


default search action
46th ICSE 2024: Lisbon, Portugal - Companion
- Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, ICSE Companion 2024, Lisbon, Portugal, April 14-20, 2024. ACM 2024
Demonstrations
- Nuno Saavedra
, André Silva
, Martin Monperrus
:
GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions. 1-5 - Wei Minn
, Yan Naing Tun
, Lwin Khin Shar
, Lingxiao Jiang
:
DronLomaly: Runtime Log-based Anomaly Detector for DJI Drones. 6-10 - Zhiqiang Zang
, Aditya Thimmaiah
, Milos Gligoric
:
JOG: Java JIT Peephole Optimizations and Tests from Patterns. 11-15 - Georgios Alexopoulos
, Dimitris Mitropoulos
:
nvshare: Practical GPU Sharing without Memory Size Constraints. 16-20 - Sami Lazreg
, Maxime Cordy
, Simon Thrane Hansen
, Axel Legay
:
Daedalux: An Extensible Platform for Variability-Aware Model Checking. 21-25 - Rijnard van Tonder
:
Verifying and Displaying Move Smart Contract Source Code for the Sui Blockchain. 26-29 - Arkadii Sapozhnikov
, Mitchell Olsthoorn
, Annibale Panichella
, Vladimir Kovalenko
, Pouria Derakhshanfar
:
TestSpark: IntelliJ IDEA's Ultimate Test Generation Companion. 30-34 - André C. Hora
:
SpotFlow: Tracking Method Calls and States at Runtime. 35-39 - Brian Sigurdson
, Samuel W. Flint
, Robert Dyer
:
Boidae: Your Personal Mining Platform. 40-43 - Thomas Le Tourneau
, Jasmine Latendresse
, Ahmad Abdellatif
, Emad Shihab
:
Code Mapper: Mapping the Global Contributions of OSS. 44-48 - Ashwin Prasad Shivarpatna Venkatesh
, Samkutty Sabu
, Jiawei Wang
, Amir M. Mir
, Li Li
, Eric Bodden
:
TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools. 49-53 - Michael Assad
, Christopher S. Meiklejohn
, Heather Miller
, Stephan Krusche
:
Can My Microservice Tolerate an Unreliable Database? Resilience Testing with Fault Injection and Visualization. 54-58 - Clinton Cao
, Simon Schneider
, Nicolás E. Díaz Ferreyra
, Sicco Verwer
, Annibale Panichella
, Riccardo Scandariato
:
CATMA: Conformance Analysis Tool For Microservice Applications. 59-63 - Kristóf Marussy
, Attila Ficsor
, Oszkár Semeráth
, Dániel Varró
:
Refinery: Graph Solver as a Service: Refinement-based Generation and Analysis of Consistent Models. 64-68 - Rafael F. Toledo
, Joanne M. Atlee
, Rui Ming Xiong
, Mingyu Liu
:
(Neo4j)^ Browser: Visualizing Variable-Aware Analysis Results. 69-73 - Mohammed Oualid Attaoui
, Fabrizio Pastore
, Lionel C. Briand
:
SAFE: Safety Analysis and Retraining of DNNs. 74-78 - Michael Ferdinando Urrico
, Diego Clerissi
, Leonardo Mariani
:
MutaBot: A Mutation Testing Approach for Chatbots. 79-83 - Eman Abdullah AlOmar
, Benjamin Knobloch
, Thomas Kain
, Christopher Kalish
, Mohamed Wiem Mkaouer
, Ali Ouni
:
AntiCopyPaster 2.0: Whitebox just-in-time code duplicates extraction. 84-88 - Liam Todd
, John Grundy
, Christoph Treude
:
GitHubInclusifier: Finding and fixing non-inclusive language in GitHub Repositories. 89-93 - Lev Sorokin
, Tiziano Munaro
, Damir Safin
, Brian Hsuan-Cheng Liao
, Adam Molin
:
OpenSBT: A Modular Framework for Search-based Testing of Automated Driving Systems. 94-98 - Tarek Mahmud
, Meiru Che
, Jihan Rouijel
, Mujahid Khan
, Guowei Yang
:
APICIA: An API Change Impact Analyzer for Android Apps. 99-103 - Feifei Niu
, Junqian Shao
, Chaofan Xu
, Christoph Mayr-Dorn
, Wesley K. G. Assunção
, Liguo Huang
, Chuanyi Li
, Jidong Ge
, Bin Luo
, Alexander Egyed
:
RAT: A Refactoring-Aware Tool for Tracking Code History. 104-108 - Lyla Naghipour Vijouyeh
, Rodrigo Bruno
, Paulo Ferreira
:
Emulation Tool For Android Edge Devices. 109-113 - Mustafa Al-Lail
, Antonio Rosales Viesca
, Hector Cardenas
, Mohammad Zarour
, Alfredo J. Perez
:
TPV: A Tool for Validating Temporal Properties in UML Class Diagrams. 114-118 - Ningzhi Tang
, Junwen An
, Meng Chen
, Aakash Bansal
, Yu Huang
, Collin McMillan
, Toby Jia-Jun Li
:
CodeGRITS: A Research Toolkit for Developer Behavior and Eye Tracking in IDE. 119-123 - Hongyue Pan
, Yilong Yang
:
ValidGen: A Tool for Automatic Generation of Validation Scripts to Support Rapid Requirements Validation. 124-128 - Wenhan Feng
, Qiugen Pei
, Yu Gao
, Dong Wang
, Wensheng Dou
, Jun Wei
, Zheheng Liang
, Zhenyue Long
:
FaultFuzz: A Coverage Guided Fault Injection Tool for Distributed Systems. 129-133 - Sajad Khatiri
, Sebastiano Panichella
, Paolo Tonella
:
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist. 134-138
Doctoral Symposium
- Bernd Gruner
:
Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow Analysis. 139-141 - Johann Glock
:
Aiding Developer Understanding of Software Changes via Symbolic Execution-based Semantic Differencing. 142-144 - Sandro Speth
:
Architecture-Based Cross-Component Issue Management and Propagation Analysis. 145-149 - Arina Kudriavtseva
:
A Software Security Evaluation Framework. 150-152 - Konstantin Rupert Blaschke
:
Automated Model Quality Estimation and Change Impact Analysis on Model Histories. 153-155 - Ketai Qiu
:
Autonomic Testing: Testing with Scenarios from Production. 156-158 - Daniel Rodríguez-Cárdenas
:
Beyond Accuracy and Robustness Metrics for Large Language Models for Code. 159-161 - Alejandro Velasco
:
Beyond Accuracy: Evaluating Source Code Capabilities in Large Language Models for Software Engineering. 162-164 - Michael Schlichtig
:
Building a Framework to Improve the User Experience of Static Analysis Tools. 165-169 - Tor Sporsem
:
Discovering Explainability Requirements in ML-Based Software. 170-172 - Hanan Abdulwahab Siala
:
Enhancing Model-Driven Reverse Engineering Using Machine Learning. 173-175 - Soneya Binta Hossain
:
Ensuring Critical Properties of Test Oracles for Effective Bug Detection. 176-180 - Yutan Huang
:
Generating User Experience Based on Personas with AI Assistants. 181-183 - Julien Malka
:
Increasing trust in the open source supply chain with reproducible builds and functional package management. 184-186 - Stefano Lambiase
:
Investigating Cultural Dispersion: on the Role of Cultural Differences in Software Development Teams. 187-191 - Felix Wallner
:
Learning Models of Cyber-Physical Systems with Discrete and Continuous Behaviour for Digital Twin Synthesis. 192-194 - Alexander Lercher
:
Managing API Evolution in Microservice Architecture. 195-197 - Niklas Meißner
:
MEITREX - Gamified and Adaptive Intelligent Tutoring in Software Engineering Education. 198-200 - Yanfu Yan
:
On Improving Management of Duplicate Video-Based Bug Reports. 201-203 - Jonathan Katzy
:
Programming Language Models in Multilingual Settings. 204-206 - Matías Brizzio
:
Resolving Goal-Conflicts and Scaling Synthesis through Mode-Based Decomposition. 207-211 - Alejandra Duque-Torres
:
Selecting and Constraining Metamorphic Relations. 212-216 - Fauzia Khan
:
Simulation-based Testing of Automated Driving Systems. 217-219 - Noura El Moussa
:
Smart Quality Monitoring for Evolving Complex Systems. 220-224 - Nathan Wintersgill
:
Studying and Improving Software License Compliance in Practice. 225-227 - Kushal Ramkumar
:
Sustainable Adaptive Security. 228-230 - Christoph König
:
Sustainable Software Engineering: Visions and Perspectives beyond Energy Efficiency. 231-233 - Jiayi Sun
:
Sustaining Scientific Open-Source Software Ecosystems: Challenges, Practices, and Opportunities. 234-236 - Junayed Mahmud
:
Toward Rapid Bug Resolution for Android Apps. 237-241 - Sarmad Bashir
:
Towards AI-centric Requirements Engineering for Industrial Systems. 242-246 - Tobias Dürschmid
:
Towards Automatic Inference of Behavioral Component Models for ROS-Based Robotics Systems. 247-251 - Eva Zimmermann
:
Towards Combining STPA and Safety-Critical Runtime Monitoring. 252-254 - Atish Kumar Dipongkor
:
Towards Interpreting the Behavior of Large Language Models on Software Engineering Tasks. 255-257 - Ali Al-Kaswan
:
Towards Safe, Secure, and Usable LLMs4Code. 258-260 - Amirhossein Deljouyi
:
Understandable Test Generation Through Capture/Replay and LLMs. 261-263
Poster Papers
- Timur Saglam
, Sebastian Hahner
, Larissa Schmid
, Erik Burger
:
Obfuscation-Resilient Software Plagiarism Detection with JPlag. 264-265 - Riccardo Coppola
, Tommaso Fulcini
, Marco Torchiano
:
Poster: Kotlin Assimilating the Android Ecosystem - An Appraisal of Diffusion and Impact on Maintainability. 266-267 - Lucas Franke
, Huayu Liang
, Aaron Brantly
, James C. Davis
, Chris Brown
:
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software. 268-269 - Tao Huang
, Zhihong Sun
, Zhi Jin
, Ge Li
, Chen Lyu
:
KareCoder: A New Knowledge-Enriched Code Generation System. 270-271 - Long He
, Xiangfu Zhao
, Yichen Wang
:
ParSE: Efficient Detection of Smart Contract Vulnerabilities via Parallel and Simplified Symbolic Execution. 272-273 - Lorenz Graf-Vlachy
, Stefan Wagner
:
Endogeneity, Instruments, and Two-Stage Models. 274-275 - Chenyuan Zhang
, Hao Liu
, Jiutian Zeng
, Kejing Yang
, Yuhong Li
, Hui Li
:
Prompt-Enhanced Software Vulnerability Detection Using ChatGPT. 276-277 - Sophie Corallo
, Thomas Weber
, Lars König
, Kathrin Leonie Schmidt
, Frederik Reiche
, Anne Koziolek
:
What do you assume? A Theory of Security-Related Assumptions. 278-279 - Honghao Chen
, Ye Tang
, Hao Zhong
:
An Empirical Study on Cross-language Clone Bugs. 280-281 - Jonathan Lee
, Mason Li
, Kuo-Hsun Hsu
:
Applying Transformer Models for Automatic Build Errors Classification of Java-Based Open Source Projects. 282-283 - Fangqing Liu
, Han Huang
, Yi Xiang
:
Micro-scale Concolic Testing Framework for Automated Test Data Generation Based on Path Coverage. 284-285 - Amirhossein Zolfagharian
, Manel Abdellatif
, Lionel C. Briand
, Ramesh S.
:
Safety Monitoring of Deep Reinforcement Learning Agents. 286-287 - Susmita Haldar
, Luiz Fernando Capretz
:
Interpretable Software Maintenance and Support Effort Prediction Using Machine Learning. 288-289 - Luiz Alexandre Costa
, Edson Dias
, Danilo Monteiro Ribeiro
, Awdren L. Fontão
, Gustavo Pinto
, Rodrigo Pereira dos Santos
, Alexander Serebrenik
:
An Actionable Framework for Understanding and Improving Talent Retention as a Competitive Advantage in IT Organizations. 290-291 - Anamaria-Roberta Preda
, Christoph Mayr-Dorn
, Atif Mashkoor
, Wesley Klewerton Guez Assunção
, Alexander Egyed
:
Towards Leveraging Fine-Grained Dependencies to Check Requirements Traceability Correctness. 292-293 - Jingwei Xu
, Zihan Zeng
:
Programmable and Semantic Connector for DNN Component Integration: a Software Engineering Perspective. 294-295 - Debasish Chakroborti
, Chanchal Roy
, Kevin A. Schneider
:
A Study of Backporting Code in Open-Source Software for Characterizing Changesets. 296-297 - Ngoc-Thanh Nguyen
, Rogardt Heldal
, Patrizio Pelliccione
:
Engineering Industry-Ready Anomaly Detection Algorithms. 298-299 - Daniel Sokolowski
, David Spielmann
, Guido Salvaneschi
:
Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code. 300-301 - Yi Li
, Tien N. Nguyen
, Shaohua Wang
, Aashish Yadavally
:
Poirot: Deep Learning for API Misuse Detection. 302-303 - Alexander Schulz-Rosengarten
, Akash Ahmad
, Malte Clement
, Reinhard von Hanxleden
, Benjamin Asch
, Marten Lohstroh
, Edward A. Lee
, Gustavo Quiros Araya
, Ankit Shukla
:
Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua Franca. 304-305 - Zhong Li
, Jiayang Shi
, Matthijs van Leeuwen
:
Graph Neural Networks based Log Anomaly Detection and Explanation. 306-307 - Youmei Fan
, Dong Wang
, Supatsara Wattanakriengkrai
, Hathaichanok Damrongsiri
, Christoph Treude
, Hideaki Hata
, Raula Gaikovina Kula
:
Going Viral: Case Studies on the Impact of Protestware. 308-309 - Valtteri Siitonen
, Saima Ritonummi
, Markus Salo
, Henri Pirkkalainen
, Saija Mauno
:
Understanding the Strategies Used by Employees to Cope with Technostress in the Software Industry. 310-311 - Yiwen Wu
, Yang Zhang
, Tao Wang
, Huaimin Wang
:
A Transformer-based Model for Assisting Dockerfile Revising. 312-313 - Zhiyi Xue
, Liangguo Li
, Senyue Tian
, Xiaohong Chen
, Pingping Li
, Liangyu Chen
, Tingting Jiang
, Min Zhang
:
Domain Knowledge is All You Need: A Field Deployment of LLM-Powered Test Case Generation in FinTech Domain. 314-315 - Yi Li
, Tien N. Nguyen
, Yuchen Cai
, Aashish Yadavally
, Abhishek Mishra
, Genesis Montejo
:
Neural Exception Handling Recommender. 316-317 - Chunmiao Li
, Yijun Yu
, Haitao Wu
, Luca Carlig
, Shijie Nie
, Lingxiao Jiang
:
Unleashing the Power of Clippy in Real-World Rust Projects. 318-319 - Stefania Dumbrava
, Zhao Jin
, Burcu Kulahcioglu Ozkan
, Jingxuan Qiu
:
GRAIL: Checking Transaction Isolation Violations with Graph Queries. 320-321 - Olivier Zeyen
, Maxime Cordy
, Gilles Perrouin
, Mathieu Acher
:
Exploring the Computational Complexity of SAT Counting and Uniform Sampling with Phase Transitions. 322-323 - Yepeng Ding
, Arthur Gervais
, Roger Wattenhofer
, Hiroyuki Sato
:
Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification. 324-325 - Nico Ritschel
, Felipe Fronchetti
, Reid Holmes
, Ronald Garcia
, David C. Shepherd
:
Blocks? Graphs? Why Not Both? Designing and Evaluating a Hybrid Programming Environment for End-users. 326-327 - Rui Ren
, Jingbang Yang
, Linxiao Yang
, Xinyue Gu
, Liang Sun
:
SLIM: a Scalable Light-weight Root Cause Analysis for Imbalanced Data in Microservice. 328-330 - Olga Ratushniak
, Beatriz Cabrero Daniel
:
Designing Digital Twins for Enhanced Reusability. 331-332 - Jinseok Heo
, Eunseok Lee
:
Analyzing the Impact of Context Representation and Scope in Code Infilling. 333-334 - Keita Sakuma
, Ryuta Matsuno
, Yoshio Kameda
:
eAIEDF: Extended AI Error Diagnosis Flowchart for Automatically Identifying Misprediction Causes in Production Models. 335-336 - Sara Fernandes
, Ademar Aguiar
, André Restivo
:
The Impact of a Live Refactoring Environment on Software Development. 337-338 - Dirk Beyer
, Matthias Kettl
, Thomas Lemberger
:
Fault Localization on Verification Witnesses (Poster Paper). 339-340 - Daniel Haak
, Raphael Mayr
, Jan-Philipp Steghöfer
, Alexandra Teynor
, Phillip Heidegger
:
Tracking assets in source code with Security Annotations. 341-342 - Galileu Santos de Jesus
, Paulo Borba
, Rodrigo Bonifácio
, Matheus Barbosa de Oliveira
:
Lightweight Semantic Conflict Detection with Static Analysis. 343-345 - Xiaoting Du
, Chenglong Li
, Xiangyue Ma
, Zheng Zheng
:
How Does Pre-trained Language Model Perform on Deep Learning Framework Bug Prediction? 346-347 - Matteo Camilli
, Raffaela Mirandola
:
Multi-requirement Parametric Falsification. 348-349 - Georgia M. Kapitsaki
, Maria Papoutsoglou
:
GDPR indications in commits messages in GitHub repositories. 350-351 - Binger Chen
, Jacek Golebiowski
, Ziawasch Abedjan
:
Towards Data Augmentation for Supervised Code Translation. 352-353 - Xiaolei Chen
, Jie Shi
, Jia Chen
, Peng Wang
, Wei Wang
:
High-precision Online Log Parsing with Large Language Models. 354-355 - Vatsal Venkatkrishna
, Durga Shree Nagabushanam
, Emmanuel Iko-Ojo Simon
, Melina C. Vidoni
:
Multi-step Automated Generation of Parameter Docstrings in Python: An Exploratory Study. 356-357 - Matias Martinez
, Silverio Martínez-Fernández
, Xavier Franch
:
Energy Consumption of Automated Program Repair. 358-359 - Laura Plein
, Wendkûuni C. Ouédraogo
, Jacques Klein
, Tegawendé F. Bissyandé
:
Automatic Generation of Test Cases based on Bug Reports: a Feasibility Study with Large Language Models. 360-361 - Saifullah Mahbub
, Md. Easin Arafat
, Chowdhury Rafeed Rahman
, Zannatul Ferdows
, Masum Hasan
:
ReviewRanker: A Semi-Supervised Learning Based Approach for Code Review Quality Estimation. 362-363 - Yilun Liu
, Shimin Tao
, Weibin Meng
, Feiyu Yao
, Xiaofeng Zhao
, Hao Yang
:
LogPrompt: Prompt Engineering Towards Zero-Shot and Interpretable Log Analysis. 364-365 - Arumoy Shome
, Luís Cruz
, Arie van Deursen
:
Data vs. Model Machine Learning Fairness Testing: An Empirical Study. 366-367 - Aurora Papotti
, Fabio Massacci
, Katja Tuma
:
On the Effects of Program Slicing for Vulnerability Detection during Code Inspection: Extended Abstract. 368-369 - Partha Protim Paul
, Md Tonoy Akanda
, Mohammed Raihan Ullah
, Dipto Mondal
, Nazia Sultana Chowdhury
, Fazle Mohammed Tawsif
:
xNose: A Test Smell Detector for C#. 370-371 - Jahnavi Kumar
, Sridhar Chimalakonda
:
On the Need for Empirically Investigating Fast-Growing Programming Languages. 372-373 - Weifeng Pan
, Wei Wu
, Ming Hua, Dae-Kyoo Kim
, Jinkai Yang
, Ruochen Liu
:
Improving the Condensing of Reverse Engineered Class Diagrams using Weighted Network Metrics. 374-375 - Sristy Sumana Nath
, Banani Roy
:
Recovering Traceability Links between Release Notes and Related Software Artifacts. 376-377 - Profir-Petru Pârtachi
, Mahito Sugiyama
:
Bringing Structure to Naturalness: On the Naturalness of ASTs. 378-379 - Vincenzo Corso
, Leonardo Mariani
, Daniela Micucci
, Oliviero Riganelli
:
Assessing AI-Based Code Assistants in Method Generation Tasks. 380-381 - Dong Jae Kim
, Tse-Hsun Chen
:
Exploring the Impact of Inheritance on Test Code Maintainability. 382-383 - Myeongsoo Kim
, Santosh Pande
, Alessandro Orso
:
Improving Program Debloating with 1-DU Chain Minimality. 384-385 - Md Nakhla Rafi
, An Ran Chen
, Tse-Hsun (Peter) Chen
, Shaohua Wang
:
Exploring Data Cleanness in Defects4J and Its Influence on Fault Localization Efficiency. 386-387 - Wenchuan Mu
, Kwan Hui Lim
:
Towards Precise Observations of Neural Model Robustness in Classification. 388-389 - Sarah Fakhoury
, Aaditya Naik
, Georgios Sakkas
, Saikat Chakraborty
, Madan Musuvathi
, Shuvendu K. Lahiri
:
Exploring the Effectiveness of LLM based Test-driven Interactive Code Generation: User Study and Empirical Evaluation. 390-391 - Issam Sedki
, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed
, Naser Ezzati-Jivan
, Mohammed A. Shehab
:
Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable Solutions. 392-393 - Sashko Ristov
, Philipp Gritsch
, David Meyer
, Michael Felderer
:
GoSpeechLess: Interoperable Serverless ML-based Cloud Services. 394-395 - Xunzhu Tang
, Haoye Tian
, Zhenghan Chen
, Weiguo Pian
, Saad Ezzini
, Abdoul Kader Kaboré
, Andrew Habib
, Jacques Klein
, Tegawendé F. Bissyandé
:
Learning to Represent Patches. 396-397 - Changshu Liu
, Pelin Çetin
, Yogesh Patodia
, Baishakhi Ray
, Saikat Chakraborty
, Yangruibo Ding
:
Automated Code Editing with Search-Generate-Modify. 398-399 - David R. Ferreira
, Alexandra Mendes
, João F. Ferreira
:
How are Contracts Used in Android Mobile Applications? 400-401 - Verya Monjezi
, Ashish Kumar
, Gang Tan
, Ashutosh Trivedi
, Saeid Tizpaz-Niari
:
Causal Graph Fuzzing for Fair ML Sofware Development. 402-403 - Mira Bhagirathi Kaniyur
, Ana Cavalcante-Studart
, Yihan Yang
, Sangeon Park
, David Chen
, Duy Lam
, Lucas Bang
:
Path Complexity Analysis for Interprocedural Code. 404-405 - Wendkûuni C. Ouédraogo
, Laura Plein
, Abdoul Kader Kaboré
, Andrew Habib
, Jacques Klein
, David Lo
, Tegawendé F. Bissyandé
:
Extracting Relevant Test Inputs from Bug Reports for Automatic Test Case Generation. 406-407 - Abhishek Kumar
, Partha Pratim Das
, Partha Pratim Chakrabarti
:
ICLNet: Stepping Beyond Dates for Robust Issue-Commit Link Recovery. 408-409 - Sarah Fakhoury
, Saikat Chakraborty
, Madanlal Musuvathi
, Shuvendu K. Lahiri
:
NL2Fix: Generating Functionally Correct Code Edits from Bug Descriptions. 410-411 - Francesco Minna
, Agathe Blaise
, Fabio Massacci
, Katja Tuma
:
Automated Security Repair for Helm Charts. 412-413 - Zhengxin Li
, Junfeng Zhao
, Jia Kang
:
Multi-source Anomaly Detection For Microservice Systems. 414-415 - Zeju Cai
, Jianguo Chen
, Wenqing Chen
, Weicheng Wang
, Xiangyuan Zhu
, Aijia Ouyang
:
F-CodeLLM: A Federated Learning Framework for Adapting Large Language Models to Practical Software Development. 416-417 - Amirmohammad Nazari
, Souti Chattopadhyay
, Swabha Swayamdipta
, Mukund Raghothaman
:
NomNom: Explanatory Function Names for Program Synthesizers. 418-419 - Zhipeng Yin
, Zichong Wang
, Wenbin Zhang
:
Improving Fairness in Machine Learning Software via Counterfactual Fairness Thinking. 420-421 - Xiaoli Lian
, Shuaisong Wang
, Jieping Ma
, Xin Tan
, Fang Liu
, Lin Shi
, Cuiyun Gao
, Li Zhang
:
Imperfect Code Generation: Uncovering Weaknesses in Automatic Code Generation by Large Language Models. 422-423
Technical Briefings
- Adel Noureddine
:
Analyzing Software Energy Consumption. 424-425 - Shaukat Ali
:
Quantum Software Testing 101. 426-427 - Paolo Arcaini
, Fuyuki Ishikawa
, Lei Ma
, Yuta Maezawa
, Nobukazu Yoshioka
, Fuyuan Zhang
:
Technical Briefing on Deep Neural Network Repair. 428-430 - Dayi Lin
, Filipe Roseiro Côgo
, Gopi Krishnan Rajbahadur
, Ahmed E. Hassan
:
Technical Brief on Software Engineering for FMware. 431-433 - Fatemeh H. Fard
:
Technical Briefing on Parameter Efficient Fine-Tuning of (Large) Language Models for Code-Intelligence. 434-435 - Rashina Hoda
:
Technical Briefing on Socio-Technical Grounded Theory for Qualitative Data Analysis. 436-437
SRC - ACM Student Research Competition
- Atish Kumar Dipongkor
:
An Ensemble Method for Bug Triaging using Large Language Models. 438-440 - Yang Chen
:
Flakiness Repair in the Era of Large Language Models. 441-443 - Lyuye Zhang
:
Vulnerability Root Cause Function Locating For Java Vulnerabilities. 444-446 - Xiang Chen
:
IntTracer: Sanitization-aware IO2BO Vulnerability Detection across Codebases. 447-449 - Zhou Yang
:
Classifying Source Code: How Far Can Compressor-based Classifiers Go? 450-452 - Ali Reza Ibrahimzada
:
Program Decomposition and Translation with Static Analysis. 453-455 - Aren A. Babikian
:
Refining Abstract Specifications into Dangerous Traffic Scenarios. 456-458
Industry Challenge
- Yuxiao Chen
, Jingzheng Wu
, Xiang Ling
, Changjiang Li
, Zhiqing Rui
, Tianyue Luo
, Yanjun Wu
:
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? 459-471 - Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao:
ReposVul: A Repository-Level High-Quality Vulnerability Dataset. 472-483 - Ying Fu
, Teng Wang
, Shanshan Li
, Jinyan Ding
, Shulin Zhou
, Zhouyang Jia
, Wang Li
, Yu Jiang
, Xiangke Liao
:
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs. 484-495

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.