![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ACM Transactions on Software Engineering and Methodology, Volume 30
Volume 30, Number 1, January 2021
- Michele Guerriero
, Damian Andrew Tamburri
, Elisabetta Di Nitto:
StreamGen: Model-driven Development of Distributed Streaming Applications. 1:1-1:30 - Janet Siegmund, Norman Peitek, Sven Apel
, Norbert Siegmund:
Mastering Variation in Human Studies: The Role of Aggregation. 2:1-2:40 - Akond Rahman
, Md. Rayhanur Rahman
, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. 3:1-3:31 - Huihui Zhang, Man Zhang
, Tao Yue
, Shaukat Ali, Yan Li:
Uncertainty-wise Requirements Prioritization with Search. 4:1-4:54 - Ahmad Salim Al-Sibahi
, Thomas P. Jensen
, Aleksandar S. Dimovski
, Andrzej Wasowski
:
Verification of Program Transformations with Inductive Refinement Types. 5:1-5:33 - Ridwan Salihin Shariffdeen
, Shin Hwei Tan
, Mingyuan Gao, Abhik Roychoudhury
:
Automated Patch Transplantation. 6:1-6:36 - Xiaoxue Ma
, Shangru Wu, Ernest Bota Pobee
, Xiupei Mei
, Hao Zhang, Bo Jiang, Wing Kwong Chan:
RegionTrack: A Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces. 7:1-7:49 - Osama Ehsan, Safwat Hassan, Mariam El Mezouar, Ying Zou:
An Empirical Study of Developer Discussions in the Gitter Platform. 8:1-8:39 - Roberto Bagnara, Michele Chiari, Roberta Gori, Abramo Bagnara:
A Practical Approach to Verification of Floating-Point C/C++ Programs with math.h/cmath Functions. 9:1-9:53 - Xiaoqin Fu, Haipeng Cai
, Wen Li, Li Li
:
SEADS: Scalable and Cost-effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning. 10:1-10:45
- Zhipeng Gao
, Xin Xia
, David Lo
, John Grundy:
Technical Q8A Site Answer Recommendation via Question Boosting. 11:1-11:34
Volume 30, Number 2, March 2021
- Javier Godoy
, Juan Pablo Galeotti, Diego Garbervetsky, Sebastián Uchitel:
Enabledness-based Testing of Object Protocols. 12:1-12:36 - Wei Ma, Mike Papadakis
, Anestis Tsakmalis, Maxime Cordy
, Yves Le Traon
:
Test Selection for Deep Learning Systems. 13:1-13:22 - Xiang Gao, Bo Wang
, Gregory J. Duck
, Ruyi Ji, Yingfei Xiong, Abhik Roychoudhury:
Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction. 14:1-14:27 - Manuel Ohrndorf, Christopher Pietsch, Udo Kelter, Lars Grunske
, Timo Kehrer:
History-based Model Repair Recommendations. 15:1-15:46 - Hong Jin Kang, David Lo
:
Adversarial Specification Mining. 16:1-16:40 - Dunwei Gong, Baicai Sun
, Xiangjuan Yao, Tian Tian:
Test Data Generation for Path Coverage of MPI Programs Using SAEO. 17:1-17:37 - Zhenpeng Chen
, Yanbin Cao, Huihan Yao, Xuan Lu
, Xin Peng, Hong Mei, Xuanzhe Liu:
Emoji-powered Sentiment and Emotion Detection from Software Developers' Communication Data. 18:1-18:48 - Thierry Titcheu Chekam
, Mike Papadakis
, Maxime Cordy
, Yves Le Traon
:
Killing Stubborn Mutants with Symbolic Execution. 19:1-19:23 - John-Paul Ore
, Carrick Detweiler
, Sebastian G. Elbaum:
An Empirical Study on Type Annotations: Accuracy, Speed, and Suggestion Effectiveness. 20:1-20:29
- Bozhi Wu
, Sen Chen
, Cuiyun Gao, Lingling Fan, Yang Liu
, Weiping Wen, Michael R. Lyu
:
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. 21:1-21:29 - Haoxiang Zhang, Shaowei Wang, Tse-Hsun (Peter) Chen
, Ahmed E. Hassan:
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers? 22:1-22:31 - Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. 23:1-23:31 - Bailey Vandehei, Daniel Alencar da Costa, Davide Falessi:
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes. 24:1-24:35 - Qiuyuan Chen, Xin Xia, Han Hu, David Lo
, Shanping Li:
Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction. 25:1-25:29
Volume 30, Number 3, May 2021
- Mauro Pezzè
:
Editorial. 26e:1 - Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen
:
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs. 26:1-26:42 - Juan de Lara, Esther Guerra
, Jörg Kienzle:
Facet-oriented Modelling. 27:1-27:59 - Abdullah A. Zarir, Gustavo Ansaldi Oliva, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:
Developing Cost-Effective Blockchain-Powered Applications: A Case Study of the Gas Usage of Smart Contract Transactions in the Ethereum Blockchain Platform. 28:1-28:38 - Mouna Abidi, Md. Saidur Rahman, Moses Openja, Foutse Khomh:
Are Multi-Language Design Smells Fault-Prone? An Empirical Study. 29:1-29:56 - Zohreh Sharafi, Yu Huang, Kevin Leach, Westley Weimer:
Toward an Objective Measure of Developers' Cognitive Activities. 30:1-30:40 - Gias Uddin, Foutse Khomh, Chanchal K. Roy:
Automatic API Usage Scenario Documentation from Technical Q&A Sites. 31:1-31:45 - Xiaoyu Sun
, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
, Damien Octeau, John C. Grundy:
Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. 32:1-32:36 - Guoliang Zhao
, Safwat Hassan, Ying Zou, Derek Truong, Toby Corbin:
Predicting Performance Anomalies in Software Systems at Run-time. 33:1-33:33 - Thiago M. Castro
, Leopoldo Teixeira, Vander Alves, Sven Apel
, Maxime Cordy
, Rohit Gheyi:
A Formal Framework of Software Product Line Analyses. 34:1-34:37 - Wendy Yánez, Rami Bahsoon, Yuqun Zhang, Rick Kazman:
Architecting Internet of Things Systems with Blockchain: A Catalog of Tactics. 35:1-35:46 - Simone Scalabrino
, Antonio Mastropaolo, Gabriele Bavota
, Rocco Oliveto:
An Adaptive Search Budget Allocation Approach for Search-Based Test Case Generation. 36:1-36:26 - Qiuyuan Chen, Chunyang Chen
, Safwat Hassan, Zhengchang Xing, Xin Xia, Ahmed E. Hassan:
How Should I Improve the UI of My App?: A Study of User Reviews of Popular Apps in the Google Play. 37:1-37:38
- Xiao Cheng
, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. 38:1-38:33 - Deqing Zou, Yueming Wu
, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, Hai Jin:
IntDroid: Android Malware Detection Based on API Intimacy Analysis. 39:1-39:32 - Yanjie Zhao
, Li Li
, Haoyu Wang, Haipeng Cai
, Tegawendé F. Bissyandé
, Jacques Klein
, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. 40:1-40:38
Volume 30, Number 4, July 2021
- Jianhui Chen, Fei He
:
Leveraging Control Flow Knowledge in SMT Solving of Program Verification. 41:1-41:26 - Chris Bogart
, Christian Kästner
, James D. Herbsleb, Ferdian Thung:
When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems. 42:1-42:56 - Angelo Ferrando
, Louise A. Dennis, Rafael C. Cardoso, Michael Fisher, Davide Ancona
, Viviana Mascardi:
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems. 43:1-43:43 - Héctor D. Menéndez
, Gunel Jahangirova, Federica Sarro
, Paolo Tonella, David Clark
:
Diversifying Focused Testing for Unit Testing. 44:1-44:24 - Zhaoqiang Guo
, Shiran Liu, Jinping Liu, Yanhui Li
, Lin Chen, Hongmin Lu, Yuming Zhou:
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study. 45:1-45:56 - Jingbo Lu
, Dongjie He
, Jingling Xue:
Eagle: CFL-Reachability-Based Precision-Preserving Acceleration of Object-Sensitive Pointer Analysis with Partial Context Sensitivity. 46:1-46:46 - Philipp Paulweber
, Georg Simhandl, Uwe Zdun
:
Specifying with Interface and Trait Abstractions in Abstract State Machines: A Controlled Experiment. 47:1-47:29 - Preetha Chatterjee
, Kostadin Damevski
, Nicholas A. Kraft, Lori L. Pollock:
Automatically Identifying the Quality of Developer Chats for Post Hoc Use. 48:1-48:28 - Yida Tao
, Shan Tang, Yepang Liu
, Zhiwu Xu
, Shengchao Qin
:
Speeding Up Data Manipulation Tasks with Alternative Implementations: An Exploratory Study. 49:1-49:28 - Nacha Chondamrongkul, Jing Sun, Ian Warren:
Software Architectural Migration: An Automated Planning Approach. 50:1-50:35 - Dalia Sobhy
, Rami Bahsoon, Leandro L. Minku
, Rick Kazman:
Evaluation of Software Architectures under Uncertainty: A Systematic Literature Review. 51:1-51:50 - Daniel Russo
:
The Agile Success Model: A Mixed-methods Study of a Large-scale Agile Transformation. 52:1-52:46 - Safdar Aqeel Safdar
, Tao Yue, Shaukat Ali:
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search. 53:1-53:36
- Yingzhe Lyu, Heng Li, Mohammed Sayagh, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions. 54:1-54:38 - Malinda Dilhara, Ameya Ketkar, Danny Dig
:
Understanding Software-2.0: A Study of Machine Learning Library Usage and Evolution. 55:1-55:42 - Haoye Wang
, Xin Xia, David Lo
, Qiang He, Xinyu Wang, John Grundy:
Context-aware Retrieval-based Deep Commit Message Generation. 56:1-56:30
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.