Abstract is missing.
- Learn To Align: A Code Alignment Network For Code Clone DetectionAiping Zhang, Kui Liu, Liming Fang 0001, Qianjun Liu, Xinyu Yun, Shouling Ji. 1-11 [doi]
- TraceRefiner: An Automated Technique for Refining Coarse-Grained Requirement-to-Class TracesMouna Hammoudi, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed. 12-21 [doi]
- NameChecker: Detecting Inconsistency between Method Names and Method BodiesKejun Li, Taiming Wang, Hui Liu. 22-31 [doi]
- Thread-Sensitive Data Race Detection for JavaStefan Schulz, Emanuel Herrendorf, Christoph Bockisch. 32-42 [doi]
- Behavioral classification of Android applications using system callsAsma Razgallah, Raphaël Khoury. 43-52 [doi]
- Categorizing npm Packages by Analyzing the Text Information in Software RepositoriesYu Wang, Huaxiao Liu, Shanquan Gao, Shujia Li. 53-60 [doi]
- Tree-based Mining of Fine-grained Code Changes to Detect Unknown Change PatternsYoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto. 61-71 [doi]
- PGraph: A Graph-based Structure for Interactive Event Exploration on Social MediaYang Yu, Minglai Shao, Hongyan Xu, Ying Sun, Wenjun Wang, Bofei Ma. 72-81 [doi]
- Effective Bug Triage Based on a Hybrid Neural NetworkHongbing Wang, Qi Li. 82-91 [doi]
- Monitoring Negative Sentiment-Related Events in Open Source Software ProjectsLingjia Li, Jian Cao 0001, Qin Qi. 92-100 [doi]
- DeepRelease: Language-agnostic Release Notes Generation from Pull Requests of Open-source SoftwareHuaxi Jiang, Jie Zhu, Li Yang, Geng Liang, Chun Zuo. 101-110 [doi]
- Detecting Duplicate Questions in Stack Overflow via Semantic and Relevance ApproachesZhifang Liao, Wenlong Li, Yan Zhang, Song Yu. 111-119 [doi]
- Interaction Modelling for IoTJessica Turner, Judy Bowen, Nikki van Zandwijk. 120-129 [doi]
- Design of Software Architecture for Neural Network Cooperation: Case of Forgery DetectionAkira Mizutani, Masami Noro, Atsushi Sawada. 130-140 [doi]
- PyTraceBugs: A Large Python Code Dataset for Supervised Machine Learning in Software Defect PredictionElena N. Akimova, Alexander Yu. Bersenev, Artem A. Deikov, Konstantin S. Kobylkin, Anton V. Konygin, Ilya P. Mezentsev, Vladimir E. Misilov. 141-151 [doi]
- Data Flow Testing for PLC Programs via Dynamic Symbolic ExecutionWeigang He, Xia Mao, Ting Su 0001, Yanhong Huang, Jianqi Shi. 152-160 [doi]
- Mining API Constraints from Library and Client to Detect API MisusesHushuang Zeng, Jingxin Chen, Beijun Shen, Hao Zhong. 161-170 [doi]
- An Empirical Study on the Usage and Evolution of Identifier Styles in PracticeJingxuan Zhang, Weiqin Zou, Zhiqiu Huang. 171-180 [doi]
- A Research Landscape of Software Engineering EducationXin Huang, He Zhang 0001, Xin Zhou, Dong Shao, Letizia Jaccheri. 181-191 [doi]
- CHIS: A Novel Hybrid Granularity Identifier Splitting ApproachSiyuan Liu, Jingxuan Zhang, Jiahui Liang, Junpeng Luo, Yong Xu, Chenxing Sun. 192-201 [doi]
- IconChecker: Anomaly Detection of Icon-Behaviors for Android AppsYuxuan Li, Ruitao Feng, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li 0001. 202-212 [doi]
- Fine-grained Pseudo-code Generation Method via Code Feature Extraction and TransformerGuang Yang, Yanlin Zhou, Xiang Chen 0005, Chi Yu. 213-222 [doi]
- Improving Semantic Consistency of Variable Names with Use-Flow Graph AnalysisYusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow. 223-232 [doi]
- Bayesian propensity score matching in automotive embedded software engineeringYuchu Liu, David Issa Mattos, Jan Bosch, Helena Holmström Olsson, Jonn Lantz. 233-242 [doi]
- Towards Continuous Data Collection from In-service Products: Exploring the Relation Between Data Dimensions and Collection ChallengesAnas Dakkak, Hongyi Zhang, David Issa Mattos, Jan Bosch, Helena Holmström Olsson. 243-252 [doi]
- Program Verification Enhanced Precise Analysis of Interrupt-Driven Program VulnerabilitiesXiang Du, Liangze Yin, Haining Feng, Wei Dong 0006. 253-263 [doi]
- Verification Assisted Gas Reduction for Smart ContractsBo Gao, Siyuan Shen, Ling Shi, Jiaying Li 0001, Jun Sun 0001, Lei Bu. 264-274 [doi]
- Critical Understanding of Security Vulnerability Detection Plugin Evaluation ReportsSindre Beba, Magnus Melseth Karlsen, Jingyue Li, Bing Zhang. 275-284 [doi]
- Pandemic Software Development: The Student Experiences from Developing a COVID-19 Information DashboardBenjamin Koh, Mojtaba Shahin, Annette Ong, Soo Ying Yeap, Priyanka Saxena, Manvendra Singh, Chunyang Chen. 285-295 [doi]
- Concepts and Models of Environment of Self-Adaptive Systems: A Systematic Literature ReviewYong-Jun Shin, Joon-Young Bae, Doo-Hwan Bae. 296-305 [doi]
- Automated Construction of Continuous Delivery Pipelines from Architecture ModelsSelin Aydin, Andreas Steffens, Horst Lichter. 306-316 [doi]
- Automatic Performance Testing for Image Displaying in Android AppsWenjie Li, Yanyan Jiang 0001, Jun Ma 0010, Chang Xu 0001. 317-326 [doi]
- Ranking Warnings of Static Analysis Tools Using Representation LearningKien-Tuan Ngo, Dinh-Truong Do, Thu-Trang Nguyen, Hieu Dinh Vo. 327-337 [doi]
- A Multi-factor Approach for Flaky Test Detection and Automated Root Cause AnalysisAzeem Ahmad, Francisco Gomes de Oliveira Neto, Zhixiang Shi, Kristian Sandahl, Ola Leifler. 338-348 [doi]
- Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware DetectionLwin Khin Shar, Ta Nguyen Binh Duong, David Lo 0001. 349-359 [doi]
- How Do Programmers Express High-Level Concepts using Primitive Data Types?Yusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow. 360-368 [doi]
- 2 LMMD: Cross-Project Software Defect Prediction via Statement Semantic Learning and Maximum Mean DiscrepancyWangshu Liu, Yongteng Zhu, Xiang Chen, Qing Gu, Xingya Wang, Shenkai Gu. 369-379 [doi]
- A Novel Architectural Design for Solving Lost-Link Problems in UAV CollaborationGregorius Airlangga, Alan Liu. 380-389 [doi]
- Metamorphic Testing for Reliability in System of SystemsKiat Kian Anthony Chua, Doo-Hwan Bae, Eunkyoung Jee. 390-400 [doi]
- Understanding Metrics Team-Stakeholder Communication in Agile Metrics Service DeliveryNataliya Berbyuk Lindström, Dina Koutsikouri, Miroslaw Staron, Wilhelm Meding, Ola Söder. 401-409 [doi]
- Degree doesn't Matter: Identifying the Drivers of Interaction in Software Development EcosystemsIshita Bardhan, Subhajit Datta, Subhashis Majumder. 410-420 [doi]
- Comparing Automated Reuse of Scripted Tests and Model-Based Tests for Configurable SoftwareStefan Fischer 0006, Rudolf Ramler, Lukas Linsbauer. 421-430 [doi]
- Context-Aware Regression Test SelectionYizhen Chen, Ninad Chaudhari, Mei-Hwa Chen. 431-440 [doi]
- Exposing Vulnerable Paths: Enhance Static Analysis with Lightweight Symbolic ExecutionGuangwei Li, Ting Yuan, Jie Lu, Lian Li, Xiaobin Zhang, Xu Song, Kejun Zhang. 441-451 [doi]
- NeoMycelia: A software reference architecturefor big data systemsPouya Ataei, Alan T. Litchfield. 452-462 [doi]
- On the Impact of ML use cases on Industrial Data PipelinesM. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson, Anders Jansson. 463-472 [doi]
- Scalable Fault Detection Based on Precise Access PathChi Li, Yuexing Wang, Min Zhou 0001, Ming Gu 0001. 473-481 [doi]
- Survey on Pains and Best Practices of Code ReviewLiming Dong 0001, He Zhang 0001, Lanxin Yang, Zhiluo Weng, Xin Yang, Xin Zhou, Zifan Pan. 482-491 [doi]
- API parameter recommendation based on language model and program analysisTran Manh Cuong, Trung-Kien Tran, Tan M. Nguyen, Thu-Trang Nguyen, Son Nguyen, Hieu Dinh Vo. 492-496 [doi]
- Finding repeated strings in code repositories and its applications to code-clone detectionYoriyuki Yamagata, Fabien Hervé, Yuji Fujiwara, Katsuro Inoue. 497-502 [doi]
- Probabilistic testing of asynchronously communicating systemsPuneet Bhateja. 503-508 [doi]
- PNPEq: Verification of Scheduled Conditional Behavior in Embedded Software using Petri NetsRakshit Mittal, Dominique Blouin, Soumyadip Bandyopadhyay. 509-514 [doi]
- Applying Multi-Objective Genetic Algorithm for Efficient Selection on Program GenerationHiroto Watanabe, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Toshiyuki Kurabayashi, Hiroyuki Kirinuki, Haruto Tanno. 515-519 [doi]
- The Role of User Reviews in App Updates: A Preliminary Investigation on App Release NotesChong Wang 0004, Tianyang Liu, Peng Liang 0001, Maya Daneva, Marten van Sinderen. 520-525 [doi]
- Detecting Functional Differences using Automatic Test Generation for Automated Assessment in Programming EducationRyoko Izuta, Shinsuke Matsumoto, Hiroshi Igaki, Sachio Saiki, Naoki Fukuyasu, Shinji Kusumoto. 526-530 [doi]
- Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-usersHumphrey O. Obie, Mojtaba Shahin, John Grundy 0001, Burak Turhan, Li Li 0029, Waqar Hussain, Jon Whittle. 531-535 [doi]
- Runtime models and evolution graphs for the version management of microservice architecturesYuwei Wang, Denis Conan, Sophie Chabridon, Kavoos Bojnourdi, Jingxuan Ma. 536-541 [doi]
- Framework for Recommending Data Residency Compliant Application ArchitectureKapil Singi, Kanchanjot Kaur Phokela, Sukhavasi Narendranath, Vikrant Kaulgud. 542-546 [doi]
- AWaRE2-MM: A Meta-Model for Goal-Driven, Contract-Mediated, Team-Centric Autonomous Middleware Frameworks for AntifragilityAnton V. Uzunov, Matthew Brennan, Mohan Baruwal Chhetri, Quoc Bao Vo, Ryszard Kowalczyk, John Wondoh. 547-552 [doi]
- Towards Accurate File Tracking Based on AST DifferencesAkira Fujimoto, Yoshiki Higo, Shinji Kusumoto. 553-558 [doi]
- Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing MethodologyScott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. 559-563 [doi]
- Smart Contract Vulnerability Detection Using Code Representation FusionBen Wang, Hanting Chu, Pengcheng Zhang, Hai Dong. 564-565 [doi]
- Applying Problem Frames in Behavior-Driven Development for Smart Cone SystemYi-Chun Yen, Bing-Yun Wang, Xin-Zhe Zhong, Wei-Yi Chiang, Chin-Yun Hsieh, Yu Chin Cheng. 566-567 [doi]
- Towards a Dynamic Visualization of Complex Reverse-Engineered Object CollaborationAki Hongo, Naoya Nitta. 568-569 [doi]
- Extracting a Micro State Transition Table Using the KLEE Symbolic Execution EngineNorihiro Yoshida, Takahiro Shimizu, Ryota Yamamoto, Hiroaki Takada. 570-571 [doi]
- Topic Trends in Issue Tracking System of Extended Reality FrameworksIrving Rodriguez, Xiaoyin Wang. 572-573 [doi]
- An Exploration Study On the Dependency Among Vulnerabilities and BugsShaikh Mostafa, Xiaoyin Wang. 574-575 [doi]
- A Learning-to-Rank Based Approach for Improving Regression Test Case PrioritizationChu-Ti Lin, Sheng-Hsiang Yuan, Jutarporn Intasara. 576-577 [doi]
- Automated Fault Tree generation in Open-PSA from UML ModelsHasnaa E. L. Jihad, Morayo Adedjouma, Matteo Morelli. 578-579 [doi]
- Static Analysis of Resource Usage Bounds for Imperative ProgramsLiqian Chen, Taoqing Chen, Guangsheng Fan, Banghu Yin. 580-581 [doi]
- Automated Feedback Generation for Multiple Function ProgramsDongwook Choi, Jinseok Heo, Eunseok Lee. 582-583 [doi]