default search action
35th ASE 2020: Melbourne, Australia
- 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, Melbourne, Australia, September 21-25, 2020. IEEE 2020, ISBN 978-1-4503-6768-4
- Marta Kwiatkowska:
Safety and Robustness for Deep Learning with Provable Guarantees. 1-3 - Gail C. Murphy:
Is Software Engineering Research Addressing Software Engineering Problems? (Keynote). 4-5 - Yueling Zhang, Geguang Pu, Jun Sun:
Accelerating All-SAT Computation with Short Blocking Clauses. 6-17 - Yu Huang, Benjamin Ogles, Eric Mercer:
A Predictive Analysis for Detecting Deadlock in MPI Programs. 18-28 - Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Yanjun Pu, Xudong Liu:
Learning to Handle Exceptions. 29-41 - Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng:
BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration. 42-53 - Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
LEGION: Best-First Concolic Testing. 54-65 - Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani:
Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent Data. 66-77 - Junjie Chen, Haoyang Ma, Lingming Zhang:
Enhanced Compiler Bug Isolation via Memoized Search. 78-89 - Bruce Collie, Philip Ginsbach, Jackson Woodruff, Ajitha Rajan, Michael F. P. O'Boyle:
M3: Semantic API Migrations. 90-102 - Nic Volanschi, Julia Lawall:
The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel. 103-114 - Timotej Kapus, Frank Busse, Cristian Cadar:
Pending Constraints in Symbolic Execution for Better Exploration and Seeding. 115-126 - Sungho Lee, Hyogun Lee, Sukyoung Ryu:
Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis. 127-137 - Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller:
Assessing and Restoring Reproducibility of Jupyter Notebooks. 138-149 - Andreas Stahlbauer, Christoph Frädrich, Gordon Fraser:
Verified from Scratch: Program Analysis for Learners' Programs. 150-162 - Xingyu Zhao, Radu Calinescu, Simos Gerasimou, Valentin Robu, David Flynn:
Interval Change-Point Detection for Runtime Probabilistic Model Checking. 163-174 - Daniel Ramos, Jorge Pereira, Inês Lynce, Vasco Manquinho, Ruben Martins:
UNCHARTIT: An Interactive Framework for Program Recovery from Charts. 175-186 - Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. 187-198 - Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. 199-210 - Pouria Derakhshanfar, Xavier Devroey, Andy Zaidman, Arie van Deursen, Annibale Panichella:
Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives. 211-223 - Qi Xin, Myeongsoo Kim, Qirun Zhang, Alessandro Orso:
Subdomain-Based Generality-Aware Debloating. 224-236 - Yiqun T. Chen, Rahul Gopinath, Anita Tadakamalla, Michael D. Ernst, Reid Holmes, Gordon Fraser, Paul Ammann, René Just:
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size. 237-249 - Andreas Katis, Grigory Fedyukovich, Jeffrey Chen, David A. Greve, Sanjai Rayadurgam, Michael W. Whalen:
Synthesis of Infinite-State Systems with Random Behavior. 250-261 - Benjamin Mariano, Yanju Chen, Yu Feng, Shuvendu K. Lahiri, Isil Dillig:
Demystifying Loops in Smart Contracts. 262-274 - Yangruibo Ding, Baishakhi Ray, Premkumar T. Devanbu, Vincent J. Hellendoorn:
Patching as Translation: the Data and the Metaphor. 275-286 - Devjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli:
DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests. 287-298 - Mohammad Jafar Mashhadi, Hadi Hemmati:
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems. 299-311 - Jesse Bartels, Jon Stephens, Saumya Debray:
Representing and Reasoning about Dynamic Code. 312-323 - Navid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek:
ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android. 324-335 - Mingyang Li, Lin Shi, Ye Yang, Qing Wang:
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum. 336-348 - Bolin Wei, Yongmin Li, Ge Li, Xin Xia, Zhi Jin:
Retrieve and Refine: Exemplar-based Neural Comment Generation. 349-360 - Zhenhao Li, Tse-Hsun Chen, Weiyi Shang:
Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks. 361-372 - Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang, Dan Hao, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems. 373-384 - Songqiang Chen, Xiaoyuan Xie, Bangguo Yin, Yuanxiang Ji, Lin Chen, Baowen Xu:
Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports. 385-397 - Zhe Liu, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun Hu, Qing Wang:
Owl Eyes: Spotting UI Display Issues via Visual Understanding. 398-409 - Weijun Shen, Yanhui Li, Lin Chen, Yuanlei Han, Yuming Zhou, Baowen Xu:
Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining. 410-422 - Xiaoning Du, Yi Li, Xiaofei Xie, Lei Ma, Yang Liu, Jianjun Zhao:
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems. 423-435 - Hengcheng Zhu, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung, Qin Sheng, Cui Zhou:
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests. 436-447 - Anjana Perera, Aldeida Aleti, Marcel Böhme, Burak Turhan:
Defect Prediction Guided Search-Based Software Testing. 448-460 - Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu, Jianling Sun:
API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph. 461-472 - Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin:
Multi-task Learning based Pre-trained Language Model for Code Completion. 473-485 - Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. 486-498 - Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang:
Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction. 499-510 - Martin Kellogg, Martin Schäf, Serdar Tasiran, Michael D. Ernst:
Continuous Compliance. 511-523 - Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. 524-535 - Haicheng Chen, Wensheng Dou, Dong Wang, Feng Qin:
CoFI: Consistency-Guided Fault Injection for Cloud Systems. 536-547 - Michael C. Gerten, James I. Lathrop, Myra B. Cohen, Titus H. Klinge:
ChemTest: An Automated Software Testing Framework for an Emerging Paradigm. 548-560 - Julian Frattini, Maximilian Junker, Michael Unterkalmsteiner, Daniel Méndez:
Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts. 561-572 - Ke Li, Zilin Xiang, Tao Chen, Kay Chen Tan:
BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction. 573-584 - Zhongxin Liu, Xin Xia, Meng Yan, Shanping Li:
Automating Just-In-Time Comment Updating. 585-597 - Patrick Stöckle, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. 598-610 - Stefan Mühlbauer, Sven Apel, Norbert Siegmund:
Identifying Software Performance Changes Across Variants and Versions. 611-622 - Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao:
CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs. 623-634 - Shahar Maoz, Ilia Shevrin:
Just-In-Time Reactive Synthesis. 635-646 - Jihyeok Park, Jihee Park, Seungmin An, Sukyoung Ryu:
JISET: JavaScript IR-based Semantics Extraction Toolchain. 647-658 - Yeting Li, Zhiwu Xu, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung, Haoren Zhao:
FlashRegex: Deducing Anti-ReDoS Regexes from Examples. 659-671 - Chengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng:
Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors. 672-683 - Johannes Dorn, Sven Apel, Norbert Siegmund:
Mastering Uncertainty in Performance Estimations of Configurable Software Systems. 684-696 - Likang Yin, Vladimir Filkov:
Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects. 697-708 - Muhammad Usman, Wenxi Wang, Sarfraz Khurshid:
TestMC: Testing Model Counters using Differential and Metamorphic Testing. 709-721 - Qian Zhang, Jiyuan Wang, Muhammad Ali Gulzar, Rohan Padhye, Miryung Kim:
BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction. 722-733 - Nick Feng, Federico Mora, Vincent Hui, Marsha Chechik:
Scaling Client-Specific Equivalence Checking via Impact Boundary Search. 734-745 - David Gros, Hariharan Sezhiyan, Prem Devanbu, Zhou Yu:
Code to Comment "Translation": Data, Metrics, Baselining & Evaluation. 746-757 - Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu:
Exploring the Architectural Impact of Possible Dependencies in Python Software. 758-770 - Hung Viet Pham, Shangshu Qian, Jiannan Wang, Thibaud Lutellier, Jonathan Rosenthal, Lin Tan, Yaoliang Yu, Nachiappan Nagappan:
Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance. 771-783 - Brandon Paulsen, Jingbo Wang, Jiawei Wang, Chao Wang:
NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation. 784-796 - Chris Satterfield, Thomas Fritz, Gail C. Murphy:
Identifying and Describing Information Seeking Tasks. 797-808 - Zhiyuan Wan, Gail C. Murphy, Xin Xia:
Predicting Code Context Models for Software Development Tasks. 809-820 - Yueming Wu, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. 821-833 - Yang Liu, Mingwei Liu, Xin Peng, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang:
Generating Concept based API Element Comparison Using a Knowledge Graph. 834-845 - Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li, Ji Wang:
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once. 846-857 - Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang:
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling. 858-870 - Xin Wang, Jin Liu, Li Li, Xiao Chen, Xiao Liu, Hao Wu:
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks. 871-882 - Qihao Zhu, Zeyu Sun, Xiran Liang, Yingfei Xiong, Lu Zhang:
OCoR: An Overlapping-Aware Code Retriever. 883-894 - Yida Tao, Jiefang Jiang, Yepang Liu, Zhiwu Xu, Shengchao Qin:
Understanding Performance Concerns in the API Documentation of Data Science Libraries. 895-906 - Samuel Benton, Xia Li, Yiling Lou, Lingming Zhang:
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems. 907-918 - Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? 919-930 - Yue Zou, Bihuan Ban, Yinxing Xue, Yun Xu:
CCGraph: a PDG-based code clone detector with approximate graph matching. 931-942 - Haichi Wang, Zan Wang, Jun Sun, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li:
Towards Generating Thread-Safe Classes Automatically. 943-955 - Aryaz Eghbali, Michael Pradel:
No Strings Attached: An Empirical Study of String-related Software Bugs. 956-967 - Shangwen Wang, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao, Hai Jin:
Automated Patch Correctness Assessment: How Far are We? 968-980 - Haoye Tian, Kui Liu, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé:
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. 981-992 - Christos Tsigkanos, Nianyu Li, Zhi Jin, Zhenjiang Hu, Carlo Ghezzi:
Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations. 993-1003 - Chaima Boufaied, Claudio Menghi, Domenico Bianculli, Lionel C. Briand, Yago Isasi Parache:
Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach. 1004-1015 - Cedric Richter, Heike Wehrheim:
Attend and Represent: A Novel View on Algorithm Selection for Software Verification. 1016-1028 - Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng:
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. 1029-1040 - David Berend, Xiaofei Xie, Lei Ma, Lingjun Zhou, Yang Liu, Chi Xu, Jianjun Zhao:
Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness. 1041-1052 - Shuai Wang, Zhendong Su:
Metamorphic Object Insertion for Testing Object Detection Systems. 1053-1065 - Farnaz Behrang, Alessandro Orso:
Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for Android. 1066-1077 - Jun-Wei Lin, Navid Salehnamadi, Sam Malek:
Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study. 1078-1089 - Benjamin Gafford, Tobias Dürschmid, Gabriel A. Moreno, Eunsuk Kang:
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems. 1090-1102 - Hoang Lam Nguyen, Nebras Nassar, Timo Kehrer, Lars Grunske:
MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools. 1103-1115 - Hongyu Liu, Ruiqin Tian, Tongping Liu, Bin Ren:
Prober: Practically Defending Overflows with Page Protection. 1116-1128 - Alan Romano, Yunhui Zheng, Weihang Wang:
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection. 1129-1140 - Yu Feng, Emina Torlak, Rastislav Bodík:
Summary-Based Symbolic Evaluation for Smart Contracts. 1141-1152 - Facundo Molina:
Applying Learning Techniques to Oracle Synthesis. 1153-1157 - Nils Wieber:
Automated Generation of Client-Specific Backends Utilizing Existing Microservices and Architectural Knowledge. 1158-1160 - César Cornejo:
SAT-Based Arithmetic Support for Alloy. 1161-1163 - Hala Abdelkader:
Towards Robust Production Machine Learning Systems: Managing Dataset Shift. 1164-1166 - Christian Schindler:
Towards Transparency-Encouraging Partial Software Disclosure to Enable Trust in Data Usage. 1167-1169 - Anjana Perera:
Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing. 1170-1174 - Yongsik Kim, SoAh Min, Youkyung Kim:
The New Approach to IT Testing : Real Transaction-Based Automated Validation Solution. 1175-1178 - Lei Liu, Mehdi Bahrami, Wei-Peng Chen:
Automatic Generation of IFTTT Mashup Infrastructures. 1179-1183 - Haruki Yokoyama, Satoshi Onoue, Shinji Kikuchi:
Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data Augmentation. 1184-1188 - Yi Liu, Jinhui Xie, Jianbo Yang, Shiyu Guo, Yuetang Deng, Shuqing Li, Yechang Wu, Yepang Liu:
Industry Practice of JavaScript Dynamic Analysis on WeChat Mini-Programs. 1189-1193 - Davrondzhon Gafurov, Margrete Sunde Grovan, Arne Erik Hurum:
Lightweight MBT Testing for National e-Health Portal in Norway. 1194-1198 - Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
Code-Based Vulnerability Detection in Node.js Applications: How far are we? 1199-1203 - Mattia Fazzini, Alessandra Gorla, Alessandro Orso:
A Framework for Automated Test Mocking of Mobile Apps. 1204-1208 - Shawn Rasheed, Jens Dietrich:
A Hybrid Analysis to Detect Java Serialisation Vulnerabilities. 1209-1213 - Junming Cao, Shouliang Yang, Wenhui Jiang, Hushuang Zeng, Beijun Shen, Hao Zhong:
BugPecker: Locating Faulty Methods with Deep Learning on Revision Graphs. 1214-1218 - Karine Even-Mendoza, Cristian Cadar, Alastair F. Donaldson:
Closer to the Edge: Testing Compilers More Thoroughly by Being Less Conservative About Undefined Behaviour. 1219-1223 - Mitchell Olsthoorn, Arie van Deursen, Annibale Panichella:
Generating Highly-structured Input Data by Combining Search-based Testing and Grammar-based Fuzzing. 1224-1228 - Joymallya Chakraborty, Kewen Peng, Tim Menzies:
Making Fair ML Software using Trustworthy Explanation. 1229-1233 - Michael Cao, Sahar Badihi, Khaled Ahmed, Peiyu Xiong, Julia Rubin:
On Benign Features in Malware Detection. 1234-1238 - Jianhui Chen, Fei He:
Proving Termination by k-Induction. 1239-1243 - Jinhao Dong, Yiling Lou, Dan Hao:
SRRTA: Regression Testing Acceleration via State Reuse. 1244-1248 - Wei Wang, Ruoxi Sun, Minhui Xue, Damith C. Ranasinghe:
An Automated Assessment of Android Clipboards. 1249-1251 - Han Gao, Yi Xu, Xiao Liu, Jia Xu, Tianxiang Chen, Bowen Zhou, Rui Li, Xuejun Li:
Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems. 1252-1254 - Tianqi Zhang, Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Ji Wang:
Efficient Multiplex Symbolic Execution with Adaptive Search Strategy. 1255-1256 - Mattia Fazzini, Alessandro Orso:
Managing App Testing Device Clouds: Issues and Opportunities. 1257-1259 - Meixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng, Zhenbang Chen, Ji Wang:
Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN. 1260-1261 - Zehua Chen, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang, Weiyu Pan:
Synthesizing Smart Solving Strategy for Symbolic Execution. 1262-1263 - Daohan Song, Hao Zhong, Li Jia:
The Symptom, Cause and Repair of Workaround. 1264-1266 - Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden:
Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation. 1267-1269 - Xuansong Li, Wei Song, Xiangyu Zhang:
Towards Programming and Verification for Activity-Oriented Smart Home Systems. 1270-1272 - Nikola Lukic, Saghar Talebipour, Nenad Medvidovic:
AirMochi - A Tool for Remotely Controlling iOS Devices. 1273-1277 - Pouria Derakhshanfar, Xavier Devroey, Annibale Panichella, Andy Zaidman, Arie van Deursen:
Botsing, a Search-based Crash Reproduction Framework for Java. 1278-1282 - Jia Xu, Xiao Liu, Xuejun Li, Lei Zhang, Yun Yang:
Express: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems**This research is in part supported by the National Natural Science Foundation of China Project No. 61972001. 1283-1286 - Di Shao, Xiao Liu, Ben Cheng, Owen Wang, Thuong N. Hoang:
Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering. 1287-1291 - Marco Mobilio, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani:
FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades. 1292-1296 - Kristian Kolthoff, Christian Bartelt, Simone Paolo Ponzetto:
GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements. 1297-1301 - Chenqian Zhu, Weisong Sun, Qin Liu, Yangyang Yuan, Chunrong Fang, Yong Huang:
HomoTR: Online Test Recommendation System Based on Homologous Code Matching. 1302-1306 - Hao Wang, Guoping Rong, Yangchen Xu, Yong You:
ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies. 1307-1311 - Dan Zhang, Ping Luo, Wei Tang, Min Zhou:
OSLDetector: Identifying Open-Source Libraries through Binary Analysis. 1312-1315 - Egor Bogomolov, Yaroslav Golubev, Artyom Lobanov, Vladimir Kovalenko, Timofey Bryksin:
Sosed: a tool for finding similar software projects. 1316-1320 - Alan Romano, Weihang Wang:
WASim: Understanding WebAssembly Applications through Classification. 1321-1325 - Runze Yu, Youzhe Zhang, Jifeng Xuan:
MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation. 1326-1330 - Zhenfei Cao, Xu Wang, Shengcheng Yu, Yexiao Yun, Chunrong Fang:
STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis. 1331-1335 - Chaiyakarn Khanan, Worawit Luewichana, Krissakorn Pruktharathikoon, Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta:
JITBot: An Explainable Just-In-Time Defect Prediction Bot. 1336-1339 - Nataniel P. Borges, Jenny Rau, Andreas Zeller:
Speeding up GUI Testing by On-Device Test Generation. 1340-1343 - Omar Javed, Joshua Heneage Dawes, Marta Han, Giovanni Franzoni, Andreas Pfeiffer, Giles Reger, Walter Binder:
PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects. 1344-1348 - João F. Ferreira, Pedro Cruz, Thomas Durieux, Rui Abreu:
SmartBugs: A Framework to Analyze Solidity Smart Contracts. 1349-1352 - Stratos Kourtzanidis, Alexander Chatzigeorgiou, Apostolos Ampatzoglou:
RepoSkillMiner: Identifying software expertise from GitHub repositories using Natural Language Processing. 1353-1357 - Kamil Adipovich Masalimov:
A Machine Learning based Approach to Autogenerate Diagnostic Models for CNC machines. 1358-1360 - Haining Feng:
A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program. 1361-1363 - Shangqing Liu:
A Unified Framework to Learn Program Semantics with Graph Neural Networks. 1364-1366 - Yi Wu:
Anti-patterns for Java Automated Program Repair Tools. 1367-1369 - Harshita Diddee, Bhrigu Kansra:
CrossPriv: User Privacy Preservation Model for Cross-Silo Federated Software. 1370-1372 - Zhe Liu:
Discovering UI Display Issues with Visual Understanding. 1373-1375 - Nikhil Pimpalkhare:
Dynamic Algorithm Selection for SMT. 1376-1378 - Chandan Sharma:
FLUX: From SQL to GQL query translation tool. 1379-1381 - Jiachi Chen:
Finding Ethereum Smart Contracts Security Issues by Comparing History Versions. 1382-1384 - Pengfei Gao:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 1385-1387 - Beatriz Souza:
Identifying Mutation Subsumption Relations. 1388-1390 - Yating Zhang:
Scalability and Precision Improvement of Neural Program Synthesis. 1391-1393 - Xiangzhe Xu:
The Classification and Propagation of Program Comments. 1394-1396 - Zhengzi Xu:
Source Code and Binary Level Vulnerability Detection and Hot Patching. 1397-1399 - Zhipeng Gao:
When Deep Learning Meets Smart Contracts. 1400-1402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.