WebAssembly has is renowned for its efficiency and security in browser
e...
As all software, blockchain nodes are exposed to faults in their underly...
Software bills of materials (SBOM) promise to become the backbone of sof...
Modern software systems rely on a multitude of third-party dependencies....
Test doubles, such as mocks and stubs, are nifty fixtures in unit tests....
WebAssembly is a binary format that has become an essential component of...
Mocking in the context of automated software tests allows testing progra...
Rickrolling is an Internet cultural phenomenon born in the mid 2000s.
Or...
The rise of blockchain technologies has triggered tremendous research
in...
The highly parallel workflows of modern software development have made
m...
GraphQL is a new paradigm to design web APIs. Despite its growing popula...
Modern software deployment process produces software that is uniform and...
Despite its obvious benefits, the increased adoption of package managers...
The Ethereum blockchain is the operational backbone of major decentraliz...
This paper explores the use of relational symbolic execution to counter
...
Edge-cloud computing offloads parts of the computations that traditional...
We study the evolution and impact of bloated dependencies in a single
so...
JSON is a popular file and data format that is precisely specified by th...
Software engineering researchers look for software artifacts to study th...
Software bugs are common and correcting them accounts for a significant ...
Software testing ensures that a software system behaves as intended. In ...
The automatic interpretation of sign languages is a challenging task, as...
Software bloat is code that is packaged in an application but is actuall...
The adoption of WebAssembly has rapidly increased in the last few years ...
Modern software deployment process produces software that is uniform, an...
In this paper, we present a novel fault injection framework called Phoeb...
During compilation from Java source code to bytecode, some information i...
Motivated by the fast adoption of WebAssembly, we propose the first
func...
Build automation tools and package managers have a profound influence on...
Docker is a virtualization technique heavily used in industry to build
c...
Repairnator is a bot. It constantly monitors software bugs discovered du...
The comparison and alignment of runtime traces are essential, e.g., for
...
An extreme transformation removes the body of a method that is reached b...
This paper addresses the following question: does a small, essential, co...
During compilation from Java source code to bytecode, some information i...
In this paper, we present a novel fault injection system called ChaosOrc...
With this paper, we survey the research performed in the domain of brows...
Maven artifacts are immutable: an artifact that is uploaded on Maven Cen...
When a developer pushes a change to an application's codebase, in the fo...
The Maven Central Repository provides an extraordinary source of data to...
Neutral program variants are functionally similar to an original program...
This report documents the program and the outcomes of Dagstuhl Seminar 1...
In the literature, there is a rather clear segregation between manually
...
Descartes is a tool that implements extreme mutation operators and aims ...
Repairnator is a bot. It constantly monitors software bugs discovered du...
Pseudo-tested methods are defined as follows: they are covered by the te...
Software systems contain resilience code to handle those failures and
un...
Many approaches for testing configurable software systems start from the...