We invite high quality submissions describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research. Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems will also be considered. Submissions that facilitate reproducibility by using available data sets or making the described tools publicly available are especially encouraged.

Papers submitted to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

Important Dates

  • Full paper submission date · March 9th, 2018

  • Rebuttal period: May 7th-10th

  • Notification date: June 11th

  • Camera ready date: September 14th

  • Conference · November 4th-9th, 2018

Important: Note that the official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of ESEC/FSE 2018. The official publication date affects the deadline for any patent filings related to published work.

At least one author of each accepted paper must register and present the paper at ESEC/FSE 2018 in order for the paper to be published in the proceedings. One-day registrations do NOT satisfy the registration requirement. Please carefully read the complete list of ESEC/FSE Submission Policies and Policies for Accepted Contributions.

Supporters
Sponsor
Sponsor
Platinum
Silver
Silver
Silver
Bronze
Dates
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 6 Nov

Displayed time zone: Guadalajara, Mexico City, Monterrey change

10:30 - 12:00
Concurrency and RacesResearch Papers at Horizons 10-11
Chair(s): Willem Visser Stellenbosch University
10:30
22m
Talk
CloudRaid: Hunting Concurrency Bugs in the Cloud via Log-Mining
Research Papers
Jie Lu , Feng Li Institute of Computing Technology at Chinese Academy of Sciences, China, Lian Li Institute of Computing Technology at Chinese Academy of Sciences, China, Xiaobing Feng ICT CAS
10:52
22m
Talk
Testing Multithreaded Programs via Thread Speed Control
Research Papers
Dongjie Chen , Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University
11:15
22m
Talk
Data Race Detection on Compressed Traces
Research Papers
Dileep Kini University of Illinois at Urbana-Champaign, Umang Mathur University of Illinois at Urbana-Champaign, Mahesh Viswanathan University of Illinois at Urbana-Champaign
11:37
22m
Talk
Practical AJAX Race Detection for JavaScript Web Applications
Research Papers
Christoffer Quist Adamsen Aarhus University, Anders Møller Aarhus University, Saba Alimadadi Northeastern University, Frank Tip Northeastern University
10:30 - 12:00
Log MiningJournal-First / Research Papers at Horizons 6-9F
Chair(s): Dongyoon Lee Virginia Tech, USA
10:30
22m
Talk
Studying and Detecting Log-Related Issues
Journal-First
Mehran Hassani , Weiyi Shang Concordia University, Canada, Emad Shihab Concordia University, Nikolaos Tsantalis Concordia University, Canada
DOI
10:52
22m
Talk
VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System
Journal-First
Lingfeng Bao Zhejiang University City College, Zhenchang Xing Australia National University, Xin Xia Monash University, David Lo Singapore Management University
DOI
11:15
22m
Talk
Using Finite-State Models for Log Differencing
Research Papers
Hen Amar Tel Aviv University, Israel, Lingfeng Bao Zhejiang University City College, Nimrod Busany Tel Aviv University, Israel, David Lo Singapore Management University, Shahar Maoz Tel Aviv University
11:37
22m
Talk
Identifying Impactful Service System Problems via Log Analysis
Research Papers
Shilin He Chinese University of Hong Kong, Qingwei Lin Microsoft, China, Jian-Guang Lou Microsoft Research, Hongyu Zhang The University of Newcastle, Michael Lyu , Dongmei Zhang Microsoft Research, China
13:30 - 15:00
PerformanceResearch Papers / Journal-First at Horizons 10-11
Chair(s): Zhendong Su ETH Zurich
13:30
22m
Talk
CHiP: A Configurable Hybrid Parallel Covering Array Constructor
Journal-First
Hanefi Mercan , Cemal Yilmaz Sabancı University, Kamer Kaya
DOI
13:52
22m
Talk
Learning to Sample: Exploiting Similarities Across Environments to Learn Performance Models for Configurable Systems
Research Papers
Pooyan Jamshidi University of South Carolina, Miguel Velez Carnegie Mellon University, USA, Christian Kästner Carnegie Mellon University, Norbert Siegmund Bauhaus-University Weimar
14:15
22m
Talk
Performance Comprehension at WiredTiger
Research Papers
Alexandra (Sasha) Fedorova University of British Columbia, Craig Mustard University of British Columbia, Canada, Ivan Beschastnikh Computer Science, University of British Columbia, Julia Rubin University of British Columbia, Augustine Wong University of British Columbia, Canada, Svetozar Miucin University of British Columbia, Canada, Louis Ye University of British Columbia, Canada
14:37
22m
Talk
MemFix: Static Analysis-Based Repair of Memory Deallocation Errors for C
Research Papers
Junhee Lee Korea University, South Korea, Seongjoon Hong Korea University, Hakjoo Oh Korea University
13:30 - 15:00
Software Analysis IJournal-First / Research Papers at Horizons 5
Chair(s): Sebastian Elbaum University of Nebraska-Lincoln, USA
13:30
22m
Talk
On Accelerating Source Code Analysis At Massive Scale
Journal-First
Ganesha Upadhyaya Futurewei Technologies, Hridesh Rajan Iowa State University
DOI
13:52
22m
Talk
RefiNym: Using Names to Refine Types
Research Papers
Santanu Dash University College London, UK, Miltiadis Allamanis Microsoft Research, Cambridge, Earl T. Barr
14:15
22m
Talk
Darwinian Data Structure Selection
Research Papers
Michail Basios University College London, Lingbo Li University College London, UK, Fan Wu University College London, UK, Leslie Kanthan University College London, UK, Earl T. Barr
DOI Pre-print
14:37
22m
Talk
Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity
Research Papers
Yue Li Aarhus University, Denmark, Tian Tan Aarhus University, Denmark, Anders Møller Aarhus University, Yannis Smaragdakis University of Athens
13:30 - 15:00
Deep LearningResearch Papers at Horizons 6-9F
Chair(s): David Rosenblum National University of Singapore
13:30
22m
Talk
Deep Learning Type Inference
Research Papers
Vincent J. Hellendoorn University of California at Davis, USA, Christian Bird Microsoft Research, Earl T. Barr , Miltiadis Allamanis Microsoft Research, Cambridge
13:52
22m
Talk
DeepSim: Deep Learning Code Functional Similarity
Research Papers
Gang Zhao , Jeff Huang Texas A&M University
14:15
22m
Talk
Code Vectors: Understanding Programs Through Embedded Abstracted Symbolic Traces
Research Papers
Jordan Henkel University of Wisconsin–Madison, Shuvendu K. Lahiri Microsoft Research, Ben Liblit University of Wisconsin–Madison, Thomas Reps University of Wisconsin - Madison and GrammaTech, Inc.
14:37
22m
Talk
MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection
Research Papers
Shiqing Ma Purdue University, USA, Yingqi Liu Purdue University, USA, Wen-Chuan Lee Purdue University, Xiangyu Zhang Purdue University, Ananth Grama Purdue University, USA
15:30 - 17:00
Developer StudiesResearch Papers / Journal-First at Horizons 10-11
Chair(s): Thomas LaToza George Mason University
15:30
22m
Talk
Programmers do not Favor Lambda Expressions for Concurrent Object-Oriented Code
Journal-First
DOI
15:52
22m
Talk
How Do Developers Utilize Source Code from Stack Overflow?
Journal-First
Yuhao Wu , Shaowei Wang Queen's University, Cor-Paul Bezemer University of Alberta, Canada, Katsuro Inoue Osaka University
DOI
16:15
22m
Talk
Towards a Theory of Software Development Expertise
Research Papers
Sebastian Baltes University of Trier, Stephan Diehl Computer Science, University Trier, Germany
Pre-print
16:37
22m
Full-paper
What Makes a Code Change Easier to Review? An Empirical Investigation on Code Change Reviewability
Research Papers
Achyudh Ram University of Waterloo, Anand Ashok Sawant Delft University of Technology, Marco Castelluccio Mozilla Foundation, UK, Alberto Bacchelli University of Zurich
Link to publication DOI Pre-print Media Attached
15:30 - 17:00
Testing IJournal-First / Research Papers at Horizons 5
Chair(s): David Lo Singapore Management University
15:30
22m
Talk
Identifying failure-causing schemas in the presence of multiple faults
Journal-First
Xintao Niu , Changhai Nie , Yu Lei , Hareton Leung , Xiaoyin Wang University of Texas at San Antonio, USA
DOI
15:52
22m
Talk
Singularity: Pattern Fuzzing for Worst Case Complexity
Research Papers
Jiayi Wei University of Texas at Austin, Jia Chen University of Texas at Austin, Yu Feng University of California, Santa Barbara, USA, Kostas Ferles UT Austin, Işıl Dillig UT Austin
DOI Pre-print
16:15
22m
Talk
Bug Synthesis: Challenging Bug-Finding Tools with Deep Faults
Research Papers
Subhajit Roy IIT Kanpur, India, Awanish Pandey IIT Kanpur, India, Brendan Dolan-Gavitt New York University, Yu Hu New York University, USA
16:37
22m
Talk
Modify, Enhance, Select: Co-Evolution of Combinatorial Models and Test Plans
Research Papers
Rachel Tzoref-Brill IBM Research, Shahar Maoz Tel Aviv University
15:30 - 17:00
15:30
22m
Talk
Text Filtering and Ranking for Security Bug Report Prediction
Journal-First
Fayola Peters Lero - The Irish Software Research Centre and University of Limerick, Thein Than Tun , Yijun Yu The Open University, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
DOI
15:52
22m
Talk
STADS: Software Testing as Species Discovery
Journal-First
Marcel Böhme Monash University
DOI
16:15
22m
Talk
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale
Research Papers
James C. Davis Virginia Tech, USA, Christy A. Coghlan Virginia Tech, USA, Francisco Servant Virginia Tech, Dongyoon Lee Virginia Tech, USA
16:37
22m
Talk
FraudDroid: Automated Ad Fraud Detection for Android Apps
Research Papers
Feng Dong Beijing University of Posts and Telecommunications, China, Haoyu Wang , Li Li Monash University, Australia, Yao Guo Peking University, Tegawendé F. Bissyandé University of Luxembourg, Luxembourg, Tianming Liu Beijing University of Posts and Telecommunications, China, Guoai Xu , Jacques Klein University of Luxembourg, SnT

Wed 7 Nov

Displayed time zone: Guadalajara, Mexico City, Monterrey change

10:30 - 12:00
Mobile AppsResearch Papers / Journal-First at Horizons 10-11
Chair(s): Shane McIntosh McGill University
10:30
22m
Talk
Getting the Most from Map Data Structures in Android
Journal-First
Rubén Saborido Infantes Department of Computer Science and Software Engineering, Concordia University, Montreal, Rodrigo Morales Concordia University, Foutse Khomh Polytechnique Montréal, Yann-Gaël Guéhéneuc Concordia University and Polytechnique Montréal, Giuliano Antoniol Polytechnique Montréal
DOI
10:52
22m
Talk
Successes, Challenges, and Rethinking – An Industrial Investigation on Crowdsourced Mobile Application Testing
Journal-First
Ruizhi Gao , Yabin Wang , Yang Feng University of California, Irvine, Zhenyu Chen Nanjing University, W. Eric Wong
DOI
11:15
22m
Talk
AppFlow: Using Machine Learning to Synthesize Robust, Reusable UI Tests
Research Papers
Gang Hu Columbia University, USA, Linjie Zhu , Junfeng Yang Columbia University
11:37
22m
Talk
Winning the App Production Rally
Research Papers
Ehsan Noei University of Toronto, Daniel Alencar Da Costa Queen's University, Kingston, Ontario, Ying Zou Queen's University, Kingston, Ontario
13:30 - 15:00
Software Maintenance IResearch Papers / Journal-First at Horizons 10-11
Chair(s): Christian Bird Microsoft Research
13:30
22m
Talk
Use and Misuse of Continuous Integration Features: An Empirical Study of Projects that (mis)use Travis CI
Journal-First
Keheliya Gallaba McGill University, Shane McIntosh McGill University
DOI
13:52
22m
Research paper
One Size Does Not Fit All: An Empirical Study of Containerized Continuous Deployment Workflows
Research Papers
Yang Zhang National University of Defense Technology, China, Bogdan Vasilescu Carnegie Mellon University, Huaimin Wang , Vladimir Filkov University of California at Davis, USA
Pre-print
14:15
22m
Talk
Be Careful of When: An Empirical Study on Time-Related Misuse of Issue Tracking Data
Research Papers
Feifei Tu Peking University, China, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences, China, Qimu Zheng Peking University, China, Minghui Zhou Peking University
14:37
22m
Talk
Do the Dependency Conflicts in My Project Matter?
Research Papers
Ying Wang Northeastern University, China, Ming Wen The Hong Kong University of Science and Technology, Zhenwei Liu Northeastern University, China, Rongxin Wu Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Rui Wang Northeastern University, China, Bo Yang Northeastern University, China, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
13:30 - 15:00
Software Analysis IIResearch Papers / Journal-First at Horizons 5
Chair(s): Myra Cohen Iowa State University
13:30
22m
Talk
A Systematic Evaluation of Static API-Misuse Detectors
Journal-First
Sven Amann Technische Universität Darmstadt, Hoan Nguyen Iowa State University, Sarah Nadi University of Alberta, Tien N. Nguyen University of Texas at Dallas, Mira Mezini TU Darmstadt
DOI
13:52
22m
Talk
Do Android Taint Analysis Tools Keep Their Promises?
Research Papers
Felix Pauck Paderborn University, Germany, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Heike Wehrheim Paderborn University
14:15
22m
Talk
Neural-Augmented Static Analysis of Android Communication
Research Papers
Jinman Zhao University of Wisconsin-Madison, USA, Aws Albarghouthi University of Wisconsin-Madison, Vaibhav Rastogi University of Wisconsin-Madison, USA, Somesh Jha University of Wisconsin, Madison, Damien Octeau University of Wisconsin and Pennsylvania State University
14:37
22m
Talk
Oreo: Detection of Clones in the Twilight Zone
Research Papers
Vaibhav Saini University of California at Irvine, USA, Farima Farmahinifarahani University of California at Irvine, USA, Yadong Lu University of California at Irvine, USA, Pierre Baldi University of California at Irvine, USA, Crista Lopes
15:30 - 17:00
Symbolic Execution and Constraint SolvingResearch Papers at Horizons 10-11
Chair(s): Satish Chandra Facebook
15:30
22m
Talk
Concurrency Verification with Maximal Path Causality
Research Papers
Qiuping Yi Texas A&M University, Jeff Huang Texas A&M University
15:52
22m
Talk
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Research Papers
Shengjian (Daniel) Guo Virginia Tech, Meng Wu Virginia Tech, Chao Wang USC
16:15
22m
Talk
Symbolic Execution with Existential Second-Order Constraints
Research Papers
Sergey Mechtaev National University of Singapore, Alberto Griggio Fondazione Bruno Kessler, Alessandro Cimatti Fondazione Bruno Kessler, Abhik Roychoudhury National University of Singapore
DOI Pre-print
16:37
22m
Talk
Parameterized Model Counting for String and Numeric Constraints
Research Papers
Abdulbaki Aydin Microsoft, USA, William Eiers University of California at Santa Barbara, USA, Lucas Bang , Tegan Brennan , Miroslav Gavrilov University of California at Santa Barbara, USA, Tevfik Bultan University of California, Santa Barbara, Fang Yu National Chengchi University
15:30 - 17:00
MiningJournal-First / Research Papers at Horizons 6-9F
Chair(s): Hridesh Rajan Iowa State University
15:30
22m
Talk
Finding Better Active Learners for Faster Literature Reviews
Journal-First
Zhe Yu , Nicholas A. Kraft ABB Corporate Research, Tim Menzies North Carolina State University
DOI
15:52
22m
Talk
Mining Semantic Loop Idioms
Journal-First
Miltiadis Allamanis Microsoft Research, Cambridge, Earl T. Barr University College London, Christian Bird Microsoft Research, Prem Devanbu University of California, Mark Marron Microsoft Research, Charles Sutton University of Edinburgh
DOI
16:15
22m
Talk
NAR-Miner: Discovering Negative Association Rules from Code for Bug Detection
Research Papers
Pan Bian Renmin University of China, China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Jianjun Huang Renmin University of China, China, Yan Cai Institute of Software, Chinese Academy of Sciences
16:37
22m
Talk
Path-Based Function Embedding and Its Application to Error-Handling Specification Mining
Research Papers
Daniel DeFreez University of California, Davis, Aditya V. Thakur University of California, Davis, Cindy Rubio-González University of California, Davis

Thu 8 Nov

Displayed time zone: Guadalajara, Mexico City, Monterrey change

10:30 - 12:00
ModelsResearch Papers / Journal-First at Horizons 10-11
Chair(s): Maurício Aniche Delft University of Technology, Netherlands
10:30
22m
Talk
The modular and feature toggle architectures of Google Chrome
Journal-First
DOI
10:52
22m
Talk
Applications of Psychological Science for Actionable Analytics
Research Papers
Di Chen North Carolina State University, USA, Wei Fu , Rahul Krishna NC State University, Tim Menzies North Carolina State University
11:15
22m
Talk
Putback-Based Bidirectional Model Transformations
Research Papers
Xiao He University of Science and Technology Beijing, China, Zhenjiang Hu National Institute of Informatics
11:37
22m
Talk
Model Transformation Languages under a Magnifying Glass: A Controlled Experiment with Xtend, ATL, and QVT
Research Papers
Regina Hebig Chalmers University of Technology & University of Gothenburg, Christoph Seidl Technische Universität Braunschweig, Thorsten Berger Chalmers University of Technology, Sweden / University of Gothenburg, Sweden, John Kook Pedersen IT University of Copenhagen, Denmark, Andrzej Wąsowski IT University of Copenhagen, Denmark
10:30 - 12:00
Estimation and PredictionResearch Papers / Journal-First at Horizons 5
Chair(s): Jim Herbsleb Carnegie Mellon University
10:30
22m
Talk
Early prediction of merged code changes to prioritize reviewing tasks
Journal-First
Yuanrui Fan , Xin Xia Monash University, David Lo Singapore Management University, Shanping Li
DOI
10:52
22m
Talk
How far we have progressed in the journey? An examination of cross-project defect prediction
Journal-First
Yuming Zhou , Yibiao Yang Nanjing University, China, Hongmin Lu , Lin Chen Nanjing University, Yanhui Li , Yangyang Zhao , Junyan Qian , Baowen Xu
Link to publication DOI
11:15
22m
Talk
A Novel Automated Approach for Software Effort Estimation Based on Data Augmentation
Research Papers
11:37
22m
Talk
Predicting Node Failure in Cloud Service Systems
Research Papers
Qingwei Lin Microsoft, China, Ken Hsieh , Yingnong Dang Microsoft, USA, Hongyu Zhang The University of Newcastle, Kaixin Sui Microsoft, China, Yong Xu Microsoft, China, Jian-Guang Lou Microsoft Research, Chenggang Li Northeastern University, China, Youjiang Wu Microsoft, USA, Randolph Yao Microsoft, USA, Murali Chintalapati Microsoft, USA, Dongmei Zhang Microsoft Research, China
10:30 - 12:00
Repair and SynthesisJournal-First / Research Papers at Horizons 6-9F
Chair(s): Shahar Maoz Tel Aviv University
10:30
22m
Talk
Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps
Journal-First
Kevin Moran College of William & Mary, Carlos Bernal-Cárdenas William and Mary, Michael Curcio , Richard Bonett , Denys Poshyvanyk William and Mary
DOI Pre-print Media Attached
10:52
22m
Talk
Detecting Speech Act Types in Developer Question/Answer Conversations during Bug Repair
Research Papers
11:15
22m
Research paper
Visual Web Test Repair
Research Papers
Andrea Stocco University of British Columbia, Rahulkrishna Yandrapally University of British Columbia, Canada, Ali Mesbah University of British Columbia
Pre-print Media Attached
11:37
22m
Talk
Syntax-Guided Synthesis of Datalog Programs
Research Papers
Xujie Si University of Pennsylvania, Woosuk Lee University of Pennsylvania, USA, Richard Zhang University of Pennsylvania, Aws Albarghouthi University of Wisconsin-Madison, Paraschos Koutris University of Wisconsin-Madison, USA, Mayur Naik University of Pennsylvania
13:30 - 15:00
Software Maintenance IIResearch Papers / Journal-First at Horizons 10-11
Chair(s): Emerson Murphy-Hill North Carolina State University
13:30
22m
Talk
Automating Change-level Self-admitted Technical Debt Determination
Journal-First
Meng Yan , Xin Xia Monash University, Emad Shihab Concordia University, David Lo Singapore Management University, Jianwei Yin , Xiaohu Yang
DOI
13:52
22m
Talk
Large-Scale Study of Substitutability in the Presence of Effects
Research Papers
Jackson Maddox Iowa State University, USA, Yuheng Long Iowa State University, Hridesh Rajan Iowa State University
14:15
22m
Talk
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems
Research Papers
Yu Gao Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software, Chinese Academy of Sciences, Feng Qin Ohio State University, USA, Chushu Gao Institute of Software, Chinese Academy of Sciences, Dong Wang Institute of Software at Chinese Academy of Sciences, China, Jun Wei State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, Ruirui Huang Alibaba Group, China, Li Zhou Alibaba Group, China, Yongming Wu Alibaba Group, China
14:37
22m
Talk
Complementing Global and Local Contexts in Representing API Descriptions to Improve API Retrieval Tasks
Research Papers
Thanh Nguyen Iowa State University, Ngoc Tran , Hung Phan , Trong Nguyen Iowa State University, USA, Linh Truong , Trong Nguyen Iowa State University, USA, Hoan Anh Nguyen Iowa State University, USA, Tien N. Nguyen University of Texas at Dallas
13:30 - 15:00
Probabilistic ReasoningResearch Papers at Horizons 5
Chair(s): Antonio Filieri Imperial College London
13:30
22m
Talk
Phys: Probabilistic Physical Unit Assignment and Inconsistency Detection
Research Papers
Sayali Kate Purdue University, USA, John-Paul Ore University of Nebraska-Lincoln, USA, Xiangyu Zhang Purdue University, Sebastian Elbaum University of Nebraska-Lincoln, USA, Zhaogui Xu Nanjing University, China
Pre-print
13:52
22m
Talk
Testing Probabilistic Programming Systems
Research Papers
Saikat Dutta University of Illinois at Urbana-Champaign, USA, Owolabi Legunsen University of Illinois at Urbana-Champaign, Zixin Huang University of Illinois at Urbana-Champaign, USA, Sasa Misailovic University of Illinois at Urbana-Champaign
14:14
22m
Talk
Verifying the Long-Run Behavior of Probabilistic System Models in the Presence of Uncertainty
Research Papers
Yamilet R. Serrano Llerena National University of Singapore, Singapore, Marcel Böhme Monash University, Marc Brünink nil, Singapore, Guoxin Su University of Wollongong, Australia, David Rosenblum National University of Singapore
13:30 - 15:00
Debugging and Bug LocalizationResearch Papers at Horizons 6-9F
Chair(s): Earlence Fernandes University of Michigan
13:30
22m
Talk
Automated Patch Extraction via Syntax- and Semantics-Aware Delta Debugging on Source Code Changes
Research Papers
Masatomo Hashimoto Chiba Institute of Technology, Japan, Akira Mori National Institute of Advanced Industrial Science and Technology, Japan, Tomonori Izumida IIJ Innovation Institute, Japan
Link to publication DOI Authorizer link
13:52
22m
Talk
Feedback-Directed Differential Testing of Interactive Debuggers
Research Papers
Daniel Lehmann TU Darmstadt, Michael Pradel TU Darmstadt
14:15
22m
Talk
Improving IR-Based Bug Localization with Context-Aware Query Reformulation
Research Papers
Masud Rahman University of Saskatchewan , Chanchal K. Roy University of Saskatchewan
Pre-print
14:37
22m
Talk
How Should Compilers Explain Problems to Developers?
Research Papers
Titus Barik Microsoft, Denae Ford North Carolina State University, Emerson Murphy-Hill North Carolina State University, Chris Parnin NCSU
Pre-print
15:30 - 17:00
Ecosystems and CrowdsourcingJournal-First / Research Papers at Horizons 10-11
Chair(s): Peter Rigby Concordia University, Montreal, Canada
15:30
22m
Talk
Comparison of release engineering practices in a large mature company and a startup
Journal-First
Eero Laukkanen , Maria Paasivaara IT University of Copenhagen, Denmark & Aalto University, Finland, Juha Itkonen , Casper Lassenius Aalto University, Finland and Simula Metropolitan Center for Digital Engineering, Norway
DOI
15:52
22m
Talk
Microtask Programming
Journal-First
Thomas LaToza George Mason University, Arturo Di Lecce , Fabio Ricci , W. Ben Towne , Andre van der Hoek University of California, Irvine
DOI
16:14
22m
Talk
Ecosystem-Level Determinants of Sustained Activity in Open-Source Projects: A Case Study of the PyPI Ecosystem
Research Papers
Marat Valiev Carnegie Mellon University, USA, Bogdan Vasilescu Carnegie Mellon University, Jim Herbsleb Carnegie Mellon University
15:30 - 17:00
Testing IIResearch Papers / Journal-First at Horizons 5
Chair(s): Tevfik Bultan University of California, Santa Barbara
15:30
22m
Talk
On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files
Journal-First
Tomasz Kuchta , Thibaud Lutellier , Edmund Wong , Lin Tan University of Waterloo , Cristian Cadar Imperial College London
DOI
15:52
22m
Talk
Optimizing Test Prioritization via Test Distribution Analysis
Research Papers
Junjie Chen Peking University, Yiling Lou Peking University, China, Lingming Zhang , Jianyi Zhou Peking University, China, Xiaoleng Wang Baidu, China, Dan Hao Peking University, Lu Zhang Peking University
16:15
22m
Talk
How Well Are Regular Expressions Tested in the Wild?
Research Papers
Peipei Wang North Carolina State University, USA, Kathryn Stolee North Carolina State University
16:37
22m
Talk
Which Generated Test Failures Are Fault Revealing? Prioritizing Failures Based on Inferred Precondition Violations using PAF
Research Papers
Mijung Kim Hong Kong University of Science and Technology, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Sunghun Kim Hong Kong University of Science and Technology
15:30 - 17:00
EnergyResearch Papers / Journal-First at Horizons 6-9F
Chair(s): Diego Garbervetsky University of Buenos Aires, Argentina
15:30
30m
Talk
Approximate Oracles and Synergy in Software Energy Search Spaces
Journal-First
Bobby R. Bruce , Justyna Petke University College London, Mark Harman Facebook and University College London, Earl T. Barr
DOI
16:00
30m
Talk
Detection of Energy Inefficiencies in Android Wear Watch Faces
Research Papers
Hailong Zhang Ohio State University, Haowei Wu , Atanas Rountev Ohio State University
16:30
30m
Talk
Stochastic Energy Optimization for Mobile GPS Applications
Research Papers
Anthony Canino SUNY Binghamton, Yu David Liu State University of New York (SUNY) Binghamton, Hidehiko Masuhara Tokyo Institute of Technology

Accepted Papers

Title
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Research Papers
An Empirical Study on Crash Recovery Bugs in Large-Scale Distributed Systems
Research Papers
A Novel Automated Approach for Software Effort Estimation Based on Data Augmentation
Research Papers
AppFlow: Using Machine Learning to Synthesize Robust, Reusable UI Tests
Research Papers
Applications of Psychological Science for Actionable Analytics
Research Papers
Automated Patch Extraction via Syntax- and Semantics-Aware Delta Debugging on Source Code Changes
Research Papers
Link to publication DOI Authorizer link
Be Careful of When: An Empirical Study on Time-Related Misuse of Issue Tracking Data
Research Papers
Bug Synthesis: Challenging Bug-Finding Tools with Deep Faults
Research Papers
CloudRaid: Hunting Concurrency Bugs in the Cloud via Log-Mining
Research Papers
Code Vectors: Understanding Programs Through Embedded Abstracted Symbolic Traces
Research Papers
Complementing Global and Local Contexts in Representing API Descriptions to Improve API Retrieval Tasks
Research Papers
Concurrency Verification with Maximal Path Causality
Research Papers
Darwinian Data Structure Selection
Research Papers
DOI Pre-print
Data Race Detection on Compressed Traces
Research Papers
Deep Learning Type Inference
Research Papers
DeepSim: Deep Learning Code Functional Similarity
Research Papers
Detecting Speech Act Types in Developer Question/Answer Conversations during Bug Repair
Research Papers
Detection of Energy Inefficiencies in Android Wear Watch Faces
Research Papers
Do Android Taint Analysis Tools Keep Their Promises?
Research Papers
Do the Dependency Conflicts in My Project Matter?
Research Papers
Ecosystem-Level Determinants of Sustained Activity in Open-Source Projects: A Case Study of the PyPI Ecosystem
Research Papers
Feedback-Directed Differential Testing of Interactive Debuggers
Research Papers
FraudDroid: Automated Ad Fraud Detection for Android Apps
Research Papers
How Should Compilers Explain Problems to Developers?
Research Papers
Pre-print
How Well Are Regular Expressions Tested in the Wild?
Research Papers
Identifying Impactful Service System Problems via Log Analysis
Research Papers
Improving IR-Based Bug Localization with Context-Aware Query Reformulation
Research Papers
Pre-print
Large-Scale Study of Substitutability in the Presence of Effects
Research Papers
Learning to Sample: Exploiting Similarities Across Environments to Learn Performance Models for Configurable Systems
Research Papers
MemFix: Static Analysis-Based Repair of Memory Deallocation Errors for C
Research Papers
MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection
Research Papers
Model Transformation Languages under a Magnifying Glass: A Controlled Experiment with Xtend, ATL, and QVT
Research Papers
Modify, Enhance, Select: Co-Evolution of Combinatorial Models and Test Plans
Research Papers
NAR-Miner: Discovering Negative Association Rules from Code for Bug Detection
Research Papers
Neural-Augmented Static Analysis of Android Communication
Research Papers
One Size Does Not Fit All: An Empirical Study of Containerized Continuous Deployment Workflows
Research Papers
Pre-print
Optimizing Test Prioritization via Test Distribution Analysis
Research Papers
Oreo: Detection of Clones in the Twilight Zone
Research Papers
Parameterized Model Counting for String and Numeric Constraints
Research Papers
Path-Based Function Embedding and Its Application to Error-Handling Specification Mining
Research Papers
Performance Comprehension at WiredTiger
Research Papers
Phys: Probabilistic Physical Unit Assignment and Inconsistency Detection
Research Papers
Pre-print
Practical AJAX Race Detection for JavaScript Web Applications
Research Papers
Predicting Node Failure in Cloud Service Systems
Research Papers
Putback-Based Bidirectional Model Transformations
Research Papers
RefiNym: Using Names to Refine Types
Research Papers
Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity
Research Papers
Singularity: Pattern Fuzzing for Worst Case Complexity
Research Papers
DOI Pre-print
Stochastic Energy Optimization for Mobile GPS Applications
Research Papers
Symbolic Execution with Existential Second-Order Constraints
Research Papers
DOI Pre-print
Syntax-Guided Synthesis of Datalog Programs
Research Papers
Testing Multithreaded Programs via Thread Speed Control
Research Papers
Testing Probabilistic Programming Systems
Research Papers
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale
Research Papers
Towards a Theory of Software Development Expertise
Research Papers
Pre-print
Using Finite-State Models for Log Differencing
Research Papers
Verifying the Long-Run Behavior of Probabilistic System Models in the Presence of Uncertainty
Research Papers
Visual Web Test Repair
Research Papers
Pre-print Media Attached
What Makes a Code Change Easier to Review? An Empirical Investigation on Code Change Reviewability
Research Papers
Link to publication DOI Pre-print Media Attached
Which Generated Test Failures Are Fault Revealing? Prioritizing Failures Based on Inferred Precondition Violations using PAF
Research Papers
Winning the App Production Rally
Research Papers

Call for Papers

We are interested in submissions from both industry and academia on all topics related to software engineering. These include, but are not limited to:

  • Architecture and design

  • Autonomic computing and (self-)adaptive systems

  • Big data

  • Cloud computing

  • Components, services, and middleware

  • Computer-supported cooperative work

  • Configuration management and deployment

  • Crowdsourcing

  • Debugging

  • Dependability, safety, and reliability

  • Development tools and environments

  • Distributed, parallel, and concurrent software

  • Education

  • Embedded and real-time software

  • Empirical software engineering

  • End-user software engineering

  • Formal methods, including languages, methods, and tools

  • Green computing

  • Human and social factors in software engineering

  • Human-computer interaction

  • Knowledge-based software engineering

  • Mobile, ubiquitous, and pervasive software

  • Model-driven software engineering

  • Patterns and frameworks

  • Processes and workflows

  • Program analysis

  • Program comprehension and visualization

  • Program synthesis

  • Refactoring

  • Requirements engineering

  • Reverse engineering

  • Safety-critical systems

  • Scientific computing

  • Search-based software engineering

  • Security and privacy

  • Software economics and metrics

  • Software evolution and maintenance

  • Software modularity

  • Software product lines

  • Software reuse

  • Software services

  • Testing

  • Traceability

  • Web-based software

How to Submit

At the time of submission all papers must conform to the ESEC/FSE 2018 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references (with an abstract of 250 words max). All submissions must be in English and in PDF format. You can submit, optionally, an additional file containing supplementary material (see details below). Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site.

Each submission will be reviewed by at least three members of the Program Committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.

ESEC/FSE 2018 will employ a lightweight double-blind review process. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should avoid providing URLs to author-revealing sites (tools, data sets). The paper can mention the existence of such sites, but the visit of such sites should not be needed to conduct the review. You can submit, optionally, a zip file or a pdf file containing supplementary material (raw data, data sets, experiments, etc.), which should also be blinded. The program committee will not necessarily consider it in the paper review process.
  • Authors should anonymize author-revealing company names, yet can provide general characteristics of the organizations involved needed to understand the context of the paper.

Once all reviews are in, author identities will be revealed to the program committee, and authors can respond to the reviews. Authors thus can also use their responses to provide additional information that would otherwise be author-revealing, thus allowing reviewers to take this extra information into account in the eventual evaluation.

Authors having further questions on double blind reviewing are encouraged to contact the Program Chairs by email. Papers that do not comply to the double blind review process will be desk-rejected.

All publications are subject to the ACM Author Representations policy.