Abstract is missing.
- The OIRE Method - Overview and Initial ValidationHuishi Yin, Dietmar Pfahl. 1-10 [doi]
- A Bird's Eye View on Requirements Engineering and Machine LearningTahira Iqbal, Parisa Elahidoost, Levi Lucio. 11-20 [doi]
- Tool Support for Restricted Use Case Specification: Findings from a Controlled ExperimentMarkus Weninger, Paul Grünbacher, HuiHui Zhang, Tao Yue 0002, Shaukat Ali 0001. 21-30 [doi]
- Actual Use of Architectural Patterns in Microservices-Based Open Source ProjectsGastón Marquez, Hernán Astudillo. 31-40 [doi]
- Development of a User-Interactive Agent Simulation System with the Blackboard Architectural PatternDavid Tai, Power Wu, Alan Liu. 41-48 [doi]
- Architecture Patterns, Quality Attributes, and Design Contexts: How Developers Design with ThemTingting Bi, Peng Liang 0001, Antony Tang. 49-58 [doi]
- Automatically Generating API Usage Patterns from Natural Language QueriesYanfei Tian, Xu Wang, Hailong Sun 0001, Yi Zhao, Chunbo Guo, Xudong Liu. 59-68 [doi]
- A JavaScript Transpiler for Escaping from Complicated Usage of Cloud Services and APIsKosaku Kimura, Atsuji Sekiguchi, Shridhar Choudhary, Tadahiro Uehara. 69-78 [doi]
- SLAMPA: Recommending Code Snippets with Statistical Language ModelShufan Zhou, Hao Zhong, Beijun Shen. 79-88 [doi]
- Formal Specification and Model Checking of the Walter-Welch-Vaidya Mutual Exclusion Protocol for Ad Hoc Mobile NetworksYati Phyo, Kazuhiro Ogata 0001. 89-98 [doi]
- Specification and Verification of Invariant Properties of Transition SystemsDaniel Gâinâ, Ionut Tutu, Adrián Riesco. 99-108 [doi]
- Accelerated Finite State Machine Test Execution Using GPUsVanya Yaneva, Arnav Kapoor, Ajitha Rajan, Christophe Dubach. 109-118 [doi]
- A Thread Modularity Approach for Verification Concurrent Software Based on Abstract InterpretationQingyu Jiang, Jing Liu, Haodong Hu. 119-128 [doi]
- Scalable Verification Framework for C ProgramGuang Chen, Dexi Wang, Tianchi Li, Chao Zhang, Ming Gu 0001, Jiaguang Sun. 129-138 [doi]
- End-to-End Automated Verification for OS KernelsJizheng Ding, Xiaoran Zhu, Jian Guo. 139-148 [doi]
- Visualizing Test Diversity to Support Test OptimisationFrancisco Gomes de Oliveira Neto, Robert Feldt, Linda Erlenhov, José Benardi de Souza Nunes. 149-158 [doi]
- A Dynamic Fitness Function Based on Branch Hardness for Search Based Software TestingZiming Zhu, Li Jiao, Xiong Xu. 159-168 [doi]
- Finding a Boundary between Valid and Invalid Regions of the Input SpaceBogdan Marculescu, Robert Feldt. 169-178 [doi]
- On the Use of Automated Log Clustering to Support Effort Reduction in Continuous EngineeringCarl Martin Rosenberg, Leon Moonen. 179-188 [doi]
- NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis CapabilityShuqi Chi, Shanshan Li, Yong Guo, Wei Dong, Zhouyang Jia, Haochen He, Qing Liao. 189-198 [doi]
- Power-Aware Allocation of Fault-Tolerant Multirate AUTOSAR ApplicationsNesredin Mahmud, Guillermo Rodríguez-Navas, Hamid Faragardix, Saad Mubeen, Cristina Seceleanu. 199-208 [doi]
- A Review on Software Architectures for Heterogeneous PlatformsHugo Sica de Andrade, Ivica Crnkovic. 209-218 [doi]
- Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services QuarantineWeijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu. 219-228 [doi]
- PyReload: Dynamic Updating of Python Programs by ReloadingWei Tang, Min Zhang. 229-238 [doi]
- Relax: Automatic Contention Detection and Resolution for Configuration Related Performance TuningZhimin Feng, Shanshan Li, Xiangke Liao, Xiaodong Liu, Yunfeng Li, ShuLin Zhou. 239-248 [doi]
- A Multi-Goal Oriented Approach for Adaptation Rules GenerationYang Liu, Zhengyin Chen, Wenpin Jiao. 249-257 [doi]
- An Empirical Study of SDK Credential Misuse in iOS AppsHaohuang Wen, Juanru Li, Yuanyuan Zhang, Dawu Gu. 258-267 [doi]
- Accelerating Automated Android GUI Exploration with Widgets GroupingChun Cao, Hongjun Ge, Tianxiao Gu, Jing Deng, Ping Yu, Jian Lu. 268-277 [doi]
- ELEGANT: Towards Effective Location of Fragmentation-Induced Compatibility Issues for Android AppsCong Li, Chang Xu 0001, Lili Wei, Jue Wang, Jun Ma, Jian Lu. 278-287 [doi]
- BCFinder: A Lightweight and Platform-Independent Tool to Find Third-Party Components in BinariesWei Tang, Du Chen, Ping Luo. 288-297 [doi]
- Scalable and Extensible Static Memory Safety Analysis with Summary over Access PathGuang Chen, Min Zhou, Jiaguang Sun, Xiaoyu Song. 298-304 [doi]
- Codifying Hidden Dependencies in Legacy J2EE ApplicationsGeoffrey Hecht, Hafedh Mili, Ghizlane El-Boussaidi, Anis Boubaker, Manel Abdellatif, Yann-Gaël Guéhéneuc, Anas Shatnawi, Jean Privat, Naouel Moha. 305-314 [doi]
- Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical StudyHuihui Liu, Yijun Yu, Bixin Li, Yibiao Yang, Ru Jia. 315-324 [doi]
- Analyzing Code Comments to Boost Program ComprehensionYusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow. 325-334 [doi]
- A Top-k Learning to Rank Approach to Cross-Project Software Defect PredictionFeng Wang, Jinxiao Huang, Yutao Ma. 335-344 [doi]
- Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and ExposuresQiuyuan Chen, Lingfeng Bao, Li Li, Xin Xia 0001, Liang Cai. 345-354 [doi]
- A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability PredictionKazi Zakia Sultana, Byron J. Williams, Amiangshu Bosu. 355-364 [doi]
- Malicious JavaScript Code Detection Based on Hybrid AnalysisXincheng He, Lei Xu 0003, Chunliu Cha. 365-374 [doi]
- Predicting Which Pull Requests Will Get Reopened in GitHubAbdillah Mohamed, Li Zhang, Jing Jiang, Ahmed Ktob. 375-385 [doi]
- How Are Issue Units Linked? Empirical Study on the Linking Behavior in GitHubLisha Li, Zhilei Ren, Xiaochen Li, Weiqin Zou, He Jiang. 386-395 [doi]
- Why Did This Reviewed Code Crash? An Empirical Study of Mozilla FirefoxLe An, Foutse Khomh, Shane McIntosh, Marco Castelluccio. 396-405 [doi]
- Multi-Discussing across Issues in GitHub: A Preliminary StudyDongyang Hu, Tao Wang, Junsheng Chang, Gang Yin, Yang Zhang. 406-415 [doi]
- Detecting Duplicate Bug Reports with Convolutional Neural NetworksQi Xie, Zhiyuan Wen, Jieming Zhu, Cuiyun Gao, Zibin Zheng. 416-425 [doi]
- STAR: A Specialized Tagging Approach for Docker RepositoriesKang Yin, Wei Chen 0018, Jiahong Zhou, Guoquan Wu, Jun Wei 0001. 426-435 [doi]
- Understanding the Reputation Differences between Women and Men on Stack OverflowYi Wang. 436-444 [doi]
- SOQDE: A Supervised Learning Based Question Difficulty Estimation Model for Stack OverflowSk Adnan Hassan, Dipto Das, Anindya Iqbal, Amiangshu Bosu, Rifat Shahriyar, Toufique Ahmed. 445-454 [doi]
- Assumptions in OSS Development: An Exploratory Study through the Hibernate Developer Mailing ListZhuang Xiong, Peng Liang 0001, Chen Yang 0007, Tianqing Liu. 455-464 [doi]
- Improving Development Practices through Experimentation: An Industrial TDD CaseAdrian Santos, Jaroslav Spisak, Markku Oivo, Natalia Juristo. 465-473 [doi]
- What Do Agile Teams Find Important for Their Success?Hiva Alahyari, Jennifer Horkoff, Olliver Matsson, Kim Egenvall. 474-483 [doi]
- Multi-Objective Iteration Planning in Agile DevelopmentWisam Haitham Abbood Al-Zubaidi, Hoa Khanh Dam, Morakot Choetkiertikul, Aditya Ghose. 484-493 [doi]
- What Aspects Do Non-Functional Requirements in App User Reviews Describe? An Exploratory and Comparative StudyTianlu Wang, Peng Liang 0001, Mengmeng Lu. 494-503 [doi]
- Kurtosis and Skewness Adjustment for Software Effort EstimationSeiji Fukui, Akito Monden, Zeynep Yücel. 504-511 [doi]
- Adopting MBSE in Construction Equipment Industry: An Experience ReportJagadish Suryadevara, Saurabh Tiwari 0001. 512-521 [doi]
- Migration to Software Product Line Development of Automotive Body Parts by Architectural Refinement with Feature AnalysisYoichi Nishiura, Masaki Asano, Tsuneo Nakanishi. 522-531 [doi]
- Model-Based Personalized Visualization System for Monitoring Evolving Industrial Cyber-Physical SystemAitziber Iglesias, Tao Yue 0002, Cristóbal Arellano, Shaukat Ali 0001, Goiuria Sagardui. 532-541 [doi]
- A Design Method for Domain-Specific Models of Software Requirements Specification Based on Stakeholders' ConcernsAkiyuki Takoshima, Mikio Aoyama. 542-550 [doi]
- MatGap: A Systematic Approach to Perform Match and Gap Analysis among SBVR-Based Domain Specific Business RulesSayandeep Mitra, Chandan Prakash, Shayak Chakraborty, Pavan Kumar Chittimalli. 551-560 [doi]
- Team Composition and Team Factors in Software Engineering: An Interview Study of Project-Based OrganizationsDora Dzvonyar, Bernd Bruegge. 561-570 [doi]
- Extracting Candidates of Microservices from Monolithic Application CodeManabu Kamimura, Keisuke Yano, Tomomi Hatano, Akihiko Matsuo. 571-580 [doi]
- Providing Technical Software Documentation as a Service - An Industrial Experience ReportGeorg Buchgeher, Claus Klammer, Bernhard Dorninger, Albin Kern. 581-590 [doi]
- Transitioning from Manual to Automated Software Regression Testing: Experience from the Banking DomainAbdurrahman Akin, Serafettin Senturk, Vahid Garousi. 591-597 [doi]
- A Quality Model and Its Quantitative Evaluation Method for Web APIsRieko Yamamoto, Kyoko Ohashi, Masahiro Fukuyori, Kosaku Kimura, Atsuji Sekiguchi, Ryuichi Umekawa, Tadahiro Uehara, Mikio Aoyama. 598-607 [doi]
- Software and Infrastructure Log-Based Framework for Identifying the Causes of System FaultsNoriko Hanakawa, Masaki Obana. 608-617 [doi]
- unjQuerify: Migration of jQuery Snippets to Modern Vanilla JavaScript APIsDereck J. Bridie, Shinsuke Matsumoto, Shinji Kusumoto. 618-622 [doi]
- An Automatic Approach to Validating Log Levels in JavaTae-young Kim, Suntae Kim, Cheol-Jung Yoo, Soohwan Cho, Sooyong Park. 623-627 [doi]
- DeepGraph: A PyCharm Tool for Visualizing and Understanding Deep Learning ModelsQiang Hu, Lei Ma, Jianjun Zhao. 628-632 [doi]
- lpt: A Tool for Tuning the Level of Parallelism of Spark ApplicationsEduardo Rosales, Andrea Rosà, Walter Binder. 633-637 [doi]
- Applying Gamification and Posing to Software DevelopmentMasateru Tsunoda, Hirotaka Yumoto. 638-642 [doi]
- A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method AnalysisHirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 643-647 [doi]
- Program Analysis and Graph Pattern Matching to Reveal Modularity and Potential for ParallelismAndrea Fornaia, Misael Mongiovì, Giuseppe Pappalardo, Emiliano Tramontana. 648-652 [doi]
- An Investigation of the Relationship between Extract Method and Change Metrics: A Case Study of JEditEunjong Choi, Daiki Tanaka, Norihiro Yoshida, Kenji Fujiwara, Daniel Port, Hajimu Iida. 653-657 [doi]
- LSRepair: Live Search of Fix Ingredients for Automated Program RepairKui Liu, Anil Koyuncu, Kisub Kim, Dongsun Kim 0001, Tegawendé F. Bissyandé. 658-662 [doi]
- Automated Code-Based Test Selection for Software Product Line Regression TestingPilsu Jung, Sungwon Kang, Jihyun Lee, Taehyun Park. 663-667 [doi]
- ICAT: An IoT Device Compatibility Testing ToolWoei-kae Chen, Chien-Hung Liu, William W.-Y. Liang, Ming-Yi Tsai. 668-672 [doi]
- Multilingual Detection of Code Clones Using ANTLR Grammar DefinitionsYuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue. 673-677 [doi]
- Verification of CPS Based on Control Loop Using Model CheckingYoshitaka Aoki, Shinpei Ogata, Kazuki Kobayashi, Hiroyuki Nakagawa. 678-682 [doi]
- xSHS: An Executable Domain-Specific Modeling Language for Modeling Stochastic and Hybrid Behaviors of Cyber-Physical SystemsChunlin Guan, Yi Ao, Dehui Du, Frédéric Mallet. 683-687 [doi]
- Large-Scale Evaluation of the Efficiency of Runtime-Verification Tools in the WildOmar Javed, Walter Binder. 688-692 [doi]
- Hybrid Testing Environment of Execution Testing and Model Checking for Product Line ApproachYusuke Aoyama, Takeru Kuroiwa, Noriyuki Kushiro. 693-694 [doi]
- A Visualization System of the Contribution of Learners in Software Development PBL Using GitHubYutsuki Miyashita, Atsuo Hazeyama, Hiroaki Hashiura, Masayuki Goto, Shigeichi Hirasawa. 695-696 [doi]
- kGenProg: A High-Performance, High-Extensibility and High-Portability APR SystemYoshiki Higo, Shinsuke Matsumoto, Ryo Arima, Akito Tanikado, Keigo Naitou, Junnosuke Matsumoto, Yuya Tomida, Shinji Kusumoto. 697-698 [doi]
- Investigating Vector-Based Detection of Code Clones Using BigCloneBenchKazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue. 699-700 [doi]
- Automatic Extraction of Reorganization Impact Focusing on Derivation Relationship of Analogous Actor Terms in Requirements SpecificationHiroki Takahashi, Norifumi Nomura, Tadahisa Kondou, Mari Inoki. 701-702 [doi]
- Improving Bug Localization with Character-Level Convolutional Neural Network and Recurrent Neural NetworkYan Xiao, Jacky Keung. 703-704 [doi]
- Automated Repair of Data Faults in Templated SpreadsheetsXiaoyan Wang, Quan Yu, Guowei Yang. 705-706 [doi]
- Fuse: An Architecture for Smart Contract Fuzz Testing ServiceW. K. Chan, Bo Jiang. 707-708 [doi]
- Text-Based Testing Environment for Voice-Based ServicesEungjun Kim, Hoijin Yoon, Wonuk Cha. 709-710 [doi]
- Automatic Generation of Pseudocode with Attention Seq2seq ModelShaofeng Xu, Yun Xiong. 711-712 [doi]
- Minimising Changes When Refactoring Applications to Run Multiple ThreadsEmiliano Tramontana. 713-714 [doi]
- An Empirical Study on the Reliability of the Web API DocumentMasaki Hosono, Hironori Washizaki, Yoshiaki Fukazawa, Kiyoshi Honda. 715-716 [doi]
- A Preprocessing Method of Test Input Generation by Symbolic Execution for Enterprise ApplicationHiroki Ohbayashi, Hideyuki Kanuka, Chikashi Okamoto. 717-718 [doi]
- Importance Measurement for the Integration of Construction CALS Systems in South KoreaNam-Gon Kim, Seong-Yun Jeong. 719-720 [doi]
- Reducing Redundant Checking for Visual Regression TestingYu Adachi, Haruto Tanno, Yu Yoshimura. 721-722 [doi]
- An Exploratory Study to Identify Similar Patches: A Case Study in Modern Code ReviewDong Wang, Raula Gaikovina Kula, Kenichi Matsumoto. 723-724 [doi]
- Recommending Similar Bug Reports: A Novel Approach Using Document Embedding ModelDongyang Hu, Ming Chen, Tao Wang, Junsheng Chang, Gang Yin, Yue Yu, Yang Zhang. 725-726 [doi]