Journal: International Journal of Software Engineering and Knowledge Engineering

Volume 30, Issue 9

1199 -- 1219Edward Kai Fung Dang, Robert Wing Pong Luk, James Allan. Context-Dependent Feature Values in Text Categorization
1221 -- 1244Zhimin Zhou, ZhongWen Chen. Split Attention Pointer Network for Source Code Language Modeling
1245 -- 1262Quyet Thang Huynh, Le-Trinh Pham, Nhu Hang Ha, Duc Man Nguyen. An Effective Approach for Context Driven Testing in Practice - A Case Study
1263 -- 1288Yutaka Watanobe, Nikolay N. Mirenkov. Algorithmic Transparency of Large-Scale *AIDA Programs
1289 -- 1307Atish Kumar Dipongkor, Iftekhar Ahmed, Rayhanul Islam, Nadia Nahar, Abdus Satter, Md. Saeed Siddik. ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method's External Dependencies
1309 -- 1336Yonghao Long, Xiangping Chen, Fan Zhou 0001. AutoWPR: An Automatic Web Page Recoloring Method
1337 -- 1370Ali Jazayeri, Ellen J. Bass. Agent-Oriented Methodologies Evaluation Frameworks: A Review

Volume 30, Issue 8

1049 -- 1050S. K. Chang. Guest Editor's Introduction
1051 -- 1078Ghassen Ben Brahim, Wassim El-Hajj, Cynthia El-Hayek, Hazem M. Hajj. A New Semantic-based Multi-Level Classification Approach for Activity Recognition Using Smartphones
1079 -- 1096Liqing Qiu, Shuang Zhang, Chunmei Gu, Xiangbo Tian. Scalable Influence Maximization Meets Efficiency and Effectiveness in Large-Scale Social Networks
1097 -- 1118Zehao Yu. Two Improved Topic Word Detection Algorithms
1119 -- 1137Mingwan Kim, Neunghoe Kim, Hoh Peter In. Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code
1139 -- 1167Ziyuan Wang, Chunrong Fang, Lin Chen, Zhiyi Zhang. A Revisit of Metrics for Test Case Prioritization Problems
1169 -- 1198Michael Omari, Jinfu Chen, Robert French-Baidoo, Yunting Sun. A Proactive Approach to Test Case Selection - An Efficient Implementation of Adaptive Random Testing

Volume 30, Issue 7

895 -- 899Yong Qin 0002, Min An, Limin Jia 0002. Guest Editors' Introduction
901 -- 919Yinggui Zhang, Zengru Chen, Min An, Aliyu Mani Umar. An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay
921 -- 940Bowen Gao, Dongxiu Ou, Decun Dong, Yusen Wu. A Data-Driven Two-Stage Prediction Model for Train Primary-Delay Recovery Time
941 -- 959Jiahao Liu, Zhipeng Wang, Yunpeng Wu, Yong Qin 0002, Xianbin Cao 0003, Yonghui Huang. An Improved Faster R-CNN for UAV-Based Catenary Support Device Inspection
961 -- 976Zengshu Shi, Yiman Du, Tao Du, Guochao Shan. The Turnout Abnormality Diagnosis Based on Semi-Supervised Learning Method
977 -- 1004Bo Dong, Shi Ying, Lin Li, Hui Luo, Zhe Yang. Impact Analysis About Response Time Considering Deployment Change of SaaS Software
1005 -- 1048Bangchao Wang, Rong Peng, Zhuo Wang, Xiaomin Wang, Yuanbang Li. An Automated Hybrid Approach for Generating Requirements Trace Links

Volume 30, Issue 6

721 -- 0Jing Sun 0002. Guest Editor's Introduction
723 -- 763Nacha Chondamrongkul, Jing Sun 0002, Ian Warren, Scott Uk-Jin Lee. Integrated Formal Tools for Software Architecture Smell Detection
765 -- 783Qinyue Wu, Duankang Fu, Beijun Shen, Yuting Chen. Semantic Service Search in IT Crowdsourcing Platform: A Knowledge Graph-Based Approach
785 -- 803David Chaves-Fraga, Freddy Priyatna, Ahmad Alobaid, Óscar Corcho. Exploiting Declarative Mapping Rules for Generating GraphQL Servers with Morph-GraphQL
805 -- 834Ester Giallonardo, Francesco Poggi, Davide Rossi, Eugenio Zimeo. Semantics-Driven Programming of Self-Adaptive Reactive Systems
835 -- 857Shang-Pin Ma, Hsuan-Ju Lin, Ming-Jen Hsu. Semantic Restful Service Composition Using Task Specification
859 -- 893Nazmul Hussain, Hai H. Wang, Christopher D. Buckingham, Xiaoyuan Zhang. Software Agent-Centric Semantic Social Network for Cyber-Physical Interaction and Collaboration

Volume 30, Issue 5

603 -- 630Alexandre L'Erário, Hellen Christine Serodio Thomazinho, José Augusto Fabri. An Approach to Software Maintenance: A Case Study in Small and Medium-Sized Businesses IT Organizations
631 -- 647Yi-Hui Chen, Eric Jui-Lin Lu, Ya-Wen Cheng. Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis
649 -- 668Yasir Hussain, Zhiqiu Huang, Yu Zhou 0010, Senzhang Wang. Deep Transfer Learning for Source Code Modeling
669 -- 694Milena Vujosevic-Janicic. Concurrent Bug Finding Based on Bounded Model Checking
695 -- 719Bing Zhang 0011, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang. Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns

Volume 30, Issue 4

481 -- 482Jerry Gao. Guest Editor's Introduction
483 -- 501Shi-Kuo Chang, Hanzhong Zheng, Tian Yi Cui, Nannan Wen, Hao Zhai, Lu Zhang. A Computation Model for Senior Citizen Health Self-Care
503 -- 521Haitao Wang, Yanli Chen, Juan Wang, Hao Peng, Hongfang Liu. Mutual Inference Model for User Roles and Urban Functional Zones
523 -- 536Jong Hyun Park. An Intelligent Service Middleware Based on Sensors in IoT Environments
537 -- 553Ping Ping, Guoyan Xu, Effendy Kumala, Jerry Gao. Smart Street Litter Detection and Classification Based on Faster R-CNN and Edge Computing
555 -- 573Wonhong Nam, Haejin Yang, Hyunyoung Kil. Winning Strategy Tree Construction for BDD-Based ATL Model Checkers
575 -- 601Raquel Fialho de Queiroz Lafetá, Thiago Fialho de Queiroz Lafetá, Marcelo de Almeida Maia. An Automated Approach for Constructing Framework Instantiation Documentation

Volume 30, Issue 3

291 -- 320Rongcun Wang, Zhengmin Li, Shujuan Jiang, Chuanqi Tao. Regression Test Case Prioritization Based on Fixed Size Candidate Set ART Algorithm
321 -- 362Roland Robert Schreiber, Matthäus Paul Zylka. Social Network Analysis in Software Development Projects: A Systematic Literature Review
363 -- 398Imad H. Hasan, Bestoun S. Ahmed, Moayad Y. Potrus, Kamal Z. Zamli. Generation and Application of Constrained Interaction Test Suites Using Base Forbidden Tuples with a Mixed Neighborhood Tabu Search
399 -- 425Duc Man Nguyen, Quyet Thang Huynh, Nhu Hang Ha, Thanh-Hung Nguyen. Automated Test Input Generation via Model Inference Based on User Story and Acceptance Criteria for Mobile Application Development
427 -- 450Ibrahim Alper Dogru, Murat Önder. AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups
451 -- 479Ju Qian, Yan Wang, Fusheng Lin, Changjian Li, Zhiyi Zhang, Xuefeng Yan. Towards Generating Realistic and High Coverage Test Data for Constraint-Based Fault Injection

Volume 30, Issue 2

147 -- 169Jasmina Nalic, Goran Martinovic. Building a Credit Scoring Model Based on Data Mining Approaches
171 -- 189Rohayanti Hassan, Noor Atikah Amira Fauzi, Shahreen Kasim, Herman Khalid Omer. Usability Requirements Extraction Method from Software Document
191 -- 216Jihyun Lee, Sungwon Kang. Case Study Investigation of the Fault Detection and Error Locating Effects of Architecture-based Software Testing
217 -- 237Achraf Ben Miled, Rahma Dhaouadi, Romany F. Mansour. Knowledge Deduction and Reuse Application to the Products' Design Process
239 -- 262Bingming Wang, Shi Ying, Guoli Cheng, Rui Wang 0036, Zhe Yang, Bo Dong. Log-Based Anomaly Detection with the Improved K-Nearest Neighbor
263 -- 290Dan Wei, Qingying Sun, Xingqi Wang, Tianning Zhang, Bin Chen. A Model-Based Test Case Prioritization Approach Based on Fault Urgency and Severity

Volume 30, Issue 11&12

1587 -- 0Shi-Kuo Chang. Guest Editor's Introduction
1589 -- 1606Gaku Fujii, Koichi Hamada, Fuyuki Ishikawa, Satoshi Masuda, Mineo Matsuya, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita. Guidelines for Quality Assurance of Machine Learning-Based Artificial Intelligence
1607 -- 1640Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham. Analyzing the Stationarity Process in Software Effort Estimation Datasets
1641 -- 1665Jiang Wu, Jianjun Xu, Xiankai Meng, Haoyu Zhang, Zhuo Zhang 0007. Enabling Reliability-Driven Optimization Selection with Gate Graph Attention Neural Network
1667 -- 1688Zhenzhou Tian, Qing Wang 0030, Cong Gao, Lingwei Chen, Dinghao Wu. Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining
1689 -- 1705Dongjin Yu, Xinfeng Wang, Xiaoxiao Sun. Prediction of Regional Commercial Activeness and Entity Condition Based on Online Reviews
1707 -- 1733Zhang Zhang, XinJun Mao, Yao Lu 0003, Jinyu Lu, Yue Yu 0001, Zhixing Li. Automatic Voter Recommendation Method for Closing Questions in Stack Overflow
1735 -- 1757Rui Song, Tong Li, Xin Dong, Zhiming Ding. Identifying Similar Users Based on Their Check-in Data: A Graph Embedding Approach
1759 -- 1777Jialing Liang, Peiquan Jin, Lin Mu, Jie Zhao 0006. An Experimental Study of Spammer Detection on Chinese Microblogs
1779 -- 1800Zengyang Li, Peng Liang 0001, Dengwei Li, Ran Mo, Bing Li 0010. Is Bug Severity in Line with Bug Fixing Change Complexity?
1801 -- 1818Ying Shang, Yongli Li, Feng You, Ruilian Zhao. Conversion-based Approach to Obtain an SNN Construction
1819 -- 1850Hind Milhem, Michael Weiss, Stéphane S. Somé. Modeling and Selecting Frameworks in Terms of Patterns, Tactics and System Qualities
1851 -- 1865Yunpeng Zhang, Xin Liu. An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network

Volume 30, Issue 10

1371 -- 1374Iaakov Exman. Guest Editor's Introduction: Software Mathematical Models for Human Understanding
1375 -- 1413Iaakov Exman, Harel Wallach. Linear Software Models: An Occam's Razor Set of Algebraic Connectors Integrates Modules into a Whole Software System
1415 -- 1442Jose María Álvarez Rodríguez, Roy Mendieta, Valentin Moreno, Miguel Sánchez-Puebla, Juan Lloréns. Semantic Recovery of Traceability Links between System Artifacts
1443 -- 1479Juntao Gao, Yingqian Zhang. Regular Expression Learning from Positive Examples Based on Integer Programming
1481 -- 1523Kazuhiro Ogata 0001. A Generic Approach on How to Formally Specify and Model Check Path Finding Algorithms: Dijkstra, A* and LPA
1525 -- 1550Abu Saleh Md Tayeen, Thanh Hai Nguyen, Van-Duc Nguyen, Enrico Pontelli. Design and Implementation of Phylotastic, a Service Architecture for Evolutionary Biology
1551 -- 1586Jiafei Song, Zhongjie Wang, Zhiying Tu, Xiaofei Xu. Method for Predicting Mobile Service Evolution from User Reviews and Update Logs

Volume 30, Issue 1

1 -- 22Shuhan Yan, Tianjiao Du, Beijun Shen, Yuting Chen, Zhilei Ren. Feedback2Code: A Deep Learning Approach to Identifying User-Feedback-Related Source Code Files
23 -- 41Mamta Pandey, Ratnesh Litoriya, Prateek Pandey. Applicability of Machine Learning Methods on Mobile App Effort Estimation: Validation and Performance Evaluation
43 -- 66Muaz Gultekin, Oya Kalipsiz. Story Point-Based Effort Estimation Model with Machine Learning Techniques
67 -- 95Theresia Ratih Dewi Saputri, Seok-Won Lee. Software Analysis Method for Assessing Software Sustainability
97 -- 118Junxia Guo, Zheng Li 0002, CunFeng Shi, Ruilian Zhao. Thread Scheduling Sequence Generation Based on All Synchronization Pair Coverage Criteria
119 -- 146Nady Slam, Wushour Slamu, Pei Wang. A Case Representation and Similarity Measurement Model with Experience-Grounded Semantics