


default search action
IEEE Transactions on Software Engineering, Volume 49
Volume 49, Number 1, January 2023
- Zhongxin Liu
, Xin Xia
, David Lo
, Meng Yan
, Shanping Li:
Just-In-Time Obsolete Comment Detection and Update. 1-23 - Aayush Garg
, Milos Ojdanic, Renzo Degiovanni
, Thierry Titcheu Chekam, Mike Papadakis
, Yves Le Traon
:
Cerebro: Static Subsuming Mutant Selection. 24-43 - Emanuele Iannone
, Roberta Guadagni, Filomena Ferrucci
, Andrea De Lucia
, Fabio Palomba
:
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. 44-63 - Simon Larsén
, Jean-Rémy Falleri
, Benoit Baudry
, Martin Monperrus
:
Spork: Structured Merge for Java With Formatting Preservation. 64-83 - Yingquan Zhao
, Zan Wang
, Shuang Liu
, Jun Sun
, Junjie Chen
, Xiang Chen
:
Achieving High MAP-Coverage Through Pattern Constraint Reduction. 99-112 - Yanjie Zhao
, Li Li
, Haoyu Wang, Qiang He
, John C. Grundy
:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. 113-130 - Anjana Perera
, Aldeida Aleti
, Burak Turhan
, Marcel Böhme
:
An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing. 131-146 - Zimin Chen
, Steve Kommrusch
, Martin Monperrus
:
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. 147-165 - Ellen Arteca
, Max Schäfer, Frank Tip
:
Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs. 166-184 - Ying Wang
, Yibo Wang, Sinan Wang, Yepang Liu
, Chang Xu
, Shing-Chi Cheung
, Hai Yu
, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. 185-210 - Marco Hoffmann
, Daniel Méndez
, Fabian Fagerholm
, Anton Luckhardt
:
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges. 211-225 - Huaijin Wang
, Pingchuan Ma, Yuanyuan Yuan
, Zhibo Liu
, Shuai Wang
, Qiyi Tang
, Sen Nie, Shi Wu:
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking. 226-250 - Juan M. Ferreira
, Francy D. Rodríguez
, Adrián Santos
, Oscar Dieste
, Silvia Teresita Acuña, Natalia Juristo:
Impact of Usability Mechanisms: A Family of Experiments on Efficiency, Effectiveness and User Satisfaction. 251-267 - Sadia Tabassum
, Leandro L. Minku
, Danyi Feng
:
Cross-Project Online Just-In-Time Software Defect Prediction. 268-287 - Ying Zhang
, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao
, Na Meng
:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? 288-303 - Ai Liu
, Shaoying Liu
:
Enhancing the Capability of Testing-Based Formal Verification by Handling Operations in Software Packages. 304-324 - Damian A. Tamburri
, Rick Kazman
, Hamed Fahimi:
On the Relationship Between Organizational Structure Patterns and Architecture in Agile Teams. 325-347 - Juan C. Alonso
, Alberto Martin-Lopez
, Sergio Segura
, José María García
, Antonio Ruiz-Cortés
:
ARTE: Automated Generation of Realistic Test Inputs for Web APIs. 348-363 - Ranci Ren, John W. Castro
, Adrián Santos
, Oscar Dieste
, Silvia Teresita Acuña:
Using the SOCIO Chatbot for UML Modelling: A Family of Experiments. 364-383 - Chengjie Lu
, Yize Shi, Huihui Zhang, Man Zhang
, Tiexin Wang
, Tao Yue
, Shaukat Ali
:
Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions. 384-402 - Zhe Liu
, Chunyang Chen
, Junjie Wang
, Yuekai Huang, Jun Hu, Qing Wang
:
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding. 403-418 - Emily Winter
, Vesna Nowack
, David Bowes
, Steve Counsell
, Tracy Hall
, Sæmundur Óskar Haraldsson
, John R. Woodward
:
Let's Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research. 419-436 - Hao Li
, Filipe Roseiro Côgo, Cor-Paul Bezemer
:
An Empirical Study of Yanked Releases in the Rust Package Registry. 437-449 - Leping Li
, Hui Liu
, Kejun Li, Yanjie Jiang, Rui Sun:
Generating Concise Patches for Newly Released Programming Assignments. 450-467 - Chanathip Pornprasit
, Chakkrit Kla Tantithamthavorn
:
DeepLineDP: Towards a Deep Learning Approach for Line-Level Defect Prediction. 84-98
Volume 49, Number 2, February 2023
- Youssef Esseddiq Ouatiti
, Mohammed Sayagh
, Noureddine Kerzazi, Ahmed E. Hassan:
An Empirical Study on Log Level Prediction for Multi-Component Systems. 473-484 - Sharmin Afrose
, Ya Xiao, Sazzadur Rahaman, Barton P. Miller
, Danfeng Yao
:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. 485-497 - Neng Zhang
, Ying Zou, Xin Xia
, Qiao Huang, David Lo
, Shanping Li:
Web APIs: Features, Issues, and Expectations - A Large-Scale Empirical Study of Web APIs From Two Publicly Accessible Registries Using Stack Overflow and a User Survey. 498-528 - Yang Yue
, Yi Wang
, David F. Redmiles:
Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer's Early Career. 529-548 - Jesús Manuel Almendros-Jiménez
, Antonio Becerra-Terón
, Mercedes G. Merayo
, Manuel Núñez
:
Using Metamorphic Testing to Improve the Quality of Tags in OpenStreetMap. 549-563 - Jianlei Chi
, Yu Qu
, Ting Liu
, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. 564-585 - Shiran Liu
, Zhaoqiang Guo, Yanhui Li
, Chuanqi Wang, Lin Chen
, Zhongbin Sun, Yuming Zhou
, Baowen Xu
:
Inconsistent Defect Labels: Essence, Causes, and Influence. 586-610 - Michael Fu
, Chakkrit Tantithamthavorn
:
GPT2SP: A Transformer-Based Agile Story Point Estimation Approach. 611-625 - Haytham Hijazi
, João Durães
, Ricardo Couceiro, João Castelhano
, Raul Barbosa
, Júlio Medeiros
, Miguel Castelo-Branco
, Paulo de Carvalho
, Henrique Madeira
:
Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension. 626-645 - Liyan Song
, Leandro L. Minku
:
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development. 646-666 - Sen Chen
, Lingling Fan
, Chunyang Chen
, Yang Liu
:
Automatically Distilling Storyboard With Rich Features for Android Apps. 667-683 - Dongyang Zhan
, Xiangzhan Yu, Hongli Zhang
, Lin Ye
:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. 684-698 - Marthe Nordengen Berntzen
, Rashina Hoda
, Nils Brede Moe
, Viktoria Stray
:
A Taxonomy of Inter-Team Coordination Mechanisms in Large-Scale Agile. 699-718 - Dongjie He
, Jingbo Lu
, Yaoqing Gao
, Jingling Xue
:
Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis. 719-742 - Elias Eid, Nancy A. Day
:
Static Profiling of Alloy Models. 743-759 - Kai Gao
, Zhixing Wang, Audris Mockus
, Minghui Zhou
:
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types. 760-776 - Zhou Liao, Shuwei Song
, Hang Zhu, Xiapu Luo
, Zheyuan He, Renkai Jiang, Ting Chen
, Jiachi Chen
, Tao Zhang
, Xiaosong Zhang
:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. 777-801 - Giulio Rossolini
, Alessandro Biondi
, Giorgio C. Buttazzo
:
Increasing the Confidence of Deep Neural Networks by Coverage Analysis. 802-815 - Frank Ebbers
:
A Large-Scale Analysis of IoT Firmware Version Distribution in the Wild. 816-830 - Liushan Chen
, Yu Pei
, Minxue Pan
, Tian Zhang, Qixin Wang, Carlo A. Furia
:
Program Repair With Repeated Learning. 831-848 - Xunhui Zhang
, Yue Yu
, Georgios Gousios
, Ayushi Rastogi
:
Pull Request Decisions Explained: An Empirical Overview. 849-871 - Barbara A. Kitchenham
, Lech Madeyski
, David Budgen
:
How Should Software Engineering Secondary Studies Include Grey Material? 872-882 - Ricardo Amaro
, Rúben Pereira, Miguel Mira da Silva
:
Capabilities and Practices in DevOps: A Multivocal Literature Review. 883-901 - Shenghui Gu
, Guoping Rong
, He Zhang, Haifeng Shen
:
Logging Practices in Software Engineering: A Systematic Mapping Study. 902-923 - Yutong Zhao
, Lu Xiao
, Andre B. Bondi
, Bihuan Chen
, Yang Liu
:
A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects. 924-946
Volume 49, Number 3, March 2023
- Yao Zhang
, Xiaofei Xie
, Yi Li
, Yun Lin
, Sen Chen
, Yang Liu
, Xiaohong Li
:
Demystifying Performance Regressions in String Solvers. 947-961 - Néstor Cataño
:
Program Synthesis for Cyber-Resilience. 962-972 - Maria Angela Ferrario
, Emily Winter
:
Applying Human Values Theory to Software Engineering Practice: Lessons and Implications. 973-990 - Xinhai Zhang
, Jianbo Tao, Kaige Tan
, Martin Törngren
, José Manuel Gaspar Sánchez, Muhammad Rusyadi Ramli
, Xin Tao
, Magnus Gyllenhammar
, Franz Wotawa
, Naveen Mohan, Mihai Nica, Hermann Felbinger:
Finding Critical Scenarios for Automated Driving Systems: A Systematic Mapping Study. 991-1026 - Markos Viggiato
, Dale Paas, Chris Buzon, Cor-Paul Bezemer
:
Identifying Similar Test Cases That Are Specified in Natural Language. 1027-1043 - Roland Croft
, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. 1044-1063 - Wuxia Jin
, Dinghong Zhong, Yuanfang Cai
, Rick Kazman
, Ting Liu
:
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability. 1064-1085 - Rahul Krishna Yandrapally
, Ali Mesbah
:
Fragment-Based Test Generation for Web Apps. 1086-1101 - José Miguel Horcas
, Daniel Strüber
, Alexandru Burdusel, Jabier Martinez
, Steffen Zschaler
:
We're Not Gonna Break It! Consistency-Preserving Operators for Efficient Product Line Configuration. 1102-1117 - Weifeng Pan
, Ming Hua, Dae-Kyoo Kim
, Zijiang Yang:
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules. 1118-1151 - Elvys Soares
, Márcio Ribeiro
, Rohit Gheyi
, Guilherme Amaral
, André L. M. Santos
:
Refactoring Test Smells With JUnit 5: Why Should Developers Keep Up-to-Date? 1152-1170 - Kashumi Madampe
, Rashina Hoda
, John Grundy
:
The Emotional Roller Coaster of Responding to Requirements Changes in Software Engineering. 1171-1187 - Simin Wang
, Liguo Huang
, Amiao Gao, Jidong Ge
, Tengfei Zhang, Haitao Feng
, Ishna Satyarth
, Ming Li, He Zhang
, Vincent Ng
:
Machine/Deep Learning for Software Engineering: A Systematic Literature Review. 1188-1231 - Pravas Ranjan Bal
, Sandeep Kumar
:
A Data Transfer and Relevant Metrics Matching Based Approach for Heterogeneous Defect Prediction. 1232-1245 - Mattia Fazzini
, Kevin Moran
, Carlos Bernal-Cárdenas
, Tyler Wendland, Alessandro Orso
, Denys Poshyvanyk
:
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps. 1246-1272 - Barbara A. Kitchenham
, Lech Madeyski
, David Budgen
:
SEGRESS: Software Engineering Guidelines for REporting Secondary Studies. 1273-1298 - Kenji Tei
, Yasuyuki Tahara
, Akihiko Ohsuga
:
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems. 1299-1322 - Ramy Shahin
, Murad Akhundov
, Marsha Chechik:
Annotative Software Product Line Analysis Using Variability-Aware Datalog. 1323-1341 - George G. Cabral
, Leandro L. Minku
:
Towards Reliable Online Just-in-Time Software Defect Prediction. 1342-1358 - Giorgio Di Tizio
, Michele Armellini
, Fabio Massacci
:
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats. 1359-1373 - Dag I. K. Sjøberg
, Gunnar Rye Bergersen
:
Construct Validity in Software Engineering. 1374-1396
Volume 49, Number 4, April 2023
- George Mathew
, Amritanshu Agrawal
, Tim Menzies
:
Finding Trends in Software Research. 1397-1410 - Michaela Greiler
, Margaret-Anne D. Storey
, Abi Noda:
An Actionable Framework for Understanding and Improving Developer Experience. 1411-1425 - Weihan Ou
, Steven H. H. Ding
, Yuan Tian
, Leo Song
:
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification. 1426-1442 - Yanjie Jiang
, Hui Liu
, Xiaoqing Luo, Zhihao Zhu, Xiaye Chi, Nan Niu
, Yuxia Zhang, Yamin Hu
, Pan Bian, Lu Zhang
:
BugBuilder: An Automated Approach to Building Bug Repository. 1443-1463 - Le Yu
, Haoyu Wang, Xiapu Luo
, Tao Zhang
, Kang Liu, Jiachi Chen
, Hao Zhou, Yutian Tang
, Xusheng Xiao
:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. 1464-1486 - Julian von der Mosel
, Alexander Trautsch
, Steffen Herbold
:
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain. 1487-1507 - Kevin Jesse
, Premkumar T. Devanbu
, Anand Ashok Sawant
:
Learning to Predict User-Defined Types. 1508-1522 - Mohannad Alhanahnah
, Clay Stevens
, Bocheng Chen, Qiben Yan
, Hamid Bagheri
:
IoTCom: Dissecting Interaction Threats in IoT Systems. 1523-1539 - Nasif Imtiaz
, Aniqa Khanom, Laurie A. Williams
:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. 1540-1560 - Zhanyao Lei
, Yixiong Chen
, Yang Yang, Mingyuan Xia
, Zhengwei Qi
:
Bootstrapping Automated Testing for RESTful Web Services. 1561-1579 - Antonio Mastropaolo
, Nathan Cooper
, David Nader-Palacio, Simone Scalabrino
, Denys Poshyvanyk
, Rocco Oliveto
, Gabriele Bavota
:
Using Transfer Learning for Code-Related Tasks. 1580-1598 - Elizabeth Dinella
, Todd Mytkowicz, Alexey Svyatkovskiy, Christian Bird
, Mayur Naik, Shuvendu K. Lahiri:
DeepMerge: Learning to Merge Programs. 1599-1614 - Ahmadreza Saboor Yaraghi
, Mojtaba Bagherzadeh, Nafiseh Kahani, Lionel C. Briand
:
Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts. 1615-1639 - Bo Lin
, Shangwen Wang
, Zhongxin Liu
, Xin Xia
, Xiaoguang Mao
:
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach. 1640-1660 - Dongkwan Kim
, Eunsoo Kim, Sang Kil Cha
, Sooel Son
, Yongdae Kim
:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. 1661-1682 - Muhui Jiang
, Qinming Dai, Wenlong Zhang, Rui Chang
, Yajin Zhou
, Xiapu Luo
, Ruoyu Wang, Yang Liu
, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. 1683-1703 - Mostafa Jangali
, Yiming Tang
, Niclas Alexandersson
, Philipp Leitner
, Jinqiu Yang, Weiyi Shang:
Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests. 1704-1725 - Mohammad Alahmadi
:
VID2XML: Automatic Extraction of a Complete XML Data From Mobile Programming Screencasts. 1726-1740 - Yulu Cao
, Lin Chen
, Wanwangying Ma, Yanhui Li
, Yuming Zhou
, Linzhang Wang
:
Towards Better Dependency Management: A First Look at Dependency Smells in Python Projects. 1741-1765 - Abu Naser Masud
:
The Duality in Computing SSA Programs and Control Dependency. 1766-1781 - Carlos Bernal-Cárdenas
, Nathan Cooper
, Madeleine Havranek, Kevin Moran
, Oscar Chaparro
, Denys Poshyvanyk
, Andrian Marcus
:
Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios. 1782-1803 - Pasquale Salza
, Christoph Schwizer, Jian Gu, Harald C. Gall
:
On the Effectiveness of Transfer Learning for Code Search. 1804-1822 - Emily Winter
, David Bowes
, Steve Counsell
, Tracy Hall
, Saemundur O. Haraldsson
, Vesna Nowack
, John R. Woodward
:
How do Developers Really Feel About Bug Fixing? Directions for Automatic Program Repair. 1823-1841 - Zhenya Zhang
, Deyun Lyu
, Paolo Arcaini
, Lei Ma
, Ichiro Hasuo
, Jianjun Zhao:
FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria. 1842-1859 - Ziyuan Zhong
, Gail E. Kaiser
, Baishakhi Ray
:
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles. 1860-1875 - Yun Peng
, Shuqing Li
, Wenwei Gu, Yichen Li
, Wenxuan Wang, Cuiyun Gao
, Michael R. Lyu:
Revisiting, Benchmarking and Exploring API Recommendation: How Far Are We? 1876-1897 - Leonardo A. F. Leite
, Nelson Lago, Claudia de O. Melo, Fabio Kon
, Paulo Meirelles
:
A Theory of Organizational Structures for Development and Infrastructure Professionals. 1898-1911 - Sakina Fatima
, Taher Ahmed Ghaleb
, Lionel C. Briand
:
Flakify: A Black-Box, Language Model-Based Predictor for Flaky Tests. 1912-1927 - Andrea Stocco
, Brian Pulfer, Paolo Tonella
:
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems. 1928-1940 - Zhiqiang Li
, Hongyu Zhang
, Xiao-Yuan Jing
, Juanying Xie
, Min Guo, Jie Ren
:
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction. 1941-1963 - Yao Deng
, James Xi Zheng
, Tianyi Zhang, Huai Liu
, Guannan Lou, Miryung Kim
, Tsong Yueh Chen
:
A Declarative Metamorphic Testing Framework for Autonomous Driving. 1964-1982 - Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj
, Xiapu Luo
, Haipeng Cai
:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. 1983-2005 - Faizan Khan
, Istvan David
, Dániel Varró
, Shane McIntosh
:
Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study. 2006-2019 - Zoe Kotti
, Georgios Gousios
, Diomidis Spinellis
:
Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis. 2020-2038 - Keila Barbosa, Ronivaldo Ferreira
, Gustavo Pinto
, Marcelo d'Amorim
, Breno Miranda
:
Test Flakiness Across Programming Languages. 2039-2052 - Ming Wen
, Zifan Xie
, Kaixuan Luo
, Xiao Chen, Yibiao Yang
, Hai Jin
:
Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis. 2053-2068 - Pouria Derakhshanfar
, Xavier Devroey
, Annibale Panichella, Andy Zaidman
, Arie van Deursen
:
Generating Class-Level Integration Tests Using Call Site Information. 2069-2087 - Alejandrina M. Aranda, Oscar Dieste
, José Ignacio Panach
, Natalia Juristo:
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments. 2088-2106 - Zhe Chen
, Qi Zhang, Jun Wu, Junqi Yan, Jingling Xue
:
A Source-Level Instrumentation Framework for the Dynamic Analysis of Memory Safety. 2107-2127 - Mikko Raatikainen
, Quim Motger
, Clara Marie Lüders
, Xavier Franch
, Lalli Myllyaho
, Elina Kettunen
, Jordi Marco
, Juha Tiihonen, Mikko Halonen, Tomi Männistö
:
Improved Management of Issue Dependencies in Issue Trackers of Large Collaborative Projects. 2128-2148 - Hourieh Khalajzadeh
, Mojtaba Shahin
, Humphrey O. Obie, Pragya Agrawal, John C. Grundy
:
Supporting Developers in Addressing Human-Centric Issues in Mobile Apps. 2149-2168 - Toufique Ahmed
, Noah Rose Ledesma, Premkumar T. Devanbu:
SynShine: Improved Fixing of Syntax Errors. 2169-2181 - Enrico Viganò, Oscar Cornejo
, Fabrizio Pastore
, Lionel C. Briand
:
Data-Driven Mutation Analysis for Cyber-Physical Systems. 2182-2201 - Danyllo Albuquerque
, Everton Guimarães
, Graziela Tonin, Pilar Rodríguez
, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich
, Ferdinandy Chagas:
Managing Technical Debt Using Intelligent Techniques - A Systematic Mapping Study. 2202-2220 - Iason Papapanagiotakis-Bousy
, Earl T. Barr
, David Clark
:
PopArt: Ranked Testing Efficiency. 2221-2238 - Shuyao Jiang
, Jiacheng Shen
, Shengnan Wu, Yu Cai, Yue Yu
, Yangfan Zhou
:
Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study. 2239-2254 - Sergio Luis Herrera Gonzalez
, Piero Fraternali
:
Almost Rerere: Learning to Resolve Conflicts in Distributed Projects. 2255-2271 - Jianjun Huang
, Bo Xue
, Jiasheng Jiang
, Wei You
, Bin Liang
, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. 2272-2284 - Xiaowei Zhang
, Weiqin Zou
, Lin Chen
, Yanhui Li
, Yuming Zhou
:
Towards the Analysis and Completion of Syntactic Structure Ellipsis for Inline Comments. 2285-2302 - Achiya Elyasaf
, Tom Yaacov
, Gera Weiss
:
What Petri Nets Oblige us to Say Comparing Approaches for Behavior Composition. 2303-2317 - Xiuting Ge, Shengcheng Yu
, Chunrong Fang
, Qi Zhu, Zhihong Zhao:
Leveraging Android Automated Testing to Assist Crowdsourced Testing. 2318-2336 - Lucas Zamprogno
, Braxton Hall, Reid Holmes
, Joanne M. Atlee:
Dynamic Human-in-the-Loop Assertion Generation. 2337-2351 - An Ran Chen
, Tse-Hsun Peter Chen
, Shaowei Wang
:
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure. 2352-2365 - Luca Di Grazia
, Paul Bredl
, Michael Pradel
:
DiffSearch: A Scalable and Precise Search Engine for Code Changes. 2366-2380 - James Tizard
, Peter Devine, Hechen Wang
, Kelly Blincoe
:
A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management. 2381-2393 - Xu Zhou
, Pengfei Wang
, Chenyifan Liu, Tai Yue
, Yingying Liu, Congxi Song
, Kai Lu, Qidi Yin, Xu Han:
UltraFuzz: Towards Resource-Saving in Distributed Fuzzing. 2394-2412 - Ifeanyi G. Ndukwe
, Sherlock A. Licorish
, Stephen G. MacDonell
:
Perceptions on the Utility of Community Question and Answer Websites Like Stack Overflow to Software Developers. 2413-2425 - Kewen Peng
, Joymallya Chakraborty, Tim Menzies
:
FairMask: Better Fairness via Model-Based Rebalancing of Protected Attributes. 2426-2439 - Lina Gong
, Haoxiang Zhang
, Jingxuan Zhang
, Mingqiang Wei
, Zhiqiu Huang
:
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction. 2440-2458 - Michel Benaroch
, Kalle Lyytinen
:
How Much Does Software Complexity Matter for Maintenance Productivity? The Link Between Team Instability and Diversity. 2459-2475 - Taher Ahmed Ghaleb
, Safwat Hassan
, Ying Zou:
Studying the Interplay Between the Durations and Breakages of Continuous Integration Builds. 2476-2497 - Ioannis Zozas
, Stamatia Bibi
, Apostolos Ampatzoglou
:
Forecasting the Principal of Code Technical Debt in JavaScript Applications. 2498-2512 - Guofu Zhang
, Lei Li, Zhaopin Su
, Zhisheng Shao, Miqing Li
, Bin Li
, Xin Yao
:
New Reliability-Driven Bounds for Architecture-Based Multi-Objective Testing Resource Allocation. 2513-2529 - Zhixing Li
, Yue Yu
, Tao Wang, Yan Lei
, Ying Wang
, Huaimin Wang:
To Follow or Not to Follow: Understanding Issue/Pull-Request Templates on GitHub. 2530-2544 - Yikun Li
, Mohamed Soliman, Paris Avgeriou
, Lou Somers:
Self-Admitted Technical Debt in the Embedded Systems Industry: An Exploratory Case Study. 2545-2565 - Supatsara Wattanakriengkrai
, Dong Wang
, Raula Gaikovina Kula
, Christoph Treude
, Patanamon Thongtanunam
, Takashi Ishio
, Kenichi Matsumoto
:
Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem. 2566-2579 - Pedro Delgado-Pérez
, Aurora Ramírez
, Kevin J. Valle-Gómez
, Inmaculada Medina-Bulo
, José Raúl Romero
:
InterEvo-TR: Interactive Evolutionary Test Generation With Readability Assessment. 2580-2596 - Jingxuan Zhang
, Siyuan Liu, Lina Gong
, Haoxiang Zhang
, Zhiqiu Huang
, He Jiang
:
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System. 2597-2620 - Bernhard Schäfer
, Han van der Aa
, Henrik Leopold
, Heiner Stuckenschmidt
:
Sketch2Process: End-to-End BPMN Sketch Recognition Based on Neural Networks. 2621-2641 - Neelofar
, Kate Smith-Miles
, Mario Andrés Muñoz
, Aldeida Aleti
:
Instance Space Analysis of Search-Based Software Testing. 2642-2660 - José Antonio Hernández López
, Jesús Sánchez Cuadrado
:
Generating Structurally Realistic Models With Deep Autoregressive Networks. 2661-2676 - Vali Tawosi
, Rebecca Moussa
, Federica Sarro
:
Agile Effort Estimation: Have We Solved the Problem Yet? Insights From a Replication Study. 2677-2697 - Max Ellis
, Sarah Nadi
, Danny Dig:
Operation-Based Refactoring-Aware Merging: An Empirical Evaluation. 2698-2721 - Naweiluo Zhou
, Huan Zhou
, Dennis Hoppe:
Containerization for High Performance Computing Systems: Survey and Prospects. 2722-2740 - Claudio Menghi
, Christos Tsigkanos, Mehrnoosh Askarpour, Patrizio Pelliccione
, Gricel Vázquez, Radu Calinescu
, Sergio García:
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties. 2741-2760 - Mohannad Alhanahnah
, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. 2761-2775 - Kexin Pei
, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray
:
Learning Approximate Execution Semantics From Traces for Binary Function Similarity. 2776-2790 - Xiao Wang
, Lu Xiao
, Tingting Yu
, Anne Woepse
, Sunny Wong
:
From Inheritance to Mockito: An Automatic Refactoring Approach. 2791-2814 - Jingzhe Guo
, Mingsheng Ying
:
Software Pipelining for Quantum Loop Programs. 2815-2828 - Kizito Salako
, Xingyu Zhao
:
The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments. 2829-2838 - Shangqing Liu
, Xiaofei Xie
, Jing Kai Siow, Lei Ma
, Guozhu Meng
, Yang Liu
:
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search. 2839-2855 - Rahul Yedida
, Hong Jin Kang
, Huy Tu, Xueqi Yang, David Lo
, Tim Menzies
:
How to Find Actionable Static Analysis Warnings: A Case Study With FindBugs. 2856-2872 - Catia Trubiani
, Riccardo Pinciroli
, Andrea Biaggi
, Francesca Arcelli Fontana
:
Automated Detection of Software Performance Antipatterns in Java-Based Applications. 2873-2891 - Enrique Larios Vargas
, Omar Elazhary
, Soroush Yousefi, Derek Lowlind, Michael L. W. Vliek, Margaret-Anne D. Storey
:
DASP: A Framework for Driving the Adoption of Software Security Practices. 2892-2919 - He Jiang
, Yulong Li
, Shikai Guo
, Xiaochen Li, Tao Zhang
, Hui Li
, Rong Chen
:
DupHunter: Detecting Duplicate Pull Requests in Fork-Based Development. 2920-2940 - Jingling Sun
, Ting Su
, Kai Liu, Chao Peng
, Zhao Zhang
, Geguang Pu
, Tao Xie, Zhendong Su
:
Characterizing and Finding System Setting-Related Defects in Android Apps. 2941-2963 - Kaspar Hageman, Álvaro Feal
, Julien Gamba
, Aniketh Girish
, Jakob Bleier, Martina Lindorfer, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. 2964-2979 - Yibo Wang, Kai Li
, Yuzhe Tang
, Jiaqi Chen
, Qi Zhang
, Xiapu Luo
, Ting Chen
:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. 2980-2995 - Nikolaos Nikolaidis, Nikolaos Mittas
, Apostolos Ampatzoglou
, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou
:
Assessing TD Macro-Management: A Nested Modeling Statistical Approach. 2996-3007 - Ziyi Zhou
, Huiqun Yu
, Guisheng Fan
, Zijie Huang
, Kang Yang:
Towards Retrieval-Based Neural Code Summarization: A Meta-Learning Approach. 3008-3031
Volume 49, Number 5, May 2023
- Chunrong Fang
, Shengcheng Yu
, Ting Su
, Jing Zhang
, Yuanhan Tian
, Yang Liu
:
Test Report Generation for Android App Testing Via Heterogeneous Data Analysis. 3032-3051 - Weiwei Zhang
, Shengjian Guo, Hongyu Zhang
, Yulei Sui, Yinxing Xue
, Yun Xu:
Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations. 3052-3070 - Shenghui Gu
, Guoping Rong
, Tian Ren, He Zhang
, Haifeng Shen
, Yongda Yu, Xian Li, Jian Ouyang
, Chunan Chen
:
TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems. 3071-3088 - Jihee Park
, Sungho Lee
, Jaemin Hong
, Sukyoung Ryu
:
Static Analysis of JNI Programs via Binary Decompilation. 3089-3105 - Xin Tan
, Minghui Zhou
, Li Zhang
:
Understanding Mentors' Engagement in OSS Communities via Google Summer of Code. 3106-3130 - Chaima Boufaied
, Claudio Menghi
, Domenico Bianculli
, Lionel C. Briand
:
Trace Diagnostics for Signal-Based Temporal Properties. 3131-3154 - Ying Wang
, Peng Sun
, Lin Pei, Yue Yu
, Chang Xu
, Shing-Chi Cheung
, Hai Yu
, Zhiliang Zhu:
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. 3155-3181 - Zohreh Aghababaeyan
, Manel Abdellatif
, Lionel C. Briand
, Ramesh S.
, Mojtaba Bagherzadeh
:
Black-Box Testing of Deep Neural Networks through Test Case Diversity. 3182-3204 - Brittany Reid
, Marcelo d'Amorim
, Markus Wagner
, Christoph Treude
:
NCQ: Code Reuse Support for Node.js Developers. 3205-3225 - Chong Wang
, Xin Peng
, Zhenchang Xing
, Xiujie Meng:
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking. 3226-3240 - Ahmet Okutan
, Peter Mell
, Mehdi Mirakhorli
, Igor Khokhlov
, Joanna C. S. Santos
, Danielle Gonzalez, Steven Simmons:
Empirical Validation of Automated Vulnerability Curation and Characterization. 3241-3260 - Neil Walkinshaw
, Robert M. Hierons
:
Modelling Second-Order Uncertainty in State Machines. 3261-3276 - Jack H. Good
, Nicholas Gisolfi, James Kyle Miller
, Artur Dubrawski
:
Verification of Fuzzy Decision Trees. 3277-3288 - Yujia Chen
, Cuiyun Gao
, Xiaoxue Ren, Yun Peng
, Xin Xia
, Michael R. Lyu:
API Usage Recommendation Via Multi-View Heterogeneous Graph Representation Learning. 3289-3304 - Chenhao Wei
, Lu Xiao
, Tingting Yu
, Xinyu Chen
, Xiao Wang
, Sunny Wong
, Abigail Clune:
Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models. 3305-3324 - Kashumi Madampe
, Rashina Hoda
, John Grundy
:
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering. 3325-3343
Volume 49, Number 6, June 2023
- Thiago do Nascimento Ferreira, James Ivers
, Jeffrey J. Yackley
, Marouane Kessentini
, Ipek Ozkaya, Khouloud Gaaloul
:
Dependent or Not: Detecting and Understanding Collections of Refactorings. 3344-3358 - Quentin L. Meunier
, Etienne Pons, Karine Heydemann
:
LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions. 3359-3375 - Wei Liu
, Tse-Hsun Chen
:
SLocator: Localizing the Origin of SQL Queries in Database-Backed Web Applications. 3376-3390 - Yuan Zhou
, Yang Sun
, Yun Tang
, Yuqi Chen, Jun Sun
, Christopher M. Poskitt
, Yang Liu
, Zijiang Yang:
Specification-Based Autonomous Driving System Testing. 3391-3410 - Thanh Le-Cong
, Duc-Minh Luong, Xuan-Bach Dinh Le
, David Lo
, Nhat-Hoa Tran, Bui Quang Huy, Quyet-Thang Huynh
:
Invalidator: Automated Patch Correctness Assessment Via Semantic and Syntactic Reasoning. 3411-3429 - Nazanin Bayati Chaleshtari
, Fabrizio Pastore
, Arda Goknil
, Lionel C. Briand
:
Metamorphic Testing for Web System Security. 3430-3471 - Chaochen Shi
, Borui Cai
, Yao Zhao
, Longxiang Gao
, Keshav Sood
, Yong Xiang
:
CoSS: Leveraging Statement Semantics for Code Summarization. 3472-3486 - Joseph Poremba
, Nancy A. Day
, Amirhossein Vakili:
New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding. 3487-3503 - Baicai Sun
, Dunwei Gong
, Feng Pan
, Xiangjuan Yao
, Tian Tian
:
Evolutionary Generation of Test Suites for Multi-Path Coverage of MPI Programs With Non-Determinism. 3504-3523 - Ya Xiao
, Wenjia Song
, Jingyuan Qi
, Bimal Viswanath
, Patrick D. McDaniel
, Danfeng Yao
:
Specializing Neural Networks for Cryptographic Code Completion Applications. 3524-3535 - Akond Rahman
, Chris Parnin
:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management. 3536-3553 - Luca Traini
, Vittorio Cortellessa
:
DeLag: Using Multi-Objective Optimization to Enhance the Detection of Latency Degradation Patterns in Service-Based Systems. 3554-3580 - Boyuan Li
, Carol S. Smidts
:
A Zone-Based Model for Analysis of Dependent Failures in Requirements Inspection. 3581-3598 - Xiaoyu Sun
, Xiao Chen
, Yonghui Liu
, John C. Grundy
, Li Li
:
Taming Android Fragmentation Through Lightweight Crowdsourced Testing. 3599-3615 - Mario Janke
, Patrick Mäder
:
${\text{FS}^{3}}_{\text{change}}$FS3change: A Scalable Method for Change Pattern Mining. 3616-3629 - Wuqi Zhang
, Lili Wei
, Shing-Chi Cheung
, Yepang Liu
, Shuqing Li
, Lu Liu
, Michael R. Lyu
:
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. 3630-3646 - Finlay Macklon
, Markos Viggiato
, Natalia Romanova, Chris Buzon, Dale Paas, Cor-Paul Bezemer
:
A Taxonomy of Testable HTML5 Canvas Issues. 3647-3659
Volume 49, Number 7, July 2023
- Mathieu Nassif
, Martin P. Robillard
:
Identifying Concepts in Software Projects. 3660-3674 - Federico Cassano
, John Gouwar
, Daniel Nguyen
, Sydney Nguyen
, Luna Phipps-Costin
, Donald Pinckney
, Ming-Ho Yee
, Yangtian Zi
, Carolyn Jane Anderson
, Molly Q. Feldman
, Arjun Guha
, Michael Greenberg
, Abhinav Jangda
:
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation. 3675-3691 - Ivano Malavolta
, Kishan Nirghin
, Gian Luca Scoccia
, Simone Romano
, Salvatore Lombardi
, Giuseppe Scanniello
, Patricia Lago
:
JavaScript Dead Code Identification, Elimination, and Empirical Assessment. 3692-3714 - Amirhossein Zolfagharian
, Manel Abdellatif
, Lionel C. Briand
, Mojtaba Bagherzadeh
, Ramesh S.
:
A Search-Based Testing Approach for Deep Reinforcement Learning Agents. 3715-3735 - Priscila Santiesteban
, Yu Huang
, Westley Weimer
, Hammad Ahmad
:
CirFix: Automated Hardware Repair and its Real-World Applications. 3736-3752 - Souvick Das
, Novarun Deb
, Nabendu Chaki
, Agostino Cortesi
:
Driving the Technology Value Stream by Analyzing App Reviews. 3753-3770 - Steve Kommrusch
, Martin Monperrus
, Louis-Noël Pouchet
:
Self-Supervised Learning to Prove Equivalence Between Straight-Line Programs via Rewrite Rules. 3771-3792 - Peng Qian
, Jianting He
, Lingling Lu
, Siwei Wu
, Zhipeng Lu
, Lei Wu
, Yajin Zhou
, Qinming He
:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. 3793-3810 - Xiao Ling
, Tim Menzies
:
What Not to Test (For Cyber-Physical Systems). 3811-3826 - Hafedh Mili
, Imen Benzarti
, Amal Elkharraz, Ghizlane El-Boussaidi
, Yann-Gaël Guéhéneuc
, Petko Valtchev
:
Discovering Reusable Functional Features in Legacy Object-Oriented Systems. 3827-3856 - Tarek Mahmud
, Meiru Che
, Guowei Yang
:
Detecting Android API Compatibility Issues With API Differences. 3857-3871 - Zhongxing Yu
, Matias Martinez
, Zimin Chen
, Tegawendé F. Bissyandé
, Martin Monperrus
:
Learning the Relation Between Code Features and Code Transforms With Structured Prediction. 3872-3900 - Qinsheng Hou
, Wenrui Diao
, Yanhao Wang
, Chenglin Mao
, Lingyun Ying
, Song Liu
, Xiaofeng Liu
, Yuanzhi Li
, Shanqing Guo
, Meining Nie
, Haixin Duan
:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. 3901-3921 - Milos Ojdanic
, Aayush Garg
, Ahmed Khanfir
, Renzo Degiovanni
, Mike Papadakis
, Yves Le Traon
:
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies. 3922-3938 - Zhuo Zhang
, Yan Lei
, Xiaoguang Mao
, Meng Yan
, Xin Xia
, David Lo
:
Context-Aware Neural Fault Localization. 3939-3954
Volume 49, Number 8, August 2023
- Sebastian Simon
, Nicolai Ruckel
, Norbert Siegmund
:
CfgNet: A Framework for Tracking Equality-Based Configuration Dependencies Across a Software Project. 3955-3971 - Essa A. Alhazami
, Abdullah M. Sheneamer
:
Graph-of-Code: Semantic Clone Detection Using Graph Fingerprints. 3972-3988 - Weiyi Zhang
, Zoran Salcic
, Avinash Malik
:
Designing, Modeling and Analysis of GALS Software Systems. 3989-4003 - Runzhi He
, Hao He
, Yuxia Zhang
, Minghui Zhou
:
Automating Dependency Updates in Practice: An Exploratory Study on GitHub Dependabot. 4004-4022 - Achiya Elyasaf
, Eitan Farchi
, Oded Margalit
, Gera Weiss
, Yeshayahu Weiss
:
Generalized Coverage Criteria for Combinatorial Sequence Testing. 4023-4034 - Truong Giang Nguyen
, Thanh Le-Cong
, Hong Jin Kang
, Ratnadira Widyasari
, Chengran Yang
, Zhipeng Zhao
, Bowen Xu
, Jiayuan Zhou
, Xin Xia
, Ahmed E. Hassan, Xuan-Bach Dinh Le
, David Lo
:
Multi-Granularity Detector for Vulnerability Fixes. 4035-4057 - Jiayang Song
, Xuan Xie
, Lei Ma
:
$\mathtt {SIEGE}$SIEGE: A Semantics-Guided Safety Enhancement Framework for AI-Enabled Cyber-Physical Systems. 4058-4080 - Mingwei Liu
, Chengyuan Zhao
, Xin Peng
, Simin Yu
, Haofen Wang
, Chaofeng Sha
:
Task-Oriented ML/DL Library Recommendation Based on a Knowledge Graph. 4081-4096 - Huayao Wu
, Senyao Yu
, Xintao Niu
, Changhai Nie
, Yu Pei
, Qiang He
, Yun Yang
:
Enhancing Fault Injection Testing of Service Systems via Fault-Tolerance Bottleneck. 4097-4114 - Shengcheng Yu
, Chunrong Fang
, Quanjun Zhang
, Zhihao Cao
, Yexiao Yun
, Zhenfei Cao
, Kai Mei
, Zhenyu Chen
:
Mobile App Crowdsourced Test Report Consistency Detection via Deep Image-and-Text Fusion Understanding. 4115-4134 - Youshuai Tan
, Jinfu Chen
, Weiyi Shang
, Tao Zhang
, Sen Fang
, Xiapu Luo
, Zijie Chen
, Shuhao Qi
:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. 4135-4151 - Chunyong Zhang
, Bin Liu
, Yang Xin
, Liangwei Yao
:
CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation. 4152-4168 - Darius Sas
, Paris Avgeriou
:
An Architectural Technical Debt Index Based on Machine Learning and Architectural Smells. 4169-4195 - Junwei Zhang
, Zhongxin Liu
, Xing Hu
, Xin Xia
, Shanping Li
:
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code. 4196-4212 - Yalemisew M. Abgaz
, Andrew McCarren
, Peter Elger, David Solan
, Neil Lapuz
, Marin Bivol, Glenn Jackson
, Murat Yilmaz
, Jim Buckley
, Paul M. Clarke
:
Decomposition of Monolith Applications Into Microservices Architectures: A Systematic Review. 4213-4242
Volume 49, Number 9, September 2023
- Razan Ghzouli
, Thorsten Berger
, Einar Broch Johnsen
, Andrzej Wasowski
, Swaib Dragule
:
Behavior Trees and State Machines in Robotics Applications. 4243-4267 - Aakash Bansal
, Zachary Eberhart
, Zachary Karas
, Yu Huang
, Collin McMillan
:
Function Call Graph Context Encoding for Neural Source Code Summarization. 4268-4281 - Orlando Amaral Cejas
, Muhammad Ilyas Azeem
, Sallam Abualhaija
, Lionel C. Briand
:
NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR. 4282-4303 - Amir Mohammad Ebrahimi
, Gustavo Ansaldi Oliva
, Ahmed E. Hassan
:
Self-Admitted Technical Debt in Ethereum Smart Contracts: A Large-Scale Exploratory Study. 4304-4323 - Leonardo Horn Iwaya
, Muhammad Ali Babar
, Awais Rashid
:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. 4324-4348 - Ulrike Maria Graetsch
, Hourieh Khalajzadeh
, Mojtaba Shahin
, Rashina Hoda
, John C. Grundy
:
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions. 4349-4370 - Uraz Cengiz Türker
, Robert M. Hierons
, Gerassimos D. Barlas
, Khaled El-Fakih
:
Incomplete Adaptive Distinguishing Sequences for Non-Deterministic FSMs. 4371-4389 - Ke Liu
, Xiang Chen
, Chunyang Chen
, Xiaofei Xie
, Zhanqi Cui
:
Automated Question Title Reformulation by Mining Modification Logs From Stack Overflow. 4390-4410 - Yihui Wang
, Huaxiao Liu
, Shanquan Gao
, Xiao Tang
:
Animation2API: API Recommendation for the Implementation of Android UI Animations. 4411-4428 - Yutao Hu
, Yilin Fang
, Yifan Sun
, Yaru Jia
, Yueming Wu
, Deqing Zou
, Hai Jin
:
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection. 4429-4442 - Toni Mancini
, Igor Melatti
, Enrico Tronci
:
Optimizing Highly-Parallel Simulation-Based Verification of Cyber-Physical Systems. 4443-4455 - Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. 4456-4476 - Jakob Svennevik Notland
, Mariusz Nowostawski
, Jingyue Li
:
Runtime Evolution of Bitcoin's Consensus Rules. 4477-4495
Volume 49, Number 10, October 2023
- Meriel von Stein
, David Shriver
, Sebastian G. Elbaum
:
DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles. 4496-4509 - Adriano Torres
, Pedro Henrique Teixeira Costa, Luis Henrique Vieira Amaral
, Jonata Pastro
, Rodrigo Bonifácio
, Marcelo d'Amorim
, Owolabi Legunsen
, Eric Bodden
, Edna Dias Canedo
:
Runtime Verification of Crypto APIs: An Empirical Study. 4510-4525 - Charaka Geethal
, Marcel Böhme
, Van-Thuan Pham
:
Human-in-the-Loop Automatic Program Repair. 4526-4549 - Michael Fu
, Van Nguyen
, Chakkrit Kla Tantithamthavorn
, Trung Le
, Dinh Q. Phung
:
VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types. 4550-4565 - Xu Guo
, Xiaoyu Song
, Jiantao Zhou
, Feiyu Wang
, Kecheng Tang
:
An Effective Approach to High Strength Covering Array Generation in Combinatorial Testing. 4566-4593 - Hadi Jahanshahi
, Mucahit Cevik
, Kianoush Mousavi
, Ayse Basar:
ADPTriage: Approximate Dynamic Programming for Bug Triage. 4594-4609 - Michele Guerra
, Simone Scalabrino
, Fausto Fasano
, Rocco Oliveto
:
An Empirical Study on the Effectiveness of Privacy Indicators. 4610-4623 - Yingnan Zhou
, Xue Hu
, Sihan Xu
, Yan Jia
, Yuhao Liu
, Junyong Wang
, Guangquan Xu
, Wei Wang
, Shaoying Liu
, Thar Baker
:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. 4624-4638 - Yao Li
, Tao Zhang
, Xiapu Luo
, Haipeng Cai
, Sen Fang
, Dawei Yuan
:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? 4639-4655 - Yuqi Huai
, Sumaya Almanee
, Yuntianyi Chen
, Xiafa Wu
, Qi Alfred Chen
, Joshua Garcia
:
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning. 4656-4676 - Francesco Bertolotti
, Walter Cazzola
:
CombTransformers: Statement-Wise Transformers for Statement-Wise Representations. 4677-4690 - Tiezhu Sun
, Kevin Allix
, Kisub Kim
, Xin Zhou
, Dongsun Kim
, David Lo
, Tegawendé F. Bissyandé
, Jacques Klein
:
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. 4691-4706 - Xinwei Fang
, Radu Calinescu
, Simos Gerasimou
, Faisal Alhwikem
:
Fast Parametric Model Checking With Applications to Software Performability Analysis. 4707-4730 - Armstrong Foundjem
, Ellis E. Eghan
, Bram Adams
:
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization. 4731-4750 - Shikai Guo
, Haorui Lin
, Jiaoru Zhao
, Hui Li
, Rong Chen
, Xiaochen Li
, He Jiang
:
An Easy Data Augmentation Approach for Application Reviews Event Inference. 4751-4772 - Eduardo Santana de Almeida
, Iftekhar Ahmed
, André van der Hoek
:
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings. 4773-4795 - Kun Wang
, Jingyi Wang
, Christopher M. Poskitt
, Xiangxiang Chen
, Jun Sun
, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. 4796-4813 - Matias Martinez
, Jean-Rémy Falleri
, Martin Monperrus
:
Hyperparameter Optimization for AST Differencing. 4814-4828
Volume 49, Number 11, November 2023
- Fan Zhang
, Qianmei Wu
, Bohan Xuan
, Yuqi Chen, Wei Lin, Christopher M. Poskitt
, Jun Sun
, Binbin Chen
:
Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. 4829-4845 - Nikita Mehrotra
, Akash Sharma, Anmol Jindal, Rahul Purandare
:
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks. 4846-4868 - Chaozheng Wang
, Yuanhang Yang
, Cuiyun Gao
, Yun Peng
, Hongyu Zhang
, Michael R. Lyu
:
Prompt Tuning in Code Intelligence: An Experimental Evaluation. 4869-4885 - Zhaoxuan Li
, Siqi Lu
, Rui Zhang
, Ziming Zhao
, Rujin Liang
, Rui Xue
, Wenhao Li
, Fan Zhang
, Sheng Gao
:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. 4886-4916 - Nick van Beest
, Heerko Groefsema
, Adrian Cryer
, Guido Governatori
, Silvano Colombo Tosatto
, Hannah M. S. Burke
:
Cross-Instance Regulatory Compliance Checking of Business Process Event Logs. 4917-4931 - Nasif Imtiaz
, Laurie A. Williams
:
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates. 4932-4945 - César Cornejo
, Germán Regis
, Nazareno Aguirre
, Marcelo F. Frias
:
A Study of the Electrum and DynAlloy Dynamic Behavior Notations. 4946-4963 - Yang Wang
, Peng Zhang
, Maolin Sun
, Zeyu Lu
, Yibiao Yang
, Yutian Tang
, Junyan Qian
, Zhi Li
, Yuming Zhou
:
Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving. 4964-4987 - Khashayar Etemadi
, Aman Sharma
, Fernanda Madeiral
, Martin Monperrus
:
Augmenting Diffs With Runtime Information. 4988-5007 - Kevin Jesse
, Christoph Kuhmünch
, Anand Ashok Sawant
:
RefactorScore: Evaluating Refactor Prone Code. 5008-5026 - César Soto-Valero
, Deepika Tiwari
, Tim Toady
, Benoit Baudry
:
Automatic Specialization of Third-Party Java Dependencies. 5027-5045
Volume 49, Number 12, December 2023
- Shuang Liu
, Shujie Dou
, Junjie Chen
, Zhirun Zhang
, Ye Lu
:
Differential Testing of Machine Translators Based on Compositional Semantics. 5046-5059 - Mukelabai Mukelabai
, Kevin Hermann
, Thorsten Berger
, Jan-Philipp Steghöfer
:
FeatRacer: Locating Features Through Assisted Traceability. 5060-5083 - Dan Iorga
, John Wickerson
, Alastair F. Donaldson
:
Simulating Operational Memory Models Using Off-the-Shelf Program Analysis Tools. 5084-5102 - Shayan Noei
, Heng Li
, Stefanos Georgiou
, Ying Zou
:
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process. 5103-5119 - Sepehr Sharifi
, Donghwan Shin
, Lionel C. Briand
, Nathan Aschbacher
:
Identifying the Hazard Boundary of ML-Enabled Autonomous Systems Using Cooperative Coevolutionary Search. 5120-5138 - Giovanni Denaro
, Rahim Heydarov
, Ali Mohebbi
, Mauro Pezzè
:
Prevent: An Unsupervised Approach to Predict Software Failures in Production. 5139-5153 - Zhaoqiang Guo
, Tingting Tan
, Shiran Liu
, Xutong Liu
, Wei Lai
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Wei Dong
, Yuming Zhou
:
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities. 5154-5188 - Rodrigo Casamayor
, Carlos Cetina
, Oscar Pastor
, Francisca Pérez
:
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering. 5189-5202 - Iflaah Salman
, Burak Turhan
, Robert Ramac
, Vladimir Mandic
:
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing. 5203-5222 - Bohan Liu
, He Zhang
, Weigang Ma
, Gongyuan Li
, Shanshan Li
, Haifeng Shen
:
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation. 5223-5249 - Weifeng Sun
, Meng Yan
, Zhongxin Liu
, David Lo
:
Robust Test Selection for Deep Neural Networks. 5250-5278 - Xi Xu
, Qinghua Zheng, Zheng Yan
, Ming Fan
, Ang Jia
, Zhaohui Zhou
, Haijun Wang
, Ting Liu
:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. 5279-5294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.