Accepted Regular Papers

  • Lov Kumar and Ashish Sureka. Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level
  • Shenhong Wei and Cangzhou Yuan. Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark
  • Xingming Wu, Lian Li and Jian Zhang. Symbolic Execution with Value-range Analysis for Floating-point Exception Detection
  • Shubham Tripathi, Gustavo Grieco and Sanjay Rawat. Exniffer: Learning to Rank Crashes by Assessing the Exploitability from Memory Dump
  • Min Wang, Pengcheng Wang and Yun Xu. CCSharp: An efficient three-phase code clone detector using modified PDGs
  • Miho Kawasaki, Hiroyuki Okamura and Tadashi Dohi. A Comprehensive Evaluation of Software Reliability Modeling Based on Marshall-Olkin Type Fault-Detection Time Distributions
  • Shuhan Yan, Beijun Shen, Wenkai Mo and Ning Li. Transfer learning for cross-platform software crowdsourcing recommendation
  • Xin Yi, Liqian Chen, Xiaoguang Mao and Tao Ji. Efficient Global Search for Inputs Triggering High Floating-Point Inaccuracies
  • Nor Shahida Mohamad Yusop, John Grundy, Rajesh Vasa and Jean-Guy Schneider. Analysis of the Textual Content of Mined Open Source Usability Defect Reports
  • Nhat-Hoa Tran, Yuki Chiba and Toshiaki Aoki. Domain-Specific Language Facilitates Scheduling in Model Checking
  • Biling Lin, Xiao Chen and Liangmin Wang. A Cloud-Based Trust Evaluation Scheme Using in a Vehicular Social Network Environment
  • Jing Yanchao, Xue Guangtao and Qian Shiyou. Noff: A Novel Extendible Parallel Library for High-performance Network Traffic Monitoring
  • Shinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi and Shinichi Honiden. Extracting Traceability between Predicates in Event-B Refinement
  • Shuo Yang, Xinjun Mao, Zhe Liu, Sen Yang, Jiangtao Xue and Zixi Xu. The Accompanying Behavior Model and Implementation Architecture of Autonomous Robot Software
  • Tong Li. Identifying Security Requirements Based on Linguistic Analysis and Machine Learning
  • Bin Li, Juan Zhai, Zhenhao Tang, Enyi Tang and Jianhua Zhao. A Framework for Array Invariants Synthesis in Induction-loop Programs
  • Xiaoyun Guo, Hsin-Hung Lin, Toshiaki Aoki and Yuki Chiba. A Reusable Framework for Modeling and Verifying In-vehicle Networking System in the Presence of CAN and FlexRay
  • Jukka Ruohonen and Ville Leppänen. How Is PHP Patched in the Wild? A Discrete Time-Homogeneous Markov Chain Analysis
  • Teng Zhao, Qinghua Cao and Qing Sun. An Improved Approach to Traceability Recovery Based on Word Embeddings
  • Girish Maskeri and Raghavan Komondoor. Detecting Full Initialization Points of Objects to Support Code Refactorings
  • Shuai Wang, Wensheng Dou, Chushu Gao, Jun Wei and Tao Huang. Mining API Type Specifications for JavaScript
  • Gabriel Campeanu, Jan Carlson and Séverine Sentilles. Flexible Components for Development of Embedded Systems with GPUs
  • Marc Brünink and David S. Rosenblum. Using Branch Frequency Spectra to Evaluate Operational Coverage
  • Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu and Jian Lu. Exploring Metadata in Bug Reports for Bug Localization
  • Yuqing Wang, Jouni Markkula and Jing Jiang. Cultural Factors Influencing International Collaborative Software Engineering Education in China
  • Luyi Feng, Yin Kia Chiam and Sin Kuang Lo. Text-mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review
  • Nuttapon Lertwittayatrai, Raula Gaikovina Kula, Saya Onoue, Hideaki Hata, Arnon Rungsawang, Pattara Leelaprute and Kenichi Matsumoto. Extracting Insights from the Topology of the JavaScript Package Ecosystem
  • Zhang Ping and Yu Dongjin. A Degree-driven Approach to Design Pattern Mining Based on Graph Matching
  • Pankajeshwara Sharma, Tony Savarimuthu and Nigel Stanger. Boundary Spanners in Open Source Software Development – A Study of Python Email Archives
  • Zhe Liu, Xinjun Mao and Shuo Yang. A Dual-Loop Control Model and Software Framework for Autonomous Robot Software
  • Yan Xiao, Jacky Keung, Qing Mi and Kwabena Ebo Bennin. Improving Bug Localization with an Enhanced Convolutional Neural Network
  • Vitor Freitas, Mirko Perkusich, Emilia Mendes, Pilar Rodríguez and Markku Oivo. Value-Based Decision-Making Using a Web-Based Tool: A Multiple Case Study
  • Shahid Hussain, Jacky Keung, Arif Ali Khan, Kwabena Ebo Bennin. Correlation Between the Frequent Use of Gang-of-Four Design Patterns and Structural Complexity
  • Payas Awadhutkar, Ganesh Ram Santhanam, Benjamin Holland and Suraj Kothari. Intelligence Amplifying Loop Characterizations for Detecting Algorithmic Complexity Vulnerabilities
  • Ana Nicolaescu, Horst Lichter and Veit Hoffmann. On Adequate Behavior-based Architecture Conformance Checks
  • Abdullah Khanfor, Ye Yang, Gregg Vesonder, Guenther Ruhe and Dave Messinger. Failure Prediction in Crowdsourced Software Development
  • Xiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang and Bin Li. An Empirical Study on Real Bugs for Machine Learning Programs
  • Junghyun Kwon and In-Young Ko. Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments
  • Yoohee Chung, Dongwoo Kim and Yunja Choi. Modeling OSEK/VDX OS Requirements in C
  • Moe Matsubara and Mikio Aoyama. An Analysis Method of Safety Requirements for Advanced Drive Support Systems of Automotive Software Systems
  • Ailun Liu, Miroslav Popovic and Huibiao Zhu. Formalization and Verification of the PSTM architecture
  • Liming Dong, Bohan Liu, Zheng Li, Ou Wu, Muhammad Ali Babar and Bingbing Xue. A Mapping Study on Mining Software Process
  • Liming Dong, Bohan Liu, Zheng Li, Bingbing Xue, Danni Chen and Tiange Chen. Mining Handover Process in Open Source Development: An Exploratory Study
  • Roland Kretschmer, Djamel Eddine Khelladi, Andreas Demuth, Roberto Erick Lopez-Herrejon and Alexander Egyed. From Abstract to Concrete Repairs of Model Inconsistencies: an Automated Approach
  • Guoping Rong, Xinbei Liu, Shenghui Gu and Dong Shao. A Goal-Driven Framework in Support of Knowledge Management
  • Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou and Baowen Xu. An empirical study on downstream workarounds for cross-project bugs
  • Chao Xu, Huibiao Zhu and Wanling Xie. Modeling and Verifying Identity Authentication Security of HDFS using CSP
  • Azlan Ismail and Marta Kwiatkowska. Synthesizing Pareto Optimal Decision for Autonomic Clouds using Stochastic Games Model Checking
  • Wenhao Fu, Huiqun Yu, Guisheng Fan and Xiang Ji. A Regression Test Case Prioritization Algorithm Based on Program Changes and Method Invocation Relationship
  • Sawan Rai, Tejaswini Gaikwad, Sparshi Jain and Atul Gupta. Method Level Text Summarization for Java Code using Nano-Patterns
  • Rui Chen, Shanshan Li and Zheng Li. From Monolith to Microservices: A Dataflow-Driven Approach