Research Track
Accepted Papers
Author registration deadline: 01 July 2022
On the Use of GitHub Actions in Software Development Repositories |
Alexandre Decan, Tom Mens, Pooya Rostami Mazrae and Mehdi Golzadeh |
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs |
Wai Kin Wong, Huaijin Wang, Pingchuan Ma, Shuai Wang, Mingyue Jiang, Tsong Yueh Chen, Qiyi Tang, Sen Nie and Shi Wu |
Exploring the Notion of Risk in Reviewer Recommendation |
Seyyedfarshad Kazemi, Maxime Lamothe and Shane McIntosh |
RMove: Recommending Move Method Refactoring Opportunities using Structural and Semantic Representations of Code |
Di Cui, Siqi Wang, Yong Luo, Xingyu Li, Jie Dai, Lu Wang and Qingshan Li |
BASHEXPLAINER: Retrieval-Augmented Bash Code Comment Generation based on Fine-tuned CodeBERT |
Chi Yu, Guang Yang, Xiang Chen, Ke Liu and Yanlin Zhou |
What Is Thrown? Lightweight Precise Automatic Extraction of Exception Preconditions in Java Methods |
Diego Marcilio and Carlo A. Furia |
An Empirical Study on the Fault-Inducing Effect of Functional Constructs in Python |
Fiorella Zampetti, François Belias, Cyrine Zid, Giuliano Antoniol and Massimiliano Di Penta |
Cross-Modal Contrastive Learning for Code Search |
Zejian Shi, Yun Xiong, Xiaolong Zhang, Yao Zhang, Shanshan Li and Yangyong Zhu |
Is Kernel Code Different From Non-Kernel Code? A Case Study of BSD Family Operating Systems |
Gunnar Kudrjavets, Jeff Thomas, Nachiappan Nagappan and Ayushi Rastogi |
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis |
Qing Sun, Lili Xu, Wei Huo, Yang Xiao and Feng Li |
FFL: Fine grained Fault Localization for Student Programs via Syntactic and Semantic Reasoning |
Thanh-Dat Nguyen, Thanh Le-Cong, Duc-Minh Luong, Van-Hai Duong, Xuan-Bach D. Le, David Lo and Quyet-Thang Huynh |
Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues |
Mohammed Alhamed and Tim Storer |
On the Security of Python Virtual Machines: An Empirical Study |
Xinrong Lin, Baojian Hua and Qiliang Fan |
Guiding Automated Test Case Generation for Transaction-Reverting Statements in Smart Contracts |
Mitchell Olsthoorn, Arie van Deursen and Annibale Panichella |
An Effective Approach for Parsing Large Log Files |
Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Ait Mohamed and Mohammed Shehab |
Peeler: Learning to Effectively Predict Flakiness without Running Tests |
Yihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li, Xiaoguang Mao and Bissyandé Tegawendé F. |
What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness |
Sarra Habchi, Guillaume Haben, Jeongju Sohn, Adriano Franci, Mike Papadakis, Maxime Cordy and Yves Le Traon |
Quantifying the Potential to Automate the Synchronization of Variants in Clone-and-Own |
Alexander Schultheiß, Paul Maximilian Bittner, Thomas Thüm and Timo Kehrer |
An Empirical Study of Flaky Tests in JavaScript |
Negar Hashemi, Amjed Tahir and Shawn Rasheed |
An Empirical Study on Performance Bugs in Deep Learning Frameworks |
Tarek Makkouk, Dong Jae Kim and Tse-Hsun Peter Chen |
Stronger Together: On Combining Relationships in Architectural Recovery Approaches |
John Ahn, Evelien Boerstra and Julia Rubin |
The Energy Cost of the Visitor Pattern |
Déaglán Connolly Bree and Mel Ó Cinnéide |
An Empirical Study of Challenges in Converting Deep Learning Models |
Moses Openja, Amin Nikanjam, Ahmed Haj Yahmed, Foutse Khomh and Zhen Ming Jiang |
An Empirical Study on the Usage of Automated Machine Learning Tools |
Forough Majidi, Moses Openja, Foutse Khomh and Heng Li |
Automatic Pull Request Title Generation |
Ting Zhang, Ivana Clairine Irsan, Ferdian Thung, Donggyun Han, David Lo and Lingxiao Jiang |
Smart Money Wasting: Analyzing Gas Cost Drivers of Ethereum Smart Contracts |
Benedikt Severin, Marc Hesenius, Florian Blum, Michael Hettmer and Volker Gruhn |
INFUSE: Towards Efficient Context Consistency by Incremental-Concurrent Check Fusion |
Lingyu Zhang, Huiyan Wang, Chang Xu and Ping Yu |
Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching |
Jiamou Sun, Zhenchang Xing, Sherry Xu, Liming Zhu and Qinghua Lu |
Dazed and Confused: Studying the Prevalence of Atoms of Confusion in Long-Lived Java Libraries |
Wendell Mendes, Oton Pinheiro, Emanuele Santos, Lincoln Rocha and Windson Viana |
OpenCBS: An Open-Source COBOL Defects Benchmark Suite |
Dylan Lee, Austin Henley, Bill Hinshaw and Rahul Pandita |
Improving Fault Localization Using Model-domain Synthesized Failing Test Generation |
Zhuo Zhang, Yan Lei, Xiaoguang Mao, Meng Yan, Xin Xia and Xiaohong Zhang |