Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

A survey of performance optimization for mobile applications

M Hort, M Kechagia, F Sarro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To ensure user satisfaction and success of mobile applications, it is important to provide
highly performant applications. This is particularly important for resource-constrained …

What do concurrency developers ask about? a large-scale study using stack overflow

S Ahmed, M Bagherzadeh - Proceedings of the 12th ACM/IEEE …, 2018 - dl.acm.org
Background Software developers are increasingly required to write concurrent code.
However, most developers find concurrent programming difficult. To better help developers …

Are static analysis violations really fixed? a closer look at realistic usage of sonarqube

D Marcilio, R Bonifácio, E Monteiro… - 2019 IEEE/ACM 27th …, 2019 - ieeexplore.ieee.org
The use of automatic static analysis tools (ASATs) has gained increasing attention in the last
few years. Even though available research have already explored ASATs issues and how …

An empirical study of refactorings and technical debt in machine learning systems

Y Tang, R Khatchadourian… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Machine Learning (ML), including Deep Learning (DL), systems, ie, those with ML
capabilities, are pervasive in today's data-driven society. Such systems are complex; they …

Graph-based mining of in-the-wild, fine-grained, semantic code change patterns

HA Nguyen, TN Nguyen, D Dig… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Prior research exploited the repetitiveness of code changes to enable several tasks such as
code completion, bug-fix recommendation, library adaption, etc. These and other novel …

A comprehensive study of real-world numerical bug characteristics

A Di Franco, H Guo… - 2017 32nd IEEE/ACM …, 2017 - ieeexplore.ieee.org
Numerical software is used in a wide variety of applications including safety-critical systems,
which have stringent correctness requirements, and whose failures have catastrophic …

Efficiently manifesting asynchronous programming errors in android apps

L Fan, T Su, S Chen, G Meng, Y Liu, L Xu… - Proceedings of the 33rd …, 2018 - dl.acm.org
Android, the# 1 mobile app framework, enforces the single-GUI-thread model, in which a
single UI thread manages GUI rendering and event dispatching. Due to this model, it is vital …

Android security assessment: A review, taxonomy and research gap study

S Garg, N Baliyan - Computers & Security, 2021 - Elsevier
Security threats are escalating exponentially posing a serious challenge to mobile platforms,
specifically Android. In recent years the number of attacks has not only increased but each …

An exploratory study on the refactoring of unit test files in android applications

A Peruma, CD Newman, MW Mkaouer, A Ouni… - Proceedings of the …, 2020 - dl.acm.org
An essential activity of software maintenance is the refactoring of source code. Refactoring
operations enable developers to take necessary actions to correct bad programming …