Abstract is missing.
- Using API-Embedding for API-Misuse RepairSebastian Nielebock 0001, Robert Heumüller, Jacob Krüger, Frank Ortmeier. 1-2 [doi]
- Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle RepairYu Huang 0015, Kevin Angstadt, Kevin Leach, Westley Weimer. 3-10 [doi]
- Flake It 'Till You Make It: Using Automated Repair to Induce and Fix Latent Test FlakinessOwain Parry, Gregory M. Kapfhammer, Michael Hilton, Phil McMinn. 11-12 [doi]
- Refining Fitness Functions in Test-Based Program RepairJustyna Petke, Aymeric Blot. 13-14 [doi]
- Program Repairing History as Git RepositoryRyoko Izuta, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto. 15-16 [doi]
- Interactive Patch Generation and SuggestionXiang Gao, Abhik Roychoudhury. 17-18 [doi]
- Learning to Fix Build Errors with Graph2Diff Neural NetworksDaniel Tarlow, Subhodeep Moitra, Andrew Rice, Zimin Chen, Pierre-Antoine Manzagol, Charles Sutton, Edward Aftandilian. 19-20 [doi]
- Impact of Similarity on Repairing Small Programs: A Case Study on QuixBugs BenchmarkMoumita Asad, Kishan Kumar Ganguly, Kazi Sakib. 21-22 [doi]
- Automatic repair of OWASP Top 10 security vulnerabilities: A surveyAlexander Marchand-Melsom, Duong Bao Nguyen Mai. 23-30 [doi]
- Bot or not?: Detecting bots in GitHub pull request activity based on comment similarityMehdi Golzadeh, Damien Legay, Alexandre Decan, Tom Mens. 31-35 [doi]
- MSABot: A Chatbot Framework for Assisting in the Development and Operation of Microservice-Based SystemsChun-Ting Lin, Shang-Pin Ma, Yu-Wen Huang. 36-40 [doi]
- Challenges and guidelines on designing test cases for test botsLinda Erlenhov, Francisco Gomes de Oliveira Neto, Martin Chukaleski, Samer Daknache. 41-45 [doi]
- Conversational Bot for Newcomers Onboarding to Open Source ProjectsJames Dominic, Jada Houser, Igor Steinmacher, Charles Ritter, Paige Rodeghero. 46-50 [doi]
- The Inconvenient Side of Software Bots on Pull RequestsMairieli Santos Wessel, Igor Steinmacher. 51-55 [doi]
- Sorry to Bother You Again: Developer Recommendation Choice Architectures for Designing Effective BotsChris Brown, Chris Parnin. 56-60 [doi]
- An Exploratory Study of Bot CommitsTapajit Dey, Bogdan Vasilescu, Audris Mockus. 61-65 [doi]
- Experiences Building an Answer Bot for GitterRicardo Romero, Esteban Parra, Sonia Haiduc. 66-70 [doi]
- Two Decades of Empirical Research on Developers' Information Needs: A Preliminary AnalysisAbir Bouraffa, Walid Maalej. 71-77 [doi]
- Comparing Different Developer Behavior Recommendation StylesChris Brown, Chris Parnin. 78-85 [doi]
- Sensemaking Practices in the Everyday Work of AI/ML Software EngineeringChristine T. Wolf, Drew Paine. 86-92 [doi]
- Multitasking Across Industry Projects: A Replication StudyKarina Kohl, Bogdan Vasilescu, Rafael Prikladnicki. 93-100 [doi]
- How Online Forums Complement Task Documentation in Software CrowdsourcingLeticia S. Machado, Igor Steinmacher, Sabrina Marczak, Cleidson R. B. de Souza. 101-108 [doi]
- Behavior-Driven Development: A case study on its impacts on agile development teamsNicolas Nascimento, Alan R. Santos, Afonso Sales, Rafael Chanin. 109-116 [doi]
- Building Implicit Vector Representations of Individual Coding StyleVladimir Kovalenko, Egor Bogomolov, Timofey Bryksin, Alberto Bacchelli. 117-124 [doi]
- Strategies for Crowdworkers to Overcome Barriers in Competition-based Software Crowdsourcing DevelopmentAlexandre Lazaretti Zanatta, Leticia Machado, Igor Steinmacher, Rafael Prikladnicki, Cleidson R. B. de Souza. 125-128 [doi]
- Linecept: An Early Prototype of a Timeline-Based Design Coordination ToolDavid Tamas Kutas, Aditya Nair, Prerna Singh, Emily Kan, Janet Burge, André van der Hoek. 129-132 [doi]
- Engineering Human Values in Software through Value ProgrammingDavoud Mougouei. 133-136 [doi]
- More than Code: Contributions in Scrum Software Engineering TeamsFrederike Ramin, Christoph Matthies, Ralf Teusner. 137-140 [doi]
- Security but not for security's sake: The impact of social considerations on app developers' choicesIrum Rauf, Dirk van der Linden, Mark Levine, John Towse, Bashar Nuseibeh, Awais Rashid. 141-144 [doi]
- Requirements Engineering in Implementing IT Support for Scandinavian Healthcare Work Processes Using Outsourced Development in EgyptJens Bæk Jørgensen, Kim Henning Jönsson, Sofie Aaskov Nielsen, Christoffer Øland Skovgaard, Johan Rugager Vase, Mohamed Ghonemi, Rasha Adel Hassan. 145-148 [doi]
- Are Automatic Bug Report Summarizers Missing the Target?John Anvik, Akalanka Galappaththi. 149-152 [doi]
- Towards Understanding Technical Responses to Requirements Changes in Agile TeamsKashumi Madampe, Rashina Hoda, John C. Grundy, Paramvir Singh. 153-156 [doi]
- Software Development at the German Aerospace Center: Role and Status in PracticeLynn von Kurnatowski, Tobias Schlauch, Carina Haupt. 157-160 [doi]
- Beyond Technical Skills in Software Testing: Automated versus Manual TestingMary Sánchez-Gordón, Laxmi Rijal, Ricardo Colomo Palacios. 161-164 [doi]
- Why Did your PR Get Rejected?: Defining Guidelines for Avoiding PR Rejection in Open Source ProjectsNick Papadakis, Ayan Patel, Tanay Gottigundala, Alexandra Garro, Xavier Graham, Bruno da Silva. 165-168 [doi]
- An Exploratory Field Study of Programmer Assistance-Seeking during Software DevelopmentPaige Rodeghero. 169-172 [doi]
- Behavioral Aspects of Safety-Critical Software DevelopmentPer Lenberg, Robert Feldt, Lars Göran Wallgren Tengberg, Lucas Gren. 173-176 [doi]
- Immersive IDE: Towards Leveraging Virtual Reality for creating an Immersive Software Development EnvironmentRohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. 177-180 [doi]
- Towards Sketch-based User Interaction with Integrated Software Development EnvironmentsSigurdur Gauti Samuelsson, Matthias Book. 181-184 [doi]
- Educating Project Stakeholders: A Preliminary ReportAlex Dekhtyar, Bruno da Silva, Karson Slocum. 185-186 [doi]
- On Developer Relations Team's Reasons for Using RepositoriesAwdren De Lima Fontão, Bruno B. P. Cafeo, Bruno Bonifácio, Rodrigo Pereira dos Santos, Arilo Claudio Dias Neto. 187-188 [doi]
- Mining for Process Improvements: Analyzing Software Repositories in Agile RetrospectivesChristoph Matthies, Franziska Dobrigkeit, Guenter Hesse. 189-190 [doi]
- Teaching-learning of software conceptual design via function-behaviour-structure frameworkT. G. Lakshmi, Sridhar Iyer. 191-192 [doi]
- A preliminary study about the low engagement of female participation in hackathonsLavinia Paganini, Kiev Gama. 193-194 [doi]
- What Malaysian Software Students Think about Testing?Luiz Fernando Capretz, Shuib Basri, Maythem Adili, Aamir Amin. 195-196 [doi]
- Evaluating Surprise Adequacy for Question AnsweringSeah Kim, Shin Yoo. 197-202 [doi]
- OffSide: Learning to Identify Mistakes in Boundary ConditionsJón Arnar Briem, Jordi Smit, Hendrig Sellik, Pavel Rapoport, Georgios Gousios, Maurício Finavaro Aniche. 203-208 [doi]
- Deep Learning for Software Defect Prediction: A SurveySafa Omri, Carsten Sinz. 209-214 [doi]
- Does Neuron Coverage Matter for Deep Reinforcement Learning?: A Preliminary StudyMiller Trujillo, Mario Linares Vásquez, Camilo Escobar-Velásquez, Ivana Dusparic, Nicolás Cardozo. 215-220 [doi]
- Manifold-based Test Generation for Image ClassifiersTaejoon Byun, Sanjai Rayadurgam. 221 [doi]
- Simulation Games Platform for Unintentional Perpetrator Attack Vector IdentificationMartin Macak, Agata Kruzikova, Lukas Daubner, Barbora Buhnova. 222-229 [doi]
- Identifying Critical Components in Large Scale Cyber Physical SystemsAida Akbarzadeh, Sokratis Katsikas. 230-236 [doi]
- Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical SystemsHerman Wijaya, Maurício Finavaro Aniche, Aditya Mathur. 237-244 [doi]
- Specific Air Traffic Management Cybersecurity Challenges: Architecture and Supply ChainJohannes de Haan. 245-249 [doi]
- Towards an Automated Approach for Detecting Architectural Weaknesses in Critical SystemsJoanna C. S. Santos, Selma Suloglu, Joanna Ye, Mehdi Mirakhorli. 250-253 [doi]
- Security Threat Modeling: Are Data Flow Diagrams Enough?Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van den Berghe, Wouter Joosen. 254-257 [doi]
- Towards automated safety analysis for architectures of dynamically forming networks of cyber-physical systemsJennifer Brings, Marian Daun. 258-265 [doi]
- Security as Culture: A Systematic Literature Review of DevSecOpsMary Sánchez-Gordón, Ricardo Colomo Palacios. 266-269 [doi]
- What happens in a control room during a cybersecurity attack?: Preliminary observations from a pilot studyEspen Nystad, Vikash Katta, John Eidar Simensen. 270-275 [doi]
- WES: Agent-based User Interaction Simulation on Real InfrastructureJohn Ahlgren, Maria Eugenia Berezin, Kinga Bojarczuk, Elena Dulskyte, Inna Dvortsova, Johann George, Natalija Gucevska, Mark Harman, Ralf Lämmel, Erik Meijer 0001, Silvia Sapora, Justin Spahr-Summers. 276-284 [doi]
- Human Factors in the Study of Automatic Software Repair: Future Directions for Research with IndustryEmily Winter, David Bowes, Steve Counsell, Tracy Hall, Saemundur Haraldsson, Vesna Nowack, John Woodward. 285-286 [doi]
- Synthetic Benchmarks for Genetic ImprovementAymeric Blot, Justyna Petke. 287-288 [doi]
- Stack-Based Genetic ImprovementAymeric Blot, Justyna Petke. 289-290 [doi]
- Checkers: Multi-modal Darwinian API OptimisationSantanu Kumar Dash, Fan Wu, Michail Basios, Lingbo Li, Leslie Kanthan. 291-292 [doi]
- Towards Knowledge-guided Genetic ImprovementOliver Krauss, Hanspeter Mössenböck, Michael Affenzeller. 293-294 [doi]
- Extending Software Development Governance to meet IT GovernanceCarlos Juiz, Ricardo Colomo Palacios. 295-298 [doi]
- Illuminating a Blind Spot in Digitalization - Software Development in Sweden's Private and Public SectorMarkus Borg, Joakim Wernberg, Thomas Olsson 0001, Ulrik Franke, Martin Andersson. 299-302 [doi]
- Data Sovereignty Governance FrameworkKapil Singi, Swapnajeet Gon Choudhury, Vikrant Kaulgud, R. P. Jagadeesh Chandra Bose, Sanjay Podder, Adam P. Burden. 303-306 [doi]
- Society-Level Software Governance: A Challenging ScenarioJuergen Musil, Angelika Musil, Danny Weyns, Stefan Biffl. 307-308 [doi]
- Software Engineering in a Governed World: Opportunities and ChallengesR. P. Jagadeesh Chandra Bose, Kapil Singi, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. 309-310 [doi]
- Refactoring of Neural Network Models for Hyperparameter Optimization in Serverless CloudAlex Kaplunovich, Yelena Yesha. 311-314 [doi]
- Recommendation of Move Method Refactoring Using Path-Based Representation of CodeZarina Kurbatova, Ivan Veselov, Yaroslav Golubev, Timofey Bryksin. 315-322 [doi]
- Inheritance versus Delegation: which is more energy efficient?Déaglán Connolly Bree, Mel Ó Cinnéide. 323-329 [doi]
- Predictable, Flexible or Correct: Trading off Refactoring Design ChoicesAnna Maria Eilertsen. 330-333 [doi]
- Increasing the Trust In Refactoring Through VisualizationAlex Bogart, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni 0001. 334-341 [doi]
- On the Relationship Between Developer Experience and Refactoring: An Exploratory Study and Preliminary ResultsEman Abdullah AlOmar, Anthony Peruma, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni 0001. 342-349 [doi]
- An Exploratory Study on the Refactoring of Unit Test Files in Android ApplicationsAnthony Peruma, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni 0001, Fabio Palomba. 350-357 [doi]
- Modelling Knowledge about Software Processes using Provenance Graphs and its Application to Git-based Version Control SystemsAndreas Schreiber, Claas de Boer. 358-359 [doi]
- Mining Hypernyms Semantic Relations from Stack OverflowLászló Tóth 0001, Balázs Nagy, Tibor Gyimóthy, László Vidács. 360-366 [doi]
- DockerKG: A Knowledge Graph of Docker ArtifactsJiahong Zhou, Wei Chen 0018, Chang Liu, Jiaxin Zhu, Guoquan Wu, Jun Wei 0001. 367-372 [doi]
- Knowledge Extraction from Natural Language Requirements into a Semantic Relation GraphAaron Schlutter, Andreas Vogelsang. 373-379 [doi]
- Metamorphic Fuzz Testing of Autonomous VehiclesJia Cheng Han, Zhi Quan Zhou. 380-385 [doi]
- A Testing Tool for Machine Learning ApplicationsYelin Liu, Yang Liu, Tsong Yueh Chen, Zhi Quan Zhou. 386-387 [doi]
- Metamorphic Robustness Testing of Google TranslateDickson T. S. Lee, Zhi Quan Zhou, T. H. Tse. 388-395 [doi]
- ARCAMETES: A Learning Approach for Metamorphic Exploration and TestingDarryl Jarman, Riley Smith, Owen Johnston, Dave Towey, Zhi Quan Zhou. 396-403 [doi]
- M.R. Hunter: Hunting for Metamorphic Relations by Puzzle SolvingYingzhuo Yang, Chang Xu. 404-409 [doi]
- Metamorphic filtering of black-box adversarial attacks on multi-network face recognition modelsRohan Reddy Mekala, Adam Porter, Mikael Lindvall. 410-417 [doi]
- Improving The Effectiveness of Automatically Generated Test Suites Using Metamorphic TestingPrashanta Saha, Upulee Kanewala. 418-419 [doi]
- MRpredT: Using Text Mining for Metamorphic Relation PredictionKarishma Rahman, Indika Kahanda, Upulee Kanewala. 420-424 [doi]
- Automatic Improvement of Machine Translation Using Mutamorphic Relation: Invited Talk PaperJie M. Zhang. 425-426 [doi]
- Software engineering for 'quantum advantage'Luis S. Barbosa. 427-429 [doi]
- Property-based Testing of Quantum Programs in Q#Shahin Honarvar, Mohammad Reza Mousavi 0001, Rajagopal Nagarajan. 430-435 [doi]
- Insights on Training Neural Networks for QUBO TasksThomas Gabor, Sebastian Feld, Hila Safi, Thomy Phan, Claudia Linnhoff-Popien. 436-441 [doi]
- Towards a Quantum Software Modeling LanguageCarlos A. Pérez-Delgado, Héctor G. Pérez-González. 442-444 [doi]
- Quantum Annealing-Based Software Components: An Experimental Case Study with SAT SolvingTom Krüger, Wolfgang Mauerer. 445-450 [doi]
- Making Quantum Computing Open: Lessons from Open Source ProjectsRuslan Shaydulin, Caleb Thomas, Paige Rodeghero. 451-455 [doi]
- The Holy Grail of Quantum Artificial Intelligence: Major Challenges in Accelerating the Machine Learning PipelineThomas Gabor, Leo Sünkel, Fabian Ritz, Thomy Phan, Lenz Belzner, Christoph Roch, Sebastian Feld, Claudia Linnhoff-Popien. 456-461 [doi]
- Dialogue Act Classification for Virtual Agents for Software Engineers during DebuggingAndrew Wood, Zachary Eberhart, Collin McMillan. 462-469 [doi]
- On the Relevance of Cross-project Learning with Nearest Neighbours for Commit Message GenerationKhashayar Etemadi, Martin Monperrus. 470-475 [doi]
- Improving Code Recommendations by Combining Neural and Classical Machine Learning ApproachesMax Eric Henry Schumacher, Kim Tuyen Le, Artur Andrzejak 0001. 476-482 [doi]
- Oracle Issues in Machine Learning and Where to Find ThemCynthia C. S. Liem, Annibale Panichella. 483-488 [doi]
- Predicting Stack Overflow Question Tags: A Multi-Class, Multi-Label ClassificationEray Mert Kavuk, Ayse Tosun. 489-493 [doi]
- On Building an Automatic Identification of Country-Specific Feature Requests in Mobile App Reviews: Possibilities and ChallengesKamonphop Srisopha, Chukiat Phonsom, Mingzhe Li, Daniel Link, Barry W. Boehm. 494-498 [doi]
- Human-AI Partnerships for Chaos EngineeringLorenzo Barberis Canonico, Vimal Vakeel, James Dominic, Paige Rodeghero. 499-503 [doi]
- Automating Continuous Planning in SAFeDarius Foo, Jonah Dela Cruz, Subashree Sekar, Asankhaya Sharma. 504 [doi]
- Platform Teams: An Organizational Structure for Continuous DeliveryLeonardo A. F. Leite, Fabio Kon, Gustavo Pinto 0001, Paulo Meirelles. 505-511 [doi]
- Challenges and Benefits from Using Software Analytics in SofteamAlessandra Bagnato, Antonin Abhervé, Silverio Martínez-Fernández, Xavier Franch. 512 [doi]
- Fitness Guided Vulnerability Detection with Greybox FuzzingRaveendra Kumar Medicherla, Raghavan Komondoor, Abhik Roychoudhury. 513-520 [doi]
- SINVAD: Search-based Image Space Navigation for DNN Image Classifier Test Input GenerationSungmin Kang, Robert Feldt, Shin Yoo. 521-528 [doi]
- Double Cycle Hybrid Testing of Hybrid Distributed IoT SystemCyrine Zid, Dmytro Humeniuk, Foutse Khomh, Giuliano Antoniol. 529-532 [doi]
- Finding Load Inducing Test Scenarios Using Genetic Algorithms and Tree Based EncodingEge Apak, Ayse Tosun. 533-536 [doi]
- Flexible Probabilistic Modeling for Search Based Test Data GenerationRobert Feldt, Shin Yoo. 537-540 [doi]
- Generating API Test Data Using Deep Reinforcement LearningSteyn Huurman, Xiaoying Bai, Thomas Hirtz. 541-544 [doi]
- Java Unit Testing Tool Competition: Eighth RoundXavier Devroey, Sebastiano Panichella, Alessio Gambi. 545-548 [doi]
- EvoSuite at the SBST 2020 Tool CompetitionAnnibale Panichella, José Campos, Gordon Fraser. 549-552 [doi]
- Chat activity is a better predictor than chat sentiment on software developers productivityMiikka Kuutila, Mika V. Mäntylä, Maëlick Claes. 553-556 [doi]
- Do You Just Discuss or Do You Solve?: Meeting Analysis in a Software Project at Early StagesJil Klünder, Nils Prenner, Ann-Kathrin Windmann, Marek Stess, Michael Nolting, Fabian Kortum, Lisa Handke, Kurt Schneider, Simone Kauffeld. 557-562 [doi]
- Understanding Implicit User Feedback from Multisensorial and Physiological Data: A case studyFranci Suni Lopez, Nelly Condori-Fernández, Alejandro Catalá. 563-569 [doi]
- Mapping human values and scrum roles: a study on students' preferencesSelina Demi, Ricardo Colomo Palacios, Stig Henning Johansen, Mary Sánchez-Gordón. 570-576 [doi]
- Research Idea on How Language and Symbols (Semantics and Semiotics) Affect Emotions of Software EngineersMahesh Venkataraman, Kishore Durg. 577-580 [doi]
- How Do Negative Emotions Influence on the Conceptual Models Verification?: A live study proposalAngela Mayhua-Quispe, Franci Suni Lopez, Maria Fernanda Granda, Nelly Condori-Fernández. 581-585 [doi]
- Towards a Topology for Legacy System MigrationStefan Strobl, Mario Bernhart, Thomas Grechenig. 586-594 [doi]
- Applying probabilistic models to C++ code on an industrial scaleAndrey Shedko, Ilya Palachev, Andrey Kvochko, Aleksandr Semenov, Kwangwon Sun. 595-602 [doi]
- Automated Software Quality Monitoring in Research Collaboration ProjectsMichael Sildatke, Hendrik Karwanni, Bodo Kraft, Oliver Schmidts, Albert Zündorf. 603-610 [doi]
- Generating Real-World Impact from Academic Research: Experience Report from a University Impact HubClaire Ingram, Jenn Chubb, Claire Boardman, Marian Ursu. 611-618 [doi]
- Centralized Generic Interfaces in Hardware/Software Co-design for AI AcceleratorsDongju Chae, Parichay Kapoor. 619-622 [doi]
- Creation of an Wearable Startup: From a Laboratory Incubator to a Revenue Generating BusinessSagar Sen. 623-626 [doi]
- A Testbed for Hardware-assisted Online Profiling of IoT devicesShangrong Li, Junyan Ma, Yi Li. 627-630 [doi]
- On the Engineering of IoT-Intensive Digital Twin Software SystemsLuis F. Rivera, Hausi A. Müller, Norha M. Villegas, Gabriel Tamura, Miguel Jiménez 0003. 631-638 [doi]
- Platform-specific Modeling for RIOT based IoT SystemsBurak Karaduman, Moharram Challenger, Raheleh Eslampanah, Joachim Denil, Hans Vangheluwe. 639-646 [doi]
- A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality PerspectiveMarcela G. dos Santos, Bianca Minetto Napoleão, Fábio Petrillo, Darine Ameyed, Fehmi Jaafar. 647-654 [doi]
- Improving Engagement Assessment in Gameplay Testing Sessions using IoT SensorsCristiano Politowski, Fábio Petrillo, Yann-Gaël Guéhéneuc. 655-659 [doi]
- A User-friendly Approach to Write and Enforce Rules for Detecting Anomalous Network Traffic in IoT EnvironmentsDavino Mauro Junior, Kiev Gama. 660-663 [doi]
- Architecting Blockchain Systems: A Systematic Literature ReviewGregory Fournier, Fábio Petrillo. 664-670 [doi]
- Digital Twin for Cybersecurity Incident Prediction: A Multivocal Literature ReviewAbhishek Pokhrel, Vikash Katta, Ricardo Colomo Palacios. 671-678 [doi]
- A preliminary study of open-source IoT development frameworksZeineb Baba-Cheikh, Ghizlane El-Boussaidi, Julien Gascon-Samson, Hafedh Mili, Yann-Gaël Guéhéneuc. 679-686 [doi]
- Towards A Dependency-Driven Taxonomy of Software TypesAndrea Capiluppi, Nemitari Ajienka. 687-694 [doi]
- How Magic Is Zero?: An Empirical Analysis of Initial Development Releases in Three Software Package DistributionsAlexandre Decan, Tom Mens. 695-702 [doi]
- Splicing Community Patterns and Smells: A Preliminary StudyManuel De Stefano, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Andrea De Lucia. 703-710 [doi]
- A first look at an emerging model of community organizations for the long-term maintenance of ecosystems' packagesThéo Zimmermann. 711-718 [doi]
- A Framework for Software Health Management using Bayesian Statistics: Position PaperYuning He, Johann Schumann. 719-722 [doi]
- Cross-distribution Feedback in Software EcosystemsArmstrong Foundjem. 723-724 [doi]
- The Influence of Technical Variety in Software EcosystemsTom Peirs, Freark Westra, Sabine Molenaar, Slinger Jansen. 725-732 [doi]
- Automatic library categorizationCamilo Velázquez-Rodríguez, Coen De Roover. 733-734 [doi]
- Characterizing outdateness with technical lag: an exploratory studyJesús M. González-Barahona. 735-741 [doi]
- Mutant Density: A Measure of Fault-Sensitive ComplexityAli Parsai, Serge Demeyer. 742-745 [doi]
- On the Variations and Evolutions of API Usage Patterns: Case Study on Android ApplicationsKoki Ogasawara, Tetsuya Kanda 0001, Katsuro Inoue. 746-753 [doi]
- ADF-GA: Data Flow Criterion Based Test Case Generation for Ethereum Smart ContractsPengcheng Zhang, Jianan Yu, Shunhui Ji. 754-761 [doi]
- A Blockchain Oriented Software Application in the Revised Payments Service Directive contextLuisanna Cocco, Andrea Pinna, Giacomo Meloni. 762-769 [doi]
- An overview of blockchain-based systems and smart contracts for digital couponsAlessandro Sebastian Podda, Livio Pompianu. 770-778 [doi]
- Investigation of Mutual-Influence among Blockchain Development Communities and Cryptocurrency Price ChangesNicola Uras, Stefano Vacca, Giuseppe Destefanis. 779-782 [doi]