Abstract is missing.
- From Data Analysis to Human Input: Navigating the Complexity of Software Evaluation and AssessmentSigrid Eldh. 1 [doi]
- A Systematic Literature Review on Client Selection in Federated LearningCarl Smestad, Jingyue Li. 2-11 [doi]
- Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary ObjectsChristoph Matthies, Robert Heinrich, Rebekka Wohlrab. 12-21 [doi]
- Impact of Architectural Smells on Software Performance: an Exploratory StudyFrancesca Arcelli Fontana, Matteo Camilli, Davide Rendina, Andrei Gabriel Taraboi, Catia Trubiani. 22-31 [doi]
- DQSOps: Data Quality Scoring Operations Framework for Data-Driven ApplicationsFiras Bayram, Bestoun S. Ahmed, Erik Hallin, Anton Engman. 32-41 [doi]
- Code Reviewer Recommendation for Architecture Violations: An Exploratory StudyRuiyin Li, Peng Liang 0001, Paris Avgeriou. 42-51 [doi]
- Measuring User Experience of Adaptive User Interfaces using EEG: A Replication StudyDaniel Gaspar-Figueiredo, Silvia Abrahão, Emilio Insfrán, Jean Vanderdonckt. 52-61 [doi]
- Implementing AI Ethics: Making Sense of the Ethical RequirementsMamia Agbese, Rahul Mohanani, Arif Ali Khan, Pekka Abrahamsson. 62-71 [doi]
- On the Energy Consumption and Performance of WebAssembly Binaries across Programming Languages and Runtimes in IoTLinus Wagner, Maximilian Mayer, Andrea Marino, Alireza Soldani Nezhad, Hugo Zwaan, Ivano Malavolta. 72-82 [doi]
- HornFuzz: Fuzzing CHC solversAnzhela Sukhanova, Valentyn Sobol. 83-92 [doi]
- On the Reliability of the Area Under the ROC Curve in Empirical Software EngineeringLuigi Lavazza, Sandro Morasca, Gabriele Rotoloni. 93-100 [doi]
- Understanding Self-Efficacy in Software Engineering Industry: An Interview studyDanilo Monteiro Ribeiro, Rayfran Lima, César França, Alberto Luiz Oliveira Tavares de Souza, Isadora Silva, Gustavo H. L. Pinto. 101-110 [doi]
- Classification-based Static Collection Selection for Java: Effectiveness and AdaptabilityNoric Couderc, Christoph Reichenbach, Emma Söderberg. 111-120 [doi]
- Developers' Perception of GitHub Actions: A Survey AnalysisSk Golam Saroar, Maleknaz Nayebi. 121-130 [doi]
- Do Developers Benefit from Recommendations when Repairing Inconsistent Design Models? a Controlled ExperimentLuciano Marchezan, Wesley K. G. Assunção, Gabriela Karoline Michelon, Alexander Egyed. 131-140 [doi]
- An Empirical Study on Continuous Integration Trends, Topics and Challenges in Stack OverflowAli Ouni 0001, Islem Saidani, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer. 141-151 [doi]
- Analyzing the Resource Usage Overhead of Mobile App Development FrameworksWellington Oliveira, Bernardo Moraes, Fernando Castor, João Paulo Fernandes. 152-161 [doi]
- Analyzing Bug Life Cycles to Derive Practical InsightsÇagri Eren, Kerem Sahin, Eray Tüzün. 162-171 [doi]
- Full Spec Software via Platform Engineering: Transition from Bolting-on to Building-inHuseyin Dursun. 172-175 [doi]
- NxtUnit: Automated Unit Test Generation for GoSiwei Wang, Xue Mao, Ziguang Cao, Yujun Gao, Qucheng Shen, Chao Peng. 176-179 [doi]
- Artifact Traceability in DevOps: An Industrial Experience ReportZaki Pauzi, Rajvir Thind, Andrea Capiluppi. 180-183 [doi]
- SoHist: A Tool for Managing Technical Debt through Retro Perspective Code AnalysisBenedikt Dornauer, Michael Felderer, Johannes Weinzerl, Mircea-Cristian Racasan, Martin Hess. 184-187 [doi]
- Assessing the Impact of File Ordering Strategies on Code Review ProcessFarid Bagirov, Pouria Derakhshanfar, Alexey Kalina, Elena Kartysheva, Vladimir Kovalenko. 188-191 [doi]
- Automating Microservices Test Failure Analysis using Kubernetes Cluster LogsPawan Kumar Sarika, Deepika Badampudi, Sai Prashanth Josyula, Muhammad Usman. 192-195 [doi]
- Are security commit messages informative? Not enough!Sofia Reis, Rui Abreu 0001, Corina S. Pasareanu. 196-199 [doi]
- Functional Size Measurement in Agile Development: Velocity in Agile SprintsThomas Fehlmann, Andrea Gelli. 200-204 [doi]
- Improving the Reporting of Threats to Construct ValidityDag I. K. Sjøberg, Gunnar R. Bergersen. 205-209 [doi]
- Psychological Aspects of Pair Programming: A Mixed-methods Experimental StudyMarcel Valový. 210-216 [doi]
- Barriers for Social Inclusion in Online Software Engineering Communities - A Study of Offensive Language Use in Gitter ProjectsBastin Tony Roy Savarimuthu, Zoofishan Zareen, Jithin Cheriyan, Muhammad Yasir, Matthias Galster. 217-222 [doi]
- Identifying Characteristics of the Agile Development Process That Impact User SatisfactionMinshun Yang, Seiji Sato, Hironori Washizaki, Yoshiaki Fukazawa, Juichi Takahashi. 223-228 [doi]
- Fusion of deep convolutional and LSTM recurrent neural networks for automated detection of code smellsAnh Ho, Anh M. T. Bui, Phuong T. Nguyen 0001, Amleto Di Salle. 229-234 [doi]
- Analysis of Bug Report Qualities with Fixing Time using a Bayesian NetworkSien Reeve Ordonez Peralta, Hironori Washizaki, Yoshiaki Fukazawa, Yuki Noyori, Shuhei Nojiri, Hideyuki Kanuka. 235-240 [doi]
- Replication and Extension of Schnappinger's Study on Human-level Ordinal Maintainability Prediction Based on Static Code MetricsSébastien Bertrand, Silvia Ciappelloni, Pierre-Alexandre Favier, Jean-Marc André. 241-246 [doi]
- Understanding the relationship between Technical Debt, New Code Cost and Rework Cost in Open-Source Software Projects: An Empirical StudyJudith Perera, Ewan D. Tempero, Yu-Cheng Tu 0001, Kelly Blincoe. 247-252 [doi]
- Outside the Sandbox: A Study of Input/Output Methods in JavaMatús Sulír, Sergej Chodarev, Milan Nosál. 253-258 [doi]
- Investigation of Security-related Commits in Android AppsTeerath Das, Adam Ali, Tommi Mikkonen. 259-260 [doi]
- Does Code Smell Frequency Have a Relationship with Fault-proneness?Md. Masudur Rahman 0005, Toukir Ahammed, Md. Mahbubul Alam Joarder, Kazi Sakib. 261-262 [doi]
- Team Composition in Software Engineering EducationSajid Ibrahim Hashmi, Jouni Markkula. 263-264 [doi]
- Code Privacy in Detection of Web VulnerabilitiesJorge Martins, Ibéria Medeiros, Bernardo Ferreira. 265-266 [doi]
- Too long; didn't read: Automatic summarization of GitHub README.MD with TransformersThu Thu Ha Doan, Phuong T. Nguyen 0001, Juri Di Rocco, Davide Di Ruscio. 267-272 [doi]
- Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK)Sam Attwood, Ashley Williams. 273-278 [doi]
- Towards Human-Bot Collaborative Software Architecting with ChatGPTAakash Ahmad, Muhammad Waseem, Peng Liang 0001, Mahdi Fahmideh, Mst Shamima Aktar, Tommi Mikkonen. 279-285 [doi]
- Reengineering legacy document information systems: Challenges and solutionsDelfina Ramos-Vidal. 286-291 [doi]
- Towards a User-centred Security Framework for Social Robots in Public SpacesSamson Ogheneovo Oruma. 292-297 [doi]
- Investigating the Relation between Requirements Framing and Confirmation Bias in TestingAfsarah Jahin. 298-303 [doi]
- Software Architecture Design of a Serverless SystemMuhammad Hamza. 304-306 [doi]
- Effective Agile Contracts Framework for Software Innovation ProjectsAdriano Gomes. 307-312 [doi]
- Analyzing Maintenance Activities of Software LibrariesAlexandros Tsakpinis. 313-318 [doi]
- Automatic Data-Driven Software Change Identification via Code Representation LearningTjasa Hericko. 319-323 [doi]
- Functional Size Measurement in Agile Development: Velocity in Agile SprintsThomas Fehlmann, Andrea Gelli. 324-325 [doi]
- Ethical Requirements Stack: A framework for implementing ethical requirements of AI in software engineering practicesMamia Agbese, Rahul Mohanani, Arif Ali Khan, Pekka Abrahamsson. 326-328 [doi]
- A Means to what End? Evaluating the Explainability of Software Systems using Goal-Oriented HeuristicsHannah Deters, Jakob Droste, Kurt Schneider. 329-338 [doi]
- Aggregating N-fold Requirements Inspection ResultsMarian Daun, Jennifer Brings. 339-347 [doi]
- Using InnerSource for Improving Internal Reuse: An Industrial Case StudyXingru Chen, Muhammad Usman, Deepika Badampudi. 348-357 [doi]
- A Rapid Review of Responsible AI frameworks: How to guide the development of ethical AIVita Santa Barletta, Danilo Caivano, Domenico Gigante, Azzurra Ragone. 358-367 [doi]
- U Owns the Code That Changes and How Marginal Owners Resolve Issues Slower in Low-Quality Source CodeMarkus Borg, Adam Tornhill, Enys Mones. 368-377 [doi]
- Decentralised Autonomous Organisations for Public ProcurementFelix Monteiro, Miguel Correia. 378-385 [doi]
- Perceived Trust in Blockchain Systems: An Interview-based SurveyHuikun Liu, Yanze Wang, Zhaowei Jiang, He Zhang, Jingyue Li, Sigurd Eileras, Haakon Pelsholen Busterud. 386-393 [doi]
- Understandings of Ethics in DevOps Teams: A Preliminary InvestigationMaira Khanam, Saima Rafi, Muhammad Azeem Akbar. 394-397 [doi]
- Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical StudyYasir Hussain, Zhiqiu Huang, Yu Zhou 0010, Izhar Ahmed Khan, Nasrullah Khan, Muhammad Zahid Abbas. 398-405 [doi]
- Challenges in Requirements Gathering for Agile Software DevelopmentRamya Sri Simhadri, Mohammad Shameem. 406-413 [doi]
- Comparative Analysis of Fuzzy and Neural Controller for a Boost ConverterMuhammad Waqas Qaisar, Mujtaba Hassan, Muhammad Tanveer Riaz, Muhammad Shahid, Ahmad Abdul Ghani, Muhammad Abbas Khan 0001, Kashif Hussain. 414-422 [doi]
- Identification of Influential Factors for Successful Adoption of DevOps and CloudSidra Ramzan, Saif ur Rehman Khan, Shahid Hussain, Wen-Li Wang, Mei-Huei Tang. 423-429 [doi]
- A Study on Management Challenges and Practices in DevOpsSyed Muhammad Faaiz, Saif ur Rehman Khan, Shahid Hussain, Wen-Li Wang, Naseem Ibrahim. 430-437 [doi]
- Prioritization of DevOps Maturity models using Fuzzy TOPSISAnkur Kumar, Mohammad Nadeem, Mohammad Shameem. 438-443 [doi]
- An Intelligent Automation of Power Transformer using PLC and SCADA at SubstationAsma Shamshad, Muhammad Tanveer Riaz, Ali Raza, Muhammad Abbas Khan. 444-449 [doi]
- A Mixed Reality Approach for Innovative Pair Programming Education with a Conversational AI Virtual AvatarGilda Manfredi, Ugo Erra, Gabriele Gilio. 450-454 [doi]
- Collecting cognitive strategies applied by students during test case designFelix Cammaerts, Monique Snoeck, Ana C. R. Paiva. 455-459 [doi]
- Gamification of Business Process Modeling Notation education: an experience reportGiacomo Garaccione, Riccardo Coppola, Luca Ardito, Marco Torchiano. 460-464 [doi]
- Training Bachelor Students to Design Better Quality Web Apps: Preliminary Results from a Prospective Empirical InvestigationSabato Nocera, Rita Francese, Giuseppe Scanniello. 465-469 [doi]
- Investigating Factors Influencing Students' Assessment of Conceptual ModelsMarian Daun, Jennifer Brings. 470-474 [doi]
- Feedback as a process in a large semi-capstone software engineering courseMarius Mikalsen, Torgeir Dingsøyr. 475-479 [doi]
- The Advancements in 6G Technology based on its Applications, Research Challenges and Problems: A ReviewMuhammad Mustafa Qureshi, Muhammad Tanveer Riaz, Saba Waseem, Muhammad Abbas Khan, Sidra Riaz. 480-486 [doi]
- Toward Successful Secure Software Deployment: An Empirical StudyAzzah A. Alghamdi, Mahmood Niazi. 487-492 [doi]
- A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning ModelsDorieh Alomari, Fatima Anis, Maryam Alabdullatif, Hamoud Aljamaan. 493-498 [doi]
- Arabic Cyberbullying Detection Using Machine Learning: State of the Art SurveyNorah Alsunaidi, Sara Aljbali, Yasmin Yasin, Hamoud Aljamaan. 499-504 [doi]