Abstract is missing.
- A Multiple Case Study of Artificial Intelligent System Development in IndustryAnh Nguyen Duc, Ingrid Sundbø, Elizamary Nascimento, Tayana Conte, Iftekhar Ahmed 0001, Pekka Abrahamsson. 1-10 [doi]
- A Bigram-based Inference Model for Retrieving Abbreviated Phrases in Source CodeAbdulrahman Alatawi, Weifeng Xu, Dianxiang Xu. 11-20 [doi]
- An Experimental Evaluation of Imbalanced Learning and Time-Series Validation in the Context of CI/CD PredictionBohan Liu, He Zhang, Lanxin Yang, Liming Dong, Haifeng Shen, Kaiwen Song. 21-30 [doi]
- Agile Islands in a Waterfall Environment: Challenges and Strategies in AutomotiveRashidah Kasauli, Eric Knauss, Joyce Nakatumba-Nabende, Benjamin Kanagwa. 31-40 [doi]
- Mining Questions Asked about Continuous Software Engineering: A Case Study of Stack OverflowMansooreh Zahedi, Roshan Namal Rajapakse, Muhammad Ali Babar. 41-50 [doi]
- Automatic Identification of Decisions from the Hibernate Developer Mailing ListXueying Li, Peng Liang 0001, Zengyang Li. 51-60 [doi]
- Combining Network Analysis with Structural Matching for Design Pattern DetectionWeichao Liu, Cheng Zhang, Futian Wang, Yun Yang 0001. 61-70 [doi]
- A Multinomial Naïve Bayesian (MNB) Network to Automatically Recommend Topics for GitHub RepositoriesClaudio Di Sipio, Riccardo Rubei, Davide Di Ruscio, Phuong T. Nguyen. 71-80 [doi]
- Observations on the Linear Order of Program Code Reading Patterns in Programmers with DyslexiaIan R. McChesney, Raymond Bond. 81-89 [doi]
- Feature Terms Prediction: A Feasible Way to Indicate the Notion of Features in Software Product LineYang Li 0060, Sandro Schulze, Jiahua Xu. 90-99 [doi]
- Exploring the Characteristics of Spectra Distribution and Their Impacts on Fault LocalizationXiao-Yi Zhang, Zheng Zheng. 100-109 [doi]
- Using the Lexicon from Source Code to Determine Application DomainAndrea Capiluppi, Nemitari Ajienka, Nour Ali, Mahir Arzoky, Steve Counsell, Giuseppe Destefanis, Alina Miron, Bhaveet Nagaria, Rumyana Neykova, Martin J. Shepperd, Stephen Swift, Allan Tucker. 110-119 [doi]
- Assessing software defection prediction performance: why using the Matthews correlation coefficient mattersJingxiu Yao, Martin J. Shepperd. 120-129 [doi]
- Publication Bias: A Detailed Analysis of Experiments Published in ESEMRolando P. Reyes, Oscar Dieste, Efraín R. Fonseca C., Natalia Juristo. 130-139 [doi]
- Reasoning about Uncertainty in Empirical ResultsNeil Walkinshaw, Martin J. Shepperd. 140-149 [doi]
- Studying Onboarding in Distributed Software Teams: A Case Study and GuidelinesNils Brede Moe, Viktoria Stray, Marcus R. Goplen. 150-159 [doi]
- Which Software Faults Are Tests Not Detecting?Jean Petric, Tracy Hall, David Bowes. 160-169 [doi]
- Is Exceptional Behavior Testing an Exception?: An Empirical Assessment Using Java Automated TestsFrancisco Dalton, Márcio Ribeiro, Gustavo Pinto 0001, Leonardo Fernandes, Rohit Gheyi, Baldoino Fonseca. 170-179 [doi]
- Caveats in Eliciting Mobile App RequirementsNitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski. 180-189 [doi]
- Investigating the Correlation between Performance Scores and Energy Consumption of Mobile Web AppsKwame Chan-Jong-Chu, Tanjina Islam, Miguel Morales Exposito, Sanjay Sheombar, Christian Valladares, Olivier Philippot, Eoin Martino Grua, Ivano Malavolta. 190-199 [doi]
- Mining Decision-Making Processes in Open Source Software Development: A Study of Python Enhancement Proposals (PEPs) using Email RepositoriesPankajeshwara Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger. 200-209 [doi]
- Surveying Software Practitioners on Technical Debt Payment Practices and Reasons for not Paying off Debt ItemsSávio Freire, Nicolli Rios, Boris Gutierrez, Darío Torres, Manoel G. Mendonça, Clemente Izurieta, Carolyn B. Seaman, Rodrigo O. Spínola. 210-219 [doi]
- How Do FOSS Communities Decide to Accept Pull Requests?Adam Alami, Marisa Leavitt Cohn, Andrzej Wasowski. 220-229 [doi]
- A Better Set of Object-Oriented Design Metrics for Within-Project Defect PredictionViet Van Pham, Chris Lokan, Kathryn Kasmarik. 230-239 [doi]
- Actionable Software Metrics: An Industrial PerspectivePrabhat Ram, Pilar Rodríguez, Markku Oivo, Silverio Martínez-Fernández, Alessandra Bagnato, Michal Choras, Rafal Kozik, Sanja Aaramaa, Milla Ahola. 240-249 [doi]
- Documentation of Quality Requirements in Agile Software DevelopmentWoubshet Behutiye, Pertti Seppänen, Pilar Rodríguez, Markku Oivo. 250-259 [doi]
- Collaborative Modelling: Chatbots or On-Line Tools? An Experimental StudyRanci Ren, John W. Castro, Adrián Santos, Sara Pérez-Soler, Silvia Teresita Acuña, Juan de Lara. 260-269 [doi]
- Quality Assessment of Online Automated Privacy Policy Generators: An Empirical StudyRuoxi Sun, Minhui Xue. 270-275 [doi]
- Tricking Johnny into Granting Web PermissionsMohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz. 276-281 [doi]
- An Empirical Investigation on Software Practices in Growth Phase StartupsOrges Cico, Anh Nguyen Duc, Letizia Jaccheri. 282-287 [doi]
- Themes and Difficulties in Distributed Agile Email Activity: A Qualititative Team-Based StudySteve Counsell, Sunila Modi, Pamela Abbott. 288-292 [doi]
- Heterogeneous Tailoring Approach Using the Spotify ModelAbdallah Salameh, Julian M. Bass. 293-298 [doi]
- A Qualitative Study of the Background, Skill Acquisition, and Learning Preferences of Software TestersRaluca Florea, Viktoria Stray. 299-305 [doi]
- Visualizing Inter-Team CoordinationTomas Gustavsson. 306-311 [doi]
- A Practical Concolic Execution Technique for Large Scale Software SystemsHongliang Liang, Wenqing Yu, Lu Ai, Lin Jiang. 312-317 [doi]
- An Exploratory Study Towards Understanding Lambda Expressions in PythonA. Eashaan Rao, Sridhar Chimalakonda. 318-323 [doi]
- How Can I Contribute?: A Qualitative Analysis of Community Websites of 25 Unix-Like DistributionsJacob Krüger, Sebastian Nielebock 0001, Robert Heumüller. 324-329 [doi]
- On the Understanding of Experimentation Usage in Light of Lean Startup in Software Development ContextBruna Prauchner Vargas, Ingrid Signoretti, Maximilian Zorzetti, Sabrina Marczak, Ricardo Bastos. 330-335 [doi]
- How features in iOS App Store Reviews can Predict Developer ResponsesKamonphop Srisopha, Devendra Swami, Daniel Link, Barry W. Boehm. 336-341 [doi]
- MLCQ: Industry-Relevant Code Smell Data SetLech Madeyski, Tomasz Lewowski. 342-347 [doi]
- Agility is responsiveness to change: An essential definitionLucas Gren, Per Lenberg. 348-353 [doi]
- Formal vs. Case-Study-Based Approaches for the Identification of Cultural Influences in Requirements EngineeringTawfeeq Alsanoosy, Maria Spichkova, James Harland. 354-359 [doi]
- Achieving "Good Enough" Software Security: The Role of ObjectivityInger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun. 360-365 [doi]
- Explainable Priority Assessment of Software-Defects using Categorical Features at SAP HANALuca Lenz, Michael Felderer, Sascha Schwedes, Kai Müller. 366-367 [doi]
- Making Software Measurement Standards UnderstandableWilhelm Meding, Miroslaw Staron. 368-370 [doi]
- Characteristic Traits of Software TestersLucas Paruch, Viktoria Stray, Charlotte Bech Blindheim. 371-372 [doi]
- Experiences from an Interpretative Case Study of Innovative Public Procurement of Digital Systems in the Norwegian Public SectorBabak A. Farshchian, Hilde Sætertrø, Marianne Stålaker. 373-374 [doi]
- TMMI Integration with Agile and Test ProcessAhmet Unudulmaz, Oya Kalipsiz. 375-378 [doi]
- Exploring and improving industry-academia communication in software engineeringSergio Rico. 379-382 [doi]
- Blockchain Applications in Human Resources Management: Opportunities and ChallengesDina Salah, Maha Hafez Ahmed, Kamal ElDahshan. 383-389 [doi]
- The Minimum Hybrid Contract (MHC): Combining Legal and Blockchain Smart ContractsJørgen Svennevik Notland, Jakob Svennevik Notland, Donn Morrison. 390-397 [doi]
- Exploring the Challenges of Developing and Operating Consortium Blockchains: A Case StudyShanshan Li, Qianwen Xu, Peiyu Hou, Xiudi Chen, Yanze Wang, He Zhang, Guoping Rong. 398-404 [doi]
- On the Evaluation of the Security Usability of Bitcoin's APIsPhilipp Tschannen, Ali Ahmed. 405-412 [doi]
- RMDevOps: A Road Map for Improvement in DevOps Activities in Context of Software OrganizationsSaima Rafi, Wu Yu, Muhammad Azeem Akbar. 413-418 [doi]
- Generative Ranking based Sequential Recommendation in Software CrowdsourcingWeisong Sun, Xuefeng Yan, Arif Ali Khan. 419-426 [doi]
- Towards Process Improvement in DevOps: A Systematic Literature ReviewSher Badshah, Arif Ali Khan, Bilal Khan. 427-433 [doi]
- Cross-Project Software Fault Prediction Using Data Leveraging Technique to Improve Software QualityBilal Khan, Danish Iqbal, Sher Badshah. 434-438 [doi]
- Towards continues code recommendation and implementation system: An Initial FrameworkMuhammad Azeem Akbar, Zhiqiu Huang, Yu Zhou 0010, Faisal Mehmood, Yasir Hussain, Muhammad Hamza. 439-444 [doi]
- Towards successful global software developmentMuhammad Shafiq 0006, Qinghua Zhang, Muhammad Azeem Akbar, Tahir Kamal, Faisal Mehmood, Muhammad Tanveer Riaz. 445-450 [doi]
- Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things upMohammad Zarour, Mamdouh Alenezi, Khalid Alsarayrah. 451-456 [doi]
- Towards a Hypothetical Framework to Secure DevOps Adoption: Grounded Theory ApproachSaima Rafi, Wu Yu, Muhammad Azeem Akbar. 457-462 [doi]
- SIOT-RIMM: Towards Secure IOT-Requirement Implementation Maturity ModelMuhammad Hamza, Haibo Hu 0002, Muhammad Azeem Akbar, Faisal Mehmood, Yasir Hussain, Ali Mahmoud Baddour. 463-468 [doi]
- Secure V2X Environment using Blockchain TechnologyMs. Taiyaba, Muhammad Azeem Akbar, Bushra Qureshi, Muhammad Shafiq 0006, Muhammad Hamza, Tanveer Riaz. 469-474 [doi]
- Automated Identification of Security Requirements: A Machine Learning ApproachArmin Kobilica, Mohammed Ayub, Jameleddine Hassine. 475-480 [doi]
- PrivDRM: A Privacy-preserving Secure Digital Right Management SystemTarek Gaber, Ali Ahmed, Amira Mostafa. 481-486 [doi]
- The State of the Art on Secure Software Engineering: A Systematic Mapping StudyRafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Ilyas, Mohd Yazid Idris. 487-492 [doi]
- Towards Efficient and Secure Global Software Development using BlockchainMuhammad Azeem Akbar, Ahmad Al-Sanad, Abeer Abdul-Aziz Alsanad, Abdu Gumaei, Muhammad Shafiq 0006, Tahir Kamal. 493-498 [doi]
- A Comparison Study of Available Sofware Security OntologiesMamdouh Alenezi, Hamid Abdul Basit, Faraz Idris Khan, Maham Anwar Beg. 499-504 [doi]
- What Norwegian Developers Want and Need From Security-Directed Program Analysis Tools: A SurveyElias Brattli Sørensen, Edvard Kristoffer Karlsen, Jingyue Li. 505-511 [doi]