Search Results - General and reference Cross-computing tools and techniques Empirical studies
-
1
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…). In particular, some recent studies have explored how to leverage large language models of code (LLMCs…”
Get full text
Conference Proceeding -
2
What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs?
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…Pre-trained models of source code have gained widespread popularity in many code intelligence tasks. Recently, with the scaling of the model and corpus size,…”
Get full text
Conference Proceeding -
3
Lost in Translation: A Study of Bugs Introduced by Large Language Models While Translating Code
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“… To that end, we present a large-scale empirical study to investigate the ability of general LLMs and code LLMs for code translation across pairs of different languages, including C, C++…”
Get full text
Conference Proceeding -
4
Grounded Theory in Software Engineering Research: A Critical Review and Guidelines
ISSN: 1558-1225Published: ACM 01.05.2016Published in Proceedings / International Conference on Software Engineering (01.05.2016)“…Grounded Theory (GT) has proved an extremely useful research approach in several fields including medical sociology, nursing, education and management theory…”
Get full text
Conference Proceeding -
5
Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“… This paper presents an empirical study on the prevalence and severity of API misuse on Stack Overflow…”
Get full text
Conference Proceeding -
6
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… We are motivated to study how far this outstanding challenge can be solved by recent advances in large language models (LLMs) such as ChatGPT…”
Get full text
Conference Proceeding -
7
Gamma: Revisiting Template-Based Automated Program Repair Via Mask Prediction
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…Automated program repair (APR) aims to fix software bugs without manual debugging efforts and plays a crucial role in software development and maintenance…”
Get full text
Conference Proceeding -
8
An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code Models
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… Although these methods claim superiority over the prior techniques, they seldom make a comprehensive and fair comparison on multiple software engineering tasks…”
Get full text
Conference Proceeding -
9
Assessing and Restoring Reproducibility of Jupyter Notebooks
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Jupyter notebooks-documents that contain live code, equations, visualizations, and narrative text-now are among the most popular means to compute, present,…”
Get full text
Conference Proceeding -
10
Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“… Prior studies provide recommendations on logging locations, but such recommendations are only for limited situations (e.g., exception logging…”
Get full text
Conference Proceeding -
11
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“… Previous research either focuses on analyzing bugs rather than vulnerabilities, or only studies general vulnerability distribution among projects rather than the distribution within each project…”
Get full text
Conference Proceeding -
12
Secure coding practices in Java: challenges and vulnerabilities
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“… We conducted an empirical study on StackOverflow posts, aiming to understand developers' concerns on Java secure coding, their programming obstacles, and insecure coding practices…”
Get full text
Conference Proceeding -
13
The Plastic Surgery Hypothesis in the Era of Large Language Models
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… Traditional APR tools typically focus on specific bug types and fixes through the use of templates, heuristics, and formal specifications…”
Get full text
Conference Proceeding -
14
How Many of All Bugs Do We Find? A Study of Static Bug Detectors
ISSN: 2643-1572Published: ACM 03.09.2018Published in 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE) (03.09.2018)“… To decide which of these bugs the tools detect, we use a novel methodology that combines an automatic analysis of warnings and bugs with a manual validation of each candidate…”
Get full text
Conference Proceeding -
15
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… Prior studies have demonstrated that the non-vulnerable code (i.e., negative labels) tends to be unreliable in commonly-used datasets, while vulnerable code (i.e., positive labels) is more determined…”
Get full text
Conference Proceeding -
16
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…As Android platform evolves in a fast pace, API-related compatibility issues become a significant challenge for developers. To handle an incompatible API…”
Get full text
Conference Proceeding -
17
On the Evaluation of Neural Code Translation: Taxonomy and Benchmark
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“…s. Based on the empirical results, we develop a taxonomy that categorizes code translation tasks into four primary types according to their complexity…”
Get full text
Conference Proceeding -
18
An Empirical Study on Automatically Detecting AI-Generated Source Code: How Far are We?
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“… This study first presents an empirical analysis to investigate the effectiveness of the existing AI detection tools in detecting AI-generated code…”
Get full text
Conference Proceeding -
19
Comparing Formal Tools for System Design: a Judgment Study
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Formal methods and tools have a long history of successful applications in the design of safety-critical railway products…”
Get full text
Conference Proceeding -
20
Vulnerability Detection with Code Language Models: How Far are We?
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…In the context of the rising interest in code language models (code LMs) and vulnerability detection, we study the effectiveness of code LMs for detecting vulnerabilities…”
Get full text
Conference Proceeding

