Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSE
ICSE 2018
Generate Citations
2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)
May 27 2018 to June 3 2018
Gothenburg, Sweden
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
Table of contents
Freely available from IEEE.
pp. 5-22
Message from the General Chair
Freely available from IEEE.
pp. 23-25
Message from the Program Chairs
Freely available from IEEE.
pp. 26-27
Message from the Journal First Chair
Freely available from IEEE.
pp. 28-28
Organizing Committee
Freely available from IEEE.
pp. 29-32
Program Board
Freely available from IEEE.
pp. 33-35
Program Committee
Freely available from IEEE.
pp. 36-44
Sponsors and Supporters
Freely available from IEEE.
pp. 45-45
Context-Aware Patch Generation for Better Automated Program Repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Ming Wen
,
Junjie Chen
,
Rongxin Wu
,
Dan Hao
,
Shing-Chi Cheung
Towards Practical Program Repair with On-demand Candidate Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-23
by
Jinru Hua
,
Mengshi Zhang
,
Kaiyuan Wang
,
Sarfraz Khurshid
[Journal First] A Correlation Study Between Automated Program Repair and Test-Suite Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-24
by
Jooyong Yi
,
Shin Hwei Tan
,
Sergey Mechtaev
,
Marcel Böhme
,
Abhik Roychoudhury
[Journal First] Do Automated Program Repair Techniques Repair Hard and Important Bugs?
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-25
by
Manish Motwani
,
Sandhya Sankaranarayanan
,
René Just
,
Yuriy Brun
Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-36
by
Pei Wang
,
Qinkun Bao
,
Li Wang
,
Shuai Wang
,
Zhaofeng Chen
,
Tao Wei
,
Dinghao Wu
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-47
by
Xiaoyin Wang
,
Xue Qin
,
Mitra Bokaei Hosseini
,
Rocky Slavin
,
Travis D. Breaux
,
Jianwei Niu
Online App Review Analysis for Identifying Emerging Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-58
by
Cuiyun Gao
,
Jichuan Zeng
,
Michael R. Lyu
,
Irwin King
EARMO: An Energy-Aware Refactoring Approach for Mobile Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-59
by
Rodrigo Morales
,
Rubén Saborido
,
Foutse Khomh
,
Francisco Chicano
,
Giuliano Antoniol
Neuro-Symbolic Program Corrector for Introductory Programming Assignments
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-70
by
Sahil Bhatia
,
Pushmeet Kohli
,
Rishabh Singh
Automated Localization for Unreproducible Builds
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-81
by
Zhilei Ren
,
He Jiang
,
Jifeng Xuan
,
Zijiang Yang
Enlightened Debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-92
by
Xiangyu Li
,
Shaowei Zhu
,
Marcelo d’Amorim
,
Alessandro Orso
[Journal First] Experiences and Challenges in Building a Data Intensive System for Data Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-93
by
Marco Scavuzzo
,
Elisabetta Di Nitto
,
Danilo Ardagna
Sentiment Analysis for Software Engineering: How Far Can We Go?
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-104
by
Bin Lin
,
Fiorella Zampetti
,
Gabriele Bavota
,
Massimiliano Di Penta
,
Michele Lanza
,
Rocco Oliveto
Identifying Features in Forks
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-116
by
Shurui Zhou
,
Stefan Stanciulescu
,
Olaf Leßenich
,
Yingfei Xiong
,
Andrzej Wasowski
,
Christian Kästner
Roles and Impacts of Hands-on Software Architects in Five Industrial Case Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-127
by
Inayat Rehman
,
Mehdi Mirakhorli
,
Meiyappan Nagappan
,
Azat Aralbay Uulu
,
Matthew Thornton
[Journal First] Sentiment Polarity Detection for Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-128
by
Fabio Calefato
,
Filippo Lanubile
,
Federico Maiorano
,
Nicole Novielli
Semantic Program Repair Using a Reference Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-139
by
Sergey Mechtaev
,
Manh-Dung Nguyen
,
Yannic Noller
,
Lars Grunske
,
Abhik Roychoudhury
Automated Repair of Mobile Friendly Problems in Web Pages
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-150
by
Sonal Mahajan
,
Negarsadat Abolhassani
,
Phil McMinn
,
William G. J. Halfond
Static Automated Program Repair for Heap Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-162
by
Rijnard van Tonder
,
Claire Le Goues
[Journal First] Overfitting in Semantics-Based Automated Program Repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-163
by
Xuan-Bach D. Le
,
Ferdian Thung
,
David Lo
,
Claire Le Goues
[Journal First] Studying the Dialogue Between Users and Developers of Free Apps in the Google Play Store
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-164
by
Safwat Hassan
,
Chakkrit Tantithamthavorn
,
Cor-Paul Bezemer
,
Ahmed E. Hassan
Automated Reporting of GUI Design Violations for Mobile Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-175
by
Kevin Moran
,
Boyang Li
,
Carlos Bernal-Cárdenas
,
Dan Jelf
,
Denys Poshyvanyk
Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-186
by
Yixue Zhao
,
Marcelo Schmitt Laser
,
Yingjun Lyu
,
Nenad Medvidovic
Repairing Crashes in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-198
by
Shin Hwei Tan
,
Zhen Dong
,
Xiang Gao
,
Abhik Roychoudhury
Hybrid Regression Test Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-209
by
Lingming Zhang
Fine-Grained Test Minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-221
by
Arash Vahabzadeh
,
Andrea Stocco
,
Ali Mesbah
FAST Approaches to Scalable Similarity-Based Test Case Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-232
by
Breno Miranda
,
Emilio Cruciani
,
Roberto Verdecchia
,
Antonia Bertolino
Towards Refactoring-Aware Regression Test Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-244
by
Kaiyuan Wang
,
Chenguang Zhu
,
Ahmet Celik
,
Jongwook Kim
,
Don Batory
,
Milos Gligoric
Inheritance Usage Patterns in Open-Source Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-255
by
Jamie Stevenson
,
Murray Wood
Almost There: A Study on Quasi-Contributors in Open-Source Software Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-266
by
Igor Steinmacher
,
Gustavo Pinto
,
Igor Scaliante Wiese
,
Marco Aurélio Gerosa
[Journal First] Analyzing a Decade of Linux System Calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-267
by
Mojtaba Bagherzadeh
,
Nafiseh Kahani
,
Cor-Paul Bezemer
,
Ahmed E. Hassan
,
Juergen Dingel
,
James R. Cordy
To Distribute or Not to Distribute? Why Licensing Bugs Matter
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-279
by
Christopher Vendome
,
Daniel German
,
Massimiliano Di Penta
,
Gabriele Bavota
,
Mario Linares-Vásquez
,
Denys Poshyvanyk
Augusto: Exploiting Popular Functionalities for the Generation of Semantic GUI Tests with Oracles
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-290
by
Leonardo Mariani
,
Mauro Pezzè
,
Daniele Zuddas
Towards Optimal Concolic Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-302
by
Xinyu Wang
,
Jun Sun
,
Zhenbang Chen
,
Peixin Zhang
,
Jingyi Wang
,
Yun Lin
DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-314
by
Yuchi Tian
,
Kexin Pei
,
Suman Jana
,
Baishakhi Ray
Precise Concolic Unit Testing of C Programs Using Extended Units and Symbolic Alarm Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-326
by
Yunho Kim
,
Yunja Choi
,
Moonzoo Kim
Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-337
by
Hua Yan
,
Yulei Sui
,
Shiping Chen
,
Jingling Xue
Program Splicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-349
by
Yanxin Lu
,
Swarat Chaudhuri
,
Chris Jermaine
,
David Melski
Chopped Symbolic Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-360
by
David Trabish
,
Andrea Mattavelli
,
Noam Rinetzky
,
Cristian Cadar
Perses: Syntax-Guided Program Reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-371
by
Chengnian Sun
,
Yuanbo Li
,
Qirun Zhang
,
Tianxiao Gu
,
Zhendong Su
Secure Coding Practices in Java: Challenges and Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-383
by
Na Meng
,
Stefan Nagy
,
Danfeng Yao
,
Wenjie Zhuang
,
Gustavo Arango-Argoty
EnMobile: Entity-Based Characterization and Analysis of Mobile Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-394
by
Wei Yang
,
Mukul Prasad
,
Tao Xie
[Journal First] Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-395
by
Katsiaryna Labunets
,
Fabio Massacci
,
Federica Paci
,
Sabrina Marczak
,
Flávio Moreira de Oliveira
[Journal First] Privacy by Designers: Software Developers' Privacy Mindset
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-396
by
Irit Hadar
,
Tomer Hasson
,
Oshrat Ayalon
,
Eran Toch
,
Michael Birnhack
,
Sofia Sherman
,
Arod Balissa
Does the Propagation of Artifact Changes Across Tasks Reflect Work Dependencies?
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-407
by
Christoph Mayr-Dorn
,
Alexander Egyed
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-419
by
Lingling Fan
,
Ting Su
,
Sen Chen
,
Guozhu Meng
,
Yang Liu
,
Lihua Xu
,
Geguang Pu
,
Zhendong Su
[Journal First] Effect Sizes and their Variance for AB/BA Crossover Design Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-420
by
Lech Madeyski
,
Barbara Kitchenham
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware Products
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-431
by
Mahmoud Hammad
,
Joshua Garcia
,
Sam Malek
[Journal First] An Empirical Study on the Interplay Between Semantic Coupling and Co-change of Software Classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-432
by
Nemitari Ajienka
,
Andrea Capiluppi
,
Steve Counsell
DeFlaker: Automatically Detecting Flaky Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-444
by
Jonathan Bell
,
Owolabi Legunsen
,
Michael Hilton
,
Lamyaa Eloussi
,
Tifany Yung
,
Darko Marinov
DetReduce: Minimizing Android GUI Test Suites for Regression Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-455
by
Wontae Choi
,
Koushik Sen
,
George Necul
,
Wenyu Wang
Time to Clean Your Test Objectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-467
by
Michaël Marcozzi
,
Sébastien Bardin
,
Nikolai Kosmatov
,
Mike Papadakis
,
Virgile Prevosto
,
Loïc Correnson
Prioritizing Browser Environments for Web Application Test Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-479
by
Jung-Hyun Kwon
,
In-Young Ko
,
Gregg Rothermel
[Journal First] An Empirical Study of Early Access Games on the Steam Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-480
by
Dayi Lin
,
Cor-Paul Bezemer
,
Ahmed E. Hassan
[Journal First] Correctness Attraction: A Study of Stability of Software Behavior Under Runtime Perturbation
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-481
by
Benjamin Danglot
,
Philippe Preux
,
Benoit Baudry
,
Martin Monperrus
[Journal First] On the Diffuseness and the Impact on Maintainability of Code Smells: A Large Scale Empirical Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-482
by
Fabio Palomba
,
Gabriele Bavota
,
Massimiliano Di Penta
,
Fausto Fasano
,
Rocco Oliveto
,
Andrea De Lucia
Accurate and Efficient Refactoring Detection in Commit History
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-494
by
Nikolaos Tsantalis
,
Matin Mansouri
,
Laleh Eshkevari
,
Davood Mazinanian
,
Danny Dig
ENTRUST: Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-495
by
Radu Calinescu
,
Danny Weyns
,
Simos Gerasimou
,
M. Usman Iftikhar
,
Ibrahim Habli
,
Tim Kelly
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-496
by
Sylvain Frey
,
Awais Rashid
,
Pauline Anthonysamy
,
Maria Pinto-Albuquerque
,
Syad Asad Naqvi
[Journal First] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-497
by
Joshua Garcia
,
Mahmoud Hammad
,
Sam Malek
[Journal First] Are Vulnerabilities Discovered and Resolved Like Other Defects?
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-498
by
Patrick Morrison
,
Rahul Pandita
,
Xusheng Xiao
,
Ram Chillarege
,
Laurie Williams
How Modern News Aggregators Help Development Communities Shape and Share Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-510
by
Maurício Aniche
,
Christoph Treude
,
Igor Steinmacher
,
Igor Wiese
,
Gustavo Pinto
,
Margaret-Anne Storey
,
Marco Aurélio Gerosa
Adding Sparkle to Social Coding: An Empirical Study of Repository Badges in the npm Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-522
by
Asher Trockman
,
Shurui Zhou
,
Christian Kästner
,
Bogdan Vasilescu
"Was My Contribution Fairly Reviewed?" A Framework to Study the Perception of Fairness in Modern Code Reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-534
by
Daniel M. German
,
Gregorio Robles
,
Germán Poo-Caamaño
,
Xin Yang
,
Hajimu Iida
,
Katsuro Inoue
Collaborative Model-Driven Software Engineering: A Classification Framework and a Research Map [Extended Abstract]
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-535
by
Davide Di Ruscio
,
Mirco Franzago
,
Ivano Malavolta
,
Henry Muccini
[Journal First] ChangeLocator: Locate Crash-Inducing Changes Based on Crash Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-536
by
Rongxin Wu
,
Ming Wen
,
Shing-Chi Cheung
,
Hongyu Zhang
Are Mutation Scores Correlated with Real Fault Detection? A Large Scale Empirical Study on the Relationship Between Mutants and Real Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-548
by
Mike Papadakis
,
Donghwan Shin
,
Shin Yoo
,
Doo-Hwan Bae
Efficient Sampling of SAT Solutions for Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-559
by
Rafael Dutra
,
Kevin Laeufer
,
Jonathan Bachrach
,
Koushik Sen
[Journal First] Are Fix-Inducing Changes a Moving Target?: A Longitudinal Case Study of Just-in-Time Defect Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-560
by
Shane McIntosh
,
Yasutaka Kamei
Understanding Developers' Needs on Deprecation as a Language Feature
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-571
by
Anand Ashok Sawant
,
Mauricio Aniche
,
Arie van Deursen
,
Alberto Bacchelli
On the Dichotomy of Debugging Behavior Among Programmers
Full-text access may be available. Sign in or learn about subscription options.
pp. 572-583
by
Moritz Beller
,
Niels Spruit
,
Diomidis Spinellis
,
Andy Zaidman
Measuring Program Comprehension: A Large-Scale Field Study with Professionals
Full-text access may be available. Sign in or learn about subscription options.
pp. 584-584
by
Xin Xia
,
Lingfeng Bao
,
David Lo
,
Zhenchang Xing
,
Ahmed E. Hassan
,
Shanping Li
Data Scientists in Software Teams: State of the Art and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-585
by
Miryung Kim
,
Thomas Zimmermann
,
Robert DeLine
,
Andrew Begel
Dataflow Tunneling: Mining Inter-Request Data Dependencies for Request-Based Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-597
by
Xiao Yu
,
Guoliang Jin
Launch-Mode-Aware Context-Sensitive Activity Transition Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-608
by
Yifei Zhang
,
Yulei Sui
,
Jingling Xue
UFO: Predictive Concurrency Use-After-Free Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 609-619
by
Jeff Huang
Collective Program Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 620-631
by
Ganesha Upadhyaya
,
Hridesh Rajan
Statistical Learning of API Fully Qualified Names in Code Snippets of Online Forums
Full-text access may be available. Sign in or learn about subscription options.
pp. 632-642
by
Hung Phan
,
Hoan Nguyen
,
Ngoc Tran
,
Linh Truong
,
Anh Nguyen
,
Tien Nguyen
When Not to Comment: Questions and Tradeoffs with API Documentation for C++ Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 643-653
by
Andrew Head
,
Caitlin Sadowski
,
Emerson Murphy-Hill
,
Andrea Knight
Deuce: A Lightweight User Interface for Structured Editing
Full-text access may be available. Sign in or learn about subscription options.
pp. 654-664
by
Brian Hempel
,
Justin Lubin
,
Grace Lu
,
Ravi Chugh
From UI Design Image to GUI Skeleton: A Neural Machine Translator to Bootstrap Mobile GUI Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 665-676
by
Chunyang Chen
,
Ting Su
,
Guozhu Meng
,
Zhenchang Xing
,
Yang Liu
When Testing Meets Code Review: Why and How Developers Review Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 677-687
by
Davide Spadini
,
Maurício Aniche
,
Margaret-Anne Storey
,
Magiel Bruntink
,
Alberto Bacchelli
Redefining Prioritization: Continuous Prioritization for Continuous Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 688-698
by
Jingjing Liang
,
Sebastian Elbaum
,
Gregg Rothermel
[Journal First] MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 699-699
by
Kwabena Ebo Bennin
,
Jacky Keung
,
Passakorn Phannachitta
,
Akito Monden
,
Solomon Mensah
[Journal First] On the Use of Hidden Markov Model to Predict the Time to Fix Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 700-700
by
Mayy Habayeb
,
Syed Shariyar Murtaza
,
Andriy Miranskyy
,
Ayse Basar Bener
[Journal First] What Makes a Great Manager of Software Engineers?
Full-text access may be available. Sign in or learn about subscription options.
pp. 701-701
by
Eirini Kalliamvakou
,
Christian Bird
,
Thomas Zimmermann
,
Andrew Begel
,
Robert DeLine
,
Daniel German
[Journal First] Older Adults and Hackathons: A Qualitative Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 702-703
by
Wieslaw Kopec
,
Bartlomiej Balcerzak
,
Radoslaw Nielek
,
Grzegorz Kowalik
,
Adam Wierzbicki
,
Fabio Casati
[Journal First] Does Syntax Highlighting Help Programming Novices?
Full-text access may be available. Sign in or learn about subscription options.
pp. 704-704
by
Christoph Hannebauer
,
Marc Hesenius
,
Volker Gruhn
Do Programmers Work at Night or During the Weekend?
Full-text access may be available. Sign in or learn about subscription options.
pp. 705-715
by
Maëlick Claes
,
Mika Mäntylä
,
Miikka Kuutila
,
Bram Adams
Multi-granular Conflict and Dependency Analysis in Software Engineering Based on Graph Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 716-727
by
Leen Lambers
,
Daniel Strüber
,
Gabriele Taentzer
,
Kristopher Born
,
Jevgenij Huebert
Showing 100 out of 165
Load More
Load All