


default search action
26th SANER 2019: Hangzhou, China
- Xinyu Wang, David Lo, Emad Shihab:
26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2019, Hangzhou, China, February 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0591-8
Keynotes
- Xinyu Wang, David Lo, Emad Shihab, Xin Xia:
Message from the General Chair, Program Co-Chairs, and Local Chair. iii-iv - Ahmed E. Hassan:
Software engineering in a data science future (Keynote). 1 - Jon Whittle:
Does your software value what you value? (Keynote). 2 - Zhi Jin:
Forward and backward traceability: Requirements and challenges (Keynote). 3
Research Papers
- Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li:
Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. 4-14 - Chunhua Yang, E. James Whitehead Jr.:
Pruning the AST with Hunks to Speed up Tree Differencing. 15-25 - Rajshakhar Paul, Amiangshu Bosu
, Kazi Zakia Sultana:
Expressions of Sentiments during Code Reviews: Male vs. Female. 26-37 - Fiorella Zampetti, Gabriele Bavota
, Gerardo Canfora, Massimiliano Di Penta:
A Study on the Interplay between Pull Request Review and Continuous Integration Builds. 38-48 - Felipe Ebert, Fernando Castor
, Nicole Novielli, Alexander Serebrenik
:
Confusion in Code Reviews: Reasons, Impacts, and Coping Strategies. 49-60 - Chenkai Guo, Dengrong Huang, Naipeng Dong
, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, Yifan Xu:
Deep Review Sharing. 61-72 - Judith F. Islam, Manishankar Mondal, Chanchal K. Roy:
A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones. 73-83 - Farima Farmahinifarahani, Vaibhav Saini, Di Yang, Hitesh Sajnani, Cristina V. Lopes:
On Precision of Code Clone Detection Tools. 84-94 - Lutz Büch
, Artur Andrzejak:
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection. 95-104 - Yanhao Wang, Zheng Leong Chua, Yuwei Liu
, Purui Su, Zhenkai Liang:
Fuzzing Program Logic Deeply Hidden in Binary Program Stages. 105-116 - John Businge, Simon Kawuma
, Moses Openja, Engineer Bainomugisha, Alexander Serebrenik
:
How Stable Are Eclipse Application Framework Internal Interfaces? 117-127 - Hugo Melo, Roberta Coelho, Christoph Treude
:
Unveiling Exception Handling Guidelines Adopted by Java Developers. 128-139 - Gleison Brito, Thaís Mombach, Marco Túlio Valente
:
Migrating to GraphQL: A Practical Assessment. 140-150 - Mehran Mahmoudi, Sarah Nadi, Nikolaos Tsantalis
:
Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts. 151-162 - Renhao Xiong, Bixin Li:
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. 163-174 - Bryan J. Muscedere, Robert Hackman, Davood Anbarnam, Joanne M. Atlee, Ian J. Davis, Michael W. Godfrey:
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis. 175-185 - Usman Ashraf, Christoph Mayr-Dorn
, Alexander Egyed:
Mining Cross-Task Artifact Dependencies from Developer Interactions. 186-196 - Cong Chen, Yulong Yang, Lin Yang, Kang Zhang:
A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers. 197-206 - Hannes Thaller, Lukas Linsbauer, Alexander Egyed:
Feature Maps: A Comprehensible Software Representation for Design Pattern Detection. 207-217 - Oscar Chaparro
, Juan Manuel Florez, Unnati Singh, Andrian Marcus
:
Reformulating Queries for Duplicate Bug Report Detection. 218-229 - Luyao Ren, Shurui Zhou, Christian Kästner, Andrzej Wasowski
:
Identifying Redundancies in Fork-based Development. 230-241 - Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong
, Quanqi Ye, Jing Xu, Sen Zhang:
Systematic Comprehension for Developer Reply in Mobile System Forum. 242-252 - Nan Yang, Kousar Aslam, Ramon R. H. Schiffelers, Leonard Lensink, Dennis Hendriks, Loek Cleophas
, Alexander Serebrenik
:
Improving Model Inference in Industry by Combining Active and Passive Learning. 253-263 - Wasim Said
, Jochen Quante, Rainer Koschke:
Towards Understandable Guards of Extracted State Machines from Embedded Software. 264-274 - Peng Sun, Chris Brown
, Ivan Beschastnikh, Kathryn T. Stolee:
Mining Specifications from Documentation using a Crowd. 275-286 - John Businge, Moses Openja, David Kavaler, Engineer Bainomugisha, Foutse Khomh, Vladimir Filkov:
Studying Android App Popularity by Cross-Linking GitHub and Google Play Store. 287-297 - Xiao Yu, Kwabena Ebo Bennin
, Jin Liu, Jacky Wai Keung
, Xiaofei Yin, Zhou Xu:
An Empirical Study of Learning to Rank Techniques for Effort-Aware Defect Prediction. 298-309 - Hiroyuki Kirinuki, Haruto Tanno, Katsuyuki Natsukawa:
COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application. 310-320 - Xian Zhan
, Tao Zhang
, Yutian Tang
:
A Comparative Study of Android Repackaged Apps Detection Techniques. 321-331 - Yangyu Hu, Haoyu Wang, Li Li, Yao Guo
, Guoai Xu, Ren He:
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps. 332-343 - Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. 344-354 - Wenjie Li, Yanyan Jiang, Chang Xu, Yepang Liu, Xiaoxing Ma, Jian Lu:
Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps. 355-365 - Qiu-Liang Chen, Jia-Ju Bai, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu:
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers. 366-376 - Nicolas Dilley, Julien Lange
:
An Empirical Study of Messaging Passing Concurrency in Go Projects. 377-387 - Xiaofang Qi, Huayang Zhou:
A Splitting Strategy for Testing Concurrent Programs. 388-398 - Jie Lu, Liu Chen, Lian Li, Xiaobing Feng:
Understanding Node Change Bugs for Distributed Systems. 399-410 - Sa Gao, Chunyang Chen
, Zhenchang Xing, Yukun Ma, Wen Song
, Shang-Wei Lin
:
A Neural Model for Method Name Generation from Functional Description. 411-421 - Bui D. Q. Nghi, Yijun Yu, Lingxiao Jiang
:
Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. 422-433 - Rui Xie
, Long Chen, Wei Ye, Zhiyu Li, Tianxiang Hu, Dongdong Du, Shikun Zhang:
DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery. 434-444 - Zhuo Zhang, Yan Lei, Xiaoguang Mao, Panpan Li:
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks. 445-455 - Kui Liu
, Anil Koyuncu, Dongsun Kim
, Tegawendé F. Bissyandé:
AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. 456-467 - Fernanda Madeiral, Simon Urli, Marcelo de Almeida Maia, Martin Monperrus
:
BEARS: An Extensible Java Bug Benchmark for Automatic Program Repair Studies. 468-478 - Martin White, Michele Tufano, Matias Martinez
, Martin Monperrus
, Denys Poshyvanyk
:
Sorting and Transforming Program Repair Ingredients via Deep Learning Code Similarities. 479-490 - Ahmed Zerouali, Tom Mens, Gregorio Robles
, Jesús M. González-Barahona
:
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs. 491-501 - Peipei Wang, Gina R. Bai
, Kathryn T. Stolee:
Exploring Regular Expression Evolution. 502-513
RENE Track
- Yunior Pacheco
, Jonas De Bleser, Tim Molderez
, Dario Di Nucci
, Wolfgang De Meuter
, Coen De Roover
:
Mining Scala Framework Extensions for Recommendation Patterns. 514-523 - Puneet Kaur Sidhu, Gunter Mussbacher, Shane McIntosh:
Reuse (or Lack Thereof) in Travis CI Specifications: An Empirical Study of CI Phases and Commands. 524-533 - Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, Nikolaos Tsantalis
:
Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences? 534-543
Industry Track
- Muslim Chochlov, Michael English, Jim Buckley, Daniel Ilie, Maria Scanlon:
Identifying Feature Clones: An Industrial Case Study. 544-548 - Xingya Wang
, Haoran Wu, Weisong Sun, Yuan Zhao:
Towards Generating Cost-Effective Test-Suite for Ethereum Smart Contract. 549-553 - Fuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, Xiang Shi:
EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine. 554-558 - Yu Zhang, Xi Deng, Jun Yan, Hang Su, Hongyu Gao:
Testing the Message Flow of Android Auto Apps. 559-563 - Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo:
Open-Source License Violations of Binary Software at Large Scale. 564-568 - Leszek Wlodarski, Boris Pereira, Ivan Povazan, Johan Fabry, Vadim Zaytsev:
Qualify First! A Large Scale Modernisation Report. 569-573 - Bence Barta, Gunter Manz, István Siket, Rudolf Ferenc
:
Challenges of SonarQube Plug-In Maintenance. 574-578 - Benoît Verhaeghe, Anne Etien
, Nicolas Anquetil, Abderrahmane Seriai, Laurent Deruelle, Stéphane Ducasse, Mustapha Derras:
GUI Migration using MDE from GWT to Angular 6: An Industrial Case. 579-583
ERA Track
- Khashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi:
Program State Coverage: A Test Coverage Metric Based on Executed Program States. 584-588 - Ahmed Zerouali, Tom Mens, Gregorio Robles
, Jesús M. González-Barahona
:
On the Diversity of Software Package Popularity Metrics: An Empirical Study of npm. 589-593 - Bin Lin
, Csaba Nagy, Gabriele Bavota
, Michele Lanza:
On the Impact of Refactoring Operations on Code Naturalness. 594-598 - Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. 599-603 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein
:
Should You Consider Adware as Malware in Your Study? 604-608 - Ugo Yukizawa, Masateru Tsunoda, Amjed Tahir:
Please Help! A Preliminary Study on the Effect of Social Proof and Legitimization of Paltry Contributions in Donations to OSS. 609-613 - Lei Ma, Felix Juefei-Xu, Minhui Xue
, Bo Li, Li Li, Yang Liu
, Jianjun Zhao:
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. 614-618 - Ahmed Zerouali, Valerio Cosentino, Tom Mens, Gregorio Robles
, Jesús M. González-Barahona
:
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images. 619-623
Tool Demonstrations
- Angel Luis Scull Pupo
, Jens Nicolay
, Kyriakos Efthymiadis
, Ann Nowé
, Coen De Roover
, Elisa Gonzalez Boix
:
GUARDIAML: Machine Learning-Assisted Dynamic Information Flow Control. 624-628 - Davide Pizzolotto, Roberto Fellin, Mariano Ceccato
:
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps. 629-633 - Hiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web Technologies. 634-638 - Davide Arcelli
, Vittorio Cortellessa, Daniele Di Pompeo:
Automating Performance Antipattern Detection and Software Refactoring in UML Models. 639-643 - Ahmad Jbara, Mousa Agbaria, Alon Adoni, Malek Jabareen, Ameen Yasin:
ICSD: Interactive Visual Support for Understanding Code Control Structure. 644-648 - Rodrigo Brito, Aline Brito, Gleison Brito, Marco Túlio Valente
:
GoCity: Code City for Go. 649-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.