Abstract is missing.
- Find your Open Source License Now!Georgia M. Kapitsaki, Georgia Charalambous. 1-8 [doi]
- Task Recommendation with Developer Social Network in Software CrowdsourcingNing Li, Wenkai Mo, Beijun Shen. 9-16 [doi]
- What Influences Usability Defect Reporting? - A Survey of Software Development PractitionersNor Shahida Mohamad Yusop, Jean-Guy Schneider, John C. Grundy, Rajesh Vasa. 17-24 [doi]
- EXPSOL: Recommending Online Threads for Exception-Related Bug ReportsXiaoning Liu, Beijun Shen, Hao Zhong, Jiangang Zhu. 25-32 [doi]
- Retrieving Design Pattern Usage Examples using Domain MatchingShamsa Abid, Zohaa Qamar, Natasha Khan, Muhammad Shayan, Hamid Abdul Basit. 33-40 [doi]
- LibSift: Automated Detection of Third-Party Libraries in Android ApplicationsCharlie Soh, Hee Beng Kuan Tan, Yauhen Leanidavich Arnatovich, Annamalai Narayanan, Lipo Wang. 41-48 [doi]
- Does the Role Matter? An Investigation of the Code Quality of Casual Contributors in GitHubYao Lu, XinJun Mao, Zude Li, Yang Zhang, Tao Wang, Gang Yin. 49-56 [doi]
- Does the "Project Manager" Still Exist in Agile Software Development Projects?Yogeshwar Shastri, Rashina Hoda, Robert Amor. 57-64 [doi]
- Does it Fit Me Better? User Segmentation in Requirements EngineeringMohammadhossein Sherkat, Tim Miller, Antonette Mendoza. 65-72 [doi]
- A Model Checking Based Approach for Containment Checking of UML Sequence DiagramsFaiz Ul Muram, Huy Tran, Uwe Zdun. 73-80 [doi]
- Model-Based Continuous VerificationLingling Fan, Sen Chen, Lihua Xu, Zongyuan Yang, Huibiao Zhu. 81-88 [doi]
- Model Driven Software Security Architecture of Systems-of-SystemsJamal El Hachem, Zi Yang Pang, Vanea Chiprianov, Ali Babar, Philippe Aniorté. 89-96 [doi]
- Analytical Study of Cognitive Layered Approach for Understanding Security Requirements Using Problem Domain OntologyBong-Jae Kim, Seok-Won Lee. 97-104 [doi]
- An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux KernelMatthieu Jimenez, Mike Papadakis, Yves Le Traon. 105-112 [doi]
- Projected Control Graph for Accurate and Efficient Analysis of Safety and Security VulnerabilitiesAhmed Tamrawi, Suresh Kothari. 113-120 [doi]
- Examination of Coding Violations Focusing on Their Change Patterns over ReleasesAji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara. 121-128 [doi]
- Splitting Commits via Past Code ChangesHiroyuki Kirinuki, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto. 129-136 [doi]
- An Empirical Study into the Relationship Between Class Features and Test SmellsAmjed Tahir, Steve Counsell, Stephen G. MacDonell. 137-144 [doi]
- A Model for Defining Coupling MetricsEwan D. Tempero, Paul Ralph. 145-152 [doi]
- A Map of Threats to Validity of Systematic Literature Reviews in Software EngineeringXin Zhou, Yuqin Jin, He Zhang, Shanshan Li, Xin Huang. 153-160 [doi]
- The Introduction of Technical Debt Tracking in Large CompaniesAntonio Martini, Terese Besker, Jan Bosch. 161-168 [doi]
- Heterogeneous Cross-Company Effort Estimation through Transfer LearningShensi Tong, Qing He, Yuting Chen, Ye Yang, Beijun Shen. 169-176 [doi]
- An Algorithmic-Based Change Effort Estimation Model for Software DevelopmentSufyan Basri, Nazri Kama, Haslina Md Sarkan, Saiful Adli Ismail, Faizura Haneem. 177-184 [doi]
- Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation DatasetsPassakorn Phannachitta, Jacky W. Keung, Kwabena Ebo Bennin, Akito Monden, Kenichi Matsumoto. 185-192 [doi]
- Achieving High Code Coverage in Android UI Testing via Automated Widget ExercisingYauhen Leanidavich Arnatovich, Minh Ngoc Ngo, Hee Beng Kuan Tan, Charlie Soh. 193-200 [doi]
- Testing Android Apps via Guided Gesture Event GenerationXiangyu Wu, Yanyan Jiang 0001, Chang Xu, Chun Cao, Xiaoxing Ma, Jian Lu. 201-208 [doi]
- Effectively Manifesting Concurrency Bugs in Android AppsQiwei Li, Yanyan Jiang 0001, Tianxiao Gu, Chang Xu, Jun Ma, Xiaoxing Ma, Jian Lu. 209-216 [doi]
- Model-Based API-Call Constraint Checking for Automotive Control SoftwareDongwoo Kim, Yoohee Chung, Yunja Choi. 217-224 [doi]
- An Incremental V-Model Process for Automotive DevelopmentBohan Liu, He Zhang, Saichun Zhu. 225-232 [doi]
- Minimalist Qualitative Models for Model Checking Cyber-Physical Feature CoordinationMichael Rathmair, Christoph Luckeneder, Hermann Kaindl. 233-240 [doi]
- Toward Developer-like Automated Program Repair - Modification Comparisons between GenProg and DevelopersHiroki Nakajima, Yoshiki Higo, Haruki Yokoyama, Shinji Kusumoto. 241-248 [doi]
- CURE: Automated Patch Generation for Dynamic Software UpdateZelin Zhao, Tianxiao Gu, Xiaoxing Ma, Chang Xu, Jian Lu. 249-256 [doi]
- Improving Reliability of Dynamic Software Updating Using Runtime RecoveryTianxiao Gu, Zelin Zhao, Xiaoxing Ma, Chang Xu, Chun Cao, Jian Lu. 257-264 [doi]
- The Floating-Point Extension of Symbolic Execution Engine for Bug DetectionXingming Wu, Zhenbo Xu, Dong Yan, Tianyong Wu, Jun Yan, Jian Zhang. 265-272 [doi]
- Compositional Symbolic Execution: Incremental Solving RevisitedYude Lin, Tim Miller, Harald Søndergaard. 273-280 [doi]
- Masking Soft Errors with Static Bitwise AnalysisJianjun Xu, Xiankai Meng, Qingping Tan, Jingling Xue. 281-288 [doi]
- Integrating Goal Model into Rule-Based AdaptationTianqi Zhao, Tao Zan, Haiyan Zhao, Zhenjiang Hu, Zhi Jin. 289-296 [doi]
- Dataset Coverage for Testing Machine Learning Computer ProgramsShin Nakajima, Hai Ngoc Bui. 297-304 [doi]
- Automated Test Sequence Generation for Function Block Diagram ProgramsJiyoung Song, Eunkyoung Jee, Doo-Hwan Bae. 305-312 [doi]
- Mind the Gap: Addressing Behavioural Inconsistencies with Formal MethodsJuliana Küster Filipe Bowles, Marco B. Caminati. 313-320 [doi]
- Formalization and Verification of the Powerlink Protocol Using CSPHaiping Pang, Ju Li, Yijia Ruan, Yanhong Huang, Jianqi Shi, Shengchao Qin. 321-328 [doi]
- Automated Deployment of Data Collection Policies over Heterogeneous Shared Sensing InfrastructuresCyril Cecchinel, Sébastien Mosser 0001, Philippe Collet. 329-336 [doi]
- Schemata, Acculturation, and Cognition: Expatriates in Japan's Software IndustryWilliam W. Baber, Arto Ojala. 337-340 [doi]
- A Review of Six Years of Asia-Pacific Software Engineering ConferenceLov Kumar, Saikrishna Sripada, Ashish Sureka. 341-344 [doi]
- Identifying Practitioners' Arguments and Evidence in Blogs: Insights from a Pilot StudyAshley Williams, Austen Rainer. 345-348 [doi]
- An Empirical Investigation into Code Smell Elimination Sequences for Energy Efficient SoftwareGarima Dhaka, Paramvir Singh. 349-352 [doi]
- Combatting Use Case Points' Limitations with COCOMO(R) II and Relative DifficultyAnandi Hira, Barry W. Boehm. 353-356 [doi]
- The Improvement of the Trustworthiness of Android App Stores in ChinaYao Wang, Yiying Ng, Hucheng Zhou, Yuan Dong, Zhiyuan Ji. 357-360 [doi]
- Detecting and Localizing Visual Inconsistencies in Web ApplicationsSonal Mahajan, Krupa Benhur Gadde, Anjaneyulu Pasala, William G. J. Halfond. 361-364 [doi]
- Developers Expertise and Roles on Software TechnologiesEleni Constantinou, Georgia M. Kapitsaki. 365-368 [doi]
- Adoption and Suitability of Software Development Methods and PracticesSherlock A. Licorish, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen, Rodrigo O. Spínola, Thiago Souto Mendes, Stephen G. MacDonell, Jim Buchan. 369-372 [doi]
- Predictive Tool for Software Team PerformanceTri Nguyen, Caslon Chua. 373-376 [doi]
- Our Journey to Becoming Agile: Experiences with Agile Transformation in Samsung ElectronicsSuhyun Kim, Hyungjong Lee, Yonghwi Kwon, Myeongsang Yu, Hyeeun Jo. 377-380 [doi]
- Design and Implementation of Training Course for Software Process Improvement EngineersNoriyoshi Kuno, Tsuyoshi Nakajima. 381-384 [doi]
- History-Based Test Case Prioritization for Failure InformationYounghwan Cho, Jeongho Kim, Eunseok Lee. 385-388 [doi]
- System Product Line Engineering for Small Appliances with Driver DerivationShintaro Hosoai, Natsuko Noda, Tomoji Kishi. 389-392 [doi]
- Guiding Identification of Missing Scenarios for Dynamic Feature LocationShinpei Hayashi, Hiroshi Kazato, Takashi Kobayashi, Tsuyoshi Oshima, Katsuyuki Natsukawa, Takashi Hoshino, Motoshi Saeki. 393-396 [doi]
- RE_PROV: Modeling Requirement Provenance with PROVYangfan He, Xiaojian Li. 397-400 [doi]