Call for Papers
ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. In the technical track, we invite high quality submissions of technical research papers describing original and unpublished results of software engineering research.
Please note the following important changes for 2023:
- As previous ICSE editions, we apply an open science policy. This year, we will ask a reviewer to perform a lightweight check on the shared artifacts (see below).
- There will be a second response period for a subset of the submitted papers. Please check our calendar of important dates.
Also, we will continue the initiative started in 2022, giving emphasis to the significance of the research contributions (see review criteria).
Research of Interest
ICSE welcomes submissions addressing topics across the full spectrum of Software Engineering, being inclusive of quantitative, qualitative, and mixed-methods research.
Topics of interest include:
● API design and evolution
● Apps and app store analysis
● Autonomic systems and self adaptation
● Configuration management
● Crowd-based software engineering
● Debugging and fault localization
● Design for quality, incl. privacy and security by design
● Distributed and collaborative software engineering
● Diversity, inclusion, fairness of software
● Embedded and cyber-physical systems
● Ethics in software engineering
● Evolution and maintenance
● Feedback, user, and requirements management
● Formal methods
● Green and sustainable technologies
● Human aspects of software engineering
● Human-computer interaction
● Legal aspects of software engineering
● Machine learning with and for SE
● Mining software repositories
● Model checking
● Modeling and model-driven engineering
● Parallel and distributed systems
● Performance analysis and testing
● Privacy and security
● Program analysis
● Program comprehension
● Program repair
● Program synthesis
● Programming languages
● Recommender systems
● Refactoring
● Release engineering and DevOps
● Reliability and safety
● Requirements engineering
● Reverse engineering
● SE for machine learning
● Search-based software engineering
● Software architecture and product design
● Software economics
● Software ecosystems
● Software metrics and prediction models
● Software processes
● Software reuse
● Software services and cloud-based systems
● Software testing
● Software traceability
● Software visualization
● Variability and product lines
Review Criteria
Each paper submitted to the Technical Track will be evaluated based on the following criteria:
● Soundness: The extent to which the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
● Significance: The extent to which the paper’s contributions can impact the field of software engineering, and under which assumptions (if any).
● Novelty: The extent to which the contributions are sufficiently original with respect to the state-of-the-art.
● Verifiability and Transparency: The extent to which the paper includes sufficient information to understand how an innovation works; to understand how data was obtained, analyzed, and interpreted; and how the paper supports independent verification or replication of the paper’s claimed contributions. New this year: the artifacts attached to the paper (or hyperlinked to it) will be checked by at least one reviewer.
● Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions, as well as adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below.
Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.
Each paper will be handled by an area chair. The role of the area chairs is to ensure a reviewing consistency among papers submitted within the same area of research. For this reason, we will ask the authors, upon submission, to identify up to two main areas to which the paper belongs, among the following ones:
● Artificial Intelligence and Software Engineering
● Analysis and Testing
● Dependability
● Requirements, modeling, and design
● Social Aspects
● Software Evolution
● Software Analytics
Program chairs will ultimately assign a paper to an area chair, considering the authors’ selection, the paper’s content, and (if applicable) keeping into account possible conflicts of interest.
For more information on how the ICSE PC will interpret and use these criteria in the paper evaluation process, see the ICSE 2023 Review Process and Guidelines.
How to Submit
Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).
● All submissions must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. Accepted papers will be allowed one extra page for the main text of the camera-ready version.
● Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above . Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.
● By submitting to the ICSE Technical Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to ICSE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2023. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
● If the research involves human participants/subjects, the authors must adhere to the ACM Publications Policy on Research Involving Human Participants and Subjects. Upon submitting, authors will declare their compliance to such a policy.
● The ICSE 2023 Technical Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
○ Authors’ names must be omitted from the submission.
○ All references to the author’s prior work should be in the third person.
○ While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to ICSE 2023.
○ During review, authors should not publicly use the submission title.
● Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
● By submitting to the ICSE Technical Track, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.
Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site ( https://icse2023.hotcrp.com) by the submission deadline. Any submission that does not comply with these requirements may be desk rejected without further review.
We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing. Authors are encouraged to try out the experimental SIGSOFT Submission Checker to detect violations to the formatting and double anonymous guidelines. (Mind that the tool is based on heuristics. Therefore it may miss violations, and it can raise false alarms. The requirements listed in this call for papers take precedence over the results of the tool when deciding whether a paper meets the submission guidelines.)
Open Science Policy
The research track of ICSE 2023 is governed by the ICSE 2023 Open Science policies. In summary, the steering principle is that all research results should be accessible to the public and, if possible, empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified. We recognize that reproducibility or replicability is not a goal in qualitative research and that, similar to industrial studies, qualitative studies often face challenges in sharing research data. For guidelines on how to report qualitative research to ensure the assessment of the reliability and credibility of research results, see the Q&A page.
Upon submission to the research track, authors are asked
● to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper, possibly in a section named "Data Availability" after the Conclusions; or
● to include in the paper an explanation as to why this is not possible or desirable; and
● to indicate if they intend to make their data publicly available upon acceptance.
NEW! This year, at least one reviewer will check whether the enclosed package contains what is declared in the paper. This quality check process will be very lightweight, and the main aim is to ensure that authors do not submit (partially) empty packages.
Supplementary material can be uploaded via the HotCrp site or anonymously linked from the paper submission. Also, the authors must briefly describe, in the submission form, the content of the supplementary material with a short paragraph/bullet list. We strongly encourage authors to use supplementary material to provide access to anonymized data, whenever possible. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.
Upon acceptance, authors have the possibility to separately submit their supplementary material to the ICSE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated or reproduced.
Mentoring for Prospective Authors
We are organizing an “Ask me Anything” (AMA) Session on Best practices for a successful ICSE paper in June 2022 for prospective authors to learn from the 2022 ICSE PC co-chairs, Andreas Zeller and Daniela Damian.
Details about this event will be announced a couple of months before the event will happen.
Author Response Periods
ICSE 2023 will offer response periods for authors. In such periods, the authors will have the opportunity to inspect the reviews, and to answer specific questions raised by the program committee.
ICSE 2023 will foresee two response periods. The first one is scheduled after all reviews have been completed, and serves to inform the subsequent decision making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process. The second one follows a period of review discussion, and will involve only some papers, for which additional reviews were needed, or where, during the discussion, further questions for the authors emerged.
Note that:
● Participating in the response period is optional for the authors, i.e., omitting a rebuttal does not necessarily prejudice the paper’s outcome.
● Not being invited to participate in the second response period does not mean the paper has been rejected (nor accepted), but just that reviewers felt that a second response period was unnecessary.
Withdrawing a Paper
Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICSE 2023 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICSE 2023 as well as any other venue adhering to this policy.
Important Dates
● Technical Track Submissions Deadline: September 1, 2022
● Technical Track Author First Response Period (all papers): November 14–19, 2022
● Technical Track Author Second Response Period (some papers): November 29–30, 2022
● Technical Track Acceptance Notification: December 9, 2022
● Technical Track Camera Ready: TBA
Conference Attendance Expectation
If a submission is accepted, at least one author of the paper is required to register for ICSE 2023 and present the paper. [We will add more info on this as soon as the ICSE 2023 format is finalized.]
Wed 17 MayDisplayed time zone: Hobart change
10:30 - 11:00 | |||
10:30 30mTalk | Cerberus: a Program Repair Framework DEMO - Demonstrations Ridwan Salihin Shariffdeen National University of Singapore, Martin Mirchev National University of Singapore, Yannic Noller National University of Singapore, Abhik Roychoudhury National University of Singapore |
10:30 - 11:00 | |||
10:30 30mTalk | InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation DEMO - Demonstrations Shuanglong Chang Northeast Petroleum University, Juntao Gao Northeast Petroleum University, Yilong Yang Beihang University |
10:30 - 11:00 | |||
10:30 30mTalk | FlaPy: Mining Flaky Python Tests at Scale DEMO - Demonstrations Pre-print |
11:00 - 12:30 | AI models for SEJournal-First Papers / Technical Track / DEMO - Demonstrations / NIER - New Ideas and Emerging Results at Level G - Plenary Room 1 Chair(s): Denys Poshyvanyk College of William and Mary | ||
11:00 15mTalk | One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering Technical Track Deze Wang National University of Defense Technology, Boxing Chen , Shanshan Li National University of Defense Technology, Wei Luo , Shaoliang Peng Hunan University, Wei Dong School of Computer, National University of Defense Technology, China, Liao Xiangke National University of Defense Technology | ||
11:15 15mTalk | CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back Technical Track Zhongxin Liu Zhejiang University, Zhijie Tang Zhejiang University, Xin Xia Huawei, Xiaohu Yang Zhejiang University Pre-print | ||
11:30 15mTalk | Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models Technical Track Shuzheng Gao Harbin institute of technology, Hongyu Zhang The University of Newcastle, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology | ||
11:45 7mTalk | PCR-Chain: Partial Code Reuse Assisted by Hierarchical Chaining of Prompts on Frozen Copilot DEMO - Demonstrations Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Jiahui Zhu School of Computer Information Engineering, Jiangxi Normal University, Zhilong Li School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing , Changjing Wang School of Computer Information Engineering, Jiangxi Normal University, Xiwei (Sherry) Xu CSIRO’s Data61 | ||
11:52 7mTalk | Towards Learning Generalizable Code Embeddings using Task-agnostic Graph Convolutional Networks Journal-First Papers Zishuo Ding Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Tse-Hsun (Peter) Chen Concordia University | ||
12:00 7mTalk | deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search Journal-First Papers Chen Zeng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Shanshan Li National University of Defense Technology, Xin Xia Huawei, Wang Zhiming National University of Defense Technology, Mingyang Geng National University of Defense Technology, Linxiao Bai National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China, Liao Xiangke National University of Defense Technology | ||
12:07 7mTalk | CodeS: Towards Code Model Generalization Under Distribution Shift NIER - New Ideas and Emerging Results Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg | ||
12:15 7mTalk | Towards using Few-Shot Prompt Learning for Automating Model Completion NIER - New Ideas and Emerging Results Meriem Ben Chaaben Université de Montréal, DIRO, Lola Burgueño University of Malaga, Houari Sahraoui Université de Montréal |
11:00 - 12:30 | Fuzzing: applicationsTechnical Track / DEMO - Demonstrations at Meeting Room 101 Chair(s): Corina S. Păsăreanu Carnegie Mellon University | ||
11:00 15mTalk | Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces Technical Track Haoxiang Jia Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Rongxin Wu Xiamen University, Maolin Sun Huazhong University of Science and Technology, Kang Chen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Pre-print | ||
11:15 15mTalk | JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers Technical Track Mingyuan Wu Southern University of Science and Technology, Minghai Lu Southern University of Science and Technology, Heming Cui University of Hong Kong, Junjie Chen Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign | ||
11:30 15mTalk | Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs Technical Track Maolin Sun Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Ming Wen Huazhong University of Science and Technology, Yongcong Wang Huazhong University of Science and Technology, Yuming Zhou Nanjing University, Hai Jin Huazhong University of Science and Technology Pre-print | ||
11:45 15mTalk | Regression Fuzzing for Deep Learning Systems Technical Track Hanmo You College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Shuang Liu Tianjin University, Shuochuan Li College of Intelligence and Computing, Tianjin University | ||
12:00 15mTalk | Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers Technical Track Suyue Guo Renmin University of China, Xinyu Wan Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Yiwei Zhang Renmin University of China, Jianjun Huang Renmin University of China, China, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China Pre-print | ||
12:15 7mTalk | JAttack: Java JIT Testing using Template Programs DEMO - Demonstrations Zhiqiang Zang University of Texas at Austin, Fu-Yao Yu The University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin Pre-print |
11:00 - 12:30 | Mining software repositoriesTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102 Chair(s): Brittany Johnson George Mason University | ||
11:00 15mTalk | The untold story of code refactoring customizations in practice Technical Track Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Ana Carla Bibiano PUC-Rio, Márcio Ribeiro Federal University of Alagoas, Brazil, Rohit Gheyi Federal University of Campina Grande, Baldoino Fonseca Federal University of Alagoas (UFAL) Pre-print | ||
11:15 15mTalk | Data Quality for Software Vulnerability Datasets Technical Track Roland Croft The University of Adelaide, Muhammad Ali Babar University of Adelaide, M. Mehdi Kholoosi University of Adelaide Pre-print | ||
11:30 15mTalk | Do code refactorings influence the merge effort? Technical Track André Oliveira Federal Fluminense University, Vania Neves Universidade Federal Fluminense (UFF), Alexandre Plastino Federal Fluminense University, Ana Carla Bibiano PUC-Rio, Alessandro Garcia PUC-Rio, Leonardo Murta Universidade Federal Fluminense (UFF) | ||
11:45 7mTalk | ActionsRemaker: Reproducing GitHub Actions DEMO - Demonstrations Hao-Nan Zhu University of California, Davis, Kevin Guan University of California, Davis, Robert M. Furth University of California, Davis, Cindy Rubio-González University of California at Davis | ||
11:52 7mTalk | Problems with with SZZ and Features: An empirical assessment of the state of practice of defect prediction data collection Journal-First Papers Steffen Herbold University of Passau, Alexander Trautsch University of Passau, Alexander Trautsch Germany, Benjamin Ledel None | ||
12:00 7mTalk | An empirical study of issue-link algorithms: which issue-link algorithms should we use? Journal-First Papers Masanari Kondo Kyushu University, Yutaro Kashiwa Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Osamu Mizuno Kyoto Institute of Technology | ||
12:07 7mTalk | SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification Journal-First Papers Weihan Ou Queen's University at Kingston, Ding Steven, H., H. Queen’s University at Kingston, Yuan Tian Queens University, Kingston, Canada, Leo Song Queen’s University at Kingston | ||
12:15 15mTalk | A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization Technical Track Hao Guan The University of Queensland, Ying Xiao Southern University of Science and Technology, Jiaying LI Microsoft, Yepang Liu Southern University of Science and Technology, Guangdong Bai University of Queensland |
11:00 - 12:30 | Fault localizationJournal-First Papers / Technical Track / Showcase at Meeting Room 103 Chair(s): Rui Abreu University of Porto | ||
11:00 15mTalk | Evaluating the Impact of Experimental Assumptions in Automated Fault Localization Technical Track Ezekiel Soremekun Royal Holloway, University of London, Lukas Kirschner Saarland University, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Mike Papadakis University of Luxembourg, Luxembourg Pre-print Media Attached | ||
11:15 15mTalk | Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set Technical Track Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Yepang Liu Southern University of Science and Technology, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences Pre-print | ||
11:30 15mTalk | PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports Technical Track Pre-print Media Attached | ||
11:45 15mTalk | Bug localization in game software engineering: evolving simulations to locate bugs in software models of video games Showcase Rodrigo Casamayor SVIT Research Group. Universidad San Jorge, Lorena Arcega San Jorge University, Francisca Pérez SVIT Research Group, Universidad San Jorge, Carlos Cetina San Jorge University, Spain DOI | ||
12:00 7mTalk | Real World Projects, Real Faults: Evaluating Spectrum Based Fault Localization Techniques on Python Projects Journal-First Papers Ratnadira Widyasari Singapore Management University, Singapore, Gede Artha Azriadi Prana Singapore Management University, Stefanus Agus Haryono Singapore Management University, Shaowei Wang University of Manitoba, David Lo Singapore Management University | ||
12:07 7mTalk | Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis Journal-First Papers Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Kaixuan Luo Huazhong University of Science and Technology, Xiao Chen Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Hai Jin Huazhong University of Science and Technology | ||
12:15 15mTalk | RAT: A Refactoring-Aware Traceability Model for Bug Localization Technical Track Feifei Niu University of Ottawa, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Liguo Huang Southern Methodist University, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Jidong Ge Nanjing University, Bin Luo Nanjing University, Alexander Egyed Johannes Kepler University Linz File Attached |
11:00 - 12:30 | Formal verificationSEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Showcase at Meeting Room 104 Chair(s): Bonita Sharif University of Nebraska-Lincoln, USA | ||
11:00 15mTalk | How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms Technical Track Hammad Ahmad University of Michigan, Zachary Karas University of Michigan, Kimberly Diaz University of Michigan, Amir Kamil University of Michigan, Jean-Baptiste Jeannin University of Michigan at Ann Arbor, Westley Weimer University of Michigan | ||
11:15 15mTalk | Which of My Assumptions are Unnecessary for Realizability and Why Should I Care? Technical Track Pre-print | ||
11:30 15mTalk | Understanding Inconsistency in Azure Cosmos DB with TLA+ SEIP - Software Engineering in Practice Alistair Finn Hackett University of British Columbia, Joshua Rowe Microsoft, Markus Alexander Kuppe Microsoft Research | ||
11:45 15mTalk | Rely/Guarantee Reasoning for Multicopy Atomic Weak Memory Models Showcase Nicholas Coughlin Defence Science and Technology Group, Australia, Kirsten Winter Defence Science and Technology Group, Australia, Graeme Smith The University of Queensland | ||
12:00 7mTalk | HOME: Heard-Of based Formal Modeling and Verification Environment for Consensus Protocols DEMO - Demonstrations Shumao Zhai Beihang University, Xiaozhou Li University of Oulu, Ning Ge School of Software, Beihang University | ||
12:07 7mTalk | CoVeriTeam Service: Verification as a Service DEMO - Demonstrations | ||
12:15 7mTalk | Proofster: Automated Formal Verification DEMO - Demonstrations Arpan Agrawal University of Illinois Urbana-Champaign, Emily First University of Massachusetts Amherst, Zhanna Kaufman University of Massachusetts, Tom Reichel University of Illinois Urbana-Champaign, Shizhuo Zhang University of Illinois Urbana-Champaign, Timothy Zhou University of Illinois Urbana-Champaign, Alex Sanchez-Stern University of Massachusetts at Amherst, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts Media Attached | ||
12:22 7mTalk | Anti-Patterns (Smells) in Temporal Specifications NIER - New Ideas and Emerging Results Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar Pre-print |
11:00 - 12:30 | APIs and librariesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 105 Chair(s): Sarah Nadi University of Alberta | ||
11:00 15mTalk | UpCy: Safely Updating Outdated Dependencies Technical Track Andreas Dann Paderborn University, Ben Hermann TU Dortmund, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print | ||
11:15 15mTalk | APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents Technical Track DOI Pre-print | ||
11:30 15mTalk | Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis Technical Track Sen Yang Army Engineering University of PLA, Sen Chen Tianjin University, Lingling Fan Nankai University, Sihan Xu Nankai University, China, Zhanwei Hui Academy of Military Science, Song Huang Army Engineering University of PLA | ||
11:45 15mTalk | OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions Technical Track Wu Jiahui Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Wei Tang Tsinghua University, Lyuye Zhang Nanyang Technological University, Yueming Wu Nanyang Technological University, Chengyue Liu Scantist, Kairan Sun Singapore University of Technology and Design, Lida Zhao Nanyang Technological University, Yang Liu Nanyang Technological University | ||
12:00 15mTalk | Scaling Web API Integrations SEIP - Software Engineering in Practice Pre-print | ||
12:15 7mTalk | Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem Journal-First Papers Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Patanamon Thongtanunam University of Melbourne, Takashi Ishio Future University Hakodate, Kenichi Matsumoto Nara Institute of Science and Technology Link to publication | ||
12:22 7mTalk | Breaking Bad? Semantic Versioning and Impact of Breaking Changes in Maven Central Journal-First Papers Lina Ochoa Eindhoven University of Technology, Thomas Degueule CNRS, LaBRI, Jean-Rémy Falleri Bordeaux INP, Jurgen Vinju CWI; Eindhoven University of Technology |
11:00 - 12:30 | Blockchain/smart contractsTechnical Track / DEMO - Demonstrations / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 106 Chair(s): Yi Li Nanyang Technological University | ||
11:00 15mTalk | SmartMark: Software Watermarking Scheme for Smart Contracts Technical Track Taeyoung Kim Sungkyunkwan University, Yunhee Jang Sungkyunkwan University, Chanjong Lee Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, hyoungshick kim Sungkyunkwan University | ||
11:15 15mTalk | Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum Technical Track Zibin Zheng School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Jianzhong Su Sun Yat-sen University, Zhijie Zhong School of Software Engineering, Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Jiachi Chen School of Software Engineering, Sun Yat-sen University Pre-print | ||
11:30 15mTalk | BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts Technical Track Peilin Zheng Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng School of Software Engineering, Sun Yat-sen University Pre-print File Attached | ||
11:45 15mTalk | DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications SEIP - Software Engineering in Practice Jianfei Zhou University of Electronic Science and Technology of China, Jiang Tianxing , Haijun Wang Ant Group, Meng Wu Ant Group, Ting Chen University of Electronic Science and Technology of China | ||
12:00 15mTalk | Evolutionary Approach for Concurrency Testing of Ripple Blockchain Consensus Algorithm SEIP - Software Engineering in Practice Martijn van Meerten Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology, Annibale Panichella Delft University of Technology | ||
12:15 7mTalk | Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts DEMO - Demonstrations Jiashuo Zhang Peking University, China, Yue Li Peking University, Jianbo Gao Peking University, Zhi Guan Peking University, Zhong Chen | ||
12:22 7mTalk | Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts Journal-First Papers Maha Ayub Information Technology University (ITU) Lahore, Pakistan, Tania Saleem Information Technology University (ITU) Lahore, Pakistan, Muhammad Umar Janjua Information Technology University (ITU) Lahore, Pakistan, Talha Ahmed Information Technology University (ITU) Lahore, Pakistan |
11:00 - 12:30 | |||
11:00 90mPoster | SRC Posters SRC - ACM Student Research Competition |
11:00 - 12:30 | Cognitive aspects of software developmentNIER - New Ideas and Emerging Results / Journal-First Papers / SEIS - Software Engineering in Society / SEIP - Software Engineering in Practice / SEET - Software Engineering Education and Training / Technical Track at Meeting Room 109 Chair(s): Nicole Novielli University of Bari | ||
11:00 15mTalk | Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors Technical Track Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Anita Sarma Oregon State University, Daniel M. German University of Victoria, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University Pre-print | ||
11:15 15mTalk | Cognitive Reflection in Software Verification and Testing SEET - Software Engineering Education and Training Kevin Buffardi California State University, Chico | ||
11:30 15mTalk | A Model for Understanding and Reducing Developer Burnout SEIP - Software Engineering in Practice Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Igor Steinmacher Northern Arizona University, Marco Gerosa Northern Arizona University, Anita Sarma Oregon State University, Marcelo Lara Globant, Michael Feathers Globant, Nick Ross Globant, Kevin Bishop Globant Pre-print | ||
11:45 15mFull-paper | Designing for Cognitive Diversity: Improving the GitHub Experience for Newcomers SEIS - Software Engineering in Society Italo Santos Northern Arizona University, João Felipe Pimentel Northern Arizona University, Igor Wiese Federal University of Technology, Igor Steinmacher Northern Arizona University, Anita Sarma Oregon State University, Marco Gerosa Northern Arizona University Pre-print | ||
12:00 7mTalk | From Anecdote to Evidence: The Relationship Between Personality and Need for Cognition of Developers Journal-First Papers Daniel Russo Department of Computer Science, Aalborg University, Andres R. Masegosa Aalborg University, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital Link to publication DOI Pre-print | ||
12:07 7mTalk | A Qualitative Study of Developers’ Discussions of Their Problems and Joys During the Early COVID-19 Months Journal-First Papers Gias Uddin University of Calgary, Canada, Omar Alam Trent University, Alexander Serebrenik Eindhoven University of Technology | ||
12:15 7mTalk | Interpersonal trust in OSS: Exploring dimensions of trust in GitHub pull requests NIER - New Ideas and Emerging Results Amirali Sajadi Drexel University, Kostadin Damevski Virginia Commonwealth University, Preetha Chatterjee Drexel University, USA Pre-print | ||
12:22 7mTalk | The risk-taking software engineer: A framed portrait NIER - New Ideas and Emerging Results Lorenz Graf-Vlachy University of Stuttgart Pre-print |
11:00 - 12:30 | |||
11:00 90mTalk | Quantum Software Testing: A Brief Introduction Technical Briefings Pre-print |
13:45 - 15:15 | Code smells and clonesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Level G - Plenary Room 1 Chair(s): Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity | ||
13:45 15mTalk | Comparison and Evaluation of Clone Detection Techniques with Different Code Representations Technical Track Yuekun Wang University of Science and Technology of China, Yuhang Ye University of Science and Technology of China, Yueming Wu Nanyang Technological University, Weiwei Zhang University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Yang Liu Nanyang Technological University | ||
14:00 15mTalk | Learning Graph-based Code Representations for Source-level Functional Similarity Detection Technical Track Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Zhenkai Liang National University of Singapore | ||
14:15 15mTalk | The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing Technical Track Qihong Chen University of California, Irvine, Rúben Câmara LASIGE and Department of Informatics are Faculdade Ciências Universidade de Lisboa,, José Campos University of Porto, Portugal, André Souto LaSiGE & FCUL, University of Lisbon, Iftekhar Ahmed University of California at Irvine Pre-print | ||
14:30 15mTalk | An Empirical Comparison on the Results of Different Clone Detection Setups for C-based Projects SEIP - Software Engineering in Practice Yan Zhou Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Yong Shi Huawei Technologies, Boyuan Chen Centre for Software Excellence, Huawei Canada, Zhen Ming (Jack) Jiang York University | ||
14:45 7mTalk | Developers’ perception matters: machine learning to detect developer-sensitive smells Journal-First Papers Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil | ||
14:52 7mTalk | Smells in system user interactive tests Journal-First Papers Renaud Rwemalika University of Luxembourg, Sarra Habchi Ubisoft, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg, Marie-Claude Brasseur BGL BNP Paribas | ||
15:00 7mTalk | Bash in the Wild: Language Usage, Code Smells, and Bugs Journal-First Papers Yiwen Dong University of Waterloo, Zheyang Li University of Waterloo, Yongqiang Tian University of Waterloo, Chengnian Sun University of Waterloo, Michael W. Godfrey University of Waterloo, Canada, Mei Nagappan University of Waterloo | ||
15:07 7mTalk | 1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis Journal-First Papers Ang Jia Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Xi Xu Xi'an Jiaotong University, Zhaohui Zhou Xi'an Jiaotong University, Qiyi Tang Tencent Security Keen Lab, Sen Nie Keen Security Lab, Tencent, Shi Wu Tencent Security Keen Lab, Ting Liu Xi'an Jiaotong University |
13:45 - 15:15 | Fuzzing: techniques and toolsTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 101 Chair(s): Mike Papadakis University of Luxembourg, Luxembourg | ||
13:45 7mTalk | Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles Journal-First Papers Ziyuan Zhong Columbia University, Gail Kaiser Columbia University, Baishakhi Ray Columbia University | ||
13:52 15mTalk | Reachable Code Coverage Technical Track Danushka Liyanage Monash University, Australia, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Kla Tantithamthavorn Monash University, Stephan Lipp Technical University of Munich | ||
14:07 15mTalk | Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing Technical Track | ||
14:22 15mTalk | Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation Technical Track Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Rongxin Wu Xiamen University, Wei Liu Nanjing University, Biao He Ant Group, Yu Ouyang Ant Group, Jiajia Li Ant Group | ||
14:37 15mTalk | Evaluating and Improving Hybrid Fuzzing Technical Track Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Mingyuan Wu Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign, Yuqun Zhang Southern University of Science and Technology | ||
14:52 15mTalk | DAISY: Effective Fuzz Driver Synthesis with Object Usage Sequence Analysis SEIP - Software Engineering in Practice Mingrui Zhang Tsinghua University, Beijing, China, Chijin Zhou Tsinghua University, Jianzhong Liu ShanghaiTech University, Mingzhe Wang Tsinghua University, Jie Liang , Juan Zhu , Yu Jiang Tsinghua University |
13:45 - 15:15 | Software architectures and designShowcase / Technical Track / SEET - Software Engineering Education and Training / NIER - New Ideas and Emerging Results at Meeting Room 102 Chair(s): Davide Taibi Tampere University | ||
13:45 15mTalk | Robustification of Behavioral Designs against Environmental Deviations Technical Track Changjian Zhang Carnegie Mellon University, Tarang Saluja Swarthmore College, Rômulo Meira-Góes Carnegie Mellon University, Matthew Bolton University of Virginia, David Garlan Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University Pre-print | ||
14:00 15mTalk | A Qualitative Study on the Implementation Design Decisions of Developers Technical Track Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University Pre-print | ||
14:15 15mTalk | Designing for Real People: Teaching Agility through User-Centric Service Design SEET - Software Engineering Education and Training Robert Chatley Imperial College London, Tony Field Imperial College London, Mark Wheelhouse Imperial College London, Carolyn Runcie Royal College of Art, Nick de Leon Royal College of Art, Clive Grinyer Royal College of Art Pre-print | ||
14:30 15mTalk | A Decision Model for Choosing Patterns in Blockchain-Based Applications Showcase Xiwei (Sherry) Xu CSIRO’s Data61, H M N Dilum Bandara Data61, CSIRO, Qinghua Lu CSIRO’s Data61, Ingo Weber TU Munich & Fraunhofer, Munich, Len Bass Carnegie Mellon University, Liming Zhu CSIRO’s Data61 | ||
14:45 15mTalk | Architectural Design Decisions for Machine Learning Deployment Showcase | ||
15:00 7mTalk | Handling Communication via APIs for Microservices NIER - New Ideas and Emerging Results | ||
15:07 7mTalk | Open Design Case Study - A Crowdsourcing Effort to Curate Software Design Case Studies SEET - Software Engineering Education and Training Chun Yong Chong Monash University Malaysia, Eunsuk Kang Carnegie Mellon University, Mary Shaw Carnegie Mellon University Pre-print |
13:45 - 15:15 | Software security and privacyTechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Wei Yang University of Texas at Dallas | ||
13:45 15mTalk | BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service Technical Track I Luk Kim Purdue University, Weihang Wang University of Southern California, Yonghwi Kwon University of Virginia, Xiangyu Zhang Purdue University | ||
14:00 15mTalk | FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing Technical Track Ziqi Zhang Peking University, Yuanchun Li Institute for AI Industry Research (AIR), Tsinghua University, Bingyan Liu Peking University, Yifeng Cai Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University | ||
14:15 15mTalk | PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps Technical Track Zeya Tan Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology Pre-print | ||
14:30 15mTalk | AdHere: Automated Detection and Repair of Intrusive Ads Technical Track Yutian Yan University of Southern California, Yunhui Zheng , Xinyue Liu University at Buffalo, SUNY, Nenad Medvidović University of Southern California, Weihang Wang University of Southern California | ||
14:45 15mTalk | Bad Snakes: Understanding and Improving Python Package Index Malware Scanning Technical Track | ||
15:00 7mTalk | DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data Journal-First Papers Xueling Zhang Rochester Institute of Technology, John Heaps University of Texas at San Antonio, Rocky Slavin The University of Texas at San Antonio, Jianwei Niu University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Xiaoyin Wang University of Texas at San Antonio | ||
15:07 7mTalk | Assessing the opportunity of combining state-of-the-art Android malware detectors Journal-First Papers Nadia Daoudi SnT, University of Luxembourg, Kevin Allix CentraleSupelec Rennes, Tegawendé F. Bissyandé SnT, University of Luxembourg, Jacques Klein University of Luxembourg |
13:45 - 15:15 | AI systems engineeringSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results / Journal-First Papers at Meeting Room 104 Chair(s): Xin Peng Fudan University | ||
13:45 15mTalk | FedDebug: Systematic Debugging for Federated Learning Applications Technical Track | ||
14:00 15mTalk | Practical and Efficient Model Extraction of Sentiment Analysis APIs Technical Track Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Victor Junqiu Wei The Hong Kong Polytechnic University, Xixian Chen Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University, Irwin King The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong | ||
14:15 15mTalk | CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models Technical Track Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Bin Luo Nanjing University Pre-print | ||
14:30 15mTalk | Challenges in Adopting Artificial Intelligence Based User Input Verification Framework in Reporting Software Systems SEIP - Software Engineering in Practice Dong Jae Kim Concordia University, Tse-Hsun (Peter) Chen Concordia University, Steve Sporea , Andrei Toma ERA Environmental Management Solutions, Laura Weinkam , Sarah Sajedi ERA Environmental Management Solutions, Steve Sporea | ||
14:45 7mTalk | Towards Understanding Quality Challenges of the Federated Learning for Neural Networks: A First Look from the Lens of Robustness Journal-First Papers Amin Eslami Abyane University of Calgary, Derui Zhu Technical University of Munich, Roberto Souza University of Calgary, Lei Ma University of Alberta, Hadi Hemmati York University | ||
14:52 7mTalk | An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks Journal-First Papers Lizhi Liao Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Lei Ma University of Alberta | ||
15:00 7mTalk | Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering Journal-First Papers Mohammed Attaoui University of Luxembourg, Hazem FAHMY University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Link to publication Pre-print | ||
15:07 7mTalk | Iterative Assessment and Improvement of DNN Operational Accuracy NIER - New Ideas and Emerging Results Antonio Guerriero Università di Napoli Federico II, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II Pre-print |
13:45 - 15:15 | Defect analysisJournal-First Papers / Technical Track / SEIP - Software Engineering in Practice at Meeting Room 106 Chair(s): Kla Tantithamthavorn Monash University | ||
13:45 15mTalk | RepresentThemAll: A Universal Learning Representation of Bug Reports Technical Track Sen Fang Macau University of Science and Technology, Tao Zhang Macau University of Science and Technology, Youshuai Tan Macau University of Science and Technology, He Jiang Dalian University of Technology, Xin Xia Huawei, Xiaobing Sun Yangzhou University | ||
14:00 15mTalk | Demystifying Exploitable Bugs in Smart Contracts Technical Track Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University Pre-print | ||
14:15 15mTalk | Understanding and Detecting On-the-Fly Configuration Bugs Technical Track Teng Wang National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Si Zheng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Erci Xu National University of Defense Technology, Shaoliang Peng Hunan University, Liao Xiangke National University of Defense Technology Pre-print | ||
14:30 15mTalk | Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation Technical Track Parvez Mahbub Dalhousie University, Ohiduzzaman Shuvo Dalhousie University, Masud Rahman Dalhousie University Pre-print Media Attached | ||
14:45 15mTalk | Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services SEIP - Software Engineering in Practice Zexin Zhong Ant Group; University of Technology Sydney, Jiangchao Liu Ant Group, Diyu Wu Ant Group, Peng Di Ant Group, Yulei Sui University of New South Wales, Sydney, Alex X. Liu Ant Group, John C.S. Lui The Chinese University of Hong Kong | ||
15:00 7mTalk | Exploring the relationship between performance metrics and cost saving potential of defect prediction models Journal-First Papers | ||
15:07 7mTalk | A Machine and Deep Learning analysis among SonarQube rules, Product, and Process Metrics for Faults Prediction Journal-First Papers Francesco Lomio Constructor Institute Schaffhausen, Sergio Moreschini Tampere University, Valentina Lenarduzzi University of Oulu |
13:45 - 15:15 | |||
13:45 90mTalk | DevCertOps: Strategies to realize Continuous Delivery of Safe Software in Regulated Domain Technical Briefings Marc Zeller Siemens AG |
13:45 - 15:15 | |||
13:45 90mTalk | SAIN: A Community-Wide Software Architecture INfrastructure Technical Briefings Joshua Garcia University of California, Irvine, Mehdi Mirakhorli Rochester Institute of Technology, Lu Xiao Stevens Institute of Technology, Sam Malek University of California at Irvine, Rick Kazman University of Hawai‘i at Mānoa, Yuanfang Cai Drexel University, Nenad Medvidović University of Southern California |
15:45 - 17:15 | DocumentationTechnical Track / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Denys Poshyvanyk College of William and Mary | ||
15:45 15mTalk | Developer-Intent Driven Code Comment Generation Technical Track Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
16:00 15mTalk | Data Quality Matters: A Case Study of ObsoleteComment Detection Technical Track Shengbin Xu Nanjing University, Yuan Yao Nanjing University, Feng Xu Nanjing University, Tianxiao Gu TikTok Inc., Jingwei Xu , Xiaoxing Ma Nanjing University Pre-print | ||
16:15 15mTalk | Revisiting Learning-based Commit Message Generation Technical Track Jinhao Dong Peking University, Yiling Lou Fudan University, Dan Hao Peking University, Lin Tan Purdue University Pre-print | ||
16:30 15mTalk | Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality Technical Track | ||
16:45 7mTalk | On the Significance of Category Prediction for Code-Comment Synchronization Journal-First Papers Zhen Yang City University of Hong Kong, China, Jacky Keung City University of Hong Kong, Xiao Yu Wuhan University of Technology, Yan Xiao National University of Singapore, Zhi Jin Peking University, Jingyu Zhang City University of Hong Kong | ||
16:52 7mTalk | Correlating Automated and Human Evaluation of Code Documentation Generation Quality Journal-First Papers Xing Hu Zhejiang University, Qiuyuan Chen Zhejiang University, Haoye Wang Hangzhou City University, Xin Xia Huawei, David Lo Singapore Management University, Thomas Zimmermann Microsoft Research | ||
17:00 7mTalk | Predictive Comment Updating with Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach Journal-First Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Zhongxin Liu Zhejiang University, Xin Xia Huawei, Xiaoguang Mao National University of Defense Technology Link to publication DOI Pre-print |
15:45 - 17:15 | Software loggingTechnical Track at Meeting Room 101 Chair(s): Hongyu Zhang The University of Newcastle | ||
15:45 15mTalk | PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing Technical Track Hetong Dai Concordia University, Yiming Tang Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo | ||
16:00 15mTalk | Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction Technical Track Zhenhao Li Concordia University, Chuan Luo Beihang University, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo, Shilin He Microsoft Research, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research | ||
16:15 15mTalk | On the Temporal Relations between Logging and Code Technical Track Zishuo Ding Concordia University, Yiming Tang Concordia University, Yang Li Beijing University of Posts and Telecommunications, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo Pre-print | ||
16:30 15mTalk | How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners Technical Track Guoping Rong Nanjing University, shenghui gu Nanjing University, Haifeng Shen Australian Catholic University, He Zhang Nanjing University, Hongyu Kuang Nanjing University | ||
16:45 15mTalk | When to Say What: Learning to Find Condition-Message Inconsistencies Technical Track Pre-print | ||
17:00 15mTalk | A Semantic-aware Parsing Approach for Log Analytics Technical Track Yintong Huo The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cheryl Lee The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong Pre-print |
15:45 - 17:15 | Test generationSEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Journal-First Papers at Meeting Room 102 Chair(s): Chunyang Chen Monash University | ||
15:45 7mTalk | SoapOperaTG: A Tool for System Knowledge Graph Based Soap Opera Test Generation DEMO - Demonstrations Yanqi Su Australian National University, Zheming Han , Zhenchang Xing CSIRO’s Data61; Australian National University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61 | ||
15:52 7mTalk | GUI Testing to the Power of Parallel Q-Learning DEMO - Demonstrations Marco Mobilio University of Milano Bicocca, Diego Clerissi University of Milano-Bicocca, Giovanni Denaro University of Milano-Bicocca, Italy, Leonardo Mariani University of Milano-Bicocca | ||
16:00 15mTalk | BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing Technical Track Dezhi Ran Peking University, Hao Wang Peking University, China, Wenyu Wang University of Illinois Urbana-Champaign, Tao Xie Peking University | ||
16:15 15mTalk | Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference Technical Track Sidong Feng Monash University, Mulong Xie Australian National University, Chunyang Chen Monash University Pre-print | ||
16:30 15mTalk | CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models Technical Track Caroline Lemieux University of British Columbia, Jeevana Priya Inala Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Siddhartha Sen Microsoft Research | ||
16:45 15mTalk | Simulation-Driven Automated End-to-End Test and Oracle Inference SEIP - Software Engineering in Practice Shreshth Tuli Meta Platforms Inc. and Imperial College, Kinga Bojarczuk Facebook, Natalija Gucevska Facebook, Mark Harman University College London, Xiaoyu Wang Meta Platforms Inc., Graham Wright Meta Platforms Inc. | ||
17:00 7mTalk | Reasoning-Based Software Testing NIER - New Ideas and Emerging Results Luca Giamattei Università di Napoli Federico II, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II Pre-print | ||
17:07 7mTalk | Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests Journal-First Papers Mostafa Jangali Concordia University, Yiming Tang Concordia University, Niclas Alexandersson Chalmers University of Technology, Philipp Leitner Chalmers University of Technology, Sweden / University of Gothenburg, Sweden, Jinqiu Yang Concordia University, Weiyi Shang University of Waterloo |
15:45 - 17:15 | SE for security 1Technical Track / SEET - Software Engineering Education and Training / Journal-First Papers / SEIS - Software Engineering in Society at Meeting Room 103 Chair(s): Abhik Roychoudhury National University of Singapore | ||
15:45 15mTalk | TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis Technical Track Chao Wang , Ronny Ko The Ohio State University, Yue Zhang The Ohio State University, Yuqing Yang The Ohio State University, Zhiqiang Lin The Ohio State University | ||
16:00 15mTalk | AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities Technical Track Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Canada, Karthik Pattabiraman University of British Columbia | ||
16:15 15mTalk | Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure Technical Track Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Shanping Li Zhejiang University Pre-print | ||
16:30 15mPaper | Security Thinking in Online Freelance Software Development SEIS - Software Engineering in Society Irum Rauf The Open University, UK, Marian Petre School of Computing and Communications, The Open University, UK, Thein Tun School of Computing and Communications,The Open University, UK; Simply Business, UK, Tamara Lopez The Open University, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland | ||
16:45 7mTalk | Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection Journal-First Papers Yu Nong Washington State University, Rainy Sharma Washington State University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Xiapu Luo The Hong Kong Polytechnic University, Haipeng Cai Washington State University Link to publication DOI Authorizer link Pre-print | ||
16:52 8mTalk | Training for Security: Planning the Use of a SAT in the Development Pipeline of Web Apps SEET - Software Engineering Education and Training Sabato Nocera University of Salerno, Simone Romano University of Salerno, Rita Francese University of Salerno, Giuseppe Scanniello University of Salerno | ||
17:00 15mTalk | VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning Technical Track Yu Nong Washington State University, Yuzhe Ou University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University Pre-print |
15:45 - 17:15 | Development and evolution of AI-intensive systemsSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results at Meeting Room 104 Chair(s): Sebastian Elbaum University of Virginia | ||
15:45 15mTalk | Reusing Deep Neural Network Models through Model Re-engineering Technical Track Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang The University of Newcastle, Zhaotian Li Beihang University, Xudong Liu Beihang University | ||
16:00 15mTalk | PyEvolve: Automating Frequent Code Changes in Python ML Systems Technical Track Malinda Dilhara University of Colorado Boulder, USA, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Ameya Ketkar Uber Pre-print | ||
16:15 15mTalk | DeepArc: Modularizing Neural Networks for the Model Maintenance Technical Track xiaoning ren , Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yinxing Xue University of Science and Technology of China, Ruofan Liu National University of Singapore, Jun Sun Singapore Management University, Zhiyong Feng Tianjin University, Jin Song Dong National University of Singapore | ||
16:30 15mTalk | Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement Technical Track Sayem Mohammad Imtiaz Iowa State University, Fraol Batole Dept. of Computer Science, Iowa State University, Astha Singh Dept. of Computer Science, Iowa State University, Rangeet Pan IBM Research, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University Pre-print | ||
16:45 7mTalk | Safe-DS: A Domain Specific Language to Make Data Science Safe NIER - New Ideas and Emerging Results Pre-print | ||
16:52 7mTalk | Rapid Development of Compositional AI NIER - New Ideas and Emerging Results Lee Martie MIT-IBM Watson AI Lab, Jessie Rosenberg IBM, Veronique Demers MIT-IBM Watson AI Lab, Gaoyuan Zhang IBM, Onkar Bhardwaj MIT-IBM Watson AI Lab, John Henning IBM, Aditya Prasad IBM, Matt Stallone MIT-IBM Watson AI Lab, Ja Young Lee IBM, Lucy Yip IBM, Damilola Adesina IBM, Elahe Paikari IBM, Oscar Resendiz IBM, Sarah Shaw IBM, David Cox IBM Pre-print | ||
17:00 7mTalk | StreamAI: Challenges of Continual Learning Systems in Production for AI Industrialization SEIP - Software Engineering in Practice Mariam Barry BNP Paribas, Albert Bifet University of Waikato, Institut Polytechnique de Paris, Jean Luc Billy BNP Paribas |
15:45 - 17:15 | Vulnerability analysis and assessmentTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105 Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
15:45 15mTalk | Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports Technical Track Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University Pre-print | ||
16:00 15mTalk | Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem Technical Track Yulun Wu Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Qiang Li Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Pre-print | ||
16:15 15mTalk | SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript Technical Track Masudul Hasan Masud Bhuiyan CISPA Helmholtz Center for Information Security, Adithya Srinivas Parthasarathy Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Nikos Vasilakis Massachusetts Institute of Technology, Michael Pradel University of Stuttgart, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security Pre-print | ||
16:30 15mTalk | On Privacy Weaknesses and Vulnerabilities in Software Systems Technical Track Pattaraporn Sangaroonsilp University of Wollongong, Hoa Khanh Dam University of Wollongong, Aditya Ghose University of Wollongong | ||
16:45 7mTalk | A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph DEMO - Demonstrations Jiamou Sun CSIRO's Data61, Zhenchang Xing CSIRO’s Data61; Australian National University, Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 | ||
16:52 7mTalk | An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities Journal-First Papers Imen Sayar IRIT, University of Toulouse, IUT Blagnac Toulouse II, 1 Place Georges Brassens, Blagnac Cedex, France, 31703, Alexandre Bartel Umeå University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Yves Le Traon University of Luxembourg, Luxembourg | ||
17:00 7mTalk | Blindspots in Python and Java APIs Result in Vulnerable Code Journal-First Papers Yuriy Brun University of Massachusetts, Tian Lin University of Florida, Jessie Elise Somerville University of Florida, Elisha M. Myers Florida Atlantic University, Natalie C. Ebner University of Florida Link to publication DOI Pre-print Media Attached |
15:45 - 17:15 | FOSE-AI & SE and DebtFoSE - Future of Software Engineering at Meeting Room 109 Chair(s): Xing Hu Zhejiang University | ||
15:45 10mTalk | Trustworthy and Synergistic AI4SE: Vision and Road Ahead FoSE - Future of Software Engineering David Lo Singapore Management University | ||
15:55 10mTalk | AI and ML: The Software Engineers of the Future FoSE - Future of Software Engineering Thomas Zimmermann Microsoft Research | ||
16:05 10mTalk | Generative Artificial Intelligence for Software Engineering FoSE - Future of Software Engineering Mark Harman Meta Platforms, Inc. and UCL | ||
16:15 10mTalk | Technical Debt: are we there yet? FoSE - Future of Software Engineering Paris Avgeriou University of Groningen, The Netherlands | ||
16:25 50mPanel | Panel discussion FoSE - Future of Software Engineering |
15:45 - 17:15 | |||
15:45 - 17:15 | |||
15:45 90mTalk | Methodology and Guidelines for Evaluating Multi-Objective Search-Based Software Engineering Technical Briefings |
15:45 - 17:15 | |||
15:45 90mTalk | SAIN: A Community-Wide Software Architecture INfrastructure Technical Briefings Joshua Garcia University of California, Irvine, Mehdi Mirakhorli Rochester Institute of Technology, Lu Xiao Stevens Institute of Technology, Sam Malek University of California at Irvine, Rick Kazman University of Hawai‘i at Mānoa, Yuanfang Cai Drexel University, Nenad Medvidović University of Southern California |
Thu 18 MayDisplayed time zone: Hobart change
10:30 - 11:00 | |||
10:30 30mTalk | RM2DM: A Tool for Automatic Generation of OO Design Models from Requirements Models DEMO - Demonstrations Zhen Tian Beihang University, Yilong Yang Beihang University, Sheng Cheng Software Engineering and Digitalization Center of China Manned Space Engineering |
10:30 - 11:00 | |||
10:30 30mTalk | What Would You do? An Ethical AI Quiz DEMO - Demonstrations Wei Teo Monash University, Ze Teoh Monash University, Dayang Abang Arabi Monash University, Morad Aboushadi Monash University, Khairenn Lai Monash University, Zhe Ng Monash University, Aastha Pant Monash Univeristy, Rashina Hoda Monash University, Kla Tantithamthavorn Monash University, Burak Turhan University of Oulu Pre-print Media Attached |
11:00 - 12:30 | Defect detection and predictionTechnical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1 Chair(s): Wei Le Iowa State University | ||
11:00 15mTalk | Detecting Exception Handling Bugs in C++ Programs Technical Track Hao Zhang Institute of Software, Chinese Academy of Sciences, Ji Luo Institute of Software, Chinese Academy of Sciences, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Zongyan Qiu Peking University | ||
11:15 15mTalk | Learning to Boost Disjunctive Static Bug-Finders Technical Track | ||
11:30 15mTalk | Predicting Bugs by Monitoring Developers During Task Execution Technical Track Gennaro Laudato University of Molise, Simone Scalabrino University of Molise, Nicole Novielli University of Bari, Filippo Lanubile University of Bari, Rocco Oliveto University of Molise | ||
11:45 15mTalk | Detecting Isolation Bugs via Transaction Oracle Construction Technical Track Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Jiansen Song , Dong Wang Institute of software, Chinese academy of sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Lei Chen Inspur Software Group Co., Ltd., Hanmo Wang Inspur Software Group Co., Ltd., Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
12:00 15mTalk | SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk Technical Track Siwei Cui Texas A & M University, Yifei Gao Texas A&M University, Rainer Unterguggenberger Lam Research, Wilfried Pichler Lam Research, Sean Livingstone Texas A&M University, Jeff Huang Texas A&M University Pre-print | ||
12:15 15mTalk | CONAN: Diagnosing Batch Failures for Cloud Systems SEIP - Software Engineering in Practice Liqun Li Microsoft Research, Xu Zhang Microsoft Research, Shilin He Microsoft Research, Yu Kang Microsoft Research, Hongyu Zhang The University of Newcastle, Minghua Ma Microsoft Research, Yingnong Dang Microsoft Azure, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research File Attached |
11:00 - 12:30 | Studies on gender in SESEIS - Software Engineering in Society / Technical Track / SEET - Software Engineering Education and Training at Meeting Room 101 Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick | ||
11:00 15mTalk | “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers Technical Track Sterre van Breukelen Eindhoven University of Technology, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Sebastian Baltes SAP SE & University of Adelaide, Alexander Serebrenik Eindhoven University of Technology Pre-print | ||
11:15 15mTalk | The ABC of Pair Programming: Gender-dependent Attitude, Behavior and Code of Young Learners SEET - Software Engineering Education and Training Pre-print | ||
11:30 15mTalk | Engaging Girls in Computer Science: Do Single-Gender Interdisciplinary Classes Help? SEET - Software Engineering Education and Training Kai Marquardt Karlsruhe Institute of Technology (KIT), Lucia Happe Karlsruhe Institute of Technology, Ingo Wagner Karlsruhe Institute of Technology (KIT) Pre-print | ||
11:45 15mPaper | Fundamentalists, Integrationists, & Transformationists: An Empirical Theory of Men Software Engineers' Orientations in Gender Inequalities SEIS - Software Engineering in Society Yi Wang Beijing University of Posts and Telecommunications, Xinyue Zhang Beijing University of Posts and Telecommunications, Wei Wang Beijing University of Posts and Telecommunications | ||
12:00 15mPaper | Draw a Software Engineer Test - An Investigation into Children's Perception of Software Engineering Profession SEIS - Software Engineering in Society Claudia Maria Cutrupi Norwegian University of Science and Technology (NTNU), Irene Zanardi USI Università della Svizzera italiana, Letizia Jaccheri Norwegian University of Science and Technology (NTNU), Monica Landoni USI Università della Svizzera italiana | ||
12:15 15mFull-paper | Benefits and Limitations of Remote Work to LGBTQIA+ Software Professionals SEIS - Software Engineering in Society Ronnie de Souza Santos Cape Breton University, Cleyton V. C. de Magalhaes CESAR School, Paul Ralph Dalhousie University Pre-print |
11:00 - 12:30 | AI testing 1Technical Track / DEMO - Demonstrations / Journal-First Papers at Meeting Room 102 Chair(s): Matthew B Dwyer University of Virginia | ||
11:00 15mTalk | When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study Technical Track Pre-print | ||
11:15 15mTalk | Fuzzing Automatic Differentiation in Deep-Learning Libraries Technical Track Chenyuan Yang University of Illinois at Urbana-Champaign, Yinlin Deng University of Illinois at Urbana-Champaign, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuxing Tu Huazhong University of Science and Technology, Hanchi Li University of Science and Technology of China, Lingming Zhang University of Illinois at Urbana-Champaign | ||
11:30 15mTalk | Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective Technical Track Zenan Li Nanjing University, China, Maorun Zhang Nanjing University, China, Jingwei Xu , Yuan Yao Nanjing University, Chun Cao Nanjing University, Taolue Chen Birkbeck University of London, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University Pre-print | ||
11:45 7mTalk | DeepJudge: A Testing Framework for Copyright Protection of Deep Learning Models DEMO - Demonstrations Jialuo Chen Zhejiang University, Youcheng Sun The University of Manchester, Jingyi Wang Zhejiang University, Peng Cheng Zhejiang University, Xingjun Ma Deakin University | ||
11:52 7mTalk | DeepCrime: from Real Faults to Mutation Testing Tool for Deep Learning DEMO - Demonstrations | ||
12:00 7mTalk | DiverGet: a Search-Based Software Testing approach for Deep Neural Network Quantization assessment Journal-First Papers Ahmed Haj Yahmed École Polytechnique de Montréal, Houssem Ben Braiek École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal, Sonia Bouzidi National Institute of Applied Science and Technology, Rania Zaatour Potsdam Institute for Climate Impact Research | ||
12:07 15mTalk | Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion Technical Track Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology |
11:00 - 12:30 | Code reviewJournal-First Papers / SEIP - Software Engineering in Practice / Technical Track at Meeting Room 103 Chair(s): Thomas LaToza George Mason University | ||
11:00 15mTalk | Workflow analysis of data science code in public GitHub repositories Journal-First Papers Dhivyabharathi Ramasamy Department of Informatics, University of Zurich, Zurich, Switzerland, Cristina Sarasua Department of Informatics, University of Zurich, Zurich, Switzerland, Alberto Bacchelli University of Zurich, Abraham Bernstein Department of Informatics, University of Zurich, Zurich, Switzerland | ||
11:15 15mTalk | Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension Journal-First Papers Haytham Hijazi CISUC, DEI, University of Coimbra, João Durães CISUC, Polytechnic Institute of Coimbra, Ricardo Couceiro University of Coimbra, Raul Barbosa CISUC, DEI, University of Coimbra, João Castelhano ICNAS, University of Coimbra, Júlio Medeiros CISUC, DEI, University of Coimbra, Miguel Castelo Branco ICNAS/CIBIT, University of Coimbra, Paulo Carvalho University of Coimbra, Henrique Madeira University of Coimbra | ||
11:30 15mTalk | Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions Technical Track Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo Pre-print | ||
11:45 15mTalk | Please fix this mutant: How do developers resolve mutants surfaced during code review? SEIP - Software Engineering in Practice Goran Petrovic Google; Universität Passau, René Just University of Washington, Marko Ivanković Google; Universität Passau, Gordon Fraser University of Passau | ||
12:00 15mTalk | Using Large-scale Heterogeneous Graph Representation Learning for Code Review Recommendations at Microsoft SEIP - Software Engineering in Practice Jiyang Zhang University of Texas at Austin, Chandra Maddila Microsoft Research, Ramakrishna Bairi Microsoft Research, Christian Bird Microsoft Research, Ujjwal Raizada Microsoft Research, Apoorva Agrawal Microsoft Research, Yamini Jhawar Microsoft Research, Kim Herzig Microsoft, Arie van Deursen Delft University of Technology Pre-print Media Attached | ||
12:15 7mTalk | A mixed-methods analysis of micro-collaborative coding practices in OpenStack Journal-First Papers Armstrong Foundjem Queen's University, Eleni Constantinou University of Cyprus, Tom Mens University of Mons, Bram Adams Queen's University, Kingston, Ontario |
11:00 - 12:30 | Program repair techniques and applicationsTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 104 Chair(s): Xuan-Bach D. Le University of Melbourne | ||
11:00 15mTalk | Better Automatic Program Repair by Using Bug Reports and Tests Together Technical Track Pre-print | ||
11:15 15mTalk | CCTEST: Testing and Repairing Code Completion Systems Technical Track Li Zongjie , Chaozheng Wang Harbin Institute of Technology, Zhibo Liu Hong Kong University of Science and Technology, Haoxuan Wang EPFL, Dong Chen HKUST, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology | ||
11:30 7mTalk | A Controlled Experiment of Different Code Representations for Learning-Based Program Repair Journal-First Papers Marjane Namavar University of British Columbia, Noor Nashid University of British Columbia, Ali Mesbah University of British Columbia (UBC) Link to publication Pre-print | ||
11:37 7mTalk | Patching Locking Bugs Statically with Crayons Journal-First Papers Juan Alfredo Cruz-Carlon IT University of Copenhagen, Mahsa Varshosaz IT University of Copenhagen, Denmark, Claire Le Goues Carnegie Mellon University, Andrzej Wąsowski IT University of Copenhagen, Denmark | ||
11:45 15mTalk | KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair Technical Track Nan Jiang Purdue University, Thibaud Lutellier University of Alberta, Yiling Lou Fudan University, Lin Tan Purdue University, Dan Goldwasser Purdue University, Xiangyu Zhang Purdue University Pre-print | ||
12:00 15mTalk | Rete: Learning Namespace Representation for Program Repair Technical Track Nikhil Parasaram University College London, Earl T. Barr University College London, Sergey Mechtaev University College London Link to publication Pre-print | ||
12:15 7mTalk | Cerberus: a Program Repair Framework DEMO - Demonstrations Ridwan Salihin Shariffdeen National University of Singapore, Martin Mirchev National University of Singapore, Yannic Noller National University of Singapore, Abhik Roychoudhury National University of Singapore | ||
12:22 7mTalk | Predicting Patch Correctness Based on the Similarity of Failing Test Cases Journal-First Papers Haoye Tian University of Luxembourg, Yinghua LI University of Luxembourg, Weiguo Pian University of Luxembourg, Abdoul Kader Kaboré SnT, University of Luxembourg, Kui Liu Huawei Software Engineering Application Technology Lab, Andrew Habib SnT, University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg |
11:00 - 12:30 | Software verificationJournal-First Papers / NIER - New Ideas and Emerging Results / Technical Track / DEMO - Demonstrations at Meeting Room 106 Chair(s): Youcheng Sun The University of Manchester | ||
11:00 15mTalk | Data-driven Recurrent Set Learning For Non-termination Analysis Technical Track | ||
11:15 15mTalk | Compiling Parallel Symbolic Execution with Continuations Technical Track Guannan Wei Purdue University, Songlin Jia Purdue University, Ruiqi Gao Purdue University, Haotian Deng Purdue University, Shangyin Tan UC Berkeley, Oliver Bračevac Purdue University, Tiark Rompf Purdue University Pre-print | ||
11:30 15mTalk | Verifying Data Constraint Equivalence in FinTech Systems Technical Track Chengpeng Wang Hong Kong University of Science and Technology, Gang Fan Ant Group, Peisen Yao Zhejing University, Fuxiong Pan Ant Group, Charles Zhang Hong Kong University of Science and Technology Pre-print | ||
11:45 15mTalk | Tolerate Control-Flow Changes for Sound Data Race Prediction Technical Track Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yuqi Guo Institute of Software, Chinese Academy of Sciences, Beijing, China, Long Zhang Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences | ||
12:00 7mTalk | TSVD4J: Thread-Safety Violation Detection for Java DEMO - Demonstrations Shanto Rahman University of Texas at Austin, Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin | ||
12:07 7mTalk | What Petri Nets Oblige Us to Say Comparing Approaches for Behavior Composition Journal-First Papers Achiya Elyasaf Ben-Gurion University of the Negev, Tom Yaacov Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev Link to publication DOI | ||
12:15 7mTalk | A Novel and Pragmatic Scenario Modeling Framework with Verification-in-the-loop for Autonomous Driving Systems NIER - New Ideas and Emerging Results Dehui Du East China Normal University, Bo Li East China Normal University, Chenghang Zheng East China Normal University |
11:00 - 12:30 | |||
11:00 5mDay opening | SCORE 2023 Introduction SCORE 2023 | ||
11:05 15mTalk | DSEC: A Data Analyzer tool for ensuring secure software development life-cycle SCORE 2023 | ||
11:20 15mTalk | PDFL - PDF Legacy, Smart Paper Reader SCORE 2023 Matteo Visotto Politecnico di Milano, Paolo Corsa , Ettore Zamponi Politecnico di Milano, Salvatore Gabriele Karra Politecnico di Milano, Tonio Ercegović , Nina Gnjidić , Dario Mesic | ||
11:35 15mTalk | CodeDefenders: RoboTournament - CodeBenders team SCORE 2023 | ||
11:50 15mTalk | PrivTAP: Privacy-preserving Trigger-action IoT Platform SCORE 2023 Enna Basic , Michele Benedetti Mälardalen University, Leonardo Panseri Politecnico di Milano, Ivan Radonjic Mälardalen University, Emanuele Santoro Politecnico di Milano, Alessandro Sassi , Lorenzo Maria Vaccarini | ||
12:05 25mMeeting | (Private) SCORE PC meeting SCORE 2023 |
11:00 - 12:30 | |||
11:00 90mDemonstration | SRC Presentations SRC - ACM Student Research Competition |
11:00 - 12:30 | Testing of mobile, web and gamesTechnical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 109 Chair(s): Wei Yang University of Texas at Dallas | ||
11:00 15mTalk | Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing Technical Track Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xing Che Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
11:15 15mTalk | Detecting Dialog-Related Keyboard Navigation Failures in Web Applications Technical Track Paul T. Chiou University of Southern California, Ali S. Alotaibi University of Southern California, William G.J. Halfond University of Southern California | ||
11:30 15mTalk | COLUMBUS: Android App Testing Through Systematic Callback Exploration Technical Track Priyanka Bose University of California, Santa Barbara, Dipanjan Das University of California, Santa Barbara, Saastha Vasan University of California, Santa Barbara, Sebastiano Mariani VMware, Inc., Ilya Grishchenko University of California, Santa Barbara, Andrea Continella University of Twente, Antonio Bianchi Purdue University, Christopher Kruegel University of California, Santa Barbara, Giovanni Vigna UC Santa Barbara | ||
11:45 15mTalk | GameRTS: A Regression Testing Framework for Video Games Technical Track Jiongchi Yu Singapore Management University, Singapore, Yuechen Wu Fuxi AI Lab, Netease Inc., China, Xiaofei Xie Singapore Management University, Wei Le Iowa State University, Lei Ma University of Alberta, Yingfeng Chen Fuxi AI Lab of Netease, Yujing Hu Fuxi AI Lab, Netease Inc., China, Fan Zhang Zhejiang University, China | ||
12:00 15mTalk | Widget Detection-based Testing for Industrial Mobile Games SEIP - Software Engineering in Practice Xiongfei Wu Kyushu University, Jiaming Ye Kyushu University, Ke Chen Fuxi AI Lab of Netease, Xiaofei Xie Singapore Management University, Yujing Hu Fuxi AI Lab, Netease Inc., China, Ruochen Huang University of Alberta, Lei Ma University of Alberta, Jianjun Zhao Kyushu University | ||
12:15 7mTalk | AVGUST: A Tool for Generating Usage-Based Tests from Videos of App Executions DEMO - Demonstrations Saghar Talebipour University of Southern California, Hyojae Park Sharon High School, Kesina Baral George Mason University, Leon Yee Valley Christian High School, Safwat Ali Khan George Mason University, Kevin Moran George Mason University, Yuriy Brun University of Massachusetts, Nenad Medvidović University of Southern California, Yixue Zhao Information Sciences Institute Pre-print Media Attached | ||
12:22 7mTalk | Fragment-Based Test Generation For Web Apps Journal-First Papers Rahulkrishna Yandrapally University of British Columbia, Canada, Ali Mesbah University of British Columbia (UBC) Link to publication Pre-print |
11:00 - 12:30 | FOSE-Testing, Security, AI and ProductivityFoSE - Future of Software Engineering at Meeting Room 110 Chair(s): Hoa Khanh Dam University of Wollongong | ||
11:00 10mTalk | The Future of Software Testing FoSE - Future of Software Engineering Aldeida Aleti Monash University | ||
11:10 10mTalk | The Future of Software Security: Beyond the Security Silo to All of Us FoSE - Future of Software Engineering Laurie Williams North Carolina State University | ||
11:20 10mTalk | Enabling Flow in Software Development FoSE - Future of Software Engineering Gail Murphy University of British Columbia | ||
11:30 10mTalk | How is the rapid progress in Artificial Intelligence affecting the future of Software Engineering? FoSE - Future of Software Engineering Lionel Briand University of Luxembourg; University of Ottawa | ||
11:40 50mPanel | Panel discussion FoSE - Future of Software Engineering |
11:00 - 12:30 | |||
11:00 90mTalk | Conducting Eye Tracking Studies in Software Engineering - Methodology and Pipeline Technical Briefings Bonita Sharif University of Nebraska-Lincoln, USA, Andrew Begel Carnegie Mellon University, Jonathan I. Maletic Kent State University File Attached |
11:00 - 12:30 | |||
11:00 15mTalk | Boosting Static Analysis with Dynamic Runtime Data at WhatsApp Server Industry Forum | ||
11:15 15mTalk | Personalized action suggestions in low-code automation platforms Industry Forum Saksham Gupta Microsoft, Gust Verbruggen Microsoft, Mukul Singh Microsoft, Sumit Gulwani Microsoft, Vu Le Microsoft | ||
11:30 15mTalk | Towards formal repair and verification of industry-scale deep neural networks Industry Forum Satoshi Munakata Fujitsu, Susumu Tokumoto Fujitsu Limited, Koji Yamamoto Fujitsu, Kazuki Munakata Fujitsu | ||
11:45 15mTalk | Challenges and Solution Strategies to Setup an MLOps Process to Develop and Assess a Driverless Regional Train Example Industry Forum | ||
12:00 15mTalk | Automated Feature Document Review via Interpretable Deep Learning Industry Forum yeming ZTE Corporation, Yuanfan Chen ZTE Corporation, Xin Zhang Peking University, Jinning He ZTE, Jicheng Cao ZTE Corporation, Dong Liu ZTE, Shengyu Cheng ZTE Corporation, Jing Gao ZTE Corporation, Hailiang Dai ZTE Corporation |
13:45 - 15:15 | Recommender systemsDEMO - Demonstrations / Technical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Kevin Moran George Mason University | ||
13:45 15mTalk | Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots Technical Track Amir Ghorbani University of Victoria, Nathan Cassee Eindhoven University of Technology, Derek Robinson University of Victoria, Adam Alami Aalborg University, Neil Ernst University of Victoria, Alexander Serebrenik Eindhoven University of Technology, Andrzej Wąsowski IT University of Copenhagen, Denmark Pre-print | ||
14:00 15mTalk | Flexible and Optimal Dependency Management via Max-SMT Technical Track Donald Pinckney Northeastern University, Federico Cassano Northeastern University, Arjun Guha Northeastern University and Roblox Research, Jonathan Bell Northeastern University, Massimiliano Culpo np-complete, S.r.l., Todd Gamblin Lawrence Livermore National Laboratory Pre-print | ||
14:15 15mTalk | Towards More Effective AI-assisted Programming: A Systematic Design Exploration to Improve Visual Studio IntelliCode's User Experience SEIP - Software Engineering in Practice Priyan Vaithilingam Harvard University, Elena Glassman Harvard University, Peter Groenwegen , Sumit Gulwani Microsoft, Austin Z. Henley Microsoft, Rohan Malpani , David Pugh , Arjun Radhakrishna Microsoft, Gustavo Soares Microsoft, Joey Wang , Aaron Yim | ||
14:30 7mTalk | DeepLog: Deep-Learning-Based Log Recommendation DEMO - Demonstrations Yang Zhang Hebei University of Science and Technology, Xiaosong Chang Hebei University of Science and Technology, Lining Fang Hebei University of Science and Technology, Yifan Lu Hebei University of Science and Technology | ||
14:37 7mTalk | ShellFusion: An Answer Generator for Shell Programming Tasks via Knowledge Fusion DEMO - Demonstrations Zhongqi Chen School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Pengyue Si School of Software Engineering, Sun Yat-sen University, ChenQinde School of Software Engineering, Sun Yat-sen University, Chao Liu Chongqing University, Zibin Zheng School of Software Engineering, Sun Yat-sen University | ||
14:45 7mTalk | Revisiting, Benchmarking and Exploring API Recommendation: How Far are We? Journal-First Papers Yun Peng Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong | ||
14:52 7mTalk | Semantically-enhanced Topic Recommendation Systems for Software Projects Journal-First Papers Maliheh Izadi Delft University of Technology, Mahtab Nejati University of Waterloo, Abbas Heydarnoori Bowling Green State University | ||
15:00 7mTalk | Code Librarian: A Software Package Recommendation System SEIP - Software Engineering in Practice Lili Tao JP Morgan Chase & Co, Alexandru-Petre Cazan JP Morgan Chase & Co, Senad Ibraimoski JP Morgan Chase & Co, Sean Moran JP Morgan Chase & Co |
13:45 - 15:15 | Diversity and inclusion in SESEIS - Software Engineering in Society at Meeting Room 101 Chair(s): Xiao Liu School of Information Technology, Deakin University | ||
13:45 15mPaper | At the Margins: Marginalized Groups' Ethical Concerns about Software SEIS - Software Engineering in Society Lauren Olson Vrije Universiteit Amsterdam, Emitzá Guzmán Vrije Universiteit Amsterdam, Florian Kunneman Vrije Universiteit Amsterdam Pre-print File Attached | ||
14:00 15mPaper | Do Users Act Equitably? Understanding User Bias Through a Large In-Person Study SEIS - Software Engineering in Society Yang Liu Rochester Institute of Technology, Heather Moses Rochester Institute of Technology, Mark Sternefeld Rochester Institute of Technology, Samuel Malachowsky Rochester Institute of Technology, Daniel Krutz Rochester Institute of Technology | ||
14:15 15mPaper | Developing Software for Diverse Socio-Economic End Users: Lessons Learned from A Case Study of Fisherfolk Communities in Bangladesh SEIS - Software Engineering in Society Tanjila Kanij Monash University, Misita Anwar Monash University, Gillian Oliver Monash University, Md Khalid Hossain Monash Universit | ||
14:30 15mFull-paper | Walking Down the Road to Independent Mobility: An Adaptive Route Training System for the Cognitively Impaired SEIS - Software Engineering in Society Konstantin Rink Bielefeld University of Applied Sciences, Tristan Gruschka Bielefeld University of Applied Sciences, Patrick Palsbröker Bielefeld University of Applied Sciences, Marcos Baez Bielefeld University of Applied Sciences, Dominic Becking Bielefeld University of Applied Sciences, Udo Seelmeyer Bielefeld University of Applied Sciences, Gudrun Dobslaw Bielefeld University of Applied Sciences, Patricia Stolz Bielefeld University of Applied Sciences and Arts | ||
14:45 15mPaper | Diversity Awareness in Software Engineering Participant Research SEIS - Software Engineering in Society Riya Dutta Concordia University, Diego Costa Concordia University, Canada, Emad Shihab Concordia Univeristy, Tanja Tajmel Concordia University Pre-print | ||
15:00 7mVision and Emerging Results | Harmful Terms in Computing: Towards Widespread Detection and Correction SEIS - Software Engineering in Society Hana Winchester Saint Ursula Academy, Alicia Boyd New York University, Brittany Johnson George Mason University |
13:45 - 15:15 | Program repair with and for AITechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102 Chair(s): Julia Rubin University of British Columbia, Canada | ||
13:45 15mTalk | Impact of Code Language Models on Automated Program Repair Technical Track Nan Jiang Purdue University, Kevin Liu Lynbrook High School, Thibaud Lutellier University of Alberta, Lin Tan Purdue University Pre-print | ||
14:00 15mTalk | Tare: Type-Aware Neural Program Repair Technical Track Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Wenjie Zhang Peking University, Yingfei Xiong Peking University, Lu Zhang Peking University | ||
14:15 15mTalk | Template-based Neural Program Repair Technical Track Xiangxin Meng Beihang University, Beijing, China, Xu Wang Beihang University, Hongyu Zhang The University of Newcastle, Hailong Sun School of Computer Science and Engineering, Beihang University, Beijing,China, Xudong Liu Beihang University, Chunming Hu Beihang University Pre-print | ||
14:30 15mTalk | Automated Repair of Programs from Large Language Models Technical Track Zhiyu Fan National University of Singapore, Singapore, Xiang Gao Beihang University, China, Martin Mirchev National University of Singapore, Abhik Roychoudhury National University of Singapore, Shin Hwei Tan Southern University of Science and Technology | ||
14:45 15mTalk | Automated Program Repair in the Era of Large Pre-trained Language Models Technical Track Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yuxiang Wei University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign | ||
15:00 7mTalk | AIREPAIR: A Repair Platform for Neural Networks DEMO - Demonstrations Xidan Song Department of Computer Science, University of Manchester, UK, Youcheng Sun The University of Manchester, Mustafa A. Mustafa Department of Computer Science, University of Manchester, UK, imec-COSIC, KU Leuven, Belgium, Lucas C. Cordeiro University of Manchester | ||
15:07 7mTalk | Arachne: Search Based Repair of Deep Neural Networks Journal-First Papers Link to publication DOI Pre-print |
13:45 - 15:15 | Programming languagesDEMO - Demonstrations / Technical Track / Journal-First Papers / SEET - Software Engineering Education and Training at Meeting Room 103 Chair(s): Jean-Guy Schneider Monash University | ||
13:45 15mTalk | Demystifying Issues, Challenges, and Solutions for Multilingual Software Development Technical Track Haoran Yang Washington State University, Weile Lian Washington State University, Shaowei Wang University of Manitoba, Haipeng Cai Washington State University Pre-print | ||
14:00 15mTalk | Testability Refactoring in Pull Requests: Patterns and Trends Technical Track Pre-print | ||
14:15 15mTalk | Usability-Oriented Design of Liquid Types for Java Technical Track Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon DOI | ||
14:30 15mTalk | A Theorem Proving Approach to Programming Language Semantics SEET - Software Engineering Education and Training Subhajit Roy IIT Kanpur | ||
14:45 7mTalk | RIdiom: Automatically Refactoring Non-idiomatic Python Code with Pythonic Idioms DEMO - Demonstrations zejun zhang Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 | ||
14:52 7mTalk | An Empirical Study of Data Constraint Implementations in Java Journal-First Papers Juan Manuel Florez CQSE America, Laura Moreno CQSE America, Zenong Zhang The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas, Andrian Marcus University of Texas at Dallas | ||
14:59 7mTalk | Learning To Predict User-Defined Types Journal-First Papers Kevin Jesse University of California at Davis, USA, Prem Devanbu University of California at Davis, Anand Ashok Sawant University of California, Davis |
13:45 - 15:15 | AI bias and fairnessDEMO - Demonstrations / Technical Track / Journal-First Papers at Meeting Room 104 Chair(s): Amel Bennaceur The Open University, UK | ||
13:45 15mTalk | Towards Understanding Fairness and its Composition in Ensemble Machine Learning Technical Track Usman Gohar Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University Pre-print | ||
14:00 15mTalk | Fairify: Fairness Verification of Neural Networks Technical Track Pre-print | ||
14:15 15mTalk | Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models Technical Track Jiri Gesi University of California, Irvine, Xinyun Shen University of California, Irvine, Yunfan Geng University of California, Irvine, Qihong Chen University of California, Irvine, Iftekhar Ahmed University of California at Irvine | ||
14:30 15mTalk | Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks Technical Track Verya Monjezi University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder, Gang (Gary) Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso Pre-print | ||
14:45 7mTalk | Seldonian Toolkit: Building Software with Safe and Fair Machine Learning DEMO - Demonstrations Austin Hoag Berkeley Existential Risk Initiative, James E. Kostas University of Massachusetts, Bruno Castro da Silva University of Massachusetts, Philip S. Thomas University of Massachusetts, Yuriy Brun University of Massachusetts Pre-print Media Attached | ||
14:52 7mTalk | What Would You do? An Ethical AI Quiz DEMO - Demonstrations Wei Teo Monash University, Ze Teoh Monash University, Dayang Abang Arabi Monash University, Morad Aboushadi Monash University, Khairenn Lai Monash University, Zhe Ng Monash University, Aastha Pant Monash Univeristy, Rashina Hoda Monash University, Kla Tantithamthavorn Monash University, Burak Turhan University of Oulu Pre-print Media Attached | ||
15:00 7mTalk | Search-Based Fairness Testing for Regression-Based Machine Learning Systems Journal-First Papers Anjana Perera Oracle Labs, Australia, Aldeida Aleti Monash University, Kla Tantithamthavorn Monash University, Jirayus Jiarpakdee Monash University, Australia, Burak Turhan University of Oulu, Lisa Kuhn Monash University, Katie Walker Monash University Link to publication DOI | ||
15:07 7mTalk | FairMask: Better Fairness via Model-based Rebalancing of Protected Attributes Journal-First Papers Kewen Peng North Carolina State University, Tim Menzies North Carolina State University, Joymallya Chakraborty North Carolina State University Link to publication Pre-print |
13:45 - 15:15 | Requirements engineeringDEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Showcase / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 105 Chair(s): Luciano Baresi Politecnico di Milano | ||
13:45 15mTalk | Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps Technical Track Kaifa ZHAO The Hong Kong Polytechnic University, Xian Zhan The Hong Kong Polytechnic University, Le Yu The Hong Kong Polytechnic University, Shiyao Zhou The Hong Kong Polytechnic University, Hao Zhou Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China, Xiapu Luo The Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology Pre-print | ||
14:00 15mTalk | Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation Technical Track Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:15 15mTalk | DocToModel: Automated Authoring of Models from Diverse Requirements Specification Documents SEIP - Software Engineering in Practice Asha Rajbhoj TCS Research, Padmalata Nistala TCS Research, Vinay Kulkarni Tata Consultancy Services Research, Shivani Soni TCS Research, Ajim Pathan TCS Research | ||
14:30 15mTalk | Environment-Driven Abstraction Identification for Requirements-Based Testing Showcase Zedong Peng , Prachi Rathod , Nan Niu University of Cincinnati, Tanmay Bhowmik Mississippi State University, Hui Liu Beijing Institute of Technology, Lin Shi ISCAS, Zhi Jin Peking University | ||
14:45 7mTalk | A Web-Based Tool for Using Storyboard of Android Apps DEMO - Demonstrations | ||
14:52 7mTalk | InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation DEMO - Demonstrations Shuanglong Chang Northeast Petroleum University, Juntao Gao Northeast Petroleum University, Yilong Yang Beihang University | ||
15:00 7mTalk | A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management Journal-First Papers James Tizard University of Auckland, Peter Devine The University of Auckland, Hechen Wang University of Auckland, Kelly Blincoe University of Auckland | ||
15:07 7mTalk | Towards Human-Centred Crowd Computing: Software for Better Use of Computational Resources NIER - New Ideas and Emerging Results Niroshinie Fernando Deakin University, Chetan Arora Monash University, Seng W.Loke Deakin University, Lubna Alam Deakin University, Stephen La Macchia Deakin University, Helen Graesser Deakin University Pre-print |
13:45 - 15:15 | SE for security 2Technical Track / Journal-First Papers at Meeting Room 106 Chair(s): Cristian Cadar Imperial College London, UK | ||
13:45 15mTalk | SLR: From Saltzer & Schoeder to 2021… Journal-First Papers Nikhil Patnaik University of Bristol, Andrew C Dwyer University of Durham, Joseph Hallett , Awais Rashid University of Bristol, UK | ||
14:00 15mTalk | On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN) Technical Track Viktoria Koscinski Rochester Institute of Technology, Sara Hashemi Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology | ||
14:15 15mTalk | Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon Technical Track Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital Pre-print | ||
14:30 15mTalk | What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? Technical Track Setu Kumar Basak North Carolina State University, Lorenzo Neil North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University Pre-print | ||
14:45 15mTalk | Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX Technical Track Xinyuan Miao Shanghai Jiao Tong University, Ziyi Lin Alibaba Group, Shaojun Wang Alibaba Group, Lei Yu Alibaba Group, Sanhong Li Alibaba Inc., Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, He Jiang Dalian University of Technology Pre-print | ||
15:00 15mTalk | Keyword Extraction From Specification Documents for Planning Security Mechanisms Technical Track Jeffy Jahfar Poozhithara Apple Inc. and University of Washington Bothell, Hazeline Asuncion University of Washington Bothell, Brent Lagesse University of Washington Bothell Pre-print |
13:45 - 15:15 | Software EvolutionTechnical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 109 Chair(s): Sebastiano Panichella Zurich University of Applied Sciences | ||
13:45 15mTalk | Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization Technical Track Wuxia Jin Xi'an Jiaotong University, Yitong Dai Xi'an Jiaotong University, Jianguo Zheng Xi'an Jiaotong University, Yu Qu UC Riverside, Ming Fan Xi'an Jiaotong University, Zhenyu Huang Honor Device Co., Ltd., Dezhi Huang Honor Device Co., Ltd., Ting Liu Xi'an Jiaotong University | ||
14:00 15mTalk | SEIP: Investigating a NASA Cyclomatic Complexity Policy on Maintenance Risk of a Critical System SEIP - Software Engineering in Practice Daniel Port University of Hawai‘i at Mānoa, Bill Taber , LiGuo Huang Dept. of Computer Science, Southern Methodist University, Dallas, TX, 75205 | ||
14:15 15mTalk | Aegis: Attribution of Control Plane Change Impact across Layers and Components for Cloud Systems SEIP - Software Engineering in Practice Xiaohan Yan Microsoft Azure, Ken Hsieh , Yasitha Liyanage , Minghua Ma Microsoft Research, Murali Chintalapati Microsoft Azure, Qingwei Lin Microsoft Research, Yingnong Dang Microsoft Azure, Dongmei Zhang Microsoft Research | ||
14:30 15mTalk | An Empirical Study on Change-induced Incidents at Ant Group SEIP - Software Engineering in Practice Yifan Wu Peking University, Bingxu Chai , Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Jianguo Li Ant Group, Yong Yang , Wei Jiang | ||
14:45 15mTalk | Fulfilling Industrial Needs for Consistency Among Engineering Artifacts SEIP - Software Engineering in Practice Luciano Marchezan Johannes Kepler University Linz, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Edvin Herac , Felix Keplinger Johannes Kepler University, Linz, Alexander Egyed Johannes Kepler University Linz, Christophe Lauwerys | ||
15:00 7mTalk | The Co-evolution of the WordPress Platform and its Plugins Journal-First Papers Jiahuei Lin Queen’s University Software Analysis and Intelligence Lab (SAIL), Canada, Mohammed Sayagh ETS Montreal, University of Quebec, Ahmed E. Hassan Queen’s University | ||
15:07 7mTalk | Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery Journal-First Papers Chenguang Zhu Meta, Mengshi Zhang Meta, Xiuheng Wu Nanyang Technological University, Singapore, Xiufeng Xu Nanyang Technological University, Yi Li Nanyang Technological University Link to publication DOI Pre-print |
13:45 - 15:15 | Test quality and improvementTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 110 Chair(s): Guowei Yang University of Queensland | ||
13:45 15mTalk | Test Selection for Unified Regression Testing Technical Track Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign Pre-print | ||
14:00 15mTalk | ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search Technical Track Rongqi Pan University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa | ||
14:15 15mTalk | Measuring and Mitigating Gaps in Structural Testing Technical Track Soneya Binta Hossain University of Virginia, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Anh Nguyen-Tuong University of Virginia Pre-print | ||
14:30 7mTalk | FlaPy: Mining Flaky Python Tests at Scale DEMO - Demonstrations Pre-print | ||
14:37 7mTalk | Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts Journal-First Papers Ahmadreza Saboor Yaraghi University of Ottawa, Mojtaba Bagherzadeh University of Ottawa, Nafiseh Kahani University of Carlton, Lionel Briand University of Luxembourg; University of Ottawa | ||
14:45 7mTalk | Flakify: A Black-Box, Language Model-based Predictor for Flaky Tests Journal-First Papers Sakina Fatima University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa | ||
14:52 7mTalk | Developer-centric test amplification Journal-First Papers Pre-print | ||
15:00 7mTalk | How Developers Engineer Test Cases: An Observational Study Journal-First Papers Maurício Aniche Delft University of Technology, Christoph Treude University of Melbourne, Andy Zaidman Delft University of Technology Pre-print |
13:45 - 15:15 | |||
13:45 90mTalk | Conducting Eye Tracking Studies in Software Engineering - Methodology and Pipeline Technical Briefings Bonita Sharif University of Nebraska-Lincoln, USA, Andrew Begel Carnegie Mellon University, Jonathan I. Maletic Kent State University File Attached |
Fri 19 MayDisplayed time zone: Hobart change
10:30 - 11:00 | |||
10:30 30mTalk | CryptOpt: Automatic Optimization of Straightline Code DEMO - Demonstrations Joel Kuepper University of Adelaide, Andres Erbsen MIT, Jason Gross MIT CSAIL, Owen Conoly MIT, Chuyue Sun Stanford, Samuel Tian MIT, David Wu University of Adelaide, Adam Chlipala Massachusetts Institute of Technology, Chitchanok Chuengsatiansup University of Adelaide, Daniel Genkin Georgia Tech, Markus Wagner Monash University, Australia, Yuval Yarom Ruhr University Bochum Link to publication |
10:30 - 11:00 | |||
10:30 30mTalk | TSVD4J: Thread-Safety Violation Detection for Java DEMO - Demonstrations Shanto Rahman University of Texas at Austin, Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin |
11:00 - 12:30 | Runtime analysis and self-adaptationTechnical Track / NIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Domenico Bianculli University of Luxembourg | ||
11:00 15mTalk | Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention Technical Track Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:15 15mTalk | Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models Technical Track Toufique Ahmed University of California at Davis, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Thomas Zimmermann Microsoft Research, Xuchao Zhang Microsoft, Saravanakumar Rajmohan Microsoft 365 Pre-print | ||
11:30 15mTalk | Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data Technical Track Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:45 15mTalk | LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly Technical Track Guangba Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Pairui Li Tencent Inc., Tianjun Weng Tencent Inc., Haibing Zheng Tencent, Yuetang Deng Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University Pre-print | ||
12:00 15mTalk | TraceArk: Towards Actionable Performance Anomaly Alerting for Online Service Systems SEIP - Software Engineering in Practice Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Bo Qiao Microsoft Research, Wentao Zou , Qingjun Chen , Meng Zhang , Xu Zhang Microsoft Research, Hongyu Zhang The University of Newcastle, Xuedong Gao , Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research | ||
12:15 7mTalk | ActivFORMS: A Formally-Founded Model-Based Approach to Engineer Self-Adaptive Systems Journal-First Papers | ||
12:22 7mTalk | Auto-Logging: AI-centred Logging Instrumentation NIER - New Ideas and Emerging Results Pre-print |
11:00 - 12:30 | AI testing 2Technical Track / Journal-First Papers at Meeting Room 101 Chair(s): Gunel Jahangirova USI Lugano, Switzerland | ||
11:00 15mTalk | Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation Technical Track Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg Pre-print | ||
11:15 15mTalk | Testing the Plasticity of Reinforcement Learning Based Systems Journal-First Papers Link to publication DOI Pre-print | ||
11:30 15mTalk | CC: Causality-Aware Coverage Criterion for Deep Neural Networks Technical Track Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology | ||
11:45 15mTalk | Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests Technical Track Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Saikat Dutta University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign | ||
12:00 15mTalk | Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems Technical Track Fitash ul haq , Donghwan Shin The University of Sheffield, Lionel Briand University of Luxembourg; University of Ottawa Pre-print | ||
12:15 15mTalk | Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects Technical Track Linyi Li University of Illinois at Urbana-Champaign, Yuhao Zhang University of Wisconsin-Madison, Luyao Ren Peking University, China, Yingfei Xiong Peking University, Tao Xie Peking University Pre-print |
11:00 - 12:30 | Developers' forumsSEIP - Software Engineering in Practice / Journal-First Papers / Technical Track / DEMO - Demonstrations at Meeting Room 102 Chair(s): Omar Haggag Monash University, Australia | ||
11:00 15mTalk | Automatic prediction of rejected edits in Stack Overflow Journal-First Papers Saikat Mondal University of Saskatchewan, Gias Uddin University of Calgary, Canada, Chanchal K. Roy University of Saskatchewan Link to publication DOI Pre-print | ||
11:15 15mTalk | Automated Summarization of Stack Overflow Posts Technical Track Bonan Kou Purdue University, Muhao Chen University of Southern California, Tianyi Zhang Purdue University | ||
11:30 15mTalk | Semi-Automatic, Inline and Collaborative Web Page Code Curations Technical Track Roy Rutishauser University of Zurich, André N. Meyer University of Zurich, Reid Holmes University of British Columbia, Thomas Fritz University of Zurich | ||
11:45 15mTalk | You Don’t Know Search: Helping Users Find Code by Automatically Evaluating Alternative Queries SEIP - Software Engineering in Practice Rijnard van Tonder Sourcegraph | ||
12:00 7mTalk | TECHSUMBOT: A Stack Overflow Answer Summarization Tool for Technical Query DEMO - Demonstrations Chengran Yang Singapore Management University, Bowen Xu Singapore Management University, Jiakun Liu Singapore Management University, David Lo Singapore Management University | ||
12:07 8mTalk | An empirical study of question discussions on Stack Overflow Journal-First Papers Wenhan Zhu University of Waterloo, Haoxiang Zhang Centre for Software Excellence at Huawei Canada, Ahmed E. Hassan Queen’s University, Michael W. Godfrey University of Waterloo, Canada | ||
12:15 15mTalk | Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence Technical Track zejun zhang Australian National University, Zhenchang Xing , Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61 |
11:00 - 12:30 | Program comprehensionTechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Oscar Chaparro College of William and Mary | ||
11:00 15mTalk | Code Comprehension Confounders: A Study of Intelligence and Personality Journal-First Papers Link to publication Pre-print | ||
11:15 15mTalk | Identifying Key Classes for Initial Software Comprehension: Can We Do It Better? Technical Track Weifeng Pan Zhejiang Gongshang University, China, Xin Du Zhejiang Gongshang University, China, Hua Ming Oakland University, Dae-Kyoo Kim Oakland University, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc | ||
11:30 15mTalk | Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods Technical Track Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University Pre-print | ||
11:45 15mTalk | Evidence Profiles for Validity Threats in Program Comprehension Experiments Technical Track Marvin Muñoz Barón University of Stuttgart, Marvin Wyrich Saarland University, Daniel Graziotin University of Stuttgart, Stefan Wagner University of Stuttgart Pre-print | ||
12:00 15mTalk | Developers’ Visuo-spatial Mental Model and Program Comprehension Technical Track Pre-print | ||
12:15 15mTalk | Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension Technical Track Shuzheng Gao Harbin institute of technology, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology, Jun Sun Singapore Management University, David Lo Singapore Management University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China |
11:00 - 12:30 | Reverse engineeringTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 104 Chair(s): Wei Le Iowa State University | ||
11:00 15mTalk | SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics Technical Track Dehai Zhao Australian National University, Australia, Zhenchang Xing , Xin Xia Huawei, Deheng Ye Tencent AI Lab, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 | ||
11:15 15mTalk | AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces Technical Track S M Hasan Mansur George Mason University, Sabiha Salma George Mason University, Damilola Awofisayo Duke University, Kevin Moran George Mason University | ||
11:30 15mTalk | Carving UI Tests to Generate API Tests and API Specification Technical Track Rahulkrishna Yandrapally University of British Columbia, Canada, Saurabh Sinha IBM Research, Rachel Tzoref-Brill IBM Research, Ali Mesbah University of British Columbia (UBC) Pre-print | ||
11:45 15mTalk | CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering SEIP - Software Engineering in Practice Shih-Yuan Yu UCI, Yonatan Achamyeleh UCI, Chonghan Wang UCI, Anton Kocheturov Siemens Technology, Patrick Eisen Siemens Technology, Mohammad Al Faruque UCI | ||
12:00 15mTalk | Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network Technical Track Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuhui Su Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
12:15 7mTalk | VID2XML: Automatic Extraction of a Complete XML Data from Mobile Programming Screencasts Journal-First Papers Mohammad D. Alahmadi Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia. |
11:00 - 12:30 | Static analysisTechnical Track / SEET - Software Engineering Education and Training / SEIP - Software Engineering in Practice at Meeting Room 106 Chair(s): Marsha Chechik University of Toronto | ||
11:00 15mTalk | DLInfer: Deep Learning with Static Slicing for Python Type Inference Technical Track Yanyan Yan Nanjing University, Yang Feng Nanjing University, Hongcheng Fan Nanjing University, Baowen Xu Nanjing University | ||
11:15 15mTalk | ViolationTracker: Building Precise Histories for Static Analysis Violations Technical Track Ping Yu Fudan University, China, Yijian Wu Fudan University, Xin Peng Fudan University, Jiahan Peng Fudan University, Jian Zhang Fudan University, Peicheng Xie Fudan University, Wenyun Zhao Fudan University, China Pre-print | ||
11:30 15mTalk | On the use of static analysis to engage students with software quality improvement: An experience with PMD SEET - Software Engineering Education and Training Eman Abdullah AlOmar Stevens Institute of Technology, Salma Abdullah AlOmar NA, Mohamed Wiem Mkaouer Rochester Institute of Technology Pre-print | ||
11:45 15mTalk | Long-term Static Analysis Rule Quality Monitoring Using True Negatives SEIP - Software Engineering in Practice Linghui Luo Amazon Web Services, Rajdeep Mukherjee Amazon Web Services, Omer Tripp Amazon, Martin Schäf Amazon Web Services, Qiang Zhou Amazon Web Services, Daniel J Sanchez Amazon Alexa | ||
12:00 15mTalk | A Language-agnostic Framework for Mining Static Analysis Rules from Code Changes SEIP - Software Engineering in Practice David Baker Effendi Stellenbosch University, Berk Cirisci IRIF, University Paris Diderot and CNRS, France, Rajdeep Mukherjee Amazon Web Services, Hoan Anh Nguyen Amazon, Omer Tripp Amazon | ||
12:15 7mTalk | GradeStyle: GitHub-Integrated and Automated Assessment of Java Code Style SEET - Software Engineering Education and Training Callum Iddon University of Auckland, Nasser Giacaman The University of Auckland, Valerio Terragni University of Auckland | ||
12:22 7mTalk | The Challenges of Shift Left Static Analysis SEIP - Software Engineering in Practice Quoc-Sang Phan Facebook, Inc., KimHao Nguyen University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University |
11:00 - 12:30 | Testing of database and low-level softwareTechnical Track / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Journal-First Papers at Meeting Room 109 Chair(s): Michael Pradel University of Stuttgart | ||
11:00 15mTalk | Compiler Test-Program Generation via Memoized Configuration Search Technical Track Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Peiqi Chen College of Intelligence and Computing, Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University | ||
11:15 15mTalk | Generating Test Databases for Database-Backed Applications Technical Track | ||
11:30 15mTalk | Testing Database Engines via Query Plan Guidance Technical Track Pre-print | ||
11:45 15mTalk | Testing Database Systems via Differential Query Execution Technical Track Jiansen Song , Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
12:00 15mTalk | Achieving Last-Mile Functional Coverage in Testing Chip Design Software Implementations SEIP - Software Engineering in Practice Ming Yan College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Hangyu Mao , Jiajun Jiang Tianjin University, Jianye Hao Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University, Zhao Tian Tianjin University, Zhichao Chen , Dong Li , Dong Li , Yanwei Guo , Wulong Liu , Bin Wang , Yuefeng Sun , Yongshun Cui | ||
12:15 7mTalk | Randomized Differential Testing of RDF Stores DEMO - Demonstrations Rui Yang Institute of Software, Chinese Academy of Sciences, Yingying Zheng Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School Pre-print | ||
12:22 7mTalk | Boosting Compiler Testing via Compiler Optimization Exploration Journal-First Papers Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University |
11:00 - 12:30 | FOSE-Human & Tools, Ethics and QuantumFoSE - Future of Software Engineering at Meeting Room 110 Chair(s): Hourieh Khalajzadeh Deakin University, Australia | ||
11:00 10mTalk | Software Engineering for Big Data and Hardware Heterogeneity FoSE - Future of Software Engineering Miryung Kim University of California at Los Angeles, USA File Attached | ||
11:10 10mTalk | Got ethics? FoSE - Future of Software Engineering Tim Menzies North Carolina State University Pre-print | ||
11:20 10mTalk | The path to quantum at scale FoSE - Future of Software Engineering | ||
11:30 10mTalk | The Software Revolution of Obfuscation FoSE - Future of Software Engineering Myra Cohen Iowa State University | ||
11:40 50mPanel | Panel discussion FoSE - Future of Software Engineering |
11:00 - 12:30 | |||
11:00 90mTalk | The Landscape of Source Code Representation Learning in AI-Driven Software Engineering Tasks Technical Briefings Sridhar Chimalakonda IIT Tirupati, Debeshee Das Indian Institute of Technology Tirupati, Alex Mathai IBM India Research Labs, Srikanth Tamilselvam IBM Research, Atul Kumar IBM India Research Labs |
13:45 - 15:15 | Software performanceDEMO - Demonstrations / NIER - New Ideas and Emerging Results / Technical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1 Chair(s): Philipp Leitner Chalmers University of Technology, Sweden / University of Gothenburg, Sweden | ||
13:45 15mTalk | Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems Technical Track Stefan Mühlbauer Leipzig University, Florian Sattler Saarland Informatics Campus, Saarland University, Christian Kaltenecker Saarland University, Germany, Johannes Dorn Leipzig University, Sven Apel Saarland University, Norbert Siegmund Leipzig University Pre-print | ||
14:00 15mTalk | Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software Technical Track Max Weber Leipzig University, Christian Kaltenecker Saarland University, Germany, Florian Sattler Saarland Informatics Campus, Saarland University, Sven Apel Saarland University, Norbert Siegmund Leipzig University Link to publication | ||
14:15 15mTalk | Auto-tuning elastic applications in production SEIP - Software Engineering in Practice Adalberto R. Sampaio Jr Huawei Canada, Ivan Beschastnikh University of British Columbia, Daryl Maier IBM Canada, Don Bourne IBM Canada, Vijay Sundaresan IBM Canada | ||
14:30 7mTalk | CryptOpt: Automatic Optimization of Straightline Code DEMO - Demonstrations Joel Kuepper University of Adelaide, Andres Erbsen MIT, Jason Gross MIT CSAIL, Owen Conoly MIT, Chuyue Sun Stanford, Samuel Tian MIT, David Wu University of Adelaide, Adam Chlipala Massachusetts Institute of Technology, Chitchanok Chuengsatiansup University of Adelaide, Daniel Genkin Georgia Tech, Markus Wagner Monash University, Australia, Yuval Yarom Ruhr University Bochum Link to publication | ||
14:37 7mTalk | Performance Analysis with Bayesian Inference NIER - New Ideas and Emerging Results Noric Couderc Lund University, Christoph Reichenbach Lund University, Emma Söderberg Lund University | ||
14:45 15mTalk | Runtime Performance Prediction for Deep Learning Models with Graph Neural Network SEIP - Software Engineering in Practice Yanjie Gao Microsoft Research, Xianyu Gu Tsinghua University, Hongyu Zhang The University of Newcastle, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research Pre-print | ||
15:00 7mTalk | Judging Adam: Studying the Performance of Optimization Methods on ML4SE Tasks NIER - New Ideas and Emerging Results Dmitry Pasechnyuk Mohammed bin Zayed University of Artificial Intelligence, UAE, Anton Prazdnichnykh , Mikhail Evtikhiev JetBrains Research, Timofey Bryksin JetBrains Research | ||
15:07 7mTalk | Who Ate My Memory? Towards Attribution in Memory Management SEIP - Software Engineering in Practice Gunnar Kudrjavets University of Groningen, Ayushi Rastogi University of Groningen, The Netherlands, Jeff Thomas Meta Platforms, Inc., Nachiappan Nagappan Facebook Pre-print |
13:45 - 15:15 | Code generationJournal-First Papers / Technical Track at Meeting Room 101 Chair(s): Iftekhar Ahmed University of California at Irvine | ||
13:45 15mTalk | Learning Deep Semantics for Test Completion Technical Track Pengyu Nie University of Texas at Austin, Rahul Banerjee The University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Raymond Mooney The University of Texas at Austin, Milos Gligoric University of Texas at Austin | ||
14:00 15mTalk | Dynamic Human-in-the-Loop Assertion Generation Journal-First Papers Lucas Zamprogno University of British Columbia, Braxton Hall University of British Columbia, Reid Holmes University of British Columbia, Joanne M. Atlee University of Waterloo | ||
14:15 15mTalk | SkCoder: A Sketch-based Approach for Automatic Code Generation Technical Track Jia Li Peking University, Yongmin Li Peking University, Ge Li Peking University, Zhi Jin Peking University, Xing Hu Zhejiang University Pre-print | ||
14:30 15mTalk | An Empirical Comparison of Pre-Trained Models of Source Code Technical Track Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Dongxiao Chen Software Institute, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University Pre-print | ||
14:45 15mTalk | On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot Technical Track Antonio Mastropaolo Università della Svizzera italiana, Luca Pascarella ETH Zurich, Emanuela Guglielmi University of Molise, Matteo Ciniselli Università della Svizzera Italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana | ||
15:00 15mTalk | Source Code Recommender Systems: The Practitioners' Perspective Technical Track Matteo Ciniselli Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Emad Aghajani Software Institute, USI Università della Svizzera italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana |
13:45 - 15:15 | Cyber-physical systems developmentSEIP - Software Engineering in Practice / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102 Chair(s): Andrzej Wąsowski IT University of Copenhagen, Denmark | ||
13:45 15mTalk | Hybrid Cloudification of Legacy Software for Efficient Simulation of Gas Turbine Designs SEIP - Software Engineering in Practice Fozail Ahmad McGill University, Maruthi Rangappa , Neeraj Katiyar McGill University, Canada, Martin Staniszewski Siemens Energy, Daniel Varro Linköping University / McGill University | ||
14:00 15mTalk | Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms SEIP - Software Engineering in Practice Pre-print | ||
14:15 7mTalk | WirelessDT: A Digital Twin Platform for Real-Time Evaluation of Wireless Software Applications DEMO - Demonstrations Zhongzheng Lai The University of Sydney, Dong Yuan The University of Sydney, Huaming Chen The University of Sydney, Yu Zhang The University of Sydney, Wei Bao The University of Sydney Media Attached | ||
14:22 7mTalk | MROS: A framework for robot self-adaptation DEMO - Demonstrations Gustavo Rezende Silva Cognitive Robotics, Delft University of Technology, Darko Bozhinoski Université Libre de Bruxelles, Mario Garzon Oviedo Department of Cognitive Robotics, Delft University of Technology, Mariano Ramírez Montero Cognitive Robotics, Delft University of Technology, Nadia Hammoudeh Garcia Fraunhofer IPA, Harshavardhan Deshpande Fraunhofer IPA, Andrzej Wąsowski IT University of Copenhagen, Denmark, Carlos Hernández Corbato Delft University of Technology | ||
14:30 7mTalk | Mind the Gap! A Study on the Transferability of Virtual vs Physical-world Testing of Autonomous Driving Systems Journal-First Papers Andrea Stocco Technical University of Munich & fortiss, Brian Pulfer University of Geneva, Paolo Tonella USI Lugano | ||
14:37 7mTalk | Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data (Journal First Presentation) Journal-First Papers Ferhat Ozgur Catak University of Stavanger, Norway, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory | ||
14:45 7mTalk | Uncertainty-aware Robustness Assessment of Industrial Elevator Systems Journal-First Papers Liping Han Nanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Shaukat Ali Simula Research Laboratory, Tao Yue Simula Research Laboratory, Aitor Arrieta Mondragon University, Maite Arratibel Orona | ||
14:52 7mTalk | Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions Journal-First Papers Chengjie Lu Simula Research Laboratory and University of Oslo, Shi Yize Nanjing University of Aeronautics and Astronautics, Huihui Zhang Weifang University, Man Zhang Kristiania University, Tiexin Wang Nanjing University of Aeronautics and Astronautics, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory Link to publication DOI Pre-print | ||
15:00 7mTalk | FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria Journal-First Papers Zhenya Zhang Kyushu University, Deyun Lyu Kyushu university, Paolo Arcaini National Institute of Informatics
, Lei Ma University of Alberta, Ichiro Hasuo National Institute of Informatics, Japan, Jianjun Zhao Kyushu University Link to publication DOI |
13:45 - 15:15 | Software development toolsDEMO - Demonstrations / Technical Track / SEIP - Software Engineering in Practice / NIER - New Ideas and Emerging Results at Meeting Room 104 Chair(s): Xing Hu Zhejiang University | ||
13:45 15mTalk | Safe low-level code without overhead is practical Technical Track Pre-print | ||
14:00 15mTalk | Sibyl: Improving Software Engineering Tools with SMT Selection Technical Track Will Leeson University of Virgina, Matthew B Dwyer University of Virginia, Antonio Filieri AWS and Imperial College London Pre-print | ||
14:15 15mTalk | Make Your Tools Sparkle with Trust: The PICSE Framework for Trust in Software Tools SEIP - Software Engineering in Practice Brittany Johnson George Mason University, Christian Bird Microsoft Research, Denae Ford Microsoft Research, Nicole Forsgren Microsoft Research, Thomas Zimmermann Microsoft Research Pre-print | ||
14:30 15mTalk | CoCoSoDa: Effective Contrastive Learning for Code Search Technical Track Ensheng Shi Xi'an Jiaotong University, Wenchao Gu The Chinese University of Hong Kong, Yanlin Wang School of Software Engineering, Sun Yat-sen University, Lun Du Microsoft Research Asia, Hongyu Zhang The University of Newcastle, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi'an Jiaotong University Pre-print | ||
14:45 7mTalk | Task Context: A Tool for Predicting Code Context Models for Software Development Tasks DEMO - Demonstrations Yifeng Wang Zhejiang University, Yuhang Lin Zhejiang University, Zhiyuan Wan Zhejiang University, Xiaohu Yang Zhejiang University Pre-print Media Attached | ||
14:52 7mTalk | Continuously Accelerating Research NIER - New Ideas and Emerging Results Sergey Mechtaev University College London, Jonathan Bell Northeastern University, Christopher Steven Timperley Carnegie Mellon University, Earl T. Barr University College London, Michael Hilton Carnegie Mellon University Pre-print | ||
15:00 7mTalk | An Alternative to Cells for Selective Execution of Data Science Pipelines NIER - New Ideas and Emerging Results Pre-print | ||
15:07 7mTalk | pytest-inline: An Inline Testing Tool for Python DEMO - Demonstrations Yu Liu University of Texas at Austin, Zachary Thurston Cornell University, Alan Han Cornell University, Pengyu Nie University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University |
13:45 - 15:15 | Fault injection and mutationJournal-First Papers / NIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track at Meeting Room 105 Chair(s): Lingxiao Jiang Singapore Management University | ||
13:45 15mTalk | Coverage Guided Fault Injection for Cloud Systems Technical Track Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wensheng Dou Institute of Software Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wenhan Feng Institute of Software Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
14:00 15mTalk | Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations Technical Track | ||
14:15 15mTalk | Identifying Defect Injection Risks from Analysis and Design Diagrams: An Industrial Case Study at Sony SEIP - Software Engineering in Practice Yoji Imanishi Sony Global Manufacturing&Operations, Kazuhiro Kumon Sony Global Manufacturing&Operations, Shuji Morisaki Nagoya University | ||
14:30 7mTalk | DaMAT: A Data-driven Mutation Analysis Tool DEMO - Demonstrations Enrico Viganò University of Luxembourg, Oscar Cornejo SnT Centre, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Pre-print | ||
14:37 7mTalk | Mutation testing in the wild: findings from GitHub Journal-First Papers Ana B. Sánchez University of Seville, Pedro Delgado-Pérez Universidad de Cádiz, Inmaculada Medina-Bulo Universidad de Cádiz, Sergio Segura University of Seville Link to publication DOI | ||
14:45 7mTalk | An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing Journal-First Papers Anjana Perera Oracle Labs, Australia, Aldeida Aleti Monash University, Burak Turhan University of Oulu, Marcel Böhme MPI-SP, Germany and Monash University, Australia Link to publication DOI | ||
14:52 7mTalk | Assurance Cases as Data: A Manifesto NIER - New Ideas and Emerging Results Claudio Menghi McMaster University, Canada, Torin Viger , Alessio Di Sandro University of Toronto, Chris Rees Critical Systems Labs, Jeffrey Joyce Critical System Labs Inc., Marsha Chechik University of Toronto | ||
15:00 7mTalk | Predictive Mutation Analysis via Natural Language Channel in Source Code Journal-First Papers Jinhan Kim KAIST, Juyoung Jeon Handong Global University, Shin Hong Handong Global University, Shin Yoo KAIST Link to publication Pre-print |
13:45 - 15:15 | Vulnerability detectionTechnical Track / Journal-First Papers at Meeting Room 106 Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
13:45 15mTalk | An Empirical Study of Deep Learning Models for Vulnerability Detection Technical Track Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University Pre-print | ||
14:00 15mTalk | DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection Technical Track Wenbo Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Yi Li New Jersey Institute of Technology, Jiyuan Zhang University of Illinois Urbana-Champaign, Aashish Yadavally The University of Texas at Dallas Pre-print | ||
14:15 15mTalk | Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model Technical Track Bin Yuan Huazhong University of Science and Technology, Yifan Lu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Zhen Li Huazhong University of Science and Technology, Zhi Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
14:30 15mTalk | Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning Technical Track Xin-Cheng Wen Harbin Institute of Technology, Yupan Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang The University of Newcastle, Jie M. Zhang King's College London, Qing Liao Harbin Institute of Technology | ||
14:45 15mTalk | Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! Technical Track Xu Yang University of Manitoba, Shaowei Wang University of Manitoba, Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology Pre-print | ||
15:00 7mTalk | Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data Journal-First Papers Aayush Garg University of Luxembourg, Luxembourg, Renzo Degiovanni SnT, University of Luxembourg, Matthieu Jimenez SnT, University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg Link to publication DOI Authorizer link Pre-print Media Attached | ||
15:07 7mTalk | Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application Journal-First Papers Sarah Elder North Carolina State University, Nusrat Zahan North Carolina State University, Rui Shu North Carolina State University, Valeri Kozarev North Carolina State University, Tim Menzies North Carolina State University, Laurie Williams North Carolina State University |
13:45 - 15:15 | SE educationSEET - Software Engineering Education and Training at Meeting Room 109 Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
13:45 15mTalk | Persona-based Assessment of Software Engineering Student Research Projects: An Experience Report SEET - Software Engineering Education and Training Chetan Arora Monash University, Laura Tubino Deakin University, Andrew Cain School of Information Technology, Deakin University, Kevin Lee Deakin University, Vasudha Malhotra Deakin University | ||
14:00 15mTalk | Exposing Software Engineering Students to Stressful Projects: Does Diversity Matter? SEET - Software Engineering Education and Training Isabella Graßl University of Passau, Gordon Fraser University of Passau, Stefan Trieflinger Reutlingen University, Marco Kuhrmann Reutlingen University Pre-print | ||
14:15 15mTalk | “Software is the easy part of Software Engineering” - Lessons and Experiences from A Large-Scale, Multi-Team Capstone Course SEET - Software Engineering Education and Training Ze Shi (Zane) Li University of Victoria, Canada, Nowshin Nawar Arony University of Victoria, Kezia Devathasan University of Victoria, Daniela Damian University of Victoria Pre-print | ||
14:30 15mTalk | Attribution-based Personas in Virtual Software Engineering Education SEET - Software Engineering Education and Training Klaudia Madhi School of Computation, Information and Technology, Technical University of Munich, Munich, Germany, Lara Marie Reimer School of Computation, Information and Technology, Technical University of Munich, Munich, Germany; Institute for Digital Medicine, University Hospital Bonn, Bonn, Germany, Stephan M. Jonas Institute for Digital Medicine, University Hospital Bonn, Bonn, Germany | ||
14:45 15mTalk | Leveraging Diversity in Software Engineering Education through Community Engaged Learning and a Supportive Network SEET - Software Engineering Education and Training Nowshin Nawar Arony University of Victoria, Kezia Devathasan University of Victoria, Ze Shi (Zane) Li University of Victoria, Canada, Daniela Damian University of Victoria Pre-print |
13:45 - 15:15 | Issue reporting and reproductionTechnical Track / DEMO - Demonstrations at Meeting Room 110 Chair(s): Daniel Russo Department of Computer Science, Aalborg University | ||
13:45 15mTalk | Incident-aware Duplicate Ticket Aggregation for Cloud Systems Technical Track Jinyang Liu The Chinese University of Hong Kong, Shilin He Microsoft Research, Zhuangbin Chen Chinese University of Hong Kong, China, Liqun Li Microsoft Research, Yu Kang Microsoft Research, Xu Zhang Microsoft Research, Pinjia He Chinese University of Hong Kong at Shenzhen, Hongyu Zhang The University of Newcastle, Qingwei Lin Microsoft Research, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research, Michael Lyu The Chinese University of Hong Kong | ||
14:00 15mTalk | Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction Technical Track Pre-print | ||
14:15 15mTalk | On the Reproducibility of Software Defect Datasets Technical Track | ||
14:30 15mTalk | Context-aware Bug Reproduction for Mobile Apps Technical Track Yuchao Huang , Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Song Wang York University, Chunyang Chen Monash University, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:45 15mTalk | Read It, Don't Watch It: Captioning Bug Recordings Automatically Technical Track Sidong Feng Monash University, Mulong Xie Australian National University, Yinxing Xue University of Science and Technology of China, Chunyang Chen Monash University Pre-print | ||
15:00 7mTalk | BURT: A Chatbot for Interactive Bug Reporting DEMO - Demonstrations Yang Song College of William and Mary, Junayed Mahmud George Mason University, Nadeeshan De Silva William & Mary, Ying Zhou University of Texas at Dallas, Oscar Chaparro College of William and Mary, Kevin Moran George Mason University, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk College of William and Mary |
15:15 - 15:45 | |||
15:45 - 17:15 | SE education methods and toolsTechnical Track / SEET - Software Engineering Education and Training at Meeting Room 101 Chair(s): Andrew Begel Carnegie Mellon University | ||
15:45 15mTalk | On the Applicability of Language Models to Block-Based Programs Technical Track Elisabeth Griebl University of Passau, Benedikt Fein University of Passau, Florian Obermueller University of Passau, Gordon Fraser University of Passau, René Just University of Washington | ||
16:00 15mTalk | Improving Grading Outcomes in Software Engineering Projects Through Automated Contributions Summaries SEET - Software Engineering Education and Training Kai Presler-Marshall Bowdoin College, Sarah Heckman North Carolina State University, Kathryn Stolee North Carolina State University | ||
16:15 15mTalk | Analyzing the Quality of Submissions in Online Programming Courses SEET - Software Engineering Education and Training Maria Tigina JetBrains Research, Anastasiia Birillo JetBrains Research, Yaroslav Golubev JetBrains Research, Hieke Keuning Utrecht University, Nikolay Vyahhi Stepik, Timofey Bryksin JetBrains Research Pre-print | ||
16:30 15mTalk | A Metric for Measuring Software Engineering Post-Graduate Outcomes SEET - Software Engineering Education and Training | ||
16:45 7mTalk | Using Focus to Personalise Learning and Feedback in Software Engineering Education SEET - Software Engineering Education and Training Bansri Amish Modi School of Information Technology, Deakin University, Andrew Cain School of Information Technology, Deakin University, Guy Wood-Bradley Deakin University, Jake Renzella University of New South Wales, Sydney | ||
16:52 7mTalk | Shaping a Tool for Developing Computing Students’ Professional Identity - Industry Perspectives SEET - Software Engineering Education and Training Laura Tubino Deakin University, Kerri Morgan Deakin University, Guy Wood-Bradley Deakin University, Andrew Cain School of Information Technology, Deakin University | ||
17:00 7mTalk | REFERENT: Transformer based Feedback Generation using Assignment Information for Programming Course SEET - Software Engineering Education and Training Jinseok Heo Sungkyunkwan University, Hohyeon Jeong Sungkyunkwan University, Dongwook Choi SungKyunKwan University, Eunseok Lee Sungkyunkwan University | ||
17:07 7mTalk | Factors Affecting Compilable State at Each Keystroke in CS1 SEET - Software Engineering Education and Training Steven Scott Utah State University, Arto Hellas Aalto University, Juho Leinonen The University of Auckland, John Edwards Utah State University |
15:45 - 17:15 | Metamorphic testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers / SEIS - Software Engineering in Society at Meeting Room 102 Chair(s): Shiva Nejati University of Ottawa | ||
15:45 15mTalk | MTTM: Metamorphic Testing for Textual Content Moderation Software Technical Track Wenxuan Wang The Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Yizhan Huang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong at Shenzhen, Michael Lyu The Chinese University of Hong Kong | ||
16:00 15mTalk | Metamorphic Shader Fusion for Testing Graphics Shader Compilers Technical Track Dongwei Xiao The Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology | ||
16:15 15mPaper | Metamorphic Testing and Debugging of Tax Preparation Software SEIS - Software Engineering in Society Saeid Tizpaz-Niari University of Texas at El Paso, Verya Monjezi University of Texas at El Paso, Morgan Wagner University of Texas at El Paso, Shiva Darian University of Colorado Boulder, Krystia Reed University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder Pre-print | ||
16:30 7mTalk | Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems Journal-First Papers Muhammad Hilmi Asyrofi School of Computing and Information Systems, Singapore Management University, Zhou Yang Singapore Management University, Imam Nur Bani Yusuf Singapore Management University, Singapore, Hong Jin Kang UCLA, Ferdian Thung Singapore Management University, David Lo Singapore Management University | ||
16:37 7mTalk | Automated Metamorphic Testing using Transitive Relations for Specializing Stance Detection Models SEIP - Software Engineering in Practice Alisa Arno IBM Research - Tokyo, Futoshi Iwama IBM Research - Tokyo, Mikio Takeuchi IBM Research - Tokyo | ||
16:45 15mTalk | MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform Technical Track Pre-print |
15:45 - 17:15 | Pre-trained and few shot learning for SETechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Yiling Lou Fudan University | ||
15:45 15mTalk | On the validity of pre-trained transformers for natural language processing in the software engineering domain Journal-First Papers Alexander Trautsch University of Passau, Julian von der Mosel , Steffen Herbold University of Passau | ||
16:00 15mTalk | Automating Code-Related Tasks Through Transformers: The Impact of Pre-training Technical Track Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana | ||
16:15 15mTalk | Log Parsing with Prompt-based Few-shot Learning Technical Track Pre-print | ||
16:30 15mTalk | Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning Technical Track Noor Nashid University of British Columbia, Mifta Sintaha University of British Columbia, Ali Mesbah University of British Columbia (UBC) Pre-print | ||
16:45 15mPaper | An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry Technical Track Wenxin Jiang Purdue University, Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Taylor R. Schorlemmer Purdue University, Rohan Sethi Loyola University Chicago, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory, James C. Davis Purdue University Pre-print | ||
17:00 15mTalk | ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning Technical Track Shangqing Liu Nanyang Technological University, bozhi wu Nanyang Technological University, Xiaofei Xie Singapore Management University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University |
15:45 - 17:15 | Program analysisShowcase / Journal-First Papers / Technical Track / SEIP - Software Engineering in Practice at Meeting Room 104 Chair(s): Marsha Chechik University of Toronto | ||
15:45 15mTalk | Stubbifier: debloating dynamic server-side JavaScript applications Journal-First Papers Alexi Turcotte Northeastern University, Ellen Arteca Northeastern University, Ashish Mishra Purdue University, Saba Alimadadi Simon Fraser University, Frank Tip Northeastern University | ||
16:00 15mTalk | DStream: A Streaming-Based Highly Parallel IFDS Framework Technical Track Xizao Wang Nanjing University, Zhiqiang Zuo Nanjing University, Lei Bu Nanjing University, Jianhua Zhao Nanjing University, China | ||
16:15 15mTalk | (Partial) Program Dependence Learning Technical Track Aashish Yadavally The University of Texas at Dallas, Wenbo Wang New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas Pre-print | ||
16:30 15mTalk | MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems Technical Track Yicheng Ouyang University of Illinois at Urbana-Champaign, Kailai Shao Ant Group, Kunqiu Chen Southern University of Science and Technology, Ruobing Shen Peking University, Chao Chen Ant Group, Mingze Xu Ant Group, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign Pre-print | ||
16:45 15mTalk | Incremental Call Graph Construction in Industrial Practice SEIP - Software Engineering in Practice Zelin Zhao Ant Group, Xizao Wang Nanjing University, Zhaogui Xu Ant Group, Zhenhao Tang Ant Group, Yongchao Li Ant Group, Peng Di Ant Group | ||
17:00 15mTalk | Generic Partition Refinement and Weighted Tree Automata Showcase Hans-Peter Deifel Friedrich-Alexander University Erlangen-Nürnberg, Germany, Stefan Milius , Lutz Schröder University of Erlangen-Nuremberg, Thorsten Wißmann Friedrich-Alexander University Erlangen-Nürnberg Link to publication DOI Pre-print |
15:45 - 17:15 | Vulnerability testing and patchingTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105 Chair(s): Cristian Cadar Imperial College London, UK | ||
15:45 15mTalk | Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation Technical Track Jiamou Sun CSIRO's Data61, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Thong Hoang Data61, CSIRO, Dehai Zhao Australian National University, Australia | ||
16:00 15mTalk | Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects Technical Track Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Wu Jiahui Nanyang Technological University, Yang Liu Nanyang Technological University | ||
16:15 15mTalk | Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs Technical Track Davide Corradini University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona Pre-print | ||
16:30 7mTalk | Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities DEMO - Demonstrations Kedi Shen Zhejiang university city college, Yun Zhang Zhejiang University City College, Lingfeng Bao Zhejiang University, Zhiyuan Wan Zhejiang University, Zhuorong Li Zhejiang university city college, Minghui Wu Zhejiang University City College} | ||
16:37 8mTalk | Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats Journal-First Papers Giorgio Di Tizio University of Trento, Michele Armellini University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam | ||
16:45 7mTalk | SSPCatcher: Learning to Catch Security Patches Journal-First Papers Arthur D. Sawadogo Université du Québec à Montréal, Tegawendé F. Bissyandé SnT, University of Luxembourg, Naouel Moha École de Technologie Supérieure (ETS), Kevin Allix CentraleSupelec Rennes, Jacques Klein University of Luxembourg, Li Li Beihang University, Yves Le Traon University of Luxembourg, Luxembourg | ||
16:52 15mTalk | CoLeFunDa: Explainable Silent Vulnerability Fix Identification Technical Track Jiayuan Zhou Huawei, Michael Pacheco Centre for Software Excellence, Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Xing Hu Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Ahmed E. Hassan Queen’s University |
15:45 - 17:15 | Cyber-physical systems testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers at Meeting Room 106 Chair(s): Shahar Maoz Tel Aviv University | ||
15:45 15mTalk | Data-driven Mutation Analysis for Cyber-Physical Systems Journal-First Papers Enrico Viganò University of Luxembourg, Oscar Cornejo SnT Centre, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Link to publication Pre-print | ||
16:00 15mTalk | Finding Causally Different Tests for an Industrial Control System Technical Track Chris Poskitt Singapore Management University, Yuqi Chen ShanghaiTech University, China, Jun Sun Singapore Management University, Yu Jiang Tsinghua University DOI Pre-print File Attached | ||
16:15 15mTalk | Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software Technical Track Yuqi Huai University of California, Irvine, Yuntianyi Chen University of California, Irvine, Sumaya Almanee University of California, Irvine, Tuan Ngo VNU University of Engineering and Technology, Xiang Liao University of California, Irvine, Ziwen Wan University of California, Irvine, Qi Alfred Chen University of California, Irvine, Joshua Garcia University of California, Irvine Pre-print | ||
16:30 15mTalk | Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems Technical Track Garrett Christian University of Virginia, Trey Woodlief University of Virginia, Sebastian Elbaum University of Virginia Pre-print | ||
16:45 15mTalk | Automated Test Case Generation for Safety-Critical Software in Scade SEIP - Software Engineering in Practice Elson Kurian University of Milano Bicocca, Pietro Braione University of Milano-Bicocca, Daniela Briola University of Milano Bicocca, Dario D'Avino , Matteo Modonato , Giovanni Denaro University of Milano-Bicocca, Italy | ||
17:00 7mTalk | Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments Journal-First Papers Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Pouria Derakhshanfar JetBrains Research, Sebastiano Panichella Zurich University of Applied Sciences, Annibale Panichella Delft University of Technology | ||
17:07 7mTalk | Parameter Coverage for Testing of Autonomous Driving Systems Under Uncertainty Journal-First Papers Thomas Laurent JSPS@National Institute of Informatics, Japan, Stefan Klikovits Johannes Kepler University, Linz, Paolo Arcaini National Institute of Informatics
, Fuyuki Ishikawa National Institute of Informatics, Anthony Ventresque Trinity College Dublin & Lero, Ireland Link to publication DOI |
15:45 - 17:15 | Software ecosystemsSEET - Software Engineering Education and Training / Technical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice / SEIS - Software Engineering in Society at Meeting Room 110 Chair(s): Sebastian Baltes SAP SE & University of Adelaide | ||
15:45 7mTalk | Upstream Bug Management in Linux Distributions - An Empirical Study of Debian and Fedora Practices Journal-First Papers Jiahuei Lin Queen’s University Software Analysis and Intelligence Lab (SAIL), Canada, Haoxiang Zhang Centre for Software Excellence at Huawei Canada, Bram Adams Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen’s University | ||
15:52 7mVision and Emerging Results | Treat societally impactful scientific insights as open-source software artifacts SEIS - Software Engineering in Society Cynthia C. S. Liem Delft University of Technology, Andrew M. Demetriou Delft University of Technology Pre-print | ||
16:00 15mTalk | Rules of Engagement: Why and How Companies Participate in OSS Technical Track Mariam Guizani Oregon State University, Aileen Abril Castro-Guzman Oregon State University, Anita Sarma Oregon State University, Igor Steinmacher Northern Arizona University Pre-print | ||
16:15 15mPaper | An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead Technical Track Boming Xia CSIRO's Data61 & University of New South Wales, Tingting Bi Data61, CSIRO, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 Pre-print | ||
16:30 15mTalk | Open Source Software Onboarding as a University Course: An Experience Report SEET - Software Engineering Education and Training Hao He Peking University, Minghui Zhou Peking University, Qingye Wang Peking University, China, Jingyue Li Norwegian University of Science and Technology Pre-print | ||
16:45 15mTalk | An Empirical Study of License Conflict in Free and Open Source Software SEIP - Software Engineering in Practice Xing Cui Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences, Xu Wang Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Sheng Qu Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Mutian Yang | ||
17:00 7mTalk | LicenseRec: Knowledge based Open Source License Recommendation for OSS Projects DEMO - Demonstrations Weiwei Xu Peking University, Xin Wu Peking University, Runzhi He Peking University, Minghui Zhou Peking University Pre-print | ||
17:07 7mTalk | Will you come back to contribute? Investigating the inactivity of OSS core developers in GitHub Journal-First Papers Fabio Calefato University of Bari, Marco Gerosa Northern Arizona University, Giuseppe Iaffaldano University of Bari, Filippo Lanubile University of Bari, Igor Steinmacher Northern Arizona University Link to publication DOI Pre-print |
15:45 - 17:15 | |||
15:45 90mTalk | Technical Briefing on Socio-Technical Grounded Theory for Qualitative Data Analysis Technical Briefings Rashina Hoda Monash University |
Accepted Papers
.
ICSE 2023 open science policy
ICSE 2023 open science policy
As a conference sponsored by ACM SIGSOFT, ICSE 2023 adheres to open science policies as adopted by SIGSOFT. The text below is based on v0.9.9 of these policies.
Open science policies
Openness in science is key to fostering progress via transparency and availability of all outputs produced at each investigative steps. Transparency and availability of research outputs allow better reproducibility, replicability of quantitative studies and recoverability of qualitative studies. Open science builds the core for excellence in evidence-based research.
As an internationally renowned forum for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, experiences, and challenges in the field of software engineering, ICSE 2023 (continuing the tradition of previous editions) actively supports setting standards for how we conduct this kind of research.
To this end, we have explicitly committed ourselves to foster openness to our research outcomes. In particular, we support the adoption of open data and open source principles. We encourage all contributing authors to disclose the (anonymized and curated) data to increase reproducibility, replicability, and/or recoverability of the studies.
Principles
Research output should be publicly and freely accessible by anyone, permanently.
Artifacts related to a study (which include, but are not limited to, raw and transformed data, extended proofs, appendices, analysis scripts, software, virtual machines and containers, and qualitative codebooks) and the paper itself should, in principle, be made available on the Internet:
- without any barrier (e.g., paywalls, registration forms, request mechanisms),
- under a proper open license that specifies purposes for re-use and repurposing, properly archived and preserved ,
- provided that there are no ethical, legal, technical, economic, or sensible barriers preventing the disclosure.
Open artifacts
Fostering artifacts as open data and open source should be done as:
● Archived on preserved digital repositories such aszenodo.org,figshare.com,www.softwareheritage.org, osf.io, or institutional repositories. GitHub, GitLab, and similar services for version control systems do not offer properly archived and preserved data. Personal or institutional websites, consumer cloud storage such as Dropbox, or services such as Academia.edu and Researchgate.net do not provide properly archived and preserved data.
● Released under a proper open data license such as the CC0 dedication or the CC-BY 4.0 license when publishing the data.
● Software can be released under an open source license.
● Different open licenses, if mandated by institutions or regulations, are also permitted.
● We encourage authors to make artifacts available upon submission (either privately or publicly) and upon acceptance (publicly).
Supporting statement
We ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section.
Authors who cannot disclose data for the reasons stated in the principles of the policies should provide a short statement in their submitted papers in a section named Data Availability after the Conclusion section.
Please note that the success of the open science initiative depends on the willingness (and possibilities) of authors to disclose their data and that all submissions will undergo the same review process independent of whether they disclose their analysis code or data.
HOWTOs
A step-by-step approach to disclosing artifacts for (doubly-anonymous) peer review and make it open data upon acceptance is available online .
A step-by-step approach to automatically archive a GitHub repository to Zenodo.org is available at https://guides.github.com/activities/citable-code/ .
A step-by-step approach to automatically archive a GitHub repository to figshare.com is available at https://knowledge.figshare.com/articles/item/how-to-connect-figshare-with-your-github-account .
A proposal for artifact evaluation by SIGSOFT is available at https://github.com/acmsigsoft/artifact-evaluation .
A proposal for open science in software engineering, including explanations for structuring an open artifact, is available at https://arxiv.org/abs/1904.06499 .
Open Access
We encourage ICSE 2023 authors to self-archive their pre- and post-prints in open and preserved repositories. Self-archiving is legal and allowed by most publishers (granted in the copyright transfer agreement), and it will enable anybody in the world to reach papers barrier-free.
Upon acceptance to ICSE 2023, we encourage authors to revise their article according to the peers’ comments, generate a PDF version of it (post-print), and submit it to arXiv.org or their institutional repository.
Unless authors are willing to pay the publisher for open access of their published papers (gold open access), they should pick the “arXiv.org - Non-exclusive license to distribute” license https://arxiv.org/licenses/nonexclusive-distrib/1.0/license.html when submitting to arXiv.
Authors should avoid a Creative Commons license for their preprints, in any repository, if the published papers are not open access. More infos available here: https://avandeursen.com/2016/11/06/green-open-access-faq/#creative-commons .
Note: Authors are not allowed to self-archive the PDF of the published article as typeset by the publisher (a.k.a. “publisher proof,” “published paper,” “the digital library version”).
HOWTOs
A comprehensive FAQ for open access and self-archiving is available at https://avandeursen.com/2016/11/06/green-open-access-faq/ .
Instructions for reviewers
ICSE 2023 has adopted an open science stance and introduced guidelines for authors (available at https://conf.researchr.org/track/icse-2023/icse-2023-open-science-policies ). The policies invite authors to provide all research artifacts for peer review, self-archive their pre- and post-prints, and archive artifacts as open data upon acceptance. We kindly ask you to pay attention to the following, while reviewing:
- All open science steps are optional for authors and reviewers. You are invited, but not required, to inspect the provided artifacts as part of your review efforts.
- All reasons for partial disclosure of data (or lack thereof) should be trusted.
- Submissions have to undergo the same review process independent of whether they disclose their analysis code or data. You are invited to complain in your review of any absence of data, but please do not let it influence your review of submissions. You are free to welcome further disclosure of data and help authors in doing so, with your review.
- Open science is challenging for qualitative studies. Please be welcoming of qualitative studies which open their artifacts even in a limited way. Furthermore, when evaluating artifacts from qualitative studies that was made available for peer review, please keep in mind that authors of qualitative studies might have underlying ontological and epistemological stances that differ from those of authors of quantitative studies. Concepts such as replicability and reproducibility might apply partially or not apply at all with qualitative studies.
- Providing research artifacts might introduce issues with doubly-anonymous reviews. We ask you not to actively hunt the identity of authors, especially in case they self-archived a preprint of their submission. License
- New! this year, for every paper, one designated reviewer will perform a lightweight check of the online/attached data (if available). Note this is not a thorough replicability check as it is done by the artifact track, but it has mainly the goal to check whether the dataset contains what was declared.
These open science policies are based on open science policies by Daniel Graziotin, licensed under CC0 1.0.
Q/A
Please note that the processes described in this document are not used by all tracks. Check in the call for papers whether
- sharing data is expected, and how.
- double-anonymous review is used or not.
Empirical Studies and Sharing of Data
I am doing research with industry. What if I cannot share data from my research?
We absolutely welcome research with industry, as it often conveys important lessons about software engineering in practice – and we perfectly understand that industry data may be subject to confidentiality issues or legal requirements. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of confidentiality agreements". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.
I am doing user studies. What if I cannot share data from my empirical study?
We absolutely welcome user studies! However, we also perfectly understand that sharing raw data can be subject to constraints such as privacy issues. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of privacy issues". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.
I am doing qualitative research. What information should I include to help reviewers assess my research results and the readers use my results?
Best practices for addressing the reliability and credibility of qualitative research suggest providing detailed arguments and rationale for qualitative approaches, procedures and analyses. Therefore, authors are advised to provide as much transparency as possible into these details of their study. For example, clearly explain details and decisions such as 1) context of study, 2) the participant-selection process and the theoretical basis for selecting those participants, 3) collection of data or evidence from participants, and 4) data analysis methods, e.g. justify their choice theoretically and how they relate to the original research questions, and make explicit how the themes and concepts were identified from the data. Further, provide sufficient detail to bridge the gap between the interpretation of findings presented and the collected evidence by, for example, numbering quotations and labeling sources. Similar to replicability in quantitative research, the transparency aims to ensure a study’s methods are available for inspection and interpretation. However, replicability or repeatability is not the goal, as qualitative methods are inherently interpretive and emphasize context. As a consequence, reporting qualitative research might require more space in the paper; authors should consider providing enough evidence for their claims while being mindful with the use of space.
Finally, when qualitative data is counted and used for quantitative methods, authors should report the technique and results in assessing rigour in data analysis procedures, such as inter-reliability tests or triangulation over different data sources or methods—, and justify how they achieved rigour if no such methods were used.
I can make my data set / my tool available, but it may reveal my identity. What should I do?
See this question under "double-anonymous submissions", below.
Double-Anonymous Submissions
Why double-anonymous?
There are many reasons for a submission track to employ a double-anonymous review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-anonymous reviewing, see Claire Le Goues’s very well-argued, referenced and evidenced blog posting in favor of double-anonymous review processes for Software Engineering conferences . See also a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
How can I prepare my paper for double-anonymous reviewing?
You must make every reasonable effort to honor the double-anonymous review process, but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names from the title page.
- Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper.
- Do not rely on non-anonymous supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. Supplementary information might result in revealing author identities.
Here is some excellent advice on anonymization from ACM .
I previously published an earlier version of this work in a venue that doesn’t have double-anonymous. What should I do about acknowledging that previous work?
If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.
If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.
Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?
It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final post-review, camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-anonymous review process, please refrain from citing the dissertation, to increase anonymity.
You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.
What if we want to cite some unpublished work of our own (as motivation for example)?
If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures ). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works. If your work is a tool, a data set, or some other resource, see the question on ‘resources already made available’, above.
Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to ICSE 2023 (E.g., using footnotes saying “Submitted to ICSE 2023”).
I can make my data set / my tool available, but it may reveal my identity. What should I do?
Please make an effort to anonymize your data set / your tool such that it does not reveal your identity. If that is impossible, place a warning next to the link that this may reveal your identity.