Abstract is missing.
- A Survey for What Developers Require in AI-powered Tools that Aid in Component Selection in CBSDMahdi Jaberzadeh Ansari, Ann Barcomb. 1-11 [doi]
- Accelerating Delta Debugging through Probabilistic Monotonicity AssessmentYonggang Tao, Jingling Xue. 12-22 [doi]
- An Empirical Study of Database Security Topics on Technical Social Forums of Software DevelopersMd. Rakibul Islam 0002, Youngeun Jo. 23-33 [doi]
- An Empirical Study on Common Defects in Modern Web Browsers Using Knowledge Embedding in GPT-4oRahul Singh, Mir Yousuf Sultan, Md Tajmilur Rahman, Sri Vidya Puttareddygari. 34-45 [doi]
- An Empirical Study on the Performance and Energy Usage of Compiled Python CodeVincenzo Stoico, Andrei Calin Dragomir, Patricia Lago. 46-56 [doi]
- Are We on the Same Page? Examining Developer Perception Alignment in Open Source Code ReviewsYoseph Berhanu Alebachew, Minhyuk Ko, Chris Brown 0001. 57-67 [doi]
- Aspects of complexity in automotive software systems and their relation to maintainability effort. A case studyBengt Haraldsson, Miroslaw Staron. 68-78 [doi]
- Assessing the Bug-Proneness of Refactored Code: A Longitudinal Multi-Project StudyIsabella Ferreira, Lawrence Arkoh, Anderson G. Uchôa, Ana Carla Bibiano, Alessandro F. Garcia 0001, Wesley K. G. Assunção. 79-90 [doi]
- Automated Vulnerability Injection in Solidity Smart Contracts: A Mutation-Based Approach for Benchmark DevelopmentGerardo Iuliano, Luigi Allocca, Matteo Cicalese, Dario Di Nucci. 91-101 [doi]
- Automatic Classification of Software Repositories: a Systematic Mapping StudyStefano Balla, Thomas Degueule, Romain Robbes, Jean-Rémy Falleri, Stefano Zacchiroli. 102-113 [doi]
- CallNavi, A challenge and empirical study on LLM function calling and routingYewei Song, Xunzhu Tang, Cedric Lothritz, Saad Ezzini, Jacques Klein, Tegawendé F. Bissyandé, Andrey Boytsov, Ulrick Ble, Anne Goujon. 114-125 [doi]
- CCCI: Code Completion with Contextual Information for Complex Data Transfer Tasks Using Large Language ModelsHangzhan Jin, Mohammad Hamdaqa. 126-135 [doi]
- Characterising Bugs in Jupyter PlatformYutian Tang, Hongchen Cao, Yuxi Chen, David Lo 0001. 136-146 [doi]
- Critical Considerations on Effort-aware Software Defect Prediction MetricsLuigi Lavazza, Gabriele Rotoloni, Sandro Morasca. 147-157 [doi]
- Designing experiment objects for Continuous Experimentation: An exploratory multiple-case studyBasak Amasya, Fabian Fagerholm. 158-168 [doi]
- Do Automatic Comment Generation Techniques Fall Short? Exploring the Influence of Method Dependencies on Code UnderstandingMd Mustakim Billah, Md Shamimur Rahman, Banani Roy. 169-180 [doi]
- Do Prompt Patterns Affect Code Quality? A First Empirical Assessment of ChatGPT-Generated CodeAntonio Della Porta, Stefano Lambiase, Fabio Palomba. 181-192 [doi]
- Emotional Strain and Frustration in LLM Interactions in Software EngineeringCristina Martinez Montes, Ranim Khojah. 193-204 [doi]
- Empirical Fault Patterns for Mutation TestingSophia Hans, Matthias Kettl, Stefan Winter 0001. 205-215 [doi]
- Empirically Evaluating the Use of Bytecode for Diversity-Based Test Case PrioritisationIslam T. Elgendy, Robert M. Hierons, Phil McMinn. 216-226 [doi]
- Evaluating the Impact of a Yoga-Based Intervention on Software Engineers' Well-BeingCristina Martinez Montes, Birgit Penzenstadler. 227-237 [doi]
- Exploring Performance of Configurable Software Systems: the JHipster Case StudyÉdouard Guégain, Alexandre Bonvoisin, Mathieu Acher, Clément Quinton, Romain Rouvoy. 238-248 [doi]
- FetaFix: Automatic Fault Localization and Repair of Deep Learning Model ConversionsNikolaos Louloudakis, Perry Gibson, José Cano 0001, Ajitha Rajan. 249-260 [doi]
- From Questions to Insights: Exploring XAI Challenges Reported on Stack Overflow QuestionsSaumendu Roy, Saikat Mondal, Banani Roy, Chanchal Roy. 261-271 [doi]
- How Do Communities of ML-Enabled Systems Smell? A Cross-Sectional Study on the Prevalence of Community SmellsGiusy Annunziata, Stefano Lambiase, Fabio Palomba, Gemma Catolino, Filomena Ferrucci. 272-282 [doi]
- Large-Scale Continuous Software Engineering: Exploring Three Dimensions of TransformationAstri Barbala, Rasmus Ulfsnes, Nils Brede Moe, Nina Haugland Andersen, Jostein Emmerhoff. 283-293 [doi]
- LLM Vs Rule-Based - The COBRAIN Tool and An Empirical Study on Extracting Business Rules from COBOLChiranjeevi B. S, Sridhar Chimalakonda. 294-304 [doi]
- Micro-Patterns in Solidity CodeLuca Ruschioni, Robert Shuttleworth, Rumyana Neykova, Barbara Re 0001, Giuseppe Destefanis. 305-315 [doi]
- Mitigating Configuration Differences Between Development and Production Environments: A Catalog of StrategiesMarcos Felipe Carvalho Nazário, Rodrigo Bonifácio, Gustavo Pinto 0001. 316-326 [doi]
- Modeling Communication Perception in Development Teams Using Monte Carlo MethodsMarc Herrmann, Martin Obaidi, Jil Klünder. 327-337 [doi]
- Navigating Decision-Making in Serverless Migration: A Socio-Technical Grounded Theory ApproachMuhammad Hamza, Muhammad Azeem Akbar, Kari Smolander. 338-348 [doi]
- Not One to Rule Them All: Mining Meaningful Code Review Orders From GitHubAbir Bouraffa, Carolin E. Brandt, Andy Zaidman, Walid Maalej. 349-359 [doi]
- On the Prevalence and Usage of Commit Signing on GitHub: A Longitudinal and Cross-Domain StudyAnupam Sharma, Sreyashi Karmakar, Gayatri Priyadarsini Kancherla, Abhishek Bichhawat. 360-370 [doi]
- PromptDebt: A Comprehensive Study of Technical Debt Across LLM ProjectsAhmed Aljohani, Hyunsook Do. 371-382 [doi]
- Providing Information About Implemented Algorithms Improves Program Comprehension: A Controlled ExperimentDenis Neumüller, Alexander Raschke, Matthias Tichy. 383-393 [doi]
- Quality Assessment of Python Tests Generated by Large Language ModelsVictor Anthony Alves, Carla I. M. Bezerra, Ivan do Carmo Machado, Larissa Rocha 0001, Tássio Virgínio, Publio Silva. 394-405 [doi]
- Racing Against the Clock: Exploring the Impact of Scheduled Deadlines on Technical DebtJoshua Aldrich Edbert, Zadia Codabux, Roberto Verdecchia. 406-417 [doi]
- Reflection on Code Contributor Demographics and Collaboration Patterns in the Rust CommunityRohit Dandamudi, Ifeoma Adaji, Gema Rodríguez-Pérez. 418-428 [doi]
- Reinforcement Learning vs Supervised Learning: A tug of war to generate refactored code accuratelyIndranil Palit, Tushar Sharma 0001. 429-440 [doi]
- Relating Complexity, Explicitness, Effectiveness of Refactorings and Non-Functional Requirements: A Replication StudyVinícius Soares, Lawrence Arkoh, Paulo Roberto Farah, Anderson G. Uchôa, Alessandro F. Garcia 0001, Wesley K. G. Assunção. 441-452 [doi]
- Seamless Data Migration between Database Schemas with DAMI-Framework: An Empirical Study on Developer ExperienceDelfina Ramos-Vidal, Alejandro Cortiñas 0001, Miguel R. Luaces, Oscar Pedreira, Ángeles Saavedra Places, Wesley K. G. Assunção. 453-464 [doi]
- SecCityVR: Visualization and Collaborative Exploration of Software Vulnerabilities in Virtual RealityDennis Wüppelmann, Enes Yigitbas. 465-475 [doi]
- Systemic Flakiness: An Empirical Analysis of Co-Occurring Flaky Test FailuresOwain Parry, Gregory M. Kapfhammer, Michael Hilton, Phil McMinn. 476-487 [doi]
- Targeted Fuzzing for Unsafe Rust Code: Leveraging Selective InstrumentationDavid Paaßen, Jens-Rene Giesen, Lucas Davi. 488-499 [doi]
- The Art of Repair: Optimizing Iterative Program Repair with Instruction-Tuned ModelsFernando Vallecillos Ruiz, Max Hort, Leon Moonen. 500-511 [doi]
- The Impact of Environment Configurations on the Stability of AI-Enabled SystemsMusfiqur Rahman, SayedHassan Khatoonabadi, Ahmad Abdellatif, Haya Samaana, Emad Shihab. 512-523 [doi]
- Tracking the Moving Target: A Framework for Continuous Evaluation of LLM Test Generation in IndustryMaider Azanza, Beatriz Pérez Lamancha, Eneko Pizarro. 524-534 [doi]
- Trust vs. Control: Comparing Flexible and Restrictive Hybrid Work Policies in Two Software CompaniesDarja Smite, Nils Brede Moe, Panagiota Chatzipetrou, Povilas Godliauskas, Per Kristian Helland, Anastasiia Tkalich. 535-545 [doi]
- Understanding and Influencing End-User Behavior in Software Energy ConsumptionThomas Zaragoza, Thibaut Soulance, Adel Noureddine, Ernesto Exposito. 546-556 [doi]
- Understanding API Usage and Testing: An Empirical Study of C LibrariesAhmed Zaki, Cristian Cadar. 557-567 [doi]
- Understanding the Impact of Domain Term Explanation on Duplicate Bug Report DetectionUsmi Mukherjee, Mohammad Masudur Rahman 0001. 568-579 [doi]
- Unveiling Ruby: Insights from Stack Overflow and Developer SurveyNikta Akbarpour, Ahmad Saleem Mirza, Erfan Raoofian, Fatemeh H. Fard, Gema Rodríguez-Pérez. 580-591 [doi]
- Using Causal Inference to Test Systems with Hidden and Interacting Variables: An Evaluative Case StudyMichael Foster 0001, Robert M. Hierons, Donghwan Shin 0001, Neil Walkinshaw, Christopher Wild. 592-603 [doi]
- Version-level Third-Party Library Detection in Android Applications via Class Structural SimilarityBolin Zhou, JingZheng Wu, Xiang Ling 0001, Tianyue Luo, Jingkun Zhang. 604-615 [doi]
- A Study on Mixup-Inspired Augmentation Methods for Software Vulnerability DetectionSeyed Shayan Daneshvar, Da Tan, Shaowei Wang 0002, Carson K. Leung. 616-621 [doi]
- An Anatomy of 488 Faults from Defects4J Based on the Control- and Data-Flow Graph Representations of ProgramsAlexandra van der Spuy, Bernd Fischer 0002. 622-627 [doi]
- Analyzing the Usage of Donation Platforms for PyPI LibrariesAlexandros Tsakpinis, Alexander Pretschner. 628-633 [doi]
- Bake Two Cakes with One Oven: RL for Defusing Popularity Bias and Cold-start in Third-Party Library RecommendationsVuong Hoang Minh, Anh M. T. Bui, Phuong T. Nguyen 0001, Davide Di Ruscio. 634-640 [doi]
- Benchmarking Large Language Models for Autonomous Run-time Error Repair: Toward Self-Healing Software SystemsAlessio Bucaioni, Gabriele Gualandi, Johan Toma. 641-646 [doi]
- Co-Change Graph Entropy: A New Process Metric for Defect PredictionEthari Hrishikesh, Amit Kumar, Meher Bhardwaj, Sonali Agarwal. 647-652 [doi]
- Detecting Malicious Source Code in PyPI Packages with LLMs: Does RAG Come in HandyMotunrayo Osatohanmen Ibiyo, Thinakone Louangdy, Phuong T. Nguyen 0001, Claudio Di Sipio, Davide Di Ruscio. 653-658 [doi]
- Effectiveness of Combinatorial Interaction Testing in Test Automation - An Industrial Case StudyFeras Daoud, Miroslav Bures, Melchizedek Alipio. 659-665 [doi]
- Evaluating Mutation-based Fault Localization for Quantum ProgramsYuta Ishimoto, Masanari Kondo, Naoyasu Ubayashi, Yasutaka Kamei, Ryota Katsube, Naoto Sato, Hideto Ogawa. 666-671 [doi]
- Exploring Zero-Shot App Review Classification with ChatGPT: Challenges and PotentialMohit Chaudhary, Chirag Jain, Preethu Rose Anish. 672-677 [doi]
- Further Evidence on a Controversial Topic about Human-Based Experiments: Professionals vs. StudentsSimone Romano 0001, Francesco Paolo Sferratore, Giuseppe Scanniello. 678-683 [doi]
- How Are We Doing With Using AI-Based Programming Assistants For Privacy-Related Code Generation? The Developers' ExperienceKashumi Madampe, John C. Grundy, Nalin A. G. Arachchilage. 684-689 [doi]
- Identifying Critical Dependencies in Large-Scale Continuous Software EngineeringAnastasiia Tkalich, Eriks Klotins, Nils Brede Moe. 690-695 [doi]
- Identifying Helpful Context for LLM-based Vulnerability Repair: A Preliminary StudyGábor Antal, Bence Bogenfürst, Rudolf Ferenc, Péter Hegedüs. 696-700 [doi]
- LELANTE: LEveraging LLM for Automated ANdroid TEstingHaz Sameen Shahgir, Shamit Fatin, Mehbubul Hasan Al-Quvi, Sukarna Barua, Anindya Iqbal, Sadia Sharmin, Md. Mostofa Akbar, Kallol Kumar Pal, A. Asif Al Rashid. 701-707 [doi]
- Paradigm shift on Coding Productivity Using GenAILiang Yu. 708-713 [doi]
- QADL: Prototype of Quantum Architecture Description LanguageMuhammad Waseem, Aakash Ahmad, Tommi Mikkonen, Muhammad Taimoor Khan 0001, Majid Haghparast, Vlad Stirbu, Peng Liang 0001. 714-719 [doi]
- Recommendation systems in e-commerce applications with machine learning methodsAneta Poniszewska-Maranda, Magdalena Pakula, Bozena Borowska. 720-725 [doi]
- Re-evaluation of Logical Specification in Behavioural VerificationRadoslaw Klimek, Jakub Semczyszyn. 726-731 [doi]
- Simplicity by Obfuscation: Evaluating LLM-Driven Code Transformation with Semantic ElasticityLorenzo De Tomasi, Claudio Di Sipio, Antinisca Di Marco, Phuong T. Nguyen 0001. 732-738 [doi]
- Testing SSD Firmware with State Data-Aware Fuzzing: Accelerating Coverage in Nondeterministic I/O EnvironmentsGangho Yoon, Eunseok Lee 0001. 739-744 [doi]
- Toward Automated Test Generation for Dockerfiles Based on Analysis of Docker Image LayersYuki Goto, Shinsuke Matsumoto, Shinji Kusumoto. 745-750 [doi]
- Toward Inclusive Low-Code Development: Detecting Accessibility Issues in User ReviewsMohammadAli Mohammadkhani, Sara Zahedi Movahed, Hourieh Khalajzadeh, Mojtaba Shahin, Khuong Tran Hoang. 751-756 [doi]
- Towards an Interpretable Analysis for Estimating the Resolution Time of Software IssuesDimitrios-Nikitas Nastos, Themistoklis Diamantopoulos, Davide Tosi, Martina Tropeano, Andreas L. Symeonidis. 757-762 [doi]
- Towards Effective Issue Assignment using Online Machine LearningAthanasios Michailoudis, Themistoklis Diamantopoulos, Antonios Favvas, Andreas L. Symeonidis. 763-769 [doi]
- Towards Lean Research Inception: Assessing Practical Relevance of Formulated Research ProblemsAnrafel Fernandes Pereira, Marcos Kalinowski, Maria Teresa Baldassarre, Jürgen Börstler, Nauman Bin Ali, Daniel Méndez 0001. 770-775 [doi]
- Towards Leveraging Large Language Model Summaries for Topic Modeling in Source CodeMichele Carissimi, Martina Saletta, Claudio Ferretti. 776-781 [doi]
- Towards Requirements Engineering for RAG SystemsTor Sporsem, Rasmus Ulfsnes. 782-788 [doi]
- Assessing your team's readiness for external contributions: A Guide for InnerSource TeamsDeepika Badampudi, Shanmugapriya Manoharan, Muhammad Usman 0002, Supriya Chitale. 789-792 [doi]
- Cross-Functional AI Task Forces (X-FAITs) for AI Transformation of Software OrganizationsLucas Gren, Robert Feldt. 793-796 [doi]
- Designing a Custom Chaos Engineering Framework for Enhanced System Resilience at SofttechEthem Utku Aktas, Burak Tuzlutas, Burak Yesiltas. 797-800 [doi]
- Hierarchical deep learning framework for continuous, state-aware visual glitch detection in gamesCiprian Paduraru, Miruna Gabriela Paduraru, Alin Stefanescu. 801-804 [doi]
- Incidents During Microservice Decomposition: A Case StudyDogaç Eldenk, H. Alperen Çetin. 805-808 [doi]
- Leveraging LLMs for Automated Translation of Legacy Code: A Case Study on PL/SQL to Java TransformationLola Solovyeva, Eduardo Carneiro Oliveira, Shiyu Fan, Alper Tuncay, Shamil Gareev, Andrea Capiluppi. 809-813 [doi]
- MBSR at Work: Perspectives from an Instructor and Software DevelopersSimone Romano 0001, Alberto Conforti, Gloria Guidetti, Sara Viotti, Rachele Ceschin, Giuseppe Scanniello. 814-817 [doi]
- Organizing for Product Development: A Framework for Structuring Agile OrganizationsNils Brede Moe, Darja Smite, Jostein Emmerhoff, Marcin Floryan. 818-821 [doi]
- Privacy-Preserving Methods for Bug Severity PredictionHavvanur Dervisoglu, Rusen Halepmollasi, Elif Eyvaz. 822-825 [doi]
- The Review of Test Processes on Corporate Quality Assurance (QA) at SeturTechHaldun Halil Olcay, Esin Belen, Ebru Hacioglu. 826-829 [doi]
- Using Eclipse OpenDuT for Distributed Automotive TestingDenesa Zyberaj, Pascal Hirmer, Marco Aiello 0001. 830-833 [doi]
- ThreMoLIA: Threat Modeling of Large Language Model-Integrated ApplicationsFelix Viktor Jedrzejewski, Davide Fucci, Oleksandr Adamov. 834-839 [doi]
- Validation Framework for E-Contract and Smart ContractSangharatna Godboley, P. Radha Krishna 0001, Sunkara Sri Harika, Pooja Varnam. 840-845 [doi]
- Developers' Practices, Web Accessibility, and Language Barriers: Analyzing Challenges and Opportunities for Inclusive Digital DevelopmentMasudul Hasan Masud Bhuiyan. 846-851 [doi]
- Proposal of the Assessment of the 4-Workflow Model for Secure Agile Process PracticesPeyman Derafshkavian. 852-857 [doi]
- Testing Individual Fairness in Graph Neural NetworksRoya Nasiri. 858-863 [doi]
- A Unified Semantic Framework for IoT-Healthcare Data Interoperability: A Graph-Based Machine Learning Approach Using RDF and R2RMLMehran Pourvahab, Anilson Monteiro, Sebastião Pais, Nuno Pombo. 864-873 [doi]
- Actual Practices from Practitioners in Benefits Management in Digitalization ProjectsJ. David Patón-Romero, Bertha Joseph Ngereja, Jo E. Hannay, Magne Jørgensen. 874-886 [doi]
- Exploring turnover, retention and growth in an OSS EcosystemTien Rahayu Tulili, Ayushi Rastogi, Andrea Capiluppi. 887-897 [doi]
- Integrating Human Feedback into a Reinforcement Learning-Based Framework for Adaptive User InterfacesDaniel Gaspar-Figueiredo, Marta Fernández-Diego, Silvia Abrahão, Emilio Insfrán. 898-907 [doi]
- NRevisit: A Cognitive Behavioral Metric for Code Understandability AssessmentHao Gao 0002, Haytham Hijazi, Júlio Medeiros, João Durães, Chan-Tong Lam, Paulo de Carvalho 0001, Henrique Madeira. 908-918 [doi]
- Understanding Underrepresented Groups in Open Source SoftwareReydne Santos, Rafa Prado, Ana Paula de Holanda Silva, Kiev Gama, Fernando Castor, Ronnie de Souza Santos. 919-928 [doi]
- ALOHA: A(IBoM) tooL generatOr for Hugging fAceRiccardo D'Avino, Sabato Nocera, Daniele Bifolco, Federica Pepe, Massimiliano Di Penta, Giuseppe Scanniello. 929-937 [doi]
- An Empirical study on LLM-based Log Retrieval for Software Engineering Metadata ManagementSimin Sun, Yuchuan Jin, Miroslaw Staron. 938-948 [doi]
- Analyzing Prominent LLMs: An Empirical Study of Performance and Complexity in Solving LeetCode ProblemsEverton Guimarães, Nathalia Moraes do Nascimento, Asish Nelapati, Chandan Shivalingaiah. 949-958 [doi]
- Assertion Messages with Large Language Models (LLMs) for CodeAhmed Aljohani, Anamul Haque Mollah, Hyunsook Do. 959-968 [doi]
- Benchmarking LLM for Code Smells Detection: OpenAI GPT-4.0 vs DeepSeek-V3Ahmed R. Sadik, Siddhata Govind. 969-975 [doi]
- Bridging AI and Human Knowledge: Towards a Deeper Understanding of Stack Overflow and ChatGPTAman Swaraj, Sandeep Kumar 0004. 976-985 [doi]
- BugsRepo: A Comprehensive Curated Dataset of Bug Reports, Comments and Contributors Information from BugzillaJagrit Acharya, Gouri Ginde. 986-993 [doi]
- Can We Enhance Bug Report Quality Using LLMs?: An Empirical Study of LLM-Based Bug Report GenerationJagrit Acharya, Gouri Ginde. 994-1003 [doi]
- How Well Do Large Language Models Serve as End-to-End Secure Code Agents for Python?Jianian Gong, Nachuan Duan, Ziheng Tao, Zhaohui Gong, Yuan Yuan, Minlie Huang. 1004-1013 [doi]
- Improved Labeling of Security Defects in Code Review by Active Learning with LLMsJohannes Härtel. 1014-1023 [doi]
- LAMeD: LLM-generated Annotations for Memory Leak DetectionEkaterina Shemetova, Ivan Smirnov, Anton Alekseev 0001, Ilya Shenbin, Alexey D. Rukhovich, Sergey I. Nikolenko, Vadim Lomshakov, Irina Piontkovskaya. 1024-1034 [doi]
- Large Language Models as Robust Data Generators in Software Analytics: Are We There Yet?Md. Abdul Awal, Mrigank Rochan, Chanchal K. Roy. 1035-1044 [doi]
- Large Language Models for API Classification: An Explorative StudyGabriel Morais, Edwin Lemelin, Mehdi Adda, Dominik Bork. 1045-1055 [doi]
- Leveraging GPT-4 for Vulnerability-Witnessing Unit Test GenerationGábor Antal, Dénes Bán, Martin Isztin, Rudolf Ferenc, Péter Hegedüs. 1056-1065 [doi]
- Linux Kernel Configurations at Scale: A Dataset for Performance and Evolution AnalysisHeraldo Borges, Juliana Alves Pereira, Djamel Eddine Khelladi, Mathieu Acher. 1066-1075 [doi]
- LLM-assisted web application functional requirements generation - A case study of four popular LLMs over a Mess Management SystemRashmi Gupta, Aditya Kumar Gupta, Aarav Jain, Avinash C. Pandey, Atul Gupta. 1076-1085 [doi]
- LLM Code Customization with Visual Results: A Benchmark on TikZCharly Reux, Mathieu Acher, Djamel Eddine Khelladi, Clément Quinton, Olivier Barais. 1086-1096 [doi]
- On Simulation-Guided LLM-based Code Generation for Safe Autonomous Driving SoftwareAli Nouri, Johan Andersson, Kailash De Jesus Hornig, Zhennan Fei, Emil Knabe, Håkan Sivencrona, Beatriz Cabrero Daniel, Christian Berger 0001. 1097-1106 [doi]
- PRIMG : Efficient LLM-driven Test Generation Using Mutant PrioritizationMohamed Salah Bouafif, Mohammad Hamdaqa, Edward Zulkoski. 1107-1116 [doi]
- Small Models, Big Tasks: An Exploratory Empirical Study on Small Language Models for Function CallingIshan Kavathekar, Raghav Donakanti, Ponnurangam Kumaraguru, Karthik Vaidhyanathan. 1117-1126 [doi]
- Towards Automated Detection of Inline Code Comment SmellsIpek Oztas, U. Boran Torun, Eray Tüzün. 1127-1137 [doi]
- Towards User-Centred Design of AI-Assisted Decision-Making in Law EnforcementVesna Nowack, Dalal Alrajeh, Carolina Gutierrez Muñoz, Katie Thomas, William Hobson, Patrick Benjamin, Catherine Hamilton-Giachritsis, Tim Grant 0002, Juliane A. Kloess, Jessica Woodhams. 1138-1148 [doi]