dblp: ICSE 2020 - Companion Volume (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


ICSE 2020: Seoul, Korea - Companion Volume

jump to- Demonstrations: Cyber-physical systems
- Demonstrations: Android application testing
- Demonstrations: Software architecture
- Demonstrations: Traceability
- Demonstrations: Deep learning testing and debugging 2
- Demonstrations: Static analysis 2
- Demonstrations: Symbolic execution
- Demonstrations: Android
- Demonstrations: Performance
- Demonstrations: Testing 2
- Doctoral symposium

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Gregg Rothermel, Doo-Hwan Bae:
ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June - 19 July, 2020. ACM 2020, ISBN 978-1-4503-7122-3
Demonstrations: Cyber-physical systems
Demonstrations: Web testing

Phu X. Mai, Arda Goknil, Fabrizio Pastore
, Lionel C. Briand:
SMRL: a metamorphic security testing tool for web systems. 9-12
Alan Romano
, Weihang Wang:
WasmView: visual testing for webassembly applications. 13-16
Demonstrations: Android application testing

Farnaz Behrang, Alessandro Orso:
AppTestMigrator: a tool for automated test migration for Android apps. 17-20
Demonstrations: Contracts

Zhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen:
Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts. 21-24
Demonstrations: Software architecture

Alexander Trautsch
, Fabian Trautsch, Steffen Herbold, Benjamin Ledel, Jens Grabowski:
The SmartSHARK ecosystem for software repository mining. 25-28
Demonstrations: Deep learning testing and debugging 1
Demonstrations: Traceability

Christoph Mayr-Dorn, Michael Vierhauser
, Felix Keplinger, Stefan Bichler, Alexander Egyed:
TimeTracer: a tool for back in time traceability replaying. 33-36
Demonstrations: API

Chunyang Chen
:
SimilarAPI: mining analogical APIs for library migration. 37-40
Demonstrations: Deep learning testing and debugging 2
Demonstrations: Fuzzing 2

Yuanhan Tian, Shengcheng Yu, Chunrong Fang
, Peiyuan Li:
FuRong: fusing report of automated Android testing on multi-devices. 49-52
Demonstrations: Static analysis 2

Hiroaki Yoshida, Rohan Bavishi, Keisuke Hotta, Yusuke Nemoto, Mukul R. Prasad, Shinji Kikuchi:
Phoenix: a tool for automated data-driven synthesis of repairs for static analysis violations. 53-56
Demonstrations: Big data

Devjeet Roy, Sarah Fakhoury, Venera Arnaoudova:
VITALSE: visualizing eye tracking and biometric data. 57-60
Demonstrations: Symbolic execution

Muhammad Ali Gulzar, Madanlal Musuvathi, Miryung Kim
:
BigTest: a symbolic execution based systematic test generation tool for Apache spark. 61-64
Richard Rutledge, Alessandro Orso:
PG-KLEE: trading soundness for coverage. 65-68
Demonstrations: Testing 1

Matias Martinez
, Anne Etien
, Stéphane Ducasse, Christopher P. Fuhrman:
RTj: a Java framework for detecting and refactoring rotten green test cases. 69-72
Yung-Pin Cheng, Wei-Nien Hsiung, Yu-Shan Wu, Li-Hsuan Chen:
GeekyNote: a technical documentation tool with coverage, backtracking, traces, and couplings. 73-76
Demonstrations: Android

Jian Liu, Xusheng Xiao
, Lihua Xu, Liang Dou, Andy Podgurski:
DroidMutator: an effective mutation analysis tool for Android applications. 77-80
Demonstrations: Meta studies

Andreas Hinderks, Francisco José Domínguez Mayo, Jörg Thomaschewski, María José Escalona:
An SLR-tool: search process in practice: a tool to conduct and manage systematic literature review (SLR). 81-84
Demonstrations: Performance

Robert Chatley
, Thomas Allerton:
Nimbus: improving the developer experience for serverless applications. 85-88
Demonstrations: Software verification

Kush Jain, Karl Palmskog, Ahmet Çelik, Emilio Jesús Gallego Arias, Milos Gligoric:
mCoq: mutation analysis for Coq verification projects. 89-92
Zhenbang Chen, Hengbiao Yu, Xianjin Fu
, Ji Wang:
MPI-SV: a symbolic verifier for MPI programs. 93-96
Demonstrations: Testing 2
ACM student research competition

Xiyue Zhang
:
Uncertainty-guided testing and robustness enhancement for deep learning systems. 101-103
Ananga Thapaliya:
Evaluation of brain activity while pair programming. 104-106
Shashij Gupta:
Machine translation testing via pathological invariance. 107-109
Sohil Lal Shrestha
:
Automatic generation of simulink models to find bugs in a cyber-physical system tool chain using deep learning. 110-112
Christoph Matthies:
Playing with your project data in scrum retrospectives. 113-115
Vikram N. Subramanian:
An empirical study of the first contributions of developers to open source projects on GitHub. 116-118
Chengyu Zhang
:
Stress testing SMT solvers via type-aware mutation. 119-121
Frederike Ramin:
The role of egocentric bias in undergraduate Agile software development teams. 122-124
Zhenhao Li:
Studying and suggesting logging locations in code blocks. 125-127
Yiwen Wu:
Exploring the relationship between dockerfile quality and project characteristics. 128-130
Cassandra Overney:
Hanging by the thread: an empirical study of donations in open source. 131-133
Zihe Song:
An automated framework for gaming platform to test multiple games. 134-136
Yi Li:
Improving bug detection and fixing via code representation learning. 137-139
Alberto Martin-Lopez
:
Automated analysis of inter-parameter dependencies in web APIs. 140-142
Tegan Brennan:
Detection and mitigation of JIT-induced side channels. 143-145
Rangeet Pan:
Does fixing bug increase robustness in deep learning? 146-148
Dong Jae Kim:
An empirical study on the evolution of test smell. 149-151
Cristian Augusto
:
Efficient test execution in end to end testing: resource optimization in end to end testing through a smart resource characterization and orchestration. 152-154
XiuFeng Xu:
Towards automated migration for blockchain-based decentralized application. 155-157
Doctoral symposium

Kirill Dorofeev
:
Skill-based engineering in industrial automation domain: skills modeling and orchestration. 158-161
Seongmin Lee
:
Scalable and approximate program dependence analysis. 162-165
Elaine Venson
:
The effects of required security on software development effort. 166-169
Hina Anwar
:
Towards greener Android application development. 170-173
John Pyrgies:
Towards DO-178C certification of adaptive learning UAV agents designed with a cognitive architecture. 174-177
Maxime Lamothe:
Bridging the divide between API users and API developers by mining public code repositories. 178-181
Anna Maria Eilertsen:
Refactoring operations Grounded in manual code changes. 182-185
Rusen Halepmollasi:
A composed technical debt identification methodology to predict software vulnerabilities. 186-189
Muhammad Abbas:
Variability aware requirements reuse analysis. 190-193
Adriana Meza Soria
:
KNOCAP: capturing and delivering important design bits in whiteboard design meetings. 194-197
Zhenhao Li:
Towards providing automated supports to developers on writing logging statements. 198-201
Alberto Martin-Lopez
:
AI-driven web API testing. 202-205
Jinfu Chen
:
Performance regression detection in DevOps. 206-209
Agustín E. Martinez Suñé:
Formalization and analysis of quantitative attributes of distributed systems. 210-213
Jeongju Sohn
:
Bridging fault localisation and defect prediction. 214-217
Gina R. Bai
:
Improving students' testing practices. 218-221
Adam Alami:
The sustainability of quality in free and open source software. 222-225
Veit Frick:
Understanding software changes: extracting, classifying, and presenting fine-grained source code changes. 226-229
Iván Arcuschin Moreno
:
Search-based test generation for Android apps. 230-233
Preetha Chatterjee
:
Extracting archival-quality information from software-related chats. 234-237
Orges Cico:
Software startups in growth phase SE practices adopted to SEE. 238-241
Leevi Rantala:
Towards better technical debt detection with NLP and machine learning methods. 242-245
Pablo Suárez-Otero
:
Towards data integrity in Cassandra database applications using conceptual models. 246-249
Posters

Weishi Shi, Saad Khan, Yasmine N. El-Glaly
, Samuel A. Malachowsky, Qi Yu
, Daniel E. Krutz:
Experiential learning in computing accessibility education. 250-251
Xindong Zhang, Chenguang Zhu
, Yi Li
, Jianmei Guo, Lihua Liu, Haobo Gu:
Large-scale patch recommendation at Alibaba. 252-253
Markus Borg:
Do preparatory programming lab sessions contribute to even work distribution in student teams? 254-255
Hourieh Khalajzadeh
, Andrew J. Simmons
, Mohamed Abdelrazek
, John C. Grundy
, John G. Hosking, Qiang He, Prasanna Ratnakanthan, Adil Zia
, Meng Law:
A practical, collaborative approach for modeling big data analytics application requirements. 256-257
Carolin Gold-Veerkamp, Ira Diethelm, Jörg Abke:
A mixed methods research agenda to identify undergraduate misconceptions in software engineering, lecturers' handling, and didactical implications. 258-259
Candy Pang, Abram Hindle, Denilson Barbosa
:
Understanding DevOps education with Grounded theory. 260-261
Nengwen Zhao, Junjie Chen, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, Dan Pei:
Understanding and handling alert storm for online service systems. 262-263
Mary Sánchez-Gordón, Ricardo Colomo-Palacios:
Factors influencing software engineering career choice of Andean indigenous. 264-265
Jingmei Hu, Jiwon Joung, Maia L. Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer:
ProvBuild: improving data scientist efficiency with provenance. 266-267
Shurui Zhou, Bogdan Vasilescu, Christian Kästner:
How has forking changed in the last 20 years?: a study of hard forks on GitHub. 268-269
Xiaoqin Fu, Haipeng Cai
:
Scaling application-level dynamic taint analysis to enterprise-scale distributed systems. 270-271
Robert Benkoczi, Daya Ram Gaur
, Shahadat Hossain, Muhammad Khan, Ajay Raj Tedlapu:
Evolutionary hot-spots in software systems. 272-273
Jiaming Ye, Mingliang Ma, Yun Lin, Yulei Sui, Yinxing Xue:
Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. 274-275
Pasquale Ardimento
, Mario Luca Bernardi
, Marta Cimitile:
Towards automatic assessment of object-oriented programs. 276-277
Ziqiang Li, Shin Hwei Tan:
Bugine: a bug report recommendation system for Android apps. 278-279
Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Cheng Su, Guangshuai Mo:
Identifying compatibility-related APIs by exploring biased distribution in Android apps. 280-281
Roberto Hens Pato, David Granada
, Juan M. Vara
, Esperanza Marcos
:
Lean kanban in an industrial context: a success story. 282-283
Ivan Pashchenko
, Duc-Ly Vu, Fabio Massacci
:
Preliminary findings on FOSS dependencies and security: a qualitative study on developers' attitudes and experience. 284-285
N. C. Shrikanth, Tim Menzies
:
What disconnects practitioner belief and empirical evidence? 286-287
Jiawei Wang, Tzu-yang Kuo, Li Li
, Andreas Zeller
:
Restoring reproducibility of Jupyter notebooks. 288-289
Tawfeeq Alsanoosy, Maria Spichkova, James Harland
:
Identification of cultural influences on requirements engineering activities. 290-291
Ethem Utku Aktas, Cemal Yilmaz:
An exploratory study on improving automated issue triage with attached screenshots. 292-293
Rafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes:
Open-vocabulary models for source code. 294-295
Leonardo A. F. Leite, Fabio Kon
, Gustavo Pinto, Paulo Meirelles
:
Building a theory of software teams organization in a continuous delivery context. 296-297
Jake Renzella
, Andrew Cain, Jean-Guy Schneider:
An intelligent tool for combatting contract cheating behaviour by facilitating scalable student-tutor discussions. 298-299
Lukas Kirschner, Ezekiel O. Soremekun
, Andreas Zeller
:
Debugging inputs. 300-301
Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung
, Shan Lu:
Managing data constraints in database-backed web applications. 302-303
Yuchi Tian, Ziyuan Zhong, Vicente Ordonez
, Gail E. Kaiser, Baishakhi Ray:
Testing DNN image classifiers for confusion & bias errors. 304-305
Kai Mindermann, Stefan Wagner
:
Fluid intelligence doesn't matter!: effects of code examples on the usability of crypto APIs. 306-307
Aman Yadav, Fatemeh Hendijani Fard
:
Semantic analysis of issues on Google play and Twitter. 308-309
Qiuping Yi, Junye Wen, Guowei Yang
:
Summary-guided incremental symbolic execution. 310-311
Zhendong Wang, Yang Feng, Yi Wang, James A. Jones, David F. Redmiles:
Elite developers' activities at open source ecosystem level. 312-313
Mohammad Alahmadi
, Abdulkarim Khormi
, Sonia Haiduc
:
GUI-focused overviews of mobile development videos. 314-315
Yi Li, Shaohua Wang, Tien N. Nguyen:
Improving automated program repair using two-layer tree-based neural networks. 316-317
Yi Li, Shaohua Wang, Tien N. Nguyen:
An empirical study on the characteristics of question-answering process on developer forums. 318-319
Chungha Sung
, Shuvendu K. Lahiri, Mike Kaufman, Pallavi Choudhury, Jessica Wolk, Chao Wang:
Towards understanding and fixing upstream merge induced conflicts in divergent forks: an industrial case study. 320-321
Simos Gerasimou
, Hasan Ferit Eniser, Alper Sen, Alper Çakan:
Importance-driven deep learning system testing. 322-323
Vartika Agrahari, Sridhar Chimalakonda:
Refactor4Green: a game for novice programmers to learn code smells. 324-325
Jean-Guy Schneider, Peter W. Eklund, Kevin Lee
, Feifei Chen, Andrew Cain, Mohamed Abdelrazek
:
Industry Agile practices in large-scale capstone projects. 326-327
Tobias Holstein, Gordana Dodig-Crnkovic
, Patrizio Pelliccione
:
Real-world ethics for self-driving cars. 328-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






