Abstract is missing.
- Negative Transfer in Cross Project Defect Prediction: Effect of Domain DivergenceOsayande P. Omondiagbe, Sherlock A. Licorish, Stephen G. MacDonell. 1-4 [doi]
- Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning in Scientific ApplicationsHamideh Hajiabadi, Lennart Hilbert, Anne Koziolek. 5-12 [doi]
- Parallel Instance Filtering for Malware DetectionMartin Jurecek, Olha Jurecková. 13-20 [doi]
- WALTS: Walmart AutoML Libraries, Tools and ServicesRahul Bajaj, Kunal Banerjee 0001, Lalitdutt Parsai, Deepansh Goyal, Sachin Parmar, Divyajyothi Bn, Balamurugan Subramaniam, Chaitanya Sai, Tarun Balotia, Anirban Chatterjee, Kailash Sati. 21-28 [doi]
- Evaluating Simple and Complex Models' Performance When Predicting Accepted Answers on Stack OverflowOsayande P. Omondiagbe, Sherlock A. Licorish, Stephen G. MacDonell. 29-38 [doi]
- EMMM: A Unified Meta-Model for Tracking Machine Learning ExperimentsSamuel Idowu, Daniel Strüber 0001, Thorsten Berger. 48-55 [doi]
- Reducing Experiment Costs in Automated Software Performance Regression DetectionMilad Abdullah, Lubomír Bulej, Tomás Bures, Petr Hnetynka, Vojtech Horký, Petr Tuma 0001. 56-59 [doi]
- Maintainability Challenges in ML: A Systematic Literature ReviewKarthik Shivashankar, Antonio Martini. 60-67 [doi]
- Deep Reinforcement Learning in a Dynamic Environment: A Case Study in the Telecommunication IndustryHongyi Zhang, JingYa Li, Zhiqiang Tyler Qi, Xingqin Lin, Anders Aronsson, Jan Bosch, Helena Holmström Olsson. 68-75 [doi]
- Comparing Input Prioritization Techniques for Testing Deep Learning AlgorithmsVasilii Mosin, Miroslaw Staron, Darko Durisic, Francisco Gomes de Oliveira Neto, Sushant Kumar Pandey, Ashok Chaitanya Koppisetty. 76-83 [doi]
- A Multivocal Literature Review of MLOps Tools and FeaturesGilberto Recupito, Fabiano Pecorelli, Gemma Catolino, Sergio Moreschini, Dario Di Nucci, Fabio Palomba, Damian A. Tamburri. 84-91 [doi]
- An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract TestingHamdy Michael Ayas, Hartmut Fischer, Philipp Leitner 0001, Francisco Gomes de Oliveira Neto. 92-99 [doi]
- Anomaly Detection in Cloud-Native SystemsFrancesco Lomio, Sergio Moreschini, Xiaozhou Li 0002, Valentina Lenarduzzi. 100-103 [doi]
- Towards the Generation of Robust E2E Test Cases in Template-based Web ApplicationsAnna Rita Fasolino, Porfirio Tramontana. 104-111 [doi]
- Towards Perspective-Based Specification of Machine Learning-Enabled SystemsHugo Villamizar, Marcos Kalinowski, Hélio Lopes 0001. 112-115 [doi]
- KennyRiMr: An Eclipse Plug-in to Improve Correctness of Rename Method Refactoring in JavaKathryn Kenny, Jongwook Kim, Eric Lacker. 116-119 [doi]
- Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution AnalysisTenma Kitai, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 120-124 [doi]
- Change-Aware Regression Test Prioritization using Genetic AlgorithmsFrancesco Altiero, Giovanni Colella, Anna Corazza, Sergio Di Martino, Adriano Peron, Luigi L. L. Starace. 125-132 [doi]
- An Evaluation of General-Purpose Static Analysis Tools on C/C++ Test CodeJean Malm, Eduard Enoiu, Abu Naser Masud, Björn Lisper, Zoltán Porkoláb, Sigrid Eldh. 133-140 [doi]
- Investigating the Adoption of History-based Prioritization in the Context of Manual Testing in a Real Industrial SettingVinícius Siqueira, Breno Miranda. 141-148 [doi]
- Towards Secure Agile Software Development Process: A Practice-Based ModelAbdulhamid A. Ardo, Julian M. Bass, Tarek Gaber. 149-156 [doi]
- Agile Enterprise Transformations: Surveying the Many Facets of Agility for the Hybrid EraPetri Kettunen, Tomas Gustavsson, Maarit Laanti, Andreas Tjernsten, Tommi Mikkonen, Tomi Männistö. 157-160 [doi]
- Living in a Pink Cloud or Fighting a Whack-a-Mole? On the Creation of Recurring Revenue Streams in the Embedded Systems DomainHelena Holmström Olsson, Jan Bosch. 161-168 [doi]
- The Role Of Post-Release Software Traceability in Release Engineering: A Software-Intensive Embedded Systems Case Study From The Telecommunications DomainAnas Dakkak, Jan Bosch, Helena Holmström Olsson. 169-176 [doi]
- "There and Back Again?" On the Influence of Software Community Dispersion Over ProductivityStefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci. 177-184 [doi]
- STORM: A Software Testing Onboarding ModelTobias Lorey, Stefan Mohacsi, Armin Beer, Michael Felderer. 185-188 [doi]
- On the Role of Personality Traits in Implementation Tasks: A Preliminary Investigation with StudentsSimone Romano 0001, Giuseppe Scanniello, Pancrazio Dionisio. 189-196 [doi]
- An 80-20 Analysis of Buggy and Non-buggy Refactorings in Open-Source CommitsSteve Counsell, Vesna Nowack, Tracy Hall, David Bowes, Saemundur Haraldsson, Emily Winter 0001, John R. Woodward. 197-200 [doi]
- A Preliminary Conceptualization and Analysis on Automated Static Analysis Tools for Vulnerability Detection in Android AppsGiammaria Giordano, Fabio Palomba, Filomena Ferrucci. 201-208 [doi]
- An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction MethodsSousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa. 209-216 [doi]
- The Impact of Parameters Optimization in Software Prediction ModelsAsad Ali 0006, Carmine Gravino. 217-224 [doi]
- Using COSMIC to measure functional size of software: a Systematic Literature ReviewVincenzo Luigi Martino, Carmine Gravino. 225-228 [doi]
- Analyzing Programming Effort Model Accuracy of High-Level Parallel Programs for Stream ProcessingGabriella Andrade, Dalvan Griebler, Rodrigo Pereira dos Santos, Christoph W. Kessler, August Ernstsson, Luiz Gustavo Fernandes. 229-232 [doi]
- Effort Prediction with Limited Data: A Case Study for Data Warehouse ProjectsHüseyin Ünlü, Ali Yildiz, Onur Demirörs. 233-238 [doi]
- Utilization of Three Software Size Measures for Effort Estimation in Agile World: A Case StudyHüseyin Ünlü, Tuna Hacaloglu, Fatma Büber, Kivilcim Berrak, Onur Leblebici, Onur Demirörs. 239-246 [doi]
- Service Classification through Machine Learning: Aiding in the Efficient Identification of Reusable Assets in Cloud Application DevelopmentZakieh Alizadehsani, Daniel Feitosa, Theodoros Maikantis, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, David Berrocal-Macías, Alfonso González-Briones, Juan M. Corchado, Marcio Mateus, Johannes Groenewold. 247-254 [doi]
- Applicability of Software Reliability Growth Models to Open Source SoftwareRadoslav Micko, Stanislav Chren, Bruno Rossi 0001. 255-262 [doi]
- Software Reuse and Evolution in JavaScript ApplicationsAnastasia Terzi, Orfeas Christou, Stamatia Bibi, Pantelis Angelidis. 263-269 [doi]
- Regularity or Anomaly? On The Use of Anomaly Detection for Fine-Grained JIT Defect PredictionFrancesco Lomio, Luca Pascarella, Fabio Palomba, Valentina Lenarduzzi. 270-273 [doi]
- Quantifying TD Interest: Are we Getting Closer, or Not Even That?Elvira-Maria Arvanitou, Pigi Argyriadou, Georgia Koutsou, Apostolos Ampatzoglou, Alexander Chatzigeorgiou. 274-281 [doi]
- Exploiting dynamic analysis for architectural smell detection: a preliminary studyIlaria Pigazzini, Dario Di Nucci, Francesca Arcelli Fontana, Marco Belotti. 282-289 [doi]
- Microservices smell detection through dynamic analysisPaolo Bacchiega, Ilaria Pigazzini, Francesca Arcelli Fontana. 290-293 [doi]
- Technical Debt Management in Automotive Software IndustryGiuseppe Lami, Giorgio Oronzo Spagnolo. 294-297 [doi]
- The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial Case StudyEhsan Zabardast, Javier Gonzalez-Huerta, Francis Palma. 298-305 [doi]
- Adopting DevOps Paradigm in Technical Debt Prioritization and MitigationMarek Grzegorz Stochel, Piotr Cholda, Mariusz R. Wawrowski. 306-313 [doi]
- Timing is Everything! A Test and Production Class View of Self-Admitted Technical DebtSteve Counsell, Stephen Swift. 314-317 [doi]
- ScrumBut as an Indicator of Process DebtJacinto Ramirez Lahti, Antti-Pekka Tuovinen, Tommi Mikkonen, Rafael Capilla. 318-321 [doi]
- Exploring the impact of scenario and distance information on the reliability assessment of multi-sensor systemsMinhao Qiu, Tobias Antesberger, Florian Bock, Reinhard German. 322-329 [doi]
- Metamorphic Testing in Autonomous System SimulationsJubril Gbolahan Adigun, Linus Eisele, Michael Felderer. 330-337 [doi]
- Risk and Engineering Knowledge Integration in Cyber-physical Production Systems EngineeringFelix Rinker, Kristof Meixner, Sebastian Kropatschek, Elmar Kiesling, Stefan Biffl. 338-345 [doi]
- Bad Smells in Industrial Automation: Sniffing out Feature EnvyLisa Sonnleithner, Rick Rabiser, Alois Zoitl. 346-349 [doi]
- RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive SystemsRodi Jolak, Thomas Rosenstatter, Saif Aldaghistani, Riccardo Scandariato. 350-357 [doi]
- An Industrial Experience Report about Challenges from Continuous Monitoring, Improvement, and Deployment for Autonomous Driving FeaturesAli Nouri, Christian Berger 0001, Fredrik Törner. 358-365 [doi]
- End-to-end Timing Model Extraction from TSN-Aware Distributed Vehicle SoftwareBahar Houtan, Mehmet Onur Aybek, Mohammad Ashjaei, Masoud Daneshtalab, Mikael Sjödin, Saad Mubeen. 366-369 [doi]
- Mitigating Risk in Neural Network ClassifiersMisael Alpizar Santana, Radu Calinescu, Colin Paterson. 370-373 [doi]
- Web-Based Tracing for Model-Driven ApplicationsJörg Christian Kirchhof, Lukas Malcher, Judith Michael, Bernhard Rumpe, Andreas Wortmann 0001. 374-381 [doi]
- Handling Environmental Uncertainty in Design Time Access Control AnalysisNicolas Boltz, Sebastian Hahner, Maximilian Walter, Stephan Seifferman, Robert Heinrich, Tomás Bures, Petr Hnetynka. 382-389 [doi]
- Model-Driven optimization: Generating Smart Mutation Operators for Multi-Objective ProblemsNiels van Harten, Carlos Diego Nascimento Damasceno, Daniel Strüber 0001. 390-397 [doi]
- A Context-Driven Modelling Framework for Dynamic Authentication DecisionsAnne Bumiller, Olivier Barais, Stéphanie Challita, Benoît Combemale, Nicolas Aillery, Gael Le Lan. 398-405 [doi]
- Search Budget in Multi-Objective Refactoring optimization: a Model-Based Empirical StudyDaniele Di Pompeo, Michele Tucci 0001. 406-413 [doi]
- Synthesis of Pareto-optimal Policies for Continuous-Time Markov Decision ProcessesNaif Alasmari, Radu Calinescu. 414-417 [doi]
- UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systemsSven Smolka, Jan Laufer 0001, Zoltán Ádám Mann, Klaus Pohl. 418-425 [doi]
- Sustainability in Software Architecture: A Systematic Mapping StudyVasilios Andrikopoulos, Rares-Dorian Boza, Carlos Perales, Patricia Lago. 426-433 [doi]
- Aligning Platform Ecosystems Through Product Roadmapping: Systematic Mapping Study and Research AgendaStefan Trieflinger, Dimitri Petrik, Georg Herzwurm, Jürgen Münch. 434-441 [doi]
- How are software datasets constructed in Empirical Software Engineering studies? A systematic mapping studyJuan Andrés Carruthers, Jorge Andrés Díaz Pace, Emanuel Agustín Irrazábal. 442-450 [doi]
- API Deprecation: A Systematic Mapping StudyLeif Bonorden, Matthias Riebisch. 451-458 [doi]
- Automotive Service-oriented Architectures: a Systematic Mapping StudyNemanja Kukulicic, Damjan Samardzic, Alessio Bucaioni, Saad Mubeen. 459-466 [doi]
- Towards Continuous Systematic Literature Review in Software EngineeringBianca Minetto Napoleão, Fábio Petrillo, Sylvain Hallé, Marcos Kalinowski. 467-474 [doi]
- A Systematic Mapping Study on Robotic Testing of Mobile DevicesLucas Maciel, Alice Oliveira, Riei Rodrigues, Williams Santiago, Andresa Silva, Gustavo Carvalho, Breno Miranda. 475-482 [doi]
- SCAS-AI: A Strategy to Semi-Automate the Initial Selection Task in Systematic Literature ReviewsFábio Octaviano, Katia Romero Felizardo, Sandra C. P. F. Fabbri, Bianca Minetto Napoleão, Fábio Petrillo, Sylvain Hallé. 483-490 [doi]
- A Mapping Study of Security Vulnerability Detection Approaches for Web ApplicationsKarishma Rahman, Clemente Izurieta. 491-494 [doi]