callback( { "result":{ "query":":facetid:toc:\"db/conf/icse/icse2015-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"70.24" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"87", "@dc":"87", "@oc":"87", "@id":"43404134", "text":":facetid:toc:db/conf/icse/icse2015-1.bht" } }, "hits":{ "@total":"87", "@computed":"87", "@sent":"87", "@first":"0", "hit":[{ "@score":"1", "@id":"3591866", "info":{"authors":{"author":[{"@pid":"53/2189-29","text":"Li Li 0029"},{"@pid":"72/11467","text":"Alexandre Bartel"},{"@pid":"00/8006","text":"Tegawendé F. Bissyandé"},{"@pid":"k/JacquesKlein","text":"Jacques Klein"},{"@pid":"95/5206","text":"Yves Le Traon"},{"@pid":"132/3414","text":"Steven Arzt"},{"@pid":"119/1650","text":"Siegfried Rasthofer"},{"@pid":"94/5744","text":"Eric Bodden"},{"@pid":"20/11088","text":"Damien Octeau"},{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"}]},"title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.","venue":"ICSE","pages":"280-291","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/0029BBKTARBOM15","doi":"10.1109/ICSE.2015.48","ee":"https://doi.org/10.1109/ICSE.2015.48","url":"https://dblp.org/rec/conf/icse/0029BBKTARBOM15"}, "url":"URL#3591866" }, { "@score":"1", "@id":"3591902", "info":{"authors":{"author":[{"@pid":"167/0222","text":"Vitalii Avdiienko"},{"@pid":"52/7477-1","text":"Konstantin Kuznetsov 0001"},{"@pid":"54/2159","text":"Alessandra Gorla"},{"@pid":"z/AndreasZeller","text":"Andreas Zeller"},{"@pid":"132/3414","text":"Steven Arzt"},{"@pid":"119/1650","text":"Siegfried Rasthofer"},{"@pid":"94/5744","text":"Eric Bodden"}]},"title":"Mining Apps for Abnormal Usage of Sensitive Data.","venue":"ICSE","pages":"426-436","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/AvdiienkoKGZARB15","doi":"10.1109/ICSE.2015.61","ee":"https://doi.org/10.1109/ICSE.2015.61","url":"https://dblp.org/rec/conf/icse/AvdiienkoKGZARB15"}, "url":"URL#3591902" }, { "@score":"1", "@id":"3591903", "info":{"authors":{"author":[{"@pid":"94/3709","text":"Pavel Avgustinov"},{"@pid":"81/6050","text":"Arthur I. Baars"},{"@pid":"81/7921","text":"Anders Starcke Henriksen"},{"@pid":"53/6820","text":"R. Greg Lavender"},{"@pid":"167/0191","text":"Galen Menzel"},{"@pid":"m/OegedeMoor","text":"Oege de Moor"},{"@pid":"91/504","text":"Max Schäfer"},{"@pid":"14/5257","text":"Julian Tibble"}]},"title":"Tracking Static Analysis Violations over Time to Capture Developer Characteristics.","venue":"ICSE","pages":"437-447","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/AvgustinovBHLMM15","doi":"10.1109/ICSE.2015.62","ee":"https://doi.org/10.1109/ICSE.2015.62","url":"https://dblp.org/rec/conf/icse/AvgustinovBHLMM15"}, "url":"URL#3591903" }, { "@score":"1", "@id":"3591917", "info":{"authors":{"author":[{"@pid":"b/LucianoBaresi","text":"Luciano Baresi"},{"@pid":"145/7951","text":"Mohammad Mehdi Pourhashem Kallehbasti"},{"@pid":"306/0008","text":"Matteo Rossi 0001"}]},"title":"Efficient Scalable Verification of LTL Specifications.","venue":"ICSE","pages":"711-721","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BaresiKR15","doi":"10.1109/ICSE.2015.84","ee":"https://doi.org/10.1109/ICSE.2015.84","url":"https://dblp.org/rec/conf/icse/BaresiKR15"}, "url":"URL#3591917" }, { "@score":"1", "@id":"3591924", "info":{"authors":{"author":[{"@pid":"69/2517-1","text":"Mike Barnett 0001"},{"@pid":"b/ChristianBird","text":"Christian Bird"},{"@pid":"41/4431","text":"João Brunet"},{"@pid":"32/2903","text":"Shuvendu K. Lahiri"}]},"title":"Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets.","venue":"ICSE","pages":"134-144","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BarnettBBL15","doi":"10.1109/ICSE.2015.35","ee":"https://doi.org/10.1109/ICSE.2015.35","url":"https://dblp.org/rec/conf/icse/BarnettBBL15"}, "url":"URL#3591924" }, { "@score":"1", "@id":"3591933", "info":{"authors":{"author":[{"@pid":"46/3025","text":"Shoham Ben-David"},{"@pid":"67/5881","text":"Baruch Sterin"},{"@pid":"a/JMAtlee","text":"Joanne M. Atlee"},{"@pid":"166/1063","text":"Sandy Beidu"}]},"title":"Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods.","venue":"ICSE","pages":"189-199","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Ben-DavidSAB15","doi":"10.1109/ICSE.2015.40","ee":"https://doi.org/10.1109/ICSE.2015.40","url":"https://dblp.org/rec/conf/icse/Ben-DavidSAB15"}, "url":"URL#3591933" }, { "@score":"1", "@id":"3591952", "info":{"authors":{"author":[{"@pid":"145/4011","text":"Ivan Bocic"},{"@pid":"07/3368","text":"Tevfik Bultan"}]},"title":"Coexecutability for Efficient Verification of Data Model Updates.","venue":"ICSE","pages":"744-754","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BocicB15","doi":"10.1109/ICSE.2015.87","ee":"https://doi.org/10.1109/ICSE.2015.87","url":"https://dblp.org/rec/conf/icse/BocicB15"}, "url":"URL#3591952" }, { "@score":"1", "@id":"3591981", "info":{"authors":{"author":[{"@pid":"53/4439","text":"Antonio Carzaniga"},{"@pid":"116/6661","text":"Andrea Mattavelli"},{"@pid":"98/6514","text":"Mauro Pezzè"}]},"title":"Measuring Software Redundancy.","venue":"ICSE","pages":"156-166","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/CarzanigaMP15","doi":"10.1109/ICSE.2015.37","ee":"https://doi.org/10.1109/ICSE.2015.37","url":"https://dblp.org/rec/conf/icse/CarzanigaMP15"}, "url":"URL#3591981" }, { "@score":"1", "@id":"3591983", "info":{"authors":{"author":[{"@pid":"167/0168","text":"Casey Casalnuovo"},{"@pid":"d/PremkumarTDevanbu","text":"Premkumar T. Devanbu"},{"@pid":"127/5650","text":"Abílio Oliveira"},{"@pid":"f/VladimirFilkov","text":"Vladimir Filkov"},{"@pid":"74/1969","text":"Baishakhi Ray"}]},"title":"Assert Use in GitHub Projects.","venue":"ICSE","pages":"755-766","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/CasalnuovoDOFR15","doi":"10.1109/ICSE.2015.88","ee":"https://doi.org/10.1109/ICSE.2015.88","url":"https://dblp.org/rec/conf/icse/CasalnuovoDOFR15"}, "url":"URL#3591983" }, { "@score":"1", "@id":"3592015", "info":{"authors":{"author":[{"@pid":"85/4864","text":"Giovanni Denaro"},{"@pid":"05/7380","text":"Alessandro Margara"},{"@pid":"98/6514","text":"Mauro Pezzè"},{"@pid":"82/8755","text":"Mattia Vivanti"}]},"title":"Dynamic Data Flow Testing of Object Oriented Systems.","venue":"ICSE","pages":"947-958","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/DenaroMPV15","doi":"10.1109/ICSE.2015.104","ee":"https://doi.org/10.1109/ICSE.2015.104","url":"https://dblp.org/rec/conf/icse/DenaroMPV15"}, "url":"URL#3592015" }, { "@score":"1", "@id":"3592020", "info":{"authors":{"author":[{"@pid":"143/7405","text":"Kyle Dewey"},{"@pid":"167/0174","text":"Lawton Nichols"},{"@pid":"89/4824","text":"Ben Hardekopf"}]},"title":"Automated Data Structure Generation: Refuting Common Wisdom.","venue":"ICSE","pages":"32-43","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/DeweyNH15","doi":"10.1109/ICSE.2015.26","ee":"https://doi.org/10.1109/ICSE.2015.26","url":"https://dblp.org/rec/conf/icse/DeweyNH15"}, "url":"URL#3592020" }, { "@score":"1", "@id":"3592044", "info":{"authors":{"author":[{"@pid":"118/3935","text":"Mattia Fazzini"},{"@pid":"90/105","text":"Prateek Saxena"},{"@pid":"35/805","text":"Alessandro Orso"}]},"title":"AutoCSP: Automatically Retrofitting CSP to Web Applications.","venue":"ICSE","pages":"336-346","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FazziniSO15","doi":"10.1109/ICSE.2015.53","ee":"https://doi.org/10.1109/ICSE.2015.53","url":"https://dblp.org/rec/conf/icse/FazziniSO15"}, "url":"URL#3592044" }, { "@score":"1", "@id":"3592049", "info":{"authors":{"author":[{"@pid":"40/8264","text":"Antonio Filieri"},{"@pid":"55/4092","text":"Lars Grunske"},{"@pid":"16/5296","text":"Alberto Leva"}]},"title":"Lightweight Adaptive Filtering for Efficient Learning and Updating of Probabilistic Models.","venue":"ICSE","pages":"200-211","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FilieriGL15","doi":"10.1109/ICSE.2015.41","ee":"https://doi.org/10.1109/ICSE.2015.41","url":"https://dblp.org/rec/conf/icse/FilieriGL15"}, "url":"URL#3592049" }, { "@score":"1", "@id":"3592075", "info":{"authors":{"author":[{"@pid":"129/2283","text":"Zebao Gao"},{"@pid":"127/0671","text":"Yalan Liang"},{"@pid":"79/5975","text":"Myra B. Cohen"},{"@pid":"m/AtifMMemon","text":"Atif M. Memon"},{"@pid":"78/6727","text":"Zhen Wang"}]},"title":"Making System User Interactive Tests Repeatable: When and What Should We Control?","venue":"ICSE","pages":"55-65","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GaoLCMW15","doi":"10.1109/ICSE.2015.28","ee":"https://doi.org/10.1109/ICSE.2015.28","url":"https://dblp.org/rec/conf/icse/GaoLCMW15"}, "url":"URL#3592075" }, { "@score":"1", "@id":"3592076", "info":{"authors":{"author":[{"@pid":"16/4671","text":"Qing Gao"},{"@pid":"82/2673","text":"Yingfei Xiong 0001"},{"@pid":"167/0206","text":"Yaqing Mi"},{"@pid":"z/LuZhang1","text":"Lu Zhang 0023"},{"@pid":"167/0229","text":"Weikun Yang"},{"@pid":"167/0205","text":"Zhaoping Zhou"},{"@pid":"94/2438","text":"Bing Xie"},{"@pid":"14/2036","text":"Hong Mei 0001"}]},"title":"Safe Memory-Leak Fixing for C Programs.","venue":"ICSE","pages":"459-470","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GaoXMZYZXM15","doi":"10.1109/ICSE.2015.64","ee":"https://doi.org/10.1109/ICSE.2015.64","url":"https://dblp.org/rec/conf/icse/GaoXMZYZXM15"}, "url":"URL#3592076" }, { "@score":"1", "@id":"3592086", "info":{"authors":{"author":[{"@pid":"167/0161","text":"Baljinder Ghotra"},{"@pid":"31/8127","text":"Shane McIntosh"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"}]},"title":"Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models.","venue":"ICSE","pages":"789-800","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GhotraMH15","doi":"10.1109/ICSE.2015.91","ee":"https://doi.org/10.1109/ICSE.2015.91","url":"https://dblp.org/rec/conf/icse/GhotraMH15"}, "url":"URL#3592086" }, { "@score":"1", "@id":"3592094", "info":{"authors":{"author":[{"@pid":"44/87","text":"Denis Gopan"},{"@pid":"05/8296","text":"Evan Driscoll"},{"@pid":"167/0198","text":"Ducson Nguyen"},{"@pid":"167/0223","text":"Dimitri Naydich"},{"@pid":"10/1529","text":"Alexey Loginov"},{"@pid":"97/6582","text":"David Melski"}]},"title":"Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery.","venue":"ICSE","pages":"145-155","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GopanDNNLM15","doi":"10.1109/ICSE.2015.36","ee":"https://doi.org/10.1109/ICSE.2015.36","url":"https://dblp.org/rec/conf/icse/GopanDNNLM15"}, "url":"URL#3592094" }, { "@score":"1", "@id":"3592097", "info":{"authors":{"author":[{"@pid":"73/311","text":"Georgios Gousios"},{"@pid":"68/6471","text":"Andy Zaidman"},{"@pid":"s/MargaretAnneDStorey","text":"Margaret-Anne D. Storey"},{"@pid":"d/ArievanDeursen","text":"Arie van Deursen"}]},"title":"Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective.","venue":"ICSE","pages":"358-368","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GousiosZSD15","doi":"10.1109/ICSE.2015.55","ee":"https://doi.org/10.1109/ICSE.2015.55","url":"https://dblp.org/rec/conf/icse/GousiosZSD15"}, "url":"URL#3592097" }, { "@score":"1", "@id":"3592106", "info":{"authors":{"author":[{"@pid":"119/1083","text":"Jiaping Gui"},{"@pid":"167/0204","text":"Stuart McIlroy"},{"@pid":"27/2828","text":"Meiyappan Nagappan"},{"@pid":"04/4583","text":"William G. J. Halfond"}]},"title":"Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers.","venue":"ICSE","pages":"100-110","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GuiMNH15","doi":"10.1109/ICSE.2015.32","ee":"https://doi.org/10.1109/ICSE.2015.32","url":"https://dblp.org/rec/conf/icse/GuiMNH15"}, "url":"URL#3592106" }, { "@score":"1", "@id":"3592126", "info":{"authors":{"author":[{"@pid":"122/2837","text":"Christopher Henard"},{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"h/MarkHarman","text":"Mark Harman"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines.","venue":"ICSE","pages":"517-528","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HenardPHT15","doi":"10.1109/ICSE.2015.69","ee":"https://doi.org/10.1109/ICSE.2015.69","url":"https://dblp.org/rec/conf/icse/HenardPHT15"}, "url":"URL#3592126" }, { "@score":"1", "@id":"3592133", "info":{"authors":{"author":[{"@pid":"32/7057","text":"Kim Herzig"},{"@pid":"94/886","text":"Michaela Greiler"},{"@pid":"05/7253","text":"Jacek Czerwonka"},{"@pid":"24/4066","text":"Brendan Murphy"}]},"title":"The Art of Testing Less without Sacrificing Quality.","venue":"ICSE","pages":"483-493","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HerzigGCM15","doi":"10.1109/ICSE.2015.66","ee":"https://doi.org/10.1109/ICSE.2015.66","url":"https://dblp.org/rec/conf/icse/HerzigGCM15"}, "url":"URL#3592133" }, { "@score":"1", "@id":"3592141", "info":{"authors":{"author":[{"@pid":"60/6376","text":"Na Meng 0001"},{"@pid":"167/0210","text":"Lisa Hua"},{"@pid":"56/5320","text":"Miryung Kim"},{"@pid":"m/KSMcKinley","text":"Kathryn S. McKinley"}]},"title":"Does Automated Refactoring Obviate Systematic Editing?","venue":"ICSE","pages":"392-402","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HuaKM15","doi":"10.1109/ICSE.2015.58","ee":"https://doi.org/10.1109/ICSE.2015.58","url":"https://dblp.org/rec/conf/icse/HuaKM15"}, "url":"URL#3592141" }, { "@score":"1", "@id":"3592142", "info":{"authors":{"author":[{"@pid":"68/4706-1","text":"Jeff Huang 0001"},{"@pid":"17/7915","text":"Qingzhou Luo"},{"@pid":"r/GrigoreRosu","text":"Grigore Rosu"}]},"title":"GPredict: Generic Predictive Concurrency Analysis.","venue":"ICSE","pages":"847-857","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HuangLR15","doi":"10.1109/ICSE.2015.96","ee":"https://doi.org/10.1109/ICSE.2015.96","url":"https://dblp.org/rec/conf/icse/HuangLR15"}, "url":"URL#3592142" }, { "@score":"1", "@id":"3592155", "info":{"authors":{"author":[{"@pid":"44/4993-1","text":"Yue Jia 0001"},{"@pid":"79/5975","text":"Myra B. Cohen"},{"@pid":"h/MarkHarman","text":"Mark Harman"},{"@pid":"23/8779","text":"Justyna Petke"}]},"title":"Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search.","venue":"ICSE","pages":"540-550","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/JiaCHP15","doi":"10.1109/ICSE.2015.71","ee":"https://doi.org/10.1109/ICSE.2015.71","url":"https://dblp.org/rec/conf/icse/JiaCHP15"}, "url":"URL#3592155" }, { "@score":"1", "@id":"3592157", "info":{"authors":{"author":[{"@pid":"167/0200","text":"Mitchell Joblin"},{"@pid":"74/694","text":"Wolfgang Mauerer"},{"@pid":"a/SvenApel","text":"Sven Apel"},{"@pid":"88/7055","text":"Janet Siegmund"},{"@pid":"38/5697","text":"Dirk Riehle"}]},"title":"From Developer Networks to Verified Communities: A Fine-Grained Approach.","venue":"ICSE","pages":"563-573","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/JoblinMASR15","doi":"10.1109/ICSE.2015.73","ee":"https://doi.org/10.1109/ICSE.2015.73","url":"https://dblp.org/rec/conf/icse/JoblinMASR15"}, "url":"URL#3592157" }, { "@score":"1", "@id":"3592165", "info":{"authors":{"author":[{"@pid":"27/1557","text":"Eirini Kalliamvakou"},{"@pid":"d/DanielaEDamian","text":"Daniela E. Damian"},{"@pid":"50/10438","text":"Kelly Blincoe"},{"@pid":"08/7668","text":"Leif Singer"},{"@pid":"g/DanielMGerman","text":"Daniel M. Germán"}]},"title":"Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub.","venue":"ICSE","pages":"574-585","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/KalliamvakouDBS15","doi":"10.1109/ICSE.2015.74","ee":"https://doi.org/10.1109/ICSE.2015.74","url":"https://dblp.org/rec/conf/icse/KalliamvakouDBS15"}, "url":"URL#3592165" }, { "@score":"1", "@id":"3592190", "info":{"authors":{"author":[{"@pid":"139/6963","text":"Markus Kusano"},{"@pid":"139/7055","text":"Arijit Chattopadhyay"},{"@pid":"w/ChaoWang","text":"Chao Wang 0001"}]},"title":"Dynamic Generation of Likely Invariants for Multithreaded Programs.","venue":"ICSE","pages":"835-846","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/KusanoCW15","doi":"10.1109/ICSE.2015.95","ee":"https://doi.org/10.1109/ICSE.2015.95","url":"https://dblp.org/rec/conf/icse/KusanoCW15"}, "url":"URL#3592190" }, { "@score":"1", "@id":"3592192", "info":{"authors":{"author":[{"@pid":"31/3605","text":"Thomas D. LaToza"},{"@pid":"167/0187","text":"Micky Chen"},{"@pid":"167/0215","text":"Luxi Jiang"},{"@pid":"33/7242","text":"Mengyao Zhao"},{"@pid":"h/AndrevanderHoek","text":"André van der Hoek"}]},"title":"Borrowing from the Crowd: A Study of Recombination in Software Design Competitions.","venue":"ICSE","pages":"551-562","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/LaTozaCJZH15","doi":"10.1109/ICSE.2015.72","ee":"https://doi.org/10.1109/ICSE.2015.72","url":"https://dblp.org/rec/conf/icse/LaTozaCJZH15"}, "url":"URL#3592192" }, { "@score":"1", "@id":"3592197", "info":{"authors":{"author":{"@pid":"44/6965","text":"Susan Landau 0001"}},"title":"Mining the Metadata - and Its Consequences.","venue":"ICSE","pages":"4-5","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Landau15","doi":"10.1109/ICSE.2015.23","ee":"https://doi.org/10.1109/ICSE.2015.23","url":"https://dblp.org/rec/conf/icse/Landau15"}, "url":"URL#3592197" }, { "@score":"1", "@id":"3592203", "info":{"authors":{"author":[{"@pid":"67/10116","text":"Mathieu Lavallée"},{"@pid":"41/4704","text":"Pierre N. Robillard"}]},"title":"Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality.","venue":"ICSE","pages":"677-687","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/LavalleeR15a","doi":"10.1109/ICSE.2015.83","ee":"https://doi.org/10.1109/ICSE.2015.83","url":"https://dblp.org/rec/conf/icse/LavalleeR15a"}, "url":"URL#3592203" }, { "@score":"1", "@id":"3592208", "info":{"authors":{"author":[{"@pid":"99/1640","text":"Yun Young Lee"},{"@pid":"48/3911","text":"Darko Marinov"},{"@pid":"j/RalphEJohnson","text":"Ralph E. Johnson"}]},"title":"Tempura: Temporal Dimension for IDEs.","venue":"ICSE","pages":"212-222","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/LeeMJ15","doi":"10.1109/ICSE.2015.42","ee":"https://doi.org/10.1109/ICSE.2015.42","url":"https://dblp.org/rec/conf/icse/LeeMJ15"}, "url":"URL#3592208" }, { "@score":"1", "@id":"3592214", "info":{"authors":{"author":[{"@pid":"93/719","text":"Paul Luo Li"},{"@pid":"181/2345","text":"Amy J. Ko"},{"@pid":"22/9924","text":"Jiamin Zhu"}]},"title":"What Makes a Great Software Engineer?","venue":"ICSE","pages":"700-710","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/LiKZ15","doi":"10.1109/ICSE.2015.335","ee":"https://doi.org/10.1109/ICSE.2015.335","url":"https://dblp.org/rec/conf/icse/LiKZ15"}, "url":"URL#3592214" }, { "@score":"1", "@id":"3592217", "info":{"authors":{"author":[{"@pid":"15/7442","text":"Jörg Liebig"},{"@pid":"167/0155","text":"Andreas Janker"},{"@pid":"167/0203","text":"Florian Garbe"},{"@pid":"a/SvenApel","text":"Sven Apel"},{"@pid":"l/CLengauer","text":"Christian Lengauer"}]},"title":"Morpheus: Variability-Aware Refactoring in the Wild.","venue":"ICSE","pages":"380-391","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/LiebigJGAL15","doi":"10.1109/ICSE.2015.57","ee":"https://doi.org/10.1109/ICSE.2015.57","url":"https://dblp.org/rec/conf/icse/LiebigJGAL15"}, "url":"URL#3592217" }, { "@score":"1", "@id":"3592243", "info":{"authors":{"author":[{"@pid":"119/1553","text":"Daniel Matichuk"},{"@pid":"31/6289","text":"Toby C. Murray"},{"@pid":"11/6441","text":"June Andronick"},{"@pid":"99/2957","text":"D. Ross Jeffery"},{"@pid":"74/2171","text":"Gerwin Klein"},{"@pid":"s/MarkStaples","text":"Mark Staples"}]},"title":"Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification.","venue":"ICSE","pages":"722-732","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/MatichukMAJKS15","doi":"10.1109/ICSE.2015.85","ee":"https://doi.org/10.1109/ICSE.2015.85","url":"https://dblp.org/rec/conf/icse/MatichukMAJKS15"}, "url":"URL#3592243" }, { "@score":"1", "@id":"3592252", "info":{"authors":{"author":[{"@pid":"167/0202","text":"Sergey Mechtaev"},{"@pid":"121/2697","text":"Jooyong Yi"},{"@pid":"04/5884","text":"Abhik Roychoudhury"}]},"title":"DirectFix: Looking for Simple Program Repairs.","venue":"ICSE","pages":"448-458","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/MechtaevYR15","doi":"10.1109/ICSE.2015.63","ee":"https://doi.org/10.1109/ICSE.2015.63","url":"https://dblp.org/rec/conf/icse/MechtaevYR15"}, "url":"URL#3592252" }, { "@score":"1", "@id":"3592257", "info":{"authors":{"author":[{"@pid":"74/1958","text":"Aleksandar Milicevic"},{"@pid":"39/5361","text":"Joseph P. Near"},{"@pid":"49/2420","text":"Eunsuk Kang"},{"@pid":"80/1906-1","text":"Daniel Jackson 0001"}]},"title":"Alloy*: A General-Purpose Higher-Order Relational Constraint Solver.","venue":"ICSE","pages":"609-619","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/MilicevicNKJ15","doi":"10.1109/ICSE.2015.77","ee":"https://doi.org/10.1109/ICSE.2015.77","url":"https://dblp.org/rec/conf/icse/MilicevicNKJ15"}, "url":"URL#3592257" }, { "@score":"1", "@id":"3592269", "info":{"authors":{"author":[{"@pid":"65/119","text":"Laura Moreno"},{"@pid":"09/8523","text":"Gabriele Bavota"},{"@pid":"d/MassimilianoDiPenta","text":"Massimiliano Di Penta"},{"@pid":"18/6986","text":"Rocco Oliveto"},{"@pid":"m/AndrianMarcus","text":"Andrian Marcus"}]},"title":"How Can I Use This Method?","venue":"ICSE","pages":"880-890","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/MorenoBPOM15","doi":"10.1109/ICSE.2015.98","ee":"https://doi.org/10.1109/ICSE.2015.98","url":"https://dblp.org/rec/conf/icse/MorenoBPOM15"}, "url":"URL#3592269" }, { "@score":"1", "@id":"3592274", "info":{"authors":{"author":[{"@pid":"137/8985","text":"Sebastian C. Müller"},{"@pid":"67/6766-1","text":"Thomas Fritz 0001"}]},"title":"Stuck and Frustrated or in Flow and Happy: Sensing Developers' Emotions and Progress.","venue":"ICSE","pages":"688-699","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/MullerF15","doi":"10.1109/ICSE.2015.334","ee":"https://doi.org/10.1109/ICSE.2015.334","url":"https://dblp.org/rec/conf/icse/MullerF15"}, "url":"URL#3592274" }, { "@score":"1", "@id":"3592282", "info":{"authors":{"author":[{"@pid":"79/1959","text":"Sebastian Nanz"},{"@pid":"78/6422","text":"Carlo A. Furia"}]},"title":"A Comparative Study of Programming Languages in Rosetta Code.","venue":"ICSE","pages":"778-788","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/NanzF15","doi":"10.1109/ICSE.2015.90","ee":"https://doi.org/10.1109/ICSE.2015.90","url":"https://dblp.org/rec/conf/icse/NanzF15"}, "url":"URL#3592282" }, { "@score":"1", "@id":"3592287", "info":{"authors":{"author":[{"@pid":"49/8034-1","text":"Anh Tuan Nguyen 0001"},{"@pid":"56/6902","text":"Tien N. Nguyen"}]},"title":"Graph-Based Statistical Language Model for Code.","venue":"ICSE","pages":"858-868","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/NguyenN15","doi":"10.1109/ICSE.2015.336","ee":"https://doi.org/10.1109/ICSE.2015.336","url":"https://dblp.org/rec/conf/icse/NguyenN15"}, "url":"URL#3592287" }, { "@score":"1", "@id":"3592293", "info":{"authors":{"author":[{"@pid":"45/7056","text":"Adrian Nistor"},{"@pid":"54/1281","text":"Po-Chun Chang"},{"@pid":"89/7473","text":"Cosmin Radoi"},{"@pid":"31/5916-1","text":"Shan Lu 0001"}]},"title":"CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes.","venue":"ICSE","pages":"902-912","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/NistorCRL15","doi":"10.1109/ICSE.2015.100","ee":"https://doi.org/10.1109/ICSE.2015.100","url":"https://dblp.org/rec/conf/icse/NistorCRL15"}, "url":"URL#3592293" }, { "@score":"1", "@id":"3592296", "info":{"authors":{"author":[{"@pid":"15/10805","text":"Frolin S. Ocariza Jr."},{"@pid":"91/5344","text":"Karthik Pattabiraman"},{"@pid":"72/4471-1","text":"Ali Mesbah 0001"}]},"title":"Detecting Inconsistencies in JavaScript MVC Applications.","venue":"ICSE","pages":"325-335","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/OcarizaP015","doi":"10.1109/ICSE.2015.52","ee":"https://doi.org/10.1109/ICSE.2015.52","url":"https://dblp.org/rec/conf/icse/OcarizaP015"}, "url":"URL#3592296" }, { "@score":"1", "@id":"3592297", "info":{"authors":{"author":[{"@pid":"20/11088","text":"Damien Octeau"},{"@pid":"17/7429","text":"Daniel Luchaup"},{"@pid":"206/1603","text":"Matthew L. Dering"},{"@pid":"j/SomeshJha","text":"Somesh Jha"},{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"}]},"title":"Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.","venue":"ICSE","pages":"77-88","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/OcteauLDJM15","doi":"10.1109/ICSE.2015.30","ee":"https://doi.org/10.1109/ICSE.2015.30","url":"https://dblp.org/rec/conf/icse/OcteauLDJM15"}, "url":"URL#3592297" }, { "@score":"1", "@id":"3592311", "info":{"authors":{"author":[{"@pid":"158/5949","text":"Yao Pan"},{"@pid":"89/2873","text":"Jules White"},{"@pid":"62/3689-2","text":"Yu Sun 0002"},{"@pid":"g/JeffreyGGray","text":"Jeff Gray 0001"}]},"title":"Gray Computing: An Analysis of Computing with Background JavaScript Tasks.","venue":"ICSE","pages":"167-177","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PanW0G15","doi":"10.1109/ICSE.2015.38","ee":"https://doi.org/10.1109/ICSE.2015.38","url":"https://dblp.org/rec/conf/icse/PanW0G15"}, "url":"URL#3592311" }, { "@score":"1", "@id":"3592314", "info":{"authors":{"author":[{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"44/4993-1","text":"Yue Jia 0001"},{"@pid":"h/MarkHarman","text":"Mark Harman"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique.","venue":"ICSE","pages":"936-946","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PapadakisJHT15","doi":"10.1109/ICSE.2015.103","ee":"https://doi.org/10.1109/ICSE.2015.103","url":"https://dblp.org/rec/conf/icse/PapadakisJHT15"}, "url":"URL#3592314" }, { "@score":"1", "@id":"3592318", "info":{"authors":{"author":[{"@pid":"61/1343","text":"Fabrizio Pastore"},{"@pid":"27/2914","text":"Leonardo Mariani"}]},"title":"ZoomIn: Discovering Failures by Detecting Wrong Assertions.","venue":"ICSE","pages":"66-76","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PastoreM15","doi":"10.1109/ICSE.2015.29","ee":"https://doi.org/10.1109/ICSE.2015.29","url":"https://dblp.org/rec/conf/icse/PastoreM15"}, "url":"URL#3592318" }, { "@score":"1", "@id":"3592324", "info":{"authors":{"author":[{"@pid":"52/7880","text":"Fayola Peters"},{"@pid":"m/TimMenzies","text":"Tim Menzies"},{"@pid":"18/6893","text":"Lucas Layman"}]},"title":"LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction.","venue":"ICSE","pages":"801-811","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PetersML15","doi":"10.1109/ICSE.2015.92","ee":"https://doi.org/10.1109/ICSE.2015.92","url":"https://dblp.org/rec/conf/icse/PetersML15"}, "url":"URL#3592324" }, { "@score":"1", "@id":"3592327", "info":{"authors":{"author":[{"@pid":"167/0221","text":"Gayane Petrosyan"},{"@pid":"r/MartinPRobillard","text":"Martin P. Robillard"},{"@pid":"86/129","text":"Renato De Mori"}]},"title":"Discovering Information Explaining API Types Using Text Classification.","venue":"ICSE","pages":"869-879","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PetrosyanRM15","doi":"10.1109/ICSE.2015.97","ee":"https://doi.org/10.1109/ICSE.2015.97","url":"https://dblp.org/rec/conf/icse/PetrosyanRM15"}, "url":"URL#3592327" }, { "@score":"1", "@id":"3592331", "info":{"authors":{"author":[{"@pid":"140/7942","text":"Van-Thuan Pham"},{"@pid":"167/0230","text":"Wei Boon Ng"},{"@pid":"04/9045","text":"Konstantin Rubinov"},{"@pid":"04/5884","text":"Abhik Roychoudhury"}]},"title":"Hercules: Reproducing Crashes in Real-World Application Binaries.","venue":"ICSE","pages":"891-901","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PhamNRR15","doi":"10.1109/ICSE.2015.99","ee":"https://doi.org/10.1109/ICSE.2015.99","url":"https://dblp.org/rec/conf/icse/PhamNRR15"}, "url":"URL#3592331" }, { "@score":"1", "@id":"3592335", "info":{"authors":{"author":[{"@pid":"25/2188","text":"Michael Pradel"},{"@pid":"152/5872","text":"Parker Schuh"},{"@pid":"04/418","text":"Koushik Sen"}]},"title":"TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript.","venue":"ICSE","pages":"314-324","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/PradelSS15","doi":"10.1109/ICSE.2015.51","ee":"https://doi.org/10.1109/ICSE.2015.51","url":"https://dblp.org/rec/conf/icse/PradelSS15"}, "url":"URL#3592335" }, { "@score":"1", "@id":"3592344", "info":{"authors":{"author":[{"@pid":"120/2795","text":"Rui Qiu"},{"@pid":"43/3366-1","text":"Guowei Yang 0001"},{"@pid":"03/4368","text":"Corina S. Pasareanu"},{"@pid":"k/SarfrazKhurshid","text":"Sarfraz Khurshid"}]},"title":"Compositional Symbolic Execution with Memoized Replay.","venue":"ICSE","pages":"632-642","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/QiuYPK15","doi":"10.1109/ICSE.2015.79","ee":"https://doi.org/10.1109/ICSE.2015.79","url":"https://dblp.org/rec/conf/icse/QiuYPK15"}, "url":"URL#3592344" }, { "@score":"1", "@id":"3592349", "info":{"authors":{"author":{"@pid":"71/2904","text":"Paul Ralph"}},"title":"Developing and Evaluating Software Engineering Process Theories.","venue":"ICSE","pages":"20-31","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Ralph15","doi":"10.1109/ICSE.2015.25","ee":"https://doi.org/10.1109/ICSE.2015.25","url":"https://dblp.org/rec/conf/icse/Ralph15"}, "url":"URL#3592349" }, { "@score":"1", "@id":"3592355", "info":{"authors":{"author":[{"@pid":"33/4870","text":"Germán Regis"},{"@pid":"24/9840","text":"Renzo Degiovanni"},{"@pid":"03/107","text":"Nicolás D'Ippolito"},{"@pid":"69/610","text":"Nazareno Aguirre"}]},"title":"Specifying Event-Based Systems with a Counting Fluent Temporal Logic.","venue":"ICSE","pages":"733-743","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/RegisDDA15","doi":"10.1109/ICSE.2015.86","ee":"https://doi.org/10.1109/ICSE.2015.86","url":"https://dblp.org/rec/conf/icse/RegisDDA15"}, "url":"URL#3592355" }, { "@score":"1", "@id":"3592357", "info":{"authors":{"author":[{"@pid":"82/10359","text":"Alexander von Rhein"},{"@pid":"04/9656","text":"Alexander Grebhahn"},{"@pid":"a/SvenApel","text":"Sven Apel"},{"@pid":"99/1780","text":"Norbert Siegmund"},{"@pid":"b/DirkBeyer1","text":"Dirk Beyer 0001"},{"@pid":"22/6472","text":"Thorsten Berger"}]},"title":"Presence-Condition Simplification in Highly Configurable Systems.","venue":"ICSE","pages":"178-188","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/RheinGAS0B15","doi":"10.1109/ICSE.2015.39","ee":"https://doi.org/10.1109/ICSE.2015.39","url":"https://dblp.org/rec/conf/icse/RheinGAS0B15"}, "url":"URL#3592357" }, { "@score":"1", "@id":"3592377", "info":{"authors":{"author":[{"@pid":"17/2324","text":"Caitlin Sadowski"},{"@pid":"167/0164","text":"Jeffrey van Gogh"},{"@pid":"36/1500","text":"Ciera Jaspan"},{"@pid":"42/9170","text":"Emma Söderberg"},{"@pid":"167/0185","text":"Collin Winter"}]},"title":"Tricorder: Building a Program Analysis Ecosystem.","venue":"ICSE","pages":"598-608","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SadowskiGJSW15","doi":"10.1109/ICSE.2015.76","ee":"https://doi.org/10.1109/ICSE.2015.76","url":"https://dblp.org/rec/conf/icse/SadowskiGJSW15"}, "url":"URL#3592377" }, { "@score":"1", "@id":"3592378", "info":{"authors":{"author":[{"@pid":"67/9972","text":"Ripon K. Saha"},{"@pid":"27/7057-1","text":"Lingming Zhang 0001"},{"@pid":"k/SarfrazKhurshid","text":"Sarfraz Khurshid"},{"@pid":"p/DEPerry","text":"Dewayne E. Perry"}]},"title":"An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes.","venue":"ICSE","pages":"268-279","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SahaZKP15","doi":"10.1109/ICSE.2015.47","ee":"https://doi.org/10.1109/ICSE.2015.47","url":"https://dblp.org/rec/conf/icse/SahaZKP15"}, "url":"URL#3592378" }, { "@score":"1", "@id":"3592382", "info":{"authors":{"author":[{"@pid":"167/0176","text":"Iflaah Salman"},{"@pid":"87/963","text":"Ayse Tosun Misirli"},{"@pid":"35/4144","text":"Natalia Juristo Juzgado"}]},"title":"Are Students Representatives of Professionals in Software Engineering Experiments?","venue":"ICSE","pages":"666-676","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SalmanMJ15","doi":"10.1109/ICSE.2015.82","ee":"https://doi.org/10.1109/ICSE.2015.82","url":"https://dblp.org/rec/conf/icse/SalmanMJ15"}, "url":"URL#3592382" }, { "@score":"1", "@id":"3592412", "info":{"authors":{"author":[{"@pid":"88/7055","text":"Janet Siegmund"},{"@pid":"99/1780","text":"Norbert Siegmund"},{"@pid":"a/SvenApel","text":"Sven Apel"}]},"title":"Views on Internal and External Validity in Empirical Software Engineering.","venue":"ICSE","pages":"9-19","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SiegmundSA15","doi":"10.1109/ICSE.2015.24","ee":"https://doi.org/10.1109/ICSE.2015.24","url":"https://dblp.org/rec/conf/icse/SiegmundSA15"}, "url":"URL#3592412" }, { "@score":"1", "@id":"3592414", "info":{"authors":{"author":{"@pid":"167/0173","text":"Claudio Silenzi"}},"title":"Software Engineering in Ferrari F1.","venue":"ICSE","pages":"3","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Silenzi15","doi":"10.1109/ICSE.2015.22","ee":"https://doi.org/10.1109/ICSE.2015.22","url":"https://dblp.org/rec/conf/icse/Silenzi15"}, "url":"URL#3592414" }, { "@score":"1", "@id":"3592420", "info":{"authors":{"author":[{"@pid":"76/9583","text":"Edward K. Smith"},{"@pid":"b/ChristianBird","text":"Christian Bird"},{"@pid":"19/3622-1","text":"Thomas Zimmermann 0001"}]},"title":"Build It Yourself! Homegrown Tools in a Large Software Company.","venue":"ICSE","pages":"369-379","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SmithBZ15","doi":"10.1109/ICSE.2015.56","ee":"https://doi.org/10.1109/ICSE.2015.56","url":"https://dblp.org/rec/conf/icse/SmithBZ15"}, "url":"URL#3592420" }, { "@score":"1", "@id":"3592436", "info":{"authors":{"author":[{"@pid":"42/6896-1","text":"Ting Su 0001"},{"@pid":"139/5447","text":"Zhoulai Fu"},{"@pid":"33/1678","text":"Geguang Pu"},{"@pid":"66/3868","text":"Jifeng He 0001"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"}]},"title":"Combining Symbolic Execution and Model Checking for Data Flow Testing.","venue":"ICSE","pages":"654-665","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/SuFPHS15","doi":"10.1109/ICSE.2015.81","ee":"https://doi.org/10.1109/ICSE.2015.81","url":"https://dblp.org/rec/conf/icse/SuFPHS15"}, "url":"URL#3592436" }, { "@score":"1", "@id":"3592443", "info":{"authors":{"author":[{"@pid":"16/9656","text":"Shin Hwei Tan"},{"@pid":"04/5884","text":"Abhik Roychoudhury"}]},"title":"relifix: Automated Repair of Software Regressions.","venue":"ICSE","pages":"471-482","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/TanR15","doi":"10.1109/ICSE.2015.65","ee":"https://doi.org/10.1109/ICSE.2015.65","url":"https://dblp.org/rec/conf/icse/TanR15"}, "url":"URL#3592443" }, { "@score":"1", "@id":"3592446", "info":{"authors":{"author":[{"@pid":"140/7129","text":"Chakkrit Tantithamthavorn"},{"@pid":"31/8127","text":"Shane McIntosh"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"},{"@pid":"22/8358","text":"Akinori Ihara"},{"@pid":"73/942","text":"Ken-ichi Matsumoto"}]},"title":"The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models.","venue":"ICSE","pages":"812-823","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Tantithamthavorn15","doi":"10.1109/ICSE.2015.93","ee":"https://doi.org/10.1109/ICSE.2015.93","url":"https://dblp.org/rec/conf/icse/Tantithamthavorn15"}, "url":"URL#3592446" }, { "@score":"1", "@id":"3592447", "info":{"authors":{"author":[{"@pid":"167/0208","text":"Valerio Terragni"},{"@pid":"c/SCCheung","text":"Shing-Chi Cheung"},{"@pid":"51/7008","text":"Charles Zhang"}]},"title":"RECONTEST: Effective Regression Testing of Concurrent Programs.","venue":"ICSE","pages":"246-256","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/TerragniCZ15","doi":"10.1109/ICSE.2015.45","ee":"https://doi.org/10.1109/ICSE.2015.45","url":"https://dblp.org/rec/conf/icse/TerragniCZ15"}, "url":"URL#3592447" }, { "@score":"1", "@id":"3592459", "info":{"authors":{"author":[{"@pid":"166/4957","text":"Michele Tufano"},{"@pid":"116/6732","text":"Fabio Palomba"},{"@pid":"09/8523","text":"Gabriele Bavota"},{"@pid":"18/6986","text":"Rocco Oliveto"},{"@pid":"d/MassimilianoDiPenta","text":"Massimiliano Di Penta"},{"@pid":"33/2785","text":"Andrea De Lucia"},{"@pid":"02/320","text":"Denys Poshyvanyk"}]},"title":"When and Why Your Code Starts to Smell Bad.","venue":"ICSE","pages":"403-414","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/TufanoPBOPLP15","doi":"10.1109/ICSE.2015.59","ee":"https://doi.org/10.1109/ICSE.2015.59","url":"https://dblp.org/rec/conf/icse/TufanoPBOPLP15"}, "url":"URL#3592459" }, { "@score":"1", "@id":"3592466", "info":{"authors":{"author":[{"@pid":"05/6486","text":"Mohsen Vakilian"},{"@pid":"167/0197","text":"Amarin Phaosawasdi"},{"@pid":"e/MDErnst","text":"Michael D. Ernst"},{"@pid":"j/RalphEJohnson","text":"Ralph E. Johnson"}]},"title":"Cascade: A Universal Programmer-Assisted Type Qualifier Inference Tool.","venue":"ICSE","pages":"234-245","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/VakilianPEJ15","doi":"10.1109/ICSE.2015.44","ee":"https://doi.org/10.1109/ICSE.2015.44","url":"https://dblp.org/rec/conf/icse/VakilianPEJ15"}, "url":"URL#3592466" }, { "@score":"1", "@id":"3592467", "info":{"authors":{"author":[{"@pid":"05/6486","text":"Mohsen Vakilian"},{"@pid":"123/7868","text":"Raluca Sauciuc"},{"@pid":"31/4906","text":"J. David Morgenthaler"},{"@pid":"m/VahabSMirrokni","text":"Vahab S. Mirrokni"}]},"title":"Automated Decomposition of Build Targets.","venue":"ICSE","pages":"123-133","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/VakilianSMM15","doi":"10.1109/ICSE.2015.34","ee":"https://doi.org/10.1109/ICSE.2015.34","url":"https://dblp.org/rec/conf/icse/VakilianSMM15"}, "url":"URL#3592467" }, { "@score":"1", "@id":"3592484", "info":{"authors":{"author":[{"@pid":"34/9298","text":"Michael Waterman"},{"@pid":"n/JamesNoble","text":"James Noble 0001"},{"@pid":"11/5571","text":"George Allan"}]},"title":"How Much Up-Front? A Grounded theory of Agile Architecture.","venue":"ICSE","pages":"347-357","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/WatermanNA15","doi":"10.1109/ICSE.2015.54","ee":"https://doi.org/10.1109/ICSE.2015.54","url":"https://dblp.org/rec/conf/icse/WatermanNA15"}, "url":"URL#3592484" }, { "@score":"1", "@id":"3592486", "info":{"authors":{"author":[{"@pid":"w/CathrinWeiss","text":"Cathrin Weiss"},{"@pid":"69/495","text":"Cindy Rubio-González"},{"@pid":"l/BenLiblit","text":"Ben Liblit"}]},"title":"Database-Backed Program Analysis for Scalable Error Propagation.","venue":"ICSE","pages":"586-597","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/WeissRL15","doi":"10.1109/ICSE.2015.75","ee":"https://doi.org/10.1109/ICSE.2015.75","url":"https://dblp.org/rec/conf/icse/WeissRL15"}, "url":"URL#3592486" }, { "@score":"1", "@id":"3592490", "info":{"authors":{"author":[{"@pid":"70/5189","text":"Michael W. Whalen"},{"@pid":"44/603","text":"Suzette Person"},{"@pid":"66/4832","text":"Neha Rungta"},{"@pid":"88/6925","text":"Matt Staats"},{"@pid":"118/3668","text":"Daniela Grijincu"}]},"title":"A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics.","venue":"ICSE","pages":"506-516","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/WhalenPRSG15","doi":"10.1109/ICSE.2015.68","ee":"https://doi.org/10.1109/ICSE.2015.68","url":"https://dblp.org/rec/conf/icse/WhalenPRSG15"}, "url":"URL#3592490" }, { "@score":"1", "@id":"3592494", "info":{"authors":{"author":[{"@pid":"46/1655-1","text":"Stefan Winter 0001"},{"@pid":"70/9359","text":"Oliver Schwahn"},{"@pid":"63/8166","text":"Roberto Natella"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"},{"@pid":"c/DomenicoCotroneo","text":"Domenico Cotroneo"}]},"title":"No PAIN, No Gain? The Utility of PArallel Fault INjections.","venue":"ICSE","pages":"494-505","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/WinterSNSC15","doi":"10.1109/ICSE.2015.67","ee":"https://doi.org/10.1109/ICSE.2015.67","url":"https://dblp.org/rec/conf/icse/WinterSNSC15"}, "url":"URL#3592494" }, { "@score":"1", "@id":"3592495", "info":{"authors":{"author":[{"@pid":"56/4411","text":"Edmund Wong"},{"@pid":"97/8704","text":"Lei Zhang"},{"@pid":"62/3151-9","text":"Song Wang 0009"},{"@pid":"161/1096","text":"Taiyue Liu"},{"@pid":"13/3957-1","text":"Lin Tan 0001"}]},"title":"DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing.","venue":"ICSE","pages":"620-631","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/WongZWLT15","doi":"10.1109/ICSE.2015.78","ee":"https://doi.org/10.1109/ICSE.2015.78","url":"https://dblp.org/rec/conf/icse/WongZWLT15"}, "url":"URL#3592495" }, { "@score":"1", "@id":"3592501", "info":{"authors":{"author":[{"@pid":"148/1336","text":"Rahulkrishna Yandrapally"},{"@pid":"83/5000","text":"Giriprasad Sridhara"},{"@pid":"13/1472","text":"Saurabh Sinha"}]},"title":"Automated Modularization of GUI Test Cases.","venue":"ICSE","pages":"44-54","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YandrapallySS15","doi":"10.1109/ICSE.2015.27","ee":"https://doi.org/10.1109/ICSE.2015.27","url":"https://dblp.org/rec/conf/icse/YandrapallySS15"}, "url":"URL#3592501" }, { "@score":"1", "@id":"3592503", "info":{"authors":{"author":[{"@pid":"03/1094-13","text":"Wei Yang 0013"},{"@pid":"13/9656","text":"Xusheng Xiao"},{"@pid":"167/0165","text":"Benjamin Andow"},{"@pid":"85/9349","text":"Sihan Li"},{"@pid":"x/TaoXie","text":"Tao Xie 0001"},{"@pid":"22/4463","text":"William Enck"}]},"title":"AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.","venue":"ICSE","pages":"303-313","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YangXALXE15","doi":"10.1109/ICSE.2015.50","ee":"https://doi.org/10.1109/ICSE.2015.50","url":"https://dblp.org/rec/conf/icse/YangXALXE15"}, "url":"URL#3592503" }, { "@score":"1", "@id":"3592504", "info":{"authors":{"author":[{"@pid":"16/8164","text":"Shengqian Yang"},{"@pid":"51/8164","text":"Dacong Yan"},{"@pid":"40/10453","text":"Haowei Wu"},{"@pid":"59/2227","text":"Yan Wang"},{"@pid":"83/1412","text":"Atanas Rountev"}]},"title":"Static Control-Flow Analysis of User-Driven Callbacks in Android Applications.","venue":"ICSE","pages":"89-99","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YangYWWR15","doi":"10.1109/ICSE.2015.31","ee":"https://doi.org/10.1109/ICSE.2015.31","url":"https://dblp.org/rec/conf/icse/YangYWWR15"}, "url":"URL#3592504" }, { "@score":"1", "@id":"3592505", "info":{"authors":{"author":[{"@pid":"68/10566","text":"Qiuping Yi"},{"@pid":"97/3485-6","text":"Zijiang Yang 0006"},{"@pid":"35/295-8","text":"Jian Liu 0008"},{"@pid":"81/3","text":"Chen Zhao"},{"@pid":"w/ChaoWang","text":"Chao Wang 0001"}]},"title":"A Synergistic Analysis Method for Explaining Failed Regression Tests.","venue":"ICSE","pages":"257-267","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YiYLZW15","doi":"10.1109/ICSE.2015.46","ee":"https://doi.org/10.1109/ICSE.2015.46","url":"https://dblp.org/rec/conf/icse/YiYLZW15"}, "url":"URL#3592505" }, { "@score":"1", "@id":"3592506", "info":{"authors":{"author":[{"@pid":"70/10471","text":"YoungSeok Yoon"},{"@pid":"54/1970","text":"Brad A. Myers"}]},"title":"Supporting Selective Undo in a Code Editor.","venue":"ICSE","pages":"223-233","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YoonM15","doi":"10.1109/ICSE.2015.43","ee":"https://doi.org/10.1109/ICSE.2015.43","url":"https://dblp.org/rec/conf/icse/YoonM15"}, "url":"URL#3592506" }, { "@score":"1", "@id":"3592507", "info":{"authors":{"author":[{"@pid":"54/5694","text":"Koen Yskout"},{"@pid":"82/5205","text":"Riccardo Scandariato"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Do Security Patterns Really Help Designers?","venue":"ICSE","pages":"292-302","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YskoutSJ15","doi":"10.1109/ICSE.2015.49","ee":"https://doi.org/10.1109/ICSE.2015.49","url":"https://dblp.org/rec/conf/icse/YskoutSJ15"}, "url":"URL#3592507" }, { "@score":"1", "@id":"3592508", "info":{"authors":{"author":[{"@pid":"04/10702","text":"Zhongxing Yu"},{"@pid":"15/6962","text":"Chenggang Bai"},{"@pid":"71/5252","text":"Kai-Yuan Cai"}]},"title":"Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests.","venue":"ICSE","pages":"924-935","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YuBC15","doi":"10.1109/ICSE.2015.102","ee":"https://doi.org/10.1109/ICSE.2015.102","url":"https://dblp.org/rec/conf/icse/YuBC15"}, "url":"URL#3592508" }, { "@score":"1", "@id":"3592509", "info":{"authors":{"author":[{"@pid":"35/824","text":"Xiang Yuan"},{"@pid":"51/3529-2","text":"Chenggang Wu 0002"},{"@pid":"00/8025","text":"Zhenjiang Wang"},{"@pid":"34/780","text":"Jianjun Li"},{"@pid":"y/PenChungYew","text":"Pen-Chung Yew"},{"@pid":"68/4706-1","text":"Jeff Huang 0001"},{"@pid":"f/XiaobingFeng2","text":"Xiaobing Feng 0002"},{"@pid":"00/6040","text":"Yanyan Lan"},{"@pid":"48/474","text":"Yunji Chen"},{"@pid":"04/606","text":"Yong Guan"}]},"title":"ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks.","venue":"ICSE","pages":"824-834","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/YuanWWLYHFLCG15","doi":"10.1109/ICSE.2015.94","ee":"https://doi.org/10.1109/ICSE.2015.94","url":"https://dblp.org/rec/conf/icse/YuanWWLYHFLCG15"}, "url":"URL#3592509" }, { "@score":"1", "@id":"3592513", "info":{"authors":{"author":[{"@pid":"17/1651-1","text":"Yufeng Zhang 0001"},{"@pid":"02/4907","text":"Zhenbang Chen"},{"@pid":"64/856-1","text":"Ji Wang 0001"},{"@pid":"92/748-6","text":"Wei Dong 0006"},{"@pid":"l/ZhimingLiu1","text":"Zhiming Liu 0001"}]},"title":"Regular Property Guided Dynamic Symbolic Execution.","venue":"ICSE","pages":"643-653","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZhangCWD015","doi":"10.1109/ICSE.2015.80","ee":"https://doi.org/10.1109/ICSE.2015.80","url":"https://dblp.org/rec/conf/icse/ZhangCWD015"}, "url":"URL#3592513" }, { "@score":"1", "@id":"3592514", "info":{"authors":{"author":[{"@pid":"17/322-1","text":"Tianyi Zhang 0001"},{"@pid":"85/2806","text":"Myoungkyu Song"},{"@pid":"167/0170","text":"Joseph Pinedo"},{"@pid":"56/5320","text":"Miryung Kim"}]},"title":"Interactive Code Review for Systematic Changes.","venue":"ICSE","pages":"111-122","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZhangSPK15","doi":"10.1109/ICSE.2015.33","ee":"https://doi.org/10.1109/ICSE.2015.33","url":"https://dblp.org/rec/conf/icse/ZhangSPK15"}, "url":"URL#3592514" }, { "@score":"1", "@id":"3592517", "info":{"authors":{"author":[{"@pid":"06/5514-1","text":"Hao Zhong 0001"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"}]},"title":"An Empirical Study on Real Bug Fixes.","venue":"ICSE","pages":"913-923","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZhongS15","doi":"10.1109/ICSE.2015.101","ee":"https://doi.org/10.1109/ICSE.2015.101","url":"https://dblp.org/rec/conf/icse/ZhongS15"}, "url":"URL#3592517" }, { "@score":"1", "@id":"3592521", "info":{"authors":{"author":[{"@pid":"10/2717","text":"Jieming Zhu"},{"@pid":"147/1619","text":"Pinjia He"},{"@pid":"17/1352","text":"Qiang Fu"},{"@pid":"29/2726-2","text":"Hongyu Zhang 0002"},{"@pid":"l/MichaelRLyu","text":"Michael R. Lyu"},{"@pid":"87/461-1","text":"Dongmei Zhang 0001"}]},"title":"Learning to Log: Helping Developers Make Informed Logging Decisions.","venue":"ICSE","pages":"415-425","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZhuHFZLZ15","doi":"10.1109/ICSE.2015.60","ee":"https://doi.org/10.1109/ICSE.2015.60","url":"https://dblp.org/rec/conf/icse/ZhuHFZLZ15"}, "url":"URL#3592521" }, { "@score":"1", "@id":"3592522", "info":{"authors":{"author":[{"@pid":"120/2094","text":"Haitao Steve Zhu"},{"@pid":"167/0232","text":"Chaoren Lin"},{"@pid":"30/3456","text":"Yu David Liu"}]},"title":"A Programming Model for Sustainable Software.","venue":"ICSE","pages":"767-777","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZhuLL15","doi":"10.1109/ICSE.2015.89","ee":"https://doi.org/10.1109/ICSE.2015.89","url":"https://dblp.org/rec/conf/icse/ZhuLL15"}, "url":"URL#3592522" }, { "@score":"1", "@id":"3592527", "info":{"authors":{"author":[{"@pid":"167/0212","text":"Daming Zou"},{"@pid":"12/6277","text":"Ran Wang"},{"@pid":"82/2673","text":"Yingfei Xiong 0001"},{"@pid":"z/LuZhang1","text":"Lu Zhang 0023"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"},{"@pid":"14/2036","text":"Hong Mei 0001"}]},"title":"A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies.","venue":"ICSE","pages":"529-539","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ZouWXZSM15","doi":"10.1109/ICSE.2015.70","ee":"https://doi.org/10.1109/ICSE.2015.70","url":"https://dblp.org/rec/conf/icse/ZouWXZSM15"}, "url":"URL#3592527" }, { "@score":"1", "@id":"3670058", "info":{"authors":{"author":[{"@pid":"03/3919","text":"Antonia Bertolino"},{"@pid":"63/4434","text":"Gerardo Canfora"},{"@pid":"e/SebastianGElbaum","text":"Sebastian G. Elbaum"}]},"title":"37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1","venue":"ICSE","publisher":"IEEE Computer Society","year":"2015","type":"Editorship","key":"conf/icse/2015-1","ee":"https://ieeexplore.ieee.org/xpl/conhome/7174815/proceeding","url":"https://dblp.org/rec/conf/icse/2015-1"}, "url":"URL#3670058" } ] } } } )