Abstract is missing.
- SAT-Based Automata Construction for LTL over Finite TracesYingying Shi, Shengping Xiao, Jianwen Li, Jian Guo, Geguang Pu. 1-10 [doi]
- Fault Diagnosis of Simplified Fault Trees using State Transition DiagramsMingyue Jiao, Yanhong Huang, Jianqi Shi, Fangda Cai, Rongfeng Lin. 11-20 [doi]
- Lemma Weakening for State Machine Invariant ProofsDuong Dinh Tran, Dang Duy Bui, Parth Gupta, Kazuhiro Ogata 0001. 21-30 [doi]
- Examining the Relationship of Code and Architectural Smells with Software VulnerabilitiesKazi Zakia Sultana, Zadia Codabux, Byron J. Williams. 31-40 [doi]
- An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked AppsYanxin Zhang, Guanping Xiao, Zheng Zheng 0001, Tianqing Zhu, Ivor W. Tsang, Yulei Sui. 41-50 [doi]
- A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent ProgramsSandip Ghosal, R. K. Shyamasundar. 51-60 [doi]
- DependLoc: A Dependency-based Framework For Bug LocalizationWei Yuan, Binhang Qi, Hailong Sun 0001, Xudong Liu 0001. 61-70 [doi]
- Understanding the Non-Repairability Factors of Automated Program Repair TechniquesBo Lin, Shangwen Wang, Ming Wen 0001, Zhang Zhang, Hongjun Wu, Yihao Qin, Xiaoguang Mao. 71-80 [doi]
- Software Defect Prediction and Localization with Attention-Based Models and Ensemble LearningTianhang Zhang, Qingfeng Du, Jincheng Xu, Jiechu Li, Xiaojun Li. 81-90 [doi]
- Clusters of Faulty States for Debugging Behavioural ModelsIrman Faqrizal, Gwen Salaün. 91-99 [doi]
- Software Engineering for Autonomous Robot: Challenges, Progresses and OpportunitiesXinJun Mao, Hao Huang, Shuo Wang. 100-108 [doi]
- Synthesizing Cooperative Controllers from Global Tasks of Multi-robot SystemsRui Li, Hao Shi, Wanwei Liu, Wei Dong 0006. 109-118 [doi]
- Testing Microservices Architecture-Based Applications: A Systematic Mapping StudyMuhammad Waseem, Peng Liang 0001, Gastón Márquez, Amleto Di Salle. 119-128 [doi]
- UML-based Modeling and Analysis of 5G Service OrchestrationAshalatha Kunnappilly, Peter Backeman, Cristina Seceleanu. 129-138 [doi]
- An Integrated Framework for the Formal Analysis of Critical Interactive SystemsIsmaïl Mendil, Neeraj Kumar Singh, Yamine Aït Ameur, Dominique Méry, Philippe A. Palanque. 139-148 [doi]
- Formal Verification of Memory Isolation for the TrustZone-based TEEYuwei Ma, Qianying Zhang, Shijun Zhao, Guohui Wang, Ximeng Li 0003, Zhiping Shi 0002. 149-158 [doi]
- A Coloured Petri Nets Based Attack Tolerance FrameworkWenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi. 159-168 [doi]
- Model Checking of Spatial LogicTengfei Li, Jing Liu 0012, Jiexiang Kang, Haiying Sun, Xiaohong Chen 0007, Li Han. 169-177 [doi]
- An Asset-Based Assistance for Secure by DesignNan Messe, Nicolas Belloir, Vanea Chiprianov, Jamal El Hachem, Régis Fleurquin, Salah Sadou. 178-187 [doi]
- A Knowledge Graph-based Sensitive Feature Selection for Android Malware ClassificationDuoyuan Ma, Yude Bai, Zhenchang Xing, Lintan Sun, Xiaohong Li 0001. 188-197 [doi]
- Modeling and Verifying Data Access Mechanism of NLSR Trust ModelNingning Chen, Huibiao Zhu, Yuan-fei, Lili Xiao, Jiaqi Yin. 198-207 [doi]
- An Empirical Study on Developing Secure Mobile Health Apps: The Developers' PerspectiveBakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar. 208-217 [doi]
- A Benchmark Study of the Contemporary Toxicity Detectors on Software Engineering InteractionsJaydeb Sarker, Asif Kamal Turzo, Amiangshu Bosu. 218-227 [doi]
- Technical Lag of Dependencies in Major Package ManagersJacob Stringer, Amjed Tahir, Kelly Blincoe, Jens Dietrich 0001. 228-237 [doi]
- Sia-RAE: A Siamese Network based on Recursive AutoEncoder for Effective Clone DetectionChenhui Feng, Tao Wang, Yue Yu, Yang Zhang, Yanzhi Zhang, Huaimin Wang. 238-246 [doi]
- Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4, 110 Projects on GitHubYiwen Wu, Yang Zhang, Tao Wang, Huaimin Wang. 247-256 [doi]
- Floating Point Accuracy Testing in Deep Neural Network Computations via Hypothesis TestingChaojin Wang, Jian Shen. 257-265 [doi]
- An Empirical Study on Robustness of DNNs with Out-of-Distribution AwarenessLingjun Zhou, Bing Yu, David Berend, Xiaofei Xie, Xiaohong Li 0001, Jianjun Zhao, Xusheng Liu. 266-275 [doi]
- Improving Machine Learning-Based Code Smell Detection via Hyper-Parameter OptimizationLei Shen, Wangshu Liu, Xiang Chen 0005, Qing Gu, Xuejun Liu. 276-285 [doi]
- Structural Similarity of Boundary Conditions and an Efficient Local Search Algorithm for Goal Conflict IdentificationHongzhen Zhong, Hai Wan, Weilin Luo, Zhanhao Xiao, Jia Li, Biqing Fang. 286-295 [doi]
- An education model for project-based learning using ability map in various target productsNoriko Hanakawa. 296-305 [doi]
- Understanding Build Errors in Agile Software Development Project-Based LearningErina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Hajimu Iida. 306-315 [doi]
- Process Debt: a First ExplorationAntonio Martini, Terese Besker, Jan Bosch. 316-325 [doi]
- Pattern-based Analysis of Interaction Failures in Systems-of-Systems: a Case Study on PlatooningSangwon Hyun, Jiyoung Song, Seungchyul Shin, Young Min Baek, Doo-Hwan Bae. 326-335 [doi]
- A Modeling Method for Model-based Analysis and Design of a System-of-SystemsYoung Min Baek, B. Zelalem Mihret, Yong-Jun Shin, Doo-Hwan Bae. 336-345 [doi]
- Towards Automated Detection of Data Pipeline FaultsAiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson, Tian J. Wang. 346-355 [doi]
- *Canh Minh Do, Kazuhiro Ogata 0001. 356-364 [doi]
- SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings AppsLwin Khin Shar, Ta Nguyen Binh Duong, Lingxiao Jiang, David Lo 0001, Wei Minn, Glenn Kiah Yong Yeo, Eugene Kim. 365-374 [doi]
- Don't Trust Me, Test Me: 100% Code Coverage for a 3rd-party Android AppAleksandr Pilgun. 375-384 [doi]
- Federated Learning Systems: Architecture AlternativesHongyi Zhang, Jan Bosch, Helena Holmström Olsson. 385-394 [doi]
- AI Deployment Architecture: Multi-Case Study for Key Factor IdentificationMeenu Mary John, Helena Holmström Olsson, Jan Bosch. 395-404 [doi]
- Principles for Re-architecting Software for Heterogeneous PlatformsHugo Sica de Andrade, Christian Berger 0001, Ivica Crnkovic, Jan Bosch. 405-414 [doi]
- Multiform Logical Time & Space for Mobile Cyber-Physical System With Automated Driving Assistance SystemQian Liu, Robert de Simone, Xiaohong Chen, Jiexiang Kang, Jing Liu, Wei Yin, Hui Wang. 415-424 [doi]
- An Empirical Study on the Influence of Social Interactions for the Acceptance of Answers in Stack OverflowZhang Zhang, XinJun Mao, Yao Lu 0003, Shangwen Wang, Jinyu Lu. 425-434 [doi]
- Mining Customer Satisfaction on B2B Online Platforms using Service Quality and Web Usage MetricsIris Figalist, Marco Dieffenbacher, Isabella Eigner, Jan Bosch, Helena Holmström Olsson, Christoph Elsner. 435-444 [doi]
- How Weak Reference is Used in Java Projects?Yoshiki Higo, Shinsuke Matsumoto, Taeyoung Kim, Shinji Kusumoto. 445-449 [doi]
- Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction ApproachRui Song, Tong Li, Zhiming Ding. 450-454 [doi]
- CLIONE: Clone Modification Support for Pull Request Based DevelopmentTasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto. 455-459 [doi]
- Identification of Misleading Location Information in Compiler DiagnosesMiaoying Wang, Weixing Ji, Dejiang Jing, Hui Liu. 460-464 [doi]
- A Formal Model for Behavior Trees Based on Context - Free GrammarSajid Anwer, Lian Wen, Zhe Wang 0001. 465-469 [doi]
- A Preliminary Study on Sensitive Information Exposure Through LoggingChen Zhi, Jianwei Yin, Junxiao Han, ShuiGuang Deng. 470-474 [doi]
- A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug LocalizationMasanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 475-479 [doi]
- Asynchronous test equivalence for probabilistic processesPuneet Bhateja. 480-484 [doi]
- Model Driven Inputs to aid Athlete's Decision MakingSatish Siddharth, Sircar Saurav, Kan Jiang, Bimlesh Wadhwa, Jin Song Dong. 485-489 [doi]
- An Attentive Deep Supervision based Semantic Matching Framework For Tag Recommendation in Software Information SitesXinhao Zheng, Lin Li, Dong Zhou. 490-494 [doi]
- Ori: A Greybox Fuzzer for SOME/IP Protocols in Automotive EthernetYuekang Li, Hongxu Chen, Cen Zhang, Siyang Xiong, Chaoyi Liu, Yi Wang. 495-499 [doi]
- Automated Assessment and Evaluation of Contribution of Collaborative Software Engineering Development ProcessKun Ma, Kun Liu, Lixin Du. 500-504 [doi]
- Requirements Risk Estimation Using TOPSIS MethodChetna Gupta, Varun Gupta 0001. 505-506 [doi]
- A Program Simplification Method for Generating Test Input Values Using Symbolic ExecutionRyo Soga, Tetsuya Yonemitsu, Mitsuo Inagaki, Yasushi Fujisaki, Hiroo Sugou, Hideyuki Kanuka. 507-508 [doi]
- Towards tracking the development process of the server ecosystems using open-source dataZhuoyao Wang, Changguo Guo, Jiaqi Gao, Shazhou Yang. 509-510 [doi]
- Feature Combination to Alleviate Hubness Problem of Source Code Representation for Bug LocalizationYoungKyoung Kim, Misoo Kim, Eunseok Lee. 511-512 [doi]
- Source Code Obfuscation for Smart ContractsMeng Zhang, Pengcheng Zhang, Xiapu Luo, Feng Xiao. 513-514 [doi]
- A Context Based Approach for Recommending Move Class RefactoringMd. Masudur Rahman, Abdus Satter. 515-516 [doi]