Default Cover Image

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE)

May 16 2015 to May 24 2015

Florence, Italy

Volume:

Table of Contents

Title Page i - Volume 1Freely available from IEEE.pp. i-i
Title Page iii - Volume 1Freely available from IEEE.pp. iii-iii
[Copyright notice - Vol 1]Freely available from IEEE.pp. iv-iv
Table of Contents - Volume 1Freely available from IEEE.pp. v-xiii
Message from the Chairs - Volume 1Freely available from IEEE.pp. xiv-xvii
Committees - Volume 1Freely available from IEEE.pp. xviii-xxxvi
Additional Reviewers - Volume 1Freely available from IEEE.pp. xxxvii-xxxix
Sponsors and Supporters - Volume 1Freely available from IEEE.pp. xl-xli
Software Engineering in Ferrari F1Full-text access may be available. Sign in or learn about subscription options.pp. 3-3
Mining the Metadata -- and Its ConsequencesFull-text access may be available. Sign in or learn about subscription options.pp. 4-5
Views on Internal and External Validity in Empirical Software EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 9-19
Developing and Evaluating Software Engineering Process TheoriesFull-text access may be available. Sign in or learn about subscription options.pp. 20-31
Automated Data Structure Generation: Refuting Common WisdomFull-text access may be available. Sign in or learn about subscription options.pp. 32-43
Automated Modularization of GUI Test CasesFull-text access may be available. Sign in or learn about subscription options.pp. 44-54
Making System User Interactive Tests Repeatable: When and What Should We Control?Full-text access may be available. Sign in or learn about subscription options.pp. 55-65
ZoomIn: Discovering Failures by Detecting Wrong AssertionsFull-text access may be available. Sign in or learn about subscription options.pp. 66-76
Static Control-Flow Analysis of User-Driven Callbacks in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 89-99
Truth in Advertising: The Hidden Cost of Mobile Ads for Software DevelopersFull-text access may be available. Sign in or learn about subscription options.pp. 100-110
Interactive Code Review for Systematic ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 111-122
Automated Decomposition of Build TargetsFull-text access may be available. Sign in or learn about subscription options.pp. 123-133
Helping Developers Help Themselves: Automatic Decomposition of Code Review ChangesetsFull-text access may be available. Sign in or learn about subscription options.pp. 134-144
Measuring Software RedundancyFull-text access may be available. Sign in or learn about subscription options.pp. 156-166
Gray Computing: An Analysis of Computing with Background JavaScript TasksFull-text access may be available. Sign in or learn about subscription options.pp. 167-177
Presence-Condition Simplification in Highly Configurable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 178-188
Symbolic Model Checking of Product-Line Requirements Using SAT-Based MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 189-199
Lightweight Adaptive Filtering for Efficient Learning and Updating of Probabilistic ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 200-211
Tempura: Temporal Dimension for IDEsFull-text access may be available. Sign in or learn about subscription options.pp. 212-222
Supporting Selective Undo in a Code EditorFull-text access may be available. Sign in or learn about subscription options.pp. 223-233
Cascade: A Universal Programmer-Assisted Type Qualifier Inference ToolFull-text access may be available. Sign in or learn about subscription options.pp. 234-245
RECONTEST: Effective Regression Testing of Concurrent ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 246-256
A Synergistic Analysis Method for Explaining Failed Regression TestsFull-text access may be available. Sign in or learn about subscription options.pp. 257-267
Do Security Patterns Really Help Designers?Full-text access may be available. Sign in or learn about subscription options.pp. 292-302
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using ContextFull-text access may be available. Sign in or learn about subscription options.pp. 303-313
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScriptFull-text access may be available. Sign in or learn about subscription options.pp. 314-324
Detecting Inconsistencies in JavaScript MVC ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 325-335
AutoCSP: Automatically Retrofitting CSP to Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 336-346
How Much Up-Front? A Grounded theory of Agile ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 347-357
Build It Yourself! Homegrown Tools in a Large Software CompanyFull-text access may be available. Sign in or learn about subscription options.pp. 369-379
Morpheus: Variability-Aware Refactoring in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 380-391
Does Automated Refactoring Obviate Systematic Editing?Full-text access may be available. Sign in or learn about subscription options.pp. 392-402
When and Why Your Code Starts to Smell BadFull-text access may be available. Sign in or learn about subscription options.pp. 403-414
Learning to Log: Helping Developers Make Informed Logging DecisionsFull-text access may be available. Sign in or learn about subscription options.pp. 415-425
Mining Apps for Abnormal Usage of Sensitive DataFull-text access may be available. Sign in or learn about subscription options.pp. 426-436
DirectFix: Looking for Simple Program RepairsFull-text access may be available. Sign in or learn about subscription options.pp. 448-458
Safe Memory-Leak Fixing for C ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 459-470
relifix: Automated Repair of Software RegressionsFull-text access may be available. Sign in or learn about subscription options.pp. 471-482
The Art of Testing Less without Sacrificing QualityFull-text access may be available. Sign in or learn about subscription options.pp. 483-493
No PAIN, No Gain? The Utility of PArallel Fault INjectionsFull-text access may be available. Sign in or learn about subscription options.pp. 494-505
A Genetic Algorithm for Detecting Significant Floating-Point InaccuraciesFull-text access may be available. Sign in or learn about subscription options.pp. 529-539
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic SearchFull-text access may be available. Sign in or learn about subscription options.pp. 540-550
Borrowing from the Crowd: A Study of Recombination in Software Design CompetitionsFull-text access may be available. Sign in or learn about subscription options.pp. 551-562
From Developer Networks to Verified Communities: A Fine-Grained ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 563-573
Database-Backed Program Analysis for Scalable Error PropagationFull-text access may be available. Sign in or learn about subscription options.pp. 586-597
Tricorder: Building a Program Analysis EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 598-608
Alloy*: A General-Purpose Higher-Order Relational Constraint SolverFull-text access may be available. Sign in or learn about subscription options.pp. 609-619
DASE: Document-Assisted Symbolic Execution for Improving Automated Software TestingFull-text access may be available. Sign in or learn about subscription options.pp. 620-631
Compositional Symbolic Execution with Memoized ReplayFull-text access may be available. Sign in or learn about subscription options.pp. 632-642
Regular Property Guided Dynamic Symbolic ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 643-653
Combining Symbolic Execution and Model Checking for Data Flow TestingFull-text access may be available. Sign in or learn about subscription options.pp. 654-665
Are Students Representatives of Professionals in Software Engineering Experiments?Full-text access may be available. Sign in or learn about subscription options.pp. 666-676
Stuck and Frustrated or in Flow and Happy: Sensing Developers' Emotions and ProgressFull-text access may be available. Sign in or learn about subscription options.pp. 688-699
What Makes a Great Software Engineer?Full-text access may be available. Sign in or learn about subscription options.pp. 700-710
Efficient Scalable Verification of LTL SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 711-721
Specifying Event-Based Systems with a Counting Fluent Temporal LogicFull-text access may be available. Sign in or learn about subscription options.pp. 733-743
Coexecutability for Efficient Verification of Data Model UpdatesFull-text access may be available. Sign in or learn about subscription options.pp. 744-754
Assert Use in GitHub ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 755-766
A Programming Model for Sustainable SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 767-777
A Comparative Study of Programming Languages in Rosetta CodeFull-text access may be available. Sign in or learn about subscription options.pp. 778-788
Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 789-800
LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 801-811
Dynamic Generation of Likely Invariants for Multithreaded ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 835-846
GPredict: Generic Predictive Concurrency AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 847-857
Graph-Based Statistical Language Model for CodeFull-text access may be available. Sign in or learn about subscription options.pp. 858-868
Discovering Information Explaining API Types Using Text ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 869-879
How Can I Use This Method?Full-text access may be available. Sign in or learn about subscription options.pp. 880-890
Hercules: Reproducing Crashes in Real-World Application BinariesFull-text access may be available. Sign in or learn about subscription options.pp. 891-901
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive FixesFull-text access may be available. Sign in or learn about subscription options.pp. 902-912
An Empirical Study on Real Bug FixesFull-text access may be available. Sign in or learn about subscription options.pp. 913-923
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing TestsFull-text access may be available. Sign in or learn about subscription options.pp. 924-935
Dynamic Data Flow Testing of Object Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 947-958
Author Index - Volume 1Freely available from IEEE.pp. 959-962
Publisher's Information - Volume 1Freely available from IEEE.pp. 964-964
Showing 96 out of 96