Abstract is missing.
- Perceval: software project data at your willSantiago Dueñas, Valerio Cosentino, Gregorio Robles, Jesús M. González-Barahona. 1-4 [doi]
- StackInTheFlow: behavior-driven recommendation system for stack overflow postsChase Greco, Tyler Haden, Kostadin Damevski. 5-8 [doi]
- SATD detector: a text-mining-based self-admitted technical debt detection toolZhongxin Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li. 9-12 [doi]
- Aletheia: a failure diagnosis toolchainMojdeh Golagha, Abu Mohammed Raisuddin, Lennart Mittag, Dominik Hellhake, Alexander Pretschner. 13-16 [doi]
- When the testing gets tough, the tough get ElasTestAntonia Bertolino, Antonello Calabrò, Guglielmo De Angelis, Micael Gallego, Boni García, Francisco Gortázar. 17-20 [doi]
- SUSHI: a test generator for programs with complex structured inputsPietro Braione, Giovanni Denaro, Andrea Mattavelli, Mauro Pezzè. 21-24 [doi]
- An extensible, regular-expression-based tool for multi-language mutant generationAlex Groce, Josie Holmes, Darko Marinov, August Shi, Lingming Zhang. 25-28 [doi]
- MuAlloy: a mutation testing framework for alloyKaiyuan Wang, Allison Sullivan, Sarfraz Khurshid. 29-32 [doi]
- MDroid+: a mutation testing framework for androidKevin Moran, Michele Tufano, Carlos Bernal-Cárdenas, Mario Linares Vásquez, Gabriele Bavota, Christopher Vendome, Massimiliano Di Penta, Denys Poshyvanyk. 33-36 [doi]
- The palladio-bench for modeling and simulating software architecturesRobert Heinrich, Dominik Werle, Heiko Klare, Ralf H. Reussner, Max E. Kramer, Steffen Becker, Jens Happe, Heiko Koziolek, Klaus Krogmann. 37-40 [doi]
- PerformanceHat: augmenting source code with runtime performance traces in the IDEJürgen Cito, Philipp Leitner, Christian Bosshard, Markus Knecht, Genc Mazlami, Harald C. Gall. 41-44 [doi]
- PROMOpedia: a web-content management-based encyclopedia of software property modelsSéverine Sentilles, Federico Ciccozzi, Efi Papatheocharous. 45-48 [doi]
- GuideGen: a tool for keeping requirements and acceptance tests alignedSofija Hotomski, Martin Glinz. 49-52 [doi]
- EVA: a tool for visualizing software architectural evolutionDaye Nam, Youn Kyu Lee, Nenad Medvidovic. 53-56 [doi]
- CSlicerCloud: a web-based semantic history slicing frameworkYi Li 0008, Chenguang Zhu, Julia Rubin, Marsha Chechik. 57-60 [doi]
- SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzingMingzhe Wang, Jie Liang, Yuanliang Chen, Yu Jiang 0001, Xun Jiao, Han Liu, Xibin Zhao, Jiaguang Sun. 61-64 [doi]
- ReGuard: finding reentrancy bugs in smart contractsChao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe. 65-68 [doi]
- Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysisCong Wang, Yu Jiang 0001, Xibin Zhao, Xiaoyu Song, Ming Gu 0001, Jiaguang Sun. 69-72 [doi]
- KernelHaven: an experimentation workbench for analyzing software product linesChristian Kröher, Sascha El-Sharkawy, Klaus Schmid. 73-76 [doi]
- Elixir: an automated repair tool for Java programsRipon K. Saha, Hiroaki Yoshida, Mukul R. Prasad, Susumu Tokumoto, Kuniharu Takayama, Isao Nanba. 77-80 [doi]
- Multi-view editing of software product lines with PEoPLMukelabai Mukelabai, Benjamin Behringer, Moritz Fey, Jochen Palz, Jacob Krüger, Thorsten Berger. 81-84 [doi]
- AnATLyzer: an advanced IDE for ATL model transformationsJesús Sánchez Cuadrado, Esther Guerra, Juan de Lara. 85-88 [doi]
- VISUFLOW: a debugging environment for static analysesLisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali 0001, Eric Bodden. 89-92 [doi]
- SQLInspect: a static analyzer to inspect database usage in Java applicationsCsaba Nagy, Anthony Cleve. 93-96 [doi]
- MDebugger: a model-level debugger for UML-RTMojtaba Bagherzadeh, Nicolas Hili, David Seekatz, Juergen Dingel. 97-100 [doi]
- CyPhEF: a model-driven engineering framework for self-adaptive cyber-physical systemsMirko D'Angelo, Annalisa Napolitano, Mauro Caporuscio. 101-104 [doi]
- ReVision: a tool for history-based model repair recommendationsManuel Ohrndorf, Christopher Pietsch, Udo Kelter, Timo Kehrer. 105-108 [doi]
- COMB: computing relevant program behaviorsBenjamin Holland, Payas Awadhutkar, Suresh Kothari, Ahmed Tamrawi, Jon Mathews. 109-112 [doi]
- The Gamma statechart composition framework: : design, verification and code generation for component-based reactive systemsVince Molnár, Bence Graics, András Vörös, István Majzik, Dániel Varró. 113-116 [doi]
- A regression proof selection tool for coqAhmet Çelik, Karl Palmskog, Milos Gligoric. 117-120 [doi]
- Industrie 4.0 virtual automation busThomas Kuhn, Pablo Oliveira Antonino, Markus Damm, Andreas Morgenstern, Dirk Schulz, Constantin Ziesche, Thorsten Müller. 121-122 [doi]
- An empirical study of the product owner role in scrumJulian M. Bass, Sarah Beecham, Mohammad Abdur Razzak, Clodagh Nic Canna, John Noll. 123-124 [doi]
- Reengineering legacy systems for supporting SOA: a case study on the brazilian's secretary of state for taxationYan de Lima Justino, Carlos Eduardo da Silva. 125-126 [doi]
- Results from multi-faceted software reliability assessment studiesYaping Luo, Egbert Touw. 127-128 [doi]
- An initial characterization of bug-injecting development sessionsIrina Diana Coman, Alberto Sillitti, Giancarlo Succi. 129-130 [doi]
- Challenges with automotive test case specificationsKatharina Juhnke, Matthias Tichy, Frank Houdek. 131-132 [doi]
- Understanding the role of reporting in work item tracking systems for software development: an industrial case studyPavneet Singh Kochhar, Stanislaw Swierc, Trevor Carnahan, Hitesh Sajnani, Meiyappan Nagappan. 133-134 [doi]
- When students meet developers: are barcamps a format for interactive software engineering education?Bianca Bergande, Philipp Brune. 135-136 [doi]
- A methodology to teaching statistical process control for software engineersJulio Cezar Costa Furtado, Sandro Ronaldo Bezerra Oliveira. 137-138 [doi]
- A matrix for analyzing projects in software engineering coursesJakeline Marcos-Abed. 139-140 [doi]
- Continuous inspection in the classroom: improving students' programming quality with social coding methodsYao Lu 0003, XinJun Mao, Tao Wang, Gang Yin, Zude Li, Huaimin Wang. 141-142 [doi]
- Startup software development education: a systematic mapping studyRafael Chanin, Afonso Sales, Leandro Bento Pompermaier, Rafael Prikladnicki. 143-144 [doi]
- Analyzing the transactive memory in teaching software engineeringStyliani Kleanthous, Georgia M. Kapitsaki. 145-146 [doi]
- Improving formation of student teams: a clustering approachShoaib Akbar, Edward F. Gehringer, Zhewei Hu. 147-148 [doi]
- Are our students engaged in their studies?: professional engagement vs. study engagementArnon Sturm, Timothy C. Lethbridge. 149-150 [doi]
- Multidisciplinary skill assessment for embedded software development education via a robot contestHarumi Watanabe, Mikiko Sato, Masafumi Miwa, Makoto Imamura, Shintaro Hosoai, Nobuhiko Ogura, Hiroyuki Nakamura, Kenji Hisazumi. 151-152 [doi]
- PBL planner toolkit: a canvas-based tool for planning PBL in software engineering educationGustavo H. S. Alexandre, Simone C. dos Santos. 153-154 [doi]
- Challenge-based learning: a brazilian case studyAlan R. Santos, Afonso Sales, Paulo Fernandes, Josiane Kroll. 155-156 [doi]
- A conceptual model for cooperative thinkingDaniel Russo 0002, Marcello Missiroli, Paolo Ciancarini. 157-158 [doi]
- Situation-based e-learning in software engineering: using software engineering-related metadata to improve self-empowered learningWilhelm Koop, Tobias Brückmann, Marian Benner-Wickner, Markus Kleinschmidt, Volker Gruhn. 159-160 [doi]
- A multi-year analysis of students' build errors in agile software development educational projectsErina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Naoki Kawashima, Hajimu Iida. 161-162 [doi]
- Deciding weak monitorability for runtime verificationZhe Chen, Yifan Wu, Ou Wei, Bin Sheng. 163-164 [doi]
- LWE: LDA refined word embeddings for duplicate bug report detectionAmar Budhiraja, Raghu Reddy, Manish Shrivastava. 165-166 [doi]
- Inferring API elements relevant to an english queryThanh Van Nguyen, Tien N. Nguyen. 167-168 [doi]
- A study of monitoring crosscutting concerns implementationGrigoreta Sofia Cojocar, Adriana Mihaela Guran. 169-170 [doi]
- Duplicate finder toolkitDmitry Luciv, Dmitrij Koznov, George Chernishev, Hamid Abdul Basit, Konstantin Romanovsky, Andrey N. Terekhov. 171-172 [doi]
- Toward the development of richer properties for recommender systemsDavid Shriver. 173-174 [doi]
- Automatic detection of inverse operations while avoiding loop unrollingKunal Banerjee, Ramanuj Chouksey, Chandan Karfa, Pankaj Kalita. 175-176 [doi]
- Efficiently finding minimal failing input in MapReduce programsMuhammad Sohaib Ayub, Junaid Haroon Siddiqui. 177-178 [doi]
- Forks insight: providing an overview of GitHub forksLuyao Ren, Shurui Zhou, Christian Kästner. 179-180 [doi]
- Use of trace link types in issue tracking systemsMihaela Todorova Tomova, Michael Rath 0002, Patrick Mäder. 181-182 [doi]
- A topic analysis of the R programming languageAbigail Atchison, Haley Anderson, Christina Berardi, Natalie Best, Cristiano Firmani, Rene German, Erik Linstead. 183-184 [doi]
- Architecture reconstruction and evaluation of blockchain open source platformJungho Kim, Sungwon Kang, Hwi Ahn, ChangSup Keum, Chan-Gun Lee. 185-186 [doi]
- Agile requirement traceability matrixSerin Jeong, Heetae Cho, Seonah Lee. 187-188 [doi]
- Beyond spatial and temporal memory safetyZhe Chen, Chuanqi Tao, Zhiyi Zhang, Zhibin Yang. 189-190 [doi]
- A novel shared memory framework for distributed deep learning in high-performance computing architectureShinyoimg Ahn, Joongheon Kim, Sungwon Kang. 191-192 [doi]
- DWEN: deep word embedding network for duplicate bug report detection in software repositoriesAmar Budhiraja, Kartik Dutta, Raghu Reddy, Manish Shrivastava. 193-194 [doi]
- Live path control flow integrityMohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue. 195-196 [doi]
- Using repository data for driving software architectureTobias Olsson, Morgan Ericsson, Anna Wingkvist. 197-198 [doi]
- Analysis of requirements quality evolutionEugenio Parra, Jose Luis de la Vara, Luis Alonso. 199-200 [doi]
- Using consensus to automatically infer post-conditionsJingyi Su, Mohd Arafat, Robert Dyer. 202-203 [doi]
- Pairika: a failure diagnosis benchmark for C++ programsMd. Rezaur Rahman, Mojdeh Golagha, Alexander Pretschner. 204-205 [doi]
- Towards safe refactoring for intelligent parallelization of Java 8 streamsYiming Tang, Raffi Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed. 206-207 [doi]
- Testing web-based applications with the voice controlled accessibility and testing tool (VCAT)Nagendra Prasad Kasaghatta Ramachandra, Christoph Csallner. 208-209 [doi]
- Leveraging product relationships to generate candidate bugs for duplicate bug predictionEmily Su, Sameer Joshi. 210-211 [doi]
- Protecting remote controlling apps of smart-home-oriented IOT devicesEric Ruiz, Richard Avelar, Xiaoyin Wang. 212-213 [doi]
- MC/DC coverage-oriented compiler optimization for symbolic executionYijun Liu, Zhenbang Chen, Wei Dong 0006, Chendong Feng. 214-215 [doi]
- Introducing quality models based on joint probabilitiesMaria Ulan, Welf Löwe, Morgan Ericsson, Anna Wingkvist. 216-217 [doi]
- Program repair that learns from mistakesBat-Chen Rothenberg, Orna Grumberg. 218-219 [doi]
- A changeset-based approach to assess source code density and developer efficacySebastian Hönel, Morgan Ericsson, Welf Löwe, Anna Wingkvist. 220-221 [doi]
- Discovering requirements of behaviour change software systems from negative user experienceNelly Condori-Fernández, Alejandro Catala Bolos, Patricia Lago. 222-223 [doi]
- Understanding newcomers success in open source communityShahab Bayati. 224-225 [doi]
- Swarming remote piloted aircraft systems for mosquito-borne disease research and controlJanet Wyngaard, Samuel S. C. Rund, Gregory R. Madey, Michael Vierhauser, Jane Cleland-Huang. 226-227 [doi]
- Ethics-aware software engineeringFatma Basak Aydemir, Fabiano Dalpiaz. 228-229 [doi]
- An efficient approach for verifying automobile distributed application systems on timing propertyHaitao Zhang, Guoqiang Li 0001, Xiaohong Li, Zhuo Cheng, Jinyun Xue, Shaoying Liu. 230-231 [doi]
- "Adoption of the visual brainstorming technique in the open source software development process"Lucrecia Llerena, Nancy Rodríguez, Pablo Gómez-Abajo, John W. Castro, Silvia Teresita Acuña. 232-233 [doi]
- A general framework to detect behavioral design patternsCong Liu, Boudewijn F. van Dongen, Nour Assy, Wil M. P. van der Aalst. 234-235 [doi]
- Subsuming mutation operatorsHuan Lin, Yawen Wang, Yunzhan Gong. 236-237 [doi]
- Detecting missing checks for identifying insufficient attack protectionsLingyun Situ, Liang Zou, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li. 238-239 [doi]
- How do community smells influence code smells?Fabio Palomba, Damian A. Tamburri, Alexander Serebrenik, Andy Zaidman, Francesca Arcelli Fontana, Rocco Oliveto. 240-241 [doi]
- Communication in open-source projects-end of the e-mail era?Verena Käfer, Daniel Graziotin, Ivan Bogicevic, Stefan Wagner 0001, Jasmin Ramadani. 242-243 [doi]
- Predicting components for issue reports using deep learning with information retrievalMorakot Choetkiertikul, Hoa Khanh Dam, Truyen Tran 0001, Trang Pham, Aditya Ghose. 244-245 [doi]
- An experimental analysis of fault detection capabilities of covering array constructorsRubing Huang, Yunan Zhou, Dave Towey, Tsong Yueh Chen, Jinfu Chen. 246-247 [doi]
- Are information retrieval-based bug localization techniques trustworthy?Misoo Kim, Eunseok Lee. 248-249 [doi]
- Accelerating counterexample detection in software model checkingCong Tian, Zhao Duan, Zhenhua Duan. 250-251 [doi]
- A novel variable-centric fault localization techniqueJeongho Kim, Jindae Kim, Eunseok Lee. 252-253 [doi]
- Android inter-component communication analysis with intent revisionCong Tian, Congli Xia, Zhenhua Duan. 254-255 [doi]
- Exploration of academic and industrial evidence about architectural tactics and patterns in microservicesFelipe Osses, Gastón Márquez, Hernán Astudillo. 256-257 [doi]
- Automatically solving NP-complete problems on a quantum computerShaohan Hu, Peng Liu 0010, Chun-Fu Richard Chen, Marco Pistoia. 258-259 [doi]
- Guiding developers to make informative commenting decisions in source codeYuan Huang, Nan Jia, Qiang Zhou, Xiangping Chen, Yingfei Xiong, Xiaonan Luo. 260-261 [doi]
- Making well-informed software design decisionsArman Shahbazian, Youn Kyu Lee, Yuriy Brun, Nenad Medvidovic. 262-263 [doi]
- Runtime verification of memory safety via source transformationZhe Chen, Junqi Yan, Wenming Li, Ju Qian, Zhiqiu Huang. 264-265 [doi]
- Synthesizing relation-aware entity transformation by examplesJiarong Wu, Yanyan Jiang 0001, Chang Xu 0001, Shing-Chi Cheung, Xiaoxing Ma, Jian Lu. 266-267 [doi]
- Testing heap-based programs with Java StarFinderLong H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun 0001, Shengchao Qin. 268-269 [doi]
- Automatically answering API-related questionsDi Wu, Xiao-Yuan Jing, Haowen Chen, Xiaoke Zhu, Hongyu Zhang, Mei Zuo, Lu Zi, Chen Zhu. 270-271 [doi]
- Exploring uncertainty in GitHub OSS projects: when and how do developers face uncertainty?Naoyasu Ubayashi, Hokuto Muraoka, Daiki Muramoto, Yasutaka Kamei, Ryosuke Sato. 272-273 [doi]
- Systematic top-down design of cyber-physical models with integrated validation and formal verificationChristoph Luckeneder, Hermann Kaindl. 274-275 [doi]
- On vulnerability evolution in Android appsJun Gao, Li Li 0029, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein. 276-277 [doi]
- UMLx: a UML diagram analytic tool for software management decisionsKan Qi, Barry W. Boehm. 278-279 [doi]
- Unit tests and component tests do make a difference on fault localisation effectivenessGulsher Laghari, Serge Demeyer. 280-281 [doi]
- Recommending exception handling patterns with ExAssistTam The Nguyen, Phong Minh Vu, Hung Viet Pham, Tung Thanh Nguyen. 282-283 [doi]
- ALPACA-advanced linguistic pattern and concept analysis framework for software engineering corporaPhong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen, Hung Viet Pham. 284-285 [doi]
- Combining STPA and BDD for safety analysis and verification in agile developmentYang Wang, Stefan Wagner 0001. 286-287 [doi]
- Machine learning based code smell detection through WekaNoseUmberto Azadi, Francesca Arcelli Fontana, Marco Zanoni. 288-289 [doi]
- Knowledge-enriched security and privacy threat modelingLaurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen. 290-291 [doi]
- CrossEcore: an extendible framework to use ecore and OCL across platformsSimon Schwichtenberg, Ivan Jovanovikj, Christian Gerth, Gregor Engels. 292-293 [doi]
- Semantically enhanced tag recommendation for software CQAs via deep learningJian Zhang, Hailong Sun 0001, Yanfei Tian, Xudong Liu. 294-295 [doi]
- QoS-aware service composition using blockchain-based smart contractsPuwei Wang, Xiaohe Liu, Jinchuan Chen, Ying Zhan, Zhi Jin. 296-297 [doi]
- An automated and instant discovery of concrete repairs for model inconsistenciesRoland Kretschmer, Djamel Eddine Khelladi, Alexander Egyed. 298-299 [doi]
- Knowledge transfer from research to industry: a survey on program comprehensionIvonne von Nostitz-Wallwitz, Jacob Krüger, Janet Siegmund, Thomas Leich. 300-301 [doi]
- MOBS: multi-operator observation-based slicing using lexical approximation of program dependenceSeongmin Lee, David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo. 302-303 [doi]
- On extracting relevant and complex variability information from software descriptions with pattern structuresJessie Carbonnel, Marianne Huchard, Clémentine Nebut. 304-305 [doi]
- CUTER: ClUstering-based test suite reductionCarmen Coviello, Simone Romano 0001, Giuseppe Scanniello. 306-307 [doi]
- The effect of noise on requirements comprehensionSimone Romano 0001, Giuseppe Scanniello, Davide Fucci, Natalia Juristo, Burak Turhan. 308-309 [doi]
- Incremental UML for agile development with PREXELEric Braude, Jason Van Schooneveld. 310-312 [doi]
- An algorithm and tool to infer practical postconditionsJohn L. Singleton, Gary T. Leavens, Hridesh Rajan, David R. Cok. 313-314 [doi]
- Designing bug detection rules for fewer false alarmsJaechang Nam, Song Wang, Yuan Xi, Lin Tan. 315-316 [doi]
- Automated user reviews analyserAdelina Ciurumelea, Sebastiano Panichella, Harald C. Gall. 317-318 [doi]
- A recommender system for developer onboardingChao Liu, Dan Yang 0001, Xiaohong Zhang, Haibo Hu, Jed Barson, Baishakhi Ray. 319-320 [doi]
- Obfuscating program control flow with Intel SGXYongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree. 321-322 [doi]
- Benchmarking microservice systems for software engineering researchXiang Zhou, Xin Peng, Tao Xie, Jun Sun 0001, Chenjie Xu, Chao Ji, Wenyun Zhao. 323-324 [doi]
- Bridging effort-aware prediction and strong classification: a just-in-time software defect prediction studyYuchen Guo, Martin Shepperd, Ning Li. 325-326 [doi]
- Model-based adaptation to extreme physical environments: a case study on mixed-criticality industrial ethernetZonghui Li, Hai Wan, Yangdong Deng, Qinghan Yu, Tianchi Li, Kang Wei, Ming Gu 0001. 327-328 [doi]
- Efficient and deterministic replay for web-enabled Android appsFangge Yan, Zhengwei Qi, Mingyuan Xia, Xue Liu. 329-330 [doi]
- A parallel framework for ab initio transcript-clusteringDhananjai M. Rao. 331-332 [doi]
- Sources of satisfaction in agile software developmentRobert Biddle, Andreas Meier 0004, Martin Kropp, Craig Anslow. 333-334 [doi]
- Which similarity metric to use for software documents?: a study on information retrieval based software engineering tasksMd Masudur Rahman, Saikat Chakraborty, Baishakhi Ray. 335-336 [doi]
- A taxonomy of how method stereotypes changeMichael John Decker, Christian D. Newman, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic, Nicholas A. Kraft. 337-338 [doi]
- Automated program repair with canonical constraintsAndrew Hill, Corina S. Pasareanu, Kathryn T. Stolee. 339-341 [doi]
- Toward measuring software coupling via weighted dynamic metricsHenning Schnoor, Wilhelm Hasselbring. 342-343 [doi]
- There is no random sampling in software engineering researchBilal Amir, Paul Ralph. 344-345 [doi]
- Efficient iterative deepening for bounded exhaustive generation of complex structuresAffan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui. 346-347 [doi]
- Improving bug localization with report quality dynamics and query reformulationMohammad Masudur Rahman, Chanchai K. Roy. 348-349 [doi]
- Towards sustainable Android malware detectionHaipeng Cai, John Jenkins. 350-351 [doi]
- Fast, scalable and user-guided clone detectionJeffrey Svajlenko, Chanchai K. Roy. 352-353 [doi]
- Searching for high-performing software configurations with metaheuristic algorithmsChong Tang 0001, Kevin J. Sullivan, Baishakhi Ray. 354-355 [doi]
- Git blame who?: stylistic authorship attribution of small, incomplete source code fragmentsEdwin Dauber, Aylin Caliskan, Richard E. Harang, Rachel Greenstadt. 356-357 [doi]
- Identifying TraIn: a neglected form of socio-technical incongruenceXiao Wang, Lu Xiao, Ye Yang, Xinyi Xu, Yu Jiang 0001. 358-359 [doi]
- Efficient blockchain-based software systems via hierarchical bucket treeWeili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Peilin Zheng, Yuren Zhou. 360-361 [doi]
- Group preference based API recommendation via heterogeneous information networkFenfang Xie, Liang Chen, Dongding Lin, Chuan Chen, Zibin Zheng, Xiaola Lin. 362-363 [doi]
- LibraryGuru: API recommendation for Android developersWeizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen. 364-365 [doi]
- ACONA: active online model adaptation for predicting continuous integration build failuresAnsong Ni, Ming Li. 366-367 [doi]
- How to handle environmental uncertainty in goal-based requirements engineeringManzoor Ahmad, Christophe Gnaho, Jean-Michel Bruel, Régine Laleau. 368-369 [doi]
- Efficient GUI test generation by learning from tests of other appsAndreas Rau, Jenny Hotzkow, Andreas Zeller. 370-371 [doi]
- A qualitative reasoning approach to spectrum-based fault localizationAlexandre Perez, Rui Abreu. 372-373 [doi]
- Evaluating project compliance during EA planning: a model-based semi automatic method for enterprise architecture planningMelanie Langermeier, Bernhard Bauer. 374-375 [doi]
- ASSEMBLE: a collaborative business process development toolAyesha Afzal, Ahmad Akhtar, Nabila Ishfaq, Basit Shafiq, Shafay Shamail, Abeer Elahraf, Jaideep Vaidya, Nabil R. Adam. 376-377 [doi]
- A weight-based approach to combinatorial test generationJing Zhao, Gao-Rong Ning, H. L. Lu, Y. B. Wang, Yan Cai, Jian Zhang. 378-379 [doi]
- Automated test migration for mobile appsFarnaz Behrang, Alessandro Orso. 384-385 [doi]
- USE: unified and split execution for exposing divergences between versionsHongliang Liang, Wenying Hu, Yini Zhang, Lin Jiang, Wuwei Shen. 386-387 [doi]
- Learning to mine parallel natural language/source code corpora from stack overflowPengcheng Yin, Bowen Deng, Edgar Chen, Bogdan Vasilescu, Graham Neubig. 388-389 [doi]
- Identification of methods with low fault riskRainer Niedermayr, Tobias Röhm, Stefan Wagner 0001. 390-391 [doi]
- A declarative approach for updating distributed microservicesFabienne Boyer, Noël De Palma, Xinxiu Tao, Xavier Etchevers. 392-393 [doi]
- Static detection of API call vulnerabilities in iOS executablesChun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan. 394-395 [doi]
- How do modelers read UML diagrams?: preliminary results from an eye-tracking studyHarald Störrle, Nick Baltsen, Henrik Christoffersen, Anja M. Maier. 396-397 [doi]
- Towards a formal API assessmentAmir Zghidi, Imed Hammouda, Brahim Hnich. 398-399 [doi]
- Measuring the energy footprint of mobile testing frameworksLuis Cruz, Rui Abreu. 400-401 [doi]
- Precooked developer dashboards: what to show and how to useVladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin. 402-403 [doi]
- Understanding and leveraging developer inexpertiseLykes Claytor, Francisco Servant. 404-405 [doi]
- The buggy side of code refactoring: understanding the relationship between refactorings and bugsIsabella Ferreira, Eduardo Fernandes, Diego Cedrim, Anderson G. Uchôa, Ana Carla Bibiano, Alessandro Garcia, João Lucas Correia, Filipe Santos, Gabriel Nunes, Caio Barbosa, Baldoino Fonseca, Rafael Maiani de Mello. 406-407 [doi]
- Predicting the fault revelation utility of mutantsThierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon. 408-409 [doi]
- Memory and resource leak defects in Java Projects: an empirical studyMohammadreza Ghanavati, Diego Costa, Artur Andrzejak, Janos Seboek. 410-411 [doi]
- Hybrid traversal: efficient source code analysis at scaleRamanathan Ramu, Ganesha Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan. 412-413 [doi]
- Defect prediction metrics for infrastructure as code scripts in DevOpsAkond Rahman, Jonathan Stallings, Laurie Williams. 414-415 [doi]
- Interlocking safety cases for unmanned autonomous systems in urban environmentsMichael Vierhauser, Sean Bayley, Jane Wyngaard, Jinghui Cheng, Wandi Xiong, Robyn R. Lutz, Joshua Huseman, Jane Cleland-Huang. 416-417 [doi]
- A systematic literature review to support the selection of user acceptance testing techniquesErnani César dos Santos, Patricia Vilain, Douglas Hiura Longo. 418-419 [doi]
- Assurance cases for scientific computing softwareSpencer Smith, Mojdeh Sayari Nejad, Alan Wassyng. 420-421 [doi]
- Grafter: transplantation and differential testing for clonesTianyi Zhang 0001, Miryung Kim. 422-423 [doi]
- Symbolic path cost analysis for side-channel detectionTegan Brennan, Seemanta Saha, Tevfik Bultan. 424-425 [doi]
- Identifying security issues in software development: are keywords enough?Patrick Morrison, Tosin Daniel Oyetoyan, Laurie Williams. 426-427 [doi]
- Implementation and evaluation of cross translation unit symbolic execution for C family languagesGábor Horváth, Péter Szécsi, Zoltán Gera, Dániel Krupp, Norbert Pataki. 428 [doi]
- Path-based function embeddingsDaniel DeFreez, Aditya V. Thakur, Cindy Rubio-González. 430-431 [doi]
- Multimorphic testingPaul Temple, Mathieu Acher, Jean-Marc Jézéquel. 432-433 [doi]
- Property specification patterns for robotic missionsClaudio Menghi, Christos Tsigkanos, Thorsten Berger, Patrizio Pelliccione, Carlo Ghezzi. 434-435 [doi]
- PostgreSQL: a blueprint for successful autotuning of real-world applicationsThomas Karcher, Mathias Landhäußer. 436-437 [doi]
- Towards multi-robot applications planning under uncertaintyClaudio Menghi, Sergio García, Patrizio Pelliccione, Jana Tumova. 438-439 [doi]
- Companies' domination in FLOSS development: an empirical study of OpenStackYuxia Zhang, Xin Tan, Minghui Zhou, Zhi Jin. 440-441 [doi]
- Reordering tests for faster test suite executionPanagiotis Stratis, Ajitha Rajan. 442-443 [doi]
- Answering the requirements traceability questionsArushi Gupta, Wentao Wang, Nan Niu, Juha Savolainen. 444-445 [doi]
- BugZoo: a platform for studying software bugsChristopher Steven Timperley, Susan Stepney, Claire Le Goues. 446-447 [doi]
- An approach to engineer and realize emergent configurations in the internet of thingsFahed Alkhabbas. 448-449 [doi]
- Effort-oriented methods and tools for software development and maintenance for mobile appsGemma Catolino. 450-451 [doi]
- Understanding and improving cyber-physical system models and development toolsShafiul Azam Chowdhury. 452-453 [doi]
- Effective engineering of multi-robot software applicationsSergio García. 454-455 [doi]
- Automated migration support for software product line co-evolutionLea Kristin Gerling. 456-457 [doi]
- Constructing supply chains in open source softwareYuxing Ma. 458-459 [doi]
- The relationship between personality and value-based decision-makingFabiana Freitas Mendes. 460-461 [doi]
- IoT-based urban security modelsMahyar Tourchi Moghaddam. 462-463 [doi]
- Assisted discovery of software vulnerabilitiesNuthan Munaiah. 464-467 [doi]
- Automatic verification of time behavior of programsGiovanni Liva. 468-471 [doi]
- Learning to accelerate compiler testingJunjie Chen. 472-475 [doi]
- Characteristics of defective infrastructure as code scripts in DevOpsAkond Rahman. 476-479 [doi]
- Fostering software developers' productivity at work through self-monitoring and goal-settingAndré N. Meyer. 480-483 [doi]
- Interactive model mining from embedded legacy softwareWasim Said. 484-487 [doi]
- Assessing personalized software defect predictorsBeyza Eken. 488-491 [doi]
- Crowdsourced software development and maintenanceBin Lin. 492-495 [doi]
- A neuro-cognitive perspective of program comprehensionNorman Peitek. 496-499 [doi]
- VarXplorer: reasoning about feature interactionsLarissa Rocha Soares. 500-502 [doi]
- Toward an empirical theory of feedback-driven developmentMoritz Beller. 503-505 [doi]
- Automatically finding bugs in commercial cyber-physical system development tool chainsShafiul Azam Chowdhury. 506-508 [doi]
- Interactive and automated debugging for big data analyticsMuhammad Ali Gulzar. 509-511 [doi]
- Deadlock detector and solver (DDS)Eman Aldakheel. 512-514 [doi]
- AutoModel: a domain-specific language for automatic modeling of real-time embedded systemsNafiseh Kahani. 515-517 [doi]
- When to extract features: towards a recommender systemJacob Krüger. 518-520 [doi]
- Compiler-assisted test acceleration using GPUsVanya Yaneva. 521-523 [doi]
- npm ecosystemAsher Trockman. 524-526 [doi]
- Combining symbolic execution and model checking to verify MPI programsHengbiao Yu. 527-530 [doi]
- Automatic software summarization: the state of the artLaura Moreno, Andrian Marcus. 530-531 [doi]
- Strategy for continuous testing in iDevOpsPeter Zimmerer. 532-533 [doi]
- Analyzing software engineering experiments: everything you always wanted to know but were afraid to askSira Vegas. 534-535 [doi]
- Natural language requirements processing: from research to practiceAlessio Ferrari. 536-537 [doi]
- Metamorphic testing 20 years later: a hands-on introductionSergio Segura, Zhi Quan Zhou. 538-539 [doi]
- How to analyze git repositories with command line tools: we're not in kansas anymoreDiomidis Spinellis, Georgios Gousios. 540-541 [doi]
- Big data software analytics with Apache SparkGeorgios Gousios. 542-543 [doi]
- Demystifying cyber-physical malwareSuraj C. Kothari. 544-545 [doi]
- Detecting and managing code smells: research and practiceTushar Sharma. 546-547 [doi]
- Machine learning for software engineering: models, methods, and applicationsKarl Meinke, Amel Bennaceur. 548-549 [doi]
- State of the systems securityEric Bodden. 550-551 [doi]
- Multi-platform computing for physical devices via MakeCode and CODALThomas Ball, Judith Bishop, Joe Finney. 552-553 [doi]