ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering.
Tue 7 Jul Times are displayed in time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I1-MetastudiesPaper Presentations / New Ideas and Emerging Results / Technical Papers / Journal First / Demonstrations at Baekje Chair(s): Michael VierhauserJohannes Kepler University Linz | ||
07:00 12mTalk | An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical Technical Papers He ZhangNanjing University, Xin ZhouState Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Xin HuangState Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Huang HuangState Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Muhammad Ali BabarThe University of Adelaide | ||
07:12 8mTalk | An Extended Abstract of "Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors"J1 Journal First Zhi Quan (George) ZhouUniversity of Wollongong, Australia, T.H. TseThe University of Hong Kong, Matt WitheridgeUniversity of Wollongong | ||
07:20 8mTalk | A Procedure and Guidelines for Analyzing Groups of Software Engineering ReplicationsJ1 Journal First Adrian Santos ParrillaUniversity of Oulu, Sira VegasUniversidad Politecnica de Madrid, Markku OivoUniversity of Oulu, Natalia JuristoUniversidad Politecnica de Madrid | ||
07:28 3mTalk | An SLR-Tool: Search Process in PracticeDemo Demonstrations Andreas HinderksUniversity of Seville, Francisco José Domínguez MayoUniversity of Seville, Jörg ThomaschewskiUniversity of Applied Sciences Emden/Leer, María José EscalonaUniversity of Seville | ||
07:31 6mTalk | Threats to Validity in Experimenting Mutation-Based Fault LocalizationNIER New Ideas and Emerging Results | ||
07:37 8mTalk | Methodological Principles for Reproducible Performance Evaluation in Cloud ComputingJ1 Journal First Alessandro Vittorio PapadopoulosMälardalen University, Laurens VersluisVrije Universiteit Amsterdam, André BauerUniversity of Würzburg, Nikolas HerbstUniversity of Würzburg, Joakim von KistowskiUniversity of Würzburg, Ahmed Ali-EldinUMass Amherst, Cristina L. AbadEscuela Superior Politecnica del Litoral, Jose Nelson AmaralUniversity of Alberta, Petr TumaCharles University, Alexandru IosupVrije Universiteit Amsterdam | ||
07:45 8mTalk | Bayesian Data Analysis in Empirical Software Engineering ResearchJ1 Journal First Carlo A. FuriaUniversità della Svizzera italiana (USI), Robert FeldtChalmers | University of Gothenburg, Blekinge Institute of Technology, Richard TorkarChalmers and the University of Gothenburg DOI Pre-print |
07:00 - 08:00 | I2-SecurityPaper Presentations / New Ideas and Emerging Results / Technical Papers at Goguryeo Chair(s): Andrea StoccoUniversità della Svizzera italiana | ||
07:00 12mTalk | Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical Technical Papers Pre-print | ||
07:12 12mTalk | HyDiff: Hybrid Differential Software Analysis Technical Papers Yannic NollerHumboldt-Universität zu Berlin, Corina S. PasareanuCarnegie Mellon University Silicon Valley, NASA Ames Research Center, Marcel BöhmeMonash University, Youcheng SunQueen's University Belfast, Hoang Lam NguyenHumboldt-Universität zu Berlin, Lars GrunskeHumboldt-Universität zu Berlin Pre-print | ||
07:24 12mTalk | Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical Technical Papers Xiyue ZhangPeking University, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Xiaoning DuNanyang Technological University, Qiang HuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University, Meng SunPeking University Pre-print | ||
07:36 12mTalk | One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical Technical Papers Anastasia DanilovaUniversity of Bonn, Alena NaiakshinaUniversity of Bonn, Matthew SmithUniversity of Bonn, Fraunhofer FKIE | ||
07:48 6mTalk | Hey, my data are mine! Active data to empower the userNIER New Ideas and Emerging Results Gian Luca ScocciaUniversity of L'Aquila, Matteo Maria FioreUniversity of L'Aquila, Patrizio PelliccioneUniversity of L'Aquila and Chalmers | University of Gothenburg, Marco AutiliUniversity of L'Aquila, Italy, Paola InverardiUniversity of L'Aquila, Alejandro RussoChalmers University of Technology, Sweden | ||
07:54 6mTalk | Threat modeling: from infancy to maturityNIER New Ideas and Emerging Results Koen Yskoutimec - DistriNet, KU Leuven, Thomas HeymanToreon, Dimitri Van LanduytKatholieke Universiteit Leuven, Laurens Sionimec-DistriNet, KU Leuven, Kim Wuytsimec-DistriNet, KU Leuven, Wouter JoosenKatholieke Universiteit Leuven Pre-print |
08:05 - 09:05 | I5-Deep Learning Testing and DebuggingPaper Presentations / Technical Papers / Demonstrations at Goguryeo Chair(s): Pooyan JamshidiUniversity of South Carolina | ||
08:05 12mTalk | DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical Technical Papers Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Jingwei XuNanjing University, Chang XuNanjing University, Xiaoxing MaNanjing University, Jian LuNanjing University | ||
08:17 12mTalk | White-box Fairness Testing through Adversarial Sampling Technical Papers Peixin ZhangZhejiang University, Jingyi WangNational University of Singapore, Singapore, Jun SunSingapore Management University, Guoliang DongComputer College of Zhejiang University, Xinyu WangZhejiang University, Xingen WangZhejiang University, Jin Song DongNational University of Singapore, Dai TingHuawei Corporation | ||
08:29 3mTalk | FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo Demonstrations Salah GhamiziSntT - University of Luxembourg, Maxime CordySnT, University of Luxembourg, Mike PapadakisUniversity of Luxembourg, Yves Le TraonUniversity of Luxembourg | ||
08:32 3mTalk | EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo Demonstrations Yongqiang TIANThe Hong Kong University of Science and Technology, Zhihua ZengZhejiang University, Ming WenHuazhong University of Science and Technology, China, Yepang LiuSouthern University of Science and Technology, Tzu-yang KuoThe Hong Kong University of Science and Technology, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
08:35 12mTalk | Taxonomy of Real Faults in Deep Learning Systems Technical Papers Nargiz HumbatovaUniversità della Svizzera italiana, Gunel JahangirovaUniversità della Svizzera italiana, Gabriele BavotaUniversità della Svizzera italiana, Vincenzo RiccioUniversità della Svizzera italiana, Andrea StoccoUniversità della Svizzera italiana, Paolo TonellaUniversità della Svizzera italiana | ||
08:47 12mTalk | An Empirical Study on Program Failures of Deep Learning Jobs Technical Papers Ru ZhangMicrosoft Research, Wencong XiaoAlibaba, Hongyu ZhangUniversity of Newcastle, Australia, Yu LiuMicrosoft Research, Haoxiang LinMicrosoft Research, Mao YangMicrosoft Research |
08:05 - 09:05 | I6-Empirical Studies and RequirementsPaper Presentations / Journal First / Software Engineering in Practice / Technical Papers at Silla Chair(s): Ita RichardsonLero - The Irish Software Research Centre and University of Limerick | ||
08:05 8mTalk | What do Programmers Discuss about Deep Learning FrameworksJ1 Journal First Junxiao HanZhejiang University, Emad ShihabConcordia University, Zhiyuan WanZhejiang University, Shuiguang DengZhejiang University, Xin XiaMonash University | ||
08:13 12mTalk | Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnical Technical Papers Lin ShiISCAS, Mingzhe XingISCAS, Mingyang LiISCAS, Yawen WangISCAS, Shoubin LiISCAS, Qing WangInstitute of Software, Chinese Academy of Sciences | ||
08:25 8mTalk | Recognizing lines of code violating company-specific coding guidelines using machine learningJ1 Journal First Miroslaw OchodekPoznan University of Technology, Regina HebigChalmers University of Technology & University of Gothenburg, Wilhelm MedingEricsson, Gert FrostGrundfos, Miroslaw StaronUniversity of Gothenburg | ||
08:33 12mTalk | Context-aware In-process Crowdworker Recommendation Technical Papers Junjie WangInstitute of Software, Chinese Academy of Sciences, Ye YangStevens institute of technology, Song WangYork University, Yuanzhe HuInstitute of Software, Chinese Academy of Sciences, Dandan WangInstitute of Software, Chinese Academy of Sciences, Qing WangInstitute of Software, Chinese Academy of Sciences | ||
08:45 12mTalk | Using a Context-Aware Approach to Recommend Code Reviewers: Findings from an Industrial Case StudySEIP Software Engineering in Practice Anton StrandEricsson AB, Markus GunnarssonEricsson AB, Ricardo BrittoEricsson / Blekinge Institute of Technology, Muhammad UsmanBlekinge Institute of Technology |
09:10 - 10:00 | |||
09:10 50mTalk | SimilarAPI: Mining Analogical APIs for Library MigrationDemo Demonstrations Chunyang ChenMonash University | ||
09:10 50mTalk | EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo Demonstrations Yongqiang TIANThe Hong Kong University of Science and Technology, Zhihua ZengZhejiang University, Ming WenHuazhong University of Science and Technology, China, Yepang LiuSouthern University of Science and Technology, Tzu-yang KuoThe Hong Kong University of Science and Technology, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
09:10 50mTalk | An SLR-Tool: Search Process in PracticeDemo Demonstrations Andreas HinderksUniversity of Seville, Francisco José Domínguez MayoUniversity of Seville, Jörg ThomaschewskiUniversity of Applied Sciences Emden/Leer, María José EscalonaUniversity of Seville | ||
09:10 50mTalk | FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo Demonstrations Salah GhamiziSntT - University of Luxembourg, Maxime CordySnT, University of Luxembourg, Mike PapadakisUniversity of Luxembourg, Yves Le TraonUniversity of Luxembourg |
15:00 - 16:00 | A1-Autonomous Driving SystemsPaper Presentations / Technical Papers at Baekje Chair(s): Donghwan ShinUniversity of Luxembourg (SnT) | ||
15:00 12mTalk | SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in Simulink Technical Papers Shafiul Azam ChowdhuryUniversity of Texas at Arlington, Sohil Lal ShresthaThe University of Texas at Arlington, Taylor T JohnsonVanderbilt University, Christoph CsallnerUniversity of Texas at Arlington Link to publication DOI Media Attached | ||
15:12 12mTalk | DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical Technical Papers Husheng ZhouThe University of Texas at Dallas, Wei LiSouthern University of Science and Technology, Zelun KongThe University of Texas at Dallas, Junfeng GuoThe University of Texas at Dallas, Yuqun ZhangSouthern University of Science and Technology, Lingming ZhangThe University of Texas at Dallas, Bei YuThe Chinese University of Hong Kong, Cong LiuUT Dallas | ||
15:24 12mTalk | Misbehaviour Prediction for Autonomous Driving SystemsTechnical Technical Papers Andrea StoccoUniversità della Svizzera italiana, Michael WeissUniversità della Svizzera Italiana (USI), Marco CalzanaUniversità della Svizzera Italiana (USI), Paolo TonellaUniversità della Svizzera italiana Pre-print | ||
15:36 12mTalk | Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification Technical Papers Claudio MenghiUniversity of Luxembourg, Shiva NejatiUniversity of Ottawa, Lionel BriandSnT Centre/University of Luxembourg, Yago Isasi ParacheLuxSpace | ||
15:48 12mTalk | A Comprehensive Study of Autonomous Vehicle BugsTechnical Technical Papers Joshua GarciaUniversity of California, Irvine, Yang FengNanjing University, Junjie ShenUniversity of California, Irvine, Sumaya AlmaneeUniversity of California, Irvine, Yuan XiaUniversity of California, Irvine, Qi Alfred ChenUniversity of California, Irvine |
15:00 - 16:00 | A3-Code SummarizationPaper Presentations / Technical Papers / New Ideas and Emerging Results at Silla Chair(s): Shaohua WangNew Jersey Institute of Technology, USA | ||
15:00 12mTalk | Posit: Simultaneously Tagging Natural and Programming LanguagesTechnical Technical Papers Profir-Petru PârțachiUniversity College London, Santanu Kumar DashUniversity College London, UK, Christoph TreudeThe University of Adelaide, Earl T. BarrUniversity College London, UK Pre-print Media Attached File Attached | ||
15:12 12mTalk | CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnical Technical Papers Juan ZhaiRutgers University, Xiangzhe XuNanjing University, Yu ShiPurdue University, Guanhong TaoPurdue University, Minxue PanNanjing University, Shiqing MaRutgers University, Lei XuNational Key Laboratory for Novel Software Technology, Nanjing University, Weifeng ZhangNanjing University of Posts and Telecommunications, Lin TanPurdue University, Xiangyu ZhangPurdue University | ||
15:24 12mTalk | Suggesting Natural Method Names to Check Name ConsistenciesTechnical Technical Papers Son NguyenThe University of Texas at Dallas, Hung Phan, Trinh LeUniversity of Engineering and Technology, Tien N. NguyenUniversity of Texas at Dallas Pre-print | ||
15:36 6mTalk | Where should I comment my code? A dataset and model for predicting locations that need commentsNIER New Ideas and Emerging Results Annie LouisUniversity of Edinburgh, Santanu Kumar DashUniversity College London, UK, Earl T. BarrUniversity College London, UK, Michael D. ErnstUniversity of Washington, USA, Charles SuttonGoogle Research | ||
15:42 12mTalk | Retrieval-based Neural Source Code SummarizationTechnical Technical Papers Jian ZhangBeihang University, Xu WangBeihang University, Hongyu ZhangUniversity of Newcastle, Australia, Hailong SunBeihang University, Xudong LiuBeihang University Pre-print | ||
15:54 6mTalk | The Dual Channel HypothesisNIER New Ideas and Emerging Results Casey CasalnuovoUniversity of California at Davis, USA, Earl T. BarrUniversity College London, UK, Santanu Kumar DashUniversity College London, UK, Prem DevanbuUniversity of California, Emily MorganUniversity of California, Davis |
16:05 - 17:05 | A4-Cyber-Physical SystemsPaper Presentations / Software Engineering in Practice / Technical Papers / Demonstrations at Baekje Chair(s): Joanne M. AtleeUniversity of Waterloo | ||
16:05 12mTalk | Adapting Requirements Models to Varying EnvironmentsTechnical Technical Papers Dalal AlrajehImperial College London, Antoine CailliauICTEAM, UCLouvain, Axel van LamsweerdeUniversité catholique de Louvain | ||
16:17 12mTalk | Comparing Formal Tools for System Design: a Judgment StudyTechnical Technical Papers Alessio FerrariCNR-ISTI, Franco MazzantiISTI-CNR, Davide BasileUniversity of Florence, Maurice H. ter BeekISTI-CNR, Alessandro FantechiUniversity of Florence DOI Pre-print | ||
16:29 3mTalk | Demo: SLEMI: Finding Simulink Compiler Bugs through Equivalence Modulo Input (EMI)Demo Demonstrations Shafiul Azam ChowdhuryUniversity of Texas at Arlington, Sohil Lal ShresthaThe University of Texas at Arlington, Taylor T JohnsonVanderbilt University, Christoph CsallnerUniversity of Texas at Arlington Link to publication DOI Media Attached | ||
16:32 12mTalk | The Forgotten Case of the Dependency Bugs: On the Example of the Robot Operating SystemSEIP Software Engineering in Practice Anders Fischer-NielsenIT University of Copenhagen, Zhoulai FuIT University of Copenhagen, Denmark, Ting SuETH Zurich, Switzerland, Andrzej WąsowskiIT University of Copenhagen, Denmark Pre-print | ||
16:44 3mTalk | PROMISE: High-Level Mission Specification for Multiple RobotsDemo Demonstrations Sergio GarciaChalmers | University of Gothenburg, Patrizio PelliccioneUniversity of L'Aquila and Chalmers | University of Gothenburg, Claudio MenghiUniversity of Luxembourg, Thorsten BergerChalmers | University of Gothenburg, Tomas BuresCharles University, Czech Republic | ||
16:47 12mTalk | How do you Architect your Robots? State of the Practice and Guidelines for ROS-based Systems Software Engineering in Practice Ivano MalavoltaVrije Universiteit Amsterdam, Grace LewisCarnegie Mellon Software Engineering Institute, Bradley SchmerlCarnegie Mellon University, USA, Patricia LagoVrije Universiteit Amsterdam, David GarlanCarnegie Mellon University |
Wed 8 Jul Times are displayed in time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P9-Bugs and RepairPaper Presentations / Journal First / Technical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Silla Chair(s): Yingfei XiongPeking University, China | ||
00:00 12mTalk | PRECFIX: Large-Scale Patch Recommendation by Mining Defect-Patch PairsSEIP Software Engineering in Practice Xindong ZhangAlibaba Group, Chenguang ZhuUniversity of Texas, Austin, Yi LiNanyang Technological University, Jianmei GuoAlibaba Group, Lihua LiuAlibaba Group, Haobo GuAlibaba Group Pre-print | ||
00:12 12mTalk | On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs Technical Papers Kui LiuNanjing University of Aeronautics and Astronautics, Shangwen WangNational University of Defense Technology, Anil KoyuncuUniversity of Luxembourg, Luxembourg, Kisub KimUniversity of Luxembourg, SnT, Tegawendé F. BissyandéSnT, University of Luxembourg, Dongsun KimFuriosa.ai, Peng WuNational University of Defense Technology, Jacques KleinUniversity of Luxembourg, SnT, Xiaoguang MaoNational University of Defense Technology, Yves Le TraonUniversity of Luxembourg Pre-print | ||
00:24 8mTalk | SEQUENCER: Sequence-to-Sequence Learning for End-to-End Program RepairJ1 Journal First Zimin ChenKTH Royal Institute of Technology, Steve KommruschColorado State University, Michele TufanoCollege of William and Mary, Louis-Noël PouchetColorado State University, USA, Denys PoshyvanykWilliam and Mary, Martin MonperrusKTH Royal Institute of Technology | ||
00:32 8mTalk | A Study of Bug Resolution Characteristics in Popular Programming LanguagesJ1 Journal First Jie M. ZhangUniversity College London, UK, Feng Li, Dan HaoPeking University, Meng WangUniversity of Bristol, UK, Hao TangPeking University, Lu ZhangPeking University, China, Mark HarmanFacebook and University College London | ||
00:40 12mTalk | Automated Bug Reproduction from User Reviews for Android ApplicationsSEIP Software Engineering in Practice Shuyue LiXi'an Jiaotong University, Jiaqi GuoXi'an Jiaotong University, Ming FanXi'an Jiaotong University, Jian-Guang LouMicrosoft Research, Qinghua ZhengXi'an Jiaotong University, Ting LiuXi'an Jiaotong University | ||
00:52 6mTalk | CHASE: Checklist to Assess User Experience in Internet of Things EnvironmentsNIER New Ideas and Emerging Results Rodrigo AlmeidaFederal University of Ceará, Joseane PaivaFederal University of Ceará, Rossana AndradeFederal University of Ceará, Ticianne DarinFederal University of Ceará |
01:05 - 02:05 | P11-Natural Language ArtifactsPaper Presentations / Journal First / Technical Papers at Goguryeo Chair(s): Jane Cleland-HuangUniversity of Notre Dame | ||
01:05 8mTalk | Neural Network Based Classification of Self-admitted Technical Debt: From Performance to Explainability and DeployabilityJ1 Journal First Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Xin XiaMonash University, David LoSingapore Management University, Xinyu WangZhejiang University, John GrundyMonash University | ||
01:13 8mTalk | Domain-specific Machine Translation with Recurrent Neural Network for Software LocalizationJ1 Journal First Xu WangCollege of Engineering & Computer ScienceAustralian National University, Canberra, Australia, Chunyang ChenMonash University, Zhenchang XingAustralia National University | ||
01:21 12mTalk | Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnical Technical Papers |
01:05 - 02:05 | P12-Testing and DebuggingPaper Presentations / Journal First / Software Engineering in Practice at Silla Chair(s): Taeksu KimSamsung Research, Samsung Electronics | ||
01:05 12mTalk | Debugging Crashes using Continuous Contrast Set MiningSEIP Software Engineering in Practice Rebecca QianFacebook, Inc., Yang YuPurdue University, Wonhee ParkFacebook, Inc., Vijayaraghavan MuraliFacebook, Inc., Stephen J FinkFacebook, Satish ChandraFacebook | ||
01:17 12mTalk | Automatic Abnormal Log Detection by Analyzing Log History for Providing Debugging InsightSEIP Software Engineering in Practice Jinhan Kim, Valeriy SavchenkoIvannikov Institute for System Programming of the RAS, Kihyuck ShinSamsung Electronics, Konstantin SorokinIvannikov Institute for System Programming of the RAS, Hyunseok JeonSamsung Electronics, Georgiy PankratenkoIvannikov Institute for System Programming of the RAS, Sergey MarkovIvannikov Institute for System Programming of the RAS, Chul-Joo KimSamsung Electronics | ||
01:29 8mTalk | Explaining Regressions via Alignment Slicing and MendingJ1 Journal First Haijun WangAnt Financial Services Group, China; CSSE, Shenzhen University, China, Yun LinNational University of Singapore, Zijiang YangWestern Michigan University, Jun SunSingapore Management University, Yang LiuNanyang Technological University, Singapore, Jin Song DongNational University of Singapore, Qinghua ZhengXi'an Jiaotong University, Ting LiuXi'an Jiaotong University | ||
01:37 8mTalk | Historical Spectrum based Fault LocalizationJ1 Journal First Ming WenHuazhong University of Science and Technology, China, Junjie ChenTianjin University, China, Yongqiang TIANThe Hong Kong University of Science and Technology, Rongxin WuDepartment of Cyber Space Security, Xiamen University, Dan HaoPeking University, Shi HanMicrosoft Research Asia, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
01:45 8mTalk | Visualizing distributed system executionsJ1 Journal First Ivan BeschastnikhComputer Science, University of British Columbia, Perry LiuUniversity of British Columbia, Albert XingUniversity of British Columbia, Patty WangUniversity of British Columbia, Yuriy BrunUniversity of Massachusetts Amherst, Michael D. ErnstUniversity of Washington, USA DOI Pre-print | ||
01:53 8mTalk | An Integration Test Order Strategy to Consider Control CouplingJ1 Journal First Shujuan JiangChina University of Mining and Technology, Miao ZHANGCity University of Hong Kong, Yanmei ZHANGChina University of Mining and Technology, Rongcun WangChina University of Mining and Technology, Qiao YUJiangsu Normal University, Jacky KeungCity University of Hong Kong |
15:00 - 16:00 | A8-Machine Learning and ModelsPaper Presentations / Journal First / Technical Papers at Goguryeo Chair(s): Liliana PasqualeUniversity College Dublin & Lero | ||
15:00 8mTalk | Improving Vulnerability Inspection Efficiency Using Active LearningJ1 Journal First Zhe YuNORTH CAROLINA STATE UNIVERSITY, Chris TheisenMicrosoft, Laurie WilliamsNorth Carolina State University, Tim MenziesNorth Carolina State University | ||
15:08 8mTalk | How Bugs Are Born: A Model to Identify How Bugs Are Introduced in Software ComponentsJ1 Journal First Gema Rodríguez-PérezUniversity of Waterloo, Canada, Gregorio RoblesUniversidad Rey Juan Carlos, Alexander SerebrenikEindhoven University of Technology, Andy ZaidmanTU Delft, Daniel M. GermanUniversity of Victoria, Jesus M. Gonzalez-BarahonaUniversidad Rey Juan Carlos DOI Pre-print | ||
15:16 8mTalk | How to “DODGE” Complex Software AnalyticsJ1 Journal First Amritanshu AgrawalWayfair, Wei FuLanding AI, Di ChenNorth Carolina State University, USA, Xipeng ShenNorth Carolina State University, Tim MenziesNorth Carolina State University | ||
15:24 12mTalk | Importance-Driven Deep Learning System TestingTechnical Technical Papers Simos GerasimouUniversity of York, UK, Hasan Ferit EniserMPI-SWS, Alper SenBogazici University, Turkey, Alper ÇakanBogazici University, Turkey | ||
15:36 12mTalk | Quickly Generating Diverse Valid Test Inputs with Reinforcement Learning Technical Papers Sameer ReddyUniversity of California, Berkeley, Caroline LemieuxUniversity of California, Berkeley, Rohan PadhyeCarnegie Mellon University, Koushik SenUniversity of California, Berkeley | ||
15:48 8mTalk | Impact of Discretization Noise of the Dependent variable on Machine Learning Classifiers in Software EngineeringJ1 Journal First Gopi Krishnan RajbahadurQueen's University, Shaowei WangMississippi State University, Yasutaka KameiKyushu University, Ahmed E. HassanQueen's University |
16:05 - 17:05 | A10-Human Aspects 2Paper Presentations / Journal First / Technical Papers at Baekje Chair(s): Giuseppe ScannielloUniversity of Basilicata | ||
16:05 8mTalk | Characterizing and Identifying Reverted CommitsJ1 Journal First Meng YanChongqing University, Xin XiaMonash University, David LoSingapore Management University, Ahmed E. HassanQueen's University, Shanping LiZhejiang University | ||
16:13 8mTalk | An Empirical Study of Obsolete Answers on Stack OverflowJ1 Journal First Haoxiang ZhangSoftware Analysis and Intelligence Lab (SAIL), Queen’s University, Kingston, Ontario, Canada, Shaowei WangMississippi State University, Tse-Hsun (Peter) ChenConcordia University, Ying ZouQueen's University, Kingston, Ontario, Ahmed E. HassanQueen's University | ||
16:21 8mTalk | An Empirical Characterization of Bad Practices in Continuous IntegrationJ1 Journal First Fiorella ZampettiUniversity of Sannio, Carmine VassalloUniversity of Zurich, Sebastiano PanichellaZurich University of Applied Sciences, Gerardo CanforaUniversity of Sannio, Harald GallUniversity of Zurich, Massimiliano Di PentaUniversity of Sannio Link to publication DOI Pre-print | ||
16:29 8mTalk | To the Attention of Mobile Software Developers: Guess What, Test your App!J1 Journal First Luís CruzDeflt University of Technology, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID, David LoSingapore Management University DOI Pre-print Media Attached | ||
16:37 12mTalk | Primers or Reminders? The Effects of Existing Review Comments on Code Review Technical Papers Davide SpadiniDelft University of Technology, Netherlands, Gül CalikliChalmers | University of Gothenburg, Alberto BacchelliUniversity of Zurich DOI Pre-print Media Attached |
16:05 - 17:05 | A12-TestingPaper Presentations / Journal First / New Ideas and Emerging Results / Demonstrations / Technical Papers at Silla Chair(s): Sasa MisailovicUniversity of Illinois at Urbana-Champaign | ||
16:05 12mTalk | Practical Fault Detection in Puppet Programs Technical Papers Thodoris SotiropoulosAthens University of Economics and Business, Dimitris MitropoulosAthens University of Economics and Business, Diomidis SpinellisAthens University of Economics and Business | ||
16:17 8mTalk | Empirical Assessment of Multimorphic TestingJ1 Journal First Paul TemplePReCISE, NaDi, UNamur, Mathieu Acher(Univ Rennes, Inria, IRISA), Jean-Marc JézéquelUniv Rennes - IRISA | ||
16:25 3mTalk | RTj: a Java framework for detecting and refactoring rotten green test casesDemo Demonstrations Matias MartinezUniversité Polytechnique Hauts-de-France, Anne EtienUniversité de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL, Stéphane Ducasse INRIA Lille, Christopher FuhrmanÉcole de technologie supérieure Pre-print Media Attached | ||
16:28 6mTalk | A Container-Based Infrastructure for Fuzzy-Driven Root Causing of Flaky TestsNIER New Ideas and Emerging Results Valerio TerragniUniversità della Svizzera Italiana, Pasquale SalzaUniversity of Zurich, Filomena FerrucciUniversity of Salerno Pre-print Media Attached | ||
16:34 12mTalk | Learning from, Understanding, and Supporting DevOps Artifacts for Docker Technical Papers Jordan HenkelUniversity of Wisconsin–Madison, Christian BirdMicrosoft Research, Shuvendu LahiriMicrosoft Research, Thomas RepsUniversity of Wisconsin-Madison, USA | ||
16:46 8mTalk | Improving Change Prediction Models with Code Smell-Related InformationJ1 Journal First Gemma CatolinoDelft University of Technology, Fabio PalombaUniversity of Salerno, Francesca Arcelli FontanaUniversity of Milano-Bicocca, Andrea De LuciaUniversity of Salerno, Andy ZaidmanTU Delft, Filomena FerrucciUniversity of Salerno DOI Pre-print | ||
16:54 3mTalk | SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo Demonstrations Phu X. MaiUniversity of Luxembourg, Arda GoknilSnT, University of Luxembourg, Fabrizio PastoreUniversity of Luxembourg, Lionel C. BriandSnT Centre/University of Luxembourg |
17:10 - 18:00 | |||
17:10 50mTalk | PG-KLEE: Trading Soundness for CoverageDemo Demonstrations | ||
17:10 50mTalk | SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo Demonstrations Phu X. MaiUniversity of Luxembourg, Arda GoknilSnT, University of Luxembourg, Fabrizio PastoreUniversity of Luxembourg, Lionel C. BriandSnT Centre/University of Luxembourg | ||
17:10 50mTalk | Nimbus: Improving the Developer Experience for Serverless ApplicationsDemo Demonstrations Pre-print |
Thu 9 Jul Times are displayed in time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | P14-TestingPaper Presentations / Technical Papers / Software Engineering in Practice at Goguryeo Chair(s): Shin YooKorea Advanced Institute of Science and Technology | ||
00:00 12mTalk | Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical Technical Papers Dehai ZhaoAustralian National University, Zhenchang XingAustralia National University, Chunyang ChenMonash University, Xiwei XuData 61, Liming ZhuCSIRO's Data61 and UNSW, Guoqiang LiShanghai Jiao Tong University, Jinshui WangSchool of Information Science and Engineering, Fujian University of Technology, Fuzhou, China | ||
00:12 12mTalk | Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical Technical Papers Xiang GaoNational University of Singapore, Singapore, Ripon SahaFujitsu Laboratories of America, Inc., Mukul R. PrasadFujitsu Laboratories of America, Inc, Abhik RoychoudhuryNational University of Singapore, Singapore | ||
00:24 12mTalk | Modeling and Ranking Flaky Tests at AppleSEIP Software Engineering in Practice Emily KowalczykApple Inc., Karan NairApple, Zebao GaoApple, Leopold SilbersteinApple Inc., Teng LongApple, Atif MemonApple Inc. | ||
00:36 12mTalk | Testing File System Implementations on Layered ModelsTechnical Technical Papers Dongjie ChenNanjing University, Yanyan JiangNanjing University, Chang XuNanjing University, Xiaoxing MaNanjing University, Jian LuNanjing University | ||
00:48 12mTalk | A Cost-efficient Approach to Building in Continuous IntegrationTechnical Technical Papers Pre-print |
01:05 - 02:05 | P16-Security and LearningPaper Presentations / Technical Papers / Journal First at Baekje Chair(s): Lingming ZhangThe University of Texas at Dallas | ||
01:05 12mTalk | Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical Technical Papers Jinyin ChenCollege of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Keke HuCollege of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Yue YuCollege of Computer, National University of Defense Technology, Changsha 410073, China, Zhuangzhi ChenCollege of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Qi XuanInstitute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China, Yi LiuInstitute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Vladimir FilkovUniversity of California at Davis, USA | ||
01:17 8mTalk | Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer LearningJ1 Journal First Suyu MaMonash University, Zhenchang XingAustralia National University, Chunyang ChenMonash University, Cheng ChenPricewaterhouseCoopers Firm, Lizhen QuMonash University, Guoqiang LiShanghai Jiao Tong University | ||
01:25 12mTalk | How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?Technical Technical Papers Xueling ZhangUniversity of Texas at San Antonio, Xiaoyin WangUniversity of Texas at San Antonio, USA, Rocky SlavinUniversity of Texas at San Antonio, Travis BreauxCarnegie Mellon University, Jianwei NiuUniversity of Texas at San Antonio | ||
01:37 12mTalk | Securing UnSafe Rust Programs with XRust Technical Papers | ||
01:49 12mTalk | Is Rust Used Safely by Software Developers?Technical Technical Papers Ana Nora EvansUniversity of Virginia, USA, Bradford CampbellUniversity of Virginia, Mary Lou SoffaUniversity of Virginia |
01:05 - 02:05 | P17-Software DevelopmentPaper Presentations / Journal First / Technical Papers / Demonstrations at Goguryeo Chair(s): Minghui ZhouPeking University | ||
01:05 8mTalk | Improving the Pull Requests Review Process Using Learning-to-rank AlgorithmsJ1 Journal First Guoliang ZhaoComputer Science of Queen's University, Daniel Alencar Da CostaUniversity of Otago, Ying ZouQueen's University, Kingston, Ontario | ||
01:13 8mTalk | Understanding the motivations, challenges and needs of Blockchain software developers: a surveyJ1 Journal First Amiangshu BosuWayne State University, Anindya IqbalBangladesh University of Engineering and Technology Dhaka, Bangladesh, Rifat ShahriyarBangladesh University of Engineering and Technology Dhaka, Bangladesh, Partho ChakrabortyBangladesh University of Engineering and Technology Dhaka, Bangladesh | ||
01:21 12mTalk | Gap between Theory and Practice : An Empirical Study of Security Patches in Solidity Technical Papers | ||
01:33 12mTalk | A Tale from the Trenches: Cognitive Biases and Software Development Technical Papers Souti ChattopadhyayGraduate Student, Nicholas NelsonOregon State University, Audrey AuOregon State University, Natalia MoralesOregon State University, Christopher SanchezOregon State University, Rahul PanditaPhase Change Software, Anita SarmaOregon State University | ||
01:45 3mTalk | VITALSE: Visualizing Eye Tracking and Biometric DataDemo Demonstrations Devjeet RoyWashington State University, Sarah FakhouryWashington State University, Venera ArnaoudovaWashington State University Pre-print |
02:10 - 03:00 | |||
02:10 50mTalk | VITALSE: Visualizing Eye Tracking and Biometric DataDemo Demonstrations Devjeet RoyWashington State University, Sarah FakhouryWashington State University, Venera ArnaoudovaWashington State University Pre-print |
07:00 - 08:00 | I15-Ecosystems 1Paper Presentations / Technical Papers / Software Engineering in Practice / Journal First at Silla Chair(s): Raula Gaikovina KulaNAIST | ||
07:00 12mTalk | Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical Technical Papers Wanwangying MaNanjing University, Lin ChenNanjing University, Xiangyu ZhangPurdue University, Yang FengNanjing University, Zhaogui XuNanjing University, China, Zhifei ChenHuawei, Yuming ZhouNanjing University, Baowen XuNanjing University | ||
07:12 8mTalk | SIEVE: Helping Developers Sift Wheat from Chaff via Cross-Platform AnalysisJ1 Journal First Agus SulistyaTelkom Institute of Technology Surabaya, Gede Artha Azriadi PranaSingapore Management University, Abhishek Sharma Singapore Management University, Singapore, David LoSingapore Management University, Christoph TreudeThe University of Adelaide | ||
07:20 18mTalk | Sharing at Scale: An Open-Source-Software-based License Compliance EcosystemSEIP Software Engineering in Practice | ||
07:38 8mTalk | Extended abstract “Software Deployment on Heterogeneous Platforms: A Systematic Mapping Study”J1 Journal First Hugo AndradeChalmers University of Technology, Jan SchroederChalmers | University of Gothenburg, Ivica CrnkovicChalmers | University of Gothenburg | ||
07:46 8mTalk | A Large Scale Study of Long-Time Contributor Prediction for GitHub ProjectsJ1 Journal First Lingfeng Bao Zhejiang University, Xin XiaMonash University, David LoSingapore Management University, Gail MurphyUniversity of British Columbia |
08:05 - 09:05 | I16-Testing and Debugging 2Paper Presentations / Technical Papers / Journal First at Baekje Chair(s): Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID | ||
08:05 12mTalk | Low-Overhead Deadlock PredictionTechnical Technical Papers Yan CaiInstitute of Software, Chinese Academy of Sciences, Ruijie MengUniversity of Chinese Academy of Sciences, Jens PalsbergUniversity of California, Los Angeles | ||
08:17 8mTalk | The Impact of Feature Reduction Techniques on Defect Prediction ModelsJ1 Journal First Masanari KondoKyoto Institute of Technology, Cor-Paul BezemerUniversity of Alberta, Canada, Yasutaka KameiKyushu University, Ahmed E. HassanQueen's University, Osamu MizunoKyoto Institute of Technology | ||
08:25 8mTalk | The Impact of Correlated Metrics on the Interpretation of Defect ModelsJ1 Journal First Jirayus JiarpakdeeMonash University, Australia, Chakkrit TantithamthavornMonash University, Australia, Ahmed E. HassanQueen's University | ||
08:33 8mTalk | The Impact of Mislabeled Changes by SZZ on Just-in-Time Defect PredictionJ1 Journal First Yuanrui FanZhejiang University, Xin XiaMonash University, Daniel Alencar Da CostaUniversity of Otago, David LoSingapore Management University, Ahmed E. HassanQueen's University, Shanping LiZhejiang University | ||
08:41 8mTalk | Which Variables Should I Log?J1 Journal First Zhongxin LiuZhejiang University, Xin XiaMonash University, David LoSingapore Management University, Zhenchang XingAustralia National University, Ahmed E. HassanQueen's University, Shanping LiZhejiang University | ||
08:49 12mTalk | Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnical Technical Papers Ke LiUniversity of Exeter, Zilin XiangUniversity of Electronic Science and Technology of China, Tao ChenLoughborough University, Shuo Wang, Kay Chen TanCity University of Hong Kong Pre-print |
08:05 - 09:05 | I17-Contracts and AnalysisPaper Presentations / Demonstrations / Technical Papers / Software Engineering in Practice / Journal First at Goguryeo Chair(s): Jaechang NamHandong Global University | ||
08:05 10mTalk | How to reduce risk effectively in fixed price software developmentSEIP Software Engineering in Practice | ||
08:15 10mTalk | Seraph: Enabling Cross-Platform Security Analysis For EVM and WASM Smart ContractsDemo Demonstrations Zhiqiang YangOxford-Hainan Blockchain Research Institute, Han LiuTsinghua University, Yue LiOxford-Hainan Blockchain Research Institute, Huixuan ZhengOxford-Hainan Blockchain Research Institute, Lei WangOxford-Hainan Blockchain Research Institute, Bangdao ChenOxford-Hainan Blockchain Research Institute | ||
08:25 10mTalk | Escape from Escape Analysis of GolangSEIP Software Engineering in Practice Cong WangTsinghua University, Mingrui ZhangTsinghua University, Beijing, China, Yu Jiang, Huafeng ZhangHuawei Technologies, Hangzhou, China, Zhenchang XingAustralia National University, Ming Gu | ||
08:35 10mTalk | Smart Contract Development: Challenges and OpportunitiesJ1 Journal First Weiqin ZouNanjing University, David LoSingapore Management University, Pavneet Singh KochharMicrosoft, Xuan-Bach D. LeSingapore Management University, Singapore, Xin XiaMonash University, Yang FengNanjing University, Zhenyu ChenNanjing University, Baowen XuNanjing University | ||
08:45 10mTalk | Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts Technical Papers Thomas DurieuxKTH Royal Institute of Technology, Sweden, João F. FerreiraINESC-ID and IST, University of Lisbon, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID, Pedro CruzIST, University of Lisbon, Portugal Pre-print | ||
08:55 10mTalk | An Extended Abstract of “METRIC+: A Metamorphic Relation Identification Technique Based on Input Plus Output Domains”J1 Journal First Chang-ai SunUniversity of Science and Technology Beijing, An FuUniversity of Science and Technology Beijing, Pak-Lok PoonSchool of Engineering & Technology, Central Queensland University, Australia, Xiaoyuan XieSchool of Computer Science, Wuhan University, China, Huai LiuSwinburne University of Technology, Tsong Yueh ChenSwinburne University of Technology |
08:05 - 09:05 | I18-APIs and CommitsPaper Presentations / New Ideas and Emerging Results / Journal First / Technical Papers at Silla Chair(s): Massimiliano Di PentaUniversity of Sannio | ||
08:05 8mTalk | Enriching API Documentation with Code Samples and Usage Scenarios from Crowd KnowledgeJ1 Journal First Jingxuan ZhangNanjing University of Aeronautics and Astronautics, He JiangSchool of Software, Dalian University of Technology, Zhilei RenDalian University of Technology, Tao ZhangHarbin Engineering University, Zhiqiu HuangNanjing University of Aeronautics and Astronautics | ||
08:13 6mTalk | Cooperative API Misuse Detection Using Correction RulesNIER New Ideas and Emerging Results Sebastian NielebockOtto-von-Guericke University Magdeburg, Germany, Robert HeumüllerChair of Software Engineering, Faculty of Computer Science, Otto-von-Guericke-University Magdeburg, Jacob KrügerOtto von Guericke University Magdeburg, Frank OrtmeierOtto-von-Guericke-University Magdeburg, Faculty of Computer Science, Chair of Software Engineering DOI Pre-print | ||
08:19 12mTalk | How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical Technical Papers Hao XiaFudan University, Yuan ZhangFudan University, Yingtian ZhouFudan University, Xiaoting ChenFudan University, Yang WangFudan University, Xiangyu ZhangPurdue University, Shuaishuai CuiFudan University, Geng HongFudan University, Xiaohan ZhangFudan University, Min YangFudan University, Zhemin YangFudan University | ||
08:31 12mTalk | An Empirical Study on API Parameter RulesTechnical Technical Papers | ||
08:43 6mTalk | Boosting Automated Program Repair with Bug-Inducing CommitsNIER New Ideas and Emerging Results Ming WenHuazhong University of Science and Technology, China, Yepang LiuSouthern University of Science and Technology, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
08:49 12mTalk | Software Documentation: The Practitioners' PerspectiveTechnical Technical Papers Emad AghajaniSoftware Institute, USI - Lugano, Switzerland, Csaba NagySoftware Institute - USI, Lugano, Switzerland, Mario Linares-VásquezUniversidad de los Andes, Laura MorenoColorado State University, Gabriele BavotaUniversità della Svizzera italiana, Michele LanzaUniversita della Svizzera italiana (USI), David C. ShepherdVirginia Commonwealth University Pre-print Media Attached |
09:10 - 10:00 | |||
09:10 50mTalk | GeekyNote: A Technical Documentation Tool with Coverage, Backtracking, Traces, and CouplingsDemo Demonstrations Yung-Pin ChengNational Central University, Wei-Nien HsiungNational Central University, Yu-Shan WuIsCoollab Co. Ltd, Li-Hsuan ChenIsCoollab Co. Ltd |
Fri 10 Jul Times are displayed in time zone: (UTC) Coordinated Universal Time change
07:00 - 08:00 | I20-Android TestingPaper Presentations / Technical Papers at Goguryeo Chair(s): Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology | ||
07:00 12mTalk | Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnical Technical Papers Jiwei YanInstitute of Software, Chinese Academy of Sciences, Hao LiuBeijing University of Technology, Linjie PanInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences, Bin LiangRenmin University of China, China | ||
07:12 12mTalk | Time-travel Testing of Android Apps Technical Papers Zhen DongNational University of Singapore, Marcel BöhmeMonash University, Lucia CojocaruPolitehnica University of Bucharest, Abhik RoychoudhuryNational University of Singapore, Singapore | ||
07:24 12mTalk | Collaborative Bug Finding for Android AppsTechnical Technical Papers Shin Hwei TanSouthern University of Science and Technology, Ziqiang LiSouthern University of Science and Technology Media Attached File Attached | ||
07:36 12mTalk | An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical Technical Papers Sen ChenNanyang Technological University, Singapore, Lingling FanNanyang Technological University, Singapore, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Ting SuETH Zurich, Switzerland, Jason Minhui XueThe University of Adelaide, Yinxing Xue, Yang LiuNanyang Technological University, Singapore, Lihua XuNew York University Shanghai Pre-print | ||
07:48 12mTalk | RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical Technical Papers Ju QianNanjing University of Aeronautics and Astronautics, Zhengyu ShangNanjing University of Aeronautics and Astronautics, Shuoyan YanNanjing University of Aeronautics and Astronautics, Yan Wang, Lin ChenNanjing University |
07:00 - 08:00 | I21-Version Control and ProgrammingPaper Presentations / Technical Papers / Journal First / Software Engineering in Practice at Silla Chair(s): Sunghun KimHong Kong University of Science and Technology | ||
07:00 12mTalk | Towards Understanding and Fixing Upstream Merge Induced Conflicts in Divergent Forks: An industrial Case StudySEIP Software Engineering in Practice Chungha SungUniversity of Southern California, Shuvendu LahiriMicrosoft Research, Mike KaufmanMicrosoft Corporation, Pallavi ChoudhuryMicrosoft Corporation, Chao WangUSC | ||
07:12 8mTalk | Version Control Systems: An Information Foraging PerspectiveJ1 Journal First Sruti Srinivasa RagavanMicrosoft Research; School of EECS, Oregon State University, Mihai CodobanMicrosoft, David PiorkowskiIBM Research AI, Danny DigUniversity of Colorado, Boulder, Margaret BurnettOregon State University | ||
07:20 8mTalk | How different are different diff algorithms in Git?J1 Journal First Yusuf Sulistyo NugrohoNara Institute of Science and Technology, Hideaki HataNara Institute of Science and Technology, Kenichi MatsumotoNara Institute of Science and Technology DOI Media Attached | ||
07:28 8mTalk | Characterizing the Usage, Evolution and Impact of Java Annotations in PracticeJ1 Journal First Zhongxing YuKTH Royal Institute of Technology, Chenggang BaiBeihang University, Lionel Seinturier, Martin MonperrusKTH Royal Institute of Technology | ||
07:36 8mTalk | Why Reinventing the Wheels? An Empirical Study on Library Reuse and Re-implementationJ1 Journal First Bowen XuSingapore Management University, Le AnPolytechnique Montreal, Ferdian ThungSingapore Management University, Foutse KhomhPolytechnique Montréal, David LoSingapore Management University | ||
07:44 12mTalk | HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnical Technical Papers Aishwarya SivaramanUniversity of California, Los Angeles, Jason LauUniversity of California, Los Angeles, Qian ZhangUniversity of California, Los Angeles, Muhammad Ali GulzarUniversity of California, Los Angeles, Jason CongUCLA, Miryung KimUniversity of California, Los Angeles DOI |
08:05 - 09:05 | I22-TestingPaper Presentations / Technical Papers / Demonstrations at Baekje Chair(s): Phil McMinnUniversity of Sheffield | ||
08:05 3mTalk | FuRong: Fusing Report of Automated Android Testing on Multi-DevicesDemo Demonstrations Yuanhan TianNanjing University, Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Peiyuan LiNanjing University | ||
08:08 12mTalk | MemLock: Memory Usage Guided Fuzzing Technical Papers Cheng WenShenzhen University, Haijun WangAnt Financial Services Group, China; CSSE, Shenzhen University, China, Yuekang LiNanyang Technological University, Shengchao QinUniversity of Teesside, Yang LiuNanyang Technological University, Singapore, Zhiwu XuShenzhen University, Hongxu ChenResearch Associate, Xiaofei XieNanyang Technological University, Geguang PuEast China Normal University, Ting LiuXi'an Jiaotong University DOI Pre-print Media Attached | ||
08:20 12mTalk | Symbolic Verification of Message Passing Interface Programs Technical Papers Hengbiao YuNational University of Defense Technology, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Xianjin FuNational University of Defense Technology, Ji WangSchool of Computer, National University of Defense Technology, China, Zhendong SuETH Zurich, Switzerland, Jun SunSingapore Management University, Chun HuangNational University of Defense Technology, Wei DongSchool of Computer, National University of Defense Technology, China Pre-print | ||
08:32 12mTalk | SAVER: Scalable, Precise, and Safe Memory-Error Repair Technical Papers Seongjoon HongKorea University, Junhee LeeKorea University, South Korea, Jeongsoo LeeKorea University, Hakjoo OhKorea University, South Korea | ||
08:44 12mTalk | A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical Technical Papers Bingchang LiuKey Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Chao ZhangInstitute for Network Sciences and Cyberspace of Tsinghua University, Feng LiKey Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Qi GongKey Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Min LinInstitute for Network Sciences and Cyberspace of Tsinghua University, Dandan SunKey Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Wei HuoInstitute of Information Engineering, Chinese Academy of Sciences, Wei ZouKey Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China | ||
08:56 3mTalk | MPI-SV: A Symbolic Verifier for MPI ProgramsDemo Demonstrations Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao YuNational University of Defense Technology, Xianjin FuNational University of Defense Technology, Ji WangSchool of Computer, National University of Defense Technology, China Pre-print |
08:05 - 09:05 | I23-Code Artifact AnalysisPaper Presentations / Journal First / Technical Papers at Goguryeo Chair(s): Benoit BaudryKTH Royal Institute of Technology | ||
08:05 12mTalk | Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical Technical Papers Qingkai ShiThe Hong Kong University of Science and Technology, Rongxin WuDepartment of Cyber Space Security, Xiamen University, Gang FanHong Kong University of Science and Technology, Charles ZhangThe Hong Kong University of Science and Technology | ||
08:17 12mTalk | Pipelining Bottom-up Data Flow AnalysisTechnical Technical Papers Qingkai ShiThe Hong Kong University of Science and Technology, Charles ZhangThe Hong Kong University of Science and Technology | ||
08:29 8mTalk | An Empirical Validation of Oracle ImprovementJ1 Journal First Gunel JahangirovaUniversità della Svizzera italiana, David ClarkUniversity College London, Mark Harman, Paolo TonellaUniversità della Svizzera italiana | ||
08:37 8mTalk | Is Static Analysis Able to Identify Unnecessary Source Code?J1 Journal First Roman HaasCQSE GmbH, Rainer NiedermayrCQSE GmbH, Tobias RoehmCQSE GmbH, Sven ApelSaarland University Pre-print | ||
08:45 8mTalk | Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1 Journal First Mohammadreza GhanavatiHeidelberg University, Diego CostaConcordia University, Canada, Janos SeboekHeidelberg University, David LoSingapore Management University, Artur AndrzejakHeidelberg University | ||
08:53 8mTalk | Towards Understanding and Detecting Fake Reviews in App StoresJ1 Journal First |
09:10 - 10:00 | |||
09:10 50mTalk | MPI-SV: A Symbolic Verifier for MPI ProgramsDemo Demonstrations Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao YuNational University of Defense Technology, Xianjin FuNational University of Defense Technology, Ji WangSchool of Computer, National University of Defense Technology, China Pre-print |
15:00 - 16:00 | A21-Testing and Debugging 3Paper Presentations / Journal First / Technical Papers at Silla Chair(s): Tingting YuUniversity of Kentucky | ||
15:00 12mTalk | Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical Technical Papers Dirk van der LindenUniversity of Bristol, Pauline AnthonysamyGoogle Inc., Bashar NuseibehThe Open University (UK) & Lero (Ireland), Thein Tun, Marian PetreThe Open University, Mark LevineLancaster University, John TowseLancaster University, Awais RashidUniversity of Bristol, UK | ||
15:12 8mTalk | Smart Greybox FuzzingJ1 Journal First Van-Thuan PhamMonash University, Marcel BöhmeMonash University, Andrew SantosaNational University of Singapore, Alexandru Răzvan CăciulescuUiPath, Abhik RoychoudhuryNational University of Singapore, Singapore | ||
15:20 8mTalk | Deep Transfer Bug LocalizationJ1 Journal First Xuan HuoNanjing University, Ferdian ThungSingapore Management University, Ming LiNanjing University, David LoSingapore Management University, Shu-Ting ShiNanjing University | ||
15:28 8mTalk | A Benchmark-Based Evaluation of Search-Based Crash ReproductionJ1 Journal First Mozhan SoltaniLeiden University, Pouria DerakhshanfarDelft University of Technology, Xavier DevroeyDelft University of Technology, Arie van DeursenDelft University of Technology Link to publication DOI Pre-print Media Attached | ||
15:36 12mTalk | An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical Technical Papers Sadia TabassumUniversity of Birmingham, UK, Leandro MinkuUniversity of Birmingham, UK, Danyi FengXiLiu Tech, George CabralUniversidade Federal Rural de Pernambuco, Liyan SongUniversity of Birmingham | ||
15:48 8mTalk | An Empirical Study of the Long Duration of Continuous Integration BuildsJ1 Journal First Taher Ahmed GhalebQueen's University, Daniel Alencar Da CostaUniversity of Otago, Ying ZouQueen's University, Kingston, Ontario Link to publication DOI Pre-print |
16:05 - 17:05 | A23-RequirementsPaper Presentations / Journal First / Technical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Dalal AlrajehImperial College London | ||
16:05 12mTalk | Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical Technical Papers | ||
16:17 8mTalk | Dealing with Non-Functional Requirements in Model-Driven Development: A SurveyJ1 Journal First David AmellerUniversitat Politècnica de Catalunya, Xavier FranchUniversitat Politècnica de Catalunya, Cristina GómezUniversitat Politècnica de Catalunya, Silverio Martínez-FernándezUPC-BarcelonaTech, João AraújoUniversidade Nova de Lisboa, Stefan BifflVienna University of Technology, Jordi CabotICREA - UOC, Vittorio CortellesaUniversity of L’Aquila, Daniel MendezTechnische Universität München, Ana MoreiraFCT / Universidade Nova de Lisboa, Henry MucciniUniversity of L'Aquila, Italy, Antonio VallecilloUniversity of Málaga, Spain, Manuel WimmerJohannes Kepler University Linz, Vasco AmaralUniversidade Nova de Lisboa, Wolfang BöhmTechnische Universität München, Hugo BrunelièreInria, Mines Nantes & LINA, Loli BurgueñoUniversidad de Malaga, Miguel GoulaoNOVA-LINCS, FCT/UNL, Sabine TeuflFortiss GmbH, Luca BerardinelliJohannes Kepler University Linz | ||
16:25 8mTalk | Locating Latent Design Information in Developer Discussions: A Study on Pull RequestsJ1 Journal First Giovanni VivianiUniversity of British Columbia, Michalis FamelisUniversité de Montréal, Xin XiaMonash University, Calahan Janik-JonesUniversity of Toronto, Gail MurphyUniversity of British Columbia | ||
16:33 8mTalk | Status Quo in Requirements Engineering: A Theory and a Global Family of SurveysJ1 Journal First Stefan WagnerUniversity of Stuttgart Link to publication DOI Pre-print | ||
16:41 8mTalk | Corba: Crowdsourcing to Obtain Requirements from Regulations and BreachesJ1 Journal First Hui GuoNorth Carolina State University, Ozgur KafaliUniversity of Kent, Anne-Liz JeukengUniversity of Florida, Laurie WilliamsNorth Carolina State University, Munindar P. SinghNorth Carolina State University | ||
16:49 6mTalk | With Registered Reports Towards Large Scale Data CurationNIER New Ideas and Emerging Results Steffen HerboldUniversity of Göttingen Pre-print |
16:05 - 17:05 | A24-Testing and Debugging 4Paper Presentations / Technical Papers / New Ideas and Emerging Results / Journal First / Demonstrations at Silla Chair(s): Yijun YuThe Open University, UK | ||
16:05 6mTalk | Manifold for Machine Learning AssuranceNIER New Ideas and Emerging Results | ||
16:11 12mTalk | On Learning Meaningful Assert Statements for Unit Test CasesTechnical Technical Papers Cody WatsonWashington and Lee University, Michele TufanoMicrosoft, Kevin MoranWilliam & Mary/George Mason University, Gabriele BavotaUniversità della Svizzera italiana, Denys PoshyvanykWilliam and Mary Pre-print Media Attached | ||
16:23 12mTalk | TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks Technical Papers Guanhong TaoPurdue University, Shiqing MaRutgers University, Yingqi LiuPurdue University, USA, Qiuling XuPurdue University, Xiangyu ZhangPurdue University Pre-print | ||
16:35 3mTalk | DeepMutation: A Neural Mutation ToolDemo Demonstrations Michele TufanoMicrosoft, Jason KimkoWilliam & Mary, Shiya WangWilliam & Mary, Cody WatsonWashington and Lee University, Gabriele BavotaUniversità della Svizzera italiana, Massimiliano Di PentaUniversity of Sannio, Denys PoshyvanykWilliam and Mary Pre-print | ||
16:38 8mTalk | Specification Patterns for Robotic MissionsJ1 Journal First Claudio MenghiUniversity of Luxembourg, Christos TsigkanosTU Vienna, Patrizio PelliccioneUniversity of L'Aquila and Chalmers | University of Gothenburg, Carlo GhezziPolitecnico di Milano, Thorsten BergerChalmers | University of Gothenburg | ||
16:46 8mTalk | ProXray: Protocol Model Learning and Guided Firmware AnalysisJ1 Journal First Farhaan FowzeUniversity of Florida, Dave (Jing) TianPurdue University, Grant HernandezUniversity of Florida, Kevin ButlerUniv. Florida, Tuba YavuzUniversity of Florida | ||
16:54 6mTalk | Visual Sketching: From Image Sketches to CodeNIER New Ideas and Emerging Results Marcelo d'AmorimFederal University of Pernambuco, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID, Carlos MelloFederal University of Pernambuco Pre-print Media Attached |
Sat 11 Jul Times are displayed in time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | |||
00:00 12mTalk | Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical Technical Papers Haijun WangAnt Financial Services Group, China; CSSE, Shenzhen University, China, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Cheng WenShenzhen University, Yuekang LiNanyang Technological University, Yang LiuNanyang Technological University, Singapore, Shengchao QinUniversity of Teesside, Hongxu ChenResearch Associate, Yulei SuiUniversity of Technology Sydney, Australia Link to publication DOI Pre-print | ||
00:12 12mTalk | sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical Technical Papers Tai D. NguyenSingapore Management University, Long H. PhamSingapore University of Technology and Design, Jun SunSingapore Management University, Yun LinNational University of Singapore, Minh Quang TranHo Chi Minh City University of Technology | ||
00:24 12mTalk | Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical Technical Papers Caius BrindescuOregon State University, Iftekhar AhmedUniversity of California at Irvine, USA, Rafael LeanoOregon State University, Anita SarmaOregon State University | ||
00:36 12mTalk | Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnical Technical Papers Akond RahmanTennessee Tech University, Effat FarhanaNorth Carolina State University, Chris ParninNorth Carolina State University, Laurie WilliamsNorth Carolina State University Pre-print | ||
00:48 12mTalk | JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical Technical Papers Tegan BrennanUniversity of California, Santa Barbara, Seemanta SahaUniversity of California Santa Barbara, Tevfik BultanUniversity of California, Santa Barbara |
00:00 - 01:00 | P26-Deep Learning Testing and DebuggingPaper Presentations / Technical Papers at Goguryeo Chair(s): Tim MenziesNorth Carolina State University | ||
00:00 12mTalk | ReluDiff: Differential Verification of Deep Neural Networks Technical Papers Brandon PaulsenUniversity of Southern California, Jingbo WangUniversity of Southern California, Chao WangUSC Pre-print | ||
00:12 12mTalk | Structure-Invariant Testing for Machine TranslationTechnical Technical Papers | ||
00:24 12mTalk | Automatic Testing and Improvement of Machine TranslationTechnical Technical Papers Zeyu SunPeking University, Jie M. ZhangUniversity College London, UK, Mark HarmanFacebook and University College London, Mike PapadakisUniversity of Luxembourg, Lu ZhangPeking University, China | ||
00:36 12mTalk | Testing DNN Image Classifier for Confusion & Bias Errors Technical Papers Yuchi TianColumbia University, Ziyuan ZhongColumbia University, Vicente OrdonezUniversity of Virginia, Gail KaiserColumbia University, Baishakhi RayColumbia University, New York | ||
00:48 12mTalk | Repairing Deep Neural Networks: Fix Patterns and Challenges Technical Papers Md Johirul IslamIowa State University, Rangeet PanIowa State University, USA, Giang NguyenDept. of Computer Science, Iowa State University, Hridesh RajanIowa State University, USA |
00:00 - 01:00 | P27-ApplicationsPaper Presentations / Software Engineering in Practice / Technical Papers at Silla Chair(s): Ganesha UpadhyayaHarmony.one | ||
00:00 12mTalk | Big Code != Big Vocabulary: Open-Vocabulary Models for Source code Technical Papers Rafael-Michael KarampatsisThe University of Edinburgh, Hlib BabiiFree University of Bozen-Bolzano, Romain RobbesFree University of Bozen-Bolzano, Charles SuttonGoogle Research, Andrea JanesFree University of Bozen-Bolzano DOI Pre-print | ||
00:12 12mTalk | Engineering for a Science-Centric Experimentation PlatformSEIP Software Engineering in Practice Nikos DiamantopoulosNetflix, Inc., Jeffrey WongNetflix, Inc., David Issa MattosChalmers University of Technology, Ilias GerostathopoulosVrije Universiteit Amsterdam, Matthew WardropNetflix, Inc., Tobias MaoNetflix, Inc., Colin McFarlandNetflix, Inc. | ||
00:24 12mTalk | Managing data constraints in database-backed web applications Technical Papers Junwen YangUniversity of Chicago, Utsav SethiUniversity of Chicago, Cong YanUniversity of Washington, Alvin CheungUniversity of California, Berkeley, Shan LuUniversity of Chicago | ||
00:36 12mTalk | Improving Data Scientist Efficiency with Provenance Technical Papers Jingmei HuHarvard University, Jiwon JoungHarvard University, Maia JacobsHarvard University, Margo SeltzerUniversity of British Columbia, Krzysztof GajosHarvard University |
01:05 - 02:05 | P29-Android and Web TestingPaper Presentations / Demonstrations / Technical Papers / Software Engineering in Practice at Goguryeo Chair(s): Hironori WashizakiWaseda University | ||
01:05 12mTalk | SLACC: Simion-based Language Agnostic Code Clones Technical Papers George MathewNorth Carolina State University, Chris ParninNorth Carolina State University, Kathryn StoleeNorth Carolina State University Pre-print | ||
01:17 8mTalk | Near-Duplicate Detection in Web App Model InferenceTechnical Technical Papers Rahulkrishna YandrapallyUniversity of British Columbia, Canada, Andrea StoccoUniversità della Svizzera italiana, Ali MesbahUniversity of British Columbia Pre-print | ||
01:25 12mTalk | JSidentify: A Hybrid Framework for Detecting Plagiarism Among JavaScript Code in Online Mini GamesSEIP Software Engineering in Practice Qun XiaTencent Inc., Zhongzhu Zhou, Zhihao LiTencent Inc., Bin XuTencent Inc., Wei ZouTencent Inc., Zishun ChenTencent Inc., Huafeng MaTencent Inc., Gangqiang LiangTencent Inc., Haochuan LuFudan University, Shiyu GuoTencent Inc., Ting XiongTencent Inc., Yuetang DengTencent, Inc., Tao XiePeking University | ||
01:37 12mTalk | Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep Learning Technical Papers Jieshan ChenAustralian National University, Chunyang ChenMonash University, Zhenchang XingAustralia National University, Xiwei XuData 61, Liming ZhuCSIRO's Data61 and UNSW, Guoqiang LiShanghai Jiao Tong University, Jinshui WangSchool of Information Science and Engineering, Fujian University of Technology, Fuzhou, China | ||
01:49 3mTalk | DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo Demonstrations Jian LiuEast China Normal University, Xusheng XiaoCase Western Reserve University, Lihua XuNew York University Shanghai, Liang DouEast China Normal University, Andy PodgurskiCase Western University | ||
01:52 3mTalk | BigTest: Symbolic Execution Based Systematic Test Generation Tool for Apache SparkDemo Demonstrations Muhammad Ali GulzarUniversity of California, Los Angeles, Madan MusuvathiMicrosoft Research, Miryung KimUniversity of California, Los Angeles |
01:05 - 02:05 | P30-Ecosystems 2Paper Presentations / Technical Papers / Journal First at Silla Chair(s): Chang XuNanjing University | ||
01:05 8mTalk | Studying the Impact of Noises in Build Breakage DataJ1 Journal First Taher Ahmed GhalebQueen's University, Daniel Alencar Da CostaUniversity of Otago, Ying ZouQueen's University, Kingston, Ontario, Ahmed E. HassanQueen's University Link to publication DOI Pre-print | ||
01:13 12mTalk | Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical Technical Papers Lingchao ChenThe University of Texas at Dallas, Foyzul HassanUniversity of Texas at San Antonio, USA, Xiaoyin WangUniversity of Texas at San Antonio, USA, Lingming ZhangThe University of Texas at Dallas | ||
01:25 12mTalk | Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem Technical Papers Ying WangNortheastern University, China, Ming WenHuazhong University of Science and Technology, China, Yepang LiuSouthern University of Science and Technology, Yibo WangNortheastern University, Zhenming LiNortheastern University, Chao WangUniversity of Southern California, Hai YuNortheastern University, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Chang XuNanjing University, Zhiliang ZhuNortheastern University, China | ||
01:37 12mTalk | How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical Technical Papers Shurui ZhouCarnegie Mellon University, USA / University of Toronto, CA, Bogdan VasilescuCarnegie Mellon University, Christian KaestnerCarnegie Mellon University Pre-print |
02:10 - 03:00 | |||
02:10 50mTalk | mCoq: Mutation Analysis for Coq Verification ProjectsDemo Demonstrations Kush JainThe University of Texas at Austin, Karl PalmskogKTH Royal Institute of Technology, Ahmet CelikFacebook, Inc., Emilio Jesús Gallego AriasINRIA, Milos GligoricThe University of Texas at Austin | ||
02:10 50mTalk | DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo Demonstrations Jian LiuEast China Normal University, Xusheng XiaoCase Western Reserve University, Lihua XuNew York University Shanghai, Liang DouEast China Normal University, Andy PodgurskiCase Western University |
15:00 - 16:00 | A26-Bugs and RepairPaper Presentations / Journal First / Technical Papers at Goguryeo Chair(s): Davide FalessiCalifornia Polytechnic State University | ||
15:00 12mTalk | Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical Technical Papers Mingyuan WuSouthern University of Science and Technology, Yicheng OuyangSouthern University of Science and Technology, Husheng ZhouThe University of Texas at Dallas, Lingming ZhangThe University of Texas at Dallas, Cong LiuUT Dallas, Yuqun ZhangSouthern University of Science and Technology | ||
15:12 8mTalk | Fine-Grained Dynamic Resource Allocation for Big-Data ApplicationsJ1 Journal First Luciano BaresiPolitecnico di Milano, Alberto LevaPolitecnico di Milano, Giovanni QuattrocchiPolitecnico di Milano | ||
15:20 8mTalk | The Assessor's Dilemma: Improving Bug Repair via Empirical Game TheoryJ1 Journal First Carlos Gavidia-CalderonUniversity College London, Federica SarroUniversity College London, UK, Mark HarmanFacebook and University College London, Earl T. BarrUniversity College London, UK Link to publication DOI Pre-print Media Attached | ||
15:28 8mTalk | FixMiner: Mining Relevant Fix Patterns for Automated Program RepairJ1 Journal First Anil KoyuncuUniversity of Luxembourg, Luxembourg, Kui LiuNanjing University of Aeronautics and Astronautics, Tegawendé F. BissyandéSnT, University of Luxembourg, Dongsun KimFuriosa.ai, Jacques KleinUniversity of Luxembourg, SnT, Martin MonperrusKTH Royal Institute of Technology, Yves Le TraonUniversity of Luxembourg Pre-print | ||
15:36 8mTalk | IntRepair: Informed Repairing of Integer OverflowsJ1 Journal First Paul MunteanTU Munich, Martin MonperrusKTH Royal Institute of Technology, Hao SunUnaffiliated, Jens GrossklagsTechnical University of Munich, Claudia EckertTechnical University of Munich | ||
15:44 12mTalk | DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical Technical Papers Yi LiNew Jersey Institute of Technology, USA, Shaohua WangNew Jersey Institute of Technology, USA, Tien N. NguyenUniversity of Texas at Dallas |
15:00 - 16:00 | A27-Software ArchitecturePaper Presentations / New Ideas and Emerging Results / Journal First / Demonstrations / Software Engineering in Practice at Silla Chair(s): Patrizio PelliccioneUniversity of L'Aquila and Chalmers | University of Gothenburg | ||
15:00 8mTalk | What should your Run-time Configuration Framework do to Help Developers?J1 Journal First Mohammed SAYAGHQueen's University, Noureddine KerzaziEnsias-Rabat, Fabio PetrilloUniversity of Quebec at Chicoutimi, Khalil BennaniPolytechnique Montreal, Bram AdamsMCIS, Polytechnique Montréal | ||
15:08 3mTalk | The SmartSHARK Ecosystem for Software Repository MiningDemo Demonstrations Alexander TrautschUniversity of Göttingen, Fabian TrautschUniversity of Göttingen, Steffen HerboldUniversity of Göttingen, Benjamin LedelUniversity of Göttingen, Jens GrabowskiUniversity of Göttingen Pre-print | ||
15:11 12mTalk | Piranha: Reducing Feature Flag Debt at UberSEIP Software Engineering in Practice Murali Krishna RamanathanUber Technologies Inc., Lazaro ClappUber Technologies Inc, Raj BarikUber Technologies Inc., Manu SridharanUniversity of California Riverside Pre-print | ||
15:23 6mTalk | Towards Engineering Future Gameful ApplicationsNIER New Ideas and Emerging Results Antonio BucchiaroneFondazione Bruno Kessler, Trento, Italy, Antonio CicchettiMälardalen University, Annapaola MarconiFondazione Bruno Kessler, Trento, Italy | ||
15:29 18mTalk | Software Development Data for Architecture Analysis: Expectation, Reality, and Future DirectionsSEIP Software Engineering in Practice |
16:05 - 17:05 | A29-Code Analysis and VerificationPaper Presentations / Technical Papers / New Ideas and Emerging Results at Goguryeo Chair(s): Elena ShermanBoise State University | ||
16:05 12mTalk | Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis Technical Papers Manuel BenzUniversity of Paderborn, Erik Krogh KristensenGitHub, Linghui LuoPaderborn University, Germany, Nataniel Borges Jr.CISPA Helmholtz Center for Information Security, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas ZellerCISPA Helmholtz Center for Information Security Media Attached File Attached | ||
16:17 12mTalk | Verifying Object ConstructionTechnical Technical Papers Martin KelloggUniversity of Washington, Seattle, Manli RanUniversity of California, Riverside, Manu SridharanUniversity of California Riverside, Martin SchäfAmazon Web Services, USA, Michael D. ErnstUniversity of Washington, USA | ||
16:29 6mTalk | Predictive Constraint Solving and Analysis New Ideas and Emerging Results Alyas AlmaawiThe University of Texas at Austin, Nima DiniUniversity of Texas at Austin, Cagdas YelenThe University of Texas at Austin, Milos GligoricThe University of Texas at Austin, Sasa MisailovicUniversity of Illinois at Urbana-Champaign, Sarfraz KhurshidUniversity of Texas at Austin, USA | ||
16:35 12mTalk | When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical Technical Papers Pre-print | ||
16:47 12mTalk | Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical Technical Papers Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Jiamou SunAustralian National University, Xin XiaMonash University, Jianling SunZhejiang University |
16:05 - 17:05 | A30-Dependencies and ConfigurationPaper Presentations / Technical Papers / Software Engineering in Practice at Silla Chair(s): Diomidis SpinellisAthens University of Economics and Business | ||
16:05 12mTalk | Lazy Product Discovery in Huge Configuration Spaces Technical Papers Michael LienhardtONERA, Ferruccio DamianiUniversity of Turin, Einar Broch JohnsenUniversity of Oslo, Jacopo MauroUniversity of Southern Denmark | ||
16:17 12mTalk | Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical Technical Papers Pre-print | ||
16:29 12mTalk | Exploring Differences and Commonalities between Feature Flags and Configuration OptionsSEIP Software Engineering in Practice Jens MeinickeCarnegie Mellon University, Chu-Pan WongCarnegie Mellon University, Bogdan VasilescuCarnegie Mellon University, Christian KaestnerCarnegie Mellon University Pre-print |
17:10 - 18:00 | |||
17:10 50mTalk | The SmartSHARK Ecosystem for Software Repository MiningDemo Demonstrations Alexander TrautschUniversity of Göttingen, Fabian TrautschUniversity of Göttingen, Steffen HerboldUniversity of Göttingen, Benjamin LedelUniversity of Göttingen, Jens GrabowskiUniversity of Göttingen Pre-print | ||
17:10 50mTalk | WasmView: Visual Testing for WebAssembly ApplicationsDemo Demonstrations |
Call for Papers
ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering including but not limited to:
Agile software development Program analysis
AI and software engineering Program comprehension
Apps and app store analysis Program repair
Autonomic and (self-)adaptive systems Program synthesis
Cloud computing Programming languages
Component-based software engineering Recommendation systems
Configuration management and deployment Refactoring
Crowd sourced software engineering Requirements engineering
Cyber physical systems Reverse engineering
Debugging Search-based software engineering
Dependability, safety, and reliability Security, privacy, and trust
Distributed and collaborative software engineering Software architecture
Embedded software Software economics and metrics
Empirical software engineering Software evolution and maintenance
End-user software engineering Software modeling and design
Fault localization Software process
Formal methods Software product lines
Green and sustainable technologies Software reuse
Human and social aspects of software engineering Software services
Human-computer interaction Software testing
Middleware, frameworks, and APIs Software visualization
Mining software engineering repositories Specification and modeling languages
Mobile applications Tools and environments
Model-driven engineering Traceability
Parallel, distributed, and concurrent systems Validation and verification
Performance
Review Criteria
Each paper submitted to the Technical Track will be evaluated based on the following criteria:
-
Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods
-
Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges
-
Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art
-
Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions
-
Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions and explanations, adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below
Reviewers will carefully consider all of these criteria during the review process, and as a result, high-quality papers may vary considerably in their type of contribution. For example, one paper could provide an extensive replication of prior work while another could describe a highly novel approach supported by non-trivial experimentation or empirical analysis.
How to Submit
-
All submissions must conform to the ICSE 2020 formatting and submission instructions and must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).
-
Formatting instructions are available at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e.,
\documentclass[sigconf,review]{acmart}
), and use the ACM reference format for the bibliography (i.e.,\bibliographystyle{ACM-Reference-Format}
). The review option adds line numbers, thereby allowing referees to refer to specific lines in their comments. -
By submitting to the ICSE Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism) and the IEEE Plagiarism FAQ (https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html). In particular, papers submitted to ICSE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2020. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
-
Lastly, the ICSE 2020 Technical Track will employ a double-blind review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-blind review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-blind review process can be found in the Q&A page (https://conf.researchr.org/track/icse-2020/icse-2020-papers#Submitting-to-ICSE-Q-A).
Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site (https://icse2020.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-blind reviewing.
Any submission that does not comply with these requirements may be desk rejected by the Technical Track PC Chairs without further review.
Conference Attendance Expectation
If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper in person.