Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 33, Issue 6July 2024
Editor:
  • Mauro Pezzé
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Reflects downloads up to 01 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Risky Dynamic Typing-related Practices in Python: An Empirical Study
Article No.: 140, Pages 1–35https://doi.org/10.1145/3649593

Python’s dynamic typing nature provides developers with powerful programming abstractions. However, many type-related bugs are accumulated in code bases of Python due to the misuse of dynamic typing. The goal of this article is to aid in the understanding ...

research-article
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks
Article No.: 141, Pages 1–45https://doi.org/10.1145/3649596

Defect prediction is crucial for software quality assurance and has been extensively researched over recent decades. However, prior studies rarely focus on data complexity in defect prediction tasks, and even less on understanding the difficulties of ...

research-article
Open Access
Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs
Article No.: 142, Pages 1–36https://doi.org/10.1145/3652157

Due to its importance and widespread use in industry, automated testing of REST APIs has attracted major interest from the research community in the last few years. However, most of the work in the literature has been focused on black-box fuzzing. ...

research-article
Help Them Understand: Testing and Improving Voice User Interfaces
Article No.: 143, Pages 1–33https://doi.org/10.1145/3654438

Voice-based virtual assistants are becoming increasingly popular. Such systems provide frameworks to developers for building custom apps. End-users can interact with such apps through a Voice User Interface (VUI), which allows the user to use natural ...

research-article
Open Access
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing
Article No.: 144, Pages 1–27https://doi.org/10.1145/3655022

Defect predictors, static bug detectors, and humans inspecting the code can propose locations in the program that are more likely to be buggy before they are discovered through testing. Automated test generators such as search-based software testing (SBST)...

research-article
On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation
Article No.: 145, Pages 1–41https://doi.org/10.1145/3654444

The multi-objective testing resource allocation problem (MOTRAP) is concerned on how to reasonably plan the testing time of software testers to save the cost and improve the reliability as much as possible. The feasible solution space of a MOTRAP is ...

research-article
Open Access
Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?
Article No.: 146, Pages 1–41https://doi.org/10.1145/3654443

With the rate of discovered and disclosed vulnerabilities escalating, researchers have been experimenting with machine learning to predict whether a vulnerability will be exploited. Existing solutions leverage information unavailable when a CVE is created,...

research-article
Open Access
Testing Multi-Subroutine Quantum Programs: From Unit Testing to Integration Testing
Article No.: 147, Pages 1–61https://doi.org/10.1145/3656339

Quantum computing has emerged as a promising field with the potential to revolutionize various domains by harnessing the principles of quantum mechanics. As quantum hardware and algorithms continue to advance, developing high-quality quantum software has ...

research-article
MTL-TRANSFER: Leveraging Multi-task Learning and Transferred Knowledge for Improving Fault Localization and Program Repair
Article No.: 148, Pages 1–31https://doi.org/10.1145/3654441

Fault localization (FL) and automated program repair (APR) are two main tasks of automatic software debugging. Compared with traditional methods, deep learning-based approaches have been demonstrated to achieve better performance in FL and APR tasks. ...

research-article
On the Way to SBOMs: Investigating Design Issues and Solutions in Practice
Article No.: 149, Pages 1–25https://doi.org/10.1145/3654442

The increase of software supply chain threats has underscored the necessity for robust security mechanisms, among which the Software Bill of Materials (SBOM) stands out as a promising solution. SBOMs, by providing a machine-readable inventory of software ...

research-article
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases
Article No.: 150, Pages 1–28https://doi.org/10.1145/3656340

Metamorphic Testing (MT) alleviates the oracle problem by defining oracles based on metamorphic relations (MRs) that govern multiple related inputs and their outputs. However, designing MRs is challenging, as it requires domain-specific knowledge. This ...

research-article
Open Access
Replication in Requirements Engineering: The NLP for RE Case
Article No.: 151, Pages 1–33https://doi.org/10.1145/3658669

Natural language processing (NLP) techniques have been widely applied in the requirements engineering (RE) field to support tasks such as classification and ambiguity detection. Despite its empirical vocation, RE research has given limited attention to ...

research-article
Open Access
Focused Test Generation for Autonomous Driving Systems
Article No.: 152, Pages 1–32https://doi.org/10.1145/3664605

Testing Autonomous Driving Systems (ADSs) is crucial to ensure their reliability when navigating complex environments. ADSs may exhibit unexpected behaviours when presented, during operation, with driving scenarios containing features inadequately ...

research-article
Open Access
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes
Article No.: 153, Pages 1–38https://doi.org/10.1145/3664600

Background: Research shows that emotional intelligence (EI) should be used alongside cognitive intelligence during requirements change (RC) handling in Software Engineering (SE), especially in agile settings. Objective: We wanted to study the role of EI ...

research-article
Automatic Repair of Quantum Programs via Unitary Operation
Article No.: 154, Pages 1–43https://doi.org/10.1145/3664604

With the continuous advancement of quantum computing (QC), the demand for high-quality quantum programs (QPs) is growing. To avoid program failure, in software engineering, the technology of automatic program repair (APR) employs appropriate patches to ...

research-article
Open Access
Testing Updated Apps by Adapting Learned Models
Article No.: 155, Pages 1–40https://doi.org/10.1145/3664601

Although App updates are frequent and software engineers would like to verify updated features only, automated testing techniques verify entire Apps and are thus wasting resources.

We present Continuous Adaptation of Learned Models (CALM), an automated ...

research-article
Open Access
Fairness Testing of Machine Translation Systems
Article No.: 156, Pages 1–27https://doi.org/10.1145/3664608

Machine translation is integral to international communication and extensively employed in diverse human-related applications. Despite remarkable progress, fairness issues persist within current machine translation systems. In this article, we propose ...

research-article
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework
Article No.: 157, Pages 1–31https://doi.org/10.1145/3664607

As mobile applications evolve rapidly, their fast iterative update nature leads to an increase in software defects. Just-In-Time Software Defect Prediction (JIT-SDP) offers immediate feedback on code changes. For new applications without historical data, ...

SECTION: Continuous Special Section: AI and SE
research-article
DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks
Article No.: 158, Pages 1–29https://doi.org/10.1145/3644388

Deep neural networks (DNNs) are widely used in various application domains such as image processing, speech recognition, and natural language processing. However, testing DNN models may be challenging due to the complexity and size of their input domain. ...

research-article
Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation
Article No.: 159, Pages 1–27https://doi.org/10.1145/3652151

Source code authorship attribution is an important problem in practical applications such as plagiarism detection, software forensics, and copyright disputes. Recent studies show that existing methods for source code authorship attribution can be ...

research-article
Do Code Summarization Models Process Too Much Information? Function Signature May Be All That Is Needed
Article No.: 160, Pages 1–35https://doi.org/10.1145/3652156

With the fast development of large software projects, automatic code summarization techniques, which summarize the main functionalities of a piece of code using natural languages as comments, play essential roles in helping developers understand and ...

research-article
Open Access
BatFix: Repairing language model-based transpilation
Article No.: 161, Pages 1–29https://doi.org/10.1145/3658668

To keep up with changes in requirements, frameworks, and coding practices, software organizations might need to migrate code from one language to another. Source-to-source migration, or transpilation, is often a complex, manual process. Transpilation ...

research-article
Open Access
Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection
Article No.: 162, Pages 1–34https://doi.org/10.1145/3664602

Software vulnerabilities (SVs) have become a common, serious, and crucial concern due to the ubiquity of computer software. Many AI-based approaches have been proposed to solve the software vulnerability detection (SVD) problem to ensure the security and ...

SECTION: Continuous Special Section: Security and SE
research-article
Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey
Article No.: 163, Pages 1–31https://doi.org/10.1145/3664810

Mobile apps are ubiquitous in our daily lives for supporting different tasks such as reading and chatting. Despite the availability of many GUI testing tools, app testers still struggle with low testing code coverage due to tools frequently getting stuck ...

SECTION: Continuous Special Section: Human-Centric SE
research-article
Open Access
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems
Article No.: 164, Pages 1–38https://doi.org/10.1145/3654439

Autonomous systems, such as drones and rescue robots, are increasingly used during emergencies. They deliver services and provide situational awareness that facilitate emergency management and response. To do so, they need to interact and cooperate with ...

research-article
What Makes a Good TODO Comment?
Article No.: 165, Pages 1–30https://doi.org/10.1145/3664811

Software development is a collaborative process that involves various interactions among individuals and teams. TODO comments in source code play a critical role in managing and coordinating diverse tasks during this process. However, this study finds ...

SECTION: Survey
survey
A Survey of Source Code Search: A 3-Dimensional Perspective
Article No.: 166, Pages 1–51https://doi.org/10.1145/3656341

(Source) code search is widely concerned by software engineering researchers because it can improve the productivity and quality of software development. Given a functionality requirement usually described in a natural language sentence, a code search ...

Subjects

Comments