Abstract is missing.
- PBLInv: Postcondition-based Loop Invariant Learning for C ProgramsHong Lu, Chengyi Wang, Jiacheng Gui, Hao Huang. 1-12 [doi]
- Data Evaluation and Enhancement for Quality Improvement of Machine LearningHaihua Chen, Jiangping Chen, Junhua Ding. 13 [doi]
- A Semantic Definition of Faults and Its ImplicationsBesma Khaireddine, Aleksandr Zakharchenko, Ali Mili. 14-21 [doi]
- Quality Assurance for Machine Learning - an approach to function and system safeguardingAlexander Poth, Burkhard Meyer, Peter Schlicht, Andreas Riel. 22-29 [doi]
- Incorporating Android Code Smells into Java Static Code Metrics for Security Risk Prediction of Android ApplicationsAi Gong, Yi Zhong, Weiqin Zou, Yangyang Shi, Chunrong Fang. 30-40 [doi]
- PHM Technology for Memory Anomalies in Cloud Computing for IaaSXiwei Qiu, Yuanshun Dai, Peng Sun, Xin Jin. 41-51 [doi]
- Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation TestbedMax Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber. 52 [doi]
- Revisiting the Impact of Concept Drift on Just-in-Time Quality AssuranceKwabena Ebo Bennin, Nauman Bin Ali, Jürgen Börstler, Xiao Yu. 53-59 [doi]
- An improved mapping method for automated consistency check between software architecture and source codeFangwei Chen, Li Zhang 0029, Xiaoli Lian. 60-71 [doi]
- A log-based anomaly detection method with the NW ensemble rulesBingming Wang, Shi Ying, Guoli Cheng, Yiyao Li. 72-82 [doi]
- HARRD: Real-time Software Rejuvenation Decision Based on Hierarchical Analysis under Weibull DistributionSihang Wang, Jing Liu. 83-90 [doi]
- On the Link Between Refactoring Activity and Class Cohesion Through the Prism of Two Cohesion-Based MetricsSteve Counsell, Giuseppe Destefanis, Steve Swift, Mahir Arzoky, Davide Taibi 0001. 91-98 [doi]
- Comprehensive Robustness Evaluation of File Systems with Model CheckingJingcheng Yuan, Toshiaki Aoki, Xiaoyun Guo. 99-110 [doi]
- Continuous Implicit Authentication through Touch Traces ModellingThomas Karanikiotis, Michail D. Papamichail, Kyriakos C. Chatzidimitriou, Napoleon-Christos I. Oikonomou, Andreas L. Symeonidis, Sashi K. Saripalle. 111-120 [doi]
- RTPDroid: Detecting Implicitly Malicious Behaviors Under Runtime Permission ModelJie Zhang, Cong Tian, Zhenhua Duan, Liang Zhao. 121 [doi]
- An intrusion detection system integrating network-level intrusion detection and host-level intrusion detectionJiannan Liu, Kun Xiao, Lei Luo, Yun Li, Lirong Chen. 122-129 [doi]
- Multi-objective Search for Model-based TestingRui Wang 0048, Cyrille Artho, Lars Michael Kristensen, Volker Stolz. 130-141 [doi]
- Architecture for the Automation of Live Testing of Cloud SystemsOussama Jebbar, Ferhat Khendek, Maria Toeroe. 142-151 [doi]
- Quality-of-Experience driven configuration of WebRTC services through automated testingAntonia Bertolino, Antonello Calabrò, Guglielmo De Angelis, Francisco Gortázar, Francesca Lonetti, Michel Maes-Bermejo, Guiomar Tuñón de Hita. 152-159 [doi]
- An Approach to Determine the Optimal k-Value of K-means Clustering in Adaptive Random TestingJinfu Chen, Lingling Zhao, Minmin Zhou, Yisong Liu, Songling Qin. 160-167 [doi]
- A Lightweight Fault Localization Approach based on XGBoostBo Yang, Yuze He, Huai Liu, Yixin Chen, Zhi Jin. 168-179 [doi]
- A Similarity Integration Method based Information Retrieval and Word Embedding in Bug LocalizationShasha Cheng, Xuefeng Yan, Arif Ali Khan. 180-187 [doi]
- Practical Automatic Lightweight Nondeterminism and Flaky Test Detection and Debugging for PythonAlex Groce, Josie Holmes. 188-195 [doi]
- Non-intrusive Virtual Machine Analysis and Reverse Debugging with SWATPavel Dovgalyuk, Ivan Vasiliev, Natalia Fursova, Denis Dmitriev, Mikhail Abakumov, Vladimir Makarov. 196-203 [doi]
- A Multi-Objective Learning Method for Building Sparse Defect Prediction ModelsXin Li, Xiaoxing Yang, Jianmin Su, Wushao Wen. 204-211 [doi]
- How Well Just-In-Time Defect Prediction Techniques Enhance Software Reliability?Yuli Tian, Ning Li, Jeff Tian, Wei Zheng. 212-221 [doi]
- Simplified Deep Forest Model based Just-In-Time Defect Prediction for Android Mobile AppsKunsong Zhao, Zhou Xu, Tao Zhang, Yutian Tang. 222 [doi]
- Cross-Project Dynamic Defect Prediction Model for Crowdsourced testYi Yao, Yuchan Liu, Song Huang, Hao Chen, Jialuo Liu, Fan Yang. 223-230 [doi]
- Pull Request Prioritization Algorithm based on Acceptance and Response ProbabilityMuhammad Ilyas Azeem, Qiang Peng, Qing Wang 0001. 231-242 [doi]
- Towards Analyzing Contributions from Software Repositories to Optimize Issue AssignmentVasileios Matsoukas, Themistoklis Diamantopoulos, Michail D. Papamichail, Andreas L. Symeonidis. 243-253 [doi]
- Development Method of Three Kinds of Typical Tree Structure Algorithms and Isabelle-based Machine Assisted VerificationChangjing Wang, Fan Xu, Haimei Luo, Qing Huang, Zhengkang Zuo. 254-264 [doi]
- On Symbolic Execution of Decompiled ProgramsLukás Korencik, Petr Rockai, Henrich Lauko, Jiri Barnat. 265-272 [doi]
- STAN: Towards Describing Bytecodes of Smart ContractXiaoqi Li 0001, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, Zhou Xu 0003. 273-284 [doi]
- Attack Graph Auto-Generation for Blockchains based on Bigraphical Reaction SystemsLian Yu, Lijun Liu, Yanbing Jiang, Qi Jing, Bei Zhao, Chen Zhang. 285-296 [doi]
- Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest SimilarityWeisong Sun, Guangyao Xu, Zijiang Yang, Zhenyu Chen 0001. 297-309 [doi]
- STSL: A Novel Spatio-Temporal Specification Language for Cyber-Physical SystemsTengfei Li, Jing Liu, Jiexiang Kang, Haiying Sun, Wei Yin, Xiaohong Chen, Hui Wang. 309-319 [doi]
- Reliability Evaluation of FPGA with Common Cause Failure in Multi-Phase MissionQi Shao, Shunkun Yang, Chong Bian, Xiaodong Gou. 320 [doi]
- Correct and Control Complex IoT Systems: Evaluation of a Classification for System AnomaliesSina Niedermaier, Stefan Heisse, Stefan Wagner 0001. 321-328 [doi]
- Process-variation Effects on 3D TLC Flash Reliability: Characterization and Mitigation SchemeYuQian Pan, Haichun Zhang, Mingyang Gong, Zhenglin Liu. 329-334 [doi]
- A Hybrid Interface Recovery Method for Android Kernels FuzzingShuaibing Lu, Xiaohui Kuang, Yuanping Nie, Zhechao Lin. 335-346 [doi]
- High-Reliability Compilation Optimization Sequence Generation Framework Based ANNJiang Wu, Jianjun Xu, Xiankai Meng, Zhuo Zhang, Nan Zhang, Haoyu Zhang. 347-355 [doi]
- Mutation Testing for Artificial Neural Networks: An Empirical EvaluationLorenz Klampfl, Nour Chetouane, Franz Wotawa. 356-365 [doi]
- Defect Prediction via LSTM Based on Sequence and Tree StructureXuan Zhou, Lu Lu. 366-373 [doi]
- On the Defect Prediction for Large Scale Software Systems - From Defect Density to Machine LearningSatya Pradhan, Venky Nanniyur, Pavan K. Vissapragada. 374-381 [doi]
- Semantic Code Clone Detection Via Event Embedding Tree and GAT NetworkBingzhuo Li, Chunyang Ye, Shouyang Guan, Hui Zhou. 382-393 [doi]
- Convergence based Evaluation Strategies for Learning Agent of Hyper-heuristic Framework for Test Case PrioritizationJinjin Han, Zheng Li, Junxia Guo, Ruilian Zhao. 394-405 [doi]
- PEACEPACT: Prioritizing Examples to Accelerate Perturbation-Based Adversary Generation for DNN Classification TestingZijie Li, Long Zhang, Jun Yan, Jian Zhang, Zhenyu Zhang 0004, T. H. Tse. 406-413 [doi]
- Research on ensemble model of anomaly detection based on autoencoderYaning Han, Yunyun Ma, Jinbo Wang, Jianmin Wang 0015. 414-417 [doi]
- The Characteristics and Impact of Uncompilable Code Changes on Software Quality EvolutionJincheng He, Sitao Min, Kelechi Ogudu, Michael Shoga, Alex Polak, Iordanis Fostiropoulos, Barry W. Boehm, Pooyan Behnamghader. 418-429 [doi]
- A Survey of the Use of Test Report in Crowdsourced TestingSong Huang, Hao Chen, Zhanwei Hui, Yuchan Liu. 430-441 [doi]
- An Empirical Study of Utilization of Imperative Modules in AnsibleShoma Kokuryo, Masanari Kondo, Osamu Mizuno. 442-449 [doi]
- Preliminary Findings about DevSecOps from Grey LiteratureRunfeng Mao, He Zhang, Qiming Dai, Huang Huang, Guoping Rong, Haifeng Shen, Lianping Chen, Kaixiang Lu. 450-457 [doi]
- Which Metrics Should Researchers Use to Collect Repositories: An Empirical StudyKai Yamamoto, Masanari Kondo, Kinari Nishiura, Osamu Mizuno. 458-466 [doi]
- How Fast and Effectively Can Code Change History Enrich Stack Overflow?Ryujiro Nishinaka, Naoyasu Ubayashi, Yasutaka Kamei, Ryosuke Sato. 467-478 [doi]
- An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?Huidan Li, Rensong Xie, Xianglong Kong, Lulu Wang 0001, Bixin Li. 479-488 [doi]
- Interpretable Test Case Recommendation based on Knowledge GraphWenjun Ke, Chao Wu, Xiufeng Fu, Chen Gao, Yinyi Song. 489-496 [doi]
- Is There A "Golden" Rule for Code Reviewer Recommendation? : - An Experimental EvaluationYuanzhe Hu, Junjie Wang 0001, Jie Hou, Shoubin Li, Qing Wang 0001. 497-508 [doi]
- On the Impact of Inter-language Dependencies in Multi-language SystemsManel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, Bram Adams. 509 [doi]
- A Practical, Principled Measure of Fuzzer Appeal: A Preliminary StudyMiroslav Gavrilov, Kyle Dewey, Alex Groce, Davina Zamanzadeh, Ben Hardekopf. 510-517 [doi]
- Dissecting Mobile Offerwall Advertisements: An Explorative StudyXu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang. 518-526 [doi]