The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589
Papers

Vulnerability Discovery with Attack Injection (Abstract)

João Antunes , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taďani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).

Revisiting the Performance Evaluation of Automated Approaches for the Retrieval of Duplicate Issue Reports (Abstract)

Mohamed Sami Rakha , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: m.rakha@queensu.ca)
Cor-Paul Bezemer , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: bezemer@cs.queensu.ca)
Ahmed E. Hassan , School of Computing, Queen\'s University, Kingston, Ontario Canada (e-mail: ahmed@cs.queensu.ca)

Collaborative Model-Driven Software Engineering: a Classification Framework and a Research Map (Abstract)

Mirco Franzago , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy 67100 (e-mail: mircofranzago@gmail.com)
Davide Di Ruscio , Department of Information Engineering Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: davide.diruscio@univaq.it)
Ivano Malavolta , Computer Science, Vrije Universiteit Amsterdam, 1190 Amsterdam, Amsterdam Netherlands (e-mail: ivanomalavolta@gmail.com)
Henry Muccini , Department of Information Engineering, Computer Science and Mathematics (DISIM), University of L'Aquila, L'Aquila, AQ Italy (e-mail: henry.muccini@univaq.it)

A Study of Social Interactions in Open Source Component Use (Abstract)

Marc Palyart , Computer Science, University of British Columbia, 8166 Vancouver, British Columbia Canada V6T 1Z4 (e-mail: mpalyart@gmail.com)
Gail C. Murphy , Computer Science, University of British Columbia, Vancouver, British Columbia Canada V6T 1Z4 (e-mail: murphy@cs.ubc.ca)
Vaden Masrani , Computer Science, University of British Columbia, Vancouver, British Columbia Canada (e-mail: vadmas@cs.ubc.ca)

Tracking Load-time Configuration Options (Abstract)

Max Lillack , Institut for Wirtschaftsinformatik, Universitat Leipzig, 9180 Leipzig, Sachsen Germany 04109 (e-mail: lillack@wifa.uni-leipzig.de)
Christian Kastner , Institute for Software Reserach, Carnegie Mellon University, Pittsburgh, Pennsylvania United States 15213-3890 (e-mail: kaestner@cs.cmu.edu)
Eric Bodden , Software Engineering, Universitat Paderborn Fakultat fur Elektrotechnik Informatik und Mathematik, 232601 Paderborn, NRW Germany 33102 (e-mail: eric.bodden@uni-paderborn.de)

On the Use of Hidden Markov Model to Predict the Time to Fix Bugs (Abstract)

Mayy Habayeb , Department of Mechanical and Industrial Engineering, Ryerson University, Toronto, Ontario Canada M5B 2K3 (e-mail: mayy.habayeb@gmail.com)
Syed Shariyar Murtaza , Computer science, the university of western ontario, London, Ontario Canada N6A5B7 (e-mail: syed.shariyar@gmail.com)
Andriy Miranskyy , Department of Computer Science, Ryerson University, Toronto, Ontario Canada (e-mail: avm@ryerson.ca)
Ayse Basar Bener , TRSITM, Ryerson University, Toronto, Ontario Canada M5B2K3 (e-mail: ayse.bener@ryerson.ca)

EARMO: An Energy-Aware Refactoring Approach for Mobile Apps (Abstract)

Rodrigo Morales , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada H3C 3A7 (e-mail: moar820326@gmail.com)
Ruben Saborido , Genie logiciel genie informatique, Ecole Polytechnique Montreal, Montreal, Quebec Canada (e-mail: ruben.saborido-infantes@polymtl.ca)
Foutse Khomh , Electrical and Computer Engineering, Queen's University, Kingston, Ontario Canada K7L3N6 (e-mail: foutse.khomh@polymtl.ca)
Francisco Chicano , Departamento de Lenguajes y Ciencias de la Computacion, Universidad de Malaga, 16752 Malaga, Andaluca Spain (e-mail: chicano@uma.es)
Giuliano Antoniol , Genie Informatique, Ecole Polytechnique de Montreal, Montreal, Quebec Canada 2500, chemin de (e-mail: antoniol@ieee.org)

Listening to the Crowd for the Release Planning of Mobile Apps (Abstract)

Simone Scalabrino , Biosciences and Territory, Universita degli Studi del Molise, 18960 Pesche, Molise Italy 86090 (e-mail: simone.scalabrino@unimol.it)
Gabriele Bavota , Faculty of Informatics, Universita della Svizzera Italiana, 27216 Lugano, Lugano Switzerland 6904 (e-mail: gabriele.bavota@usi.ch)
Barbara Russo , Faculty of Computer Science, University of Bolzano-Bozen, Bolzano-Bozen, Bolzano Italy 39100 (e-mail: barbara.russo@unibz.it)
Rocco Oliveto , Dept. of Engineering, University of Sannio, Benevento, _ Italy 82100 (e-mail: dipenta@unisannio.it)
Massimiliano Di Penta , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)

Entropy Based Software Reliability Analysis of Multi-Version Open Source Software (Abstract)

V B SINGH , Computer Science, Delhi College of Arts & Commerce, University of Delhi, New Delhi, Delhi India 110075 (e-mail: singh_vb@rediffmail.com)
Meera Sharma , Swami Shraddhanand College, University of Delhi, New Delhi, Delhi India (e-mail: meerakaushik@gmail.com)
Hoang Pham , ISE, Rutgers, Piscataway, New Jersey United States 08854 (e-mail: hoang84pham@gmail.com)

A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies (Abstract)

Andrea Margheri , Electronics and Computer Science, University of Southampton, 7423 Southampton, Hampshire United Kingdom of Great Britain and Northern Ireland SO17 1BJ (e-mail: a.margheri@soton.ac.uk)
Massimiliano Masi , DC Tower, Tiani Spirit GmBh, Wien, Wien Austria (e-mail: massimiliano.masi@tiani-spirit.com)
Rosario Pugliese , Statistica, Informatica, Applicazioni, Universita degli Studi di Firenze, 9300 Firenze, Toscana Italy (e-mail: rosario.pugliese@unifi.it)
Francesco Tiezzi , School of Science and Technology, Computer Science Division, Universita degli Studi di Camerino Scuola di Scienze e Tecnologie, 201848 Camerino, Marche Italy (e-mail: francesco.tiezzi@unicam.it)

Automatic Software Repair: A Survey (PDF)

Luca Gazzola , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy (e-mail: gazzola@disco.unimib.it)
Daniela Micucci , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy (e-mail: micucci@disco.unimib.it)
Leonardo Mariani , Department of Informatics, Systems and Communication (DISCo), University of Milano Bicocca, Milano, Milano Italy 20126 (e-mail: mariani@disco.unimib.it)

What Makes a Great Manager of Software Engineers? (Abstract)

Eirini Kalliamvakou , Computer Science, University of Victoria, Victoria, British Columbia Canada V8W 2Y2 (e-mail: ikaliam@uvic.ca)
Christian Bird , Microsoft Research, Microsoft Corportation, Redmond, Washington United States 98052 (e-mail: cbird@microsoft.com)
Thomas Zimmermann , Microsoft Research, Microsoft Corportation, Redmond, Washington United States 98052 (e-mail: tzimmer@microsoft.com)
Andrew Begel , Research, Microsoft, Redmond, Washington United States 98052 (e-mail: Andrew.Begel@microsoft.com)
Robert DeLine , Research, Microsoft Corporation, Redmond, Washington United States 98052 (e-mail: rdeline@microsoft.com)
Daniel M. German , CS, University of Victoria, Victoria, British Columbia Canada V8S3P6 (e-mail: dmg@uvic.ca)

A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction (Abstract)

Seyedrebvar Hosseini , Department of Information Processing Science, Oulun Yliopisto, 6370 Oulu, Pohjois-Pohjanmaa Finland (e-mail: rebvar@oulu.fi)
Burak Turhan , Department of Computer Science, Brunel University Department of Computer Science, 387820 Uxbridge, Middlesex United Kingdom of Great Britain and Northern Ireland (e-mail: Burak.Turhan@brunel.ac.uk)
Dimuthu Gunarathna , quality assurance, Vaimo Finland (Oy), Oulu, pohjois-pohjanmaa Finland (e-mail: dimuthu.gunarathna@vaimo.com)

Toward a Smell-aware Bug Prediction Model (Abstract)

Fabio Palomba , Computer Science, Technische Universiteit Delft, 2860 Delft, Zuid-Holland Netherlands (e-mail: fpalomba@unisa.it)
Marco Zanoni , Department of Informatics, Systems and Communication, University of Milano-Bicocca, Milan, Milan Italy 20126 (e-mail: marco.zanoni@disco.unimib.it)
Francesca Arcelli Fontana , DISCo, University of Milano Bicocca, Milano, Milano Italy 20126 (e-mail: arcelli@disco.unimib.it)
Andrea De Lucia , Dipartimento di Matematica e Informatica, Universit di Salerno, Fisciano, Salerno Italy 84084 (e-mail: adelucia@unisa.it)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)

Gray Computing: A Framework for Computing with Background JavaScript Tasks (Abstract)

Yao Pan , Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee United States (e-mail: yao.pan@vanderbilt.edu)
Jules White , Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee United States (e-mail: jules.white@vanderbilt.edu)
Yu Sun , Department of Computer Science, California State Polytechnic University, Pomona, Pomona, California United States (e-mail: yusun@cpp.edu)
Jeff Gray , Department of Computer Science, The University of Alabama, Tuscaloosa, Alabama United States (e-mail: gray@cs.ua.edu)

Integrating Technical Debt Management and Software Quality Management Processes: A Normative Framework and Field Tests (Abstract)

Narayan Ramasubbu , Katz Graduate School of Business, University of Pittsburgh, Pittsburgh, Pennsylvania United States 15260 (e-mail: narayanr@pitt.edu)
C. F. Kemerer , KGSB, University of Pittsburgh, Pittsburgh, Pennsylvania United States 15260 (e-mail: ckemerer@katz.pitt.edu)

Automated Refactoring of OCL Constraints with Search (PDF)

Lu Hong , Software Engineering, Simula Research Laboratory AS, 394155 Lysaker, Lysaker Norway (e-mail: honglu@simula.no)
Shuai Wang , Software Engineering, Simula Research Laboratory, Lysaker, Lysaker Norway (e-mail: shuai@simula.no)
Tao Yue , Informatics, Universitetet i Oslo, 6305 Oslo, Oslo Norway (e-mail: tao@simula.no)
shaukat Ali , Software Engineering, Simula Research Laboratory AS, 394155 Lysaker, Lysaker Norway (e-mail: shaukat@simula.no)
J. F. Nygard , Registration Informatics Department, Kreftregisteret, 11315 Oslo, Oslo Norway (e-mail: Jan.Nygard@kreftregisteret.no)

Developer Testing in The IDE: Patterns, Beliefs, And Behavior (Abstract)

Moritz Beller , Software Technology, Delft University of Technology, Delft, SH Netherlands (e-mail: m.m.beller@tudelft.nl)
Gousios Georgios , Faculty Electrical Engineering, Mathematics and Computer Science, TU Delft, Delft, ZH Netherlands (e-mail: g.gousios@tudelft.nl)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Sebastian Proksch , Computer Science, TU Darmstadt, Darmstadt, Hessen Germany 64289 (e-mail: research@mail.proks.ch)
Sven Amann , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Deutschland Germany 64289 (e-mail: amann@st.informatik.tu-darmstadt.de)
Andy Zaidman , Software Engineering Research Group, Delft University of Technology, Delft, Zuid Holland Netherlands 2628 CD (e-mail: a.e.zaidman@tudelft.nl)

Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs (Abstract)

Jonathan Dorn , Computer Science, University of Virginia, Charlottesville, Virginia United States 22093 (e-mail: dornja@gmail.com)
Jeremy Lacomis , Computer Science, University of Virginia, Charlottesville, Virginia United States (e-mail: lacomis@virginia.edu)
Westley Weimer , Computer Science, University of Virginia, Charlottesville, Virginia United States 22903 (e-mail: weimer@cs.virginia.edu)
Stephanie Forrest , Computer Science, Univ. of New Mexico, Albuquerque, New Mexico United States (e-mail: forrest@cs.unm.edu)

MSeer-An Advanced Technique for Locating Multiple Bugs in Parallel (Abstract)

Ruizhi Gao , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: gxr116020@utdallas.edu)
W. Eric Wong , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75083 (e-mail: ewong@utdallas.edu)

Competition-Based Crowdsourcing Software Development: A Multi-Method Study from a Customer Perspective (PDF)

Klaas-Jan Stol , Lero, University of Limerick, Limerick, Limerick Ireland (e-mail: kjstol@gmail.com)
Bora Caglayan , Innovation Exchange, IBM Ireland Limited, 42426 Dublin, Dublin Ireland (e-mail: bora.caglayan@ibm.com)
Brian Fitzgerald , Lero - the Irish Software Research centre, University of Limerick, Limerick, Limerick Ireland (e-mail: bf@ul.ie)

Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction (Abstract)

Alessandro Marchetto , SE unit, Fondazione Bruno Kessler, Trento, Trento Italy 38123 (e-mail: alex.marchetto@gmail.com)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, University della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Angelo Susi , IT - Software Engineering, FBK-IRST, Trento, Trento Italy 38123 (e-mail: susi@fbk.eu)

Smart Bound Selection for the Verification of UML/OCL Class Diagrams (Abstract)

Robert Clariso , IT, Multimedia and Telecommunication Department, Universitat Oberta de Catalunya, 16766 Barcelona, Barcelona Spain 08018 (e-mail: rclariso@uoc.edu)
Carlos A. Gonzalez , SnT Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg, Luxembourg Luxembourg (e-mail: caglezp@gmail.com)
Jordi Cabot , IN3-UOC, Institucio Catalana de Recerca i Estudis Avancats, 117370 Barcelona, Catalunya Spain (e-mail: jordi.cabot@icrea.cat)

Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications (Abstract)

Sadeeq Jan , SnT, Universite du Luxembourg, 81872 Luxembourg, LU Luxembourg (e-mail: jan@svv.lu)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: annibale.panichella@uni.lu)
Andrea Arcuri , SnT, Universite du Luxembourg, 81872 Luxembourg, LU Luxembourg (e-mail: arcand@westerdals.no)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)

Automatic Identification and Classification of Software Development Video Tutorial Fragments (Abstract)

Luca Ponzanelli , Software Institute, Faculty of Informatics, Università della Svizzera italiana, Lugano, Ticino Switzerland (e-mail: luca.ponzanelli@usi.ch)
Gabriele Bavota , Software Institute, Faculty of Informatics, Universita della Svizzera Italiana, 27216 Lugano, Lugano Switzerland (e-mail: gabriele.bavota@usi.ch)
Andrea Mocci , Software Institute, Faculty of Informatics, Università della Svizzera italiana, Lugano, Ticino Switzerland (e-mail: andrea.mocci@gmail.com)
Rocco Oliveto , Department of Bioscience and Territory, University of Molise, Pesche, Isernia Italy 86090 (e-mail: rocco.oliveto@unimol.it)
Massimiliano Di Penta , Dept. of Engineering, University of Sannio, Benevento, _ Italy 82100 (e-mail: dipenta@unisannio.it)
Sonia Cristina Haiduc , Department Of Computer Science, Wayne State University, Detroit, Michigan United States 48202 (e-mail: shaiduc@cs.fsu.edu)
Barbara Russo , Faculty of Computer Science, University of Bolzano-Bozen, Bolzano-Bozen, Bolzano Italy 39100 (e-mail: barbara.russo@unibz.it)
Michele Lanza , Software Institute, Faculty of Informatics, University of Lugano, Lugano, TI Switzerland (e-mail: michele.lanza@usi.ch)

On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction (Abstract)

Zhiqiang Li , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: lzq115@163.com)
Xiao-Yuan Jing , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan City, Hubei Province China 430072 (e-mail: jingxy_2000@126.com)
Xiaoke Zhu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, 12390 Wuhan, Hubei China (e-mail: henuzxk@163.com)
Hongyu Zhang , School of Electrical Engineering and Computing, The University of Newcastle, Newcastle, New South Wales Australia (e-mail: hongyu.zhang@newcastle.edu.au)
Baowen Xu , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: bwxu@nju.edu.cn)
Shi Ying , State Key Laboratory of Software Engineering, School of Computer, Wuhan University, Wuhan, Hubei China (e-mail: yingshi@whu.edu.cn)

Decomposition-Based Approach for Model-Based Test Generation (Abstract)

Paolo Arcaini , Department of Distributed and Dependable Systems, Univerzita Karlova, 37740 Praha, Praha Czech Republic 118 00 (e-mail: arcaini@d3s.mff.cuni.cz)
Angelo Gargantini , Dipartimento di Ingegneria, University of Bergamo, Dalmine, BG Italy 24100 (e-mail: angelo.gargantini@unibg.it)
Elvinia Riccobene , Computer Science, Universita degli Studi di Milano, 9304 Crema, CR Italy 26013 (e-mail: elvinia.riccobene@unimi.it)

An Empirical Study on API Usages (Abstract)

Hao Zhong , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, Shanghai China 200240 (e-mail: zhonghao@sjtu.edu.cn)
Hong Mei , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, Shanghai China (e-mail: meih@sjtu.edu.cn)

The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game (Abstract)

Sylvain Frey , Electronics and Computer Science, University of Southampton Faculty of Physical Sciences and Engineering, 243732 Southampton, Southampton United Kingdom of Great Britain and Northern Ireland (e-mail: s.a.f.frey@soton.ac.uk)
Awais Rashid , Department of Computer Science, University of Bristol Department of Computer Science, 152321 Bristol, Bristol United Kingdom of Great Britain and Northern Ireland (e-mail: a.rashid@lancaster.ac.uk)
Pauline Anthonysamy , Google, Google Inc, 93176 Mountain View, California United States (e-mail: p.anthonysamy@lancaster.ac.uk)
Maria Pinto-Albuquerque , Departamento de Ciências e Tecnologias da Informação, ISCTE-Instituto Universitario de Lisboa, 56061 Lisboa, Lisboa Portugal (e-mail: maria.albuquerque@iscte.pt)
Syed Asad Naqvi , Infolab21, Lancaster University, 4396 Lancaster, Lancashire United Kingdom of Great Britain and Northern Ireland (e-mail: s.naqvi@lancaster.ac.uk)

Coverage-based Greybox Fuzzing as Markov Chain (Abstract)

Marcel Bohme , Computer Science, National University of Singapore, Singapore, Singapore Singapore 117417 (e-mail: marcel.boehme@acm.org)
Van-Thuan Pham , Computer Science, National University of Singapore, Singapore, Singapore Singapore (e-mail: thuanpv@comp.nus.edu.sg)
Abhik Roychoudhury , Computer Science, National University of Singapore, Singapore, Singapore Singapore 117417 (e-mail: abhik@comp.nus.edu.sg)

Text Filtering and Ranking for Security Bug Report Prediction (Abstract)

Fayola Peters , University of Limerick, Lero- The Irish Software Research Centre, Limerick, Co. Limerick Ireland (e-mail: fayolapeters@gmail.com)
Thein Tun , Department of Computing and Communications, The Open University, Milton Keynes, England United Kingdom of Great Britain and Northern Ireland (e-mail: Thein.Tun@open.ac.uk)
Yijun Yu , Department of Computing and Communications, The Open University, Milton Keynes, England United Kingdom of Great Britain and Northern Ireland (e-mail: yijun.yu@open.ac.uk)
Bashar Nuseibeh , University of Limerick, Lero - The Irish Software Research Centre, Limerick, Co. Limerick Ireland (e-mail: bashar.nuseibeh@lero.ie)

Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas (Abstract)

Phil McMinn , Computer Science, University of Sheffield, Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland S1 4DP (e-mail: p.mcminn@sheffield.ac.uk)
Chris J. Wright , Computer Science, University of Sheffield, 7315 Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: chrisjameswright@gmail.com)
Colton J. McCurdy , Computer Science, Allegheny College, 5368 Meadville, Pennsylvania United States (e-mail: mccurdyc@allegheny.edu)
Gregory Kapfhammer , Computer Science, Allegheny College, Meadville, Pennsylvania United States 16335 (e-mail: gkapfham@allegheny.edu)

makeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes (Abstract)

Luca Mottola , DEIB, Politenico di Milano, Milano, Milano Italy 20133 (e-mail: luca.mottola@polimi.it)
Gian Pietro Picco , Department of Information Engineering and Computer Science, University of Trento, Trento, TN Italy 38100 (e-mail: gianpietro.picco@unitn.it)
Felix Jonathan Opperman , Institut für Technische Informatik, Technische Universitat Graz, 27253 Graz, Steiermark Austria (e-mail: oppermann@tugraz.at)
Joakim Eriksson , NES, Swedish Institute of Computer Science, 4277 Kista, Kista Sweden (e-mail: joakime@sics.se)
Niclas Finne , NES, Swedish Institute of Computer Science, 4277 Kista, Kista Sweden (e-mail: nfi@sics.se)
Harald Fuchs , SAP Research, SAP SE, Karlsruhe, Karlsruhe Germany (e-mail: harald.fuchs@sap.com)
Andrea Gaglione , Department of Computing, Imperial College London, 4615 London, London United Kingdom of Great Britain and Northern Ireland (e-mail: ag909@cam.ac.uk)
Stamatis Karnouskos , SAP Research, SAP, Karlsruhe, BW Germany D-76131 (e-mail: karnouskos@ieee.org)
Patricio Montero , ACCIONA, ACCIONA Ingenieria SA, 152752 Alcobendas, Madrid Spain (e-mail: patricio.moreno.montero@acciona.es)
Nina Oertel , SAP Research, SAP SE, Karlsruhe, Karlsruhe Germany (e-mail: nina.oertel@sap.com)
Kay Romer , Institut für Technische Informatik, Technische Universitat Graz, 27253 Graz, Steiermark Austria (e-mail: roemer@tugraz.at)
Patrik Spiess , SAP Research, SAP AG, Karlsruhe, Karlsruhe Germany (e-mail: patrik.spiess@sap.com)
Stefano Tranquillini , DISI, University of Trento, Trento, Trento Italy (e-mail: stefano.tranquillini@gmail.com)
Thiemo Voigt , CSL, Swedish Institute of Computer Science, Kista, Kista Sweden (e-mail: thiemo@sics.se)

Automatic Loop Summarization via Path Dependency Analysis (Abstract)

Xiaofei Xie , School of Computer Science and Technology, Tianjin University, Tianjin, Tianjin China (e-mail: xiexiaofei@tju.edu.cn)
Bihuan Chen , School of Computer Science and Shanghai Key Laboratory of Data Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: chenbihuan@gmail.com)
Liang Zou , School of Computer Science and Engineering, Nanyang Technological University, 54761 Singapore, Singapore Singapore (e-mail: liang.d.zou@gmail.com)
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: yangliu@ntu.edu.sg)
Wei Le , Department of Computer Science, Iowa State University, 1177 Ames, Iowa United States (e-mail: weile@iastate.edu)
Xiaohong Li , School of Computer Science and Technology, Tianjin University, Tianjin, Tianjin China (e-mail: xiaohongli@tju.edu.cn)

"Sampling" as a Baseline Optimizer for Search-based Software Engineering (Abstract)

Jianfeng Chen , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States 27695 (e-mail: jchen37@ncsu.edu)
Vivek Nair , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: vivekaxl@gmail.com)
Rahul Krishna , Computer science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: rkrish11@ncsu.edu)
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, West Virginia United States 26501 (e-mail: tim@menzies.us)

ConPredictor: Concurrency Defect Prediction in Real-World Applications (Abstract)

Tingting Yu , Computer Science, University of Kentucky, Lexington, Kentucky United States 40506 (e-mail: tyu@cs.uky.edu)
Wei Wen , Computer Science, University of Kentucky, Lexington, Kentucky United States (e-mail: wei.wen0@uky.edu)
Xue Han , Computer Science, University of Kentucky, Lexington, Kentucky United States (e-mail: xha225@g.uky.edu)
Jane Hayes , Computer Science, University of Kentucky, Lexington, Kentucky United States 40506-0495 (e-mail: hayes@cs.uky.edu)

A deep learning model for estimating story points (Abstract)

Morakot Choetkiertikul , School of Computing and Information Technology, University of Wollongong, 8691 Wollongong, New South Wales Australia 2522 (e-mail: morakotch@gmail.com)
Hoa Khanh Dam , School of Computer Science and Software Engineering, University of Wollongong, Wollongong, New South Wales Australia 2522 (e-mail: hoa@uow.edu.au)
Truyen Tran , Centre for Pattern Recognition and Data Analytics, Deakin University, Waurn Ponds, Victoria Australia 3216 (e-mail: truyen.tran@deakin.edu.au)
Trang Thi Minh Pham , 434468, Deakin University, Waurn Ponds, Victoria Australia 3216 (e-mail: phtra@deakin.edu.au)
Aditya Ghose , School of Computing and Information Technology, University of Wollongong, 8691 Wollongong, New South Wales Australia (e-mail: aditya@uow.edu.au)
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, West Virginia United States 26501 (e-mail: tim@menzies.us)

The Impact of Automated Parameter Optimization on Defect Prediction Models (Abstract)

Chakkrit Tantithamthavorn , School of Computer Science, The University of Adelaide, Adelaide, South Australia Australia (e-mail: chakkrit.tantithamthavorn@adelaide.edu.au)
Shane McIntosh , Department of Electrical and Computer Engineering, McGill University, Montreal, Quebec Canada H3A 0E9 (e-mail: shane.mcintosh@mcgill.ca)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada (e-mail: ahmed@cs.queensu.ca)
Kenichi Matsumoto , Information Systems, Nara Institute of Science and Technology, Information Systems, Ikomashi, Naraken Japan (e-mail: matumoto@is.naist.jp)

Toward Methodological Guidelines for Process Theories and Taxonomies in Software Engineering (Abstract)

Paul Ralph , Computer Science, University of Auckland, Auckland Central, Auckland New Zealand (e-mail: paul@paulralph.name)

Design Rule Spaces: A New Model for Representing and Analyzing Software Architecture (Abstract)

Yuanfang Cai , Computer Science, Drexel University, philadelphia, Pennsylvania United States 19104 (e-mail: yfcai@cs.drexel.edu)
Lu Xiao , School of Systems and Enterprises, Stevens Institute of Technology, 33694 Hoboken, New Jersey United States 07030 (e-mail: lxiao6@stevens.edu)
Rick Kazman , Department of Information Technology Management, University of Hawaii, Honolulu, Hawaii United States 96822 (e-mail: kazman@hawaii.edu)
Ran Mo , Computer Science, Drexel University, philadelphia, Pennsylvania United States (e-mail: rm859@drexel.edu)
Qiong Feng , Computer Science, Drexel University, philadelphia, Pennsylvania United States (e-mail: qf28@drexel.edu)

A Systematic Literature Review of Applications of the Physics of Notation (Abstract)

Dirk Van Der Linden , Department of Computer Science, University of Bristol, Bristol, City of Bristol United Kingdom of Great Britain and Northern Ireland (e-mail: djt.vanderlinden@gmail.com)
Irit Hadar , Department of Information Systems, University of Haifa, Haifa, Hefa Israel (e-mail: hadari@is.haifa.ac.il)

VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System (Abstract)

Lingfeng Bao , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: lingfengbao@zju.edu.cn)
Zhenchang Xing , Research School of Computer Science, Australian National University, Canberra, Australian Capital Territory Australia (e-mail: zhenchang.xing@anu.edu.au)
Xin Xia , Faculty of Information Tehnoology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)

A Systematic Review of Interaction in Search-Based Software Engineering (Abstract)

Aurora Ramirez , Computer Sciences and Numerical Analysis, University of Cordoba, Cordoba, Cordoba Spain (e-mail: aramirez@uco.es)
Jose Raul Romero , Computer Sciences and Numerical Analysis, University of Cordoba, Cordoba, Cordoba Spain 14071 (e-mail: jrromero@uco.es)
Christopher Simons , Department of Computer Science, University of the West of England, Bristol, Bristol United Kingdom of Great Britain and Northern Ireland BS16 1QY (e-mail: chris.simons@uwe.ac.uk)

Instance Migration Validity for Dynamic Evolution of Data-Aware Processes (Abstract)

Wei Song , Coomputer Science, Nanjing University of Science and Technology, Nanjing, Jiangsu China 210094 (e-mail: wsong@njust.edu.cn)
Xiaoxing Ma , State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu China 210046 (e-mail: xxm@nju.edu.cn)
Hans-Arno Jacobsen , ECE, Department of Electrical and Computer Engineering, Toronto, Ontario Canada M5S3G4 (e-mail: jacobsen@eecg.toronto.edu)

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool (Abstract)

Justin Smith , Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States 27606 (e-mail: jssmit11@ncsu.edu)
Brittany Johnson , Computer Science, University of Massachusetts Amherst College of Information and Computer Sciences, Amherst, Massachusetts United States (e-mail: bijohnso@ncsu.edu)
Emerson Murphy-Hill , Computer Science, North Carolina State University, Raleigh, North Carolina United States 27695 (e-mail: emerson@csc.ncsu.edu)
Bei-Tseng Chu , SIS, UNC Charlotte, Charlotte, North Carolina United States 28223 (e-mail: billchu@uncc.edu)
Heather Richter , Software and Information Systems, University of North Carolina at Charlotte, Charlotte, North Carolina United States 28223 (e-mail: richter@uncc.edu)

Predictive Mutation Testing (Abstract)

Jie Zhang , Computer Science, Peking University, 12465 Beijing, Beijing China 100871 (e-mail: zhangjie_marina@163.com)
Lingming Zhang , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: lingming.zhang@utdallas.edu)
Mark Harman , CS, UCL, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: mark.harman@ucl.ac.uk)
Dan Hao , EECS,Peking University, Institute of Software, Beijing, Beijing China 100871 (e-mail: haodan@pku.edu.cn)
Yue Jia , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6B (e-mail: yue.jia@ucl.ac.uk)
Lu Zhang , EECS,Peking University, Institute of Software, Beijing, Beijing China (e-mail: zhanglucs@pku.edu.cn)

Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior (Abstract)

Reza Matinnejad , SnT Centre, University of Luxembourg, luxembourg, Luxembourg Luxembourg (e-mail: reza.matinnejad@uni.lu)
Shiva Nejati , SnT Centre, University of Luxembourg, luxembourg, Luxembourg Luxembourg (e-mail: shiva.nejati@uni.lu)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)
Thomas Bruckmann , Delphi Automotive, Delphi Automotive, Luxembourg, Luxembourg Luxembourg (e-mail: thomas.bruckmann@delphi.com)

Network-Clustered Multi-Modal Bug Localization (Abstract)

Thong Van-Duc Hoang , School of Information System, Singapore Management University, 54756 Singapore, Singapore Singapore 188065 (e-mail: vdthoang.2016@smu.edu.sg)
Richard J. Oentaryo , Living Analytics Research Centre, Singapore Management University, Singapore, SG Singapore (e-mail: roentaryo@smu.edu.sg)
Tien-Duy Bui Le , School of Information Systems, Singapore Management University, 54756 Singapore, Singapore Singapore 188065 (e-mail: btdle.2012@smu.edu.sg)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)

Asymmetric Release Planning - Compromising Satisfaction against Dissatisfaction (Abstract)

Maleknaz Nayebi , Software Deciosion Support lab, University of Calgary, Calgary, Alberta Canada (e-mail: mnayebi@ucalgary.ca)
Guenther Ruhe , Computer Science and Electrical Engineering, University of Calgary, Calgary, Alberta Canada T2N 1N4 (e-mail: ruhe@ucalgary.ca)

Fully Reflective Execution Environments (Abstract)

Guido Chari , Computer Science, Universidad de Buenos Aires, 28196 Buenos Aires, CABA Argentina 1053 (e-mail: gchari@dc.uba.ar)
Diego Garbervetsky , Computer Science, FCEyN. UBA, Buenos Aires, Buenos Aires Argentina 1428 (e-mail: diegog@dc.uba.ar)
Stefan Marr , CS, Johannes Kepler Universitat Linz, 27266 Linz, sterreich Austria (e-mail: stefan.marr@jku.at)
Stephane Ducasse , B3, Inria Centre de recherche Lille Nord Europe, 176498 Villeneuve d'Ascq, Nord-Pas-de-Calais France (e-mail: stephane.ducasse@inria.fr)

A Screening Test for Disclosed Vulnerabilities in FOSS Components (Abstract)

Stanislav Dashevskyi , Information Engineering and Computer Science, Universita degli Studi di Trento, 19034 Trento, Trentino-Alto Adige Italy (e-mail: stanislav.dashevskyi@unitn.it)
Achim D. Brucker , Computer Science, University of Sheffield, 7315 Sheffield, South Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: a.brucker@sheffield.ac.uk)
Fabio Massacci , Information Engineering and Computer Science, Universita degli Studi di Trento, 19034 Trento, Trentino-Alto Adige Italy (e-mail: fabio.massacci@unitn.it)

Detecting Bugs by Discovering Expectations and Their Violations (Abstract)

Pan Bian , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: bianpan@ruc.edu.cn)
Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Yan Zhang , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: annazhang@ruc.edu.cn)
Chaoqun Yang , School of Information, Renmin University of China, 12471 Beijing, Beijing China (e-mail: cqyang@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
Yan Cai , Chinese Academy of Sciences, State Key Laboratory of Computer Science, Institute of Software, Beijing, Beijing China 100190 (e-mail: yancai@ios.ac.cn)

How Do Static and Dynamic Test Case Prioritization Techniques Perform on Modern Software Systems? An Extensive Study on GitHub Projects (Abstract)

Qi Luo , Computer Science, College of William and Mary, Williamsburg, Virginia United States 23185 (e-mail: qluo@email.wm.edu)
Kevin Moran , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: kpmoran01@email.wm.edu)
Lingming Zhang , Computer Science, University of Texas at Dallas, Richardson, Texas United States 75080 (e-mail: lingming.zhang@utdallas.edu)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Microtask Programming (Abstract)

Thomas D. LaToza , Department of Computer Science, George Mason University, Fairfax, Virginia United States (e-mail: tlatoza@gmu.edu)
Arturo Di Lecce , ., Cuebiq Srl, ., . Italy (e-mail: arturodilecce@gmail.com)
Fabio Ricci , ., Bosch Rexroth, ., . Italy (e-mail: f.ricci89@gmail.com)
Ben Towne , Institute for Software Research, Carnegie Mellon University, 15213, Pennsylvania United States (e-mail: wbt@cs.cmu.edu)
Andre Van der Hoek , Informatics, University of California, Irvine, Irvine, California United States 92697-3440 (e-mail: andre@ics.uci.edu)

Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations (Abstract)

Osama Hamdi Al-Baik , Electrical and Computer Engineering, University of Alberta, Edmonton, Alberta Canada (e-mail: albaik@ualberta.ca)
James Miller , Electrical and Computer Eng, University of Alberta, Edmonton, Alberta Canada T6H 2M4 (e-mail: jimm@ualberta.ca)

Creating Rich and Representative Personas by Discovering Affordances (Abstract)

Mostafa Mesgari , Management and Entrepreneurship, Elon University, Elon, North Carolina United States (e-mail: mmesgari@elon.edu)
Chitu Okoli , SKEMA Business School, Université Côte d'Azur - SKEMA, Paris, Paris France (e-mail: Chitu.Okoli@skema.edu)
Ana Ortiz de Guinea , Strategy and Information Systems, Universidad de Deusto, 16392 Bilbao, Pais Vasco Spain (e-mail: ana.ortiz-de-guinea@hec.ca)

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation (Abstract)

Yinxing Xue , School of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui China (e-mail: yinxingxue@gmail.com)
Zhengzi Xu , School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: XU0001ZI@e.ntu.edu.sg)
Mahinthan Chandramohan , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: mahintha001@e.ntu.edu.sg)
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore, Singapore Singapore 639798 (e-mail: yangliu@ntu.edu.sg)

A Systematic Evaluation of Static API-Misuse Detectors (Abstract)

Sven Amann , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany (e-mail: amann@st.informatik.tu-darmstadt.de)
Hoan Anh Nguyen , Electrical and Computer Engineering, Iowa State University, Ames, Iowa United States (e-mail: hoan@iastate.edu)
Sarah Nadi , Computing Science, University of Alberta Faculty of Science, 98623 Edmonton, Alberta Canada (e-mail: nadi@ualberta.ca)
Tien N. Nguyen , Computer Science, University of Texas at Dallas, 12335 Richardson, Texas United States (e-mail: tien.n.nguyen@utdallas.edu)
Mira Mezini , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany (e-mail: mezini@informatik.tu-darmstadt.de)

Automating Change-level Self-admitted Technical Debt Determination (Abstract)

Meng Yan , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: mengy@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University Faculty of Information Technology, 224480 Clayton, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
Emad Shihab , Computer Science and Software Engineering, Concordia University, Montreal, Quebec Canada (e-mail: eshihab@encs.concordia.ca)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Jianwei Yin , Computer science and technology, Zhejiang University, Hangzhou, Zhejiang Province China 310027 (e-mail: zjuyjw@cs.zju.edu.cn)
Xiaohu Yang , College of Computer Science, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yangxh@zju.edu.cn)

LEILA: formaL tool for idEntifying mobIle maLicious behAviour (Abstract)

Gerardo Canfora , Dept. of Engineering, University of Sannio, Benevento, BN Italy (e-mail: canfora@unisannio.it)
Fabio Martinelli , ICT, National Research Council of Italy, pisa, Italy Italy 56123 (e-mail: fabio.martinelli@iit.cnr.it)
Francesco Mercaldo , IIT, Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche, 215080 Pisa, Italy Italy 56124 (e-mail: francesco.mercaldo@iit.cnr.it)
Vittoria Nardone , Ingegneria, University of Sannio, Benevento, Benevento Italy (e-mail: vnardone@unisannio.it)
Antonella Santone , Ingegneria, University of Sannio, Benevento, Benevnto Italy 82100 (e-mail: santone@unisannio.it)
Corrado Aaron Visaggio , Research Centre on Software Technology, Univeristy of Sannio, Benevento, Italy Italy 82100 (e-mail: visaggio@unisannio.it)

Need for Sleep: the Impact of a Night of Sleep Deprivation on Novice Developers' Performance (Abstract)

Davide Fucci , HITeC, University of Hamburg, Hamburg, - Germany (e-mail: fucci@informatik.uni-hamburg.de)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, Università della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Simone Romano , DiMIE, Universita degli Studi della Basilicata, 19006 Potenza, Basilicata Italy (e-mail: simone.romano@unibas.it)
Natalia Juristo , Facultad de Informatica, Universidad Politecnica de Madrid, Boadilla del Monte, Madrid Spain 28660 (e-mail: natalia@fi.upm.es)

Automatically Categorizing Software Technologies (Abstract)

Mathieu Nassif , School of Computer Science, McGill University School of Computer Science, 348406 Montreal, Quebec Canada H3A 0E9 (e-mail: mnassif@cs.mcgill.ca)
Christoph Treude , School of Computer Science, McGill University, Montreal, Quebec Canada (e-mail: ctreude@cs.mcgill.ca)
Martin Robillard , School of Computer Science, McGill University, Montreal, Quebec Canada H3A 2A7 (e-mail: martin@cs.mcgill.ca)

A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction (Abstract)

Qinbao Song , Computer Science, Xi'an Jiaotong University, Xi'an, Shaanxi China 710049 (e-mail: qbsong@mail.xjtu.edu.cn)
Yuchen Guo , Computer science and technology, Xi'an Jiaotong Univeristy, Xi'an, Shaanxi China (e-mail: wispcat@stu.xjtu.edu.cn)
Martin Shepperd , IS & Computing, Brunel University, Uxbridge, Middx United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: martin.shepperd@brunel.ac.uk)

CHiP: A Configurable Hybrid Parallel Covering Array Constructor (Abstract)

Hanefi Mercan , Computer sciences and engineering, Sabanci Universitesi, 52991 Istanbul, Istanbul Turkey 34956 (e-mail: hanefimercan@sabanciuniv.edu)
Cemal Yilmaz , Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Tuzla Turkey 34956 (e-mail: cyilmaz@sabanciuniv.edu)
Kamer Kaya , Computer Science and Engineering, Sabanci Universitesi, 52991 İstanbul, Tuzla Turkey 34956 (e-mail: kaya@sabanciuniv.edu)

Use and Misuse of Continuous Integration Features: An Empirical Study of Projects that (mis)use Travis CI (Abstract)

Keheliya Gallaba , Department of Electrical & Computer Engineering, McGill University, Montreal, Quebec Canada (e-mail: keheliya.gallaba@mail.mcgill.ca)
Shane McIntosh , Department of Electrical and Computer Engineering, McGill University, Montreal, Quebec Canada H3A 0E9 (e-mail: shane.mcintosh@mcgill.ca)

Motivation and Satisfaction of Software Engineers (Abstract)

Cesar Franca , Departamento de Computação, Universidade Federal Rural de Pernambuco, 67744 Recife, Pernambuco Brazil (e-mail: cesarfranca@gmail.com)
Fabio Fabio Queda Bueno Da Silva , Centro de Informática, Universidade Federal de Pernambuco, 28116 Recife, Pernambuco Brazil (e-mail: fabio@cin.ufpe.br)
Helen Sharp , Computing, The Open University, UK, Milton Keynes, Buckinghamshire United Kingdom of Great Britain and Northern Ireland MK7 6AA (e-mail: h.c.sharp@open.ac.uk)

A Multi-study Investigation Into Dead Code (Abstract)

Simone Romano , DiMIE, Universita degli Studi della Basilicata, 19006 Potenza, Basilicata Italy (e-mail: simone.romano@unibas.it)
Christopher Vendome , Computer Science Department, The College of William and Mary, Williamsburg, Virginia United States (e-mail: cgvendome@email.wm.edu)
Giuseppe Scanniello , Dipartimento di Matematica e Informatica, Università della Basilicata, Potenza, Italy Italy 85100 (e-mail: gscanniello@unisa.it)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Identifying failure-causing schemas in the presence of multiple faults (Abstract)

Xintao Niu , computer science and technology, Nanjing University, Nanjing, Jiangsu China 210023 (e-mail: niuxintao@gmail.com)
Nie Changhai , computer science and technology, Nanjing University, nanjing, Jiangsu China 210096 (e-mail: changhainie@nju.edu.cn)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)
Xiaoyin Wang , Computer Science, University of Texas at San Antonio, San Antonio, Texas United States 78249 (e-mail: xiaoyin.wang@utsa.edu)

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving (Abstract)

Julian Thome , SnT, University of Luxembourg, Luxembourg, LU Luxembourg (e-mail: julian.thome@uni.lu)
Lwin Khin Shar , SnT Centre, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg (e-mail: shar@svv.lu)
Domenico Bianculli , SnT, University of Luxembourg, Luxembourg, LU Luxembourg 2721 (e-mail: domenico.bianculli@uni.lu)
Lionel Briand , SnT Centre, University of Luxembourg, Luxembourg, Luxembourg Luxembourg 2721 (e-mail: lionel.briand@uni.lu)

Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps (Abstract)

Kevin Patrick Moran , Computer Science, College of William & Mary, Williamsburg, Virginia United States 23185 (e-mail: kpmoran@cs.wm.edu)
Carlos Bernal-Cardenas , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: cebernal@cs.wm.edu)
Michael Curcio , Computer Science, College of William & Mary, Williamsburg, Virginia United States (e-mail: mjcurcio@email.wm.edu)
Richard Bonett , Computer Science, College of William & Mary, Williamsburg, Virginia United States (e-mail: rfbonett@email.wm.edu)
Denys Poshyvanyk , Computer Science, William and Mary, Williamsburg, Virginia United States 23188 (e-mail: denys@cs.wm.edu)

Safety Practices in Requirements Engineering: The Uni-REPM Safety Module (Abstract)

Jessyka Flavyanne Ferreira Vilela , Campus Quixadá, Universidade Federal do Ceara, 28121 Quixadá, CE Brazil (e-mail: jessykavilela@ufc.br)
Jaelson Castro , Ciência da Computação, Universidade Federal de Pernambuco, Recife, PE Brazil (e-mail: jbc@cin.ufpe.br)
Luiz Eduardo G. Martins , Departamento de Ciência e Tecnologia, Universidade Federal de Sao Paulo, 28105 São José dos Campos, SP Brazil (e-mail: legmartins@unifesp.br)
Tony Gorschek , Department of Systems and Software Engineering, Blekinge Institute of Technology, Karlskrona, Blekinge Sweden SE-371 79 (e-mail: tony.gorschek@bth.se)

Automated Selection of Optimal Model Transformation Chains via Shortest-Path Algorithms (Abstract)

Francesco Basciani , Computer Science, Universita degli Studi dell'Aquila Dipartimento di Ingegneria Industriale e dell'Informazione e di Economia, 90345 L'Aquila, Abruzzo Italy (e-mail: francesco.basciani@graduate.univaq.it)
Mattia DEmidio , Computer Science, Gran Sasso Science Institute, 476635 L'aquila, L'Aquila Italy (e-mail: mattia.demidio@gssi.it)
Davide Di Ruscio , Department of Information Engineering Computer Science and Mathematics, University of L'Aquila, L'Aquila, AQ Italy 67100 (e-mail: davide.diruscio@univaq.it)
Daniele Frigioni , Dept. of Electrical and Information Engineering, University of L'Aquila, L'Aquila, aq Italy (e-mail: daniele.frigioni@univaq.it)
Ludovico Iovino , Computer Science, Gran Sasso Science Institute, l'aquila, aq Italy 67100 (e-mail: ludovico.iovino@gssi.it)
Alfonso Pierantonio , Department of Information Engineering Computer Science and Mathematics, University of L'Aquila, L'Aquila, Abruzzo Italy (e-mail: alfonso.pierantonio@univaq.it)

Incentivizing Deep Fixes in Software Economies (Abstract)

Malvika Rao , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States 02138 (e-mail: malvikar@gmail.com)
David F. Bacon , Software, Google Inc New York, 470984 New York, New York United States (e-mail: dfb@google.com)
David Parkes , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States (e-mail: parkes@eecs.harvard.edu)
Margo Seltzer , John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts United States (e-mail: margo@eecs.harvard.edu)

Analyzing the Effects of Bugs on Software Interfaces (Abstract)

Roberto Natella , Dipartimento di Informatica e Sistemistica, Universita degli Studi di Napoli Federico II, Napoli, Napoli Italy 80125 (e-mail: roberto.natella@unina.it)
Stefan Winter , DEEDS, TU Darmstadt, Darmstadt, Hessen Germany 64289 (e-mail: sw@cs.tu-darmstadt.de)
Domenico Cotroneo , Computer and System engineering, University of Naples federico II, Naples, Italy Italy 80125 (e-mail: cotroneo@unina.it)
Neeraj Suri , Dept. of Computer Science, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: suri@cs.tu-darmstadt.de)

Requirements Engineering for Safety-Critical Systems: An Interview Study with Industry Practitioners (Abstract)

Luiz Eduardo G. Martins , Department of Science and Technology, Federal University of Sao Paulo, Sao Jose dos Campos, Sao Paulo Brazil (e-mail: martinsleg@hotmail.com)
Tony Gorschek , Department of Systems and Software Engineering, Blekinge Institute of Technology, Karlskrona, Blekinge Sweden SE-371 79 (e-mail: tony.gorschek@bth.se)

An Empirical Comparison of Combinatorial Testing, Random Testing and Adaptive Random Testing (PDF)

Huayao Wu , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: hywu@smail.nju.edu.cn)
nie changhai , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: changhainie@nju.edu.cn)
Justyna Petke , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: j.petke@ucl.ac.uk)
Yue Jia , Facebook, Facebook Inc., London, London United Kingdom of Great Britain and Northern Ireland (e-mail: yue.jia@ucl.ac.uk)
Mark Harman , Facebook, Facebook Inc., London, London United Kingdom of Great Britain and Northern Ireland (e-mail: mark.harman@ucl.ac.uk)

A framework for quantitative modeling and analysis of highly (re)configurable systems (Abstract)

Maurice Ter Beek , ISTI, CNR, Pisa, Pisa Italy 56124 (e-mail: maurice.terbeek@isti.cnr.it)
Axel Legay , computer science, Inria, Rennes, Britany France 35000 (e-mail: axel.legay@inria.fr)
Alberto Lluch Lafuente , Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Hovedstaden Denmark (e-mail: albl@dtu.dk)
Andrea Vandin , Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Hovedstaden Denmark (e-mail: anvan@dtu.dk)

A Framework for Temporal Verification Support in Domain-Specific Modelling (Abstract)

Bart Meyers , Codesign & Optimization, Flanders Make vzw, Leuven, Vlaams Brabant Belgium (e-mail: bart.meyers@flandersmake.be)
Hans Vangheluwe , Computer Science and Mathematics, Universiteit Antwerpen, 26660 Antwerpen, Antwerpen Belgium (e-mail: hv@cs.mcgill.ca)
Joachim Denil , Computer Science and Mathematics, Universiteit Antwerpen, 26660 Antwerpen, Antwerpen Belgium (e-mail: joachim.denil@uantwerpen.be)
Rick Salay , Computer Science, University of Toronto, 7938 Toronto, Ontario Canada M5S 3G4 (e-mail: rsalay@cs.toronto.edu)

On the Understandability of Temporal Properties Formalized in Linear Temporal Logic, Property Specification Patterns and Event Processing Language (Abstract)

Christoph Czepa , Faculty of Computer Science, Research Group Software Architecture, University of Vienna, Vienna, Vienna Austria (e-mail: christoph.czepa@univie.ac.at)
Uwe Zdun , Faculty of Computer Science, Research Group Software Architecture, University of Vienna, Vienna, Vienna Austria (e-mail: uwe.zdun@univie.ac.at)

Extending Abstract Interpretation to Dependency Analysis of Database Applications (Abstract)

Angshuman Jana , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: janaangshuman@gmail.com)
Raju Halder , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: halder@iitp.ac.in)
Abhishekh Kalahasti , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: kalahasti.cs13@iitp.ac.in)
Sanjivani Ganni , Computer Science & Engineering, Indian Institute of Technology Patna Department of Computer Science and Engineering, 250392 Patna, Bihar India (e-mail: ganni.cs13@iitp.ac.in)
Agostino Cortesi , Computer Science, University Ca' Foscari di Venezia, Venezia, VE Italy 30170 (e-mail: cortesi@unive.it)

Leveraging Historical Associations between Requirements and Source Code to Identify Impacted Classes (Abstract)

Davide Falessi , Computer Science, California Polytechnic State University, San Luis Obispo, California United States (e-mail: d.falessi@gmail.com)
Justin Roll , Computer Science and Software Engineering, California Polytechnic State University College of Engineering, 306564 San Luis Obispo, California United States (e-mail: jroll@calpoly.edu)
Jin L.C. Guo , Computer Science, McGill University, Montreal, Quebec Canada (e-mail: jguo@cs.mcgill.ca)
Jane Cleland-Huang , Computer science, University of Notre Dame, South Bend, Illinois United States (e-mail: JaneClelandHuang@nd.edu)

Analyzing Families of Experiments in SE: a Systematic Mapping Study (Abstract)

Adrian Santos , M-Group, University of Oulu, Oulu, Oulu Finland (e-mail: Adrian.Santos.Parrilla@oulu.fi)
Omar S. Gomez , Facultad de Informática y Electrónica, Escuela Superior Politécnica de Chimborazo, Riobamba, Chimborazo Ecuador 060106 (e-mail: ogomez@espoch.edu.ec)
Natalia Juristo , Escuela Técnica Superior de Ingenieros Informáticos, Universidad Politecnica de Madrid, Boadilla del Monte, Madrid Spain 28660 (e-mail: natalia@fi.upm.es)

Observation-Enhanced QoS Analysis of Component-Based Systems (Abstract)

Colin Alexander Paterson , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5GH (e-mail: colin.paterson@york.ac.uk)
Radu Calinescu , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: radu.calinescu@york.ac.uk)

Chaff from the Wheat: Characterizing and Determining Valid Bug Reports (Abstract)

Yuanrui Fan , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yrfan@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)

On Scheduling Constraint Abstraction for Multi-Threaded Program Verification (Abstract)

Liangze Yin , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: yinliangze@163.com)
Wei Dong , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: wdong@nudt.edu.cn)
Wanwei Liu , School of Computer, National University of Defense Technology, 58294 Changsha, Hunan China (e-mail: wwliu@nudt.edu.cn)
Ji Wang , School of Computer, National University of Defense Technology, Changsha, Hunan China (e-mail: wj@nudt.edu.cn)

A Combinatorial Testing-Based Approach to Fault Localization (Abstract)

Laleh Sh. Ghandehari , Computer Science and Engineering, University of Texas at Arlington, 12329 Arlington, Texas United States 76019 (e-mail: laleh.shikhgholamhosseing@mavs.uta.edu)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Raghu Kacker , math division, National Institute of Standards & Technology, Gaithersburg, Maryland United States (e-mail: raghu.kacker@nist.gov)
D. Richard Rick Kuhn , computer security division, National Institute of Standards & Technology, Gaithersburg, Maryland United States 20899 (e-mail: kuhn@nist.gov)
David Kung , Computer Science and Engineering, University of Texas at Arlington, Arlington, Texas United States 76019-0015 (e-mail: kung@uta.edu)
Tao Xie , Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, Illinois United States 61801 (e-mail: taoxie@illinois.edu)

An interleaving approach to combinatorial testing and failure-inducing interaction identification (PDF)

Xintao Niu , computer science and technology, Nanjing University, Nanjing, Jiangsu China 210023 (e-mail: niuxintao@gmail.com)
nie changhai , computer science and technology, Nanjing University, nanjing, Jiangsu China 210096 (e-mail: changhainie@nju.edu.cn)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)
Yu Lei , Computer Science and Engineering, The University of Texas at Arlington, Arlington, Texas United States 76019 (e-mail: ylei@cse.uta.edu)
Xiaoyin Wang , Computer Science, University of Texas at San Antonio, San Antonio, Texas United States 78249 (e-mail: xiaoyin.wang@utsa.edu)
Jiaxi Xu , School of Information Engineering, Nanjing Xiaozhuang University, Nanjing, Jiangsu China (e-mail: xujiaxi@njxzc.edu.cn)
Yan Wang , School of Information Engineering, Nanjing Xiaozhuang University, Nanjing, Jiangsu China (e-mail: wangyan@njxzc.edu.cn)

Software Configuration Engineering in Practice: Interviews, Survey, and Systematic Literature Review (Abstract)

Mohammed Sayagh , Génie informatique et génie logiciel, Ecole Polytechnique, Montreal, Quebec Canada (e-mail: mohammed.sayagh@polymtl.ca)
Noureddine Kerzazi , Software engineering, the Ecole Nationale Superieure d'Informatique et d'Analyse des Systemes (ENSIAS), Rabat, Rabat Morocco (e-mail: n.kerzazi@um5s.net.ma)
Bram Adams , Genie Informatique et Genie Logiciel, Ecole Polytechnique de Montreal, Montreal, Quebec Canada H3T 1J4 (e-mail: bram.adams@polymtl.ca)
Fabio Petrillo , Software Engineering, Ecole Polytechnique de Montreal, 5596 Montreal, Quebec Canada H3T 1J4 (e-mail: fabio@petrillo.com)

A Test Case Prioritization Genetic Algorithm guided by the Hypervolume Indicator (Abstract)

Dario Di Nucci , Department of Computer Science, Vrije Universiteit Brussel, 70493 Brussels, Brussels Belgium (e-mail: dario.di.nucci@vub.be)
Annibale Panichella , Software Engineering Research Group, Technische Universiteit Delft, 2860 Delft, Zuid-Holland Netherlands (e-mail: anni.panico@gmail.com)
Andy Zaidman , Software Engineering Research Group, Delft University of Technology, Delft, Zuid Holland Netherlands (e-mail: a.e.zaidman@tudelft.nl)
Andrea De Lucia , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy (e-mail: adelucia@unisa.it)

Automatic and Accurate Expansion of Abbreviations in Parameters (Abstract)

Yanjie Jiang , Computer Science and Technology, Beijing Institute of Technology, 47833 Beijing, China China (e-mail: 2990094974@qq.com)
Hui Liu , School of Computer Science and Technology, Beijing Institute of Technology, Beijing, Beijing China (e-mail: liuhui08@bit.edu.cn)
Jia Qi Zhu , Computer Science and Technology, Beijing Institute of Technology, 47833 Beijing, Beijing China (e-mail: zjqjessiechu@163.com)
Lu Zhang , Electronics Engineering and Computer Science, Peking University, Beijing, Beijing China 100871 (e-mail: zhanglu@sei.pku.edu.cn)

Ensuring the Observability of Structural Test Obligations (Abstract)

Ying Meng , Department of Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States (e-mail: ymeng@email.sc.edu)
Gregory Gay , Department of Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States 29208 (e-mail: greg@greggay.com)
Michael Whalen , Computer Science, University of Minnesota, Minneapolis, Minnesota United States 55455 (e-mail: whalen@cs.umn.edu)

How Practitioners Perceive Automated Bug Report Management Techniques (Abstract)

Weiqin Zou , State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: wqzou@smail.nju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Zhenyu Chen , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, Jiangsu China 210093 (e-mail: zychen@nju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
Yang Feng , Department of Informatics, University of California, Irvine, Irvine, California United States (e-mail: yang.feng@uci.edu)
Baowen Xu , Computer, Nanjing University, Nanjing, Jiangsu China (e-mail: bwxu@nju.edu.cn)

Finding Trends in Software Research (Abstract)

George Mathew , Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: george.meg91@gmail.com)
Amritanshu Agrawal , Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: aagrawa8@ncsu.edu)
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, West Virginia United States 26501 (e-mail: timm@ieee.org)

Tell you a Definite Answer: Whether Your Data is Tainted During Thread Scheduling (Abstract)

Xiaodong Zhang , computer science and technology, Xi'an Jiaotong University, Xi'an, Shaanxi China (e-mail: xdzhang@sei.xjtu.edu.cn)
Zijiang Yang , Computer Science, Western Michigan University, Kalamazoo, Michigan United States 49008 (e-mail: zijiang.yang@wmich.edu)
Qinghua Zheng , computer science and technology, Xi'an Jiaotong University, Xi'an, Shaanxi China 710049 (e-mail: qhzheng@mail.xjtu.edu.cn)
Yu Hao , computer science and technology, Xi'an Jiaotong University, Xi'an, Shaanxi China (e-mail: yhao@sei.xjtu.edu.cn)
Pei Liu , computer science and technology, Xi'an Jiaotong University, Xi'an, Shaanxi China (e-mail: pliu@sei.xjtu.edu.cn)
Ting Liu , Control, System Engineering Institute, Xi'an, Shaanxi China 710049 (e-mail: tingliu@mail.xjtu.edu.cn)

ARJA: Automated Repair of Java Programs via Multi-Objective Genetic Programming (Abstract)

Yuan Yuan , Computer Science and Engineering, Michigan State University, East Lansing, Michigan United States (e-mail: yyxhdy@gmail.com)
Wolfgang Banzhaf , Computer Science and Engineering, Michigan State University, East Lansing, Michigan United States (e-mail: banzhafw@msu.edu)

Changeset-Based Topic Modeling of Software Repositories (Abstract)

Christopher S. Corley , Department of Computer Science, The University of Alabama, Tuscaloosa, Alabama United States (e-mail: cscorley@crimson.ua.edu)
Kostadin Damevski , Department of Computer Science, Virginia Commonwealth University, Richmond, Virginia United States 23284 (e-mail: damevski@acm.org)
Nicholas A. Kraft , N/A, ABB Corporate Research, Raleigh, North Carolina United States (e-mail: nicholas.a.kraft@us.abb.com)

Uncovering the Periphery: A Qualitative Survey of Episodic Volunteering in Free/Libre and Open Source Software Communities (PDF)

Ann Barcomb , Lero, University of Limerick, 8808 Limerick, Co Limerick Ireland (e-mail: ann@barcomb.org)
Andreas Kaufmann , Department of Computer Science, Friedrich-Alexander University Erlangen-Nürnberg, Erlangen, Bavaria Germany (e-mail: andreas.kaufmann@fau.de)
Dirk Riehle , Computer Science, Friedrich-Alexander-Universitat Erlangen-Nurnberg, 9171 Erlangen, Bavaria Germany 91058 (e-mail: dirk@riehle.org)
Klaas-Jan Stol , Computer Science, University College Cork, Cork, Cork Ireland (e-mail: kjstol@gmail.com)
Brian Fitzgerald , Lero - the Irish Software Research centre, University of Limerick, Limerick, Limerick Ireland (e-mail: bf@ul.ie)

Metamorphic Relations for Enhancing System Understanding and Use (Abstract)

Zhi Quan Zhou , School of Computing and Information Technology, University of Wollongong, Wollongong, New South Wales Australia (e-mail: zhiquan@uow.edu.au)
Liqun Sun , School of Computing and Information Technology, University of Wollongong, Wollongong, New South Wales Australia (e-mail: ls168@uowmail.edu.au)
Tsong Yueh Chen , Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, Victoria Australia (e-mail: tychen@swin.edu.au)
Dave Towey , School of Computer Science, University of Nottingham Ningbo China, Ningbo, Zhejiang China (e-mail: dave.towey@nottingham.edu.cn)

How Well Do Change Sequences Predict Defects? Sequence Learning from Software Changes (Abstract)

Ming Wen , Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, Hong Kong China (e-mail: mwenaa@cse.ust.hk)
Rongxin Wu , Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, Hong Kong Hong Kong (e-mail: wurongxin@cse.ust.hk)
S.C. Cheung , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon Hong Kong (e-mail: scc@cse.ust.hk)

Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding (Abstract)

Xiaochen Li , School of Software, Dalian University of Technology, 12399 Dalian, Liaoning China (e-mail: li1989@mail.dlut.edu.cn)
He Jiang , School of Software, Dalian University of Technology, Dalian, Liaoning China (e-mail: jianghe@dlut.edu.cn)
Yasutaka Kamei , Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Fukuoka Japan 819-0395 (e-mail: kamei@ait.kyushu-u.ac.jp)
Xin Chen , School of Computer Science and Technology, Hangzhou Dianzi University, 12626 Hangzhou, Zhejiang China (e-mail: chenxin4391@mail.dlut.edu.cn)

Automating Intention Mining (Abstract)

Qiao Huang , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: tkdsheep@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Gail C. Murphy , Computer Science, University of British Columbia, Vancouver, British Columbia Canada V6T 1Z4 (e-mail: murphy@cs.ubc.ca)

Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps (Abstract)

Lili Wei , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, Hong Kong Hong Kong (e-mail: lweiae@cse.ust.hk)
Yepang Liu , Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, Guangdong China (e-mail: andrewust@cse.ust.hk)
S.C. Cheung , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon Hong Kong (e-mail: scc@cse.ust.hk)
Huaxun Huang , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon Hong Kong (e-mail: hhuangas@cse.ust.hk)
Xuan Lu , School of EECS, Peking University, Beijing, Beijing China (e-mail: luxuan@pku.edu.cn)
Xuanzhe Liu , Institute of Software, Peking University, Beijing, Beijing China 100871 (e-mail: liuxuanzhe@pku.edu.cn)

The Impact of Class Rebalancing Techniques on the Performance and Interpretation of Defect Prediction Models (Abstract)

Chakkrit Tantithamthavorn , Faculty of Information Technology, Monash University Faculty of Information Technology, 224480 Clayton, Victoria Australia (e-mail: chakkrit.tantithamthavorn@monash.edu)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)
Kenichi Matsumoto , Information Systems, Nara Institute of Science and Technology, Information Systems, Ikomashi, Naraken Japan (e-mail: matumoto@is.naist.jp)

Dynamic Update of Discrete Event Controllers (Abstract)

Leandro Nahabedian , Departamento de Computación, Universidad de Buenos Aires Facultad de Ciencias Exactas y Naturales, 117139 Ciudad Autónoma de Buenos Aires, Ciudad Autónoma de Buenos Aires Argentina (e-mail: lnahabedian@dc.uba.ar)
Victor Braberman , Departamento de Computación, FCEyN, Universidad de Buenos Aires, Ciudad Autónoma de Buenos Aires, Ciudad Autónoma de Buenos Aires Argentina (e-mail: vbraber@dc.uba.ar)
Nicolas DIppolito , Departamento de Computación, Universidad de Buenos Aires Facultad de Ciencias Exactas y Naturales, 117139 Ciudad Autónoma de Buenos Aires, Ciudad Autónoma de Buenos Aires Argentina (e-mail: ndippolito@dc.uba.ar)
Shinichi Honiden , Research Division, NII, Tokyo, Chiyoda-ku Japan (e-mail: honiden@nii.ac.jp)
Jeff Kramer , Computing, Imperial College, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: j.kramer@imperial.ac.uk)
Kenji Tei , Research Division, NII, Tokyo, Chiyoda-ku Japan (e-mail: tei@nii.ac.jp)
Sebastian Uchitel , Departamento de Computación, Universidad de Buenos Aires Facultad de Ciencias Exactas y Naturales, 117139 Ciudad Autónoma de Buenos Aires, Ciudad Autónoma de Buenos Aires Argentina (e-mail: suchitel@dc.uba.ar)

Deep Semantic Feature Learning for Software Defect Prediction (Abstract)

Song Wang , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: song.wang@uwaterloo.ca)
Taiyue Liu , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada (e-mail: t67liu@uwaterloo.ca)
Jaechang Nam , Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, - Hong Kong - (e-mail: jcnam@postech.edu)
Lin Tan , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: lintan@uwaterloo.ca)

Perceptions, Expectations, and Challenges in Defect Prediction (Abstract)

Zhiyuan Wan , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: wanzhiyuan@zju.edu.cn)
Xin Xia , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xxkidd@zju.edu.cn)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Jianwei Yin , Computer science and technology, Zhejiang University, Hangzhou, Zhejiang Province China 310027 (e-mail: zjuyjw@cs.zju.edu.cn)
Xiaohu Yang , College of Computer Science, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yangxh@zju.edu.cn)

Search-Based Crash Reproduction and Its Impact on Debugging (Abstract)

Mozhan Soltani , Software Technology, Technische Universiteit Delft, 2860 Delft, Delft Netherlands (e-mail: m.soltani@tudelft.nl)
Annibale Panichella , Centre Interdisciplinary for Security, Reliability and Trust, Universite du Luxembourg, 81872 Luxembourg, Luxembourg Luxembourg L-2721 (e-mail: anni.panico@gmail.com)
Arie Van Deursen , EEMCS / ST / SE, Delft University of Technology, Delft, ZH Netherlands 2628 CD (e-mail: arie.vandeursen@tudelft.nl)

Cognitive Biases in Software Engineering: A Systematic Mapping Study (Abstract)

Rahul Mohanani , Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Oulu Finland (e-mail: rahul.mohanani@oulu.fi)
Iflaah Salman , M3S, Oulun Yliopisto Teknillinen Tiedekunta, 101225 Oulu, Northern Ostrobothnia Finland 90014 (e-mail: iflaah.salman@oulu.fi)
Burak Turhan , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: turhanb@computer.org)
Pilar Rodriguez , Department of Information Processing Sciences, University of Oulu, Oulu, Oulu Finland 90014 (e-mail: pilar.rodriguez@oulu.fi)
Paul Ralph , Department of Computer Science, University of Auckland, 1415 Auckland, Auckland New Zealand (e-mail: p.ralph@auckland.ac.nz)

Key Stakeholders' Value Propositions for Feature Selection in Software-intensive Products: An Industrial Case Study (Abstract)

Pilar Rodriguez , Department of Information Processing Sciences, University of Oulu, Oulu, Oulu Finland 90014 (e-mail: pilar.rodriguez@oulu.fi)
Emilia Mendes , Computer Science, Blekinge Tekniska Hogskola, 4206 Karlskrona, Blekinge Sweden 371 79 (e-mail: emilia.mendes@bth.se)
Burak Turhan , Computer Science, Brunel University, 3890 Uxbridge, Middlesex United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: turhanb@computer.org)

Platform-Independent Dynamic Taint Analysis for JavaScript (Abstract)

Rezwana Karim , CSIC, Samsung Research America, Mountain View, California United States (e-mail: rezwana.k@samsung.com)
Frank Tip , College of Computer and Information Science, Northeastern University, Boston, Massachusetts United States 02115-5005 (e-mail: f.tip@northeastern.edu)
Alena Sochurkova , N/A, Avast, Prague, N/A Czech Republic (e-mail: sochuale@fit.cvut.cz)
Koushik Sen , EECS, University of California Berkeley, Berkeley, California United States (e-mail: ksen@berkeley.edu)

Symbolic Refinement of Extended State Machines with Applications to the Automatic Derivation of Sub-Components and Controllers (Abstract)

Khaled El-Fakih , Computer Science and Engineering, American University of Sharjah, Sharjah, Sharjah United Arab Emirates 26666 (e-mail: kelfakih@aus.edu)
Gregor von Bochmann , School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Ontario Canada (e-mail: bochmann@uottawa.ca)

A Model-Integrated Approach to Designing Self-Protecting Systems (Abstract)

Stefano Iannucci , Computer Science and Engineering, Mississippi State University, Starkville, Mississippi United States (e-mail: stefano@dasi.msstate.edu)
Sherif Abdelwahed , Electrical and Computer Engineering, Virginia Commonwealth University, Richmond, Virginia United States (e-mail: sabdelwahed@vcu.edu)
Andrea Montemaggio , Center for Cyber Innovation, Mississippi State University, Starkville, Mississippi United States (e-mail: am4691@cci.msstate.edu)
Melissa Hannis , Center for Cyber Innovation, Mississippi State University, Starkville, Mississippi United States (e-mail: mkh149@cci.msstate.edu)
Leslie Leonard , High Performance Modernization Program, U.S. Army Engineer Research and Development Center (ERDC), Vicksburg, Mississippi United States (e-mail: Leslie.C.Leonard@erdc.dren.mil)
Jason King , High Performance Modernization Program, U.S. Army Engineer Research and Development Center (ERDC), Vicksburg, Mississippi United States (e-mail: Jason.S.King@erdc.dren.mil)
John Hamilton , Center for Cyber Innovation, Mississippi State University, Starkville, Mississippi United States (e-mail: hamilton@cci.msstate.edu)

A systematic literature review on bad smells — 5 W's: which, when, what, who, where (Abstract)

Elder Vicente de Paulo Sobrinho , Department of Electrical Engineering, Federal University of Triangulo Mineiro, Uberaba, Minas Gerias Brazil 38064-200 (e-mail: eldereng@hotmail.com)
Andrea De Lucia , Dipartimento di Matematica e Informatica, University di Salerno, Fisciano, Salerno Italy 84084 (e-mail: adelucia@unisa.it)
Marcelo de Almeida Maia , Faculty of Computing, Federal University of Uberlandia, Uberlandia, Minas Gerais Brazil (e-mail: marcelo.maia@ufu.br)
81 ms
(Ver 3.3 (11022016))