Default Cover Image

2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)

Sept. 28 2020 to Oct. 2 2020

Adelaide, Australia

ISBN: 978-1-7281-5619-4

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-16
Organizing CommitteeFreely available from IEEE.pp. 19-21
Steering CommitteeFreely available from IEEE.pp. 22-22
Program CommitteeFreely available from IEEE.pp. 23-33
Keynote AbstractsFreely available from IEEE.pp. 34-36
Evaluated ArtifactsFreely available from IEEE.pp. 37-37
Effects of Adopting Code Review Bots on Pull Requests to OSS ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Can You Capture Information As You Intend To? A Case Study on Logging Practice in IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 12-22
Haste Makes Waste: An Empirical Study of Fast Answers in Stack OverflowFull-text access may be available. Sign in or learn about subscription options.pp. 23-34
What Developers (Care to) Recall: An Interview Survey on Smaller SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 46-57
Database-Access Performance Antipatterns in Database-Backed Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 58-69
GenSlice: Generalized Semantic History SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 81-91
A Method for Finding Missing Unit TestsFull-text access may be available. Sign in or learn about subscription options.pp. 92-103
Analysis of Modern Release Engineering Topics : – A Large-Scale Study using StackOverflow –Full-text access may be available. Sign in or learn about subscription options.pp. 104-114
Learning Code-Query Interaction for Enhancing Code SearchesFull-text access may be available. Sign in or learn about subscription options.pp. 115-126
A Framework and DataSet for Bugs in Ethereum Smart ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 139-150
A First Look at the Deprecation of RESTful APIs: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 151-161
Achieving Reliable Sentiment Analysis in the Software Engineering Domain using BERTFull-text access may be available. Sign in or learn about subscription options.pp. 162-173
Detecting Semantic Conflicts via Automated Behavior Change DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 174-184
Failures and Fixes: A Study of Software System Incident ResponseFull-text access may be available. Sign in or learn about subscription options.pp. 185-195
Every Mutation Should Be Rewarded: Boosting Fault Localization with Mutated PredicatesFull-text access may be available. Sign in or learn about subscription options.pp. 196-207
A Fine-Grained Analysis on the Inconsistent Changes in Code ClonesFull-text access may be available. Sign in or learn about subscription options.pp. 220-231
Identifying Compiler and Optimization Options from Binary Code using Deep Learning ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 232-242
Guided, Deep Testing of X.509 Certificate Validation via Coverage Transfer GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 243-254
#ifdef Directives and Program Comprehension: The Dilemma between Correctness and PreferenceFull-text access may be available. Sign in or learn about subscription options.pp. 255-266
Introducing Differential Privacy Mechanisms for Mobile App Analytics of Dynamic ContentFull-text access may be available. Sign in or learn about subscription options.pp. 267-277
Shake It! Detecting Flaky Tests Caused by Concurrency with ShakerFull-text access may be available. Sign in or learn about subscription options.pp. 301-311
Studying Software Developer Expertise and Contributions in Stack Overflow and GitHubFull-text access may be available. Sign in or learn about subscription options.pp. 312-323
Assessing the Characteristics of FOSS Contributions in Network Automation ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 324-335
Pizza versus Pinsa: On the Perception and Measurability of Unit Test Code QualityFull-text access may be available. Sign in or learn about subscription options.pp. 336-347
Evaluating Code Readability and Legibility: An Examination of Human-centric StudiesFull-text access may be available. Sign in or learn about subscription options.pp. 348-359
A software maintenance-focused process and supporting toolset for academic environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 360-370
A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker HubFull-text access may be available. Sign in or learn about subscription options.pp. 371-381
CounterFault: Value-Based Fault Localization by Modeling and Predicting Counterfactual OutcomesFull-text access may be available. Sign in or learn about subscription options.pp. 382-393
Commit-Aware Mutation TestingFull-text access may be available. Sign in or learn about subscription options.pp. 394-405
Remote Pair Programming in Virtual RealityFull-text access may be available. Sign in or learn about subscription options.pp. 406-417
A Cost-Effective Approach for Hyper-Parameter Tuning in Search-based Test Case GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 418-429
Assessing Mock Classes: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 453-463
Characterizing Task-Relevant Information in Natural Language Software ArtifactsFull-text access may be available. Sign in or learn about subscription options.pp. 476-487
Improving Testing by Mimicking User BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 488-498
Lifting the Curtain on Merge Conflict Resolution: A Sensemaking PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 534-545
On the Impact of Multi-language Development in Machine Learning FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 546-556
Improving Automated GUI Exploration of Android Apps via Static Dependency AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 557-568
AOBTM: Adaptive Online Biterm Topic Modeling for Version Sensitive Short-texts AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 593-604
Why are Some Bugs Non-Reproducible? : –An Empirical Investigation using Data Fusion–Full-text access may be available. Sign in or learn about subscription options.pp. 605-616
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 617-628
Interest of Defect Technical Debt: An Exploratory Study on Apache ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 629-639
CrossASR: Efficient Differential Testing of Automatic Speech Recognition via Text-To-SpeechFull-text access may be available. Sign in or learn about subscription options.pp. 640-650
Moderate Detection and Removal of Omnipresent Modules in Software ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 662-666
Improving Log-Based Anomaly Detection with Component-Aware AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 667-671
Who (Self) Admits Technical Debt?Full-text access may be available. Sign in or learn about subscription options.pp. 672-676
Investigating The Reproducibility of NPM PackagesFull-text access may be available. Sign in or learn about subscription options.pp. 677-681
On Package Freshness in Linux DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 682-686
Fuzzing to Estimate Gas Costs of Ethereum ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 687-691
Regression Testing of Massively Multiplayer Online Role-Playing GamesFull-text access may be available. Sign in or learn about subscription options.pp. 692-696
SiblingClassTestDetector: Finding Untested Sibling FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 697-701
SBFL-Suitability: A Software Characteristic for Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 702-706
Examining The Work Experience of Programmers with Visual ImpairmentsFull-text access may be available. Sign in or learn about subscription options.pp. 707-711
Using Symbolic Execution to Analyze Linux KBuild MakefilesFull-text access may be available. Sign in or learn about subscription options.pp. 712-716
Few-Shot Guided Mix for DNN RepairingFull-text access may be available. Sign in or learn about subscription options.pp. 717-721
On the need for automatic knowledge management in modern collaboration tools to improve software maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 722-722
EWIDL: Single-Source Web API Documentation Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 723-726
Efficient Bug Triage For Industrial EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 727-735
De-Flake Your Tests : Automatically Locating Root Causes of Flaky Tests in Code At GoogleFull-text access may be available. Sign in or learn about subscription options.pp. 736-745
From 6.2 to 0.15 seconds – an Industrial Case Study on Mobile Web PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 746-755
Incremental Type Migration Using Type AlgebraFull-text access may be available. Sign in or learn about subscription options.pp. 756-765
Improving Bug Localization by Mining Crash Reports: An Industrial StudyFull-text access may be available. Sign in or learn about subscription options.pp. 766-775
Toward a Definition of Cognitive-Driven DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 776-778
A blessing in disguise? Assessing the Relationship between Code Smells and SustainabilityFull-text access may be available. Sign in or learn about subscription options.pp. 779-780
Reducing accidental clones using instant clone search in automatic code reviewFull-text access may be available. Sign in or learn about subscription options.pp. 781-783
Towards a new Test Case Prioritization Approach based on Fuzzy Clustering AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 786-788
Robin: A Voice Controlled Virtual Teammate for Software Developers and TeamsFull-text access may be available. Sign in or learn about subscription options.pp. 789-791
Exploring Bluetooth Communication Protocols in Internet-of-Things Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 792-793
Graph Neural Network-based Vulnerability PredicationFull-text access may be available. Sign in or learn about subscription options.pp. 800-801
DR-Tools: a suite of lightweight open-source tools to measure and visualize Java source codeFull-text access may be available. Sign in or learn about subscription options.pp. 802-805
JCoffee: Using Compiler Feedback to Make Partial Code Snippets CompilableFull-text access may be available. Sign in or learn about subscription options.pp. 810-813
A toolset to support a software maintenance process in academic environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 814-817
Showing 100 out of 117