Accepted Regular Papers
- Lov Kumar and Ashish Sureka. Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level
- Shenhong Wei and Cangzhou Yuan. Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark
- Xingming Wu, Lian Li and Jian Zhang. Symbolic Execution with Value-range Analysis for Floating-point Exception Detection
- Shubham Tripathi, Gustavo Grieco and Sanjay Rawat. Exniffer: Learning to Rank Crashes by Assessing the Exploitability from Memory Dump
- Min Wang, Pengcheng Wang and Yun Xu. CCSharp: An efficient three-phase code clone detector using modified PDGs
- Miho Kawasaki, Hiroyuki Okamura and Tadashi Dohi. A Comprehensive Evaluation of Software Reliability Modeling Based on Marshall-Olkin Type Fault-Detection Time Distributions
- Shuhan Yan, Beijun Shen, Wenkai Mo and Ning Li. Transfer learning for cross-platform software crowdsourcing recommendation
- Xin Yi, Liqian Chen, Xiaoguang Mao and Tao Ji. Efficient Global Search for Inputs Triggering High Floating-Point Inaccuracies
- Nor Shahida Mohamad Yusop, John Grundy, Rajesh Vasa and Jean-Guy Schneider. Analysis of the Textual Content of Mined Open Source Usability Defect Reports
- Nhat-Hoa Tran, Yuki Chiba and Toshiaki Aoki. Domain-Specific Language Facilitates Scheduling in Model Checking
- Biling Lin, Xiao Chen and Liangmin Wang. A Cloud-Based Trust Evaluation Scheme Using in a Vehicular Social Network Environment
- Jing Yanchao, Xue Guangtao and Qian Shiyou. Noff: A Novel Extendible Parallel Library for High-performance Network Traffic Monitoring
- Shinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi and Shinichi Honiden. Extracting Traceability between Predicates in Event-B Refinement
- Shuo Yang, Xinjun Mao, Zhe Liu, Sen Yang, Jiangtao Xue and Zixi Xu. The Accompanying Behavior Model and Implementation Architecture of Autonomous Robot Software
- Tong Li. Identifying Security Requirements Based on Linguistic Analysis and Machine Learning
- Bin Li, Juan Zhai, Zhenhao Tang, Enyi Tang and Jianhua Zhao. A Framework for Array Invariants Synthesis in Induction-loop Programs
- Xiaoyun Guo, Hsin-Hung Lin, Toshiaki Aoki and Yuki Chiba. A Reusable Framework for Modeling and Verifying In-vehicle Networking System in the Presence of CAN and FlexRay
- Jukka Ruohonen and Ville Leppänen. How Is PHP Patched in the Wild? A Discrete Time-Homogeneous Markov Chain Analysis
- Teng Zhao, Qinghua Cao and Qing Sun. An Improved Approach to Traceability Recovery Based on Word Embeddings
- Girish Maskeri and Raghavan Komondoor. Detecting Full Initialization Points of Objects to Support Code Refactorings
- Shuai Wang, Wensheng Dou, Chushu Gao, Jun Wei and Tao Huang. Mining API Type Specifications for JavaScript
- Gabriel Campeanu, Jan Carlson and Séverine Sentilles. Flexible Components for Development of Embedded Systems with GPUs
- Marc Brünink and David S. Rosenblum. Using Branch Frequency Spectra to Evaluate Operational Coverage
- Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu and Jian Lu. Exploring Metadata in Bug Reports for Bug Localization
- Yuqing Wang, Jouni Markkula and Jing Jiang. Cultural Factors Influencing International Collaborative Software Engineering Education in China
- Luyi Feng, Yin Kia Chiam and Sin Kuang Lo. Text-mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review
- Nuttapon Lertwittayatrai, Raula Gaikovina Kula, Saya Onoue, Hideaki Hata, Arnon Rungsawang, Pattara Leelaprute and Kenichi Matsumoto. Extracting Insights from the Topology of the JavaScript Package Ecosystem
- Zhang Ping and Yu Dongjin. A Degree-driven Approach to Design Pattern Mining Based on Graph Matching
- Pankajeshwara Sharma, Tony Savarimuthu and Nigel Stanger. Boundary Spanners in Open Source Software Development – A Study of Python Email Archives
- Zhe Liu, Xinjun Mao and Shuo Yang. A Dual-Loop Control Model and Software Framework for Autonomous Robot Software
- Yan Xiao, Jacky Keung, Qing Mi and Kwabena Ebo Bennin. Improving Bug Localization with an Enhanced Convolutional Neural Network
- Vitor Freitas, Mirko Perkusich, Emilia Mendes, Pilar Rodríguez and Markku Oivo. Value-Based Decision-Making Using a Web-Based Tool: A Multiple Case Study
- Shahid Hussain, Jacky Keung, Arif Ali Khan, Kwabena Ebo Bennin. Correlation Between the Frequent Use of Gang-of-Four Design Patterns and Structural Complexity
- Payas Awadhutkar, Ganesh Ram Santhanam, Benjamin Holland and Suraj Kothari. Intelligence Amplifying Loop Characterizations for Detecting Algorithmic Complexity Vulnerabilities
- Ana Nicolaescu, Horst Lichter and Veit Hoffmann. On Adequate Behavior-based Architecture Conformance Checks
- Abdullah Khanfor, Ye Yang, Gregg Vesonder, Guenther Ruhe and Dave Messinger. Failure Prediction in Crowdsourced Software Development
- Xiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang and Bin Li. An Empirical Study on Real Bugs for Machine Learning Programs
- Junghyun Kwon and In-Young Ko. Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments
- Yoohee Chung, Dongwoo Kim and Yunja Choi. Modeling OSEK/VDX OS Requirements in C
- Moe Matsubara and Mikio Aoyama. An Analysis Method of Safety Requirements for Advanced Drive Support Systems of Automotive Software Systems
- Ailun Liu, Miroslav Popovic and Huibiao Zhu. Formalization and Verification of the PSTM architecture
- Liming Dong, Bohan Liu, Zheng Li, Ou Wu, Muhammad Ali Babar and Bingbing Xue. A Mapping Study on Mining Software Process
- Liming Dong, Bohan Liu, Zheng Li, Bingbing Xue, Danni Chen and Tiange Chen. Mining Handover Process in Open Source Development: An Exploratory Study
- Roland Kretschmer, Djamel Eddine Khelladi, Andreas Demuth, Roberto Erick Lopez-Herrejon and Alexander Egyed. From Abstract to Concrete Repairs of Model Inconsistencies: an Automated Approach
- Guoping Rong, Xinbei Liu, Shenghui Gu and Dong Shao. A Goal-Driven Framework in Support of Knowledge Management
- Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou and Baowen Xu. An empirical study on downstream workarounds for cross-project bugs
- Chao Xu, Huibiao Zhu and Wanling Xie. Modeling and Verifying Identity Authentication Security of HDFS using CSP
- Azlan Ismail and Marta Kwiatkowska. Synthesizing Pareto Optimal Decision for Autonomic Clouds using Stochastic Games Model Checking
- Wenhao Fu, Huiqun Yu, Guisheng Fan and Xiang Ji. A Regression Test Case Prioritization Algorithm Based on Program Changes and Method Invocation Relationship
- Sawan Rai, Tejaswini Gaikwad, Sparshi Jain and Atul Gupta. Method Level Text Summarization for Java Code using Nano-Patterns
- Rui Chen, Shanshan Li and Zheng Li. From Monolith to Microservices: A Dataflow-Driven Approach