicu TU Darmstadt, Martin Toldam Torp Aarhus University, Max Schaefer GitHub, Inc., Anders Møller Aarhus University, Michael Pradel University of Stuttgart Pre-print Media Attached | ||
16:47 12mTalk | Finding Client-side Business Flow Tampering VulnerabilitiesTechnical Technical Papers I Luk Kim Purdue University, Yunhui Zheng IBM Research, Hogun Park Purdue University, Weihang Wang University at Buffalo, SUNY, Wei You Renmin University of China, Yousra Aafer Purdue University, Xiangyu Zhang Purdue University |
16:05 - 17:05 | A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Elena Sherman Boise State University | ||
16:05 12mTalk | Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis Technical Papers Manuel Benz University of Paderborn, Erik Krogh Kristensen GitHub, Linghui Luo Paderborn University, Germany, Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached File Attached | ||
16:17 12mTalk | Verifying Object ConstructionTechnical Technical Papers Martin Kellogg University of Washington, Seattle, Manli Ran University of California, Riverside, Manu Sridharan University of California Riverside, Martin Schäf Amazon Web Services, USA, Michael D. Ernst University of Washington, USA | ||
16:35 12mTalk | When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical Technical Papers Pre-print | ||
16:47 12mTalk | Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical Technical Papers Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Jiamou Sun Australian National University, Xin Xia Monash University, JianLing Sun Zhejiang University |
16:05 - 17:05 | A30-Dependencies and ConfigurationTechnical Papers / Software Engineering in Practice at Silla Chair(s): Diomidis Spinellis Athens University of Economics and Business | ||
16:05 12mTalk | Lazy Product Discovery in Huge Configuration Spaces Technical Papers Michael Lienhardt ONERA, Ferruccio Damiani University of Turin, Einar Broch Johnsen University of Oslo, Jacopo Mauro University of Southern Denmark | ||
16:17 12mTalk | Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical Technical Papers Pre-print |
Accepted Papers
Call for Papers
ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering including but not limited to:
Agile software development Program analysis
AI and software engineering Program comprehension
Apps and app store analysis Program repair
Autonomic and (self-)adaptive systems Program synthesis
Cloud computing Programming languages
Component-based software engineering Recommendation systems
Configuration management and deployment Refactoring
Crowd sourced software engineering Requirements engineering
Cyber physical systems Reverse engineering
Debugging Search-based software engineering
Dependability, safety, and reliability Security, privacy, and trust
Distributed and collaborative software engineering Software architecture
Embedded software Software economics and metrics
Empirical software engineering Software evolution and maintenance
End-user software engineering Software modeling and design
Fault localization Software process
Formal methods Software product lines
Green and sustainable technologies Software reuse
Human and social aspects of software engineering Software services
Human-computer interaction Software testing
Middleware, frameworks, and APIs Software visualization
Mining software engineering repositories Specification and modeling languages
Mobile applications Tools and environments
Model-driven engineering Traceability
Parallel, distributed, and concurrent systems Validation and verification
Performance
Review Criteria
Each paper submitted to the Technical Track will be evaluated based on the following criteria:
-
Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods
-
Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges
-
Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art
-
Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions
-
Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions and explanations, adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below
Reviewers will carefully consider all of these criteria during the review process, and as a result, high-quality papers may vary considerably in their type of contribution. For example, one paper could provide an extensive replication of prior work while another could describe a highly novel approach supported by non-trivial experimentation or empirical analysis.
How to Submit
-
All submissions must conform to the ICSE 2020 formatting and submission instructions and must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).
-
Formatting instructions are available at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e.,
\documentclass[sigconf,review]{acmart}
), and use the ACM reference format for the bibliography (i.e.,\bibliographystyle{ACM-Reference-Format}
). The review option adds line numbers, thereby allowing referees to refer to specific lines in their comments. -
By submitting to the ICSE Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism) and the IEEE Plagiarism FAQ (https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html). In particular, papers submitted to ICSE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2020. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
-
Lastly, the ICSE 2020 Technical Track will employ a double-blind review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-blind review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-blind review process can be found in the Q&A page (https://conf.researchr.org/track/icse-2020/icse-2020-papers#Submitting-to-ICSE-Q-A).
Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site (https://icse2020.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-blind reviewing.
Any submission that does not comply with these requirements may be desk rejected by the Technical Track PC Chairs without further review.
Conference Attendance Expectation
If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper in person.
Submitting to ICSE: Q&A
Please note that the Double Blind Review (DBR) process is not used by all tracks. Check in the call for papers whether DBR is used or not.
Q: Why Double Blind?
There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-blind reviewing, see Claire Le Goues’s very well argued, referenced and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli (see https://pure.tudelft.nl/portal/files/17721365/1589a385.pdf).
Q: How to prepare your paper for double-blind reviewing?
You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up as an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
-
Omit all authors’ names from the title page. Please note that it is not sufficient to simply change the font color to white, as names may appear when highlighted or on some printers; nor is it sufficient to cover the names with a rectangle. Also, please make sure that no identifying information is stored in the properties metadata of your submitted pdf. There are many ways to check this, for example from linux: $ pdfinfo paper.pdf or from Adobe Acrobat select File/Properties tab.
-
Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper. If for any reason it is completely impossible to reference your prior work in the third person, then you will need to provide a blinded reference and send a copy of the original paper to the chairs. However, in most cases we expect you to reference your own work in the third person.
-
Do not rely on supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. We allow supplementary material to be uploaded in the submission system, but it is your responsibility to make sure it does not include identifying information. If you choose to upload supplementary material (either through the submission site or as a link), and your material includes identifying information, then your submission could be desk rejected. Furthermore, please keep in mind that reviewers are not obligated to read supplementary material.
Q: I previously published an earlier version of this work in a venue that doesn’t have double-blind. What should I do about acknowledging that previous work?
A: If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.
If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.
Q: Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?
A: It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final post-review, camera ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-blind review process, please refrain from citing the dissertation, to increase anonymity.
You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identifies. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.
Q: What if we want to cite some unpublished work of our own (as motivation for example)
A: If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.
Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?
A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting to the conference.
Author Information
More info will be posted on this page as it becomes available