default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 156 matches
- 2024
- Ashraf Abdou, Nagy Ramadan Darwish:
Severity classification of software code smells using machine learning techniques: A comparative study. J. Softw. Evol. Process. 36(1) (2024) - Ibtissam Abnane, Ali Idri, Alain Abran:
Optimized fuzzy clustering-based k-nearest neighbors imputation for mixed missing data in software development effort estimation. J. Softw. Evol. Process. 36(4) (2024) - Amjad AbuHassan, Mohammad R. Alshayeb, Lahouari Ghouti:
Software refactoring side effects. J. Softw. Evol. Process. 36(1) (2024) - Mansi Agnihotri, Anuradha Chug:
Severity Factor (SF): An aid to developers for application of refactoring operations to improve software quality. J. Softw. Evol. Process. 36(5) (2024) - Muhammad Ovais Ahmad, Iftikhar Ahmad, Fawad Qayum:
Early career software developers and work preferences in software engineering. J. Softw. Evol. Process. 36(2) (2024) - Muhammad Ovais Ahmad, Tomas Gustavsson:
The Pandora's box of social, process, and people debts in software engineering. J. Softw. Evol. Process. 36(2) (2024) - Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Kari Smolander:
Successful management of cloud-based global software development projects: A multivocal study. J. Softw. Evol. Process. 36(4) (2024) - Muhammad Azeem Akbar, Víctor Leiva:
A new taxonomy of global software development best practices using prioritization based on a fuzzy system. J. Softw. Evol. Process. 36(3) (2024) - Eman Abdullah AlOmar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni:
Behind the scenes: On the relationship between developer experience and refactoring. J. Softw. Evol. Process. 36(1) (2024) - Gulzar Alam, Sajjad Mahmood, Mohammad R. Alshayeb, Mahmood Niazi, Saad Zafar:
Maturity model for secure software testing. J. Softw. Evol. Process. 36(5) (2024) - Yaroslav Alekseev, Mikhail Onischuck, Arseniy Zorin, Vitaliy Chernyi, Evgeniy Iliyn, Vladimir M. Itsykson:
ATSM: A coverage-based framework and a tool for test suite minimization. J. Softw. Evol. Process. 36(6) (2024) - Reem Alfayez, Robert Winn, Yunyan Ding, Ghaida Alfayez, Barry W. Boehm:
Technical debt (TD) through the lens of Twitter: A survey. J. Softw. Evol. Process. 36(4) (2024) - Maha Alharbi, Mohammad R. Alshayeb:
An empirical investigation of the relationship between pattern grime and code smells. J. Softw. Evol. Process. 36(9) (2024) - Waqas Ali, Lili Bo, Xiaobing Sun, Xiaoxue Wu, Aakash Ali, Ying Wei:
Software bug localization based on optimized and ensembled deep learning models. J. Softw. Evol. Process. 36(8) (2024) - Mashal Kasem Alqudah, Rozilawati Razali, Musab Kasim AlQudah, Muawya N. Aldalaien, Hamzeh Mohammad Alabool, Hamzah Ali Alkhazaleh:
A grounded theory of selecting lean and agile practices for software development. J. Softw. Evol. Process. 36(4) (2024) - Francesco Altiero, Anna Corazza, Sergio Di Martino, Adriano Peron, Luigi Libero Lucio Starace:
Regression test prioritization leveraging source code similarity with tree kernels. J. Softw. Evol. Process. 36(8) (2024) - Besma Ben Amara, Hédia Mhiri Sellami, Lamjed Ben Said:
An approach for serious game design and development based on iterative evaluation. J. Softw. Evol. Process. 36(10) (2024) - Guglielmo De Angelis, Hyunsook Do, Bao N. Nguyen:
Introduction to the special issue: "Software Quality for Modern Systems". J. Softw. Evol. Process. 36(8) (2024) - Mohammad Azzeh, Yousef Alqasrawi, Yousef Elsheikh:
A soft computing approach for software defect density prediction. J. Softw. Evol. Process. 36(4) (2024) - Aline Brito, André C. Hora, Marco Túlio Valente:
Towards a catalog of composite refactorings. J. Softw. Evol. Process. 36(4) (2024) - Jie Cai, Qian Cai, Bin Li, Jiale Zhang, Xiaobing Sun:
Application programming interface recommendation for smart contract using deep learning from augmented code representation. J. Softw. Evol. Process. 36(8) (2024) - Edna Dias Canedo, Emille Catarine Rodrigues Cançado, Alana Paula Barbosa Mota, Ian Nery Bandeira, Pedro Henrique Teixeira Costa, Fernanda Lima, Luis Henrique Vieira Amaral, Rodrigo Bonifácio:
Using Design Thinking to break social barriers: An experience report with former inmates. J. Softw. Evol. Process. 36(7) (2024) - Hongchen Cao, Shuai Li, Yuming Zhou, Ming Fan, Xuejiao Zhao, Yutian Tang:
Cheating your apps: Black-box adversarial attacks on deep learning apps. J. Softw. Evol. Process. 36(4) (2024) - Everton Cavalcante, Thaís Batista, Flávio Oquendo:
Looking back and forward: A retrospective and future directions on software engineering for systems-of-systems. J. Softw. Evol. Process. 36(10) (2024) - Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
A novel test case prioritization approach for black-box testing based on K-medoids clustering. J. Softw. Evol. Process. 36(4) (2024) - Bochuan Chen, Xiao Guo, Yuting Chen, Xiaofeng Yu, Lei Bu:
Constructing exception handling chains for testing Java virtual machine implementations. J. Softw. Evol. Process. 36(4) (2024) - Ningning Chen, Huibiao Zhu:
A process calculus SMrCaIT for IoT. J. Softw. Evol. Process. 36(5) (2024) - Zhenbang Chen, Guofeng Zhang, Zehua Chen, Ziqi Shuai, Weiyu Pan, Yufeng Zhang, Ji Wang:
Adaptive solving strategy synthesis for symbolic execution. J. Softw. Evol. Process. 36(4) (2024) - Zadia Codabux, Kazi Zakia Sultana, Md. Naseef-Ur-Rahman Chowdhury:
A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study. J. Softw. Evol. Process. 36(7) (2024) - Jie Dai, Qingshan Li, Shenglong Xie, Daizhen Li, Hua Chu:
PCG: A joint framework of graph collaborative filtering for bug triaging. J. Softw. Evol. Process. 36(9) (2024)
skipping 126 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-24 04:59 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint