Journal: IEEE Trans. Software Eng.

Volume 40, Issue 9

841 -- 861Wael Kessentini, Marouane Kessentini, Houari A. Sahraoui, Slim Bechikh, Ali Ouni. A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection
862 -- 894Ismael Rodríguez, Luis Llana, Pablo Rabanal. A General Testability Theory: Classes, Properties, Complexity, and Testing Reductions
895 -- 910David Fernández-Amorós, Ruben Heradio, José Antonio Cerrada, Carlos Cerrada. A Scalable Approach to Exact Model and Commonality Counting for Extended Feature Models
911 -- 940Yepang Liu, Chang Xu, Shing-Chi Cheung, Jian Lu. GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications

Volume 40, Issue 8

738 -- 757Matej Hertis, Matjaz B. Juric. An Empirical Analysis of Business Process Execution Language Usage
758 -- 772Narayan Ramasubbu, Chris F. Kemerer. Managing Technical Debt in EnterpriseSoftware Packages
773 -- 794Xiaoyin Wang, Yingnong Dang, Lu Zhang 0023, Dongmei Zhang, Erica Lan, Hong Mei. Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time
795 -- 817Gregorio Díaz, María-Emilia Cambronero, Enrique Martínez, Gerardo Schneider. Specification and Verification of NormativeTexts Using C-O Diagrams
818 -- 840Henrik Leopold, Jan Mendling, Artem Polyvyanyy. Supporting Process Model Validation through Natural Language Generation

Volume 40, Issue 7

633 -- 649Miryung Kim, Thomas Zimmermann, Nachiappan Nagappan. An Empirical Study of RefactoringChallenges and Benefits at Microsoft
650 -- 670Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Patrick Heymans, Yves Le Traon. Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines
671 -- 694Gabriele Bavota, Rocco Oliveto, Malcom Gethers, Denys Poshyvanyk, Andrea De Lucia. Methodbook: Recommending Move Method Refactorings via Relational Topic Models
695 -- 709JaeSeung Song, Cristian Cadar, Peter Pietzuch. SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications
710 -- 737Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly. Symbolic Crosschecking of Data-Parallel Floating-Point Code

Volume 40, Issue 6

533 -- 554Ayse Tosun Misirli, Ayse Basar Bener. Bayesian Networks For Evidence-Based Decision-Making in Software Engineering
555 -- 583Juan Manuel Vara, Verónica Andrea Bollati, Álvaro Jiménez, Esperanza Marcos. Dealing with Traceability in the MDDof Model Transformations
584 -- 602Jonathan Lee, Kuo-Hsun Hsu. GEA: A Goal-Driven Approach toDiscovering Early Aspects
603 -- 616Martin Shepperd, David Bowes, Tracy Hall. Researcher Bias: The Use of Machine Learning in Software Defect Prediction
617 -- 632Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon. Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android

Volume 40, Issue 5

427 -- 449Yu Pei 0001, Carlo A. Furia, Martin Nordio, Yi Wei, Bertrand Meyer, Andreas Zeller. Automated Fixing of Programs with Contracts
450 -- 460Les Hatton. Conservation of Information: Software'sHidden Clockwork?
461 -- 482Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider, Steven Versteeg. Formulating Cost-Effective Monitoring Strategies for Service-Based Systems
483 -- 501Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto, Koichi Takahashi. Modular Software Model Checking for Distributed Systems
502 -- 532Venera Arnaoudova, Laleh Mousavi Eshkevari, Massimiliano Di Penta, Rocco Oliveto, Giuliano Antoniol, Yann-Gaël Guéhéneuc. REPENT: Analyzing the Nature of Identifier Renamings

Volume 40, Issue 4

324 -- 337David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania. A Model-Driven Methodology for Developing Secure Data-Management Applications
338 -- 365Christophe Damas, Bernard Lambeau, Axel van Lamsweerde. Analyzing Critical Decision-Based Processes
366 -- 380Sarah Rastkar, Gail C. Murphy, Gabriel Murray. Automatic Summarization of Bug Reports
381 -- 395Roberto Latorre. Effects of Developer Experience on Learningand Applying Unit Test-Driven Development
396 -- 412Junpeng Lv, Bei-Bei Yin, Kai-Yuan Cai. On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment
413 -- 426Saehwa Kim. Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation

Volume 40, Issue 3

216 -- 234Bao N. Nguyen, Atif M. Memon. An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input Spaces
235 -- 250Narayan Ramasubbu. Governing Software Process Improvementsin Globally Distributed Product Development
251 -- 265Charles Song, Adam Porter, Jeffrey S. Foster. iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees
266 -- 281Yan Cai, W. K. Chan. Magiclock: Scalable Detection ofPotential Deadlocks in Large-ScaleMultithreaded Programs
282 -- 306Matthias Galster, Danny Weyns, Dan Tofan, Bartosz Michalik, Paris Avgeriou. Variability in Software Systems - A Systematic Literature Review
307 -- 323Alex Groce, Todd Kulesza, Chaoqiang Zhang, Shalini Shamasunder, Margaret M. Burnett, Weng-Keen Wong, Simone Stumpf, Shubhomoy Das, Amber Shinsel, Forrest Bice, Kevin McIntosh. You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems

Volume 40, Issue 2

107 -- 122Yulei Sui, Ding Ye, Jingling Xue. Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis
123 -- 136François Taïani, Shen Lin 0003, Gordon S. Blair. GossipKit: A Unified ComponentFramework for Gossip
137 -- 153Shang-Wei Lin, Étienne André, Yang Liu, Jun Sun 0001, Jin Song Dong. Learning Assumptions for CompositionalVerification of Timed Systems
154 -- 166Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera. Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes
167 -- 191Immanuel Trummer, Boi Faltings, Walter Binder. Multi-Objective Quality-Driven Service Selection - A Fully Polynomial Time Approximation Scheme
192 -- 215Qiang He, Jun Yan, Hai Jin, Yun Yang. Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction

Volume 40, Issue 12

1147 -- 1162Fabio Massacci, Viet Hung Nguyen. An Empirical Methodology to Evaluate Vulnerability Discovery Models
1163 -- 1184Gunnar R. Bergersen, Dag I. K. Sjøberg, Tore Dybå. Construction and Validation of an Instrument for Measuring Programming Skill
1185 -- 1205Emilio Coppa, Camil Demetrescu, Irene Finocchi. Input-Sensitive Profiling
1206 -- 1223Cong Tian, Zhenhua Duan, Zhao Duan. Making CEGAR More Efficient in Software Model Checking
1224 -- 1259Kevin Lano, Shekoufeh Kolahdouz Rahimi. Model-Transformation Design Patterns

Volume 40, Issue 11

1042 -- 1060Jesús Sánchez Cuadrado, Esther Guerra, Juan de Lara. A Component Model for Model Transformations
1061 -- 1074Sebastian Draxler, Gunnar Stevens, Alexander Boden. Keeping the Development Environment Up to Date - A Study of the Situated Practices of Appropriating the Eclipse IDE
1075 -- 1099Chu-Ti Lin, Yan-fu Li. Rate-Based Queueing Simulation Model of Open Source Software Debugging Activities
1100 -- 1125Dimitrios Athanasiou, Ariadi Nugroho, Joost Visser, Andy Zaidman. Test Code Quality and Its Relation to Issue Handling Performance
1126 -- 1146Barthélémy Dagenais, Martin P. Robillard. Using Traceability Links to Recommend Adaptive Changes for Documentation Evolution

Volume 40, Issue 10

941 -- 956Erik Casagrande, Selamawit Woldeamlak, Wei Lee Woon, Hatem H. Zeineldin, Davor Svetinovic. NLP-KAOS for Systems Goal Elicitation: Smart Metering System Case Study
957 -- 970Ying-Dar Lin, José F. Rojas, Edward T.-H. Chu, Yuan-Cheng Lai. On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices
971 -- 992Wladimir Araujo, Lionel C. Briand, Yvan Labiche. On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object-Oriented Software
993 -- 1006Riccardo Scandariato, James Walden, Aram Hovsepyan, Wouter Joosen. Predicting Vulnerable Software Components via Text Mining
1007 -- 1024Tim Miller, Bin Lu, Leon Sterling, Ghassan Beydoun, Kuldar Taveter. Requirements Elicitation and Specification Using the Agent Paradigm: The Case Study of an Aircraft Turnaround Simulator
1025 -- 1041Arilo Claudio Dias Neto, Guilherme Horta Travassos. Supporting the Combined Selection of Model-Based Testing Techniques

Volume 40, Issue 1

1 -- 3Bashar Nuseibeh. Signing Off: The State of the Journal
4 -- 22Huai Liu, Fei-Ching Kuo, Dave Towey, Tsong Yueh Chen. How Effectively Does Metamorphic Testing Alleviate the Oracle Problem?
23 -- 42Lech Madeyski, Wojciech Orzeszyna, Richard Torkar, Mariusz Jozala. Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation
43 -- 66Cemal Yilmaz, Emine Dumlu, Myra B. Cohen, Adam A. Porter. Reducing Masking Effects in CombinatorialInteraction Testing: A Feedback DrivenAdaptive Approach
67 -- 82Christian Kästner, Alexander Dreiling, Klaus Ostermann. Variability Mining: Consistent Semi-automatic Detection of Product-Line Features
83 -- 102Leandro L. Minku, Dirk Sudholt, Xin Yao. Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis