Search Results - "General and reference Cross-computing tools and techniques"
-
1
FAST approaches to scalable similarity-based test case prioritization
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…Many test case prioritization criteria have been proposed for speeding up fault detection. Among them, similarity-based approaches give priority to the test…”
Get full text
Conference Proceeding -
2
Fixing Large Language Models' Specification Misunderstanding for Better Code Generation
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Code generation is to automatically generate source code conforming to a given programming specification, which has received extensive attention especially…”
Get full text
Conference Proceeding -
3
Parametric Falsification of Many Probabilistic Requirements Under Flakiness
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Falsification is a popular simulation-based testing method for Cyber-Physical Systems to find inputs that violate a formal requirement. It employs optimization…”
Get full text
Conference Proceeding -
4
Leveraging Propagated Infection to Crossfire Mutants
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“… We conducted a study and found that many such surviving mutants (up to 84% for the subjects of our study…”
Get full text
Conference Proceeding -
5
Software Model Evolution with Large Language Models: Experiments on Simulated, Public, and Industrial Datasets
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“… As with other software engineering artifacts, software models are subject to evolution. Supporting modelers in evolving software models with recommendations for model completions is still an open problem, though…”
Get full text
Conference Proceeding -
6
Taming the killer microsecond
ISBN: 9781538662403, 153866240XPublished: Piscataway, NJ, USA IEEE Press 20.10.2018Published in 2018 51st Annual IEEE ACM International Symposium on Microarchitecture (MICRO) (20.10.2018)“… Finding the root cause of this "Killer Microsecond" problem, is the subject of this work…”
Get full text
Conference Proceeding -
7
Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“… Using three open-source Kotlin-Java mixing projects as our subjects, Depends-Kotlin demonstrates high accuracy and performance in resolving Kotlin-Kotlin and Kotlin-Java dependencies relations…”
Get full text
Conference Proceeding -
8
An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“… To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject…”
Get full text
Conference Proceeding -
9
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour
ISSN: 2643-1572Published: IEEE 01.11.2019Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (01.11.2019)“…Designing field-representative load tests is an essential step for the quality assurance of large-scale systems. Practitioners may capture user behaviour at…”
Get full text
Conference Proceeding -
10
The StageNet fabric for constructing resilient multicore systems
ISBN: 9781424428366, 142442836XISSN: 1072-4451Published: Washington, DC, USA IEEE Computer Society 08.11.2008Published in 2008 41st IEEE/ACM International Symposium on Microarchitecture (08.11.2008)“… Consequently, high reliability and fault tolerance, which have traditionally been subjects of interest for high-end server markets, are now getting emphasis in the mainstream desktop and embedded systems space…”
Get full text
Conference Proceeding -
11
Creating a cognitive metric of programming task difficulty
ISBN: 1605580392, 9781605580395ISSN: 0270-5257Published: 13.05.2008Published in International Conference on Software Engineering 2008 (13.05.2008)“… Despite careful effort in the selection and confirmation from our pilot subjects finding the two tasks to be of equivalent difficulty, the data from the experiment suggest the subjects found one…”
Get full text
Journal Article -
12
SBFT Tool Competition 2024 - Python Test Case Generation Track
Published: ACM 14.04.2024Published in 2024 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT) (14.04.2024)“… budget of 400 seconds. We considered one configuration of each tool for each test subject and evaluated the tools…”
Get full text
Conference Proceeding -
13
Accurate Interprocedural Null-Dereference Analysis for Java
ISBN: 9781424434534, 142443453XISSN: 0270-5257Published: Washington, DC, USA IEEE Computer Society 16.05.2009Published in 2009 IEEE 31st International Conference on Software Engineering (16.05.2009)“…Null dereference is a commonly occurring defect in Java programs, and many static-analysis tools identify such defects. However, most of the existing tools…”
Get full text
Conference Proceeding -
14
Precimonious: tuning assistant for floating-point precision
ISBN: 9781450323789, 1450323782ISSN: 2167-4329Published: New York, NY, USA ACM 17.11.2013Published in 2013 SC - International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (17.11.2013)“… Precimonious performs a search on the types of the floating-point program variables trying to lower their precision subject to accuracy constraints and performance goals…”
Get full text
Conference Proceeding -
15
Evaluating the Accuracy of Fault Localization Techniques
ISBN: 1424452597, 9781424452590ISSN: 1938-4300Published: IEEE 01.11.2009Published in 2009 IEEE/ACM International Conference on Automated Software Engineering (01.11.2009)“… Most of these claims have to do with evaluating FL accuracy. Our investigation centers on a new subject program having properties useful for FL experiments…”
Get full text
Conference Proceeding -
16
Dataset: Copy-based Reuse in Open Source Software
ISSN: 2574-3864Published: ACM 15.04.2024Published in Proceedings (IEEE/ACM International Conference on Mining Software Repositories. Online) (15.04.2024)“…In Open Source Software, the source code and any other resources available in a project can be viewed or reused by anyone subject to often permissive licensing restrictions…”
Get full text
Conference Proceeding -
17
Enhancing Incident Management: Insights from a Case Study at ING
Published: ACM 16.04.2024Published in 2024 IEEE/ACM Workshop on Software Engineering Challenges in Financial Firms (FinanSE) (16.04.2024)“… This paper aims to enhance understanding of the current state of practice through a single-case exploratory case study, at the international bank ING, by interviewing 15 subject matter experts…”
Get full text
Conference Proceeding -
18
Predicting common web application vulnerabilities from input validation and sanitization code patterns
ISBN: 1450312047, 9781450312042Published: New York, NY, USA ACM 03.09.2012Published in 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)“…Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate…”
Get full text
Conference Proceeding -
19
The Effect of Information Content and Length on Name Recollection
ISSN: 2643-7171Published: ACM 01.05.2022Published in 2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC) (01.05.2022)“… they are. We show in two independent experiments involving a total of 190 subjects that informative names are usually easier to recollect than similar-length names which contain less focused information…”
Get full text
Conference Proceeding -
20
Ethical Mining - A Case Study on MSR Mining Challenges
ISSN: 2574-3864Published: ACM 01.05.2020Published in 2020 IEEE/ACM 17th International Conference on Mining Software Repositories (MSR) (01.05.2020)“…Research in Mining Software Repositories (MSR) is research involving human subjects, as the repositories usually contain data about developers' interactions with the repositories…”
Get full text
Conference Proceeding

