Default Cover Image

2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)

Sept. 29 2019 to Oct. 4 2019

Cleveland, OH, USA

ISBN: 978-1-7281-3094-1

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-15
Organizing CommitteeFreely available from IEEE.pp. 18-19
Steering CommitteeFreely available from IEEE.pp. 20-20
Program CommitteeFreely available from IEEE.pp. 21-25
Keynote AbstractsFull-text access may be available. Sign in or learn about subscription options.pp. 26-28
A Longitudinal Analysis of Bug Handling Across Eclipse ReleasesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Impact of Switching Bug Trackers: A Case Study on a Medium-Sized Open Source ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 13-23
The Impact of Rare Failures on Statistical Fault Localization: The Case of the Defects4J SuiteFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Do Energy-Oriented Changes Hinder Maintainability?Full-text access may be available. Sign in or learn about subscription options.pp. 29-40
Can Everyone use my app? An Empirical Study on Accessibility in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 41-52
Quantifying the Performance Impact of SQL Antipatterns on Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 53-64
An Empirical Study of UI Implementations in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 65-75
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS AppsFull-text access may be available. Sign in or learn about subscription options.pp. 76-80
Improving Bug Triaging with High Confidence Predictions at EricssonFull-text access may be available. Sign in or learn about subscription options.pp. 81-91
Deep Learning Anti-Patterns from Code Metrics HistoryFull-text access may be available. Sign in or learn about subscription options.pp. 114-124
An Approach to Recommendation of Verbosity Log Levels Based on Logging IntentionFull-text access may be available. Sign in or learn about subscription options.pp. 125-134
Automated Characterization of Software VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 135-139
TECCD: A Tree Embedding Approach for Code Clone DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 145-156
Investigating Context Adaptation Bugs in Code ClonesFull-text access may be available. Sign in or learn about subscription options.pp. 157-168
Decomposing God Classes at SiemensFull-text access may be available. Sign in or learn about subscription options.pp. 169-180
Tracy: A Business-Driven Technical Debt Prioritization FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Identifying the Within-Statement Changes to Facilitate Change UnderstandingFull-text access may be available. Sign in or learn about subscription options.pp. 191-201
Aiding Code Change Understanding with Semantic Change Impact AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 202-212
Towards Generating Transformation Rules without Examples for Android API ReplacementFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
How the Experience of Development Teams Relates to Assertion Density of Test ClassesFull-text access may be available. Sign in or learn about subscription options.pp. 223-234
Automatic Discovery and Cleansing of Numerical Metamorphic RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 235-245
AutoMR: Automatic Discovery and Cleansing of Numerical Metamorphic RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 246-246
Automated Identification of Over-Privileged SmartThings AppsFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 252-256
Know-How in Programming Tasks: From Textual Tutorials to Task-Oriented Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 257-268
An Open Dataset of Abbreviations and ExpansionsFull-text access may be available. Sign in or learn about subscription options.pp. 280-280
Estimating Software Task Effort in CrowdsFull-text access may be available. Sign in or learn about subscription options.pp. 281-285
Do as I Do, Not as I Say: Do Contribution Guidelines Match the GitHub Contribution Process?Full-text access may be available. Sign in or learn about subscription options.pp. 286-290
An Analysis of 35+ Million Jobs of Travis CIFull-text access may be available. Sign in or learn about subscription options.pp. 291-295
Linguistic Change in Open Source SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Learning How to Mutate Source Code from Bug-FixesFull-text access may be available. Sign in or learn about subscription options.pp. 301-312
Personalized Code RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
BARRIERFINDER: Recognizing Ad Hoc BarriersFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
Losing Confidence in Quality: Unspoken Evolution of Computer Vision ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 333-342
What Do Developers Discuss about Biometric APIs?Full-text access may be available. Sign in or learn about subscription options.pp. 348-352
Teaching Software MaintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 353-362
Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 363-363
Challenges in re-Platforming Mixed Language PL/I and COBOL IS to an Open Systems PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 364-364
Application of Philosophical Principles in Linux Kernel CustomizationFull-text access may be available. Sign in or learn about subscription options.pp. 365-365
Lessons Learned from Large-Scale RefactoringFull-text access may be available. Sign in or learn about subscription options.pp. 366-366
Interactive Traceability Links Visualization using Hierarchical Trace MapFull-text access may be available. Sign in or learn about subscription options.pp. 367-369
Supporting Software Architecture Maintenance by Providing Task-Specific RecommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 370-372
A Validation Method of Self-Adaptive Strategy Based on POMDPFull-text access may be available. Sign in or learn about subscription options.pp. 373-375
Modeling the Relationship Between Identifier Name and BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 376-378
Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 379-381
Processing Large Datasets of Fined Grained Source Code ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
CodeSonar (R) Extension for Copy-Paste-(Mis) Adapt Error DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Recommending Exception Handling CodeFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Near-Omniscient Debugging for Java Using Size-Limited Execution TraceFull-text access may be available. Sign in or learn about subscription options.pp. 398-401
Sciit: Aligning Source Control Management and Issue Tracking ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 402-405
Ticket Tagger: Machine Learning Driven Issue ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 406-409
Kraken-Mobile: Cross-Device Interaction-Based Testing of Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method LevelFull-text access may be available. Sign in or learn about subscription options.pp. 414-417
OSAIFU: A Source Code Factorizer on Android StudioFull-text access may be available. Sign in or learn about subscription options.pp. 422-425
Systematically Testing and Diagnosing Responsiveness for Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 449-453
DeepEvolution: A Search-Based Testing Approach for Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 454-458
An Exploratory Study of Logging Configuration Practice in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 459-469
Performance-Influence Model for Highly Configurable Software with Fourier Learning and Lasso RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 470-480
Microservices Migration in Industry: Intentions, Strategies, and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 481-490
Comparing Constraints Mined From Execution Logs to Understand Software EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 491-495
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 496-500
Comprehending Test Code: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 501-512
An Empirical Study Assessing Source Code Readability in ComprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 513-523
Handling Duplicates in Dockerfiles Families: Learning from ExpertsFull-text access may be available. Sign in or learn about subscription options.pp. 524-535
Share, But be Aware: Security Smells in Python GistsFull-text access may be available. Sign in or learn about subscription options.pp. 536-540
Can Automated Impact Analysis Techniques Help Predict Decaying Modules?Full-text access may be available. Sign in or learn about subscription options.pp. 541-545
Assuring the Evolvability of Microservices: Insights into Industry Practices and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 546-556
Investigating Instability Architectural Smells Evolution: An Exploratory Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 557-567
A Qualitative Study on Framework DebuggingFull-text access may be available. Sign in or learn about subscription options.pp. 568-579
Adoption, Support, and Challenges of Infrastructure-as-Code: Insights from IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 580-589
Studying the Impact of Policy Changes on Bug Handling PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 590-594
Automatic Examining of Software Architectures on Mobile Applications CodebasesFull-text access may be available. Sign in or learn about subscription options.pp. 595-599
The Relationship Between Cognitive Complexity and the Probability of DefectsFull-text access may be available. Sign in or learn about subscription options.pp. 600-604
Business-Driven Technical Debt PrioritizationFull-text access may be available. Sign in or learn about subscription options.pp. 605-609
Applying Markov Models to Identify Grammatical Patterns of Function IdentifiersFull-text access may be available. Sign in or learn about subscription options.pp. 610-614
Enhancing Eye Tracking of Source Code: A Specialized Fixation Filter for Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 615-618
Improving the Robustness and Efficiency of Continuous Integration and DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 619-623
Towards Better Understanding Developer Perception of RefactoringFull-text access may be available. Sign in or learn about subscription options.pp. 624-628
Showing 100 out of 105