Abstract is missing.
- Using the case survey methodology for finding high-quality grey literature in software engineeringAshley Williams, Jim Buchan. 1-9 [doi]
- Automatically Capturing Quality-Related Concerns in Bug Report Descriptions for Efficient Bug TriagingRrezarta Krasniqi, Hyunsook Do. 10-19 [doi]
- Text and Team: What Article Metadata Characteristics Drive Citations in Software Engineering?Lorenz Graf-Vlachy, Daniel Graziotin, Stefan Wagner 0001. 20-29 [doi]
- Black-box Test Case Selection by Relating Code Changes with Previously Fixed DefectsTutku Çingil, Hasan Sözer. 30-39 [doi]
- How Are Communication Channels on GitHub Presented to Their Intended Audience? - A Thematic AnalysisVerena Ebert, Daniel Graziotin, Stefan Wagner 0001. 40-49 [doi]
- An empirical study on the Performance and Energy Consumption of AI Containerization Strategies for Computer-Vision Tasks on the EdgeRaluca-Maria Hampau, Maurits Kaptein, Robin van Emden, Thomas Rost, Ivano Malavolta. 50-59 [doi]
- Peer-Reviewing and Submission Dynamics Around Top Software-Engineering Venues: A Juniors' PerspectiveRand Alchokr, Jacob Krüger, Yusra Shakeel, Gunter Saake, Thomas Leich. 60-69 [doi]
- Human Values Violations in Stack Overflow: An Exploratory StudySara Krishtul, Mojtaba Shahin, Humphrey O. Obie, Hourieh Khalajzadeh, Fan Gai, Ali Rezaei Nasab, John C. Grundy. 70-79 [doi]
- Overlap between Automated Unit and Acceptance Testing - a Systematic Literature ReviewJack van Heugten Breurkes, Fabian Gilson, Matthias Galster. 80-89 [doi]
- On Reporting Performance and Accuracy Bugs for Deep Learning Frameworks: An Exploratory Study from GitHubGuoming Long, Tao Chen. 90-99 [doi]
- How Do Software Companies Deal with Artificial Intelligence Ethics? A Gap AnalysisVille Vakkuri, Kai-Kristian Kemell, Joel Tolvanen, Marianna Jantunen, Erika Halme, Pekka Abrahamsson. 100-109 [doi]
- Exploring Security Vulnerabilities in Competitive Programming: An Empirical StudyDebeshee Das, Noble Saji Mathews, Sridhar Chimalakonda. 110-119 [doi]
- Do Developers Modify Dead Methods during the Maintenance of Java Desktop Applications?Pietro Cassieri, Simone Romano 0001, Giuseppe Scanniello, Genoveffa Tortora, Danilo Caivano. 120-129 [doi]
- On the Impact of the Critical CSS Technique on the Performance and Energy Consumption of Mobile BrowsersKalle Janssen, Tim Pelle, Lucas de Geus, Reinier van der Gronden, Tanjina Islam, Ivano Malavolta. 130-139 [doi]
- Comparing the Energy Efficiency of WebAssembly and JavaScript in Web Applications on Android Mobile DevicesMax van Hasselt, Kevin Huijzendveld, Nienke Noort, Sasja de Ruijter, Tanjina Islam, Ivano Malavolta. 140-149 [doi]
- Towards a Catalog of Energy Patterns in Deep Learning DevelopmentShriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma, Vikrant Kaulgud. 150-159 [doi]
- Evaluating Code Improvements in Software Quality Course ProjectsStanislav Chren, Martin Macák, Bruno Rossi 0001, Barbora Buhnova. 160-169 [doi]
- Understanding the Experience of Code Review: Misalignments, Attention, and Units of AnalysisEmma Söderberg, Luke Church, Jürgen Börstler, Diederick C. Niehorster, Christofer Rydenfält. 170-179 [doi]
- Incorporating Altmetrics to Support Selection and Assessment of Publications During Literature AnalysesYusra Shakeel, Rand Alchokr, Jacob Krüger, Thomas Leich, Gunter Saake. 180-189 [doi]
- Studying the Practices of Deploying Machine Learning Projects on DockerMoses Openja, Forough Majidi, Foutse Khomh, Bhagya Chembakottu, Heng Li. 190-200 [doi]
- A Hierarchical DBSCAN Method for Extracting Microservices from Monolithic ApplicationsKhaled Sellami, Mohamed Aymen Saied, Ali Ouni 0001. 201-210 [doi]
- An Empirical Study of Blockchain Repositories in GitHubAjoy Das, Gias Uddin 0001, Guenther Ruhe. 211-220 [doi]
- Personality Traits in Game DevelopmentMiriam Sturdee, Matthew Ivory, David Ellis, Patrick Stacey, Paul Ralph. 221-230 [doi]
- Simulating the Evolution of Clone-and-Own Projects with VEVOSAlexander Schultheiß, Paul Maximilian Bittner, Sascha El-Sharkawy, Thomas Thüm, Timo Kehrer. 231-236 [doi]
- Litmus Test for Linus' Law: A Structural Equation Modeling Based ApproachReshmi Maulik, Subhajit Datta, Subhashis Majumder. 237-242 [doi]
- Building an Operable Graph Representation of a Java Program as a Basis for Automatic Software Maintainability AnalysisSébastien Bertrand, Pierre-Alexandre Favier, Jean-Marc André. 243-248 [doi]
- Understanding the Characteristics of Visual Contents in Open Source Issue Discussions: A Case Study of Jupyter NotebookVishakha Agrawal, Yong-Han Lin, Jinghui Cheng. 249-254 [doi]
- On the Identification of Third-Party Library Usage Patterns for Android ApplicationsRichardson Alexandre, Ali Ouni 0001, Mohamed Aymen Saied, Salah Bouktif, Mohamed Wiem Mkaouer. 255-259 [doi]
- The Evolving Landscape of Software Performance EngineeringGunnar Kudrjavets, Jeff Thomas, Nachiappan Nagappan. 260-261 [doi]
- Offline assessment of interference effects in a series of AB testsAgne Reklaite, Jevgenij Gamper. 262-263 [doi]
- On the Use of Causal Graphical Models for Designing Experiments in the Automotive DomainDavid Issa Mattos, Yuchu Liu. 264-265 [doi]
- The Lifecycle of Developing Overall Evaluation Criterion in AB Testing for Netflix MessagingSophia Liu, Alex Liu. 266-267 [doi]
- Automated Sample Ratio Mismatch (SRM) detection and analysisLukas Vermeer, Kevin Anderson, Mauricio Acebal. 268-269 [doi]
- When experimentation starts as a solution to raise ROI: The pitfall of not having the right scope for experimentation ROIRuben de Boer, Shirley van Haalem, Desiree van der Horst, Ton Wesseling. 270-271 [doi]
- Significance of Continuous Compliance in AutomotiveAli Shahrokni, Patrizio Pelliccione. 272-273 [doi]
- Enforcing Consistent Code Style in a Repository While Allowing Developer-Specific Preferences in Local Workspaces: An Experience ReportTjasa Hericko, Bostjan Sumak. 274-275 [doi]
- Conversational DevBots for Secure Programming: An Empirical Study on SKF ChatbotCatherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato. 276-281 [doi]
- Generated abstracts: evaluating automatic text summarization for blog posts in gray literature studiesJorge Melegati, Eduardo M. Guerra 0001, Igor Scaliante Wiese, Xiaofeng Wang 0001. 282-287 [doi]
- On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven LibrariesAyano Ikegami, Raula Gaikovina Kula, Bodin Chinthanet, Vittunyuta Maeprasart, Ali Ouni 0001, Takashi Ishio, Kenichi Matsumoto. 288-293 [doi]
- Can We Increase the Test-coverage in Libraries using Dependent Projects' Test-suites?Igor Schittekat, Mehrdad Abdi, Serge Demeyer. 294-298 [doi]
- How Experimentation in Software Engineering has been taught? Survey and Research AgendaCarlos Danilo Luz, Edson OliveiraJr, Igor Fabio Steinmacher. 299-304 [doi]
- Extending a corpus for assessing the credibility of software practitioner blog articles using meta-knowledgeAshley Williams, Matthew Shardlow. 305-310 [doi]
- Introducing an Evaluation Method for TaxonomiesAngelika Kaplan, Thomas Kühn 0001, Sebastian Hahner, Niko Benkler, Jan Keim, Dominik Fuchß, Sophia Corallo, Robert Heinrich. 311-316 [doi]
- The Soft Skills of Software Learning Development: the Psychological Dimensions of Computing and Security BehavioursMatthew Ivory. 317-322 [doi]
- Classification of Software Engineering Contributions to Support Validation Techniques and Research ApplicationsAngelika Kaplan. 323-328 [doi]
- Better Identifying and Addressing Diverse Issues in mHealth and Emerging Apps Using User ReviewsOmar Haggag. 329-335 [doi]
- Toward Investigating the Violations Roles of Pattern Grime Occurrence in Software Design Patterns: Violations Roles of Pattern GrimeSara H. S. Almadi. 336-341 [doi]
- An Open Science-Based Framework for Managing Experimental Data in Software EngineeringAndré Felipe R. Cordeiro. 342-346 [doi]
- Security and Privacy Challenges in Blockchain Interoperability - A Multivocal Literature ReviewTerje Haugum, Bjørnar Hoff, Mohammed Alsadi, Jingyue Li. 347-356 [doi]
- Performance Modeling of Hyperledger Fabric 2.0Ou Wu, Shanshan Li, Liwen Liu, He Zhang, Xin Zhou, Qinghua Lu 0001. 357-365 [doi]
- A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static AnalysisPeiru Li, Shanshan Li, Mengjie Ding, Jiapeng Yu, He Zhang, Xin Zhou, Jingyue Li. 366-374 [doi]
- Experience on Using ArchiMate Models for Modelling Blockchain-Enhanced Value ChainsShanshan Jiang, Truls Bakkejord Ræder. 375-382 [doi]
- Ethics of AI: A Systematic Literature Review of Principles and ChallengesArif Ali Khan, Sher Badshah, Peng Liang 0001, Muhammad Waseem, Bilal Khan, Aakash Ahmad, Mahdi Fahmideh, Mahmood Niazi, Muhammad Azeem Akbar. 383-392 [doi]
- AI-Based Software Defect Prediction for Trustworthy Android Appssaadia sadaf, Danish Iqbal, Barbora Buhnova. 393-398 [doi]
- The Influence of Cost Drivers on Effort Estimation in Distributed Software DevelopmentDanish Iqbal, Sher Badshah, Irfan Kazim. 399-407 [doi]
- DevOps Business Model: Work from Home EnvironmentSaima Rafi, Muhammad Azeem Akbar, Adnan Manzoor. 408-412 [doi]
- Empirical Investigation of role of Meta-learning approaches for the Improvement of Software Development Process via Software Fault PredictionShahid Hussain, Naseem Ibrahim. 413-420 [doi]
- Toward Effective and Efficient DevOps using BlockchainMuhammad Azeem Akbar, Sajjad Mahmood, Dominik Siemon. 421-427 [doi]
- Assessing the Maturity of DevOps Practices in Software Industry: An Empirical Study of HELENA2 DatasetAnkur Kumar, Mohammad Nadeem, Mohammad Shameem. 428-432 [doi]
- Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping StudyRafiq Ahmad Khan, Siffat Ullah Khan, Muhammad Ilyas 0002. 433-439 [doi]
- Challenges of Secure Software Deployment: An Empirical StudyAzzah A. Alghamdi, Mahmood Niazi. 440-445 [doi]
- EVSec: An Approach to Extract and Visualize Security Scenarios from System LogsJameleddine Hassine. 446-452 [doi]
- Toward a secure global contact tracing app for Covid-19Muhammad Hamza, Arif Ali Khan, Muhammad Azeem Akbar. 453-460 [doi]
- Software Testing and Quality Assurance for Data Intensive ApplicationsSonali Agarwal, Sanjay Kumar Sonbhadra, Narinder Singh Punn. 461-462 [doi]
- Enhancing Product Comparison through Automated Similarity MatchingMike Mannion, Hermann Kaindl. 463-464 [doi]
- Tutorial 3: Pitfalls in the Measurement Methods Applied in Experimental Software Engineering - Assessment and Suggestions for ImprovementOscar Dieste, Sira Vegas. 465-466 [doi]