Journal: IEEE Trans. Software Eng.

Volume 45, Issue 9

839 -- 857Maleknaz Nayebi, Guenther Ruhe. Asymmetric Release Planning: Compromising Satisfaction against Dissatisfaction
858 -- 876Guido Chari, Diego Garbervetsky, Stefan Marr, Stéphane Ducasse. Fully Reflective Execution Environments: Virtual Machines for More Flexible Software
877 -- 897Justin Smith 0001, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford. How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool
898 -- 918Jie Zhang 0050, Lingming Zhang, Mark Harman, Dan Hao, Yue Jia 0001, Lu Zhang 0023. Predictive Mutation Testing
919 -- 944Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann. Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior

Volume 45, Issue 8

736 -- 759Dirk van der Linden, Irit Hadar. A Systematic Literature Review of Applications of the Physics of Notations
760 -- 781Aurora Ramírez 0001, José Raúl Romero, Christopher L. Simons. A Systematic Review of Interaction in Search-Based Software Engineering
782 -- 801Wei Song 0003, Xiaoxing Ma, Hans-Arno Jacobsen. Instance Migration Validity for Dynamic Evolution of Data-Aware Processes
802 -- 822Michael D. Harrison, Paolo Masci, José Creissac Campos. Verification Templates for the Analysis of User Interface Software Design
823 -- 838Lingfeng Bao, Zhenchang Xing, Xin Xia 0001, David Lo 0001. VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System

Volume 45, Issue 7

637 -- 656Morakot Choetkiertikul, Hoa Khanh Dam, Truyen Tran 0001, Trang Pham, Aditya Ghose, Tim Menzies. A Deep Learning Model for Estimating Story Points
657 -- 682Yuanfang Cai, Lu Xiao 0001, Rick Kazman, Ran Mo, Qiong Feng. Design Rule Spaces: A New Model for Representing and Analyzing Software Architecture
683 -- 711Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto. The Impact of Automated Parameter Optimization on Defect Prediction Models
712 -- 735Paul Ralph. Toward Methodological Guidelines for Process Theories and Taxonomies in Software Engineering

Volume 45, Issue 6

537 -- 557Xiaofei Xie, Bihuan Chen 0001, Liang Zou, Yang Liu 0003, Wei Le, Xiaohong Li. Automatic Loop Summarization via Path Dependency Analysis
558 -- 575Tingting Yu, Wei Wen, Xue Han, Jane Huffman Hayes. ConPredictor: Concurrency Defect Prediction in Real-World Applications
576 -- 596Luca Mottola, Gian Pietro Picco, Felix Jonathan Oppermann, Joakim Eriksson, Niclas Finne, Harald Fuchs, Andrea Gaglione, Stamatis Karnouskos, Patricio Moreno Montero, Nina Oertel, Kay Römer, Patrik Spieß, Stefano Tranquillini, Thiemo Voigt. makeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes
597 -- 614Jianfeng Chen, Vivek Nair, Rahul Krishna, Tim Menzies. "Sampling" as a Baseline Optimizer for Search-Based Software Engineering
615 -- 631Fayola Peters, Thein Than Tun, Yijun Yu, Bashar Nuseibeh. Text Filtering and Ranking for Security Bug Report Prediction
632 -- 636Steffen Herbold, Alexander Trautsch, Jens Grabowski. Correction of "A Comparative Study to Benchmark Cross-Project Defect Prediction Approaches"

Volume 45, Issue 5

427 -- 463Phil McMinn, Chris J. Wright, Colton J. McCurdy, Gregory M. Kapfhammer. Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas
464 -- 488Luca Ponzanelli, Gabriele Bavota, Andrea Mocci, Rocco Oliveto, Massimiliano Di Penta, Sonia Haiduc, Barbara Russo, Michele Lanza. Automatic Identification and Classification of Software Development Video Tutorial Fragments
489 -- 506Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury. Coverage-Based Greybox Fuzzing as Markov Chain
507 -- 520Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene. Decomposition-Based Approach for Model-Based Test Generation
521 -- 536Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi. The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game

Volume 45, Issue 4

319 -- 334Hao Zhong, Hong Mei. An Empirical Study on API Usages
335 -- 362Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel C. Briand. Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
363 -- 390Alessandro Marchetto, Giuseppe Scanniello, Angelo Susi. Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction
391 -- 411Zhiqiang Li 0003, Xiao-Yuan Jing, Xiaoke Zhu, Hongyu Zhang, Baowen Xu, Shi Ying. On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction
412 -- 426Robert Clarisó, Carlos A. González, Jordi Cabot. Smart Bound Selection for the Verification of UML/OCL Class Diagrams

Volume 45, Issue 3

219 -- 236Jonathan Dorn, Jeremy Lacomis, Westley Weimer, Stephanie Forrest. Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs
237 -- 260Klaas-Jan Stol, Bora Caglayan, Brian Fitzgerald 0001. Competition-Based Crowdsourcing Software Development: A Multi-Method Study from a Customer Perspective
261 -- 284Moritz Beller, Georgios Gousios, Annibale Panichella, Sebastian Proksch, Sven Amann, Andy Zaidman. Developer Testing in the IDE: Patterns, Beliefs, and Behavior
285 -- 300Narayan Ramasubbu, Chris F. Kemerer. Integrating Technical Debt Management and Software Quality Management Processes: A Normative Framework and Field Tests
301 -- 318Ruizhi Gao, W. Eric Wong. MSeer - An Advanced Technique for Locating Multiple Bugs in Parallel

Volume 45, Issue 2

111 -- 147Seyedrebvar Hosseini, Burak Turhan, Dimuthu Gunarathna. A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction
148 -- 170Hong Lu 0005, Shuai Wang 0001, Tao Yue 0002, Shaukat Ali 0001, Jan F. Nygård. Automated Refactoring of OCL Constraints with Search
171 -- 193Yao Pan, Jules White, Yu Sun 0002, Jeff Gray. Gray Computing: A Framework for Computing with Background JavaScript Tasks
194 -- 218Fabio Palomba, Marco Zanoni, Francesca Arcelli Fontana, Andrea De Lucia, Rocco Oliveto. Toward a Smell-Aware Bug Prediction Model

Volume 45, Issue 12

1170 -- 1188Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini. A Systematic Evaluation of Static API-Misuse Detectors
1189 -- 1210Osama Al-Baik, James Miller 0001. Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations
1211 -- 1229Meng Yan, Xin Xia 0001, Emad Shihab, David Lo 0001, Jianwei Yin, Xiaohu Yang. Automating Change-Level Self-Admitted Technical Debt Determination
1230 -- 1252Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio. LEILA: Formal Tool for Identifying Mobile Malicious Behaviour
1253 -- 1269Qinbao Song, Yuchen Guo, Martin J. Shepperd. A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction
1270 -- 1291Hanefi Mercan, Cemal Yilmaz, Kamer Kaya. CHiP: A Configurable Hybrid Parallel Covering Array Constructor

Volume 45, Issue 11

1054 -- 1080Qi Luo, Kevin Moran, Lingming Zhang, Denys Poshyvanyk. How Do Static and Dynamic Test Case Prioritization Techniques Perform on Modern Software Systems? An Extensive Study on GitHub Projects
1081 -- 1105Rahul Krishna, Tim Menzies. Bellwethers: A Baseline Method for Transfer Learning
1106 -- 1124Thomas D. LaToza, Arturo Di Lecce, Fabio Ricci, W. Ben Towne, André van der Hoek. Microtask Programming
1125 -- 1149Yinxing Xue, Zhengzi Xu, Mahinthan Chandramohan, Yang Liu 0003. Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation
1150 -- 1169Bobby R. Bruce, Justyna Petke, Mark Harman, Earl T. Barr. Approximate Oracles and Synergy in Software Energy Search Spaces

Volume 45, Issue 10

945 -- 966Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci. A Screening Test for Disclosed Vulnerabilities in FOSS Components
967 -- 983Mostafa Mesgari, Chitu Okoli, Ana Ortiz de Guinea. Creating Rich and Representative Personas by Discovering Affordances
984 -- 1001Pan Bian, Bin Liang 0002, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai 0001. Detecting Bugs by Discovering Expectations and Their Violations
1002 -- 1023Thong Hoang, Richard Jayadi Oentaryo, Tien-Duy B. Le, David Lo 0001. Network-Clustered Multi-Modal Bug Localization
1024 -- 1053Francis Palma, Naouel Moha, Yann-Gaël Guéhéneuc. UniDoSA: The Unified Specification and Detection of Service Antipatterns

Volume 45, Issue 1

1 -- 0Nenad Medvidovic. Editorial: State of the Journal
2 -- 33Andrea Margheri, Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi. A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies
34 -- 67Luca Gazzola, Daniela Micucci, Leonardo Mariani. Automatic Software Repair: A Survey
68 -- 86Simone Scalabrino, Gabriele Bavota, Barbara Russo, Massimiliano Di Penta, Rocco Oliveto. Listening to the Crowd for the Release Planning of Mobile Apps
87 -- 106Eirini Kalliamvakou, Christian Bird, Thomas Zimmermann 0001, Andrew Begel, Robert DeLine, Daniel M. Germán. What Makes a Great Manager of Software Engineers?