Abstract is missing.
- Grey-box Fuzzing Based on Execution Feedback for EOSIO Smart ContractsWenyin Li, Meng Wang, Bin Yu, Yuhang Shi, Mingxin Fu, You Shao. 1-10 [doi]
- Exploring Activity and Contributors on GitHub: Who, What, When, and WhereXiaoya Xia, Zhenjie Weng, Wei Wang, Shengyu Zhao. 11-20 [doi]
- The Language of Programming: On the Vocabulary of NamesNitsan Amit, Dror G. Feitelson. 21-30 [doi]
- Efficient Reinforcement Learning with Generalized-Reactivity SpecificationsChenyang Zhu, Yujie Cai, Can Hu, Jia Bi. 31-40 [doi]
- UTCache: Updatable Transactional Cache For Database-Driven ApplicationsXiaodong Zhang, Jing Zhou. 41-50 [doi]
- Automated Generation of Bug Samples Based on Source Code AnalysisTianming Zheng, Zhixin Tong, Ping Yi, Yue Wu 0010. 51-60 [doi]
- Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving PoliciesAizaz Sharif, Dusica Marijan. 61-70 [doi]
- Empirical Study of Co-Renamed IdentifiersYuki Osumi, Naotaka Umekawa, Hitomi Komata, Shinpei Hayashi. 71-80 [doi]
- Systematic Analysis of Defect-Specific Code Abstraction for Neural Program RepairKicheol Kim, Misoo Kim, Eunseok Lee. 81-89 [doi]
- Incorporating Ethics in Software Engineering: Challenges and OpportunitiesAnna Mitchell, Dharini Balasubramaniam, Jade Fletcher. 90-98 [doi]
- Incremental Relational Topic Model for Duplicate Bug Report DetectionAnh Tuan Nguyen 0001, Tien N. Nguyen. 99-108 [doi]
- Bisection Value IterationJia Lu, Ming Xu. 109-118 [doi]
- DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep LearningLwin Khin Shar, Wei Minn, Ta Nguyen Binh Duong, Jiani Fan, Lingxiao Jiang, Daniel Lim Wai Kiat. 119-128 [doi]
- Non-Intrusive Annotation-Based Domain-Specific Analysis to Certify Event-B Models BehavioursIsmail Mendil, Peter Riviere, Yamine Aït Ameur, Neeraj Kumar Singh 0001, Dominique Méry, Philippe A. Palanque. 129-138 [doi]
- An Experimental Comparison of Clone Detection Techniques using Java BytecodeJean-Guy Schneider, Sung Une Lee. 139-148 [doi]
- Data Flow Reduction Based Test Case Generation for Smart ContractsShunhui Ji, Shaoqing Zhu, Pengcheng Zhang, Hai Dong. 149-158 [doi]
- SysML Flow ModelGuohuan Ding, Jing Liu. 159-168 [doi]
- Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency MaskingXiaoliang Wu, Ajitha Rajan. 169-178 [doi]
- Symbolic Execution of Floating-point Programs: How far are we?Guofeng Zhang 0005, Zhenbang Chen, Ziqi Shuai. 179-188 [doi]
- Goal-oriented Knowledge Reuse via Curriculum Evolution for Reinforcement Learning-based AdaptationJialong Li, Mingyue Zhang, Zhenyu Mao, Haiyan Zhao, Zhi Jin, Shinichi Honiden, Kenji Tei. 189-198 [doi]
- Diff Feature Matching Network in Refactoring DetectionLiang Tan, Christoph Bockisch. 199-208 [doi]
- Automatic Generation of Metamorphic Relations for a Cyber-Physical System-of-Systems Using Genetic AlgorithmEsther Cho, Yong-Jun Shin, Sangwon Hyun, Hansu Kim, Doo-Hwan Bae. 209-218 [doi]
- Toward a Better Alignment Between the Research and Practice of Code Search EnginesYin Liu, Shuangyi Li, Eli Tilevich. 219-228 [doi]
- Code Question Answering via Task-Adaptive Sequence-to-Sequence Pre-trainingTingrui Yu, Xiaodong Gu 0002, Beijun Shen. 229-238 [doi]
- Two-Stage Patch Synthesis for API Migration from Single API Usage ExampleDaisuke Yamaguchi, Takuya Iwatsuka. 239-248 [doi]
- An Empirical Study of Predicting Fault-prone Components and their EvolutionAparna Pisolkar, Md Tajmilur Rahman. 249-258 [doi]
- Tuning SAT solvers for LTL Model CheckingAnissa Kheireddine, Etienne Renault, Souheib Baarir. 259-268 [doi]
- A Reference Architecture for Blockchain-based Traceability Systems Using Domain-Driven Design and MicroservicesYanze Wang, Shanshan Li, Huikun Liu, He Zhang, Bo Pan. 269-278 [doi]
- An Approach for Hazard Analysis of Multiple-Cooperative Systems Considering Dynamic Configuration UncertaintySejin Jung, Junbeom Yoo. 279-288 [doi]
- Multifaceted Hierarchical Report Identification for Non-Functional Bugs in Deep Learning FrameworksGuoming Long, Tao Chen 0001, Georgina Cosma. 289-298 [doi]
- Optimal Refinement-based Array Constraint Solving for Symbolic ExecutionMeixi Liu, Ziqi Shuai, Luyao Liu, Kelin Ma, Ke Ma. 299-308 [doi]
- How Libraries Evolve: A Survey of Two Industrial Companies and an Open-Source CommunityOleksandr Zaitsev, Stéphane Ducasse, Nicolas Anquetil, Arnaud Thiefaine. 309-317 [doi]
- An Empirical Study on Multi-Source Cross-Project Defect Prediction ModelsXuanying Liu, Zonghao Li, Jiaqi Zou, Haonan Tong. 318-327 [doi]
- Synergizing Symbolic Execution and Fuzzing By Function-level Selective SymbolizationGuofeng Zhang 0005, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang, Ji Wang 0001. 328-337 [doi]
- NuMFUZZ: A Floating-Point Format Aware Fuzzer for Numerical ProgramsChenghu Ma, Liqian Chen, Xin Yi, Guangsheng Fan, Ji Wang. 338-347 [doi]
- Multi-Perspective Alignment Mechanism for Code SearchShun Yang, Bo Cai. 348-356 [doi]
- Retrieve-Guided Commit Message Generation with Semantic Similarity And DisparityZhihan Li, Yi Cheng, Haiyang Yang, Li Kuang, Lingyan Zhang. 357-366 [doi]
- NEGAR: Network Embedding Guided Architecture Recovery for Software SystemsJiayi Chen, Zhixing Wang, Yuchen Jiang, Jun Pang 0001, Tian Zhang, Minxue Pan, Jianwen Sun. 367-376 [doi]
- Quantifying the Similarity of BPMN ProcessesGwen Salaün. 377-386 [doi]
- Reducing Syntactic Complexity for Information Extraction from Japanese Requirement SpecificationsMaiko Onishi, Shinpei Ogata, Kozo Okano, Daisuke Bekki. 387-396 [doi]
- Detecting High Floating-Point Errors via Ranking AnalysisZheng Wang, Xin Yi, Hengbiao Yu, Banghu Yin. 397-406 [doi]
- Bounded Model Checking of Synchronous Reactive Models in Ptolemy IIXiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong. 407-416 [doi]
- On the Usefulness of Crossover in Search-Based Test Case Generation: An Industrial ReportChangze Huang, Hailian Zhou, Hongbing Zhao, Wenting Cai, Zhi Quan Zhou, Mingyue Jiang. 417-421 [doi]
- Refactoring Community Smells: An Empirical Study on the Software Practitioners of BangladeshNoshin Tahsin, Kazi Sakib. 422-426 [doi]
- Unified program cross-architecture migration framework modelMinhao Zhou, Zhe Quan, Xing Huang. 427-431 [doi]
- RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution DataShinobu Saito, Kenji Takahashi, Yasuyuki Hamada, Jan Vermeulen. 432-436 [doi]
- AMF: A Field to Realize the Values of Agile Manifesto through RetrospectivesIkkaku Kawaguchi, Yasuhiro Hayase, Kyohei Kobayashi, Chiemi Watanabe. 437-441 [doi]
- Quality assurance study with mismatched data in sentiment analysisTinghui Ouyang, Yoshiki Seo, Yutaka Oiwa. 442-446 [doi]
- SCAR: Smart Contract Alarm RankingTrung-Kien Tran, Hieu Dinh Vo. 447-451 [doi]
- Combining Model-Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAALSaurabh Tiwari 0001, Kumar Iyer, Eduard Paul Enoiu. 452-456 [doi]
- Reusing My Own Code: Preliminary Results for Competitive Coding in Jupyter NotebooksNatanon Ritta, Tasha Settewong, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Kenichi Matsumoto. 457-461 [doi]
- Why Visualize Data When Coding? Preliminary Categories for Coding in Jupyter NotebooksTasha Settewong, Natanon Ritta, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Kenichi Matsumoto. 462-466 [doi]
- Testing for Event-Driven Microservices Based on Consumer-Driven Contracts and State ModelsChu-Fei Wu, Shang-Pin Ma, An-Chi Shau, Hang-Wei Yeh. 467-471 [doi]
- Visualizing Contributor Code Competency for PyPI Libraries: Preliminary ResultsIndira Febriyanti, Raula Gaikovina Kula, Ruksit Rojpaisarnkit, Kanchanok Kannee, Yusuf Sulistyo Nugroho, Kenichi Matsumoto. 472-476 [doi]
- Analyzing and Monitoring Kubernetes Microservices based on Distributed Tracing and Service MeshYu-Te Wang, Shang-Pin Ma, Yue-Jun Lai, Yan-Cih Liang. 477-481 [doi]
- eBAT: An Efficient Automated Web Application Testing Approach Based on Tester's BehaviorMridha Md. Nafis Fuad, Kazi Sakib. 482-486 [doi]
- Preliminary Analysis of the Influence of the Stereotype Threat on Computer ProgrammingYuriko Takatsuka, Masateru Tsunoda. 487-491 [doi]
- Preliminary Analysis of Review Method Selection Based on Bandit AlgorithmsTakuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto. 492-496 [doi]
- A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviewsAlvine Boaye Belle, Yixi Zhao. 502-506 [doi]
- Virtual Reality for Software Engineering PresentationsChaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Apirak Hoonlor, Mores Prachyabrued. 507-516 [doi]
- How students design simple programs: a study on the effort and perceptions of the design activityDiego Vallespir, Silvana Moreno. 517-526 [doi]
- Automatic Programming Assessment System for a Computer Science Bridge Course - An Experience ReportSebastian Geiss, Tim Jentzsch, Nils Wild, Christian Plewnia. 527-536 [doi]
- Balancing between Creativity and Efficiency in Software Engineering Project CoursesRuoqing Wang, Snezhina Milusheva, Stephan Krusche. 537-546 [doi]
- Threshold Concepts and Skills in Software Architecture: Instructors' PerspectivesUsman Nasir, Muhammad Laiq. 547-553 [doi]
- A Preliminary Finding on Programs Fixed by an APR Tool based on a Genetic AlgorithmKanon Harada, Katsuhisa Maruyama. 554-555 [doi]
- Comparison of Different Keyphrase Extraction Algorithms for Supporting Problem Selection in Online Judge SystemRyota Shinhama, Erina Makihara, Keiko Ono, Akitaka Yaguchi, Ayumu Taisho. 556-557 [doi]
- * Trial for improving quality of specification document through writing system specifications and test cases concurrentlyTaiga Wakamatsu, Yutaro Mikaduki, Noriyuki Kushiro. 558-559 [doi]
- Verifying Attention Robustness of Deep Neural Networks against Semantic PerturbationsSatoshi Munakata, Caterina Urban, Haruki Yokoyama, Koji Yamamoto, Kazuki Munakata. 560-561 [doi]
- EDPS: Early Dropout Prediction System of MOOC CoursesJiaxuan Zhang, Kun Ma. 562-563 [doi]
- On the Scrutinization of the NFT Valuation FactorsAiden Cheung, Jacky Keung. 564-565 [doi]
- Bytecode Obfuscation for Smart ContractsQifan Yu, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji. 566-567 [doi]
- How Does Grit Affect the Performance of Software Developers?Hodaka Shinbori, Masateru Tsunoda. 568-569 [doi]
- Defending against code injection attacks using Secure Design PatternAnivesh Panjiyar, Debanjan Sadhya. 570-571 [doi]
- Comparison of Developer's Work Efficiency between Different EditorsSentaro Onizuka, Tetsuya Kanda, Katsuro Inoue. 572-573 [doi]
- What Pakistani Computer Science and Software Engineering Students Think about Software Testing?Luiz Fernando Capretz, Abdul Rehman Gilal. 574-575 [doi]
- A new measure to assess the systematicity of the abstracts of reviews self-identifying as systematic reviewsAlvine Boaye Belle, Yixi Zhao. 576-577 [doi]
- SceneCommitter: a screen scenario review system using the GitHub and Figma WebAPI in the waterfall based software developmentMihato Ueda, Yousuke Asano, Hane Kondo, Oh Sato, Atsuo Hazeyama. 578-579 [doi]
- An additional approach to pre-trained code model with multilingual natural languagesTeruno Kajiura, Nao Souma, Miyu Sato, Mai Takahashi, Kimio Kuramitsu. 580-581 [doi]
- Risk assessment to design business process incorporating AI tasksRyo Soga, Hideyuki Kanuka, Daisuke Fukui, Masayoshi Mase. 582-583 [doi]
- Systematic Literature Review on Educational Effectiveness of Project-Based Learning for Software DevelopmentHane Kondo, Atsuo Hazeyama. 584-585 [doi]
- DigiSoC - Digital Software City - toward Software 3R: Reduce, Reuse, and RecycleShinobu Saito. 586-587 [doi]
- How Does Future Perspective Affect Job Satisfaction and Turnover Intention of Software Engineers?Ikuto Yamagata, Masateru Tsunoda, Keitaro Nakasai. 588-589 [doi]
- Battle of the Blocs: Quantity and Quality of Software Engineering Research by OriginLorenz Graf-Vlachy. 590-591 [doi]