1. | Zeinab Abou Khalil, Eleni Constantinou, Tom Mens, Laurence Duchien and Clément Quinton. A Longitudinal Analysis of Bug Handling Across Eclipse Releases |
2. | Chak Shun Yu, Christoph Treude and Maurício Aniche. Comprehending Test Code: An Empirical Study |
3. | Justus Bogner, Jonas Fritzsch, Stefan Wagner and Alfred Zimmermann. Assuring the Evolvability of Microservices: Insights into Industry Practices and Challenges |
4. | Théo Zimmermann and Annalí Casanueva Artís. Impact of switching bug trackers: a case study on a medium-sized open source project |
5. | Jiamou Sun, Zhenchang Xing, Rui Chu, Helai Bai, Jinshui Wang and Xin Peng. Know-How in Programming Tasks: From Textual Tutorials to Task-Oriented Knowledge Graph |
6. | Christopher Mills, Javier Escobar-Avila, Aditya Bhattacharya, Grigoriy Kondyukov, Shayok Chakraborty and Sonia Haiduc. Tracing with Less Data: Active Learning for Classification-Based Traceability Link Recovery |
7. | Zack Coker, David Gray Widder, Claire Le Goues, Christopher Bogart and Joshua Sunshine. A Qualitative Study on Framework Debugging |
8. | Alex Cummaudo, Rajesh Vasa, John Grundy, Mohamed Abdelrazek and Andrew Cain. Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services |
9. | Yi Gao, Zan Wang, Shuang Liu, Lin Yang, Sang Wei and Yuanfang Cai. TECCD: A Tree Embedding Approach for Code Clone Detection |
10. | Chen Zhi, Jianwei Yin, Shuiguang Deng, Maoxin Ye, Min Fu and Tao Xie. An Exploratory Study of Logging Configuration Practice in Java |
11. | Gemma Catolino, Fabio Palomba, Andy Zaidman and Filomena Ferrucci. How the Experience of Development Teams Relates to Assertion Density of Test Classes |
12. | Gustavo Sizílio, Daniel Alencar Da Costa and Uirá Kulesza. An Empirical Study of the Relationship between Continuous Integration and Test Code Evolution |
13. | Mohamed A. Oumaziz, Jean-Rémy Falleri, Xavier Blanc, Tegawendé F. Bissyandé and Jacques Klein. Handling duplicates in Dockerfiles families: Learning from experts |
14. | Chunhua Yang and Jim Whitehead. Identifying the Within-Statement Changes to Facilitate Change Understanding |
15. | Abdullah Alsharif, Gregory Kapfhammer and Phil McMinn. What Factors Make SQL Test Cases Understandable For Testers? A Human Study of Automatic Test Data Generation Techniques |
16. | Luis Cruz, Rui Abreu, John Grundy, Li Li and Xin Xia. Do Energy-oriented Changes Hinder Maintainability? |
17. | Darius Sas, Paris Avgeriou and Francesca Arcelli Fontana. Investigating instability architectural smells evolution: an exploratory case study |
18. | John Johnson, Sergio Lubo, Nishitha Yedla, Jairo Aponte and Bonita Sharif. An Empirical Study Assessing Source Code Readability in Comprehension |
19. | Manishankar Mondal, Banani Roy, Chanchal K. Roy and Kevin Schneider. Investigating Context Adaptation Bugs in Code Clones |
20. | Aindrila Sarkar, Peter Rigby and Béla Bartalos. Improving Bug Triaging with High Confidence Predictions at Ericsson |
21. | Keith Gallagher, Suzanne Kozaitis and Mark Fioravanti. Teaching Software Maintenance |
22. | Quinn Hanam, Ali Mesbah and Reid Holmes. Aiding Code Change Understanding with Semantic Change Impact Analysis |
23. | Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White and Denys Poshyvanyk. Learning How to Mutate Source Code from Bug-Fixes |
24. | Christian Newman, Michael J. Decker, Reem Alsuhaibani, Dishant Kaushik, Anthony Peruma and Emily Hill. An Empirical Study of Abbreviations and Expansions in Software Artifacts |
25. | Christopher Vendome, Diana Solano, Santiago Liñán and Mario Linares-Vásquez. Can everyone use my app? An Empirical Study on Accessibility in Android Apps |
26. | Antoine Barbez, Foutse Khomh and Yann-Gaël Guéhéneuc. Deep Learning Anti-patterns from Code Metrics History |
27. | Mian Wan, Negarsadat Abolhassani and William G. J. Halfond. An Empirical Study of UI Implementations in Android Applications |
28. | Yingjun Lyu, Ali Alotaibi and William G.J. Halfond. Quantifying the Performance Impact of SQL Antipatterns on Mobile Applications |
29. | Bo Zhang, Hongyu Zhang, Junjie Chen, Dan Hao and Pablo Moscato. Automatic Discovery and Cleansing of Numerical Metamorphic Relations |
30. | Huong Ha and Hongyu Zhang. Performance-Influence Model for Highly Configurable Software with Fourier Learning and Lasso Regression |
31. | Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon and Pierre Lorrach. An industrial study on the differences between pre-release and post-release bugs |
1. | Martina Iammarino, Fiorella Zampetti, Lerina Aversano and Massimiliano Di Penta. Self-Admitted Technical Debt Removal and Refactoring Actions: Co-Occurrence or More? |
2. | Alexander William Wong, Amir Salimi, Shaiful Chowdhury and Abram Hindle. Syntax and Stack Overflow: A methodology for source code error and fix extraction |
3. | Effat Farhana, Nasif Imtiaz and Akond Rahman. Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software |
4. | Miroslav Tushev, Saket Khatiwada and Anas Mahmoud. Linguistic Change in Open Source Software |
5. | Zhe Jin, Kong Yik Chee and Xin Xia. What Do Developers Discuss about Biometric APIs? |
6. | Md Rayhanur Rahman, Akond Rahman and Laurie Williams. Share, But Be Aware: Security Smells in Python Gists |
7. | Thomas Krismayer, Michael Vierhauser, Rick Rabiser and Paul Grünbacher. Comparing Constraints Mined From Execution Logs to Understand Software Evolution |
8. | Moumita Asad, Kishan Kumar Ganguly and Kazi Sakib. Impact Analysis of Syntactic and Semantic Similarities on Patch Prioritization in Automated Program Repair |
9. | Wenhua Zhao, Zhenkai Ding, Mingyuan Xia and Zhengwei Qi. Systematically Testing and Diagnosing Responsiveness for Android Apps |
10. | Rodrigo Rebouças de Almeida, Christoph Treude and Uirá Kulesza. Tracy: A Business-driven Technical Debt Prioritization Framework |
11. | Mohammed Alhamed and Tim Storer. Estimating Software Task Effort in Crowds |
12. | Atheer Abu Zaid, Manar Alalfi and Ali Miri. Automated Identification of Over-Privileged SmartThings Apps |
13. | Tam Nguyen, Phong Vu and Tung Nguyen. Personalized Code Recommendation |
14. | Masaki Hosono, Hironori Washizaki, Kiyoshi Honda, Hiromasa Nagumo, Hisanobu Sonoda, Yoshiaki Fukazawa, Kazuki Munakata, Takao Nakagawa, Yusuke Nemoto, Susumu Tokumoto and Supasit Monpratarnchai. Inappropriate Usage Examples in Web API Documentations |
15. | Tao Wang, Xiao Yu, Zhengyi Qiu, Guoliang Jin and Frank Mueller. BarrierFinder: Recognizing Ad Hoc Barriers |
16. | Krishna Neupane, Kabo Cheung and Yi Wang. EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software Development |
17. | Markos Viggiato, Johnatan Oliveira, Eduardo Figueiredo, Pooyan Jamshidi and Christian Kästner. How Do Code Changes Evolve in Different Platforms? A Mining-based Investigation |
18. | Kamonphop Srisopha, Chukiat Phonsom, Keng Lin and Barry Boehm. Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps |
19. | Danielle Gonzalez, Holly Hastings and Mehdi Mirakhorli. Automated Characterization of Software Vulnerabilities |
20. | Houssem Ben Braiek and Foutse Khomh. DeepEvolution: A Search-based testing approach for Deep Neural Networks |
21. | David N. Palacio, Daniel McCrystal, Kevin Moran, Carlos Bernal-Cárdenas, Denys Poshyvanyk and Chris Shenefiel. Learning to Identify Security-Related Issues Using Convolutional Neural Networks |
22. | Natthawute Sae-Lim, Shinpei Hayashi and Motoshi Saeki. Can Automated Impact Analysis Techniques Help Predict Decaying Modules? |
23. | Yigit Kucuk, Tim Henderson and Andy Podgurski. The Impact of Rare Failures on Statistical Fault Localization: the Case of the Defects4J Suite |
24. | Omar Elazhary, Margaret-Anne Storey, Neil Ernst and Andy Zaidman. Do as I Do, Not as I Say: Do Contribution Guidelines Match the GitHub Contribution Process? |
25. | Ferdian Thung, Kang Hong Jin, Lingxiao Jiang and David Lo. Towards Generating Transformation Rules without Examples for Android API Replacement |
26. | Thomas Durieux, Rui Abreu, Martin Monperrus, Tegawendé F. Bissyandé and Luís Cruz. An Analysis of 35+ Million Jobs of Travis CI |
1. | Michael D. Shah Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive Applications |
2. | Thazin Win Win Aung, Huan Huo and Yuiei Sui. Interactive Traceability Links Visualization using Hierarchical Trace Map |
3. | Matthias Galster, Christoph Treude and Kelly Blincoe. Supporting Software Architecture Maintenance by Providing Task-specific Recommendations |
4. | Tong Wu and Qingshan Li. A Validation Method of Self-Adaptive Strategy Based on POMDP |
5. | Christian Newman, Anthony Peruma and Reem Alsuhaibani. Modeling the Relationship Between Identifier Name and Behavior |
1. | Nystrom Edwards, Dhitiwat Jongsuebchoke and Tim Storer. Sciit: Aligning Source Control Management and Issue Tracking Architectures |
2. | Petru F. Mihancea and Roger Scott. CodeSonar Extension For Copy-Paste-(Mis)Adapt Error Detections |
3. | Rafael Kallis, Andrea Di Sorbo, Gerardo Canfora and Sebastiano Panichella. Ticket Tagger: Machine Learning Driven Issue Classification |
4. | Laura Bello-Jiménez, Alejandro Mazuera-Rozo, Mario Linares-Vásquez and Gabriele Bavota. OPIA: A Tool for On-Device Testing of Vulnerabilities in Android Applications |
5. | Tam Nguyen, Phong Vu and Tung Nguyen. Recommending Exception Handling Code |
6. | William Ravelo-Méndez, Camilo Escobar-Velásquez and Mario Linares-Vásquez. Kraken-Mobile: Cross-Device Interaction-based Testing of Android Apps |
7. | Hussein Alrubaye, Mohamed Wiem Mkaouer and Ali Ouni. MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method Level |
8. | Zhipeng Gao, Vinoj Jayasundara, Lingxiao Jiang, Xin Xia, David Lo and John Grundy. SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding |
9. | Masahiro Hata, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata and Tetsuo Hironaka. OSAIFU: A Source Code Factorizer on Android Studio |
10. | Stanislav Levin and Amiram Yehudai. Processing Large Datasets of Fine Grained Source Code Changes |
11. | Kazumasa Shimari, Takashi Ishio, Tetsuya Kanda and Katsuro Inoue. Near-Omniscient Debugging for Java Using Size-Limited Execution Trace |
1. | Nicolas Anquetil, Anne Etien, Gaelle Andreo and Stéphane Ducasse. Decomposing God Classes at Siemens: A Visualization tool and approach |
2. | Han Anu, Jie Chen, Wenchang Shi, Jianwei Hou, Bin Liang and Bo Qin. An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention |
3. | Jonas Fritzsch, Justus Bogner, Stefan Wagner and Alfred Zimmermann. Microservices Migration in Industry: Intentions, Strategies, and Challenges |
4. | Michele Guerriero, Martin Garriga, Damian Andrew Tamburri and Fabio Palomba. Adoption, Support, and Challenges of Infrastructure-as-Code: Insights from Industry |
1. | Chang Liu, Krerkkiat Chusap, Zhongen Li, Zhaojie Chen, Dylan Rogers and Fanghao Song. Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving Software |
2. | Thomas Wagner, Christian Brem, Stefan Strobl and Thomas Grechenig. Challenges in re-platforming mixed language PL/I and COBOL IS to an open systems platform |
3. | Hang Li, Lin Yan and Xiliang Zhao. Application of Philosophical Principles in Linux Kernel Customization |
4. | Hyrum Wright Lessons Learned from Large-Scale Refactoring |
1. | Christian Newman, Michael J. Decker, Reem Alsuhaibani, Dishant Kaushik, Anthony Peruma and Emily Hill. An Open Dataset of Abbreviations and Expansions |
2. | Bo Zhang, Hongyu Zhang, Junjie Chen, Dan Hao and Pablo Moscato. Automatic Discovery and Cleansing of Numerical Metamorphic Relations |
1. | Chao Ni, Xiang Chen, Xin Xia, Qing Gu and Yingquan Zhao. Multi-task Defect Prediction Journal of Software: Evolution and Process |
2. | Qingye Wang, Xin Xia, David Lo and Shanping Li. Why is my code change abandoned? Information & Software Technology - https://doi.org/10.1016/j.infsof.2019.02.007 |
3. | Gemma Catolino, Fabio Palomba, Andy Zaidman and Filomena Ferrucci. Not all bugs are the same: Understanding, characterizing, and classifying bug types Journal of Systems and Software - https://doi.org/10.1016/j.jss.2019.03.002 |
4. | Yi Bian, Zheng Li, Junxia Guo and Ruilian Zhao. Concrete hyperheuristic framework for test case prioritization Journal of Software: Evolution and Process - https://doi.org/10.1002/smr.1992 |
5. | Vaclav Rajlich Five recommendations for software evolvability Journal of Software: Evolution and Process - https://doi.org/10.1002/smr.1949 |
6. | Masanari Kondo, Daniel German, Osamu Mizuno and Eun-Hye Choi. The Impact of Context Metrics on Just-In-Time Defect Prediction Empirical Software Engineering |
7. | Md. Rejaul Karim, Akinori Ihara, Eunjong Choi and Hajimu Iida. Identifying and Predicting Key Features to Support Bug Reporting Journal of Software: Evolution and Process |
8. | Hernán Ceferino Vázquez, Alexandre Bergel, Santiago Vidal, Andrés Díaz Pace and Claudia Marcos. Slimming JavaScript Applications: an Approach for Removing Unused Functions from JavaScript Libraries Information & software Technology - https://doi.org/10.1016/j.infsof.2018.10.009 |
9. | Akond Rahman and Laurie Williams. Source Code Properties of Defective Infrastructure as Code Scripts Information & software Technology - https://doi.org/10.1016/j.infsof.2019.04.013 |
10. | Miguel Campusano, Johan Fabry and Alexandre Bergel. Live Programming in Practice: a Controlled Experiment on State Machines for Robotic Behaviors Information & software Technology - https://doi.org/10.1016/j.infsof.2018.12.008 |
1. | Zeinab Abou Khalil Studying the impact of policy changes on bug handling performance |
2. | Dragos Dobrean Automatic examining of software architectures on mobile applications codebases |
3. | Basma Alqadi The Relationship Between Cognitive Complexity and the Probability of Defects |
4. | Rodrigo Rebouças de Almeida Business-Driven Technical Debt Prioritization |
5. | Reem Alsuhaibani Applying Markov Models to Identify Grammatical Patterns of Function Identifiers |
6. | Drew Guarnera Enhancing Eye Tracking of Source Code: A Specialized Fixation Filter for Source Code |
7. | Keheliya Gallaba Improving the Robustness and Efficiency of Continuous Integration and Deployment |
8. | Eman Alomar Towards Better Understanding Developer Perception of Refactoring |
9. | Yutaro Kashiwa RAPTOR: Release-Aware and Prioritized Bug-fixing Task assignment Optimization |
10. | Deema Alshoaibi Characterizing Performance Regression Introducing Code Changes |
11. | Anthony Peruma Towards a Model to Appraise and Suggest Identifier Names |
12. | Asif Imran Design Smell Detection and Analysis for Open Source Java Software (Post-proposal) |