


default search action
29th SANER 2022: Honolulu, HI, USA
- IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, Honolulu, HI, USA, March 15-18, 2022. IEEE 2022, ISBN 978-1-6654-3786-8
- Peter Bludau
, Alexander Pretschner:
PR-SZZ: How pull requests can support the tracing of defects in software repositories. 1-12 - Zi Gong, Cuiyun Gao, Yasheng Wang, Wenchao Gu, Yun Peng, Zenglin Xu:
Source Code Summarization with Structural Relative Position Guided Transformer. 13-24 - Biruk Asmare Muse, Foutse Khomh, Giuliano Antoniol:
Do Developers Refactor Data Access Code? An Empirical Study. 25-35 - Nyyti Saarimäki
, Sergio Moreschini
, Francesco Lomio
, Rafael Peñaloza, Valentina Lenarduzzi:
Towards a Robust Approach to Analyze Time-Dependent Data in Software Engineering. 36-40 - Nitish Patkar
, Andrei Chis, Nataliia Stulova, Oscar Nierstrasz:
First-class artifacts as building blocks for live in-IDE documentation. 41-45 - Francesco Lomio, Zadia Codabux, Dale Birtch, Dale Hopkins, Davide Taibi:
On the Benefits of the Accelerate Metrics: An Industrial Survey at Vendasta. 46-50 - Giang Nguyen-Truong, Hong Jin Kang, David Lo
, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang:
HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits. 51-62 - Akond Rahman
, Tushar Sharma
:
Lessons from Research to Practice on Writing Better Quality Puppet Scripts. 63-67 - Shrishti Pradhan, Raveendra Kumar Medicherla, Shivani Kondewar, Ravindra Naik:
Program Transformations for Precise Analysis of Enterprise Information Systems. 68-72 - Chengran Yang, Ferdian Thung, David Lo
:
Efficient Search of Live-Coding Screencasts from Online Videos. 73-77 - Tao Chen:
Lifelong Dynamic Optimization for Self-Adaptive Systems: Fact or Fiction? 78-89 - Sara Forootani, Andrea Di Sorbo, Corrado Aaron Visaggio:
An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects. 90-100 - Xinyue Liang, Jun Ma:
A Study on Screen Logging Risks of Secure Keyboards of Android Financial Apps. 101-111 - Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. 112-122 - Pablo Valenzuela-Toledo, Alexandre Bergel:
Evolution of GitHub Action Workflows. 123-127 - Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi
, Constance Tan, Fiona Wee, Jack Phan, David Lo
:
On the Influence of Biases in Bug Localization: Evaluation and Benchmark. 128-139 - Zachary Eberhart, Collin McMillan:
Generating Clarifying Questions for Query Refinement in Source Code Search. 140-151 - Alex Serban, Joost Visser
:
Adapting Software Architectures to Machine Learning Challenges. 152-163 - Christian Birchler, Nicolas Ganz
, Sajad Khatiri, Alessio Gambi, Sebastiano Panichella
:
Cost-effective Simulation-based Test Selection in Self-driving Cars Software with SDC-Scissor. 164-168 - Romulo Nascimento, André C. Hora, Eduardo Figueiredo:
Exploring API Deprecation Evolution in JavaScript. 169-173 - Ítalo Santos, Igor Wiese, Igor Steinmacher, Anita Sarma, Marco Aurélio Gerosa:
Hits and Misses: Newcomers' ability to identify Skills needed for OSS tasks. 174-183 - Denis Sushentsev, Aleksandr Khvorov, Roman Vasiliev, Yaroslav Golubev, Timofey Bryksin:
DAPSTEP: Deep Assignee Prediction for Stack Trace Error rePresentation. 184-195 - Enrique A. da Roza, Jackson A. Prado Lima
, Rogério C. Silva, Silvia Regina Vergilio:
Machine Learning Regression Techniques for Test Case Prioritization in Continuous Integration Environment. 196-206 - Camilo Velázquez-Rodríguez
, Eleni Constantinou
, Coen De Roover
:
Uncovering Library Features from API Usage on Stack Overflow. 207-217 - Chaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta, Federica Sarro
:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand. 218-222 - Nicholas Chan, John A. Chandy
:
Extracting Vulnerabilities from GitHub Commits. 235-239 - Arthur Marques, Gail C. Murphy:
Evaluating the Use of Semantics for Identifying Task-relevant Textual Information. 240-251 - Harshavardhan Kadiyala, Alberto Misail, Julia Rubin:
Kuber: Cost-Efficient Microservice Deployment Planner. 252-262 - Hung Nguyen, Francesco Lomio
, Fabiano Pecorelli
, Valentina Lenarduzzi:
PANDORA: Continuous Mining Software Repository and Dataset Generation. 263-267 - Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. 268-272 - Camila Sarmento, Tiago Massoni, Alexander Serebrenik, Gemma Catolino, Damian A. Tamburri, Fabio Palomba:
Gender Diversity and Community Smells: A Double-Replication Study on Brazilian Software Teams. 273-283 - Aitor Arrieta, Maialen Otaegi, Liping Han
, Goiuria Sagardui, Shaukat Ali, Maite Arratibel:
Automating Test Oracle Generation in DevOps for Industrial Elevators. 284-288 - Yan Lei, Chunyan Liu, Huan Xie, Sheng Huang, Meng Yan
, Zhou Xu:
BCL-FL: A Data Augmentation Approach with Between-Class Learning for Fault Localization. 289-300 - Giovanni Viviani, Gail C. Murphy:
What really is software design? 301-308 - Yan Zhao, Enyi Tang, Haipeng Cai
, Xi Guo, Xiaoyin Wang, Na Meng:
A Lightweight Approach of Human-Like Playtest for Android Apps. 309-320 - Jack Johnson, Junayed Mahmud, Tyler Wendland, Kevin Moran, Julia Rubin, Mattia Fazzini
:
An Empirical Investigation into the Reproduction of Bug Reports for Android Apps. 321-322 - Mohammed A. Shehab
, Abdelwahab Hamou-Lhadj
, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. 333-337 - Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. 338-348 - Zishuo Ding, Heng Li, Weiyi Shang:
LoGenText: Automatically Generating Logging Texts Using Neural Machine Translation. 349-360 - Guang Yang
, Xiang Chen, Yanlin Zhou, Chi Yu:
DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. 361-372 - Rongfan Li, Bihuan Chen, Fengyi Zhang, Chao Sun, Xin Peng:
Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks. 373-384 - Chengran Yang, Bowen Xu, Junaed Younus Khan
, Gias Uddin, DongGyun Han
, Zhou Yang, David Lo
:
Aspect-Based API Review Classification: How Far Can Pre-Trained Transformer Model Go? 385-395 - Zhongyang Deng, Ling Xu, Chao Liu, Meng Yan
, Zhou Xu, Yan Lei:
Fine-grained Co-Attentive Representation Learning for Semantic Code Search. 396-407 - Zhou Yang, Jieke Shi
, Muhammad Hilmi Asyrofi, David Lo
:
Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks. 408-419 - Mubin Ul Haque
, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. 420-431 - Menghan Wu, Yang Zhang, Jiakun Liu, Shangwen Wang, Zhang Zhang, Xin Xia, Xinjun Mao:
On the Way to Microservices: Exploring Problems and Solutions from Online Q&A Community. 432-443 - Yunosuke Higashi, Katsunori Fukui, Yutaro Kashiwa, Masao Ohira:
A Preliminary Analysis of GPL-Related License Violations in Docker Images. 444-448 - Yinyuan Zhang, Yang Zhang, Xinjun Mao, Yiwen Wu, Bo Lin, Shangwen Wang:
Recommending Base Image for Docker Containers based on Deep Configuration Comprehension. 449-453 - Sergio Naranjo-Puentes, Camilo Escobar-Velásquez, Christopher Vendome, Mario Linares-Vásquez:
A Preliminary Study on Accessibility of Augmented Reality Features in Mobile Apps. 454-458 - Christoph Reile, Mohak Chadha, Valentin Hauner, Anshul Jindal, Benjamin Hofmann, Michael Gerndt:
Bunk8s: Enabling Easy Integration Testing of Microservices in Kubernetes. 459-463 - Ulf Kargén
, Ivar Härnqvist, Johannes Wilson, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri:
desync-cc: An Automatic Disassembly-Desynchronization Obfuscator. 464-468 - Anamaria Mojica-Hanke, Laura Bello-Jiménez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:
Crème de la crème. Investigating Metadata and Survivability of Top Android Apps. 469-480 - Jing Yang, Yibiao Yang
, Maolin Sun
, Ming Wen, Yuming Zhou, Hai Jin:
Isolating Compiler Optimization Faults via Differentiating Finer-grained Options. 481-491 - Sergey Titov, Yaroslav Golubev, Timofey Bryksin:
ReSplit: Improving the Structure of Jupyter Notebooks by Re-Splitting Their Cells. 492-496 - Sakutaro Sugiyama, Takashi Kobayashi, Kazumasa Shimari, Takashi Ishio
:
JISDLab: A web-based interactive literate debugging environment. 497-501 - Thanh V. Nguyen, Aashish Yadavally, Tien N. Nguyen:
Phrase2Set: Phrase-to-Set Machine Translation and Its Software Engineering Applications. 502-513 - Kevin Moran, Ali Yachnes, George Purnell, Junayed Mahmud, Michele Tufano, Carlos Bernal-Cárdenas, Denys Poshyvanyk
, Zach H'Doubler:
An Empirical Investigation into the Use of Image Captioning for Automated Software Documentation. 514-525 - Jordan Henkel, Goutham Ramakrishnan, Zi Wang, Aws Albarghouthi, Somesh Jha, Thomas W. Reps:
Semantic Robustness of Models of Source Code. 526-537 - Lívia Barbosa, André C. Hora:
How and Why Developers Migrate Python Tests. 538-548 - Pablo Valle, Aitor Arrieta:
Towards the Isolation of Failure-Inducing Inputs in Cyber-Physical Systems: is Delta Debugging Enough? 549-553 - Jing Kai Siow, Shangqing Liu, Xiaofei Xie
, Guozhu Meng, Yang Liu
:
Learning Program Semantics with Code Representations: An Empirical Study. 554-565 - Ning Ge, Ze Wang, Li Zhang, Jiuang Zhao, Yufei Zhou, Zewei Liu:
ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code. 566-576 - Ke Liu, Guang Yang
, Xiang Chen, Chi Yu:
SOTitle: A Transformer-based Post Title Generation Approach for Stack Overflow. 577-588 - Shichao Wang, Yun Zhang, Liagfeng Bao, Xin Xia, Minghui Wu:
VCMatch: A Ranking-based Approach for Automatic Security Patches Localization for OSS Vulnerabilities. 589-600 - Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin:
Cross-Language Binary-Source Code Matching with Intermediate Representations. 601-612 - Chong Wang, Jingwen Jiang, Maya Daneva, Marten van Sinderen:
CoolTeD: A Web-based Collaborative Labeling Tool for the Textual Dataset. 613-617 - Behnaz Hassanshahi, Hyunjun Lee, Paddy Krishnan:
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications. 618-629 - Dezhen Kong, Qiuyuan Chen, Lingfeng Bao, Chenxing Sun, Xin Xia, Shanping Li:
Recommending Code Reviewers for Proprietary Software Projects: A Large Scale Study. 630-640 - Jingting Chen, Feng Li, Mingjie Xu, Jianhua Zhou, Wei Huo:
RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations. 641-651 - Maxime Gobert, Loup Meurice, Anthony Cleve:
HyDRa: A Framework for Modeling, Manipulating and Evolving Hybrid Polystores. 652-656 - Bharti Chimdyalwar, Anushri Jana, Shrawan Kumar, Ankita Khadsare, Vaidehi Ghime:
Identifying Relevant Changes for Incremental Verification of Evolving Software Systems. 657-661 - Mehdi Golzadeh, Alexandre Decan, Tom Mens:
On the rise and fall of CI services in GitHub. 662-672 - Michael Schlichtig
, Steffen Sassalla
, Krishna Narasimhan, Eric Bodden:
FUM - A Framework for API Usage constraint and Misuse Classification. 673-684 - Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:
DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. 685-696 - Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares-Vásquez, Gabriele Bavota
:
Detecting Connectivity Issues in Android Apps. 697-708 - Alejandra Duque-Torres, Dietmar Pfahl
, Rudolf Ramler, Claus Klammer:
A Replication Study on Predicting Metamorphic Relations at Unit Testing Level. 709-719 - Dongge Liu
, Van-Thuan Pham, Gidon Ernst
, Toby Murray, Benjamin I. P. Rubinstein
:
State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing. 720-730 - Giulia Sellitto
, Emanuele Iannone
, Zadia Codabux, Valentina Lenarduzzi, Andrea De Lucia, Fabio Palomba, Filomena Ferrucci:
Toward Understanding the Impact of Refactoring on Program Comprehension. 731-742 - Gowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, Kazi Zakia Sultana, Zadia Codabux:
Common Programming Mistakes Leading to Information Disclosure: A Preliminary Study. 743-747 - Thierry Sorg
, Amine Abbad Andaloussi
, Barbara Weber:
Towards a Fine-grained Analysis of Cognitive Load During Program Comprehension. 748-752 - Daniel Coutinho
, Anderson G. Uchôa
, Caio Barbosa, Vinícius Soares, Alessandro F. Garcia, Marcelo Schots, Juliana Alves Pereira, Wesley K. G. Assunção
:
On the Influential Interactive Factors on Degrees of Design Decay: A Multi-Project Study. 753-764 - Junaed Younus Khan
, Gias Uddin:
Automatic Detection and Analysis of Technical Debts in Peer-Review Documentation of R Packages. 765-776 - Ming Ye, Jicheng Cao, Shengyu Cheng:
Rebot: An Automatic Multi-modal Requirements Review Bot. 777-781 - Aidan Connor, Aaron Harris, Nathan Cooper, Denys Poshyvanyk
:
Can We Automatically Fix Bugs by Learning Edit Operations? 782-792 - Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Zexuan Li:
How Do Injected Bugs Affect Deep Learning? 793-804 - Martin Odermatt, Diego Marcilio, Carlo A. Furia:
Static Analysis Warnings and Automatic Fixing: A Replication for C# Projects. 805-816 - Riccardo Rubei, Claudio Di Sipio, Juri Di Rocco, Davide Di Ruscio
, Phuong T. Nguyen
:
Endowing third-party libraries recommender systems with explicit user feedback mechanisms. 817-821 - Michael Moser, Josef Pichler, Andreas Pointner
:
Towards Attribute Grammar Mining by Symbolic Execution. 822-826 - Vali Tawosi, Afnan A. Al-Subaihin, Federica Sarro
:
Investigating the Effectiveness of Clustering for Story Point Estimation. 827-838 - William Ravelo-Méndez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:
Kraken 2.0: A platform-agnostic and cross-device interaction testing tool. 839-843 - Qiang Xu, James C. Davis, Y. Charlie Hu, Abhilash Jindal:
An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage. 844-855 - Xin Zhang, Rongjie Yan, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang:
ExcePy: A Python Benchmark for Bugs with Python Built-in Types. 856-866 - John Businge, Ahmed Zerouali, Alexandre Decan, Tom Mens, Serge Demeyer, Coen De Roover
:
Variant Forks - Motivations and Impediments. 867-877 - Richárd Szalay
, Zoltán Porkoláb
:
Flexible semi-automatic support for type migration of primitives for C/C++ programs. 878-889 - Safwat Hassan, Heng Li, Ahmed E. Hassan:
On the Importance of Performing App Analysis Within Peer Groups. 890-901 - Déaglán Connolly Bree
, Mel Ó Cinnéide:
Removing Decorator to Improve Energy Efficiency. 902-912 - Kawser Wazed Nafi, Muhammad Asaduzzaman, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:
Mining Software Information Sites to Recommend Cross-Language Analogical Libraries. 913-924 - Wilson Baker, Michael O'Connor, Seyed Reza Shahamiri
, Valerio Terragni:
Detect, Fix, and Verify TensorFlow API Misuses. 925-929 - Boris Cherry, Pol Benats, Maxime Gobert, Loup Meurice, Csaba Nagy, Anthony Cleve:
Static Analysis of Database Accesses in MongoDB Applications. 930-934 - Jian Gu, Pasquale Salza
, Harald C. Gall:
Assemble Foundation Models for Automatic Code Summarization. 935-946 - Giammaria Giordano, Antonio Fasulo, Gemma Catolino, Fabio Palomba, Filomena Ferrucci, Carmine Gravino:
On the Evolution of Inheritance and Delegation Mechanisms and Their Impact on Code Quality. 947-958 - Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser
, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. 959-970 - Yu Hu, Zekun Shen, Brendan Dolan-Gavitt:
Characterizing and Improving Bug-Finders with Synthetic Bugs. 971-982 - Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Phishing Kits Source Code Similarity Distribution: A Case Study. 983-994 - Rui Xi, Karthik Pattabiraman:
When They Go Low: Automated Replacement of Low-level Functions in Ethereum Smart Contracts. 995-1005 - Mark Santolucito, Jialu Zhang, Ennan Zhai, Jürgen Cito, Ruzica Piskac:
Learning CI Configuration Correctness for Early Build Feedback. 1006-1017 - Rolf-Helge Pfeiffer:
Searching for Technical Debt - An Empirical, Exploratory, and Descriptive Case Study. 1018-1022 - Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen:
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model. 1023-1033 - Yang Hong, Chakkrit Kla Tantithamthavorn, Patanamon Thongtanunam:
Where Should I Look at? Recommending Lines that Reviewers Should Pay Attention To. 1034-1045 - Chaochen Shi, Yong Xiang, Jiangshan Yu
, Longxiang Gao, Keshav Sood
, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. 1046-1054 - Hiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Web Element Identification by Combining NLP and Heuristic Search for Web Testing. 1055-1065 - Mubin Ul Haque
, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. 1066-1077 - Dun Jin, Peiyu Liu, Zhenfang Zhu:
Automatically Generating Code Comment Using Heterogeneous Graph Neural Networks. 1078-1088 - Xiaoning Zhu, Chaofeng Sha, Junyu Niu:
A Simple Retrieval-based Method for Code Comment Generation. 1089-1100 - Zhiheng Qu, Yi Hu, Jianhui Zeng, Bo Cai
, Shun Yang:
Method Name Generation Based on Code Structure Guidance. 1101-1110 - Shogo Tokui, Susumu Tokumoto, Akihito Yoshii, Fuyuki Ishikawa, Takao Nakagawa, Kazuki Munakata, Shinji Kikuchi:
NeuRecover: Regression-Controlled Repair of Deep Neural Networks with Training History. 1111-1121 - Abhishek Sharma, Gede Artha Azriadi Prana, Anamika Sawhney, Nachiappan Nagappan, David Lo
:
Analyzing Offline Social Engagements: An Empirical Study of Meetup Events Related to Software Development. 1122-1133 - Jieke Shi
, Zhou Yang, Junda He, Bowen Xu, David Lo
:
Can Identifier Splitting Improve Open-Vocabulary Language Model of Code? 1134-1138 - Yoshitomo Sha, Masataka Nagura, Shingo Takada:
Fault Localization in Server-Side Applications Using Spectrum-Based Fault Localization. 1139-1146 - Alejandra Duque-Torres, Dietmar Pfahl
, Claus Klammer, Stefan Fischer:
Using Source Code Metrics for Predicting Metamorphic Relations at Method Level. 1147-1154 - Stefan Fischer, Denise Rigoni, Nikola Obrenovic:
iTest: Using coverage measurements to improve test efficiency. 1155-1158 - Adwait Chandorkar, Nitish Patkar
, Andrea Di Sorbo, Oscar Nierstrasz:
An Exploratory Study on the Usage of Gherkin Features in Open-Source Projects. 1159-1166 - Dietmar Winkler, Pirmin Urbanke, Rudolf Ramler:
What Do We Know About Readability of Test Code? - A Systematic Mapping Study. 1167-1174 - Serge Demeyer, Mehrdad Abdi, Ebert Schoofs:
Type Profiling to the Rescue: Test Amplification in Python and Smalltalk. 1175-1178 - Janneke Morin, Krishnendu Ghosh:
ProPy: Prolog-based Fault Localization Tool for Python. 1179-1182 - Matthew A. Puentes, Yunsen Lei, Noëlle Rakotondravony, Lane T. Harrison, Craig A. Shue:
Visualizing Web Application Execution Logs to Improve Software Security Defect Localization. 1183-1190 - Henrique Rocha, John Businge:
Blockchain-Oriented Software Variant Forks: A Preliminary Study. 1191-1196 - Giuseppe Antonio Pierro, Andy Amoordon:
A Tool to check the Ownership of Solana's Smart Contracts. 1197-1202 - Jihyeon Kim, Dae-hyeon Jeong, Jisoo Kim, Eun-Sun Cho:
Stone: A Privacy Policy Enforcement System for Smart Contracts. 1203-1206 - Andrea Pinna
, Roberto Tonelli:
On the use of Petri Nets in Smart Contracts modeling, generation and verification. 1207-1211 - Giacomo Ibba, Marco Ortu:
Analysis Of The Relationship Between Smart Contracts' Categories and Vulnerabilities. 1212-1218 - Giuseppe Antonio Pierro, Roberto Tonelli:
Can Solana be the Solution to the Blockchain Scalability Problem? 1219-1226 - Konstantinos Tsiounis, Kostas Kontogiannis:
Goal and Policy Based Code Generation and Deployment of Smart Contracts. 1227-1230 - Raimondo Cossu, Maria Ilaria Lunesu, Marco Uras, Alessandro Floris
:
A Blockchain-based Data Notarization System for Smart Mobility Services. 1231-1238 - Junjie Luo, Pengzhan Zhao
, Zhongtao Miao, Shuhan Lan, Jianjun Zhao:
A Comprehensive Study of Bug Fixes in Quantum Programs. 1239-1246 - Wolfgang Mauerer, Stefanie Scherzinger:
1-2-3 Reproducibility for Quantum Software Experiments. 1247-1248 - Thomas Gabor, Marian Lingsch Rosenfeld, Claudia Linnhoff-Popien, Sebastian Feld
:
How to Approximate any Objective Function via Quadratic Unconstrained Binary Optimization. 1249-1257 - Marie Salm, Johanna Barzen, Frank Leymann, Benjamin Weder
:
Prioritization of Compiled Quantum Circuits for Different Quantum Computers. 1258-1265 - Lynn von Kurnatowski, Annika Meinecke, Adriana Rieger
:
Towards using focus groups to identify software developer's interests regarding their development process. 1266-1269 - Sristy Sumana Nath, Banani Roy:
Exploring Relevant Artifacts of Release Notes: The Practitioners' Perspective. 1270-1277 - Lisa Grabinger
, Florian Hauser, Jürgen Mottok:
Accessing the Presentation of Causal Graphs and an Application of Gestalt Principles with Eye Tracking. 1278-1285 - Bonita Sharif
, Niloofar Mansoor:
Humans in Empirical Software Engineering Studies: An Experience Report. 1286-1292 - Sergio Moreschini
, Francesco Lomio
, David Hästbacka, Davide Taibi
:
MLOps for evolvable AI intensive software systems. 1293-1294 - Xiaozhou Li, Sergio Moreschini
, Aleksandra Filatova, Davide Taibi
:
Knowledge Management Challenges for AI Quality. 1295-1296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.