The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589

Heterogeneous Defect Prediction (Abstract)

Jaechang Nam , Department of Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: jc.nam@uwaterloo.ca)
Wei Fu , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: wfu@ncsu.edu)
Sunghun Kim , Department of Computer Science, Hong Kong University of Science and, Hong Kong, n/a Hong Kong N/A (e-mail: hunkim@cse.ust.hk)
Tim Menzies , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: tim@menzies.us)
Lin Tan , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: lintan@uwaterloo.ca)

A Comparative Study to Benchmark Cross-project Defect Prediction Approaches (Abstract)

Steffen Herbold , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany 37077 (e-mail: herbold@cs.uni-goettingen.de)
Alexander Trautsch , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: alexander.trautsch@stud.uni-goettingen.de)
Jens Grabowski , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: grabowski@cs.uni-goettingen.de)

Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy (Abstract)

Le Yu , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: yulele08@gmail.com)
Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: csxluo@comp.polyu.edu.hk)
Chenxiong Qian , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: chenxiongqian@gmail.com)
Shuai Wang , Department of Computing, Hong Kong Polytechnic University, 26680 Kowloon, Hong Kong Hong Kong (e-mail: waishuai@hotmail.com)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)

Authors' Reply to “Comments on 'Researcher Bias: The Use of Machine Learning in Software Defect Prediction' ” (Abstract)

Martin Shepperd , IS & Computing, Brunel University, Uxbridge, Middx United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: martin.shepperd@brunel.ac.uk)
Tracy Hall , Information systems and computing, Brunel University, Middlesex, Middlesex United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: tracy.hall@brunel.ac.uk)
David Bowes , Computer Science, University of Hertfordshire, Hatfield, Hertfordshire United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: d.h.bowes@herts.ac.uk)

Two-phase Assessment Approach to Improve the Efficiency of Refactoring Identification (Abstract)

Ah-Rim Han , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: arhan@se.kaist.ac.kr)
Sungdeok Cha , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: scha@korea.ac.kr)

A Theoretical and Empirical Study of Diversity-aware Mutation Adequacy Criterion (Abstract)

Donghwan Shin , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: donghwan@se.kaist.ac.kr)
Shin Yoo , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: shin.yoo@kaist.ac.kr)
Doo-Hwan Bae , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: bae@se.kaist.ac.kr)

Measuring Program Comprehension: A Large-Scale Field Study with Professionals (Abstract)

Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China 310000 (e-mail: xxkidd@zju.edu.cn)
Lingfeng Bao , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: lingfengbao@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Zhenchang Xing , Research School of Computer Science, Australian National University, Canberra, Victoria Australia (e-mail: zhenchang.xing@anu.edu.au)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)
Shanping Li , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: shan@zju.edu.cn)

Coordination Challenges in Large-Scale Software Development: A Case Study of Planning Misalignment in Hybrid Settings (Abstract)

Saskia Bick , Cloud Platform Services, SAP SE, Walldorf 69190, Germany (e-mail: saskia.bick@sap.com)
Kai Spohrer , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: spohrer@uni-mannheim.de)
Rashina Hoda , Department of Electrical and Computer Engineering, The University of Auckland, Auckland, New Zealand (e-mail: r.hoda@auckland.ac.nz)
Alexander Scheerer , Globalization Services, SAP SE, Walldorf 69190, Germany (e-mail: alexander.scheerer@sap.com)
Armin Heinzl , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: heinzl@uni-mannheim.de)

Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases (Abstract)

Radu Calinescu , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: radu.calinescu@york.ac.uk)
Danny Weyns , Computer Science, Linnaeus University, Vaxjo, Smaland Sweden SE-35195 (e-mail: Danny.Weyns@gmail.com)
Simos Gerasimou , Computer Science, University of York, 8748 York, North Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5DD (e-mail: simos.gerasimou@york.ac.uk)
Muhammad Usman Iftikhar , Department of Computer Science, Linneuniversitet - Vaxjo, 8180 Vaxjo, Kronoberg Sweden 351 95 (e-mail: usman.iftikhar@lnu.se)
Ibrahim Habli , Computer Science, University of York, York, Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5GH (e-mail: Ibrahim.Habli@york.ac.uk)
Tim Kelly , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: tim.kelly@york.ac.uk)

Predicting Future Developer Behavior in the IDE Using Topic Models (Abstract)

Kostadin Damevski , Department of Computer Science, Virginia Commonwealth University, Richmond, Virginia United States 23284 (e-mail: damevski@acm.org)
Hui Chen , Dept. of Math and CS, Virginia State University, Petersburg, Virginia United States (e-mail: huichen@ieee.org)
David Shepherd , ISS SWE, ABB, Inc., Raleigh, North Carolina United States 27606 (e-mail: david.shepherd@us.abb.com)
Nicholas A. Kraft , Principle Scientist, ABB Corporate Research, Raleigh, North Carolina United States (e-mail: nicholas.a.kraft@us.abb.com)
Lori Pollock , Computer and Information Sciences, University of Delaware, Newark, Delaware United States 19716-2586 (e-mail: pollock@cis.udel.edu)

Expanding Queries for Code Search Using Semantically Related API Class-names (Abstract)

Feng Zhang , School of Computing, Queen's University, Kingston, Ontario Canada (e-mail: feng@cs.queensu.ca)
Haoran Niu , Electrical and Computer Engineering, Queen's University, kingston, Ontario Canada K7L 3N6 (e-mail: hit.haoran@gmail.com)
Iman Keivanloo , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada (e-mail: keivanloo@gmail.com)
Ying Zou , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada (e-mail: ying.zou@queensu.ca)

Using Local Clocks to Reproduce Concurrency Bugs (Abstract)

Zhe Wang , State Key Laboratory of Computer Architecture, Institute of Computing Technology Chinese Academy of Sciences, 53035 Beijing, Beijing China 100190 (e-mail: wangzhe12@ict.ac.cn)
Chenggang Wu , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, Beijing, Beijing China 100190 (e-mail: wucg@ict.ac.cn)
Xiang Yuan , SKL of Computer Architecture, Institute of Computing Technology, Beijing, Beijing China 100190 (e-mail: yuanxiang@ict.ac.cn)
Zhenjiang Wang , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, Beijing, Beijing China 100190 (e-mail: wangzhenjiang@ict.ac.cn)
Jianjun Li , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, bj, Beijing China 100190 (e-mail: lijianjun@ict.ac.cn)
Pen-Chung Yew , Department of Computer Science and Engineering, University of Minnesota, Minneapolis, Minnesota United States (e-mail: yew@cs.umn.edu)
Jeff Huang , Texas A&M University, The Department of Computer Science & Engineering, College Station, Texas United States 77843 (e-mail: jeff@cse.tamu.edu)
Xiaobing Feng , Key Lab. of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: fxb@ict.ac.cn)
Yanyan Lan , Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: lanyanyan@ict.ac.cn)
Yunji Chen , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China 100190 (e-mail: cyj@ict.ac.cn)
Yuanming Lai , State Key Laboratory of Computer Architecture, Institute of Computing Technology of Chinese Academy of Sciences, Beijing, Beijing China (e-mail: laiyuanming@ict.ac.cn)
Yong Guan , College of Computer and Information Management, Capital Normal University, Beijing, Beijing China (e-mail: guanyong@mail.cnu.edu.cn)

The Scent of a Smell: An Extensive Comparison between Textual and Structural Smells (Abstract)

Fabio Palomba , Electrical Engineering, Mathematics, and Computed Science, Technische Universiteit Delft Faculteit Technische Natuurwetenschappen, 145265 Delft, Zuid-Holland Netherlands (e-mail: fpalomba@unisa.it)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Andy Zaidman , Software Engineering Research Group, Delft University of Technology, Delft, Zuid Holland Netherlands 2628 CD (e-mail: a.e.zaidman@tudelft.nl)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)
Andrea De Lucia , Dipartimento di Matematica e Informatica, Universit di Salerno, Fisciano, Salerno Italy 84084 (e-mail: adelucia@unisa.it)

Data Scientists in Software Teams: State of the Art and Challenges (Abstract)

Miryung Kim , Computer Science, University of California, Los Angeles, Los Angeles, California United States 90095 (e-mail: miryung@cs.ucla.edu)
Thomas Zimmermann , Research, Microsoft Corporation, Redmond, Washington United States (e-mail: tzimmer@microsoft.com)
Robert DeLine , Research, Microsoft Corporation, Redmond, Washington United States 98052 (e-mail: rdeline@microsoft.com)
Andrew Begel , Research, Microsoft, Redmond, Washington United States 98052 (e-mail: Andrew.Begel@microsoft.com)

Revisiting the Performance Evaluation of Automated Approaches for the Retrieval of Duplicate Issue Reports (Abstract)

Mohamed Sami Rakha , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: m.rakha@queensu.ca)
Cor-Paul Bezemer , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: bezemer@cs.queensu.ca)
Ahmed E. Hassan , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: ahmed@cs.queensu.ca)

Collaborative Model-Driven Software Engineering: a Classification Framework and a Research Map (Abstract)

Mirco Franzago , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy 67100 (e-mail: mircofranzago@gmail.com)
Davide Di Ruscio , Department of Information Engineering Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: davide.diruscio@univaq.it)
Ivano Malavolta , Computer Science, Vrije Universiteit Amsterdam, 1190 Amsterdam, Amsterdam Netherlands (e-mail: ivanomalavolta@gmail.com)
Henry Muccini , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: henry.muccini@univaq.it)

A Study of Social Interactions in Open Source Component Use (Abstract)

Marc Palyart , Computer Science, University of British Columbia, 8166 Vancouver, British Columbia Canada V6T 1Z4 (e-mail: mpalyart@gmail.com)
Gail C. Murphy , Computer Science, University of British Columbia, Vancouver, British Columbia Canada V6T 1Z4 (e-mail: murphy@cs.ubc.ca)
Vaden Masrani , Computer Science, University of British Columbia, Vancouver, British Columbia Canada (e-mail: vadmas@cs.ubc.ca)

Tracking Load-time Configuration Options (Abstract)

Max Lillack , Institut for Wirtschaftsinformatik, Universitat Leipzig, 9180 Leipzig, Sachsen Germany 04109 (e-mail: lillack@wifa.uni-leipzig.de)
Christian Kastner , Institute for Software Reserach, Carnegie Mellon University, Pittsburgh, Pennsylvania United States 15213-3890 (e-mail: kaestner@cs.cmu.edu)
Eric Bodden , Software Engineering, Universitat Paderborn Fakultat fur Elektrotechnik Informatik und Mathematik, 232601 Paderborn, NRW Germany 33102 (e-mail: eric.bodden@uni-paderborn.de)

On the Use of Hidden Markov Model to Predict the Time to Fix Bugs (Abstract)

Mayy Habayeb , Department of Mechanical and Industrial Engineering, Ryerson University, Toronto, Ontario Canada M5B 2K3 (e-mail: mayy.habayeb@gmail.com)
Syed Shariyar Murtaza , Computer science, the university of western ontario, London, Ontario Canada N6A5B7 (e-mail: syed.shariyar@gmail.com)
Andriy Miranskyy , Department of Computer Science, Ryerson University, Toronto, Ontario Canada (e-mail: avm@ryerson.ca)
Ayse Basar Bener , TRSITM, Ryerson University, Toronto, Ontario Canada M5B2K3 (e-mail: ayse.bener@ryerson.ca)

EARMO: An Energy-Aware Refactoring Approach for Mobile Apps (Abstract)

Rodrigo Morales , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada H3C 3A7 (e-mail: moar820326@gmail.com)
Ruben Saborido , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada (e-mail: ruben.saborido-infantes@polymtl.ca)
Foutse Khomh , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada K7L3N6 (e-mail: foutse.khomh@polymtl.ca)
Francisco Chicano , Departamento de Lenguajes y Ciencias de la Computacion, Universidad de Malaga, 16752 Malaga, Andaluca Spain (e-mail: chicano@uma.es)
Giuliano Antoniol , Genie Informatique, Ecole Polytechnique de Montreal, Montreal, Quebec Canada 2500, chemin de (e-mail: antoniol@ieee.org)

Listening to the Crowd for the Release Planning of Mobile Apps (Abstract)

Simone Scalabrino , Biosciences and Territory, Universita degli Studi del Molise, 18960 Pesche, Molise Italy 86090 (e-mail: simone.scalabrino@unimol.it)
Gabriele Bavota , Faculty of Informatics, Universita della Svizzera Italiana, 27216 Lugano, Lugano Switzerland 6904 (e-mail: gabriele.bavota@usi.ch)
Barbara Russo , Faculty of Computer Science, University of Bolzano-Bozen, Bolzano-Bozen, Bolzano Italy 39100 (e-mail: barbara.russo@unibz.it)
Rocco Oliveto , Dept. of Engineering, University of Sannio, Benevento, _ Italy 82100 (e-mail: dipenta@unisannio.it)
Massimiliano Di Penta , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)

Metamorphic Testing of RESTful Web APIs (Abstract)

Sergio Segura , Computer and Languages Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: sergiosegura@us.es)
Jose A. Parejo , CS Languages and Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: japarejo@us.es)
Javier Troya , Computer Languages and Systems, Universidad de Sevilla, 16778 Sevilla, Andalucia Spain (e-mail: jtroya@us.es)
Antonio Ruiz-Cortes , Computer and Languages Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: aruiz@us.es)

Entropy Based Software Reliability Analysis of Multi-Version Open Source Software (Abstract)

V B SINGH , Computer Science, Delhi College of Arts & Commerce, University of Delhi, New Delhi, Delhi India 110075 (e-mail: singh_vb@rediffmail.com)
Meera Sharma , Swami Shraddhanand College, University of Delhi, New Delhi, Delhi India (e-mail: meerakaushik@gmail.com)
Hoang Pham , ISE, Rutgers, Piscataway, New Jersey United States 08854 (e-mail: hoang84pham@gmail.com)

A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies (Abstract)

Andrea Margheri , Electronics and Computer Science, University of Southampton, 7423 Southampton, Hampshire United Kingdom of Great Britain and Northern Ireland SO17 1BJ (e-mail: a.margheri@soton.ac.uk)
Massimiliano Masi , DC Tower, Tiani Spirit GmBh, Wien, Wien Austria (e-mail: massimiliano.masi@tiani-spirit.com)
Rosario Pugliese , Statistica, Informatica, Applicazioni, Universita degli Studi di Firenze, 9300 Firenze, Toscana Italy (e-mail: rosario.pugliese@unifi.it)
Francesco Tiezzi , School of Science and Technology, Computer Science Division, Universita degli Studi di Camerino Scuola di Scienze e Tecnologie, 201848 Camerino, Marche Italy (e-mail: francesco.tiezzi@unicam.it)

Automatic Software Repair: A Survey (PDF)

Luca Gazzola , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy (e-mail: gazzola@disco.unimib.it)
Daniela Micucci , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy (e-mail: micucci@disco.unimib.it)
Leonardo Mariani , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy 20126 (e-mail: mariani@disco.unimib.it)

What Makes a Great Manager of Software Engineers? (Abstract)

Eirini Kalliamvakou , Computer Science, University of Victoria, Victoria, British Columbia Canada V8W 2Y2 (e-mail: ikaliam@uvic.ca)
Christian Bird , Microsoft Research, Microsoft Corportation, Redmond, Washington United States 98052 (e-mail: cbird@microsoft.com)
Thomas Zimmermann , Microsoft Research, Microsoft Corportation, Redmond, Washington United States 98052 (e-mail: tzimmer@microsoft.com)
Andrew Begel , Research, Microsoft, Redmond, Washington United States 98052 (e-mail: Andrew.Begel@microsoft.com)
Robert DeLine , Research, Microsoft Corporation, Redmond, Washington United States 98052 (e-mail: rdeline@microsoft.com)
Daniel M. German , CS, University of Victoria, Victoria, British Columbia Canada V8S3P6 (e-mail: dmg@uvic.ca)

A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction (Abstract)

Seyedrebvar Hosseini , Department of Information Processing Science, Oulun Yliopisto, 6370 Oulu, Pohjois-Pohjanmaa Finland (e-mail: rebvar@oulu.fi)
Burak Turhan , Department of Computer Science, Brunel University Department of Computer Science, 387820 Uxbridge, Middlesex United Kingdom of Great Britain and Northern Ireland (e-mail: Burak.Turhan@brunel.ac.uk)
Dimuthu Gunarathna , quality assurance, Vaimo Finland (Oy), Oulu, pohjois-pohjanmaa Finland (e-mail: dimuthu.gunarathna@vaimo.com)

Toward a Smell-aware Bug Prediction Model (Abstract)

Fabio Palomba , Computer Science, Technische Universiteit Delft, 2860 Delft, Zuid-Holland Netherlands (e-mail: fpalomba@unisa.it)
Marco Zanoni , Department of Informatics, Systems and Communication, University of Milano-Bicocca, Milan, Milan Italy 20126 (e-mail: marco.zanoni@disco.unimib.it)
Francesca Arcelli Fontana , DISCo, University of Milano Bicocca, Milano, Milano Italy 20126 (e-mail: arcelli@disco.unimib.it)
Andrea De Lucia , Dipartimento di Matematica e Informatica, Universit di Salerno, Fisciano, Salerno Italy 84084 (e-mail: adelucia@unisa.it)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)

Gray Computing: A Framework for Computing with Background JavaScript Tasks (Abstract)

Yao Pan , Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee United States (e-mail: yao.pan@vanderbilt.edu)
Jules White , Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee United States (e-mail: jules.white@vanderbilt.edu)
Yu Sun , Department of Computer Science, California State Polytechnic University, Pomona, Pomona, California United States (e-mail: yusun@cpp.edu)
Jeff Gray , Department of Computer Science, The University of Alabama, Tuscaloosa, Alabama United States (e-mail: gray@cs.ua.edu)

Integrating Technical Debt Management and Software Quality Management Processes: A Normative Framework and Field Tests (Abstract)

Narayan Ramasubbu , Katz Graduate School of Business, University of Pittsburgh, Pittsburgh, Pennsylvania United States 15260 (e-mail: narayanr@pitt.edu)
C. F. Kemerer , KGSB, University of Pittsburgh, Pittsburgh, Pennsylvania United States 15260 (e-mail: ckemerer@katz.pitt.edu)

Automated Refactoring of OCL Constraints with Search (PDF)

Lu Hong , Software Engineering, Simula Research Laboratory AS, 394155 Lysaker, Lysaker Norway (e-mail: honglu@simula.no)
Shuai Wang , Software Engineering, Simula Research Laboratory, Lysaker, Lysaker Norway (e-mail: shuai@simula.no)
Tao Yue , Informatics, Universitetet i Oslo, 6305 Oslo, Oslo Norway (e-mail: tao@simula.no)
shaukat Ali , Software Engineering, Simula Research Laboratory AS, 394155 Lysaker, Lysaker Norway (e-mail: shaukat@simula.no)
J. F. Nygard , Registration Informatics Department, Kreftregisteret, 11315 Oslo, Oslo Norway (e-mail: Jan.Nygard@kreftregisteret.no)

Developer Testing in The IDE: Patterns, Beliefs, And Behavior (Abstract)

Moritz Beller , Software Technology, Delft University of Technology, Delft, SH Netherlands (e-mail: m.m.beller@tudelft.nl)
Gousios Georgios , Faculty Electrical Engineering, Mathematics and Computer Science, TU Delft, Delft, ZH Netherlands (e-mail: g.gousios@tudelft.nl)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Sebastian Proksch , Computer Science, TU Darmstadt, Darmstadt, Hessen Germany 64289 (e-mail: research@mail.proks.ch)
Sven Amann , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Deutschland Germany 64289 (e-mail: amann@st.informatik.tu-darmstadt.de)
Andy Zaidman , Software Engineering Research Group, Delft University of Technology, Delft, Zuid Holland Netherlands 2628 CD (e-mail: a.e.zaidman@tudelft.nl)

Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs (Abstract)

Jonathan Dorn , Computer Science, University of Virginia, Charlottesville, Virginia United States 22093 (e-mail: dornja@gmail.com)
Jeremy Lacomis , Computer Science, University of Virginia, Charlottesville, Virginia United States (e-mail: lacomis@virginia.edu)
Westley Weimer , Computer Science, University of Virginia, Charlottesville, Virginia United States 22903 (e-mail: weimer@cs.virginia.edu)
Stephanie Forrest , Computer Science, Univ. of New Mexico, Albuquerque, New Mexico United States (e-mail: forrest@cs.unm.edu)

MSeer-An Advanced Technique for Locating Multiple Bugs in Parallel (Abstract)

Ruizhi Gao , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: gxr116020@utdallas.edu)
W. Eric Wong , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75083 (e-mail: ewong@utdallas.edu)

Competition-Based Crowdsourcing Software Development: A Multi-Method Study from a Customer Perspective (PDF)

Klaas-Jan Stol , Lero, University of Limerick, Limerick, Limerick Ireland (e-mail: kjstol@gmail.com)
Bora Caglayan , Innovation Exchange, IBM Ireland Limited, 42426 Dublin, Dublin Ireland (e-mail: bora.caglayan@ibm.com)
Brian Fitzgerald , Lero - the Irish Software Research centre, University of Limerick, Limerick, Limerick Ireland (e-mail: bf@ul.ie)

Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction (Abstract)

Alessandro Marchetto , SE unit, Fondazione Bruno Kessler, Trento, Trento Italy 38123 (e-mail: alex.marchetto@gmail.com)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, University della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Angelo Susi , IT - Software Engineering, FBK-IRST, Trento, Trento Italy 38123 (e-mail: susi@fbk.eu)

Smart Bound Selection for the Verification of UML/OCL Class Diagrams (Abstract)

Robert Clariso , IT, Multimedia and Telecommunication Department, Universitat Oberta de Catalunya, 16766 Barcelona, Barcelona Spain 08018 (e-mail: rclariso@uoc.edu)
Carlos A. Gonzalez , SnT Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg, Luxembourg Luxembourg (e-mail: caglezp@gmail.com)
Jordi Cabot , IN3-UOC, Institucio Catalana de Recerca i Estudis Avancats, 117370 Barcelona, Catalunya Spain (e-mail: jordi.cabot@icrea.cat)

Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications (Abstract)

Sadeeq Jan , SnT, Universite du Luxembourg, 81872 Luxembourg, LU Luxembourg (e-mail: jan@svv.lu)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Andrea Arcuri , SnT, Universite du Luxembourg, 81872 Luxembourg, LU Luxembourg (e-mail: arcand@westerdals.no)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)

Automatic Identification and Classification of Software Development Video Tutorial Fragments (Abstract)

Luca Ponzanelli , Software Institute, Faculty of Informatics, Università della Svizzera italiana, Lugano, Ticino Switzerland (e-mail: luca.ponzanelli@usi.ch)
Gabriele Bavota , Software Institute, Faculty of Informatics, Universita della Svizzera Italiana, 27216 Lugano, Lugano Switzerland (e-mail: gabriele.bavota@usi.ch)
Andrea Mocci , Software Institute, Faculty of Informatics, Università della Svizzera italiana, Lugano, Ticino Switzerland (e-mail: andrea.mocci@gmail.com)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)
Massimiliano Di Penta , Dept. of Engineering, University of Sannio, Benevento, _ Italy 82100 (e-mail: dipenta@unisannio.it)
Sonia Cristina Haiduc , Department Of Computer Science, Wayne State University, Detroit, Michigan United States 48202 (e-mail: shaiduc@cs.fsu.edu)
Barbara Russo , Faculty of Computer Science, University of Bolzano-Bozen, Bolzano-Bozen, Bolzano Italy 39100 (e-mail: barbara.russo@unibz.it)
Michele Lanza , Software Institute, Faculty of Informatics, University of Lugano, Lugano, TI Switzerland (e-mail: michele.lanza@usi.ch)

On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction (Abstract)

Zhiqiang Li , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: lzq115@163.com)
Xiao-Yuan Jing , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan City, Hubei Province China 430072 (e-mail: jingxy_2000@126.com)
Xiaoke Zhu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, 12390 Wuhan, Hubei China (e-mail: henuzxk@163.com)
Hongyu Zhang , School of Electrical Engineering and Computing, The University of Newcastle, Newcastle, New South Wales Australia (e-mail: hongyu.zhang@newcastle.edu.au)
Baowen Xu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: bwxu@nju.edu.cn)
Shi Ying , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: yingshi@whu.edu.cn)

Decomposition-Based Approach for Model-Based Test Generation (Abstract)

Paolo Arcaini , Department of Distributed and Dependable Systems, Univerzita Karlova, 37740 Praha, Praha Czech Republic 118 00 (e-mail: arcaini@d3s.mff.cuni.cz)
Angelo Gargantini , Dipartimento di Ingegneria, University of Bergamo, Dalmine, BG Italy 24100 (e-mail: angelo.gargantini@unibg.it)
Elvinia Riccobene , Computer Science, Universita degli Studi di Milano, 9304 Crema, CR Italy 26013 (e-mail: elvinia.riccobene@unimi.it)

An Empirical Study on API Usages (Abstract)

Hao Zhong , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, Shanghai China 200240 (e-mail: zhonghao@sjtu.edu.cn)
Hong Mei , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, Shanghai China (e-mail: meih@sjtu.edu.cn)

The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game (Abstract)

Sylvain Frey , Electronics and Computer Science, University of Southampton Faculty of Physical Sciences and Engineering, 243732 Southampton, Southampton United Kingdom of Great Britain and Northern Ireland (e-mail: s.a.f.frey@soton.ac.uk)
Awais Rashid , Department of Computer Science, University of Bristol Department of Computer Science, 152321 Bristol, Bristol United Kingdom of Great Britain and Northern Ireland (e-mail: a.rashid@lancaster.ac.uk)
Pauline Anthonysamy , Google, Google Inc, 93176 Mountain View, California United States (e-mail: p.anthonysamy@lancaster.ac.uk)
Maria Pinto-Albuquerque , Departamento de Ciências e Tecnologias da Informação, ISCTE-Instituto Universitario de Lisboa, 56061 Lisboa, Lisboa Portugal (e-mail: maria.albuquerque@iscte.pt)
Syed Asad Naqvi , Infolab21, Lancaster University, 4396 Lancaster, Lancashire United Kingdom of Great Britain and Northern Ireland (e-mail: s.naqvi@lancaster.ac.uk)

Coverage-based Greybox Fuzzing as Markov Chain (Abstract)

Marcel Bohme , Computer Science, National University of Singapore, Singapore, Singapore Singapore 117417 (e-mail: marcel.boehme@acm.org)
Van-Thuan Pham , Computer Science, National University of Singapore, Singapore, Singapore Singapore (e-mail: thuanpv@comp.nus.edu.sg)
Abhik Roychoudhury , Computer Science, National University of Singapore, Singapore, Singapore Singapore 117417 (e-mail: abhik@comp.nus.edu.sg)

Text Filtering and Ranking for Security Bug Report Prediction (Abstract)

Fayola Peters , University of Limerick, Lero- The Irish Software Research Centre, Limerick, Co. Limerick Ireland (e-mail: fayolapeters@gmail.com)
Thein Tun , Department of Computing and Communications, The Open University, Milton Keynes, England United Kingdom of Great Britain and Northern Ireland (e-mail: Thein.Tun@open.ac.uk)
Yijun Yu , Department of Computing and Communications, The Open University, Milton Keynes, England United Kingdom of Great Britain and Northern Ireland (e-mail: yijun.yu@open.ac.uk)
Bashar Nuseibeh , University of Limerick, Lero - The Irish Software Research Centre, Limerick, Co. Limerick Ireland (e-mail: bashar.nuseibeh@lero.ie)

Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas (Abstract)

Phil McMinn , Computer Science, University of Sheffield, Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland S1 4DP (e-mail: p.mcminn@sheffield.ac.uk)
Chris J. Wright , Computer Science, University of Sheffield, 7315 Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: chrisjameswright@gmail.com)
Colton J. McCurdy , Computer Science, Allegheny College, 5368 Meadville, Pennsylvania United States (e-mail: mccurdyc@allegheny.edu)
Gregory Kapfhammer , Computer Science, Allegheny College, Meadville, Pennsylvania United States 16335 (e-mail: gkapfham@allegheny.edu)

makeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes (Abstract)

Luca Mottola , DEIB, Politenico di Milano, Milano, Milano Italy 20133 (e-mail: luca.mottola@polimi.it)
Gian Pietro Picco , Department of Information Engineering and Computer Science, University of Trento, Trento, TN Italy 38100 (e-mail: gianpietro.picco@unitn.it)
Felix Jonathan Opperman , Institut für Technische Informatik, Technische Universitat Graz, 27253 Graz, Steiermark Austria (e-mail: oppermann@tugraz.at)
Joakim Eriksson , NES, Swedish Institute of Computer Science, 4277 Kista, Kista Sweden (e-mail: joakime@sics.se)
Niclas Finne , NES, Swedish Institute of Computer Science, 4277 Kista, Kista Sweden (e-mail: nfi@sics.se)
Harald Fuchs , SAP Research, SAP SE, Karlsruhe, Karlsruhe Germany (e-mail: harald.fuchs@sap.com)
Andrea Gaglione , Department of Computing, Imperial College London, 4615 London, London United Kingdom of Great Britain and Northern Ireland (e-mail: ag909@cam.ac.uk)
Stamatis Karnouskos , SAP Research, SAP, Karlsruhe, BW Germany D-76131 (e-mail: karnouskos@ieee.org)
Patricio Montero , ACCIONA, ACCIONA Ingenieria SA, 152752 Alcobendas, Madrid Spain (e-mail: patricio.moreno.montero@acciona.es)
Nina Oertel , SAP Research, SAP SE, Karlsruhe, Karlsruhe Germany (e-mail: nina.oertel@sap.com)
Kay Romer , Institut für Technische Informatik, Technische Universitat Graz, 27253 Graz, Steiermark Austria (e-mail: roemer@tugraz.at)
Patrik Spiess , SAP Research, SAP AG, Karlsruhe, Karlsruhe Germany (e-mail: patrik.spiess@sap.com)
Stefano Tranquillini , DISI, University of Trento, Trento, Trento Italy (e-mail: stefano.tranquillini@gmail.com)
Thiemo Voigt , CSL, Swedish Institute of Computer Science, Kista, Kista Sweden (e-mail: thiemo@sics.se)

Automatic Loop Summarization via Path Dependency Analysis (Abstract)

Xiaofei Xie , School of Computer Science and Technology, Tianjin University, Tianjin, Tianjin China (e-mail: xiexiaofei@tju.edu.cn)
Bihuan Chen , School of Computer Science and Shanghai Key Laboratory of Data Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: chenbihuan@gmail.com)
Liang Zou , School of Computer Science and Engineering, Nanyang Technological University, 54761 Singapore, Singapore Singapore (e-mail: liang.d.zou@gmail.com)
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: yangliu@ntu.edu.sg)
Wei Le , Department of Computer Science, Iowa State University, 1177 Ames, Iowa United States (e-mail: weile@iastate.edu)
Xiaohong Li , School of Computer Science and Technology, Tianjin University, Tianjin, Tianjin China (e-mail: xiaohongli@tju.edu.cn)

"Sampling" as a Baseline Optimizer for Search-based Software Engineering (Abstract)

Jianfeng Chen , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States 27695 (e-mail: jchen37@ncsu.edu)
Vivek Nair , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: vivekaxl@gmail.com)
Rahul Krishna , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: rkrish11@ncsu.edu)
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, West Virginia United States 26501 (e-mail: tim@menzies.us)

ConPredictor: Concurrency Defect Prediction in Real-World Applications (Abstract)

Tingting Yu , Computer Science, University of Kentucky, Lexington, Kentucky United States 40506 (e-mail: tyu@cs.uky.edu)
Wei Wen , Computer Science, University of Kentucky, Lexington, Kentucky United States (e-mail: wei.wen0@uky.edu)
Xue Han , Computer Science, University of Kentucky, Lexington, Kentucky United States (e-mail: xha225@g.uky.edu)
Jane Hayes , Computer Science, University of Kentucky, Lexington, Kentucky United States 40506-0495 (e-mail: hayes@cs.uky.edu)

A deep learning model for estimating story points (Abstract)

Morakot Choetkiertikul , School of Computing and Information Technology, University of Wollongong, 8691 Wollongong, New South Wales Australia 2522 (e-mail: morakotch@gmail.com)
Hoa Khanh Dam , School of Computer Science and Software Engineering, University of Wollongong, Wollongong, New South Wales Australia 2522 (e-mail: hoa@uow.edu.au)
Truyen Tran , Centre for Pattern Recognition and Data Analytics, Deakin University, Waurn Ponds, Victoria Australia 3216 (e-mail: truyen.tran@deakin.edu.au)
Trang Thi Minh Pham , 434468, Deakin University, Waurn Ponds, Victoria Australia 3216 (e-mail: phtra@deakin.edu.au)
Aditya Ghose , School of Computing and Information Technology, University of Wollongong, 8691 Wollongong, New South Wales Australia (e-mail: aditya@uow.edu.au)
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, West Virginia United States 26501 (e-mail: tim@menzies.us)

The Impact of Automated Parameter Optimization on Defect Prediction Models (Abstract)

Chakkrit Tantithamthavorn , School of Computer Science, The University of Adelaide, Adelaide, South Australia Australia (e-mail: chakkrit.tantithamthavorn@adelaide.edu.au)
Shane McIntosh , Department of Electrical and Computer Engineering, McGill University, Montreal, Quebec Canada H3A 0E9 (e-mail: shane.mcintosh@mcgill.ca)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada (e-mail: ahmed@cs.queensu.ca)
Kenichi Matsumoto , Information Systems, Nara Institute of Science and Technology, Information Systems, Ikomashi, Naraken Japan (e-mail: matumoto@is.naist.jp)

Toward Methodological Guidelines for Process Theories and Taxonomies in Software Engineering (Abstract)

Paul Ralph , Computer Science, University of Auckland, Auckland Central, Auckland New Zealand (e-mail: paul@paulralph.name)

Design Rule Spaces: A New Model for Representing and Analyzing Software Architecture (Abstract)

Yuanfang Cai , Computer Science, Drexel University, philadelphia, Pennsylvania United States 19104 (e-mail: yfcai@cs.drexel.edu)
Lu Xiao , School of Systems and Enterprises, Stevens Institute of Technology, 33694 Hoboken, New Jersey United States 07030 (e-mail: lxiao6@stevens.edu)
Rick Kazman , Department of Information Technology Management, University of Hawaii, Honolulu, Hawaii United States 96822 (e-mail: kazman@hawaii.edu)
Ran Mo , Computer Science, Drexel University, philadelphia, Pennsylvania United States (e-mail: rm859@drexel.edu)
Qiong Feng , Computer Science, Drexel University, philadelphia, Pennsylvania United States (e-mail: qf28@drexel.edu)

A Systematic Literature Review of Applications of the Physics of Notation (Abstract)

Dirk Van Der Linden , Department of Computer Science, University of Bristol, Bristol, City of Bristol United Kingdom of Great Britain and Northern Ireland (e-mail: djt.vanderlinden@gmail.com)
Irit Hadar , Department of Information Systems, University of Haifa, Haifa, Hefa Israel (e-mail: hadari@is.haifa.ac.il)

VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System (Abstract)

Lingfeng Bao , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: lingfengbao@zju.edu.cn)
Zhenchang Xing , Research School of Computer Science, Australian National University, Canberra, Australian Capital Territory Australia (e-mail: zhenchang.xing@anu.edu.au)
Xin Xia , Faculty of Information Tehnoology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)

A Systematic Review of Interaction in Search-Based Software Engineering (Abstract)

Aurora Ramirez , Computer Sciences and Numerical Analysis, University of Cordoba, Cordoba, Cordoba Spain (e-mail: aramirez@uco.es)
Jose Raul Romero , Computer Sciences and Numerical Analysis, University of Cordoba, Cordoba, Cordoba Spain 14071 (e-mail: jrromero@uco.es)
Christopher Simons , Department of Computer Science, University of the West of England, Bristol, Bristol United Kingdom of Great Britain and Northern Ireland BS16 1QY (e-mail: chris.simons@uwe.ac.uk)

Instance Migration Validity for Dynamic Evolution of Data-Aware Processes (Abstract)

Wei Song , Coomputer Science, Nanjing University of Science and Technology, Nanjing, Jiangsu China 210094 (e-mail: wsong@njust.edu.cn)
Xiaoxing Ma , State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu China 210046 (e-mail: xxm@nju.edu.cn)
Hans-Arno Jacobsen , ECE, Department of Electrical and Computer Engineering, Toronto, Ontario Canada M5S3G4 (e-mail: jacobsen@eecg.toronto.edu)

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool (Abstract)

Justin Smith , Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States 27606 (e-mail: jssmit11@ncsu.edu)
Brittany Johnson , Computer Science, University of Massachusetts Amherst College of Information and Computer Sciences, Amherst, Massachusetts United States (e-mail: bijohnso@ncsu.edu)
Emerson Murphy-Hill , Computer Science, North Carolina State University, Raleigh, North Carolina United States 27695 (e-mail: emerson@csc.ncsu.edu)
Bei-Tseng Chu , SIS, UNC Charlotte, Charlotte, North Carolina United States 28223 (e-mail: billchu@uncc.edu)
Heather Richter , Software and Information Systems, University of North Carolina at Charlotte, Charlotte, North Carolina United States 28223 (e-mail: richter@uncc.edu)

Predictive Mutation Testing (Abstract)

Jie Zhang , Computer Science, Peking University, 12465 Beijing, Beijing China 100871 (e-mail: zhangjie_marina@163.com)
Lingming Zhang , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: lingming.zhang@utdallas.edu)
Mark Harman , CS, UCL, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: mark.harman@ucl.ac.uk)
Dan Hao , EECS,Peking University, Institute of Software, Beijing, Beijing China 100871 (e-mail: haodan@pku.edu.cn)
Yue Jia , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6B (e-mail: yue.jia@ucl.ac.uk)
Lu Zhang , EECS,Peking University, Institute of Software, Beijing, Beijing China (e-mail: zhanglucs@pku.edu.cn)

Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior (Abstract)

Reza Matinnejad , SnT Centre, University of Luxembourg, luxembourg, Luxembourg Luxembourg (e-mail: reza.matinnejad@uni.lu)
Shiva Nejati , SnT Centre, University of Luxembourg, luxembourg, Luxembourg Luxembourg (e-mail: shiva.nejati@uni.lu)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)
Thomas Bruckmann , Delphi Automotive, Delphi Automotive, Luxembourg, Luxembourg Luxembourg (e-mail: thomas.bruckmann@delphi.com)

Network-Clustered Multi-Modal Bug Localization (Abstract)

Thong Van-Duc Hoang , School of Information System, Singapore Management University, 54756 Singapore, Singapore Singapore 188065 (e-mail: vdthoang.2016@smu.edu.sg)
Richard J. Oentaryo , Living Analytics Research Centre, Singapore Management University, Singapore, SG Singapore (e-mail: roentaryo@smu.edu.sg)
Tien-Duy Bui Le , School of Information Systems, Singapore Management University, 54756 Singapore, Singapore Singapore 188065 (e-mail: btdle.2012@smu.edu.sg)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)

Asymmetric Release Planning - Compromising Satisfaction against Dissatisfaction (Abstract)

Maleknaz Nayebi , Software Deciosion Support lab, University of Calgary, Calgary, Alberta Canada (e-mail: mnayebi@ucalgary.ca)
Guenther Ruhe , Computer Science and Electrical Engineering, University of Calgary, Calgary, Alberta Canada T2N 1N4 (e-mail: ruhe@ucalgary.ca)

Fully Reflective Execution Environments (Abstract)

Guido Chari , Computer Science, Universidad de Buenos Aires, 28196 Buenos Aires, CABA Argentina 1053 (e-mail: gchari@dc.uba.ar)
Diego Garbervetsky , Computer Science, FCEyN. UBA, Buenos Aires, Buenos Aires Argentina 1428 (e-mail: diegog@dc.uba.ar)
Stefan Marr , CS, Johannes Kepler Universitat Linz, 27266 Linz, sterreich Austria (e-mail: stefan.marr@jku.at)
Stephane Ducasse , B3, Inria Centre de recherche Lille Nord Europe, 176498 Villeneuve d'Ascq, Nord-Pas-de-Calais France (e-mail: stephane.ducasse@inria.fr)

A Screening Test for Disclosed Vulnerabilities in FOSS Components (Abstract)

Stanislav Dashevskyi , Information Engineering and Computer Science, Universita degli Studi di Trento, 19034 Trento, Trentino-Alto Adige Italy (e-mail: stanislav.dashevskyi@unitn.it)
Achim D. Brucker , Computer Science, University of Sheffield, 7315 Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: a.brucker@sheffield.ac.uk)
Fabio Massacci , Information Engineering and Computer Science, Universita degli Studi di Trento, 19034 Trento, Trentino-Alto Adige Italy (e-mail: fabio.massacci@unitn.it)

Detecting Bugs by Discovering Expectations and Their Violations (Abstract)

Pan Bian , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: bianpan@ruc.edu.cn)
Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Yan Zhang , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: annazhang@ruc.edu.cn)
Chaoqun Yang , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: cqyang@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
Yan Cai , Chinese Academy of Sciences, State Key Laboratory of Computer Science, Institute of Software, Beijing, Beijing China 100190 (e-mail: yancai@ios.ac.cn)

How Do Static and Dynamic Test Case Prioritization Techniques Perform on Modern Software Systems? An Extensive Study on GitHub Projects (Abstract)

Qi Luo , Computer Science, College of William and Mary, Williamsburg, Virginia United States 23185 (e-mail: qluo@email.wm.edu)
Kevin Moran , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: kpmoran01@email.wm.edu)
Lingming Zhang , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: lingming.zhang@utdallas.edu)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Microtask Programming (Abstract)

Thomas D. LaToza , Department of Computer Science, George Mason University, Fairfax, Virginia United States (e-mail: tlatoza@gmu.edu)
Arturo Di Lecce , ., Cuebiq Srl, ., . Italy (e-mail: arturodilecce@gmail.com)
Fabio Ricci , ., Bosch Rexroth, ., . Italy (e-mail: f.ricci89@gmail.com)
Ben Towne , Institute for Software Research, Carnegie Mellon University, 15213, Pennsylvania United States (e-mail: wbt@cs.cmu.edu)
Andre Van der Hoek , Informatics, University of California, Irvine, Irvine, California United States 92697-3440 (e-mail: andre@ics.uci.edu)

Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations (Abstract)

Osama Hamdi Al-Baik , Electrical and Computer Engineering, University of Alberta, Edmonton, Alberta Canada (e-mail: albaik@ualberta.ca)
James Miller , Electrical and Computer Eng, University of Alberta, Edmonton, Alberta Canada T6H 2M4 (e-mail: jimm@ualberta.ca)

Creating Rich and Representative Personas by Discovering Affordances (Abstract)

Mostafa Mesgari , Management and Entrepreneurship, Elon University, Elon, North Carolina United States (e-mail: mmesgari@elon.edu)
Chitu Okoli , SKEMA Business School, Université Côte d'Azur - SKEMA, Paris, Paris France (e-mail: Chitu.Okoli@skema.edu)
Ana Ortiz de Guinea , Strategy and Information Systems, Universidad de Deusto, 16392 Bilbao, Pais Vasco Spain (e-mail: ana.ortiz-de-guinea@hec.ca)

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation (Abstract)

Yinxing Xue , School of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui China (e-mail: yinxingxue@gmail.com)
Zhengzi Xu , School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: XU0001ZI@e.ntu.edu.sg)
Mahinthan Chandramohan , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: mahintha001@e.ntu.edu.sg)
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: yangliu@ntu.edu.sg)

A Systematic Evaluation of Static API-Misuse Detectors (Abstract)

Sven Amann , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany (e-mail: amann@st.informatik.tu-darmstadt.de)
Hoan Anh Nguyen , Electrical and Computer Engineering, Iowa State University, Ames, Iowa United States (e-mail: hoan@iastate.edu)
Sarah Nadi , Computing Science, University of Alberta Faculty of Science, 98623 Edmonton, Alberta Canada (e-mail: nadi@ualberta.ca)
Tien N. Nguyen , Computer Science, University of Texas at Dallas, 12335 Richardson, Texas United States (e-mail: tien.n.nguyen@utdallas.edu)
Mira Mezini , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany (e-mail: mezini@informatik.tu-darmstadt.de)

Automating Change-level Self-admitted Technical Debt Determination (Abstract)

Meng Yan , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: mengy@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University Faculty of Information Technology, 224480 Clayton, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
Emad Shihab , Computer Science and Software Engineering, Concordia University, Montreal, Quebec Canada (e-mail: eshihab@encs.concordia.ca)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Jianwei Yin , Computer science and technology, Zhejiang University, Hangzhou, Zhejiang Province China 310027 (e-mail: zjuyjw@cs.zju.edu.cn)
Xiaohu Yang , College of Computer Science, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yangxh@zju.edu.cn)

LEILA: formaL tool for idEntifying mobIle maLicious behAviour (Abstract)

Gerardo Canfora , Dept. of Engineering, University of Sannio, Benevento, BN Italy (e-mail: canfora@unisannio.it)
Fabio Martinelli , ICT, National Research Council of Italy, pisa, Italy Italy 56123 (e-mail: fabio.martinelli@iit.cnr.it)
Francesco Mercaldo , IIT, Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche, 215080 Pisa, Italy Italy 56124 (e-mail: francesco.mercaldo@iit.cnr.it)
Vittoria Nardone , Ingegneria, University of Sannio, Benevento, Benevento Italy (e-mail: vnardone@unisannio.it)
Antonella Santone , Ingegneria, University of Sannio, Benevento, Benevnto Italy 82100 (e-mail: santone@unisannio.it)
Corrado Aaron Visaggio , Research Centre on Software Technology, Univeristy of Sannio, Benevento, Italy Italy 82100 (e-mail: visaggio@unisannio.it)

Need for Sleep: the Impact of a Night of Sleep Deprivation on Novice Developers' Performance (Abstract)

Davide Fucci , HITeC, University of Hamburg, Hamburg, - Germany (e-mail: fucci@informatik.uni-hamburg.de)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, Università della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Simone Romano , DiMIE, Universita degli Studi della Basilicata, 19006 Potenza, Basilicata Italy (e-mail: simone.romano@unibas.it)
Natalia Juristo , Facultad de Informatica, Universidad Politecnica de Madrid, Boadilla del Monte, Madrid Spain 28660 (e-mail: natalia@fi.upm.es)

Automatically Categorizing Software Technologies (Abstract)

Mathieu Nassif , School of Computer Science, McGill University School of Computer Science, 348406 Montreal, Quebec Canada H3A 0E9 (e-mail: mnassif@cs.mcgill.ca)
Christoph Treude , School of Computer Science, McGill University, Montreal, Quebec Canada (e-mail: ctreude@cs.mcgill.ca)
Martin Robillard , School of Computer Science, McGill University, Montreal, Quebec Canada H3A 2A7 (e-mail: martin@cs.mcgill.ca)

A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction (Abstract)

Qinbao Song , Computer Science, Xi'an Jiaotong University, Xi'an, Shaanxi China 710049 (e-mail: qbsong@mail.xjtu.edu.cn)
Yuchen Guo , Computer science and technology, Xi'an Jiaotong Univeristy, Xi'an, Shaanxi China (e-mail: wispcat@stu.xjtu.edu.cn)
Martin Shepperd , IS & Computing, Brunel University, Uxbridge, Middx United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: martin.shepperd@brunel.ac.uk)

CHiP: A Configurable Hybrid Parallel Covering Array Constructor (Abstract)

Hanefi Mercan , Computer sciences and engineering, Sabanci Universitesi, 52991 Istanbul, Istanbul Turkey 34956 (e-mail: hanefimercan@sabanciuniv.edu)
Cemal Yilmaz , Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Tuzla Turkey 34956 (e-mail: cyilmaz@sabanciuniv.edu)
Kamer Kaya , Computer Science and Engineering, Sabanci Universitesi, 52991 İstanbul, Tuzla Turkey 34956 (e-mail: kaya@sabanciuniv.edu)

Use and Misuse of Continuous Integration Features: An Empirical Study of Projects that (mis)use Travis CI (Abstract)

Keheliya Gallaba , Department of Electrical & Computer Engineering, McGill University, Montreal, Quebec Canada (e-mail: keheliya.gallaba@mail.mcgill.ca)
Shane McIntosh , Department of Electrical and Computer Engineering, McGill University, Montreal, Quebec Canada H3A 0E9 (e-mail: shane.mcintosh@mcgill.ca)

Motivation and Satisfaction of Software Engineers (Abstract)

Cesar Franca , Departamento de Computação, Universidade Federal Rural de Pernambuco, 67744 Recife, Pernambuco Brazil (e-mail: cesarfranca@gmail.com)
Fabio Fabio Queda Bueno Da Silva , Centro de Informática, Universidade Federal de Pernambuco, 28116 Recife, Pernambuco Brazil (e-mail: fabio@cin.ufpe.br)
Helen Sharp , Computing, The Open University, UK, Milton Keynes, Buckinghamshire United Kingdom of Great Britain and Northern Ireland MK7 6AA (e-mail: h.c.sharp@open.ac.uk)

A Multi-study Investigation Into Dead Code (Abstract)

Simone Romano , DiMIE, Universita degli Studi della Basilicata, 19006 Potenza, Basilicata Italy (e-mail: simone.romano@unibas.it)
Christopher Vendome , Computer Science Department, The College of William and Mary, Williamsburg, Virginia United States (e-mail: cgvendome@email.wm.edu)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, Università della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Identifying failure-causing schemas in the presence of multiple faults (Abstract)

Xintao Niu , computer science and technology, Nanjing University, Nanjing, Jiangsu China 210023 (e-mail: niuxintao@gmail.com)
Nie Changhai , computer science and technology, Nanjing University, nanjing, Jiangsu China 210096 (e-mail: changhainie@nju.edu.cn)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)
Xiaoyin Wang , Computer Science, University of Texas at San Antonio, San Antonio, Texas United States 78249 (e-mail: xiaoyin.wang@utsa.edu)

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving (Abstract)

Julian Thome , SnT, University of Luxembourg, Luxembourg, LU Luxembourg (e-mail: julian.thome@uni.lu)
Lwin Khin Shar , SnT Centre, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg (e-mail: shar@svv.lu)
Domenico Bianculli , SnT, University of Luxembourg, Luxembourg, LU Luxembourg 2721 (e-mail: domenico.bianculli@uni.lu)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)

Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps (Abstract)

Kevin Patrick Moran , Computer Science, College of William & Mary, Williamsburg, Virginia United States 23185 (e-mail: kpmoran@cs.wm.edu)
Carlos Bernal-Cardenas , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: cebernal@cs.wm.edu)
Michael Curcio , Computer Science, College of William & Mary, Williamsburg, Virginia United States (e-mail: mjcurcio@email.wm.edu)
Richard Bonett , Computer Science, College of William & Mary, Williamsburg, Virginia United States (e-mail: rfbonett@email.wm.edu)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Safety Practices in Requirements Engineering: The Uni-REPM Safety Module (Abstract)

Jessyka Flavyanne Ferreira Vilela , Campus Quixadá, Universidade Federal do Ceara, 28121 Quixadá, CE Brazil (e-mail: jessykavilela@ufc.br)
Jaelson Castro , Ciência da Computação, Universidade Federal de Pernambuco, Recife, PE Brazil (e-mail: jbc@cin.ufpe.br)
Luiz Eduardo G. Martins , Departamento de Ciência e Tecnologia, Universidade Federal de Sao Paulo, 28105 São José dos Campos, SP Brazil (e-mail: legmartins@unifesp.br)
Tony Gorschek , Department of Systems and Software Engineering, Blekinge Institute of Technology, Karlskrona, Blekinge Sweden SE-371 79 (e-mail: tony.gorschek@bth.se)

Automated Selection of Optimal Model Transformation Chains via Shortest-Path Algorithms (Abstract)

Francesco Basciani , Computer Science, Universita degli Studi dell'Aquila Dipartimento di Ingegneria Industriale e dell'Informazione e di Economia, 90345 L'Aquila, Abruzzo Italy (e-mail: francesco.basciani@graduate.univaq.it)
Mattia DEmidio , Computer Science, Gran Sasso Science Institute, 476635 L'aquila, L'Aquila Italy (e-mail: mattia.demidio@gssi.it)
Davide Di Ruscio , Department of Information Engineering Computer Science and Mathematics, University of L'Aquila, L'Aquila, AQ Italy 67100 (e-mail: davide.diruscio@univaq.it)
Daniele Frigioni , Dept. of Electrical and Information Engineering, University of L'Aquila, L'Aquila, aq Italy (e-mail: daniele.frigioni@univaq.it)
Ludovico Iovino , Computer Science, Gran Sasso Science Institute, l'aquila, aq Italy 67100 (e-mail: ludovico.iovino@gssi.it)
Alfonso Pierantonio , Department of Information Engineering Computer Science and Mathematics, University of L'Aquila, L'Aquila, Abruzzo Italy (e-mail: alfonso.pierantonio@univaq.it)

Incentivizing Deep Fixes in Software Economies (Abstract)

Malvika Rao , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States 02138 (e-mail: malvikar@gmail.com)
David F. Bacon , Software, Google Inc New York, 470984 New York, New York United States (e-mail: dfb@google.com)
David Parkes , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States (e-mail: parkes@eecs.harvard.edu)
Margo Seltzer , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States (e-mail: margo@eecs.harvard.edu)

Analyzing the Effects of Bugs on Software Interfaces (Abstract)

Roberto Natella , Dipartimento di Informatica e Sistemistica, Universita degli Studi di Napoli Federico II, Napoli, Napoli Italy 80125 (e-mail: roberto.natella@unina.it)
Stefan Winter , DEEDS, TU Darmstadt, Darmstadt, Hessen Germany 64289 (e-mail: sw@cs.tu-darmstadt.de)
Domenico Cotroneo , Computer and System engineering, University of Naples federico II, Naples, Italy Italy 80125 (e-mail: cotroneo@unina.it)
Neeraj Suri , Dept. of Computer Science, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: suri@cs.tu-darmstadt.de)

Requirements Engineering for Safety-Critical Systems: An Interview Study with Industry Practitioners (Abstract)

Luiz Eduardo G. Martins , Department of Science and Technology, Federal University of Sao Paulo, Sao Jose dos Campos, Sao Paulo Brazil (e-mail: martinsleg@hotmail.com)
Tony Gorschek , Department of Systems and Software Engineering, Blekinge Institute of Technology, Karlskrona, Blekinge Sweden SE-371 79 (e-mail: tony.gorschek@bth.se)

An Empirical Comparison of Combinatorial Testing, Random Testing and Adaptive Random Testing (PDF)

Huayao Wu , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: hywu@smail.nju.edu.cn)
nie changhai , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: changhainie@nju.edu.cn)
Justyna Petke , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: j.petke@ucl.ac.uk)
Yue Jia , Facebook, Facebook Inc., London, London United Kingdom of Great Britain and Northern Ireland (e-mail: yue.jia@ucl.ac.uk)
Mark Harman , Facebook, Facebook Inc., London, London United Kingdom of Great Britain and Northern Ireland (e-mail: mark.harman@ucl.ac.uk)

A framework for quantitative modeling and analysis of highly (re)configurable systems (Abstract)

Maurice Ter Beek , ISTI, CNR, Pisa, Pisa Italy 56124 (e-mail: maurice.terbeek@isti.cnr.it)
Axel Legay , computer science, Inria, Rennes, Britany France 35000 (e-mail: axel.legay@inria.fr)
Alberto Lluch Lafuente , Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Hovedstaden Denmark (e-mail: albl@dtu.dk)
Andrea Vandin , Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Hovedstaden Denmark (e-mail: anvan@dtu.dk)

A Framework for Temporal Verification Support in Domain-Specific Modelling (Abstract)

Bart Meyers , Codesign & Optimization, Flanders Make vzw, Leuven, Vlaams Brabant Belgium (e-mail: bart.meyers@flandersmake.be)
Hans Vangheluwe , Computer Science and Mathematics, Universiteit Antwerpen, 26660 Antwerpen, Antwerpen Belgium (e-mail: hv@cs.mcgill.ca)
Joachim Denil , Computer Science and Mathematics, Universiteit Antwerpen, 26660 Antwerpen, Antwerpen Belgium (e-mail: joachim.denil@uantwerpen.be)
Rick Salay , Computer Science, University of Toronto, 7938 Toronto, Ontario Canada M5S 3G4 (e-mail: rsalay@cs.toronto.edu)

On the Understandability of Temporal Properties Formalized in Linear Temporal Logic, Property Specification Patterns and Event Processing Language (Abstract)

Christoph Czepa , Faculty of Computer Science, Research Group Software Architecture, University of Vienna, Vienna, Vienna Austria (e-mail: christoph.czepa@univie.ac.at)
Uwe Zdun , Faculty of Computer Science, Research Group Software Architecture, University of Vienna, Vienna, Vienna Austria (e-mail: uwe.zdun@univie.ac.at)

Extending Abstract Interpretation to Dependency Analysis of Database Applications (Abstract)

Angshuman Jana , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: janaangshuman@gmail.com)
Raju Halder , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: halder@iitp.ac.in)
Abhishekh Kalahasti , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: kalahasti.cs13@iitp.ac.in)
Sanjivani Ganni , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: ganni.cs13@iitp.ac.in)
Agostino Cortesi , Computer Science, University Ca' Foscari di Venezia, Venezia, VE Italy 30170 (e-mail: cortesi@unive.it)

Leveraging Historical Associations between Requirements and Source Code to Identify Impacted Classes (Abstract)

Davide Falessi , Computer Science, California Polytechnic State University, San Luis Obispo, California United States (e-mail: d.falessi@gmail.com)
Justin Roll , Computer Science and Software Engineering, California Polytechnic State University College of Engineering, 306564 San Luis Obispo, California United States (e-mail: jroll@calpoly.edu)
Jin L.C. Guo , Computer Science, McGill University, Montreal, Quebec Canada (e-mail: jguo@cs.mcgill.ca)
Jane Cleland-Huang , Computer science, University of Notre Dame, South Bend, Illinois United States (e-mail: JaneClelandHuang@nd.edu)

Analyzing Families of Experiments in SE: a Systematic Mapping Study (Abstract)

Adrian Santos , M-Group, University of Oulu, Oulu, Oulu Finland (e-mail: Adrian.Santos.Parrilla@oulu.fi)
Omar S. Gomez , Facultad de Informática y Electrónica, Escuela Superior Politécnica de Chimborazo, Riobamba, Chimborazo Ecuador 060106 (e-mail: ogomez@espoch.edu.ec)
Natalia Juristo , Escuela Técnica Superior de Ingenieros Informáticos, Universidad Politecnica de Madrid, Boadilla del Monte, Madrid Spain 28660 (e-mail: natalia@fi.upm.es)

Observation-Enhanced QoS Analysis of Component-Based Systems (Abstract)

Colin Alexander Paterson , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5GH (e-mail: colin.paterson@york.ac.uk)
Radu Calinescu , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: radu.calinescu@york.ac.uk)

Chaff from the Wheat: Characterizing and Determining Valid Bug Reports (Abstract)

Yuanrui Fan , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yrfan@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)

On Scheduling Constraint Abstraction for Multi-Threaded Program Verification (Abstract)

Liangze Yin , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: yinliangze@163.com)
Wei Dong , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: wdong@nudt.edu.cn)
Wanwei Liu , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: wwliu@nudt.edu.cn)
Ji Wang , School of Computer, National University of Defense Technology, Changsha, Hunan China (e-mail: wj@nudt.edu.cn)

A Combinatorial Testing-Based Approach to Fault Localization (Abstract)

Laleh Sh. Ghandehari , Computer Science and Engineering, University of Texas at Arlington, 12329 Arlington, Texas United States 76019 (e-mail: laleh.shikhgholamhosseing@mavs.uta.edu)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Raghu Kacker , math division, National Institute of Standards & Technology, Gaithersburg, Maryland United States (e-mail: raghu.kacker@nist.gov)
D. Richard Rick Kuhn , computer security division, National Institute of Standards & Technology, Gaithersburg, Maryland United States 20899 (e-mail: kuhn@nist.gov)
David Kung , Computer Science and Engineering, University of Texas at Arlington, Arlington, Texas United States 76019-0015 (e-mail: kung@uta.edu)
Tao Xie , Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, Illinois United States 61801 (e-mail: taoxie@illinois.edu)

An interleaving approach to combinatorial testing and failure-inducing interaction identification (PDF)

Xintao Niu , computer science and technology, Nanjing University, Nanjing, Jiangsu China 210023 (e-mail: niuxintao@gmail.com)
nie changhai , computer science and technology, Nanjing University, nanjing, Jiangsu China 210096 (e-mail: changhainie@nju.edu.cn)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Xiaoyin Wang , Computer Science, University of Texas at San Antonio, San Antonio, Texas United States 78249 (e-mail: xiaoyin.wang@utsa.edu)
Jiaxi Xu , School of Information Engineering, Nanjing Xiaozhuang University, Nanjing, Jiangsu China (e-mail: xujiaxi@njxzc.edu.cn)
Yan Wang , School of Information Engineering, Nanjing Xiaozhuang University, Nanjing, Jiangsu China (e-mail: wangyan@njxzc.edu.cn)
Papers

Vulnerability Discovery with Attack Injection (Abstract)

João Antunes , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taďani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).
84 ms
(Ver 3.3 (11022016))