Blogs (1) >>
ASE 2019
Sun 10 - Fri 15 November 2019 San Diego, California, United States

It has been long suggested that commit messages can greatly facilitate code comprehension. However, developers may not write good commit messages in practice. Neural machine translation (NMT) has been suggested to automatically generate commit messages. Despite the efforts in improve NMT algorithms, the quality of the generated commit messages is not yet satisfactory. This paper, instead of improving NMT algorithms, suggests that proper preprocessing of code changes into concise inputs is quite critical to train NMT. We approach it with semantic analysis of code changes. We collect a real-world dataset with 50k+ commits of popular Java projects, and verify our idea with comprehensive experiments. The results show that preprocessing inputs with code semantic analysis can improve NMT significantly. This work sheds light to how to apply existing DNNs designed by the machine learning community, e.g., NMT models, to complete software engineering tasks.

Tue 12 Nov

ase-2019-Student-Research-Competition
15:20 - 16:00: Student Research Competition - Poster Session: Student Research Competition at Kensington Ballroom
ase-2019-Student-Research-Competition15:20 - 16:00
Boosting Neural Commit Message Generation with Code Semantic Analysis
Shuyao JiangFudan University
ase-2019-Student-Research-Competition15:20 - 16:00
Toward Practical Automatic Program Repair
Ali GhanbariThe University of Texas at Dallas
ase-2019-Student-Research-Competition15:20 - 16:00
An Image-inspired and CNN-based Android Malware Detection Approach
Shao YangCase Western Reserve University
ase-2019-Student-Research-Competition15:20 - 16:00
An Approach for Investigating Emotion Dynamics in Software Development
Krishna NeupaneRochester Institute of Technology
ase-2019-Student-Research-Competition15:20 - 16:00
A Machine Learning based Approach to Identify SQL Injection Vulnerabilities
Kevin ZhangWayne State University
ase-2019-Student-Research-Competition15:20 - 16:00
Retrieve and Refine: Exemplar-based Neural Comment Generation
Bolin WeiPeking University
ase-2019-Student-Research-Competition15:20 - 16:00
Verifying Determinism in Sequential Programs
Rashmi MudduluruUniversity of Washington, Seattle
ase-2019-Student-Research-Competition15:20 - 16:00
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications
Krishna Murthy Kattiyan RamamoorthySan Diego State University
ase-2019-Student-Research-Competition15:20 - 16:00
Empirical Study of Python Call Graph
Li YuNanjing University
ase-2019-Student-Research-Competition15:20 - 16:00
Towards Comprehensible Representation of Controllers using Machine Learning
Gargi BalasubramaniamBirla Institute of Technology and Science, Pilani, K K Birla Goa Campus
ase-2019-Student-Research-Competition15:20 - 16:00
API Design Implications of Boilerplate Client Code
Daye NamCarnegie Mellon University
ase-2019-Student-Research-Competition15:20 - 16:00
Compile-time detection of machine image sniping
Martin KelloggUniversity of Washington, Seattle
ase-2019-Student-Research-Competition15:20 - 16:00
Crowdsourced Report Generation via Bug Screenshot Understanding
Shengcheng YuNanjing University, China

Wed 13 Nov

ase-2019-Student-Research-Competition
13:40 - 15:20: Student Research Competition - Student Research Competition - Selected Presentations (Undergraduate) at South Park
Chair(s): Jie M. ZhangUniversity College London, UK, Jin L.C. GuoMcGill University
ase-2019-Student-Research-Competition13:40 - 13:55
Crowdsourced Report Generation via Bug Screenshot Understanding
Shengcheng YuNanjing University, China
ase-2019-Student-Research-Competition13:55 - 14:10
Towards Comprehensible Representation of Controllers using Machine Learning
Gargi BalasubramaniamBirla Institute of Technology and Science, Pilani, K K Birla Goa Campus
ase-2019-Student-Research-Competition14:10 - 14:25
Empirical Study of Python Call Graph
Li YuNanjing University
ase-2019-Student-Research-Competition14:25 - 14:40
A Machine Learning based Approach to Identify SQL Injection Vulnerabilities
Kevin ZhangWayne State University
ase-2019-Student-Research-Competition14:40 - 14:55
Boosting Neural Commit Message Generation with Code Semantic Analysis
Shuyao JiangFudan University