Abstract is missing.
- An Empirical Study on Refactoring-Inducing Pull RequestsFlávia Coelho, Nikolaos Tsantalis, Tiago Massoni, Everton L. G. Alves. [doi]
- Promises and Perils of Inferring Personality on GitHubFrenk C. J. van Mil, Ayushi Rastogi, Andy Zaidman. [doi]
- Study of the Utility of Text Classification Based Software Architecture Recovery Method RELAX for MaintenanceDaniel Link, Kamonphop Srisopha, Barry W. Boehm. [doi]
- A Rubric to Identify Misogynistic and Sexist Texts from Software Developer CommunicationsSayma Sultana, Jaydeb Sarker, Amiangshu Bosu. [doi]
- Towards Sustainability of Systematic Literature ReviewsVinicius dos Santos, Anderson Yoshiaki Iwazaki, Katia Romero Felizardo, Érica Ferreira de Souza, Elisa Yumi Nakagawa. [doi]
- An Exploratory Study on Dead Methods in Open-source Java Desktop ApplicationsDanilo Caivano, Pietro Cassieri, Simone Romano 0001, Giuseppe Scanniello. [doi]
- A Model of Software Prototyping based on a Systematic MapElizabeth Bjarnason, Franz Lang, Alexander Mjöberg. [doi]
- Towards a Methodology for Participant Selection in Software Engineering Experiments: A Vision of the FutureValentina Lenarduzzi, Oscar Dieste, Davide Fucci, Sira Vegas. [doi]
- Evaluating the Impact of Java Virtual Machines on Energy ConsumptionZakaria Ournani, Mohammed Chakib Belgaid, Romain Rouvoy, Pierre Rust, Joël Penhoat. [doi]
- Why Do Organizations Adopt Agile Scaling Frameworks?: A Survey of PractitionersAbheeshta Putta, Ömer Uludag, Shun-Long Hong, Maria Paasivaara, Casper Lassenius. [doi]
- Characteristics and Challenges of Low-Code Development: The Practitioners' PerspectiveYajing Luo, Peng Liang 0004, Chong Wang, Mojtaba Shahin, Jing Zhan. [doi]
- Why Some Bug-bounty Vulnerability Reports are Invalid?: Study of bug-bounty reports and developing an out-of-scope taxonomy modelSaman Shafigh, Boualem Benatallah, Carlos Rodríguez 0001, Mortada Al-Banna. [doi]
- Barriers to Shift-Left Security: The Unique Pain Points of Writing Automated Tests Involving Security ControlsDanielle Gonzalez, Paola Peralta Perez, Mehdi Mirakhorli. [doi]
- Measurement Challenges for Cyber Cyber Digital Twins: Experiences from the Deployment of Facebook's WW Simulation SystemKinga Bojarczuk, Natalija Gucevska, Simon M. M. Lucas, Inna Dvortsova, Mark Harman, Erik Meijer 0001, Silvia Sapora, Johann George, Maria Lomeli, Rubmary Rojas. [doi]
- Semantic Slicing of Architectural Change Commits: Towards Semantic Design ReviewAmit Kumar Mondal, Chanchal K. Roy, Kevin A. Schneider, Banani Roy, Sristy Sumana Nath. [doi]
- Web Application Testing: Using Tree Kernels to Detect Near-duplicate States in Automated Model InferenceAnna Corazza, Sergio Di Martino, Adriano Peron, Luigi Libero Lucio Starace. [doi]
- Characterizing and Predicting Good First IssuesYuekai Huang, Junjie Wang, Song Wang, Zhe Liu, Dandan Wang, Qing Wang. [doi]
- A Survey-Based Qualitative Study to Characterize Expectations of Software Developers from Five StakeholdersKhalid Hasan, Partha Chakraborty, Rifat Shahriyar, Anindya Iqbal, Gias Uddin 0001. [doi]
- An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security TestingRoland Croft, Dominic Newlands, Ziyu Chen, Muhammad Ali Babar. [doi]
- Facing the Giant: a Grounded Theory Study of Decision-Making in Microservices MigrationsHamdy Michael Ayas, Philipp Leitner 0001, Regina Hebig. [doi]
- What Evidence We Would Miss If We Do Not Use Grey Literature?Fernando Kamei, Gustavo Pinto 0001, Igor Wiese, Márcio Ribeiro 0001, Sérgio Soares. [doi]
- The Existence and Co-Modifications of Code Clones within or across MicroservicesRan Mo, Yang Zhao, Qiong Feng, Zengyang Li. [doi]
- Vision for an Artefact-based Approach to Regulatory Requirements EngineeringOleksandr Kosenkov, Michael Unterkalmsteiner, Daniel Méndez, Davide Fucci. [doi]
- Important Experimentation Characteristics: An Expert SurveyFlorian Auer, Michael Felderer. [doi]
- Public Software Development Activity During the PandemicVanessa Klotzman, Farima Farmahinifarahani, Cristina V. Lopes. [doi]
- Testing Smart Contracts: Which Technique Performs Best?Sefa Akca, Chao Peng, Ajitha Rajan. [doi]
- An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOpsRoshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar. [doi]
- Security Smells Pervade Mobile App ServersPascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari. [doi]
- Who are Vulnerability Reporters?: A Large-scale Empirical Study on FLOSSNikolaos Alexopoulos, Andrew Meneely, Dorian Arnouts, Max Mühlhäuser. [doi]
- Python Crypto Misuses in the WildAnna-Katharina Wickert, Lars Baumgärtner, Florian Breitfelder, Mira Mezini. [doi]
- Tackling Consistency-related Design Challenges of Distributed Data-Intensive Systems: An Action Research StudySusanne Braun, Stefan Deßloch, Eberhard Wolff, Frank Elberzhager, Andreas Jedlitschka. [doi]
- Contextual Understanding and Improvement of Metamorphic Testing in Scientific Software DevelopmentZedong Peng, Upulee Kanewala, Nan Niu. [doi]
- How Empirical Research Supports Tool Development: A Retrospective Analysis and new HorizonsMassimiliano Di Penta. [doi]
- A comparative study of vulnerability reporting by software composition analysis toolsNasif Imtiaz, Seaver Thorn, Laurie A. Williams. [doi]
- Towards a Human Values Dashboard for Software Development: An Exploratory StudyArif Nurwidyantoro, Mojtaba Shahin, Michel Chaudron, Waqar Hussain, Harsha Perera, Rifat Ara Shams, Jon Whittle. [doi]
- An Empirical Examination of the Impact of Bias on Just-in-time Defect PredictionJiri Gesi, Jiawei Li, Iftekhar Ahmed 0001. [doi]
- Inclusion and Exclusion Criteria in Software Engineering Tertiary Studies: A Systematic Mapping and Emerging FrameworkDolors Costal, Carles Farré, Xavier Franch, Carme Quer. [doi]
- Continuous Software Bug PredictionSong Wang, Junjie Wang, Jaechang Nam, Nachiappan Nagappan. [doi]