default search action
IEEE Transactions on Software Engineering, Volume 48
Volume 48, Number 2, February 2022
- Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. 364-376 - Jose Ricardo da Silva Junior, Daniel Prett Campagna, Esteban Clua, Anita Sarma, Leonardo Murta:
Dominoes: An Interactive Exploratory Data Analysis Tool for Software Relationships. 377-396 - Esther Guerra, Juan de Lara, Marsha Chechik, Rick Salay:
Property Satisfiability Analysis for Product Lines of Modelling Languages. 397-416 - Maxime Lamothe, Weiyi Shang, Tse-Hsun Peter Chen:
A3: Assisting Android API Migrations Using Code Examples. 417-431 - Beatriz Bernárdez, Amador Durán, José Antonio Parejo, Natalia Juristo, Antonio Ruiz-Cortés:
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments. 432-452 - Jackson A. Prado Lima, Silvia Regina Vergilio:
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. 453-465 - Pilar Rodríguez, Cathy Urquhart, Emilia Mendes:
A Theory of Value for Value-Based Feature Selection in Software Engineering. 466-484 - Yuxing Ma, Audris Mockus, Russell Zaretzki, Randy V. Bradley, Bogdan C. Bichescu:
A Methodology for Analyzing Uptake of Software Technologies Among Developers. 485-501 - Aaditya Bhatia, Shaowei Wang, Muhammad Asaduzzaman, Ahmed E. Hassan:
A Study of Bug Management Using the Stack Exchange Question and Answering Platform. 502-518 - Yanjie Jiang, Hui Liu, Jiahao Jin, Lu Zhang:
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion. 519-537 - Guoxin Su, Li Liu, Minjie Zhang, David S. Rosenblum:
Quantitative Verification for Monitoring Event-Streaming Systems. 538-550 - Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. 551-570 - Hao Zhong, Xiaoyin Wang, Hong Mei:
Inferring Bug Signatures to Detect Real Bugs. 571-584 - Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand:
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach. 585-616 - Fabrizio Pastore, Daniela Micucci, Michell Guzmán, Leonardo Mariani:
TkT: Automatic Inference of Timed and Extended Pushdown Automata. 617-636 - Manish Motwani, Mauricio Soto, Yuriy Brun, René Just, Claire Le Goues:
Quality of Automated Program Repair on Real-World Defects. 637-661 - Jie Lu, Feng Li, Chen Liu, Lian Li, Xiaobing Feng, Jingling Xue:
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement. 662-677 - Lisa Nguyen Quang Do, Eric Bodden:
Explaining Static Analysis With Rule Graphs. 678-690 - Shaoying Liu, Shin Nakajima:
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing. 691-712 - Francisca Pérez, Tewfik Ziadi, Carlos Cetina:
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models. 713-731 - Jie M. Zhang, Mark Harman, Lei Ma, Yang Liu:
Machine Learning Testing: Survey, Landscapes and Horizons. 1-36 - Dror G. Feitelson, Ayelet Mizrahi, Nofar Noy, Aviad Ben Shabat, Or Eliyahu, Roy Sheffer:
How Developers Choose Names. 37-52 - Carlos Sáenz-Adán, Beatriz Pérez, Francisco J. García Izquierdo, Luc Moreau:
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience. 53-68 - Toshiki Hirao, Shane McIntosh, Akinori Ihara, Kenichi Matsumoto:
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities. 69-81 - Meng Yan, Xin Xia, Yuanrui Fan, Ahmed E. Hassan, David Lo, Shanping Li:
Just-In-Time Defect Identification and Localization: A Two-Phase Framework. 82-101 - Wenhua Wang, Yuqun Zhang, Yulei Sui, Yao Wan, Zhou Zhao, Jian Wu, Philip S. Yu, Guandong Xu:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. 102-119 - Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. 120-134 - Sebastian Baltes, Christoph Treude, Martin P. Robillard:
Contextual Documentation Referencing on Stack Overflow. 135-149 - Qiang He, Bo Li, Feifei Chen, John C. Grundy, Xin Xia, Yun Yang:
Diversified Third-Party Library Prediction for Mobile App Development. 150-165 - Jirayus Jiarpakdee, Chakkrit Kla Tantithamthavorn, Hoa Khanh Dam, John C. Grundy:
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models. 166-185 - Camilo Escobar-Velásquez, Mario Linares-Vásquez, Gabriele Bavota, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk:
Enabling Mutant Generation for Open- and Closed-Source Android Apps. 186-208 - Md. Ahasanuzzaman, Safwat Hassan, Ahmed E. Hassan:
Studying Ad Library Integration Strategies of Top Free-to-Download Apps. 209-224 - André N. Meyer, Chris Satterfield, Manuela Züger, Katja Kevic, Gail C. Murphy, Thomas Zimmermann, Thomas Fritz:
Detecting Developers' Task Switches and Types. 225-240 - Hema Susmita Padala, Christopher J. Mendez, Felipe Fronchetti, Igor Steinmacher, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Margaret Burnett, Marco Aurélio Gerosa, Anita Sarma:
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects. 241-259 - Ann Barcomb, Klaas-Jan Stol, Brian Fitzgerald, Dirk Riehle:
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities. 260-277 - Huy Tu, Zhe Yu, Tim Menzies:
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction). 278-294 - Héctor D. Menéndez, Michele Boreale, Daniele Gorla, David Clark:
Output Sampling for Output Diversity in Automatic Unit Test Generation. 295-308 - Tongtong Xu, Liushan Chen, Yu Pei, Tian Zhang, Minxue Pan, Carlo A. Furia:
Restore: Retrospective Fault Localization Enhancing Automated Program Repair. 309-326 - Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
Defining Smart Contract Defects on Ethereum. 327-345 - Yu Wang, Fengjuan Gao, Linzhang Wang, Tingting Yu, Jianhua Zhao, Xuandong Li:
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software. 346-363
Volume 48, Number 3, March 2022
- Pedro Pinto, João Bispo, João M. P. Cardoso, Jorge G. Barbosa, Davide Gadioli, Gianluca Palermo, Jan Martinovic, Martin Golasowski, Katerina Slaninová, Radim Cmar, Cristina Silvano:
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems. 732-754 - Mashel Albarak, Rami Bahsoon, Ipek Ozkaya, Robert L. Nord:
Managing Technical Debt in Database Normalization. 755-772 - Iris Reinhartz-Berger, Anna Zamansky:
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms. 773-785 - Chao Ni, Xin Xia, David Lo, Xiang Chen, Qing Gu:
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction. 786-802 - Giovani Guizzo, Federica Sarro, Jens Krinke, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. 803-818 - Daniel Russo, Klaas-Jan Stol:
Gender Differences in Personality Traits of Software Engineers. 819-834 - Lisa Nguyen Quang Do, James R. Wright, Karim Ali:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. 835-847 - Mario Janke, Patrick Mäder:
Graph Based Mining of Code Change Patterns From Version Control Commits. 848-863 - Chaima Abid, Marouane Kessentini, Vahid Alizadeh, Mouna Dhaouadi, Rick Kazman:
How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. 864-878 - Hetong Dai, Heng Li, Che-Shao Chen, Weiyi Shang, Tse-Hsun Chen:
Logram: Efficient Log Parsing Using $n$n-Gram Dictionaries. 879-892 - Rahul Krishna, Chong Tang, Kevin J. Sullivan, Baishakhi Ray:
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance. 893-909 - Minxue Pan, Tongtong Xu, Yu Pei, Zhong Li, Tian Zhang, Xuandong Li:
GUI-Guided Test Script Repair for Mobile Apps. 910-929 - Nikolaos Tsantalis, Ameya Ketkar, Danny Dig:
RefactoringMiner 2.0. 930-950 - Mojtaba Bagherzadeh, Nafiseh Kahani, Karim Jahed, Juergen Dingel:
Execution of Partial State Machine Models. 951-972 - Pengfei Gao, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song, Taolue Chen:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 973-1000 - Kun Qiu, Zheng Zheng, Tsong Yueh Chen, Pak-Lok Poon:
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition. 1001-1017 - Shivashree Vysali, Shane McIntosh, Bram Adams:
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements. 1018-1029 - Hanefi Mercan, Arsalan Javeed, Cemal Yilmaz:
Flexible Combinatorial Interaction Testing. 1030-1066 - Peng Zhang, Yanhui Li, Wanwangying Ma, Yibiao Yang, Lin Chen, Hongmin Lu, Yuming Zhou, Baowen Xu:
CBUA: A Probabilistic, Predictive, and Practical Approach for Evaluating Test Suite Effectiveness. 1067-1096
Volume 48, Number 4, April 2022
- Jesús Sánchez Cuadrado, Loli Burgueño, Manuel Wimmer, Antonio Vallecillo:
Efficient Execution of ATL Model Transformations Using Static Analysis and Parallelism. 1097-1114 - Ting Su, Lingling Fan, Sen Chen, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. 1115-1137 - Ezekiel O. Soremekun, Esteban Pavese, Nikolas Havrikov, Lars Grunske, Andreas Zeller:
Inputs From Hell. 1138-1153 - Mohammad Mehdi Pourhashem Kallehbasti, Matteo Rossi, Luciano Baresi:
On How Bit-Vector Logic Can Help Verify LTL-Based Specifications. 1154-1168 - Xiangjuan Yao, Gongjie Zhang, Feng Pan, Dunwei Gong, Changqing Wei:
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing. 1169-1184 - Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing:
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval. 1185-1211 - Mitchell J. Gerrard, Mateus Borges, Matthew B. Dwyer, Antonio Filieri:
Conditional Quantitative Program Analysis. 1212-1227 - Dong Liu, He Jiang, Xiaochen Li, Zhilei Ren, Lei Qiao, Zuohua Ding:
DPWord2Vec: Better Representation of Design Patterns in Semantics. 1228-1248 - Lin Jiang, Hui Liu, He Jiang, Lu Zhang, Hong Mei:
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access. 1249-1267 - Hui Liu, Mingzhu Shen, Jiaqi Zhu, Nan Niu, Ge Li, Lu Zhang:
Deep Learning Based Program Generation From Requirements Text: Are We There Yet? 1268-1289 - Di Liu, Yang Feng, Xiaofang Zhang, James A. Jones, Zhenyu Chen:
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding. 1290-1308 - Zhixing Li, Yue Yu, Minghui Zhou, Tao Wang, Gang Yin, Long Lan, Huaimin Wang:
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects. 1309-1335 - Baicai Sun, Dunwei Gong, Tian Tian, Xiangjuan Yao:
Integrating an Ensemble Surrogate Model's Estimation into Test Data Generation. 1336-1350 - Iflaah Salman, Pilar Rodríguez, Burak Turhan, Ayse Tosun, Arda Gureller:
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers? 1351-1368 - Raghvinder S. Sangwan, Ashkan Negahban, Robert L. Nord, Ipek Ozkaya:
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value. 1369-1384 - Saikat Chakraborty, Yangruibo Ding, Miltiadis Allamanis, Baishakhi Ray:
CODIT: Code Editing With Tree-Based Neural Models. 1385-1399 - Gema Rodríguez-Pérez, Meiyappan Nagappan, Gregorio Robles:
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project. 1400-1416 - Fei He, Qianshan Yu, Liming Cai:
Efficient Summary Reuse for Software Regression Verification. 1417-1431 - Maurício Aniche, Erick Maziero, Rafael S. Durelli, Vinicius H. S. Durelli:
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring. 1432-1450 - Navid Teymourian, Habib Izadkhah, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. 1451-1462
Volume 48, Number 5, May 2022
- Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. 1463-1479 - Supatsara Wattanakriengkrai, Patanamon Thongtanunam, Chakkrit Tantithamthavorn, Hideaki Hata, Kenichi Matsumoto:
Predicting Defective Lines Using a Model-Agnostic Technique. 1480-1496 - Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. 1497-1514 - Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. 1515-1528 - Jinfu Chen, Weiyi Shang, Emad Shihab:
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits. 1529-1544 - Meilun Li, Andrea Turrini, Ernst Moritz Hahn, Zhikun She, Lijun Zhang:
Probabilistic Preference Planning Problem for Markov Decision Processes. 1545-1559 - Soumaya Rebai, Vahid Alizadeh, Marouane Kessentini, Houcem Fehri, Rick Kazman:
Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring. 1560-1578 - Zainab Masood, Rashina Hoda, Kelly Blincoe:
Real World Scrum A Grounded Theory of Variations in Practice. 1579-1591 - Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. 1592-1609 - Kristóf Marussy, Oszkár Semeráth, Dániel Varró:
Automated Generation of Consistent Graph Models With Multiplicity Reasoning. 1610-1629 - Nico Ritschel, Vladimir Kovalenko, Reid Holmes, Ronald Garcia, David C. Shepherd:
Comparing Block-Based Programming Models for Two-Armed Robots. 1630-1643 - Bartosz Papis, Konrad Grochowski, Kamil Subzda, Kamil Sijko:
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project. 1644-1664 - Wentao Wang, Faryn Dumont, Nan Niu, Glen Horton:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. 1665-1675 - Zhe Yu, Fahmid Morshed Fahid, Huy Tu, Tim Menzies:
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach. 1676-1691 - Zohreh Sharafi, Ian Bertram, Michael Flanagan, Westley Weimer:
Eyes on Code: A Study on Developers' Code Navigation Strategies. 1692-1704 - George Digkas, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Paris Avgeriou:
Can Clean New Code Reduce Technical Debt Density? 1705-1721 - Mohammad Bajammal, Andrea Stocco, Davood Mazinanian, Ali Mesbah:
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks. 1722-1742 - Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. 1743-1770 - Miqing Li, Tao Chen, Xin Yao:
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance. 1771-1799 - Shangqing Liu, Cuiyun Gao, Sen Chen, Lun Yiu Nie, Yang Liu:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. 1800-1817 - Waqar Hussain, Harsha Perera, Jon Whittle, Arif Nurwidyantoro, Rashina Hoda, Rifat Ara Shams, Gillian C. Oliver:
Human Values in Software Engineering: Contrasting Case Studies of Practice. 1818-1833
Volume 48, Number 6, June 2022
- Tingting Bi, Xin Xia, David Lo, John C. Grundy, Thomas Zimmermann:
An Empirical Study of Release Note Production and Usage in Practice. 1834-1852 - Bhaveet Nagaria, Tracy Hall:
How Software Developers Mitigate Their Errors When Developing Code. 1853-1867 - Federica Sarro, Rebecca Moussa, Alessio Petrozziello, Mark Harman:
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates. 1868-1882 - Zachary Eberhart, Aakash Bansal, Collin McMillan:
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant. 1883-1904 - Qusay Idrees Sarhan, Bestoun S. Ahmed, Miroslav Bures, Kamal Z. Zamli:
Software Module Clustering: An In-Depth Literature Analysis. 1905-1928 - Jorge Melegati, Henry Edison, Xiaofeng Wang:
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups. 1929-1946 - Xavier Franch, Daniel Méndez, Andreas Vogelsang, Rogardt Heldal, Eric Knauss, Marc Oriol, Guilherme H. Travassos, Jeffrey C. Carver, Thomas Zimmermann:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? 1947-1964 - Maureen Keegan, Víctor A. Braberman, Nicolás D'Ippolito, Nir Piterman, Sebastián Uchitel:
Control and Discovery of Environment Behaviour. 1965-1978 - Zi Peng, Tse-Hsun Chen, Jinqiu Yang:
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies. 1979-1993 - Tianpei Xia, Rui Shu, Xipeng Shen, Tim Menzies:
Sequential Model Optimization for Software Effort Estimation. 1994-2009 - Alex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Requirements of API Documentation: A Case Study into Computer Vision Services. 2010-2027 - Barton P. Miller, Mengxiao Zhang, Elisa R. Heymann:
The Relevance of Classic Fuzz Testing: Have We Solved This One? 2028-2039 - Keheliya Gallaba, John Ewart, Yves Junqueira, Shane McIntosh:
Accelerating Continuous Integration by Caching Environments and Inferring Dependencies. 2040-2052 - Richard Torkar, Carlo A. Furia, Robert Feldt, Francisco Gomes de Oliveira Neto, Lucas Gren, Per Lenberg, Neil A. Ernst:
A Method to Assess and Argue for Practical Significance in Software Engineering. 2053-2065 - Abdul Razzaq, Anthony Ventresque, Rainer Koschke, Andrea De Lucia, Jim Buckley:
The Effect of Feature Characteristics on the Performance of Feature Location Techniques. 2066-2085 - Stefano Dalla Palma, Dario Di Nucci, Fabio Palomba, Damian A. Tamburri:
Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics. 2086-2104 - Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Kashumi Madampe:
The Effects of Human Aspects on the Requirements Engineering Process: A Systematic Literature Review. 2105-2127 - Tiago Boldt Sousa, Hugo Sereno Ferreira, Filipe Figueiredo Correia:
A Survey on the Adoption of Patterns for Engineering Software for the Cloud. 2128-2140 - Xiangying Dang, Dunwei Gong, Xiangjuan Yao, Tian Tian, Huai Liu:
Enhancement of Mutation Testing via Fuzzy Clustering and Multi-Population Genetic Algorithm. 2141-2156 - Yu Zhou, Xinying Yang, Taolue Chen, Zhiqiu Huang, Xiaoxing Ma, Harald C. Gall:
Boosting API Recommendation With Implicit Feedback. 2157-2172 - Zhixing Li, Yue Yu, Tao Wang, Gang Yin, ShanShan Li, Huaimin Wang:
Are You Still Working on This? An Empirical Study on Pull Request Abandonment. 2173-2188
Volume 48, Number 7, July 2022
- Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen:
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. 2189-2207 - Filipe Roseiro Côgo, Gustavo Ansaldi Oliva, Ahmed E. Hassan:
Deprecation of Packages and Releases in Software Ecosystems: A Case Study on NPM. 2208-2223 - Jia Yang, Cai Fu, Xiao-Yang Liu, Heng Yin, Pan Zhou:
Codee: A Tensor Embedding Scheme for Binary Code Search. 2224-2244 - Gopi Krishnan Rajbahadur, Shaowei Wang, Gustavo Ansaldi Oliva, Yasutaka Kamei, Ahmed E. Hassan:
The Impact of Feature Importance Methods on the Interpretation of Defect Classifiers. 2245-2261 - Devika Sondhi, Mayank Jobanputra, Divya Rani, Salil Purandare, Sakshi Sharma, Rahul Purandare:
Mining Similar Methods for Test Adaptation. 2262-2276 - Diego Elias Costa, Suhaib Mujahid, Rabe Abdalkareem, Emad Shihab:
Breaking Type Safety in Go: An Empirical Study on the Usage of the unsafe Package. 2277-2294 - Ying Wang, Rongxin Wu, Chao Wang, Ming Wen, Yepang Liu, Shing-Chi Cheung, Hai Yu, Chang Xu, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? 2295-2316 - Yi Xiang, Han Huang, Miqing Li, Sizhe Li, Xiaowei Yang:
Looking For Novelty in Search-Based Software Product Line Testing. 2317-2338 - He Jiang, Zhide Zhou, Zhilei Ren, Jingxuan Zhang, Xiaochen Li:
CTOS: Compiler Testing for Optimization Sequences of LLVM. 2339-2358 - Haoxiang Zhang, Shaowei Wang, Heng Li, Tse-Hsun Chen, Ahmed E. Hassan:
A Study of C/C++ Code Weaknesses on Stack Overflow. 2359-2375 - Yuan Huang, Jinyu Jiang, Xiapu Luo, Xiangping Chen, Zibin Zheng, Nan Jia, Gang Huang:
Change-Patterns Mapping: A Boosting Way for Change Impact Analysis. 2376-2398 - Han Wang, Chunyang Chen, Zhenchang Xing, John Grundy:
DiffTech: Differencing Similar Technologies From Crowd-Scale Comparison Discussions. 2399-2416 - Phuong T. Nguyen, Juri Di Rocco, Claudio Di Sipio, Davide Di Ruscio, Massimiliano Di Penta:
Recommending API Function Calls and Code Snippets to Support Software Development. 2417-2438 - Joshua Garcia, Ehsan Kouroshfar, Negar Ghorbani, Sam Malek:
Forecasting Architectural Decay From Evolutionary History. 2439-2454 - Mohamed El-Attar:
Empirically Evaluating the Effect of the Physics of Notations on Model Construction. 2455-2475 - Zhenhao Li, Tse-Hsun Chen, Jinqiu Yang, Weiyi Shang:
Studying Duplicate Logging Statements and Their Relationships With Code Clones. 2476-2494 - Emerson R. Murphy-Hill, Jillian Dicker, Margaret Morrow Hodges, Carolyn D. Egelman, Ciera Jaspan, Lan Cheng, Elizabeth Kammer, Ben Holtz, Matthew A. Jorde, Andrea Knight Dolan, Collin Green:
Engineering Impacts of Anonymous Author Code Review: A Field Experiment. 2495-2509 - Kewen Peng, Tim Menzies:
Defect Reduction Planning (Using TimeLIME). 2510-2525 - Xiao Ling, Rishabh Agrawal, Tim Menzies:
How Different is Test Case Prioritization for Open and Closed Source Projects? 2526-2540 - Xiaoxue Wu, Wei Zheng, Xin Xia, David Lo:
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction. 2541-2556 - Mikolaj Fejzer, Jakub Narebski, Piotr Przymus, Krzysztof Stencel:
Tracking Buggy Files: New Efficient Adaptive Bug Localization Algorithm. 2557-2569 - Omar Elazhary, Colin M. Werner, Ze Shi Li, Derek Lowlind, Neil A. Ernst, Margaret-Anne D. Storey:
Uncovering the Benefits and Challenges of Continuous Integration Practices. 2570-2583 - Valentín Valero, Gregorio Díaz, Juan Boubeta-Puig, Hermenegilda Macià, Enrique Brazález:
A Compositional Approach for Complex Event Pattern Modeling and Transformation to Colored Petri Nets with Black Sequencing Transitions. 2584-2605 - Chang Rao, Nan Li, Yu Lei, Jin Guo, Yadong Zhang, Raghu N. Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Multiple Input Models With Shared Parameters. 2606-2628 - Colin M. Werner, Ze Shi Li, Derek Lowlind, Omar Elazhary, Neil A. Ernst, Daniela E. Damian:
Continuously Managing NFRs: Opportunities and Challenges in Practice. 2629-2642 - Francesco Mercaldo, Antonella Santone:
Formal Equivalence Checking for Mobile Malware Detection and Family Classification. 2643-2657 - Maria Kechagia, Sergey Mechtaev, Federica Sarro, Mark Harman:
Evaluating Automatic Program Repair Capabilities to Repair API Misuses. 2658-2679 - Boqin Qin, Tengfei Tu, Ziheng Liu, Tingting Yu, Linhai Song:
Algorithmic Profiling for Real-World Complexity Problems. 2680-2694
Volume 48, Number 8, August 2022
- Md Atique Reza Chowdhury, Rabe Abdalkareem, Emad Shihab, Bram Adams:
On the Untriviality of Trivial Packages: An Empirical Study of npm JavaScript Packages. 2695-2708 - Henry Edison, Xiaofeng Wang, Kieran Conboy:
Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review. 2709-2731 - Maryam Bagheri, Marjan Sirjani, Ehsan Khamespanah, Christel Baier, Ali Movaghar:
Magnifier: A Compositional Analysis Approach for Autonomous Traffic Control. 2732-2747 - Kundi Yao, Mohammed Sayagh, Weiyi Shang, Ahmed E. Hassan:
Improving State-of-the-Art Compression Techniques for Log Management Tools. 2748-2760 - Hong Jin Kang, David Lo:
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. 2761-2783 - Mohammad Javad Beheshtian, Amir Hossein Bavand, Peter C. Rigby:
Software Batch Testing to Save Build Test Resources and to Reduce Feedback Time. 2784-2801 - Barbara A. Kitchenham, Lech Madeyski, Giuseppe Scanniello, Carmine Gravino:
The Importance of the Correlation in Crossover Experiments. 2802-2813 - Dilini Rajapaksha, Chakkrit Tantithamthavorn, Jirayus Jiarpakdee, Christoph Bergmeir, John Grundy, Wray L. Buntine:
SQAPlanner: Generating Data-Informed Software Quality Improvement Plans. 2814-2835 - Mojtaba Bagherzadeh, Nafiseh Kahani, Lionel C. Briand:
Reinforcement Learning for Test Case Prioritization. 2836-2856 - Mahdi Fahmideh, Aakash Ahmad, Ali Behnaz, John Grundy, Willy Susilo:
Software Engineering for Internet of Things: The Practitioners' Perspective. 2857-2878 - Max Hort, Maria Kechagia, Federica Sarro, Mark Harman:
A Survey of Performance Optimization for Mobile Applications. 2879-2904 - An Ran Chen, Tse-Hsun Chen, Shaowei Wang:
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs. 2905-2919 - He Ye, Jian Gu, Matias Martinez, Thomas Durieux, Martin Monperrus:
Automated Classification of Overfitting Patches With Statically Extracted Code Features. 2920-2938 - Amritanshu Agrawal, Xueqi Yang, Rishabh Agrawal, Rahul Yedida, Xipeng Shen, Tim Menzies:
Simpler Hyperparameter Optimization for Software Analytics: Why, How, When? 2939-2954 - Reza Nadri, Gema Rodríguez-Pérez, Meiyappan Nagappan:
On the Relationship Between the Developer's Perceptible Race and Ethnicity and the Evaluation of Contributions in OSS. 2955-2968 - Dayi Lin, Chakkrit Tantithamthavorn, Ahmed E. Hassan:
The Impact of Data Merging on the Interpretation of Cross-Project Just-In-Time Defect Models. 2969-2986 - Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao:
Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation. 2987-3009 - Darryl Jarman, Jeffrey Berry, Riley Smith, Ferdian Thung, David Lo:
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe. 3010-3024 - Cuiyun Gao, Jichuan Zeng, Zhiyuan Wen, David Lo, Xin Xia, Irwin King, Michael R. Lyu:
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing. 3025-3043 - Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. 3044-3065 - Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. 3066-3086 - Ahmad Abdellatif, Khaled Badran, Diego Elias Costa, Emad Shihab:
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering. 3087-3102 - Rahul Yedida, Tim Menzies:
On the Value of Oversampling for Deep Learning in Software Defect Prediction. 3103-3116 - Wilson Rosa, Bradford K. Clark, Raymond J. Madachy, Barry W. Boehm:
Empirical Effort and Schedule Estimation Models for Agile Processes in the US DoD. 3117-3130 - Junjie Wang, Ye Yang, Song Wang, Chunyang Chen, Dandan Wang, Qing Wang:
Context-Aware Personalized Crowdtesting Task Recommendation. 3131-3144 - Faizan Khan, Boqi Chen, Dániel Varró, Shane McIntosh:
An Empirical Study of Type-Related Defects in Python Projects. 3145-3158 - Wolfgang Mauerer, Mitchell Joblin, Damian A. Tamburri, Carlos V. Paradis, Rick Kazman, Sven Apel:
In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study. 3159-3184 - Vali Tawosi, Federica Sarro, Alessio Petrozziello, Mark Harman:
Multi-Objective Software Effort Estimation: A Replication Study. 3185-3205
Volume 48, Number 9, September 2022
- Arnaud Blouin, Jean-Marc Jézéquel:
Interacto: A Modern User Interaction Processing Model. 3206-3226 - Jiakun Liu, Xin Xia, David Lo, Haoxiang Zhang, Ying Zou, Ahmed E. Hassan, Shanping Li:
Broken External Links on Stack Overflow. 3242-3267 - Mathieu Nassif, Alexa Hernandez, Ashvitha Sridharan, Martin P. Robillard:
Generating Unit Tests for Documentation. 3268-3279 - Saikat Chakraborty, Rahul Krishna, Yangruibo Ding, Baishakhi Ray:
Deep Learning Based Vulnerability Detection: Are We There Yet? 3280-3296 - Christophe Rezk, Yasutaka Kamei, Shane McIntosh:
The Ghost Commit Problem When Identifying Fix-Inducing Changes: An Empirical Study of Apache Projects. 3297-3309 - Xavier Franch, Martin Glinz, Daniel Méndez, Norbert Seyff:
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry. 3310-3325 - Daniela Girardi, Filippo Lanubile, Nicole Novielli, Alexander Serebrenik:
Emotions and Perceived Productivity of Software Developers at the Workplace. 3326-3341 - Paulo Anselmo da Mota Silveira Neto, Umme Ayda Mannan, Eduardo Santana de Almeida, Nachiappan Nagappan, David Lo, Pavneet Singh Kochhar, Cuiyun Gao, Iftekhar Ahmed:
A Deep Dive into the Impact of COVID-19 on Software Development. 3342-3360 - Yong Shi, Mingzhi Wen, Filipe Roseiro Côgo, Boyuan Chen, Zhen Ming Jiang:
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems. 3361-3377 - Jorge Pérez, Ángel González-Prieto, Jessica Díaz, Daniel López-Fernández, Javier García Martín, Agustín Yagüe:
DevOps Research-Based Teaching Using Qualitative Research and Inter-Coder Agreement. 3378-3393 - Gede Artha Azriadi Prana, Denae Ford, Ayushi Rastogi, David Lo, Rahul Purandare, Nachiappan Nagappan:
Including Everyone, Everywhere: Understanding Opportunities and Challenges of Geographic Gender-Inclusion in OSS. 3394-3409 - Maxime Lamothe, Heng Li, Weiyi Shang:
Assisting Example-Based API Misuse Detection via Complementary Artificial Examples. 3410-3422 - Bowen Xu, Thong Hoang, Abhishek Sharma, Chengran Yang, Xin Xia, David Lo:
Post2Vec: Learning Distributed Representations of Stack Overflow Posts. 3423-3441 - Sami Ullah, Heekuck Oh:
BinDiffNN: Learning Distributed Representation of Assembly for Robust Binary Diffing Against Semantic Differences. 3442-3466 - Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. 3467-3484 - Aatira Anum Ahmad, Abdul Rafae Noor, Hashim Sharif, Usama Hameed, Shoaib Asif, Mubashir Anwar, Ashish Gehani, Fareed Zaffar, Junaid Haroon Siddiqui:
Trimmer: An Automated System for Configuration-Based Software Debloating. 3485-3505 - Christian D. Newman, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy J. Sheldon, Emily Hill:
An Ensemble Approach for Annotating Source Code Identifiers With Part-of-Speech Tags. 3506-3522 - Marco Kuhrmann, Paolo Tell, Regina Hebig, Jil Klünder, Jürgen Münch, Oliver Linssen, Dietmar Pfahl, Michael Felderer, Christian R. Prause, Stephen G. MacDonell, Joyce Nakatumba-Nabende, David Raffo, Sarah Beecham, Eray Tüzün, Gustavo López, Nicolás Paez, Diego Fontdevila, Sherlock A. Licorish, Steffen Küpper, Günther Ruhe, Eric Knauss, Özden Özcan-Top, Paul M. Clarke, Fergal McCaffery, Marcela Genero, Aurora Vizcaíno, Mario Piattini, Marcos Kalinowski, Tayana Conte, Rafael Prikladnicki, Stephan Krusche, Ahmet Coskunçay, Ezequiel Scott, Fabio Calefato, Svetlana Pimonova, Rolf-Helge Pfeiffer, Ulrik Pagh Schultz, Rogardt Heldal, Masud Fazal-Baqaie, Craig Anslow, Maleknaz Nayebi, Kurt Schneider, Stefan Sauer, Dietmar Winkler, Stefan Biffl, María Cecilia Bastarrica, Ita Richardson:
What Makes Agile Software Development Agile? 3523-3539 - Héctor D. Menéndez, David Clark:
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection. 3540-3553 - Claudio Mandrioli, Martina Maggio:
Testing Self-Adaptive Software With Probabilistic Guarantees on Performance Metrics: Extended and Comparative Results. 3554-3572 - Elvan Kula, Eric Greuter, Arie van Deursen, Georgios Gousios:
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development. 3573-3592 - Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling. 3593-3612 - Andreas Dann, Henrik Plate, Ben Hermann, Serena Elisa Ponta, Eric Bodden:
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite. 3613-3625 - Zainab Masood, Rashina Hoda, Kelly Blincoe:
What Drives and Sustains Self-Assignment in Agile Teams. 3626-3639 - Sooyoung Cha, Seongjoon Hong, Jiseong Bak, Jingyoung Kim, Junhee Lee, Hakjoo Oh:
Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics. 3640-3663 - Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache:
Combining Genetic Programming and Model Checking to Generate Environment Assumptions. 3664-3685 - Lu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng:
Detecting the Locations and Predicting the Maintenance Costs of Compound Architectural Debts. 3686-3715 - Steven Locke, Heng Li, Tse-Hsun Peter Chen, Weiyi Shang, Wei Liu:
LogAssist: Assisting Log Analysis Through Log Summarization. 3227-3241
Volume 48, Number 10, October 2022
- Daniel López-Fernández, Jessica Díaz, Javier Garcia, Jorge Pérez, Ángel González-Prieto:
DevOps Team Structures: Characterization and Implications. 3716-3736 - Kashumi Madampe, Rashina Hoda, John C. Grundy:
A Faceted Taxonomy of Requirements Changes in Agile Contexts. 3737-3752 - Chaima Abid, Dhia Elhaq Rzig, Thiago do Nascimento Ferreira, Marouane Kessentini, Tushar Sharma:
X-SBR: On the Use of the History of Refactorings for Explainable Search-Based Refactoring and Intelligent Change Operators. 3753-3770 - Nikita Mehrotra, Navdha Agarwal, Piyush Gupta, Saket Anand, David Lo, Rahul Purandare:
Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks. 3771-3789 - Abbas Javan Jafari, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab, Nikolaos Tsantalis:
Dependency Smells in JavaScript Projects. 3790-3807 - Rashina Hoda:
Socio-Technical Grounded Theory for Software Engineering. 3808-3832 - Nada Almasri, Bogdan Korel, Luay Tahat:
Verification Approach for Refactoring Transformation Rules of State-Based Models. 3833-3861 - Toufique Ahmed, Premkumar T. Devanbu, Anand Ashok Sawant:
Learning to Find Usages of Library Functions in Optimized Binaries. 3862-3876 - ThanhVu Nguyen, KimHao Nguyen, Matthew B. Dwyer:
Using Symbolic States to Infer Numerical Invariants. 3877-3899 - Goran Petrovic, Marko Ivankovic, Gordon Fraser, René Just:
Practical Mutation Testing at Scale: A view from Google. 3900-3912 - Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand:
Mutation Analysis for Cyber-Physical Systems: Scalable Solutions and Results in the Space Domain. 3913-3939 - Bianca Trinkenreich, Mariam Guizani, Igor Wiese, Tayana Conte, Marco Aurélio Gerosa, Anita Sarma, Igor Steinmacher:
Pots of Gold at the End of the Rainbow: What is Success for Open Source Contributors? 3940-3953 - Sen Chen, Chunyang Chen, Lingling Fan, Mingming Fan, Xian Zhan, Yang Liu:
Accessible or Not? An Empirical Investigation of Android App Accessibility. 3954-3968 - Binny M. Samuel, Hillol Bala, Sherae L. Daniel, V. Ramesh:
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics. 3969-3987 - Mariam El Mezouar, Daniel Alencar da Costa, Daniel M. Germán, Ying Zou:
Exploring the Use of Chatrooms by Developers: An Empirical Study on Slack and Gitter. 3988-4001 - Toni Mancini, Igor Melatti, Enrico Tronci:
Any-Horizon Uniform Random Sampling and Enumeration of Constrained Scenarios for Simulation-Based Formal Verification. 4002-4013 - Junbin Zhang, Yingying Wang, Lina Qiu, Julia Rubin:
Analyzing Android Taint Analysis Tools: FlowDroid, Amandroid, and DroidSafe. 4014-4040 - Ralph Hoch, Christoph Luckeneder, Roman Popp, Hermann Kaindl:
Verification of Consistency Between Process Models, Object Life Cycles, and Context-Dependent Semantic Specifications. 4041-4059 - Shouvick Mondal, Rupesh Nasre:
${{\sf Colosseum}}$Colosseum: Regression Test Prioritization by Delta Displacement in Test Coverage. 4060-4073 - Rahul Mohanani, Paul Ralph, Burak Turhan, Vladimir Mandic:
How Templated Requirements Specifications Inhibit Creativity in Software Engineering. 4074-4086 - Alexandre Decan, Tom Mens, Ahmed Zerouali, Coen De Roover:
Back to the Past - Analysing Backporting Practices in Package Dependency Networks. 4087-4099 - Thu-Trang Nguyen, Kien-Tuan Ngo, Son Nguyen, Hieu Dinh Vo:
A Variability Fault Localization Approach for Software Product Lines. 4100-4118 - Xintao Niu, Huayao Wu, Changhai Nie, Yu Lei, Xiaoyin Wang:
A Theory of Pending Schemas in Combinatorial Testing. 4119-4151 - Simon Eismann, Joel Scheuner, Erwin Van Eyk, Maximilian Schwinger, Johannes Grohmann, Nikolas Herbst, Cristina L. Abad, Alexandru Iosup:
The State of Serverless Applications: Collection, Characterization, and Community Consensus. 4152-4166 - Jianmin Guo, Quan Zhang, Yue Zhao, Heyuan Shi, Yu Jiang, Jia-Guang Sun:
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems. 4167-4180 - Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. 4181-4213 - Tao Xiao, Dong Wang, Shane McIntosh, Hideaki Hata, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
Characterizing and Mitigating Self-Admitted Technical Debt in Build Systems. 4214-4228
Volume 48, Number 11, November 2022
- Claudia P. Ayala, Burak Turhan, Xavier Franch, Natalia Juristo:
Use and Misuse of the Term "Experiment" in Mining Software Repositories Research. 4229-4248 - Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-Party Library Detection Tools. 4249-4273 - Hugo Martin, Mathieu Acher, Juliana Alves Pereira, Luc Lesoil, Jean-Marc Jézéquel, Djamel Eddine Khelladi:
Transfer Learning Across Variants and Versions: The Case of Linux Kernel Size. 4274-4290 - Niclas Kannengießer, Sebastian Lins, Christian Sander, Klaus Winter, Hellmuth Frey, Ali Sunyaev:
Challenges and Common Solutions in Smart Contract Development. 4291-4318 - Fatima Sabir, Yann-Gaël Guéhéneuc, Francis Palma, Naouel Moha, Ghulam Rasool, Hassan Akhtar:
A Mixed-Method Approach to Recommend Corrections and Correct REST Antipatterns. 4319-4338 - Ana Neri, Rui Soares Barbosa, José N. Oliveira:
Compiling Quantamorphisms for the IBM Q Experience. 4339-4356 - Xinqiang Xie, Xiaochun Yang, Bin Wang, Qiang He:
DevRec: Multi-Relationship Embedded Software Developer Recommendation. 4357-4379 - Fuchen Ma, Zhenyang Xu, Meng Ren, Zijing Yin, Yuanliang Chen, Lei Qiao, Bin Gu, Huizhong Li, Yu Jiang, Jia-Guang Sun:
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. 4380-4396 - John Spray, Roopak Sinha, Arnab Sen, Xingbin Cheng:
Building Maintainable Software Using Abstraction Layering. 4397-4410 - Yixuan Tang, He Jiang, Zhide Zhou, Xiaochen Li, Zhilei Ren, Weiqiang Kong:
Detecting Compiler Warning Defects Via Diversity-Guided Program Mutation. 4411-4432 - Renana Arizon-Peretz, Irit Hadar, Gil Luria:
The Importance of Security Is in the Eye of the Beholder: Cultural, Organizational, and Personal Factors Affecting the Implementation of Security by Design. 4433-4446 - Ali Ebnenasir:
Verification and Synthesis of Responsive Symmetric Uni-Rings. 4447-4464 - Rui Li, Wenrui Diao, Zhou Li, Shishuai Yang, Shuang Li, Shanqing Guo:
Android Custom Permissions Demystified: A Comprehensive Security Evaluation. 4465-4484 - Mingwei Liu, Xin Peng, Andrian Marcus, Shuangshuang Xing, Christoph Treude, Chengyuan Zhao:
API-Related Developer Information Needs in Stack Overflow. 4485-4500 - Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. 4501-4520 - Matias Martinez, Bruno Gois Mateus:
Why Did Developers Migrate Android Applications From Java to Kotlin? 4521-4534 - Afsoon Afzal, Claire Le Goues, Christopher Steven Timperley:
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems. 4535-4552 - Francisca Pérez, Jaime Font, Lorena Arcega, Carlos Cetina:
Empowering the Human as the Fitness Function in Search-Based Model-Driven Engineering. 4553-4568 - Binfa Gui, Wei Song, Hailong Xiong, Jeff Huang:
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone? 4569-4589 - Georg Seibt, Florian Heck, Guilherme Cavalcanti, Paulo Borba, Sven Apel:
Leveraging Structure in Software Merge: An Empirical Study. 4590-4610 - Hai Jin, Zeli Wang, Ming Wen, Weiqi Dai, Yu Zhu, Deqing Zou:
Aroc: An Automatic Repair Framework for On-Chain Smart Contracts. 4611-4629 - Pengcheng Zhang, Bin Ren, Hai Dong, Qiyin Dai:
CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing for Image-Based Deep Learning Systems. 4630-4646 - Orlando Amaral, Sallam Abualhaija, Damiano Torre, Mehrdad Sabetzadeh, Lionel C. Briand:
AI-Enabled Automation for Completeness Checking of Privacy Policies. 4647-4674 - Alessio Ferrari, Franco Mazzanti, Davide Basile, Maurice H. ter Beek:
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design. 4675-4691 - Samuel Benton, Xia Li, Yiling Lou, Lingming Zhang:
Evaluating and Improving Unified Debugging. 4692-4716
Volume 48, Number 12, December 2022
- Nikhil Parasaram, Earl T. Barr, Sergey Mechtaev:
Trident: Controlling Side Effects in Automated Program Repair. 4717-4732 - Haipeng Cai, Xiaoqin Fu:
D$^2$2Abs: A Framework for Dynamic Dependence Analysis of Distributed Programs. 4733-4761 - Laura Carnevali, Reinhard German, Francesco Santoni, Enrico Vicario:
Compositional Analysis of Hierarchical UML Statecharts. 4762-4788 - Stefan Wagner, Marvin Wyrich:
Code Comprehension Confounders: A Study of Intelligence and Personality. 4789-4801 - José Ignacio Panach, Oscar Pastor, Natalia Juristo:
A Family of Experiments to Compare Two Model-Driven Development Tools vs a Traditional Development Method. 4802-4817 - Matteo Ciniselli, Nathan Cooper, Luca Pascarella, Antonio Mastropaolo, Emad Aghajani, Denys Poshyvanyk, Massimiliano Di Penta, Gabriele Bavota:
An Empirical Study on the Usage of Transformer Models for Code Completion. 4818-4837 - Adam Alami, Raúl Pardo, Marisa Leavitt Cohn, Andrzej Wasowski:
Pull Request Governance in Open Source Communities. 4838-4856 - Foozhan Ataiefard, Mohammad Jafar Mashhadi, Hadi Hemmati, Neil Walkinshaw:
Deep State Inference: Toward Behavioral Model Inference of Black-Box Software Systems. 4857-4872 - Islem Saidani, Ali Ouni, Mohamed Wiem Mkaouer:
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search. 4873-4891 - Dimitrios Tsoukalas, Nikolaos Mittas, Alexander Chatzigeorgiou, Dionisis D. Kehagias, Apostolos Ampatzoglou, Theodoros Amanatidis, Lefteris Angelis:
Machine Learning for Technical Debt Identification. 4892-4906 - Heng Li, Haoxiang Zhang, Shaowei Wang, Ahmed E. Hassan:
Studying the Practices of Logging Exception Stack Traces in Open-Source Software Projects. 4907-4924 - Maurício Aniche, Christoph Treude, Andy Zaidman:
How Developers Engineer Test Cases: An Observational Study. 4925-4946 - Yao Lu, Xinjun Mao, Minghui Zhou, Yang Zhang, Zude Li, Tao Wang, Gang Yin, Huaimin Wang:
Motivation Under Gamification: An Empirical Study of Developers' Motivations and Contributions in Stack Overflow. 4947-4963 - Gustavo Vale, Claus Hunsen, Eduardo Figueiredo, Sven Apel:
Challenges of Resolving Merge Conflicts: A Mining and Survey Study. 4964-4985 - Lizhi Liao, Jinfu Chen, Heng Li, Yi Zeng, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi:
Locating Performance Regression Root Causes in the Field Operations of Web-Based Systems: An Experience Report. 4986-5006 - Xintao Niu, Yanjie Sun, Huayao Wu, Gang Li, Changhai Nie, Yu Lei, Xiaoyin Wang:
Enhance Combinatorial Testing With Metamorphic Relations. 5007-5029 - Lina Gong, Gopi Krishnan Rajbahadur, Ahmed E. Hassan, Shujuan Jiang:
Revisiting the Impact of Dependency Network Metrics on Software Defect Prediction. 5030-5049 - Julian Aron Prenner, Romain Robbes:
Making the Most of Small Software Engineering Datasets With Modern Machine Learning. 5050-5067 - Fangcheng Qiu, Zhipeng Gao, Xin Xia, David Lo, John C. Grundy, Xinyu Wang:
Deep Just-In-Time Defect Localization. 5068-5086 - Muhammad Hilmi Asyrofi, Zhou Yang, Imam Nur Bani Yusuf, Hong Jin Kang, Ferdian Thung, David Lo:
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems. 5087-5101 - Feng Li, Jianyi Zhou, Yinzhu Li, Dan Hao, Lu Zhang:
AGA: An Accelerated Greedy Additional Algorithm for Test Case Prioritization. 5102-5119 - Jia-Ju Bai, Qiu-Liang Chen, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu:
Hybrid Static-Dynamic Analysis of Data Races Caused by Inconsistent Locking Discipline in Device Drivers. 5120-5135 - Shachi Sharma, Parag C. Pendharkar, Karmeshu:
Learning Component Size Distributions for Software Cost Estimation: Models Based on Arithmetic and Shifted Geometric Means Rules. 5136-5147 - Miroslav Tushev, Fahimeh Ebrahimi, Anas Mahmoud:
A Systematic Literature Review of Anti-Discrimination Design Strategies in the Digital Sharing Economy. 5148-5157 - Waqar Hussain, Mojtaba Shahin, Rashina Hoda, Jon Whittle, Harsha Perera, Arif Nurwidyantoro, Rifat Ara Shams, Gillian C. Oliver:
How Can Human Values be Addressed in Agile Methods? A Case Study on SAFe. 5158-5175 - Weifeng Pan, Ming Hua, Zijiang Yang, Tian Wang:
Comments on "Using $k$k-Core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance". 5176-5187 - Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay:
Astraea: Grammar-Based Fairness Testing. 5188-5211
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.