Conference Dates
Conference Dates are in time zone (GMT-08:00) Tijuana, Baja California, and may differ from the viewed time zone.
Rooms
Tracks
Badges
Your Program
Sun 10 Nov Times are displayed in time zone: Tijuana, Baja California change
Sun 10 Nov
Times are displayed in time zone: Tijuana, Baja California change
16:00 - 18:00 | |||
17:00 - 18:00 | NSF Workshop Deep Learning and Software Engineering (invitation only) - ReceptionNSF Workshop: DL + SE at Kensington 2 | ||
18:00 - 21:00 | NSF Workshop Deep Learning and Software Engineering (invitation only)NSF Workshop: DL + SE at Kensington 2 | ||
Mon 11 Nov Times are displayed in time zone: Tijuana, Baja California change
Mon 11 Nov
Times are displayed in time zone: Tijuana, Baja California change
08:00 - 11:00 | |||
08:30 - 08:45 | |||
08:30 - 18:00 | NSF Workshop Deep Learning and Software Engineering (invitation only) - PlenaryNSF Workshop: DL + SE at Cortez 3 | ||
08:30 - 17:30 | NSF Workshop Deep Learning and Software Engineering (invitation only) - BreakoutNSF Workshop: DL + SE at Normal Heights | ||
08:30 - 17:30 | NSF Workshop Deep Learning and Software Engineering (invitation only) - BreakoutNSF Workshop: DL + SE at University Heights | ||
08:45 - 09:30 | |||
08:45 45mTalk | Keynote: Navigating your PhD & the World Beyond Doctoral Symposium Sarah NadiUniversity of Alberta |
09:00 - 10:30 | |||
09:00 30mDay opening | Welcome and Opening A-Mobile Li LiMonash University, Australia, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Jacques KleinUniversity of Luxembourg, SnT, Sam MalekUniversity of California, Irvine | ||
09:30 60mTalk | Grammar-based UI Testing A-Mobile Andreas ZellerCISPA Helmholtz Center for Information Security |
09:00 - 10:30 | |||
09:00 70mTalk | Openings and 5-minute research intro from all attending PC members Celebration of ASE | ||
10:10 20mTalk | Quality and Reliability for Machine Learning Systems Celebration of ASE Lei MaKyushu University |
09:00 - 17:30 | |||
09:00 - 10:30 | |||
09:00 15mDay opening | Introduction SEAD Mehdi MirakhorliRochester Institute of Technology, Matthias GalsterUniversity of Canterbury, Laurie WilliamsNorth Carolina State University | ||
09:15 60mTalk | Keynote Talk: Automating Pragmatic Software Dependability SEAD |
09:30 - 10:30 | |||
09:30 30m | Tackling Build Failures in Continuous Integration Doctoral Symposium Foyzul HassanUniversity of Texas at San Antonio, USA | ||
10:00 30m | Enabling Continuous Improvement of a Continuous Integration Process Doctoral Symposium Carmine VassalloUniversity of Zurich |
10:30 - 11:00 | |||
11:00 - 12:30 | |||
11:00 30m | Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements Doctoral Symposium Kristian KolthoffInstitute for Enterprise Systems (InES), University Of Mannheim | ||
11:30 30m | Improving Collaboration Efficiency in Fork-based Development Doctoral Symposium Shurui ZhouCarnegie Mellon University, USA | ||
12:00 30m | Inference of Properties from Requirements and Automation of their Formal Verification Doctoral Symposium Marina ReichChemnitz University of Technology/ Airbus Defence and Space GmbH |
11:00 - 12:30 | |||
11:00 30mResearch paper | Enforcing Green Code With Android Lint A-Mobile Olivier Le GoaerLIUPPA, Université de Pau et des Pays de l'Adour Link to publication Media Attached | ||
11:30 30mResearch paper | BenchPress: Analyzing Android App Vulnerability Benchmark Suites A-Mobile Joydeep MitraKansas State University, Venkatesh-Prasad RanganathKansas State University, Aditya Narkar Pre-print Media Attached | ||
12:00 30mResearch paper | Android App Merging for Benchmark Speed-Up and Analysis Lift-Up A-Mobile |
11:00 - 12:30 | |||
11:00 20mTalk | Machine Learning Testing Celebration of ASE Jie M. ZhangUniversity College London, UK | ||
11:20 20mTalk | How does Machine Learning Change Software Development Practices? Celebration of ASE Xin XiaMonash University | ||
11:40 50m | Reviewer Experience Panel Celebration of ASE Bogdan VasilescuCarnegie Mellon University, Elena ShermanBoise State University, Massimiliano Di PentaUniversity of Sannio, Sarah NadiUniversity of Alberta |
11:00 - 12:30 | |||
11:00 20mTalk | The Effect of Weighted Moving Windows on Security Vulnerability Prediction SEAD Patrick Kwaku KudjoJiangsu University, Jinfu ChenJiangsu University, Selasie Aformaley BrownUniversity of Professional Studies, Accra-Ghana, Solomon MensahUniversity of Ghana, Legon | ||
11:20 20mTalk | Towards Automated Security Design Flaw Detection SEAD Laurens SionKatholieke Universiteit Leuven, Katja TumaChalmers | University of Gothenburg, Koen YskoutKatholieke Universiteit Leuven, Riccardo ScandariatoChalmers | University of Gothenburg, Wouter JoosenKatholieke Universiteit Leuven | ||
11:40 20mTalk | Securing Smart Contracts in Blockchain SEAD Jaturong KongmaneeComputer Science, Texas Tech University, Jaturong KongmaneeComputer Science, Texas Tech University, Phongphun KijsanayothinElectrical and Computer Engineering, Naresuan University, Rattikorn HewettComputer Science, Texas Tech University |
12:30 - 14:00 | |||
13:30 - 14:00 | |||
14:00 - 15:30 | |||
14:00 30m | Automatically Repairing Binary Programs Using Adapter Synthesis Doctoral Symposium Vaibhav SharmaUniversity of Minnesota | ||
14:30 30m | Improving Patch Quality by Enhancing Key Components of Automatic Program Repair Doctoral Symposium Mauricio SotoCarnegie Mellon University | ||
15:00 30m | Generating Tests to Analyse Dynamically-Typed Programs Doctoral Symposium Stephan LukasczykUniversity of Passau |
14:00 - 15:30 | |||
14:00 30mTalk | Automated Support for Testing and Maintenance of Mobile Applications A-Mobile Mattia FazziniUniversity of Minnesota | ||
14:30 30mResearch paper | Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features A-Mobile Amit Kumar Mondal, Chanchal K. RoyUniversity of Saskatchewan, Banani RoyUniversity of Saskatchewan, Kevin SchneiderUniversity of Saskatchewan | ||
15:00 30mResearch paper | SeMA: A Design Methodology for Building Secure Android Apps A-Mobile Pre-print Media Attached |
14:00 - 15:30 | |||
14:00 20mTalk | Practical Program Repair via Bytecode Mutation Celebration of ASE Lingming ZhangThe University of Texas at Dallas | ||
14:20 20mTalk | Refinement in Object-Sensitivity Points-to Analysis via Slicing Celebration of ASE Raghavan KomondoorIndian Institute of Science, Bangalore | ||
14:40 20mTalk | Investigating Software Merging Challenges Celebration of ASE Sarah NadiUniversity of Alberta | ||
15:00 20mTalk | Testing Scratch Programs Automatically Celebration of ASE Gordon FraserUniversity of Passau | ||
15:20 10m | Open Research Discussion Celebration of ASE |
14:00 - 15:30 | |||
14:00 20mTalk | Secrets Management and Handling in Mobile Application Development Lifecycle SEAD | ||
14:20 20mTalk | Challenges in Secure Engineering of Critical Infrastructure Systems SEAD Sridhar AdepuSingapore University of Technology and Design, Singapore, Eunsuk KangCarnegie Mellon University, Aditya MathurSingapore University of Technology and Design | ||
14:40 20mTalk | Security-related Commits in Open Source Web Browser Projects SEAD Ákos KissUniversity of Szeged, Department of Software Engineering, Renáta HodovánUniversity of Szeged, Department of Software Engineering |
15:30 - 16:00 | |||
15:30 - 16:00 | |||
16:00 - 16:50 | |||
16:00 - 17:30 | |||
16:00 30mMeeting | Panel Discussion A-Mobile | ||
16:30 30mDay closing | Summary and Closing A-Mobile |
16:00 - 17:00 | |||
16:00 60m | "SE Community: Challenges and Opportunities" -- Panel and Open Discussion Celebration of ASE Tim MenziesNorth Carolina State University, René JustUniversity of Washington, USA, Nenad MedvidovićUniversity of Southern California, Dirk BeyerLMU Munich |
16:00 - 17:30 | |||
16:00 - 18:00 | |||
16:50 - 17:00 | |||
18:00 - 20:30 | Dinner at Lazy DogCelebration of ASE | ||
18:00 - 23:59 | |||
Tue 12 Nov Times are displayed in time zone: Tijuana, Baja California change
Tue 12 Nov
Times are displayed in time zone: Tijuana, Baja California change
07:30 - 11:00 | |||
08:30 - 10:00 | |||
08:30 30m | Welcome from the Chairs Research Papers | ||
09:00 60mTalk | Re-engineering Software Engineering for a Data-centric World Research Papers Miryung KimUniversity of California, Los Angeles |
08:30 - 18:00 | NSF Workshop Deep Learning and Software Engineering (invitation only) - OrganizersNSF Workshop: DL + SE at Normal Heights | ||
10:00 - 10:40 | |||
10:00 - 10:40 | |||
10:00 40mDemonstration | Pangolin: An SFL-based Toolset for Feature Localization Demonstrations Bruno Miguel Sotto-Mayor de Castro MachadoIST, University of Lisbon, Alexandre PerezPalo Alto Research Center, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID | ||
10:00 40mDemonstration | A Quantitative Analysis Framework for Recurrent Neural Network Demonstrations Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | ||
10:00 40mDemonstration | Ares: Inferring Error Specifications through Static Analysis Demonstrations Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle | ||
10:00 40mDemonstration | SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software Demonstrations Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Sebastian RulandTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt Pre-print Media Attached File Attached | ||
10:00 40mDemonstration | VeriAbs : Verification by Abstraction and Test Generation Demonstrations Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre | ||
10:00 40mDemonstration | DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks Demonstrations Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | ||
10:00 40mDemonstration | SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs Demonstrations Xutong MaInstitute of Software, Chinese Academy of Sciences, Jiwei YanInstitute of Software, Chinese Academy of Sciences, Yaqi LiInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences | ||
10:00 40mDemonstration | LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform Demonstrations Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University File Attached | ||
10:00 40mDemonstration | FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing Demonstrations Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology | ||
10:00 40mDemonstration | SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection Demonstrations Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University | ||
10:00 40mDemonstration | FPChecker: Detecting Floating-Point Exceptions in GPU Applications Demonstrations Ignacio LagunaLawrence Livermore National Laboratory | ||
10:00 40mDemonstration | PMExec: An Execution Engine of Partial UML-RT Models Demonstrations Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario Pre-print |
10:40 - 12:20 | Testing and CoverageResearch Papers / Demonstrations / Journal First Presentations / Industry Showcase at Cortez 1 Chair(s): Jonathan BellGeorge Mason University | ||
10:40 20mTalk | Automatic Self-Validation for Code Coverage Profilers Research Papers Yibiao YangHuazhong University of Science and Technology, Yanyan JiangNanjing University, Zhiqiang ZuoNanjing University, China, Yang WangNanjing University, Hao SunUnaffiliated, Hongmin LuNanjing University, Yuming ZhouNanjing University, Baowen XuNanjing University Pre-print | ||
11:00 20mTalk | Efficient Test Generation Guided by Field Coverage Criteria Research Papers Ariel GodioDept. of Software Engineering Instituto Tecnológico de Buenos Aires, Valeria BengoleaDept. of Computer Science FCEFQyN, University of Rio Cuarto, Pablo PonzioDept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto, Marcelo F. FriasDept. of Software Engineering Instituto Tecnológico de Buenos Aires | ||
11:20 20mTalk | Exploring Output-Based Coverage for Testing PHP Web Applications Journal First Presentations Hung Viet NguyenGoogle LLC, USA, Hung Dang PhanECpE Department, Iowa State University, Christian KaestnerCarnegie Mellon University, Tien N. NguyenUniversity of Texas at Dallas Link to publication | ||
11:40 20mTalk | PHANTA: Diversified Test Code Quality Measurement for Modern Software Development Industry Showcase Media Attached | ||
12:00 10mDemonstration | TestCov: Robust Test-Suite Execution and Coverage Measurement Demonstrations Pre-print Media Attached File Attached | ||
12:10 10mDemonstration | VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization Demonstrations Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University |
10:40 - 12:20 | AI and SEResearch Papers / Journal First Presentations / Demonstrations at Cortez 2&3 Chair(s): Kaiyuan WangGoogle, Inc. | ||
10:40 20mTalk | Assessing the Generalizability of code2vec Token Embeddings Research Papers Hong Jin KangSchool of Information Systems, Singapore Management University, Tegawendé F. BissyandéSnT, University of Luxembourg, David LoSingapore Management University Pre-print | ||
11:00 20mTalk | Multi-Modal Attention Network Learning for Semantic Source Code Retrieval Research Papers Yao WanZhejiang University, Jingdong ShuZhejiang University, Yulei SuiUniversity of Technology Sydney, Australia, Guandong XuUniversity of Technology, Sydney, Zhou ZhaoZhejiang University, Jian WuZhejiang University, philip yuUniversity of Illinois at Chicago | ||
11:20 20mTalk | Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award Research Papers Christoph GladischCorporate Research, Robert Bosch GmbH, Thomas HeinzCorporate Research, Robert Bosch GmbH, Christian HeinzemannCorporate Research, Robert Bosch GmbH, Jens OehlerkingCorporate Research, Robert Bosch GmbH, Anne von VietinghoffCorporate Research, Robert Bosch GmbH, Tim PfitzerRobert Bosch Automotive Steering GmbH | ||
11:40 20mTalk | Machine Translation-Based Bug Localization Technique for Bridging Lexical Gap Journal First Presentations Yan XiaoDepartment of Computer Science, City University of Hong Kong, Jacky KeungDepartment of Computer Science, City University of Hong Kong, Kwabena E. BenninBlekinge Institute of Technology, SERL Sweden, Qing MiDepartment of Computer Science, City University of Hong Kong Link to publication | ||
12:00 10mTalk | AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation Research Papers Nghi D. Q. BuiSingapore Management University, Singapore, Yijun YuThe Open University, UK, Lingxiao JiangSingapore Management University Pre-print | ||
12:10 10mDemonstration | A Quantitative Analysis Framework for Recurrent Neural Network Demonstrations Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University |
10:40 - 12:20 | Mobile 1Demonstrations / Research Papers / Journal First Presentations at Hillcrest Chair(s): Marouane KessentiniUniversity of Michigan | ||
10:40 20mTalk | Test Transfer Across Mobile Apps Through Semantic Mapping Research Papers Jun-Wei LinUniversity of California, Irvine, Reyhaneh JabbarvandUniversity of California, Irvine, Sam MalekUniversity of California, Irvine | ||
11:00 20mTalk | Test Migration Between Mobile Apps with Similar Functionality Research Papers | ||
11:20 20mTalk | DaPanda: Detecting Aggressive Push Notification in Android Apps Research Papers Tianming LiuBeijing University of Posts and Telecommunications, China, Haoyu WangBeijing University of Posts and Telecommunications, China, Li LiMonash University, Australia, Guangdong BaiGriffith University, Yao GuoPeking University, Guoai Xu Beijing University of Posts and Telecommunications | ||
11:40 20mTalk | Automatic, highly accurate app permission recommendation Journal First Presentations Zhongxin LiuZhejiang University, Xin XiaMonash University, David LoSingapore Management University, John GrundyMonash University Link to publication | ||
12:00 10mDemonstration | LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform Demonstrations Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University File Attached | ||
12:10 10mDemonstration | Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing Demonstrations Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University |
12:20 - 13:40 | |||
12:20 80mLunch | First-Timer’s LunchDiversity and Inclusion Social |
13:00 - 17:40 | Local College Student VisitsSocial | ||
13:00 4h40m | Local College Student VisitsDiversity and Inclusion Social |
13:40 - 15:20 | Testing and VerificationResearch Papers / Demonstrations / Industry Showcase at Cortez 1 Chair(s): Weihang WangUniversity at Buffalo, SUNY | ||
13:40 20mTalk | Systematically Covering Input Structure Research Papers Nikolas HavrikovCISPA Helmholtz Center for Information Security, Andreas ZellerCISPA Helmholtz Center for Information Security Pre-print | ||
14:00 20mTalk | SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs Research Papers Pre-print | ||
14:20 20mTalk | Detecting Error-Handling Bugs without Error Specification Input Research Papers Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, Tingting YuUniversity of Kentucky, Xiangke LiaoNational University of Defense Technology, China, Ji WangNational University of Defense Technology, Xiaodong LiuNational University of Defense Technology, Yunhuai LiuPeking University | ||
14:40 20mTalk | Test Automation and its Limitations Industry Showcase Ahyoung SungSamsung Electronics, Yangsu KimSamsung Electronics, Sangjun KimSamsung Electronics, Jongin KimSamsung Electronics, Neo JangSamsung Electronics | ||
15:00 10mTalk | Grading-Based Test Suite Augmentation Research Papers Jonathan Osei-OwusuUniversity of Illinois at Urbana-Champaign, Angello AstorgaUniversity of Illinois at Urbana-Champaign, Liia ButlerUniversity of Illinois at Urbana-Champaign, Tao XiePeking University, Geoffrey ChallenUniversity of Illinois at Urbana-Champaign | ||
15:10 10mDemonstration | MutAPK: Source-Codeless Mutant Generation for Android Apps Demonstrations Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia |
13:40 - 15:20 | Natural Language and Human AspectsResearch Papers / Demonstrations / Journal First Presentations at Cortez 2&3 Chair(s): Bogdan VasilescuCarnegie Mellon University | ||
13:40 20mTalk | Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites Research Papers Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Xin XiaMonash University, Guoqiang LiShanghai Jiao Tong University, Jianling SunZhejiang University Pre-print | ||
14:00 20mTalk | Automating App Review Response Generation Research Papers Cuiyun GaoNanyang Technological University, Singapore, Jichuan ZengThe Chinese University of Hong Kong, Xin XiaMonash University, David LoSingapore Management University, Michael LyuThe Chinese University of Hong Kong, Irwin KingThe Chinese University of Hong Kong Pre-print | ||
14:20 20mTalk | Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award Research Papers Zhongxin LiuZhejiang University, Xin XiaMonash University, Christoph TreudeThe University of Adelaide, David LoSingapore Management University, Shanping LiZhejiang University Pre-print | ||
14:40 20mTalk | Recommending Who to Follow in the Software Engineering Twitter Space Journal First Presentations Abhishek Sharma Singapore Management University, Singapore, Yuan TianQueens University, Kingston, Canada, Agus SulistyaSchool of Information Systems, Singapore Management University, Dinusha WijedasaSchool of Information Systems, Singapore Management University, David LoSingapore Management University Pre-print | ||
15:00 10mDemonstration | Developer Reputation Estimator (DRE) Demonstrations Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville | ||
15:10 10mDemonstration | CocoQa: Question Answering for Coding Conventions over Knowledge Graphs Demonstrations Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University |
13:40 - 15:20 | Mobile 2Research Papers / Journal First Presentations at Hillcrest Chair(s): Myra CohenIowa State University | ||
13:40 20mTalk | A Qualitative Analysis of Android Taint-Analysis Results Research Papers Linghui LuoPaderborn University, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Johannes SpäthFraunhofer IEM Pre-print File Attached | ||
14:00 20mTalk | Goal-Driven Exploration for Android Applications Research Papers Pre-print | ||
14:20 20mTalk | RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation Research Papers Onur SahinBoston University, Assel AliyevaBoston University, Hariharan MathavanBoston University, Ayse CoskunBoston University, Manuel EgeleBoston University, USA | ||
14:40 20mTalk | Specifying Callback Control Flow of Mobile Apps Using Finite Automata Journal First Presentations Link to publication | ||
15:00 20mTalk | MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis Research Papers Yueming WuHuazhong University of Science and Technology, Xiaodi LiUniversity of Texas at Dallas, Deqing ZouHuazhong University of Science and Technology, Wei YangUniversity of Texas at Dallas, Xin ZhangHuazhong University of Science and Technology, Hai JinHuazhong University of Science and Technology Pre-print |
13:40 - 15:20 | Poster Session: Student Research Competition (for judges only)Student Research Competition at Kensington Ballroom | ||
15:20 - 16:00 | |||
16:00 - 17:40 | Testing and VisualizationDemonstrations / Research Papers / Journal First Presentations at Cortez 1 Chair(s): Amin AlipourUniversity of Houston | ||
16:00 20mTalk | History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award Research Papers Junjie ChenTianjin University, Guancheng WangPeking University, Dan HaoPeking University, Yingfei XiongPeking University, Hongyu ZhangThe University of Newcastle, Lu ZhangPeking University | ||
16:20 20mTalk | Data-Driven Compiler Testing and Debugging Research Papers Junjie ChenTianjin University | ||
16:40 20mTalk | Targeted Example Generation for Compilation Errors Research Papers Umair Z. AhmedNational University of Singapore, Renuka SindhgattaQueensland University of Technology, Australia, Nisheeth SrivastavaIndian Institute of Technology, Kanpur, Amey KarkareIIT Kanpur Link to publication Pre-print | ||
17:00 20mTalk | Lightweight Assessment of Test-Case Effectiveness using Source-Code-Quality Indicators Journal First Presentations Giovanni GranoUniversity of Zurich, Fabio PalombaDepartment of Informatics, University of Zurich, Harald GallUniversity of Zurich Link to publication Pre-print | ||
17:20 10mDemonstration | Visual Analytics for Concurrent Java Executions Demonstrations Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford | ||
17:30 10mDemonstration | NeuralVis: Visualizing and Interpreting Deep Learning Models Demonstrations Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University |
16:00 - 17:40 | SecurityDemonstrations / Research Papers / Journal First Presentations at Hillcrest Chair(s): Julia RubinUniversity of British Columbia | ||
16:00 20mTalk | Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award Research Papers Dongjie HeUniversity of New South Wales; Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Haofeng LiInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Lei WangInstitute of Computing Technology, Chinese Academy of Science, Haining MengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Hengjie ZhengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Jie LiuUniversity of New South Wales, Shuangwei Huvivo AI Lab, Lian LiInstitute of Computing Technology at Chinese Academy of Sciences, China, Jingling XueUNSW Sydney | ||
16:20 20mTalk | Characterizing Android App Signing Issues Research Papers Haoyu WangBeijing University of Posts and Telecommunications, China, Hongxuan LiuPeking University, Xusheng XiaoCase Western Reserve University, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Yao GuoPeking University | ||
16:40 20mTalk | OAuthLint: An Empirical Study on OAuth Bugs in Android Applications Research Papers Tamjid Al RahatUniversity of Virginia, Yu FengUniversity of California, Santa Barbara, Yuan TianUniversity of Virginia Pre-print | ||
17:00 20mTalk | Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities? Journal First Presentations Link to publication DOI Pre-print Media Attached | ||
17:20 10mDemonstration | SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods Demonstrations Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print Media Attached File Attached | ||
17:30 10mDemonstration | Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs Demonstrations Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University |
18:00 - 21:00 | |||
18:00 3hSocial Event | ASE Reception Social | ||
19:30 30m | Adhoc affinity group dinner meetupsDiversity and Inclusion Social |
19:00 - 23:59 | |||
Wed 13 Nov Times are displayed in time zone: Tijuana, Baja California change
Wed 13 Nov
Times are displayed in time zone: Tijuana, Baja California change
07:30 - 08:30 | |||
07:30 60m | Women’s Breakfast (registration required)Diversity and Inclusion Social |
08:00 - 11:00 | |||
08:30 - 10:00 | |||
08:30 30mAwards | ASE Award Ceremony Research Papers | ||
09:00 60mTalk | The Human Dimension of Cloud Computing Research Papers Yuanyuan ZhouUniversity of California, San Diego |
10:00 - 10:40 | |||
10:00 - 10:40 | |||
10:00 40mDemonstration | TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis Demonstrations Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University | ||
10:00 40mDemonstration | BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules Demonstrations Pavan ChittimalliTCS Research, Kritika AnandTCS Research, Shrishti PradhanTCS Research, Sayandeep MitraTCS Research, Chandan PrakashTCS Research, Rohit ShereTCS Research, Ravindra NaikTCS Research, TRDDC, India | ||
10:00 40mDemonstration | Lancer: Your Code Tell Me What You Need Demonstrations Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University | ||
10:00 40mDemonstration | TestCov: Robust Test-Suite Execution and Coverage Measurement Demonstrations Pre-print Media Attached File Attached | ||
10:00 40mDemonstration | Prema: A Tool for Precise Requirements Editing, Modeling and Analysis Demonstrations Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd | ||
10:00 40mDemonstration | XRaSE: Towards Virtually Tangible Software using Augmented Reality Demonstrations Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture | ||
10:00 40mDemonstration | MuSC: A Tool for Mutation Testing of Ethereum Smart Contract Demonstrations Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University | ||
10:00 40mDemonstration | VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq Demonstrations Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise | ||
10:00 40mDemonstration | DeepMutation++: a Mutation Testing Framework for Deep Learning Systems Demonstrations Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | ||
10:00 40mDemonstration | Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts Demonstrations Mark MossbergTrail of Bits, Felipe ManzanoTrail of Bits, Eric HennenfentTrail of Bits, Alex GroceTrail of Bits, Gustavo GriecoTrail of Bits, Josselin FeistTrail of Bits, Trent BrunsonTrail of Bits, Artem DinaburgTrail of Bits Media Attached | ||
10:00 40mDemonstration | ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities Demonstrations Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University | ||
10:00 40mDemonstration | mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines Demonstrations Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario |
10:40 - 12:20 | Testing and Program AnalysisResearch Papers / Demonstrations at Cortez 1 Chair(s): Jun SunSingapore Management University, Singapore | ||
10:40 20mTalk | Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular ExpressionsACM SIGSOFT Distinguished Paper Award Research Papers Louis G. Michael IVVirginia Tech, James DonohueUniversity of Bradford, James C. DavisVirginia Tech, USA, Dongyoon LeeStony Brook University, Francisco ServantVirginia Tech Pre-print File Attached | ||
11:00 20mTalk | Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study Research Papers James C. DavisVirginia Tech, USA, Daniel MoyerVirginia Tech, Ayaan M. KazerouniVirginia Tech, Dongyoon LeeStony Brook University Pre-print File Attached | ||
11:20 20mTalk | Accurate String Constraints Solution Counting with Weighted Automata Research Papers | ||
11:40 20mTalk | Subformula Caching for Model Counting and Quantitative Program Analysis Research Papers William EiersUniversity of California at Santa Barbara, USA, Seemanta SahaUniversity of California Santa Barbara, Tegan BrennanUniversity of California, Santa Barbara, Tevfik BultanUniversity of California, Santa Barbara | ||
12:00 10mDemonstration | SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs Demonstrations Xutong MaInstitute of Software, Chinese Academy of Sciences, Jiwei YanInstitute of Software, Chinese Academy of Sciences, Yaqi LiInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences | ||
12:10 10mDemonstration | FPChecker: Detecting Floating-Point Exceptions in GPU Applications Demonstrations Ignacio LagunaLawrence Livermore National Laboratory |
10:40 - 12:20 | Program RepairResearch Papers / Demonstrations / Journal First Presentations at Cortez 2&3 Chair(s): Yingfei XiongPeking University | ||
10:40 20mTalk | Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models Research Papers | ||
11:00 20mTalk | Re-factoring based Program Repair applied to Programming Assignments Research Papers Yang HuThe University of Texas at Austin, Umair Z. AhmedNational University of Singapore, Sergey MechtaevUniversity College London, Ben LeongNational University of Singapore, Abhik RoychoudhuryNational University of Singapore Pre-print | ||
11:20 20mTalk | InFix: Automatically Repairing Novice Program Inputs Research Papers Madeline EndresUniversity of Michigan, Georgios SakkasUniversity of California, San Diego, Benjamin CosmanUniversity of California at San Diego, USA, Ranjit JhalaUniversity of California, San Diego, Westley WeimerUniversity of Michigan Pre-print | ||
11:40 20mTalk | Astor: Exploring the Design Space of Generate-and-Validate Program Repair beyond GenProg Journal First Presentations Matias MartinezUniversité Polytechnique Hauts-de-France, Martin MonperrusKTH Royal Institute of Technology Pre-print | ||
12:00 10mDemonstration | PraPR: Practical Program Repair via Bytecode Mutation Demonstrations | ||
12:10 10mTalk | Understanding Automatically-Generated Patches Through Symbolic Invariant Differences Research Papers Padraic CashinArizona State University, Cari MartinezUniversity of New Mexico, Stephanie ForrestArizona State University, Westley WeimerUniversity of Michigan Pre-print |
10:40 - 12:20 | Cloud and Online ServicesJournal First Presentations / Research Papers / Demonstrations at Hillcrest Chair(s): Dan HaoPeking University | ||
10:40 20mTalk | Understanding Exception-Related Bugs in Large-Scale Cloud Systems Research Papers Haicheng ChenThe Ohio State University, Wensheng DouInstitute of Software, Chinese Academy of Sciences, Yanyan JiangNanjing University, Feng QinOhio State University, USA Pre-print Media Attached | ||
11:00 20mTalk | iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems Research Papers Wujie ZhengTencent, Inc., Haochuan LuFudan University, Yangfan ZhouFudan University, Jianming LiangTencent, Haibing ZhengTencent, Yuetang DengTencent, Inc. | ||
11:20 20mTalk | Software Microbenchmarking in the Cloud. How Bad is it Really? Journal First Presentations Christoph LaaberUniversity of Zurich, Joel ScheunerChalmers | University of Gothenburg, Philipp LeitnerChalmers University of Technology & University of Gothenburg Link to publication Pre-print | ||
11:40 20mTalk | Continuous Incident Triage for Large-Scale Online Service Systems Research Papers Junjie ChenTianjin University, Xiaoting HeMicrosoft, Qingwei LinMicrosoft Research, China, Hongyu ZhangThe University of Newcastle, Dan HaoPeking University, Feng GaoMicrosoft, Zhangwei XuMicrosoft, Yingnong DangMicrosoft Azure, Dongmei ZhangMicrosoft Research, China | ||
12:00 10mDemonstration | Kotless: a Serverless Framework for Kotlin Demonstrations Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University | ||
12:10 10mDemonstration | FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing Demonstrations Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology |
10:40 - 12:20 | Student Research Competition - Selected Presentations (Graduate)Student Research Competition at South Park Chair(s): Jie M. ZhangUniversity College London, UK, Jin L.C. GuoMcGill University | ||
10:40 15m | Toward Practical Automatic Program Repair Student Research Competition Ali GhanbariThe University of Texas at Dallas | ||
10:55 15m | Verifying Determinism in Sequential Programs Student Research Competition Rashmi MudduluruUniversity of Washington, Seattle | ||
11:10 15m | An Image-inspired and CNN-based Android Malware Detection Approach Student Research Competition Shao YangCase Western Reserve University | ||
11:25 15m | User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications Student Research Competition Krishna Murthy Kattiyan RamamoorthySan Diego State University | ||
11:40 15m | API Design Implications of Boilerplate Client Code Student Research Competition Daye NamCarnegie Mellon University | ||
11:55 15m | Compile-time detection of machine image sniping Student Research Competition Martin KelloggUniversity of Washington, Seattle |
12:20 - 13:40 | |||
12:20 80mLunch | Diversity and Inclusion LunchDiversity and Inclusion Social |
13:40 - 15:20 | Verification and Bug DetectionDemonstrations / Research Papers at Cortez 1 Chair(s): Raghavan KomondoorIndian Institute of Science, Bangalore | ||
13:40 20mTalk | Mutation Analysis for Coq Research Papers Ahmet CelikThe University of Texas at Austin, Karl PalmskogUniversity of Texas at Austin, Marinela ParovicThe University of Texas at Austin, Emilio Jesús Gallego AriasMINES ParisTech, Milos GligoricThe University of Texas at Austin | ||
14:00 20mTalk | Verifying Arithmetic in Cryptographic C Programs Research Papers Jiaxiang LiuShenzhen University, Xiaomu ShiShenzhen University, Ming-Hsien TsaiAcademia Sinica, Taiwan, Bow-Yaw WangAcademia Sinica, Bo-Yin YangAcademia Sinica Pre-print | ||
14:20 20mTalk | Model checking embedded control software using OS-in-the-loop CEGAR Research Papers Pre-print | ||
14:40 20mTalk | Get rid of inline assembly through verification-oriented lifting Research Papers Frédéric RecoulesCEA LIST, Sébastien BardinCEA LIST, Richard BonichonCEA LIST, Laurent MounierUniversité Grenoble Alpes, Marie-Laure PotetUniversité Grenoble Alpes DOI Pre-print | ||
15:00 10mDemonstration | VeriAbs : Verification by Abstraction and Test Generation Demonstrations Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre | ||
15:10 10mDemonstration | SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection Demonstrations Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University |
13:40 - 15:20 | Configurations and VariabilityJournal First Presentations / Research Papers at Hillcrest Chair(s): Shin Hwei TanSouthern University of Science and Technology | ||
13:40 20mTalk | ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks Research Papers Liang BaoSchool of Computer Science and Technology, XiDian University, Xin LiuDepartment of Computer Science, University of California, Davis, Fangzheng WangSchool of Computer Science and Technology, XiDian University, Baoyin FangSchool of Computer Science and Technology, XiDian University | ||
14:00 20mTalk | Automated N-way Program Merging for Facilitating Family-Based Analyses of Variant-Rich Software Journal First Presentations Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Johannes BürdekTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt Link to publication DOI | ||
14:20 20mTalk | V2: Fast Detection of Configuration Drift in Python Research Papers Pre-print | ||
14:40 20mTalk | Feature-Interaction Aware Configuration Prioritization for Configurable Code Research Papers Son NguyenThe University of Texas at Dallas, Hoan Anh NguyenAmazon, Ngoc TranUniversity of Texas at Dallas, Hieu TranThe University of Texas at Dallas, Tien N. NguyenUniversity of Texas at Dallas | ||
15:00 20mTalk | Search-based test case implantation for testing untested configurations Journal First Presentations Dipesh PradhanSimula Research Laboratory, Norway, Shuai WangHong Kong University of Science and Technology, Tao YueNanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Shaukat AliSimula Research Lab, Marius LiaaenCisco Systems Link to publication |
13:40 - 15:20 | Student Research Competition - Selected Presentations (Undergraduate)Student Research Competition at South Park Chair(s): Jie M. ZhangUniversity College London, UK, Jin L.C. GuoMcGill University | ||
13:40 15m | Crowdsourced Report Generation via Bug Screenshot Understanding Student Research Competition Shengcheng YuNanjing University, China File Attached | ||
13:55 15m | Towards Comprehensible Representation of Controllers using Machine Learning Student Research Competition Gargi BalasubramaniamBirla Institute of Technology and Science, Pilani, K K Birla Goa Campus File Attached | ||
14:10 15m | Empirical Study of Python Call Graph Student Research Competition Li YuNanjing University | ||
14:25 15m | A Machine Learning based Approach to Identify SQL Injection Vulnerabilities Student Research Competition Kevin ZhangWayne State University | ||
14:40 15m | Boosting Neural Commit Message Generation with Code Semantic Analysis Student Research Competition Shuyao JiangFudan University |
15:20 - 16:00 | |||
16:00 - 17:40 | PredictionResearch Papers / Journal First Presentations at Cortez 1 Chair(s): Xin XiaMonash University | ||
16:00 20mTalk | Predicting Licenses for Changed Source Code Research Papers Xiaoyu LiuDepartment of Computer Science and Engineering, Southern Methodist University, Liguo HuangDept. of Computer Science, Southern Methodist University, Dallas, TX, 75205, Jidong GeState Key Laboratory for Novel Software and Technology, Nanjing University, Vincent NgHuman Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688 | ||
16:20 20mTalk | Empirical evaluation of the impact of class overlap on software defect prediction Research Papers Lina GongChina University of Mining and Technology, Shujuan JiangChina University of Mining and Technology, Rongcun WangChina University of Mining and Technology, Li JiangChina University of Mining and Technology | ||
16:40 20mTalk | Combining Program Analysis and Statistical Language Model for Code Statement Completion Research Papers Son NguyenThe University of Texas at Dallas, Tien N. NguyenUniversity of Texas at Dallas, Yi LiNew Jersey Institute of Technology, USA, Shaohua WangNew Jersey Institute of Technology, USA | ||
17:00 20mTalk | Balancing the trade-off between accuracy and interpretability in software defect prediction Journal First Presentations Toshiki MoriCorporate Software Engineering & Technology Center, Toshiba Corporation, Naoshi UchihiraSchool of Knowledge Science, Japan Advanced Institute of Science and Technology (JAIST) Link to publication File Attached | ||
17:20 20mTalk | Fine-grained just-in-time defect prediction Journal First Presentations Luca PascarellaDelft University of Technology, Fabio PalombaDepartment of Informatics, University of Zurich, Alberto BacchelliUniversity of Zurich Link to publication |
16:00 - 17:40 | API and RenamingResearch Papers / Journal First Presentations at Cortez 2&3 Chair(s): Massimiliano Di PentaUniversity of Sannio | ||
16:00 20mTalk | CodeKernel: A Graph Kernel based Approach to the Selection of API Usage Examples Research Papers Xiaodong GuThe Hong Kong University of Science and Technology, Hongyu ZhangThe University of Newcastle, Sunghun KimHong Kong University of Science and Technology Pre-print | ||
16:20 20mTalk | Machine Learning Based Automated Method Name Recommendation: How Far Are We Research Papers Lin Jiangbeijing university of posts and telecommunication, Hui LiuBeijing Institute of Technology, He JiangSchool of Software, Dalian University of Technology Link to publication Pre-print | ||
16:40 20mTalk | MARBLE: Mining for Boilerplate Code to Identify API Usability Problems Research Papers Daye NamCarnegie Mellon University, Amber HorvathCarnegie Mellon University, Andrew MacveanGoogle, Inc., Brad A. MyersCarnegie Mellon University, Bogdan VasilescuCarnegie Mellon University Pre-print | ||
17:00 20mTalk | DIRE: A Neural Approach to Decompiled Identifier Renaming Research Papers Jeremy LacomisCarnegie Mellon University, Pengcheng YinCarnegie Mellon University, Edward J. SchwartzCarnegie Mellon University Software Engineering Institute, Miltiadis AllamanisMicrosoft Research, Cambridge, Claire Le GouesCarnegie Mellon University, Graham NeubigCarnegie Mellon University, Bogdan VasilescuCarnegie Mellon University Pre-print Media Attached | ||
17:20 20mTalk | Automatic Detection and Update Suggestion for Outdated API Names in Documentation Journal First Presentations Seonah LeeGyeongsang National University, Rongxin WuDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Sungwon KangKorea Advanced Institute of Science and Technology Link to publication |
18:00 - 00:00 | ASE BanquetSocial / Faculty Mentorship Lunch | ||
18:00 4h30mSocial Event | ASE Banquet Social | ||
21:00 3hSocial Event | Evening D&I Session – KaraokeDiversity and Inclusion Social |
Thu 14 Nov Times are displayed in time zone: Tijuana, Baja California change
Thu 14 Nov
Times are displayed in time zone: Tijuana, Baja California change
08:00 - 11:00 | |||
08:30 - 10:00 | |||
08:30 15mAwards | Student Research Competition Awards Ceremony Student Research Competition | ||
08:45 15m | ASE 2020 Announcement Research Papers | ||
09:00 60mTalk | Automated Debug & Profiling of AAA Games Research Papers Mathieu NayrollesUbisoft Montreal |
10:00 - 10:40 | |||
10:00 - 10:40 | |||
10:00 40mDemonstration | PraPR: Practical Program Repair via Bytecode Mutation Demonstrations | ||
10:00 40mDemonstration | Kotless: a Serverless Framework for Kotlin Demonstrations Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University | ||
10:00 40mDemonstration | PeASS: A Tool for Identifying Performance Changes at Code Level Demonstrations David Georg ReicheltUniversität Leipzig, Stefan KühneUniversität Leipzig, Wilhelm HasselbringKiel University Pre-print Media Attached File Attached | ||
10:00 40mDemonstration | MutAPK: Source-Codeless Mutant Generation for Android Apps Demonstrations Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia | ||
10:00 40mDemonstration | CocoQa: Question Answering for Coding Conventions over Knowledge Graphs Demonstrations Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University | ||
10:00 3mDemonstration | Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing Demonstrations Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University | ||
10:00 40mDemonstration | Developer Reputation Estimator (DRE) Demonstrations Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville | ||
10:00 40mDemonstration | NeuralVis: Visualizing and Interpreting Deep Learning Models Demonstrations Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University | ||
10:00 40mDemonstration | Visual Analytics for Concurrent Java Executions Demonstrations Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford | ||
10:00 40mDemonstration | Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs Demonstrations Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University | ||
10:00 40mDemonstration | SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods Demonstrations Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print Media Attached File Attached | ||
10:00 40mDemonstration | VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization Demonstrations Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University |
10:40 - 12:20 | ConcurrencyResearch Papers / Demonstrations at Cortez 1 Chair(s): Elena ShermanBoise State University | ||
10:40 20mTalk | MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes Research Papers Zan WangCollege of Intelligence and Computing, Tianjin University, Yingquan ZhaoCollege of Intelligence and Computing, Tianjin University, Shuang LiuCollege of Intelligence and Computing, Tianjin University, Jun SunSingapore Management University, Singapore, Xiang ChenSchool of Information Science and Technology, Nantong University, Huarui LinCollege of Intelligence and Computing, Tianjin University | ||
11:00 20mTalk | Automating Non-Blocking Synchronization In Concurrent Data Abstractions Research Papers Jiange ZhangUniversity of Colorado Colorado Springs, Qing YiUniversity of Colorado Colorado Springs, Damian DechevUniversity of Central Florida Pre-print | ||
11:20 20mTalk | Automating CUDA Synchronization via Program Transformation Research Papers Mingyuan WuSouthern University of Science and Technology, Lingming ZhangThe University of Texas at Dallas, Cong LiuEindhoven University of Technology, Shin Hwei TanSouthern University of Science and Technology, Yuqun ZhangSouthern University of Science and Technology | ||
11:40 20mTalk | Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs Research Papers Ernest Bota PobeeCity University of Hong Kong, Xiupei MeiCity University of Hong Kong, Wing-Kwong ChanCity University of Hong Kong, Hong Kong | ||
12:00 10mDemonstration | VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq Demonstrations Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise | ||
12:10 10mDemonstration | ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities Demonstrations Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University |
10:40 - 12:20 | Deep ModelsResearch Papers / Demonstrations at Cortez 2&3 Chair(s): Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto | ||
10:40 20mTalk | Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award Research Papers Yan ZhengTianjin University, Xiaofei XieNanyang Technological University, Ting SuETH Zurich, Lei MaKyushu University, Jianye HaoTianjin University, Zhaopeng MengTianjin University, Yang LiuNanyang Technological University, Singapore, Ruimin ShenFuxi AI Lab in Netease, Yinfeng ChenFuxi AI Lab in Netease, Changjie FanFuxi AI Lab in Netease Link to publication Pre-print | ||
11:00 20mTalk | A Study of Oracle Approximations in Testing Deep Learning Libraries Research Papers | ||
11:20 20mTalk | Property Inference for Deep Neural Networks Research Papers Divya GopinathCarnegie Mellon University, Hayes ConverseThe University of Texas at Austin, Corina S. PasareanuCarnegie Mellon University Silicon Valley, NASA Ames Research Center, Ankur TalyGoogle | ||
11:40 20mTalk | An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms Research Papers Qianyu GuoTianjin University, Sen ChenNanyang Technological University, Singapore, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Qiang HuKyushu University, Japan, Hongtao LiuTianjin University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University, Li XiaohongTianJin University Pre-print | ||
12:00 10mDemonstration | DeepMutation++: a Mutation Testing Framework for Deep Learning Systems Demonstrations Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | ||
12:10 10mDemonstration | DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks Demonstrations Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University |
10:40 - 12:20 | Refactoring and Software ProductionResearch Papers / Industry Showcase / Demonstrations at Hillcrest Chair(s): Cyrille ArthoKTH Royal Institute of Technology, Sweden | ||
10:40 20mTalk | RefBot: Intelligent Software Refactoring Bot Research Papers Vahid AlizadehUniversity of Michigan, Mohamed Amine OualiUniversity of Michigan, Marouane KessentiniUniversity of Michigan, Meriem ChaterUniversity of Michigan | ||
11:00 20mTalk | Automated Refactoring to Reactive Programming Research Papers | ||
11:20 20mTalk | Trusted Software Supply Chain Industry Showcase Kapil SingiAccenture, R.P. Jagadeesh Chandra BoseAccenture Labs, Sanjay PodderAccenture, Adam P. BurdenAccenture | ||
11:40 20mTalk | A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery Industry Showcase Vibhu Saujanya SharmaAccenture Labs, Rohit MehraAccenture Labs, India, Sanjay PodderAccenture, Adam P. BurdenAccenture | ||
12:00 10mDemonstration | Prema: A Tool for Precise Requirements Editing, Modeling and Analysis Demonstrations Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd | ||
12:10 10mTalk | Empirical Study of Programming to an Interface Research Papers Benoît VerhaegheINRIA, Christopher FuhrmanÉcole de technologie supérieure, Nicolas AnquetilINRIA, Latifa GuerroujÉcole de Technologie Supérieure, Stéphane Ducasse INRIA Lille Pre-print Media Attached |
12:20 - 13:40 | |||
12:20 80mLunch | Faculty Mentorship Lunch Faculty Mentorship Lunch |
13:40 - 15:20 | Mining and Bug DetectionDemonstrations / Journal First Presentations at Cortez 2&3 Chair(s): Chanchal K. RoyUniversity of Saskatchewan | ||
13:40 20mTalk | Automatically 'Verifying' Complex Systems through Learning, Abstraction and Refinement Journal First Presentations Jingyi WangNational University of Singapore, Singapore, Jun SunSingapore Management University, Singapore, Shengchao QinUniversity of Teesside, Cyrille JegourelISTD, Singapore University of Technology and Design Link to publication | ||
14:00 20mTalk | Interactive semi-automated specification mining for debugging: An experience report Journal First Presentations Mohammad Jafar MashhadiUniversity of Calgary, Taha R. SiddiquiInfoMagnetics Technologies Corp, Hadi HemmatiUniversity of Calgary, Howard W. LoewenDepartment of Electrical & Computer Engineering, University of Calgary Link to publication | ||
14:20 20mTalk | Improving reusability of software libraries through usage pattern mining Journal First Presentations Mohamed Aymen SaiedConcordia University, Ali OuniETS Montreal, University of Quebec, Houari SahraouiUniversité de Montréal, Raula Gaikovina KulaNAIST, Katsuro InoueOsaka University, David LoSingapore Management University Link to publication | ||
14:40 20mTalk | Rule-based specification mining leveraging learning to rank Journal First Presentations Zherui CaoZhejiang University, Yuan TianQueens University, Kingston, Canada, Tien-Duy B. LeSchool of Information Systems, Singapore Management University, David LoSingapore Management University Link to publication | ||
15:00 10mDemonstration | TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis Demonstrations Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University | ||
15:10 10mDemonstration | Ares: Inferring Error Specifications through Static Analysis Demonstrations Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle |
13:40 - 15:20 | Models and LogsResearch Papers / Demonstrations at Hillcrest Chair(s): Timo KehrerHumboldt-Universtität zu Berlin | ||
13:40 20mTalk | Statistical Log Differencing Research Papers Lingfeng BaoInstitute of Information Engineering, Chinese Academy of Sciences, Nimrod BusanyTel Aviv University, David LoSingapore Management University, Shahar MaozTel Aviv University Pre-print | ||
14:00 20mTalk | Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression Research Papers Jinyang LiuSun Yat-Sen University, Jieming ZhuHuawei Noah's Ark Lab, Shilin HeChinese University of Hong Kong, Pinjia HeETH Zurich, Zibin ZhengSun Yat-Sen University, Michael LyuThe Chinese University of Hong Kong | ||
14:20 20mTalk | Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling Research Papers Artur BoronatUniversity of Leicester | ||
14:40 20mTalk | Size and Accuracy in Model Inference Research Papers Nimrod BusanyTel Aviv University, Shahar MaozTel Aviv University, Yehonatan YulazariTel Aviv University Pre-print | ||
15:00 10mDemonstration | PMExec: An Execution Engine of Partial UML-RT Models Demonstrations Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario Pre-print | ||
15:10 10mDemonstration | mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines Demonstrations Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario |
15:20 - 16:00 | |||
16:00 - 17:40 | Emerging DomainsDemonstrations / Journal First Presentations / Research Papers at Cortez 1 Chair(s): Joshua GarciaUniversity of California, Irvine | ||
16:00 20mTalk | Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility Research Papers Jeffrey PalmerinoRochester Institute of Technology, Qi YuRochester Institute of Technology, Travis Desell University of North Dakota, Daniel KrutzRochester Institute of Technology Pre-print | ||
16:20 20mTalk | Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences Research Papers Yuqi ChenSingapore University of Technology and Design, Singapore, Chris PoskittSingapore University of Technology and Design, Jun SunSingapore Management University, Singapore, Sridhar AdepuSingapore University of Technology and Design, Singapore, Fan ZhangZhejiang University, Zhejiang Lab, and Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China DOI Pre-print File Attached | ||
16:40 20mTalk | Uncertainty-wise Test Case Generation and Minimization for Cyber-Physical Systems Journal First Presentations Man ZhangKristiania University, Shaukat AliSimula Research Lab, Tao YueNanjing University of Aeronautics and Astronautics & Simula Research Laboratory Link to publication | ||
17:00 20mTalk | Finding Trends in Software Research Journal First Presentations George MathewDepartment of Computer Science, North Carolina State University, Amritanshu AgrawalWayfair, Tim MenziesNorth Carolina State University Link to publication | ||
17:20 10mDemonstration | XRaSE: Towards Virtually Tangible Software using Augmented Reality Demonstrations Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture | ||
17:30 10mDemonstration | MuSC: A Tool for Mutation Testing of Ethereum Smart Contract Demonstrations Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University |
16:00 - 17:40 | Untangling and MergingResearch Papers at Cortez 2&3 Chair(s): Iftekhar AhmedUniversity of California at Irvine, USA | ||
16:00 20mTalk | The Impact of Structure on Software Merging: Semistructured versus Structured Merge Research Papers Guilherme CavalcantiFederal University of Pernambuco, Brazil, Paulo BorbaFederal University of Pernambuco, Brazil, Georg SeibtUniversity of Passau, Sven ApelSaarland University Pre-print | ||
16:20 20mTalk | Semistructured Merge in JavaScript Systems Research Papers Alberto Trindade TavaresFederal University of Pernambuco, Paulo BorbaFederal University of Pernambuco, Brazil, Guilherme CavalcantiFederal University of Pernambuco, Brazil, Sergio SoaresFederal University of Pernambuco Pre-print | ||
16:40 20mTalk | CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation Research Papers Kawser NafiUniversity of Saskatchewan, Tonny Shekha KarUniversity of Saskatchewan, Canada, Banani RoyUniversity of Saskatchewan, Chanchal K. RoyUniversity of Saskatchewan, Kevin SchneiderUniversity of Saskatchewan | ||
17:00 20mTalk | B2SFinder: Detecting Open-Source Software Reuse in COTS Software Research Papers Muyue FengInstitute of Information Engineering, Chinese Academy of Sciences, Zimu YuanInstitute of Information Engineering, Chinese Academy of Sciences, Feng LiInstitute of Computing Technology at Chinese Academy of Sciences, China, Gu BanInstitute of Information Engineering, Chinese Academy of Sciences, Yang XiaoInstitute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Shiyang WangInstitute of Information Engineering, Chinese Academy of Sciences, Qian TangInstitute of Information Engineering, Chinese Academy of Sciences, He SuInstitute of Information Engineering, Chinese Academy of Sciences, Chendong YuUniversity of Chinese Academy of Sciences, Jiahuan XuInstitute of Information Engineering, Chinese Academy of Sciences, Aihua PiaoInstitute of Information Engineering, Chinese Academy of Sciences, Jingling XueUNSW Sydney, Wei HuoInstitute of Information Engineering, Chinese Academy of Sciences | ||
17:20 20mTalk | CoRA: Decomposing and Describing Tangled Code Changes for Reviewer Research Papers Min WangPeking University, Zeqi LinMicrosoft Research, China, Yanzhen ZouPeking University, Bing XiePeking University |
16:00 - 17:40 | Software DevelopmentResearch Papers / Journal First Presentations / Industry Showcase / Demonstrations at Hillcrest Chair(s): Hitesh SajnaniMicrosoft | ||
16:00 20mTalk | What is Wrong with Topic Modeling? (and How to Fix it Using Search-based Software Engineering) Journal First Presentations Amritanshu AgrawalWayfair, Wei FuDepartment of Computer Science, North Carolina State University, Tim MenziesNorth Carolina State University Link to publication | ||
16:20 20mTalk | Cautious Adaptation of Defiant Components Research Papers Paulo MaiaState University of Ceará, Lucas VieiraState University of Ceará, Matheus ChagasState University of Ceará, Yijun YuThe Open University, UK, Andrea ZismanThe Open University, Bashar NuseibehThe Open University (UK) & Lero (Ireland) | ||
16:40 20mTalk | Better Development of Safety Critical Systems:Chinese High Speed Railway System Development Experience Report Industry Showcase Zhiwei WuEast China Normal University, Jing LiuEast China Normal University, Xiang ChenCASCO Signal Ltd. | ||
17:00 20mTalk | Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation Research Papers Qiong FengDrexel University, Yuanfang Cai Drexel University, Rick KazmanUniversity of Hawai‘i at Mānoa, Di CuiXi'an Jiaotong University, Ting LiuXi'an Jiaotong University, Hongzhou FangDrexel University | ||
17:20 10mTalk | Automated Trainability Evaluation for Smart Software Functions Research Papers Ilias GerostathopoulosTechnical University of Munich, Stefan KugeleTechnical University of Munich, Christoph SeglerBMW Group Research, New Technologies, Innovations, Tomas BuresCharles University, Czech Republic, Alois KnollTechnical University of Munich Pre-print | ||
17:30 10mDemonstration | Lancer: Your Code Tell Me What You Need Demonstrations Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University |
Fri 15 Nov Times are displayed in time zone: Tijuana, Baja California change
Fri 15 Nov
Times are displayed in time zone: Tijuana, Baja California change
08:00 - 10:00 | |||
09:00 - 10:30 | |||
09:00 30mTalk | BugSwarm: an Infrastructure and Dataset for Software Engineering Research NJR Cindy Rubio-GonzálezUniversity of California, Davis | ||
09:30 30mTalk | ARCADE - A Workbench for Mining Architectural Information and Identifying Technical Debt NJR Nenad MedvidovićUniversity of Southern California | ||
10:00 30mTalk | Moving Fast with High Reliability using Pluggable Types NJR Manu SridharanUniversity of California Riverside |
09:00 - 10:30 | |||
09:00 15mDay opening | Welcome EXPLAIN | ||
09:15 75mTalk | Causality and Fairness in Software EXPLAIN Yuriy BrunUniversity of Massachusetts Amherst |
09:00 - 10:30 | |||
09:00 90mTalk | SEConfig Keynote: Noise in CI/CD data SEConfig Shane McIntoshMcGill University |
09:00 - 17:30 | |||
09:00 - 10:30 | |||
09:00 45mTalk | AI Systems and Practices for Intelligent Software Evolution SEI | ||
09:45 45mTalk | Galaxies: Application Dependency System and Knowledge Graph. SEI |
10:30 - 11:00 | |||
11:00 - 12:30 | |||
11:00 30mTalk | 50K-C: A Dataset of Compilable and Compiled, Java Projects NJR | ||
11:30 30mTalk | Why We're Going in SAIN: Producing a Community-Wide Software Architecture INfrastructure NJR Joshua GarciaUniversity of California, Irvine | ||
12:00 30mTalk | NJR: Executable, Scriptable, and Searchable Java Programs NJR Jens PalsbergUniversity of California, Los Angeles |
11:00 - 12:30 | Explainability and CodeEXPLAIN at Cortez 1B Chair(s): Ilias GerostathopoulosTechnical University of Munich | ||
11:00 30mTalk | Explaining Static Analysis - A Perspective EXPLAIN Marcus Nachtigall, Lisa Nguyen Quang DoGoogle, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM | ||
11:30 30mTalk | A Hybrid Editor for Fast Robot Mission Prototyping EXPLAIN | ||
12:00 30mTalk | Explaining Business Process Software with Fulib-Scenarios EXPLAIN Albert ZündorfKassel University, Sebastian CopeiKassel University, Ira DiethelmCarl von Ossietzky Universität Oldenburg / University of Oldenburg, Claude DraudeKassel University, Adrian KunzKassel University, Ulrich NorbisrathUniversity of Applied Sciences Upper Austria |
11:00 - 12:30 | |||
11:00 20mTalk | Identifying Network Configuration Errors from SIP Traffic by Learning State Machines SEConfig | ||
11:20 70mTalk | Synthesizing Mutable Configurations: Setting up Systems for Success SEConfig Tim NelsonBrown University, Natasha DanasBrown University, Theophilos GiannakopoulosSystems & Technology Research, Shriram KrishnamurthiBrown University, United States |
12:30 - 14:00 | |||
14:00 - 15:30 | NJR Discussion; Needs, Requirements, WishesNJR at Cortez 1A Chair(s): Jens PalsbergUniversity of California, Los Angeles, Crista Lopes | ||
14:00 - 15:30 | |||
14:00 30mTalk | Framework for Trustworthy Software Development EXPLAIN Jagadeesh Chandra Bose R PAccenture, Kapil SingiAccenture, Vikrant KaulgudAccenture Labs, India, Kanchanjot Kaur PhokelaAccenture, Sanjay PodderAccenture | ||
14:30 30mTalk | Don’t Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning Models EXPLAIN | ||
15:00 30mOther | Working Group Formation EXPLAIN |
14:00 - 15:30 | |||
14:00 45mTalk | Encoding Adaptability of Software Engineering Tools as Algorithm Configuration Problem: A Case Study SEConfig | ||
14:45 45mTalk | Toward Evaluation of Deployment Architecture of ML-based Cyber-Physical Systems SEConfig |
15:30 - 16:00 | |||
16:00 - 17:30 | |||
16:00 60mOther | Working Groups EXPLAIN | ||
17:00 20mTalk | Report from Working Groups EXPLAIN | ||
17:20 10mDay closing | Closing EXPLAIN |
16:00 - 17:30 | |||
16:00 45mOther | HackerNews Roulette SEConfig | ||
16:45 45mOther | Breakout Poster Boarding SEConfig |
16:00 - 17:30 | |||
16:00 30mTalk | Can AI Close the Design-Code Abstraction Gap? SEI | ||
16:30 30mTalk | On the Engineering of AI-Powered Systems SEI | ||
17:00 30mTalk | Software Quality and Context for Rich Source Code Representations. SEI |
Sun 10 Nov Times are displayed in time zone: Tijuana, Baja California change
Sun 10 Nov
Times are displayed in time zone: Tijuana, Baja California change
Mon 11 Nov Times are displayed in time zone: Tijuana, Baja California change
Mon 11 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 8:00 | 30 | 9:00 | 30 | 10:00 | 30 | 11:00 | 30 | 12:00 | 30 | 13:00 | 30 | 14:00 | 30 | 15:00 | 30 | 16:00 | 30 | 17:00 | 30 | 18:00 | 30 | 19:00 | 30 | 20:00 | 30 | 21:00 | 30 | 22:00 | 30 | 23:00 | 30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cortez 1B | 09:00 - 10:30 11:00 - 12:30 14:00 - 15:30 16:00 - 17:30 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hillcrest 2 | 09:00 - 10:30 11:00 - 12:30 14:00 - 15:30 16:00 - 17:30 |
Tue 12 Nov Times are displayed in time zone: Tijuana, Baja California change
Tue 12 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 7:00 | 30 | 8:00 | 30 | 9:00 | 30 | 10:00 | 30 | 11:00 | 30 | 12:00 | 30 | 13:00 | 30 | 14:00 | 30 | 15:00 | 30 | 16:00 | 30 | 17:00 | 30 | 18:00 | 30 | 19:00 | 30 | 20:00 | 30 | 21:00 | 30 | 22:00 | 30 | 23:00 | 30 |
---|
Wed 13 Nov Times are displayed in time zone: Tijuana, Baja California change
Wed 13 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 7:00 | 30 | 8:00 | 30 | 9:00 | 30 | 10:00 | 30 | 11:00 | 30 | 12:00 | 30 | 13:00 | 30 | 14:00 | 30 | 15:00 | 30 | 16:00 | 30 | 17:00 | 30 | 18:00 | 30 | 19:00 | 30 | 20:00 | 30 | 21:00 | 30 | 22:00 | 30 | 23:00 | 30 |
---|
Thu 14 Nov Times are displayed in time zone: Tijuana, Baja California change
Thu 14 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 8:00 | 30 | 9:00 | 30 | 10:00 | 30 | 11:00 | 30 | 12:00 | 30 | 13:00 | 30 | 14:00 | 30 | 15:00 | 30 | 16:00 | 30 | 17:00 | 30 |
---|
Fri 15 Nov Times are displayed in time zone: Tijuana, Baja California change
Fri 15 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 8:00 | 30 | 9:00 | 30 | 10:00 | 30 | 11:00 | 30 | 12:00 | 30 | 13:00 | 30 | 14:00 | 30 | 15:00 | 30 | 16:00 | 30 | 17:00 | 30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cortez 1B | 09:00 - 10:30 11:00 - 12:30 14:00 - 15:30 16:00 - 17:30 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cortez 3 | 09:00 - 10:30 11:00 - 12:30 14:00 - 15:30 16:00 - 17:30 |
Mon 11 Nov Times are displayed in time zone: Tijuana, Baja California change
Mon 11 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 8:00 | 15 | 30 | 45 | 9:00 | 15 | 30 | 45 | 10:00 | 15 | 30 | 45 | 11:00 | 15 | 30 | 45 | 12:00 | 15 | 30 | 45 | 13:00 | 15 | 30 | 45 | 14:00 | 15 | 30 | 45 | 15:00 | 15 | 30 | 45 | 16:00 | 15 | 30 | 45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cortez 1B | A-Mobile Welcome and Opening 09:00 - 09:30 | A-Mobile Grammar-based UI Testing 09:30 - 10:30 | A-Mobile Enforcing Green Code With Android Lint 11:00 - 11:30 | A-Mobile Panel Discussion 16:00 - 16:30 | A-Mobile Summary and Closing 16:30 - 17:00 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cortez 2 | Celebration of ASE Machine Learning Testing 11:00 - 11:20 | Celebration of ASE Reviewer Experience Panel 11:40 - 12:30 | Celebration of ASE Open Research Discussion 15:20 - 15:30 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hillcrest 2 | SEAD Introduction 09:00 - 09:15 | SEAD Towards Automated Security Design Flaw Detection 11:20 - 11:40 | SEAD Securing Smart Contracts in Blockchain 11:40 - 12:00 |
Tue 12 Nov Times are displayed in time zone: Tijuana, Baja California change
Tue 12 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 8:00 | 15 | 30 | 45 | 9:00 | 15 | 30 | 45 | 10:00 | 15 | 30 | 45 | 11:00 | 15 | 30 | 45 | 12:00 | 15 | 30 | 45 | 13:00 | 15 | 30 | 45 | 14:00 | 15 | 30 | 45 | 15:00 | 15 | 30 | 45 | 16:00 | 15 | 30 | 45 | 17:00 | 15 | 30 | 45 | 18:00 | 15 | 30 | 45 | 19:00 | 15 | 30 | 45 | 20:00 | 15 | 30 | 45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Kensington Ballroom | 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 10:00 - 10:40 | 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 15:20 - 16:00 |
Wed 13 Nov Times are displayed in time zone: Tijuana, Baja California change
Wed 13 Nov
Times are displayed in time zone: Tijuana, Baja California change
Room | 7:00 | 15 | 30 | 45 | 8:00 | 15 | 30 | 45 | 9:00 | 15 | 30 | 45 | 10:00 | 15 | 30 | 45 | 11:00 | 15 | 30 | 45 | 12:00 | 15 | 30 | 45 | 13:00 | 15 | 30 | 45 | 14:00 | 15 | 30 | 45 | 15:00 | 15 | 30 | 45 | 16:00 | 15 | 30 | 45 | 17:00 | 15 | 30 | 45 | 18:00 | 15 | 30 | 45 | 19:00 | 15 | 30 | 45 | 20:00 | 15 | 30 | 45 | 21:00 | 15 | 30 | 45 | 22:00 | 15 | 30 | 45 | 23:00 | 15 | 30 | 45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cortez 1 | ASE Research Papers Mutation Analysis for Coq 13:40 - 14:00 |