Abstract is missing.
- From Data Analysis to Human Input: Navigating the Complexity of Software Evaluation and AssessmentSigrid Eldh. 1  [doi]
 - A Systematic Literature Review on Client Selection in Federated LearningCarl Smestad, Jingyue Li. 2-11  [doi]
 - Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary ObjectsChristoph Matthies, Robert Heinrich, Rebekka Wohlrab. 12-21  [doi]
 - Impact of Architectural Smells on Software Performance: an Exploratory StudyFrancesca Arcelli Fontana, Matteo Camilli, Davide Rendina, Andrei Gabriel Taraboi, Catia Trubiani. 22-31  [doi]
 - DQSOps: Data Quality Scoring Operations Framework for Data-Driven ApplicationsFiras Bayram, Bestoun S. Ahmed, Erik Hallin, Anton Engman. 32-41  [doi]
 - Code Reviewer Recommendation for Architecture Violations: An Exploratory StudyRuiyin Li, Peng Liang 0001, Paris Avgeriou. 42-51  [doi]
 - Measuring User Experience of Adaptive User Interfaces using EEG: A Replication StudyDaniel Gaspar-Figueiredo, Silvia Abrahão, Emilio Insfrán, Jean Vanderdonckt. 52-61  [doi]
 - Implementing AI Ethics: Making Sense of the Ethical RequirementsMamia Agbese, Rahul Mohanani, Arif Ali Khan, Pekka Abrahamsson. 62-71  [doi]
 - On the Energy Consumption and Performance of WebAssembly Binaries across Programming Languages and Runtimes in IoTLinus Wagner, Maximilian Mayer, Andrea Marino, Alireza Soldani Nezhad, Hugo Zwaan, Ivano Malavolta. 72-82  [doi]
 - HornFuzz: Fuzzing CHC solversAnzhela Sukhanova, Valentyn Sobol. 83-92  [doi]
 - On the Reliability of the Area Under the ROC Curve in Empirical Software EngineeringLuigi Lavazza, Sandro Morasca, Gabriele Rotoloni. 93-100  [doi]
 - Understanding Self-Efficacy in Software Engineering Industry: An Interview studyDanilo Monteiro Ribeiro, Rayfran Lima, César França, Alberto Luiz Oliveira Tavares de Souza, Isadora Silva, Gustavo H. L. Pinto. 101-110  [doi]
 - Classification-based Static Collection Selection for Java: Effectiveness and AdaptabilityNoric Couderc, Christoph Reichenbach, Emma Söderberg. 111-120  [doi]
 - Developers' Perception of GitHub Actions: A Survey AnalysisSk Golam Saroar, Maleknaz Nayebi. 121-130  [doi]
 - Do Developers Benefit from Recommendations when Repairing Inconsistent Design Models? a Controlled ExperimentLuciano Marchezan, Wesley K. G. Assunção, Gabriela Karoline Michelon, Alexander Egyed. 131-140  [doi]
 - An Empirical Study on Continuous Integration Trends, Topics and Challenges in Stack OverflowAli Ouni 0001, Islem Saidani, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer. 141-151  [doi]
 - Analyzing the Resource Usage Overhead of Mobile App Development FrameworksWellington Oliveira, Bernardo Moraes, Fernando Castor, João Paulo Fernandes. 152-161  [doi]
 - Analyzing Bug Life Cycles to Derive Practical InsightsÇagri Eren, Kerem Sahin, Eray Tüzün. 162-171  [doi]
 - Full Spec Software via Platform Engineering: Transition from Bolting-on to Building-inHuseyin Dursun. 172-175  [doi]
 - NxtUnit: Automated Unit Test Generation for GoSiwei Wang, Xue Mao, Ziguang Cao, Yujun Gao, Qucheng Shen, Chao Peng. 176-179  [doi]
 - Artifact Traceability in DevOps: An Industrial Experience ReportZaki Pauzi, Rajvir Thind, Andrea Capiluppi. 180-183  [doi]
 - SoHist: A Tool for Managing Technical Debt through Retro Perspective Code AnalysisBenedikt Dornauer, Michael Felderer, Johannes Weinzerl, Mircea-Cristian Racasan, Martin Hess. 184-187  [doi]
 - Assessing the Impact of File Ordering Strategies on Code Review ProcessFarid Bagirov, Pouria Derakhshanfar, Alexey Kalina, Elena Kartysheva, Vladimir Kovalenko. 188-191  [doi]
 - Automating Microservices Test Failure Analysis using Kubernetes Cluster LogsPawan Kumar Sarika, Deepika Badampudi, Sai Prashanth Josyula, Muhammad Usman. 192-195  [doi]
 - Are security commit messages informative? Not enough!Sofia Reis, Rui Abreu 0001, Corina S. Pasareanu. 196-199  [doi]
 - Functional Size Measurement in Agile Development: Velocity in Agile SprintsThomas Fehlmann, Andrea Gelli. 200-204  [doi]
 - Improving the Reporting of Threats to Construct ValidityDag I. K. Sjøberg, Gunnar R. Bergersen. 205-209  [doi]
 - Psychological Aspects of Pair Programming: A Mixed-methods Experimental StudyMarcel Valový. 210-216  [doi]
 - Barriers for Social Inclusion in Online Software Engineering Communities - A Study of Offensive Language Use in Gitter ProjectsBastin Tony Roy Savarimuthu, Zoofishan Zareen, Jithin Cheriyan, Muhammad Yasir, Matthias Galster. 217-222  [doi]
 - Identifying Characteristics of the Agile Development Process That Impact User SatisfactionMinshun Yang, Seiji Sato, Hironori Washizaki, Yoshiaki Fukazawa, Juichi Takahashi. 223-228  [doi]
 - Fusion of deep convolutional and LSTM recurrent neural networks for automated detection of code smellsAnh Ho, Anh M. T. Bui, Phuong T. Nguyen 0001, Amleto Di Salle. 229-234  [doi]
 - Analysis of Bug Report Qualities with Fixing Time using a Bayesian NetworkSien Reeve Ordonez Peralta, Hironori Washizaki, Yoshiaki Fukazawa, Yuki Noyori, Shuhei Nojiri, Hideyuki Kanuka. 235-240  [doi]
 - Replication and Extension of Schnappinger's Study on Human-level Ordinal Maintainability Prediction Based on Static Code MetricsSébastien Bertrand, Silvia Ciappelloni, Pierre-Alexandre Favier, Jean-Marc André. 241-246  [doi]
 - Understanding the relationship between Technical Debt, New Code Cost and Rework Cost in Open-Source Software Projects: An Empirical StudyJudith Perera, Ewan D. Tempero, Yu-Cheng Tu 0001, Kelly Blincoe. 247-252  [doi]
 - Outside the Sandbox: A Study of Input/Output Methods in JavaMatús Sulír, Sergej Chodarev, Milan Nosál. 253-258  [doi]
 - Investigation of Security-related Commits in Android AppsTeerath Das, Adam Ali, Tommi Mikkonen. 259-260  [doi]
 - Does Code Smell Frequency Have a Relationship with Fault-proneness?Md. Masudur Rahman 0005, Toukir Ahammed, Md. Mahbubul Alam Joarder, Kazi Sakib. 261-262  [doi]
 - Team Composition in Software Engineering EducationSajid Ibrahim Hashmi, Jouni Markkula. 263-264  [doi]
 - Code Privacy in Detection of Web VulnerabilitiesJorge Martins, Ibéria Medeiros, Bernardo Ferreira. 265-266  [doi]
 - Too long; didn't read: Automatic summarization of GitHub README.MD with TransformersThu Thu Ha Doan, Phuong T. Nguyen 0001, Juri Di Rocco, Davide Di Ruscio. 267-272  [doi]
 - Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK)Sam Attwood, Ashley Williams. 273-278  [doi]
 - Towards Human-Bot Collaborative Software Architecting with ChatGPTAakash Ahmad, Muhammad Waseem, Peng Liang 0001, Mahdi Fahmideh, Mst Shamima Aktar, Tommi Mikkonen. 279-285  [doi]
 - Reengineering legacy document information systems: Challenges and solutionsDelfina Ramos-Vidal. 286-291  [doi]
 - Towards a User-centred Security Framework for Social Robots in Public SpacesSamson Ogheneovo Oruma. 292-297  [doi]
 - Investigating the Relation between Requirements Framing and Confirmation Bias in TestingAfsarah Jahin. 298-303  [doi]
 - Software Architecture Design of a Serverless SystemMuhammad Hamza. 304-306  [doi]
 - Effective Agile Contracts Framework for Software Innovation ProjectsAdriano Gomes. 307-312  [doi]
 - Analyzing Maintenance Activities of Software LibrariesAlexandros Tsakpinis. 313-318  [doi]
 - Automatic Data-Driven Software Change Identification via Code Representation LearningTjasa Hericko. 319-323  [doi]
 - Functional Size Measurement in Agile Development: Velocity in Agile SprintsThomas Fehlmann, Andrea Gelli. 324-325  [doi]
 - Ethical Requirements Stack: A framework for implementing ethical requirements of AI in software engineering practicesMamia Agbese, Rahul Mohanani, Arif Ali Khan, Pekka Abrahamsson. 326-328  [doi]
 - A Means to what End? Evaluating the Explainability of Software Systems using Goal-Oriented HeuristicsHannah Deters, Jakob Droste, Kurt Schneider. 329-338  [doi]
 - Aggregating N-fold Requirements Inspection ResultsMarian Daun, Jennifer Brings. 339-347  [doi]
 - Using InnerSource for Improving Internal Reuse: An Industrial Case StudyXingru Chen, Muhammad Usman, Deepika Badampudi. 348-357  [doi]
 - A Rapid Review of Responsible AI frameworks: How to guide the development of ethical AIVita Santa Barletta, Danilo Caivano, Domenico Gigante, Azzurra Ragone. 358-367  [doi]
 - U Owns the Code That Changes and How Marginal Owners Resolve Issues Slower in Low-Quality Source CodeMarkus Borg, Adam Tornhill, Enys Mones. 368-377  [doi]
 - Decentralised Autonomous Organisations for Public ProcurementFelix Monteiro, Miguel Correia. 378-385  [doi]
 - Perceived Trust in Blockchain Systems: An Interview-based SurveyHuikun Liu, Yanze Wang, Zhaowei Jiang, He Zhang, Jingyue Li, Sigurd Eileras, Haakon Pelsholen Busterud. 386-393  [doi]
 - Understandings of Ethics in DevOps Teams: A Preliminary InvestigationMaira Khanam, Saima Rafi, Muhammad Azeem Akbar. 394-397  [doi]
 - Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical StudyYasir Hussain, Zhiqiu Huang, Yu Zhou 0010, Izhar Ahmed Khan, Nasrullah Khan, Muhammad Zahid Abbas. 398-405  [doi]
 - Challenges in Requirements Gathering for Agile Software DevelopmentRamya Sri Simhadri, Mohammad Shameem. 406-413  [doi]
 - Comparative Analysis of Fuzzy and Neural Controller for a Boost ConverterMuhammad Waqas Qaisar, Mujtaba Hassan, Muhammad Tanveer Riaz, Muhammad Shahid, Ahmad Abdul Ghani, Muhammad Abbas Khan 0001, Kashif Hussain. 414-422  [doi]
 - Identification of Influential Factors for Successful Adoption of DevOps and CloudSidra Ramzan, Saif ur Rehman Khan, Shahid Hussain, Wen-Li Wang, Mei-Huei Tang. 423-429  [doi]
 - A Study on Management Challenges and Practices in DevOpsSyed Muhammad Faaiz, Saif ur Rehman Khan, Shahid Hussain, Wen-Li Wang, Naseem Ibrahim. 430-437  [doi]
 - Prioritization of DevOps Maturity models using Fuzzy TOPSISAnkur Kumar, Mohammad Nadeem, Mohammad Shameem. 438-443  [doi]
 - An Intelligent Automation of Power Transformer using PLC and SCADA at SubstationAsma Shamshad, Muhammad Tanveer Riaz, Ali Raza, Muhammad Abbas Khan. 444-449  [doi]
 - A Mixed Reality Approach for Innovative Pair Programming Education with a Conversational AI Virtual AvatarGilda Manfredi, Ugo Erra, Gabriele Gilio. 450-454  [doi]
 - Collecting cognitive strategies applied by students during test case designFelix Cammaerts, Monique Snoeck, Ana C. R. Paiva. 455-459  [doi]
 - Gamification of Business Process Modeling Notation education: an experience reportGiacomo Garaccione, Riccardo Coppola, Luca Ardito, Marco Torchiano. 460-464  [doi]
 - Training Bachelor Students to Design Better Quality Web Apps: Preliminary Results from a Prospective Empirical InvestigationSabato Nocera, Rita Francese, Giuseppe Scanniello. 465-469  [doi]
 - Investigating Factors Influencing Students' Assessment of Conceptual ModelsMarian Daun, Jennifer Brings. 470-474  [doi]
 - Feedback as a process in a large semi-capstone software engineering courseMarius Mikalsen, Torgeir Dingsøyr. 475-479  [doi]
 - The Advancements in 6G Technology based on its Applications, Research Challenges and Problems: A ReviewMuhammad Mustafa Qureshi, Muhammad Tanveer Riaz, Saba Waseem, Muhammad Abbas Khan, Sidra Riaz. 480-486  [doi]
 - Toward Successful Secure Software Deployment: An Empirical StudyAzzah A. Alghamdi, Mahmood Niazi. 487-492  [doi]
 - A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning ModelsDorieh Alomari, Fatima Anis, Maryam Alabdullatif, Hamoud Aljamaan. 493-498  [doi]
 - Arabic Cyberbullying Detection Using Machine Learning: State of the Art SurveyNorah Alsunaidi, Sara Aljbali, Yasmin Yasin, Hamoud Aljamaan. 499-504  [doi]