Abstract is missing.
- Generative secure design, definedRiccardo Scandariato, Jennifer Horkoff, Robert Feldt. 1-4 [doi]
- Towards secure dynamic product lines in the cloudSebastian Krieter, Jacob Krüger, Nico Weichbrodt, Vasily A. Sartakov, Rüdiger Kapitza, Thomas Leich. 5-8 [doi]
- Towards forensic-ready software systemsLiliana Pasquale, Dalal Alrajeh, Claudia Peersman, Thein Than Tun, Bashar Nuseibeh, Awais Rashid. 9-12 [doi]
- Measure confidence of assurance cases in safety-critical domainsChung-Ling Lin, Wuwei Shen, Steven Drager, Betty Cheng. 13-16 [doi]
- A critical review of: "a practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineering": essay on quality indicator selection for SBSEMiqing Li, Tao Chen 0001, Xin Yao. 17-20 [doi]
- Enabling real-time feedback in software engineeringEnrique Larios Vargas, Joseph Hejderup, Maria Kechagia, Magiel Bruntink, Georgios Gousios. 21-24 [doi]
- Combining spreadsheet smells for improved fault predictionPatrick W. Koch, Konstantin Schekotihin, Dietmar Jannach, Birgit Hofer, Franz Wotawa, Thomas Schmitz. 25-28 [doi]
- Images of code: lossy compression for native instructionsMarcelino Rodriguez-Cancio, Jules White, Benoit Baudry. 29-32 [doi]
- Hierarchical learning of cross-language mappings through distributed vector representations for codeNghi D. Q. Bui, Lingxiao Jiang. 33-36 [doi]
- Which library should I use?: a metric-based comparison of software librariesFernando López de la Mora, Sarah Nadi. 37-40 [doi]
- Unicomp: a semantics-aware model compiler for optimised predictable softwareFederico Ciccozzi. 41-44 [doi]
- Self-adaptive static analysisEric Bodden. 45-48 [doi]
- Mining container image repositories for software configuration and beyondTianyin Xu, Darko Marinov. 49-52 [doi]
- Explainable software analyticsHoa Khanh Dam, Truyen Tran 0001, Aditya Ghose. 53-56 [doi]
- Generalizing specific-instance interpolation proofs with SyGuSMuqsit Azeem, Kumar Madhukar, R. Venkatesh. 57-60 [doi]
- Efficient parametric model checking using domain-specific modelling patternsRadu Calinescu, Kenneth Johnson, Colin Paterson. 61-64 [doi]
- Deep learning UI design patterns of mobile appsTam The Nguyen, Phong Minh Vu, Hung Viet Pham, Tung Thanh Nguyen. 65-68 [doi]
- Code review comments: language mattersVasiliki Efstathiou, Diomidis Spinellis. 69-72 [doi]
- Replication studies considered harmfulMartin Shepperd. 73-76 [doi]
- From craft to science: the road ahead for empirical software engineering researchMatthias Galster, Danny Weyns, Antony Tang, Rick Kazman, Mehdi Mirakhorli. 77-80 [doi]
- Towards saving money in using smart contractsTing Chen, Zihao Li, Hao Zhou, Jiachi Chen, Xiapu Luo, Xiaoqi Li, Xiaosong Zhang. 81-84 [doi]
- Understanding the impact of pair programming on the minds of developersSara Busechian, Vladimir Ivanov, Alan Rogers, Ilyas Sirazitdinov, Giancarlo Succi, Alexander Tormasov, Jooyong Yi. 85-88 [doi]
- Retrospective based on data-driven persona significance in B-to-B software developmentYasuhiro Watanabe, Hironori Washizaki, Kiyoshi Honda, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki. 89-92 [doi]
- Dazed: measuring the cognitive load of solving technical interview problems at the whiteboardMahnaz Behroozi, Alison Lui, Ian Moore, Denae Ford, Chris Parnin. 93-96 [doi]
- Deep customization of multi-tenant SaaS using intrusive microservicesHui Song, Franck Chauvel, Arnor Solberg. 97-100 [doi]
- Software ecosystem call graph for dependency managementJoseph Hejderup, Arie van Deursen, Georgios Gousios. 101-104 [doi]
- An immersive future for software engineering: avenues and approachesVibhu Saujanya Sharma, Rohit Mehra, Vikrant Kaulgud, Sanjay Podder. 105-108 [doi]
- Dronology: an incubator for cyber-physical systems researchJane Cleland-Huang, Michael Vierhauser, Sean Bayley. 109-112 [doi]