


default search action
IEEE Transactions on Software Engineering, Volume 48
Volume 48, Number 2, February 2022
- Dirk van der Linden
, Emma J. Williams
, Joseph Hallett
, Awais Rashid
:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. 364-376 - Jose Ricardo da Silva Junior
, Daniel Prett Campagna
, Esteban Clua
, Anita Sarma
, Leonardo Murta
:
Dominoes: An Interactive Exploratory Data Analysis Tool for Software Relationships. 377-396 - Esther Guerra
, Juan de Lara
, Marsha Chechik, Rick Salay:
Property Satisfiability Analysis for Product Lines of Modelling Languages. 397-416 - Maxime Lamothe
, Weiyi Shang
, Tse-Hsun Peter Chen
:
A3: Assisting Android API Migrations Using Code Examples. 417-431 - Beatriz Bernárdez
, Amador Durán
, José Antonio Parejo
, Natalia Juristo, Antonio Ruiz-Cortés
:
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments. 432-452 - Jackson A. Prado Lima
, Silvia Regina Vergilio
:
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. 453-465 - Pilar Rodríguez
, Cathy Urquhart, Emilia Mendes:
A Theory of Value for Value-Based Feature Selection in Software Engineering. 466-484 - Yuxing Ma
, Audris Mockus
, Russell Zaretzki
, Randy V. Bradley, Bogdan C. Bichescu:
A Methodology for Analyzing Uptake of Software Technologies Among Developers. 485-501 - Aaditya Bhatia, Shaowei Wang
, Muhammad Asaduzzaman, Ahmed E. Hassan:
A Study of Bug Management Using the Stack Exchange Question and Answering Platform. 502-518 - Yanjie Jiang
, Hui Liu
, Jiahao Jin, Lu Zhang
:
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion. 519-537 - Guoxin Su
, Li Liu
, Minjie Zhang
, David S. Rosenblum
:
Quantitative Verification for Monitoring Event-Streaming Systems. 538-550 - Lei Xue
, Hao Zhou, Xiapu Luo
, Le Yu
, Dinghao Wu
, Yajin Zhou
, Xiaobo Ma
:
PackerGrind: An Adaptive Unpacking System for Android Apps. 551-570 - Hao Zhong
, Xiaoyin Wang
, Hong Mei
:
Inferring Bug Signatures to Detect Real Bugs. 571-584 - Chunhui Wang, Fabrizio Pastore
, Arda Goknil
, Lionel C. Briand
:
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach. 585-616 - Fabrizio Pastore
, Daniela Micucci
, Michell Guzmán
, Leonardo Mariani
:
TkT: Automatic Inference of Timed and Extended Pushdown Automata. 617-636 - Manish Motwani
, Mauricio Soto
, Yuriy Brun
, René Just
, Claire Le Goues
:
Quality of Automated Program Repair on Real-World Defects. 637-661 - Jie Lu
, Feng Li, Chen Liu, Lian Li
, Xiaobing Feng, Jingling Xue:
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement. 662-677 - Lisa Nguyen Quang Do
, Eric Bodden
:
Explaining Static Analysis With Rule Graphs. 678-690 - Shaoying Liu
, Shin Nakajima:
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing. 691-712 - Francisca Pérez
, Tewfik Ziadi, Carlos Cetina
:
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models. 713-731 - Jie M. Zhang
, Mark Harman, Lei Ma
, Yang Liu
:
Machine Learning Testing: Survey, Landscapes and Horizons. 1-36 - Dror G. Feitelson
, Ayelet Mizrahi
, Nofar Noy
, Aviad Ben Shabat
, Or Eliyahu
, Roy Sheffer
:
How Developers Choose Names. 37-52 - Carlos Sáenz-Adán
, Beatriz Pérez
, Francisco J. García Izquierdo
, Luc Moreau
:
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience. 53-68 - Toshiki Hirao
, Shane McIntosh
, Akinori Ihara
, Kenichi Matsumoto
:
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities. 69-81 - Meng Yan
, Xin Xia
, Yuanrui Fan
, Ahmed E. Hassan, David Lo
, Shanping Li:
Just-In-Time Defect Identification and Localization: A Two-Phase Framework. 82-101 - Wenhua Wang, Yuqun Zhang, Yulei Sui
, Yao Wan, Zhou Zhao
, Jian Wu, Philip S. Yu
, Guandong Xu
:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. 102-119 - Faeq Alrimawi
, Liliana Pasquale
, Deepak Mehta, Nobukazu Yoshioka
, Bashar Nuseibeh
:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. 120-134 - Sebastian Baltes
, Christoph Treude
, Martin P. Robillard
:
Contextual Documentation Referencing on Stack Overflow. 135-149 - Qiang He
, Bo Li
, Feifei Chen
, John C. Grundy
, Xin Xia, Yun Yang
:
Diversified Third-Party Library Prediction for Mobile App Development. 150-165 - Jirayus Jiarpakdee
, Chakkrit Kla Tantithamthavorn
, Hoa Khanh Dam
, John C. Grundy
:
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models. 166-185 - Camilo Escobar-Velásquez
, Mario Linares-Vásquez
, Gabriele Bavota
, Michele Tufano
, Kevin Moran
, Massimiliano Di Penta
, Christopher Vendome, Carlos Bernal-Cárdenas
, Denys Poshyvanyk
:
Enabling Mutant Generation for Open- and Closed-Source Android Apps. 186-208 - Md. Ahasanuzzaman
, Safwat Hassan
, Ahmed E. Hassan:
Studying Ad Library Integration Strategies of Top Free-to-Download Apps. 209-224 - André N. Meyer
, Chris Satterfield, Manuela Züger, Katja Kevic, Gail C. Murphy
, Thomas Zimmermann
, Thomas Fritz
:
Detecting Developers' Task Switches and Types. 225-240 - Hema Susmita Padala, Christopher J. Mendez, Felipe Fronchetti, Igor Steinmacher
, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Margaret Burnett
, Marco Aurélio Gerosa, Anita Sarma
:
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects. 241-259 - Ann Barcomb
, Klaas-Jan Stol
, Brian Fitzgerald, Dirk Riehle
:
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities. 260-277 - Huy Tu
, Zhe Yu
, Tim Menzies
:
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction). 278-294 - Héctor D. Menéndez, Michele Boreale
, Daniele Gorla
, David Clark
:
Output Sampling for Output Diversity in Automatic Unit Test Generation. 295-308 - Tongtong Xu
, Liushan Chen
, Yu Pei
, Tian Zhang, Minxue Pan
, Carlo A. Furia
:
Restore: Retrospective Fault Localization Enhancing Automated Program Repair. 309-326 - Jiachi Chen
, Xin Xia
, David Lo
, John C. Grundy
, Xiapu Luo
, Ting Chen
:
Defining Smart Contract Defects on Ethereum. 327-345 - Yu Wang
, Fengjuan Gao
, Linzhang Wang
, Tingting Yu
, Jianhua Zhao, Xuandong Li:
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software. 346-363
Volume 48, Number 3, March 2022
- Pedro Pinto
, João Bispo
, João M. P. Cardoso
, Jorge G. Barbosa
, Davide Gadioli
, Gianluca Palermo
, Jan Martinovic
, Martin Golasowski, Katerina Slaninová
, Radim Cmar, Cristina Silvano
:
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems. 732-754 - Mashel Albarak
, Rami Bahsoon
, Ipek Ozkaya
, Robert L. Nord
:
Managing Technical Debt in Database Normalization. 755-772 - Iris Reinhartz-Berger
, Anna Zamansky
:
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms. 773-785 - Chao Ni
, Xin Xia
, David Lo
, Xiang Chen
, Qing Gu:
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction. 786-802 - Giovani Guizzo
, Federica Sarro
, Jens Krinke
, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. 803-818 - Daniel Russo
, Klaas-Jan Stol
:
Gender Differences in Personality Traits of Software Engineers. 819-834 - Lisa Nguyen Quang Do
, James R. Wright
, Karim Ali
:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. 835-847 - Mario Janke
, Patrick Mäder
:
Graph Based Mining of Code Change Patterns From Version Control Commits. 848-863 - Chaima Abid, Marouane Kessentini
, Vahid Alizadeh
, Mouna Dhaouadi, Rick Kazman
:
How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. 864-878 - Hetong Dai
, Heng Li
, Che-Shao Chen, Weiyi Shang, Tse-Hsun Chen
:
Logram: Efficient Log Parsing Using $n$n-Gram Dictionaries. 879-892 - Rahul Krishna
, Chong Tang
, Kevin J. Sullivan, Baishakhi Ray:
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance. 893-909 - Minxue Pan
, Tongtong Xu
, Yu Pei
, Zhong Li, Tian Zhang, Xuandong Li:
GUI-Guided Test Script Repair for Mobile Apps. 910-929 - Nikolaos Tsantalis
, Ameya Ketkar
, Danny Dig:
RefactoringMiner 2.0. 930-950 - Mojtaba Bagherzadeh
, Nafiseh Kahani, Karim Jahed, Juergen Dingel:
Execution of Partial State Machine Models. 951-972 - Pengfei Gao
, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song
, Taolue Chen
:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 973-1000 - Kun Qiu
, Zheng Zheng
, Tsong Yueh Chen
, Pak-Lok Poon
:
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition. 1001-1017 - Shivashree Vysali
, Shane McIntosh
, Bram Adams
:
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements. 1018-1029 - Hanefi Mercan
, Arsalan Javeed, Cemal Yilmaz
:
Flexible Combinatorial Interaction Testing. 1030-1066 - Peng Zhang
, Yanhui Li
, Wanwangying Ma, Yibiao Yang
, Lin Chen
, Hongmin Lu, Yuming Zhou
, Baowen Xu
:
CBUA: A Probabilistic, Predictive, and Practical Approach for Evaluating Test Suite Effectiveness. 1067-1096
Volume 48, Number 4, April 2022
- Jesús Sánchez Cuadrado
, Loli Burgueño
, Manuel Wimmer
, Antonio Vallecillo
:
Efficient Execution of ATL Model Transformations Using Static Analysis and Parallelism. 1097-1114 - Ting Su
, Lingling Fan
, Sen Chen
, Yang Liu
, Lihua Xu, Geguang Pu
, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. 1115-1137 - Ezekiel O. Soremekun
, Esteban Pavese, Nikolas Havrikov
, Lars Grunske
, Andreas Zeller:
Inputs From Hell. 1138-1153 - Mohammad Mehdi Pourhashem Kallehbasti
, Matteo Rossi
, Luciano Baresi
:
On How Bit-Vector Logic Can Help Verify LTL-Based Specifications. 1154-1168 - Xiangjuan Yao
, Gongjie Zhang
, Feng Pan
, Dunwei Gong
, Changqing Wei:
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing. 1169-1184 - Neng Zhang
, Qiao Huang, Xin Xia
, Ying Zou, David Lo
, Zhenchang Xing
:
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval. 1185-1211 - Mitchell J. Gerrard
, Mateus Borges, Matthew B. Dwyer
, Antonio Filieri
:
Conditional Quantitative Program Analysis. 1212-1227 - Dong Liu, He Jiang
, Xiaochen Li
, Zhilei Ren, Lei Qiao
, Zuohua Ding
:
DPWord2Vec: Better Representation of Design Patterns in Semantics. 1228-1248 - Lin Jiang
, Hui Liu
, He Jiang
, Lu Zhang
, Hong Mei:
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access. 1249-1267 - Hui Liu
, Mingzhu Shen, Jiaqi Zhu, Nan Niu
, Ge Li, Lu Zhang
:
Deep Learning Based Program Generation From Requirements Text: Are We There Yet? 1268-1289 - Di Liu, Yang Feng
, Xiaofang Zhang
, James A. Jones, Zhenyu Chen
:
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding. 1290-1308 - Zhixing Li
, Yue Yu
, Minghui Zhou
, Tao Wang, Gang Yin, Long Lan, Huaimin Wang:
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects. 1309-1335 - Baicai Sun
, Dunwei Gong
, Tian Tian
, Xiangjuan Yao
:
Integrating an Ensemble Surrogate Model's Estimation into Test Data Generation. 1336-1350 - Iflaah Salman
, Pilar Rodríguez
, Burak Turhan
, Ayse Tosun
, Arda Gureller:
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers? 1351-1368 - Raghvinder S. Sangwan
, Ashkan Negahban
, Robert L. Nord
, Ipek Ozkaya:
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value. 1369-1384 - Saikat Chakraborty
, Yangruibo Ding
, Miltiadis Allamanis
, Baishakhi Ray
:
CODIT: Code Editing With Tree-Based Neural Models. 1385-1399 - Gema Rodríguez-Pérez
, Meiyappan Nagappan
, Gregorio Robles
:
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project. 1400-1416 - Fei He
, Qianshan Yu, Liming Cai:
Efficient Summary Reuse for Software Regression Verification. 1417-1431 - Maurício Aniche
, Erick Maziero, Rafael S. Durelli
, Vinicius H. S. Durelli:
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring. 1432-1450 - Navid Teymourian
, Habib Izadkhah
, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. 1451-1462
Volume 48, Number 5, May 2022
- Yuan Huang
, Nan Jia
, Xiangping Chen
, Kai Hong, Zibin Zheng
:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. 1463-1479 - Supatsara Wattanakriengkrai
, Patanamon Thongtanunam
, Chakkrit Tantithamthavorn
, Hideaki Hata
, Kenichi Matsumoto
:
Predicting Defective Lines Using a Model-Agnostic Technique. 1480-1496 - Morteza Verdi, Ashkan Sami
, Jafar Akhondali, Foutse Khomh
, Gias Uddin
, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. 1497-1514 - Benjamin Shreeve
, Joseph Hallett
, Matthew Edwards
, Kopo M. Ramokapane, Richard Atkins, Awais Rashid
:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. 1515-1528 - Jinfu Chen
, Weiyi Shang, Emad Shihab:
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits. 1529-1544 - Meilun Li
, Andrea Turrini
, Ernst Moritz Hahn
, Zhikun She
, Lijun Zhang
:
Probabilistic Preference Planning Problem for Markov Decision Processes. 1545-1559 - Soumaya Rebai, Vahid Alizadeh
, Marouane Kessentini
, Houcem Fehri, Rick Kazman
:
Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring. 1560-1578 - Zainab Masood
, Rashina Hoda
, Kelly Blincoe
:
Real World Scrum A Grounded Theory of Variations in Practice. 1579-1591 - Ivan Pashchenko
, Henrik Plate
, Serena Elisa Ponta
, Antonino Sabetta
, Fabio Massacci
:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. 1592-1609 - Kristóf Marussy
, Oszkár Semeráth
, Dániel Varró
:
Automated Generation of Consistent Graph Models With Multiplicity Reasoning. 1610-1629 - Nico Ritschel
, Vladimir Kovalenko
, Reid Holmes
, Ronald Garcia, David C. Shepherd
:
Comparing Block-Based Programming Models for Two-Armed Robots. 1630-1643 - Bartosz Papis
, Konrad Grochowski
, Kamil Subzda
, Kamil Sijko:
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project. 1644-1664 - Wentao Wang
, Faryn Dumont, Nan Niu
, Glen Horton
:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. 1665-1675 - Zhe Yu
, Fahmid Morshed Fahid
, Huy Tu
, Tim Menzies
:
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach. 1676-1691 - Zohreh Sharafi
, Ian Bertram
, Michael Flanagan
, Westley Weimer:
Eyes on Code: A Study on Developers' Code Navigation Strategies. 1692-1704 - George Digkas
, Alexander Chatzigeorgiou
, Apostolos Ampatzoglou
, Paris Avgeriou
:
Can Clean New Code Reduce Technical Debt Density? 1705-1721 - Mohammad Bajammal
, Andrea Stocco
, Davood Mazinanian, Ali Mesbah
:
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks. 1722-1742 - Yingzhe He
, Guozhu Meng
, Kai Chen
, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. 1743-1770 - Miqing Li
, Tao Chen
, Xin Yao:
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance. 1771-1799 - Shangqing Liu
, Cuiyun Gao
, Sen Chen
, Lun Yiu Nie, Yang Liu
:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. 1800-1817 - Waqar Hussain
, Harsha Perera
, Jon Whittle
, Arif Nurwidyantoro
, Rashina Hoda
, Rifat Ara Shams
, Gillian C. Oliver
:
Human Values in Software Engineering: Contrasting Case Studies of Practice. 1818-1833
Volume 48, Number 6, June 2022
- Tingting Bi, Xin Xia
, David Lo
, John C. Grundy
, Thomas Zimmermann
:
An Empirical Study of Release Note Production and Usage in Practice. 1834-1852 - Bhaveet Nagaria
, Tracy Hall
:
How Software Developers Mitigate Their Errors When Developing Code. 1853-1867 - Federica Sarro
, Rebecca Moussa
, Alessio Petrozziello, Mark Harman:
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates. 1868-1882 - Zachary Eberhart
, Aakash Bansal, Collin McMillan:
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant. 1883-1904 - Qusay Idrees Sarhan
, Bestoun S. Ahmed
, Miroslav Bures
, Kamal Z. Zamli
:
Software Module Clustering: An In-Depth Literature Analysis. 1905-1928 - Jorge Melegati
, Henry Edison
, Xiaofeng Wang
:
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups. 1929-1946 - Xavier Franch
, Daniel Méndez
, Andreas Vogelsang
, Rogardt Heldal, Eric Knauss
, Marc Oriol, Guilherme H. Travassos
, Jeffrey C. Carver
, Thomas Zimmermann
:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? 1947-1964 - Maureen Keegan
, Víctor A. Braberman, Nicolás D'Ippolito
, Nir Piterman, Sebastián Uchitel
:
Control and Discovery of Environment Behaviour. 1965-1978 - Zi Peng, Tse-Hsun Chen
, Jinqiu Yang:
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies. 1979-1993 - Tianpei Xia
, Rui Shu, Xipeng Shen
, Tim Menzies
:
Sequential Model Optimization for Software Effort Estimation. 1994-2009 - Alex Cummaudo
, Rajesh Vasa
, John C. Grundy
, Mohamed Abdelrazek
:
Requirements of API Documentation: A Case Study into Computer Vision Services. 2010-2027 - Barton P. Miller
, Mengxiao Zhang
, Elisa R. Heymann
:
The Relevance of Classic Fuzz Testing: Have We Solved This One? 2028-2039 - Keheliya Gallaba
, John Ewart, Yves Junqueira, Shane McIntosh
:
Accelerating Continuous Integration by Caching Environments and Inferring Dependencies. 2040-2052 - Richard Torkar
, Carlo A. Furia
, Robert Feldt, Francisco Gomes de Oliveira Neto
, Lucas Gren
, Per Lenberg
, Neil A. Ernst:
A Method to Assess and Argue for Practical Significance in Software Engineering. 2053-2065 - Abdul Razzaq
, Anthony Ventresque
, Rainer Koschke, Andrea De Lucia
, Jim Buckley:
The Effect of Feature Characteristics on the Performance of Feature Location Techniques. 2066-2085 - Stefano Dalla Palma
, Dario Di Nucci
, Fabio Palomba
, Damian A. Tamburri
:
Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics. 2086-2104 - Dulaji Hidellaarachchi
, John C. Grundy
, Rashina Hoda
, Kashumi Madampe
:
The Effects of Human Aspects on the Requirements Engineering Process: A Systematic Literature Review. 2105-2127 - Tiago Boldt Sousa
, Hugo Sereno Ferreira
, Filipe Figueiredo Correia
:
A Survey on the Adoption of Patterns for Engineering Software for the Cloud. 2128-2140 - Xiangying Dang
, Dunwei Gong
, Xiangjuan Yao
, Tian Tian
, Huai Liu
:
Enhancement of Mutation Testing via Fuzzy Clustering and Multi-Population Genetic Algorithm. 2141-2156 - Yu Zhou
, Xinying Yang, Taolue Chen
, Zhiqiu Huang
, Xiaoxing Ma
, Harald C. Gall
:
Boosting API Recommendation With Implicit Feedback. 2157-2172 - Zhixing Li
, Yue Yu
, Tao Wang, Gang Yin, ShanShan Li
, Huaimin Wang:
Are You Still Working on This? An Empirical Study on Pull Request Abandonment. 2173-2188
Volume 48, Number 7, July 2022
- Jiachi Chen
, Xin Xia
, David Lo
, John Grundy
, Xiapu Luo
, Ting Chen
:
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. 2189-2207 - Filipe Roseiro Côgo, Gustavo Ansaldi Oliva
, Ahmed E. Hassan:
Deprecation of Packages and Releases in Software Ecosystems: A Case Study on NPM. 2208-2223 - Jia Yang
, Cai Fu
, Xiao-Yang Liu
, Heng Yin
, Pan Zhou
:
Codee: A Tensor Embedding Scheme for Binary Code Search. 2224-2244 - Gopi Krishnan Rajbahadur
, Shaowei Wang
, Gustavo Ansaldi Oliva, Yasutaka Kamei
, Ahmed E. Hassan:
The Impact of Feature Importance Methods on the Interpretation of Defect Classifiers. 2245-2261 - Devika Sondhi
, Mayank Jobanputra
, Divya Rani
, Salil Purandare
, Sakshi Sharma
, Rahul Purandare
:
Mining Similar Methods for Test Adaptation. 2262-2276 - Diego Elias Costa
, Suhaib Mujahid
, Rabe Abdalkareem
, Emad Shihab:
Breaking Type Safety in Go: An Empirical Study on the Usage of the unsafe Package. 2277-2294 - Ying Wang
, Rongxin Wu
, Chao Wang, Ming Wen
, Yepang Liu
, Shing-Chi Cheung
, Hai Yu
, Chang Xu
, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? 2295-2316 - Yi Xiang
, Han Huang
, Miqing Li
, Sizhe Li, Xiaowei Yang:
Looking For Novelty in Search-Based Software Product Line Testing. 2317-2338 - He Jiang
, Zhide Zhou
, Zhilei Ren, Jingxuan Zhang
, Xiaochen Li
:
CTOS: Compiler Testing for Optimization Sequences of LLVM. 2339-2358 - Haoxiang Zhang
, Shaowei Wang
, Heng Li
, Tse-Hsun Chen
, Ahmed E. Hassan:
A Study of C/C++ Code Weaknesses on Stack Overflow. 2359-2375 - Yuan Huang
, Jinyu Jiang, Xiapu Luo
, Xiangping Chen
, Zibin Zheng
, Nan Jia, Gang Huang
:
Change-Patterns Mapping: A Boosting Way for Change Impact Analysis. 2376-2398 - Han Wang
, Chunyang Chen
, Zhenchang Xing
, John Grundy
:
DiffTech: Differencing Similar Technologies From Crowd-Scale Comparison Discussions. 2399-2416 - Phuong T. Nguyen
, Juri Di Rocco
, Claudio Di Sipio
, Davide Di Ruscio
, Massimiliano Di Penta
:
Recommending API Function Calls and Code Snippets to Support Software Development. 2417-2438 - Joshua Garcia
, Ehsan Kouroshfar, Negar Ghorbani
, Sam Malek:
Forecasting Architectural Decay From Evolutionary History. 2439-2454 - Mohamed El-Attar
:
Empirically Evaluating the Effect of the Physics of Notations on Model Construction. 2455-2475 - Zhenhao Li
, Tse-Hsun Chen
, Jinqiu Yang, Weiyi Shang:
Studying Duplicate Logging Statements and Their Relationships With Code Clones. 2476-2494 - Emerson R. Murphy-Hill
, Jillian Dicker, Margaret Morrow Hodges, Carolyn D. Egelman
, Ciera Jaspan
, Lan Cheng, Elizabeth Kammer, Ben Holtz, Matthew A. Jorde, Andrea Knight Dolan, Collin Green
:
Engineering Impacts of Anonymous Author Code Review: A Field Experiment. 2495-2509 - Kewen Peng
, Tim Menzies
:
Defect Reduction Planning (Using TimeLIME). 2510-2525 - Xiao Ling
, Rishabh Agrawal
, Tim Menzies
:
How Different is Test Case Prioritization for Open and Closed Source Projects? 2526-2540 - Xiaoxue Wu
, Wei Zheng
, Xin Xia
, David Lo
:
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction. 2541-2556 - Mikolaj Fejzer
, Jakub Narebski
, Piotr Przymus
, Krzysztof Stencel
:
Tracking Buggy Files: New Efficient Adaptive Bug Localization Algorithm. 2557-2569 - Omar Elazhary, Colin M. Werner
, Ze Shi Li
, Derek Lowlind
, Neil A. Ernst
, Margaret-Anne D. Storey
:
Uncovering the Benefits and Challenges of Continuous Integration Practices. 2570-2583 - Valentín Valero
, Gregorio Díaz
, Juan Boubeta-Puig
, Hermenegilda Macià
, Enrique Brazález
:
A Compositional Approach for Complex Event Pattern Modeling and Transformation to Colored Petri Nets with Black Sequencing Transitions. 2584-2605 - Chang Rao
, Nan Li
, Yu Lei
, Jin Guo, Yadong Zhang, Raghu N. Kacker
, D. Richard Kuhn
:
Combinatorial Test Generation for Multiple Input Models With Shared Parameters. 2606-2628 - Colin M. Werner
, Ze Shi Li
, Derek Lowlind
, Omar Elazhary
, Neil A. Ernst
, Daniela E. Damian
:
Continuously Managing NFRs: Opportunities and Challenges in Practice. 2629-2642 - Francesco Mercaldo
, Antonella Santone
:
Formal Equivalence Checking for Mobile Malware Detection and Family Classification. 2643-2657 - Maria Kechagia
, Sergey Mechtaev, Federica Sarro
, Mark Harman:
Evaluating Automatic Program Repair Capabilities to Repair API Misuses. 2658-2679 - Boqin Qin
, Tengfei Tu, Ziheng Liu
, Tingting Yu
, Linhai Song
:
Algorithmic Profiling for Real-World Complexity Problems. 2680-2694
Volume 48, Number 8, August 2022
- Md Atique Reza Chowdhury, Rabe Abdalkareem
, Emad Shihab, Bram Adams
:
On the Untriviality of Trivial Packages: An Empirical Study of npm JavaScript Packages. 2695-2708 - Henry Edison
, Xiaofeng Wang, Kieran Conboy
:
Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review. 2709-2731 - Maryam Bagheri
, Marjan Sirjani
, Ehsan Khamespanah, Christel Baier
, Ali Movaghar
:
Magnifier: A Compositional Analysis Approach for Autonomous Traffic Control. 2732-2747 - Kundi Yao
, Mohammed Sayagh
, Weiyi Shang, Ahmed E. Hassan:
Improving State-of-the-Art Compression Techniques for Log Management Tools. 2748-2760 - Hong Jin Kang
, David Lo
:
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. 2761-2783 - Mohammad Javad Beheshtian
, Amir Hossein Bavand, Peter C. Rigby
:
Software Batch Testing to Save Build Test Resources and to Reduce Feedback Time. 2784-2801 - Barbara A. Kitchenham
, Lech Madeyski
, Giuseppe Scanniello
, Carmine Gravino
:
The Importance of the Correlation in Crossover Experiments. 2802-2813 - Dilini Rajapaksha
, Chakkrit Tantithamthavorn
, Jirayus Jiarpakdee
, Christoph Bergmeir
, John Grundy
, Wray L. Buntine
:
SQAPlanner: Generating Data-Informed Software Quality Improvement Plans. 2814-2835 - Mojtaba Bagherzadeh
, Nafiseh Kahani, Lionel C. Briand
:
Reinforcement Learning for Test Case Prioritization. 2836-2856 - Mahdi Fahmideh
, Aakash Ahmad
, Ali Behnaz, John Grundy
, Willy Susilo
:
Software Engineering for Internet of Things: The Practitioners' Perspective. 2857-2878 - Max Hort, Maria Kechagia
, Federica Sarro
, Mark Harman:
A Survey of Performance Optimization for Mobile Applications. 2879-2904 - An Ran Chen
, Tse-Hsun Chen
, Shaowei Wang
:
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs. 2905-2919 - He Ye
, Jian Gu, Matias Martinez
, Thomas Durieux
, Martin Monperrus
:
Automated Classification of Overfitting Patches With Statically Extracted Code Features. 2920-2938 - Amritanshu Agrawal
, Xueqi Yang, Rishabh Agrawal
, Rahul Yedida
, Xipeng Shen
, Tim Menzies
:
Simpler Hyperparameter Optimization for Software Analytics: Why, How, When? 2939-2954 - Reza Nadri
, Gema Rodríguez-Pérez
, Meiyappan Nagappan
:
On the Relationship Between the Developer's Perceptible Race and Ethnicity and the Evaluation of Contributions in OSS. 2955-2968 - Dayi Lin
, Chakkrit Tantithamthavorn
, Ahmed E. Hassan:
The Impact of Data Merging on the Interpretation of Cross-Project Just-In-Time Defect Models. 2969-2986 - Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao:
Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation. 2987-3009 - Darryl Jarman
, Jeffrey Berry, Riley Smith, Ferdian Thung
, David Lo
:
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe. 3010-3024 - Cuiyun Gao
, Jichuan Zeng
, Zhiyuan Wen, David Lo
, Xin Xia, Irwin King
, Michael R. Lyu:
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing. 3025-3043 - Yutian Tang
, Haoyu Wang, Xian Zhan
, Xiapu Luo
, Yajin Zhou
, Hao Zhou, Qiben Yan
, Yulei Sui, Jacky Keung
:
A Systematical Study on Application Performance Management Libraries for Apps. 3044-3065 - Ting Chen
, Zihao Li
, Xiapu Luo
, Xiaofeng Wang, Ting Wang
, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li
, Yan Cheng, Xiaosong Zhang
:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. 3066-3086 - Ahmad Abdellatif
, Khaled Badran, Diego Elias Costa
, Emad Shihab
:
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering. 3087-3102 - Rahul Yedida
, Tim Menzies
:
On the Value of Oversampling for Deep Learning in Software Defect Prediction. 3103-3116 - Wilson Rosa
, Bradford K. Clark, Raymond J. Madachy, Barry W. Boehm:
Empirical Effort and Schedule Estimation Models for Agile Processes in the US DoD. 3117-3130 - Junjie Wang
, Ye Yang, Song Wang
, Chunyang Chen
, Dandan Wang
, Qing Wang
:
Context-Aware Personalized Crowdtesting Task Recommendation. 3131-3144 - Faizan Khan
, Boqi Chen
, Dániel Varró
, Shane McIntosh
:
An Empirical Study of Type-Related Defects in Python Projects. 3145-3158 - Wolfgang Mauerer
, Mitchell Joblin, Damian A. Tamburri
, Carlos V. Paradis, Rick Kazman
, Sven Apel
:
In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study. 3159-3184 - Vali Tawosi
, Federica Sarro
, Alessio Petrozziello, Mark Harman:
Multi-Objective Software Effort Estimation: A Replication Study. 3185-3205
Volume 48, Number 9, September 2022
- Arnaud Blouin
, Jean-Marc Jézéquel
:
Interacto: A Modern User Interaction Processing Model. 3206-3226 - Jiakun Liu
, Xin Xia
, David Lo
, Haoxiang Zhang
, Ying Zou, Ahmed E. Hassan, Shanping Li:
Broken External Links on Stack Overflow. 3242-3267 - Mathieu Nassif
, Alexa Hernandez
, Ashvitha Sridharan
, Martin P. Robillard
:
Generating Unit Tests for Documentation. 3268-3279 - Saikat Chakraborty
, Rahul Krishna
, Yangruibo Ding
, Baishakhi Ray
:
Deep Learning Based Vulnerability Detection: Are We There Yet? 3280-3296 - Christophe Rezk
, Yasutaka Kamei
, Shane McIntosh
:
The Ghost Commit Problem When Identifying Fix-Inducing Changes: An Empirical Study of Apache Projects. 3297-3309 - Xavier Franch
, Martin Glinz
, Daniel Méndez
, Norbert Seyff
:
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry. 3310-3325 - Daniela Girardi
, Filippo Lanubile
, Nicole Novielli
, Alexander Serebrenik
:
Emotions and Perceived Productivity of Software Developers at the Workplace. 3326-3341 - Paulo Anselmo da Mota Silveira Neto
, Umme Ayda Mannan
, Eduardo Santana de Almeida
, Nachiappan Nagappan, David Lo
, Pavneet Singh Kochhar, Cuiyun Gao
, Iftekhar Ahmed
:
A Deep Dive into the Impact of COVID-19 on Software Development. 3342-3360 - Yong Shi, Mingzhi Wen, Filipe Roseiro Côgo, Boyuan Chen
, Zhen Ming Jiang
:
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems. 3361-3377 - Jorge Pérez
, Ángel González-Prieto, Jessica Díaz
, Daniel López-Fernández
, Javier García Martín, Agustín Yagüe
:
DevOps Research-Based Teaching Using Qualitative Research and Inter-Coder Agreement. 3378-3393 - Gede Artha Azriadi Prana
, Denae Ford
, Ayushi Rastogi
, David Lo
, Rahul Purandare
, Nachiappan Nagappan:
Including Everyone, Everywhere: Understanding Opportunities and Challenges of Geographic Gender-Inclusion in OSS. 3394-3409 - Maxime Lamothe
, Heng Li
, Weiyi Shang:
Assisting Example-Based API Misuse Detection via Complementary Artificial Examples. 3410-3422 - Bowen Xu
, Thong Hoang, Abhishek Sharma, Chengran Yang
, Xin Xia, David Lo
:
Post2Vec: Learning Distributed Representations of Stack Overflow Posts. 3423-3441 - Sami Ullah
, Heekuck Oh
:
BinDiffNN: Learning Distributed Representation of Assembly for Robust Binary Diffing Against Semantic Differences. 3442-3466 - Peter Leo Gorski
, Sebastian Möller
, Stephan Wiefling
, Luigi Lo Iacono
:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. 3467-3484 - Aatira Anum Ahmad
, Abdul Rafae Noor
, Hashim Sharif
, Usama Hameed, Shoaib Asif, Mubashir Anwar
, Ashish Gehani
, Fareed Zaffar, Junaid Haroon Siddiqui
:
Trimmer: An Automated System for Configuration-Based Software Debloating. 3485-3505 - Christian D. Newman
, Michael John Decker
, Reem S. Alsuhaibani
, Anthony Peruma
, Mohamed Wiem Mkaouer
, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy J. Sheldon, Emily Hill:
An Ensemble Approach for Annotating Source Code Identifiers With Part-of-Speech Tags. 3506-3522 - Marco Kuhrmann
, Paolo Tell
, Regina Hebig
, Jil Klünder
, Jürgen Münch
, Oliver Linssen, Dietmar Pfahl
, Michael Felderer
, Christian R. Prause
, Stephen G. MacDonell
, Joyce Nakatumba-Nabende
, David Raffo, Sarah Beecham, Eray Tüzün
, Gustavo López
, Nicolás Paez
, Diego Fontdevila
, Sherlock A. Licorish
, Steffen Küpper, Günther Ruhe, Eric Knauss
, Özden Özcan-Top, Paul M. Clarke
, Fergal McCaffery, Marcela Genero, Aurora Vizcaíno
, Mario Piattini
, Marcos Kalinowski
, Tayana Conte, Rafael Prikladnicki
, Stephan Krusche
, Ahmet Coskunçay
, Ezequiel Scott
, Fabio Calefato
, Svetlana Pimonova, Rolf-Helge Pfeiffer, Ulrik Pagh Schultz
, Rogardt Heldal, Masud Fazal-Baqaie
, Craig Anslow
, Maleknaz Nayebi
, Kurt Schneider, Stefan Sauer, Dietmar Winkler
, Stefan Biffl
, María Cecilia Bastarrica
, Ita Richardson
:
What Makes Agile Software Development Agile? 3523-3539 - Héctor D. Menéndez, David Clark
:
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection. 3540-3553 - Claudio Mandrioli
, Martina Maggio
:
Testing Self-Adaptive Software With Probabilistic Guarantees on Performance Metrics: Extended and Comparative Results. 3554-3572 - Elvan Kula
, Eric Greuter, Arie van Deursen
, Georgios Gousios
:
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development. 3573-3592 - Peixin Zhang
, Jingyi Wang
, Jun Sun, Xinyu Wang
, Guoliang Dong, Xingen Wang
, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling. 3593-3612 - Andreas Dann
, Henrik Plate
, Ben Hermann
, Serena Elisa Ponta
, Eric Bodden
:
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite. 3613-3625 - Zainab Masood
, Rashina Hoda
, Kelly Blincoe
:
What Drives and Sustains Self-Assignment in Agile Teams. 3626-3639 - Sooyoung Cha
, Seongjoon Hong
, Jiseong Bak
, Jingyoung Kim
, Junhee Lee, Hakjoo Oh
:
Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics. 3640-3663 - Khouloud Gaaloul
, Claudio Menghi
, Shiva Nejati
, Lionel C. Briand
, Yago Isasi Parache:
Combining Genetic Programming and Model Checking to Generate Environment Assumptions. 3664-3685 - Lu Xiao
, Yuanfang Cai
, Rick Kazman
, Ran Mo
, Qiong Feng:
Detecting the Locations and Predicting the Maintenance Costs of Compound Architectural Debts. 3686-3715 - Steven Locke
, Heng Li
, Tse-Hsun Peter Chen
, Weiyi Shang, Wei Liu
:
LogAssist: Assisting Log Analysis Through Log Summarization. 3227-3241
Volume 48, Number 10, October 2022
- Daniel López-Fernández
, Jessica Díaz
, Javier Garcia
, Jorge Pérez
, Ángel González-Prieto
:
DevOps Team Structures: Characterization and Implications. 3716-3736 - Kashumi Madampe
, Rashina Hoda
, John C. Grundy
:
A Faceted Taxonomy of Requirements Changes in Agile Contexts. 3737-3752 - Chaima Abid, Dhia Elhaq Rzig
, Thiago do Nascimento Ferreira
, Marouane Kessentini
, Tushar Sharma
:
X-SBR: On the Use of the History of Refactorings for Explainable Search-Based Refactoring and Intelligent Change Operators. 3753-3770 - Nikita Mehrotra
, Navdha Agarwal
, Piyush Gupta
, Saket Anand
, David Lo
, Rahul Purandare
:
Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks. 3771-3789 - Abbas Javan Jafari
, Diego Elias Costa
, Rabe Abdalkareem
, Emad Shihab
, Nikolaos Tsantalis
:
Dependency Smells in JavaScript Projects. 3790-3807 - Rashina Hoda
:
Socio-Technical Grounded Theory for Software Engineering. 3808-3832 - Nada Almasri
, Bogdan Korel
, Luay Tahat
:
Verification Approach for Refactoring Transformation Rules of State-Based Models. 3833-3861 - Toufique Ahmed
, Premkumar T. Devanbu, Anand Ashok Sawant
:
Learning to Find Usages of Library Functions in Optimized Binaries. 3862-3876 - ThanhVu Nguyen
, KimHao Nguyen, Matthew B. Dwyer
:
Using Symbolic States to Infer Numerical Invariants. 3877-3899 - Goran Petrovic
, Marko Ivankovic
, Gordon Fraser, René Just
:
Practical Mutation Testing at Scale: A view from Google. 3900-3912 - Oscar Cornejo
, Fabrizio Pastore
, Lionel C. Briand
:
Mutation Analysis for Cyber-Physical Systems: Scalable Solutions and Results in the Space Domain. 3913-3939 - Bianca Trinkenreich
, Mariam Guizani
, Igor Wiese, Tayana Conte, Marco Aurélio Gerosa, Anita Sarma
, Igor Steinmacher
:
Pots of Gold at the End of the Rainbow: What is Success for Open Source Contributors? 3940-3953 - Sen Chen
, Chunyang Chen
, Lingling Fan
, Mingming Fan
, Xian Zhan
, Yang Liu
:
Accessible or Not? An Empirical Investigation of Android App Accessibility. 3954-3968 - Binny M. Samuel
, Hillol Bala
, Sherae L. Daniel, V. Ramesh:
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics. 3969-3987 - Mariam El Mezouar
, Daniel Alencar da Costa
, Daniel M. Germán, Ying Zou:
Exploring the Use of Chatrooms by Developers: An Empirical Study on Slack and Gitter. 3988-4001 - Toni Mancini
, Igor Melatti
, Enrico Tronci
:
Any-Horizon Uniform Random Sampling and Enumeration of Constrained Scenarios for Simulation-Based Formal Verification. 4002-4013 - Junbin Zhang
, Yingying Wang, Lina Qiu, Julia Rubin
:
Analyzing Android Taint Analysis Tools: FlowDroid, Amandroid, and DroidSafe. 4014-4040 - Ralph Hoch
, Christoph Luckeneder, Roman Popp, Hermann Kaindl
:
Verification of Consistency Between Process Models, Object Life Cycles, and Context-Dependent Semantic Specifications. 4041-4059 - Shouvick Mondal
, Rupesh Nasre:
${{\sf Colosseum}}$Colosseum: Regression Test Prioritization by Delta Displacement in Test Coverage. 4060-4073 - Rahul Mohanani
, Paul Ralph
, Burak Turhan
, Vladimir Mandic
:
How Templated Requirements Specifications Inhibit Creativity in Software Engineering. 4074-4086 - Alexandre Decan
, Tom Mens
, Ahmed Zerouali
, Coen De Roover
:
Back to the Past - Analysing Backporting Practices in Package Dependency Networks. 4087-4099 - Thu-Trang Nguyen
, Kien-Tuan Ngo, Son Nguyen, Hieu Dinh Vo
:
A Variability Fault Localization Approach for Software Product Lines. 4100-4118 - Xintao Niu
, Huayao Wu
, Changhai Nie, Yu Lei
, Xiaoyin Wang
:
A Theory of Pending Schemas in Combinatorial Testing. 4119-4151 - Simon Eismann
, Joel Scheuner
, Erwin Van Eyk
, Maximilian Schwinger, Johannes Grohmann
, Nikolas Herbst
, Cristina L. Abad
, Alexandru Iosup
:
The State of Serverless Applications: Collection, Characterization, and Community Consensus. 4152-4166 - Jianmin Guo
, Quan Zhang, Yue Zhao, Heyuan Shi
, Yu Jiang
, Jia-Guang Sun:
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems. 4167-4180 - Xian Zhan
, Tianming Liu, Lingling Fan
, Li Li
, Sen Chen
, Xiapu Luo
, Yang Liu
:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. 4181-4213 - Tao Xiao
, Dong Wang
, Shane McIntosh
, Hideaki Hata
, Raula Gaikovina Kula
, Takashi Ishio
, Kenichi Matsumoto
:
Characterizing and Mitigating Self-Admitted Technical Debt in Build Systems. 4214-4228
Volume 48, Number 11, November 2022
- Claudia P. Ayala
, Burak Turhan
, Xavier Franch
, Natalia Juristo:
Use and Misuse of the Term "Experiment" in Mining Software Repositories Research. 4229-4248 - Xian Zhan
, Tianming Liu
, Yepang Liu
, Yang Liu
, Li Li
, Haoyu Wang, Xiapu Luo
:
A Systematic Assessment on Android Third-Party Library Detection Tools. 4249-4273 - Hugo Martin
, Mathieu Acher
, Juliana Alves Pereira
, Luc Lesoil
, Jean-Marc Jézéquel
, Djamel Eddine Khelladi:
Transfer Learning Across Variants and Versions: The Case of Linux Kernel Size. 4274-4290 - Niclas Kannengießer
, Sebastian Lins
, Christian Sander, Klaus Winter
, Hellmuth Frey, Ali Sunyaev
:
Challenges and Common Solutions in Smart Contract Development. 4291-4318 - Fatima Sabir
, Yann-Gaël Guéhéneuc
, Francis Palma
, Naouel Moha, Ghulam Rasool
, Hassan Akhtar:
A Mixed-Method Approach to Recommend Corrections and Correct REST Antipatterns. 4319-4338 - Ana Neri
, Rui Soares Barbosa
, José N. Oliveira
:
Compiling Quantamorphisms for the IBM Q Experience. 4339-4356 - Xinqiang Xie
, Xiaochun Yang
, Bin Wang
, Qiang He
:
DevRec: Multi-Relationship Embedded Software Developer Recommendation. 4357-4379 - Fuchen Ma
, Zhenyang Xu
, Meng Ren, Zijing Yin
, Yuanliang Chen, Lei Qiao, Bin Gu
, Huizhong Li, Yu Jiang
, Jia-Guang Sun:
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. 4380-4396 - John Spray, Roopak Sinha
, Arnab Sen
, Xingbin Cheng:
Building Maintainable Software Using Abstraction Layering. 4397-4410 - Yixuan Tang
, He Jiang
, Zhide Zhou
, Xiaochen Li
, Zhilei Ren, Weiqiang Kong:
Detecting Compiler Warning Defects Via Diversity-Guided Program Mutation. 4411-4432 - Renana Arizon-Peretz
, Irit Hadar
, Gil Luria
:
The Importance of Security Is in the Eye of the Beholder: Cultural, Organizational, and Personal Factors Affecting the Implementation of Security by Design. 4433-4446 - Ali Ebnenasir
:
Verification and Synthesis of Responsive Symmetric Uni-Rings. 4447-4464 - Rui Li
, Wenrui Diao
, Zhou Li
, Shishuai Yang, Shuang Li, Shanqing Guo
:
Android Custom Permissions Demystified: A Comprehensive Security Evaluation. 4465-4484 - Mingwei Liu
, Xin Peng
, Andrian Marcus
, Shuangshuang Xing, Christoph Treude
, Chengyuan Zhao
:
API-Related Developer Information Needs in Stack Overflow. 4485-4500 - Yutian Tang
, Hao Zhou, Xiapu Luo
, Ting Chen
, Haoyu Wang, Zhou Xu
, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. 4501-4520 - Matias Martinez
, Bruno Gois Mateus:
Why Did Developers Migrate Android Applications From Java to Kotlin? 4521-4534 - Afsoon Afzal
, Claire Le Goues
, Christopher Steven Timperley
:
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems. 4535-4552 - Francisca Pérez
, Jaime Font
, Lorena Arcega
, Carlos Cetina
:
Empowering the Human as the Fitness Function in Search-Based Model-Driven Engineering. 4553-4568 - Binfa Gui, Wei Song
, Hailong Xiong
, Jeff Huang:
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone? 4569-4589 - Georg Seibt
, Florian Heck, Guilherme Cavalcanti, Paulo Borba
, Sven Apel
:
Leveraging Structure in Software Merge: An Empirical Study. 4590-4610 - Hai Jin
, Zeli Wang
, Ming Wen
, Weiqi Dai
, Yu Zhu, Deqing Zou
:
Aroc: An Automatic Repair Framework for On-Chain Smart Contracts. 4611-4629 - Pengcheng Zhang
, Bin Ren, Hai Dong
, Qiyin Dai:
CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing for Image-Based Deep Learning Systems. 4630-4646 - Orlando Amaral
, Sallam Abualhaija
, Damiano Torre
, Mehrdad Sabetzadeh, Lionel C. Briand
:
AI-Enabled Automation for Completeness Checking of Privacy Policies. 4647-4674 - Alessio Ferrari
, Franco Mazzanti
, Davide Basile
, Maurice H. ter Beek
:
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design. 4675-4691 - Samuel Benton
, Xia Li, Yiling Lou
, Lingming Zhang:
Evaluating and Improving Unified Debugging. 4692-4716
Volume 48, Number 12, December 2022
- Nikhil Parasaram, Earl T. Barr
, Sergey Mechtaev
:
Trident: Controlling Side Effects in Automated Program Repair. 4717-4732 - Haipeng Cai
, Xiaoqin Fu:
D$^2$2Abs: A Framework for Dynamic Dependence Analysis of Distributed Programs. 4733-4761 - Laura Carnevali
, Reinhard German, Francesco Santoni, Enrico Vicario
:
Compositional Analysis of Hierarchical UML Statecharts. 4762-4788 - Stefan Wagner
, Marvin Wyrich
:
Code Comprehension Confounders: A Study of Intelligence and Personality. 4789-4801 - José Ignacio Panach
, Oscar Pastor
, Natalia Juristo
:
A Family of Experiments to Compare Two Model-Driven Development Tools vs a Traditional Development Method. 4802-4817 - Matteo Ciniselli
, Nathan Cooper
, Luca Pascarella
, Antonio Mastropaolo
, Emad Aghajani
, Denys Poshyvanyk
, Massimiliano Di Penta
, Gabriele Bavota
:
An Empirical Study on the Usage of Transformer Models for Code Completion. 4818-4837 - Adam Alami
, Raúl Pardo, Marisa Leavitt Cohn, Andrzej Wasowski
:
Pull Request Governance in Open Source Communities. 4838-4856 - Foozhan Ataiefard
, Mohammad Jafar Mashhadi, Hadi Hemmati, Neil Walkinshaw
:
Deep State Inference: Toward Behavioral Model Inference of Black-Box Software Systems. 4857-4872 - Islem Saidani
, Ali Ouni
, Mohamed Wiem Mkaouer
:
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search. 4873-4891 - Dimitrios Tsoukalas
, Nikolaos Mittas
, Alexander Chatzigeorgiou, Dionisis D. Kehagias
, Apostolos Ampatzoglou
, Theodoros Amanatidis, Lefteris Angelis
:
Machine Learning for Technical Debt Identification. 4892-4906 - Heng Li
, Haoxiang Zhang
, Shaowei Wang
, Ahmed E. Hassan:
Studying the Practices of Logging Exception Stack Traces in Open-Source Software Projects. 4907-4924 - Maurício Aniche
, Christoph Treude
, Andy Zaidman
:
How Developers Engineer Test Cases: An Observational Study. 4925-4946 - Yao Lu
, Xinjun Mao
, Minghui Zhou
, Yang Zhang
, Zude Li, Tao Wang, Gang Yin, Huaimin Wang:
Motivation Under Gamification: An Empirical Study of Developers' Motivations and Contributions in Stack Overflow. 4947-4963 - Gustavo Vale
, Claus Hunsen, Eduardo Figueiredo, Sven Apel
:
Challenges of Resolving Merge Conflicts: A Mining and Survey Study. 4964-4985 - Lizhi Liao
, Jinfu Chen, Heng Li
, Yi Zeng, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi
:
Locating Performance Regression Root Causes in the Field Operations of Web-Based Systems: An Experience Report. 4986-5006 - Xintao Niu
, Yanjie Sun, Huayao Wu
, Gang Li, Changhai Nie, Yu Lei, Xiaoyin Wang
:
Enhance Combinatorial Testing With Metamorphic Relations. 5007-5029 - Lina Gong
, Gopi Krishnan Rajbahadur
, Ahmed E. Hassan, Shujuan Jiang
:
Revisiting the Impact of Dependency Network Metrics on Software Defect Prediction. 5030-5049 - Julian Aron Prenner
, Romain Robbes
:
Making the Most of Small Software Engineering Datasets With Modern Machine Learning. 5050-5067 - Fangcheng Qiu, Zhipeng Gao
, Xin Xia
, David Lo
, John C. Grundy
, Xinyu Wang
:
Deep Just-In-Time Defect Localization. 5068-5086 - Muhammad Hilmi Asyrofi, Zhou Yang, Imam Nur Bani Yusuf, Hong Jin Kang
, Ferdian Thung
, David Lo
:
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems. 5087-5101 - Feng Li
, Jianyi Zhou, Yinzhu Li, Dan Hao
, Lu Zhang:
AGA: An Accelerated Greedy Additional Algorithm for Test Case Prioritization. 5102-5119 - Jia-Ju Bai
, Qiu-Liang Chen, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu
:
Hybrid Static-Dynamic Analysis of Data Races Caused by Inconsistent Locking Discipline in Device Drivers. 5120-5135 - Shachi Sharma
, Parag C. Pendharkar
, Karmeshu
:
Learning Component Size Distributions for Software Cost Estimation: Models Based on Arithmetic and Shifted Geometric Means Rules. 5136-5147 - Miroslav Tushev
, Fahimeh Ebrahimi
, Anas Mahmoud
:
A Systematic Literature Review of Anti-Discrimination Design Strategies in the Digital Sharing Economy. 5148-5157 - Waqar Hussain
, Mojtaba Shahin
, Rashina Hoda
, Jon Whittle
, Harsha Perera
, Arif Nurwidyantoro
, Rifat Ara Shams
, Gillian C. Oliver
:
How Can Human Values be Addressed in Agile Methods? A Case Study on SAFe. 5158-5175 - Weifeng Pan
, Ming Hua, Zijiang Yang, Tian Wang:
Comments on "Using $k$k-Core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance". 5176-5187 - Ezekiel O. Soremekun
, Sakshi Udeshi
, Sudipta Chattopadhyay
:
Astraea: Grammar-Based Fairness Testing. 5188-5211

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.