Stop the war!
Остановите войну!
for scientists:
default search action
ACM Transactions on Software Engineering and Methodology, Volume 33
Volume 33, Number 1, January 2024
- Mauro Pezzè:
Editorial: Toward the Future with Eight Issues Per Year. 1e:1-1e:2 - Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. 1:1-1:40 - Xuanzhe Liu, Chengxu Yang, Ding Li, Yuhan Zhou, Shaofei Li, Jiali Chen, Zhenpeng Chen:
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces. 2:1-2:27 - Suyu Ma, Chunyang Chen, Hourieh Khalajzadeh, John Grundy:
A First Look at Dark Mode in Real-world Android Apps. 3:1-3:26 - Jiarong Wu, Lili Wei, Yanyan Jiang, Shing-Chi Cheung, Luyao Ren, Chang Xu:
Programming by Example Made Easy. 4:1-4:36 - Narjes Bessghaier, Mohammed Sayagh, Ali Ouni, Mohamed Wiem Mkaouer:
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects. 5:1-5:37 - Qing Huang, Yanbang Sun, Zhenchang Xing, Min Yu, Xiwei Xu, Qinghua Lu:
API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model. 6:1-6:25 - Jeho Oh, Don S. Batory, Ruben Heradio:
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees. 7:1-7:36 - Chang-Ai Sun, Hepeng Dai, Ning Geng, Huai Liu, Tsong Yueh Chen, Peng Wu, Yan Cai, Jinqiu Wang:
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs. 8:1-8:21 - Toni Taipalus, Hilkka Grahn:
Framework for SQL Error Message Design: A Data-Driven Approach. 9:1-9:50 - Andrew G. Clark, Michael Foster, Benedikt Prifling, Neil Walkinshaw, Robert M. Hierons, Volker Schmidt, Robert D. Turner:
Testing Causality in Scientific Modelling Software. 10:1-10:42 - Jianzhong Liu, Yuheng Shen, Yiru Xu, Hao Sun, Yu Jiang:
Horus: Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures. 11:1-11:25 - Sina Entekhabi, Wojciech Mostowski, Mohammad Reza Mousavi:
Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving. 12:1-12:32 - Carlo A. Furia, Richard Torkar, Robert Feldt:
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions. 13:1-13:35 - Olivier Nourry, Yutaro Kashiwa, Bin Lin, Gabriele Bavota, Michele Lanza, Yasutaka Kamei:
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities. 14:1-14:26 - Pei Liu, Yanjie Zhao, Mattia Fazzini, Haipeng Cai, John Grundy, Li Li:
Automatically Detecting Incompatible Android APIs. 15:1-15:33 - Hengcheng Zhu, Lili Wei, Valerio Terragni, Yepang Liu, Shing-Chi Cheung, Jiarong Wu, Qin Sheng, Bing Zhang, Lihong Song:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. 16:1-16:31 - Yongqiang Tian, Xueyan Zhang, Yiwen Dong, Zhenyang Xu, Mengxiao Zhang, Yu Jiang, Shing-Chi Cheung, Chengnian Sun:
On the Caching Schemes to Speed Up Program Reduction. 17:1-17:30 - Claudio Mandrioli, Max Nyberg Carlsson, Martina Maggio:
Testing Abstractions for Cyber-Physical Control Systems. 18:1-18:32 - Wang Fang, Mingsheng Ying, Xiaodi Wu:
Differentiable Quantum Programming with Unbounded Loops. 19:1-19:63
- Yuanhang Yang, Wei He, Cuiyun Gao, Zenglin Xu, Xin Xia, Chuanyi Liu:
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site. 20:1-20:25 - Tianlin Li, Xiaofei Xie, Jian Wang, Qing Guo, Aishan Liu, Lei Ma, Yang Liu:
Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis. 21:1-21:24 - Xueqi Dang, Yinghua Li, Mike Papadakis, Jacques Klein, Tegawendé F. Bissyandé, Yves Le Traon:
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. 22:1-22:40 - Yuhan Zhi, Xiaofei Xie, Chao Shen, Jun Sun, Xiaoyu Zhang, Xiaohong Guan:
Seed Selection for Testing Deep Neural Networks. 23:1-23:33 - Hanyang Guo, Xiangping Chen, Yuan Huang, Yanlin Wang, Xi Ding, Zibin Zheng, Xiaocong Zhou, Hong-Ning Dai:
Snippet Comment Generation Based on Code Context Expansion. 24:1-24:30 - Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Yves Le Traon:
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing. 25:1-25:28
- Han Hu, Yujin Huang, Qiuyuan Chen, Terry Yue Zhuo, Chunyang Chen:
A First Look at On-device Models in iOS Apps. 26:1-26:30
- Amid Golmohammadi, Man Zhang, Andrea Arcuri:
Testing RESTful APIs: A Survey. 27:1-27:41
- Michael Weiss, Paolo Tonella:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks. 28:1-28:29
- Michael Weiss, Paolo Tonella:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report. 29:1-29:4
Volume 33, Number 2, February 2024
- Yu Zhou, Weilin Zhan, Zi Li, Tingting Han, Taolue Chen, Harald C. Gall:
DRIVE: Dockerfile Rule Mining and Violation Detection. 30:1-30:23 - Qing Huang, Zhiqiang Yuan, Zhenchang Xing, Xin Peng, Xiwei Xu, Qinghua Lu:
FQN Inference in Partial Code by Prompt-tuned Language Model of Code. 31:1-31:32 - Jaekwon Lee, Seung Yeob Shin, Lionel C. Briand, Shiva Nejati:
Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages. 32:1-32:34 - Knut H. Rolland, Brian Fitzgerald, Torgeir Dingsøyr, Klaas-Jan Stol:
Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development. 33:1-33:45 - Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo:
A Closer Look at the Security Risks in the Rust Ecosystem. 34:1-34:30 - Claudio Mandrioli, Seung Yeob Shin, Martina Maggio, Domenico Bianculli, Lionel C. Briand:
Stress Testing Control Loops in Cyber-physical Systems. 35:1-35:58 - SayedHassan Khatoonabadi, Diego Elias Costa, Suhaib Mujahid, Emad Shihab:
Understanding the Helpfulness of Stale Bot for Pull-Based Development: An Empirical Study of 20 Large Open-Source Projects. 36:1-36:43 - Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. 37:1-37:29 - Zishuo Ding, Yiming Tang, Xiaoyu Cheng, Heng Li, Weiyi Shang:
LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates. 38:1-38:45 - Weishi Shi, Heather Moses, Qi Yu, Samuel A. Malachowsky, Daniel E. Krutz:
ALL: Supporting Experiential Accessibility Education and Inclusive Software Development. 39:1-39:30 - Federico Formica, Tony Fan, Claudio Menghi:
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions. 40:1-40:37 - Jiajun Jiang, Yumeng Wang, Junjie Chen, Delin Lv, Mengjiao Liu:
Variable-based Fault Localization via Enhanced Decision Tree. 41:1-41:32 - Wei Huang, Xingyu Zhao, Alec Banks, Victoria Cox, Xiaowei Huang:
Hierarchical Distribution-aware Testing of Deep Learning. 42:1-42:35 - Sicong Cao, Xiaobing Sun, Lili Bo, Rongxin Wu, Bin Li, Xiaoxue Wu, Chuanqi Tao, Tao Zhang, Wei Liu:
Learning to Detect Memory-related Vulnerabilities. 43:1-43:35 - Elkhan Ismayilzada, Md Mazba Ur Rahman, Dongsun Kim, Jooyong Yi:
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair. 44:1-44:39 - Yuanhang Zhou, Fuchen Ma, Yuanliang Chen, Meng Ren, Yu Jiang:
CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing. 45:1-45:28 - Yi Xiang, Han Huang, Sizhe Li, Miqing Li, Chuan Luo, Xiaowei Yang:
Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization. 46:1-46:52 - Han Hu, Ruiqi Dong, John Grundy, Thai Minh Nguyen, Huaxiao Liu, Chunyang Chen:
Automated Mapping of Adaptive App GUIs from Phones to TVs. 47:1-47:31
- Yuejun Guo, Qiang Hu, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Yves Le Traon:
KAPE: kNN-based Performance Testing for Deep Code Search. 48:1-48:24 - Jiamou Sun, Zhenchang Xing, Xin Xia, Qinghua Lu, Xiwei Xu, Liming Zhu:
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. 49:1-49:38 - Jiawei Liu, Yuheng Huang, Zhijie Wang, Lei Ma, Chunrong Fang, Mingzheng Gu, Xufan Zhang, Zhenyu Chen:
Generation-based Differential Fuzzing for Deep Learning Libraries. 50:1-50:28 - Jiho Shin, Moshi Wei, Junjie Wang, Lin Shi, Song Wang:
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks. 51:1-51:24
- Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. 52:1-52:35 - Rafael Dutra, Rahul Gopinath, Andreas Zeller:
FormatFuzzer: Effective Fuzzing of Binary File Formats. 53:1-53:29
- Yutao Xie, Jiayi Lin, Hande Dong, Lei Zhang, Zhonghai Wu:
Survey of Code Search Based on Deep Learning. 54:1-54:42 - Quanjun Zhang, Chunrong Fang, Yuxiang Ma, Weisong Sun, Zhenyu Chen:
A Survey of Learning-based Automated Program Repair. 55:1-55:69
Volume 33, Number 3, March 2024
- Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. 56:1-56:30 - Daniel Russo, Paul H. P. Hanel, Niels van Berkel:
Understanding Developers Well-Being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic. 57:1-57:44 - Andre Lustosa, Tim Menzies:
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health. 58:1-58:22 - Yanming Yang, Xing Hu, Xin Xia, Xiaohu Yang:
The Lost World: Characterizing and Detecting Undiscovered Test Smells. 59:1-59:32 - Guang Yang, Yu Zhou, Wenhua Yang, Tao Yue, Xiang Chen, Taolue Chen:
How Important Are Good Method Names in Neural Code Generation? A Model Robustness Perspective. 60:1-60:35 - Jiajun Jiang, Junjie Yang, Yingyi Zhang, Zan Wang, Hanmo You, Junjie Chen:
A Post-training Framework for Improving the Performance of Deep Learning Models via Model Transformation. 61:1-61:41 - Jia Li, Zhuo Li, Huangzhao Zhang, Ge Li, Zhi Jin, Xing Hu, Xin Xia:
Poison Attack and Poison Detection on Deep Source Code Processing Models. 62:1-62:31 - Wen Li, Austin Marino, Haoran Yang, Na Meng, Li Li, Haipeng Cai:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. 63:1-63:46 - Sangeeth Kochanthara, Tajinder Singh, Alexandru Forrai, Loek Cleophas:
Safety of Perception Systems for Automated Driving: A Case Study on Apollo. 64:1-64:28 - Armin Zirak, Hadi Hemmati:
Improving Automated Program Repair with Domain Adaptation. 65:1-65:43 - Wensheng Tang, Dejun Dong, Shijie Li, Chengpeng Wang, Peisen Yao, Jinguo Zhou, Charles Chuan Zhang:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. 66:1-66:33 - Tingwei Zhu, Zhong Li, Minxue Pan, Chaoxuan Shi, Tian Zhang, Yu Pei, Xuandong Li:
Deep Is Better? An Empirical Comparison of Information Retrieval and Deep Learning Approaches to Code Summarization. 67:1-67:37 - Zhe Zhao, Guangke Chen, Tong Liu, Taishan Li, Fu Song, Jingyi Wang, Jun Sun:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. 68:1-68:45 - Junda He, Xin Zhou, Bowen Xu, Ting Zhang, Kisub Kim, Zhou Yang, Ferdian Thung, Ivana Clairine Irsan, David Lo:
Representation Learning for Stack Overflow Posts: How Far Are We? 69:1-69:24 - Binhang Qi, Hailong Sun, Hongyu Zhang, Xiang Gao:
Reusing Convolutional Neural Network Models through Modularization and Composition. 70:1-70:39 - Md Rakib Hossain Misu, Rohan Achar, Cristina V. Lopes:
SourcererJBF: A Java Build Framework For Large-Scale Compilation. 71:1-71:35
- Zhihao Li, Chuanyi Li, Ze Tang, Wanhong Huang, Jidong Ge, Bin Luo, Vincent Ng, Ting Wang, Yucheng Hu, Xiaopeng Zhang:
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation. 72:1-72:30 - Matteo Biagiola, Paolo Tonella:
Testing of Deep Reinforcement Learning Agents with Surrogate Models. 73:1-73:33 - Luca Giamattei, Antonio Guerriero, Roberto Pietrantuono, Stefano Russo:
Causality-driven Testing of Autonomous Driving Systems. 74:1-74:35 - Weisong Sun, Chunrong Fang, Yuchen Chen, Quanjun Zhang, Guanhong Tao, Yudu You, Tingxu Han, Yifei Ge, Yuling Hu, Bin Luo, Zhenyu Chen:
An Extractive-and-Abstractive Framework for Source Code Summarization. 75:1-75:39 - Will Leeson, Matthew B. Dwyer:
Algorithm Selection for Software Verification Using Graph Neural Networks. 76:1-76:36 - Hichem Belgacem, Xiaochen Li, Domenico Bianculli, Lionel C. Briand:
Learning-based Relaxation of Completeness Requirements for Data Entry Forms. 77:1-77:32
- Michael Fu, Van Nguyen, Chakkrit Tantithamthavorn, Dinh Phung, Trung Le:
Vision Transformer Inspired Automated Vulnerability Repair. 78:1-78:29 - Pengfei Gao, Fu Song, Taolue Chen:
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks. 79:1-79:38
- Aastha Pant, Rashina Hoda, Simone V. Spiegler, Chakkrit Tantithamthavorn, Burak Turhan:
Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges. 80:1-80:35
- Johan Cederbladh, Antonio Cicchetti, Jagadish Suryadevara:
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review. 81:1-81:67
- Daniel Russo, Paul H. P. Hanel, Niels van Berkel:
Understanding Developers Well-being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic - RCR Report. 82:1-82:4
Volume 33, Number 4, May 2024
- Mauro Pezzè:
Editorial: ICSE and the Incredible Contradictions of Software Engineering. 83:1-83:2 - Weifeng Pan, Marouane Kessentini, Ming Hua, Zijiang Yang:
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches. 84:1-84:43 - Chidera Biringa, Gökhan Kul:
PACE: A Program Analysis Framework for Continuous Performance Prediction. 85:1-85:23 - Peng Zhang, Yang Wang, Xutong Liu, Zeyu Lu, Yibiao Yang, Yanhui Li, Lin Chen, Ziyuan Wang, Chang-Ai Sun, Xiao Yu, Yuming Zhou:
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? 86:1-86:32 - Alessio Ferrari, Thaide Huichapa, Paola Spoletini, Nicole Novielli, Davide Fucci, Daniela Girardi:
Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews. 87:1-87:36 - Sai Anirudh Karre, Y. Raghu Reddy, Raghav Mittal:
RE Methods for Virtual Reality Software Product Development: A Mapping Study. 88:1-88:31 - Zhe Chen, Rui Yan, Yingzi Ma, Yulei Sui, Jingling Xue:
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety. 89:1-89:47 - Pablo C. Cañizares, Jose María López-Morales, Sara Pérez-Soler, Esther Guerra, Juan de Lara:
Measuring and Clustering Heterogeneous Chatbot Designs. 90:1-90:43 - Bentley James Oakes, Michalis Famelis, Houari A. Sahraoui:
Building Domain-Specific Machine Learning Workflows: A Conceptual Framework for the State of the Practice. 91:1-91:50 - Changjie Shao, Gaolei Li, Jun Wu, James Xi Zheng:
Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based Software Vulnerability Detection. 92:1-92:28 - Baharin Aliashrafi Jodat, Abhishek Chandar, Shiva Nejati, Mehrdad Sabetzadeh:
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures. 93:1-93:32 - Neelofar, Aldeida Aleti:
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features. 94:1-94:32 - Donato Clun, Donghwan Shin, Antonio Filieri, Domenico Bianculli:
Rigorous Assessment of Model Inference Accuracy using Language Cardinality. 95:1-95:39 - Anshunkang Zhou, Yikun Hu, Xiangzhe Xu, Charles Zhang:
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation. 96:1-96:31 - Kai Gao, Runzhi He, Bing Xie, Minghui Zhou:
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement. 97:1-97:27 - Shaiful Alam Chowdhury, Gias Uddin, Hadi Hemmati, Reid Holmes:
Method-level Bug Prediction: Problems and Promises. 98:1-98:31 - Qunying Song, Emelie Engström, Per Runeson:
Industry Practices for Challenging Autonomous Driving Systems with Critical Scenarios. 99:1-99:35 - Mingxuan Zhu, Dan Hao, Junjie Chen:
Compiler Autotuning through Multiple-phase Learning. 100:1-100:38 - Taijara Loiola de Santana, Paulo Anselmo da Mota Silveira Neto, Eduardo Santana De Almeida, Iftekhar Ahmed:
Bug Analysis in Jupyter Notebook Projects: An Empirical Study. 101:1-101:34 - Zhenfei Huang, Junjie Chen, Jiajun Jiang, Yihua Liang, Hanmo You, Fengjie Li:
Mapping APIs in Dynamic-typed Programs by Leveraging Transfer Learning. 102:1-102:29
- Sungmin Kang, Robert Feldt, Shin Yoo:
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders. 103:1-103:24 - Han Wang, Sijia Yu, Chunyang Chen, Burak Turhan, Xiaodong Zhu:
Beyond Accuracy: An Empirical Study on Unit Testing in Open-source Deep Learning Projects. 104:1-104:22 - Shikai Guo, Dongmin Li, Lin Huang, Sijia Lv, Rong Chen, Hui Li, Xiaochen Li, He Jiang:
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction. 105:1-105:25 - Hanyang Guo, Yingye Chen, Xiangping Chen, Yuan Huang, Zibin Zheng:
Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization. 106:1-106:31
- Davide Pizzolotto, Stefano Berlato, Mariano Ceccato:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. 107:1-107:38 - Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Hong Li, Zhi Li, Limin Sun:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. 108:1-108:26
- Hashini Gunatilake, John C. Grundy, Rashina Hoda, Ingo Mueller:
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study. 109:1-109:41 - Xin Tan, Xinyue Lv, Jing Jiang, Li Zhang:
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share. 110:1-110:28
- Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Test Optimization in DNN Testing: A Survey. 111:1-111:42
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.