


Остановите войну!
for scientists:


default search action
35th ASE 2020: Melbourne, Australia
- 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, Melbourne, Australia, September 21-25, 2020. IEEE 2020, ISBN 978-1-4503-6768-4
- Marta Kwiatkowska:
Safety and Robustness for Deep Learning with Provable Guarantees. 1-3 - Gail C. Murphy:
Is Software Engineering Research Addressing Software Engineering Problems? (Keynote). 4-5 - Yueling Zhang, Geguang Pu, Jun Sun:
Accelerating All-SAT Computation with Short Blocking Clauses. 6-17 - Yu Huang, Benjamin Ogles, Eric Mercer:
A Predictive Analysis for Detecting Deadlock in MPI Programs. 18-28 - Jian Zhang, Xu Wang, Hongyu Zhang
, Hailong Sun, Yanjun Pu, Xudong Liu:
Learning to Handle Exceptions. 29-41 - Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng:
BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration. 42-53 - Dongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
LEGION: Best-First Concolic Testing. 54-65 - Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani:
Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent Data. 66-77 - Junjie Chen, Haoyang Ma, Lingming Zhang:
Enhanced Compiler Bug Isolation via Memoized Search. 78-89 - Bruce Collie
, Philip Ginsbach, Jackson Woodruff, Ajitha Rajan, Michael F. P. O'Boyle:
M3: Semantic API Migrations. 90-102 - Nic Volanschi, Julia Lawall:
The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel. 103-114 - Timotej Kapus, Frank Busse
, Cristian Cadar
:
Pending Constraints in Symbolic Execution for Better Exploration and Seeding. 115-126 - Sungho Lee, Hyogun Lee, Sukyoung Ryu
:
Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis. 127-137 - Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller
:
Assessing and Restoring Reproducibility of Jupyter Notebooks. 138-149 - Andreas Stahlbauer, Christoph Frädrich, Gordon Fraser:
Verified from Scratch: Program Analysis for Learners' Programs. 150-162 - Xingyu Zhao
, Radu Calinescu, Simos Gerasimou, Valentin Robu
, David Flynn
:
Interval Change-Point Detection for Runtime Probabilistic Model Checking. 163-174 - Daniel Ramos, Jorge Pereira, Inês Lynce
, Vasco M. Manquinho
, Ruben Martins:
UNCHARTIT: An Interactive Framework for Program Recovery from Charts. 175-186 - Hao Zhou
, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. 187-198 - Hao Zhou
, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. 199-210 - Pouria Derakhshanfar, Xavier Devroey
, Andy Zaidman, Arie van Deursen
, Annibale Panichella:
Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives. 211-223 - Qi Xin, Myeongsoo Kim, Qirun Zhang, Alessandro Orso:
Subdomain-Based Generality-Aware Debloating. 224-236 - Yiqun T. Chen, Rahul Gopinath, Anita Tadakamalla, Michael D. Ernst, Reid Holmes, Gordon Fraser, Paul Ammann, René Just:
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size. 237-249 - Andreas Katis, Grigory Fedyukovich, Jeffrey Chen, David A. Greve, Sanjai Rayadurgam, Michael W. Whalen:
Synthesis of Infinite-State Systems with Random Behavior. 250-261 - Benjamin Mariano, Yanju Chen, Yu Feng, Shuvendu K. Lahiri, Isil Dillig:
Demystifying Loops in Smart Contracts. 262-274 - Yangruibo Ding
, Baishakhi Ray, Premkumar T. Devanbu, Vincent J. Hellendoorn:
Patching as Translation: the Data and the Metaphor. 275-286 - Devjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli:
DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests. 287-298 - Mohammad Jafar Mashhadi, Hadi Hemmati:
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems. 299-311 - Jesse Bartels, Jon Stephens, Saumya Debray:
Representing and Reasoning about Dynamic Code. 312-323 - Navid Salehnamadi
, Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek:
ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android. 324-335 - Mingyang Li, Lin Shi
, Ye Yang, Qing Wang:
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum. 336-348 - Bolin Wei, Yongmin Li, Ge Li, Xin Xia, Zhi Jin:
Retrieve and Refine: Exemplar-based Neural Comment Generation. 349-360 - Zhenhao Li, Tse-Hsun Chen, Weiyi Shang:
Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks. 361-372 - Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang
, Dan Hao
, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems. 373-384 - Songqiang Chen
, Xiaoyuan Xie, Bangguo Yin, Yuanxiang Ji, Lin Chen, Baowen Xu
:
Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports. 385-397 - Zhe Liu
, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun Hu, Qing Wang:
Owl Eyes: Spotting UI Display Issues via Visual Understanding. 398-409 - Weijun Shen, Yanhui Li
, Lin Chen, Yuanlei Han, Yuming Zhou, Baowen Xu
:
Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining. 410-422 - Xiaoning Du, Yi Li
, Xiaofei Xie
, Lei Ma, Yang Liu, Jianjun Zhao:
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems. 423-435 - Hengcheng Zhu
, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung
, Qin Sheng, Cui Zhou:
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests. 436-447 - Anjana Perera
, Aldeida Aleti, Marcel Böhme, Burak Turhan
:
Defect Prediction Guided Search-Based Software Testing. 448-460 - Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu
, Jianling Sun:
API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph. 461-472 - Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin:
Multi-task Learning based Pre-trained Language Model for Code Completion. 473-485 - Qianyu Guo, Xiaofei Xie
, Yi Li
, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. 486-498 - Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang:
Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction. 499-510 - Martin Kellogg, Martin Schäf, Serdar Tasiran, Michael D. Ernst:
Continuous Compliance. 511-523 - Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie
, Xiaohong Li, Yang Liu, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. 524-535 - Haicheng Chen, Wensheng Dou, Dong Wang, Feng Qin:
CoFI: Consistency-Guided Fault Injection for Cloud Systems. 536-547 - Michael C. Gerten, James I. Lathrop, Myra B. Cohen, Titus H. Klinge:
ChemTest: An Automated Software Testing Framework for an Emerging Paradigm. 548-560 - Julian Frattini, Maximilian Junker, Michael Unterkalmsteiner, Daniel Méndez
:
Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts. 561-572 - Ke Li, Zilin Xiang, Tao Chen, Kay Chen Tan:
BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction. 573-584 - Zhongxin Liu, Xin Xia, Meng Yan, Shanping Li:
Automating Just-In-Time Comment Updating. 585-597 - Patrick Stöckle
, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. 598-610 - Stefan Mühlbauer, Sven Apel, Norbert Siegmund:
Identifying Software Performance Changes Across Variants and Versions. 611-622 - Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao:
CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs. 623-634 - Shahar Maoz, Ilia Shevrin:
Just-In-Time Reactive Synthesis. 635-646 - Jihyeok Park
, Jihee Park, Seungmin An, Sukyoung Ryu
:
JISET: JavaScript IR-based Semantics Extraction Toolchain. 647-658 - Yeting Li
, Zhiwu Xu, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung
, Haoren Zhao:
FlashRegex: Deducing Anti-ReDoS Regexes from Examples. 659-671 - Chengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng:
Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors. 672-683 - Johannes Dorn, Sven Apel, Norbert Siegmund:
Mastering Uncertainty in Performance Estimations of Configurable Software Systems. 684-696 - Likang Yin, Vladimir Filkov:
Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects. 697-708 - Muhammad Usman, Wenxi Wang, Sarfraz Khurshid:
TestMC: Testing Model Counters using Differential and Metamorphic Testing. 709-721 - Qian Zhang, Jiyuan Wang, Muhammad Ali Gulzar, Rohan Padhye, Miryung Kim:
BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction. 722-733 - Nick Feng, Federico Mora, Vincent Hui, Marsha Chechik:
Scaling Client-Specific Equivalence Checking via Impact Boundary Search. 734-745 - David Gros, Hariharan Sezhiyan, Prem Devanbu, Zhou Yu:
Code to Comment "Translation": Data, Metrics, Baselining & Evaluation. 746-757 - Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu:
Exploring the Architectural Impact of Possible Dependencies in Python Software. 758-770 - Hung Viet Pham, Shangshu Qian
, Jiannan Wang, Thibaud Lutellier
, Jonathan Rosenthal, Lin Tan, Yaoliang Yu, Nachiappan Nagappan:
Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance. 771-783 - Brandon Paulsen, Jingbo Wang, Jiawei Wang, Chao Wang:
NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation. 784-796 - Chris Satterfield, Thomas Fritz, Gail C. Murphy:
Identifying and Describing Information Seeking Tasks. 797-808 - Zhiyuan Wan, Gail C. Murphy, Xin Xia:
Predicting Code Context Models for Software Development Tasks. 809-820 - Yueming Wu
, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. 821-833 - Yang Liu, Mingwei Liu
, Xin Peng, Christoph Treude
, Zhenchang Xing, Xiaoxin Zhang:
Generating Concept based API Element Comparison Using a Knowledge Graph. 834-845 - Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li, Ji Wang:
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once. 846-857 - Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang:
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling. 858-870 - Xin Wang, Jin Liu, Li Li, Xiao Chen
, Xiao Liu, Hao Wu
:
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks. 871-882 - Qihao Zhu, Zeyu Sun, Xiran Liang, Yingfei Xiong, Lu Zhang:
OCoR: An Overlapping-Aware Code Retriever. 883-894 - Yida Tao, Jiefang Jiang, Yepang Liu, Zhiwu Xu, Shengchao Qin:
Understanding Performance Concerns in the API Documentation of Data Science Libraries. 895-906 - Samuel Benton
, Xia Li, Yiling Lou, Lingming Zhang:
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems. 907-918 - Xian Zhan
, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? 919-930 - Yue Zou, Bihuan Ban, Yinxing Xue, Yun Xu:
CCGraph: a PDG-based code clone detector with approximate graph matching. 931-942 - Haichi Wang, Zan Wang, Jun Sun, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li:
Towards Generating Thread-Safe Classes Automatically. 943-955 - Aryaz Eghbali, Michael Pradel:
No Strings Attached: An Empirical Study of String-related Software Bugs. 956-967 - Shangwen Wang
, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao, Hai Jin:
Automated Patch Correctness Assessment: How Far are We? 968-980 - Haoye Tian
, Kui Liu
, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein
, Tegawendé F. Bissyandé:
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. 981-992 - Christos Tsigkanos, Nianyu Li, Zhi Jin, Zhenjiang Hu, Carlo Ghezzi:
Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations. 993-1003 - Chaima Boufaied, Claudio Menghi
, Domenico Bianculli, Lionel C. Briand, Yago Isasi Parache:
Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach. 1004-1015 - Cedric Richter, Heike Wehrheim:
Attend and Represent: A Novel View on Algorithm Selection for Software Verification. 1016-1028 - Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng:
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. 1029-1040 - David Berend, Xiaofei Xie
, Lei Ma, Lingjun Zhou, Yang Liu, Chi Xu, Jianjun Zhao:
Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness. 1041-1052 - Shuai Wang, Zhendong Su
:
Metamorphic Object Insertion for Testing Object Detection Systems. 1053-1065 - Farnaz Behrang, Alessandro Orso:
Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for Android. 1066-1077 - Jun-Wei Lin, Navid Salehnamadi
, Sam Malek:
Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study. 1078-1089 - Benjamin Gafford, Tobias Dürschmid
, Gabriel A. Moreno, Eunsuk Kang:
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems. 1090-1102 - Hoang Lam Nguyen, Nebras Nassar, Timo Kehrer, Lars Grunske
:
MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools. 1103-1115 - Hongyu Liu, Ruiqin Tian, Tongping Liu, Bin Ren:
Prober: Practically Defending Overflows with Page Protection. 1116-1128 - Alan Romano, Yunhui Zheng, Weihang Wang:
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection. 1129-1140 - Yu Feng, Emina Torlak, Rastislav Bodík:
Summary-Based Symbolic Evaluation for Smart Contracts. 1141-1152 - Facundo Molina:
Applying Learning Techniques to Oracle Synthesis. 1153-1157 - Nils Wieber:
Automated Generation of Client-Specific Backends Utilizing Existing Microservices and Architectural Knowledge. 1158-1160 - César Cornejo:
SAT-Based Arithmetic Support for Alloy. 1161-1163 - Hala Abdelkader:
Towards Robust Production Machine Learning Systems: Managing Dataset Shift. 1164-1166 - Christian Schindler:
Towards Transparency-Encouraging Partial Software Disclosure to Enable Trust in Data Usage. 1167-1169 - Anjana Perera
:
Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing. 1170-1174 - Yongsik Kim, SoAh Min, Youkyung Kim:
The New Approach to IT Testing : Real Transaction-Based Automated Validation Solution. 1175-1178 - Lei Liu, Mehdi Bahrami, Wei-Peng Chen:
Automatic Generation of IFTTT Mashup Infrastructures. 1179-1183 - Haruki Yokoyama, Satoshi Onoue, Shinji Kikuchi:
Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data Augmentation. 1184-1188 - Yi Liu
, Jinhui Xie, Jianbo Yang, Shiyu Guo, Yuetang Deng, Shuqing Li, Yechang Wu, Yepang Liu:
Industry Practice of JavaScript Dynamic Analysis on WeChat Mini-Programs. 1189-1193 - Davrondzhon Gafurov, Margrete Sunde Grovan, Arne Erik Hurum:
Lightweight MBT Testing for National e-Health Portal in Norway. 1194-1198 - Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula
, Takashi Ishio, Kenichi Matsumoto:
Code-Based Vulnerability Detection in Node.js Applications: How far are we? 1199-1203 - Mattia Fazzini
, Alessandra Gorla, Alessandro Orso:
A Framework for Automated Test Mocking of Mobile Apps. 1204-1208 - Shawn Rasheed, Jens Dietrich
:
A Hybrid Analysis to Detect Java Serialisation Vulnerabilities. 1209-1213 - Junming Cao, Shouliang Yang, Wenhui Jiang, Hushuang Zeng, Beijun Shen, Hao Zhong
:
BugPecker: Locating Faulty Methods with Deep Learning on Revision Graphs. 1214-1218 - Karine Even-Mendoza
, Cristian Cadar, Alastair F. Donaldson:
Closer to the Edge: Testing Compilers More Thoroughly by Being Less Conservative About Undefined Behaviour. 1219-1223 - Mitchell Olsthoorn
, Arie van Deursen
, Annibale Panichella:
Generating Highly-structured Input Data by Combining Search-based Testing and Grammar-based Fuzzing. 1224-1228 - Joymallya Chakraborty, Kewen Peng, Tim Menzies:
Making Fair ML Software using Trustworthy Explanation. 1229-1233 - Michael Cao, Sahar Badihi, Khaled Ahmed, Peiyu Xiong, Julia Rubin:
On Benign Features in Malware Detection. 1234-1238 - Jianhui Chen, Fei He:
Proving Termination by k-Induction. 1239-1243 - Jinhao Dong, Yiling Lou, Dan Hao
:
SRRTA: Regression Testing Acceleration via State Reuse. 1244-1248 - Wei Wang, Ruoxi Sun
, Minhui Xue, Damith C. Ranasinghe:
An Automated Assessment of Android Clipboards. 1249-1251 - Han Gao, Yi Xu, Xiao Liu, Jia Xu, Tianxiang Chen, Bowen Zhou, Rui Li, Xuejun Li:
Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems. 1252-1254 - Tianqi Zhang, Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Ji Wang:
Efficient Multiplex Symbolic Execution with Adaptive Search Strategy. 1255-1256 - Mattia Fazzini
, Alessandro Orso:
Managing App Testing Device Clouds: Issues and Opportunities. 1257-1259