


default search action
Empirical Software Engineering, Volume 30
Volume 30, Number 1, February 2025
- Khaled Sellami
, Mohamed Aymen Saied
:
Extracting microservices from monolithic systems using deep reinforcement learning. 1 - Michael Dorner
, Daniel Méndez, Krzysztof Wnuk, Ehsan Zabardast
, Jacek Czerwonka:
The upper bound of information diffusion in code review. 2 - Jaemin Hong
, Sukyoung Ryu
:
Type-migrating C-to-Rust translation using a large language model. 3 - Umme Ayman Koana, Quang Hy Le, Shaikur Raman, Chris Carlson, Francis Chew, Maleknaz Nayebi
:
Correction to: Examining ownership models in software teams. 4 - Chao Tan
, Razieh Behjati, Erik Arisholm:
Application of deep learning models to generate rich, dynamic and production-like test data. 5 - Hao Li
, Cor-Paul Bezemer:
Bridging the language gap: an empirical study of bindings for open source machine learning libraries across software package ecosystems. 6 - Cristina Improta
, Pietro Liguori
, Roberto Natella
, Bojan Cukic
, Domenico Cotroneo
:
Enhancing robustness of AI offensive code generators via data augmentation. 7 - Ricardo de Sousa Job, André C. Hora
:
How and why developers implement OS-specific tests. 8 - Fiorella Zampetti
, Cyrine Zid, Giuliano Antoniol, Massimiliano Di Penta:
The downside of functional constructs: a quantitative and qualitative analysis of their fix-inducing effects. 9 - Sebastián Pizard
, Joaquín Lezama, Rodrigo García, Diego Vallespir
, Barbara A. Kitchenham
:
Using rapid reviews to support software engineering practice: a systematic review and a replication study. 10 - Shishuai Yang, Qinsheng Hou, Shuang Li, Fenghao Xu, Wenrui Diao
:
From guidelines to practice: assessing Android app developer compliance with google's security recommendations. 11 - Monoshiz Mahbub Khan
, Zhe Yu:
Approaching code search for python as a translation retrieval problem with dual encoders. 12 - Hanying Shao, Zishuo Ding, Weiyi Shang, Jinqiu Yang, Nikolaos Tsantalis:
Towards effectively testing machine translation systems from white-box perspectives. 13 - Yijian Wu
, Yuan Chen, Xin Peng, Bin Hu, Xiaochen Wang, Baiqiang Fu, Wenyun Zhao:
CloneRipples: predicting change propagation between code clone instances by graph-based deep learning. 14 - Belinda Schantong
, Norbert Siegmund, Janet Siegmund:
Toward a theory on programmer's block inspired by writer's block. 15 - Jonas Eberlein, Daniel Rodríguez
, Rachel Harrison
:
The effect of data complexity on classifier performance. 16 - Flávia Coelho
, Nikolaos Tsantalis, Tiago Massoni
, Everton L. G. Alves:
A qualitative study on refactorings induced by code review. 17 - Umm-e-Habiba
, Mohammad Kasra Habib
, Justus Bogner
, Jonas Fritzsch
, Stefan Wagner
:
How do ML practitioners perceive explainability? an interview study of practices and challenges. 18 - Luca Giamattei
, Matteo Biagiola
, Roberto Pietrantuono
, Stefano Russo
, Paolo Tonella
:
Reinforcement learning for online testing of autonomous driving systems: a replication and extension study. 19 - Yijun Shen, Xiang Gao, Hailong Sun, Yu Guo:
Understanding vulnerabilities in software supply chains. 20 - Weidong Wang
, Dian Li, Yujian Kang, Yang Zhao:
An intelligent java method name recommendation framework via two-phase neural networks. 21 - Daniel Blackwell
, Ingolf Becker, David Clark
:
Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer. 22 - Mehil B. Shah
, Mohammad Masudur Rahman
, Foutse Khomh
:
Towards enhancing the reproducibility of deep learning bugs: an empirical study. 23 - Lanxin Yang
, Bohan Liu, Junyu Jia, Jinwei Xu, Junming Xue, He Zhang, Alberto Bacchelli:
Prioritizing code review requests to improve review efficiency: a simulation study. 24 - Annalí Casanueva Artís, Davide Rossi
, Stefano Zacchiroli
, Théo Zimmermann
:
The impact of the COVID-19 pandemic on women's contribution to public code. 25 - Lev Sorokin
, Damir Safin, Shiva Nejati:
Can search-based testing with pareto optimization effectively cover failure-revealing test inputs? 26 - Luana Almeida Martins, Valeria Pontillo
, Heitor A. X. Costa, Filomena Ferrucci, Fabio Palomba, Ivan do Carmo Machado
:
Test code refactoring unveiled: where and how does it affect test code quality and effectiveness? 27 - Junda He, Bowen Xu, Zhou Yang, DongGyun Han, Chengran Yang, Jiakun Liu, Zhipeng Zhao, David Lo
:
PTM4Tag+: Tag recommendation of stack overflow posts with pre-trained models. 28 - Julian Frattini
, Davide Fucci
, Richard Torkar
, Lloyd Montgomery
, Michael Unterkalmsteiner
, Jannik Fischbach
, Daniel Méndez
:
Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment. 29 - James Caddy
, Christoph Treude, Markus Wagner, Earl T. Barr:
The role of surprisal in issue trackers. 30 - Taiming Wang
, Yuxia Zhang, Lin Jiang, Yi Tang, Guangjie Li, Hui Liu:
Deep learning based identification of inconsistent method names: How far are we? 31 - Zihan Sha
, Chao Zhang, Hao Wang, Zeyu Gao, Bolun Zhang, Yang Lan, Hui Shu:
PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models. 32 - Emad Fallahzadeh
, Peter C. Rigby
, Bram Adams
:
Contrasting test selection, prioritization, and batch testing at scale. 33 - Alina Mailach
, Dominik Gorgosch, Norbert Siegmund, Janet Siegmund:
"Ok Pal, we have to code that now": interaction patterns of programming beginners with a conversational chatbot. 34 - Povilas Godliauskas
, Darja Smite
:
The well-being of software engineers: a systematic literature review and a theory. 35 - Xunzhu Tang, Haoye Tian
, Pingfan Kong, Saad Ezzini, Kui Liu, Xin Xia, Jacques Klein, Tegawendé F. Bissyandé:
Correction to: App review driven collaborative bug finding. 36 - Xin Zhou
, DongGyun Han, David Lo
:
Bridging expert knowledge with deep learning techniques for just-in-time defect prediction. 37 - Xueqi Yang
, Mariusz Jakubowski, Li Kang, Haojie Yu, Tim Menzies
:
SparseCoder: Advancing source code analysis with sparse attention and learned token pruning. 38 - Paulina Stevia Nouwou Mindom, Amin Nikanjam, Foutse Khomh:
Harnessing pre-trained generalist agents for software engineering tasks. 39 - Elçin Yenisen Yavuz, Dirk Riehle
, Ankita Mehrotra:
Why do companies create and how do they succeed with a vendor-led open source foundation. 40
Volume 30, Number 2, March 2025
- Deepika Badampudi
, Muhammad Usman, Xingru Chen:
Large scale reuse of microservices using CI/CD and InnerSource practices - a case study. 41 - Dhanushka Jayasuriya
, Samuel Ou
, Saakshi Hegde, Valerio Terragni
, Jens Dietrich
, Kelly Blincoe
:
An extended study of syntactic breaking changes in the wild. 42 - Anders Sundelin
, Javier Gonzalez-Huerta
, Richard Torkar
, Krzysztof Wnuk
:
Governing the commons: code ownership and code-clones in large-scale software development. 43 - Sangwon Hyun
, Eunkyoung Jee, Doo-Hwan Bae:
Collaboration failure analysis in cyber-physical system-of-systems using context fuzzy clustering. 44 - Sungmin Kang
, Bei Chen, Shin Yoo, Jian-Guang Lou:
Explainable automated debugging via large language model-driven scientific debugging. 45 - Shamsa Abid
, Xuemeng Cai, Lingxiao Jiang
:
Measuring model alignment for code clone detection using causal interpretation. 46 - Norbert Tihanyi
, Tamás Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro:
How secure is AI-generated code: a large-scale comparison of large language models. 47 - Mahdi Saeedi Nikoo
, Sangeeth Kochanthara, Önder Babur
, Mark van den Brand
:
An empirical study of business process models and model clones on GitHub. 48 - Zihan Sha
, Yang Lan, Chao Zhang, Hao Wang, Zeyu Gao, Bolun Zhang, Hui Shu:
OpTrans: enhancing binary code similarity detection with function inlining re-optimization. 49 - Zibin Zheng, Kaiwen Ning, Qingyuan Zhong, Jiachi Chen, Wenqing Chen, Lianghong Guo, Weicheng Wang, Yanlin Wang:
Towards an understanding of large language models in software engineering tasks. 50 - Divya M. Kamath
, Bram Adams, Ahmed E. Hassan:
Lightweight dynamic build batching algorithms for continuous integration. 51 - Enrico Fregnan, Fernando Petrulio, Linda Di Geronimo, Alberto Bacchelli:
Correction to: A preliminary investigation on using multi-task learning to predict change performance in code reviews. 52 - Nicole Davila
, Ingrid Nunes
, Igor Wiese
:
A fine-grained taxonomy of code review feedback in TypeScript projects. 53 - Nathan Cassee
, Neil A. Ernst
, Nicole Novielli
, Alexander Serebrenik
:
Negativity in self-admitted technical debt: how sentiment influences prioritization. 54 - Samuel W. Flint
, Ali M. Keshk
, Robert Dyer
, Hamid Bagheri
:
How do developers use type inference: an exploratory study in Kotlin. 55 - Youmei Fan
, Dong Wang, Supatsara Wattanakriengkrai, Hathaichanok Damrongsiri, Christoph Treude, Hideaki Hata, Raula Gaikovina Kula:
Developer reactions to protestware in open source software: the cases of color.js and es5.ext. 56 - Adem Ait
, Javier Luis Cánovas Izquierdo, Jordi Cabot:
On the suitability of hugging face hub for empirical studies. 57 - Yue Zhang, Justin Murphy, Akond Rahman:
Come for syntax, stay for speed, write secure code: an empirical study of security weaknesses in Julia programs. 58 - Jinfeng Wen
, Zhenpeng Chen, Federica Sarro, Shangguang Wang:
Unveiling overlooked performance variance in serverless computing. 59 - Kechi Zhang
, Jia Li, Zhuo Li, Zhi Jin, Ge Li:
Transformer-based code model with compressed hierarchy representation. 60
Volume 30, Number 3, June 2025
- Amir Mohammad Ebrahimi
, Bram Adams, Gustavo Ansaldi Oliva, Ahmed E. Hassan:
UPC sentinel: An accurate approach for detecting upgradeability proxy contracts in Ethereum. 61 - Jiahui Yang, Xiangfu Zhao
, Hanfeng Zhang, Long He, Shiji Wang, Naixiang Gou:
CSAFuzzer: Fuzzing smart contracts combining with static analysis. 62 - Zhi-Yi Zhang, Yichun Wang, Yongming Yao, Ziyuan Wang, Zhiqiu Huang:
A fine-grained evaluation of mutation operators to boost mutation testing for deep learning systems. 63 - Ismail Sergen Göçmen
, Ahmed Salih Cezayir
, Eray Tüzün
:
Enhanced code reviews using pull request based change impact analysis. 64 - Florian Tambon
, Arghavan Moradi Dakhel, Amin Nikanjam, Foutse Khomh, Michel C. Desmarais, Giuliano Antoniol:
Bugs in large language models generated code: an empirical study. 65 - Patric Genfer
, Souhaila Serbout, Georg Simhandl, Uwe Zdun, Cesare Pautasso:
Understanding security tactics in microservice APIs using annotated software architecture decomposition models - a controlled experiment. 66 - Aishwarya Seth, Saikath Bhattacharya
, Sarah Elder
, Nusrat Zahan
, Laurie A. Williams
:
Comparing effectiveness and efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) tools in a large java-based system. 67 - Zeming Dong
, Qiang Hu
, Yuejun Guo, Zhenya Zhang, Maxime Cordy, Mike Papadakis, Yves Le Traon, Jianjun Zhao:
Boosting source code learning with text-oriented data augmentation: an empirical study. 68 - Sushant Kumar Pandey, Sivajeet Chand
, Jennifer Horkoff, Miroslaw Staron, Miroslaw Ochodek, Darko Durisic:
Design pattern recognition: a study of large language models. 69 - Sharif Ahmed
, Nasir U. Eisty
:
Hold on! is my feedback useful? evaluating the usefulness of code review comments. 70 - Camila A. Paiva, Raquel Maximino, Frederico Paiva, Rafael Accetta Vieira, Nicole Espanha, João Felipe Pimentel, Igor Wiese
, Marco Aurélio Gerosa, Igor Steinmacher
, Leonardo Murta
, Vanessa Braganholo
:
Analyzing the adoption of database management systems throughout the history of open source projects. 71 - Shabnam Hassani, Mehrdad Sabetzadeh
, Daniel Amyot
:
An empirical study on LLM-based classification of requirements-related provisions in food-safety regulations. 72 - Mathieu Nassif
, Martin P. Robillard
:
Evaluating interactive documentation for programmers. 73 - Alexandre Verdet, Mohammad Hamdaqa
, Léuson M. P. da Silva, Foutse Khomh
:
Assessing the adoption of security policies by developers in terraform across different cloud providers. 74 - Salomé Perez-Rosero, Robert Dyer
, Samuel W. Flint
, Shane McIntosh
, Witawas Srisa-an
:
WIA-SZZ: Work item aware SZZ. 75 - Rongcun Wang
, Xingyu Ji, Yuan Tian, Senlei Xu, Xiaobing Sun, Shujuan Jiang:
Fixer-level supervised contrastive learning for bug assignment. 76 - Ahmed Fawzy, Amjed Tahir
, Matthias Galster, Peng Liang:
Exploring data management challenges and solutions in agile software development: a literature review and practitioner survey. 77 - Adekunle Akinjobi Ajibode, Abdul Ali Bangash, Filipe R. Cogo, Bram Adams, Ahmed E. Hassan:
Towards semantic versioning of open pre-trained language model releases on hugging face. 78 - Anastasiia Tkalich, Eriks Klotins, Tor Sporsem, Viktoria Stray, Nils Brede Moe, Astri Barbala:
User feedback in continuous software engineering: revealing the state-of-practice. 79 - Johan Linåker, Björn Lundell, Francisco Servant, Jonas Gamalielsson, Sachiko Muto, Gregorio Robles:
Public sector open source software projects - How is development organized? 80 - Nasir U. Eisty, Upulee Kanewala, Jeffrey C. Carver:
Testing research software: an in-depth survey of practices, methods, and tools. 81 - Kezia Devathasan, Nowshin Nawar Arony, Emerson R. Murphy-Hill, Daniela E. Damian:
Empathy, self-determination and motivation: moderating diversity for enhanced performance in software development teams. 82 - Taiming Wang, Yuxia Zhang, Lin Jiang, Yi Tang, Guangjie Li, Hui Liu:
Correction to: Deep learning based identification of inconsistent method names: how Far are we? 83 - Giovanni Rosa, Simone Scalabrino, Stefano Mastrostefano, Rocco Oliveto:
Why and how developers maintain smart contracts. 84 - Wendkûuni C. Ouédraogo, Laura Plein, Abdoul Kader Kaboré, Andrew Habib, Jacques Klein, David Lo, Tegawendé F. Bissyandé:
Enriching automatic test case generation by extracting relevant test inputs from bug reports. 85 - Yang Zhang, Chunhui Zhang, Kun Zheng, Grant Meredith:
DeepCSS: severity classification for code smell based on deep learning. 86 - Jia Li, Zheng Fang, Xianjie Shi, Zhi Jin, Fang Liu, Jia Li, Yunfei Zhao, Ge Li:
SCodeSearcher: soft contrastive learning for code search. 87 - Yixuan Tang, Junwei Zeng, Jingxuan Zhang, Weiwei Li, Zhiqiu Huang:
CTDip: a diversity-guided test program synthesis approach for boosting compiler bug detection. 88 - Hamid Mohayeji, Andrei Agaronian, Eleni Constantinou, Nicola Zannone, Alexander Serebrenik:
Securing dependencies: A comprehensive study of Dependabot's impact on vulnerability mitigation. 89 - Lili Wei, Heqing Huang, Shing-Chi Cheung, Kevin Li:
How far are app secrets from being stolen? a case study on android. 90 - Francesco Sovrano, Emmie Hine, Stefano Anzolut, Alberto Bacchelli:
Simplifying software compliance: AI technologies in drafting technical documentation for the AI Act. 91 - Lanxin Yang, He Zhang, Jinwei Xu, Jun Lyu, Xin Zhou, Dong Shao, Shan Gao, Alberto Bacchelli:
Correction to: A preliminary investigation on using multi-task learning to predict change performance in code reviews. 92 - Aurora Papotti, Katja Tuma, Fabio Massacci:
On the effects of program slicing for vulnerability detection during code inspection. 93 - Sven Peldszus, Davide Brugali, Daniel Strüber, Patrizio Pelliccione, Thorsten Berger:
Software reconfiguration in robotics. 94 - Sadaf Azimi, Ali Golzari, Naghmeh Ivaki, Nuno Laranjeiro:
A systematic review on smart contracts security design patterns. 95 - Haya Samaana, Diego Elias Costa, Ahmad Abdellatif, Emad Shihab:
Opportunities and security risks of technical leverage: A replication study on the NPM ecosystem. 96 - Patrick Loic Foalem, Leuson Da Silva, Foutse Khomh, Heng Li, Ettore Merlo:
Logging requirement for continuous auditing of responsible machine learning-based applications. 97 - Mojtaba Mostafavi Ghahfarokhi, Alireza Asadi, Arash Asgari, Bardia Mohammadi, Abbas Heydarnoori:
Predicting the understandability of computational notebooks through code metrics analysis. 98 - Md. Ahasanuzzaman, Gustavo Ansaldi Oliva, Ahmed E. Hassan:
Predicting long time contributors with knowledge units of programming languages: an empirical study. 99 - Eñaut Mendiluze Usandizaga, Shaukat Ali, Tao Yue, Paolo Arcaini:
Quantum circuit mutants: Empirical analysis and recommendations. 100 - Amirali Sajadi, Binh Le, Anh Nguyen, Kostadin Damevski, Preetha Chatterjee:
Do LLMs consider security? an empirical study on responses to programming questions. 101 - Aastha Pant, Rashina Hoda, Chakkrit Tantithamthavorn, Burak Turhan:
Navigating fairness: practitioners' understanding, challenges, and strategies in AI/ML development. 102 - Bihui Jin, Heng Li, Ying Zou:
Impact of extensions on browser performance: An empirical study on google chrome. 103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.