


default search action
26th SANER 2019: Hangzhou, China
- Xinyu Wang, David Lo, Emad Shihab:

26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2019, Hangzhou, China, February 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0591-8
Keynotes
- Xinyu Wang, David Lo, Emad Shihab, Xin Xia:

Message from the General Chair, Program Co-Chairs, and Local Chair. iii-iv - Ahmed E. Hassan:

Software engineering in a data science future (Keynote). 1 - Jon Whittle:

Does your software value what you value? (Keynote). 2 - Zhi Jin:

Forward and backward traceability: Requirements and challenges (Keynote). 3
Research Papers
- Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li:

Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. 4-14 - Chunhua Yang, E. James Whitehead Jr.:

Pruning the AST with Hunks to Speed up Tree Differencing. 15-25 - Rajshakhar Paul

, Amiangshu Bosu
, Kazi Zakia Sultana:
Expressions of Sentiments during Code Reviews: Male vs. Female. 26-37 - Fiorella Zampetti, Gabriele Bavota

, Gerardo Canfora, Massimiliano Di Penta:
A Study on the Interplay between Pull Request Review and Continuous Integration Builds. 38-48 - Felipe Ebert, Fernando Castor

, Nicole Novielli, Alexander Serebrenik
:
Confusion in Code Reviews: Reasons, Impacts, and Coping Strategies. 49-60 - Chenkai Guo, Dengrong Huang, Naipeng Dong

, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, Yifan Xu:
Deep Review Sharing. 61-72 - Judith F. Islam, Manishankar Mondal, Chanchal K. Roy:

A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones. 73-83 - Farima Farmahinifarahani, Vaibhav Saini, Di Yang, Hitesh Sajnani, Cristina V. Lopes:

On Precision of Code Clone Detection Tools. 84-94 - Lutz Büch

, Artur Andrzejak:
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection. 95-104 - Yanhao Wang, Zheng Leong Chua, Yuwei Liu

, Purui Su, Zhenkai Liang:
Fuzzing Program Logic Deeply Hidden in Binary Program Stages. 105-116 - John Businge, Simon Kawuma

, Moses Openja, Engineer Bainomugisha, Alexander Serebrenik
:
How Stable Are Eclipse Application Framework Internal Interfaces? 117-127 - Hugo Melo, Roberta Coelho, Christoph Treude

:
Unveiling Exception Handling Guidelines Adopted by Java Developers. 128-139 - Gleison Brito, Thaís Mombach, Marco Túlio Valente

:
Migrating to GraphQL: A Practical Assessment. 140-150 - Mehran Mahmoudi, Sarah Nadi, Nikolaos Tsantalis

:
Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts. 151-162 - Renhao Xiong, Bixin Li:

Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. 163-174 - Bryan J. Muscedere, Robert Hackman, Davood Anbarnam, Joanne M. Atlee, Ian J. Davis, Michael W. Godfrey:

Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis. 175-185 - Usman Ashraf, Christoph Mayr-Dorn

, Alexander Egyed:
Mining Cross-Task Artifact Dependencies from Developer Interactions. 186-196 - Cong Chen, Yulong Yang, Lin Yang, Kang Zhang:

A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers. 197-206 - Hannes Thaller, Lukas Linsbauer, Alexander Egyed:

Feature Maps: A Comprehensible Software Representation for Design Pattern Detection. 207-217 - Oscar Chaparro

, Juan Manuel Florez, Unnati Singh, Andrian Marcus
:
Reformulating Queries for Duplicate Bug Report Detection. 218-229 - Luyao Ren, Shurui Zhou, Christian Kästner, Andrzej Wasowski

:
Identifying Redundancies in Fork-based Development. 230-241 - Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong

, Quanqi Ye, Jing Xu, Sen Zhang:
Systematic Comprehension for Developer Reply in Mobile System Forum. 242-252 - Nan Yang, Kousar Aslam, Ramon R. H. Schiffelers, Leonard Lensink, Dennis Hendriks, Loek Cleophas

, Alexander Serebrenik
:
Improving Model Inference in Industry by Combining Active and Passive Learning. 253-263 - Wasim Said

, Jochen Quante, Rainer Koschke:
Towards Understandable Guards of Extracted State Machines from Embedded Software. 264-274 - Peng Sun, Chris Brown

, Ivan Beschastnikh, Kathryn T. Stolee:
Mining Specifications from Documentation using a Crowd. 275-286 - John Businge, Moses Openja, David Kavaler, Engineer Bainomugisha, Foutse Khomh, Vladimir Filkov:

Studying Android App Popularity by Cross-Linking GitHub and Google Play Store. 287-297 - Xiao Yu, Kwabena Ebo Bennin

, Jin Liu, Jacky Wai Keung
, Xiaofei Yin, Zhou Xu:
An Empirical Study of Learning to Rank Techniques for Effort-Aware Defect Prediction. 298-309 - Hiroyuki Kirinuki, Haruto Tanno, Katsuyuki Natsukawa:

COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application. 310-320 - Xian Zhan

, Tao Zhang
, Yutian Tang
:
A Comparative Study of Android Repackaged Apps Detection Techniques. 321-331 - Yangyu Hu, Haoyu Wang, Li Li, Yao Guo

, Guoai Xu, Ren He:
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps. 332-343 - Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. 344-354 - Wenjie Li, Yanyan Jiang, Chang Xu, Yepang Liu, Xiaoxing Ma, Jian Lu:

Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps. 355-365 - Qiu-Liang Chen, Jia-Ju Bai, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu:

Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers. 366-376 - Nicolas Dilley, Julien Lange

:
An Empirical Study of Messaging Passing Concurrency in Go Projects. 377-387 - Xiaofang Qi, Huayang Zhou:

A Splitting Strategy for Testing Concurrent Programs. 388-398 - Jie Lu, Liu Chen, Lian Li, Xiaobing Feng:

Understanding Node Change Bugs for Distributed Systems. 399-410 - Sa Gao, Chunyang Chen

, Zhenchang Xing, Yukun Ma, Wen Song
, Shang-Wei Lin
:
A Neural Model for Method Name Generation from Functional Description. 411-421 - Bui D. Q. Nghi, Yijun Yu, Lingxiao Jiang

:
Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. 422-433 - Rui Xie

, Long Chen, Wei Ye, Zhiyu Li, Tianxiang Hu, Dongdong Du, Shikun Zhang:
DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery. 434-444 - Zhuo Zhang, Yan Lei, Xiaoguang Mao

, Panpan Li:
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks. 445-455 - Kui Liu

, Anil Koyuncu, Dongsun Kim
, Tegawendé F. Bissyandé:
AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. 456-467 - Fernanda Madeiral

, Simon Urli, Marcelo de Almeida Maia, Martin Monperrus
:
BEARS: An Extensible Java Bug Benchmark for Automatic Program Repair Studies. 468-478 - Martin White, Michele Tufano, Matias Martinez

, Martin Monperrus
, Denys Poshyvanyk
:
Sorting and Transforming Program Repair Ingredients via Deep Learning Code Similarities. 479-490 - Ahmed Zerouali, Tom Mens, Gregorio Robles

, Jesús M. González-Barahona
:
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs. 491-501 - Peipei Wang, Gina R. Bai

, Kathryn T. Stolee:
Exploring Regular Expression Evolution. 502-513
RENE Track
- Yunior Pacheco

, Jonas De Bleser, Tim Molderez
, Dario Di Nucci
, Wolfgang De Meuter
, Coen De Roover
:
Mining Scala Framework Extensions for Recommendation Patterns. 514-523 - Puneet Kaur Sidhu, Gunter Mussbacher, Shane McIntosh:

Reuse (or Lack Thereof) in Travis CI Specifications: An Empirical Study of CI Phases and Commands. 524-533 - Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, Nikolaos Tsantalis

:
Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences? 534-543
Industry Track
- Muslim Chochlov, Michael English, Jim Buckley, Daniel Ilie, Maria Scanlon:

Identifying Feature Clones: An Industrial Case Study. 544-548 - Xingya Wang

, Haoran Wu, Weisong Sun, Yuan Zhao:
Towards Generating Cost-Effective Test-Suite for Ethereum Smart Contract. 549-553 - Fuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, Xiang Shi:

EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine. 554-558 - Yu Zhang, Xi Deng, Jun Yan, Hang Su, Hongyu Gao:

Testing the Message Flow of Android Auto Apps. 559-563 - Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo:

Open-Source License Violations of Binary Software at Large Scale. 564-568 - Leszek Wlodarski, Boris Pereira, Ivan Povazan, Johan Fabry, Vadim Zaytsev:

Qualify First! A Large Scale Modernisation Report. 569-573 - Bence Barta, Gunter Manz, István Siket, Rudolf Ferenc

:
Challenges of SonarQube Plug-In Maintenance. 574-578 - Benoît Verhaeghe

, Anne Etien
, Nicolas Anquetil, Abderrahmane Seriai, Laurent Deruelle, Stéphane Ducasse, Mustapha Derras:
GUI Migration using MDE from GWT to Angular 6: An Industrial Case. 579-583
ERA Track
- Khashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi:

Program State Coverage: A Test Coverage Metric Based on Executed Program States. 584-588 - Ahmed Zerouali, Tom Mens, Gregorio Robles

, Jesús M. González-Barahona
:
On the Diversity of Software Package Popularity Metrics: An Empirical Study of npm. 589-593 - Bin Lin

, Csaba Nagy, Gabriele Bavota
, Michele Lanza
:
On the Impact of Refactoring Operations on Code Naturalness. 594-598 - Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:

Knowledge Graphing Git Repositories: A Preliminary Study. 599-603 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein

:
Should You Consider Adware as Malware in Your Study? 604-608 - Ugo Yukizawa, Masateru Tsunoda, Amjed Tahir:

Please Help! A Preliminary Study on the Effect of Social Proof and Legitimization of Paltry Contributions in Donations to OSS. 609-613 - Lei Ma, Felix Juefei-Xu, Minhui Xue

, Bo Li, Li Li, Yang Liu
, Jianjun Zhao:
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. 614-618 - Ahmed Zerouali, Valerio Cosentino, Tom Mens, Gregorio Robles

, Jesús M. González-Barahona
:
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images. 619-623
Tool Demonstrations
- Angel Luis Scull Pupo

, Jens Nicolay
, Kyriakos Efthymiadis
, Ann Nowé
, Coen De Roover
, Elisa Gonzalez Boix
:
GUARDIAML: Machine Learning-Assisted Dynamic Information Flow Control. 624-628 - Davide Pizzolotto, Roberto Fellin, Mariano Ceccato

:
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps. 629-633 - Hiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:

Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web Technologies. 634-638 - Davide Arcelli

, Vittorio Cortellessa, Daniele Di Pompeo:
Automating Performance Antipattern Detection and Software Refactoring in UML Models. 639-643 - Ahmad Jbara, Mousa Agbaria, Alon Adoni, Malek Jabareen, Ameen Yasin:

ICSD: Interactive Visual Support for Understanding Code Control Structure. 644-648 - Rodrigo Brito, Aline Brito, Gleison Brito, Marco Túlio Valente

:
GoCity: Code City for Go. 649-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














