


default search action
15th ESEC / 23rd SIGSOFT FSE 2015: Bergamo, Italy
- Elisabetta Di Nitto, Mark Harman, Patrick Heymans:
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2015, Bergamo, Italy, August 30 - September 4, 2015. ACM 2015, ISBN 978-1-4503-3675-8
Adaptive Systems
- Gabriel A. Moreno, Javier Cámara, David Garlan, Bradley R. Schmerl:
Proactive self-adaptation under uncertainty: a probabilistic model checking approach. 1-12 - Antonio Filieri
, Henry Hoffmann, Martina Maggio
:
Automated multi-objective control for self-adaptive software design. 13-24 - Gholamreza Safi, Arman Shahbazian, William G. J. Halfond, Nenad Medvidovic:
Detecting event anomalies in event-based systems. 25-37
Software Quality
- Miltiadis Allamanis
, Earl T. Barr
, Christian Bird, Charles Sutton:
Suggesting accurate method and class names. 38-49 - Neil A. Ernst
, Stephany Bellomo, Ipek Ozkaya
, Robert L. Nord, Ian Gorton:
Measure it? Manage it? Ignore it? software practitioners and technical debt. 50-60 - Lucas Bang, Abdulbaki Aydin, Tevfik Bultan:
Automatically computing path complexity of programs. 61-72
Synthesis and Search-Based Approaches for Reactive Systems
- Ankush Desai, Shaz Qadeer, Sanjit A. Seshia:
Systematic testing of asynchronous reactive systems. 73-83 - Reza Matinnejad, Shiva Nejati
, Lionel C. Briand, Thomas Bruckmann:
Effective test suites for mixed discrete-continuous stateflow controllers. 84-95 - Shahar Maoz
, Jan Oliver Ringert
:
GR(1) synthesis for LTL specification patterns. 96-106
Testing I
- Ermira Daka
, José Campos
, Gordon Fraser, Jonathan Dorn, Westley Weimer:
Modeling readability to improve unit tests. 107-118 - Paolo Arcaini
, Angelo Gargantini, Elvinia Riccobene:
Improving model-based test generation by model decomposition. 119-130 - Malavika Samak, Murali Krishna Ramanathan:
Synthesizing tests for detecting atomicity violations. 131-142
Search-Based Approaches to Testing, Repair, and Energy Optimisation
- Mario Linares Vásquez
, Gabriele Bavota
, Carlos Eduardo Bernal-Cárdenas, Rocco Oliveto, Massimiliano Di Penta
, Denys Poshyvanyk
:
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach. 143-154 - Andrea Arcuri, Gordon Fraser, Juan Pablo Galeotti:
Generating TCP/UDP network data for automated unit test generation. 155-165 - Fan Long, Martin C. Rinard:
Staged program repair with condition synthesis. 166-178
Empirical Studies of Software Developers I
- Moritz Beller
, Georgios Gousios
, Annibale Panichella, Andy Zaidman
:
When, how, and why developers (do not) test in their IDEs. 179-190 - Caitlin Sadowski, Kathryn T. Stolee
, Sebastian G. Elbaum:
How developers search for code: a case study. 191-201 - Katja Kevic, Braden M. Walters, Timothy R. Shaffer
, Bonita Sharif
, David C. Shepherd
, Thomas Fritz:
Tracing software developers' eyes and interactions for change tasks. 202-213
Testing II
- Yucheng Zhang, Ali Mesbah
:
Assertions are strongly correlated with test suite effectiveness. 214-224 - Yang Feng, Zhenyu Chen, James A. Jones, Chunrong Fang
, Baowen Xu
:
Test report prioritization to assist crowdsourced testing. 225-236 - August Shi, Tifany Yung, Alex Gyori, Darko Marinov:
Comparing and combining test-suite reduction and regression test selection. 237-247
Security
- Justin Smith
, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
Questions developers ask while diagnosing potential security vulnerabilities with static analysis. 248-259 - Jim Witschey, Olga A. Zielinska, Allaire K. Welk, Emerson R. Murphy-Hill, Christopher B. Mayhorn
, Thomas Zimmermann:
Quantifying developers' adoption of security tools. 260-271 - Inian Parameshwaran, Enrico Budianto, Shweta Shinde
, Hung Dang, Atul Sadhu, Prateek Saxena:
Auto-patching DOM-based XSS at scale. 272-283
Configurable Systems
- Norbert Siegmund, Alexander Grebhahn, Sven Apel
, Christian Kästner
:
Performance-influence models for highly configurable systems. 284-294 - Farnaz Behrang, Myra B. Cohen, Alessandro Orso:
Users beware: preference inconsistencies ahead. 295-306 - Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker:
Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software. 307-319
Debugging
- Fuxiang Chen
, Sunghun Kim:
Crowd debugging. 320-332 - Mouna Hammoudi, Brian Burg, Gigon Bae
, Gregg Rothermel:
On the use of delta debugging to reduce recordings and facilitate debugging of web applications. 333-344 - Simon Holm Jensen, Manu Sridharan
, Koushik Sen, Satish Chandra:
MemInsight: platform-independent memory debugging for JavaScript. 345-356
Web Applications
- Liang Gong, Michael Pradel, Koushik Sen:
JITProf: pinpointing JIT-unfriendly JavaScript code. 357-368 - Hung Viet Nguyen, Christian Kästner
, Tien N. Nguyen:
Cross-language program slicing for dynamic web applications. 369-380 - Erdal Mutlu
, Serdar Tasiran, Benjamin Livshits:
Detecting JavaScript races that matter. 381-392
Studies of Software Engineering Research and Practice
- Jürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall
:
The making of cloud applications: an empirical study on software development for the cloud. 393-403 - Meiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus
, Ahmed E. Hassan:
An empirical study of goto in C code from GitHub repositories. 404-414 - David Lo
, Nachiappan Nagappan, Thomas Zimmermann:
How practitioners perceive the relevance of software engineering research. 415-425
Concurrency
- Rui Gu, Guoliang Jin, Linhai Song, Linjie Zhu, Shan Lu
:
What change history tells us about thread synchronization. 426-438 - Jeff Huang, Lawrence Rauchwerger:
Finding schedule-sensitive branches. 439-449 - Yan Cai, Lingwei Cao:
Effective and precise dynamic detection of hidden races for Java programs. 450-461
Program Analysis I
- Ravi Mangal, Xin Zhang
, Aditya V. Nori, Mayur Naik:
A user-guided approach to program analysis. 462-473 - Michael Eichberg, Ben Hermann
, Mira Mezini, Leonid Glanz:
Hidden truths in dead software paths. 474-484 - Mohammed Afraz, Diptikalyan Saha, Aditya Kanade:
P3: partitioned path profiling. 485-495
Prediction and Recommendation
- Xiao-Yuan Jing, Fei Wu, Xiwei Dong, Fumin Qi, Baowen Xu
:
Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning. 496-507 - Jaechang Nam, Sunghun Kim:
Heterogeneous defect prediction. 508-519 - Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao:
Clone-based and interactive recommendation for modifying pasted code. 520-531
Program Repair
- Edward K. Smith, Earl T. Barr
, Claire Le Goues
, Yuriy Brun
:
Is the cure worse than the disease? overfitting in automated program repair. 532-543 - Nishant Sinha, Rezwana Karim:
Responsive designs in a snap. 544-554 - Aritra Dhar, Rahul Purandare
, Mohan Dhawan, Suresh Rangaswamy:
CLOTHO: saving programs from malformed strings and incorrect string-handling. 555-566
Information Retrieval
- Laura Moreno, Gabriele Bavota
, Sonia Haiduc, Massimiliano Di Penta
, Rocco Oliveto, Barbara Russo
, Andrian Marcus
:
Query-based configuration of text retrieval solutions for software engineering tasks. 567-578 - Tien-Duy B. Le, Richard Jayadi Oentaryo
, David Lo
:
Information retrieval and spectrum based bug localization: better together. 579-590 - Tuong Huan Nguyen, John C. Grundy
, Mohamed Almorsy:
Rule-based extraction of goal-use case models from text. 591-601
Program Analysis II
- Pietro Braione
, Giovanni Denaro
, Mauro Pezzè
:
Symbolic execution of programs with heap inputs. 602-613 - Yangchun Fu, Zhiqiang Lin, David Brumley:
Automatically deriving pointer reference expressions from binary code for memory dump analysis. 614-624
Measurement and Metric
- Christoph Treude
, Fernando Marques Figueira Filho, Uirá Kulesza:
Summarizing and measuring development activity. 625-636 - Qimu Zheng, Audris Mockus
, Minghui Zhou:
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies. 637-648
Patterns and Coding Convention
- Christian R. Prause, Matthias Jarke:
Gamification for enforcing coding conventions. 649-660
Mobile Applications
- Ding Li, Yingjun Lyu, Mian Wan, William G. J. Halfond:
String analysis for Java and Android applications. 661-672 - Kevin Moran, Mario Linares Vásquez
, Carlos Bernal-Cárdenas, Denys Poshyvanyk
:
Auto-completing bug reports for Android applications. 673-686 - Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications. 687-697
Search, Synthesis, and Verification
- Jun Sun
, Hao Xiao, Yang Liu
, Shang-Wei Lin
, Shengchao Qin
:
TLV: abstraction through testing, learning, and validation. 698-709 - Stefan Heule, Manu Sridharan
, Satish Chandra:
Mimic: computing models for opaque code. 710-720 - Dirk Beyer
, Matthias Dangl, Daniel Dietsch, Matthias Heizmann
, Andreas Stahlbauer:
Witness validation and stepwise testification across software verifiers. 721-733
Java and Object-Oriented Programming
- Scott West, Sebastian Nanz, Bertrand Meyer:
Efficient and reasonable object-oriented concurrency. 734-744 - Jongse Park, Hadi Esmaeilzadeh, Xin Zhang
, Mayur Naik, William Harris:
FlexJava: language support for safe and modular approximate programming. 745-757 - Ben Hermann
, Michael Reif, Michael Eichberg, Mira Mezini:
Getting to know you: towards a capability model for Java. 758-769
Testing III
- Jonathan Bell, Gail E. Kaiser
, Eric Melski, Mohan Dattatreya:
Efficient dependency detection for safe Java test acceleration. 770-781 - Ulf Kargén
, Nahid Shahmehri:
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. 782-792 - Yuting Chen, Zhendong Su
:
Guided differential testing of certificate validation in SSL/TLS implementations. 793-804
Empirical Studies of Software Developers II
- Bogdan Vasilescu
, Yue Yu, Huaimin Wang, Premkumar T. Devanbu
, Vladimir Filkov:
Quality and productivity outcomes relating to continuous integration in GitHub. 805-816 - Casey Casalnuovo, Bogdan Vasilescu
, Premkumar T. Devanbu
, Vladimir Filkov:
Developer onboarding in GitHub: the role of prior social links and language experience. 817-828 - Matthieu Foucault, Marc Palyart, Xavier Blanc, Gail C. Murphy, Jean-Rémy Falleri
:
Impact of developer turnover on quality in open-source software. 829-841
Symbolic Execution
- Koushik Sen, George C. Necula, Liang Gong, Wontae Choi:
MultiSE: multi-path symbolic execution using value summaries. 842-853 - Shengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta
:
Assertion guided symbolic execution of multithreaded programs. 854-865 - Mateus Borges, Antonio Filieri
, Marcelo d'Amorim
, Corina S. Pasareanu:
Iterative distribution-aware sampling for probabilistic symbolic execution. 866-877
Human Aspects of Software Engineering
- Brittany Johnson, Rahul Pandita, Emerson R. Murphy-Hill, Sarah Heckman
:
Bespoke tools: adapted to the concepts developers know. 878-881 - Titus Barik
, Brittany Johnson, Emerson R. Murphy-Hill:
I heart hacker news: expanding qualitative research findings by analyzing social news websites. 882-885 - Kevin J. North, Shane Bolan, Anita Sarma
, Myra B. Cohen:
GitSonifier: using sound to portray developer conflict history. 886-889 - Raphael Pham, Yauheni Stoliar, Kurt Schneider
:
Automatically recommending test code examples to inexperienced developers. 890-893 - Han Xu, Stephan Krusche
, Bernd Bruegge:
Using software theater for the demonstration of innovative ubiquitous applications. 894-897
Validation, Verification, and Testing
- Nimrod Busany, Shahar Maoz
:
Behavioral log analysis with statistical guarantees. 898-901 - Yingfei Xiong
, Dan Hao
, Lu Zhang, Tao Zhu, Muyao Zhu, Tian Lan:
Inner oracles: input-specific assertions on internal states. 902-905 - Cristian Cadar
:
Targeted program transformations for symbolic execution. 906-909 - Jifeng Xuan
, Xiaoyuan Xie, Martin Monperrus
:
Crash reproduction via test case mutation: let existing test cases help. 910-913 - Arun K. Rajagopalan, Jeff Huang:
RDIT: race detection from incomplete traces. 914-917
Maintenance and Evolution
- Tingting Yu:
TACO: test suite augmentation for concurrent programs. 918-921 - Apostolos V. Zarras, Theofanis Vartziotis, Panos Vassiliadis:
Navigating through the archipelago of refactorings. 922-925 - Hung Viet Nguyen, My Huu Nguyen, Son Cuu Dang, Christian Kästner
, Tien N. Nguyen:
Detecting semantic merge conflicts with variability-aware execution. 926-929 - Mathieu Acher, Guillaume Bécan, Benoît Combemale, Benoit Baudry, Jean-Marc Jézéquel
:
Product lines can jeopardize their trade secrets. 930-933
Tool Demonstrations
- Jinseong Jeon, Xiaokang Qiu
, Jeffrey S. Foster, Armando Solar-Lezama
:
JSketch: sketching for Java. 934-937 - Pavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov:
Don't panic: reverse debugging of kernel drivers. 938-941 - Chunhui Wang, Fabrizio Pastore
, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal:
UMTG: a toolset to automatically generate system test cases from use case specifications. 942-945 - Inian Parameshwaran, Enrico Budianto, Shweta Shinde
, Hung Dang, Atul Sadhu, Prateek Saxena:
DexterJS: robust testing platform for DOM-based XSS vulnerabilities. 946-949 - I. S. Wishnu B. Prasetya
:
T3i: a tool for generating and querying test suites for Java. 950-953 - Timothy R. Shaffer
, Jenna L. Wise
, Braden M. Walters, Sebastian C. Müller, Michael Falcone, Bonita Sharif
:
iTrace: enabling eye tracking on software artifacts within the IDE to support software engineering tasks. 954-957 - Ding Li, Angelica Huyen Tran, William G. J. Halfond:
Nyx: a display energy optimizer for mobile web apps. 958-961 - Chetan Arora
, Mehrdad Sabetzadeh
, Arda Goknil, Lionel C. Briand, Frank Zimmer:
NARCIA: an automated tool for change impact analysis in natural language requirements. 962-965 - Christoffer Rosen, Ben Grawi, Emad Shihab:
Commit guru: analytics and risk prediction of software commits. 966-969 - Davide Di Ruscio
, Dimitris S. Kolovos
, Ioannis Korkontzelos
, Nicholas Drivalos Matragkas, Jurgen J. Vinju:
OSSMETER: a software measurement platform for automatically analysing open source software projects. 970-973 - Paul Börding, Melanie Bruns, Marie Christin Platenius:
Comprehensive service matching with MatchBox. 974-977 - Larissa Leite, Christoph Treude
, Fernando Marques Figueira Filho:
UEDashboard: awareness of unusual events in commit histories. 978-981 - Sana Ben Nasr, Guillaume Bécan, Mathieu Acher, João Bosco Ferreira Filho, Benoit Baudry, Nicolas Sannier, Jean-Marc Davril:
MatrixMiner: a red pill to architect informal product descriptions in the matrix. 982-985
Quality
- Pete Rotella, Sunita Chulani, Devesh Goyal:
Predicting field reliability. 986-989 - Mijung Kim
, Jaechang Nam, Jaehyuk Yeon, Soonhwang Choi, Sunghun Kim:
REMI: defect prediction for efficient API testing. 990-993 - Muhammad Umar Janjua:
OnSpot system: test impact visibility during code edits in real software. 994-997
Software Process
- Juliana Saraiva, Christian Bird, Thomas Zimmermann:
Products, developers, and milestones: how should I build my N-Gram language model. 998-1001 - Joel Greenyer
, Max Haase, Jörg Marhenke, Rene Bellmer:
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering. 1002-1005 - Mahshad M. Mahally, Miroslaw Staron, Jan Bosch:
Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case study. 1006-1009
Requirements and Specification
- Chih-Hong Cheng, Tuncay Guelfirat, Christian Messinger, Johannes O. Schmitt, Matthias Schnelte, Peter Weber:
Semantic degrees for Industrie 4.0 engineering: deciding on the degree of semantic formalization to select appropriate technologies. 1010-1013 - Smita Ghaisas, Manish Motwani, Balaji Balasubramaniam
, Anjali Gajendragadkar, Rahul Kelkar, Harrick M. Vin:
Towards automating the security compliance value chain. 1014-1017 - Aapo Koski, Tommi Mikkonen
:
Requirements, architecture, and quality in a mission critical system: 12 lessons learned. 1018-1021
Doctoral Symposium
- Luca Florio:
Decentralized self-adaptation in large-scale distributed systems. 1022-1025 - Sebastian Vöst:
Vehicle level continuous integration in the automotive industry. 1026-1029 - Lu Xiao:
Quantifying architectural debts. 1030-1033 - Denis Feth:
User-centric security: optimization of the security-usability trade-off. 1034-1037 - Sina Shamshiri:
Automated unit test generation for evolving software. 1038-1041
Student Research Competition
- Thomas D. White
:
Increasing the efficiency of search-based unit test generation using parameter control. 1042-1044 - Kevin Moran:
Enhancing Android application bug reporting. 1045-1047 - Carlos Bernal-Cárdenas:
Improving energy consumption in Android apps. 1048-1050 - Shuktika Jain:
Automated generation of programming language quizzes. 1051-1053 - Venkatesh Vinayakarao:
Spotting familiar code snippet structures for program comprehension. 1054-1056 - Martin Konopka
:
Combining eye tracking with navigation paths for identification of cross-language code dependencies. 1057-1059 - Oyindamola Olajubu:
A textual domain specific language for requirement modelling. 1060-1062 - Christopher Theisen:
Automated attack surface approximation. 1063-1065 - Erina Makihara:
Pockets: a tool to support exploratory programming for novices and educators. 1066-1068

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.