Abstract is missing.
- A Cluster-Based Hybrid Feature Selection Method for Defect PredictionFei Wang, Jun Ai, Zhuoliang Zou. 1-9 [doi]
- MVSE: Effort-Aware Heterogeneous Defect Prediction via Multiple-View Spectral EmbeddingZhou Xu, Sizhe Ye, Tao Zhang 0001, Zhen Xia, Shuai Pang, Yong Wang 0020, Yutian Tang. 10-17 [doi]
- An Empirical Study of Bug Isolation on the Effectiveness of Multiple Fault LocalizationZheng Li, Yonghao Wu, Yong Liu. 18-25 [doi]
- Evaluating Fault Localization for Resource Adaptation via Test-Based Software ModificationArpit Christi, Alex Groce, Rahul Gopinath. 26-33 [doi]
- Combinatorial Robustness Testing with Negative Test CasesKonrad Fögen, Horst Lichter. 34-45 [doi]
- A Distance-Based Dynamic Random Testing with Test Case ClusteringHanyu Pei, Beibei Yin, Kai-Yuan Cai, Min Xie. 46-53 [doi]
- Random Border Mirror Transform: A Diversity Based Approach to an Effective and Efficient Mirror Adaptive Random TestingMichael Omari, Jinfu Chen, Patrick Kwaku Kudjo, Hilary Ackah-Arthur, Rubing Huang. 54-61 [doi]
- Efficient Evolutionary Fuzzing for Android Application Installation ProcessVeysel Hatas, Sevil Sen, John A. Clark. 62-68 [doi]
- A Novel Reliability Assessment Method Based on the Effects of ComponentsYue Chen, Xuefeng Yan, Arif Ali Khan. 69-76 [doi]
- On Kolmogorov-Smirnov Test for Software Reliability Models with Grouped DataHiroyuki Okamura, Tadashi Dohi. 77-82 [doi]
- A Point Process Approach of Bug Fixing Analysis in Open Source Software ProjectsTakahiro Ushiroda, Tadashi Dohi, Yasuhiro Saito, Hiroyuki Okamura. 83-88 [doi]
- Reliability Analysis of Phased-Mission System in Irrelevancy Coverage ModelMing Yang, Dongdong Zhao, Luyao Ye, Siwei Zhou, Jianwen Xiang. 89-96 [doi]
- SMARTKT: A Search Framework to Assist Program Comprehension using Smart Knowledge TransferSrijoni Majumdar, Shakti Papdeja, Partha Pratim Das, Soumya Kanti Ghosh 0001. 97-108 [doi]
- Importance and Aptitude of Source Code Density for Commit Classification into Maintenance ActivitiesSebastian Hönel, Morgan Ericsson, Welf Löwe, Anna Wingkvist. 109-120 [doi]
- A Mechanism for Automatically Summarizing Software Functionality from Source CodeChristos Psarras, Themistoklis Diamantopoulos, Andreas L. Symeonidis. 121-130 [doi]
- Characterizing Software Maintainability in Issue Summaries using a Fuzzy ClassifierCelia Chen, Michael Shoga, Barry W. Boehm. 131-138 [doi]
- WARDER: Refining Cell Clustering for Effective Spreadsheet Defect Detection via Validity PropertiesDa Li, Huiyan Wang, Chang Xu 0001, Fengmin Shi, Xiaoxing Ma, Jian Lu 0001. 139-150 [doi]
- Detecting Vulnerabilities in Android Applications using Event SequencesZachary B. Ratliff, D. Richard Kuhn, Daniel J. Ragsdale. 159-166 [doi]
- BugIdentifier: An Approach to Identifying Bugs via Log Mining for Accelerating Bug Reporting StageWensheng Xia, Ying Li, Tong Jia, Zhonghai Wu. 167-175 [doi]
- Microservice Based Architecture: Towards High-Availability for Stateful Applications with KubernetesLeila Abdollahi Vayghan, Mohamed Aymen Saied, Maria Toeroe, Ferhat Khendek. 176-185 [doi]
- A Transfer Learning Based Interpretable User Experience Model on Small SamplesQi Yu, Xiaoping Che, Yuxiang Yang, Liqiang Wang. 186-196 [doi]
- Experimental Analysis and Comparison of Load Prediction Algorithms in Cloud Data CenterYanxin Liu, Jian Dong, Decheng Zuo, Hongwei Liu. 197-203 [doi]
- Analyzing Software Architecture Evolvability Based on Multiple Architectural Attributes MeasurementsTong Wang, Bixin Li. 204-215 [doi]
- Hybrid Predicate Transition Nets - A Formal Method for Modeling and Analyzing Cyber-Physical SystemsXudong He, Dewan Mohammad Moksedul Alam. 216-227 [doi]
- Tool-Supported Analysis of Dynamic and Stochastic Behaviors in Cyber-Physical SystemsLi Huang, Tian Liang, Eun-Young Kang 0001. 228-239 [doi]
- Repeatable Decentralized Simulations for Cyber-Physical SystemsChristophe Reymann, Mohammed Foughali, Simon Lacroix. 240-247 [doi]
- Improving the Accuracy of Vulnerability Report Classification Using Term Frequency-Inverse Gravity MomentPatrick Kwaku Kudjo, Jinfu Chen, Minmin Zhou, Solomon Mensah, Rubing Huang. 248-259 [doi]
- Reorganizing and Optimizing Post-Inspection on Suspicious Bug Reports in Path-Sensitive AnalysisXutong Ma, Jiwei Yan, Jun Yan, Jian Zhang. 260-271 [doi]
- Are All Duplicates Value-Neutral? An Empirical Analysis of Duplicate Issue ReportsMingyang Li, Lin Shi, Qing Wang 0001. 272-279 [doi]
- What are Good Discussions Within Bug Report Comments for Shortening Bug Fixing Time?Yuki Noyori, Hironori Washizaki, Yoshiaki Fukazawa, Keishi Oshima, Hideyuki Kanuka, Shuhei Nojiri, Ryosuke Tsuchiya. 280-287 [doi]
- When and Why Do Software Developers Face Uncertainty?Naoyasu Ubayashi, Yasutaka Kamei, Ryosuke Sato. 288-299 [doi]
- An Exploratory Study on Judicial Image Quality Assessment Based on Deep LearningQiqi Gu, Weilin Cai, Shengcheng Yu, Zhenyu Chen. 300-305 [doi]
- Branch Use in Practice: A Large-Scale Empirical Study of 2, 923 Projects on GitHubWeiqin Zou, Weiqiang Zhang, Xin Xia 0001, Reid Holmes, Zhenyu Chen 0001. 306-317 [doi]
- Automatic Analysis of Critical Sections for Efficient Secure Multi-ExecutionTobias F. Pfeffer, Thomas Göthel, Sabine Glesner. 318-325 [doi]
- Fault Detection in Timed FSM with Timeouts by SAT-SolvingOmer Nguena-Timo, Dimitri Prestat, Florent Avellaneda. 326-333 [doi]
- Improved Invariant Generation for Industrial Software Model Checking of Time PropertiesVassil Todorov, Safouan Taha, Frédéric Boulanger, Armando Hernandez. 334-341 [doi]
- UML-SR: A Novel Security Requirements Specification LanguageMuhammad Mohsin, Muhammad Umair Khan. 342-349 [doi]
- Method-Level Test Selection for Continuous Integration with Static Dependencies and Dynamic Execution RulesYingling Li, Junjie Wang 0001, Yun Yang, Qing Wang 0001. 350-361 [doi]
- Learning and Adaptive Testing of Nondeterministic State MachinesAlexandre Petrenko, Florent Avellaneda. 362-373 [doi]
- A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert SystemCharitha Hettiarachchi, Hyunsook Do. 374-385 [doi]
- Efficient Generation of Test Data with Extended Cardinality ConstraintsMichaël Larouche, Sylvain Hallé. 386-393 [doi]
- On the Investigation of Essential Diversities for Deep Learning Testing CriteriaZhiyi Zhang, Xiaoyuan Xie. 394-405 [doi]
- Testing Scientific Software with Invariant Relations: A Case StudyJunhua Ding, Xinchuan Li, Xin-Hua Hu. 406-417 [doi]
- Genetic Algorithm-Based Test Parameter Optimization for ADAS System TestingFlorian Klück, Martin Zimmermann, Franz Wotawa, Mihai Nica. 418-425 [doi]
- TFCheck : A TensorFlow Library for Detecting Training Issues in Neural Network ProgramsHoussem Ben Braiek, Foutse Khomh. 426-433 [doi]
- Technical Debt Prioritization: A Search-Based ApproachReem Alfayez, Barry W. Boehm. 434-445 [doi]
- Quality of Reusable Game Software: Empowering Developers with Automated Quality ChecksWim van der Vegt, Wim Westera. 446-452 [doi]