default search action
IET Software, Volume 16
Volume 16, Number 1, February 2022
- Arnaldo Pereira, Alina Trifan, Rui Pedro Lopes, José Luís Oliveira:
Systematic review of question answering over knowledge bases. 1-13 - Abraham L. R. de Sousa, Cleidson R. B. de Souza, Rodrigo Quites Reis:
A 20-year mapping of Bayesian belief networks in software project management. 14-28
- Nana Zhang, Shi Ying, Kun Zhu, Dandan Zhu:
Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine. 29-47 - Fatemeh Moodi, Hamid Saadatfar:
An improved K-means algorithm for big data. 48-59 - Scarlet Rahy, Julian M. Bass:
Managing non-functional requirements in agile software development. 60-72 - Sergio Caro-Álvaro, Eva García-López, Antonio García-Cabot, Luis de-Marcos, Adrián Domínguez-Díaz:
Applying usability recommendations when developing mobile instant messaging applications. 73-93 - Huaxiao Liu, Xinglong Yin, Shanshan Song, Shanquan Gao, Mengxi Zhang:
Mining detailed information from the description for App functions comparison. 94-110
- Ismael M. G. Cardoso, Jorge L. V. Barbosa, Bruno Mota, Lucas P. S. Dias, Luan Carlos Nesi:
Vulcont: A recommender system based on context history ontology. 111-123
Volume 16, Number 2, April 2022
- Sana Alam, Shehnila Zardari, Muneera Bano:
Software engineering and 12 prominent sub-areas: Comprehensive bibliometric assessment on 13 years (2007-2019). 125-145 - Can Cheng, Bing Li, Zengyang Li, Peng Liang, Xu Yang:
An in-depth study of the effects of methods on the dataset selection of public development projects. 146-166 - Philipp Haindl, Reinhold Plösch:
Value-oriented quality metrics in software development: Practical relevance from a software engineering perspective. 167-184 - Kwabena Ebo Bennin, Amjed Tahir, Stephen G. MacDonell, Jürgen Börstler:
An empirical study on the effectiveness of data resampling approaches for cross-project software defect prediction. 185-199 - Qingan Huang, Le Ma, Siyu Jiang, Guobin Wu, Hengjie Song, Libiao Jiang, Chunyun Zheng:
A cross-project defect prediction method based on multi-adaptation and nuclear norm. 200-213 - Nguyen Hung-Cuong, Quyet-Thang Huynh:
New non-homogeneous Poisson process software reliability model based on a 3-parameter S-shaped function. 214-232 - Hyeon-Ah Moon, Sooyong Park:
Conformance evaluation of the top-100 Ethereum token smart contracts with Ethereum Request for Comment-20 functional specifications. 233-249
Volume 16, Number 3, June 2022
- Qiaohe Yang:
A new localization method based on improved particle swarm optimization for wireless sensor networks. 251-258 - Kunsong Zhao, Zhou Xu, Meng Yan, Lei Xue, Wei Li, Gemma Catolino:
A compositional model for effort-aware Just-In-Time defect prediction on android apps. 259-278 - Xu Guo, Xiaoyu Song, Jiantao Zhou:
A synergic quantum particle swarm optimisation for constrained combinatorial test generation. 279-300 - Foivos Tsimpourlas, Gwenyth Rooijackers, Ajitha Rajan, Miltiadis Allamanis:
Embedding and classifying test execution traces using neural networks. 301-316 - Ju Qian, Xu Zhou, Hui Zhou:
Prioritising test scripts for the testing of memory bloat in web applications. 317-330
- Azeem Ahmad, Ola Leifler, Kristian Sandahl:
Data visualisation in continuous integration and delivery: Information needs, challenges, and recommendations. 331-349
Volume 16, Number 4, August 2022
- Hazem Peter Samoaa, Firas Bayram, Pasquale Salza, Philipp Leitner:
A systematic mapping study of source code representation for deep learning in software engineering. 351-385
- Yezi Xu, Zhi Quan Zhou, Xiaoxia Zhang, Jing Wang, Mingyue Jiang:
Metamorphic testing of named entity recognition systems: A case study. 386-404 - Ramon R. Palacio, Gilberto Cordova, Luís A. Castro, Gilberto Borrego:
Profession-centric measures and indicators for occupational stress: An empirical study with novice software developers in Mexico. 405-421 - Zhen Ni, Lili Bo, Bin Li, Tianhao Chen, Xiaobing Sun, Xiaoxue Wu:
An approach of method-level bug localization. 422-437 - Knut Kjetil Holgeid, John Krogstie, Patrick Mikalef, Eirik E. Saur, Dag I. K. Sjøberg:
Benefits management and Information Technology work distribution. 438-454
Volume 16, Number 5, October 2022
- Meikel Bode, Maya Daneva, Marten J. van Sinderen:
Characterising the digital transformation of IT consulting services-Results from a systematic mapping study. 455-477
- Kevin J. Valle-Gómez, Antonio García-Domínguez, Pedro Delgado-Pérez, Inmaculada Medina-Bulo:
Mutation-inspired symbolic execution for software testing. 478-492 - Mohammad Reza Hasanzadeh, Farshid Keynia, Maliheh Hashemipour:
A new index-based hyper-heuristic algorithm for global optimisation problems. 493-515 - Fazli Subhan, Xiaojun Wu, Lili Bo, Xiaobing Sun, Muhammad Rahman:
A deep learning-based approach for software vulnerability detection using code metrics. 516-526 - Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang:
Malware recognition approach based on self-similarity and an improved clustering algorithm. 527-541
Volume 16, Number 6, December 2022
- Hend Alrasheed, Austin Melton:
Measuring nesting. 543-557 - Wathiq H. Dukhan, Marghny H. Mohamed, Ali A. Amer, Elnomery Allam Zanaty, Omar Reyad:
Software requirement selection using a combined multi-objective optimisation technique. 558-575 - Byeong-Mo Chang, Kyung-min Lee, Ga-young Koh, Kwanghoon Choi:
SmartProvenance: User-friendly provenance system for internet of things applications based on event flow graphs. 576-602 - Mirsaeid Hosseini Shirvani, Gholam R. Amin, Sara Babaeikiadehi:
A decision framework for cloud migration: A hybrid approach. 603-629 - Xiao Liu, Zhou Xu, Dan Yang, Meng Yan, Weihan Zhang, Haohan Zhao, Lei Xue, Ming Fan:
An unsupervised cross project model for crashing fault residence identification. 630-646
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.