Abstract is missing.
- BLINKER: A Blockchain-Enabled Framework for Software ProvenanceR. P. Jagadeesh Chandra Bose, Kanchanjot Kaur Phokela, Vikrant Kaulgud, Sanjay Podder. 1-8 [doi]
- SoReady: An Extension of the Test and Defect Coverage-Based Analytics Model for Pull-Based Software DevelopmentSharifah Mashita Syed-Mohamad, Nur Shazwani Md. Akhir. 9-14 [doi]
- A Domain Experts Centric Approach to Formal Requirements Modeling and V&V of Embedded Control SoftwareWeikai Miao, Qianqian Yan, Yihao Huang, Jincao Feng, Hanyue Zheng. 15-22 [doi]
- Enhancing Unsupervised Requirements Traceability with Sequential SemanticsLei Chen, Dandan Wang, Junjie Wang 0001, Qing Wang 0001. 23-30 [doi]
- MBRP: Model-Based Requirements Prioritization Using PageRank AlgorithmMuhammad Abbas, Irum Inayat, Naila Jan, Mehrdad Saadatmand, Eduard Paul Enoiu, Daniel Sundmark. 31-38 [doi]
- Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid ApproachShiheng Wang, Tong Li, Zhen Yang. 39-46 [doi]
- Towards the Mechanized Semantics and Refinement of UML Class DiagramsFeng Sheng, Huibiao Zhu, Zongyuan Yang. 47-54 [doi]
- Formalizing Architectural Rules with Ontologies - An Industrial EvaluationSandra Schröder, Georg Buchgeher. 55-62 [doi]
- Adaptive Random Testing for XSS VulnerabilityChengcheng Lv, Long Zhang, Fanping Zeng, Jian Zhang 0001. 63-69 [doi]
- Multiple Program Analysis Techniques Enable Precise Check for SEI CERT C Coding StandardThu-Trang Nguyen, Toshiaki Aoki, Takashi Tomita, Iori Yamada. 70-77 [doi]
- VISION: Evaluating Scenario Suitableness for DNN Models by Mirror SynthesisZiqi Chen, Huiyan Wang, Chang Xu 0001, Xiaoxing Ma, Chun Cao. 78-85 [doi]
- Integrating Static Program Analysis Tools for Verifying Cautions of MicrocontrollerThuy Nguyen, Toshiaki Aoki, Takashi Tomita, Junpei Endo. 86-93 [doi]
- A Mutation-Based Approach for Assessing Weight Coverage of a Path PlannerThomas Laurent 0003, Paolo Arcaini, Fuyuki Ishikawa, Anthony Ventresque. 94-101 [doi]
- Verification of CTL_BDI Properties by Symbolic Model CheckingRan Chen, Wenhui Zhang. 102-109 [doi]
- Semi-Automatic Repair of Over-Constrained Models for Combinatorial Robustness TestingKonrad Fögen, Horst Lichter. 110-117 [doi]
- A Prioritization Method for SPL Pairwise Testing Based on User ProfilesHirofumi Akimoto, Yuto Isogami, Takashi Kitamura, Natsuko Noda, Tomoji Kishi. 118-125 [doi]
- History Coupling Space: A New Model to Represent Evolutionary RelationsRan Mo, Mengya Zhan. 126-133 [doi]
- Mercem: Method Name Recommendation Based on Call Graph EmbeddingHiroshi Yonai, Yasuhiro Hayase, Hiroyuki Kitagawa. 134-141 [doi]
- Quality Assessment for Large-Scale Industrial Software Systems: Experience Report at AlibabaChen Zhi, ShuiGuang Deng, Jianwei Yin, Min Fu, Hai Zhu, Yuanping Li, Tao Xie. 142-149 [doi]
- Multi-Objective Configuration Sampling for Performance Ranking in Configurable SystemsYongfeng Gu, Yuntianyi Chen, Xiangyang Jia, Jifeng Xuan. 150-157 [doi]
- A Cloud-Based Solution for Testing Applications' Compatibility and Portability on Fragmented Android PlatformAmmar Lanui, Thiam Kian Chiew. 158-164 [doi]
- Version-Based Microservice Analysis, Monitoring, and VisualizationShang-Pin Ma, I-Hsiu Liu, Chun-Yu Chen, Jiun-Ting Lin, Nien-Lin Hsueh. 165-172 [doi]
- Generating Mock Skeletons for Lightweight Web-Service TestingThilini Bhagya, Jens Dietrich 0001, Hans W. Guesgen. 181-188 [doi]
- An Algebraic Approach to Modeling and Verifying Policy-Driven Smart Devices in IoT SystemsXiaotong Chi, Min Zhang, Xiao Xu. 189-196 [doi]
- Automatic Identifying Interaction Components in Collaborative Cyber-Physical SystemsDaneth Horn, Nazakat Ali, Jang-Eui Hong. 197-203 [doi]
- Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on HardwareMengyu Ma, Liwei Chen, Gang Shi. 204-211 [doi]
- Statistical Verification Framework for Platooning System of Systems with UncertaintySangwon Hyun, Jiyoung Song, Seungchyul Shin, Doo-Hwan Bae. 212-219 [doi]
- SHML: Stochastic Hybrid Modeling Language for CPS BehaviorDehui Du, Tong Guo, Yao Wang. 220-227 [doi]
- A Framework for Internet of Things Search Engines EngineeringNguyen Khoi Tran 0001, Muhammad Ali Babar, Quan Z. Sheng, John Grundy. 228-235 [doi]
- Inferring Faults in Business Specifications Extracted from Source CodeKazuya Yasuda, Shinji Itoh, Ryota Mibe, Yoshinori Jodai, Fumie Nakaya. 236-243 [doi]
- Deep Semantic Feature Learning with Embedded Static Metrics for Software Defect PredictionGuisheng Fan, Xuyang Diao, Huiqun Yu, Kang Yang, Liqiong Chen. 244-251 [doi]
- DeepTLE: Learning Code-Level Features to Predict Code Performance before It RunsMeiling Zhou, Jie Chen, HaiYang Hu, JiaCheng Yu, Zhongjin Li, Hua Hu. 252-259 [doi]
- Achieving Abstract Machine Reachability with Learning-Based Model FulfilmentCheng-Hao Cai, Jing Sun 0002, Gillian Dobbie, Scott Uk-Jin Lee. 260-267 [doi]
- Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to AnalysisYuexing Wang, Min Zhou 0001, Ming Gu 0001, Jiaguang Sun. 268-275 [doi]
- Class Imbalance Data-Generation for Software Defect PredictionZheng Li 0002, Xingyao Zhang, Junxia Guo, Ying Shang. 276-283 [doi]
- How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone RefactoringTasuku Nakagawa, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto. 284-291 [doi]
- Understanding Source Code Variability in Cloned Android Families: An Empirical Study on 75 FamiliesAnas Shatnawi, Tewfik Ziadi, Mohamed Yassin Mohamadi. 292-299 [doi]
- Towards Non-Invasive Recognition of Developers' Flow States with Computer Interaction TracesZhiwen Zheng, Liang Wang 0006, Yue Cao, Yuqian Zhuang, XianPing Tao. 300-307 [doi]
- Teaching Software Process Models to Software Engineering Students: An Exploratory StudySaurabh Tiwari 0001, Santosh Singh Rathore. 308-315 [doi]
- Automatic Classifying Self-Admitted Technical Debt Using N-Gram IDFSupatsara Wattanakriengkrai, Napat Srisermphoak, Sahawat Sintoplertchaikul, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Hideaki Hata, Kenichi Matsumoto. 316-322 [doi]
- Decisions and Their Making in OSS Development: An Exploratory Study Using the Hibernate Developer Mailing ListXueying Li, Peng Liang 0001, Tianqing Liu. 323-330 [doi]
- Towards a Formal Approach to Defining and Computing the Complexity of Component Based SoftwareYongxin Zhao, Xiujuan Zhang, Ling Shi, Gan Zeng, Feng Sheng, Shuang Liu. 331-338 [doi]
- RBML: A Refined Behavior Modeling Language for Safety-Critical Hybrid SystemsZhangtao Chen, Jing Liu, Xi Ding, Miaomiao Zhang. 339-346 [doi]
- A Coloured Petri Net Approach to Model and Analyze Safety-Critical Interactive SystemsSapna Jaidka, Steve Reeves, Judy Bowen. 347-354 [doi]
- Formal Modelling and Verification of Spinlocks at Instruction LevelLeping Zhang, Qianying Zhang, Guohui Wang, Zhiping Shi, Minhua Wu, Yong Guan. 355-362 [doi]
- Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-SystemsJamal El Hachem, Ali Sedaghatbaf, Elena Lisova, Aida Causevic. 363-370 [doi]
- Model-Driven Engineering for Delta-Oriented Software Product LinesMaya R. A. Setyautami, Rafiano R. Rubiantoro, Ade Azurat. 371-377 [doi]
- CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System PackagesYi Ren, Jianbo Guan, Jun Ma, Yusong Tan, Qingbo Wu, Yan Ding. 378-385 [doi]
- Automatic Identification of Assumptions from the Hibernate Developer Mailing ListRuiyin Li, Peng Liang 0001, Chen Yang 0007, Georgios Digkas, Alexander Chatzigeorgiou, Zhuang Xiong. 394-401 [doi]
- Influence, Information and Team Outcomes in Large Scale Software DevelopmentSubhajit Datta. 402-409 [doi]
- More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-AJingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu. 410-417 [doi]
- SGXPy: Protecting Integrity of Python Applications with Intel SGXDenghui Zhang, Guisai Wang, Wei Xu, Kevin Gao. 418-425 [doi]
- A Language-Based Multi-View Approach for Combining Functional and Security ModelsHui Zhao, Frédéric Mallet, Ludovic Apvrille. 426-433 [doi]
- Witness: Detecting Vulnerabilities in Android Apps Extensively and VerifiablyHongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie. 434-441 [doi]
- Run-Time Safety Monitoring Framework for AI-Based Systems: Automated Driving CasesMohd Hafeez Osman, Stefan Kugele, Sina Shafaei. 442-449 [doi]
- Anatomizing Android MalwaresAnand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar. 450-457 [doi]
- Reinforcement Learning of Code Search SessionsWei Li, Shuhan Yan, Beijun Shen, Yuting Chen. 458-465 [doi]
- SIF: A Framework for Solidity Contract Instrumentation and AnalysisChao Peng, Sefa Akca, Ajitha Rajan. 466-473 [doi]
- Jact: A Playground Tool for Comparison of JavaScript FrameworksNozomi Nakajima, Shinsuke Matsumoto, Shinji Kusumoto. 474-481 [doi]
- SolAnalyser: A Framework for Analysing and Testing Smart ContractsSefa Akca, Ajitha Rajan, Chao Peng. 482-489 [doi]
- Investigating Cross-Repository Socially Connected Teams on GitHubDuo Wang, Jian Cao, Shiyou Qian, Qing Qi. 490-497 [doi]
- Class Name Recommendation Based on Graph Embedding of Program ElementsShintaro Kurimoto, Yasuhiro Hayase, Hiroshi Yonai, Hiroyoshi Ito, Hiroyuki Kitagawa. 498-505 [doi]
- Detecting Duplicate Questions in Stack Overflow via Deep Learning ApproachesLiting Wang, Li Zhang, Jing Jiang. 506-513 [doi]
- Understanding the Effect of Developer Sentiment on Fix-Inducing Changes: An Exploratory Study on GitHub Pull RequestsSyed Fatiul Huq, Ali Zafar Sadiq, Kazi Sakib. 514-521 [doi]
- Neural Comment Generation for Source Code with Auxiliary Code Classification TaskMinghao Chen, Xiaojun Wan. 522-529 [doi]