The Community for Technology Leaders
2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE) (2016)
Singapore, Singapore
Sept. 3, 2016 to Sept. 7, 2016
ISBN: 978-1-5090-5571-5
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-xviii

Program generation for performance (Abstract)

Markus Puschel , Department of Computer Science, ETH Zurich, Switzerland
pp. 1

The power of probabilistic thinking (Abstract)

David S. Rosenblum , National University of Singapore, Singapore
pp. 3

An empirical investigation into the nature of test smells (Abstract)

Michele Tufano , The College of William and Mary, USA
Fabio Palomba , University of Salerno, Italy
Gabriele Bavota , Università della Svizzera italiana (USI), Switzerland
Massimiliano Di Penta , University of Sannio, Italy
Rocco Oliveto , University of Molise, Italy
Andrea De Lucia , University of Salerno, Italy
Denys Poshyvanyk , The College of William and Mary, USA
pp. 4-15

Evaluating non-adequate test-case reduction (Abstract)

Mohammad Amin Alipour , School of Electrical Engineering and Computer Science, Oregon State University, USA
August Shi , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Rahul Gopinath , School of Electrical Engineering and Computer Science, Oregon State University, USA
Darko Marinov , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Alex Groce , School of Electrical Engineering and Computer Science, Oregon State University, USA
pp. 16-26

Optimizing customized program coverage (Abstract)

Peter Ohmann , University of Wisconsin-Madison, Madison, WI, USA
David Binqham Brown , University of Wisconsin-Madison, Madison, WI, USA
Naveen Neelakandan , University of Wisconsin-Madison, Madison, WI, USA
Jeff Linderoth , University of Wisconsin-Madison, Madison, WI, USA
Ben Liblit , University of Wisconsin-Madison, Madison, WI, USA
pp. 27-38

What makes killing a mutant hard (Abstract)

Willem Visser , Department of Computer Science, Stellenbosch University, South Africa
pp. 39-44

Test case permutation to improve execution time (Abstract)

Panagiotis Stratis , School of Informatics, University of Edinburgh, UK
Ajitha Rajan , School of Informatics, University of Edinburgh, UK
pp. 45-50

Predicting semantically linkable knowledge in developer online forums via convolutional neural network (Abstract)

Bowen Xu , College of Computer Science and Technology, Zhejiang University, China
Deheng Ye , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Zhenchang Xing , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Xin Xia , College of Computer Science and Technology, Zhejiang University, China
Guibin Chen , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Shanping Li , College of Computer Science and Technology, Zhejiang University, China
pp. 51-62

Testing advanced driver assistance systems using multi-objective search and neural networks (Abstract)

Raja Ben Abdessalem , SnT / University of Luxembourg, Luxembourg
Shiva Nejati , SnT / University of Luxembourg, Luxembourg
Lionel C. Briand , SnT / University of Luxembourg, Luxembourg
Thomas Stifter , IEE S.A. Contern, Luxembourg
pp. 63-74

Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation (Abstract)

Fumin Qi , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China
Xiao-Yuan Jing , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China
Xiaoke Zhu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China
Fei Wu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China
Li Cheng , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, China
pp. 75-86

Deep learning code fragments for code clone detection (Abstract)

Martin White , Department of Computer Science, College of William and Mary, Williamsburg, Virginia, USA
Michele Tufano , Department of Computer Science, College of William and Mary, Williamsburg, Virginia, USA
Christopher Vendome , Department of Computer Science, College of William and Mary, Williamsburg, Virginia, USA
Denys Poshyvanyk , Department of Computer Science, College of William and Mary, Williamsburg, Virginia, USA
pp. 87-98

Automatically recommending code reviewers based on their expertise: An empirical comparison (Abstract)

Christoph Hannebauer , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany
Michael Patalas , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany
Sebastian Stunkelt , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany
Volker Gruhn , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany
pp. 99-110

Evaluating the evaluations of code recommender systems: A reality check (Abstract)

Sebastian Proksch , Software Technology Group, Technische Universität Darmstadt, Germany
Sven Amann , Software Technology Group, Technische Universität Darmstadt, Germany
Sarah Nadi , Software Technology Group, Technische Universität Darmstadt, Germany
Mira Mezini , Software Technology Group, Technische Universität Darmstadt, Germany
pp. 111-121

Too much automation? The bellwether effect and its implications for transfer learning (Abstract)

Rahul Krishna , Computer Science, North Carolina State University, USA
Tim Menzies , Computer Science, North Carolina State University, USA
Wei Fu , Computer Science, North Carolina State University, USA
pp. 122-131

Automatic microbenchmark generation to prevent dead code elimination and constant folding (Abstract)

Marcelino Rodriguez-Cancio , University of Rennes 1, France
Benoit Combemale , University of Rennes 1/INRIA, France
Benoit Baudry , INRIA, France
pp. 132-143

Visualization of combinatorial models and test plans (Abstract)

Rachel Tzoref-Brill , School of Computer Science, Tel Aviv University and IBM Research, Israel
Paul Wojciak , IBM Systems, USA
Shahar Maoz , School of Computer Science, Tel Aviv University, Israel
pp. 144-154

Finding access control bugs in web applications with CanCheck (Abstract)

Ivan Bocic , Department of Computer Science, University of California, Santa Barbara, USA
Tevfik Bultan , Department of Computer Science, University of California, Santa Barbara, USA
pp. 155-166

SOFIA: An automated security oracle for black-box testing of SQL-injection vulnerabilities (Abstract)

Mariano Ceccato , Fondazione Bruno Kessler, Trento, Italy
Cu D. Nguyen , SnT Centre, University of Luxembourg, Luxembourg
Dennis Appelt , SnT Centre, University of Luxembourg, Luxembourg
Lionel C. Briand , SnT Centre, University of Luxembourg, Luxembourg
pp. 167-177

Supporting oracle construction via static analysis (Abstract)

Junjie Chen , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
Yanwei Bai , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
Dan Hao , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
Lingming Zhang , Department of Computer Science, University of Texas at Dallas, 75080, USA
Lu Zhang , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
Bing Xie , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
Hong Mei , Key Laboratory of High Confidence Software Technologies (Peking University), MoE
pp. 178-189

Local-based active classification of test report to assist crowdsourced testing (Abstract)

Junjie Wang , Laboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, Beijing, China
Song Wang , Electrical and Computer Engineering, University of Waterloo, Canada
Qiang Cui , Laboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, Beijing, China
Qing Wang , Laboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, Beijing, China
pp. 190-201

Multi-objective test report prioritization using image understanding (Abstract)

Yang Feng , Department of Informatics, University of California, Irvine, USA
James A. Jones , Department of Informatics, University of California, Irvine, USA
Zhenyu Chen , State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China
Chunrong Fang , State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China
pp. 202-213

CrowdService: Serving the individuals through mobile crowdsourcing and service composition (Abstract)

Xin Peng , School of Computer Science, Fudan University, China
Jingxiao Gu , School of Computer Science, Fudan University, China
Tian Huat Tan , Singapore University of Technology and Design, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Yijun Yu , Department of Computing and Communications, The Open University, UK
Bashar Nuseibeh , Department of Computing and Communications, The Open University, UK
Wenyun Zhao , School of Computer Science, Fudan University, China
pp. 214-219

QUICKAR: Automatic query reformulation for concept location using crowdsourced knowledge (Abstract)

Mohammad Masudur Rahman , Department of Computer Science, University of Saskatchewan, Canada
Chanchal K. Roy , Department of Computer Science, University of Saskatchewan, Canada
pp. 220-225

Taming Android fragmentation: Characterizing and detecting compatibility issues for Android apps (Abstract)

Lili Wei , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
Yepang Liu , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
Shing-Chi Cheung , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
pp. 226-237

Automated model-based Android GUI testing using multi-level GUI comparison criteria (Abstract)

Young-Min Baek , Korea Advanced Institute of Science and Technology (KAIST) Daeieon. Republic of Korea
Doo-Hwan Bae , Korea Advanced Institute of Science and Technology (KAIST) Daeieon. Republic of Korea
pp. 238-249

HybriDroid: Static analysis framework for Android hybrid applications (Abstract)

Sungho Lee , KAIST, South Korea
Julian Dolby , IBM Research, USA
Sukyoung Ryu , KAIST, South Korea
pp. 250-261

Locus: Locating bugs from software changes (Abstract)

Ming Wen , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
Rongxin Wu , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
Shing-Chi Cheung , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China
pp. 262-273

Fine-tuning spectrum based fault localisation with frequent method item sets (Abstract)

Gulsher Laghari , ANSYMO - Universiteit Antwerpen, Belgium
Alessandro Murgia , ANSYMO - Universiteit Antwerpen, Belgium
Serge Demeyer , ANSYMO - Universiteit Antwerpen, Belgium
pp. 274-285

Recommending relevant classes for bug reports using multi-objective search (Abstract)

Rafi Almhana , Computer and Information Science Department, University of Michigan, Dearborn, MI, USA
Wiem Mkaouer , Computer and Information Science Department, University of Michigan, Dearborn, MI, USA
Marouane Kessentini , Computer and Information Science Department, University of Michigan, Dearborn, MI, USA
Ali Ouni , Graduate School of Information Science and Technology, Osaka University, Osaka, Japan
pp. 286-295

An empirical study on dependence clusters for effort-aware fault-proneness prediction (Abstract)

Yibiao Yang , Department of Computer Science and Technology, Nanjing University, China
Mark Harman , Department of Computer Science, University College London, UK
Jens Krinke , Department of Computer Science, University College London, UK
Syed Islam , School of Architecture, Computing and Engineering, University of East London, UK
David Binkley , Department of Computer Science, Loyola University Maryland, USA
Yuming Zhou , Department of Computer Science and Technology, Nanjing University, China
Baowen Xu , Department of Computer Science and Technology, Nanjing University, China
pp. 296-307

StraightTaint: Decoupled offline symbolic taint analysis (Abstract)

Jiang Ming , College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA
Dinghao Wu , College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA
Jun Wang , College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA
Gaoyao Xiao , College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA
Peng Liu , College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA
pp. 308-319

IncA: A DSL for the definition of incremental program analyses (Abstract)

Tamas Szabo , itemis, Germany / Delft University of Technology, Netherlands
Sebastian Erdweg , Delft University of Technology, Netherlands
Markus Voelter , independent / itemis, Germany
pp. 320-331

What developers want and need from program analysis: An empirical study (Abstract)

Maria Christakis , Microsoft Research, Redmond, USA
Christian Bird , Microsoft Research, Redmond, USA
pp. 332-343

DistIA: A cost-effective dynamic impact analysis for distributed programs (Abstract)

Haipeng Cai , School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA
Douglas Thain , Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA
pp. 344-355

Radius aware probabilistic testing of deadlocks with guarantees (Abstract)

Yan Cait , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Zijiang Yang , Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA
pp. 356-367

LockPeeker: Detecting latent locks in Java APIs (Abstract)

Ziyi Lin , School of Software, ShanghaiJiao Tong University, China
Hao Zhong , Department of Computer Science and Engineering, ShanghaiJiao Tong University, China
Yuting Chen , Department of Computer Science and Engineering, ShanghaiJiao Tong University, China
Jianjun Zhao , Department of Advanced Information Technology, Kyushu University, Japan
pp. 368-378

Sound static deadlock analysis for C/Pthreads (Abstract)

Daniel Kroening , University of Oxford, Oxford, UK
Daniel Poetzl , University of Oxford, Oxford, UK
Peter Schrammel , University of Sussex, Brighton, UK
Bjorn Wachter , SSW-Trading GmbH, Germany
pp. 379-390

Static race detection for device drivers: The Goblint approach (Abstract)

Vesal Vojdani , University of Tartu, Estonia
Kalmer Apinis , University of Tartu, Estonia
Vootele Rotov , University of Tartu, Estonia
Helmut Seidl , Technische Universität, München, Germany
Varmo Vene , University of Tartu, Estonia
Ralf Vogler , Technische Universität, München, Germany
pp. 391-402

An empirical evaluation of two user interfaces of an interactive program verifier (Abstract)

Martin Hentschel , TU Darmstadt, Dept. of Computer Science, Darmstadt, Germany
Reiner Hahnle , TU Darmstadt, Dept. of Computer Science, Darmstadt, Germany
Richard Bubel , TU Darmstadt, Dept. of Computer Science, Darmstadt, Germany
pp. 403-413

Traceability maintenance: Factors and guidelines (Abstract)

Salome Maro , Chalmers | University of Gothenburg, Sweden
Anthony Anjorin , University of Paderborn, Paderborn, Germany
Rebekka Wohlrab , Chalmers | University of Gothenburg, Sweden
Jan-Philipp Steghofer , Chalmers | University of Gothenburg, Sweden
pp. 414-425

Usage, costs, and benefits of continuous integration in open-source projects (Abstract)

Michael Hilton , Oregon State University, USA
Timothy Tunnell , University of Illinois, USA
Kai Huang , University of Illinois, USA
Darko Marinov , University of Illinois, USA
Danny Dig , Oregon State University, USA
pp. 426-437

DSL-maps: From requirements to design of domain-specific languages (Abstract)

Ana Pescador , Computer Science Department, Modelling and Software Engineering Research Group, Universidad Autónoma de Madrid (Spain)
Juan de Lara , Computer Science Department, Modelling and Software Engineering Research Group, Universidad Autónoma de Madrid (Spain)
pp. 438-443

The IDE as a scriptable information system (Abstract)

Dimitar Asenov , Dept. of Computer Science, ETH Zurich, Switzerland
Peter Muller , Dept. of Computer Science, ETH Zurich, Switzerland
Lukas Vogel , Ergon Informatik AG, Zurich, Switzerland
pp. 444-449

Inferring annotations for device drivers from verification histories (Abstract)

Zvonimir Pavlinovic , New York University, USA
Akash Lal , Microsoft Research, India
Rahul Sharma , Stanford University, USA
pp. 450-460

Array length inference for C library bindings (Abstract)

Alisa J. Maas , University of Wisconsin-Madison, Madison, WI, USA
Henrique Nazare , Universidade Federal de Minas Gerais, Belo Horizonte, Brazil
Ben Liblit , University of Wisconsin-Madison, Madison, WI, USA
pp. 461-471

APEx: Automated inference of error specifications for C APIs (Abstract)

Yuan Kang , Columbia University, USA
Baishakhi Ray , University of Virginia, USA
Suman Jana , Columbia University, USA
pp. 472-482

On essential configuration complexity: Measuring interactions in highly-configurable systems (Abstract)

Jens Meinicke , University of Magdeburg, Germany
Chu-Pan Wong , Carnegie Mellon University, USA
Christian Kastner , Carnegie Mellon University, USA
Thomas Thum , TU Braunschweig, Germany
Gunter Saake , University of Magdeburg, Germany
pp. 483-494

Precise semantic history slicing through dynamic delta refinement (Abstract)

Yi Li , University of Toronto, Toronto, ON, Canada
Chenguang Zhu , University of Toronto, Toronto, ON, Canada
Julia Rubin , MIT, Cambridge, MA, USA
Marsha Chechik , University of Toronto, Toronto, ON, Canada
pp. 495-506

Goal-conflict detection based on temporal satisfiability checking (Abstract)

Renzo Degiovanni , Departamento de Computación, Universidad Nacional de Río Cuarto and CONICET, Argentina
Nicolas Ricci , Departamento de Computación, Universidad Nacional de Río Cuarto and CONICET, Argentina
Dalal Alrajeh , Department of Computing, Imperial College London, UK
Pablo Castro , Departamento de Computación, Universidad Nacional de Río Cuarto and CONICET, Argentina
Nazareno Aguirre , Departamento de Computación, Universidad Nacional de Río Cuarto and CONICET, Argentina
pp. 507-518

Symbolic execution of stored procedures in database management systems (Abstract)

Muhammad Suleman Mahmood , Department of Computer Science, LUMS School of Science and Engineering, Lahore, Pakistan
Maryam Abdul Ghafoor , Department of Computer Science, LUMS School of Science and Engineering, Lahore, Pakistan
Junaid Haroon Siddiqui , Department of Computer Science, LUMS School of Science and Engineering, Lahore, Pakistan
pp. 519-530

Conc-iSE: Incremental symbolic execution of concurrent software (Abstract)

Shengjian Guo , Department of ECE, Virginia Tech, Blacksburg, VA, USA
Markus Kusano , Department of ECE, Virginia Tech, Blacksburg, VA, USA
Chao Wang , Department of CS, University of Southern California, Los Angeles, CA, USA
pp. 531-542

Model-based whitebox fuzzing for program binaries (Abstract)

Van-Thuan Pham , School of Computing, National University of Singapore, Singapore
Marcel Bohme , School of Computing, National University of Singapore, Singapore
Abhik Roychoudhury , School of Computing, National University of Singapore, Singapore
pp. 543-553

Symbolic execution of complex program driven by machine learning based constraint solving (Abstract)

Xin Li , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Yongjuan Liang , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Hong Qian , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Yi-Qi Hu , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Lei Bu , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Yang Yu , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Xin Chen , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
Xuandong Li , State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, Jiangsu, P.R. China
pp. 554-559

Towards bounded model checking using nonlinear programming solver (Abstract)

Masataka Nishi , Center for Technology Innovation, R&D Group, Hitachi Ltd, Japan
pp. 560-565

Identifying domain elements from textual specifications (Abstract)

Jitendra Singh Thakur , Indian Institute of Information Technology, Design and Manufacturing, Jabalpur, India, Jabalpur Engineering College, Jabalpur, India
Atul Gupta , Indian Institute of Information Technology, Design and Manufacturing, Jabalpur, India
pp. 566-577

Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (Abstract)

Sven Peldszus , Institute for Software Technology, University of Koblenz-Landau, Germany
Geza Kulcsar , Real-Time Systems Lab, TU Darmstadt, Germany
Malte Lochau , Real-Time Systems Lab, TU Darmstadt, Germany
Sandro Schulze , Institute of Software Technology Systems, TU Hamburg-Harburg, Germany
pp. 578-589

Efficient detection of inconsistencies in a multi-developer engineering environment (Abstract)

Andreas Demuth , Institute for Software Systems Engineering, Johannes Kepler University, Linz, Austria
Markus Riedl-Ehrenleitner , Institute for Software Systems Engineering, Johannes Kepler University, Linz, Austria
Alexander Egyed , Institute for Software Systems Engineering, Johannes Kepler University, Linz, Austria
pp. 590-601

How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications (Abstract)

Owolabi Legunsen , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Wajih Ul Hassan , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Xinyue Xu , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Grigore Rosu , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Darko Marinov , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 602-613

Greedy combinatorial test case generation using unsatisfiable cores (Abstract)

Akihisa Yamada , University of Innsbruck, Austria
Armin Biere , Johannes Kepler University, Austria
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Japan
Takashi Kitamura , National Institute of Advanced Industrial Science and Technology (AIST), Japan
Eun-Hye Choi , National Institute of Advanced Industrial Science and Technology (AIST), Japan
pp. 614-624

Towards automatically generating descriptive names for unit tests (Abstract)

Benwen Zhang , University of Delaware, Newark, DE, USA
Emily Hill , Drew University, Madison, NJ, USA
James Clause , University of Delaware, Newark, DE, USA
pp. 625-636

Applying combinatorial test data generation to big data applications (Abstract)

Nan Li , Research and Development, Medidata Solutions, New York, NY, USA
Yu Lei , Dept. of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA
Haider Riaz Khan , Research and Development, Medidata Solutions, New York, NY, USA
Jingshu Liu , Research and Development, Medidata Solutions, New York, NY, USA
Yun Guo , Dept. of Computer Science, George Mason University, Fairfax, VA, USA
pp. 637-647

Generating test cases to expose concurrency bugs in android applications (Abstract)

Hongyin Tang , State key Laboratory of Computer Sciences, Institute of Software, Chinese Academy of Sciences, China
Guoquan Wu , State key Laboratory of Computer Sciences, Institute of Software, Chinese Academy of Sciences, China
Jun Wei , State key Laboratory of Computer Sciences, Institute of Software, Chinese Academy of Sciences, China
Hua Zhong , State key Laboratory of Computer Sciences, Institute of Software, Chinese Academy of Sciences, China
pp. 648-653

Automatic test image generation using procedural noise (Abstract)

Matthew Patrick , Department of Plant Sciences, University of Cambridge, United Kingdom
Matthew D. Castle , Department of Plant Sciences, University of Cambridge, United Kingdom
Richard O. J. H. Stutt , Department of Plant Sciences, University of Cambridge, United Kingdom
Christopher A. Gilligan , Department of Plant Sciences, University of Cambridge, United Kingdom
pp. 654-659

Move-optimized source code tree differencing (Abstract)

Georg Dotzler , Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany, Programming Systems Group
Michael Philippsen , Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany, Programming Systems Group
pp. 660-671

Migrating cascading style sheets to preprocessors by introducing mixins (Abstract)

Davood Mazinanian , Computer Science and Software Engineering, Concordia University, Montreal, Canada
Nikolaos Tsantalis , Computer Science and Software Engineering, Concordia University, Montreal, Canada
pp. 672-683

Automatic runtime recovery via error handler synthesis (Abstract)

Tianxiao Gu , Department of Computer Science and Technology, Nanjing University, China
Chengnian Sun , Department of Computer Science, University of California, Davis, USA
Xiaoxing Ma , Department of Computer Science and Technology, Nanjing University, China
Jian Lu , Department of Computer Science and Technology, Nanjing University, China
Zhendong Su , Department of Computer Science, University of California, Davis, USA
pp. 684-695

Mining revision histories to detect cross-language clones without intermediates (Abstract)

Xiao Cheng , Department of Computer Science and Engineering, ShanghaiJiao Tong University, China
Zhiming Peng , School of Information Systems, Singapore Management University, Singapore
Lingxiao Jiang , School of Information Systems, Singapore Management University, Singapore
Hao Zhong , Department of Computer Science and Engineering, ShanghaiJiao Tong University, China
Haibo Yu , School of Software, ShanghaiJiao Tong University, China
Jianjun Zhao , Department of Advanced Information Technology, Kyushu University, Japan
pp. 696-701

Battery-aware transformations in mobile applications (Abstract)

Jurgen Cito , University of Zurich, Zurich, Switzerland
Julia Rubin , MIT, Cambridge, MA, USA
Phillip Stanley-Marbell , MIT, Cambridge, MA, USA
Martin Rinard , MIT, Cambridge, MA, USA
pp. 702-707

Bugram: Bug detection with n-gram language models (Abstract)

Song Wang , Electrical and Computer Engineering, University of Waterloo, Canada
Devin Chollak , Electrical and Computer Engineering, University of Waterloo, Canada
Dana Movshovitz-Attias , Computer Science Department, Carnegie Mellon University, USA
Lin Tan , Electrical and Computer Engineering, University of Waterloo, Canada
pp. 708-719

Mining input grammars from dynamic taints (Abstract)

Matthias Hoschele , Saarland University, Saarland Informatics Campus, Saarbrücken, Germany
Andreas Zeller , Saarland University, Saarland Informatics Campus, Saarbrücken, Germany
pp. 720-725

Phrase-based extraction of user opinions in mobile app reviews (Abstract)

Phong Minh Vu , Computer Science Department, Utah State University
Hung Viet Pham , Computer Science Department, Utah State University
Tam The Nguyen , Computer Science Department, Utah State University
Tung Thanh Nguyen , Computer Science Department, Utah State University
pp. 726-731

Practical guidelines for change recommendation using association rule mining (Abstract)

Leon Moonen , Simula Research Laboratory, Oslo, Norway
Stefano Di Alesio , Simula Research Laboratory, Oslo, Norway
David Binkley , Loyola University Maryland, Baltimore, Maryland, USA
Thomas Rolfsnes , Simula Research Laboratory, Oslo, Norway
pp. 732-743

Learning a dual-language vector space for domain-specific cross-lingual question retrieval (Abstract)

Guibin Chen , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Chunyang Chen , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Zhenchang Xing , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Bowen Xu , College of Computer Science and Technology, Zhejiang University, China
pp. 744-755

Reflection-aware static analysis of Android apps (Abstract)

Li Li , SnT, University of Luxembourg, Luxembourg
Tegawende F. Bissyande , SnT, University of Luxembourg, Luxembourg
Damien Octeau , CSE, Pennsylvania State University, USA
Jacques Klein , SnT, University of Luxembourg, Luxembourg
pp. 756-761

Relda2: An effective static analysis tool for resource leak detection in Android apps (Abstract)

Tianyong Wu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Jierui Liu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Xi Deng , Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, Beijing, China
Jun Yan , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Jian Zhang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
pp. 762-767

An end-user oriented tool suite for development of mobile applications (Abstract)

Zhongyi Zhai , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Bo Cheng , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Meng Niu , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Zhaoning Wang , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Yimeng Feng , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
Junliang Chen , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
pp. 768-773

Model driven design of heterogeneous synchronous embedded systems (Abstract)

Huafeng Zhang , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Yu Jiang , Department of Computer Science, University of Illinois at Urbana-Champaign, Illinois, USA
Han Liu , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Hehua Zhang , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Ming Gu , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Jiaguang Sun , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
pp. 774-779

MACKE: Compositional analysis of low-level vulnerabilities with symbolic execution (Abstract)

Saahil Ognawala , Technical University of Munich, Germany
Martin Ochoa , Singapore University of Technology and Design, Singapore
Alexander Pretschner , Technical University of Munich, Germany
Tobias Limmer , Siemens AG, Germany
pp. 780-785

BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities (Abstract)

Fengjuan Gao , State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, 210023, China
Linzhang Wang , State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, 210023, China
Xuandong Li , State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, 210023, China
pp. 786-791

CORRECT: Code reviewer recommendation at GitHub for Vendasta technologies (Abstract)

Mohammad Masudur Rahman , University of Saskatchewan, Canada
Chanchal K. Roy , University of Saskatchewan, Canada
Jesse Redl , Vendasta Technologies, Canada
Jason A. Collins , Google Inc., USA
pp. 792-797

ProcessPAIR: A tool for automated performance analysis and improvement recommendation in software development (Abstract)

Mushtaq Raza , INESC TEC/University of Porto - Faculty of Engineering, Rua Dr. Roberto Frias, s/n, 4200-465 Porto Portugal
Joao Pascoal Faria , INESC TEC/University of Porto - Faculty of Engineering, Rua Dr. Roberto Frias, s/n, 4200-465 Porto Portugal
pp. 798-803

CVExplorer: Identifying candidate developers by mining and exploring their open source contributions (Abstract)

Gillian J. Greene , CAIR, CSIR Meraka, Computer Science Division, University of Stellenbosch, South Africa
Bernd Fischer , CAIR, CSIR Meraka, Computer Science Division, University of Stellenbosch, South Africa
pp. 804-809

Lightweight collection and storage of software repository data with DataRover (Abstract)

Thomas Kowark , Institute, University of Potsdam, August-Bebel-Str. 88 Potsdam, Germany
Christoph Matthies , Institute, University of Potsdam, August-Bebel-Str. 88 Potsdam, Germany
Matthias Uflacker , Institute, University of Potsdam, August-Bebel-Str. 88 Potsdam, Germany
Hasso Plattner Hasso Plattner , Institute, University of Potsdam, August-Bebel-Str. 88 Potsdam, Germany
pp. 810-815

Visual contract extractor: A tool for reverse engineering visual contracts using dynamic analysis (Abstract)

Abdullah Alshanqiti , Department of Computer Science, University of Leicester, UK
Reiko Heckel , Department of Computer Science, University of Leicester, UK
Timo Kehrer , Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy
pp. 816-821

SuperMod: Tool support for collaborative filtered model-driven software product line engineering (Abstract)

Felix Schwager , Applied Computer Science, University of Bayreuth, 95440 Bayreuth, Germany
Bernhard Westfechtel , Applied Computer Science, University of Bayreuth, 95440 Bayreuth, Germany
pp. 822-827

AnModeler: A tool for generating domain models from textual specifications (Abstract)

Jitendra Singh Thakur , Indian Institute of Information Technology, Design and Manufacturing, Jabalpur, India, Jabalpur Engineering College, Jabalpur, India
Atul Gupta , Indian Institute of Information Technology, Design and Manufacturing Jabalpur, India
pp. 828-833

SimilarTech: Automatically recommend analogical libraries across different programming languages (Abstract)

Chunyang Chen , School of Computer Science and Engineering, Nanyang Technological University, Singapore
Zhenchang Xing , School of Computer Science and Engineering, Nanyang Technological University, Singapore
pp. 834-839

TeeVML: Tool support for semi-automatic integration testing environment emulation (Abstract)

Jian Liu , School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC 3122, Australia
John Grundy , School of Information Technology, Deakin University, Burwood, VIC 3125, Australia
Iman Avazpour , School of Information Technology, Deakin University, Burwood, VIC 3125, Australia
Mohamed Abdelrazek , School of Information Technology, Deakin University, Burwood, VIC 3125, Australia
pp. 840-845

The interactive verification debugger: Effective understanding of interactive proof attempts (Abstract)

Martin Hentschel , TU Darmstadt, Darmstadt, Germany
Reiner Hahnle , TU Darmstadt, Darmstadt, Germany & Università degli Studi di Torino, Torino, Italy
Richard Bubel , TU Darmstadt, Darmstadt, Germany
pp. 846-851

Verifying Simulink Stateflow model: Timed automata approach (Abstract)

Yixiao Yang , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Yu Jiang , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Ming Gu , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
Jiaguang Sun , School of Software, Tsinghua University, TNLIST, KLISS, Beijing, China
pp. 852-857

GUICat: GUI testing as a service (Abstract)

Lin Cheng , Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA
Jialiang Chang , Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA
Zijiang Yang , Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA
Chao Wang , Department of Computer Science, University of Southern California, Los Angeles, CA, USA
pp. 858-863

An automated collaborative requirements engineering tool for better validation of requirements (Abstract)

Nor Aiza Moketar , Innovative Software System and Services Group, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia
Massila Kamalrudin , Innovative Software System and Services Group, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia
Safiah Sidek , Innovative Software System and Services Group, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia
Mark Robinson , Fulgent Corporation, USA
John Grundy , Faculty of Science Engineering and Built Environment, School of Information Technology, Melbourne Burwood Campus, Deakin University, Victoria 3125, Australia
pp. 864-869

An extensible framework for variable-precision data-flow analyses in MPS (Abstract)

Tamas Szabo , itemis, Germany / Delft University of Technology, Netherlands
Simon Alperovich , JetBrains, Czechia
Sebastian Erdweg , Delft University of Technology, Netherlands
Markus Voelter , independent/itemis, Germany
pp. 870-875

Towards efficient and effective automatic program repair (Abstract)

Xuan-Bach D. Le , School of Information Systems, Singapore Management University, Singapore
pp. 876-879

Automated testing and notification of mobile app privacy leak-cause behaviours (Abstract)

Joseph Chan Joo Keng , School of Information Systems, Singapore Management University
pp. 880-883

Factoring requirement dependencies in software requirement selection using graphs and integer programming (Abstract)

Davoud Mougouei , School of Computer Science, Engineering, and Mathematics, Flinders University, Adelaide, Australia
pp. 884-887

Statistical analysis of large sets of models (Abstract)

Onder Babur , Eindhoven University of Technology, 5600 MB Eindhoven, The Netherlands
pp. 888-891

Developer targeted analytics: Supporting software development decisions with runtime information (Abstract)

Jurgen Cito , Software evolution & architecture lab, University of Zurich, Switzerland
pp. 892-895

API recommendation system for software development (Abstract)

Ferdian Thung , School of Information Systems, Singapore Management University
pp. 896-899

Author index (PDF)

pp. 900-901
79 ms
(Ver 3.3 (11022016))