Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSE
ICSE 2015
Generate Citations
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE)
May 16 2015 to May 24 2015
Florence, Italy
Volume:
0
1
Table of Contents
Title Page i - Volume 1
Freely available from IEEE.
pp. i-i
Title Page iii - Volume 1
Freely available from IEEE.
pp. iii-iii
[Copyright notice - Vol 1]
Freely available from IEEE.
pp. iv-iv
Table of Contents - Volume 1
Freely available from IEEE.
pp. v-xiii
Message from the Chairs - Volume 1
Freely available from IEEE.
pp. xiv-xvii
Committees - Volume 1
Freely available from IEEE.
pp. xviii-xxxvi
Additional Reviewers - Volume 1
Freely available from IEEE.
pp. xxxvii-xxxix
Sponsors and Supporters - Volume 1
Freely available from IEEE.
pp. xl-xli
Software Engineering in Ferrari F1
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-3
by
Claudio Silenzi
Mining the Metadata -- and Its Consequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-5
by
Susan Landau
Views on Internal and External Validity in Empirical Software Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-19
by
Janet Siegmund
,
Norbert Siegmund
,
Sven Apel
Developing and Evaluating Software Engineering Process Theories
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-31
by
Paul Ralph
Automated Data Structure Generation: Refuting Common Wisdom
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-43
by
Kyle Dewey
,
Lawton Nichols
,
Ben Hardekopf
Automated Modularization of GUI Test Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-54
by
Rahulkrishna Yandrapally
,
Giriprasad Sridhara
,
Saurabh Sinha
Making System User Interactive Tests Repeatable: When and What Should We Control?
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-65
by
Zebao Gao
,
Yalan Liang
,
Myra B. Cohen
,
Atif M. Memon
,
Zhen Wang
ZoomIn: Discovering Failures by Detecting Wrong Assertions
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-76
by
Fabrizio Pastore
,
Leonardo Mariani
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-88
by
Damien Octeau
,
Daniel Luchaup
,
Matthew Dering
,
Somesh Jha
,
Patrick McDaniel
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-99
by
Shengqian Yang
,
Dacong Yan
,
Haowei Wu
,
Yan Wang
,
Atanas Rountev
Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-110
by
Jiaping Gui
,
Stuart Mcilroy
,
Meiyappan Nagappan
,
William G. J. Halfond
Interactive Code Review for Systematic Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-122
by
Tianyi Zhang
,
Myoungkyu Song
,
Joseph Pinedo
,
Miryung Kim
Automated Decomposition of Build Targets
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-133
by
Mohsen Vakilian
,
Raluca Sauciuc
,
J. David Morgenthaler
,
Vahab Mirrokni
Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-144
by
Mike Barnett
,
Christian Bird
,
Joao Brunet
,
Shuvendu K. Lahiri
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-155
by
Denis Gopan
,
Evan Driscoll
,
Ducson Nguyen
,
Dimitri Naydich
,
Alexey Loginov
,
David Melski
Measuring Software Redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-166
by
Antonio Carzaniga
,
Andrea Mattavelli
,
Mauro Pezze
Gray Computing: An Analysis of Computing with Background JavaScript Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-177
by
Yao Pan
,
Jules White
,
Yu Sun
,
Jeff Gray
Presence-Condition Simplification in Highly Configurable Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-188
by
Alexander Von Rhein
,
Alexander Grebhahn
,
Sven Apel
,
Norbert Siegmund
,
Dirk Beyer
,
Thorsten Berger
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-199
by
Shoham Ben-David
,
Baruch Sterin
,
Joanne M. Atlee
,
Sandy Beidu
Lightweight Adaptive Filtering for Efficient Learning and Updating of Probabilistic Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-211
by
Antonio Filieri
,
Lars Grunske
,
Alberto Leva
Tempura: Temporal Dimension for IDEs
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-222
by
Yun Young Lee
,
Darko Marinov
,
Ralph E. Johnson
Supporting Selective Undo in a Code Editor
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-233
by
YoungSeok Yoon
,
Brad A. Myers
Cascade: A Universal Programmer-Assisted Type Qualifier Inference Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-245
by
Mohsen Vakilian
,
Amarin Phaosawasdi
,
Michael D. Ernst
,
Ralph E. Johnson
RECONTEST: Effective Regression Testing of Concurrent Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-256
by
Valerio Terragni
,
Shing-Chi Cheung
,
Charles Zhang
A Synergistic Analysis Method for Explaining Failed Regression Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-267
by
Qiuping Yi
,
Zijiang Yang
,
Jian Liu
,
Chen Zhao
,
Chao Wang
An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-279
by
Ripon K. Saha
,
Lingming Zhang
,
Sarfraz Khurshid
,
Dewayne E. Perry
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-291
by
Li Li
,
Alexandre Bartel
,
Tegawende F. Bissyande
,
Jacques Klein
,
Yves Le Traon
,
Steven Arzt
,
Siegfried Rasthofer
,
Eric Bodden
,
Damien Octeau
,
Patrick McDaniel
Do Security Patterns Really Help Designers?
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-302
by
Koen Yskout
,
Riccardo Scandariato
,
Wouter Joosen
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-313
by
Wei Yang
,
Xusheng Xiao
,
Benjamin Andow
,
Sihan Li
,
Tao Xie
,
William Enck
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-324
by
Michael Pradel
,
Parker Schuh
,
Koushik Sen
Detecting Inconsistencies in JavaScript MVC Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-335
by
Frolin S. Ocariza
,
Karthik Pattabiraman
,
Ali Mesbah
AutoCSP: Automatically Retrofitting CSP to Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-346
by
Mattia Fazzini
,
Prateek Saxena
,
Alessandro Orso
How Much Up-Front? A Grounded theory of Agile Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-357
by
Michael Waterman
,
James Noble
,
George Allan
Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-368
by
Georgios Gousios
,
Andy Zaidman
,
Margaret-Anne Storey
,
Arie van Deursen
Build It Yourself! Homegrown Tools in a Large Software Company
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-379
by
Edward K. Smith
,
Christian Bird
,
Thomas Zimmermann
Morpheus: Variability-Aware Refactoring in the Wild
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-391
by
Jorg Liebig
,
Andreas Janker
,
Florian Garbe
,
Sven Apel
,
Christian Lengauer
Does Automated Refactoring Obviate Systematic Editing?
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-402
by
Lisa Hua
,
Miryung Kim
,
Kathryn S. McKinley
When and Why Your Code Starts to Smell Bad
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-414
by
Michele Tufano
,
Fabio Palomba
,
Gabriele Bavota
,
Rocco Oliveto
,
Massimiliano Di Penta
,
Andrea De Lucia
,
Denys Poshyvanyk
Learning to Log: Helping Developers Make Informed Logging Decisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-425
by
Jieming Zhu
,
Pinjia He
,
Qiang Fu
,
Hongyu Zhang
,
Michael R. Lyu
,
Dongmei Zhang
Mining Apps for Abnormal Usage of Sensitive Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-436
by
Vitalii Avdiienko
,
Konstantin Kuznetsov
,
Alessandra Gorla
,
Andreas Zeller
,
Steven Arzt
,
Siegfried Rasthofer
,
Eric Bodden
Tracking Static Analysis Violations over Time to Capture Developer Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-447
by
Pavel Avgustinov
,
Arthur I. Baars
,
Anders S. Henriksen
,
Greg Lavender
,
Galen Menzel
,
Oege De Moor
,
Max Schafer
,
Julian Tibble
DirectFix: Looking for Simple Program Repairs
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-458
by
Sergey Mechtaev
,
Jooyong Yi
,
Abhik Roychoudhury
Safe Memory-Leak Fixing for C Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-470
by
Qing Gao
,
Yingfei Xiong
,
Yaqing Mi
,
Lu Zhang
,
Weikun Yang
,
Zhaoping Zhou
,
Bing Xie
,
Hong Mei
relifix: Automated Repair of Software Regressions
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-482
by
Shin Hwei Tan
,
Abhik Roychoudhury
The Art of Testing Less without Sacrificing Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-493
by
Kim Herzig
,
Michaela Greiler
,
Jacek Czerwonka
,
Brendan Murphy
No PAIN, No Gain? The Utility of PArallel Fault INjections
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-505
by
Stefan Winter
,
Oliver Schwahn
,
Roberto Natella
,
Neeraj Suri
,
Domenico Cotroneo
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-516
by
Michael W. Whalen
,
Suzette Person
,
Neha Rungta
,
Matt Staats
,
Daniela Grijincu
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-528
by
Christopher Henard
,
Mike Papadakis
,
Mark Harman
,
Yves Le Traon
A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-539
by
Daming Zou
,
Ran Wang
,
Yingfei Xiong
,
Lu Zhang
,
Zhendong Su
,
Hong Mei
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-550
by
Yue Jia
,
Myra B. Cohen
,
Mark Harman
,
Justyna Petke
Borrowing from the Crowd: A Study of Recombination in Software Design Competitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-562
by
Thomas D. LaToza
,
Micky Chen
,
Luxi Jiang
,
Mengyao Zhao
,
Andre van der Hoek
From Developer Networks to Verified Communities: A Fine-Grained Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 563-573
by
Mitchell Joblin
,
Wolfgang Mauerer
,
Sven Apel
,
Janet Siegmund
,
Dirk Riehle
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub
Full-text access may be available. Sign in or learn about subscription options.
pp. 574-585
by
Eirini Kalliamvakou
,
Daniela Damian
,
Kelly Blincoe
,
Leif Singer
,
Daniel M. German
Database-Backed Program Analysis for Scalable Error Propagation
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-597
by
Cathrin Weiss
,
Cindy Rubio-Gonzalez
,
Ben Liblit
Tricorder: Building a Program Analysis Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-608
by
Caitlin Sadowski
,
Jeffrey Van Gogh
,
Ciera Jaspan
,
Emma Soderberg
,
Collin Winter
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver
Full-text access may be available. Sign in or learn about subscription options.
pp. 609-619
by
Aleksandar Milicevic
,
Joseph P. Near
,
Eunsuk Kang
,
Daniel Jackson
DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 620-631
by
Edmund Wong
,
Lei Zhang
,
Song Wang
,
Taiyue Liu
,
Lin Tan
Compositional Symbolic Execution with Memoized Replay
Full-text access may be available. Sign in or learn about subscription options.
pp. 632-642
by
Rui Qiu
,
Guowei Yang
,
Corina S. Pasareanu
,
Sarfraz Khurshid
Regular Property Guided Dynamic Symbolic Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 643-653
by
Yufeng Zhang
,
Zhenbang Chen
,
Ji Wang
,
Wei Dong
,
Zhiming Liu
Combining Symbolic Execution and Model Checking for Data Flow Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 654-665
by
Ting Su
,
Zhoulai Fu
,
Geguang Pu
,
Jifeng He
,
Zhendong Su
Are Students Representatives of Professionals in Software Engineering Experiments?
Full-text access may be available. Sign in or learn about subscription options.
pp. 666-676
by
Iflaah Salman
,
Ayse Tosun Misirli
,
Natalia Juristo
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 677-687
by
Mathieu Lavallee
,
Pierre N. Robillard
Stuck and Frustrated or in Flow and Happy: Sensing Developers' Emotions and Progress
Full-text access may be available. Sign in or learn about subscription options.
pp. 688-699
by
Sebastian C. Muller
,
Thomas Fritz
What Makes a Great Software Engineer?
Full-text access may be available. Sign in or learn about subscription options.
pp. 700-710
by
Paul Luo Li
,
Amy J. Ko
,
Jiamin Zhu
Efficient Scalable Verification of LTL Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 711-721
by
Luciano Baresi
,
Mohammad Mehdi Pourhashem Kallehbasti
,
Matteo Rossi
Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 722-732
by
Daniel Matichuk
,
Toby Murray
,
June Andronick
,
Ross Jeffery
,
Gerwin Klein
,
Mark Staples
Specifying Event-Based Systems with a Counting Fluent Temporal Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 733-743
by
German Regis
,
Renzo Degiovanni
,
Nicolas D'Ippolito
,
Nazareno Aguirre
Coexecutability for Efficient Verification of Data Model Updates
Full-text access may be available. Sign in or learn about subscription options.
pp. 744-754
by
Ivan Bocic
,
Tevfik Bultan
Assert Use in GitHub Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 755-766
by
Casey Casalnuovo
,
Prem Devanbu
,
Abilio Oliveira
,
Vladimir Filkov
,
Baishakhi Ray
A Programming Model for Sustainable Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 767-777
by
Haitao Steve Zhu
,
Chaoren Lin
,
Yu David Liu
A Comparative Study of Programming Languages in Rosetta Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 778-788
by
Sebastian Nanz
,
Carlo A. Furia
Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 789-800
by
Baljinder Ghotra
,
Shane McIntosh
,
Ahmed E. Hassan
LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 801-811
by
Fayola Peters
,
Tim Menzies
,
Lucas Layman
The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 812-823
by
Chakkrit Tantithamthavorn
,
Shane McIntosh
,
Ahmed E. Hassan
,
Akinori Ihara
,
Kenichi Matsumoto
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 824-834
by
Xiang Yuan
,
Chenggang Wu
,
Zhenjiang Wang
,
Jianjun Li
,
Pen-Chung Yew
,
Jeff Huang
,
Xiaobing Feng
,
Yanyan Lan
,
Yunji Chen
,
Yong Guan
Dynamic Generation of Likely Invariants for Multithreaded Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 835-846
by
Markus Kusano
,
Arijit Chattopadhyay
,
Chao Wang
GPredict: Generic Predictive Concurrency Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 847-857
by
Jeff Huang
,
Qingzhou Luo
,
Grigore Rosu
Graph-Based Statistical Language Model for Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 858-868
by
Anh Tuan Nguyen
,
Tien N. Nguyen
Discovering Information Explaining API Types Using Text Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 869-879
by
Gayane Petrosyan
,
Martin P. Robillard
,
Renato De Mori
How Can I Use This Method?
Full-text access may be available. Sign in or learn about subscription options.
pp. 880-890
by
Laura Moreno
,
Gabriele Bavota
,
Massimiliano Di Penta
,
Rocco Oliveto
,
Andrian Marcus
Hercules: Reproducing Crashes in Real-World Application Binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 891-901
by
Van-Thuan Pham
,
Wei Boon Ng
,
Konstantin Rubinov
,
Abhik Roychoudhury
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes
Full-text access may be available. Sign in or learn about subscription options.
pp. 902-912
by
Adrian Nistor
,
Po-Chun Chang
,
Cosmin Radoi
,
Shan Lu
An Empirical Study on Real Bug Fixes
Full-text access may be available. Sign in or learn about subscription options.
pp. 913-923
by
Hao Zhong
,
Zhendong Su
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 924-935
by
Zhongxing Yu
,
Chenggang Bai
,
Kai-Yuan Cai
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 936-946
by
Mike Papadakis
,
Yue Jia
,
Mark Harman
,
Yves Le Traon
Dynamic Data Flow Testing of Object Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 947-958
by
Giovanni Denaro
,
Alessandro Margara
,
Mauro Pezze
,
Mattia Vivanti
Author Index - Volume 1
Freely available from IEEE.
pp. 959-962
Publisher's Information - Volume 1
Freely available from IEEE.
pp. 964-964
Showing 96 out of 96