default search action
IEEE Transactions on Software Engineering, Volume 49
Volume 49, Number 1, January 2023
- Zhongxin Liu, Xin Xia, David Lo, Meng Yan, Shanping Li:
Just-In-Time Obsolete Comment Detection and Update. 1-23 - Aayush Garg, Milos Ojdanic, Renzo Degiovanni, Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon:
Cerebro: Static Subsuming Mutant Selection. 24-43 - Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba:
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. 44-63 - Simon Larsén, Jean-Rémy Falleri, Benoit Baudry, Martin Monperrus:
Spork: Structured Merge for Java With Formatting Preservation. 64-83 - Yingquan Zhao, Zan Wang, Shuang Liu, Jun Sun, Junjie Chen, Xiang Chen:
Achieving High MAP-Coverage Through Pattern Constraint Reduction. 99-112 - Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John C. Grundy:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. 113-130 - Anjana Perera, Aldeida Aleti, Burak Turhan, Marcel Böhme:
An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing. 131-146 - Zimin Chen, Steve Kommrusch, Martin Monperrus:
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. 147-165 - Ellen Arteca, Max Schäfer, Frank Tip:
Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs. 166-184 - Ying Wang, Yibo Wang, Sinan Wang, Yepang Liu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. 185-210 - Marco Hoffmann, Daniel Méndez, Fabian Fagerholm, Anton Luckhardt:
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges. 211-225 - Huaijin Wang, Pingchuan Ma, Yuanyuan Yuan, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu:
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking. 226-250 - Juan M. Ferreira, Francy D. Rodríguez, Adrián Santos, Oscar Dieste, Silvia Teresita Acuña, Natalia Juristo:
Impact of Usability Mechanisms: A Family of Experiments on Efficiency, Effectiveness and User Satisfaction. 251-267 - Sadia Tabassum, Leandro L. Minku, Danyi Feng:
Cross-Project Online Just-In-Time Software Defect Prediction. 268-287 - Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? 288-303 - Ai Liu, Shaoying Liu:
Enhancing the Capability of Testing-Based Formal Verification by Handling Operations in Software Packages. 304-324 - Damian A. Tamburri, Rick Kazman, Hamed Fahimi:
On the Relationship Between Organizational Structure Patterns and Architecture in Agile Teams. 325-347 - Juan C. Alonso, Alberto Martin-Lopez, Sergio Segura, José María García, Antonio Ruiz-Cortés:
ARTE: Automated Generation of Realistic Test Inputs for Web APIs. 348-363 - Ranci Ren, John W. Castro, Adrián Santos, Oscar Dieste, Silvia Teresita Acuña:
Using the SOCIO Chatbot for UML Modelling: A Family of Experiments. 364-383 - Chengjie Lu, Yize Shi, Huihui Zhang, Man Zhang, Tiexin Wang, Tao Yue, Shaukat Ali:
Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions. 384-402 - Zhe Liu, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun Hu, Qing Wang:
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding. 403-418 - Emily Winter, Vesna Nowack, David Bowes, Steve Counsell, Tracy Hall, Sæmundur Óskar Haraldsson, John R. Woodward:
Let's Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research. 419-436 - Hao Li, Filipe Roseiro Côgo, Cor-Paul Bezemer:
An Empirical Study of Yanked Releases in the Rust Package Registry. 437-449 - Leping Li, Hui Liu, Kejun Li, Yanjie Jiang, Rui Sun:
Generating Concise Patches for Newly Released Programming Assignments. 450-467 - Chanathip Pornprasit, Chakkrit Kla Tantithamthavorn:
DeepLineDP: Towards a Deep Learning Approach for Line-Level Defect Prediction. 84-98
Volume 49, Number 2, February 2023
- Youssef Esseddiq Ouatiti, Mohammed Sayagh, Noureddine Kerzazi, Ahmed E. Hassan:
An Empirical Study on Log Level Prediction for Multi-Component Systems. 473-484 - Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. 485-497 - Neng Zhang, Ying Zou, Xin Xia, Qiao Huang, David Lo, Shanping Li:
Web APIs: Features, Issues, and Expectations - A Large-Scale Empirical Study of Web APIs From Two Publicly Accessible Registries Using Stack Overflow and a User Survey. 498-528 - Yang Yue, Yi Wang, David F. Redmiles:
Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer's Early Career. 529-548 - Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Mercedes G. Merayo, Manuel Núñez:
Using Metamorphic Testing to Improve the Quality of Tags in OpenStreetMap. 549-563 - Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. 564-585 - Shiran Liu, Zhaoqiang Guo, Yanhui Li, Chuanqi Wang, Lin Chen, Zhongbin Sun, Yuming Zhou, Baowen Xu:
Inconsistent Defect Labels: Essence, Causes, and Influence. 586-610 - Michael Fu, Chakkrit Tantithamthavorn:
GPT2SP: A Transformer-Based Agile Story Point Estimation Approach. 611-625 - Haytham Hijazi, João Durães, Ricardo Couceiro, João Castelhano, Raul Barbosa, Júlio Medeiros, Miguel Castelo-Branco, Paulo de Carvalho, Henrique Madeira:
Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension. 626-645 - Liyan Song, Leandro L. Minku:
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development. 646-666 - Sen Chen, Lingling Fan, Chunyang Chen, Yang Liu:
Automatically Distilling Storyboard With Rich Features for Android Apps. 667-683 - Dongyang Zhan, Xiangzhan Yu, Hongli Zhang, Lin Ye:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. 684-698 - Marthe Nordengen Berntzen, Rashina Hoda, Nils Brede Moe, Viktoria Stray:
A Taxonomy of Inter-Team Coordination Mechanisms in Large-Scale Agile. 699-718 - Dongjie He, Jingbo Lu, Yaoqing Gao, Jingling Xue:
Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis. 719-742 - Elias Eid, Nancy A. Day:
Static Profiling of Alloy Models. 743-759 - Kai Gao, Zhixing Wang, Audris Mockus, Minghui Zhou:
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types. 760-776 - Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. 777-801 - Giulio Rossolini, Alessandro Biondi, Giorgio C. Buttazzo:
Increasing the Confidence of Deep Neural Networks by Coverage Analysis. 802-815 - Frank Ebbers:
A Large-Scale Analysis of IoT Firmware Version Distribution in the Wild. 816-830 - Liushan Chen, Yu Pei, Minxue Pan, Tian Zhang, Qixin Wang, Carlo A. Furia:
Program Repair With Repeated Learning. 831-848 - Xunhui Zhang, Yue Yu, Georgios Gousios, Ayushi Rastogi:
Pull Request Decisions Explained: An Empirical Overview. 849-871 - Barbara A. Kitchenham, Lech Madeyski, David Budgen:
How Should Software Engineering Secondary Studies Include Grey Material? 872-882 - Ricardo Amaro, Rúben Pereira, Miguel Mira da Silva:
Capabilities and Practices in DevOps: A Multivocal Literature Review. 883-901 - Shenghui Gu, Guoping Rong, He Zhang, Haifeng Shen:
Logging Practices in Software Engineering: A Systematic Mapping Study. 902-923 - Yutong Zhao, Lu Xiao, Andre B. Bondi, Bihuan Chen, Yang Liu:
A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects. 924-946
Volume 49, Number 3, March 2023
- Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. 947-961 - Néstor Cataño:
Program Synthesis for Cyber-Resilience. 962-972 - Maria Angela Ferrario, Emily Winter:
Applying Human Values Theory to Software Engineering Practice: Lessons and Implications. 973-990 - Xinhai Zhang, Jianbo Tao, Kaige Tan, Martin Törngren, José Manuel Gaspar Sánchez, Muhammad Rusyadi Ramli, Xin Tao, Magnus Gyllenhammar, Franz Wotawa, Naveen Mohan, Mihai Nica, Hermann Felbinger:
Finding Critical Scenarios for Automated Driving Systems: A Systematic Mapping Study. 991-1026 - Markos Viggiato, Dale Paas, Chris Buzon, Cor-Paul Bezemer:
Identifying Similar Test Cases That Are Specified in Natural Language. 1027-1043 - Roland Croft, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. 1044-1063 - Wuxia Jin, Dinghong Zhong, Yuanfang Cai, Rick Kazman, Ting Liu:
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability. 1064-1085 - Rahul Krishna Yandrapally, Ali Mesbah:
Fragment-Based Test Generation for Web Apps. 1086-1101 - José Miguel Horcas, Daniel Strüber, Alexandru Burdusel, Jabier Martinez, Steffen Zschaler:
We're Not Gonna Break It! Consistency-Preserving Operators for Efficient Product Line Configuration. 1102-1117 - Weifeng Pan, Ming Hua, Dae-Kyoo Kim, Zijiang Yang:
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules. 1118-1151 - Elvys Soares, Márcio Ribeiro, Rohit Gheyi, Guilherme Amaral, André L. M. Santos:
Refactoring Test Smells With JUnit 5: Why Should Developers Keep Up-to-Date? 1152-1170 - Kashumi Madampe, Rashina Hoda, John Grundy:
The Emotional Roller Coaster of Responding to Requirements Changes in Software Engineering. 1171-1187 - Simin Wang, Liguo Huang, Amiao Gao, Jidong Ge, Tengfei Zhang, Haitao Feng, Ishna Satyarth, Ming Li, He Zhang, Vincent Ng:
Machine/Deep Learning for Software Engineering: A Systematic Literature Review. 1188-1231 - Pravas Ranjan Bal, Sandeep Kumar:
A Data Transfer and Relevant Metrics Matching Based Approach for Heterogeneous Defect Prediction. 1232-1245 - Mattia Fazzini, Kevin Moran, Carlos Bernal-Cárdenas, Tyler Wendland, Alessandro Orso, Denys Poshyvanyk:
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps. 1246-1272 - Barbara A. Kitchenham, Lech Madeyski, David Budgen:
SEGRESS: Software Engineering Guidelines for REporting Secondary Studies. 1273-1298 - Kenji Tei, Yasuyuki Tahara, Akihiko Ohsuga:
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems. 1299-1322 - Ramy Shahin, Murad Akhundov, Marsha Chechik:
Annotative Software Product Line Analysis Using Variability-Aware Datalog. 1323-1341 - George G. Cabral, Leandro L. Minku:
Towards Reliable Online Just-in-Time Software Defect Prediction. 1342-1358 - Giorgio Di Tizio, Michele Armellini, Fabio Massacci:
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats. 1359-1373 - Dag I. K. Sjøberg, Gunnar Rye Bergersen:
Construct Validity in Software Engineering. 1374-1396
Volume 49, Number 4, April 2023
- George Mathew, Amritanshu Agrawal, Tim Menzies:
Finding Trends in Software Research. 1397-1410 - Michaela Greiler, Margaret-Anne D. Storey, Abi Noda:
An Actionable Framework for Understanding and Improving Developer Experience. 1411-1425 - Weihan Ou, Steven H. H. Ding, Yuan Tian, Leo Song:
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification. 1426-1442 - Yanjie Jiang, Hui Liu, Xiaoqing Luo, Zhihao Zhu, Xiaye Chi, Nan Niu, Yuxia Zhang, Yamin Hu, Pan Bian, Lu Zhang:
BugBuilder: An Automated Approach to Building Bug Repository. 1443-1463 - Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. 1464-1486 - Julian von der Mosel, Alexander Trautsch, Steffen Herbold:
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain. 1487-1507 - Kevin Jesse, Premkumar T. Devanbu, Anand Ashok Sawant:
Learning to Predict User-Defined Types. 1508-1522 - Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri:
IoTCom: Dissecting Interaction Threats in IoT Systems. 1523-1539 - Nasif Imtiaz, Aniqa Khanom, Laurie A. Williams:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. 1540-1560 - Zhanyao Lei, Yixiong Chen, Yang Yang, Mingyuan Xia, Zhengwei Qi:
Bootstrapping Automated Testing for RESTful Web Services. 1561-1579 - Antonio Mastropaolo, Nathan Cooper, David Nader-Palacio, Simone Scalabrino, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota:
Using Transfer Learning for Code-Related Tasks. 1580-1598 - Elizabeth Dinella, Todd Mytkowicz, Alexey Svyatkovskiy, Christian Bird, Mayur Naik, Shuvendu K. Lahiri:
DeepMerge: Learning to Merge Programs. 1599-1614 - Ahmadreza Saboor Yaraghi, Mojtaba Bagherzadeh, Nafiseh Kahani, Lionel C. Briand:
Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts. 1615-1639 - Bo Lin, Shangwen Wang, Zhongxin Liu, Xin Xia, Xiaoguang Mao:
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach. 1640-1660 - Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. 1661-1682 - Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. 1683-1703 - Mostafa Jangali, Yiming Tang, Niclas Alexandersson, Philipp Leitner, Jinqiu Yang, Weiyi Shang:
Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests. 1704-1725 - Mohammad Alahmadi:
VID2XML: Automatic Extraction of a Complete XML Data From Mobile Programming Screencasts. 1726-1740 - Yulu Cao, Lin Chen, Wanwangying Ma, Yanhui Li, Yuming Zhou, Linzhang Wang:
Towards Better Dependency Management: A First Look at Dependency Smells in Python Projects. 1741-1765 - Abu Naser Masud:
The Duality in Computing SSA Programs and Control Dependency. 1766-1781 - Carlos Bernal-Cárdenas, Nathan Cooper, Madeleine Havranek, Kevin Moran, Oscar Chaparro, Denys Poshyvanyk, Andrian Marcus:
Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios. 1782-1803 - Pasquale Salza, Christoph Schwizer, Jian Gu, Harald C. Gall:
On the Effectiveness of Transfer Learning for Code Search. 1804-1822 - Emily Winter, David Bowes, Steve Counsell, Tracy Hall, Saemundur O. Haraldsson, Vesna Nowack, John R. Woodward:
How do Developers Really Feel About Bug Fixing? Directions for Automatic Program Repair. 1823-1841 - Zhenya Zhang, Deyun Lyu, Paolo Arcaini, Lei Ma, Ichiro Hasuo, Jianjun Zhao:
FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria. 1842-1859 - Ziyuan Zhong, Gail E. Kaiser, Baishakhi Ray:
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles. 1860-1875 - Yun Peng, Shuqing Li, Wenwei Gu, Yichen Li, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu:
Revisiting, Benchmarking and Exploring API Recommendation: How Far Are We? 1876-1897 - Leonardo A. F. Leite, Nelson Lago, Claudia de O. Melo, Fabio Kon, Paulo Meirelles:
A Theory of Organizational Structures for Development and Infrastructure Professionals. 1898-1911 - Sakina Fatima, Taher Ahmed Ghaleb, Lionel C. Briand:
Flakify: A Black-Box, Language Model-Based Predictor for Flaky Tests. 1912-1927 - Andrea Stocco, Brian Pulfer, Paolo Tonella:
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems. 1928-1940 - Zhiqiang Li, Hongyu Zhang, Xiao-Yuan Jing, Juanying Xie, Min Guo, Jie Ren:
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction. 1941-1963 - Yao Deng, James Xi Zheng, Tianyi Zhang, Huai Liu, Guannan Lou, Miryung Kim, Tsong Yueh Chen:
A Declarative Metamorphic Testing Framework for Autonomous Driving. 1964-1982 - Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. 1983-2005 - Faizan Khan, Istvan David, Dániel Varró, Shane McIntosh:
Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study. 2006-2019 - Zoe Kotti, Georgios Gousios, Diomidis Spinellis:
Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis. 2020-2038 - Keila Barbosa, Ronivaldo Ferreira, Gustavo Pinto, Marcelo d'Amorim, Breno Miranda:
Test Flakiness Across Programming Languages. 2039-2052 - Ming Wen, Zifan Xie, Kaixuan Luo, Xiao Chen, Yibiao Yang, Hai Jin:
Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis. 2053-2068 - Pouria Derakhshanfar, Xavier Devroey, Annibale Panichella, Andy Zaidman, Arie van Deursen:
Generating Class-Level Integration Tests Using Call Site Information. 2069-2087 - Alejandrina M. Aranda, Oscar Dieste, José Ignacio Panach, Natalia Juristo:
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments. 2088-2106 - Zhe Chen, Qi Zhang, Jun Wu, Junqi Yan, Jingling Xue:
A Source-Level Instrumentation Framework for the Dynamic Analysis of Memory Safety. 2107-2127 - Mikko Raatikainen, Quim Motger, Clara Marie Lüders, Xavier Franch, Lalli Myllyaho, Elina Kettunen, Jordi Marco, Juha Tiihonen, Mikko Halonen, Tomi Männistö:
Improved Management of Issue Dependencies in Issue Trackers of Large Collaborative Projects. 2128-2148 - Hourieh Khalajzadeh, Mojtaba Shahin, Humphrey O. Obie, Pragya Agrawal, John C. Grundy:
Supporting Developers in Addressing Human-Centric Issues in Mobile Apps. 2149-2168 - Toufique Ahmed, Noah Rose Ledesma, Premkumar T. Devanbu:
SynShine: Improved Fixing of Syntax Errors. 2169-2181 - Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand:
Data-Driven Mutation Analysis for Cyber-Physical Systems. 2182-2201 - Danyllo Albuquerque, Everton Guimarães, Graziela Tonin, Pilar Rodríguez, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich, Ferdinandy Chagas:
Managing Technical Debt Using Intelligent Techniques - A Systematic Mapping Study. 2202-2220 - Iason Papapanagiotakis-Bousy, Earl T. Barr, David Clark:
PopArt: Ranked Testing Efficiency. 2221-2238 - Shuyao Jiang, Jiacheng Shen, Shengnan Wu, Yu Cai, Yue Yu, Yangfan Zhou:
Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study. 2239-2254 - Sergio Luis Herrera Gonzalez, Piero Fraternali:
Almost Rerere: Learning to Resolve Conflicts in Distributed Projects. 2255-2271 - Jianjun Huang, Bo Xue, Jiasheng Jiang, Wei You, Bin Liang, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. 2272-2284 - Xiaowei Zhang, Weiqin Zou, Lin Chen, Yanhui Li, Yuming Zhou:
Towards the Analysis and Completion of Syntactic Structure Ellipsis for Inline Comments. 2285-2302 - Achiya Elyasaf, Tom Yaacov, Gera Weiss:
What Petri Nets Oblige us to Say Comparing Approaches for Behavior Composition. 2303-2317 - Xiuting Ge, Shengcheng Yu, Chunrong Fang, Qi Zhu, Zhihong Zhao:
Leveraging Android Automated Testing to Assist Crowdsourced Testing. 2318-2336 - Lucas Zamprogno, Braxton Hall, Reid Holmes, Joanne M. Atlee:
Dynamic Human-in-the-Loop Assertion Generation. 2337-2351 - An Ran Chen, Tse-Hsun Peter Chen, Shaowei Wang:
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure. 2352-2365 - Luca Di Grazia, Paul Bredl, Michael Pradel:
DiffSearch: A Scalable and Precise Search Engine for Code Changes. 2366-2380 - James Tizard, Peter Devine, Hechen Wang, Kelly Blincoe:
A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management. 2381-2393 - Xu Zhou, Pengfei Wang, Chenyifan Liu, Tai Yue, Yingying Liu, Congxi Song, Kai Lu, Qidi Yin, Xu Han:
UltraFuzz: Towards Resource-Saving in Distributed Fuzzing. 2394-2412 - Ifeanyi G. Ndukwe, Sherlock A. Licorish, Stephen G. MacDonell:
Perceptions on the Utility of Community Question and Answer Websites Like Stack Overflow to Software Developers. 2413-2425 - Kewen Peng, Joymallya Chakraborty, Tim Menzies:
FairMask: Better Fairness via Model-Based Rebalancing of Protected Attributes. 2426-2439 - Lina Gong, Haoxiang Zhang, Jingxuan Zhang, Mingqiang Wei, Zhiqiu Huang:
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction. 2440-2458 - Michel Benaroch, Kalle Lyytinen:
How Much Does Software Complexity Matter for Maintenance Productivity? The Link Between Team Instability and Diversity. 2459-2475 - Taher Ahmed Ghaleb, Safwat Hassan, Ying Zou:
Studying the Interplay Between the Durations and Breakages of Continuous Integration Builds. 2476-2497 - Ioannis Zozas, Stamatia Bibi, Apostolos Ampatzoglou:
Forecasting the Principal of Code Technical Debt in JavaScript Applications. 2498-2512 - Guofu Zhang, Lei Li, Zhaopin Su, Zhisheng Shao, Miqing Li, Bin Li, Xin Yao:
New Reliability-Driven Bounds for Architecture-Based Multi-Objective Testing Resource Allocation. 2513-2529 - Zhixing Li, Yue Yu, Tao Wang, Yan Lei, Ying Wang, Huaimin Wang:
To Follow or Not to Follow: Understanding Issue/Pull-Request Templates on GitHub. 2530-2544 - Yikun Li, Mohamed Soliman, Paris Avgeriou, Lou Somers:
Self-Admitted Technical Debt in the Embedded Systems Industry: An Exploratory Case Study. 2545-2565 - Supatsara Wattanakriengkrai, Dong Wang, Raula Gaikovina Kula, Christoph Treude, Patanamon Thongtanunam, Takashi Ishio, Kenichi Matsumoto:
Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem. 2566-2579 - Pedro Delgado-Pérez, Aurora Ramírez, Kevin J. Valle-Gómez, Inmaculada Medina-Bulo, José Raúl Romero:
InterEvo-TR: Interactive Evolutionary Test Generation With Readability Assessment. 2580-2596 - Jingxuan Zhang, Siyuan Liu, Lina Gong, Haoxiang Zhang, Zhiqiu Huang, He Jiang:
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System. 2597-2620 - Bernhard Schäfer, Han van der Aa, Henrik Leopold, Heiner Stuckenschmidt:
Sketch2Process: End-to-End BPMN Sketch Recognition Based on Neural Networks. 2621-2641 - Neelofar, Kate Smith-Miles, Mario Andrés Muñoz, Aldeida Aleti:
Instance Space Analysis of Search-Based Software Testing. 2642-2660 - José Antonio Hernández López, Jesús Sánchez Cuadrado:
Generating Structurally Realistic Models With Deep Autoregressive Networks. 2661-2676 - Vali Tawosi, Rebecca Moussa, Federica Sarro:
Agile Effort Estimation: Have We Solved the Problem Yet? Insights From a Replication Study. 2677-2697 - Max Ellis, Sarah Nadi, Danny Dig:
Operation-Based Refactoring-Aware Merging: An Empirical Evaluation. 2698-2721 - Naweiluo Zhou, Huan Zhou, Dennis Hoppe:
Containerization for High Performance Computing Systems: Survey and Prospects. 2722-2740 - Claudio Menghi, Christos Tsigkanos, Mehrnoosh Askarpour, Patrizio Pelliccione, Gricel Vázquez, Radu Calinescu, Sergio García:
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties. 2741-2760 - Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. 2761-2775 - Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray:
Learning Approximate Execution Semantics From Traces for Binary Function Similarity. 2776-2790 - Xiao Wang, Lu Xiao, Tingting Yu, Anne Woepse, Sunny Wong:
From Inheritance to Mockito: An Automatic Refactoring Approach. 2791-2814 - Jingzhe Guo, Mingsheng Ying:
Software Pipelining for Quantum Loop Programs. 2815-2828 - Kizito Salako, Xingyu Zhao:
The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments. 2829-2838 - Shangqing Liu, Xiaofei Xie, Jing Kai Siow, Lei Ma, Guozhu Meng, Yang Liu:
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search. 2839-2855 - Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies:
How to Find Actionable Static Analysis Warnings: A Case Study With FindBugs. 2856-2872 - Catia Trubiani, Riccardo Pinciroli, Andrea Biaggi, Francesca Arcelli Fontana:
Automated Detection of Software Performance Antipatterns in Java-Based Applications. 2873-2891 - Enrique Larios Vargas, Omar Elazhary, Soroush Yousefi, Derek Lowlind, Michael L. W. Vliek, Margaret-Anne D. Storey:
DASP: A Framework for Driving the Adoption of Software Security Practices. 2892-2919 - He Jiang, Yulong Li, Shikai Guo, Xiaochen Li, Tao Zhang, Hui Li, Rong Chen:
DupHunter: Detecting Duplicate Pull Requests in Fork-Based Development. 2920-2940 - Jingling Sun, Ting Su, Kai Liu, Chao Peng, Zhao Zhang, Geguang Pu, Tao Xie, Zhendong Su:
Characterizing and Finding System Setting-Related Defects in Android Apps. 2941-2963 - Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez:
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. 2964-2979 - Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. 2980-2995 - Nikolaos Nikolaidis, Nikolaos Mittas, Apostolos Ampatzoglou, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou:
Assessing TD Macro-Management: A Nested Modeling Statistical Approach. 2996-3007 - Ziyi Zhou, Huiqun Yu, Guisheng Fan, Zijie Huang, Kang Yang:
Towards Retrieval-Based Neural Code Summarization: A Meta-Learning Approach. 3008-3031
Volume 49, Number 5, May 2023
- Chunrong Fang, Shengcheng Yu, Ting Su, Jing Zhang, Yuanhan Tian, Yang Liu:
Test Report Generation for Android App Testing Via Heterogeneous Data Analysis. 3032-3051 - Weiwei Zhang, Shengjian Guo, Hongyu Zhang, Yulei Sui, Yinxing Xue, Yun Xu:
Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations. 3052-3070 - Shenghui Gu, Guoping Rong, Tian Ren, He Zhang, Haifeng Shen, Yongda Yu, Xian Li, Jian Ouyang, Chunan Chen:
TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems. 3071-3088 - Jihee Park, Sungho Lee, Jaemin Hong, Sukyoung Ryu:
Static Analysis of JNI Programs via Binary Decompilation. 3089-3105 - Xin Tan, Minghui Zhou, Li Zhang:
Understanding Mentors' Engagement in OSS Communities via Google Summer of Code. 3106-3130 - Chaima Boufaied, Claudio Menghi, Domenico Bianculli, Lionel C. Briand:
Trace Diagnostics for Signal-Based Temporal Properties. 3131-3154 - Ying Wang, Peng Sun, Lin Pei, Yue Yu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. 3155-3181 - Zohreh Aghababaeyan, Manel Abdellatif, Lionel C. Briand, Ramesh S., Mojtaba Bagherzadeh:
Black-Box Testing of Deep Neural Networks through Test Case Diversity. 3182-3204 - Brittany Reid, Marcelo d'Amorim, Markus Wagner, Christoph Treude:
NCQ: Code Reuse Support for Node.js Developers. 3205-3225 - Chong Wang, Xin Peng, Zhenchang Xing, Xiujie Meng:
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking. 3226-3240 - Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C. S. Santos, Danielle Gonzalez, Steven Simmons:
Empirical Validation of Automated Vulnerability Curation and Characterization. 3241-3260 - Neil Walkinshaw, Robert M. Hierons:
Modelling Second-Order Uncertainty in State Machines. 3261-3276 - Jack H. Good, Nicholas Gisolfi, James Kyle Miller, Artur Dubrawski:
Verification of Fuzzy Decision Trees. 3277-3288 - Yujia Chen, Cuiyun Gao, Xiaoxue Ren, Yun Peng, Xin Xia, Michael R. Lyu:
API Usage Recommendation Via Multi-View Heterogeneous Graph Representation Learning. 3289-3304 - Chenhao Wei, Lu Xiao, Tingting Yu, Xinyu Chen, Xiao Wang, Sunny Wong, Abigail Clune:
Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models. 3305-3324 - Kashumi Madampe, Rashina Hoda, John Grundy:
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering. 3325-3343
Volume 49, Number 6, June 2023
- Thiago do Nascimento Ferreira, James Ivers, Jeffrey J. Yackley, Marouane Kessentini, Ipek Ozkaya, Khouloud Gaaloul:
Dependent or Not: Detecting and Understanding Collections of Refactorings. 3344-3358 - Quentin L. Meunier, Etienne Pons, Karine Heydemann:
LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions. 3359-3375 - Wei Liu, Tse-Hsun Chen:
SLocator: Localizing the Origin of SQL Queries in Database-Backed Web Applications. 3376-3390 - Yuan Zhou, Yang Sun, Yun Tang, Yuqi Chen, Jun Sun, Christopher M. Poskitt, Yang Liu, Zijiang Yang:
Specification-Based Autonomous Driving System Testing. 3391-3410 - Thanh Le-Cong, Duc-Minh Luong, Xuan-Bach Dinh Le, David Lo, Nhat-Hoa Tran, Bui Quang Huy, Quyet-Thang Huynh:
Invalidator: Automated Patch Correctness Assessment Via Semantic and Syntactic Reasoning. 3411-3429 - Nazanin Bayati Chaleshtari, Fabrizio Pastore, Arda Goknil, Lionel C. Briand:
Metamorphic Testing for Web System Security. 3430-3471 - Chaochen Shi, Borui Cai, Yao Zhao, Longxiang Gao, Keshav Sood, Yong Xiang:
CoSS: Leveraging Statement Semantics for Code Summarization. 3472-3486 - Joseph Poremba, Nancy A. Day, Amirhossein Vakili:
New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding. 3487-3503 - Baicai Sun, Dunwei Gong, Feng Pan, Xiangjuan Yao, Tian Tian:
Evolutionary Generation of Test Suites for Multi-Path Coverage of MPI Programs With Non-Determinism. 3504-3523 - Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. 3524-3535 - Akond Rahman, Chris Parnin:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management. 3536-3553 - Luca Traini, Vittorio Cortellessa:
DeLag: Using Multi-Objective Optimization to Enhance the Detection of Latency Degradation Patterns in Service-Based Systems. 3554-3580 - Boyuan Li, Carol S. Smidts:
A Zone-Based Model for Analysis of Dependent Failures in Requirements Inspection. 3581-3598 - Xiaoyu Sun, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li:
Taming Android Fragmentation Through Lightweight Crowdsourced Testing. 3599-3615 - Mario Janke, Patrick Mäder:
${\text{FS}^{3}}_{\text{change}}$FS3change: A Scalable Method for Change Pattern Mining. 3616-3629 - Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu, Shuqing Li, Lu Liu, Michael R. Lyu:
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. 3630-3646 - Finlay Macklon, Markos Viggiato, Natalia Romanova, Chris Buzon, Dale Paas, Cor-Paul Bezemer:
A Taxonomy of Testable HTML5 Canvas Issues. 3647-3659
Volume 49, Number 7, July 2023
- Mathieu Nassif, Martin P. Robillard:
Identifying Concepts in Software Projects. 3660-3674 - Federico Cassano, John Gouwar, Daniel Nguyen, Sydney Nguyen, Luna Phipps-Costin, Donald Pinckney, Ming-Ho Yee, Yangtian Zi, Carolyn Jane Anderson, Molly Q. Feldman, Arjun Guha, Michael Greenberg, Abhinav Jangda:
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation. 3675-3691 - Ivano Malavolta, Kishan Nirghin, Gian Luca Scoccia, Simone Romano, Salvatore Lombardi, Giuseppe Scanniello, Patricia Lago:
JavaScript Dead Code Identification, Elimination, and Empirical Assessment. 3692-3714 - Amirhossein Zolfagharian, Manel Abdellatif, Lionel C. Briand, Mojtaba Bagherzadeh, Ramesh S.:
A Search-Based Testing Approach for Deep Reinforcement Learning Agents. 3715-3735 - Priscila Santiesteban, Yu Huang, Westley Weimer, Hammad Ahmad:
CirFix: Automated Hardware Repair and its Real-World Applications. 3736-3752 - Souvick Das, Novarun Deb, Nabendu Chaki, Agostino Cortesi:
Driving the Technology Value Stream by Analyzing App Reviews. 3753-3770 - Steve Kommrusch, Martin Monperrus, Louis-Noël Pouchet:
Self-Supervised Learning to Prove Equivalence Between Straight-Line Programs via Rewrite Rules. 3771-3792 - Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. 3793-3810 - Xiao Ling, Tim Menzies:
What Not to Test (For Cyber-Physical Systems). 3811-3826 - Hafedh Mili, Imen Benzarti, Amal Elkharraz, Ghizlane El-Boussaidi, Yann-Gaël Guéhéneuc, Petko Valtchev:
Discovering Reusable Functional Features in Legacy Object-Oriented Systems. 3827-3856 - Tarek Mahmud, Meiru Che, Guowei Yang:
Detecting Android API Compatibility Issues With API Differences. 3857-3871 - Zhongxing Yu, Matias Martinez, Zimin Chen, Tegawendé F. Bissyandé, Martin Monperrus:
Learning the Relation Between Code Features and Code Transforms With Structured Prediction. 3872-3900 - Qinsheng Hou, Wenrui Diao, Yanhao Wang, Chenglin Mao, Lingyun Ying, Song Liu, Xiaofeng Liu, Yuanzhi Li, Shanqing Guo, Meining Nie, Haixin Duan:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. 3901-3921 - Milos Ojdanic, Aayush Garg, Ahmed Khanfir, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies. 3922-3938 - Zhuo Zhang, Yan Lei, Xiaoguang Mao, Meng Yan, Xin Xia, David Lo:
Context-Aware Neural Fault Localization. 3939-3954
Volume 49, Number 8, August 2023
- Sebastian Simon, Nicolai Ruckel, Norbert Siegmund:
CfgNet: A Framework for Tracking Equality-Based Configuration Dependencies Across a Software Project. 3955-3971 - Essa A. Alhazami, Abdullah M. Sheneamer:
Graph-of-Code: Semantic Clone Detection Using Graph Fingerprints. 3972-3988 - Weiyi Zhang, Zoran Salcic, Avinash Malik:
Designing, Modeling and Analysis of GALS Software Systems. 3989-4003 - Runzhi He, Hao He, Yuxia Zhang, Minghui Zhou:
Automating Dependency Updates in Practice: An Exploratory Study on GitHub Dependabot. 4004-4022 - Achiya Elyasaf, Eitan Farchi, Oded Margalit, Gera Weiss, Yeshayahu Weiss:
Generalized Coverage Criteria for Combinatorial Sequence Testing. 4023-4034 - Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo:
Multi-Granularity Detector for Vulnerability Fixes. 4035-4057 - Jiayang Song, Xuan Xie, Lei Ma:
$\mathtt {SIEGE}$SIEGE: A Semantics-Guided Safety Enhancement Framework for AI-Enabled Cyber-Physical Systems. 4058-4080 - Mingwei Liu, Chengyuan Zhao, Xin Peng, Simin Yu, Haofen Wang, Chaofeng Sha:
Task-Oriented ML/DL Library Recommendation Based on a Knowledge Graph. 4081-4096 - Huayao Wu, Senyao Yu, Xintao Niu, Changhai Nie, Yu Pei, Qiang He, Yun Yang:
Enhancing Fault Injection Testing of Service Systems via Fault-Tolerance Bottleneck. 4097-4114 - Shengcheng Yu, Chunrong Fang, Quanjun Zhang, Zhihao Cao, Yexiao Yun, Zhenfei Cao, Kai Mei, Zhenyu Chen:
Mobile App Crowdsourced Test Report Consistency Detection via Deep Image-and-Text Fusion Understanding. 4115-4134 - Youshuai Tan, Jinfu Chen, Weiyi Shang, Tao Zhang, Sen Fang, Xiapu Luo, Zijie Chen, Shuhao Qi:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. 4135-4151 - Chunyong Zhang, Bin Liu, Yang Xin, Liangwei Yao:
CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation. 4152-4168 - Darius Sas, Paris Avgeriou:
An Architectural Technical Debt Index Based on Machine Learning and Architectural Smells. 4169-4195 - Junwei Zhang, Zhongxin Liu, Xing Hu, Xin Xia, Shanping Li:
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code. 4196-4212 - Yalemisew M. Abgaz, Andrew McCarren, Peter Elger, David Solan, Neil Lapuz, Marin Bivol, Glenn Jackson, Murat Yilmaz, Jim Buckley, Paul M. Clarke:
Decomposition of Monolith Applications Into Microservices Architectures: A Systematic Review. 4213-4242
Volume 49, Number 9, September 2023
- Razan Ghzouli, Thorsten Berger, Einar Broch Johnsen, Andrzej Wasowski, Swaib Dragule:
Behavior Trees and State Machines in Robotics Applications. 4243-4267 - Aakash Bansal, Zachary Eberhart, Zachary Karas, Yu Huang, Collin McMillan:
Function Call Graph Context Encoding for Neural Source Code Summarization. 4268-4281 - Orlando Amaral Cejas, Muhammad Ilyas Azeem, Sallam Abualhaija, Lionel C. Briand:
NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR. 4282-4303 - Amir Mohammad Ebrahimi, Gustavo Ansaldi Oliva, Ahmed E. Hassan:
Self-Admitted Technical Debt in Ethereum Smart Contracts: A Large-Scale Exploratory Study. 4304-4323 - Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. 4324-4348 - Ulrike Maria Graetsch, Hourieh Khalajzadeh, Mojtaba Shahin, Rashina Hoda, John C. Grundy:
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions. 4349-4370 - Uraz Cengiz Türker, Robert M. Hierons, Gerassimos D. Barlas, Khaled El-Fakih:
Incomplete Adaptive Distinguishing Sequences for Non-Deterministic FSMs. 4371-4389 - Ke Liu, Xiang Chen, Chunyang Chen, Xiaofei Xie, Zhanqi Cui:
Automated Question Title Reformulation by Mining Modification Logs From Stack Overflow. 4390-4410 - Yihui Wang, Huaxiao Liu, Shanquan Gao, Xiao Tang:
Animation2API: API Recommendation for the Implementation of Android UI Animations. 4411-4428 - Yutao Hu, Yilin Fang, Yifan Sun, Yaru Jia, Yueming Wu, Deqing Zou, Hai Jin:
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection. 4429-4442 - Toni Mancini, Igor Melatti, Enrico Tronci:
Optimizing Highly-Parallel Simulation-Based Verification of Cyber-Physical Systems. 4443-4455 - Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. 4456-4476 - Jakob Svennevik Notland, Mariusz Nowostawski, Jingyue Li:
Runtime Evolution of Bitcoin's Consensus Rules. 4477-4495
Volume 49, Number 10, October 2023
- Meriel von Stein, David Shriver, Sebastian G. Elbaum:
DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles. 4496-4509 - Adriano Torres, Pedro Henrique Teixeira Costa, Luis Henrique Vieira Amaral, Jonata Pastro, Rodrigo Bonifácio, Marcelo d'Amorim, Owolabi Legunsen, Eric Bodden, Edna Dias Canedo:
Runtime Verification of Crypto APIs: An Empirical Study. 4510-4525 - Charaka Geethal, Marcel Böhme, Van-Thuan Pham:
Human-in-the-Loop Automatic Program Repair. 4526-4549 - Michael Fu, Van Nguyen, Chakkrit Kla Tantithamthavorn, Trung Le, Dinh Q. Phung:
VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types. 4550-4565 - Xu Guo, Xiaoyu Song, Jiantao Zhou, Feiyu Wang, Kecheng Tang:
An Effective Approach to High Strength Covering Array Generation in Combinatorial Testing. 4566-4593 - Hadi Jahanshahi, Mucahit Cevik, Kianoush Mousavi, Ayse Basar:
ADPTriage: Approximate Dynamic Programming for Bug Triage. 4594-4609 - Michele Guerra, Simone Scalabrino, Fausto Fasano, Rocco Oliveto:
An Empirical Study on the Effectiveness of Privacy Indicators. 4610-4623 - Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. 4624-4638 - Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? 4639-4655 - Yuqi Huai, Sumaya Almanee, Yuntianyi Chen, Xiafa Wu, Qi Alfred Chen, Joshua Garcia:
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning. 4656-4676 - Francesco Bertolotti, Walter Cazzola:
CombTransformers: Statement-Wise Transformers for Statement-Wise Representations. 4677-4690 - Tiezhu Sun, Kevin Allix, Kisub Kim, Xin Zhou, Dongsun Kim, David Lo, Tegawendé F. Bissyandé, Jacques Klein:
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. 4691-4706 - Xinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem:
Fast Parametric Model Checking With Applications to Software Performability Analysis. 4707-4730 - Armstrong Foundjem, Ellis E. Eghan, Bram Adams:
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization. 4731-4750 - Shikai Guo, Haorui Lin, Jiaoru Zhao, Hui Li, Rong Chen, Xiaochen Li, He Jiang:
An Easy Data Augmentation Approach for Application Reviews Event Inference. 4751-4772 - Eduardo Santana de Almeida, Iftekhar Ahmed, André van der Hoek:
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings. 4773-4795 - Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. 4796-4813 - Matias Martinez, Jean-Rémy Falleri, Martin Monperrus:
Hyperparameter Optimization for AST Differencing. 4814-4828
Volume 49, Number 11, November 2023
- Fan Zhang, Qianmei Wu, Bohan Xuan, Yuqi Chen, Wei Lin, Christopher M. Poskitt, Jun Sun, Binbin Chen:
Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. 4829-4845 - Nikita Mehrotra, Akash Sharma, Anmol Jindal, Rahul Purandare:
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks. 4846-4868 - Chaozheng Wang, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang, Michael R. Lyu:
Prompt Tuning in Code Intelligence: An Experimental Evaluation. 4869-4885 - Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. 4886-4916 - Nick van Beest, Heerko Groefsema, Adrian Cryer, Guido Governatori, Silvano Colombo Tosatto, Hannah M. S. Burke:
Cross-Instance Regulatory Compliance Checking of Business Process Event Logs. 4917-4931 - Nasif Imtiaz, Laurie A. Williams:
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates. 4932-4945 - César Cornejo, Germán Regis, Nazareno Aguirre, Marcelo F. Frias:
A Study of the Electrum and DynAlloy Dynamic Behavior Notations. 4946-4963 - Yang Wang, Peng Zhang, Maolin Sun, Zeyu Lu, Yibiao Yang, Yutian Tang, Junyan Qian, Zhi Li, Yuming Zhou:
Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving. 4964-4987 - Khashayar Etemadi, Aman Sharma, Fernanda Madeiral, Martin Monperrus:
Augmenting Diffs With Runtime Information. 4988-5007 - Kevin Jesse, Christoph Kuhmünch, Anand Ashok Sawant:
RefactorScore: Evaluating Refactor Prone Code. 5008-5026 - César Soto-Valero, Deepika Tiwari, Tim Toady, Benoit Baudry:
Automatic Specialization of Third-Party Java Dependencies. 5027-5045
Volume 49, Number 12, December 2023
- Shuang Liu, Shujie Dou, Junjie Chen, Zhirun Zhang, Ye Lu:
Differential Testing of Machine Translators Based on Compositional Semantics. 5046-5059 - Mukelabai Mukelabai, Kevin Hermann, Thorsten Berger, Jan-Philipp Steghöfer:
FeatRacer: Locating Features Through Assisted Traceability. 5060-5083 - Dan Iorga, John Wickerson, Alastair F. Donaldson:
Simulating Operational Memory Models Using Off-the-Shelf Program Analysis Tools. 5084-5102 - Shayan Noei, Heng Li, Stefanos Georgiou, Ying Zou:
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process. 5103-5119 - Sepehr Sharifi, Donghwan Shin, Lionel C. Briand, Nathan Aschbacher:
Identifying the Hazard Boundary of ML-Enabled Autonomous Systems Using Cooperative Coevolutionary Search. 5120-5138 - Giovanni Denaro, Rahim Heydarov, Ali Mohebbi, Mauro Pezzè:
Prevent: An Unsupervised Approach to Predict Software Failures in Production. 5139-5153 - Zhaoqiang Guo, Tingting Tan, Shiran Liu, Xutong Liu, Wei Lai, Yibiao Yang, Yanhui Li, Lin Chen, Wei Dong, Yuming Zhou:
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities. 5154-5188 - Rodrigo Casamayor, Carlos Cetina, Oscar Pastor, Francisca Pérez:
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering. 5189-5202 - Iflaah Salman, Burak Turhan, Robert Ramac, Vladimir Mandic:
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing. 5203-5222 - Bohan Liu, He Zhang, Weigang Ma, Gongyuan Li, Shanshan Li, Haifeng Shen:
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation. 5223-5249 - Weifeng Sun, Meng Yan, Zhongxin Liu, David Lo:
Robust Test Selection for Deep Neural Networks. 5250-5278 - Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. 5279-5294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.