ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering.
Tue 7 JulDisplayed time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I1-MetastudiesNew Ideas and Emerging Results / Technical Papers / Journal First / Demonstrations at Baekje Chair(s): Michael Vierhauser Johannes Kepler University Linz | ||
07:00 12mTalk | An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical Technical Papers He Zhang Nanjing University, Xin Zhou State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Xin Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Huang Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Muhammad Ali Babar The University of Adelaide | ||
07:12 8mTalk | An Extended Abstract of "Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors"J1 Journal First Zhi Quan (George) Zhou University of Wollongong, Australia, T.H. Tse The University of Hong Kong, Matt Witheridge University of Wollongong | ||
07:20 8mTalk | A Procedure and Guidelines for Analyzing Groups of Software Engineering ReplicationsJ1 Journal First Adrian Santos Parrilla University of Oulu, Sira Vegas Universidad Politecnica de Madrid, Markku Oivo University of Oulu, Natalia Juristo Universidad Politecnica de Madrid | ||
07:28 3mTalk | An SLR-Tool: Search Process in PracticeDemo Demonstrations Andreas Hinderks University of Seville, Francisco José Domínguez Mayo University of Seville, Jörg Thomaschewski University of Applied Sciences Emden/Leer, María José Escalona University of Seville | ||
07:31 6mTalk | Threats to Validity in Experimenting Mutation-Based Fault LocalizationNIER New Ideas and Emerging Results | ||
07:37 8mTalk | Methodological Principles for Reproducible Performance Evaluation in Cloud ComputingJ1 Journal First Alessandro Vittorio Papadopoulos Mälardalen University, Laurens Versluis Vrije Universiteit Amsterdam, André Bauer University of Würzburg, Nikolas Herbst University of Würzburg, Joakim von Kistowski University of Würzburg, Ahmed Ali-Eldin UMass Amherst, Cristina L. Abad Escuela Superior Politecnica del Litoral, Jose Nelson Amaral University of Alberta, Petr Tuma Charles University, Alexandru Iosup Vrije Universiteit Amsterdam | ||
07:45 8mTalk | Bayesian Data Analysis in Empirical Software Engineering ResearchJ1 Journal First Carlo A. Furia Università della Svizzera italiana (USI), Robert Feldt Chalmers | University of Gothenburg, Blekinge Institute of Technology, Richard Torkar Chalmers and the University of Gothenburg DOI Pre-print |
07:00 - 08:00 | I2-SecurityNew Ideas and Emerging Results / Technical Papers at Goguryeo Chair(s): Andrea Stocco Università della Svizzera italiana | ||
07:00 12mTalk | Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical Technical Papers Pre-print | ||
07:12 12mTalk | HyDiff: Hybrid Differential Software AnalysisTechnical Technical Papers Yannic Noller Humboldt-Universität zu Berlin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, Marcel Böhme Monash University, Youcheng Sun Queen's University Belfast, Hoang Lam Nguyen Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin Pre-print | ||
07:24 12mTalk | Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical Technical Papers Xiyue Zhang Peking University, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Xiaoning Du Nanyang Technological University, Qiang Hu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University, Meng Sun Peking University Pre-print | ||
07:36 12mTalk | One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical Technical Papers Anastasia Danilova University of Bonn, Alena Naiakshina University of Bonn, Matthew Smith University of Bonn, Fraunhofer FKIE | ||
07:48 6mTalk | Hey, my data are mine! Active data to empower the userNIER New Ideas and Emerging Results Gian Luca Scoccia University of L'Aquila, Matteo Maria Fiore University of L'Aquila, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Marco Autili University of L'Aquila, Italy, Paola Inverardi University of L'Aquila, Alejandro Russo Chalmers University of Technology, Sweden | ||
07:54 6mTalk | Threat modeling: from infancy to maturityNIER New Ideas and Emerging Results Koen Yskout imec - DistriNet, KU Leuven, Thomas Heyman Toreon, Dimitri Van Landuyt Katholieke Universiteit Leuven, Laurens Sion imec-DistriNet, KU Leuven, Kim Wuyts imec-DistriNet, KU Leuven, Wouter Joosen Katholieke Universiteit Leuven Pre-print |
08:05 - 09:05 | I5-Deep Learning Testing and DebuggingTechnical Papers / Demonstrations at Goguryeo Chair(s): Pooyan Jamshidi University of South Carolina | ||
08:05 12mTalk | DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical Technical Papers Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Jingwei Xu Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University | ||
08:17 12mTalk | White-box Fairness Testing through Adversarial SamplingTechnical Technical Papers Peixin Zhang Zhejiang University, Jingyi Wang National University of Singapore, Singapore, Jun Sun Singapore Management University, Guoliang Dong Computer College of Zhejiang University, Xinyu Wang Zhejiang University, Xingen Wang Zhejiang University, Jin Song Dong National University of Singapore, Dai Ting Huawei Corporation | ||
08:29 3mTalk | FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo Demonstrations Salah Ghamizi SntT - University of Luxembourg, Maxime Cordy SnT, University of Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg | ||
08:32 3mTalk | EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo Demonstrations Yongqiang TIAN The Hong Kong University of Science and Technology, Zhihua Zeng Zhejiang University, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Tzu-yang Kuo The Hong Kong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
08:35 12mTalk | Taxonomy of Real Faults in Deep Learning SystemsTechnical Technical Papers Nargiz Humbatova Università della Svizzera italiana, Gunel Jahangirova Università della Svizzera italiana, Gabriele Bavota Università della Svizzera italiana, Vincenzo Riccio Università della Svizzera italiana, Andrea Stocco Università della Svizzera italiana, Paolo Tonella Università della Svizzera italiana | ||
08:47 12mTalk | An Empirical Study on Program Failures of Deep Learning JobsTechnical Technical Papers Ru Zhang Microsoft Research, Wencong Xiao Alibaba, Hongyu Zhang University of Newcastle, Australia, Yu Liu Microsoft Research, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research DOI Pre-print |
08:05 - 09:05 | I6-Empirical Studies and RequirementsJournal First / Software Engineering in Practice / Technical Papers at Silla Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick | ||
08:05 8mTalk | What do Programmers Discuss about Deep Learning FrameworksJ1 Journal First Junxiao Han Zhejiang University, Emad Shihab Concordia University, Zhiyuan Wan Zhejiang University, Shuiguang Deng Zhejiang University, Xin Xia Monash University | ||
08:13 12mTalk | Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnical Technical Papers Lin Shi ISCAS, Mingzhe Xing ISCAS, Mingyang Li ISCAS, Yawen Wang ISCAS, Shoubin Li ISCAS, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
08:25 8mTalk | Recognizing lines of code violating company-specific coding guidelines using machine learningJ1 Journal First Miroslaw Ochodek Poznan University of Technology, Regina Hebig Chalmers University of Technology & University of Gothenburg, Wilhelm Meding Ericsson, Gert Frost Grundfos, Miroslaw Staron University of Gothenburg | ||
08:33 12mTalk | Context-aware In-process Crowdworker RecommendationTechnical Technical Papers Junjie Wang Institute of Software, Chinese Academy of Sciences, Ye Yang Stevens institute of technology, Song Wang York University, Yuanzhe Hu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
08:45 12mTalk | Using a Context-Aware Approach to Recommend Code Reviewers: Findings from an Industrial Case StudySEIP Software Engineering in Practice Anton Strand Ericsson AB, Markus Gunnarsson Ericsson AB, Ricardo Britto Ericsson / Blekinge Institute of Technology, Muhammad Usman Blekinge Institute of Technology |
09:10 - 10:00 | |||
09:10 50mTalk | SimilarAPI: Mining Analogical APIs for Library MigrationDemo Demonstrations Chunyang Chen Monash University | ||
09:10 50mTalk | EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo Demonstrations Yongqiang TIAN The Hong Kong University of Science and Technology, Zhihua Zeng Zhejiang University, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Tzu-yang Kuo The Hong Kong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
09:10 50mTalk | An SLR-Tool: Search Process in PracticeDemo Demonstrations Andreas Hinderks University of Seville, Francisco José Domínguez Mayo University of Seville, Jörg Thomaschewski University of Applied Sciences Emden/Leer, María José Escalona University of Seville | ||
09:10 50mTalk | FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo Demonstrations Salah Ghamizi SntT - University of Luxembourg, Maxime Cordy SnT, University of Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg |
15:00 - 16:00 | A1-Autonomous Driving SystemsTechnical Papers at Baekje Chair(s): Donghwan Shin University of Luxembourg (SnT) | ||
15:00 12mTalk | SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in SimulinkTechnical Technical Papers Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington Link to publication DOI Media Attached | ||
15:12 12mTalk | DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical Technical Papers Husheng Zhou The University of Texas at Dallas, Wei Li Southern University of Science and Technology, Zelun Kong The University of Texas at Dallas, Junfeng Guo The University of Texas at Dallas, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang The University of Texas at Dallas, Bei Yu The Chinese University of Hong Kong, Cong Liu UT Dallas | ||
15:24 12mTalk | Misbehaviour Prediction for Autonomous Driving SystemsTechnical Technical Papers Andrea Stocco Università della Svizzera italiana, Michael Weiss Università della Svizzera Italiana (USI), Marco Calzana Università della Svizzera Italiana (USI), Paolo Tonella Università della Svizzera italiana Pre-print | ||
15:36 12mTalk | Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System IdentificationTechnical Technical Papers Claudio Menghi University of Luxembourg, Shiva Nejati University of Ottawa, Lionel Briand SnT Centre/University of Luxembourg, Yago Isasi Parache LuxSpace | ||
15:48 12mTalk | A Comprehensive Study of Autonomous Vehicle BugsTechnical Technical Papers Joshua Garcia University of California, Irvine, Yang Feng Nanjing University, Junjie Shen University of California, Irvine, Sumaya Almanee University of California, Irvine, Yuan Xia University of California, Irvine, Qi Alfred Chen University of California, Irvine |
15:00 - 16:00 | A3-Code SummarizationTechnical Papers / New Ideas and Emerging Results at Silla Chair(s): Shaohua Wang New Jersey Institute of Technology, USA | ||
15:00 12mTalk | Posit: Simultaneously Tagging Natural and Programming LanguagesTechnical Technical Papers Profir-Petru Pârțachi University College London, Santanu Dash University College London, UK, Christoph Treude The University of Adelaide, Earl T. Barr University College London, UK Pre-print Media Attached File Attached | ||
15:12 12mTalk | CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnical Technical Papers Juan Zhai Rutgers University, Xiangzhe Xu Nanjing University, Yu Shi Purdue University, Guanhong Tao Purdue University, Minxue Pan Nanjing University, Shiqing Ma Rutgers University, Lei Xu National Key Laboratory for Novel Software Technology, Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Lin Tan Purdue University, Xiangyu Zhang Purdue University | ||
15:24 12mTalk | Suggesting Natural Method Names to Check Name ConsistenciesTechnical Technical Papers Son Nguyen The University of Texas at Dallas, Hung Phan , Trinh Le University of Engineering and Technology, Tien N. Nguyen University of Texas at Dallas Pre-print | ||
15:36 6mTalk | Where should I comment my code? A dataset and model for predicting locations that need commentsNIER New Ideas and Emerging Results Annie Louis University of Edinburgh, Santanu Dash University College London, UK, Earl T. Barr University College London, UK, Michael D. Ernst University of Washington, USA, Charles Sutton Google Research | ||
15:42 12mTalk | Retrieval-based Neural Source Code SummarizationTechnical Technical Papers Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang University of Newcastle, Australia, Hailong Sun Beihang University, Xudong Liu Beihang University Pre-print | ||
15:54 6mTalk | The Dual Channel HypothesisNIER New Ideas and Emerging Results Casey Casalnuovo University of California at Davis, USA, Earl T. Barr University College London, UK, Santanu Dash University College London, UK, Prem Devanbu University of California, Emily Morgan University of California, Davis |
16:05 - 17:05 | A4-Cyber-Physical SystemsSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje Chair(s): Joanne M. Atlee University of Waterloo | ||
16:05 12mTalk | Adapting Requirements Models to Varying EnvironmentsTechnical Technical Papers Dalal Alrajeh Imperial College London, Antoine Cailliau ICTEAM, UCLouvain, Axel van Lamsweerde Université catholique de Louvain | ||
16:17 12mTalk | Comparing Formal Tools for System Design: a Judgment StudyTechnical Technical Papers Alessio Ferrari CNR-ISTI, Franco Mazzanti ISTI-CNR, Davide Basile University of Florence, Maurice H. ter Beek ISTI-CNR, Alessandro Fantechi University of Florence DOI Pre-print | ||
16:29 3mTalk | Demo: SLEMI: Finding Simulink Compiler Bugs through Equivalence Modulo Input (EMI)Demo Demonstrations Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington Link to publication DOI Media Attached | ||
16:32 12mTalk | The Forgotten Case of the Dependency Bugs: On the Example of the Robot Operating SystemSEIP Software Engineering in Practice Anders Fischer-Nielsen IT University of Copenhagen, Zhoulai Fu IT University of Copenhagen, Denmark, Ting Su ETH Zurich, Switzerland, Andrzej Wąsowski IT University of Copenhagen, Denmark Pre-print | ||
16:44 3mTalk | PROMISE: High-Level Mission Specification for Multiple RobotsDemo Demonstrations Sergio Garcia Chalmers | University of Gothenburg, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Claudio Menghi University of Luxembourg, Thorsten Berger Chalmers | University of Gothenburg, Tomas Bures Charles University, Czech Republic | ||
16:47 12mTalk | How do you Architect your Robots? State of the Practice and Guidelines for ROS-based SystemsSEIP Software Engineering in Practice Ivano Malavolta Vrije Universiteit Amsterdam, Grace Lewis Carnegie Mellon Software Engineering Institute, Bradley Schmerl Carnegie Mellon University, USA, Patricia Lago Vrije Universiteit Amsterdam, David Garlan Carnegie Mellon University |
Wed 8 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P9-Bugs and RepairJournal First / Technical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Silla Chair(s): Yingfei Xiong Peking University, China | ||
00:00 12mTalk | PRECFIX: Large-Scale Patch Recommendation by Mining Defect-Patch PairsSEIP Software Engineering in Practice Xindong Zhang Alibaba Group, Chenguang Zhu University of Texas, Austin, Yi Li Nanyang Technological University, Jianmei Guo Alibaba Group, Lihua Liu Alibaba Group, Haobo Gu Alibaba Group Pre-print | ||
00:12 12mTalk | On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsTechnical Technical Papers Kui Liu Huawei Software Engineering Application Technology Lab, Shangwen Wang National University of Defense Technology, Anil Koyuncu University of Luxembourg, Luxembourg, Kisub Kim University of Luxembourg, SnT, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Peng Wu National University of Defense Technology, Jacques Klein University of Luxembourg, SnT, Xiaoguang Mao National University of Defense Technology, Yves Le Traon University of Luxembourg Pre-print | ||
00:24 8mTalk | SEQUENCER: Sequence-to-Sequence Learning for End-to-End Program RepairJ1 Journal First Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Colorado State University, Michele Tufano College of William and Mary, Louis-Noël Pouchet Colorado State University, USA, Denys Poshyvanyk William and Mary, Martin Monperrus KTH Royal Institute of Technology | ||
00:32 8mTalk | A Study of Bug Resolution Characteristics in Popular Programming LanguagesJ1 Journal First Jie M. Zhang University College London, UK, Feng Li , Dan Hao Peking University, Meng Wang University of Bristol, UK, Hao Tang Peking University, Lu Zhang Peking University, China, Mark Harman Facebook and University College London | ||
00:40 12mTalk | Automated Bug Reproduction from User Reviews for Android ApplicationsSEIP Software Engineering in Practice Shuyue Li Xi'an Jiaotong University, Jiaqi Guo Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Jian-Guang Lou Microsoft Research, Qinghua Zheng Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
00:52 6mTalk | CHASE: Checklist to Assess User Experience in Internet of Things EnvironmentsNIER New Ideas and Emerging Results Rodrigo Almeida Federal University of Ceará, Joseane Paiva Federal University of Ceará, Rossana Andrade Federal University of Ceará, Ticianne Darin Federal University of Ceará |
01:05 - 02:05 | P11-Natural Language ArtifactsJournal First / Technical Papers at Goguryeo Chair(s): Jane Cleland-Huang University of Notre Dame | ||
01:05 8mTalk | Neural Network Based Classification of Self-admitted Technical Debt: From Performance to Explainability and DeployabilityJ1 Journal First Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Xin Xia Monash University, David Lo Singapore Management University, Xinyu Wang Zhejiang University, John Grundy Monash University | ||
01:13 8mTalk | Domain-specific Machine Translation with Recurrent Neural Network for Software LocalizationJ1 Journal First Xu Wang College of Engineering & Computer ScienceAustralian National University, Canberra, Australia, Chunyang Chen Monash University, Zhenchang Xing Australia National University | ||
01:21 12mTalk | Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnical Technical Papers |
01:05 - 02:05 | P12-Testing and DebuggingJournal First / Software Engineering in Practice at Silla Chair(s): Taeksu Kim Samsung Research, Samsung Electronics | ||
01:05 12mTalk | Debugging Crashes using Continuous Contrast Set MiningSEIP Software Engineering in Practice Rebecca Qian Facebook, Inc., Yang Yu Purdue University, Wonhee Park Facebook, Inc., Vijayaraghavan Murali Facebook, Inc., Stephen J Fink Facebook, Satish Chandra Facebook | ||
01:17 12mTalk | Automatic Abnormal Log Detection by Analyzing Log History for Providing Debugging InsightSEIP Software Engineering in Practice Jinhan Kim , Valeriy Savchenko Ivannikov Institute for System Programming of the RAS, Kihyuck Shin Samsung Electronics, Konstantin Sorokin Ivannikov Institute for System Programming of the RAS, Hyunseok Jeon Samsung Electronics, Georgiy Pankratenko Ivannikov Institute for System Programming of the RAS, Sergey Markov Ivannikov Institute for System Programming of the RAS, Chul-Joo Kim Samsung Electronics | ||
01:29 8mTalk | Explaining Regressions via Alignment Slicing and MendingJ1 Journal First Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yun Lin National University of Singapore, Zijiang Yang Western Michigan University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University, Singapore, Jin Song Dong National University of Singapore, Qinghua Zheng Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
01:37 8mTalk | Historical Spectrum based Fault LocalizationJ1 Journal First Ming Wen Huazhong University of Science and Technology, China, Junjie Chen Tianjin University, China, Yongqiang TIAN The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Dan Hao Peking University, Shi Han Microsoft Research Asia, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
01:45 8mTalk | Visualizing distributed system executionsJ1 Journal First Ivan Beschastnikh Computer Science, University of British Columbia, Perry Liu University of British Columbia, Albert Xing University of British Columbia, Patty Wang University of British Columbia, Yuriy Brun University of Massachusetts Amherst, Michael D. Ernst University of Washington, USA DOI Pre-print | ||
01:53 8mTalk | An Integration Test Order Strategy to Consider Control CouplingJ1 Journal First Shujuan Jiang China University of Mining and Technology, Miao ZHANG City University of Hong Kong, Yanmei ZHANG China University of Mining and Technology, Rongcun Wang China University of Mining and Technology, Qiao YU Jiangsu Normal University, Jacky Keung City University of Hong Kong |
15:00 - 16:00 | A8-Machine Learning and ModelsJournal First / Technical Papers at Goguryeo Chair(s): Liliana Pasquale University College Dublin & Lero | ||
15:00 8mTalk | Improving Vulnerability Inspection Efficiency Using Active LearningJ1 Journal First Zhe Yu NORTH CAROLINA STATE UNIVERSITY, Chris Theisen Microsoft, Laurie Williams North Carolina State University, Tim Menzies North Carolina State University | ||
15:08 8mTalk | How Bugs Are Born: A Model to Identify How Bugs Are Introduced in Software ComponentsJ1 Journal First Gema Rodríguez-Pérez University of Waterloo, Canada, Gregorio Robles Universidad Rey Juan Carlos, Alexander Serebrenik Eindhoven University of Technology, Andy Zaidman TU Delft, Daniel M. German University of Victoria, Jesus M. Gonzalez-Barahona Universidad Rey Juan Carlos DOI Pre-print | ||
15:16 8mTalk | How to “DODGE” Complex Software AnalyticsJ1 Journal First Amritanshu Agrawal Wayfair, Wei Fu Landing AI, Di Chen North Carolina State University, USA, Xipeng Shen North Carolina State University, Tim Menzies North Carolina State University | ||
15:24 12mTalk | Importance-Driven Deep Learning System TestingTechnical Technical Papers Simos Gerasimou University of York, UK, Hasan Ferit Eniser MPI-SWS, Alper Sen Bogazici University, Turkey, Alper Çakan Bogazici University, Turkey | ||
15:36 12mTalk | Quickly Generating Diverse Valid Test Inputs with Reinforcement LearningTechnical Technical Papers Sameer Reddy University of California, Berkeley, Caroline Lemieux University of California, Berkeley, Rohan Padhye Carnegie Mellon University, Koushik Sen University of California, Berkeley | ||
15:48 8mTalk | Impact of Discretization Noise of the Dependent variable on Machine Learning Classifiers in Software EngineeringJ1 Journal First Gopi Krishnan Rajbahadur Queen's University, Shaowei Wang Mississippi State University, Yasutaka Kamei Kyushu University, Ahmed E. Hassan Queen's University |
15:00 - 16:00 | A9-TraceabilityNew Ideas and Emerging Results / Demonstrations / Technical Papers / Software Engineering in Practice at Silla Chair(s): Andrea Zisman The Open University | ||
15:00 12mTalk | A Novel Approach to Tracing Safety Requirements and State-Based Design ModelsTechnical Technical Papers Mounifah Alenazi University of Cincinnati, Nan Niu University of Cincinnati, Juha Savolainen Danfoss | ||
15:12 12mTalk | Establishing Multilevel Test-to-Code Traceability LinksTechnical Technical Papers Robert White University College London, UK, Jens Krinke University College London, Raymond Tan University College London | ||
15:24 6mTalk | Synthesis of Assurance Cases for Software CertificationNIER New Ideas and Emerging Results Hamid Bagheri University of Nebraska-Lincoln, USA, Eunsuk Kang Carnegie Mellon University, Niloofar Mansoor University of Nebraska - Lincoln Pre-print | ||
15:30 3mTalk | TimeTracer: A Tool for Back in Time Traceability ReplayingDemo Demonstrations Christoph Mayr-Dorn Johannes Kepler University Linz, Michael Vierhauser Johannes Kepler University Linz, Felix Keplinger Johannes Kepler University, Linz, Stefan Bichler Johannes Kepler University, Linz, Alexander Egyed Johannes Kepler University, Linz | ||
15:33 12mTalk | Lack of Adoption of Units of Measurement Libraries: Survey and AnecdotesSEIP Software Engineering in Practice Steve McKeever Department of Informatics and Media, Uppsala University, Sweden, Omar-Alfred Salah Department of Informatics and Media, Uppsala University, Sweden | ||
15:45 12mTalk | Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian NetworksTechnical Technical Papers Kevin Moran William & Mary/George Mason University, David Nader Palacio William & Mary, Carlos Bernal-Cárdenas William and Mary, Denys Poshyvanyk William and Mary, Daniel McCrystal William & Mary, Chris Shenefiel Cisco Systems, Jeff Johnson Cisco Systems Pre-print Media Attached |
16:05 - 17:05 | A10-Human Aspects 2Journal First / Technical Papers at Baekje Chair(s): Giuseppe Scanniello University of Basilicata | ||
16:05 8mTalk | Characterizing and Identifying Reverted CommitsJ1 Journal First Meng Yan Chongqing University, Xin Xia Monash University, David Lo Singapore Management University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University | ||
16:13 8mTalk | An Empirical Study of Obsolete Answers on Stack OverflowJ1 Journal First Haoxiang Zhang Software Analysis and Intelligence Lab (SAIL), Queen’s University, Kingston, Ontario, Canada, Shaowei Wang Mississippi State University, Tse-Hsun (Peter) Chen Concordia University, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University | ||
16:21 8mTalk | An Empirical Characterization of Bad Practices in Continuous IntegrationJ1 Journal First Fiorella Zampetti University of Sannio, Carmine Vassallo University of Zurich, Sebastiano Panichella Zurich University of Applied Sciences, Gerardo Canfora University of Sannio, Harald Gall University of Zurich, Massimiliano Di Penta University of Sannio Link to publication DOI Pre-print | ||
16:29 8mTalk | To the Attention of Mobile Software Developers: Guess What, Test your App!J1 Journal First Luís Cruz Deflt University of Technology, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, David Lo Singapore Management University DOI Pre-print Media Attached | ||
16:37 12mTalk | Primers or Reminders? The Effects of Existing Review Comments on Code ReviewTechnical Technical Papers Davide Spadini Delft University of Technology, Netherlands, Gül Calikli Chalmers | University of Gothenburg, Alberto Bacchelli University of Zurich DOI Pre-print Media Attached |
16:05 - 17:05 | A12-TestingJournal First / New Ideas and Emerging Results / Demonstrations / Technical Papers at Silla Chair(s): Sasa Misailovic University of Illinois at Urbana-Champaign | ||
16:05 12mTalk | Practical Fault Detection in Puppet ProgramsTechnical Technical Papers Thodoris Sotiropoulos Athens University of Economics and Business, Dimitris Mitropoulos Athens University of Economics and Business, Diomidis Spinellis Athens University of Economics and Business | ||
16:17 8mTalk | Empirical Assessment of Multimorphic TestingJ1 Journal First Paul Temple PReCISE, NaDi, UNamur, Mathieu Acher (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA | ||
16:25 3mTalk | RTj: a Java framework for detecting and refactoring rotten green test casesDemo Demonstrations Matias Martinez Université Polytechnique Hauts-de-France, Anne Etien Université de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL, Stéphane Ducasse INRIA Lille, Christopher Fuhrman École de technologie supérieure Pre-print Media Attached | ||
16:28 6mTalk | A Container-Based Infrastructure for Fuzzy-Driven Root Causing of Flaky TestsNIER New Ideas and Emerging Results Valerio Terragni Università della Svizzera Italiana, Pasquale Salza University of Zurich, Filomena Ferrucci University of Salerno Pre-print Media Attached | ||
16:34 12mTalk | Learning from, Understanding, and Supporting DevOps Artifacts for DockerTechnical Technical Papers Jordan Henkel University of Wisconsin–Madison, Christian Bird Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Thomas Reps University of Wisconsin-Madison, USA | ||
16:46 8mTalk | Improving Change Prediction Models with Code Smell-Related InformationJ1 Journal First Gemma Catolino Delft University of Technology, Fabio Palomba University of Salerno, Francesca Arcelli Fontana University of Milano-Bicocca, Andrea De Lucia University of Salerno, Andy Zaidman TU Delft, Filomena Ferrucci University of Salerno DOI Pre-print | ||
16:54 3mTalk | SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo Demonstrations Phu X. Mai University of Luxembourg, Arda Goknil SnT, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel C. Briand SnT Centre/University of Luxembourg |
17:10 - 18:00 | |||
17:10 50mTalk | PG-KLEE: Trading Soundness for CoverageDemo Demonstrations | ||
17:10 50mTalk | SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo Demonstrations Phu X. Mai University of Luxembourg, Arda Goknil SnT, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel C. Briand SnT Centre/University of Luxembourg | ||
17:10 50mTalk | Nimbus: Improving the Developer Experience for Serverless ApplicationsDemo Demonstrations Pre-print |
Thu 9 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P14-TestingTechnical Papers / Software Engineering in Practice at Goguryeo Chair(s): Shin Yoo Korea Advanced Institute of Science and Technology | ||
00:00 12mTalk | Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical Technical Papers Dehai Zhao Australian National University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China | ||
00:12 12mTalk | Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical Technical Papers Xiang Gao National University of Singapore, Singapore, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Laboratories of America, Abhik Roychoudhury National University of Singapore, Singapore | ||
00:24 12mTalk | Modeling and Ranking Flaky Tests at AppleSEIP Software Engineering in Practice Emily Kowalczyk Apple Inc., Karan Nair Apple, Zebao Gao Apple, Leopold Silberstein Apple Inc., Teng Long Apple, Atif Memon Apple Inc. | ||
00:36 12mTalk | Testing File System Implementations on Layered ModelsTechnical Technical Papers Dongjie Chen Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University | ||
00:48 12mTalk | A Cost-efficient Approach to Building in Continuous IntegrationTechnical Technical Papers Pre-print |
01:05 - 02:05 | P16-Security and LearningTechnical Papers / Journal First at Baekje Chair(s): Lingming Zhang The University of Texas at Dallas | ||
01:05 12mTalk | Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical Technical Papers Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Keke Hu College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Zhuangzhi Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Qi Xuan Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China, Yi Liu Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Vladimir Filkov University of California at Davis, USA | ||
01:17 8mTalk | Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer LearningJ1 Journal First Suyu Ma Monash University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Cheng Chen PricewaterhouseCoopers Firm, Lizhen Qu Monash University, Guoqiang Li Shanghai Jiao Tong University | ||
01:25 12mTalk | How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?Technical Technical Papers Xueling Zhang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio, USA, Rocky Slavin University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Jianwei Niu University of Texas at San Antonio | ||
01:37 12mTalk | Securing UnSafe Rust Programs with XRustTechnical Technical Papers | ||
01:49 12mTalk | Is Rust Used Safely by Software Developers?Technical Technical Papers Ana Nora Evans University of Virginia, USA, Bradford Campbell University of Virginia, Mary Lou Soffa University of Virginia |
01:05 - 02:05 | P17-Software DevelopmentJournal First / Technical Papers / Demonstrations at Goguryeo Chair(s): Minghui Zhou Peking University | ||
01:05 8mTalk | Improving the Pull Requests Review Process Using Learning-to-rank AlgorithmsJ1 Journal First Guoliang Zhao Computer Science of Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario | ||
01:13 8mTalk | Understanding the motivations, challenges and needs of Blockchain software developers: a surveyJ1 Journal First Amiangshu Bosu Wayne State University, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Rifat Shahriyar Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Partho Chakraborty Bangladesh University of Engineering and Technology Dhaka, Bangladesh | ||
01:21 12mTalk | Gap between Theory and Practice : An Empirical Study of Security Patches in SolidityTechnical Technical Papers | ||
01:33 12mTalk | A Tale from the Trenches: Cognitive Biases and Software DevelopmentTechnical Technical Papers Souti Chattopadhyay Graduate Student, Nicholas Nelson Oregon State University, Audrey Au Oregon State University, Natalia Morales Oregon State University, Christopher Sanchez Oregon State University, Rahul Pandita Phase Change Software, Anita Sarma Oregon State University | ||
01:45 3mTalk | VITALSE: Visualizing Eye Tracking and Biometric DataDemo Demonstrations Devjeet Roy Washington State University, Sarah Fakhoury Washington State University, Venera Arnaoudova Washington State University Pre-print |
02:10 - 03:00 | |||
02:10 50mTalk | VITALSE: Visualizing Eye Tracking and Biometric DataDemo Demonstrations Devjeet Roy Washington State University, Sarah Fakhoury Washington State University, Venera Arnaoudova Washington State University Pre-print |
07:00 - 08:00 | I15-Ecosystems 1Technical Papers / Software Engineering in Practice / Journal First at Silla Chair(s): Raula Gaikovina Kula NAIST | ||
07:00 12mTalk | Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical Technical Papers Wanwangying Ma Nanjing University, Lin Chen Nanjing University, Xiangyu Zhang Purdue University, Yang Feng Nanjing University, Zhaogui Xu Nanjing University, China, Zhifei Chen Huawei, Yuming Zhou Nanjing University, Baowen Xu Nanjing University | ||
07:12 8mTalk | SIEVE: Helping Developers Sift Wheat from Chaff via Cross-Platform AnalysisJ1 Journal First Agus Sulistya Telkom Institute of Technology Surabaya, Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Singapore Management University, Singapore, David Lo Singapore Management University, Christoph Treude The University of Adelaide | ||
07:20 18mTalk | Sharing at Scale: An Open-Source-Software-based License Compliance EcosystemSEIP Software Engineering in Practice | ||
07:38 8mTalk | Extended abstract “Software Deployment on Heterogeneous Platforms: A Systematic Mapping Study”J1 Journal First Hugo Andrade Chalmers University of Technology, Jan Schroeder Chalmers | University of Gothenburg, Ivica Crnkovic Chalmers | University of Gothenburg | ||
07:46 8mTalk | A Large Scale Study of Long-Time Contributor Prediction for GitHub ProjectsJ1 Journal First Lingfeng Bao Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, Gail Murphy University of British Columbia |
08:05 - 09:05 | I16-Testing and Debugging 2Technical Papers / Journal First at Baekje Chair(s): Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID | ||
08:05 12mTalk | Low-Overhead Deadlock PredictionTechnical Technical Papers Yan Cai Institute of Software, Chinese Academy of Sciences, Ruijie Meng University of Chinese Academy of Sciences, Jens Palsberg University of California, Los Angeles | ||
08:17 8mTalk | The Impact of Feature Reduction Techniques on Defect Prediction ModelsJ1 Journal First Masanari Kondo Kyoto Institute of Technology, Cor-Paul Bezemer University of Alberta, Canada, Yasutaka Kamei Kyushu University, Ahmed E. Hassan Queen's University, Osamu Mizuno Kyoto Institute of Technology | ||
08:25 8mTalk | The Impact of Correlated Metrics on the Interpretation of Defect ModelsJ1 Journal First Jirayus Jiarpakdee Monash University, Australia, Kla Tantithamthavorn Monash University, Australia, Ahmed E. Hassan Queen's University | ||
08:33 8mTalk | The Impact of Mislabeled Changes by SZZ on Just-in-Time Defect PredictionJ1 Journal First Yuanrui Fan Zhejiang University, Xin Xia Monash University, Daniel Alencar Da Costa University of Otago, David Lo Singapore Management University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University | ||
08:41 8mTalk | Which Variables Should I Log?J1 Journal First Zhongxin Liu Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, Zhenchang Xing Australia National University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University | ||
08:49 12mTalk | Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnical Technical Papers Ke Li University of Exeter, Zilin Xiang University of Electronic Science and Technology of China, Tao Chen Loughborough University, Shuo Wang , Kay Chen Tan City University of Hong Kong Pre-print |
08:05 - 09:05 | I17-Contracts and AnalysisDemonstrations / Technical Papers / Software Engineering in Practice / Journal First at Goguryeo Chair(s): Jaechang Nam Handong Global University | ||
08:05 10mTalk | How to reduce risk effectively in fixed price software developmentSEIP Software Engineering in Practice | ||
08:15 10mTalk | Seraph: Enabling Cross-Platform Security Analysis For EVM and WASM Smart ContractsDemo Demonstrations Zhiqiang Yang Oxford-Hainan Blockchain Research Institute, Han Liu Tsinghua University, Yue Li Oxford-Hainan Blockchain Research Institute, Huixuan Zheng Oxford-Hainan Blockchain Research Institute, Lei Wang Oxford-Hainan Blockchain Research Institute, Bangdao Chen Oxford-Hainan Blockchain Research Institute | ||
08:25 10mTalk | Escape from Escape Analysis of GolangSEIP Software Engineering in Practice Cong Wang Tsinghua University, Mingrui Zhang Tsinghua University, Beijing, China, Yu Jiang , Huafeng Zhang Huawei Technologies, Hangzhou, China, Zhenchang Xing Australia National University, Ming Gu | ||
08:35 10mTalk | Smart Contract Development: Challenges and OpportunitiesJ1 Journal First Weiqin Zou Nanjing University, David Lo Singapore Management University, Pavneet Singh Kochhar Microsoft, Xuan-Bach D. Le Singapore Management University, Singapore, Xin Xia Monash University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University | ||
08:45 10mTalk | Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart ContractsTechnical Technical Papers Thomas Durieux KTH Royal Institute of Technology, Sweden, João F. Ferreira INESC-ID and IST, University of Lisbon, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Pedro Cruz IST, University of Lisbon, Portugal Pre-print | ||
08:55 10mTalk | An Extended Abstract of “METRIC+: A Metamorphic Relation Identification Technique Based on Input Plus Output Domains”J1 Journal First Chang-ai Sun University of Science and Technology Beijing, An Fu University of Science and Technology Beijing, Pak-Lok Poon School of Engineering & Technology, Central Queensland University, Australia, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Huai Liu Swinburne University of Technology, Tsong Yueh Chen Swinburne University of Technology |
08:05 - 09:05 | I18-APIs and CommitsNew Ideas and Emerging Results / Journal First / Technical Papers at Silla Chair(s): Massimiliano Di Penta University of Sannio | ||
08:05 8mTalk | Enriching API Documentation with Code Samples and Usage Scenarios from Crowd KnowledgeJ1 Journal First Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, He Jiang School of Software, Dalian University of Technology, Zhilei Ren Dalian University of Technology, Tao Zhang Harbin Engineering University, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics | ||
08:13 6mTalk | Cooperative API Misuse Detection Using Correction RulesNIER New Ideas and Emerging Results Sebastian Nielebock Otto-von-Guericke University Magdeburg, Germany, Robert Heumüller Chair of Software Engineering, Faculty of Computer Science, Otto-von-Guericke-University Magdeburg, Jacob Krüger Otto von Guericke University Magdeburg, Frank Ortmeier Otto-von-Guericke-University Magdeburg, Faculty of Computer Science, Chair of Software Engineering DOI Pre-print | ||
08:19 12mTalk | How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical Technical Papers Hao Xia Fudan University, Yuan Zhang Fudan University, Yingtian Zhou Fudan University, Xiaoting Chen Fudan University, Yang Wang Fudan University, Xiangyu Zhang Purdue University, Shuaishuai Cui Fudan University, Geng Hong Fudan University, Xiaohan Zhang Fudan University, Min Yang Fudan University, Zhemin Yang Fudan University | ||
08:31 12mTalk | An Empirical Study on API Parameter RulesTechnical Technical Papers | ||
08:43 6mTalk | Boosting Automated Program Repair with Bug-Inducing CommitsNIER New Ideas and Emerging Results Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
08:49 12mTalk | Software Documentation: The Practitioners' PerspectiveTechnical Technical Papers Emad Aghajani Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Switzerland, Mario Linares-Vásquez Universidad de los Andes, Laura Moreno Colorado State University, Gabriele Bavota Università della Svizzera italiana, Michele Lanza Universita della Svizzera italiana (USI), David C. Shepherd Virginia Commonwealth University Pre-print Media Attached |
09:10 - 10:00 | |||
09:10 50mTalk | GeekyNote: A Technical Documentation Tool with Coverage, Backtracking, Traces, and CouplingsDemo Demonstrations Yung-Pin Cheng National Central University, Wei-Nien Hsiung National Central University, Yu-Shan Wu IsCoollab Co. Ltd, Li-Hsuan Chen IsCoollab Co. Ltd |
Fri 10 JulDisplayed time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I19-Code Generation and VerificationTechnical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Baekje Chair(s): Raffi Khatchadourian City University of New York (CUNY) Hunter College | ||
07:00 6mTalk | Using Hypersafety Verification for Proving Correctness of Programming AssignmentsNIER New Ideas and Emerging Results Jude Anil TCS Research, Sumanth Prabhu TCS Research, Kumar Madhukar TCS Innovation Labs (TRDDC), R Venkatesh | ||
07:06 12mTalk | Automatically Testing String SolversTechnical Technical Papers Pre-print | ||
07:18 6mTalk | On the Power of Abstraction: a Model-Driven Co-evolution Approach of Software CodeNIER New Ideas and Emerging Results Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA) | ||
07:24 12mTalk | Co-Evolving Code with Evolving MetamodelsTechnical Technical Papers Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA | ||
07:36 12mTalk | Rule-based Code Generation in Industrial Automation: Four Large-scale Case Studies applying the CAYENNE MethodSEIP Software Engineering in Practice Heiko Koziolek ABB Corporate Research, Andreas Burger ABB Corporate Research, Marie Platenius-Mohr ABB Corporate Research, Julius Rückert ABB Corporate Research, Hadil Abukwaik ABB Corporate Research, Raoul Jetley ABB, Abdulla PP ABB Corporate Research Pre-print | ||
07:48 12mTalk | Understanding and Handling Alert Storm for Online Service SystemsSEIP Software Engineering in Practice Nengwen Zhao Tsinghua University, Junjie Chen Tianjin University, Xiao Peng China EverBright Bank, Honglin Wang BizSeer, Xinya Wu BizSeer, Yuanzong Zhang BizSeer, Zikai Chen Tsinghua University, Xiangzhong Zheng BizSeer, Xiaohui Nie Tsinghua University, Gang Wang China EverBright Bank, Yong Wu China EverBright Bank, Fang Zhou China EverBright Bank, Wenchi Zhang BizSeer, Kaixin Sui BizSeer, Dan Pei Tsinghua University |
07:00 - 08:00 | I20-Android TestingTechnical Papers at Goguryeo Chair(s): Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
07:00 12mTalk | Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnical Technical Papers Jiwei Yan Institute of Software, Chinese Academy of Sciences, Hao Liu Beijing University of Technology, Linjie Pan Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences, Bin Liang Renmin University of China, China | ||
07:12 12mTalk | Time-travel Testing of Android AppsTechnical Technical Papers Zhen Dong National University of Singapore, Marcel Böhme Monash University, Lucia Cojocaru Politehnica University of Bucharest, Abhik Roychoudhury National University of Singapore, Singapore | ||
07:24 12mTalk | Collaborative Bug Finding for Android AppsTechnical Technical Papers Shin Hwei Tan Southern University of Science and Technology, Ziqiang Li Southern University of Science and Technology Media Attached File Attached | ||
07:36 12mTalk | An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical Technical Papers Sen Chen Nanyang Technological University, Singapore, Lingling Fan Nanyang Technological University, Singapore, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Ting Su ETH Zurich, Switzerland, Jason Minhui Xue The University of Adelaide, Yinxing Xue , Yang Liu Nanyang Technological University, Singapore, Lihua Xu New York University Shanghai Pre-print | ||
07:48 12mTalk | RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical Technical Papers Ju Qian Nanjing University of Aeronautics and Astronautics, Zhengyu Shang Nanjing University of Aeronautics and Astronautics, Shuoyan Yan Nanjing University of Aeronautics and Astronautics, Yan Wang , Lin Chen Nanjing University |
07:00 - 08:00 | I21-Version Control and ProgrammingTechnical Papers / Journal First / Software Engineering in Practice at Silla Chair(s): Sunghun Kim Hong Kong University of Science and Technology | ||
07:00 12mTalk | Towards Understanding and Fixing Upstream Merge Induced Conflicts in Divergent Forks: An industrial Case StudySEIP Software Engineering in Practice Chungha Sung University of Southern California, Shuvendu K. Lahiri Microsoft Research, Mike Kaufman Microsoft Corporation, Pallavi Choudhury Microsoft Corporation, Chao Wang USC | ||
07:12 8mTalk | Version Control Systems: An Information Foraging PerspectiveJ1 Journal First Sruti Srinivasa Ragavan Microsoft Research; School of EECS, Oregon State University, Mihai Codoban Microsoft, David Piorkowski IBM Research AI, Danny Dig University of Colorado, Boulder, Margaret Burnett Oregon State University | ||
07:20 8mTalk | How different are different diff algorithms in Git?J1 Journal First Yusuf Sulistyo Nugroho Nara Institute of Science and Technology, Hideaki Hata Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology DOI Media Attached | ||
07:28 8mTalk | Characterizing the Usage, Evolution and Impact of Java Annotations in PracticeJ1 Journal First Zhongxing Yu KTH Royal Institute of Technology, Chenggang Bai Beihang University, Lionel Seinturier , Martin Monperrus KTH Royal Institute of Technology | ||
07:36 8mTalk | Why Reinventing the Wheels? An Empirical Study on Library Reuse and Re-implementationJ1 Journal First Bowen Xu Singapore Management University, Le An Polytechnique Montreal, Ferdian Thung Singapore Management University, Foutse Khomh Polytechnique Montréal, David Lo Singapore Management University | ||
07:44 12mTalk | HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnical Technical Papers Aishwarya Sivaraman University of California, Los Angeles, Jason Lau University of California, Los Angeles, Qian Zhang University of California, Los Angeles, Muhammad Ali Gulzar University of California, Los Angeles, Jason Cong UCLA, Miryung Kim University of California, Los Angeles DOI |
08:05 - 09:05 | I22-TestingTechnical Papers / Demonstrations at Baekje Chair(s): Phil McMinn University of Sheffield | ||
08:05 3mTalk | FuRong: Fusing Report of Automated Android Testing on Multi-DevicesDemo Demonstrations Yuanhan Tian Nanjing University, Shengcheng Yu Nanjing University, China, Chunrong Fang Nanjing University, Peiyuan Li Nanjing University | ||
08:08 12mTalk | MemLock: Memory Usage Guided FuzzingTechnical Technical Papers Cheng Wen Xidian University, Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yuekang Li Nanyang Technological University, Shengchao Qin University of Teesside, Yang Liu Nanyang Technological University, Singapore, Zhiwu Xu Shenzhen University, Hongxu Chen Research Associate, Xiaofei Xie Nanyang Technological University, Geguang Pu East China Normal University, Ting Liu Xi'an Jiaotong University DOI Pre-print Media Attached | ||
08:20 12mTalk | Symbolic Verification of Message Passing Interface ProgramsTechnical Technical Papers Hengbiao Yu National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China, Zhendong Su ETH Zurich, Switzerland, Jun Sun Singapore Management University, Chun Huang National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China Pre-print | ||
08:32 12mTalk | SAVER: Scalable, Precise, and Safe Memory-Error RepairTechnical Technical Papers Seongjoon Hong Korea University, Junhee Lee Korea University, South Korea, Jeongsoo Lee Korea University, Hakjoo Oh Korea University, South Korea | ||
08:44 12mTalk | A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical Technical Papers Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Chao Zhang Institute for Network Sciences and Cyberspace of Tsinghua University, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Qi Gong Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Min Lin Institute for Network Sciences and Cyberspace of Tsinghua University, Dandan Sun Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Wei Huo Institute of Information Engineering, Chinese Academy of Sciences, Wei Zou Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China | ||
08:56 3mTalk | MPI-SV: A Symbolic Verifier for MPI ProgramsDemo Demonstrations Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao Yu National University of Defense Technology, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China Pre-print |
08:05 - 09:05 | I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo Chair(s): Benoit Baudry KTH Royal Institute of Technology | ||
08:05 12mTalk | Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology | ||
08:17 12mTalk | Pipelining Bottom-up Data Flow AnalysisTechnical Technical Papers Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology | ||
08:29 8mTalk | An Empirical Validation of Oracle ImprovementJ1 Journal First Gunel Jahangirova Università della Svizzera italiana, David Clark University College London, Mark Harman , Paolo Tonella Università della Svizzera italiana | ||
08:37 8mTalk | Is Static Analysis Able to Identify Unnecessary Source Code?J1 Journal First Roman Haas CQSE GmbH, Rainer Niedermayr CQSE GmbH, Tobias Roehm CQSE GmbH, Sven Apel Saarland University Pre-print | ||
08:45 8mTalk | Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1 Journal First Mohammadreza Ghanavati Heidelberg University, Diego Costa Concordia University, Canada, Janos Seboek Heidelberg University, David Lo Singapore Management University, Artur Andrzejak Heidelberg University | ||
08:53 8mTalk | Towards Understanding and Detecting Fake Reviews in App StoresJ1 Journal First |
09:10 - 10:00 | |||
09:10 50mTalk | MPI-SV: A Symbolic Verifier for MPI ProgramsDemo Demonstrations Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao Yu National University of Defense Technology, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China Pre-print |
15:00 - 16:00 | A21-Testing and Debugging 3Journal First / Technical Papers at Silla Chair(s): Tingting Yu University of Kentucky | ||
15:00 12mTalk | Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical Technical Papers Dirk van der Linden University of Bristol, Pauline Anthonysamy Google Inc., Bashar Nuseibeh The Open University (UK) & Lero (Ireland), Thein Tun , Marian Petre The Open University, Mark Levine Lancaster University, John Towse Lancaster University, Awais Rashid University of Bristol, UK | ||
15:12 8mTalk | Smart Greybox FuzzingJ1 Journal First Van-Thuan Pham Monash University, Marcel Böhme Monash University, Andrew Santosa National University of Singapore, Alexandru Răzvan Căciulescu UiPath, Abhik Roychoudhury National University of Singapore, Singapore | ||
15:20 8mTalk | Deep Transfer Bug LocalizationJ1 Journal First Xuan Huo Nanjing University, Ferdian Thung Singapore Management University, Ming Li Nanjing University, David Lo Singapore Management University, Shu-Ting Shi Nanjing University | ||
15:28 8mTalk | A Benchmark-Based Evaluation of Search-Based Crash ReproductionJ1 Journal First Mozhan Soltani Leiden University, Pouria Derakhshanfar Delft University of Technology, Xavier Devroey Delft University of Technology, Arie van Deursen Delft University of Technology Link to publication DOI Pre-print Media Attached | ||
15:36 12mTalk | An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical Technical Papers Sadia Tabassum University of Birmingham, UK, Leandro Minku University of Birmingham, UK, Danyi Feng XiLiu Tech, George Cabral Universidade Federal Rural de Pernambuco, Liyan Song University of Birmingham | ||
15:48 8mTalk | An Empirical Study of the Long Duration of Continuous Integration BuildsJ1 Journal First Taher A Ghaleb Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario Link to publication DOI Pre-print |
16:05 - 17:05 | A23-RequirementsJournal First / Technical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Dalal Alrajeh Imperial College London | ||
16:05 12mTalk | Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical Technical Papers | ||
16:17 8mTalk | Dealing with Non-Functional Requirements in Model-Driven Development: A SurveyJ1 Journal First David Ameller Universitat Politècnica de Catalunya, Xavier Franch Universitat Politècnica de Catalunya, Cristina Gómez Universitat Politècnica de Catalunya, Silverio Martínez-Fernández UPC-BarcelonaTech, João Araújo Universidade Nova de Lisboa, Stefan Biffl Vienna University of Technology, Jordi Cabot ICREA - UOC, Vittorio Cortellesa University of L’Aquila, Daniel Mendez Technische Universität München, Ana Moreira FCT / Universidade Nova de Lisboa, Henry Muccini University of L'Aquila, Italy, Antonio Vallecillo University of Málaga, Spain, Manuel Wimmer Johannes Kepler University Linz, Vasco Amaral Universidade Nova de Lisboa, Wolfang Böhm Technische Universität München, Hugo Brunelière Inria, Mines Nantes & LINA, Lola Burgueño Universidad de Malaga, Miguel Goulao NOVA-LINCS, FCT/UNL, Sabine Teufl Fortiss GmbH, Luca Berardinelli Johannes Kepler University Linz | ||
16:25 8mTalk | Locating Latent Design Information in Developer Discussions: A Study on Pull RequestsJ1 Journal First Giovanni Viviani University of British Columbia, Michalis Famelis Université de Montréal, Xin Xia Monash University, Calahan Janik-Jones University of Toronto, Gail Murphy University of British Columbia | ||
16:33 8mTalk | Status Quo in Requirements Engineering: A Theory and a Global Family of SurveysJ1 Journal First Stefan Wagner University of Stuttgart Link to publication DOI Pre-print | ||
16:41 8mTalk | Corba: Crowdsourcing to Obtain Requirements from Regulations and BreachesJ1 Journal First Hui Guo North Carolina State University, Ozgur Kafali University of Kent, Anne-Liz Jeukeng University of Florida, Laurie Williams North Carolina State University, Munindar P. Singh North Carolina State University | ||
16:49 6mTalk | With Registered Reports Towards Large Scale Data CurationNIER New Ideas and Emerging Results Steffen Herbold University of Göttingen Pre-print |
16:05 - 17:05 | A24-Testing and Debugging 4Technical Papers / New Ideas and Emerging Results / Journal First / Demonstrations at Silla Chair(s): Yijun Yu The Open University, UK | ||
16:05 6mTalk | Manifold for Machine Learning AssuranceNIER New Ideas and Emerging Results | ||
16:11 12mTalk | On Learning Meaningful Assert Statements for Unit Test CasesTechnical Technical Papers Cody Watson Washington and Lee University, Michele Tufano Microsoft, Kevin Moran William & Mary/George Mason University, Gabriele Bavota Università della Svizzera italiana, Denys Poshyvanyk William and Mary Pre-print Media Attached | ||
16:23 12mTalk | TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural NetworksTechnical Technical Papers Guanhong Tao Purdue University, Shiqing Ma Rutgers University, Yingqi Liu Purdue University, USA, Qiuling Xu Purdue University, Xiangyu Zhang Purdue University Pre-print | ||
16:35 3mTalk | DeepMutation: A Neural Mutation ToolDemo Demonstrations Michele Tufano Microsoft, Jason Kimko William & Mary, Shiya Wang William & Mary, Cody Watson Washington and Lee University, Gabriele Bavota Università della Svizzera italiana, Massimiliano Di Penta University of Sannio, Denys Poshyvanyk William and Mary Pre-print | ||
16:38 8mTalk | Specification Patterns for Robotic MissionsJ1 Journal First Claudio Menghi University of Luxembourg, Christos Tsigkanos TU Vienna, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Carlo Ghezzi Politecnico di Milano, Thorsten Berger Chalmers | University of Gothenburg | ||
16:46 8mTalk | ProXray: Protocol Model Learning and Guided Firmware AnalysisJ1 Journal First Farhaan Fowze University of Florida, Dave (Jing) Tian Purdue University, Grant Hernandez University of Florida, Kevin Butler Univ. Florida, Tuba Yavuz University of Florida | ||
16:54 6mTalk | Visual Sketching: From Image Sketches to CodeNIER New Ideas and Emerging Results Marcelo d'Amorim Federal University of Pernambuco, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Carlos Mello Federal University of Pernambuco Pre-print Media Attached |
Sat 11 JulDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | |||
00:00 12mTalk | Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical Technical Papers Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Cheng Wen Xidian University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Singapore, Shengchao Qin University of Teesside, Hongxu Chen Research Associate, Yulei Sui University of Technology Sydney, Australia Link to publication DOI Pre-print | ||
00:12 12mTalk | sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical Technical Papers Tai D. Nguyen Singapore Management University, Long H. Pham Singapore University of Technology and Design, Jun Sun Singapore Management University, Yun Lin National University of Singapore, Minh Quang Tran Ho Chi Minh City University of Technology | ||
00:24 12mTalk | Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical Technical Papers Caius Brindescu Oregon State University, Iftekhar Ahmed University of California at Irvine, USA, Rafael Leano Oregon State University, Anita Sarma Oregon State University | ||
00:36 12mTalk | Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnical Technical Papers Akond Rahman Tennessee Tech University, Effat Farhana North Carolina State University, Chris Parnin North Carolina State University, Laurie Williams North Carolina State University Pre-print | ||
00:48 12mTalk | JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical Technical Papers Tegan Brennan University of California, Santa Barbara, Seemanta Saha University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara |
00:00 - 01:00 | P26-Deep Learning Testing and DebuggingTechnical Papers at Goguryeo Chair(s): Tim Menzies North Carolina State University | ||
00:00 12mTalk | ReluDiff: Differential Verification of Deep Neural NetworksTechnical Technical Papers Brandon Paulsen University of Southern California, Jingbo Wang University of Southern California, Chao Wang USC Pre-print | ||
00:12 12mTalk | Structure-Invariant Testing for Machine TranslationTechnical Technical Papers | ||
00:24 12mTalk | Automatic Testing and Improvement of Machine TranslationTechnical Technical Papers Zeyu Sun Peking University, Jie M. Zhang University College London, UK, Mark Harman Facebook and University College London, Mike Papadakis University of Luxembourg, Lu Zhang Peking University, China | ||
00:36 12mTalk | Testing DNN Image Classifier for Confusion & Bias ErrorsTechnical Technical Papers Yuchi Tian Columbia University, Ziyuan Zhong Columbia University, Vicente Ordonez University of Virginia, Gail Kaiser Columbia University, Baishakhi Ray Columbia University, New York | ||
00:48 12mTalk | Repairing Deep Neural Networks: Fix Patterns and ChallengesTechnical Technical Papers Md Johirul Islam Iowa State University, Rangeet Pan Iowa State University, USA, Giang Nguyen Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University, USA |
00:00 - 01:00 | P27-ApplicationsSoftware Engineering in Practice / Technical Papers at Silla Chair(s): Ganesha Upadhyaya Harmony.one | ||
00:00 12mTalk | Big Code != Big Vocabulary: Open-Vocabulary Models for Source codeTechnical Technical Papers Rafael-Michael Karampatsis The University of Edinburgh, Hlib Babii Free University of Bozen-Bolzano, Romain Robbes Free University of Bozen-Bolzano, Charles Sutton Google Research, Andrea Janes Free University of Bozen-Bolzano DOI Pre-print | ||
00:12 12mTalk | Engineering for a Science-Centric Experimentation PlatformSEIP Software Engineering in Practice Nikos Diamantopoulos Netflix, Inc., Jeffrey Wong Netflix, Inc., David Issa Mattos Chalmers University of Technology, Ilias Gerostathopoulos Vrije Universiteit Amsterdam, Matthew Wardrop Netflix, Inc., Tobias Mao Netflix, Inc., Colin McFarland Netflix, Inc. | ||
00:24 12mTalk | Managing data constraints in database-backed web applicationsTechnical Technical Papers Junwen Yang University of Chicago, Utsav Sethi University of Chicago, Cong Yan University of Washington, Alvin Cheung University of California, Berkeley, Shan Lu University of Chicago | ||
00:36 12mTalk | Improving Data Scientist Efficiency with ProvenanceTechnical Technical Papers Jingmei Hu Harvard University, Jiwon Joung Harvard University, Maia Jacobs Harvard University, Margo Seltzer University of British Columbia, Krzysztof Gajos Harvard University |
01:05 - 02:05 | P29-Android and Web TestingDemonstrations / Technical Papers / Software Engineering in Practice at Goguryeo Chair(s): Hironori Washizaki Waseda University | ||
01:05 12mTalk | SLACC: Simion-based Language Agnostic Code ClonesTechnical Technical Papers George Mathew North Carolina State University, Chris Parnin North Carolina State University, Kathryn Stolee North Carolina State University Pre-print | ||
01:17 8mTalk | Near-Duplicate Detection in Web App Model InferenceTechnical Technical Papers Rahulkrishna Yandrapally University of British Columbia, Canada, Andrea Stocco Università della Svizzera italiana, Ali Mesbah University of British Columbia Pre-print | ||
01:25 12mTalk | JSidentify: A Hybrid Framework for Detecting Plagiarism Among JavaScript Code in Online Mini GamesSEIP Software Engineering in Practice Qun Xia Tencent Inc., Zhongzhu Zhou , Zhihao Li Tencent Inc., Bin Xu Tencent Inc., Wei Zou Tencent Inc., Zishun Chen Tencent Inc., Huafeng Ma Tencent Inc., Gangqiang Liang Tencent Inc., Haochuan Lu Fudan University, Shiyu Guo Tencent Inc., Ting Xiong Tencent Inc., Yuetang Deng Tencent, Inc., Tao Xie Peking University | ||
01:37 12mTalk | Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningTechnical Technical Papers Jieshan Chen Australian National University, Chunyang Chen Monash University, Zhenchang Xing Australia National University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China | ||
01:49 3mTalk | DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo Demonstrations Jian Liu East China Normal University, Xusheng Xiao Case Western Reserve University, Lihua Xu New York University Shanghai, Liang Dou East China Normal University, Andy Podgurski Case Western University | ||
01:52 3mTalk | BigTest: Symbolic Execution Based Systematic Test Generation Tool for Apache SparkDemo Demonstrations Muhammad Ali Gulzar University of California, Los Angeles, Madan Musuvathi Microsoft Research, Miryung Kim University of California, Los Angeles |
01:05 - 02:05 | |||
01:05 8mTalk | Studying the Impact of Noises in Build Breakage DataJ1 Journal First Taher A Ghaleb Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University Link to publication DOI Pre-print | ||
01:13 12mTalk | Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical Technical Papers Lingchao Chen The University of Texas at Dallas, Foyzul Hassan University of Texas at San Antonio, USA, Xiaoyin Wang University of Texas at San Antonio, USA, Lingming Zhang The University of Texas at Dallas | ||
01:25 12mTalk | Watchman: Monitoring Dependency Conflicts for Python Library EcosystemTechnical Technical Papers Ying Wang Northeastern University, China, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Yibo Wang Northeastern University, Zhenming Li Northeastern University, Chao Wang University of Southern California, Hai Yu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Chang Xu Nanjing University, Zhiliang Zhu Northeastern University, China | ||
01:37 12mTalk | How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical Technical Papers Shurui Zhou Carnegie Mellon University, USA / University of Toronto, CA, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University Pre-print |
02:10 - 03:00 | |||
02:10 50mTalk | mCoq: Mutation Analysis for Coq Verification ProjectsDemo Demonstrations Kush Jain The University of Texas at Austin, Karl Palmskog KTH Royal Institute of Technology, Ahmet Celik Facebook, Inc., Emilio Jesús Gallego Arias INRIA, Milos Gligoric The University of Texas at Austin | ||
02:10 50mTalk | DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo Demonstrations Jian Liu East China Normal University, Xusheng Xiao Case Western Reserve University, Lihua Xu New York University Shanghai, Liang Dou East China Normal University, Andy Podgurski Case Western University |
15:00 - 16:00 | A26-Bugs and RepairJournal First / Technical Papers at Goguryeo Chair(s): Davide Falessi California Polytechnic State University | ||
15:00 12mTalk | Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical Technical Papers Mingyuan Wu Southern University of Science and Technology, Yicheng Ouyang Southern University of Science and Technology, Husheng Zhou The University of Texas at Dallas, Lingming Zhang The University of Texas at Dallas, Cong Liu UT Dallas, Yuqun Zhang Southern University of Science and Technology | ||
15:12 8mTalk | Fine-Grained Dynamic Resource Allocation for Big-Data ApplicationsJ1 Journal First Luciano Baresi Politecnico di Milano, Alberto Leva Politecnico di Milano, Giovanni Quattrocchi Politecnico di Milano | ||
15:20 8mTalk | The Assessor's Dilemma: Improving Bug Repair via Empirical Game TheoryJ1 Journal First Carlos Gavidia-Calderon University College London, Federica Sarro University College London, UK, Mark Harman Facebook and University College London, Earl T. Barr University College London, UK Link to publication DOI Pre-print Media Attached | ||
15:28 8mTalk | FixMiner: Mining Relevant Fix Patterns for Automated Program RepairJ1 Journal First Anil Koyuncu University of Luxembourg, Luxembourg, Kui Liu Huawei Software Engineering Application Technology Lab, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Jacques Klein University of Luxembourg, SnT, Martin Monperrus KTH Royal Institute of Technology, Yves Le Traon University of Luxembourg Pre-print | ||
15:36 8mTalk | IntRepair: Informed Repairing of Integer OverflowsJ1 Journal First Paul Muntean TU Munich, Martin Monperrus KTH Royal Institute of Technology, Hao Sun Unaffiliated, Jens Grossklags Technical University of Munich, Claudia Eckert Technical University of Munich | ||
15:44 12mTalk | DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical Technical Papers Yi Li New Jersey Institute of Technology, USA, Shaohua Wang New Jersey Institute of Technology, USA, Tien N. Nguyen University of Texas at Dallas |
15:00 - 16:00 | A27-Software ArchitectureNew Ideas and Emerging Results / Journal First / Demonstrations / Software Engineering in Practice at Silla Chair(s): Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg | ||
15:00 8mTalk | What should your Run-time Configuration Framework do to Help Developers?J1 Journal First Mohammed SAYAGH Queen's University, Noureddine Kerzazi Ensias-Rabat, Fabio Petrillo University of Quebec at Chicoutimi, Khalil Bennani Polytechnique Montreal, Bram Adams MCIS, Polytechnique Montréal | ||
15:08 3mTalk | The SmartSHARK Ecosystem for Software Repository MiningDemo Demonstrations Alexander Trautsch University of Göttingen, Fabian Trautsch University of Göttingen, Steffen Herbold University of Göttingen, Benjamin Ledel University of Göttingen, Jens Grabowski University of Göttingen Pre-print | ||
15:11 12mTalk | Piranha: Reducing Feature Flag Debt at UberSEIP Software Engineering in Practice Murali Krishna Ramanathan Uber Technologies Inc., Lazaro Clapp Uber Technologies Inc, Raj Barik Uber Technologies Inc., Manu Sridharan University of California Riverside Pre-print | ||
15:23 6mTalk | Towards Engineering Future Gameful ApplicationsNIER New Ideas and Emerging Results Antonio Bucchiarone Fondazione Bruno Kessler, Trento, Italy, Antonio Cicchetti Mälardalen University, Annapaola Marconi Fondazione Bruno Kessler, Trento, Italy | ||
15:29 18mTalk | Software Development Data for Architecture Analysis: Expectation, Reality, and Future DirectionsSEIP Software Engineering in Practice |
16:05 - 17:05 | A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Elena Sherman Boise State University | ||
16:05 12mTalk | Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisTechnical Technical Papers Manuel Benz University of Paderborn, Erik Krogh Kristensen GitHub, Linghui Luo Paderborn University, Germany, Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached File Attached | ||
16:17 12mTalk | Verifying Object ConstructionTechnical Technical Papers Martin Kellogg University of Washington, Seattle, Manli Ran University of California, Riverside, Manu Sridharan University of California Riverside, Martin Schäf Amazon Web Services, USA, Michael D. Ernst University of Washington, USA | ||
16:29 6mTalk | Predictive Constraint Solving and AnalysisNIER New Ideas and Emerging Results Alyas Almaawi The University of Texas at Austin, Nima Dini University of Texas at Austin, Cagdas Yelen The University of Texas at Austin, Milos Gligoric The University of Texas at Austin, Sasa Misailovic University of Illinois at Urbana-Champaign, Sarfraz Khurshid University of Texas at Austin, USA | ||
16:35 12mTalk | When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical Technical Papers Pre-print | ||
16:47 12mTalk | Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical Technical Papers Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Jiamou Sun Australian National University, Xin Xia Monash University, JianLing Sun Zhejiang University |
16:05 - 17:05 | A30-Dependencies and ConfigurationTechnical Papers / Software Engineering in Practice at Silla Chair(s): Diomidis Spinellis Athens University of Economics and Business | ||
16:05 12mTalk | Lazy Product Discovery in Huge Configuration SpacesTechnical Technical Papers Michael Lienhardt ONERA, Ferruccio Damiani University of Turin, Einar Broch Johnsen University of Oslo, Jacopo Mauro University of Southern Denmark | ||
16:17 12mTalk | Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical Technical Papers Pre-print | ||
16:29 12mTalk | Exploring Differences and Commonalities between Feature Flags and Configuration OptionsSEIP Software Engineering in Practice Jens Meinicke Carnegie Mellon University, Chu-Pan Wong Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University Pre-print |
17:10 - 18:00 | |||
17:10 50mTalk | The SmartSHARK Ecosystem for Software Repository MiningDemo Demonstrations Alexander Trautsch University of Göttingen, Fabian Trautsch University of Göttingen, Steffen Herbold University of Göttingen, Benjamin Ledel University of Göttingen, Jens Grabowski University of Göttingen Pre-print | ||
17:10 50mTalk | WasmView: Visual Testing for WebAssembly ApplicationsDemo Demonstrations |
Accepted Papers
Call for Papers
ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering including but not limited to:
Agile software development Program analysis
AI and software engineering Program comprehension
Apps and app store analysis Program repair
Autonomic and (self-)adaptive systems Program synthesis
Cloud computing Programming languages
Component-based software engineering Recommendation systems
Configuration management and deployment Refactoring
Crowd sourced software engineering Requirements engineering
Cyber physical systems Reverse engineering
Debugging Search-based software engineering
Dependability, safety, and reliability Security, privacy, and trust
Distributed and collaborative software engineering Software architecture
Embedded software Software economics and metrics
Empirical software engineering Software evolution and maintenance
End-user software engineering Software modeling and design
Fault localization Software process
Formal methods Software product lines
Green and sustainable technologies Software reuse
Human and social aspects of software engineering Software services
Human-computer interaction Software testing
Middleware, frameworks, and APIs Software visualization
Mining software engineering repositories Specification and modeling languages
Mobile applications Tools and environments
Model-driven engineering Traceability
Parallel, distributed, and concurrent systems Validation and verification
Performance
Review Criteria
Each paper submitted to the Technical Track will be evaluated based on the following criteria:
-
Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods
-
Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges
-
Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art
-
Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions
-
Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions and explanations, adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below
Reviewers will carefully consider all of these criteria during the review process, and as a result, high-quality papers may vary considerably in their type of contribution. For example, one paper could provide an extensive replication of prior work while another could describe a highly novel approach supported by non-trivial experimentation or empirical analysis.
How to Submit
-
All submissions must conform to the ICSE 2020 formatting and submission instructions and must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).
-
Formatting instructions are available at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e.,
\documentclass[sigconf,review]{acmart}
), and use the ACM reference format for the bibliography (i.e.,\bibliographystyle{ACM-Reference-Format}
). The review option adds line numbers, thereby allowing referees to refer to specific lines in their comments. -
By submitting to the ICSE Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism) and the IEEE Plagiarism FAQ (https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html). In particular, papers submitted to ICSE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2020. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
-
Lastly, the ICSE 2020 Technical Track will employ a double-blind review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-blind review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-blind review process can be found in the Q&A page (https://conf.researchr.org/track/icse-2020/icse-2020-papers#Submitting-to-ICSE-Q-A).
Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site (https://icse2020.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-blind reviewing.
Any submission that does not comply with these requirements may be desk rejected by the Technical Track PC Chairs without further review.
Conference Attendance Expectation
If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper in person.
Submitting to ICSE: Q&A
Please note that the Double Blind Review (DBR) process is not used by all tracks. Check in the call for papers whether DBR is used or not.
Q: Why Double Blind?
There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-blind reviewing, see Claire Le Goues’s very well argued, referenced and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli (see https://pure.tudelft.nl/portal/files/17721365/1589a385.pdf).
Q: How to prepare your paper for double-blind reviewing?
You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up as an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
-
Omit all authors’ names from the title page. Please note that it is not sufficient to simply change the font color to white, as names may appear when highlighted or on some printers; nor is it sufficient to cover the names with a rectangle. Also, please make sure that no identifying information is stored in the properties metadata of your submitted pdf. There are many ways to check this, for example from linux: $ pdfinfo paper.pdf or from Adobe Acrobat select File/Properties tab.
-
Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper. If for any reason it is completely impossible to reference your prior work in the third person, then you will need to provide a blinded reference and send a copy of the original paper to the chairs. However, in most cases we expect you to reference your own work in the third person.
-
Do not rely on supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. We allow supplementary material to be uploaded in the submission system, but it is your responsibility to make sure it does not include identifying information. If you choose to upload supplementary material (either through the submission site or as a link), and your material includes identifying information, then your submission could be desk rejected. Furthermore, please keep in mind that reviewers are not obligated to read supplementary material.
Q: I previously published an earlier version of this work in a venue that doesn’t have double-blind. What should I do about acknowledging that previous work?
A: If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.
If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.
Q: Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?
A: It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final post-review, camera ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-blind review process, please refrain from citing the dissertation, to increase anonymity.
You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identifies. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.
Q: What if we want to cite some unpublished work of our own (as motivation for example)
A: If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.
Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?
A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting to the conference.
Author Information
More info will be posted on this page as it becomes available