skip to main content
10.1145/3551349acmotherconferencesBook PagePublication PagesaseConference Proceedingsconference-collections
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering Rochester MI USA October 10 - 14, 2022
ISBN:
978-1-4503-9475-8
Published:
05 January 2023

Reflects downloads up to 01 Nov 2024Bibliometrics
SESSION: Doctoral Symposium
research-article
Open Access
A Framework for Testing Chemical Reaction Networks
Article No.: 117, Pages 1–5https://doi.org/10.1145/3551349.3559562

The use of non-traditional computing devices is growing rapidly. One paradigm of interest is chemical reaction networks (CRNs) which can model and use chemical interactions for computation. These CRNs are used to develop programs at the nanoscale for ...

short-paper
A model for automatic generating reusable code from multiple GUIs
Article No.: 118, Pages 1–3https://doi.org/10.1145/3551349.3559563

In the context of user interface-oriented software development, the task of translating a GUI into code requires sufficient knowledge to identify visual elements and how to code it for one or more platforms. In addition, other issues are important, ...

short-paper
Open Access
Assessment of Automated (Intelligent) Toolchains
Article No.: 119, Pages 1–3https://doi.org/10.1145/3551349.3559572

[Background:] Automated Intelligent Toolchains, which are a composition of different tools that use AI or static analysis, are widely used in software engineering to deploy automated program repair techniques, or in software security to identify ...

research-article
Call Graph Evolution Analytics over a Version Series of an Evolving Software System
Article No.: 120, Pages 1–5https://doi.org/10.1145/3551349.3559573

Software evolution analytics can be supported by generating and comparing call graph evolution information over versions of a software system. Call Graph evolution analytics can assist a software engineer when maintaining or evolving a software system. ...

short-paper
Coverage-based Greybox Fuzzing with Pointer Monitoring for C Programs
Article No.: 121, Pages 1–4https://doi.org/10.1145/3551349.3559566

C has been regarded as a dominant programming language for system software implementation. Meanwhile, it often suffers from various memory vulnerabilities due to its low-level memory control. Quite massive approaches are proposed to enhance memory ...

short-paper
Extraction and Management of Rationale
Article No.: 122, Pages 1–3https://doi.org/10.1145/3551349.3559568

Software developers often have to make many design decisions. The underlying logic behind these decisions, also called design rationale, represents beneficial and valuable information. In the past, researchers have tried to automatically extract and ...

research-article
Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities
Article No.: 123, Pages 1–5https://doi.org/10.1145/3551349.3559571

Contemporary software development organizations are dominated by straight males and lack diversity. As a result, people from other demographic such as women and LGBTQ+ often encounter bias, sexism, and misogyny. Due to negative experiences, many women ...

research-article
Identification and Mitigation of Toxic Communications Among Open Source Software Developers
Article No.: 124, Pages 1–5https://doi.org/10.1145/3551349.3559570

Toxic and unhealthy conversations during the developer’s communication may reduce the professional harmony and productivity of Free and Open Source Software (FOSS) projects. For example, toxic code review comments may raise pushback from an author to ...

short-paper
Leveraging Artificial Intelligence on Binary Code Comprehension
Article No.: 125, Pages 1–3https://doi.org/10.1145/3551349.3559564

Understanding binary code is an essential but complex software engineering task for reverse engineering, malware analysis, and compiler optimization. Unlike source code, binary code has limited semantic information, which makes it challenging for human ...

research-article
Open Access
Towards a Live Environment for Code Refactoring
Article No.: 126, Pages 1–5https://doi.org/10.1145/3551349.3559569

Refactoring code manually can be complex. Several refactoring tools were developed to mitigate the effort needed to create more readable, adaptable, and maintainable code. However, most of them continue to provide late feedback, assistance, and support ...

research-article
Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts
Article No.: 127, Pages 1–5https://doi.org/10.1145/3551349.3559567

The growth in the popularity of smart contracts has been accompanied by a rise in security attacks targeting smart contracts, which have led to financial losses of millions of dollars and erosion of trust. To enable developers discover vulnerabilities ...

research-article
Public Access
Towards Improving Code Review Effectiveness Through Task Automation
Article No.: 128, Pages 1–5https://doi.org/10.1145/3551349.3559565

Modern code review (MCR) is a widely adopted software quality assurance practice in the contemporary software industry. As software developers spend significant amounts of time on MCR activities, even a small improvement in MCR effectiveness will incur ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 82 of 337 submissions, 24%
YearSubmittedAcceptedRate
ASE '143378224%
Overall3378224%