The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589

Language Inclusion Checking of Timed Automata with Non-Zenoness (Abstract)

Ting Wang , College of Computer Science, Zhejiang University of Technology, P.R. China.(email:wangting@zjut.edu.cn)

Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt (Abstract)

Emad Shihab , Data-driven Analysis of Software (DAS) lab at the Department of Computer Science and Software Engineering, Concordia University, Montreal, Quebec, Canada. (e-mail: eshihab@encs.concordia.ca).

AutoSense: A Framework for Automated Sensitivity Analysis of Program Data (Abstract)

Rajarshi Ray , Department of Computer Science & Engineering, National Institute of Technology Meghalaya, Shillong, India.

Reasoning about Identifier Spaces: How to Make Chord Correct (Abstract)

Pamela Zave , AT&T Laboratories—Research Bedminster, New Jersey 07921, USA (e-mail: pamela@research.att.com).

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection (Abstract)

Dinghao Wu , College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802 (e-mail: dwu@ist.psu.edu).

On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study (Abstract)

Guido Salvaneschi , Software Technology Group, Department of Computer Science, Technische Universitat Darmstadt, Darmstadt, Germany.

Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review (Abstract)

Jehad Al Dallal , Department of Information Science, Kuwait University. P.O. Box 5969, Safat 13060, Kuwait. (email: j.aldallal@ku.edu.kw).

Autofolding for Source Code Summarization (Abstract)

Jaroslav Fowkes , School of Informatics, University of Edinburgh, Edinburgh, EH8 9AB, UK (e-mail: jaroslav.fowkes@ed.ac.uk).

Semantic Slicing of Software Version Histories (Abstract)

Yi Li , Department of Computer Science, University of Toronto, Toronto, ON, Canada, M5S3G4.(email:liyi@cs.toronto.edu)

Test-Case Generation for Boolean Expressions by Cell Covering (Abstract)

Lian Yu , School of Software and Microelectronics in Peking University, Beijing, 102600, China.(email:lianyu@ss.pku.edu.cn)

Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems (Abstract)

Yun Yang , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia (e-mail: yyang@swin.edu.au)

Detecting Trivial Mutant Equivalences via Compiler Optimisations (PDF)

Marinos Kintis , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. (e-mail: marinos.kintis@uni.lu)

Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles (PDF)

Xuanzhe Liu , Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing, China, 100871 (e-mail: liuxuanzhe@pku.edu.cn).

Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection (Abstract)

Zhenzhou Tian , Z. Tian is with the Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China, and with the School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Xi’an 710121, China.(email:tianzhenzhou@xupt.edu.cn)

EnergyPatch: Repairing Resource Leaks to Improve Energy-efficiency of Android Apps (Abstract)

Abhijeet Banerjee , School of Computing, National University of Singapore, Singapore (e-mail: abhijeet@comp.nus.edu.sg)

Detecting overly strong preconditions in refactoring engines (Abstract)

Melina Mongiovi , Department of Computing and Systems, Federal University of Campina Grande, Campina Grande, PB, 58429-900 Brazil.(email:melina@computacao.ufcg.edu.br)

Predicting Delivery Capability in Iterative Software Development (Abstract)

Morakot Choetkiertikul , School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, NSW, Australia, 2522.(email:mc650@uow.edu.au)

Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction (Abstract)

Shane McIntosh , Department of Electrical and Computer Engineer- ing, McGill University, Canada. (e-mail: shane.mcintosh@mcgill.ca).

Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction (Abstract)

Haipeng Cai , School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, 99163, USA.(email:hcai@eecs.wsu.edu)

A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems (Abstract)

Andrea Domenici , Department of Information Engineering, University of Pisa, Italy. (E-mail: Andrea.Domenici@iet.unipi.it).

A Templating System to Generate Provenance (PDF)

Luc Moreau , Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, Southampton, UK. (e-mail: l.moreau@ecs.soton.ac.uk).

Towards Model Checking Android Applications (Abstract)

Guangdong Bai , Singapore Institute of Technology, Singapore (e-mail: baiguangdong@gmail.com)

Control-Theoretical Software Adaptation: A Systematic Literature Review (Abstract)

Stepan Shevtsov , Linnaeus University Sweden, Växjö, Sweden (e-mail: stepan.shevtsov@lnu.se)

A Survey of Recent Trends in Testing Concurrent Software Systems (Abstract)

Alessandro Margara , Faculty of Informatics, Univerista della Svizzera italiana, USI Lugano.
Mauro Pezze , Faculty of Informatics, Univerista della Svizzera italiana, USI Lugano.

A Formal Specification and Verification Framework for Timed Security Protocols (Abstract)

Li Li , ISTD, Singapore University of Technology and Design, Singapore.(email:li lig@sutd.edu.sg)

Implementing and Evaluating Candidate-Based Invariant Generation (Abstract)

Adam Betts , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: a.betts@imperial.ac.uk)
Nathan Chong , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: nyc03@imperial.ac.uk)
Alastair Donaldson , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland SW7 2AZ (e-mail: alastair.donaldson@imperial.ac.uk)
Pantazis Deligiannis , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: pdegliannis13@imperial.ac.uk)
Jeroen Ketema , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: j.ketema@imperial.ac.uk)

Heterogeneous Defect Prediction (Abstract)

Jaechang Nam , Department of Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: jc.nam@uwaterloo.ca)
Wei Fu , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: wfu@ncsu.edu)
Sunghun Kim , Department of Computer Science, Hong Kong University of Science and, Hong Kong, n/a Hong Kong N/A (e-mail: hunkim@cse.ust.hk)
Tim Menzies , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: tim@menzies.us)
Lin Tan , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: lintan@uwaterloo.ca)

Specialising Software for Different Downstream Applications Using Genetic Improvement and Code Transplantation (PDF)

Justyna Petke , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: j.petke@ucl.ac.uk)
Mark Harman , CS, UCL, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: mark.harman@ucl.ac.uk)
William B. Langdon , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: W.Langdon@cs.ucl.ac.uk)
Westley Weimer , Computer Science, University of Virginia, Charlottesville, Virginia United States 22903 (e-mail: weimer@cs.virginia.edu)

A Comparative Study to Benchmark Cross-project Defect Prediction Approaches (Abstract)

Steffen Herbold , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany 37077 (e-mail: herbold@cs.uni-goettingen.de)
Alexander Trautsch , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: alexander.trautsch@stud.uni-goettingen.de)
Jens Grabowski , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: grabowski@cs.uni-goettingen.de)

Blindness and Program Comprehension (Abstract)

Ameer Armaly , Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana United States 46656 (e-mail: aarmaly@nd.edu)
Paige Rodeghero , Department of Computer Science and Engineering, University of Notre Dame, South Bend, Indiana United States 46628 (e-mail: prodeghe@nd.edu)
Collin McMillan , Computer Science, University of Notre Dame, South Bend, Virginia United States 46545 (e-mail: cmc@nd.edu)

Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy (Abstract)

Le Yu , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: yulele08@gmail.com)
Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: csxluo@comp.polyu.edu.hk)
Chenxiong Qian , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: chenxiongqian@gmail.com)
Shuai Wang , Department of Computing, Hong Kong Polytechnic University, 26680 Kowloon, Hong Kong Hong Kong (e-mail: waishuai@hotmail.com)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)

Authors' Reply to “Comments on 'Researcher Bias: The Use of Machine Learning in Software Defect Prediction' ” (Abstract)

Martin Shepperd , IS & Computing, Brunel University, Uxbridge, Middx United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: martin.shepperd@brunel.ac.uk)
Tracy Hall , Information systems and computing, Brunel University, Middlesex, Middlesex United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: tracy.hall@brunel.ac.uk)
David Bowes , Computer Science, University of Hertfordshire, Hatfield, Hertfordshire United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: d.h.bowes@herts.ac.uk)

Two-phase Assessment Approach to Improve the Efficiency of Refactoring Identification (Abstract)

Ah-Rim Han , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: arhan@se.kaist.ac.kr)
Sungdeok Cha , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: scha@korea.ac.kr)

MAHAKIL:Diversity based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction (Abstract)

Kwabena Ebo Bennin , Computer Science, City University of Hong Kong, 53025 Kowloon Tong, Kowloon Hong Kong (e-mail: ebotuk38@gmail.com)
Jacky Keung , Department of Computer Science, City University of Hong Kong, Kowloon, Kowloon Tong Hong Kong KLN (e-mail: Jacky.Keung@cityu.edu.hk)
Passakorn Phannachitta , College of Arts, Media and Technology, Chiang Mai University, 26682 Chiang Mai, Chiang Mai University Thailand (e-mail: passakorn.p@cmu.ac.th)
Akito Monden , Graduate School of Natural Science and Technology, Okayama University, Okayama, Okayama Japan (e-mail: monden@okayama-u.ac.jp)
Solomon Mensah , Computer Science, City University of Hong Kong, Kowloon Tong, Kowloon Hong Kong (e-mail: smensah2-c@my.cityu.edu.hk)

A Theoretical and Empirical Study of Diversity-aware Mutation Adequacy Criterion (Abstract)

Donghwan Shin , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: donghwan@se.kaist.ac.kr)
Shin Yoo , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: shin.yoo@kaist.ac.kr)
Doo-Hwan Bae , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: bae@se.kaist.ac.kr)

Measuring Program Comprehension: A Large-Scale Field Study with Professionals (Abstract)

Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China 310000 (e-mail: xxkidd@zju.edu.cn)
Lingfeng Bao , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: lingfengbao@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Zhenchang Xing , Research School of Computer Science, Australian National University, Canberra, Victoria Australia (e-mail: zhenchang.xing@anu.edu.au)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)
Shanping Li , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: shan@zju.edu.cn)

Coordination Challenges in Large-Scale Software Development: A Case Study of Planning Misalignment in Hybrid Settings (Abstract)

Saskia Bick , Cloud Platform Services, SAP SE, Walldorf 69190, Germany (e-mail: saskia.bick@sap.com)
Kai Spohrer , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: spohrer@uni-mannheim.de)
Rashina Hoda , Department of Electrical and Computer Engineering, The University of Auckland, Auckland, New Zealand (e-mail: r.hoda@auckland.ac.nz)
Alexander Scheerer , Globalization Services, SAP SE, Walldorf 69190, Germany (e-mail: alexander.scheerer@sap.com)
Armin Heinzl , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: heinzl@uni-mannheim.de)

Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases (Abstract)

Radu Calinescu , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: radu.calinescu@york.ac.uk)
Danny Weyns , Computer Science, Linnaeus University, Vaxjo, Smaland Sweden SE-35195 (e-mail: Danny.Weyns@gmail.com)
Simos Gerasimou , Computer Science, University of York, 8748 York, North Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5DD (e-mail: simos.gerasimou@york.ac.uk)
Muhammad Usman Iftikhar , Department of Computer Science, Linneuniversitet - Vaxjo, 8180 Vaxjo, Kronoberg Sweden 351 95 (e-mail: usman.iftikhar@lnu.se)
Ibrahim Habli , Computer Science, University of York, York, Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5GH (e-mail: Ibrahim.Habli@york.ac.uk)
Tim Kelly , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: tim.kelly@york.ac.uk)

Comments on ScottKnottESD in response to “An Empirical Comparison of Model Validation Techniques for Defect Prediction Models” (Abstract)

Steffen Herbold , Institute for Computer Science, Georg-August-Universit?t G?ttingen, G?ttingen, Lower Saxony Germany 37077 (e-mail: herbold@cs.uni-goettingen.de)

Predicting Future Developer Behavior in the IDE Using Topic Models (Abstract)

Kostadin Damevski , Department of Computer Science, Virginia Commonwealth University, Richmond, Virginia United States 23284 (e-mail: damevski@acm.org)
Hui Chen , Dept. of Math and CS, Virginia State University, Petersburg, Virginia United States (e-mail: huichen@ieee.org)
David Shepherd , ISS SWE, ABB, Inc., Raleigh, North Carolina United States 27606 (e-mail: david.shepherd@us.abb.com)
Nicholas A. Kraft , Principle Scientist, ABB Corporate Research, Raleigh, North Carolina United States (e-mail: nicholas.a.kraft@us.abb.com)
Lori Pollock , Computer and Information Sciences, University of Delaware, Newark, Delaware United States 19716-2586 (e-mail: pollock@cis.udel.edu)

Expanding Queries for Code Search Using Semantically Related API Class-names (Abstract)

Feng Zhang , School of Computing, Queen's University, Kingston, Ontario Canada (e-mail: feng@cs.queensu.ca)
Haoran Niu , Electrical and Computer Engineering, Queen's University, kingston, Ontario Canada K7L 3N6 (e-mail: hit.haoran@gmail.com)
Iman Keivanloo , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada (e-mail: keivanloo@gmail.com)
Ying Zou , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada (e-mail: ying.zou@queensu.ca)

Using Local Clocks to Reproduce Concurrency Bugs (Abstract)

Zhe Wang , State Key Laboratory of Computer Architecture, Institute of Computing Technology Chinese Academy of Sciences, 53035 Beijing, Beijing China 100190 (e-mail: wangzhe12@ict.ac.cn)
Chenggang Wu , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, Beijing, Beijing China 100190 (e-mail: wucg@ict.ac.cn)
Xiang Yuan , SKL of Computer Architecture, Institute of Computing Technology, Beijing, Beijing China 100190 (e-mail: yuanxiang@ict.ac.cn)
Zhenjiang Wang , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, Beijing, Beijing China 100190 (e-mail: wangzhenjiang@ict.ac.cn)
Jianjun Li , Institute of Computing Technology, Key Laboratory of Computer System and Architecture, bj, Beijing China 100190 (e-mail: lijianjun@ict.ac.cn)
Pen-Chung Yew , Department of Computer Science and Engineering, University of Minnesota, Minneapolis, Minnesota United States (e-mail: yew@cs.umn.edu)
Jeff Huang , Texas A&M University, The Department of Computer Science & Engineering, College Station, Texas United States 77843 (e-mail: jeff@cse.tamu.edu)
Xiaobing Feng , Key Lab. of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: fxb@ict.ac.cn)
Yanyan Lan , Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: lanyanyan@ict.ac.cn)
Yunji Chen , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing China 100190 (e-mail: cyj@ict.ac.cn)
Yuanming Lai , State Key Laboratory of Computer Architecture, Institute of Computing Technology of Chinese Academy of Sciences, Beijing, Beijing China (e-mail: laiyuanming@ict.ac.cn)
Yong Guan , College of Computer and Information Management, Capital Normal University, Beijing, Beijing China (e-mail: guanyong@mail.cnu.edu.cn)

The Scent of a Smell: An Extensive Comparison between Textual and Structural Smells (Abstract)

Fabio Palomba , Electrical Engineering, Mathematics, and Computed Science, Technische Universiteit Delft Faculteit Technische Natuurwetenschappen, 145265 Delft, Zuid-Holland Netherlands (e-mail: fpalomba@unisa.it)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Andy Zaidman , Software Engineering Research Group, Delft University of Technology, Delft, Zuid Holland Netherlands 2628 CD (e-mail: a.e.zaidman@tudelft.nl)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)
Andrea De Lucia , Dipartimento di Matematica e Informatica, Universit di Salerno, Fisciano, Salerno Italy 84084 (e-mail: adelucia@unisa.it)

Data Scientists in Software Teams: State of the Art and Challenges (Abstract)

Miryung Kim , Computer Science, University of California, Los Angeles, Los Angeles, California United States 90095 (e-mail: miryung@cs.ucla.edu)
Thomas Zimmermann , Research, Microsoft Corporation, Redmond, Washington United States (e-mail: tzimmer@microsoft.com)
Robert DeLine , Research, Microsoft Corporation, Redmond, Washington United States 98052 (e-mail: rdeline@microsoft.com)
Andrew Begel , Research, Microsoft, Redmond, Washington United States 98052 (e-mail: Andrew.Begel@microsoft.com)

Revisiting the Performance Evaluation of Automated Approaches for the Retrieval of Duplicate Issue Reports (Abstract)

Mohamed Sami Rakha , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: m.rakha@queensu.ca)
Cor-Paul Bezemer , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: bezemer@cs.queensu.ca)
Ahmed E. Hassan , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: ahmed@cs.queensu.ca)

Collaborative Model-Driven Software Engineering: a Classification Framework and a Research Map (Abstract)

Mirco Franzago , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy 67100 (e-mail: mircofranzago@gmail.com)
Davide Di Ruscio , Department of Information Engineering Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: davide.diruscio@univaq.it)
Ivano Malavolta , Computer Science, Vrije Universiteit Amsterdam, 1190 Amsterdam, Amsterdam Netherlands (e-mail: ivanomalavolta@gmail.com)
Henry Muccini , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: henry.muccini@univaq.it)

Clarifications on the Construction and Use of the ManyBugs Benchmark (Abstract)

Claire Le Goues , Institue for Software Research, Carnegie Mellon University, Pittsburgh, Pennsylvania United States (e-mail: clegoues@cs.cmu.edu)
Yuriy Brun , College of Information and Computer Science, University of Massachusetts, Amherst, Massachusetts United States (e-mail: brun@cs.umass.edu)
Stephanie Forrest , Department of Computer Science, Univ. of New Mexico, Albuquerque, New Mexico United States (e-mail: forrest@cs.unm.edu)
Westley Weimer , Computer Science and Engineering, University of Michigan, Ann Arbor, Michigan United States (e-mail: weimerw@umich.edu)

A Study of Social Interactions in Open Source Component Use (Abstract)

Marc Palyart , Computer Science, University of British Columbia, 8166 Vancouver, British Columbia Canada V6T 1Z4 (e-mail: mpalyart@gmail.com)
Gail C. Murphy , Computer Science, University of British Columbia, Vancouver, British Columbia Canada V6T 1Z4 (e-mail: murphy@cs.ubc.ca)
Vaden Masrani , Computer Science, University of British Columbia, Vancouver, British Columbia Canada (e-mail: vadmas@cs.ubc.ca)

Tracking Load-time Configuration Options (Abstract)

Max Lillack , Institut for Wirtschaftsinformatik, Universitat Leipzig, 9180 Leipzig, Sachsen Germany 04109 (e-mail: lillack@wifa.uni-leipzig.de)
Christian Kastner , Institute for Software Reserach, Carnegie Mellon University, Pittsburgh, Pennsylvania United States 15213-3890 (e-mail: kaestner@cs.cmu.edu)
Eric Bodden , Software Engineering, Universitat Paderborn Fakultat fur Elektrotechnik Informatik und Mathematik, 232601 Paderborn, NRW Germany 33102 (e-mail: eric.bodden@uni-paderborn.de)

On the Use of Hidden Markov Model to Predict the Time to Fix Bugs (Abstract)

Mayy Habayeb , Department of Mechanical and Industrial Engineering, Ryerson University, Toronto, Ontario Canada M5B 2K3 (e-mail: mayy.habayeb@gmail.com)
Syed Shariyar Murtaza , Computer science, the university of western ontario, London, Ontario Canada N6A5B7 (e-mail: syed.shariyar@gmail.com)
Andriy Miranskyy , Department of Computer Science, Ryerson University, Toronto, Ontario Canada (e-mail: avm@ryerson.ca)
Ayse Basar Bener , TRSITM, Ryerson University, Toronto, Ontario Canada M5B2K3 (e-mail: ayse.bener@ryerson.ca)

EARMO: An Energy-Aware Refactoring Approach for Mobile Apps (Abstract)

Rodrigo Morales , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada H3C 3A7 (e-mail: moar820326@gmail.com)
Ruben Saborido , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada (e-mail: ruben.saborido-infantes@polymtl.ca)
Foutse Khomh , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada K7L3N6 (e-mail: foutse.khomh@polymtl.ca)
Francisco Chicano , Departamento de Lenguajes y Ciencias de la Computacion, Universidad de Malaga, 16752 Malaga, Andaluca Spain (e-mail: chicano@uma.es)
Giuliano Antoniol , Genie Informatique, Ecole Polytechnique de Montreal, Montreal, Quebec Canada 2500, chemin de (e-mail: antoniol@ieee.org)

Listening to the Crowd for the Release Planning of Mobile Apps (Abstract)

Simone Scalabrino , Biosciences and Territory, Universita degli Studi del Molise, 18960 Pesche, Molise Italy 86090 (e-mail: simone.scalabrino@unimol.it)
Gabriele Bavota , Faculty of Informatics, Universita della Svizzera Italiana, 27216 Lugano, Lugano Switzerland 6904 (e-mail: gabriele.bavota@usi.ch)
Barbara Russo , Faculty of Computer Science, University of Bolzano-Bozen, Bolzano-Bozen, Bolzano Italy 39100 (e-mail: barbara.russo@unibz.it)
Rocco Oliveto , Dept. of Engineering, University of Sannio, Benevento, _ Italy 82100 (e-mail: dipenta@unisannio.it)
Massimiliano Di Penta , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)

Metamorphic Testing of RESTful Web APIs (Abstract)

Sergio Segura , Computer and Languages Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: sergiosegura@us.es)
Jose A. Parejo , CS Languages and Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: japarejo@us.es)
Javier Troya , Computer Languages and Systems, Universidad de Sevilla, 16778 Sevilla, Andalucia Spain (e-mail: jtroya@us.es)
Antonio Ruiz-Cortes , Computer and Languages Systems, University of Seville, Sevilla, Sevilla Spain 41012 (e-mail: aruiz@us.es)
Papers

Vulnerability Discovery with Attack Injection (Abstract)

Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
João Antunes , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taïani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).
87 ms
(Ver 3.3 (11022016))