Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSME
ICSME 2019
Generate Citations
2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)
Sept. 29 2019 to Oct. 4 2019
Cleveland, OH, USA
ISBN: 978-1-7281-3094-1
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-15
Message from the General Co-Chairs and the Program Co-Chairs
Freely available from IEEE.
pp. 16-17
Organizing Committee
Freely available from IEEE.
pp. 18-19
Steering Committee
Freely available from IEEE.
pp. 20-20
Program Committee
Freely available from IEEE.
pp. 21-25
Keynote Abstracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-28
A Longitudinal Analysis of Bug Handling Across Eclipse Releases
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Zeinab Abou Khalil
,
Eleni Constantinou
,
Tom Mens
,
Laurence Duchien
,
Clément Quinton
Impact of Switching Bug Trackers: A Case Study on a Medium-Sized Open Source Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-23
by
Théo Zimmermann
,
Annalí Casanueva Artís
The Impact of Rare Failures on Statistical Fault Localization: The Case of the Defects4J Suite
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-28
by
Yiğit Küçük
,
Tim A. D. Henderson
,
Andy Podgurski
Do Energy-Oriented Changes Hinder Maintainability?
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-40
by
Luis Cruz
,
Rui Abreu
,
John Grundy
,
Li Li
,
Xin Xia
Can Everyone use my app? An Empirical Study on Accessibility in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-52
by
Christopher Vendome
,
Diana Solano
,
Santiago Liñán
,
Mario Linares-Vásquez
Quantifying the Performance Impact of SQL Antipatterns on Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-64
by
Yingjun Lyu
,
Ali Alotaibi
,
William G. J. Halfond
An Empirical Study of UI Implementations in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-75
by
Mian Wan
,
Negarsadat Abolhassani
,
Ali Alotaibi
,
William G. J. Halfond
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-80
by
Kamonphop Srisopha
,
Chukiat Phonsom
,
Keng Lin
,
Barry Boehm
Improving Bug Triaging with High Confidence Predictions at Ericsson
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-91
by
Aindrila Sarkar
,
Peter C. Rigby
,
Béla Bartalos
An Industrial Study on the Differences between Pre-Release and Post-Release Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-102
by
Renaud Rwemalika
,
Marinos Kintis
,
Mike Papadakis
,
Yves Le Traon
,
Pierre Lorrach
Tracing with Less Data: Active Learning for Classification-Based Traceability Link Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-113
by
Chris Mills
,
Javier Escobar-Avila
,
Aditya Bhattacharya
,
Grigoriy Kondyukov
,
Shayok Chakraborty
,
Sonia Haiduc
Deep Learning Anti-Patterns from Code Metrics History
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-124
by
Antoine Barbez
,
Foutse Khomh
,
Yann-Gaël Guéhéneuc
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-134
by
Han Anu
,
Jie Chen
,
Wenchang Shi
,
Jianwei Hou
,
Bin Liang
,
Bo Qin
Automated Characterization of Software Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-139
by
Danielle Gonzalez
,
Holly Hastings
,
Mehdi Mirakhorli
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-144
by
David N. Palacio
,
Daniel McCrystal
,
Kevin Moran
,
Carlos Bernal-Cárdenas
,
Denys Poshyvanyk
,
Chris Shenefiel
TECCD: A Tree Embedding Approach for Code Clone Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-156
by
Yi Gao
,
Zan Wang
,
Shuang Liu
,
Lin Yang
,
Wei Sang
,
Yuanfang Cai
Investigating Context Adaptation Bugs in Code Clones
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-168
by
Manishankar Mondal
,
Banani Roy
,
Chanchal K. Roy
,
Kevin A. Schneider
Decomposing God Classes at Siemens
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-180
by
Nicolas Anquetil
,
Anne Etien
,
Gaelle Andreo
,
Stéphane Ducasse
Tracy: A Business-Driven Technical Debt Prioritization Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Rodrigo Rebouças de Almeida
,
Christoph Treude
,
Uirá Kulesza
Self-Admitted Technical Debt Removal and Refactoring Actions: Co-Occurrence or More?
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Martina Iammarino
,
Fiorella Zampetti
,
Lerina Aversano
,
Massimiliano Di Penta
Identifying the Within-Statement Changes to Facilitate Change Understanding
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-201
by
Chunhua Yang
,
Jim WhiteHead
Aiding Code Change Understanding with Semantic Change Impact Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-212
by
Quinn Hanam
,
Ali Mesbah
,
Reid Holmes
Towards Generating Transformation Rules without Examples for Android API Replacement
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Ferdian Thung
,
Hong Jin Kang
,
Lingxiao Jiang
,
David Lo
How Do Code Changes Evolve in Different Platforms? A Mining-Based Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Markos Viggiato
,
Johnatan Oliveira
,
Eduardo Figueiredo
,
Pooyan Jamshidi
,
Christian Kästner
How the Experience of Development Teams Relates to Assertion Density of Test Classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-234
by
Gemma Catolino
,
Fabio Palomba
,
Andy Zaidman
,
Filomena Ferrucci
Automatic Discovery and Cleansing of Numerical Metamorphic Relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-245
by
Bo Zhang
,
Hongyu Zhang
,
Junjie Chen
,
Dan Hao
,
Pablo Moscato
AutoMR: Automatic Discovery and Cleansing of Numerical Metamorphic Relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-246
by
Bo Zhang
,
Hongyu Zhang
,
Junjie Chen
,
Dan Hao
,
Pablo Moscato
Automated Identification of Over-Privileged SmartThings Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Atheer Abu Zaid
,
Manar H. Alalfi
,
Ali Miri
EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-256
by
Krishna Prasad Neupane
,
Kabo Cheung
,
Yi Wang
Know-How in Programming Tasks: From Textual Tutorials to Task-Oriented Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-268
by
Jiamou Sun
,
Zhenchang Xing
,
Rui Chu
,
Heilai Bai
,
Jinshui Wang
,
Xin Peng
An Empirical Study of Abbreviations and Expansions in Software Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-279
by
Christian D. Newman
,
Michael J. Decker
,
Reem S. Alsuhaibani
,
Anthony Peruma
,
Dishant Kaushik
,
Emily Hill
An Open Dataset of Abbreviations and Expansions
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-280
by
Christian Newman
,
Michael John Decker
,
Reem S AlSuhaibani
,
Anthony Peruma
,
Dishant Kaushik
,
Emily Hill
Estimating Software Task Effort in Crowds
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-285
by
Mohammed Alhamed
,
Tim Storer
Do as I Do, Not as I Say: Do Contribution Guidelines Match the GitHub Contribution Process?
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Omar Elazhary
,
Margaret-Anne Storey
,
Neil Ernst
,
Andy Zaidman
An Analysis of 35+ Million Jobs of Travis CI
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-295
by
Thomas Durieux
,
Rui Abreu
,
Martin Monperrus
,
Tegawendé F. Bissyandé
,
Luís Cruz
Linguistic Change in Open Source Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Miroslav Tushev
,
Saket Khatiwada
,
Anas Mahmoud
Learning How to Mutate Source Code from Bug-Fixes
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-312
by
Michele Tufano
,
Cody Watson
,
Gabriele Bavota
,
Massimiliano Di Penta
,
Martin White
,
Denys Poshyvanyk
Personalized Code Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Tam Nguyen
,
Phong Vu
,
Tung Nguyen
Syntax and Stack Overflow: A Methodology for Extracting a Corpus of Syntax Errors and Fixes
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Alexander William Wong
,
Amir Salimi
,
Shaiful Chowdhury
,
Abram Hindle
BARRIERFINDER: Recognizing Ad Hoc Barriers
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-327
by
Tao Wang
,
Xiao Yu
,
Zhengyi Qiu
,
Guoliang Jin
,
Frank Mueller
Impact Analysis of Syntactic and Semantic Similarities on Patch Prioritization in Automated Program Repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Moumita Asad
,
Kishan Kumar Ganguly
,
Kazi Sakib
Losing Confidence in Quality: Unspoken Evolution of Computer Vision Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-342
by
Alex Cummaudo
,
Rajesh Vasa
,
John Grundy
,
Mohamed Abdelrazek
,
Andrew Cain
Inappropriate Usage Examples in Web API Documentations
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-347
by
Masaki Hosono
,
Hironori Washizaki
,
Kiyoshi Honda
,
Hiromasa Nagumo
,
Hisanobu Sonoda
,
Yoshiaki Fukazawa
,
Kazuki Munakata
,
Takao Nakagawa
,
Yusuke Nemoto
,
Susumu Tokumoto
,
Supasit Monpratarnchai
What Do Developers Discuss about Biometric APIs?
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Zhe Jin
,
Kong Yik Chee
,
Xin Xia
Teaching Software Maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-362
by
Keith Gallagher
,
Mark Fioravanti
,
Suzanne Kozaitis
Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-363
by
Chang Liu
,
Krerkkiat Chusap
,
Zhongen Li
,
Zhaojie Chen
,
Dylan Rogers
,
Fanghao Song
Challenges in re-Platforming Mixed Language PL/I and COBOL IS to an Open Systems Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-364
by
Thomas Wagner
,
Christian Brem
,
Stefan Strobl
,
Thomas Grechenig
Application of Philosophical Principles in Linux Kernel Customization
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-365
by
Hang Li
,
Lin Yan
,
XiLiang Zhao
Lessons Learned from Large-Scale Refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-366
by
Hyrum Wright
Interactive Traceability Links Visualization using Hierarchical Trace Map
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-369
by
Thazin Win Win Aung
,
Huan Huo
,
Yulei Sui
Supporting Software Architecture Maintenance by Providing Task-Specific Recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-372
by
Matthias Galster
,
Christoph Treude
,
Kelly Blincoe
A Validation Method of Self-Adaptive Strategy Based on POMDP
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-375
by
Tong Wu
,
Qignshan Li
,
Lu Wang
Modeling the Relationship Between Identifier Name and Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-378
by
Christian D. Newman
,
Anthony Preuma
,
Reem AlSuhaibani
Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-381
by
Michael Shah
Processing Large Datasets of Fined Grained Source Code Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-385
by
Stanislav Levin
,
Amiram Yehudai
CodeSonar (R) Extension for Copy-Paste-(Mis) Adapt Error Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-389
by
Petru-Florin Mihancea
,
Roger Scott
Recommending Exception Handling Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-393
by
Tam Nguyen
,
Phong Vu
,
Tung Nguyen
SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-397
by
Zhipeng Gao
,
Vinoj Jayasundara
,
LingXiao Jiang
,
Xin Xia
,
David Lo
,
John Grundy
Near-Omniscient Debugging for Java Using Size-Limited Execution Trace
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-401
by
Kazumasa Shimari
,
Takashi Ishio
,
Tetsuya Kanda
,
Katsuro Inoue
Sciit: Aligning Source Control Management and Issue Tracking Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-405
by
Nystrom Edwards
,
Dhitiwat Jongsuebchoke
,
Tim Storer
Ticket Tagger: Machine Learning Driven Issue Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-409
by
Rafael Kallis
,
Andrea Di Sorbo
,
Gerardo Canfora
,
Sebastiano Panichella
Kraken-Mobile: Cross-Device Interaction-Based Testing of Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-413
by
William Ravelo-Méndez
,
Camilo Escobar-Vélasquez
,
Mario Linares-Vásquez
MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-417
by
Hussein Alrubaye
,
Mohamed Wiem Mkaouer
,
Ali Ouni
OPIA: A Tool for On-Device Testing of Vulnerabilities in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-421
by
Laura Bello-Jiménez
,
Alejandro Mazuera-Rozo
,
Mario Linares-Vásquez
,
Gabriele Bavota
OSAIFU: A Source Code Factorizer on Android Studio
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-425
by
Masahiro Hata
,
Masashi Nishimoto
,
Keiji Nishiyama
,
Hideyuki Kawabata
,
Tetsuo Hironaka
An Empirical Study of the Relationship between Continuous Integration and Test Code Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-436
by
Gustavo Sizilio Nery
,
Daniel Alencar da Costa
,
Uirá Kulesza
What Factors Make SQL Test Cases Understandable for Testers? A Human Study of Automated Test Data Generation Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-448
by
Abdullah Alsharif
,
Gregory M. Kapfhammer
,
Phil McMinn
Systematically Testing and Diagnosing Responsiveness for Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-453
by
Wenhua Zhao
,
Zhenkai Ding
,
Mingyuan Xia
,
Zhengwei Qi
DeepEvolution: A Search-Based Testing Approach for Deep Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-458
by
Houssem Ben Braiek
,
Foutse Khomh
An Exploratory Study of Logging Configuration Practice in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-469
by
Chen Zhi
,
Jianwei Yin
,
Shuiguang Deng
,
Maoxin Ye
,
Min Fu
,
Tao Xie
Performance-Influence Model for Highly Configurable Software with Fourier Learning and Lasso Regression
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-480
by
Huong Ha
,
Hongyu Zhang
Microservices Migration in Industry: Intentions, Strategies, and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-490
by
Jonas Fritzsch
,
Justus Bogner
,
Stefan Wagner
,
Alfred Zimmermann
Comparing Constraints Mined From Execution Logs to Understand Software Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-495
by
Thomas Krismayer
,
Michael Vierhauser
,
Rick Rabiser
,
Paul Grünbacher
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-500
by
Effat Farhana
,
Nasif Imtiaz
,
Akond Rahman
Comprehending Test Code: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-512
by
Chak Shun Yu
,
Christoph Treude
,
Maurício Aniche
An Empirical Study Assessing Source Code Readability in Comprehension
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-523
by
John Johnson
,
Sergio Lubo
,
Nishitha Yedla
,
Jairo Aponte
,
Bonita Sharif
Handling Duplicates in Dockerfiles Families: Learning from Experts
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-535
by
Mohamed A. Oumaziz
,
Jean-Rémy Falleri
,
Xavier Blanc
,
Tegawendé F. Bissyandé
,
Jacques Klein
Share, But be Aware: Security Smells in Python Gists
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-540
by
Md Rayhanur Rahman
,
Akond Rahman
,
Laurie Williams
Can Automated Impact Analysis Techniques Help Predict Decaying Modules?
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-545
by
Natthawute Sae-Lim
,
Shinpei Hayashi
,
Motoshi Saeki
Assuring the Evolvability of Microservices: Insights into Industry Practices and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-556
by
Justus Bogner
,
Jonas Fritzsch
,
Stefan Wagner
,
Alfred Zimmermann
Investigating Instability Architectural Smells Evolution: An Exploratory Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 557-567
by
Darius Sas
,
Paris Avgeriou
,
Francesca Arcelli Fontana
A Qualitative Study on Framework Debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-579
by
Zack Coker
,
David Gray Widder
,
Claire Le Goues
,
Christopher Bogart
,
Joshua Sunshine
Adoption, Support, and Challenges of Infrastructure-as-Code: Insights from Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 580-589
by
MIchele Guerriero
,
Martin Garriga
,
Damian A. Tamburri
,
Fabio Palomba
Studying the Impact of Policy Changes on Bug Handling Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-594
by
Zeinab Abou Khalil
Automatic Examining of Software Architectures on Mobile Applications Codebases
Full-text access may be available. Sign in or learn about subscription options.
pp. 595-599
by
Dragoş Dobrean
The Relationship Between Cognitive Complexity and the Probability of Defects
Full-text access may be available. Sign in or learn about subscription options.
pp. 600-604
by
Basma S. Alqadi
Business-Driven Technical Debt Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 605-609
by
Rodrigo Rebouças de Almeida
Applying Markov Models to Identify Grammatical Patterns of Function Identifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 610-614
by
Reem S. Alsuhaibani
Enhancing Eye Tracking of Source Code: A Specialized Fixation Filter for Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 615-618
by
Drew T. Guarnera
Improving the Robustness and Efficiency of Continuous Integration and Deployment
Full-text access may be available. Sign in or learn about subscription options.
pp. 619-623
by
Keheliya Gallaba
Towards Better Understanding Developer Perception of Refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 624-628
by
Eman Abdullah Alomar
Showing 100 out of 105
Load More
Load All