IEEE International Conference on Software Analysis, Evolution and Reengineering

Research Track


Xiaoyuan Xie , Haolin Yang , Qiang He , Lin Chen . Towards Understanding Tool-chain Bugs in the LLVM Compiler Infrastructure
Rrezarta Krasniqi , Ankit Agrawal . Analyzing and Detecting Emerging Quality-Related Concerns across OSS Defect Report Summaries
Yun Peng , Yu Zhang , Mingzhe Hu . An Empirical Study for Common Language Features Used in Python Projects
Chunyang Ling , Yanzhen Zou , Bing Xie . Graph Neural Network based Collaborative Filtering for API Usage Recommendation
Deze Wang , Yue Yu , Shanshan Li , Wei Dong , Ji Wang , Qing Liao . MulCode: A Multi-task Learning Approach for Source Code Understanding
Aakash Bansal , Zachary Eberhart , Lingfei Wu , Collin McMillan . A Neural Question Answering System for Basic Questions about Subroutines
Hao He , Yulin Xu , Yixiao Ma , Yifei Xu , Guangtai Liang , Minghui Zhou . A Multi-Metric Ranking Approach for Library Migration Recommendations
Xiangdong Kong , Yong Tang , Pengfei Wang , Shuning Wei , Tai Yue . HashMTI: Scalable Mutation-based Taint Inference with Hash Records
Deheng Yang , Yan Lei , Xiaoguang Mao , David Lo , Huan Xie , Meng Yan . Is the Ground Truth Really Accurate? Dataset Purification for Automated Program Repair
Xumei Li , Lei Sun , Ruobing Jiang , Haipeng Qu , Zhen Yan . OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing
Di Wu , Xiao-Yuan Jing , Hongyu Zhang , Yuming Zhou , Baowen Xu . Leveraging Stack Overflow to Discover Relevant Tutorial Fragments of APIs
Tristan Benoit , Jean-Yves Marion , Sébastien Bardin . Binary level toolchain provenance identification with graph neural networks
Felipe Rego Pinto , Bruno Costa , Leonardo Murta . Assessing time-based and range-based strategies for commit assignment to releases
Jose Carlos Pazos , Ivan Beschastnikh , Jean-Sebastien Legare . XSnare: Application-specific client-side cross-site scripting protection
Juan Manuel Florez , Oscar Chaparro , Christoph Treude , Andrian Marcus . Combining Query Reduction and Expansion for Text-Retrieval-Based Bug Localization
Xin Zhao , Jeff Gray , Taylor Riche . A Survey-Based Empirical Evaluation of Bad Smells in LabVIEW Systems Models
Zhiyang Zhou , Wensheng Dou , Jie Liu , Chenxin Zhang , Jun Wei , Dan Ye . DeepCon: Contribution Coverage Testing for Deep Learning Systems
Zack Coker , Claire Le Goues , Joshua Sunshine . FrameFix: Automatically Repairing Statically-Detected Directive Violations in Framework Applications
Yang Xiao , Zhengzi Xu , Weiwei Zhang , Chendong Yu , Longquan Liu , Wei Zou , Zimu Yuan , Yang Liu , Aihua Piao , Wei Huo . VIVA: Binary Level Vulnerability Identification via Partial Signature
Bin Hu , Yijian Wu , Xin Peng , Jun Sun , Nanjie Zhan , Jun Wu . Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures
Anna Maria Eilertsen , Gail C. Murphy . The Usability (or Not) of Refactoring Tools
Marcel Steinbeck , Rainer Koschke . Javadoc Violations and Their Evolution in Open-Source Software
Bei Wang , Meng Yan , Zhongxin Liu , Ling Xu , Xin Xia , Xiaohong Zhang , Dan Yang . Quality Assurance for Automated Commit Message Generation
Sinan Wang , Ming Wen , Yepang Liu , Ying Wang , Rongxin Wu . Understanding and Facilitating the Co-Evolution of Production and Test Code
Jeongju Sohn , Yasutaka Kamei , Shane McIntosh , Shin Yoo . Leveraging Fault Localisation to Enhance Defect Prediction
Yihao Qin , Shangwen Wang , Kui Liu , Xiaoguang Mao , Tegawendé F. Bissyandé . On the Impact of Flaky Tests in Automated Program Repair
Andrea Mambretti , Pasquale Convertini , Alessandro Sorniotti , Alexandra Sandulescu , Engin Kirda , Anil Kurmus . GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers
Junaed Younus Khan , Md. Tawkat Islam Khondaker , Gias Uddin , Anindya Iqbal . Automatic Detection of Five API Documentation Smells: Practitioners' Perspectives
Sakib Haque , Aakash Bansal , Lingfei Wu , Collin McMillan . Action Word Prediction for Neural Source Code Summarization
Ling Xu , Huanhuan Yang , Chao Liu , Jianhang Shuai , Meng Yan , Yan Lei , Zhou Xu . Two-Stage Attention-Based Model for Code Search with Textual and Structural Features
Mohammed Latif Siddiq , Md. Rezwanur Rahman Jahin , Mohammad Rafid Ul Islam , Rifat Shahriyar , Anindya Iqbal . SQLIFIX: Learning Based Approach to Fix SQL Injection Vulnerabilities in Source Code
Béla Vancsics , Ferenc Horváth , Attila Szatmári , Árpád Beszédes . Call Frequency-Based Fault Localization
Wesley K. G. Assunção , Thelma E. Colanzi , Luiz Carvalho , Juliana Alves Pereira , Alessandro Garcia , Maria Julia de Lima , Carlos Lucena . A Multi-Criteria Strategy for Redesigning Legacy Features as Microservices: An Industrial Case Study
Kaylea Champion , Benjamin Mako Hill . Underproduction: An approach for measuring risk in open source software
Noah Mauthe , Ulf Kargén , Nahid Shahmehri . A Large-Scale Empirical Study of Android App Decompilation
Md. Shariful Islam , Abdelwahab Hamou-Lhadj , Korosh Koochekian-Sabor , Mohammad Hamdaqa , Haipeng Cai . EnHMM: On the Use of Ensemble HMMs and Stack Traces To Predict the Reassignment of Bug Report Fields
Amine Barrak , Ellis E. Eghan , Bram Adams . On the Co-evolution of ML Pipelines and Source Code - Empirical Study of DVC Projects
Mahmood Vahedi , Mohammad Masudur Rahman , Foutse Khomh , Gias Uddin , Giuliano Antoniol . Summarizing Relevant Parts from Technical Videos
Mahmoud Alfadel , Diego Elias Costa , Emad Shihab . Empirical analysis of security vulnerabilities in python packages
Zeyu Wang , Sheng Huang , Zhongxin Liu , Meng Yan , Xin Xia , Bei Wang , Dan Yang . Plot2API: Recommending Graphic API from Plot via Semantic Parsing Guided Neural Network
Xiangping Chen , Peiyong Liao , Yixin Zhang , Yuan Huang , Zibin Zheng . Understanding Code Reuse in Smart Contracts
Tarek Mahmud , Meiru Che , Guowei Yang . Android Compatibility Issue Detection Using API Differences

ERA Track


Sho Ogino , Yoshiki Higo , Shinji Kusumoto . Evaluating Bug Prediction under Realistic Settings
Yaroslav Golubev , Viktor Poletansky , Nikita Povarov , Timofey Bryksin . Multi-threshold token-based code clone detection
Hyuga Horiguchi , Itsuki Omori , Masao Ohira . Onboarding to Open Source Projects with Good First Issues: A Preliminary Analysis
Md. Shamsujjoha , John Grundy , Li Li , Hourieh Khalajzadeh , Qinghua Lu . Human-Centric Issues in eHealth App Development and Usage: A Preliminary Assessment
Hailemelekot Demtse Tessema , Surafel Lemma Abebe . Enhancing Just-in-Time Defect Prediction Using Change Request-based Metrics
Heidi Hokka , Felix Dobslaw , Jonathan Bengtsson . Linking Developer Experience to Coding Style in Open-Source Repositories
Moeen Ali Naqvi , Merve Astekin , Sehrish Malik , Leon Moonen . Adaptive Immunity for Software: Towards Autonomous Self-healing Systems
Mahshid Naghashzadeh , Amir Haghshenas , Ashkan Sami , David Lo . How Do Users Answer MATLAB Questions on Q&A Sites? A Case Study on Stack Overflow and MathWorks
Moataz Chouchen , Ali Ouni , Raula Gaikovina Kula , Dong Wang , Patanamon Thongtanunam , Mohamed Wiem Mkaouer , Kenichi Matsumoto . Anti-patterns in Modern Code Review: Symptoms and Prevalence
Aquilas Tchanjou Njomou , Alexandra Johanne Bifona Africa , Bram Adams , Marios Fokaefs . MSR4ML: Reconstructing artifact traceability in Machine Learning repositories
Yuki Ueda , Takashi Ishio , Kenichi Matsumoto . Automatically Customizing Static Analysis Tools to Coding Rules Really Followed by Developers
Cezar Sas , Andrea Capiluppi . Using Structural and Semantic Information to Identify Software Components

Tool Track


Simone Romano , Maria Caulo , Matteo Buompastore , Leonardo Guerra , Anas Mounsif , Michele Telesca , Maria Teresa Baldassarre , Giuseppe Scanniello . G-Repo: a Tool to Support MSR Studies on GitHub
Carmen Coviello , Simone Romano , Giuseppe Scanniello , Giuliano Antoniol . GASSER
Martin Schröer , Rainer Koschke . Recording, Visualising and Understanding Developer Programming Behaviour
Daniel Althviz , Kelly Garcés , Jaime Chavarriaga . ClarchMap: API-oriented reconstruction of architecture for cloud-based systems
Marcel Steinbeck , Rainer Koschke . TinySpline: A Small, yet Powerful Library for Interpolating, Transforming, and Querying NURBS, B-Splines, and Bézier Curves
Mathias Birrer , Pooja Rani , Sebastiano Panichella , Oscar Nierstrasz . Makar: A Framework for Multi-source Studies based on Unstructured Data

Industry Track


Pradeep Waychal , Luiz Fernando Capretz , Jingdong Jia , Yadira Lizama , Daniel Varona . Practitioners’ Testimonials about Software Testing
Armando Sousa , Ricardo Britto , Zhixiong Gong , Feng Lyu , Lincoln Rocha . Technical Debt in Large-Scale Distributed Projects: An Industrial Case Study
Ruben Opdebeeck , Johan Fabry , Tim Molderez , Jonas De Bleser , Coen De Roover . Mining for Graph-Based Library Usage Patterns in COBOL Systems
Hamid Khodabandehloo , Banani Roy , Chanchal Roy , Kevin Schneider , Mashankar Mondal . A Testing Approach While Re-engineering Legacy Systems: An Industrial Case Study
Sávio Freire , Nicolli Rios , Boris Pérez , Darío Correal , Manoel Mendonça , Clemente Izurieta , Carolyn Seaman , Rodrigo Spinola . How do Technical Debt Payment Practices Relate to the Effects of the Presence of Debt Items in Software Projects?

RENE Track


Jacob Krüger , Gul Calikli , Thorsten Berger , Thomas Leich . How Explicit Feature Traces Did Not Impact Developers’ Memory
Liming Fu , Peng Liang , Li Xueying , Chen Yang . Will Data Influence the Experiment Results? A Replication Study of Automatic Identification of Decisions

Journal First Track


Christian Newman , Reem Alsuhaibani , Michael J. Decker , Anthony Peruma , Dishant Kaushik , Mohamed Wiem Mkaouer , Emily Hill . On the Generation, Structure, and Semantics of Grammar Patterns in Source Code Identifiers
Eman Alomar , Mohamed Wiem Mkaouer , Ali Ouni . Toward the Automatic Classification of Self-Affirmed Refactoring
Riccardo Rubei , Claudio Di Sipio , Phuong Nguyen , Juri Di Rocco , Davide Di Ruscio . PostFinder: Mining Stack Overflow posts to support software developers