| 201 |
Anomaly Detection in a Large-scale Cloud Platform
Mohammad Saiful Islam, William Pourmajidi, ... (+4 more)
|
👻
Ghosted
|
cs.DC
|
45 |
5 years ago |
| 202 |
Leveraging Large Language Models to Improve REST API Testing
Myeongsoo Kim, Tyler Stennett, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
45 |
2 years ago |
| 203 |
SINVAD: Search-based Image Space Navigation for DNN Image Classifier Test Input Generation
Sungmin Kang, Robert Feldt, Shin Yoo
|
👻
Ghosted
|
cs.SE
|
44 |
5 years ago |
| 204 |
MTTM: Metamorphic Testing for Textual Content Moderation Software
Wenxuan Wang, Jen-tse Huang, ... (+6 more)
|
👻
Ghosted
|
cs.CL
|
44 |
3 years ago |
| 205 |
Analyzing and Supporting Adaptation of Online Code Examples
Tianyi Zhang, Di Yang, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
43 |
6 years ago |
| 206 |
AI-Tutoring in Software Engineering Education
Eduard Frankford, Clemens Sauerwein, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
43 |
2 years ago |
| 207 |
Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks
Zhongxin Liu, Zhijie Tang, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
43 |
2 years ago |
| 208 |
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems
Sicong Cao, Xiaobing Sun, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
43 |
2 years ago |
| 209 |
What Makes Effective Leadership in Agile Software Development Teams?
Lucas Gren, Paul Ralph
|
👻
Ghosted
|
cs.SE
|
43 |
4 years ago |
| 210 |
Using Reinforcement Learning for Load Testing of Video Games
Rosalia Tufano, Simone Scalabrino, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
43 |
4 years ago |
| 211 |
RAICC: Revealing Atypical Inter-Component Communication in Android Apps
Jordan Samhi, Alexandre Bartel, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
42 |
5 years ago |
| 212 |
Graph-Based Fuzz Testing for Deep Learning Inference Engine
Weisi Luo, Dong Chai, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
42 |
5 years ago |
| 213 |
Attribution Required: Stack Overflow Code Snippets in GitHub Projects
Sebastian Baltes, Richard Kiefer, Stephan Diehl
|
👻
Ghosted
|
cs.SE
|
42 |
8 years ago |
| 214 |
Programming Not Only by Example
Hila Peleg, Sharon Shoham, Eran Yahav
|
👻
Ghosted
|
cs.PL
|
42 |
8 years ago |
| 215 |
RLCoder: Reinforcement Learning for Repository-Level Code Completion
Yanlin Wang, Yanli Wang, ... (+5 more)
|
💤
Eternal Rest
|
cs.SE
|
42 |
1 year ago |
| 216 |
Testing Database Engines via Query Plan Guidance
Jinsheng Ba, Manuel Rigger
|
👻
Ghosted
|
cs.SE
|
42 |
2 years ago |
| 217 |
Xpert: Empowering Incident Management with Query Recommendations via Large Language Models
Yuxuan Jiang, Chaoyun Zhang, ... (+9 more)
|
👻
Ghosted
|
cs.SE
|
41 |
2 years ago |
| 218 |
Presenting and Evaluating the Impact of Experiential Learning in Computing Accessibility Education
Weishi Shi, Samuel Malachowsky, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
41 |
6 years ago |
| 219 |
Recommendation of Move Method Refactoring Using Path-Based Representation of Code
Zarina Kurbatova, Ivan Veselov, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
41 |
6 years ago |
| 220 |
A Large-Scale Empirical Study on Industrial Fake Apps
Chongbin Tang, Sen Chen, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
41 |
7 years ago |
| 221 |
A Longitudinal Study of Identifying and Paying Down Architectural Debt
Maleknaz Nayebi, Yuanfang Cai, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
41 |
7 years ago |
| 222 |
Mining Container Image Repositories for Software Configuration and Beyond
Tianyin Xu, Darko Marinov
|
👻
Ghosted
|
cs.SE
|
41 |
8 years ago |
| 223 |
SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development
Vaibhav Saini, Hitesh Sajnani, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
41 |
10 years ago |
| 224 |
TOGLL: Correct and Strong Test Oracle Generation with LLMs
Soneya Binta Hossain, Matthew Dwyer
|
👻
Ghosted
|
cs.SE
|
41 |
1 year ago |
| 225 |
Why do developers take breaks from contributing to OSS projects? A preliminary analysis
Giuseppe Iaffaldano, Igor Steinmacher, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
40 |
7 years ago |
| 226 |
Do Programmers Work at Night or During the Weekend?
Maëlick Claes, Mika Mäntylä, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
40 |
8 years ago |
| 227 |
MDroid+: A Mutation Testing Framework for Android
Kevin Moran, Michele Tufano, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
40 |
8 years ago |
| 228 |
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study
Zongjie Li, Chaozheng Wang, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
40 |
3 years ago |
| 229 |
Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching
Can Yang, Zhengzi Xu, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
40 |
4 years ago |
| 230 |
Fast and Precise On-the-fly Patch Validation for All
Lingchao Chen, Lingming Zhang
|
👻
Ghosted
|
cs.SE
|
39 |
5 years ago |
| 231 |
Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian Networks
Kevin Moran, David N. Palacio, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
39 |
5 years ago |
| 232 |
WES: Agent-based User Interaction Simulation on Real Infrastructure
John Ahlgren, Maria Eugenia Berezin, ... (+10 more)
|
👻
Ghosted
|
cs.SE
|
39 |
6 years ago |
| 233 |
Towards Causal Deep Learning for Vulnerability Detection
Md Mahbubur Rahman, Ira Ceka, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
39 |
2 years ago |
| 234 |
A Benchmark Comparison of Python Malware Detection Approaches
Duc-Ly Vu, Zachary Newman, John Speed Meyers
|
👻
Ghosted
|
cs.CR
|
39 |
3 years ago |
| 235 |
Traces of Memorisation in Large Language Models for Code
Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen
|
👻
Ghosted
|
cs.CR
|
38 |
2 years ago |
| 236 |
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study
Vincenzo Riccio, Paolo Tonella
|
👻
Ghosted
|
cs.SE
|
38 |
3 years ago |
| 237 |
Fairify: Fairness Verification of Neural Networks
Sumon Biswas, Hridesh Rajan
|
👻
Ghosted
|
cs.LG
|
38 |
3 years ago |
| 238 |
AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces
SM Hasan Mansur, Sabiha Salma, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
37 |
3 years ago |
| 239 |
Learning Autocompletion from Real-World Datasets
Gareth Ari Aye, Seohyun Kim, Hongyu Li
|
👻
Ghosted
|
cs.SE
|
37 |
5 years ago |
| 240 |
Using Dynamic Analysis to Generate Disjunctive Invariants
ThanhVu Nguyen, Deepak Kapur, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
37 |
7 years ago |
| 241 |
Redundant Loads: A Software Inefficiency Indicator
Pengfei Su, Shasha Wen, ... (+3 more)
|
👻
Ghosted
|
cs.PF
|
37 |
7 years ago |
| 242 |
Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs
Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski
|
👻
Ghosted
|
cs.SE
|
37 |
2 years ago |
| 243 |
Less is More: Supporting Developers in Vulnerability Detection during Code Review
Larissa Braz, Christian Aeberhard, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
37 |
4 years ago |
| 244 |
ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel
Patrick Franz, Thorsten Berger, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
36 |
5 years ago |
| 245 |
Digitalization of Swedish Government Agencies - A Perspective Through the Lens of a Software Development Census
Markus Borg, Thomas Olsson, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
36 |
8 years ago |
| 246 |
AntibIoTic: Protecting IoT Devices Against DDoS Attacks
Michele De Donno, Nicola Dragoni, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
36 |
8 years ago |
| 247 |
Greening Large Language Models of Code
Jieke Shi, Zhou Yang, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
36 |
2 years ago |
| 248 |
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks
Verya Monjezi, Ashutosh Trivedi, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
36 |
3 years ago |
| 249 |
FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation
Zhiyang Chen, Sidi Mohamed Beillahi, Fan Long
|
👻
Ghosted
|
cs.PL
|
36 |
3 years ago |
| 250 |
BeDivFuzz: Integrating Behavioral Diversity into Generator-based Fuzzing
Hoang Lam Nguyen, Lars Grunske
|
👻
Ghosted
|
cs.SE
|
36 |
4 years ago |