


default search action
Software Quality Journal, Volume 32
Volume 32, Number 1, March 2024
- Antonio Vallecillo, Ricardo Pérez-Castillo, Joost Visser
:
Guest editorial: special issue on "IT quality challenges in a digital society". 1-3 - Maurizio Leotta, Davide Paparella, Filippo Ricca:
Mutta: a novel tool for E2E web mutation testing. 5-26 - Luis Olsina, Philip Lew, Pablo Becker:
Comparative analysis of the syntactic and semantic consistency of terms in software testing glossaries. 27-52 - Jaime Alvarado-Valiente, Javier Romero-Álvarez
, Enrique Moguel, José García-Alonso, Juan Manuel Murillo:
Technological diversity of quantum computing providers: a comparative study and a proposal for API Gateway integration. 53-73 - Marko Jäntti, Markus Aho
:
Quality aspects of digital forest service management: a case study. 75-94 - Marta Catillo, Antonio Pecchia, Umberto Villano:
Successful intrusion detection with a single deep autoencoder: theory and practice. 95-123 - Daniele Granata, Massimiliano Rak:
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools. 125-161 - Manuel A. Serrano
, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Carlos Blanco
, Vita Santa Barletta
, Danilo Caivano, Eduardo Fernández-Medina:
Minimizing incident response time in real-world scenarios using quantum computing. 163-192 - Iñigo Aldalur, Aitor Arrieta, Aitor Agirre, Goiuria Sagardui, Maite Arratibel:
A microservice-based framework for multi-level testing of cyber-physical systems. 193-223 - Morena Barboni, Andrea Morichetta, Andrea Polini, Francesco Casoni:
ReSuMo: a regression strategy and tool for mutation testing of solidity smart contracts. 225-253 - Giovanni Giachetti, José Luis de la Vara
, Beatriz Marín:
Model-driven gap analysis for the fulfillment of quality standards in software development processes. 255-282 - Hanna Looks
, Jannik Fangmann
, Jörg Thomaschewski
, María José Escalona
, Eva-Maria Schön
:
Towards improving agility in public administration. 283-311
Volume 32, Number 2, June 2024
- Shameer Kumar Pradhan, Hans-Martin Heyn, Eric Knauss:
Identifying and managing data quality requirements: a design science study in the field of automated driving. 313-360 - Mohammad Mahdi Abdollahpour, Mehrdad Ashtiani, Fatemeh Bakhshi:
Automatic software code repair using deep learning techniques. 361-390 - Leevi Rantala, Mika Mäntylä
, Valentina Lenarduzzi:
Keyword-labeled self-admitted technical debt and static code analysis have significant relationship but limited overlap. 391-429 - Yanyan Zhuang
, Yu Yan, Lois Anne DeLong, Kuo-Chuan (Martin) Yeh:
Do developer perceptions have borders? Comparing C code responses across continents. 431-457 - Chenchen Chai, Guisheng Fan, Huiqun Yu, Zijie Huang
, Jianshu Ding, Yao Guan:
Exploring better alternatives to size metrics for explainable software defect prediction. 459-486 - Nebi Yilmaz
, Ayça Kolukisa Tarhan
:
Quality evaluation meta-model for open-source software: multi-method validation study. 487-541 - Xiujing Guo, Hiroyuki Okamura, Tadashi Dohi:
Optimal test case generation for boundary value analysis. 543-566 - Oscar Cornejo, Daniela Briola
, Daniela Micucci, Davide Ginelli, Leonardo Mariani, Adrián Santos Parrilla, Natalia Juristo:
A family of experiments about how developers perceive delayed system response time. 567-605 - António Miguel Pesqueira
, Maria José Sousa
:
Exploring the role of big data analytics and dynamic capabilities in ESG programs within pharmaceuticals. 607-640 - Luana Almeida Martins, Taher Ahmed Ghaleb, Heitor A. X. Costa, Ivan Machado:
A comprehensive catalog of refactoring strategies to handle test smells in Java-based systems. 641-679 - Waqas Junaid, Zhi Li:
Tackling visual and conceptual complexity of problem-oriented modeling of requirements. 681-702 - Maria Hoffmann Jensen, Maja Due Kadenic
:
Enhancing big data analytics deployment: uncovering stakeholder dynamics and balancing salience in project roles. 703-727 - Stefan Karlsson, John Hughes, Robbert Jongeling
, Adnan Causevic, Daniel Sundmark:
Exploring API behaviours through generated examples. 729-763 - Zhenzhou Tian, Fanfan Wang, Yanping Chen, Lingwei Chen:
Differential testing solidity compiler through deep contract manipulation and mutation. 765-790 - Jinli Zhang, Zhenbo Wang, Zongli Jiang, Man Wu, Chen Li
, Yoshihiro Yamanishi:
Quantitative evaluation of molecular generation performance of graph-based GANs. 791-819 - Xinjie Wei, Chang-Ai Sun, Xiao-Yi Zhang:
KAD: a knowledge formalization-based anomaly detection approach for distributed systems. 821-845 - Simon Butler
, Jonas Gamalielsson, Björn Lundell, Christoffer Brax, Anders Mattsson, Tomas Gustavsson, Jonas Feist, Bengt Kvarnström, Erik Lönroth:
Correction to: On business adoption and use of reproducible builds for open and closed source software. 847-848
Volume 32, Number 3, September 2024
- Monika Rani Golla
, Sangharatna Godboley:
Automated SC-MCC test case generation using coverage-guided fuzzing. 849-880 - Umut Sener, Ebru Gökalp
, P. Erhan Eren:
CLOUD-QM: a quality model for benchmarking cloud-based enterprise information systems. 881-920 - Xi Li, Peian Wen, Peng Chen
, Juan Chen, Xuming Wen, Yunni Xia:
An effective parallel convolutional anomaly multi-classification model for fault diagnosis in microservice system. 921-938 - Yujun Dai, Shaoying Liu, Guangquan Xu:
Enhancing human-machine pair inspection with risk number and code inspection diagram. 939-959 - Junpeng Jiang, Mingyue Jiang, Liming Nie, Zuohua Ding:
A source model simplification method to assist model transformation debugging. 961-984 - Xiaoting Du, Zhihao Liu, Chenglong Li, Xiangyue Ma, Yingzhuo Li, Xinyu Wang:
LLM-BRC: A large language model-based bug report classification framework. 985-1005 - Mawal A. Mohammed
, Mohammad R. Alshayeb, Jameleddine Hassine:
A rule-based approach for the identification of quality improvement opportunities in GRL models. 1007-1037 - Kinari Nishiura, Eun-Hye Choi, Eunjong Choi, Osamu Mizuno:
Two improving approaches for faulty interaction localization using logistic regression analysis. 1039-1073 - Adityarajsingh Santokhee
, Juan Carlos Augusto, Lindsey Brodie:
Towards engineering higher quality intelligent environments: a multi case study approach. 1075-1135 - Otávio Lemos, Fábio F. Silveira, Fabiano Cutigi Ferrari, Tiago Silva da Silva, Eduardo Guerra, Alessandro F. Garcia:
Unraveling the code: an in-depth empirical study on the impact of development practices in auxiliary functions implementation. 1137-1174 - Jiaqi Yin, Sini Chen, Yixiao Lv, Huibiao Zhu:
Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system. 1175-1202 - Hongwei Tao
, Xiaoxu Niu
, Lang Xu, Lianyou Fu, Qiaoling Cao, Haoran Chen, Songtao Shang, Yang Xian:
A comparative study of software defect binomial classification prediction models based on machine learning. 1203-1237 - Jati H. Husen
, Hironori Washizaki, Jomphon Runpakprakun, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi:
Integrated multi-view modeling for reliable machine learning-intensive software engineering. 1239-1285 - Stefan Karlsson, Robbert Jongeling
, Adnan Causevic, Daniel Sundmark:
Exploring behaviours of RESTful APIs in an industrial setting. 1287-1324 - Xufeng Zhao, Yilei Bu, Wendi Pang, Jiajia Cai:
Periodic and random incremental backup policies in reliability theory. 1325-1340 - Sixuan Wang, Baoqing Jin, Dongjin Yu, Shuhan Cheng:
ASDMG: business topic clustering-based architecture smell detection for microservice granularity. 1341-1374
Volume 32, Number 4, December 2024
- Amanda Santana, Eduardo Figueiredo, Juliana Alves Pereira, Alessandro Garcia:
An exploratory evaluation of code smell agglomerations. 1375-1412 - Xiaodong Xie, Zhehao Li
, Jinfu Chen, Yue Zhang, Xiangxiang Wang, Patrick Kwaku Kudjo:
MUT Model: a metric for characterizing metamorphic relations diversity. 1413-1455 - Jiaqi Yin, Yuan Fei:
FVF-BIoT: a formal verification framework for blockchain-based IoT authentication. 1457-1480 - Kai Jia, Xiao Yu, Chen Zhang, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang:
TTAFPred: Prediction of time to aging failure for software systems based on a two-stream multi-scale features fusion network. 1481-1513 - Jiaxuan Han, Cheng Huang, Jiayong Liu:
bjEnet: a fast and accurate software bug localization method in natural language semantic space. 1515-1538 - Alberto Gordillo
, Coral Calero
, María Ángeles Moraga
, Félix García
, João Paulo Fernandes
, Rui Abreu
, João Saraiva
:
Programming languages ranking based on energy measurements. 1539-1580 - Hina Saeeda, Muhammad Ovais Ahmad, Tomas Gustavsson:
Navigating social debt and its link with technical debt in large-scale agile software development projects. 1581-1613 - Daniel de Paula Porto
, Sandra Camargo Pinto Ferraz Fabbri, Fabiano Cutigi Ferrari
:
Getting into the game: gamifying software development with the GSA framework. 1615-1653 - Qianshuang Meng, Weiqin Zou, Biyu Cai, Jingxuan Zhang:
KeyTitle: towards better bug report title generation by keywords planning. 1655-1682 - Anderson Gonçalves Uchôa
, Rafael Maiani de Mello
, Jairo Souza
, Leopoldo Teixeira
, Baldoino Fonseca
, Alessandro Garcia
:
Towards effective gamification of existing systems: method and experience report. 1683-1716 - Xiaoning Shen, Jiaqi Lu, Shuxian Li, Liyan Song:
Feature mapping based on heterogeneous cross-company effort estimation. 1717-1761

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.