Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments
Article No.: 28, pp 1–30https://doi.org/10.1145/3533818

Testing with simulation environments helps to identify critical failing scenarios for self-driving cars (SDCs). Simulation-based tests are safer than in-field operational tests and allow detecting software defects before deployment. However, these tests ...

research-article
Graded Refinement, Retrenchment, and Simulation
Article No.: 29, pp 1–69https://doi.org/10.1145/3534116

Refinement of formal system models towards implementation has been a mainstay of system development since the inception of formal and Correct by Construction approaches to system development. However, pure refinement approaches do not always deal fluently ...

research-article
On the Significance of Category Prediction for Code-Comment Synchronization
Article No.: 30, pp 1–41https://doi.org/10.1145/3534117

Software comments sometimes are not promptly updated in sync when the associated code is changed. The inconsistency between code and comments may mislead the developers and result in future bugs. Thus, studies concerning code-comment synchronization have ...

research-article
Dealing with Belief Uncertainty in Domain Models
Article No.: 31, pp 1–34https://doi.org/10.1145/3542947

There are numerous domains in which information systems need to deal with uncertain information. These uncertainties may originate from different reasons such as vagueness, imprecision, incompleteness, or inconsistencies, and in many cases, they cannot be ...

research-article
Aide-mémoire: Improving a Project’s Collective Memory via Pull Request–Issue Links
Article No.: 32, pp 1–36https://doi.org/10.1145/3542937

Links between pull request and the issues they address document and accelerate the development of a software project but are often omitted. We present a new tool, Aide-mémoire, to suggest such links when a developer submits a pull request or closes an ...

research-article
Open Access
iBiR: Bug-report-driven Fault Injection
Article No.: 33, pp 1–31https://doi.org/10.1145/3542946

Much research on software engineering relies on experimental studies based on fault injection. Fault injection, however, is not often relevant to emulate real-world software faults since it “blindly” injects large numbers of faults. It remains indeed ...

research-article
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search
Article No.: 34, pp 1–27https://doi.org/10.1145/3546066

With the rapid increase of public code repositories, developers maintain a great desire to retrieve precise code snippets by using natural language. Despite existing deep learning-based approaches that provide end-to-end solutions (i.e., accept natural ...

research-article
Nudge: Accelerating Overdue Pull Requests toward Completion
Article No.: 35, pp 1–30https://doi.org/10.1145/3544791

Pull requests are a key part of the collaborative software development and code review process today. However, pull requests can also slow down the software development process when the reviewer(s) or the author do not actively engage with the pull ...

research-article
Toward More Efficient Statistical Debugging with Abstraction Refinement
Article No.: 36, pp 1–38https://doi.org/10.1145/3544790

Debugging is known to be a notoriously painstaking and time-consuming task. As one major family of automated debugging, statistical debugging approaches have been well investigated over the past decade, which collect failing and passing executions and ...

research-article
Open Access
Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages
Article No.: 37, pp 1–33https://doi.org/10.1145/3546941

Estimating worst-case execution time (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task executions always complete before their ...

research-article
Open Access
Coverage-Based Debloating for Java Bytecode
Article No.: 38, pp 1–34https://doi.org/10.1145/3546948

Software bloat is code that is packaged in an application but is actually not necessary to run the application. The presence of software bloat is an issue for security, performance, and for maintenance. In this article, we introduce a novel technique for ...

research-article
Open Access
DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class
Article No.: 39, pp 1–34https://doi.org/10.1145/3546946

The decompiler is one of the most common tools for examining executable binaries without the corresponding source code. It transforms binaries into high-level code, reversing the compilation process. Unfortunately, decompiler output is far from readable ...

research-article
Open Access
A Characterization Study of Merge Conflicts in Java Projects
Article No.: 40, pp 1–28https://doi.org/10.1145/3546944

In collaborative software development, programmers create software branches to add features and fix bugs tentatively, and then merge branches to integrate edits. When edits from different branches textually overlap (i.e., textual conflicts) or lead to ...

research-article
Hippodrome: Data Race Repair Using Static Analysis Summaries
Article No.: 41, pp 1–33https://doi.org/10.1145/3546942

Implementing bug-free concurrent programs is a challenging task in modern software development. State-of-the-art static analyses find hundreds of concurrency bugs in production code, scaling to large codebases. Yet, fixing these bugs in constantly ...

research-article
Evaluating Surprise Adequacy for Deep Learning System Testing
Article No.: 42, pp 1–29https://doi.org/10.1145/3546947

The rapid adoption of Deep Learning (DL) systems in safety critical domains such as medical imaging and autonomous driving urgently calls for ways to test their correctness and robustness. Borrowing from the concept of test adequacy in traditional ...

research-article
Assessing the Alignment between the Information Needs of Developers and the Documentation of Programming Languages: A Case Study on Rust
Article No.: 43, pp 1–48https://doi.org/10.1145/3546945

Programming language documentation refers to the set of technical documents that provide application developers with a description of the high-level concepts of a language (e.g., manuals, tutorials, and API references). Such documentation is essential to ...

research-article
Suboptimal Comments in Java Projects: From Independent Comment Changes to Commenting Practices
Article No.: 45, pp 1–33https://doi.org/10.1145/3546949

High-quality source code comments are valuable for software development and maintenance, however, code often contains low-quality comments or lacks them altogether. We name such source code comments as suboptimal comments. Such suboptimal comments create ...

SECTION: Continuous Special Section: AI and SE
research-article
HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems
Article No.: 46, pp 1–30https://doi.org/10.1145/3528100

Modern software systems are usually highly configurable, providing users with customized functionality through various configuration options. Understanding how system performance varies with different option combinations is important to determine optimal ...

research-article
Open Access
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms
Article No.: 47, pp 1–40https://doi.org/10.1145/3533021

Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre-fill fields in the forms, they provide limited ...

research-article
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks
Article No.: 48, pp 1–43https://doi.org/10.1145/3542944

Code embeddings have seen increasing applications in software engineering (SE) research and practice recently. Despite the advances in embedding techniques applied in SE research, one of the main challenges is their generalizability. A recent study finds ...

research-article
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems
Article No.: 49, pp 1–38https://doi.org/10.1145/3544792

Assessing the quality of Deep Learning (DL) systems is crucial, as they are increasingly adopted in safety-critical domains. Researchers have proposed several input generation techniques for DL systems. While such techniques can expose failures, they do ...

SECTION: Continuous Special Section: Security and SE
research-article
Demystifying Hidden Sensitive Operations in Android Apps
Article No.: 50, pp 1–30https://doi.org/10.1145/3574158

Security of Android devices is now paramount, given their wide adoption among consumers. As researchers develop tools for statically or dynamically detecting suspicious apps, malware writers regularly update their attack mechanisms to hide malicious ...

SECTION: Survey
survey
Open Access
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review
Article No.: 51, pp 1–61https://doi.org/10.1145/3542945

We perform a systematic literature review on testing, validation, and verification of robotic and autonomous systems (RAS). The scope of this review covers peer-reviewed research papers proposing, improving, or evaluating testing techniques, processes, or ...

SECTION: Registered Papers
research-article
Dissecting American Fuzzy Lop: A FuzzBench Evaluation
Article No.: 52, pp 1–26https://doi.org/10.1145/3580596

AFL is one of the most used and extended fuzzers, adopted by industry and academic researchers alike. Although the community agrees on AFL’s effectiveness at discovering new vulnerabilities and its outstanding usability, many of its internal design ...

research-article
Open Access
Fuzzing Configurations of Program Options
Article No.: 53, pp 1–21https://doi.org/10.1145/3580597

While many real-world programs are shipped with configurations to enable/disable functionalities, fuzzers have mostly been applied to test single configurations of these programs. In this work, we first conduct an empirical study to understand how program ...

SECTION: RCR Reports
research-article
Dissecting American Fuzzy Lop – A FuzzBench Evaluation - RCR Report
Article No.: 54, pp 1–4https://doi.org/10.1145/3580600

This report describes the artifacts of the “Dissecting American Fuzzy Lop – A FuzzBench Evaluation” paper. The artifacts are available online at and archived at . ...

research-article
Open Access
Fuzzing Configurations of Program Options - RCR Report
Article No.: 55, pp 1–3https://doi.org/10.1145/3580601

This artifact contains the source code and instructions to reproduce the evaluation results of the article “Fuzzing Configurations of Program Options.” The source code includes the configuration grammars for six target programs, the scripts to generate ...

Subjects

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!