Tao Xie - Selected Publications


ASEHow does our research work impact software industry?

>>> Full List of Publications by Years

Publications by Research Categories   Publications by Types 
Google Scholar Citations, Semantic Scholar, DBLP, Microsoft Academic Search, Arnetminer, ACM Author

Selected Publications in Major Conferences

12 ICSE papers (+4 SEIP Papers + 3 Education Papers), 9 FSE papers (+ 4 Industry Papers), 5 ISSTA papers, 1 OOPSLA paper, 2 ECOOP papers, 14 ASE papers, 1 VL/HCC paper

1 SIGMETRICS paper, 3 WWW papers, 2 USENIX Security, 1 ASPLOS paper, 2 DSN papers, 1 USENIX ATC paper


ICSE (12)

[ICSE 2016PRADA: Prioritizing Android Devices for Apps by Mining Large-Scale Usage Data
[ICSE 2015] AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Contexts
[ICSE 2012] Inferring Method Specifications from Natural Language API Descriptions
[ICSE 2012] Performance Debugging in the Large via Mining Millions of Stack Traces
[ICSE 2011] Precise Identification of Problems for Structural Test Generation
[ICSE 2010] Mining API Mapping for Language Migration
[ICSE 2010] Is Operator-Based Mutant Selection Superior to Random Mutant Selection?
[ICSE 2009] Mining Exception-Handling Rules as Conditional Association Rules
[ICSE 2009] Locating Need-to-Translate Constant Strings for Software Internationalization
[ICSE 2008] An Approach to Detecting Duplicate Bug Reports using Natural Language and Execution Information
[ICSE 2007]
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
[ICSE 2005] Helping Users Avoid Bugs in GUI Applications

ICSE Software Engineering in Practice (SEIP) Track (4)

[ICSE 2017 SEIPAutomated Test Input Generation for Android: Towards Getting There in an Industrial Case
[ICSE 2017 SEIPTransferring Code-Clone Detection and Analysis to Practice
[ICSE 2014 SEIP] Where Do Developers Log? An Empirical Study on Logging Practices in Industry
[ICSE 2013 SEIP] A Characteristic Study on Failures of Production Distributed Data-Parallel Programs IEEE Software Best Software Engineering in Practice (SEIP) Paper Award

ICSE Education Track (3)

[ICSE 2016 SEETMeasuring Code Behavioral Similarity for Programming and Software Engineering Education
[ICSE 2015 JSEET] Code Hunt: Experience with Coding Contests at Scale
[ICSE 2013 SEE] Teaching and Learning Programming and Software Engineering via Interactive Gaming

FSE (9)

[FSE 2016] Relationship-Aware Code Search for JavaScript Frameworks
[ESEC/FSE 2013] Inferring Project-Specific Bug Patterns for Detecting Sibling Bugs
[FSE 2012] Automated Extraction of Security Policies from Natural-Language Software Documents
[FSE 2012] How Do Software Engineers Understand Code Changes? An Exploratory Study in Industry
[FSE 2012] Automating Presentation Changes in Dynamic Web Applications via Collaborative Hybrid Analysis
[ESEC/FSE 2011] Testing Software In Age Of Data Privacy: A Balancing Act
[FSE 2010]           Locating Need-to-Translate Constant Strings in Web Applications 
[ESEC/FSE 2009] MSeqGen: Object-Oriented Unit-Test Generation via Mining Source Code
[ESEC/FSE 2007] Mining API Patterns as Partial Orders from Source Code: From Usage Scenarios to Specifications 

FSE Industry Track

[ESEC/FSE 2017 IndustryRecord and Replay for Android: Are We There Yet in Industrial Cases?
[ESEC/FSE 2017 Industry] When Program Analysis Meets Mobile Security: An Industrial Study of Misusing Android Internet Sockets
[FSE 2016 Industry] Automated Test Input Generation for Android: Are We Really There Yet in an Industrial Case?
[FSE 2016 Industry] Learning for Test Prioritization: An Industrial Case Study

ISSTA (5)

[ISSTA 2017PerfRanker: Prioritization of Performance Regression Tests for Collection-Intensive Software
[ISSTA 2013] Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks
[ISSTA 2011] eXpress: Guided Path Exploration for Efficient Regression Test Generation
[ISSTA 2010] OCAT: Object Capture-based Automated Testing
[ISSTA 2009] Time-Aware Test-Case Prioritization using Integer Linear Programming

OOPSLA (1)

[OOPSLA 2011] Synthesizing Method Sequences for High-Coverage Testing 

ECOOP (2)

[ECOOP 2009] MAPO: Mining and Recommending API Usage Patterns
[ECOOP 2006] Augmenting Automatically Generated Unit-Test Suites with Regression Oracle Checking

ASE (14)

[ASE 2014 EP] Transferring an Automated Test Generation Tool to Practice: From Pex to Fakes and Code Digger
[ASE 2013] Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution
[ASE 2013 EP] Software Analytics for Incident Management of Online Services: An Experience Report
[ASE 2011] Generating Program Inputs for Database Application Testing
[ASE 2011] Iterative Mining of Resource-Releasing Specifications
[ASE 2010] Automatic Construction of an Effective Training Set for Prioritizing Static Analysis Warnings
[ASE 2009] Inferring Resource Specifications from Natural Language API Documentation Best Paper Award and ACM SIGSOFT Distinguished Paper Award
[ASE 2009] Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
[ASE 2008] SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web
[ASE 2008] Improving Structural Testing of Object-Oriented Programs via Integrating Evolutionary Testing and Symbolic Execution
[ASE 2007] PARSEWeb: A Programmer Assistant for Reusing Open Source Code on the Web
[ASE 2006] An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing
[ASE 2004] Rostra: A Framework for Detecting Redundant Object-Oriented Unit Tests
[ASE 2003] Tool-Assisted Unit Test Selection Based on Operational Violations

VL/HCC (1)

[VL/HCC 2013] A Comprehensive Field Study of End-User Programming on Mobile Devices

SIGMETRICS (1)

[SIGMETRICS 2008] XEngine: A Fast and Scalable XACML Policy Evaluation Engine

WWW (3)

[WWW 2015] Measurement and Analysis of Mobile Web Cache Performance
[WWW 2013] Inferring Dependency Constraints on Parameters for Web Services
[WWW 2007] A Fault Model and Mutation Testing of Access Control Policies

USENIX Security (2)

[USENIX Security 2013] WHYPER: Towards Automating Risk Assessment of Mobile Applications
[USENIX Security 2013] MetaSymploit: Day-One Defense Against Script-based Attacks with Security-Enhanced Symbolic Analysis

ASPLOS (1)

[ASPLOS 2014] Comprehending Performance from Real-World Execution Traces: A Device-Driver Case

DSN (2)

[DSN 2014] Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems
[
DSN 2009] Fitness-Guided PathExploration in Dynamic Symbolic Execution

USENIX ATC (1)

[USENIX ATC 2015] Log2: A Cost-Aware Logging Mechanism for Performance Diagnosis



Selected Publications of Current/Past Students from the ASE Group

Past Students