Research PapersESEC/FSE 2018
We invite high quality submissions describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research. Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems will also be considered. Submissions that facilitate reproducibility by using available data sets or making the described tools publicly available are especially encouraged.
Papers submitted to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
Important Dates
-
Full paper submission date · March 9th, 2018
-
Rebuttal period: May 7th-10th
-
Notification date: June 11th
-
Camera ready date: September 14th
-
Conference · November 4th-9th, 2018
Important: Note that the official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of ESEC/FSE 2018. The official publication date affects the deadline for any patent filings related to published work.
At least one author of each accepted paper must register and present the paper at ESEC/FSE 2018 in order for the paper to be published in the proceedings. One-day registrations do NOT satisfy the registration requirement. Please carefully read the complete list of ESEC/FSE Submission Policies and Policies for Accepted Contributions.
Tue 6 NovDisplayed time zone: Guadalajara, Mexico City, Monterrey change
10:30 - 12:00 | Concurrency and RacesResearch Papers at Horizons 10-11 Chair(s): Willem Visser Stellenbosch University | ||
10:30 22mTalk | CloudRaid: Hunting Concurrency Bugs in the Cloud via Log-Mining Research Papers Jie Lu , Feng Li Institute of Computing Technology at Chinese Academy of Sciences, China, Lian Li Institute of Computing Technology at Chinese Academy of Sciences, China, Xiaobing Feng ICT CAS | ||
10:52 22mTalk | Testing Multithreaded Programs via Thread Speed Control Research Papers Dongjie Chen , Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University | ||
11:15 22mTalk | Data Race Detection on Compressed Traces Research Papers Dileep Kini University of Illinois at Urbana-Champaign, Umang Mathur University of Illinois at Urbana-Champaign, Mahesh Viswanathan University of Illinois at Urbana-Champaign | ||
11:37 22mTalk | Practical AJAX Race Detection for JavaScript Web Applications Research Papers Christoffer Quist Adamsen Aarhus University, Anders Møller Aarhus University, Saba Alimadadi Northeastern University, Frank Tip Northeastern University |
10:30 - 12:00 | Log MiningJournal-First / Research Papers at Horizons 6-9F Chair(s): Dongyoon Lee Virginia Tech, USA | ||
10:30 22mTalk | Studying and Detecting Log-Related Issues Journal-First Mehran Hassani , Weiyi Shang Concordia University, Canada, Emad Shihab Concordia University, Nikolaos Tsantalis Concordia University, Canada DOI | ||
10:52 22mTalk | VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System Journal-First Lingfeng Bao Zhejiang University City College, Zhenchang Xing Australia National University, Xin Xia Monash University, David Lo Singapore Management University DOI | ||
11:15 22mTalk | Using Finite-State Models for Log Differencing Research Papers Hen Amar Tel Aviv University, Israel, Lingfeng Bao Zhejiang University City College, Nimrod Busany Tel Aviv University, Israel, David Lo Singapore Management University, Shahar Maoz Tel Aviv University | ||
11:37 22mTalk | Identifying Impactful Service System Problems via Log Analysis Research Papers Shilin He Chinese University of Hong Kong, Qingwei Lin Microsoft, China, Jian-Guang Lou Microsoft Research, Hongyu Zhang The University of Newcastle, Michael Lyu , Dongmei Zhang Microsoft Research, China |
13:30 - 15:00 | |||
13:30 22mTalk | CHiP: A Configurable Hybrid Parallel Covering Array Constructor Journal-First DOI | ||
13:52 22mTalk | Learning to Sample: Exploiting Similarities Across Environments to Learn Performance Models for Configurable Systems Research Papers Pooyan Jamshidi University of South Carolina, Miguel Velez Carnegie Mellon University, USA, Christian Kästner Carnegie Mellon University, Norbert Siegmund Bauhaus-University Weimar | ||
14:15 22mTalk | Performance Comprehension at WiredTiger Research Papers Alexandra (Sasha) Fedorova University of British Columbia, Craig Mustard University of British Columbia, Canada, Ivan Beschastnikh Computer Science, University of British Columbia, Julia Rubin University of British Columbia, Augustine Wong University of British Columbia, Canada, Svetozar Miucin University of British Columbia, Canada, Louis Ye University of British Columbia, Canada | ||
14:37 22mTalk | MemFix: Static Analysis-Based Repair of Memory Deallocation Errors for C Research Papers Junhee Lee Korea University, South Korea, Seongjoon Hong Korea University, Hakjoo Oh Korea University |
13:30 - 15:00 | Software Analysis IJournal-First / Research Papers at Horizons 5 Chair(s): Sebastian Elbaum University of Nebraska-Lincoln, USA | ||
13:30 22mTalk | On Accelerating Source Code Analysis At Massive Scale Journal-First DOI | ||
13:52 22mTalk | RefiNym: Using Names to Refine Types Research Papers Santanu Dash University College London, UK, Miltiadis Allamanis Microsoft Research, Cambridge, Earl T. Barr | ||
14:15 22mTalk | Darwinian Data Structure Selection Research Papers Michail Basios University College London, Lingbo Li University College London, UK, Fan Wu University College London, UK, Leslie Kanthan University College London, UK, Earl T. Barr DOI Pre-print | ||
14:37 22mTalk | Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity Research Papers Yue Li Aarhus University, Denmark, Tian Tan Aarhus University, Denmark, Anders Møller Aarhus University, Yannis Smaragdakis University of Athens |
13:30 - 15:00 | Deep LearningResearch Papers at Horizons 6-9F Chair(s): David Rosenblum National University of Singapore | ||
13:30 22mTalk | Deep Learning Type Inference Research Papers Vincent J. Hellendoorn University of California at Davis, USA, Christian Bird Microsoft Research, Earl T. Barr , Miltiadis Allamanis Microsoft Research, Cambridge | ||
13:52 22mTalk | DeepSim: Deep Learning Code Functional Similarity Research Papers | ||
14:15 22mTalk | Code Vectors: Understanding Programs Through Embedded Abstracted Symbolic Traces Research Papers Jordan Henkel University of Wisconsin–Madison, Shuvendu K. Lahiri Microsoft Research, Ben Liblit University of Wisconsin–Madison, Thomas Reps University of Wisconsin - Madison and GrammaTech, Inc. | ||
14:37 22mTalk | MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection Research Papers Shiqing Ma Purdue University, USA, Yingqi Liu Purdue University, USA, Wen-Chuan Lee Purdue University, Xiangyu Zhang Purdue University, Ananth Grama Purdue University, USA |
15:30 - 17:00 | Developer StudiesResearch Papers / Journal-First at Horizons 10-11 Chair(s): Thomas LaToza George Mason University | ||
15:30 22mTalk | Programmers do not Favor Lambda Expressions for Concurrent Object-Oriented Code Journal-First DOI | ||
15:52 22mTalk | How Do Developers Utilize Source Code from Stack Overflow? Journal-First Yuhao Wu , Shaowei Wang Queen's University, Cor-Paul Bezemer University of Alberta, Canada, Katsuro Inoue Osaka University DOI | ||
16:15 22mTalk | Towards a Theory of Software Development Expertise Research Papers Pre-print | ||
16:37 22mFull-paper | What Makes a Code Change Easier to Review? An Empirical Investigation on Code Change Reviewability Research Papers Achyudh Ram University of Waterloo, Anand Ashok Sawant Delft University of Technology, Marco Castelluccio Mozilla Foundation, UK, Alberto Bacchelli University of Zurich Link to publication DOI Pre-print Media Attached |
15:30 - 17:00 | Testing IJournal-First / Research Papers at Horizons 5 Chair(s): David Lo Singapore Management University | ||
15:30 22mTalk | Identifying failure-causing schemas in the presence of multiple faults Journal-First Xintao Niu , Changhai Nie , Yu Lei , Hareton Leung , Xiaoyin Wang University of Texas at San Antonio, USA DOI | ||
15:52 22mTalk | Singularity: Pattern Fuzzing for Worst Case Complexity Research Papers Jiayi Wei University of Texas at Austin, Jia Chen University of Texas at Austin, Yu Feng University of California, Santa Barbara, USA, Kostas Ferles UT Austin, Işıl Dillig UT Austin DOI Pre-print | ||
16:15 22mTalk | Bug Synthesis: Challenging Bug-Finding Tools with Deep Faults Research Papers Subhajit Roy IIT Kanpur, India, Awanish Pandey IIT Kanpur, India, Brendan Dolan-Gavitt New York University, Yu Hu New York University, USA | ||
16:37 22mTalk | Modify, Enhance, Select: Co-Evolution of Combinatorial Models and Test Plans Research Papers |
15:30 - 17:00 | |||
15:30 22mTalk | Text Filtering and Ranking for Security Bug Report Prediction Journal-First Fayola Peters Lero - The Irish Software Research Centre and University of Limerick, Thein Than Tun , Yijun Yu The Open University, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland) DOI | ||
15:52 22mTalk | STADS: Software Testing as Species Discovery Journal-First Marcel Böhme Monash University DOI | ||
16:15 22mTalk | The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale Research Papers James C. Davis Virginia Tech, USA, Christy A. Coghlan Virginia Tech, USA, Francisco Servant Virginia Tech, Dongyoon Lee Virginia Tech, USA | ||
16:37 22mTalk | FraudDroid: Automated Ad Fraud Detection for Android Apps Research Papers Feng Dong Beijing University of Posts and Telecommunications, China, Haoyu Wang , Li Li Monash University, Australia, Yao Guo Peking University, Tegawendé F. Bissyandé University of Luxembourg, Luxembourg, Tianming Liu Beijing University of Posts and Telecommunications, China, Guoai Xu , Jacques Klein University of Luxembourg, SnT |
Wed 7 NovDisplayed time zone: Guadalajara, Mexico City, Monterrey change
10:30 - 12:00 | Mobile AppsResearch Papers / Journal-First at Horizons 10-11 Chair(s): Shane McIntosh McGill University | ||
10:30 22mTalk | Getting the Most from Map Data Structures in Android Journal-First Rubén Saborido Infantes Department of Computer Science and Software Engineering, Concordia University, Montreal, Rodrigo Morales Concordia University, Foutse Khomh Polytechnique Montréal, Yann-Gaël Guéhéneuc Concordia University and Polytechnique Montréal, Giuliano Antoniol Polytechnique Montréal DOI | ||
10:52 22mTalk | Successes, Challenges, and Rethinking – An Industrial Investigation on Crowdsourced Mobile Application Testing Journal-First Ruizhi Gao , Yabin Wang , Yang Feng University of California, Irvine, Zhenyu Chen Nanjing University, W. Eric Wong DOI | ||
11:15 22mTalk | AppFlow: Using Machine Learning to Synthesize Robust, Reusable UI Tests Research Papers | ||
11:37 22mTalk | Winning the App Production Rally Research Papers Ehsan Noei University of Toronto, Daniel Alencar Da Costa Queen's University, Kingston, Ontario, Ying Zou Queen's University, Kingston, Ontario |
13:30 - 15:00 | Software Maintenance IResearch Papers / Journal-First at Horizons 10-11 Chair(s): Christian Bird Microsoft Research | ||
13:30 22mTalk | Use and Misuse of Continuous Integration Features: An Empirical Study of Projects that (mis)use Travis CI Journal-First DOI | ||
13:52 22mResearch paper | One Size Does Not Fit All: An Empirical Study of Containerized Continuous Deployment Workflows Research Papers Yang Zhang National University of Defense Technology, China, Bogdan Vasilescu Carnegie Mellon University, Huaimin Wang , Vladimir Filkov University of California at Davis, USA Pre-print | ||
14:15 22mTalk | Be Careful of When: An Empirical Study on Time-Related Misuse of Issue Tracking Data Research Papers Feifei Tu Peking University, China, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Qimu Zheng Peking University, China, Minghui Zhou Peking University | ||
14:37 22mTalk | Do the Dependency Conflicts in My Project Matter? Research Papers Ying Wang Northeastern University, China, Ming Wen The Hong Kong University of Science and Technology, Zhenwei Liu Northeastern University, China, Rongxin Wu Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Rui Wang Northeastern University, China, Bo Yang Northeastern University, China, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology |
13:30 - 15:00 | Software Analysis IIResearch Papers / Journal-First at Horizons 5 Chair(s): Myra Cohen Iowa State University | ||
13:30 22mTalk | A Systematic Evaluation of Static API-Misuse Detectors Journal-First Sven Amann Technische Universität Darmstadt, Hoan Nguyen Iowa State University, Sarah Nadi University of Alberta, Tien N. Nguyen University of Texas at Dallas, Mira Mezini TU Darmstadt DOI | ||
13:52 22mTalk | Do Android Taint Analysis Tools Keep Their Promises? Research Papers Felix Pauck Paderborn University, Germany, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Heike Wehrheim Paderborn University | ||
14:15 22mTalk | Neural-Augmented Static Analysis of Android Communication Research Papers Jinman Zhao University of Wisconsin-Madison, USA, Aws Albarghouthi University of Wisconsin-Madison, Vaibhav Rastogi University of Wisconsin-Madison, USA, Somesh Jha University of Wisconsin, Madison, Damien Octeau University of Wisconsin and Pennsylvania State University | ||
14:37 22mTalk | Oreo: Detection of Clones in the Twilight Zone Research Papers Vaibhav Saini University of California at Irvine, USA, Farima Farmahinifarahani University of California at Irvine, USA, Yadong Lu University of California at Irvine, USA, Pierre Baldi University of California at Irvine, USA, Crista Lopes |
15:30 - 17:00 | Symbolic Execution and Constraint SolvingResearch Papers at Horizons 10-11 Chair(s): Satish Chandra Facebook | ||
15:30 22mTalk | Concurrency Verification with Maximal Path Causality Research Papers | ||
15:52 22mTalk | Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks Research Papers | ||
16:15 22mTalk | Symbolic Execution with Existential Second-Order Constraints Research Papers Sergey Mechtaev National University of Singapore, Alberto Griggio Fondazione Bruno Kessler, Alessandro Cimatti Fondazione Bruno Kessler, Abhik Roychoudhury National University of Singapore DOI Pre-print | ||
16:37 22mTalk | Parameterized Model Counting for String and Numeric Constraints Research Papers Abdulbaki Aydin Microsoft, USA, William Eiers University of California at Santa Barbara, USA, Lucas Bang , Tegan Brennan , Miroslav Gavrilov University of California at Santa Barbara, USA, Tevfik Bultan University of California, Santa Barbara, Fang Yu National Chengchi University |
15:30 - 17:00 | MiningJournal-First / Research Papers at Horizons 6-9F Chair(s): Hridesh Rajan Iowa State University | ||
15:30 22mTalk | Finding Better Active Learners for Faster Literature Reviews Journal-First DOI | ||
15:52 22mTalk | Mining Semantic Loop Idioms Journal-First Miltiadis Allamanis Microsoft Research, Cambridge, Earl T. Barr University College London, Christian Bird Microsoft Research, Prem Devanbu University of California, Mark Marron Microsoft Research, Charles Sutton University of Edinburgh DOI | ||
16:15 22mTalk | NAR-Miner: Discovering Negative Association Rules from Code for Bug Detection Research Papers Pan Bian Renmin University of China, China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Jianjun Huang Renmin University of China, China, Yan Cai Institute of Software, Chinese Academy of Sciences | ||
16:37 22mTalk | Path-Based Function Embedding and Its Application to Error-Handling Specification Mining Research Papers Daniel DeFreez University of California, Davis, Aditya V. Thakur University of California, Davis, Cindy Rubio-González University of California, Davis |
Thu 8 NovDisplayed time zone: Guadalajara, Mexico City, Monterrey change
10:30 - 12:00 | ModelsResearch Papers / Journal-First at Horizons 10-11 Chair(s): Maurício Aniche Delft University of Technology, Netherlands | ||
10:30 22mTalk | The modular and feature toggle architectures of Google Chrome Journal-First DOI | ||
10:52 22mTalk | Applications of Psychological Science for Actionable Analytics Research Papers Di Chen North Carolina State University, USA, Wei Fu , Rahul Krishna NC State University, Tim Menzies North Carolina State University | ||
11:15 22mTalk | Putback-Based Bidirectional Model Transformations Research Papers Xiao He University of Science and Technology Beijing, China, Zhenjiang Hu National Institute of Informatics | ||
11:37 22mTalk | Model Transformation Languages under a Magnifying Glass: A Controlled Experiment with Xtend, ATL, and QVT Research Papers Regina Hebig Chalmers University of Technology & University of Gothenburg, Christoph Seidl Technische Universität Braunschweig, Thorsten Berger Chalmers University of Technology, Sweden / University of Gothenburg, Sweden, John Kook Pedersen IT University of Copenhagen, Denmark, Andrzej Wąsowski IT University of Copenhagen, Denmark |
10:30 - 12:00 | Repair and SynthesisJournal-First / Research Papers at Horizons 6-9F Chair(s): Shahar Maoz Tel Aviv University | ||
10:30 22mTalk | Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps Journal-First Kevin Moran College of William & Mary, Carlos Bernal-Cárdenas William and Mary, Michael Curcio , Richard Bonett , Denys Poshyvanyk William and Mary DOI Pre-print Media Attached | ||
10:52 22mTalk | Detecting Speech Act Types in Developer Question/Answer Conversations during Bug Repair Research Papers | ||
11:15 22mResearch paper | Visual Web Test Repair Research Papers Andrea Stocco University of British Columbia, Rahulkrishna Yandrapally University of British Columbia, Canada, Ali Mesbah University of British Columbia Pre-print Media Attached | ||
11:37 22mTalk | Syntax-Guided Synthesis of Datalog Programs Research Papers Xujie Si University of Pennsylvania, Woosuk Lee University of Pennsylvania, USA, Richard Zhang University of Pennsylvania, Aws Albarghouthi University of Wisconsin-Madison, Paraschos Koutris University of Wisconsin-Madison, USA, Mayur Naik University of Pennsylvania |
13:30 - 15:00 | Software Maintenance IIResearch Papers / Journal-First at Horizons 10-11 Chair(s): Emerson Murphy-Hill North Carolina State University | ||
13:30 22mTalk | Automating Change-level Self-admitted Technical Debt Determination Journal-First Meng Yan , Xin Xia Monash University, Emad Shihab Concordia University, David Lo Singapore Management University, Jianwei Yin , Xiaohu Yang DOI | ||
13:52 22mTalk | Large-Scale Study of Substitutability in the Presence of Effects Research Papers Jackson Maddox Iowa State University, USA, Yuheng Long Iowa State University, Hridesh Rajan Iowa State University | ||
14:15 22mTalk | An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems Research Papers Yu Gao Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software, Chinese Academy of Sciences, Feng Qin Ohio State University, USA, Chushu Gao Institute of Software, Chinese Academy of Sciences, Dong Wang Institute of Software at Chinese Academy of Sciences, China, Jun Wei State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, Ruirui Huang Alibaba Group, China, Li Zhou Alibaba Group, China, Yongming Wu Alibaba Group, China | ||
14:37 22mTalk | Complementing Global and Local Contexts in Representing API Descriptions to Improve API Retrieval Tasks Research Papers Thanh Nguyen Iowa State University, Ngoc Tran , Hung Phan , Trong Nguyen Iowa State University, USA, Linh Truong , Trong Nguyen Iowa State University, USA, Hoan Anh Nguyen Iowa State University, USA, Tien N. Nguyen University of Texas at Dallas |
13:30 - 15:00 | Probabilistic ReasoningResearch Papers at Horizons 5 Chair(s): Antonio Filieri Imperial College London | ||
13:30 22mTalk | Phys: Probabilistic Physical Unit Assignment and Inconsistency Detection Research Papers Sayali Kate Purdue University, USA, John-Paul Ore University of Nebraska-Lincoln, USA, Xiangyu Zhang Purdue University, Sebastian Elbaum University of Nebraska-Lincoln, USA, Zhaogui Xu Nanjing University, China Pre-print | ||
13:52 22mTalk | Testing Probabilistic Programming Systems Research Papers Saikat Dutta University of Illinois at Urbana-Champaign, USA, Owolabi Legunsen University of Illinois at Urbana-Champaign, Zixin Huang University of Illinois at Urbana-Champaign, USA, Sasa Misailovic University of Illinois at Urbana-Champaign | ||
14:14 22mTalk | Verifying the Long-Run Behavior of Probabilistic System Models in the Presence of Uncertainty Research Papers Yamilet R. Serrano Llerena National University of Singapore, Singapore, Marcel Böhme Monash University, Marc Brünink nil, Singapore, Guoxin Su University of Wollongong, Australia, David Rosenblum National University of Singapore |
13:30 - 15:00 | Debugging and Bug LocalizationResearch Papers at Horizons 6-9F Chair(s): Earlence Fernandes University of Michigan | ||
13:30 22mTalk | Automated Patch Extraction via Syntax- and Semantics-Aware Delta Debugging on Source Code Changes Research Papers Masatomo Hashimoto Chiba Institute of Technology, Japan, Akira Mori National Institute of Advanced Industrial Science and Technology, Japan, Tomonori Izumida IIJ Innovation Institute, Japan Link to publication DOI Authorizer link | ||
13:52 22mTalk | Feedback-Directed Differential Testing of Interactive Debuggers Research Papers | ||
14:15 22mTalk | Improving IR-Based Bug Localization with Context-Aware Query Reformulation Research Papers Pre-print | ||
14:37 22mTalk | How Should Compilers Explain Problems to Developers? Research Papers Titus Barik Microsoft, Denae Ford North Carolina State University, Emerson Murphy-Hill North Carolina State University, Chris Parnin NCSU Pre-print |
15:30 - 17:00 | Ecosystems and CrowdsourcingJournal-First / Research Papers at Horizons 10-11 Chair(s): Peter Rigby Concordia University, Montreal, Canada | ||
15:30 22mTalk | Comparison of release engineering practices in a large mature company and a startup Journal-First Eero Laukkanen , Maria Paasivaara IT University of Copenhagen, Denmark & Aalto University, Finland, Juha Itkonen , Casper Lassenius Aalto University, Finland and Simula Metropolitan Center for Digital Engineering, Norway DOI | ||
15:52 22mTalk | Microtask Programming Journal-First Thomas LaToza George Mason University, Arturo Di Lecce , Fabio Ricci , W. Ben Towne , Andre van der Hoek University of California, Irvine DOI | ||
16:14 22mTalk | Ecosystem-Level Determinants of Sustained Activity in Open-Source Projects: A Case Study of the PyPI Ecosystem Research Papers Marat Valiev Carnegie Mellon University, USA, Bogdan Vasilescu Carnegie Mellon University, Jim Herbsleb Carnegie Mellon University |
15:30 - 17:00 | EnergyResearch Papers / Journal-First at Horizons 6-9F Chair(s): Diego Garbervetsky University of Buenos Aires, Argentina | ||
15:30 30mTalk | Approximate Oracles and Synergy in Software Energy Search Spaces Journal-First Bobby R. Bruce , Justyna Petke University College London, Mark Harman Facebook and University College London, Earl T. Barr DOI | ||
16:00 30mTalk | Detection of Energy Inefficiencies in Android Wear Watch Faces Research Papers | ||
16:30 30mTalk | Stochastic Energy Optimization for Mobile GPS Applications Research Papers Anthony Canino SUNY Binghamton, Yu David Liu State University of New York (SUNY) Binghamton, Hidehiko Masuhara Tokyo Institute of Technology |
Accepted Papers
Call for Papers
We are interested in submissions from both industry and academia on all topics related to software engineering. These include, but are not limited to:
-
Architecture and design
-
Autonomic computing and (self-)adaptive systems
-
Big data
-
Cloud computing
-
Components, services, and middleware
-
Computer-supported cooperative work
-
Configuration management and deployment
-
Crowdsourcing
-
Debugging
-
Dependability, safety, and reliability
-
Development tools and environments
-
Distributed, parallel, and concurrent software
-
Education
-
Embedded and real-time software
-
Empirical software engineering
-
End-user software engineering
-
Formal methods, including languages, methods, and tools
-
Green computing
-
Human and social factors in software engineering
-
Human-computer interaction
-
Knowledge-based software engineering
-
Mobile, ubiquitous, and pervasive software
-
Model-driven software engineering
-
Patterns and frameworks
-
Processes and workflows
-
Program analysis
-
Program comprehension and visualization
-
Program synthesis
-
Refactoring
-
Requirements engineering
-
Reverse engineering
-
Safety-critical systems
-
Scientific computing
-
Search-based software engineering
-
Security and privacy
-
Software economics and metrics
-
Software evolution and maintenance
-
Software modularity
-
Software product lines
-
Software reuse
-
Software services
-
Testing
-
Traceability
-
Web-based software
How to Submit
At the time of submission all papers must conform to the ESEC/FSE 2018 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references (with an abstract of 250 words max). All submissions must be in English and in PDF format. You can submit, optionally, an additional file containing supplementary material (see details below). Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site.
Each submission will be reviewed by at least three members of the Program Committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
ESEC/FSE 2018 will employ a lightweight double-blind review process. The papers submitted must not reveal the authors’ identities in any way:
- Authors should leave out author names and affiliations from the body of their submission.
- Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
- Authors should avoid providing URLs to author-revealing sites (tools, data sets). The paper can mention the existence of such sites, but the visit of such sites should not be needed to conduct the review. You can submit, optionally, a zip file or a pdf file containing supplementary material (raw data, data sets, experiments, etc.), which should also be blinded. The program committee will not necessarily consider it in the paper review process.
-
Authors should anonymize author-revealing company names, yet can provide general characteristics of the organizations involved needed to understand the context of the paper.
Once all reviews are in, author identities will be revealed to the program committee, and authors can respond to the reviews. Authors thus can also use their responses to provide additional information that would otherwise be author-revealing, thus allowing reviewers to take this extra information into account in the eventual evaluation.
Authors having further questions on double blind reviewing are encouraged to contact the Program Chairs by email. Papers that do not comply to the double blind review process will be desk-rejected.
All publications are subject to the ACM Author Representations policy.