Year | Title | Authors |
---|---|---|
2018 | Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks | Shengjian (Daniel) Guo, Virginia Tech Meng Wu, Virginia Tech Chao Wang, University of Southern California |
2018 | An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems | Yu Gao, Chinese Academy of Sciences Wensheng Dou, Chinese Academy of Sciences Feng Qin, Ohio State University Chushu Gao, Chinese Academy of Sciences Dong Wang, Chinese Academy of Sciences Jun Wei, Chinese Academy of Sciences Ruirui Huang, Alibaba Group Li Zhou, Alibaba Group Yongming Wu, Alibaba Group |
2018 | Data Race Detection on Compressed Traces | Dileep Kini, University of Illinois at Urbana-Champaign Umang Mathur, University of Illinois at Urbana-Champaign Mahesh Viswanathan, University of Illinois at Urbana-Champaign |
2018 | Oreo: Detection of Clones in the Twilight Zone | Vaibhav Saini, University of California Irvine Farima Farmahinifarahani, University of California Irvine Yadong Lu, University of California Irvine Pierre Baldi, University of California Irvine Crista Lopes, University of California Irvine |
2018 | The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale | James C. Davis, Virginia Tech Christy A. Coghlan, Virginia Tech Francisco Servant, Virginia Tech Dongyoon Lee, Virginia Tech |
2018 | Do Android Taint Analysis Tools Keep Their Promises? | Felix Pauck, Paderborn University Eric Bodden, Paderborn University Heike Wehrheim, Paderborn University |
2017 | The Power of “Why” and “Why Not”: Enriching Scenario Exploration with Provenance | Tim Nelson, Brown University Natasha Danas, Brown University Daniel J. Dougherty, Worcester Polytechnic Institute Shriram Krishnamurthi, Brown University |
2017 | Cooperative Kernels: GPU Multitasking for Blocking Algorithms | Tyler Sorensen, Imperial College London Hugues Evrard, Imperial College London Alastair F. Donaldson, Imperial College London |
2017 | Understanding Misunderstandings in Source Code | Dan Gopstein, New York University Jake Iannacone, New York University Yu Yan, Pennsylvania State University Lois DeLong, New York University Yanyan Zhuang, University of Colorado Martin K.-C. Yeh, Pennsylvania State University Justin Cappos, New York University |
2017 | Trade-Offs in Continuous Integration: Assurance, Security, and Flexibility | Michael Hilton, Oregon State University Nicholas Nelson, Oregon State University Timothy Tunnell, University of Illinois at Urbana-Champaign Darko Marinov, University of Illinois at Urbana-Champaign Danny Dig, Oregon State University |
2017 | Discovering Relational Specifications | Calvin Smith, University of Wisconsin-Madison Gabriel Ferns, University of Wisconsin-Madison Aws Albarghouthi, University of Wisconsin-Madison |
2017 | Automatically Diagnosing and Repairing Error Handling Bugs in C | Yuchi Tian & Baishakhi Ray, University of Virginia |
2017 | Fairness Testing: Testing Software for Discrimination | Sainyam Galhotra, University of Massachusetts Amherst Yuriy Brun, University of Massachusetts Amherst Alexandra Meliou, University of Massachusetts Amherst |
2016 | Foraging and Navigations Fundamentally: Developers’ Predictions of Value and Cost | David Piorkowski, Oregon State University Austin Z. Henley, University of Memphis Tahmid Nabi, Oregon State University Scott D. Fleming, University of Memphis Christopher Scaffidi, Oregon State University Margaret Burnett, Oregon State University |
2016 | Multi-Representational Security Analysis | Eunsuk Kang, University of California Berkeley Aleksandar Milicevic, Microsoft Daniel Jackson, Massachusetts Institute of Technology |
2016 | Factors Influencing Code Review Processes in Industry | Tobias Baum, Leibniz Universität Hannover Olga Liskin, Leibniz Universität Hannover Kai Niklas, Leibniz Universität Hannover Kurt Schneider, Leibniz Universität Hannover |
2016 | API Code Recommendation Using Statistical Learning from Fine-grained Changes | Anh Tuan Nguyen, Iowa State University Michael Hilton, Oregon State University Mihai Codoban, Microsoft Hoan Anh Nguyen, Iowa State University Lily Mast, University of Evansville Eli Rademacher, Oregon State University Tien N. Nguyen, Iowa State University Danny Dig, Oregon State University |
2016 | Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis | Xiaofei Xie, Tianjin University Bihuan Chen, Nanyang Technological University Yang Liu, Nanyang Technological University Wei Le, Iowa State University Xiaohong Li, Tianjin University |
2016 | Why We Refactor? Confessions of GitHub Contributors | Danilo Silva, Federal University of Minas Gerais Nikolaos Tsantalis, Concordia University Marco Tulio Valente, Federal University of Minas Gerais |
2016 | Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis | Jianjun Huang, Purdue University Xiangyu Zhang, Purdue University Lin Tan, University of Waterloo |
2015 | Optimizing energy consumption of GUIs in Android apps: a multi-objective approach | Mario Linares-Vásquez, College of William and Mary Gabriele Bavota, Free University of Bolzano Carlos Eduardo Bernal Cárdenas, College of William and Mary Rocco Oliveto, University of Molise Massimiliano Di Penta, University of Sannio Denys Poshyvanyk, College of William and Mary |
2015 | How Practitioners Perceive the Relevance of Software Engineering Research | David Lo, Singapore Management University Nachiappan Nagappan, Microsoft Research Thomas Zimmermann, Microsoft Research |
2015 | Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers | Reza Matinnejad, University of Luxembourg Shiva Nejati, University of Luxembourg Lionel C. Briand, University of Luxembourg Thomas Bruckmann, Delphi Automotive Systems |
2015 | Modeling Readability to Improve Unit Tests | Ermira Daka, University of Sheffield José Campos, University of Sheffield Gordon Fraser, University of Sheffield Jonathan Dorn, University of Virginia Westley Weimer, University of Virginia |
2015 | Measure It? Manage It? Ignore It? Software Practitioners and Technical Debt | Neil A. Ernst, Carnegie Mellon University Stephany Bellomo, Carnegie Mellon University Ipek Ozkaya, Carnegie Mellon University Robert L. Nord, Carnegie Mellon University Ian Gorton, Carnegie Mellon University |
2015 | A User-Guided Approach to Program Analysis | Ravi Mangal, Georgia Institute of Technology Xin Zhang, Georgia Institute of Technology Aditya V. Nori, Microsoft Research Mayur Naik, Georgia Institute of Technology |
2015 | MultiSE: Multi-path Symbolic Execution using Value Summaries | Koushik Sen, University of California Berkeley George Necula, University of California Berkeley Liang Gong, University of California Berkeley Wontae Choi, University of California Berkeley |
2015 | Users Beware: Preference Inconsistencies Ahead | Farnaz Behrang, Georgia Institute of Technology Myra B. Cohen, University of Nebraska-Lincoln Alessandro Orso, Georgia Institute of Technology |
2014 | Selection and Presentation Practices for Code Example Summarization | Annie Ying & Martin Robillard, McGill University |
2014 | Are Mutants a Valid Substitute for Real Faults in Software Testing? | René Just, University of Washington Darioush Jalali, University of Washington Laura Inozemtseva, University of Waterloo Michael Ernst, University of Washington Reid Holmes, University of Waterloo Gordon Fraser, University of Sheffield |
2014 | AI: A Lightweight System for Tolerating Concurrency Bugs | Mingxing Zhang, Tsinghua University Yongwei Wu, Tsinghua University Shan Lu, University of Wisconsin Shanxiang Qi, University of Illinois at Urbana-Champaign Jinglei Ren, Tsinghua University Weimin Zheng, Tsinghua University |
2014 | Powering the Static Driver Verifier using Corral | Akash Lal & Shaz Qadeer, Microsoft Research |
2014 | Learning Natural Coding Conventions | Miltiadis Allamanis, University of Edinburgh Earl T. Barr, University College London Christian Bird, Microsoft Research Charles Sutton, University of Edinburgh |
2014 | Architecture Challenges for Internal Software Ecosystems: A Large-Scale Industry Case Study | Klaus-Benedikt Schultis, Siemens Corporate Technology Christoph Elsner, Siemens Corporate Technology Daniel Lohmann, Friedrich-Alexander University |
2012 | Seeking the Ground Truth: A Retroactive Study on the Evolution and Migration of Software Libraries | Bradley Cossette & Robert Walker, University of Calgary |
2012 | Scalable Test Data Generation from Multidimensional Models | Emina Torlak, University of California Berkeley |
2012 | Assessing the Value of Branches with What-if Analysis | Christian Bird & Thomas Zimmermann, Microsoft Research |
2011 | Proactive Detection of Collaboration Conflicts | Yuriy Brun, University of Washington Reid Holmes, University of Waterloo Michael D. Ernst, University of Washington David Notkin, University of Washington |
2011 | How Do Fixes Become Bugs? | Zuoning Yin, University of Illinois at Urbana-Champaign Ding Yuan, University of Illinois at Urbana-Champaign Yuanyuan Zhou, University of California San Diego Shankar Pasupathy, NetApp Lakshmi Bairavasundaram, NetApp |
2011 | Proving programs robust | Swarat Chaudhuri, Rice University Sumit Gulwani, Microsoft Research Roberto Lublinerman, Pennsylvania State University Sara Navidpour, Pennsylvania State University |
2010 | Creating and evolving developer documentation: understanding the decisions of open source contributors | Barthélémy Dagenais & Martin P. Robillard, McGill University |
2010 | Developer Fluency: Achieving True Mastery in Software Projects | Minghui Zhou, Peking University Audris Mockus, Avaya Labs |
2010 | Staged Concurrent Program Analysis | Nishant Sinha & Chao Wang, NEC Labs America |
2009 | Asserting and checking determinism for multithreaded programs | Jacob Burnim & Koushik Sen, University of California Berkeley |
2009 | Darwin: an approach for debugging evolving programs | Dawei Qi, National University of Singapore Abhik Roychoudhury, National University of Singapore Zhenkai Liang, National University of Singapore Kapil Vaswani, Microsoft Research |
2009 | Graph-based Mining of Multiple Object Usage Patterns | Tung Thanh Nguyen, Iowa State University Hoan Anh Nguyen, Iowa State University Nam H. Pham, Iowa State University Jafar M. Al-Kofahi, Iowa State University Tien N. Nguyen, Iowa State University |
2008 | What makes a good bug report? | Nicolas Bettenburg, Saarland University Sascha Just, Saarland University Adrian Schröter, University of Victoria Cathrin Weiss, University of Zurich Rahul Premraj, Saarland University Thomas Zimmermann, University of Calgary |
2008 | Efficient online monitoring of web-service SLAs | Franco Raimondi, University College London James Skene, University College London Wolfgang Emmerich, University College London |
2007 | Automatic consistency assessment for query results in dynamic environments | Jamie Payton, University of North Carolina at Charlotte Christine Julien, University of Texas at Austin Gruia-Catalin Roman, Washington University in St. Louis |
2007 | Globally distributed software development project performance: an empirical analysis | Narayan Ramasubbu & Rajesh Krishna Balan, Singapore Management University |
2007 | Mining specifications of malicious behavior | Mihai Christodorescu, University of Wisconsin Somesh Jha, University of Wisconsin Christopher Kruegel, Vienna University of Technology |
2007 | Object and reference immutability using Java generics | Yoav Zibin, Massachusetts Institute of Technology Alex Potanin, Victoria University of Wellington Mahmood Ali, Massachusetts Institute of Technology Shay Artzi, Massachusetts Institute of Technology Adam Kieżun, Massachusetts Institute of Technology Michael D. Ernst, Massachusetts Institute of Technology |
2006 | Controlling factors in evaluating path-sensitive error detection techniques | Matthew B. Dwyer, University of Nebraska-Lincoln Suzette Person, University of Nebraska-Lincoln Sebastian Elbaum, University of Nebraska-Lincoln |
2006 | SYNERGY: a new algorithm for property checking | Bhargav S. Gulavani, Indian Institute of Technology Thomas A. Henzinger, École Polytechnique Fédérale de Lausanne Yamini Kannan, Microsoft Research Aditya V. Nori, Microsoft Research Sriram K. Rajamani, Microsoft Research |
2005 | Automatic Generation of Suggestions for Program Investigation | Martin P. Robillard, McGill University |
2005 | CUTE: a concolic unit testing engine for C | Koushik Sen, University of Illinois at Urbana-Champaign Darko Marinov, University of Illinois at Urbana-Champaign Gul Agha, University of Illinois at Urbana-Champaign |
2005 | Context- and path-sensitive memory leak detection | Yichen Xie & Alex Aiken, Stanford University |
2004 | Reasoning about partial goal satisfaction for requirements and design engineering | Emmanuel Letier & Axel van Lamsweerde, Université catholique de Louvain |
2004 | A classification system and analysis for aspect-oriented programs | Martin Rinard, Massachusetts Institute of Technology Alexandru Salcianu, Massachusetts Institute of Technology Suhabe Bugrara, Massachusetts Institute of Technology |
2003 | Eliminating redundancies with a “composition with adaptation” meta-programming technique | Stan Jarzabek, National University of Singapore Li Shubiao, Xi’an Jiaotong University |
2003 | A Family of Test Adequacy Criteria for Database-Driven Applications | Gregory M. Kapfhammer & Mary Lou Soffa, University of Pittsburgh |
2003 | Predicting problems caused by component upgrades | Stephen McCamant & Michael D. Ernst, Massachusetts Institute of Technology |
2002 | Isolating Cause-Effect Chains from Computer Programs | Andreas Zeller, Saarland University |