References
[1]
Robillard
M P,
DeLine
R.
A field study of API learning obstacles.
Empir Software Eng,
2011, 16: 703-732
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A field study of API learning obstacles&author=Robillard M P&author=DeLine R&publication_year=2011&journal=Empir Software Eng&volume=16&pages=703-732
[2]
Hou D, Li L. Obstacles in using frameworks and APIs: An exploratory study of programmers' newsgroup discussions. In: Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension, 2011. 91--100.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hou D, Li L. Obstacles in using frameworks and APIs: An exploratory study of programmers' newsgroup discussions. In: Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension, 2011. 91--100&
[3]
Nadi S, Krüger S, Mezini M, et al. Jumping through hoops: why do Java developers struggle with cryptography apis? In: Proceedings of the 38th International Conference on Software Engineering, 2016. 935--946.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Nadi S, Krüger S, Mezini M, et al. Jumping through hoops: why do Java developers struggle with cryptography apis? In: Proceedings of the 38th International Conference on Software Engineering, 2016. 935--946&
[4]
Zibran M F, Eishita F Z, Roy C K. Useful, but usable? factors affecting the usability of apis. In: Proceedings of the 2011 18th Working Conference on Reverse Engineering, 2011. 151--155.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zibran M F, Eishita F Z, Roy C K. Useful, but usable? factors affecting the usability of apis. In: Proceedings of the 2011 18th Working Conference on Reverse Engineering, 2011. 151--155&
[5]
Robillard
M P,
Bodden
E,
Kawrykow
D.
Automated API Property Inference Techniques.
IIEEE Trans Software Eng,
2013, 39: 613-637
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Automated API Property Inference Techniques&author=Robillard M P&author=Bodden E&author=Kawrykow D&publication_year=2013&journal=IIEEE Trans Software Eng&volume=39&pages=613-637
[6]
Zhong H, Xie T, Zhang L, et al. MAPO: Mining and recommending API usage patterns. In: Drossopoulou S, eds. ECOOP 2009--- Object-Oriented Programming. ECOOP 2009. Lecture Notes in Computer Science, vol 5653. Berlin, Heidelberg: Springer, 2009. 318--343.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhong H, Xie T, Zhang L, et al. MAPO: Mining and recommending API usage patterns. In: Drossopoulou S, eds. ECOOP 2009--- Object-Oriented Programming. ECOOP 2009. Lecture Notes in Computer Science, vol 5653. Berlin, Heidelberg: Springer, 2009. 318--343&
[7]
Uddin
G,
Robillard
M P.
How API Documentation Fails.
IEEE Softw,
2015, 32: 68-75
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=How API Documentation Fails&author=Uddin G&author=Robillard M P&publication_year=2015&journal=IEEE Softw&volume=32&pages=68-75
[8]
Linares-Vásquez M, Bavota G, Bernal-Cárdenas C, et al. API change and fault proneness: a threat to the success of android apps. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, 2013. 477--487.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Linares-Vásquez M, Bavota G, Bernal-Cárdenas C, et al. API change and fault proneness: a threat to the success of android apps. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, 2013. 477--487&
[9]
McDonnell T, Ray B, and Kim M. An empirical study of api stability and adoption in the android ecosystem. In: Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013. 70--79.
Google Scholar
http://scholar.google.com/scholar_lookup?title=McDonnell T, Ray B, and Kim M. An empirical study of api stability and adoption in the android ecosystem. In: Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013. 70--79&
[10]
Dig
D,
Johnson
R.
How do APIs evolve? A story of refactoring.
J Softw Maint Evol-Res Pract,
2006, 18: 83-107
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=How do APIs evolve? A story of refactoring&author=Dig D&author=Johnson R&publication_year=2006&journal=J Softw Maint Evol-Res Pract&volume=18&pages=83-107
[11]
Xavier L, Brito A, Hora A, et al. Historical and impact analysis of API breaking changes: a large-scale study. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2017. 138--147.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Xavier L, Brito A, Hora A, et al. Historical and impact analysis of API breaking changes: a large-scale study. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2017. 138--147&
[12]
Jezek
K,
Dietrich
J,
Brada
P.
How Java APIs break - An empirical study.
Inf Software Tech,
2015, 65: 129-146
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=How Java APIs break - An empirical study&author=Jezek K&author=Dietrich J&author=Brada P&publication_year=2015&journal=Inf Software Tech&volume=65&pages=129-146
[13]
Raemaekers
S,
van Deursen
A,
Visser
J.
Semantic versioning and impact of breaking changes in the Maven repository.
J Syst Software,
2017, 129: 140-158
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Semantic versioning and impact of breaking changes in the Maven repository&author=Raemaekers S&author=van Deursen A&author=Visser J&publication_year=2017&journal=J Syst Software&volume=129&pages=140-158
[14]
Jung
C,
Rus
S,
Railing
B P.
Brainy.
SIGPLAN Not,
2011, 46: 86
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Brainy&author=Jung C&author=Rus S&author=Railing B P&publication_year=2011&journal=SIGPLAN Not&volume=46&pages=86
[15]
Xu G. CoCo: Sound and adaptive replacement of Java collections. In: Castagna G, eds. ECOOP 2013---Object-Oriented Programming. ECOOP 2013. Lecture Notes in Computer Science, vol 7920. Berlin, Heidelberg: Springer, 2013. 1--26.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Xu G. CoCo: Sound and adaptive replacement of Java collections. In: Castagna G, eds. ECOOP 2013---Object-Oriented Programming. ECOOP 2013. Lecture Notes in Computer Science, vol 7920. Berlin, Heidelberg: Springer, 2013. 1--26&
[16]
Chen B, Liu Y, Le W. Generating performance distributions via probabilistic symbolic execution. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 49--60.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chen B, Liu Y, Le W. Generating performance distributions via probabilistic symbolic execution. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 49--60&
[17]
Zhao Y, Xiao L, Wang X, et al. Localized or architectural: an empirical study of performance issues dichotomy. In: Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2019. 316--317.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhao Y, Xiao L, Wang X, et al. Localized or architectural: an empirical study of performance issues dichotomy. In: Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2019. 316--317&
[18]
Georgiev M, Iyengar S, Jana S, et al. The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012. 38--49.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Georgiev M, Iyengar S, Jana S, et al. The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012. 38--49&
[19]
Fahl S, Harbach M, Perl H, et al. Rethinking SSL development in an appified world. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. 49--60.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fahl S, Harbach M, Perl H, et al. Rethinking SSL development in an appified world. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. 49--60&
[20]
Egele M, Brumley D, Fratantonio Y, et al. An empirical study of cryptographic misuse in android applications. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. 73--84.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Egele M, Brumley D, Fratantonio Y, et al. An empirical study of cryptographic misuse in android applications. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. 73--84&
[21]
Li L, Bissyandé T F, Traon Y L, et al. Accessing inaccessible android apis: an empirical study. In: Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2016. 411--422.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li L, Bissyandé T F, Traon Y L, et al. Accessing inaccessible android apis: an empirical study. In: Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2016. 411--422&
[22]
Li
Z,
Zhou
Y.
PR-Miner.
SIGSOFT Softw Eng Notes,
2005, 30: 306
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=PR-Miner&author=Li Z&author=Zhou Y&publication_year=2005&journal=SIGSOFT Softw Eng Notes&volume=30&pages=306
[23]
Thummalapenta S, Xie T. Alattin: mining alternative patterns for detecting neglected conditions. In: Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering, 2009. 283--294.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Thummalapenta S, Xie T. Alattin: mining alternative patterns for detecting neglected conditions. In: Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering, 2009. 283--294&
[24]
Monperrus M, Bruch M, Mezini M. Detecting missing method calls in object-oriented software. In: D'Hondt T, eds. ECOOP 2010---Object-Oriented Programming. ECOOP 2010. Lecture Notes in Computer Science, vol 6183. Berlin, Heidelberg: Springer, 2010. 2--25.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Monperrus M, Bruch M, Mezini M. Detecting missing method calls in object-oriented software. In: D'Hondt T, eds. ECOOP 2010---Object-Oriented Programming. ECOOP 2010. Lecture Notes in Computer Science, vol 6183. Berlin, Heidelberg: Springer, 2010. 2--25&
[25]
Wasylkowski A, Zeller A, Lindig C. Detecting object usage anomalies. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2007. 35--44.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wasylkowski A, Zeller A, Lindig C. Detecting object usage anomalies. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2007. 35--44&
[26]
Moritz E, Linares-Vásquez M, Poshyvanyk D, et al. ExPort: detecting and visualizing API usages in large source code repositories. In: Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013. 646--651.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Moritz E, Linares-Vásquez M, Poshyvanyk D, et al. ExPort: detecting and visualizing API usages in large source code repositories. In: Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013. 646--651&
[27]
Fowkes J, Sutton C. Parameter-free probabilistic API mining across github. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 254--265.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fowkes J, Sutton C. Parameter-free probabilistic API mining across github. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 254--265&
[28]
Zhang T, Upadhyaya G, Reinhardt A, et al. Are code examples on an online Q&A forum reliable? a study of API misuse on stack overflow. In: 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018. 886--896.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhang T, Upadhyaya G, Reinhardt A, et al. Are code examples on an online Q&A forum reliable? a study of API misuse on stack overflow. In: 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018. 886--896&
[29]
Williams
C C,
Hollingsworth
J K.
Recovering system specific rules from software repositories.
SIGSOFT Softw Eng Notes,
2005, 30: 1
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Recovering system specific rules from software repositories&author=Williams C C&author=Hollingsworth J K&publication_year=2005&journal=SIGSOFT Softw Eng Notes&volume=30&pages=1
[30]
Livshits
B,
Zimmermann
T.
DynaMine.
SIGSOFT Softw Eng Notes,
2005, 30: 296
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=DynaMine&author=Livshits B&author=Zimmermann T&publication_year=2005&journal=SIGSOFT Softw Eng Notes&volume=30&pages=296
[31]
Uddin G, Dagenais B, Robillard M P. Temporal analysis of API usage concepts. In: Proceedings of the 2012 34th International Conference on Software Engineering (ICSE), 2012. 804--814.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Uddin G, Dagenais B, Robillard M P. Temporal analysis of API usage concepts. In: Proceedings of the 2012 34th International Conference on Software Engineering (ICSE), 2012. 804--814&
[32]
Azad
S,
Rigby
P C,
Guerrouj
L.
Generating API call rules from version history and stack overflow posts.
ACM Trans Softw Eng Methodol,
2017, 25: 1-22
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Generating API call rules from version history and stack overflow posts&author=Azad S&author=Rigby P C&author=Guerrouj L&publication_year=2017&journal=ACM Trans Softw Eng Methodol&volume=25&pages=1-22
[33]
Liang B, Bian P, Zhang Y, et al. Antminer: mining more bugs by reducing noise interference. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 333--344.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liang B, Bian P, Zhang Y, et al. Antminer: mining more bugs by reducing noise interference. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 333--344&
[34]
Ramanathan M K, Grama A, Jagannathan S. Path-sensitive inference of function precedence protocols. In: 29th International Conference on Software Engineering (ICSE'07), 2007. 240--250.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ramanathan M K, Grama A, Jagannathan S. Path-sensitive inference of function precedence protocols. In: 29th International Conference on Software Engineering (ICSE'07), 2007. 240--250&
[35]
Nguyen H A, Dyer R, Nguyen T N, et al. Mining preconditions of APIs in large-scale code corpus. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014. 166--177.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Nguyen H A, Dyer R, Nguyen T N, et al. Mining preconditions of APIs in large-scale code corpus. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2014. 166--177&
[36]
Ramanathan
M K,
Grama
A,
Jagannathan
S.
Static specification inference using predicate mining.
SIGPLAN Not,
2007, 42: 123
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Static specification inference using predicate mining&author=Ramanathan M K&author=Grama A&author=Jagannathan S&publication_year=2007&journal=SIGPLAN Not&volume=42&pages=123
[37]
Wasylkowski
A,
Zeller
A.
Mining temporal specifications from object usage.
Autom Softw Eng,
2011, 18: 263-292
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Mining temporal specifications from object usage&author=Wasylkowski A&author=Zeller A&publication_year=2011&journal=Autom Softw Eng&volume=18&pages=263-292
[38]
Chang R Y, Podgurski A, Yang J. Finding what's not there: a new approach to revealing neglected conditions in software. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, 2007. 163--173.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chang R Y, Podgurski A, Yang J. Finding what's not there: a new approach to revealing neglected conditions in software. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, 2007. 163--173&
[39]
Nguyen T T, Nguyen H A, Pham N H, et al. Graph-based mining of multiple object usage patterns. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2009. 383--392.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Nguyen T T, Nguyen H A, Pham N H, et al. Graph-based mining of multiple object usage patterns. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2009. 383--392&
[40]
Falleri J R, Morandat F, Blanc X, et al. Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, 2014. 313--324.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Falleri J R, Morandat F, Blanc X, et al. Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, 2014. 313--324&
[41]
Sunghun Kim
,
Whitehead
E J,
Yi Zhang
E J.
Classifying Software Changes: Clean or Buggy?.
IIEEE Trans Software Eng,
2008, 34: 181-196
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Classifying Software Changes: Clean or Buggy?&author=Sunghun Kim &author=Whitehead E J&author=Yi Zhang E J&publication_year=2008&journal=IIEEE Trans Software Eng&volume=34&pages=181-196
[42]
Jin
G,
Song
L,
Shi
X.
Understanding and detecting real-world performance bugs.
SIGPLAN Not,
2012, 47: 77-88
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Understanding and detecting real-world performance bugs&author=Jin G&author=Song L&author=Shi X&publication_year=2012&journal=SIGPLAN Not&volume=47&pages=77-88
[43]
Chen Z, Chen B, Xiao L, et al. Speedoo: prioritizing performance optimization opportunities. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 811--821.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chen Z, Chen B, Xiao L, et al. Speedoo: prioritizing performance optimization opportunities. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 811--821&
[44]
Zhou Y and Sharma A. Automated identification of security issues from commit messages and bug reports. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 914--919.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhou Y and Sharma A. Automated identification of security issues from commit messages and bug reports. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 914--919&
[45]
Wei L, Liu Y, Cheung S C. Taming android fragmentation: characterizing and detecting compatibility issues for Android apps. In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016. 226--237.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wei L, Liu Y, Cheung S C. Taming android fragmentation: characterizing and detecting compatibility issues for Android apps. In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016. 226--237&
[46]
Herzig K, Zeller A. The impact of tangled code changes. In: Proceedings of the 2013 10th Working Conference on Mining Software Repositories (MSR), 2013. 121--130.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Herzig K, Zeller A. The impact of tangled code changes. In: Proceedings of the 2013 10th Working Conference on Mining Software Repositories (MSR), 2013. 121--130&
[47]
Dias M, Bacchelli A, Gousios G, et al . Untangling fine-grained code changes. In: Proceedings of the 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015. 341--350.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Dias M, Bacchelli A, Gousios G, et al . Untangling fine-grained code changes. In: Proceedings of the 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015. 341--350&
[48]
Hattori L P, Lanza M. On the nature of commits. In: Proceedings of the 2008 23rd IEEE/ACM International Conference on Automated Software Engineering-Workshops, 2008. 63--71.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hattori L P, Lanza M. On the nature of commits. In: Proceedings of the 2008 23rd IEEE/ACM International Conference on Automated Software Engineering-Workshops, 2008. 63--71&
[49]
Liu H, Liu Q, Staicu C A, et al. Nomen est omen: exploring and exploiting similarities between argument and parameter names. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 1063--1073.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu H, Liu Q, Staicu C A, et al. Nomen est omen: exploring and exploiting similarities between argument and parameter names. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 1063--1073&
[50]
Pradel M, Gross T R. Detecting anomalies in the order of equally-typed method arguments. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis, 2011. 232--242.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Pradel M, Gross T R. Detecting anomalies in the order of equally-typed method arguments. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis, 2011. 232--242&
[51]
Pradel
M,
Gross
T R.
Name-based analysis of equally typed method arguments.
IIEEE Trans Software Eng,
2013, 39: 1127-1143
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Name-based analysis of equally typed method arguments&author=Pradel M&author=Gross T R&publication_year=2013&journal=IIEEE Trans Software Eng&volume=39&pages=1127-1143
[52]
Rice A, Aftandilian E, Jaspan C, et al. Detecting argument selection defects. In: Proceedings of the ACM on Programming Languages, 2017. 104:1--104:22.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rice A, Aftandilian E, Jaspan C, et al. Detecting argument selection defects. In: Proceedings of the ACM on Programming Languages, 2017. 104:1--104:22&
[53]
Williams
C C,
Hollingsworth
J K.
Automatic mining of source code repositories to improve bug finding techniques.
IIEEE Trans Software Eng,
2005, 31: 466-480
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Automatic mining of source code repositories to improve bug finding techniques&author=Williams C C&author=Hollingsworth J K&publication_year=2005&journal=IIEEE Trans Software Eng&volume=31&pages=466-480
[54]
Hovemeyer
D,
Pugh
W.
Finding bugs is easy.
SIGPLAN Not,
2004, 39: 92-106
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Finding bugs is easy&author=Hovemeyer D&author=Pugh W&publication_year=2004&journal=SIGPLAN Not&volume=39&pages=92-106
[55]
Aftandilian E, Sauciuc R, Priya S, et al. Building useful program analysis tools using an extensible Java compiler. In: Proceedings of the 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, 2012. 14--23.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Aftandilian E, Sauciuc R, Priya S, et al. Building useful program analysis tools using an extensible Java compiler. In: Proceedings of the 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, 2012. 14--23&
[56]
Copeland T. PMD Applied. Arexandria, Va, USA: Centennial Books, 2005.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Copeland T. PMD Applied. Arexandria, Va, USA: Centennial Books, 2005&
[57]
Thung
F,
Lucia
F,
Lo
D.
To what extent could we detect field defects? An extended empirical study of false negatives in static bug-finding tools.
Autom Softw Eng,
2015, 22: 561-602
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=To what extent could we detect field defects? An extended empirical study of false negatives in static bug-finding tools&author=Thung F&author=Lucia F&author=Lo D&publication_year=2015&journal=Autom Softw Eng&volume=22&pages=561-602
[58]
Habib A, Pradel M. How many of all bugs do we find? a study of static bug detectors. In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018. 317--328.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Habib A, Pradel M. How many of all bugs do we find? a study of static bug detectors. In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018. 317--328&
[59]
Sabetta A, Bezzi M. A practical approach to the automatic classification of security-relevant commits. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2018. 579--582.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Sabetta A, Bezzi M. A practical approach to the automatic classification of security-relevant commits. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2018. 579--582&
[60]
Xu Z, Chen B, Chandramohan M, et al. SPAIN: Security patch analysis for binaries towards understanding the pain and pills. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 462--472.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Xu Z, Chen B, Chandramohan M, et al. SPAIN: Security patch analysis for binaries towards understanding the pain and pills. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 462--472&
[61]
Pearson S, Campos J, Just R, et al. Evaluating and improving fault localization. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 609--620.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Pearson S, Campos J, Just R, et al. Evaluating and improving fault localization. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 609--620&
[62]
Kawrykow D, and Robillard M P. Non-essential changes in version histories. In: Proceedings of the 2011 33rd International Conference on Software Engineering (ICSE), 2011. 351--360.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Kawrykow D, and Robillard M P. Non-essential changes in version histories. In: Proceedings of the 2011 33rd International Conference on Software Engineering (ICSE), 2011. 351--360&
[63]
Barnett M, Bird C, Brunet J A, et al. Helping developers help themselves: automatic decomposition of code review changesets. In: Proceedings of the 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Florence, 2015. 134--144.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Barnett M, Bird C, Brunet J A, et al. Helping developers help themselves: automatic decomposition of code review changesets. In: Proceedings of the 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Florence, 2015. 134--144&
[64]
Y. Tao and S. Kim, Partitioning composite code changes to facilitate code review. In: Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 2015. 180--190.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Y. Tao and S. Kim, Partitioning composite code changes to facilitate code review. In: Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 2015. 180--190&
[65]
Paletov
R,
Tsankov
P,
Raychev
V.
Inferring crypto API rules from code changes.
SIGPLAN Not,
2018, 53: 450-464
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Inferring crypto API rules from code changes&author=Paletov R&author=Tsankov P&author=Raychev V&publication_year=2018&journal=SIGPLAN Not&volume=53&pages=450-464
[66]
Amann
S,
Nguyen
H A,
Nadi
S.
A systematic evaluation of static API-misuse detectors.
IIEEE Trans Software Eng,
2019, 45: 1170-1188
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A systematic evaluation of static API-misuse detectors&author=Amann S&author=Nguyen H A&author=Nadi S&publication_year=2019&journal=IIEEE Trans Software Eng&volume=45&pages=1170-1188
[67]
Engler
D,
Chen
D Y,
Hallem
S.
Bugs as deviant behavior.
SIGOPS Oper Syst Rev,
2001, 35: 57
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bugs as deviant behavior&author=Engler D&author=Chen D Y&author=Hallem S&publication_year=2001&journal=SIGOPS Oper Syst Rev&volume=35&pages=57
[68]
Eyal Salman
H.
Identification multi-level frequent usage patterns from APIs.
J Syst Software,
2017, 130: 42-56
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Identification multi-level frequent usage patterns from APIs&author=Eyal Salman H&publication_year=2017&journal=J Syst Software&volume=130&pages=42-56
[69]
Xie T, Pei J. MAPO: Mining API usages from open source repositories. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, 2006. 54--57.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Xie T, Pei J. MAPO: Mining API usages from open source repositories. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, 2006. 54--57&
[70]
Kagdi H, Collard M L, Maletic J I. An approach to mining call-usage patternswith syntactic context. In: Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering, 2007. 457--460.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Kagdi H, Collard M L, Maletic J I. An approach to mining call-usage patternswith syntactic context. In: Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering, 2007. 457--460&
[71]
Acharya M, Xie T, Pei J, et al. Mining API patterns as partial orders from source code: from usage scenarios to specifications. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2007. 25--34.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Acharya M, Xie T, Pei J, et al. Mining API patterns as partial orders from source code: from usage scenarios to specifications. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2007. 25--34&
[72]
Gruska N, Wasylkowski A, Zeller A. Learning from 6000 projects: lightweight cross-project anomaly detection. In: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010. 119--130.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gruska N, Wasylkowski A, Zeller A. Learning from 6000 projects: lightweight cross-project anomaly detection. In: Proceedings of the 19th International Symposium on Software Testing and Analysis, 2010. 119--130&
[73]
Thummalapenta S, Xie T. Mining exception-handling rules as sequence association rules. In: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, 2009. 496--506.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Thummalapenta S, Xie T. Mining exception-handling rules as sequence association rules. In: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, 2009. 496--506&
[74]
Wang J, Dang Y, Zhang H, et al. Mining succinct and high-coverage API usage patterns from source code. In: Proceedings of the 2013 10th Working Conference on Mining Software Repositories (MSR), 2013. 319--328.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang J, Dang Y, Zhang H, et al. Mining succinct and high-coverage API usage patterns from source code. In: Proceedings of the 2013 10th Working Conference on Mining Software Repositories (MSR), 2013. 319--328&
[75]
Gu X, Zhang H, Zhang D, et al. Deep API learning. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 631--642.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gu X, Zhang H, Zhang D, et al. Deep API learning. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 631--642&
[76]
Wen M, Liu Y, Wu R, et al. Exposing library API misuses via mutation analysis. In: Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wen M, Liu Y, Wu R, et al. Exposing library API misuses via mutation analysis. In: Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019&
[77]
Mandelin
D,
Xu
L,
Bodík
R.
Jungloid mining.
SIGPLAN Not,
2005, 40: 48
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Jungloid mining&author=Mandelin D&author=Xu L&author=Bodík R&publication_year=2005&journal=SIGPLAN Not&volume=40&pages=48
[78]
Zhong H, Zhang H L, Mei H. Inferring specifications of object oriented APIs from API source code. In: Proceedings of the 2008 15th Asia-Pacific Software Engineering Conference, 2008. 221--228.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhong H, Zhang H L, Mei H. Inferring specifications of object oriented APIs from API source code. In: Proceedings of the 2008 15th Asia-Pacific Software Engineering Conference, 2008. 221--228&
[79]
Buse R P, Weimer W. Synthesizing api usage examples. In: Proceedings of the 2012 34th International Conference on Software Engineering (ICSE), 2012. 782--792.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Buse R P, Weimer W. Synthesizing api usage examples. In: Proceedings of the 2012 34th International Conference on Software Engineering (ICSE), 2012. 782--792&
[80]
Niu
H,
Keivanloo
I,
Zou
Y.
API usage pattern recommendation for software development.
J Syst Software,
2017, 129: 127-139
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=API usage pattern recommendation for software development&author=Niu H&author=Keivanloo I&author=Zou Y&publication_year=2017&journal=J Syst Software&volume=129&pages=127-139
[81]
Wang S, Chollak D, Movshovitz-Attias D, et al. Bugram: bug detection with n-gram language models. In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016. 708--719.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang S, Chollak D, Movshovitz-Attias D, et al. Bugram: bug detection with n-gram language models. In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016. 708--719&
[82]
Murali V, Chaudhuri S, Jermaine C. Bayesian specification learning for finding API usage errors. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 151--162.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Murali V, Chaudhuri S, Jermaine C. Bayesian specification learning for finding API usage errors. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 151--162&
[83]
Murphy-Hill E, Sadowski C, Head A, et al. Discovering API usability problems at scale. In: Proceedings of the 2nd International Workshop on API Usage and Evolution, 2018. 14--17.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Murphy-Hill E, Sadowski C, Head A, et al. Discovering API usability problems at scale. In: Proceedings of the 2nd International Workshop on API Usage and Evolution, 2018. 14--17&
[84]
Uddin G, Dagenais B, Robillard M P. Analyzing temporal API usage patterns. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011. 456--459.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Uddin G, Dagenais B, Robillard M P. Analyzing temporal API usage patterns. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011. 456--459&
[85]
Bruch M, Monperrus M, Mezini M. Learning from examples to improve code completion systems. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2009. 213--222.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bruch M, Monperrus M, Mezini M. Learning from examples to improve code completion systems. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, 2009. 213--222&
[86]
Wang L, Fang L, Wang L, et al. APIExample: an effective web search based usage example recommendation system for Java APIs. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011. 592--595.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang L, Fang L, Wang L, et al. APIExample: an effective web search based usage example recommendation system for Java APIs. In: Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011. 592--595&
[87]
Negara S, Codoban M, Dig D, et al. Mining fine-grained code changes to detect unknown change patterns. In: Proceedings of the 36th International Conference on Software Engineering, 2014. 803--813.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Negara S, Codoban M, Dig D, et al. Mining fine-grained code changes to detect unknown change patterns. In: Proceedings of the 36th International Conference on Software Engineering, 2014. 803--813&
[88]
Meng
N,
Kim
M,
McKinley
K S.
Systematic editing.
SIGPLAN Not,
2011, 46: 329
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Systematic editing&author=Meng N&author=Kim M&author=McKinley K S&publication_year=2011&journal=SIGPLAN Not&volume=46&pages=329
[89]
Meng N, Kim M, McKinley K S. LASE: locating and applying systematic edits by learning from examples. In: Proceedings of the 2013 35th International Conference on Software Engineering (ICSE), 2013. 502--511.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Meng N, Kim M, McKinley K S. LASE: locating and applying systematic edits by learning from examples. In: Proceedings of the 2013 35th International Conference on Software Engineering (ICSE), 2013. 502--511&
[90]
Rolim R, Soares G, D'Antoni L, et al. Learning syntactic program transformations from examples. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 404--415.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rolim R, Soares G, D'Antoni L, et al. Learning syntactic program transformations from examples. In: Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 404--415&
[91]
Kim D, Nam J, Song J, et al. Automatic patch generation learned from human-written patches. In: Proceedings of the 2013 35th International Conference on Software Engineering (ICSE), 2013. 802--811.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Kim D, Nam J, Song J, et al. Automatic patch generation learned from human-written patches. In: Proceedings of the 2013 35th International Conference on Software Engineering (ICSE), 2013. 802--811&
[92]
Long F, Amidon P, Rinard M. Automatic inference of code transforms for patch generation. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 727--739.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Long F, Amidon P, Rinard M. Automatic inference of code transforms for patch generation. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 727--739&
[93]
Liu X, Zhong H. Mining stackoverflow for program repair. In: Proceedings of the 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018. 118--129.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu X, Zhong H. Mining stackoverflow for program repair. In: Proceedings of the 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018. 118--129&
[94]
Roychoudhury
A,
Xiong
Y.
Automated program repair: a step towards software automation.
Sci China Inf Sci,
2019, 62: 200103
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Automated program repair: a step towards software automation&author=Roychoudhury A&author=Xiong Y&publication_year=2019&journal=Sci China Inf Sci&volume=62&pages=200103
[95]
Brown D B, Vaughn M, Liblit B, et al. The care and feeding of wild-caught mutants. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 511--522.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Brown D B, Vaughn M, Liblit B, et al. The care and feeding of wild-caught mutants. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017. 511--522&
[96]
Monperrus
M,
Eichberg
M,
Tekes
E.
What should developers be aware of? An empirical study on the directives of API documentation.
Empir Software Eng,
2012, 17: 703-737
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=What should developers be aware of? An empirical study on the directives of API documentation&author=Monperrus M&author=Eichberg M&author=Tekes E&publication_year=2012&journal=Empir Software Eng&volume=17&pages=703-737
[97]
Dekel U, Herbsleb J D. Improving API documentation usability with knowledge pushing. In: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, 2009. 320--330.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Dekel U, Herbsleb J D. Improving API documentation usability with knowledge pushing. In: Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, 2009. 320--330&
[98]
Saied M A, Sahraoui H, Dufour B. An observational study on API usage constraints and their documentation. In: 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015. 33--42.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Saied M A, Sahraoui H, Dufour B. An observational study on API usage constraints and their documentation. In: 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015. 33--42&
[99]
Zhou Y, Gu R, Chen T, et al. Analyzing apis documentation and code to detect directive defects. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 27--37.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhou Y, Gu R, Chen T, et al. Analyzing apis documentation and code to detect directive defects. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017. 27--37&
[100]
Wu W, Guéhéneuc Y G, Antoniol G, et al. AURA: a hybrid approach to identify framework evolution. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1, 2010. 325--334.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wu W, Guéhéneuc Y G, Antoniol G, et al. AURA: a hybrid approach to identify framework evolution. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1, 2010. 325--334&
[101]
Dagenais
B,
Robillard
M P.
Recommending adaptive changes for framework evolution.
ACM Trans Softw Eng Methodol,
2011, 20: 1-35
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Recommending adaptive changes for framework evolution&author=Dagenais B&author=Robillard M P&publication_year=2011&journal=ACM Trans Softw Eng Methodol&volume=20&pages=1-35