Abstract is missing.
- Towards Understanding Programs by Counting ObjectsEwan D. Tempero, Paul Ralph. 1-10 [doi]
- Engineering Interactive Systems with Model-Driven Code ContractsJudy Bowen, Steve Reeves. 11-20 [doi]
- Generating Pseudo-Code from Source Code Using Deep LearningAbdulaziz Alhefdhi, Hoa Khanh Dam, Hideaki Hata, Aditya Ghose. 21-25 [doi]
- Symbolic Execution with Invariant Inlay: Evaluating the PotentialEman Alatawi, Tim Miller, Harald Søndergaard. 26-30 [doi]
- Semi-Automated Extraction of New Requirements from Online Reviews for Software Product EvolutionJim Buchan, Muneera Bano, Didar Zowghi, Phonephasouk Volabouth. 31-40 [doi]
- Psychologically-Driven Requirements Engineering: A Case Study in Depression CareEman Alatawi, Antonette Mendoza, Tim Miller. 41-50 [doi]
- Evaluating an Open Learner Model Visualisation Prototype Tool with User eXperience MetricsLaw Check Yee, John C. Grundy, Karola von Baggo, Andrew Cain, Rajesh Vasa. 51-60 [doi]
- From User Stories to Use Case Scenarios towards a Generative ApproachFabian Gilson, Calum Irwin. 61-65 [doi]
- Automating Developers' Responses to App ReviewsGeorgia Greenheld, Bastin Tony Roy Savarimuthu, Sherlock A. Licorish. 66-70 [doi]
- A Perception of the Practice of Software Security and Performance VerificationVictor Vidigal Ribeiro, Daniela Soares Cruzes, Guilherme Horta Travassos. 71-80 [doi]
- Preliminary Evaluation of a Guided Usability Defect Report FormNor Shahida Mohamad Yusop, John C. Grundy, Jean-Guy Schneider, Rajesh Vasa. 81-90 [doi]
- Monitoring Informed Testing for IoTAhmed Abdullah, Heinz W. Schmidt, Maria Spichkova, Huai Liu. 91-95 [doi]
- Metamorphic Testing for Machine Translations: MT4MTZhi Quan Zhou, Liqun Sun. 96-100 [doi]
- ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-ManagementMohan Baruwal Chhetri, Hien P. Luong, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk, Surya Nepal, Isuru Rajapakse. 101-110 [doi]
- Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development ProjectsDaniela Soares Cruzes, Martin Gilje Jaatun, Karin Bernsmed, Inger Anne Tøndel. 111-120 [doi]
- Driver Generation for Java EE Web ApplicationsJens Dietrich, François Gauthier, Padmanabhan Krishnan. 121-125 [doi]
- Revealing Implicit Correspondence between Bytecode Instructions and Expressions Determined by Java CompilersIzuru Kume, Masahide Nakamura, Naoya Nitta. 126-130 [doi]
- Missing Clean Code Acceptance and Support in Practice - An Empirical StudyPaula Rachow, Sandra Schröder, Matthias Riebisch. 131-140 [doi]
- Code Reuse in Stack Overflow and Popular Open Source Java ProjectsAdriaan Lotter, Sherlock A. Licorish, Bastin Tony Roy Savarimuthu, Sarah Meldrum. 141-150 [doi]
- Formal in the Informal: A Multi-Level Analysis of Core Python Developers' TweetsMuhammad Yasir, Kevin Michael, Bastin Tony Roy Savarimuthu, Sherlock A. Licorish. 151-160 [doi]
- Experience Building IT Infrastructure for Research with Online Youth Mental Health ToolsJim Warren, Ewan Tempero, Ian Warren, Anjuka Sathianathan, Sarah Hopkins, Matthew Shepherd, Sally Merry. 161-165 [doi]
- Automated Analysis of the Impact of Weather Conditions on Medicine ConsumptionMaria Spichkova. 166-170 [doi]
- How Is Logging Practice Implemented in Open Source Software Projects? A Preliminary ExplorationGuoping Rong, Shenghui Gu, He Zhang, Dong Shao, Wanggen Liu. 171-180 [doi]
- Application of Design Patterns for Structural Alignment in Software PortingTilmann Stehle, Matthias Riebisch. 181-190 [doi]
- Developing Cross-Organisational Service-Based Software Systems through Decentralised Interface-Oriented Continuous IntegrationJameel Almalki, Haifeng Shen. 191-200 [doi]
- Using Blog Articles in Software Engineering Research: Benefits, Challenges and Case-Survey MethodAusten Rainer, Ashley Williams. 201-209 [doi]
- Identification of Technology Features to Understand and Maintain Software ArchitecturesSebastian Gerdes, Tobias Fechner, Matthias Riebisch. 210-214 [doi]