Default Cover Image

2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)

May 27 2018 to June 3 2018

Gothenburg, Sweden

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
Table of contentsFreely available from IEEE.pp. 5-22
Message from the General ChairFreely available from IEEE.pp. 23-25
Message from the Program ChairsFreely available from IEEE.pp. 26-27
Message from the Journal First ChairFreely available from IEEE.pp. 28-28
Organizing CommitteeFreely available from IEEE.pp. 29-32
Program BoardFreely available from IEEE.pp. 33-35
Program CommitteeFreely available from IEEE.pp. 36-44
Sponsors and SupportersFreely available from IEEE.pp. 45-45
Context-Aware Patch Generation for Better Automated Program RepairFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Towards Practical Program Repair with On-demand Candidate GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 12-23
[Journal First] Do Automated Program Repair Techniques Repair Hard and Important Bugs?Full-text access may be available. Sign in or learn about subscription options.pp. 25-25
Software Protection on the Go: A Large-Scale Empirical Study on Mobile App ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 26-36
Online App Review Analysis for Identifying Emerging IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 48-58
EARMO: An Energy-Aware Refactoring Approach for Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 59-59
Neuro-Symbolic Program Corrector for Introductory Programming AssignmentsFull-text access may be available. Sign in or learn about subscription options.pp. 60-70
Automated Localization for Unreproducible BuildsFull-text access may be available. Sign in or learn about subscription options.pp. 71-81
Enlightened DebuggingFull-text access may be available. Sign in or learn about subscription options.pp. 82-92
Sentiment Analysis for Software Engineering: How Far Can We Go?Full-text access may be available. Sign in or learn about subscription options.pp. 94-104
Identifying Features in ForksFull-text access may be available. Sign in or learn about subscription options.pp. 105-116
[Journal First] Sentiment Polarity Detection for Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 128-128
Semantic Program Repair Using a Reference ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 129-139
Automated Repair of Mobile Friendly Problems in Web PagesFull-text access may be available. Sign in or learn about subscription options.pp. 140-150
Static Automated Program Repair for Heap PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 151-162
[Journal First] Overfitting in Semantics-Based Automated Program RepairFull-text access may be available. Sign in or learn about subscription options.pp. 163-163
Automated Reporting of GUI Design Violations for Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 165-175
Leveraging Program Analysis to Reduce User-Perceived Latency in Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 176-186
Repairing Crashes in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 187-198
Hybrid Regression Test SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 199-209
Fine-Grained Test MinimizationFull-text access may be available. Sign in or learn about subscription options.pp. 210-221
FAST Approaches to Scalable Similarity-Based Test Case PrioritizationFull-text access may be available. Sign in or learn about subscription options.pp. 222-232
Towards Refactoring-Aware Regression Test SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 233-244
Inheritance Usage Patterns in Open-Source SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 245-255
Almost There: A Study on Quasi-Contributors in Open-Source Software ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 256-266
[Journal First] Analyzing a Decade of Linux System CallsFull-text access may be available. Sign in or learn about subscription options.pp. 267-267
Augusto: Exploiting Popular Functionalities for the Generation of Semantic GUI Tests with OraclesFull-text access may be available. Sign in or learn about subscription options.pp. 280-290
Towards Optimal Concolic TestingFull-text access may be available. Sign in or learn about subscription options.pp. 291-302
DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous CarsFull-text access may be available. Sign in or learn about subscription options.pp. 303-314
Precise Concolic Unit Testing of C Programs Using Extended Units and Symbolic Alarm FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 315-326
Program SplicingFull-text access may be available. Sign in or learn about subscription options.pp. 338-349
Chopped Symbolic ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 350-360
Perses: Syntax-Guided Program ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 361-371
Secure Coding Practices in Java: Challenges and VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 372-383
EnMobile: Entity-Based Characterization and Analysis of Mobile MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 384-394
Does the Propagation of Artifact Changes Across Tasks Reflect Work Dependencies?Full-text access may be available. Sign in or learn about subscription options.pp. 397-407
Large-Scale Analysis of Framework-Specific Exceptions in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 408-419
[Journal First] Effect Sizes and their Variance for AB/BA Crossover Design StudiesFull-text access may be available. Sign in or learn about subscription options.pp. 420-420
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware ProductsFull-text access may be available. Sign in or learn about subscription options.pp. 421-431
DeFlaker: Automatically Detecting Flaky TestsFull-text access may be available. Sign in or learn about subscription options.pp. 433-444
DetReduce: Minimizing Android GUI Test Suites for Regression TestingFull-text access may be available. Sign in or learn about subscription options.pp. 445-455
Time to Clean Your Test ObjectivesFull-text access may be available. Sign in or learn about subscription options.pp. 456-467
Prioritizing Browser Environments for Web Application Test ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 468-479
[Journal First] An Empirical Study of Early Access Games on the Steam PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 480-480
Accurate and Efficient Refactoring Detection in Commit HistoryFull-text access may be available. Sign in or learn about subscription options.pp. 483-494
[Journal First] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 497-497
[Journal First] Are Vulnerabilities Discovered and Resolved Like Other Defects?Full-text access may be available. Sign in or learn about subscription options.pp. 498-498
[Journal First] ChangeLocator: Locate Crash-Inducing Changes Based on Crash ReportsFull-text access may be available. Sign in or learn about subscription options.pp. 536-536
Efficient Sampling of SAT Solutions for TestingFull-text access may be available. Sign in or learn about subscription options.pp. 549-559
Understanding Developers' Needs on Deprecation as a Language FeatureFull-text access may be available. Sign in or learn about subscription options.pp. 561-571
On the Dichotomy of Debugging Behavior Among ProgrammersFull-text access may be available. Sign in or learn about subscription options.pp. 572-583
Measuring Program Comprehension: A Large-Scale Field Study with ProfessionalsFull-text access may be available. Sign in or learn about subscription options.pp. 584-584
Data Scientists in Software Teams: State of the Art and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 585-585
Dataflow Tunneling: Mining Inter-Request Data Dependencies for Request-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 586-597
Launch-Mode-Aware Context-Sensitive Activity Transition AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 598-608
UFO: Predictive Concurrency Use-After-Free DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 609-619
Collective Program AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 620-631
Statistical Learning of API Fully Qualified Names in Code Snippets of Online ForumsFull-text access may be available. Sign in or learn about subscription options.pp. 632-642
When Not to Comment: Questions and Tradeoffs with API Documentation for C++ ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 643-653
Deuce: A Lightweight User Interface for Structured EditingFull-text access may be available. Sign in or learn about subscription options.pp. 654-664
When Testing Meets Code Review: Why and How Developers Review TestsFull-text access may be available. Sign in or learn about subscription options.pp. 677-687
Redefining Prioritization: Continuous Prioritization for Continuous IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 688-698
[Journal First] On the Use of Hidden Markov Model to Predict the Time to Fix BugsFull-text access may be available. Sign in or learn about subscription options.pp. 700-700
[Journal First] What Makes a Great Manager of Software Engineers?Full-text access may be available. Sign in or learn about subscription options.pp. 701-701
[Journal First] Does Syntax Highlighting Help Programming Novices?Full-text access may be available. Sign in or learn about subscription options.pp. 704-704
Do Programmers Work at Night or During the Weekend?Full-text access may be available. Sign in or learn about subscription options.pp. 705-715
Showing 100 out of 165