Wed 17 JulDisplayed time zone: Brasilia, Distrito Federal, Brazil change
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Social Events |
10:30 - 11:00 | |||
10:30 30mPoster | MicroSensor: Towards an Extensible Tool for the Static Analysis of Microservices Systems in Continuous Integration Posters Edson Soares Instituto Atlantico & State University of Ceara (UECE), Matheus Paixao State University of Ceará, Allysson Allex Araújo Federal University of Cariri | ||
10:30 30mPoster | SORBET: A Framework to Evaluate the Robustness of LiDAR 3D Object Detection and Its Impacts on Autonomous Driving Posters | ||
10:30 30mPoster | An Analysis of the Costs and Benefits of Autocomplete in IDEs Posters Shaokang Jiang University of California, San Diego, Michael Coblenz University of California, San Diego | ||
10:30 30mPoster | Go the Extra Mile: Fixing Propagated Error-Handling Bugs Posters Haoran Liu National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Huiping Zhou National University of Defense Technology, Haifang Zhou National University of Defense Technology, Shanshan Li National University of Defense Technology | ||
10:30 30mPoster | Hybrid Regression Test Selection by Synergizing File and Method Call Dependences Posters Luyao Liu College of Computer, National University of Defense Technology, Guofeng Zhang College of Computer, National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China | ||
10:30 30mPoster | Do Large Language Models Generate Similar Codes from Mutated Prompts?: A Case Study of Gemini Pro Posters DOI Pre-print Media Attached File Attached | ||
10:30 30mPoster | Towards Realistic SATD Identification Through Machine Learning Models: Ongoing Research and Preliminary Results Posters Eliakim Gama State University of Ceará, Matheus Paixao State University of Ceará, Mariela I. Cortés State University of Ceará, Lucas Monteiro State University of Ceará DOI Pre-print | ||
10:30 30mPoster | Building Software Engineering Capacity through a University Open Source Program Office Posters | ||
10:30 30mPoster | Inferring Natural Preconditions via Program Transformation Posters | ||
10:30 30mPoster | RFNIT: Robotic Framework for Non-Invasive Testing Posters Davi Simoes Freitas Centro de Informática at Universidade Federal de Pernambuco, Breno Miranda Centro de Informática at Universidade Federal de Pernambuco, Juliano Iyoda Centro de Informática at Universidade Federal de Pernambuco |
11:00 - 12:30 | Software Maintenance and Comprehension 1Research Papers / Ideas, Visions and Reflections / Demonstrations at Acerola Chair(s): Wesley Assunção North Carolina State University | ||
11:00 18mTalk | Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning Research Papers Xiaoling Zhang Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Zhengzi Xu Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, Zhiqiang Shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, DOI Pre-print | ||
11:18 18mTalk | Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language Model Research Papers Jiawei Li University of California, Irvine, David Faragó Innoopract GmbH & QPR Technologies, Christian Petrov Innoopract GmbH, Iftekhar Ahmed University of California, Irvine | ||
11:36 18mTalk | Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations Research Papers Jun Lyu Nanjing University, Shanshan Li Software Institute, Nanjing University, He Zhang Nanjing University, Lanxin Yang Nanjing University, Bohan Liu Nanjing University, Manuel Rigger National University of Singapore | ||
11:54 18mTalk | Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example Research Papers Malinda Dilhara University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research Pre-print | ||
12:12 9mTalk | Variability-Aware Differencing with DiffDetectiveBest Demo Paper Demonstrations Paul Maximilian Bittner Paderborn University, Alexander Schultheiß Paderborn University, Benjamin Moosherr University of Ulm, Timo Kehrer University of Bern, Thomas Thüm Paderborn University Pre-print Media Attached | ||
12:21 9mTalk | From Models to Practice: Enhancing OSS Project Sustainability with Evidence-Based Advice Ideas, Visions and Reflections Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis, Vladimir Filkov University of California at Davis, USA Link to publication DOI |
11:00 - 12:30 | Human Aspects 1Research Papers / Industry Papers at Mandacaru Chair(s): Christoph Treude Singapore Management University | ||
11:00 18mTalk | "The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal Practitioners Research Papers Nathan Wintersgill William & Mary, Trevor Stalnaker William & Mary, Laura A. Heymann William & Mary, Oscar Chaparro William & Mary, Denys Poshyvanyk William & Mary | ||
11:18 18mTalk | AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation Research Papers Vijayaraghavan Murali Meta Platforms Inc., Chandra Sekhar Maddila Meta Platforms, Inc., Imad Ahmad Meta Platforms, Inc., Michael Bolin Meta Platforms, Inc., Daniel Cheng Meta Platforms Inc., Negar Ghorbani Meta Platforms Inc., Renuka Fernandez Meta Platforms, Inc., Nachiappan Nagappan Meta Platforms, Inc., Peter C Rigby Meta / Concordia University | ||
11:36 18mTalk | An Analysis of the Costs and Benefits of Autocomplete in IDEs Research Papers Shaokang Jiang University of California, San Diego, Michael Coblenz University of California, San Diego Pre-print | ||
11:54 18mTalk | Shadows in the Interface: A Comprehensive Study on Dark Patterns Research Papers Liming Nie Nanyang Technological University, Yangyang Zhao Zhejiang Sci-Tech University, Chenglin Li Zhejiang Sci-Tech University, Xuqiong Luo Changsha University of Science and Technology, Yang Liu Nanyang Technological University | ||
12:12 9mTalk | Paths to Testing: Why Women Enter and Remain in Software Testing? Industry Papers Kleice Silva CESAR School, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Ronnie de Souza Santos University of Calgary |
11:00 - 12:30 | Formal VerificationDemonstrations / Journal First / Research Papers / Industry Papers at Pitanga Chair(s): Yunja Choi Kyungpook National University | ||
11:00 18mTalk | A Transferability Study of Interpolation-Based Hardware Model Checking to Software Verification Research Papers DOI Media Attached | ||
11:18 9mTalk | CoqPyt: Proof Navigation in Python in the Era of LLMs Demonstrations Pedro Carrott Imperial College London, Nuno Saavedra INESC-ID and IST, University of Lisbon, Kyle Thompson University of California, San Diego, Sorin Lerner University of California at San Diego, João F. Ferreira INESC-ID and IST, University of Lisbon, Emily First University of California, San Diego DOI Pre-print | ||
11:27 9mTalk | How We Built Cedar: A Verification-Guided Approach Industry Papers Craig Disselkoen Amazon Web Services, Aaron Eline Amazon, Shaobo He Amazon Web Services, Kyle Headley Unaffiliated, MIchael Hicks Amazon, Kesha Hietala Amazon Web Services, John Kastner Amazon Web Services, Anwar Mamat University of Maryland, Matt McCutchen , Neha Rungta Amazon Web Services, Bhakti Shah University of St. Andrews, Emina Torlak Amazon Web Services, USA, Andrew Wells Amazon Web Services | ||
11:36 18mTalk | Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties Journal First Claudio Menghi University of Bergamo; McMaster University, Christos Tsigkanos University of Bern, Switzerland, Mehrnoosh Askarpour McMaster University, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Gricel Vázquez University of York, UK, Radu Calinescu University of York, UK, Sergio García Volvo Cars Corporation, Sweden | ||
11:54 18mTalk | Rigorous Assessment of Model Inference Accuracy using Language Cardinality Journal First Donato Clun Imperial College London, Donghwan Shin University of Sheffield, Antonio Filieri AWS and Imperial College London, Domenico Bianculli University of Luxembourg | ||
12:12 18mTalk | Simulation-based Testing of Simulink Models with Test Sequence and Test Assessment Blocks Journal First Federico Formica McMaster University, Tony Fan McMaster University, Akshay Rajhans Mathworks, Vera Pantelic McMaster University, Mark Lawford McMaster University, Claudio Menghi University of Bergamo; McMaster University |
11:00 - 12:30 | Code Search and CompletionIndustry Papers / Research Papers at Pitomba Chair(s): Akond Rahman Auburn University | ||
11:00 18mTalk | Leveraging Large Language Models for the Auto-remediation of Microservice Applications - An Experimental Study Industry Papers Komal Sarda York University, Zakeya Namrud York University, Marin Litoiu York University, Canada, Larisa Shwartz IBM T.J. Watson Research, Ian Watts IBM Canada | ||
11:18 18mTalk | CodePlan: Repository-level Coding using LLMs and Planning Research Papers Ramakrishna Bairi Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Aditya Kanade Microsoft Research, India, Vageesh D C Microsoft Research, India, Arun Iyer Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua, B. Ashok Microsoft Research. India, Shashank Shet Microsoft Research. India | ||
11:36 18mTalk | An Empirical Study of Code Search in Intelligent Coding Assistant: Perceptions, Expectations, and Directions Industry Papers Chao Liu Chongqing University, Xindong Zhang Alibaba Cloud Computing Co. Ltd., Hongyu Zhang Chongqing University, Zhiyuan Wan Zhejiang University, Zhan Huang Chongqing University, Meng Yan Chongqing University | ||
11:54 18mTalk | DeciX: Explain Deep Learning Based Code Generation Applications Research Papers Simin Chen University of Texas at Dallas, Zexin Li University of California, Riverside, Wei Yang University of Texas at Dallas, Cong Liu University of California, Riverside | ||
12:12 18mTalk | IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion Research Papers Bolun Li Shandong Normal University, Zhihong Sun Shandong Normal University, Tao Huang Shandong Normal University, Hongyu Zhang Chongqing University, Yao Wan Huazhong University of Science and Technology, Chen Lyu Shandong Normal University, Ge Li Peking University, Zhi Jin Peking University |
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Social Events |
12:30 - 14:00 | FSE Steering Committee MeetingSocial Events at Sapoti Chair(s): Abhik Roychoudhury National University of Singapore | ||
12:30 90mMeeting | FSE Steering Committee Social Events |
14:00 - 15:30 | Processes, Requirements, and ArchitectureIndustry Papers / Journal First / Research Papers / Demonstrations at Acerola Chair(s): Annibale Panichella Delft University of Technology | ||
14:00 18mTalk | On the Usefulness of Automatically Generated Microservice Architectures Journal First Luiz Carvalho Pontifical Catholic University of Rio de Janeiro, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Marcos Kalinowski Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Maria Julia de Lima Tecgraf Institute, Pontifical Catholic University of Rio de Janeiro, Brazil, Carlos Lucena Pontifical Catholic University of Rio de Janeiro, Brazil | ||
14:18 18mTalk | An LGPD Compliance Inspection Checklist to Assess IoT Solutions Industry Papers Ivonildo Pereira Gomes Neto Federal University of Pernambuco, João Mendes Federal University of Maranhão, Waldemar Pires Ferreira Neto Rural Federal University of Pernambuco, Luis Jorge Enrique Rivero Cabrejos Federal University of Maranhão, Brazil, Davi Viana Federal University of Maranhão, Sérgio Soares Universidade Federal de Pernambuco | ||
14:36 18mTalk | Automated Smell Detection and Recommendation in Natural Language Requirements Journal First Alvaro Veizaga University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland | ||
14:54 9mTalk | Supporting Early Architectural Decision-Making Through Tradeoff Analysis: A Study with Volvo Cars Industry Papers Karl Öqvist Chalmers | University of Gothenburg, Jacob Messinger Chalmers | University of Gothenburg, Rebekka Wohlrab Chalmers University of Technology | ||
15:03 9mTalk | MicroKarta: Visualising Microservice Architectures Demonstrations Oscar Manglaras University of Adelaide, Alex Farkas University of Adelaide, Peter Fule Swordfish Computing, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia | ||
15:12 18mTalk | Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring Ecosystem Research Papers Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), João Lucas Correia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Paulo Vítor C. F. Libório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio) DOI Pre-print |
14:00 - 15:30 | Empirical Studies 1Industry Papers / Research Papers / Journal First at Mandacaru Chair(s): Ronnie de Souza Santos University of Calgary | ||
14:00 18mTalk | An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation Research Papers Yibo He Peking University, Jiaming Huang Peking University, Hao Yu Peking University, Tao Xie Peking University | ||
14:18 18mTalk | Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications Research Papers Shuqing Li The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Jianping Zhang The Chinese University of Hong Kong, Yujia Zhang Harbin Institute of Technology, Yepang Liu Southern University of Science and Technology, Jiazhen Gu The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong DOI Pre-print | ||
14:36 18mTalk | Decision Making for Managing Automotive Platforms: An Interview Survey on the Sate-of-Practice Industry Papers Philipp Zellmer Volkswagen AG & Harz University of Applied Sciences, Jacob Krüger Eindhoven University of Technology, Thomas Leich Harz University of Applied Sciences, Germany | ||
14:54 18mTalk | Evaluation framework for autonomous systems: the case of Programmable Electronic Medical Systems Journal First Andrea Bombarda University of Bergamo, Silvia Bonfanti University of Bergamo, Martina De Sanctis Gran Sasso Science Institute, Angelo Gargantini University of Bergamo, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Elvinia Riccobene Computer Science Dept., University of Milan, Patrizia Scandurra University of Bergamo, Italy | ||
15:12 18mTalk | Insights into Transitioning towards Electrics/Electronics Platform Management in the Automotive Industry Industry Papers Lennart Holsten Volkswagen AG & Harz University of Applied Sciences, Jacob Krüger Eindhoven University of Technology, Thomas Leich Harz University of Applied Sciences, Germany |
14:00 - 15:30 | |||
14:00 18mTalk | Test Input Prioritization for 3D Point Clouds Journal First Yinghua LI University of Luxembourg, Xueqi Dang University of Luxembourg, Lei Ma The University of Tokyo & University of Alberta, Jacques Klein University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
14:18 18mTalk | Evaluating and Improving ChatGPT for Unit Test Generation Research Papers Zhiqiang Yuan Fudan University, Mingwei Liu Fudan University, Shiji Ding Fudan University, Kaixin Wang Fudan University, Yixuan Chen Yale University, Xin Peng Fudan University, Yiling Lou Fudan University | ||
14:36 18mTalk | Bounding Random Test Set Size with Computational Learning Theory Research Papers Neil Walkinshaw University of Sheffield, Michael Foster The University of Sheffield, José Miguel Rojas The University of Sheffield, Robert Hierons The University of Sheffield Pre-print | ||
14:54 18mTalk | COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings Research Papers Weipeng Jiang Xi'an Jiaotong University, Juan Zhai University of Massachusetts, Amherst, Shiqing Ma University of Massachusetts, Amherst, Xiaoyu Zhang Xi'an Jiaotong University, Chao Shen Xi'an Jiaotong University | ||
15:12 18mTalk | FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution Research Papers |
14:00 - 15:30 | AI4SE 1Research Papers at Pitomba Chair(s): Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology | ||
14:00 18mTalk | Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning Research Papers Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao Zhejiang University, Yu Liu Zhejiang University, JianLing Sun Zhejiang University | ||
14:18 18mTalk | CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking Research Papers Zian Su Purdue University, Xiangzhe Xu Purdue University, Ziyang Huang Purdue University, Zhuo Zhang Purdue University, Yapeng Ye Purdue University, Jianjun Huang Renmin University of China, Xiangyu Zhang Purdue University | ||
14:36 18mTalk | Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs Research Papers Yanfu Yan William & Mary, Nathan Cooper William & Mary, Kevin Moran University of Central Florida, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Denys Poshyvanyk William & Mary, Steve Rich Cisco Systems | ||
14:54 18mTalk | Exploring and Unleashing the Power of Large Language Models in Automated Code Translation Research Papers Zhen Yang Shandong University, Fang Liu Beihang University, Zhongxing Yu Shandong University, Jacky Keung City University of Hong Kong, Jia Li Peking University, Shuo Liu City University of Hong Kong, Hong Yifan City University of Hong Kong, Xiaoxue Ma City University of Hong Kong, Zhi Jin Peking University, Ge Li Peking University Pre-print | ||
15:12 18mTalk | Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection Research Papers Yuxi Li Huazhong University of Science and Technology, Yi Liu Nanyang Technological University, Gelei Deng Nanyang Technological University, Ying Zhang Virginia Tech, Wenjia Song Virginia Tech, Ling Shi Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Yuekang Li The University of New South Wales, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology |
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Social Events |
16:00 - 18:00 | Program Repair and SynthesisDemonstrations / Research Papers / Ideas, Visions and Reflections at Mandacaru Chair(s): Fernanda Madeiral Vrije Universiteit Amsterdam | ||
16:00 18mTalk | A Deep Dive into Large Language Models for Automated Bug Localization and Repair Research Papers Soneya Binta Hossain University of Virginia, Nan Jiang Purdue University, Qiang Zhou Amazon Web Services, Xiaopeng LI Amazon Web Services, Wen-Hao Chiang Amazon Web Services, Yingjun Lyu Amazon Web Services, Hoan Nguyen Amazon Web Services, Omer Tripp Amazon Web Services DOI | ||
16:18 18mTalk | CORE: Resolving Code Quality Issues Using LLMs Research Papers Nalin Wadhwa Microsoft Research, India, Jui Pradhan Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Surya Prakash Sahu Microsoft Research, India, Nagarajan Natarajan Microsoft Research India, Aditya Kanade Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua | ||
16:36 18mTalk | Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs Research Papers Qi Xin Wuhan University, Haojun Wu Wuhan University, Jinran Tang Wuhan University, Xinyu Liu Wuhan University, Steven P. Reiss Brown University, Jifeng Xuan Wuhan University | ||
16:54 18mTalk | ProveNFix: Temporal Property guided Program Repair Research Papers Yahui Song National University of Singapore, Xiang Gao Beihang University, Wenhua Li National University of Singapore, Wei-Ngan Chin National University of Singapore, Abhik Roychoudhury National University of Singapore DOI Pre-print | ||
17:12 18mTalk | Towards AI-Assisted Synthesis of Verified Dafny Methods Research Papers Md Rakib Hossain Misu University of California Irvine, Crista Lopes University of California Irvine, Iris Ma University of California Irvine, James Noble Independent. Wellington, NZ DOI Pre-print | ||
17:30 9mTalk | Execution-free program repair Ideas, Visions and Reflections Bertrand Meyer Constructor Institute Schaffhausen, Li Huang Constructor Institute Schaffhausen, Ilgiz Mustafin Constructor Institute, Manuel Oriol Constructor Institute Schaffhausen | ||
17:39 9mTalk | ConDefects: A Complementary Dataset to Address the Data Leakage Concern for LLM-based Fault Localization and Program Repair Demonstrations Yonghao Wu Beijing University of Chemical Technology, Zheng Li Beijing University of Chemical Technology, Jie M. Zhang King's College London, Yong Liu Beijing University of Chemical Technology | ||
17:48 9mTalk | ASAC: A Benchmark for Algorithm Synthesis Demonstrations Zhao Zhang Peking University, Yican Sun Peking University, Ruyi Ji Peking University, Siyuan Li Peking University, Xuanyu Peng University of California, San Diego, Zhechong Huang Peking University, Sizhe Li Peking University, Tianran Zhu Peking University, Yingfei Xiong Peking University Pre-print Media Attached |
16:00 - 18:00 | Testing 2Demonstrations / Ideas, Visions and Reflections / Research Papers / Industry Papers at Pitanga Chair(s): Wing Lam George Mason University | ||
16:00 18mTalk | Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers Research Papers Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Qi Pang Carnegie Mellon University, Shuai Wang The Hong Kong University of Science and Technology, Yichen LI Hong Kong University of Science and Technology | ||
16:18 18mTalk | Mobile Bug Report Reproduction via Global Search on the App UI Model Research Papers Zhaoxu Zhang University of Southern California, Fazle Mohammed Tawsif University of Southern California, Komei Ryu University of Southern California, Tingting Yu University of Connecticut, William G.J. Halfond University of Southern California | ||
16:36 18mTalk | FinHunter: Improved Search-based Test Generation for Structural Testing of FinTech Systems Industry Papers Xuanwen Ding East China Normal University, Qingshun Wang East China Normal University, Dan Liu East China Normal University, Lihua Xu New York University Shanghai, Jun Xiao Ant Group Co. Ltd., Bojun Zhang Ant Group Co. Ltd., Xue Li Ant Group Co. Ltd., Liang Dou East China Normal University, Liang He East China Normal University, Tao Xie Peking University | ||
16:54 9mTalk | Tests4Py: A Benchmark for System Testing Demonstrations Marius Smytzek CISPA Helmholtz Center for Information Security, Martin Eberlein Humboldt University of Berlin, Batuhan Serce CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security Pre-print Media Attached | ||
17:03 9mTalk | On Polyglot Program Testing Ideas, Visions and Reflections Philémon Houdaille DIVERSE Team, IRISA-INRIA, CNRS, Université Rennes 1, Djamel Eddine Khelladi CNRS, IRISA, University of Rennes, Benoit Combemale University of Rennes, Inria, CNRS, IRISA, Gunter Mussbacher McGill University DOI Pre-print | ||
17:12 9mTalk | Ctest4J: A Practical Configuration Testing Framework for Java Demonstrations Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Qingyu Li University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign Pre-print | ||
17:21 9mTalk | Predicting Test Results without Execution Ideas, Visions and Reflections Andre Hora UFMG Pre-print Media Attached | ||
17:30 9mTalk | Py-holmes: Causal Testing for Deep Neural Networks in Python Demonstrations Wren McQueary George Mason University, sadia afrin mim George Mason University, Md Nishat Raihan George Mason University, Justin Smith Lafayette College, Brittany Johnson George Mason University Pre-print | ||
17:39 9mTalk | AndroLog: Android Instrumentation and Code Coverage Analysis Demonstrations Jordan Samhi CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security DOI Pre-print | ||
17:48 9mTalk | PathSpotter: Exploring Tested Paths to Discover Missing Tests Demonstrations Andre Hora UFMG Pre-print Media Attached |
16:00 - 18:00 | AI4SE 2Industry Papers / Research Papers at Pitomba Chair(s): Jingyue Li Norwegian University of Science and Technology (NTNU) | ||
16:00 18mTalk | MonitorAssistant: Simplifying Cloud Service Monitoring via Large Language Models Industry Papers Zhaoyang Yu Tsinghua University, Minghua Ma Microsoft Research, Chaoyun Zhang Microsoft, Si Qin Microsoft Research, Yu Kang Microsoft Research, Chetan Bansal Microsoft Research, Saravan Rajmohan Microsoft, Yingnong Dang Microsoft Azure, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research | ||
16:18 18mTalk | Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM Research Papers Gabriel Ryan Columbia University, Siddhartha Jain AWS AI Labs, Mingyue Shang AWS AI Labs, Shiqi Wang AWS AI Labs, Xiaofei Ma AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Baishakhi Ray Columbia University, New York; AWS AI Lab | ||
16:36 18mTalk | A Machine Learning-Based Error Mitigation Approach for Reliable Software Development on IBM’s Quantum Computers Industry Papers Asmar Muqeet Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Paolo Arcaini National Institute of Informatics
| ||
16:54 18mTalk | Multi-line AI-assisted Code Authoring Industry Papers Omer Dunay Meta Platforms, Inc., Daniel Cheng Meta Platforms Inc., Adam Tait Meta Platforms, Inc., Parth Thakkar Meta Platforms, Inc., Peter C Rigby Meta / Concordia University, Andy Chiu Meta Platforms, Inc., Imad Ahmad Meta Platforms, Inc., Arun Ganesan Meta Platforms, Inc., Chandra Sekhar Maddila Meta Platforms, Inc., Vijayaraghavan Murali Meta Platforms Inc., Ali Tayyebi Meta Platforms Inc., Nachiappan Nagappan Meta Platforms, Inc. | ||
17:12 18mTalk | Combating Missed Recalls in E-commerce Search: a CoT-prompting Testing Approach Industry Papers Shengnan Wu School of Computer Science, Fudan University, Yongxiang Hu Fudan University, Yingchuan Wang School of Computer Science, Fudan University, Jiazhen Gu The Chinese University of Hong Kong, Jin Meng Meituan Inc., Liujie Fan Meituan Inc., Zhongshi Luan Meituan Inc., Xin Wang Fudan University, Yangfan Zhou Fudan University Pre-print | ||
17:30 18mTalk | Automated Unit Test Improvement using Large Language Models at Meta Industry Papers Mark Harman Meta Platforms, Inc. and UCL, Jubin Chheda Meta platforms, Anastasia Finogenova Meta platforms, Inna Harper Meta, Alexandru Marginean Meta platforms, Shubho Sengupta Meta platforms, Eddy Wang Meta platforms, Nadia Alshahwan Meta Platforms, Beliz Gokkaya Meta Platforms |
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis 1Demonstrations / Research Papers / Industry Papers at Sapoti Chair(s): Muhammad Ali Gulzar Virginia Tech | ||
16:00 18mTalk | A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization Research Papers Sungmin Kang Korea Advanced Institute of Science and Technology, Gabin An Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology Pre-print | ||
16:18 18mTalk | BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection Research Papers Pre-print | ||
16:36 18mTalk | Fault Diagnosis for Test Alarms in Microservices Through Multi-source Data Industry Papers Shenglin Zhang Nankai University, Jun Zhu Nankai University, Bowen Hao Nankai University, Yongqian Sun Nankai University, Xiaohui Nie CNIC, CAS, Jingwen Zhu Nankai University, Xilin Liu Huawei Cloud, Xiaoqian Li Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Dan Pei Tsinghua University | ||
16:54 18mTalk | Costs and Benefits of Machine Learning Software Defect Prediction: Industrial Case Study Industry Papers Szymon Stradowski Wroclaw University of Science and Technology & NOKIA, Lech Madeyski Wroclaw University of Science and Technology | ||
17:12 18mTalk | Chain-of-Event: Interpretable Root Cause Analysis for Microservices through Automatically Learning Weighted Event Causal Graph Industry Papers Zhenhe Yao Tsinghua University, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Wenxiao Chen Tsinghua University, Hanzhang Wang Walmart Global Tech, Liangfei Su eBay, USA, Huai Jiang eBay, USA, Zhe Xie Tsinghua University, Xiaohui Nie CNIC, CAS, Dan Pei Tsinghua University | ||
17:30 18mTalk | ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems Research Papers Guangba Yu Sun Yat-sen University, Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Qiuyu Yan Tencent, Yu Luo Tencent, Fangyuan Li Tencent, Zibin Zheng Sun Yat-sen University DOI Pre-print | ||
17:48 9mTalk | MineCPP: Mining Bug Fix Pairs and Their Structures Demonstrations DOI Pre-print Media Attached |
18:15 - 19:30 | SIGSOFT Townhall SessionSocial Events at Plenary Hall Chair(s): Thomas Zimmermann Microsoft Research | ||
18:15 75mMeeting | SIGSOFT Townhall Session Social Events |
Thu 18 JulDisplayed time zone: Brasilia, Distrito Federal, Brazil change
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Social Events |
10:30 - 11:00 | |||
10:30 30mPoster | DyPyBench: A Benchmark of Executable Python Software Posters Islem BOUZENIA University of Stuttgart, Bajaj Piyush Krishan University of Stuttgart, Michael Pradel University of Stuttgart | ||
10:30 30mPoster | Shadows in the Interface: A Comprehensive Study on Dark Patterns Posters Liming Nie Nanyang Technological University, Yangyang Zhao Zhejiang Sci-Tech University, Chenglin Li Zhejiang Sci-Tech University, Xuqiong Luo Changsha University of Science and Technology, Yang Liu Nanyang Technological University | ||
10:30 30mPoster | Do Large Language Models Recognize Python Identifier Swaps in their Generated Code? Posters DOI Pre-print Media Attached File Attached | ||
10:30 30mPoster | Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring Ecosystem Posters Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), João Lucas Correia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Paulo Vítor C. F. Libório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio) | ||
10:30 30mPoster | ProveNFix: Temporal Property guided Program Repair Posters Yahui Song National University of Singapore, Xiang Gao Beihang University, Wenhua Li National University of Singapore, Wei-Ngan Chin National University of Singapore, Abhik Roychoudhury National University of Singapore | ||
10:30 30mPoster | PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software Posters | ||
10:30 30mPoster | A Transferability Study of Interpolation-Based Hardware Model Checking to Software Verification Posters DOI Media Attached | ||
10:30 30mPoster | Evaluating and Improving ChatGPT for Unit Test Generation Posters Zhiqiang Yuan Fudan University, Mingwei Liu Fudan University, Shiji Ding Fudan University, Kaixin Wang Fudan University, Yixuan Chen Yale University, Xin Peng Fudan University, Yiling Lou Fudan University | ||
10:30 30mPoster | Testing AI Systems Leveraging Graph Perturbation Posters Zhaorui Yang University of California, Riverside, Haichao Zhu Tencent America, Qian Zhang University of California, Riverside | ||
10:30 30mPoster | Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence Learning Posters Aashish Yadavally University of Texas at Dallas, Yi Li University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas | ||
10:30 30mPoster | Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example Posters Malinda Dilhara University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research | ||
10:30 30mPoster | A Deep Dive into Large Language Models for Bug Fixing Posters Soneya Binta Hossain University of Virginia, Nan Jiang Purdue University, Qiang Zhou Amazon Web Services, Xiaopeng LI Amazon Web Services, Wen-Hao Chiang Amazon Web Services, Yingjun Lyu Amazon Web Services, Hoan Nguyen Amazon Web Services, Omer Tripp Amazon Web Services | ||
10:30 30mPoster | A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization Posters Sungmin Kang Korea Advanced Institute of Science and Technology, Gabin An Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology | ||
10:30 30mPoster | IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion Posters Bolun Li Shandong Normal University, Zhihong Sun Shandong Normal University, Tao Huang Shandong Normal University, Hongyu Zhang Chongqing University, Yao Wan Huazhong University of Science and Technology, Chen Lyu Shandong Normal University, Ge Li Peking University, Zhi Jin Peking University |
11:00 - 12:30 | Empirical Studies 2Ideas, Visions and Reflections / Research Papers / Industry Papers / Journal First at Acerola Chair(s): Iftekhar Ahmed University of California, Irvine | ||
11:00 18mTalk | State Reconciliation Defects in Infrastructure as Code Research Papers Md Mahadi Hassan Auburn University, John Salvador Auburn University, Shubhra Kanti Karmaker Santu Auburn University, Akond Rahman Auburn University Pre-print | ||
11:18 18mTalk | Understanding and Detecting Annotation-induced Faults of Static Analyzers Research Papers Huaien Zhang The Hong Kong Polytechnic University, Southern University of Science and Technology, Yu Pei The Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Shin Hwei Tan Concordia University | ||
11:36 18mTalk | What Makes a Code Review Useful to OpenDev Developers? An Empirical Investigation Journal First | ||
11:54 9mTalk | The Patch Overfitting Problem in Automated Program Repair: Practical Magnitude and a Baseline for Realistic Benchmarking Ideas, Visions and Reflections Justyna Petke University College London, Matias Martinez Universitat Politècnica de Catalunya (UPC), Maria Kechagia University College London, Aldeida Aleti Monash University, Federica Sarro University College London | ||
12:03 9mTalk | Automating Issue Reporting in Software Testing: Lessons Learned from Using the Template Generator Tool Industry Papers Lennon Chaves SIDIA Institute of Science and Technology, Flávia Oliveira Sidia Institute of Science and Technology, Leonardo Tiago Sidia Institute of Science and Technology | ||
12:12 9mTalk | Reproducibility Debt: Challenges and Future Pathways Ideas, Visions and Reflections Zara Hassan Australian National University, Christoph Treude Singapore Management University, Michael Norrish Australian National University, Graham Williams Australian National University, Alex Potanin Australian National University Link to publication DOI | ||
12:21 9mTalk | A Vision on Open Science for the Evolution of Software Engineering Research and Practice Ideas, Visions and Reflections Edson OliveiraJr State University of Maringá, Fernanda Madeiral Vrije Universiteit Amsterdam, Alcemir Rodrigues Santos State University of Piauí, Christina von Flach Federal University of Bahia, Sérgio Soares Universidade Federal de Pernambuco Pre-print |
11:00 - 12:30 | Program Analysis and Performance 2Research Papers at Pitanga Chair(s): Rahul Purandare University of Nebraska-Lincoln | ||
11:00 18mTalk | Adapting Multi-objectivized Software Configuration Tuning Research Papers Pre-print | ||
11:18 18mTalk | Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions? Research Papers Madeline Endres University of Massachusetts Amherst, Sarah Fakhoury Microsoft Research, Saikat Chakraborty Microsoft Research, Shuvendu K. Lahiri Microsoft Research | ||
11:36 18mTalk | Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit Research Papers Pre-print | ||
11:54 18mTalk | Abstraction-Aware Inference of Metamorphic Relations Research Papers Agustin Nolasco University of Rio Cuarto, Facundo Molina IMDEA Software Institute, Renzo Degiovanni Luxembourg Institute of Science and Technology, Alessandra Gorla IMDEA Software Institute, Diego Garbervetsky Departamento de Computación, FCEyN, UBA, Mike Papadakis University of Luxembourg, Sebastian Uchitel Imperial College and University of Buenos Aires, Nazareno Aguirre University of Rio Cuarto and CONICET, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires | ||
12:12 18mTalk | Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning Research Papers Pre-print |
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Social Events |
12:30 - 14:00 | FSE'25 PC MeetingSocial Events at Sapoti Chair(s): Denys Poshyvanyk William & Mary, Dongmei Zhang Microsoft Research | ||
12:30 90mMeeting | FSE'25 PC Lunch Social Events |
12:30 - 14:00 | |||
12:30 90mLunch | LGBTQIA+ Lunch Social Events O: Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg, O: Ronnie de Souza Santos University of Calgary |
14:00 - 15:30 | SE4AI 1Journal First / Ideas, Visions and Reflections / Research Papers / Demonstrations at Mandacaru Chair(s): Qinghua Lu Data61, CSIRO | ||
14:00 18mTalk | Harnessing Neuron Stability to Improve DNN Verification Research Papers Hai Duong George Mason University, Dong Xu University of Virginia, ThanhVu Nguyen George Mason University, Matthew B Dwyer University of Virginia | ||
14:18 18mTalk | MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions Research Papers Ying Xiao King's College London / Southern University of Science and Technology, Jie M. Zhang King's College London, Yepang Liu Southern University of Science and Technology, Mohammad Reza Mousavi King's College London, Sicen Liu Southern University of Science and Technology, Dingyuan Xue Southern University of Science and Technology | ||
14:36 9mTalk | Using Run-time Information to Enhance Static Analysis of Machine Learning Code in Notebooks Ideas, Visions and Reflections Yiran Wang Linköping University, José Antonio Hernández López Linkoping University, Ulf Nilsson Linköping University, Daniel Varro Linköping University / McGill University Link to publication DOI | ||
14:45 9mTalk | Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Ideas, Visions and Reflections Quan Zhang Tsinghua University, Binqi Zeng Central South University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Heyuan Shi Central South University, Yu Jiang Tsinghua University | ||
14:54 18mTalk | DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks Journal First Zohreh Aghababaeyan University of Ottawa, Canada, Manel Abdellatif Software and Information Technology Engineering Department, École de Technologie Supérieure, Mahboubeh Dadkhah The School of EECS, University of Ottawa, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland | ||
15:12 9mTalk | Testing Learning-Enabled Cyber-Physical Systems with Large-Language Models: A Formal Approach Ideas, Visions and Reflections Xi Zheng Macquarie University, Aloysius K. Mok University of Texas at Austin, Ruzica Piskac Yale University, Yong Jae Lee University of Wisconsin Madison, Bhaskar Krishnamachari University of Southern California, Dakai Zhu The University of Texas at San Antonio, Oleg Sokolsky University of Pennsylvania, USA, Insup Lee University of Pennsylvania | ||
15:21 9mTalk | GAISSALabel: A tool for energy labeling of ML models Demonstrations Pau Duran Universitat Politècnica de Catalunya (UPC), Joel Castaño Fernández Universitat Politècnica de Catalunya (UPC), Cristina Gómez Universitat Politècnica de Catalunya, Silverio Martínez-Fernández UPC-BarcelonaTech Link to publication Pre-print |
14:00 - 15:30 | Security and Privacy 1Ideas, Visions and Reflections / Industry Papers / Research Papers at Pitanga Chair(s): Gias Uddin York University, Canada | ||
14:00 18mTalk | Investigating Documented Privacy Changes in Android OS Research Papers Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Fuman Xie University of Queensland, Guangdong Bai University of Queensland | ||
14:18 9mTalk | A Preliminary Study on the Privacy Concerns of Using IP Addresses in Log Data Ideas, Visions and Reflections Issam Sedki Concordia University | ||
14:27 9mTalk | Personal Data-Less Personalized Software Applications Ideas, Visions and Reflections Sana Belguith University of Bristol, Inah Omoronyia University of Bristol, Ruzanna Chitchyan University of Bristol | ||
14:36 18mTalk | Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials Research Papers Yizhan Huang The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong | ||
14:54 18mTalk | Unveil the Mystery of Critical Software Vulnerabilities Industry Papers Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Jiayuan Zhou Huawei, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Shanping Li Zhejiang University | ||
15:12 9mTalk | AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting Industry Papers Mert Toslali IBM Research, Edward Snible IBM Research, Jing Chen IBM Research, Alan Cha IBM Research, USA, Sandeep Singh IBM, Michael Kalantar IBM Research, Srinivasan Parthasarathy IBM Research |
14:00 - 15:30 | Software Maintenance and Comprehension 3Research Papers / Journal First at Pitomba Chair(s): Xin Xia Huawei Technologies | ||
14:00 18mTalk | Revealing Software Development Work Patterns with PR-Issue Graph Topologies Research Papers Cleidson de Souza Federal University of Pará, Brazil, Emilie Ma University of British Columbia, Jesse Wong University of British Columbia, Dongwook Yoon University of British Columbia, Ivan Beschastnikh University of British Columbia | ||
14:18 18mTalk | Using acceptance tests to predict merge conflict risk Journal First Thaís Rocha UFAPE - Universidade Federal do Agreste de Pernambuco, Paulo Borba Federal University of Pernambuco Pre-print | ||
14:36 18mTalk | Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions Research Papers Tao Xiao Nara Institute of Science and Technology, Hideaki Hata Shinshu University, Christoph Treude Singapore Management University, Kenichi Matsumoto Nara Institute of Science and Technology Pre-print Media Attached | ||
14:54 18mTalk | SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach Research Papers | ||
15:12 18mTalk | Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations Research Papers David Broneske DZHW Hannover, Germany, Sebastian Kittan Otto-von-Guericke Unviersity Magdeburg, Germany, Jacob Krüger Eindhoven University of Technology |
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Social Events |
15:30 - 16:00 | |||
15:30 30mPoster | Can GPT-4 Replicate Empirical Software Engineering Research? Posters Jenny T. Liang Carnegie Mellon University, Carmen Badea Microsoft Research, Christian Bird Microsoft Research, Robert DeLine Microsoft Research, Denae Ford Microsoft Research, Nicole Forsgren Microsoft Research, Thomas Zimmermann Microsoft Research | ||
15:30 30mPoster | Evaluating Directed Fuzzers: Are We Heading in the Right Direction? Posters Tae Eun Kim KAIST, Jaeseung Choi Sogang University, Seongjae Im KAIST, Kihong Heo KAIST, Sang Kil Cha KAIST Link to publication Media Attached File Attached | ||
15:30 30mPoster | Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection Posters Yuxi Li Huazhong University of Science and Technology, Yi Liu Nanyang Technological University, Gelei Deng Nanyang Technological University, Ying Zhang Virginia Tech, Wenjia Song Virginia Tech, Ling Shi Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Yuekang Li The University of New South Wales, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology | ||
15:30 30mPoster | Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion Posters Md Shamimur Rahman University of Saskatchewan, Canada, Zadia Codabux University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada | ||
15:30 30mPoster | CodePlan: Repository-level Coding using LLMs and Planning Posters Ramakrishna Bairi Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Aditya Kanade Microsoft Research, India, Vageesh D C Microsoft Research, India, Arun Iyer Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua, B. Ashok Microsoft Research. India, Shashank Shet Microsoft Research. India | ||
15:30 30mPoster | Understanding and Detecting Annotation-induced Faults of Static Analyzers Posters Huaien Zhang The Hong Kong Polytechnic University, Southern University of Science and Technology, Yu Pei The Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Shin Hwei Tan Concordia University | ||
15:30 30mPoster | Partial Solution Based Constraint Solving Cache in Symbolic Execution Posters Ziqi Shuai School of Computer, National University of Defense Technology, China, Zhenbang Chen College of Computer, National University of Defense Technology, Kelin Ma School of Computer, National University of Defense Technology, China, Kunlin Liu School of Computer, National University of Defense Technology, China, Yufeng Zhang Hunan University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Ji Wang School of Computer, National University of Defense Technology, China | ||
15:30 30mPoster | Characterizing Python Library Migrations Posters Mohayeminul Islam University of Alberta, Ajay Jha North Dakota State University, Ildar Akhmetov Northeastern University, Sarah Nadi New York University Abu Dhabi, University of Alberta File Attached | ||
15:30 30mPoster | DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing Posters | ||
15:30 30mPoster | BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection Posters | ||
15:30 30mPoster | Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications Posters Shuqing Li The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Jianping Zhang The Chinese University of Hong Kong, Yujia Zhang Harbin Institute of Technology, Yepang Liu Southern University of Science and Technology, Jiazhen Gu The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong | ||
15:30 30mPoster | CORE: Resolving Code Quality Issues Using LLMs Posters Nalin Wadhwa Microsoft Research, India, Jui Pradhan Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Surya Prakash Sahu Microsoft Research, India, Nagarajan Natarajan Microsoft Research India, Aditya Kanade Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua | ||
15:30 30mPoster | Abstraction-Aware Inference of Metamorphic Relations Posters Agustin Nolasco University of Rio Cuarto, Facundo Molina IMDEA Software Institute, Renzo Degiovanni Luxembourg Institute of Science and Technology, Alessandra Gorla IMDEA Software Institute, Diego Garbervetsky Departamento de Computación, FCEyN, UBA, Mike Papadakis University of Luxembourg, Sebastian Uchitel Imperial College and University of Buenos Aires, Nazareno Aguirre University of Rio Cuarto and CONICET, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires | ||
15:30 30mPoster | State Reconciliation Defects in Infrastructure as Code Posters Md Mahadi Hassan Auburn University, John Salvador Auburn University, Shubhra Kanti Karmaker Santu Auburn University, Akond Rahman Auburn University |
16:00 - 18:00 | Log Analysis and DebuggingResearch Papers / Industry Papers at Acerola Chair(s): Domenico Bianculli University of Luxembourg | ||
16:00 18mTalk | Go Static: Contextualized Logging Statement Generation Research Papers Yichen LI The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Renyi Zhong The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Jiazhen Gu The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong | ||
16:18 18mTalk | DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing Research Papers | ||
16:36 18mTalk | DTD: Comprehensive and Scalable Testing for Debuggers Research Papers Hongyi Lu Southern University of Science and Technology/Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Shuai Wang The Hong Kong University of Science and Technology, Fengwei Zhang Southern University of Science and Technology | ||
16:54 9mTalk | Decoding Anomalies! Unraveling Operational Challenges in Human-in-the-Loop Anomaly Validation Industry Papers Dong Jae Kim Concordia University, Steven Locke , Tse-Hsun (Peter) Chen Concordia University, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions, Steve Sporea , Laura Weinkam | ||
17:03 18mTalk | A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques Research Papers Max Landauer AIT Austrian Institute of Technology, Florian Skopik AIT Austrian Institute of Technology, Markus Wurzenberger AIT Austrian Institute of Technology | ||
17:21 18mResearch paper | LILAC: Log Parsing using LLMs with Adaptive Parsing Cache Research Papers Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yichen LI The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Jiazhen Gu The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong DOI Pre-print | ||
17:39 18mTalk | TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime State Research Papers Haiyu Huang Sun Yat-sen University, Xiaoyu Zhang HUAWEI CLOUD COMPUTING TECHNOLOGIES CO. LTD., Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Zhiming Chen Sun Yat-sen University, Guangba Yu Sun Yat-sen University, Hongyang Chen Sun Yat-sen University, Chen Sun Huawei Pre-print |
16:00 - 18:00 | SE4AI 2Research Papers / Industry Papers / Demonstrations / Journal First at Mandacaru Chair(s): Wei Yang University of Texas at Dallas | ||
16:00 18mTalk | Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models Research Papers Yan Wang Central University of Finance and Economics, Xiaoning Li Central University of Finance and Economics, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Chao Ni School of Software Technology, Zhejiang University, Ling Ding Central University of Finance and Economics Pre-print Media Attached File Attached | ||
16:18 18mTalk | On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software Research Papers | ||
16:36 9mTalk | Decide: Knowledge-based Version Incompatibility Detection in Deep Learning Stacks Demonstrations Zihan Zhou The University of Hong Kong, Zhongkai Zhao National University of Singapore, Bonan Kou Purdue University, Tianyi Zhang Purdue University DOI Pre-print Media Attached | ||
16:45 18mTalk | Test input prioritization for Machine Learning Classifiers Journal First Xueqi Dang University of Luxembourg, Yinghua LI University of Luxembourg, Mike Papadakis University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg | ||
17:03 18mTalk | How Far Are We with Automated Machine Learning? Characterization and Challenges of AutoML Toolkits Journal First | ||
17:21 18mTalk | Automated Root Causing of Cloud Incidents using In-Context Learning with GPT-4 Industry Papers Xuchao Zhang Microsoft, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Rujia Wang Microsoft, Minghua Ma Microsoft Research, Yu Kang Microsoft Research, Saravan Rajmohan Microsoft | ||
17:39 18mTalk | Exploring LLM-based Agents for Root Cause Analysis Industry Papers Devjeet Roy Washington State University, Xuchao Zhang Microsoft, Rashi Bhave Microsoft Research, Chetan Bansal Microsoft Research, Pedro Las-Casas Microsoft, Rodrigo Fonseca Microsoft Research, Saravan Rajmohan Microsoft |
16:00 - 18:00 | Testing 3Ideas, Visions and Reflections / Demonstrations / Research Papers / Journal First at Pitanga Chair(s): Qi Xin Wuhan University | ||
16:00 18mTalk | Search-based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions Journal First Federico Formica McMaster University, Tony Fan McMaster University, Claudio Menghi University of Bergamo; McMaster University | ||
16:18 9mTalk | Monitoring the Execution of 14K Tests: Methods Tend to Have One Path that Is Significantly More Executed Ideas, Visions and Reflections Andre Hora UFMG Pre-print Media Attached | ||
16:36 18mTalk | Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles Research Papers weigang he East China Normal University / University of Technology Sydney, Peng Di Ant Group, Mengli Ming East China Normal University, Chengyu Zhang ETH Zurich, Ting Su East China Normal University, Shijie Li Ant Group, Yulei Sui UNSW | ||
16:54 18mTalk | A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators Research Papers Jinyin Chen Zhejiang University of Technology, Chengyu Jia Zhejiang University of Technology, Yunjie Yan Zhejiang University of Technology, Jie Ge Zhejiang University of Technology, haibin zheng Zhejiang University of Technology, Yao Cheng TÜV SÜD Asia Pacific Pte. Ltd. | ||
17:12 9mTalk | ExLi : An Inline-Test Generation Tool for Java Demonstrations Yu Liu University of Texas at Austin, Aditya Thimmaiah The University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric The University of Texas at Austin | ||
17:21 9mTalk | ATheNA-S: a Testing Tool for Simulink Models Driven by Software Requirements and Domain Expertise Demonstrations Federico Formica McMaster University, Mohammad Mahdi Mahboob McMaster University, Mehrnoosh Askarpour McMaster University, Claudio Menghi University of Bergamo; McMaster University | ||
17:30 9mTalk | Test Polarity: Detecting Positive and Negative Tests Ideas, Visions and Reflections Andre Hora UFMG Pre-print Media Attached | ||
17:39 18mTalk | Java JIT Testing with Template Extraction Research Papers Zhiqiang Zang The University of Texas at Austin, Fu-Yao Yu The University of Texas at Austin, Aditya Thimmaiah The University of Texas at Austin, August Shi The University of Texas at Austin, Milos Gligoric The University of Texas at Austin DOI Pre-print |
16:00 - 18:00 | AI4SE 3Industry Papers / Demonstrations / Journal First at Pitomba Chair(s): Maliheh Izadi Delft University of Technology | ||
16:00 18mTalk | Rethinking Software Engineering in the Era of Foundation Models Industry Papers Ahmed E. Hassan Queen’s University, Dayi Lin Centre for Software Excellence, Huawei Canada, Gopi Krishnan Rajbahadur Centre for Software Excellence, Huawei, Canada, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Filipe Cogo Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Haoxiang Zhang Huawei, Kishanthan Thangarajah Centre for Software Excellence, Huawei Canada, Gustavo Oliva Centre for Software Excellence, Huawei Canada, Jiahuei (Justina) Lin Centre for Software Excellence, Huawei Canada, Wali Mohammad Abdullah Centre for Software Excellence, Huawei Canada, Zhen Ming (Jack) Jiang York University | ||
16:18 18mTalk | LM-PACE: Confidence Estimation by Large Language Models for Effective Root Causing of Cloud Incidents Industry Papers Shizhuo Zhang University of Illinois Urbana-Champaign, Xuchao Zhang Microsoft, Chetan Bansal Microsoft Research, Pedro Las-Casas Microsoft, Rodrigo Fonseca Microsoft Research, Saravan Rajmohan Microsoft | ||
16:36 18mTalk | Application of Quantum Extreme Learning Machines for QoS Prediction of Elevators' Software in an Industrial Context Industry Papers Xinyi Wang Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Aitor Arrieta Mondragon University, Paolo Arcaini National Institute of Informatics
, Maite Arratibel Orona | ||
16:54 18mTalk | X-lifecycle Learning for Cloud Incident Management using LLMs Industry Papers Drishti Goel Microsoft, Fiza Husain Microsoft, Aditya Kumar Singh Microsoft, Supriyo Ghosh Microsoft, Anjaly Parayil Microsoft, Chetan Bansal Microsoft Research, Xuchao Zhang Microsoft, Saravan Rajmohan Microsoft Media Attached | ||
17:12 18mTalk | Neat: Mobile App Layout Similarity Comparison based on Graph Convolutional Networks Industry Papers Zhu Tao ByteDance, Yongqiang Gao ByteDance, Jiayi Qi ByteDance, Chao Peng ByteDance, China, Qinyun Wu Bytedance Ltd., Xiang Chen ByteDance, Ping Yang Bytedance Network Technology | ||
17:30 18mTalk | Transformers and Meta-Tokenization in Sentiment Analysis for Software Engineering Journal First Nathan Cassee Eindhoven University of Technology, Andrei Agaronian Eindhoven University of Technology, Eleni Constantinou University of Cyprus, Nicole Novielli University of Bari, Alexander Serebrenik Eindhoven University of Technology | ||
17:48 9mTalk | EM-Assist: Safe automated ExtractMethod refactoring with LLMs Demonstrations Dorin Pomian University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Malinda Dilhara University of Colorado Boulder, Zarina Kurbatova JetBrains Research, Egor Bogomolov JetBrains Research, Andrey Sokolov JetBrains Research, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research Pre-print |
16:00 - 18:00 | FuzzingDemonstrations / Journal First / Ideas, Visions and Reflections / Research Papers / Industry Papers at Sapoti Chair(s): Maxime Lamothe Polytechnique Montreal, Montreal, Canada | ||
16:00 18mTalk | Dodrio: Parallelizing Taint Analysis Based Fuzzing via Redundancy-Free Scheduling Industry Papers Jie Liang , Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Zhiyong Wu Tsinghua University, China, Jianzhong Liu ShanghaiTech University, Yu Jiang Tsinghua University | ||
16:18 18mTalk | Evolutionary Generative Fuzzing for Differential Testing of the Kotlin Compiler Industry Papers Călin Georgescu Delft University of Technology, Mitchell Olsthoorn Delft University of Technology, Pouria Derakhshanfar JetBrains Research, Marat Akhin JetBrains Research, Annibale Panichella Delft University of Technology | ||
16:36 18mTalk | Evaluating Directed Fuzzers: Are We Heading in the Right Direction? Research Papers Tae Eun Kim KAIST, Jaeseung Choi Sogang University, Seongjae Im KAIST, Kihong Heo KAIST, Sang Kil Cha KAIST Pre-print Media Attached | ||
16:54 9mTalk | When Fuzzing Meets LLMs: Challenges and Opportunities Ideas, Visions and Reflections Yu Jiang Tsinghua University, Jie Liang , Fuchen Ma Tsinghua University, Yuanliang Chen Tsinghua University, Chijin Zhou Tsinghua University, Yuheng Shen Tsinghua University, Zhiyong Wu Tsinghua University, China, Jingzhou Fu Tsinghua University, Mingzhe Wang Tsinghua University, Shanshan Li National University of Defense Technology, Quan Zhang Tsinghua University Pre-print | ||
17:03 9mTalk | Look Ma, No Input Samples! Mining Input Grammars from Code with Symbolic Parsing Ideas, Visions and Reflections Leon Bettscheider CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security Link to publication DOI | ||
17:12 9mTalk | VinJ: An Automated Tool for Large-Scale Software Vulnerability Data Generation Demonstrations Yu Nong Washington State University, Haoran Yang Washington State University, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University DOI Pre-print Media Attached | ||
17:30 18mTalk | The Human Side of Fuzzing: Challenges Faced by Developers During Fuzzing Activities Journal First Olivier Nourry Kyushu University, Yutaro Kashiwa Nara Institute of Science and Technology, Bin Lin Radboud University, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Michele Lanza Software Institute - USI, Lugano, Yasutaka Kamei Kyushu University |
Fri 19 JulDisplayed time zone: Brasilia, Distrito Federal, Brazil change
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Social Events |
10:30 - 11:00 | |||
10:30 30mPoster | Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications Posters Dhanushka Jayasuriya University of Auckland, Valerio Terragni University of Auckland, Jens Dietrich Victoria University of Wellington, Kelly Blincoe University of Auckland | ||
10:30 30mPoster | Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials Posters Yizhan Huang The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong | ||
10:30 30mPoster | Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models Posters Yan Wang Central University of Finance and Economics, Xiaoning Li Central University of Finance and Economics, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Chao Ni School of Software Technology, Zhejiang University, Ling Ding Central University of Finance and Economics | ||
10:30 30mPoster | PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages Posters Kai Gao Peking University, Weiwei Xu Peking University, Wenhao Yang Peking University, Minghui Zhou Peking University | ||
10:30 30mPoster | "The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal Practitioners Posters Nathan Wintersgill William & Mary, Trevor Stalnaker William & Mary, Laura A. Heymann William & Mary, Oscar Chaparro William & Mary, Denys Poshyvanyk William & Mary | ||
10:30 30mPoster | RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction Posters Gengyi Sun University of Waterloo, Sarra Habchi Ubisoft Montréal, Shane McIntosh University of Waterloo | ||
10:30 30mPoster | MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions Posters Ying Xiao King's College London / Southern University of Science and Technology, Jie M. Zhang King's College London, Yepang Liu Southern University of Science and Technology, Mohammad Reza Mousavi King's College London, Sicen Liu Southern University of Science and Technology, Dingyuan Xue Southern University of Science and Technology | ||
10:30 30mPoster | Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers Posters Bonan Kou Purdue University, Shengmai Chen Purdue University, Zhijie Wang University of Alberta, Lei Ma The University of Tokyo & University of Alberta, Tianyi Zhang Purdue University | ||
10:30 30mPoster | Dependency-Induced Waste in Continuous Integration: An Empirical Study on NPM Dependencies Posters Nimmi Weeraddana University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo | ||
10:30 30mPoster | A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators Posters Jinyin Chen Zhejiang University of Technology, Chengyu Jia Zhejiang University of Technology, Yunjie Yan Zhejiang University of Technology, Jie Ge Zhejiang University of Technology, haibin zheng Zhejiang University of Technology, Yao Cheng TÜV SÜD Asia Pacific Pte. Ltd. | ||
10:30 30mPoster | Investigating Documented Privacy Changes in Android OS Posters Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Fuman Xie University of Queensland, Guangdong Bai University of Queensland | ||
10:30 30mPoster | Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit Posters | ||
10:30 30mPoster | Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions Posters Tao Xiao Nara Institute of Science and Technology, Hideaki Hata Shinshu University, Christoph Treude Singapore Management University, Kenichi Matsumoto Nara Institute of Science and Technology | ||
10:30 30mPoster | Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis Posters Georgios-Petros Drosos ETH Zurich, Thodoris Sotiropoulos ETH Zurich, Diomidis Spinellis Athens University of Economics and Business & Delft University of Technology, Dimitris Mitropoulos University of Athens |
11:00 - 12:30 | |||
11:00 18mTalk | Come for syntax, stay for speed, understand defects: An Empirical Study of Defects in Julia Programs Journal First Akond Rahman Auburn University, Dibyendu Brinto Bose Graduate Student, Raunak Shakya Mineral Worths, Rahul Pandita GitHub, Inc. Link to publication DOI Authorizer link Pre-print | ||
11:18 18mTalk | An Empirically Grounded Path Forward for Scenario-based Testing of Autonomous Driving Systems Industry Papers | ||
11:54 9mTalk | Automated End-to-End Dynamic Taint Analysis for WhatsApp Industry Papers Sopot Cela Meta, Andrea Ciancone Meta, Per Gustafsson Meta, Ákos Hajdu Meta, Yue Jia Meta, Timotej Kapus Meta, Maksym Koshtenko Meta, Will Lewis Meta, Ke Mao Meta, Dragos Martac Meta |
11:00 - 12:30 | Human Aspects 3Research Papers / Industry Papers at Mandacaru Chair(s): Eduardo Santana de Almeida Federal University of Bahia | ||
11:00 18mTalk | Exploring Hybrid Work Realities: A Case Study with Software Professionals From Underrepresented Groups Industry Papers Ronnie de Souza Santos University of Calgary, Cleyton Magalhaes Universidade Federal Rural de Pernambuco, Robson T. de Souza Santos UNINASSAU, Jorge Correia-Neto Universidade Federal Rural de Pernambuco | ||
11:18 18mTalk | Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks Research Papers Wei Wang Beijing University of Posts and Telecommunications, Huilong Ning Beijing University of Posts and Telecommunications, Gaowei Zhang Beijing University of Posts and Telecommunications, Libo Liu School of Computing and Information Systems, University of Melbourne, Yi Wang Beijing University of Posts and Telecommunications DOI Pre-print | ||
11:36 18mTalk | Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice Research Papers Ranim Khojah Chalmers | University of Gothenburg, Mazen Mohamad Chalmers | RISE - Research Institutes of Sweden, Philipp Leitner Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg Pre-print | ||
11:54 18mTalk | How to Gain Commit Rights in Modern Top Open Source Communities? Research Papers Xin Tan Beihang University, Yan Gong Beihang University, Geyu Huang Beihang University, Haohua Wu Beihang University, Li Zhang Beihang University DOI Pre-print | ||
12:12 18mTalk | How does Simulation-based Testing for Self-driving Cars match Human Perception? Research Papers Christian Birchler Zurich University of Applied Sciences & University of Bern, Tanzil Kombarabettu Mohammed University of Zurich, Pooja Rani University of Zurich, Teodora Nechita Zurich University of Applied Sciences, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences |
11:00 - 12:30 | Testing 4Research Papers / Industry Papers at Pitanga Chair(s): Antonia Bertolino National Research Council, Italy | ||
11:00 18mTalk | Partial Solution Based Constraint Solving Cache in Symbolic Execution Research Papers Ziqi Shuai School of Computer, National University of Defense Technology, China, Zhenbang Chen College of Computer, National University of Defense Technology, Kelin Ma School of Computer, National University of Defense Technology, China, Kunlin Liu School of Computer, National University of Defense Technology, China, Yufeng Zhang Hunan University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Ji Wang School of Computer, National University of Defense Technology, China Pre-print | ||
11:18 18mTalk | Natural Symbolic Execution-based Testing for Big Data Analytics Research Papers Yaoxuan Wu UCLA, Ahmad Humayun Virginia Tech, Muhammad Ali Gulzar Virginia Tech, Miryung Kim UCLA and Amazon Web Services Pre-print | ||
11:36 18mTalk | MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems Research Papers Xiaoyan Zhu Zhejiang Sci-Tech University, Mingyue Jiang Zhejiang Sci-Tech University, Xiao-Yi Zhang University of Science and Technology Beijing, Liming Nie Nanyang Technological University, Zuohua Ding Zhejiang Sci-Tech University | ||
11:54 18mTalk | Observation-based unit test generation at Meta Industry Papers Mark Harman Meta Platforms, Inc. and UCL, Rotem Tal Meta platforms, Alexandru Marginean Meta platforms, Eddy Wang Meta platforms, Nadia Alshahwan Meta Platforms | ||
12:12 18mTalk | Property-based Testing for Validating User Privacy-Related Functionalities in Social Media Apps Industry Papers Jingling Sun University of Electronic Science and Technology of China, Ting Su East China Normal University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Jianwen Li East China Normal University, China, Mengfei Wang ByteDance, Geguang Pu East China Normal University, China |
11:00 - 12:30 | |||
11:00 18mTalk | Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge Distillation Research Papers | ||
11:18 18mTalk | Learning to Detect and Localize Multilingual Bugs Research Papers Haoran Yang Washington State University, Yu Nong Washington State University, Tao Zhang Macau University of Science and Technology, Xiapu Luo The Hong Kong Polytechnic University, Haipeng Cai Washington State University DOI Pre-print | ||
11:36 18mTalk | Mining Action Rules for Defect Reduction Planning Research Papers Khouloud Oueslati Polytechnique Montréal, Canada, Gabriel Laberge Polytechnique Montréal, Canada, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal | ||
11:54 18mTalk | Predicting Failures of Autoscaling Distributed Applications Research Papers Giovanni Denaro University of Milano - Bicocca, Noura El Moussa USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Rahim Heydarov USI Università della Svizzera Italiana, Francesco Lomio SIT Schaffhausen Institute of Technology, Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Ketai Qiu USI Università della Svizzera Italiana DOI Pre-print | ||
12:12 18mTalk | RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction Research Papers Gengyi Sun University of Waterloo, Sarra Habchi Ubisoft Montréal, Shane McIntosh University of Waterloo |
12:30 - 14:00 | |||
12:30 90mLunch | Lunch Social Events |
12:30 - 14:00 | Diversity LunchDiversity and Inclusion at Hotel Restaurant Chair(s): Tayana Conte Universidade Federal do Amazonas, Rashina Hoda Monash University | ||
12:30 90mLunch | Diversity Lunch Diversity and Inclusion |
14:00 - 15:30 | |||
14:00 18mTalk | PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models Research Papers Simin Chen University of Texas at Dallas, XiaoNing Feng Taiyuan University of Technology, Xiaohong Han Taiyuan University of Technology, Cong Liu University of California, Riverside, Wei Yang University of Texas at Dallas | ||
14:18 18mTalk | Demystifying Invariant Effectiveness for Securing Smart Contracts Research Papers Zhiyang Chen University of Toronto, Ye Liu Nanyang Technological University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto Link to publication Pre-print Media Attached | ||
14:36 18mTalk | Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? Research Papers Kaixuan Li East China Normal University, Yue Xue Metatrust Labs, Sen Chen Tianjin University, Han Liu East China Normal University, Kairan Sun Nanyang Technological University, Ming Hu Singapore Management University, Haijun Wang Xi'an Jiaotong University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University Pre-print | ||
14:54 18mTalk | On the Contents and Utility of IoT Cybersecurity Guidelines Research Papers Jesse Chen University of Arizona, Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, Sazzadur Rahaman University of Arizona DOI Pre-print | ||
15:12 18mTalk | CVECenter: Industry Practice of Automated Vulnerability Management for Linux Distribution Community Industry Papers Jing Luo Central South University, Heyuan Shi Central South University, Yongchao Zhang Alibaba, Runzhe Wang Alibaba Group, Yuheng Shen Tsinghua University, Yuao Chen Alibaba, Rongkai Liu Central South University, Xiaohai Shi Alibaba Group, Chao Hu Central South University, Yu Jiang Tsinghua University |
14:00 - 15:30 | Program Analysis and Performance 3Research Papers at Mandacaru Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University | ||
14:00 18mTalk | Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings Research Papers Zirui Song The Chinese University of Hong Kong, Jiongyi Chen National University of Defense Technology, Kehuan Zhang The Chinese University of Hong Kong | ||
14:18 18mTalk | Active Monitoring Mechanism for Control-based Self-Adaptive Systems Research Papers Yi Qin State Key Laboratory for Novel Software Technology, Nanjing University, Yanxiang Tong State Key Laboratory for Novel Software Technology, Nanjing University, Yifei Xu State Key Laboratory for Novel Software Technology, Nanjing University, Chun Cao State Key Laboratory for Novel Software Technology, Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University | ||
14:36 18mTalk | Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs Research Papers Haoran Liu National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yan Lei Chongqing University, Yue Yu National University of Defense Technology, Yu Jiang Tsinghua university, Xiaoguang Mao National University of Defense Technology, Liao Xiangke National University of Defense Technology | ||
14:54 18mTalk | DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization Research Papers Chengpeng Wang The Hong Kong University of Science and Technology, Jipeng Zhang The Hong Kong University of Science and Technology, Rongxin Wu School of Informatics, Xiamen University, Charles Zhang The Hong Kong University of Science and Technology | ||
15:12 18mTalk | Decomposing Software Verification Using Distributed Summary Synthesis Research Papers DOI Media Attached File Attached |
14:00 - 15:30 | Fault Diagnosis and Root Cause Analysis 2Research Papers / Industry Papers at Pitanga Chair(s): Xi Zheng Macquarie University | ||
14:00 18mTalk | Illuminating the Gray Zone: Non-Intrusive Gray Failure Localization in Server Operating Systems Industry Papers Shenglin Zhang Nankai University, Yongxin Zhao Nankai University, Xiao Xiong Nankai University, Yongqian Sun Nankai University, Xiaohui Nie CNIC, CAS, Jiacheng Zhang Nankai University, Fenglai Wang Huawei Technologies Ltd., Xian Zheng Huawei Technologies Ltd., Yuzhi Zhang Nankai University, Dan Pei Tsinghua University DOI File Attached | ||
14:18 18mTalk | Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation Research Papers Md Nakhla Rafi Concordia University, Dong Jae Kim Concordia University, An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang Department of Computer Science, University of Manitoba, Canada | ||
14:36 18mTalk | Easy over Hard: A Simple Baseline for Test Failures Causes Prediction Industry Papers Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Zhipeng Xue , Xing Hu Zhejiang University, Weiyi Shang University of Waterloo, Xin Xia Huawei Technologies |
14:00 - 15:30 | Software Maintenance and Comprehension 4Research Papers / Demonstrations / Ideas, Visions and Reflections / Industry Papers at Pitomba Chair(s): Timo Kehrer University of Bern | ||
14:00 18mTalk | EyeTrans: Merging Human and Machine Attention for Neural Code Summarization Research Papers Yifan Zhang Vanderbilt University, Jiliang Li Vanderbilt University, Zachary Karas Vanderbilt University, Aakash Bansal University of Notre Dame, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University | ||
14:18 18mTalk | Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks Research Papers Tarek Alakmeh University of Zurich, David Reich University of Potsdam, Lena Jäger University of Zurich, Thomas Fritz University of Zurich DOI Pre-print | ||
14:36 18mTalk | R2I: A Relative Readability Metric for Decompiled Code Research Papers Haeun Eom Sungkyunkwan University, Dohee Kim Sungkyunkwan University, Sori Lim Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, Sungjae Hwang Sungkyunkwan University | ||
14:54 9mTalk | CognitIDE: An IDE Plugin for Mapping Physiological Measurements to Source Code Demonstrations Fabian Stolp Hasso Plattner Institute, University of Potsdam, Malte Stellmacher Hasso Plattner Institute, University of Potsdam, Bert Arnrich Hasso Plattner Institute, University of Potsdam Link to publication DOI Media Attached | ||
15:03 9mTalk | The lion, the ecologist and the plankton: a classification of species in multi-bot ecosystems Ideas, Visions and Reflections Dimitrios Platis Neat, Linda Erlenhov Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg Link to publication | ||
15:12 18mTalk | S.C.A.L.E: a CO2-aware Scheduler for OpenShift at ING Industry Papers |
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Social Events |
15:30 - 16:00 | |||
15:30 30mPoster | Predicting Failures of Autoscaling Distributed Applications Posters Giovanni Denaro University of Milano - Bicocca, Noura El Moussa USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Rahim Heydarov USI Università della Svizzera Italiana, Francesco Lomio SIT Schaffhausen Institute of Technology, Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Ketai Qiu USI Università della Svizzera Italiana | ||
15:30 30mPoster | On the Contents and Utility of IoT Cybersecurity Guidelines Posters Jesse Chen University of Arizona, Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, Sazzadur Rahaman University of Arizona | ||
15:30 30mPoster | Demystifying Invariant Effectiveness for Securing Smart Contracts Posters Zhiyang Chen University of Toronto, Ye Liu Nanyang Technological University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto | ||
15:30 30mPoster | Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge Distillation Posters | ||
15:30 30mPoster | Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? Posters Kaixuan Li East China Normal University, Yue Xue Metatrust Labs, Sen Chen Tianjin University, Han Liu East China Normal University, Kairan Sun Nanyang Technological University, Ming Hu Singapore Management University, Haijun Wang Xi'an Jiaotong University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University | ||
15:30 30mPoster | Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks Posters Tarek Alakmeh University of Zurich, David Reich University of Potsdam, Lena Jäger University of Zurich, Thomas Fritz University of Zurich | ||
15:30 30mPoster | Decomposing Software Verification Using Distributed Summary Synthesis Posters DOI Pre-print | ||
15:30 30mPoster | EyeTrans: Merging Human and Machine Attention for Neural Code Summarization Posters Yifan Zhang Vanderbilt University, Jiliang Li Vanderbilt University, Zachary Karas Vanderbilt University, Aakash Bansal University of Notre Dame, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University | ||
15:30 30mPoster | Mining Action Rules for Defect Reduction Planning Posters Khouloud Oueslati Polytechnique Montréal, Canada, Gabriel Laberge Polytechnique Montréal, Canada, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal | ||
15:30 30mPoster | How does Simulation-based Testing for Self-driving Cars match Human Perception? Posters Christian Birchler Zurich University of Applied Sciences & University of Bern, Tanzil Kombarabettu Mohammed University of Zurich, Pooja Rani University of Zurich, Teodora Nechita Zurich University of Applied Sciences, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences | ||
15:30 30mPoster | Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice Posters Ranim Khojah Chalmers | University of Gothenburg, Mazen Mohamad Chalmers | RISE - Research Institutes of Sweden, Philipp Leitner Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg |
Not scheduled yet
Not scheduled yet Talk | Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times Research Papers Necip Fazıl Yıldıran University of Central Florida, Jeho Oh The University of Texas at Austin, Julia Lawall Inria, Paul Gazzillo University of Central Florida | ||
Not scheduled yet Talk | Syntax Is All You Need: A Universal-Language Approach to Mutant Generation Research Papers Sourav Deb Northern Arizona University, Kush Jain Carnegie Mellon University, Rijnard van Tonder Mysten Labs, Inc., Claire Le Goues Carnegie Mellon University, Alex Groce Northern Arizona University | ||
Not scheduled yet Talk | JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization Research Papers Xiangping Chen Sun Yat-sen University, Furen Xu Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
Not scheduled yet Talk | ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification Research Papers Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Song Wang York University, Zhuohao Yu Institute of Software, Chinese Academy of Sciences, Binquan Zhang Beihang University, ChenXue Wang Institute of Software, Chinese Academy of Sciences, Shichao LIu Software IDE innovation Lab, Huawei Central Software Institute, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
Not scheduled yet Talk | CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models Research Papers Qilin Zhou City University of Hong Kong, Zhengyuan Wei City University of Hong Kong, Haipeng Wang City University of Hong Kong, Bo Jiang Beihang University, Wing-Kwong Chan City University of Hong Kong | ||
Not scheduled yet Talk | DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises Research Papers Daoguang Zan Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ailun Yu Peking University, Bo Shen Huawei Technologies Co., Ltd, Bei Chen Independent Researcher, Wei Li Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yongshun Gong Shandong University, Xiaolin Chen Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yafen Yao Huawei Technologies Co., Ltd, Weihua Luo Funcun-wuyou Technologies Co., Ltd, Bei Guan Institute of Software Chinese Academy of Sciences, Yan Liu Independent Researcher, Yongji Wang Institute of Software Chinese Academy of Sciences, Qianxiang Wang Huawei Technologies Co., Ltd, Lizhen Cui Shandong University | ||
Not scheduled yet Talk | Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems Research Papers Yuntianyi Chen University of California, Irvine, Yuqi Huai University of California, Irvine, Shilong Li University of California, Irvine, Changnam Hong University of California, Irvine, Joshua Garcia University of California, Irvine DOI | ||
Not scheduled yet Talk | Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules Research Papers Shengcheng Yu Nanjing University, Chunrong Fang Nanjing University, Quanjun Zhang Nanjing University, Mingzhe Du Nanjing University, Jia Liu Nanjing University, Zhenyu Chen Nanjing University | ||
Not scheduled yet Talk | SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis Research Papers Zeqin Liao Sun Yat-sen University, Henglong Liang Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Sicheng Hao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Juan Zhai University of Massachusetts, Amherst, Jiajing Wu Sun Yat-sen University | ||
Not scheduled yet Talk | TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers Research Papers | ||
Not scheduled yet Talk | BRF: Fuzzing the eBPF runtime Research Papers | ||
Not scheduled yet Talk | A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories Research Papers Farbod Farhour Concordia University, Ahmad Abdellatif University of Calgary, Essam Mansour Concordia University, Emad Shihab Concordia University | ||
Not scheduled yet Talk | LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking Research Papers Yongzheng Xie University of Adelaide, Hongyu Zhang Chongqing University, Muhammad Ali Babar School of Computer Science, The University of Adelaide | ||
Not scheduled yet Talk | Towards Efficient Verification of Constant-Time Cryptographic Implementations Research Papers Luwei Cai ShanghaiTech University, Fu Song State Key Laboratory of Computer Science and Institute of Software, Chinese Academy of Sciences., Taolue Chen Birkbeck, University of London | ||
Not scheduled yet Talk | Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation Research Papers Shasha Zhou University of Exeter, Mingyu Huang University of Electronic Science and Technology of China, Ke Li University of Exeter, Yanan Sun Sichuan University | ||
Not scheduled yet Talk | Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications Research Papers Keke Lian Fudan University, Lei Zhang Fudan University, Guangliang Yang Fudan University, Shuo Mao Fudan University, Xinjie Wang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University | ||
Not scheduled yet Talk | CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection Research Papers Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Haoxiang Jia Huazhong University of Science and Technology, Yuhao Zhou Fudan University, Yang Liu Nanyang Technological University | ||
Not scheduled yet Talk | Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts Research Papers Zexu Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology |
Accepted Papers
Call for Papers
We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research.
Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems are also welcome, as well as replication papers. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call.
NEW THIS YEAR #1: The inaugural Proceedings of the ACM on Software Engineering (PACMSE) Issue FSE 2024 seeks contributions through submissions in this track. Accepted papers will be invited for presentation at FSE 2024. Approval has been granted by ACM in late July. PACMSE will be the only proceedings where accepted research track papers will be published. Please check the FAQ for details.
NEW THIS YEAR #2: The steering committee has decided that the conference name will be changed to ACM International Conference on the Foundations of Software Engineering (FSE). In this transition year, we may still use the old and new names interchangeably on the conference webpage.
NEW THIS YEAR #3: Based on the coordination among FSE, ICSE, and ASE steering committees, the FSE conference and submission dates have been moved a few months early. The intention is for this schedule to remain stable in the years ahead and the conference and submission deadlines of the three large general software engineering conferences to be spread out throughout the year. This change however means that the submission deadline of FSE 2024 (late September 2023) will be before the days ESEC/FSE 2023 will be held (December 2023).
NEW THIS YEAR #4: Submissions must follow the "ACM Policy on Authorship" released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).
Tracks
This CFP refers to the Research Track of FSE. For the remaining tracks, please check the specific calls on the website:
- Industry: https://conf.researchr.org/track/fse-2024/fse-2024-industry
- Ideas, visions, and reflections: https://conf.researchr.org/track/fse-2024/fse-2024-ideas–visions-and-reflections
- Journal First: https://conf.researchr.org/track/fse-2024/fse-2024-journal-first
- Student Research Competition: https://conf.researchr.org/track/fse-2024/fse-2024-student-research-competition
- Demonstrations: https://conf.researchr.org/track/fse-2024/fse-2024-demonstrations
- Artifacts: https://conf.researchr.org/track/fse-2024/fse-2024-artifacts
HOW TO SUBMIT
At the time of submission, each paper should have no more than 18 pages for all text and figures, plus 4 pages for references, using the following templates: Latex or Word (Mac) or Word (Windows). Authors using LaTeX should use the sample-acmsmall-conf.tex
file (found in the samples folder of the acmart package) with the acmsmall
option. We also strongly encourage the use of the review, screen, and anonymous options as well. In sum, you want to use: \documentclass[acmsmall,screen,review,anonymous]{acmart}
. Papers may be submitted using numeric citations, but final versions of accepted papers must use the author-year format for citations. It is a single-column page layout. Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the FSE 2024 submission site:
Each submission will be reviewed by at least three members of the program committee. The review process is that the initial output can be accept, reject or major revision. When the initial output of the three reviews is major revision, authors will have an opportunity to address the reviewers’ requests during a 6 week major revision period. Such requests may include additional experiments or new analyses of existing results; major rewriting of algorithms and explanations; clarifications, better scoping, and improved motivations. The revised submission must be accompanied by a response letter, where the authors explain how they addressed each concern expressed by the reviewers. The same reviewers who requested major revisions will then assess whether the revised submission satisfies their requests adequately.
Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation (if relevant), quality of presentation, and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for publication.
In addition to declaring the topics which are relevant for their submissions, authors will be asked to declare the research methods employed in their submissions. This will enable us to ensure reviewer expertise both for research methods and topics. For full definitions of the research methods, see the SIGSOFT Empirical Standards.
Double-Anonymous Review Process
In order to ensure the fairness of the reviewing process, the FSE 2024 Research Papers Track will employ a double-anonymous review process, where external reviewers do not know the identity of authors, and authors do not know the identity of external reviewers. The papers submitted must not reveal the authors’ identities in any way:
- Authors should leave out author names and affiliations from the body of their submission.
- Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
- Authors should not include URLs to author-revealing sites (tools, datasets). Authors are still encouraged to follow open science principles and submit replication packages, see more details on the open science policy below.
- Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
- Authors should ensure that paper acknowledgements do not reveal the origin of their work.
- While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to FSE 2024.
- During review, authors should not publicly use the submission title.
The double-anonymous process used this year is “heavy”, i.e., the paper anonymity will be maintained during all reviewing and discussion periods. In case of major revision, authors must therefore maintain anonymity in their response letter and must provide no additional information that could be author-revealing.
To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to FSE 2024.
Authors with further questions on double-anonymous reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-anonymous review process will be desk-rejected.
Submission Policies
The authors must follow the “ACM Policy on Authorship” released April 20, 2023 and its accompanying FAQ including the following points:
-
“Generative AI tools and technologies, such as ChatGPT, may not be listed as authors of an ACM published Work. The use of generative AI tools and technologies to create content is permitted but must be fully disclosed in the Work. For example, the authors could include the following statement in the Acknowledgements section of the Work: ChatGPT was utilized to generate sections of this Work, including text, tables, graphs, code, data, citations, etc.). If you are uncertain about the need to disclose the use of a particular tool, err on the side of caution, and include a disclosure in the acknowledgements section of the Work.”
-
“If you are using generative AI software tools to edit and improve the quality of your existing text in much the same way you would use a typing assistant like Grammarly to improve spelling, grammar, punctuation, clarity, engagement or to use a basic word processing system to correct spelling or grammar, it is not necessary to disclose such usage of these tools in your Work.”
Please read the full policy and FAQ.
Papers submitted for consideration to FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.
All publications are subject to the ACM Author Representations policy.
By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.
Alleged violations to any of the above policies will be reported to ACM for further investigation and may result in a full retraction of your paper, in addition to other potential penalties, as per the ACM Publications Policies.
Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process if your paper is accepted. ACM has been involved in ORCID from the start and they have recently made a commitment to collect ORCID IDs from all published authors. ACM is committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.
The authors of accepted papers are invited and strongly encouraged to attend the conference to present their work. Attendance at the event is not mandatory for publication. Authors also have the option of not presenting their work at the conference, in which case they do not need to register.
Important Dates
All dates are 23:59:59 AoE (UTC-12h)
- Paper registration: Thursday, September 21, 2023 (to register a paper, paper title, abstract, author list, and some additional metadata are required; title and abstract must contain sufficient information for effective bidding; registrations containing empty or generic title and abstract may be dropped)
- Full paper submission: Thursday, September 28, 2023
- Author response: December 11-13, 2023 (3-day period)
- Initial notification: Tuesday, January 23, 2024 (long discussion period due to year-end holidays)
- Camera ready (directly accepted papers): Tuesday, February 20, 2024
- Revised manuscript submissions (major revisions only): Tuesday, March 5, 2024
- Final notification for major revisions: Tuesday, April 16, 2024
- Camera ready (accepted major revision papers): Tuesday, May 14, 2024
The official publication date is the date the journal issue is made available in the ACM Digital Library. This date may be as early as July 1, 2024. The official publication date affects the deadline for any patent filings related to published work.
Open Science Policy
The research track of FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.
Upon submission to the research track, authors are asked to make a replication package available to the program committee (via upload of supplemental material or a link to a private or public repository) or to comment on why this is not possible or desirable. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. We ask authors to provide a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. Be careful that such statements continue to maintain author anonymity. For more details, see the FSE open science policy.
Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate FSE’24 artifact evaluation committee.
Topics of Interest
Topics of interest include, but are not limited to:
- Artificial intelligence and machine learning for software engineering
- Autonomic computing
- Debugging and fault localization
- Dependability, safety, and reliability
- Distributed and collaborative software engineering
- Embedded software, safety-critical systems, and cyber-physical systems
- Empirical software engineering
- Human and social aspects of software engineering
- Human-computer interaction
- Mining software repositories
- Mobile development
- Model checking
- Model-driven engineering
- Parallel, distributed, and concurrent systems
- Performance engineering
- Program analysis
- Program comprehension
- Program repair
- Program synthesis
- Programming languages
- Recommendation systems
- Requirements engineering
- Search-based software engineering
- Services, components, and cloud
- Software architectures
- Software engineering education
- Software engineering for machine learning and artificial intelligence
- Software evolution
- Software processes
- Software security
- Software testing
- Software traceability
- Symbolic execution
- Tools and environments
FAQ
FAQ on Review Process: Major Revisions, Open Science Policy, Double-Anonymous Reviewing
PACMSE Proceedings
Q: What paper format shall we follow for FSE 2024?
A: Papers accepted by the technical track of FSE 2024 will be published in the inaugural journal issue of the Proceedings of the ACM on Software Engineering (PACMSE). Approval has been granted by ACM in late July. Please check the Research Paper How to Submit section for details.
Q: How would the inaugural PACMSE journal affect FSE 2024?
A: FSE will be published in the inaugural PACMSE journal following the recent practices of other communities such as PACMPL (PLDI, POPL, OOPSLA, etc.), PACMHCI, PACMMOD, PACMNET, etc.
Identity: FSE papers will be published in a dedicated issue of PACMSE, with FSE as the issue name. This means that FSE papers will keep their identity!
Paper format: The paper format will follow the ACM’s requirement. This is a switch from the traditional FSE two-column format to this new PACMSE single-column format. However, the amount of content should remain more or less the same: the FSE 2024’s 18 page limit in the singe-column format maps roughly to the old single-column of 10 pages.
Review process: FSE already has a major-revision cycle in 2023 and 2024, which maps neatly onto PACMSE’s requirements for two rounds of reviews, so there are no PACMSE-related changes here.
Conference presentations: FSE 2024’s move to PACMSE changes how the proceedings are published. All accepted papers will still be guaranteed presentation delivery at the conference in the usual way.
Policy on Authorship (e.g., regarding ChatGPT)
Q: What is the policy on Authorship, especially considering the the use of Generative AI tools and technologies, such as ChatGPT?
A: Submissions must follow the “ACM Policy on Authorship” released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).
Major Revision Process
Q: Why is FSE allowing major revisions?
A: SE conferences are currently forced to reject papers that include valuable material, but would need major changes to become acceptable for conference presentation, because major revisions cannot be accommodated in the current review process. By supporting only a binary outcome, conferences force reviewers to decide between rejection and acceptance even in borderline cases that would be better judged after a round of major revision. This can cause additional reviewing burden for the community (the paper is resubmitted to another venue with new reviewers) and inconsistency for the authors (the new reviewers have different opinions). We hope by allowing major revisions to both increase the acceptance rate of FSE and to help reduce these current problems with the reviewing process.
For Authors
Q: If my paper receives major revisions, what happens next?
A: The meta-review will clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. Authors of these papers are granted 6 weeks to implement the requested changes. In addition to the revised paper, authors are asked to submit a response letter that explains how each required change was implemented. If any change was not implemented, authors can explain why. The same reviewers will then review the revised paper and make their final (binary) decision. Authors can also choose to withdraw their submission if they wish.
Q: Will major revision become the default decision causing initial acceptance rates to drop?
A: This is not the intention: reviewers are instructed to accept all papers that would have been accepted when major revision was not an available outcome.
For Reviewers
Q: When shall I recommend major revision for a paper?
A: Major revision should not become the default choice for borderline papers and should be used only if without major revisions the paper would be rejected, while a properly done major revision, which addresses the reviewers’ concerns, could make the paper acceptable for publication; if the requested changes are doable in 6 weeks and are implementable within the page limit; if the requested changes are strictly necessary for paper acceptance (i.e., not just nice-to-have features); if the requested changes require recheck (i.e., reviewers cannot trust the authors to implement them directly in the camera ready).
Q: When shall I recommend rejection instead of major revision?
A: Rejection is a more appropriate outcome than major revision if the requested additions/changes are not implementable in 6 weeks; if the contribution is very narrow or not relevant to the SE audience, and it cannot be retargeted in 6 weeks; if the methodology is flawed and cannot be fixed in 6 weeks; if results are unconvincing, the paper does not seem to improve the state of the art much, and new convincing results are unlikely to be available after 6 weeks of further experiments; if the customary benchmark used in the community was ignored and cannot be adopted and compared to in 6 weeks.
Q: When shall I recommend acceptance instead of major revision?
A: We do not want major revision to become the primary pathway for acceptance. We should continue to trust the authors to make minor changes to the submissions in the camera ready version. Acceptance is preferable if the requested additions/changes are nice to have features, not mandatory for the acceptability of the work; if minor improvements of the text are needed; if minor clarifications requested by the reviewers should be incorporated; if important but not critical references should be added and discussed; if discussion of results could be improved, but the current one is already sufficient.
Q: What is the difference between major revision and shepherding?
A: Major revision is not shepherding. While shepherding typically focuses on important but minor changes, which can be specified in an operational way and can be checked quite easily and quickly by reviewers, major revisions require major changes (although doable in 6 weeks), which means the instructions for the authors cannot be completely operational and the check will need to go deeply into the new content delivered by the paper. Hence, while the expectation for shepherded papers is that most of them will be accepted once the requested changes are implemented, this is not necessarily the case with major revisions.
Q: Is there a quota of papers that can have major revision as outcome? A: As there is no quota for the accepted papers, there is also no quota for major revisions. However, we expect that thanks to major revisions we will be able to eventually accept 10-15% more papers, while keeping the quality bar absolutely unchanged.
Q: What shall I write in the meta-review of a paper with major revision outcome?
A: With the possibility of a major revision outcome, meta-reviews become extremely important. The meta-review should clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. The meta-review should act as a contract between reviewers and authors, such that when all required changes are properly made, the paper is accepted. In this respect, the listed changes should be extremely clear, precise, and implementable.
Review Process
For Authors
Q: Can I withdraw my paper?
A: Yes, papers can be withdrawn at any time using HotCRP.
Q: Is appendix or other supplemental materials allowed?
A: The main submission file must follow the page limit. Any supplemental materials including appendix and replication packages must be submitted separately under “Supplemental Material”. Program Committee members can review supplemental materials but are not obligated to review them.
For Reviewers
Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?
A: Contact the Program Co-Chairs, who will download the material on your behalf and make it available to you.
Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?
A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Co-Chairs, especially since additional reviewers might have a different set of conflicts of interest.
Open Science Policy
Q: What is the FSE 2024 open science policy and how can I follow it?
A: Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:
- make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
- include in the paper an explanation as to why this is not possible or desirable; and
- indicate if they intend to make their data publicly available upon acceptance. This information should be provided in the submitted papers in a section named Data Availability after the Conclusion section. For more details, see the FSE open science policy.
Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?
A: To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site. Instructions are provided in the FSE open science policy.
Double-Anonymous Reviewing (DAR)
Q: Why are you using double-anonymous reviewing?
A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.
Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.
A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.
For Authors
Q: What exactly do I have to do to anonymize my paper?
A: Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors.
Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?
A: On the submission site, there will be an option to submit supplementary material along with your main paper. You can also share supplementary material in a private or publicly shared repository (preferred). This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-anonymous guidelines. See instructions on the FSE open science policy.
Q: My submission is based on code available in a public repository. How do I deal with this?
A: Making your code publicly available is not incompatible with double-anonymous reviewing. You can create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-anonymize your repository.
Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission? A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Co-Chairs.
Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?
A: No. But we recommend you do not use the same title for your FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.
Q: Am I allowed to post my (non-anonymized) paper on my web page or arXiv?
A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to FSE 2024 (e.g., using footnotes saying “Submitted to FSE 2024”).
Q: Can I give a talk about my work while it is under review? How do I handle social media?
A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are grey areas and trade-offs; we cannot describe every possible scenario.
Things you may do:
- Put your submission on your home page.
- Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
- Present your work at professional meetings, job interviews, etc.
- Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.
Things you should not do:
- Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
- Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
- Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.
Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.
Q: Will the fact that FSE is double-anonymous have an impact on handling conflicts of interest?
A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Call for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.
For Reviewers
Q: What should I do if I learn the authors’ identity? What should I do if a prospective FSE author contacts me and asks to visit my institution? A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Co-Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgement.
Q: How do we handle potential conflicts of interest since I cannot see the author names?
A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.
Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?
A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.
The above guidelines are partly based on the PLDI FAQ on double-anonymous reviewing and the ICSE 2023 guidelines on double-anonymous submissions.