default search action
SEIP@ICSE 2020: Seoul, Korea
- Gregg Rothermel, Doo-Hwan Bae:
ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June - 19 July, 2020. ACM 2020, ISBN 978-1-4503-7123-0 - Anton Strand, Markus Gunnarson, Ricardo Britto, Muhammad Usman:
Using a context-aware approach to recommend code reviewers: findings from an industrial case study. 1-10 - Nathan Chong, Byron Cook, Konstantinos Kallas, Kareem Khazem, Felipe R. Monteiro, Daniel Schwartz-Narbonne, Serdar Tasiran, Michael Tautschnig, Mark R. Tuttle:
Code-level model checking in the software development workflow. 11-20 - Anders Fischer-Nielsen, Zhoulai Fu, Ting Su, Andrzej Wasowski:
The forgotten case of the dependency bugs: on the example of the robot operating system. 21-30 - Ivano Malavolta, Grace A. Lewis, Bradley R. Schmerl, Patricia Lago, David Garlan:
How do you architect your robots?: state of the practice and guidelines for ROS-based systems. 31-40 - Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Precfix: large-scale patch recommendation by mining defect-patch pairs. 41-50 - Shuyue Li, Jiaqi Guo, Ming Fan, Jian-Guang Lou, Qinghua Zheng, Ting Liu:
Automated bug reproduction from user reviews for Android applications. 51-60 - Rebecca Qian, Yang Yu, Wonhee Park, Vijayaraghavan Murali, Stephen Fink, Satish Chandra:
Debugging crashes using continuous contrast set mining. 61-70 - Jinhan Kim, Valeriy V. Savchenko, Kihyuck Shin, Konstantin S. Sorokin, Hyunseok Jeon, Georgiy A. Pankratenko, Sergey Markov, Chul-Joo Kim:
Automatic abnormal log detection by analyzing log history for providing debugging insight. 71-80 - Omar-Alfred Salah, Steve McKeever:
Lack of adoption of units of measurement libraries: survey and anecdotes. 81-89 - Yang Chen, Andrew E. Santosa, Asankhaya Sharma, David Lo:
Automated identification of libraries from vulnerability data. 90-99 - Pei Wang, Yu Ding, Mingshen Sun, Huibo Wang, Tongxin Li, Rundong Zhou, Zhaofeng Chen, Yiming Jing:
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development. 100-109 - Emily Kowalczyk, Karan Nair, Zebao Gao, Leo Silberstein, Teng Long, Atif M. Memon:
Modeling and ranking flaky tests at Apple. 110-119 - Mingyu Park, Hoon Jang, Taejoon Byun, Yunja Choi:
Property-based testing for LG home appliances using accelerated software-in-the-loop simulation. 120-129 - Aran Azhakesan, Frances Paulisch:
Sharing at scale: an open-source-software-based license compliance ecosystem. 130-131 - Volker Gruhn, Niklas Spitczok von Brisinski:
How to reduce risk effectively in fixed price software development. 132-141 - Cong Wang, Mingrui Zhang, Yu Jiang, Huafeng Zhang, Zhenchang Xing, Ming Gu:
Escape from escape analysis of Golang. 142-151 - Heiko Koziolek, Andreas Burger, Marie Platenius-Mohr, Julius Rückert, Hadil Abukwaik, Raoul Jetley, Abdulla P. P:
Rule-based code generation in industrial automation: four large-scale case studies applying the CAYENNE method. 152-161 - Nengwen Zhao, Junjie Chen, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, Dan Pei:
Understanding and handling alert storm for online service systems. 162-171 - Chungha Sung, Shuvendu K. Lahiri, Mike Kaufman, Pallavi Choudhury, Chao Wang:
Towards understanding and fixing upstream merge induced conflicts in divergent forks: an industrial case study. 172-181 - N. C. Shrikanth, Tim Menzies:
Assessing practitioner beliefs about software defect prediction. 182-190 - Nikos Diamantopoulos, Jeffrey Wong, David Issa Mattos, Ilias Gerostathopoulos, Matthew Wardrop, Tobias Mao, Colin McFarland:
Engineering for a science-centric experimentation platform. 191-200 - Chetan Bansal, Sundararajan Renganathan, Ashima Asudani, Olivier Midy, Mathru Janakiraman:
DeCaf: diagnosing and triaging performance issues in large-scale cloud services. 201-210 - Qun Xia, Zhongzhu Zhou, Zhihao Li, Bin Xu, Wei Zou, Zishun Chen, Huafeng Ma, Gangqiang Liang, Haochuan Lu, Shiyu Guo, Ting Xiong, Yuetang Deng, Tao Xie:
JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini games. 211-220 - Murali Krishna Ramanathan, Lazaro Clapp, Rajkishore Barik, Manu Sridharan:
Piranha: reducing feature flag debt at uber. 221-230 - Yuanfang Cai, Rick Kazman:
Software development data for architecture analysis: expectations, reality, and future directions. 231-232 - Jens Meinicke, Chu-Pan Wong, Bogdan Vasilescu, Christian Kästner:
Exploring differences and commonalities between feature flags and configuration options. 233-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.