Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSME
ICSME 2020
Generate Citations
2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)
Sept. 28 2020 to Oct. 2 2020
Adelaide, Australia
ISBN: 978-1-7281-5619-4
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-16
Message from the General Co-Chairs and the Program Co-Chairs
Freely available from IEEE.
pp. 17-18
Organizing Committee
Freely available from IEEE.
pp. 19-21
Steering Committee
Freely available from IEEE.
pp. 22-22
Program Committee
Freely available from IEEE.
pp. 23-33
Keynote Abstracts
Freely available from IEEE.
pp. 34-36
Evaluated Artifacts
Freely available from IEEE.
pp. 37-37
Effects of Adopting Code Review Bots on Pull Requests to OSS Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Mairieli Wessel
,
Alexander Serebrenik
,
Igor Wiese
,
Igor Steinmacher
,
Marco A. Gerosa
Can You Capture Information As You Intend To? A Case Study on Logging Practice in Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-22
by
Guoping Rong
,
Yangchen Xu
,
Shenghui Gu
,
He Zhang
,
Dong Shao
Haste Makes Waste: An Empirical Study of Fast Answers in Stack Overflow
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-34
by
Yao Lu
,
Xinjun Mao
,
Minghui Zhou
,
Yang Zhang
,
Tao Wang
,
Zude Li
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-45
by
Ying Wang
,
Bihuan Chen
,
Kaifeng Huang
,
Bowen Shi
,
Congying Xu
,
Xin Peng
,
Yijian Wu
,
Yang Liu
What Developers (Care to) Recall: An Interview Survey on Smaller Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-57
by
Jacob Krüger
,
Regina Hebig
Database-Access Performance Antipatterns in Database-Backed Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-69
by
Shudi Shao
,
Zhengyi Qiu
,
Xiao Yu
,
Wei Yang
,
Guoliang Jin
,
Tao Xie
,
Xintao Wu
Sentiment Analysis for Software Engineering: How Far Can Pre-trained Transformer Models Go?
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-80
by
Ting Zhang
,
Bowen Xu
,
Ferdian Thung
,
Stefanus Agus Haryono
,
David Lo
,
Lingxiao Jiang
GenSlice: Generalized Semantic History Slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-91
by
Chenguang Zhu
,
Yi Li
,
Julia Rubin
,
Marsha Chechik
A Method for Finding Missing Unit Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-103
by
Daniel Gaston
,
James Clause
Analysis of Modern Release Engineering Topics : – A Large-Scale Study using StackOverflow –
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-114
by
Moses Openja
,
Bram Adams
,
Foutse Khomh
Learning Code-Query Interaction for Enhancing Code Searches
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-126
by
Wei Li
,
Haozhe Qin
,
Shuhan Yan
,
Beijun Shen
,
Yuting Chen
Static source code metrics and static analysis warnings for fine-grained just-in-time defect prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-138
by
Alexander Trautsch
,
Steffen Herbold
,
Jens Grabowski
A Framework and DataSet for Bugs in Ethereum Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-150
by
Pengcheng Zhang
,
Feng Xiao
,
Xiapu Luo
A First Look at the Deprecation of RESTful APIs: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-161
by
Jerin Yasmin
,
Yuan Tian
,
Jinqiu Yang
Achieving Reliable Sentiment Analysis in the Software Engineering Domain using BERT
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-173
by
Eeshita Biswas
,
Mehmet Efruz Karabulut
,
Lori Pollock
,
K. Vijay-Shanker
Detecting Semantic Conflicts via Automated Behavior Change Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-184
by
Leuson Da Silva
,
Paulo Borba
,
Wardah Mahmood
,
Thorsten Berger
,
João Moisakis
Failures and Fixes: A Study of Software System Incident Response
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-195
by
Jonathan Sillito
,
Esdras Kutomi
Every Mutation Should Be Rewarded: Boosting Fault Localization with Mutated Predicates
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-207
by
Xuezheng Xu
,
Changwei Zou
,
Jingling Xue
Automated Extraction of Requirement Entities by Leveraging LSTM-CRF and Transfer Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-219
by
Mingyang Li
,
Ye Yang
,
Lin Shi
,
Qing Wang
,
Jun Hu
,
Xinhua Peng
,
Weimin Liao
,
Guizhen Pi
A Fine-Grained Analysis on the Inconsistent Changes in Code Clones
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-231
by
Manishankar Mondal
,
Chanchal K. Roy
,
Kevin A. Schneider
Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-242
by
Davide Pizzolotto
,
Katsuro Inoue
Guided, Deep Testing of X.509 Certificate Validation via Coverage Transfer Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-254
by
Jiayu Zhu
,
Chengcheng Wan
,
Pengbo Nie
,
Yuting Chen
,
Zhendong Su
#ifdef Directives and Program Comprehension: The Dilemma between Correctness and Preference
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-266
by
Wolfram Fenske
,
Jacob Krüger
,
Maria Kanyshkova
,
Sandro Schulze
Introducing Differential Privacy Mechanisms for Mobile App Analytics of Dynamic Content
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-277
by
Sufian Latif
,
Yu Hao
,
Hailong Zhang
,
Raef Bassily
,
Atanas Rountev
Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-289
by
Markus Schnappinger
,
Arnaud Fietzke
,
Alexander Pretschner
Experiments with Interactive Fault Localization Using Simulated and Real Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-300
by
Ferenc Horváth
,
Árpád Beszédes
,
Béla Vancsics
,
Gergő Balogh
,
László Vidács
,
Tibor Gyimóthy
Shake It! Detecting Flaky Tests Caused by Concurrency with Shaker
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-311
by
Denini Silva
,
Leopoldo Teixeira
,
Marcelo d’Amorim
Studying Software Developer Expertise and Contributions in Stack Overflow and GitHub
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-323
by
Sri Lakshmi Vadlamani
,
Olga Baysal
Assessing the Characteristics of FOSS Contributions in Network Automation Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-335
by
John Anderson
,
Igor Steinmacher
,
Paige Rodeghero
Pizza versus Pinsa: On the Perception and Measurability of Unit Test Code Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-347
by
Giovanni Grano
,
Cristian De Iaco
,
Fabio Palomba
,
Harald C. Gall
Evaluating Code Readability and Legibility: An Examination of Human-centric Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-359
by
Delano Oliveira
,
Reydne Bruno
,
Fernanda Madeiral
,
Fernando Castor
A software maintenance-focused process and supporting toolset for academic environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-370
by
Ryan Hardt
A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-381
by
Changyuan Lin
,
Sarah Nadi
,
Hamzeh Khazaei
CounterFault: Value-Based Fault Localization by Modeling and Predicting Counterfactual Outcomes
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-393
by
Andy Podgurski
,
Yiğit Küçük
Commit-Aware Mutation Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-405
by
Wei Ma
,
Thomas Laurent
,
Miloš Ojdanić
,
Thierry Titcheu Chekam
,
Anthony Ventresque
,
Mike Papadakis
Remote Pair Programming in Virtual Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-417
by
James Dominic
,
Brock Tubre
,
Charles Ritter
,
Jada Houser
,
Colton Smith
,
Paige Rodeghero
A Cost-Effective Approach for Hyper-Parameter Tuning in Search-based Test Case Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-429
by
Shayan Zamani
,
Hadi Hemmati
It Takes a Village to Build a Robot: An Empirical Study of The ROS Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-440
by
Sophia Kolak
,
Afsoon Afzal
,
Claire Le Goues
,
Michael Hilton
,
Christopher Steven Timperley
How (Not) to Find Bugs: The Interplay Between Merge Conflicts, Co-Changes, and Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-452
by
Luís Amaral
,
Marcos C. Oliveira
,
Welder Luz
,
José Fortes
,
Rodrigo Bonifácio
,
Daniel Alencar
,
Eduardo Monteiro
,
Gustavo Pinto
,
David Lo
Assessing Mock Classes: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-463
by
Gustavo Pereira
,
Andre Hora
Automated Recording and Semantics-Aware Replaying of High-Speed Eye Tracking and Interaction Data to Support Cognitive Studies of Software Engineering Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-475
by
Vlas Zyrianov
,
Drew T. Guarnera
,
Cole S. Peterson
,
Bonita Sharif
,
Jonathan I. Maletic
Characterizing Task-Relevant Information in Natural Language Software Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-487
by
Arthur Marques
,
Nick C. Bradley
,
Gail C. Murphy
Improving Testing by Mimicking User Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-498
by
Qianqian Wang
,
Alessandro Orso
Expanding the Number of Reviewers in Open-Source Projects by Recommending Appropriate Developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-510
by
Aleksandr Chueshev
,
Julia Lawall
,
Reda Bendraou
,
Tewfik Ziadi
How Does Modern Code Review Impact Software Design Degradation? An In-depth Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-522
by
Anderson Uchôa
,
Caio Barbosa
,
Willian Oizumi
,
Publio Blenilio
,
Rafael Lima
,
Alessandro Garcia
,
Carla Bezerra
Revisiting Test Smells in Automatically Generated Tests: Limitations, Pitfalls, and Opportunities
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-533
by
Annibale Panichella
,
Sebastiano Panichella
,
Gordon Fraser
,
Anand Ashok Sawant
,
Vincent J. Hellendoorn
Lifting the Curtain on Merge Conflict Resolution: A Sensemaking Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 534-545
by
Caius Brindescu
,
Yenifer Ramirez
,
Anita Sarma
,
Carlos Jensen
On the Impact of Multi-language Development in Machine Learning Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-556
by
Manel Grichi
,
Ellis E. Eghan
,
Bram Adams
Improving Automated GUI Exploration of Android Apps via Static Dependency Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 557-568
by
Wunan Guo
,
Liwei Shen
,
Ting Su
,
Xin Peng
,
Weiyang Xie
On the Performance and Adoption of Search-Based Microservice Identification with toMicroservices
Full-text access may be available. Sign in or learn about subscription options.
pp. 569-580
by
Luiz Carvalho
,
Alessandro Garcia
,
Thelma Elita Colanzi
,
Wesley K. G. Assunção
,
Juliana Alves Pereira
,
Baldoino Fonseca
,
Márcio Ribeiro
,
Maria Julia de Lima
,
Carlos Lucena
An Empirical Study of i18n Collateral Changes and Bugs in GUIs of Android apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 581-592
by
Camilo Escobar-Velásquez
,
Michael Osorio-Riaño
,
Juan Dominguez-Osorio
,
Maria Arevalo
,
Mario Linares-Vásquez
AOBTM: Adaptive Online Biterm Topic Modeling for Version Sensitive Short-texts Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 593-604
by
Mohammad Abdul Hadi
,
Fatemeh H Fard
Why are Some Bugs Non-Reproducible? : –An Empirical Investigation using Data Fusion–
Full-text access may be available. Sign in or learn about subscription options.
pp. 605-616
by
Mohammad Masudur Rahman
,
Foutse Khomh
,
Marco Castelluccio
A
3
Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 617-628
by
Wei Wang
,
Guozhu Meng
,
Haoyu Wang
,
Kai Chen
,
Weimin Ge
,
Xiaohong Li
Interest of Defect Technical Debt: An Exploratory Study on Apache Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 629-639
by
Zengyang Li
,
Qinyi Yu
,
Peng Liang
,
Ran Mo
,
Chen Yang
CrossASR: Efficient Differential Testing of Automatic Speech Recognition via Text-To-Speech
Full-text access may be available. Sign in or learn about subscription options.
pp. 640-650
by
Muhammad Hilmi Asyrofi
,
Ferdian Thung
,
David Lo
,
Lingxiao Jiang
Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 651-661
by
Mohamed Osama
,
Aya Zaki-Ismail
,
Mohamed Abdelrazek
,
John Grundy
,
Amani Ibrahim
Moderate Detection and Removal of Omnipresent Modules in Software Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 662-666
by
Keisuke Yano
,
Akihiko Matsuo
Improving Log-Based Anomaly Detection with Component-Aware Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 667-671
by
Kun Yin
,
Meng Yan
,
Ling Xu
,
Zhou Xu
,
Zhao Li
,
Dan Yang
,
Xiaohong Zhang
Who (Self) Admits Technical Debt?
Full-text access may be available. Sign in or learn about subscription options.
pp. 672-676
by
Gianmarco Fucci
,
Fiorella Zampetti
,
Alexander Serebrenik
,
Massimiliano Di Penta
Investigating The Reproducibility of NPM Packages
Full-text access may be available. Sign in or learn about subscription options.
pp. 677-681
by
Pronnoy Goswami
,
Saksham Gupta
,
Zhiyuan Li
,
Na Meng
,
Daphne Yao
On Package Freshness in Linux Distributions
Full-text access may be available. Sign in or learn about subscription options.
pp. 682-686
by
Damien Legay
,
Alexandre Decan
,
Tom Mens
Fuzzing to Estimate Gas Costs of Ethereum Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 687-691
by
Daniel Soto
,
Alexandre Bergel
,
Alejandro Hevia
Regression Testing of Massively Multiplayer Online Role-Playing Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 692-696
by
Yuechen Wu
,
Yingfeng Chen
,
Xiaofei Xie
,
Bing Yu
,
Changjie Fan
,
Lei Ma
SiblingClassTestDetector: Finding Untested Sibling Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 697-701
by
Qian Liang
,
Patrick Lam
SBFL-Suitability: A Software Characteristic for Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 702-706
by
Yui Sasaki
,
Yoshiki Higo
,
Shinsuke Matsumoto
,
Shinji Kusumoto
Examining The Work Experience of Programmers with Visual Impairments
Full-text access may be available. Sign in or learn about subscription options.
pp. 707-711
by
Earl W. Huff
,
Kwajo Boateng
,
Makayla Moster
,
Paige Rodeghero
,
Julian Brinkley
Using Symbolic Execution to Analyze Linux KBuild Makefiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 712-716
by
ThanhVu Nguyen
,
KimHao Nguyen
Few-Shot Guided Mix for DNN Repairing
Full-text access may be available. Sign in or learn about subscription options.
pp. 717-721
by
Xuhong Ren
,
Bing Yu
,
Hua Qi
,
Felix Juefei-Xu
,
Zhuo Li
,
Wanli Xue
,
Lei Ma
,
Jianjun Zhao
On the need for automatic knowledge management in modern collaboration tools to improve software maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 722-722
by
Vipin Balachandran
EWIDL: Single-Source Web API Documentation Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 723-726
by
Michał Michalski
,
Piotr Kosko
,
Dawid Juszczak
,
Hobum Kwon
Efficient Bug Triage For Industrial Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 727-735
by
Wei Zhang
De-Flake Your Tests : Automatically Locating Root Causes of Flaky Tests in Code At Google
Full-text access may be available. Sign in or learn about subscription options.
pp. 736-745
by
Celal Ziftci
,
Diego Cavalcanti
From 6.2 to 0.15 seconds – an Industrial Case Study on Mobile Web Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 746-755
by
Jasper van Riet
,
Flavia Paganelli
,
Ivano Malavolta
Incremental Type Migration Using Type Algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 756-765
by
Hyrum K. Wright
Improving Bug Localization by Mining Crash Reports: An Industrial Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 766-775
by
Marcos Medeiros
,
Uirá Kulesza
,
Rodrigo Bonifácio
,
Eiji Adachi
,
Roberta Coelho
Toward a Definition of Cognitive-Driven Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 776-778
by
Alberto Luiz Oliveira Tavares de Souza
,
Victor Hugo Santiago Costa Pinto
A blessing in disguise? Assessing the Relationship between Code Smells and Sustainability
Full-text access may be available. Sign in or learn about subscription options.
pp. 779-780
by
Gemma Catolino
Reducing accidental clones using instant clone search in automatic code review
Full-text access may be available. Sign in or learn about subscription options.
pp. 781-783
by
Vipin Balachandran
Exploring the Challenges of Cloud Migrations During a Global Pandemic
Freely available from IEEE.
pp. 784-785
by
Brock Tubre
,
Paige Rodeghero
Towards a new Test Case Prioritization Approach based on Fuzzy Clustering Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 786-788
by
Andreea Vescan
,
Camelia Şerban
Robin: A Voice Controlled Virtual Teammate for Software Developers and Teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 789-791
by
Bruno da Silva
,
Chloe Hebert
,
Abhishu Rawka
,
Siriwan Sereesathien
Exploring Bluetooth Communication Protocols in Internet-of-Things Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 792-793
by
Tri Minh Triet Pham
,
Jinqiu Yang
Refactoring Recommendations Based on the Optimization of Socio-Technical Congruence
Full-text access may be available. Sign in or learn about subscription options.
pp. 794-796
by
Manuel De Stefano
,
Fabiano Pecorelli
,
Damian Andrew Tamburri
,
Fabio Palomba
,
Andrea De Lucia
Practitioners’ insights on machine-learning software engineering design patterns: a preliminary study
Full-text access may be available. Sign in or learn about subscription options.
pp. 797-799
by
Hironori Washizaki
,
Hironori Takeuchi
,
Foutse Khomh
,
Naotake Natori
,
Takuo Doi
,
Satoshi Okuda
Graph Neural Network-based Vulnerability Predication
Full-text access may be available. Sign in or learn about subscription options.
pp. 800-801
by
Qi Feng
,
Chendong Feng
,
Weijiang Hong
DR-Tools: a suite of lightweight open-source tools to measure and visualize Java source code
Full-text access may be available. Sign in or learn about subscription options.
pp. 802-805
by
Guilherme Lacerda
,
Fabio Petrillo
,
Marcelo S. Pimenta
Teddy: Automatic Recommendation of Pythonic Idiom Usage For Pull-Based Software Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 806-809
by
Purit Phan-udom
,
Naruedon Wattanakul
,
Tattiya Sakulniwat
,
Chaiyong Ragkhitwetsagul
,
Thanwadee Sunetnanta
,
Morakot Choetkiertikul
,
Raula Gaikovina Kula
JCoffee: Using Compiler Feedback to Make Partial Code Snippets Compilable
Full-text access may be available. Sign in or learn about subscription options.
pp. 810-813
by
Piyush Gupta
,
Nikita Mehrotra
,
Rahul Purandare
A toolset to support a software maintenance process in academic environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 814-817
by
Ryan Hardt
Showing 100 out of 117
Load More
Load All