2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE)

14-22 May 2016

Filter Results

Displaying Results 1 - 25 of 116
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xvi
    Request permission for commercial reuse | |PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2016, Page(s):xvii - xxii
    Request permission for commercial reuse | |PDF file iconPDF (1213 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2016, Page(s):xxiii - xxvi
    Request permission for commercial reuse | |PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Program Board

    Publication Year: 2016, Page(s): xxvii
    Request permission for commercial reuse | |PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s):xxviii - xxx
    Request permission for commercial reuse | |PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Web Committee

    Publication Year: 2016, Page(s): xxxi
    Request permission for commercial reuse | |PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Publicity Committee

    Publication Year: 2016, Page(s): xxxii
    Request permission for commercial reuse | |PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Publications Committee

    Publication Year: 2016, Page(s): xxxiii
    Request permission for commercial reuse | |PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Workshops Committee

    Publication Year: 2016, Page(s): xxxiv
    Request permission for commercial reuse | |PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2016, Page(s): xxxv
    Request permission for commercial reuse | |PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Sponsors and supporters

    Publication Year: 2016, Page(s):xxxvii - xxxix
    Request permission for commercial reuse | |PDF file iconPDF (294 KB)
    Freely Available from IEEE
  • PRADA: Prioritizing Android Devices for Apps by Mining Large-Scale Usage Data

    Publication Year: 2016, Page(s):3 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB) | HTML iconHTML

    Selecting and prioritizing major device models are critical for mobile app developers to select testbeds and optimize resources such as marketing and quality-assurance resources. The heavily fragmented distribution of Android devices makes it challenging to select a few major device models out of thousands of models available on the market. Currently app developers usually rely on some reported or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Release Planning of Mobile Apps Based on User Reviews

    Publication Year: 2016, Page(s):14 - 24
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2257 KB) | HTML iconHTML

    Developers have to to constantly improve their apps by fixing critical bugs and implementing the most desired features in order to gain shares in the continuously increasing and competitive market of mobile apps. A precious source of information to plan such activities is represented by reviews left by users on the app store. However, in order to exploit such information developers need to manuall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Framework for Detecting Privacy Policy Violations in Android Application Code

    Publication Year: 2016, Page(s):25 - 36
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5508 KB) | HTML iconHTML

    Mobile applications frequently access sensitive personal information to meet user or business requirements. Because such information is sensitive in general, regulators increasingly require mobile-app developers to publish privacy policies that describe what information is collected. Furthermore, regulators have fined companies when these policies are inconsistent with the actual data practices of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Sandboxes

    Publication Year: 2016, Page(s):37 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (580 KB) | HTML iconHTML

    We present sandbox mining, a technique to confine an application to resources accessed during automatic testing. Sandbox mining first explores software behavior by means of automatic test generation, and extracts the set of resources accessed during these tests. This set is then used as a sandbox, blocking access to resources not used during testing. The mined sandbox thus protects against behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Performance Distributions via Probabilistic Symbolic Execution

    Publication Year: 2016, Page(s):49 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (964 KB) | HTML iconHTML

    Analyzing performance and understanding the potential best-case, worst-case and distribution of program execution times are very important software engineering tasks. There have been model-based and program analysis-based approaches for performance analysis. Model-based approaches rely on analytical or design models derived from mathematical theories or software architecture abstraction, which are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Issues and Optimizations in JavaScript: An Empirical Study

    Publication Year: 2016, Page(s):61 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (380 KB) | HTML iconHTML

    As JavaScript is becoming increasingly popular, the performance of JavaScript programs is crucial to ensure the responsiveness and energy-efficiency of thousands of pro- grams. Yet, little is known about performance issues that developers face in practice and they address these issues. This paper presents an empirical study of 98 fixed performance issues from 16 popular client-side and server-side... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of Run-Time Quality-of-Service Evaluation Using Parametric Model Checking

    Publication Year: 2016, Page(s):73 - 84
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1028 KB)

    Run-time Quality-of-Service (QoS) assurance is crucial for business-critical systems. Complex behavioral performance metrics (PMs) are useful but often difficult to monitor or measure. Probabilistic model checking, especially parametric model checking, can support the computation of aggre- gate functions for a broad range of those PMs. In practice, those PMs may be defined with parameters determin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Selection of Competing Services with Probabilistic Hierarchical Refinement

    Publication Year: 2016, Page(s):85 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (316 KB) | HTML iconHTML

    Recently, many large enterprises (e.g., Netflix, Amazon) have decomposed their monolithic application into services, and composed them to fulfill their business functionalities. Many hosting services on the cloud, with different Quality of Service (QoS) (e.g., availability, cost), can be used to host the services. This is an example of competing services. QoS is crucial for the satisfaction of use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Emerging Role of Data Scientists on Software Development Teams

    Publication Year: 2016, Page(s):96 - 107
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (930 KB) | HTML iconHTML

    Creating and running software produces large amounts of raw data about the development process and the customer usage, which can be turned into actionable insight with the help of skilled data scientists. Unfortunately, data scientists with the analytical and software engineering skills to analyze these large data sets have been hard to come by; only recently have software companies started to dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Belief & Evidence in Empirical Software Engineering

    Publication Year: 2016, Page(s):108 - 119
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (399 KB) | HTML iconHTML

    Empirical software engineering has produced a steady stream of evidence-based results concerning the factors that affect important outcomes such as cost, quality, and interval. However, programmers often also have strongly-held a priori opinions about these issues. These opinions are important, since developers are highlytrained professionals whose beliefs would doubtless affect their practice. As... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grounded Theory in Software Engineering Research: A Critical Review and Guidelines

    Publication Year: 2016, Page(s):120 - 131
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (623 KB) | HTML iconHTML

    Grounded Theory (GT) has proved an extremely useful research approach in several fields including medical sociology, nursing, education and management theory. However, GT is a complex method based on an inductive paradigm that is fundamentally different from the traditional hypothetico-deductive research model. As there are at least three variants of GT, some ostensibly GT research suffers from me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.