Journal: IEEE Trans. Software Eng.

Volume 49, Issue 9

4243 -- 4267Razan Ghzouli, Thorsten Berger, Einar Broch Johnsen, Andrzej Wasowski, Swaib Dragule. Behavior Trees and State Machines in Robotics Applications
4268 -- 4281Aakash Bansal, Zachary Eberhart, Zachary Karas, Yu Huang 0015, Collin McMillan. Function Call Graph Context Encoding for Neural Source Code Summarization
4282 -- 4303Orlando Amaral Cejas, Muhammad Ilyas Azeem, Sallam Abualhaija, Lionel C. Briand. NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR
4304 -- 4323Amir Mohammad Ebrahimi, Gustavo Ansaldi Oliva, Ahmed E. Hassan. Self-Admitted Technical Debt in Ethereum Smart Contracts: A Large-Scale Exploratory Study
4324 -- 4348Leonardo Horn Iwaya, Muhammad Ali Babar 0001, Awais Rashid. Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices
4349 -- 4370Ulrike Maria Graetsch, Hourieh Khalajzadeh, Mojtaba Shahin, Rashina Hoda, John C. Grundy. Dealing With Data Challenges When Delivering Data-Intensive Software Solutions
4371 -- 4389Uraz Cengiz Türker, Robert M. Hierons, Gerassimos D. Barlas, Khaled El-Fakih. Incomplete Adaptive Distinguishing Sequences for Non-Deterministic FSMs
4390 -- 4410Ke Liu, Xiang Chen 0005, Chunyang Chen, Xiaofei Xie, Zhanqi Cui. Automated Question Title Reformulation by Mining Modification Logs From Stack Overflow
4411 -- 4428Yihui Wang, Huaxiao Liu, Shanquan Gao, Xiao Tang. Animation2API: API Recommendation for the Implementation of Android UI Animations
4429 -- 4442Yutao Hu, Yilin Fang, Yifan Sun, Yaru Jia, Yueming Wu, Deqing Zou, Hai Jin 0001. Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection
4443 -- 4455Toni Mancini, Igor Melatti, Enrico Tronci. Optimizing Highly-Parallel Simulation-Based Verification of Cyber-Physical Systems
4456 -- 4476Pengcheng Zhang, Qifan Yu, Yan Xiao 0002, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang. BiAn: Smart Contract Source Code Obfuscation
4477 -- 4495Jakob Svennevik Notland, Mariusz Nowostawski, Jingyue Li. Runtime Evolution of Bitcoin's Consensus Rules

Volume 49, Issue 8

3955 -- 3971Sebastian Simon, Nicolai Ruckel, Norbert Siegmund. CfgNet: A Framework for Tracking Equality-Based Configuration Dependencies Across a Software Project
3972 -- 3988Essa A. Alhazami, Abdullah M. Sheneamer. Graph-of-Code: Semantic Clone Detection Using Graph Fingerprints
3989 -- 4003Weiyi Zhang, Zoran Salcic, Avinash Malik. Designing, Modeling and Analysis of GALS Software Systems
4004 -- 4022Runzhi He, Hao He 0012, Yuxia Zhang, Minghui Zhou 0001. Automating Dependency Updates in Practice: An Exploratory Study on GitHub Dependabot
4023 -- 4034Achiya Elyasaf, Eitan Farchi, Oded Margalit, Gera Weiss, Yeshayahu Weiss. Generalized Coverage Criteria for Combinatorial Sequence Testing
4035 -- 4057Truong-Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia 0001, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo 0001. Multi-Granularity Detector for Vulnerability Fixes
4058 -- 4080Jiayang Song, Xuan Xie, Lei Ma 0003. $\mathtt {SIEGE}$SIEGE: A Semantics-Guided Safety Enhancement Framework for AI-Enabled Cyber-Physical Systems
4081 -- 4096Mingwei Liu 0002, Chengyuan Zhao, Xin Peng 0001, Simin Yu, Haofen Wang, Chaofeng Sha. Task-Oriented ML/DL Library Recommendation Based on a Knowledge Graph
4097 -- 4114Huayao Wu, Senyao Yu, Xintao Niu, Changhai Nie, Yu Pei 0001, Qiang He 0001, Yun Yang 0001. Enhancing Fault Injection Testing of Service Systems via Fault-Tolerance Bottleneck
4115 -- 4134Shengcheng Yu, Chunrong Fang, Quanjun Zhang, Zhihao Cao, Yexiao Yun, Zhenfei Cao, Kai Mei, Zhenyu Chen 0001. Mobile App Crowdsourced Test Report Consistency Detection via Deep Image-and-Text Fusion Understanding
4135 -- 4151Youshuai Tan, Jinfu Chen 0002, Weiyi Shang, Tao Zhang 0001, Sen Fang, Xiapu Luo, Zijie Chen, Shuhao Qi. STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews
4152 -- 4168Chunyong Zhang, Bin Liu, Yang Xin, Liangwei Yao. CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation
4169 -- 4195Darius Sas, Paris Avgeriou. An Architectural Technical Debt Index Based on Machine Learning and Architectural Smells
4196 -- 4212Junwei Zhang, Zhongxin Liu, Xing Hu 0008, Xin Xia 0001, Shanping Li. Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code
4213 -- 4242Yalemisew M. Abgaz, Andrew McCarren, Peter Elger, David Solan, Neil Lapuz, Marin Bivol, Glenn Jackson, Murat Yilmaz 0001, Jim Buckley, Paul M. Clarke. Decomposition of Monolith Applications Into Microservices Architectures: A Systematic Review

Volume 49, Issue 7

3660 -- 3674Mathieu Nassif, Martin P. Robillard. Identifying Concepts in Software Projects
3675 -- 3691Federico Cassano, John Gouwar, Daniel Nguyen, Sydney Nguyen, Luna Phipps-Costin, Donald Pinckney, Ming-Ho Yee, Yangtian Zi, Carolyn Jane Anderson, Molly Q. Feldman, Arjun Guha, Michael Greenberg 0002, Abhinav Jangda. MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation
3692 -- 3714Ivano Malavolta, Kishan Nirghin, Gian Luca Scoccia, Simone Romano 0001, Salvatore Lombardi, Giuseppe Scanniello, Patricia Lago. JavaScript Dead Code Identification, Elimination, and Empirical Assessment
3715 -- 3735Amirhossein Zolfagharian, Manel Abdellatif, Lionel C. Briand, Mojtaba Bagherzadeh, Ramesh S 0002. A Search-Based Testing Approach for Deep Reinforcement Learning Agents
3736 -- 3752Priscila Santiesteban, Yu Huang 0015, Westley Weimer, Hammad Ahmad. CirFix: Automated Hardware Repair and its Real-World Applications
3753 -- 3770Souvick Das, Novarun Deb, Nabendu Chaki, Agostino Cortesi. Driving the Technology Value Stream by Analyzing App Reviews
3771 -- 3792Steve Kommrusch, Martin Monperrus, Louis-Noël Pouchet. Self-Supervised Learning to Prove Equivalence Between Straight-Line Programs via Rewrite Rules
3793 -- 3810Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu 0012, Yajin Zhou, Qinming He. Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
3811 -- 3826Xiao Ling, Tim Menzies. What Not to Test (For Cyber-Physical Systems)
3827 -- 3856Hafedh Mili, Imen Benzarti, Amal Elkharraz, Ghizlane El-Boussaidi, Yann-Gaël Guéhéneuc, Petko Valtchev. Discovering Reusable Functional Features in Legacy Object-Oriented Systems
3857 -- 3871Tarek Mahmud, Meiru Che, Guowei Yang 0001. Detecting Android API Compatibility Issues With API Differences
3872 -- 3900Zhongxing Yu, Matias Martinez, Zimin Chen, Tegawendé F. Bissyandé, Martin Monperrus. Learning the Relation Between Code Features and Code Transforms With Structured Prediction
3901 -- 3921Qinsheng Hou, Wenrui Diao, Yanhao Wang, Chenglin Mao, Lingyun Ying, Song Liu, Xiaofeng Liu, Yuanzhi Li, Shanqing Guo, Meining Nie, Haixin Duan. Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem
3922 -- 3938Milos Ojdanic, Aayush Garg, Ahmed Khanfir, Renzo Degiovanni, Mike Papadakis, Yves Le Traon. Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies
3939 -- 3954Zhuo Zhang 0007, Yan Lei, Xiaoguang Mao, Meng Yan 0001, Xin Xia 0001, David Lo 0001. Context-Aware Neural Fault Localization

Volume 49, Issue 6

3344 -- 3358Thiago do Nascimento Ferreira, James Ivers, Jeffrey J. Yackley, Marouane Kessentini, Ipek Ozkaya, Khouloud Gaaloul. Dependent or Not: Detecting and Understanding Collections of Refactorings
3359 -- 3375Quentin L. Meunier, Etienne Pons, Karine Heydemann. LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions
3376 -- 3390Wei Liu, Tse-Hsun Chen. SLocator: Localizing the Origin of SQL Queries in Database-Backed Web Applications
3391 -- 3410Yuan Zhou 0005, Yang Sun 0008, Yun Tang 0003, Yuqi Chen 0001, Jun Sun 0001, Christopher M. Poskitt, Yang Liu 0003, Zijiang Yang 0006. Specification-Based Autonomous Driving System Testing
3411 -- 3429Thanh Le-Cong, Duc-Minh Luong, Xuan-Bach Dinh Le, David Lo 0001, Nhat-Hoa Tran, Bui Quang Huy, Quyet Thang Huynh. Invalidator: Automated Patch Correctness Assessment Via Semantic and Syntactic Reasoning
3430 -- 3471Nazanin Bayati Chaleshtari, Fabrizio Pastore, Arda Goknil, Lionel C. Briand. Metamorphic Testing for Web System Security
3472 -- 3486Chaochen Shi, Borui Cai, Yao Zhao, Longxiang Gao, Keshav Sood, Yong Xiang 0001. CoSS: Leveraging Statement Semantics for Code Summarization
3487 -- 3503Joseph Poremba, Nancy A. Day, Amirhossein Vakili. New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding
3504 -- 3523Baicai Sun, Dunwei Gong, Feng Pan, Xiangjuan Yao, Tian Tian. Evolutionary Generation of Test Suites for Multi-Path Coverage of MPI Programs With Non-Determinism
3524 -- 3535Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao. Specializing Neural Networks for Cryptographic Code Completion Applications
3536 -- 3553Akond Rahman, Chris Parnin. Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management
3554 -- 3580Luca Traini, Vittorio Cortellessa. DeLag: Using Multi-Objective Optimization to Enhance the Detection of Latency Degradation Patterns in Service-Based Systems
3581 -- 3598Boyuan Li, Carol S. Smidts. A Zone-Based Model for Analysis of Dependent Failures in Requirements Inspection
3599 -- 3615Xiaoyu Sun, Xiao Chen 0002, Yonghui Liu, John C. Grundy, Li Li 0029. Taming Android Fragmentation Through Lightweight Crowdsourced Testing
3616 -- 3629Mario Janke, Patrick Mäder. ${\text{FS}^{3}}_{\text{change}}$FS3change: A Scalable Method for Change Pattern Mining
3630 -- 3646Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu 0001, Shuqing Li, Lu Liu, Michael R. Lyu. Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
3647 -- 3659Finlay Macklon, Markos Viggiato, Natalia Romanova, Chris Buzon, Dale Paas, Cor-Paul Bezemer. A Taxonomy of Testable HTML5 Canvas Issues

Volume 49, Issue 5

3032 -- 3051Chunrong Fang, Shengcheng Yu, Ting Su 0001, Jing Zhang, Yuanhan Tian, Yang Liu 0003. Test Report Generation for Android App Testing Via Heterogeneous Data Analysis
3052 -- 3070Weiwei Zhang, Shengjian Guo, Hongyu Zhang 0002, Yulei Sui, Yinxing Xue, Yun Xu. Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations
3071 -- 3088Shenghui Gu, Guoping Rong, Tian Ren, He Zhang 0001, Haifeng Shen, Yongda Yu, Xian Li, Jian Ouyang, Chunan Chen. TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems
3089 -- 3105Jihee Park, Sungho Lee, Jaemin Hong, Sukyoung Ryu. Static Analysis of JNI Programs via Binary Decompilation
3106 -- 3130Xin Tan, Minghui Zhou 0001, Li Zhang 0029. Understanding Mentors' Engagement in OSS Communities via Google Summer of Code
3131 -- 3154Chaima Boufaied, Claudio Menghi, Domenico Bianculli, Lionel C. Briand. Trace Diagnostics for Signal-Based Temporal Properties
3155 -- 3181Ying Wang 0038, Peng Sun, Lin Pei, Yue Yu 0001, Chang Xu 0001, Shing-Chi Cheung, Hai Yu 0001, Zhiliang Zhu 0001. Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem
3182 -- 3204Zohreh Aghababaeyan, Manel Abdellatif, Lionel C. Briand, Ramesh S, Mojtaba Bagherzadeh. Black-Box Testing of Deep Neural Networks through Test Case Diversity
3205 -- 3225Brittany Reid, Marcelo d'Amorim, Markus Wagner 0007, Christoph Treude. NCQ: Code Reuse Support for Node.js Developers
3226 -- 3240Chong Wang, Xin Peng 0001, Zhenchang Xing, Xiujie Meng. Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking
3241 -- 3260Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C. S. Santos, Danielle Gonzalez, Steven Simmons. Empirical Validation of Automated Vulnerability Curation and Characterization
3261 -- 3276Neil Walkinshaw, Robert M. Hierons. Modelling Second-Order Uncertainty in State Machines
3277 -- 3288Jack H. Good, Nicholas Gisolfi, James Kyle Miller, Artur Dubrawski. Verification of Fuzzy Decision Trees
3289 -- 3304Yujia Chen, Cuiyun Gao, Xiaoxue Ren, Yun Peng, Xin Xia 0001, Michael R. Lyu. API Usage Recommendation Via Multi-View Heterogeneous Graph Representation Learning
3305 -- 3324Chenhao Wei, Lu Xiao 0001, Tingting Yu, Xinyu Chen, Xiao Wang 0030, Sunny Wong, Abigail Clune. Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models
3325 -- 3343Kashumi Madampe, Rashina Hoda, John Grundy 0001. A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering

Volume 49, Issue 4

1397 -- 1410George Mathew, Amritanshu Agrawal, Tim Menzies. Finding Trends in Software Research
1411 -- 1425Michaela Greiler, Margaret-Anne D. Storey, Abi Noda. An Actionable Framework for Understanding and Improving Developer Experience
1426 -- 1442Weihan Ou, Steven H. H. Ding, Yuan Tian, Leo Song. SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification
1443 -- 1463Yanjie Jiang, Hui Liu 0003, Xiaoqing Luo, Zhihao Zhu, Xiaye Chi, Nan Niu, Yuxia Zhang, Yamin Hu, Pan Bian, Lu Zhang 0023. BugBuilder: An Automated Approach to Building Bug Repository
1464 -- 1486Le Yu 0002, Haoyu Wang 0001, Xiapu Luo, Tao Zhang 0001, Kang Liu 0001, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao. Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews
1487 -- 1507Julian von der Mosel, Alexander Trautsch, Steffen Herbold. On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain
1508 -- 1522Kevin Jesse, Premkumar T. Devanbu, Anand Ashok Sawant. Learning to Predict User-Defined Types
1523 -- 1539Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri. IoTCom: Dissecting Interaction Threats in IoT Systems
1540 -- 1560Nasif Imtiaz, Aniqa Khanom, Laurie A. Williams. Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages
1561 -- 1579Zhanyao Lei, Yixiong Chen, Yang Yang, Mingyuan Xia, Zhengwei Qi. Bootstrapping Automated Testing for RESTful Web Services
1580 -- 1598Antonio Mastropaolo, Nathan Cooper, David Nader-Palacio, Simone Scalabrino, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota. Using Transfer Learning for Code-Related Tasks
1599 -- 1614Elizabeth Dinella, Todd Mytkowicz, Alexey Svyatkovskiy, Christian Bird, Mayur Naik, Shuvendu K. Lahiri. DeepMerge: Learning to Merge Programs
1615 -- 1639Ahmadreza Saboor Yaraghi, Mojtaba Bagherzadeh, Nafiseh Kahani, Lionel C. Briand. Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts
1640 -- 1660Bo Lin, Shangwen Wang, Zhongxin Liu, Xin Xia 0001, Xiaoguang Mao. Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach
1661 -- 1682Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim. Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned
1683 -- 1703Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang 0001, Yang Liu 0003, Kui Ren 0001. A Comprehensive Study on ARM Disassembly Tools
1704 -- 1725Mostafa Jangali, Yiming Tang, Niclas Alexandersson, Philipp Leitner 0001, Jinqiu Yang, Weiyi Shang. Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests
1726 -- 1740Mohammad Alahmadi. VID2XML: Automatic Extraction of a Complete XML Data From Mobile Programming Screencasts
1741 -- 1765Yulu Cao, Lin Chen 0015, Wanwangying Ma, Yanhui Li, Yuming Zhou, Linzhang Wang. Towards Better Dependency Management: A First Look at Dependency Smells in Python Projects
1766 -- 1781Abu Naser Masud. The Duality in Computing SSA Programs and Control Dependency
1782 -- 1803Carlos Bernal-Cárdenas, Nathan Cooper, Madeleine Havranek, Kevin Moran, Oscar Chaparro, Denys Poshyvanyk, Andrian Marcus. Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios
1804 -- 1822Pasquale Salza, Christoph Schwizer, Jian Gu, Harald C. Gall. On the Effectiveness of Transfer Learning for Code Search
1823 -- 1841Emily Winter 0001, David Bowes, Steve Counsell, Tracy Hall, Saemundur O. Haraldsson, Vesna Nowack, John R. Woodward. How do Developers Really Feel About Bug Fixing? Directions for Automatic Program Repair
1842 -- 1859Zhenya Zhang, Deyun Lyu, Paolo Arcaini, Lei Ma 0003, Ichiro Hasuo, Jianjun Zhao. FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria
1860 -- 1875Ziyuan Zhong, Gail E. Kaiser, Baishakhi Ray. Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
1876 -- 1897Yun Peng, Shuqing Li, Wenwei Gu, Yichen Li, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu. Revisiting, Benchmarking and Exploring API Recommendation: How Far Are We?
1898 -- 1911Leonardo A. F. Leite, Nelson Lago, Claudia de O. Melo, Fabio Kon, Paulo Meirelles. A Theory of Organizational Structures for Development and Infrastructure Professionals
1912 -- 1927Sakina Fatima, Taher Ahmed Ghaleb, Lionel C. Briand. Flakify: A Black-Box, Language Model-Based Predictor for Flaky Tests
1928 -- 1940Andrea Stocco 0001, Brian Pulfer, Paolo Tonella. Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems
1941 -- 1963Zhiqiang Li 0003, Hongyu Zhang 0002, Xiao-Yuan Jing, Juanying Xie, Min Guo, Jie Ren 0007. DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction
1964 -- 1982Yao Deng, James Xi Zheng, Tianyi Zhang 0001, Huai Liu, Guannan Lou, Miryung Kim, Tsong Yueh Chen. A Declarative Metamorphic Testing Framework for Autonomous Driving
1983 -- 2005Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai. Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection
2006 -- 2019Faizan Khan, Istvan David, Dániel Varró, Shane McIntosh. Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study
2020 -- 2038Zoe Kotti, Georgios Gousios, Diomidis Spinellis. Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis
2039 -- 2052Keila Barbosa, Ronivaldo Ferreira, Gustavo Pinto 0001, Marcelo d'Amorim, Breno Miranda. Test Flakiness Across Programming Languages
2053 -- 2068Ming Wen 0001, Zifan Xie, Kaixuan Luo, Xiao Chen, Yibiao Yang, Hai Jin 0001. Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis
2069 -- 2087Pouria Derakhshanfar, Xavier Devroey, Annibale Panichella, Andy Zaidman, Arie van Deursen. Generating Class-Level Integration Tests Using Call Site Information
2088 -- 2106Alejandrina M. Aranda, Oscar Dieste, José Ignacio Panach, Natalia Juristo. Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments
2107 -- 2127Zhe Chen, Qi Zhang, Jun Wu, Junqi Yan, Jingling Xue. A Source-Level Instrumentation Framework for the Dynamic Analysis of Memory Safety
2128 -- 2148Mikko Raatikainen, Quim Motger, Clara Marie Lüders, Xavier Franch, Lalli Myllyaho, Elina Kettunen, Jordi Marco, Juha Tiihonen, Mikko Halonen, Tomi Männistö. Improved Management of Issue Dependencies in Issue Trackers of Large Collaborative Projects
2149 -- 2168Hourieh Khalajzadeh, Mojtaba Shahin, Humphrey O. Obie, Pragya Agrawal, John C. Grundy. Supporting Developers in Addressing Human-Centric Issues in Mobile Apps
2169 -- 2181Toufique Ahmed, Noah Rose Ledesma, Premkumar T. Devanbu. SynShine: Improved Fixing of Syntax Errors
2182 -- 2201Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand. Data-Driven Mutation Analysis for Cyber-Physical Systems
2202 -- 2220Danyllo Albuquerque, Everton Guimarães, Graziela Tonin, Pilar Rodríguez 0002, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich, Ferdinandy Chagas. Managing Technical Debt Using Intelligent Techniques - A Systematic Mapping Study
2221 -- 2238Iason Papapanagiotakis-Bousy, Earl T. Barr, David Clark 0001. PopArt: Ranked Testing Efficiency
2239 -- 2254Shuyao Jiang, Jiacheng Shen, Shengnan Wu, Yu Cai, Yue Yu 0001, Yangfan Zhou. Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study
2255 -- 2271Sergio Luis Herrera Gonzalez, Piero Fraternali. Almost Rerere: Learning to Resolve Conflicts in Distributed Projects
2272 -- 2284Jianjun Huang 0001, Bo Xue, Jiasheng Jiang, Wei You, Bin Liang 0002, JingZheng Wu, Yanjun Wu. Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering
2285 -- 2302Xiaowei Zhang, Weiqin Zou, Lin Chen 0015, Yanhui Li, Yuming Zhou. Towards the Analysis and Completion of Syntactic Structure Ellipsis for Inline Comments
2303 -- 2317Achiya Elyasaf, Tom Yaacov, Gera Weiss. What Petri Nets Oblige us to Say Comparing Approaches for Behavior Composition
2318 -- 2336Xiuting Ge, Shengcheng Yu, Chunrong Fang, Qi Zhu, Zhihong Zhao. Leveraging Android Automated Testing to Assist Crowdsourced Testing
2337 -- 2351Lucas Zamprogno, Braxton Hall, Reid Holmes, Joanne M. Atlee. Dynamic Human-in-the-Loop Assertion Generation
2352 -- 2365An Ran Chen, Tse-Hsun Peter Chen, Shaowei Wang 0002. T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure
2366 -- 2380Luca Di Grazia, Paul Bredl, Michael Pradel. DiffSearch: A Scalable and Precise Search Engine for Code Changes
2381 -- 2393James Tizard, Peter Devine, Hechen Wang, Kelly Blincoe. A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management
2394 -- 2412Xu Zhou, Pengfei Wang 0010, Chenyifan Liu, Tai Yue, Yingying Liu, Congxi Song, Kai Lu, Qidi Yin, Xu Han. UltraFuzz: Towards Resource-Saving in Distributed Fuzzing
2413 -- 2425Ifeanyi G. Ndukwe, Sherlock A. Licorish, Stephen G. MacDonell. Perceptions on the Utility of Community Question and Answer Websites Like Stack Overflow to Software Developers
2426 -- 2439Kewen Peng, Joymallya Chakraborty, Tim Menzies. FairMask: Better Fairness via Model-Based Rebalancing of Protected Attributes
2440 -- 2458Lina Gong, Haoxiang Zhang, Jingxuan Zhang, Mingqiang Wei, Zhiqiu Huang. A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction
2459 -- 2475Michel Benaroch, Kalle Lyytinen. How Much Does Software Complexity Matter for Maintenance Productivity? The Link Between Team Instability and Diversity
2476 -- 2497Taher Ahmed Ghaleb, Safwat Hassan, Ying Zou 0001. Studying the Interplay Between the Durations and Breakages of Continuous Integration Builds
2498 -- 2512Ioannis Zozas, Stamatia Bibi, Apostolos Ampatzoglou. Forecasting the Principal of Code Technical Debt in JavaScript Applications
2513 -- 2529Guofu Zhang, Lei Li, Zhaopin Su, Zhisheng Shao, Miqing Li, Bin Li 0025, Xin Yao 0001. New Reliability-Driven Bounds for Architecture-Based Multi-Objective Testing Resource Allocation
2530 -- 2544Zhixing Li, Yue Yu 0001, Tao Wang, Yan Lei, Ying Wang 0038, Huaimin Wang. To Follow or Not to Follow: Understanding Issue/Pull-Request Templates on GitHub
2545 -- 2565Yikun Li, Mohamed Soliman, Paris Avgeriou, Lou Somers. Self-Admitted Technical Debt in the Embedded Systems Industry: An Exploratory Case Study
2566 -- 2579Supatsara Wattanakriengkrai, Dong Wang, Raula Gaikovina Kula, Christoph Treude, Patanamon Thongtanunam, Takashi Ishio, Kenichi Matsumoto. Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem
2580 -- 2596Pedro Delgado-Pérez, Aurora Ramírez 0001, Kevin J. Valle-Gómez, Inmaculada Medina-Bulo, José Raúl Romero. InterEvo-TR: Interactive Evolutionary Test Generation With Readability Assessment
2597 -- 2620Jingxuan Zhang, Siyuan Liu, Lina Gong, Haoxiang Zhang, Zhiqiu Huang, He Jiang 0001. BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System
2621 -- 2641Bernhard Schäfer, Han van der Aa, Henrik Leopold, Heiner Stuckenschmidt. Sketch2Process: End-to-End BPMN Sketch Recognition Based on Neural Networks
2642 -- 2660Neelofar, Kate Smith-Miles, Mario Andrés Muñoz, Aldeida Aleti. Instance Space Analysis of Search-Based Software Testing
2661 -- 2676José Antonio Hernández López, Jesús Sánchez Cuadrado. Generating Structurally Realistic Models With Deep Autoregressive Networks
2677 -- 2697Vali Tawosi, Rebecca Moussa, Federica Sarro. Agile Effort Estimation: Have We Solved the Problem Yet? Insights From a Replication Study
2698 -- 2721Max Ellis, Sarah Nadi, Danny Dig. Operation-Based Refactoring-Aware Merging: An Empirical Evaluation
2722 -- 2740Naweiluo Zhou, Huan Zhou, Dennis Hoppe. Containerization for High Performance Computing Systems: Survey and Prospects
2741 -- 2760Claudio Menghi, Christos Tsigkanos, Mehrnoosh Askarpour, Patrizio Pelliccione, Gricel Vázquez, Radu Calinescu, Sergio García 0002. Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties
2761 -- 2775Mohannad Alhanahnah, ShiQing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang 0001. autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning
2776 -- 2790Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray. Learning Approximate Execution Semantics From Traces for Binary Function Similarity
2791 -- 2814Xiao Wang 0030, Lu Xiao 0001, Tingting Yu, Anne Woepse, Sunny Wong. From Inheritance to Mockito: An Automatic Refactoring Approach
2815 -- 2828Jingzhe Guo, Mingsheng Ying. Software Pipelining for Quantum Loop Programs
2829 -- 2838Kizito Salako, Xingyu Zhao 0001. The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments
2839 -- 2855Shangqing Liu, Xiaofei Xie, Jing Kai Siow, Lei Ma 0003, Guozhu Meng, Yang Liu 0003. GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search
2856 -- 2872Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo 0001, Tim Menzies. How to Find Actionable Static Analysis Warnings: A Case Study With FindBugs
2873 -- 2891Catia Trubiani, Riccardo Pinciroli, Andrea Biaggi, Francesca Arcelli Fontana. Automated Detection of Software Performance Antipatterns in Java-Based Applications
2892 -- 2919Enrique Larios Vargas, Omar Elazhary, Soroush Yousefi, Derek Lowlind, Michael L. W. Vliek, Margaret-Anne D. Storey. DASP: A Framework for Driving the Adoption of Software Security Practices
2920 -- 2940He Jiang 0001, Yulong Li, Shikai Guo, Xiaochen Li, Tao Zhang 0001, Hui Li 0014, Rong Chen 0003. DupHunter: Detecting Duplicate Pull Requests in Fork-Based Development
2941 -- 2963Jingling Sun, Ting Su 0001, Kai Liu, Chao Peng, Zhao Zhang, Geguang Pu, Tao Xie 0001, Zhendong Su 0001. Characterizing and Finding System Setting-Related Defects in Android Apps
2964 -- 2979Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez. Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem
2980 -- 2995Yibo Wang, Kai Li 0017, Yuzhe Tang, Jiaqi Chen, Qi Zhang 0009, Xiapu Luo, Ting Chen 0002. Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations
2996 -- 3007Nikolaos Nikolaidis 0003, Nikolaos Mittas, Apostolos Ampatzoglou, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou. Assessing TD Macro-Management: A Nested Modeling Statistical Approach
3008 -- 3031Ziyi Zhou, Huiqun Yu, Guisheng Fan, Zijie Huang 0001, Kang Yang. Towards Retrieval-Based Neural Code Summarization: A Meta-Learning Approach

Volume 49, Issue 3

947 -- 961Yao Zhang, Xiaofei Xie, Yi Li 0008, Yun Lin 0001, Sen Chen, Yang Liu 0003, Xiaohong Li 0001. Demystifying Performance Regressions in String Solvers
962 -- 972Néstor Cataño. Program Synthesis for Cyber-Resilience
973 -- 990Maria Angela Ferrario, Emily Winter 0001. Applying Human Values Theory to Software Engineering Practice: Lessons and Implications
991 -- 1026Xinhai Zhang, Jianbo Tao, Kaige Tan, Martin Törngren, José Manuel Gaspar Sánchez, Muhammad Rusyadi Ramli, Xin Tao, Magnus Gyllenhammar, Franz Wotawa, Naveen Mohan, Mihai Nica, Hermann Felbinger. Finding Critical Scenarios for Automated Driving Systems: A Systematic Mapping Study
1027 -- 1043Markos Viggiato, Dale Paas, Chris Buzon, Cor-Paul Bezemer. Identifying Similar Test Cases That Are Specified in Natural Language
1044 -- 1063Roland Croft, Yongzheng Xie, Muhammad Ali Babar. Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review
1064 -- 1085Wuxia Jin, Dinghong Zhong, Yuanfang Cai, Rick Kazman, Ting Liu 0002. Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability
1086 -- 1101Rahul Krishna Yandrapally, Ali Mesbah 0001. Fragment-Based Test Generation for Web Apps
1102 -- 1117José-Miguel Horcas, Daniel Strüber 0001, Alexandru Burdusel, Jabier Martinez, Steffen Zschaler. We're Not Gonna Break It! Consistency-Preserving Operators for Efficient Product Line Configuration
1118 -- 1151Weifeng Pan 0001, Ming Hua 0003, Dae-Kyoo Kim, Zijiang Yang 0006. Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules
1152 -- 1170Elvys Soares, Márcio Ribeiro 0001, Rohit Gheyi, Guilherme Amaral, André L. M. Santos. Refactoring Test Smells With JUnit 5: Why Should Developers Keep Up-to-Date?
1171 -- 1187Kashumi Madampe, Rashina Hoda, John Grundy 0001. The Emotional Roller Coaster of Responding to Requirements Changes in Software Engineering
1188 -- 1231Simin Wang, LiGuo Huang, Amiao Gao, JiDong Ge, Tengfei Zhang, Haitao Feng, Ishna Satyarth, Ming Li, He Zhang 0001, Vincent Ng 0001. Machine/Deep Learning for Software Engineering: A Systematic Literature Review
1232 -- 1245Pravas Ranjan Bal, Sandeep Kumar 0004. A Data Transfer and Relevant Metrics Matching Based Approach for Heterogeneous Defect Prediction
1246 -- 1272Mattia Fazzini, Kevin Moran, Carlos Bernal-Cárdenas, Tyler Wendland, Alessandro Orso, Denys Poshyvanyk. Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps
1273 -- 1298Barbara A. Kitchenham, Lech Madeyski, David Budgen. SEGRESS: Software Engineering Guidelines for REporting Secondary Studies
1299 -- 1322Kenji Tei, Yasuyuki Tahara, Akihiko Ohsuga. Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems
1323 -- 1341Ramy Shahin, Murad Akhundov, Marsha Chechik. Annotative Software Product Line Analysis Using Variability-Aware Datalog
1342 -- 1358George G. Cabral, Leandro L. Minku. Towards Reliable Online Just-in-Time Software Defect Prediction
1359 -- 1373Giorgio Di Tizio, Michele Armellini, Fabio Massacci. Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
1374 -- 1396Dag I. K. Sjøberg, Gunnar Rye Bergersen. Construct Validity in Software Engineering

Volume 49, Issue 2

473 -- 484Youssef Esseddiq Ouatiti, Mohammed Sayagh, Noureddine Kerzazi, Ahmed E. Hassan. An Empirical Study on Log Level Prediction for Multi-Component Systems
485 -- 497Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao. Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks
498 -- 528Neng Zhang 0001, Ying Zou 0001, Xin Xia 0001, Qiao Huang, David Lo 0001, Shanping Li. Web APIs: Features, Issues, and Expectations - A Large-Scale Empirical Study of Web APIs From Two Publicly Accessible Registries Using Stack Overflow and a User Survey
529 -- 548Yang Yue, Yi Wang, David F. Redmiles. Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer's Early Career
549 -- 563Jesús Manuel Almendros-Jiménez, Antonio Becerra-Terón, Mercedes G. Merayo, Manuel Núñez 0001. Using Metamorphic Testing to Improve the Quality of Tags in OpenStreetMap
564 -- 585Jianlei Chi, Yu Qu, Ting Liu 0002, Qinghua Zheng, Heng Yin 0001. SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning
586 -- 610Shiran Liu, Zhaoqiang Guo, Yanhui Li, Chuanqi Wang, Lin Chen 0015, Zhongbin Sun, Yuming Zhou, Baowen Xu. Inconsistent Defect Labels: Essence, Causes, and Influence
611 -- 625Michael Fu, Chakkrit Tantithamthavorn. GPT2SP: A Transformer-Based Agile Story Point Estimation Approach
626 -- 645Haytham Hijazi, João Durães, Ricardo Couceiro, João Castelhano, Raul Barbosa, Júlio Medeiros, Miguel Castelo-Branco, Paulo de Carvalho 0001, Henrique Madeira. Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension
646 -- 666Liyan Song, Leandro L. Minku. A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development
667 -- 683Sen Chen, Lingling Fan 0003, Chunyang Chen, Yang Liu 0003. Automatically Distilling Storyboard With Rich Features for Android Apps
684 -- 698Dongyang Zhan, Xiangzhan Yu, Hongli Zhang 0001, Lin Ye. ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis
699 -- 718Marthe Nordengen Berntzen, Rashina Hoda, Nils Brede Moe, Viktoria Stray. A Taxonomy of Inter-Team Coordination Mechanisms in Large-Scale Agile
719 -- 742Dongjie He, Jingbo Lu, Yaoqing Gao, Jingling Xue. Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis
743 -- 759Elias Eid, Nancy A. Day. Static Profiling of Alloy Models
760 -- 776Kai Gao, Zhixing Wang, Audris Mockus, Minghui Zhou. On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types
777 -- 801Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen 0002, Jiachi Chen, Tao Zhang 0001, Xiaosong Zhang 0001. Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts
802 -- 815Giulio Rossolini, Alessandro Biondi 0001, Giorgio C. Buttazzo. Increasing the Confidence of Deep Neural Networks by Coverage Analysis
816 -- 830Frank Ebbers. A Large-Scale Analysis of IoT Firmware Version Distribution in the Wild
831 -- 848Liushan Chen, Yu Pei 0001, Minxue Pan, Tian Zhang 0001, Qixin Wang, Carlo A. Furia. Program Repair With Repeated Learning
849 -- 871Xunhui Zhang, Yue Yu 0001, Georgios Gousios, Ayushi Rastogi. Pull Request Decisions Explained: An Empirical Overview
872 -- 882Barbara A. Kitchenham, Lech Madeyski, David Budgen. How Should Software Engineering Secondary Studies Include Grey Material?
883 -- 901Ricardo Amaro, Rúben Pereira 0001, Miguel Mira da Silva. Capabilities and Practices in DevOps: A Multivocal Literature Review
902 -- 923Shenghui Gu, Guoping Rong, He Zhang 0001, Haifeng Shen. Logging Practices in Software Engineering: A Systematic Mapping Study
924 -- 946Yutong Zhao, Lu Xiao 0001, Andre B. Bondi, Bihuan Chen 0001, Yang Liu 0003. A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects

Volume 49, Issue 12

5046 -- 5059Shuang Liu 0007, Shujie Dou, Junjie Chen 0003, Zhirun Zhang, Ye Lu. Differential Testing of Machine Translators Based on Compositional Semantics
5060 -- 5083Mukelabai Mukelabai, Kevin Hermann, Thorsten Berger, Jan-Philipp Steghöfer. FeatRacer: Locating Features Through Assisted Traceability
5084 -- 5102Dan Iorga, John Wickerson, Alastair F. Donaldson. Simulating Operational Memory Models Using Off-the-Shelf Program Analysis Tools
5103 -- 5119Shayan Noei, Heng Li 0007, Stefanos Georgiou, Ying Zou 0001. An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process
5120 -- 5138Sepehr Sharifi, Donghwan Shin 0001, Lionel C. Briand, Nathan Aschbacher. Identifying the Hazard Boundary of ML-Enabled Autonomous Systems Using Cooperative Coevolutionary Search
5139 -- 5153Giovanni Denaro, Rahim Heydarov, Ali Mohebbi 0003, Mauro Pezzè. Prevent: An Unsupervised Approach to Predict Software Failures in Production
5154 -- 5188Zhaoqiang Guo, Tingting Tan, Shiran Liu, Xutong Liu, Wei Lai, Yibiao Yang, Yanhui Li, Lin Chen 0015, Wei Dong 0006, Yuming Zhou. Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities
5189 -- 5202Rodrigo Casamayor, Carlos Cetina, Oscar Pastor 0001, Francisca Pérez 0001. Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering
5203 -- 5222Iflaah Salman, Burak Turhan, Robert Ramac, Vladimir Mandic. Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing
5223 -- 5249Bohan Liu, He Zhang 0001, Weigang Ma, Gongyuan Li, Shanshan Li, Haifeng Shen. The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation
5250 -- 5278Weifeng Sun, Meng Yan 0001, Zhongxin Liu, David Lo 0001. Robust Test Selection for Deep Neural Networks
5279 -- 5294Xi Xu, Qinghua Zheng, Zheng Yan 0002, Ming Fan 0002, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu 0002. PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks

Volume 49, Issue 11

4829 -- 4845Fan Zhang 0010, Qianmei Wu, Bohan Xuan, Yuqi Chen 0001, Wei Lin, Christopher M. Poskitt, Jun Sun 0001, Binbin Chen 0001. Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing
4846 -- 4868Nikita Mehrotra, Akash Sharma, Anmol Jindal, Rahul Purandare. Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks
4869 -- 4885Chaozheng Wang, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang 0002, Michael R. Lyu. Prompt Tuning in Code Intelligence: An Experimental Evaluation
4886 -- 4916Zhaoxuan Li, Siqi Lu, Rui Zhang 0016, Ziming Zhao 0008, Rujin Liang, Rui Xue 0001, Wenhao Li, Fan Zhang 0010, Sheng Gao 0002. VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning
4917 -- 4931Nick van Beest, Heerko Groefsema, Adrian Cryer, Guido Governatori, Silvano Colombo Tosatto, Hannah M. S. Burke. Cross-Instance Regulatory Compliance Checking of Business Process Event Logs
4932 -- 4945Nasif Imtiaz, Laurie A. Williams. Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates
4946 -- 4963César Cornejo, Germán Regis, Nazareno Aguirre, Marcelo F. Frias. A Study of the Electrum and DynAlloy Dynamic Behavior Notations
4964 -- 4987Yang Wang, Peng Zhang, Maolin Sun, Zeyu Lu, Yibiao Yang, Yutian Tang, Junyan Qian, Zhi Li 0017, Yuming Zhou. Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving
4988 -- 5007Khashayar Etemadi, Aman Sharma, Fernanda Madeiral, Martin Monperrus. Augmenting Diffs With Runtime Information
5008 -- 5026Kevin Jesse, Christoph Kuhmünch, Anand Ashok Sawant. RefactorScore: Evaluating Refactor Prone Code
5027 -- 5045César Soto-Valero, Deepika Tiwari, Tim Toady, Benoit Baudry. Automatic Specialization of Third-Party Java Dependencies

Volume 49, Issue 10

4496 -- 4509Meriel von Stein, David Shriver, Sebastian G. Elbaum. DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles
4510 -- 4525Adriano Torres, Pedro Henrique Teixeira Costa, Luis Henrique Vieira Amaral, Jonata Pastro, Rodrigo Bonifácio, Marcelo d'Amorim, Owolabi Legunsen, Eric Bodden, Edna Dias Canedo. Runtime Verification of Crypto APIs: An Empirical Study
4526 -- 4549Charaka Geethal, Marcel Böhme, Van-Thuan Pham. Human-in-the-Loop Automatic Program Repair
4550 -- 4565Michael Fu, Van Nguyen 0002, Chakkrit Kla Tantithamthavorn, Trung Le, Dinh Q. Phung. VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types
4566 -- 4593Xu Guo, Xiaoyu Song, Jiantao Zhou 0002, Feiyu Wang, Kecheng Tang. An Effective Approach to High Strength Covering Array Generation in Combinatorial Testing
4594 -- 4609Hadi Jahanshahi, Mucahit Cevik, Kianoush Mousavi, Ayse Basar. ADPTriage: Approximate Dynamic Programming for Bug Triage
4610 -- 4623Michele Guerra, Simone Scalabrino, Fausto Fasano, Rocco Oliveto. An Empirical Study on the Effectiveness of Privacy Indicators
4624 -- 4638Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang 0012, Shaoying Liu, Thar Baker. Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters
4639 -- 4655Yao Li, Tao Zhang 0001, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan. Do Pretrained Language Models Indeed Understand Software Engineering Tasks?
4656 -- 4676Yuqi Huai, Sumaya Almanee, Yuntianyi Chen, Xiafa Wu, Qi Alfred Chen, Joshua Garcia. scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning
4677 -- 4690Francesco Bertolotti, Walter Cazzola. CombTransformers: Statement-Wise Transformers for Statement-Wise Representations
4691 -- 4706Tiezhu Sun, Kevin Allix, Kisub Kim, Xin Zhou, Dongsun Kim 0001, David Lo 0001, Tegawendé F. Bissyandé, Jacques Klein. DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode
4707 -- 4730Xinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem. Fast Parametric Model Checking With Applications to Software Performability Analysis
4731 -- 4750Armstrong Foundjem, Ellis E. Eghan, Bram Adams. A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization
4751 -- 4772Shikai Guo, Haorui Lin, Jiaoru Zhao, Hui Li 0014, Rong Chen 0003, Xiaochen Li, He Jiang 0001. An Easy Data Augmentation Approach for Application Reviews Event Inference
4773 -- 4795Eduardo Santana de Almeida, Iftekhar Ahmed 0001, André van der Hoek. Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings
4796 -- 4813Kun Wang 0023, Jingyi Wang 0004, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun 0001, Peng Cheng 0007. K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs
4814 -- 4828Matias Martinez, Jean-Rémy Falleri, Martin Monperrus. Hyperparameter Optimization for AST Differencing

Volume 49, Issue 1

1 -- 23Zhongxin Liu, Xin Xia 0001, David Lo 0001, Meng Yan, Shanping Li. Just-In-Time Obsolete Comment Detection and Update
24 -- 43Aayush Garg, Milos Ojdanic, Renzo Degiovanni, Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon. Cerebro: Static Subsuming Mutant Selection
44 -- 63Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba. The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
64 -- 83Simon Larsén, Jean-Rémy Falleri, Benoit Baudry, Martin Monperrus. Spork: Structured Merge for Java With Formatting Preservation
84 -- 98Chanathip Pornprasit, Chakkrit Kla Tantithamthavorn. DeepLineDP: Towards a Deep Learning Approach for Line-Level Defect Prediction
99 -- 112Yingquan Zhao, Zan Wang, Shuang Liu 0007, Jun Sun 0001, Junjie Chen, Xiang Chen 0005. Achieving High MAP-Coverage Through Pattern Constraint Reduction
113 -- 130Yanjie Zhao, Li Li 0029, Haoyu Wang 0001, Qiang He 0001, John C. Grundy. APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps
131 -- 146Anjana Perera, Aldeida Aleti, Burak Turhan, Marcel Böhme. An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing
147 -- 165Zimin Chen, Steve Kommrusch, Martin Monperrus. Neural Transfer Learning for Repairing Security Vulnerabilities in C Code
166 -- 184Ellen Arteca, Max Schäfer, Frank Tip. Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs
185 -- 210Ying Wang 0038, Yibo Wang, Sinan Wang, Yepang Liu 0001, Chang Xu 0001, Shing-Chi Cheung, Hai Yu 0001, Zhiliang Zhu 0001. Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward
211 -- 225Marco Hoffmann, Daniel Méndez 0001, Fabian Fagerholm, Anton Luckhardt. The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges
226 -- 250Huaijin Wang, Pingchuan Ma 0004, Yuanyuan Yuan, Zhibo Liu, Shuai Wang 0011, Qiyi Tang 0003, Sen Nie, Shi Wu. Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
251 -- 267Juan M. Ferreira, Francy D. Rodríguez, Adrián Santos, Oscar Dieste, Silvia Teresita Acuña, Natalia Juristo. Impact of Usability Mechanisms: A Family of Experiments on Efficiency, Effectiveness and User Satisfaction
268 -- 287Sadia Tabassum, Leandro L. Minku, Danyi Feng. Cross-Project Online Just-In-Time Software Defect Prediction
288 -- 303Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng 0001. Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?
304 -- 324ai Liu, Shaoying Liu. Enhancing the Capability of Testing-Based Formal Verification by Handling Operations in Software Packages
325 -- 347Damian A. Tamburri, Rick Kazman, Hamed Fahimi. On the Relationship Between Organizational Structure Patterns and Architecture in Agile Teams
348 -- 363Juan C. Alonso, Alberto Martin-Lopez, Sergio Segura, José María García, Antonio Ruiz Cortés. ARTE: Automated Generation of Realistic Test Inputs for Web APIs
364 -- 383Ranci Ren, John W. Castro, Adrián Santos, Oscar Dieste, Silvia Teresita Acuña. Using the SOCIO Chatbot for UML Modelling: A Family of Experiments
384 -- 402Chengjie Lu, Yize Shi, HuiHui Zhang, Man Zhang, Tiexin Wang, Tao Yue 0002, Shaukat Ali 0001. Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions
403 -- 418Zhe Liu 0025, Chunyang Chen, Junjie Wang 0001, Yuekai Huang, Jun Hu, Qing Wang 0001. Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding
419 -- 436Emily Winter 0001, Vesna Nowack, David Bowes, Steve Counsell, Tracy Hall, Sæmundur Óskar Haraldsson, John R. Woodward. Let's Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research
437 -- 449Hao Li, Filipe Roseiro Côgo, Cor-Paul Bezemer. An Empirical Study of Yanked Releases in the Rust Package Registry
450 -- 467Leping Li, Hui Liu 0003, Kejun Li, Yanjie Jiang, Rui Sun. Generating Concise Patches for Newly Released Programming Assignments