Cover Art - Volume 2 (PDF)
Title Page i - Volume 2 (PDF)
Title Page iii - Volume 2 (PDF)
[Copyright notice - Vol 2] (PDF)
Table of Contents - Volume 2 (PDF)
Message from the General and Program Chairs - Volume 2 (PDF)
Committees - Volume 2 (PDF)
Additional Reviewers - Volume 2 (PDF)
Sponsors and Supporters - Volume 2 (PDF)
Empirically Detecting False Test Alarms Using Association Rules (Abstract)
Automatic and Continuous Software Architecture Validation (Abstract)
Online Defect Prediction for Imbalanced Data (Abstract)
Measuring Dependency Freshness in Software Systems (Abstract)
Evolution of Software Development Strategies (Abstract)
Novice Code Understanding Strategies during a Software Maintenance Assignment (Abstract)
System Thinking: Educating T-Shaped Software Engineers (Abstract)
Concurrent Software Engineering and Robotics Education (Abstract)
Software Design Studio: A Practical Example (Abstract)
Active and Inductive Learning in Software Engineering Education (Abstract)
In Search of the Emotional Design Effect in Programming (Abstract)
Engineering Sustainability Through Language (Abstract)
Free Hugs -- Praising Developers for Their Actions (Abstract)
Incorporating Human Intention into Self-Adaptive Systems (Abstract)
Dynamic Safety Cases for Through-Life Safety Assurance (Abstract)
A Unified Framework for the Comprehension of Software's Time (Abstract)
Smart Programming Playgrounds (Abstract)
Evolution-Aware Monitoring-Oriented Programming (Abstract)
Optimising Energy Consumption of Design Patterns (Abstract)
Rapid Multi-Purpose, Multi-Commit Code Analysis (Abstract)
Bixie: Finding and Understanding Inconsistent Code (Abstract)
Source Code Curation on StackOverflow: The Vesperin System (Abstract)
MU-MMINT: An IDE for Model Uncertainty (Abstract)
StriSynth: Synthesis for Live Programming (Abstract)
Ekstazi: Lightweight Test Selection (Abstract)
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (Abstract)
Automatic Categorization of Software Libraries Using Bytecode (Abstract)
Post-Dominator Analysis for Precisely Handling Implicit Flows (Abstract)
Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (Abstract)
Poster: Filtering Code Smells Detection Results (Abstract)
Poster: Enhancing Partition Testing through Output Variation (Abstract)
Poster: Segmentation Based Online Performance Problem Diagnosis (Abstract)
Poster: Symbolic Execution of MPI Programs (Abstract)
Poster: Automatically Fixing Real-World JavaScript Performance Bugs (Abstract)
Poster: Dynamic Analysis Using JavaScript Proxies (Abstract)
Poster: Tierless Programming in JavaScript (Abstract)
Poster: Reasoning Based on Imperfect Context Data in Adaptive Security (Abstract)
Scalable Formal Verification of UML Models (Abstract)
A Unified Approach to Automatic Testing of Architectural Constraints (Abstract)
Measuring Software Developers' Perceived Difficulty with Biometric Sensors (Abstract)
Automatic Documentation Generation via Source Code Summarization (Abstract)
A Comprehensive Framework for the Development of Dynamic Smart Spaces (Abstract)
Software Requirements Patterns - A State of the Art and the Practice (Abstract)
Software Engineering for Privacy in-the-Large (Abstract)
Reactive Programming: A Walkthrough (Abstract)
3rd FME Workshop on Formal Methods in Software Engineering (FormaliSE 2015) (Abstract)
8th International Workshop on Search-Based Software Testing (SBST 2015) (Abstract)
1st International Workshop on Software Protection (SPRO 2015) (Abstract)
Author Index - Volume 2 (PDF)
Publisher's Information - Volume 2 (PDF)