Abstract is missing.
- Unit Test Based Component Integration TestingNils Wild, Horst Lichter. 1-10 [doi]
- On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-Box FuzzersHaeun Lee, Hee-Dong Yang, Su Geun Ji, Sang Kil Cha. 11-20 [doi]
- Test Case Level Predictive Mutation Testing Combining PIE and Natural Language FeaturesRui Xu, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong. 21-30 [doi]
- Taxonomy of Architecture Maintainability SmellsPaula Rachow, Marion Wiese, André van Hoorn. 31-40 [doi]
- Analytical Modeling and Empirical Validation of Performability of Service- and Cloud-Based Dynamic Routing Architecture PatternsAmirali Amiri, Uwe Zdun, André van Hoorn. 41-50 [doi]
- Light-Weight MBSE Approach for Construction Equipment Domain - An Experience ReportJohan Cederbladh, Jagadish Suryadevara. 51-60 [doi]
- On the Reliability of Coverage Data for Fault LocalizationHuan Xie, Maojin Li, Yan Lei, Jian Hu, Shanshan Li 0001, Xiaoguang Mao, Yue Yu 0001. 61-70 [doi]
- Do App Developers Follow the Android Official Data Security Guidelines? An Empirical Measurement on App Data SecurityShishuai Yang, Qinsheng Hou, Shuang Li, Wenrui Diao. 71-80 [doi]
- FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attentionNanfei Yang, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong. 81-90 [doi]
- Reinforcement Learning Guided Symbolic Execution for Ethereum Smart ContractsMeng Wang, Weiliang Fei, Miao Wang, Jin Cui. 91-100 [doi]
- Effective Anomaly Detection for Microservice Systems with Real-Time Feature SelectionSiqi Zhou, Xian Zhan, Linlin Li, Yepang Liu 0001. 101-110 [doi]
- Architectural Design Decisions for Data Communication of Cyber-Physical SystemsAmirali Amiri, Evangelos Ntentos, Uwe Zdun. 111-120 [doi]
- Towards Requirements Engineering Activities for Machine Learning-Enabled FinTech ApplicationsYishu Li, Jacky Keung, Kwabena Ebo Bennin, Xiaoxue Ma, Yangyang Huang, Jingyu Zhang. 121-130 [doi]
- On the Impact of Development Frameworks on Mobile AppsParsa Karami, Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo, Imen Benzarti. 131-140 [doi]
- An Empirical Study on the Stability of Explainable Software Defect PredictionJiho Shin, Reem Aleithan, Jaechang Nam, Junjie Wang 0001, Nima Shiri Harzevili, Song Wang 0009. 141-150 [doi]
- Refactoring Programs Using Large Language Models with Few-Shot ExamplesAtsushi Shirafuji, Yusuke Oda, Jun Suzuki, Makoto Morishita, Yutaka Watanobe. 151-160 [doi]
- Improving Code Refinement for Code Review Via Input Reconstruction and Ensemble LearningJiaWei Lu, Zhijie Tang, Zhongxin Liu. 161-170 [doi]
- QoS-Aware Graph Contrastive Learning for Web Service RecommendationJeongwhan Choi 0002, Duksan Ryu. 171-180 [doi]
- LogFold: Enhancing Log Anomaly Detection Through Sequence Folding and ReconstructionXiaonan Shi, Rui Li, Qingfeng Du, Cheng He, Fulong Tian. 181-190 [doi]
- Natural Language Processing-Based Requirements Modeling: A Case Study on Problem FramesJiahao Wei, Xuan Chen, Hongbin Xiao, Shangzhi Tang, Xiaolan Xie, Zhi Li. 191-200 [doi]
- Sentiment Analysis for Requirements Elicitation from App Reviews: A Systematic Mapping StudyHongyan Wan, Zhiquan An, Bangchao Wang, Teng Xiong. 201-210 [doi]
- SAB: Stacking Action Blocks for Efficiently Generating Diverse Multimodal Critical Driving ScenarioShuting Kang, Heng Guo, Zitong Bo, Lijun Zhang, Qian Dong, Yunzhi Xue, Yanjun Wu. 211-220 [doi]
- CP Decomposition and Set Theory based Root Cause Analysis in Online Service SystemsQianbo Wei, Qian Tan, Yan Zhang, Zhen Xu 0009, Hongyan Tan. 221-228 [doi]
- Interpreting CodeBERT for Semantic Code Clone DetectionShamsa Abid, Xuemeng Cai, Lingxiao Jiang. 229-238 [doi]
- Context-Adaptation Bugs in Micro-ClonesSayeedi Mottakin, Maliha Bintay Zaman, Manishankar Mondal, Atanu Shome. 239-248 [doi]
- P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint AnalysisRulin Xu, Xiaoguang Mao, Luohui Chen. 249-258 [doi]
- Improving Vulnerability Detection with Hybrid Code Graph RepresentationXiangxin Meng, Shaoxiao Lu, Xu Wang 0007, Xudong Liu 0001, Chunming Hu. 259-268 [doi]
- MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Search Based on Knowledge GraphYuxin Zhao, XinJun Mao, Tanghaoran Zhang, Zhang Zhang. 269-278 [doi]
- WMWatcher: Preventing Workload-Related Misconfigurations in Production EnvironmentShuLin Zhou, Zhijie Jiang, Shanshan Li 0001, Xiaodong Liu 0004, Zhouyang Jia, Yuanliang Zhang, Jun Ma 0015, Haibo Mi. 279-288 [doi]
- Reusability Challenges of Scientific Workflows: A Case Study for GalaxyKhairul Alam, Banani Roy, Alexander Serebrenik. 289-298 [doi]
- Histree: A Tree-Based Experiment History Tracking Tool for Jupyter NotebooksLaurens Studtmann, Selin Aydin, Horst Lichter. 299-308 [doi]
- Formal Verification of Interrupt Isolation for the TrustZone-based TEELeping Zhang, Qianying Zhang, Xinyue Wang, Ximeng Li 0003, Guohui Wang, Zhiping Shi 0002, Yong Guan. 309-318 [doi]
- A Single-sample Pruning and Clustering Method for Neural Network VerificationHuanzhang Xiong, Gang Hou, Long Zhu, Jie Wang 0004, Weiqiang Kong. 319-328 [doi]
- AMPT: Automatic Mixed-Precision Tuning Based on Accuracy GainJiangwei Hao, Yuanyuan Xia, Fei Li, Hongru Yang, Zongjiang Yi, Bei Zhou, Jianmin Pang. 329-338 [doi]
- Developer's Cognitive Effort Maintaining Monoliths vs. Microservices - An Eye-Tracking StudyGeorg Simhandl, Philipp Paulweber, Uwe Zdun. 339-348 [doi]
- Defining Bad Smells and Automating Their Detection in Goal-Oriented Requirement Analysis Method iStarYoshitake Hirabayashi, Shinji Ohota, Suzuka Fujii, Motoshi Saeki. 349-358 [doi]
- Understanding Developers' Contribution Motivation in Stack Overflow: A Systematic ReviewYi Yang, XinJun Mao. 359-368 [doi]
- Exploring Trade-Offs in MLOps AdoptionMeenu Mary John, Helena Holmström Olsson, Jan Bosch, Daniel Gillblad. 369-375 [doi]
- Family-based Model Checking using Probabilistic Model Checker PRISMTomoji Kishi. 376-385 [doi]
- Automated Simulation-Based Integration Testing for Multiple PLCs in a Reactor Protection SystemHyeongseok Eun, Eunkyoung Jee, Doo-Hwan Bae, Younggeul Kim, Yoonhee Lee. 386-395 [doi]
- Parameterized Search Heuristic Prediction for Concolic ExecutionFarnoushsadat Nilizadeh, Hamid Dashtbani, Maryam Mouzarani. 396-404 [doi]
- Verifying Exception-Handling Code in Concurrent LibrariesDhriti Khanna, Subodh Sharma 0001, Rahul Purandare. 405-414 [doi]
- Assessing the Effectiveness of Vulnerability Detection via Prompt Tuning: An Empirical StudyGuilong Lu, Xiaolin Ju, Xiang Chen 0005, Shaoyu Yang, Liang Chen, Hao Shen. 415-424 [doi]
- Investigating Multi- and Many-Objective Search for Stability-Aware Configuration of an Autonomous Delivery SystemThomas Laurent 0003, Paolo Arcaini, Fuyuki Ishikawa, Hirokazu Kawamoto, Kaoru Sawai, Eiichi Muramoto. 425-430 [doi]
- Automating Test Generation of Industrial Control Software Through a PLC-to-Python Translation Framework and PynguinMikael Ebrahimi Salari, Eduard Paul Enoiu, Cristina Seceleanu, Wasif Afzal, Filip Sebek. 431-440 [doi]
- Cost-Benefit Analysis for Modernizing a Large-Scale Industrial SystemKazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Joji Okada, Yoshiki Higo. 441-449 [doi]
- Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and DetectionTinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo. 450-457 [doi]
- A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality AssuranceTinghui Ouyang, Isao Echizen, Yoshiki Seo. 458-464 [doi]
- A method for requirements elicitation and consensus-building for ideas in the vehicle system concept design using GSNMasahiro Watanabe, Yutaka Matsuno, Toshinori Takai. 465-472 [doi]
- Timing-Aware Variability Resolution in EAST-ADL Product Line ArchitectureMuhammad Waseem Anwar, Alessio Bucaioni, Federico Ciccozzi. 473-482 [doi]
- Migrating Individual Applications into Software Product Lines Using the Mobioos Forge PlatformKarim Ghallab, Tewfik Ziadi, Zaak Chalal. 483-492 [doi]
- Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and MemoryXun An, Qihang Zhou, Haichao Du, Zhenyu Song, Xiaoqi Jia. 493-502 [doi]
- Maturity Assessment Model for Industrial Data PipelinesM. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson. 503-513 [doi]
- Assessing Safety of an Automated Vehicle Through Model-Driven Analysis and SimulationMorayo Adedjouma, Fabien Gaudin, Philippe Fiani. 514-523 [doi]
- Quality Assurance for ML Devices A Risk-Based ApproachGonzalo Aguirre Dominguez, Keigo Kawaai, Hiroshi Maruyama. 524-531 [doi]
- Scalable Fault Tree Analysis for Functional Safety SoftwareHyung-Ho Kim. 532-538 [doi]
- A Decision Tree of Bioengineering Study and Career Path for Educational GuidanceWantana Areeprayolkij, Mengzhen Li. 539-543 [doi]
- Unit Testing Challenges with Automated MarkingChakkrit Tantithamthavorn, Norman Chen. 544-548 [doi]
- Bridging the Gap Between Academic Curricula and Industrial Practice with DevOps EducationNick Patrikeos, Yuchao Jiang, Fethi Rabhi. 549-553 [doi]
- A Meta-Model for Outcome-Based Education: Streamlining Evaluation ProcessesMuhammad Awais, Muhammad Waseem Anwar, Farooque Azam. 554-558 [doi]
- Exploiting Paired Concepts to Facilitate Software Engineering EducationZheng Li 0001, Austen Rainer. 559-563 [doi]
- Toward Enhancing Software Developers' Persuasion and Engagement in GamificationMasateru Tsunoda, Hidetsugu Suto, Takeshi Yamada. 564-568 [doi]
- Automated Detection of Dark Patterns Using In-Context Learning Capabilities of GPT-3Yasin Sazid, Mridha Md. Nafis Fuad, Kazi Sakib. 569-573 [doi]
- A Machine Learning Based Approach to Detect Machine Learning Design PatternsWeitao Pan, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Foutse Khomh, Yann-Gaël Guéhéneuc. 574-578 [doi]
- On Mutation Testing of Graph Database Queries in the Cypher LanguageShingo Ariwaka, Tatsuhiro Tsuchiya. 579-583 [doi]
- A Pilot Study of Testing Infrastructure as Code for Cloud SystemsNabhan Suwanachote, Soratouch Pornmaneerattanatri, Yutaro Kashiwa, Kohei Ichikawa, Pattara Leelaprute, Arnon Rungsawang, Bundit Manaskasemsak, Hajimu Iida. 584-588 [doi]
- Investigating Technology Usage Span by Analyzing Users' Q&A Traces in Stack OverflowSaikat Mondal, Debajyoti Mondal, Chanchal K. Roy. 589-593 [doi]
- TLDBERT: Leveraging Further Pre-Trained Model for Issue Typed Links DetectionHuaian Zhou, Tao Wang, Yang Zhang, Yang Shen. 594-598 [doi]
- A methodology for resilient safety-critical infrastructures using statistical model checkingRajesh Kumar 0012, Nitish Yadav. 599-603 [doi]
- Performance Diagnosis for Microservice-Based Systems via Intra-/Inter-Trace AnalysisZheheng Liang, Guoquan Wu, Lei Cui, Zhenyue Long. 604-606 [doi]
- Automated Runtime Transition between Virtual and Platform Threads in the Java Virtual MachineAndrea Rosà, Matteo Basso, Leonardo Bohnhoff, Walter Binder. 607-611 [doi]
- Towards Formal Verification of Behaviour-Driven Development Scenarios Using Timed AutomataEun-Young Kang 0001, Thiago Rocha Silva. 612-616 [doi]
- Towards Safety Assessment of Robot Behaviors in SMACHEun-Young Kang 0001, Miguel Campusano. 617-621 [doi]
- On Code Example-Aided Just-In-Time Learning for Programming EducationZheng Li 0001, Sridhar Sai Gorrepati, Desmond Greer. 622-626 [doi]
- TABot: A Teaching Assistant Chatbot for Software Engineering CoursesShang-Pin Ma, Yan-Cih Liang, Sheng-Kai Wang, Yu-Wen Huang, Wan-Lin You. 627-631 [doi]
- ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?Michael Fu, Chakkrit Kla Tantithamthavorn, Van Nguyen 0002, Trung Le. 632-636 [doi]
- An Empirical Study on Regression Techniques for Software Defect Number PredictionShihan Wang 0004, Yuxin Re, Rongrong Shi, Chiyuan Jing, Ying Liu, Haonan Tong. 637-638 [doi]
- Detecting Bot on GitHub Leveraging Transformer-based Models: A Preliminary StudyJin Zhang, Xingjin Wu, Yang Zhang, Shunyu Xu. 639-640 [doi]
- Detecting Common Weakness Enumeration Through Training the Core Building Blocks of Similar Languages Based on the CodeBERT ModelChansol Park, R. Young-Chul Kim. 641-642 [doi]
- Enhancing Logic Error Detection Through Program PseudocodesZhenyu Xu, Victor S. Sheng. 643-644 [doi]
- Exploring Collaboration Patterns in GitHub Using Discrete Time Markov ChainSuhee Jo, Ryeonggu Kwon, Gihwon Kwon. 645-646 [doi]
- Exploring Loss Scenarios of STPA with Reinforcement Learning: A Case Study of Platform Screen DoorJiyoung Chang, Ryeonggu Kwon, Gihwon Kwon. 647-648 [doi]
- Funding sources in top Software Engineering conference publicationsGeorgia M. Kapitsaki, Maria Papoutsoglou 0001. 649-650 [doi]
- Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid DeobfuscatorHyeonachang Jeon, Seoyeon Kang, Seoksu Lee, Eun-Sun Cho. 651-652 [doi]
- Can ChatGPT Correct Code Based on Logical Steps?Nao Souma, Waka Ito, Momoka Obara, Takako Kawaguchi, Yuka Akinobu, Toshiyuki Kurabayashi, Haruto Tanno, Kimio Kuramitsu. 653-654 [doi]
- Consistency of Code: A Prompt Based Approach to Comprehend FunctionalityHoyoung Choi, Hyunjae Park, Young-June Choi, Kyungsik Han. 655-656 [doi]
- Symbolic Execution of MPI Programs with One-Sided CommunicationsNenghui Hu, Zheng Bian, Ziqi Shuai, Zhenbang Chen, Yufeng Zhang 0001. 657-658 [doi]
- Test Case Generation for Cross-Blockchain Smart ContractJiahao Gong, Shunhui Ji, Pengcheng Zhang. 659-660 [doi]
- Unsatisfiable Core Based Constraint Solving Cache in Symbolic ExecutionZiqi Shuai, Zhenbang Chen, Yufeng Zhang 0001, Hengbiao Yu, Ji Wang 0001. 661-662 [doi]
- Visualizing Program Behavior with a Ball and Pipes for Computer Science UnpluggedSnmika Jinnouchi, Masateru Tsunoda. 663-664 [doi]