


default search action
Automated Software Engineering, Volume 28
Volume 28, Number 1, May 2021
- Rafi Almhana, Marouane Kessentini:
Considering dependencies between bug reports to improve bugs triage. 1 - Mohammadali Gharaat, Mohammadreza Sharbaf, Bahman Zamani, Abdelwahab Hamou-Lhadj
:
ALBA: a model-driven framework for the automatic generation of android location-based apps. 2 - Daniel Honsel
, Verena Herbold
, Stephan Waack, Jens Grabowski:
Investigation and prediction of open source software evolution using automated parameter mining for agent-based simulation. 3
Volume 28, Number 2, November 2021
- Chaima Abid, Vahid Alizadeh
, Marouane Kessentini, Mouna Dhaouadi, Rick Kazman:
Prioritizing refactorings for security-critical code. 4 - Yi Wang
, David F. Redmiles
:
IIAG: a data-driven and theory-inspired approach for advising how to interact with new remote collaborators in OSS teams. 5 - Benoît Verhaeghe
, Nicolas Anquetil, Anne Etien
, Stéphane Ducasse, Abderrahmane Seriai, Mustapha Derras:
GUI visual aspect migration: a framework agnostic solution. 6 - Mohammad Derakhshandi, Shekoufeh Kolahdouz Rahimi
, Javier Troya, Kevin Lano:
A model-driven framework for developing android-based classic multiplayer 2D board games. 7 - Sangeeta, Sitender
, Kapil Sharma, Manju Bala
:
New failure rate model for iterative software development life cycle process. 9 - Pingfan Kong, Li Li
, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein
:
ANCHOR: locating android framework-specific crashing faults. 10 - Aftab Ali, Naveed Khan, Mamun I. Abu-Tair, Joost Noppen, Sally I. McClean, Ian R. McChesney:
Discriminating features-based cost-sensitive approach for software defect prediction. 11 - Baber Majid Bhatti
, Sameera Mubarak, Sev V. Nagalingam
:
Information security implications of using NLP in IT outsourcing: a Diffusion of Innovation theory perspective. 12 - Fariha Ashfaq
, Imran Sarwar Bajwa
:
Natural language ambiguity resolution by intelligent semantic annotation of software requirements. 13 - Somya Goyal
:
Predicting the Defects using Stacked Ensemble Learner with Filtered Dataset. 14 - Sebastian Nielebock
, Robert Heumüller
, Kevin Michael Schott, Frank Ortmeier
:
Guided pattern mining for API misuse detection by change-based code analysis. 15 - R. Dhaya, Kanthavel Radhakrishnan:
Cloud - based multiple importance sampling algorithm with AI based CNN classifier for secure infrastructure. 16 - M. Karthikeyan
, T. S. Subashini
, R. Jebakumar
:
SSD based waste separation in smart garbage using augmented clustering NMS. 17 - Jongwook Jeong
, Neunghoe Kim
:
Does sentiment help requirement engineering: exploring sentiments in user comments to discover informative comments. 18 - D. Selvapandian, R. Santhosh
:
Deep learning approach for intrusion detection in IoT-multi cloud environment. 19 - Mabrouka Chouchane, Makram Soui, Khaled Ghédira:
The impact of the code smells of the presentation layer on the diffuseness of aesthetic defects of Android apps. 20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.