Abstract is missing.
- Symbolic Execution with Value-Range Analysis for Floating-Point Exception DetectionXingming Wu, Lian Li, Jian Zhang. 1-10 [doi]
- Efficient Global Search for Inputs Triggering High Floating-Point InaccuraciesXin Yi, Liqian Chen, Xiaoguang Mao, Tao Ji. 11-20 [doi]
- A Framework for Array Invariants Synthesis in Induction-Loop ProgramsBin Li, Juan Zhai, Zhenhao Tang, Enyi Tang, Jianhua Zhao. 21-30 [doi]
- Cultural Factors Influencing International Collaborative Software Engineering Education in ChinaYuqing Wang, Jouni Markkula, Jing Jiang. 31-40 [doi]
- Text-Mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature ReviewLuyi Feng, Yin Kia Chiam, Sin Kuang Lo. 41-50 [doi]
- A Mapping Study on Mining Software ProcessLiming Dong, Bohan Liu, Zheng Li, Ou Wu, Muhammad Ali Babar, Bingbing Xue. 51-60 [doi]
- Extracting Traceability between Predicates in Event-B RefinementShinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi, Shinichi Honiden. 61-70 [doi]
- How PHP Releases Are Adopted in the Wild?Jukka Ruohonen, Ville Leppänen. 71-80 [doi]
- An Improved Approach to Traceability Recovery Based on Word EmbeddingsTeng Zhao, Qinghua Cao, Qing Sun. 81-89 [doi]
- Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class LevelLov Kumar, Ashish Sureka. 90-99 [doi]
- CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGsMin Wang, Pengcheng Wang, Yun Xu. 100-109 [doi]
- Detecting Full Initialization Points of Objects to Support Code RefactoringsGirish Maskeri Rama, Raghavan Komondoor. 110-119 [doi]
- A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network EnvironmentBiling Lin, Xiao Chen 0003, Liangmin Wang. 120-129 [doi]
- Noff: A Novel Extendible Parallel Library for High-Performance Network Traffic MonitoringYanchao Jing, Guangtao Xue, Shiyou Qian. 130-139 [doi]
- A Reusable Framework for Modeling and Verifying In-Vehicle Networking Systems in the Presence of CAN and FlexRayXiaoyun Guo, Hsin-hung Lin, Toshiaki Aoki, Yuki Chiba. 140-149 [doi]
- Using Branch Frequency Spectra to Evaluate Operational CoverageMarc Brünink, David S. Rosenblum. 150-159 [doi]
- Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development EnvironmentsJung-Hyun Kwon, In-Young Ko. 160-168 [doi]
- A Regression Test Case Prioritization Algorithm Based on Program Changes and Method Invocation RelationshipWenhao Fu, Huiqun Yu, Guisheng Fan, Xiang Ji, Xin Pei. 169-178 [doi]
- A Degree-Driven Approach to Design Pattern Mining Based on Graph MatchingPing Zhang, Dongjin Yu, Jiaojiao Wang. 179-188 [doi]
- Correlation between the Frequent Use of Gang-of-Four Design Patterns and Structural ComplexityShahid Hussain, Jacky Keung, Arif Ali Khan, Kwabena Ebo Bennin. 189-198 [doi]
- Method Level Text Summarization for Java Code Using Nano-PatternsSawan Rai, Tejaswini Gaikwad, Sparshi Jain, Atul Gupta. 199-208 [doi]
- The Accompanying Behavior Model and Implementation Architecture of Autonomous Robot SoftwareShuo Yang, XinJun Mao, Zhe Liu, Sen Yang, Jiangtao Xue, Zixi Xu. 209-218 [doi]
- Flexible Components for Development of Embedded Systems with GPUsGabriel Campeanu, Jan Carlson, Séverine Sentilles. 219-228 [doi]
- A Dual-Loop Control Model and Software Framework for Autonomous Robot SoftwareZhe Liu, XinJun Mao, Shuo Yang. 229-238 [doi]
- Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory DumpShubham Tripathi, Gustavo Grieco, Sanjay Rawat 0001. 239-248 [doi]
- Modeling and Verifying Identity Authentication Security of HDFS Using CSPChao Xu, Huibiao Zhu, Wanling Xie. 259-268 [doi]
- Transfer Learning for Cross-Platform Software Crowdsourcing RecommendationShuhan Yan, Beijun Shen, Wenkai Mo, Ning Li. 269-278 [doi]
- Value-Based Decision-Making Using a Web-Based Tool: A Multiple Case StudyVitor Freitas, Mirko Perkusich, Emilia Mendes, Pilar Rodríguez, Markku Oivo. 279-288 [doi]
- A Goal-Driven Framework in Support of Knowledge ManagementGuoping Rong, Xinbei Liu, Shenghui Gu, Dong Shao. 289-297 [doi]
- Extracting Insights from the Topology of the JavaScript Package EcosystemNuttapon Lertwittayatrai, Raula Gaikovina Kula, Saya Onoue, Hideaki Hata, Arnon Rungsawang, Pattara Leelaprute, Kenichi Matsumoto. 298-307 [doi]
- Boundary Spanners in Open Source Software Development: A Study of Python Email ArchivesPankajeshwara N. Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger. 308-317 [doi]
- An Empirical Study on Downstream Workarounds for Cross-Project BugsHui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu. 318-327 [doi]
- Exploring Metadata in Bug Reports for Bug LocalizationXiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu, Jian Lu. 328-337 [doi]
- Improving Bug Localization with an Enhanced Convolutional Neural NetworkYan Xiao, Jacky Keung, Qing Mi, Kwabena Ebo Bennin. 338-347 [doi]
- An Empirical Study on Real Bugs for Machine Learning ProgramsXiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang, Bin Li. 348-357 [doi]
- Analysis of the Textual Content of Mined Open Source Usability Defect ReportsNor Shahida Mohamad Yusop, Jean-Guy Schneider, John Grundy, Rajesh Vasa. 358-367 [doi]
- Mining API Type Specifications for JavaScriptShuai Wang, Wensheng Dou, Chushu Gao, Jun Wei 0001, Tao Huang 0001. 368-377 [doi]
- Mining Handover Process in Open Source Development: An Exploratory StudyLiming Dong, Bohan Liu, Zheng Li, Bingbing Xue, Danni Chen, Tiange Chen. 378-387 [doi]
- Identifying Security Requirements Based on Linguistic Analysis and Machine LearningTong Li. 388-397 [doi]
- Modeling OSEK/VDX OS Requirements in CYoohee Chung, Dongwoo Kim, Yunja Choi. 398-407 [doi]
- An Analysis Method of Safety Requirements for Automotive Software SystemsMoe Matsubara, Mikio Aoyama. 408-416 [doi]
- Domain-Specific Language Facilitates Scheduling in Model CheckingNhat-Hoa Tran, Yuki Chiba, Toshiaki Aoki. 417-426 [doi]
- Formalization and Verification of the PSTM ArchitectureAilun Liu, Miroslav Popovic, Huibiao Zhu. 427-435 [doi]
- Synthesizing Pareto Optimal Decision for Autonomic Clouds Using Stochastic Games Model CheckingAzlan Ismail, Marta Kwiatkowska. 436-445 [doi]
- On Adequate Behavior-Based Architecture Conformance ChecksAna Nicolaescu, Horst Lichter, Veit Hoffmann. 446-455 [doi]
- From Abstract to Concrete Repairs of Model Inconsistencies: An Automated ApproachRoland Kretschmer, Djamel Eddine Khelladi, Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed. 456-465 [doi]
- From Monolith to Microservices: A Dataflow-Driven ApproachRui Chen, Shanshan Li, Zheng Li. 466-475 [doi]
- Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior BirthmarkCangzhou Yuan, Shenhong Wei, Chengjian Zhou, Jiangtao Guo, Hongyue Xiang. 476-485 [doi]
- A Comprehensive Evaluation of Software Reliability Modeling Based on Marshall-Olkin Type Fault-Detection Time DistributionMiho Kawasaki, Hiroyuki Okamura, Tadashi Dohi. 486-494 [doi]
- Failure Prediction in Crowdsourced Software DevelopmentAbdullah Khanfor, Ye Yang, Gregg Vesonder, Guenther Ruhe, Dave Messinger. 495-504 [doi]
- What-If Model Construction and Validation of Web Systems Based on Log MiningJianpeng Hu, Linpeng Huang, Juan Huang, Tianqi Sun, Yingjun Ouyang. 505-512 [doi]
- Automatic Test Generation of Large Boolean Expressions in Computer Based Interlocking SystemZhiwei Li, Jing Liu, Haiying Sun, Tingliang Zhou, Junfeng Sun. 513-520 [doi]
- An Empirical Study to Revisit Productivity across Different Programming LanguagesYingling Li, Lin Shi, Jun Hu, Qing Wang, Jian Zhai. 526-533 [doi]
- A Systematic Review of Logging Practice in Software EngineeringGuoping Rong, Qiuping Zhang, Xinbei Liu, Shenghui Gu. 534-539 [doi]
- Identifying Terms in Open Source Software License TextsGeorgia M. Kapitsaki, Demetris Paschalides. 540-545 [doi]
- SoS GaP Slicer: Slicing SoS Goal and PRISM Models for Change-Responsive Verification of SoSJiyoung Song, Young Min Baek, Mingyu Jin, Eunkyoung Jee, Doo-Hwan Bae. 546-551 [doi]
- Steiner Tree Based Recommendation System for Combination of APIs and IoT DevicesTomohiro Ohtake, Yohei Seki, Toshihiro Kodaka. 552-557 [doi]
- Software Optimizations of Multiple Sets Intersection via SIMD InstructionsXingshen Song, Yuexiang Yang, Yu Jiang. 558-563 [doi]
- Multi-Perspective Visualization to Assist Code Change ReviewChen Wang, Xiaoyuan Xie, Peng Liang, Jifeng Xuan. 564-569 [doi]
- tgp: A Task-Granularity Profiler for the Java Virtual MachineEduardo Rosales, Andrea Rosà, Walter Binder. 570-575 [doi]
- An Exploratory Experiment on Metamodel-Transformation Co-EvolutionDjamel Eddine Khelladi, Horacio Hoyos Rodriguez, Roland Kretschmer, Alexander Egyed. 576-581 [doi]
- Feature Evolution and Reuse - An Exploratory Study of EclipseAmjed Tahir, Sherlock A. Licorish, Stephen G. MacDonell. 582-587 [doi]
- iLSE: An Intelligent Web-Based System for Log Structuring and ExtractionSahan Serasinghe, Haifeng Shen, David Chen. 588-593 [doi]
- How Do Programmers Maintain Concurrent Code?Feiyue Yu, Hao Zhong, Beijun Shen. 594-599 [doi]
- Formal Definitions for Design Spaces and TracesJudy Bowen, Anke Dittmar. 600-605 [doi]
- Generating Equality Loop Invariants with Functions Based on Random Testing, Constraint Solving and VerificationMengjun Li. 606-611 [doi]
- Characterising Sound Visualisations of Specifications Using Micro-Charts and RefinementColin Pilbrow, Steve Reeves. 612-617 [doi]
- Writing Concurrent Java Programs Based on CafeOBJ SpecificationsXuan-Linh Ha, Kazuhiro Ogata 0001. 618-623 [doi]
- An Evaluation of Selection Methods for Time-Aware Effort EstimationSousuke Amasaki, Chris Lokan. 624-629 [doi]
- Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction ModelsKwabena Ebo Bennin, Jacky Keung, Akito Monden. 630-635 [doi]
- Identifying Textual Features of High-Quality Questions: An Empirical Study on Stack OverflowQing Mi, Yujin Gao, Jacky Keung, Yan Xiao, Solomon Mensah. 636-641 [doi]
- Facilitating Scenario-Based Program Comprehension with Topic ModelsTianxia Wang, Yan Liu. 642-647 [doi]
- How Do Code Refactoring Activities Impact Software Developers' Sentiments? - An Empirical Investigation Into GitHub CommitsNavdeep Singh, Paramvir Singh. 648-653 [doi]
- CCFinderSW: Clone Detection Tool with Flexible Multilingual TokenizationYuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue. 654-659 [doi]
- Automatic Generation of Monitoring Code for Model Based Analysis of Runtime BehaviourMichael Szvetits, Uwe Zdun. 660-665 [doi]
- Code Suggestion of Method Call Statements Using a Source Code CorpusTetsuo Yamamoto. 666-671 [doi]
- On the Use of Mined Stack Traces to Improve the Soundness of Statically Constructed Call GraphsLi Sui, Jens Dietrich, Amjed Tahir. 672-676 [doi]
- Test Environment Construction Method Using Parameterized Test EnvironmentsDong Hun Song, Yongjin Seo, Hyeon Soo Kim. 677-682 [doi]
- Optimized Test Data Generation for RESTful Web ServiceJing Liu, Wenjie Chen. 683-688 [doi]
- Towards an Improvement of Bisection-Based Adaptive Random TestingChengying Mao, Xuzheng Zhan. 689-694 [doi]
- A Novel Tool for Automatic GUI Layout TestingKristian Fjeld Hasselknippe, Jingyue Li. 695-700 [doi]
- Multi-Process Runtime Verification for AndroidHaiyang Sun, Alexander North, Walter Binder. 701-706 [doi]
- Toward Detection of Abnormal Behaviors in Timing and Security RequirementsDanielle Gaither, Hyunsook Do, Barrett R. Bryant. 707-712 [doi]
- An Ontological Approach to Elicit Safety RequirementsLuciana Provenzano, Kaj Hänninen, Jiale Zhou, Kristina Lundqvist. 713-718 [doi]
- Towards Semantic-Aware Collaborations in Systems EngineeringLaurent Wouters, Stephen Creff, Emma Effa Bella, Ali Koudri. 719-724 [doi]
- Automated Analysis of Multi-View Software ArchitecturesChih-Hong Cheng, Yassine Hamza, Harald Ruess. 725-730 [doi]
- Structuring the Knowledge for Software Process Appraisal towards Semi-Automated SupportSuppasit Roongsangjan, Thanwadee Sunetnanta, Pattanasak Mongkolwat. 731-736 [doi]
- Factors Influencing Productivity of Agile Software Development Teamwork: A Qualitative System Dynamics ApproachIsrat Fatema, Kazi Sakib. 737-742 [doi]
- Clockwerk: A Predictable and Efficient Extension of Logical Execution Time ModelBo Wan, Xi Li, Kaiqi Zhou, Haizhao Luo, Chao Wang, Xianglan Chen, Xuehai Zhou. 743-744 [doi]
- A Simulation Model of Kanban Software ProcessHaojie Gong, Bohan Liu, Dong Shao. 745-746 [doi]
- Interface Driven Code Clone DetectionMd Rakib Hossain Misu, Kazi Sakib. 747-748 [doi]
- Retrieving Self-Executable and Functionally Correct Code to Improve Source Code SearchAbdus Satter, M. G. Muntaqeem, Nadia Nahar, Kazi Sakib. 749-750 [doi]
- Knowledge Based Optimization for Distributed Real-Time SystemsMahieddine Dellabani, Jacques Combaz, Saddek Bensalem, Marius Bozga. 751-756 [doi]