Abstract is missing.
- Reducing Flakiness in End-to-End Test Suites: An Experience ReportDario Olianas, Maurizio Leotta, Filippo Ricca, Luca Villa. 3-17 [doi]
- Mutation Subsumption as Relative IncorrectnessBesma Khaireddine, Amani Ayad, Imen Marsit, Ali Mili. 18-28 [doi]
- What We Talk About When We Talk About Software Test FlakinessMorena Barboni, Antonia Bertolino, Guglielmo De Angelis. 29-39 [doi]
- Looking for the Needle in the Haystack: End-to-end Tests in Open Source ProjectsFrancisco Gortázar, Michel Maes-Bermejo, Micael Gallego, Jorge Contreras Padilla. 40-48 [doi]
- Evaluating Sensor Interaction Failures in Mobile ApplicationsEuler Horta Marinho, João P. Diniz, Fischer Ferreira, Eduardo Figueiredo 0001. 49-63 [doi]
- Feature-Oriented Clone and Pull for Distributed Development and EvolutionDaniel Hinterreiter, Lukas Linsbauer, Herbert Prähofer, Paul Grünbacher. 67-81 [doi]
- Detecting Sudden Variations in Web Apps Code Smells' Density: A Longitudinal StudyAmérico Rio, Fernando Brito e Abreu. 82-96 [doi]
- Risk and Complexity Assessment on the Context of Language MigrationSantiago Bragagnolo, Abderrahmane Seriai, Stéphane Ducasse, Mustapha Derras. 97-110 [doi]
- Automatically Assessing Complexity of Contributions to Git RepositoriesRolf-Helge Pfeiffer. 111-124 [doi]
- Scrum for Safety: Agile Development in Safety-Critical Software SystemsRiccardo Carbone, Salvatore Barone, Mario Barbareschi, Valentina Casola. 127-140 [doi]
- Empirical Evaluation of Agile TeamworkPaolo Ciancarini, Marcello Missiroli, Sofia Zani. 141-155 [doi]
- STAMP 4 NLP - An Agile Framework for Rapid Quality-Driven NLP Applications DevelopmentPhilipp Kohl, Oliver Schmidts, Lars Klöser, Henri Werth, Bodo Kraft, Albert Zündorf. 156-166 [doi]
- Evaluating Predictive Business Process Monitoring Approaches on Small Event LogsMartin Käppel, Stefan Jablonski, Stefan Schönig. 167-182 [doi]
- Analyzing a Process Core Ontology and Its Usefulness for Different DomainsPablo Becker, Fernanda Papa, Guido Tebes, Luis Olsina. 183-196 [doi]
- Towards Understanding Quality-Related Characteristics in Knowledge-Intensive Processes - A Systematic Literature ReviewRachel Vital Simões, Glaucia Melo dos Santos, Fernando Brito e Abreu, Toacy Cavalcante de Oliveira. 197-207 [doi]
- KDM to UML Model Transformation for Quantum Software ModernizationLuis Jiménez-Navajas, Ricardo Pérez-Castillo, Mario Piattini. 211-224 [doi]
- Hybrid Classical-Quantum Software Services Systems: Exploration of the Rough EdgesDavid Valencia, José García-Alonso, Javier Rojo 0004, Enrique Moguel, Javier Berrocal, Juan Manuel Murillo. 225-238 [doi]
- Towards a Set of Metrics for Quantum Circuits UnderstandabilityJosé A. Cruz-Lemus, Luis A. Marcelo, Mario Piattini. 239-249 [doi]
- A Critique on the Use of Machine Learning on Public Datasets for Intrusion DetectionMarta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano. 253-266 [doi]
- A Comparison of Different Source Code Representation Methods for Vulnerability Prediction in PythonAmirreza Bagheri, Péter Hegedüs. 267-281 [doi]
- Threat Modeling of Edge-Based IoT ApplicationsMassimo Ficco, Daniele Granata, Massimiliano Rak, Giovanni Salzillo. 282-296 [doi]
- Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case StudyMario Barbareschi, Salvatore Barone, Alfonso Fezza, Erasmo La Montagna. 297-310 [doi]
- GRADUATION: A GDPR-Based Mutation MethodologySaid Daoudagh, Eda Marchetti. 311-324 [doi]
- A Proposal for the Classification of Methods for Verification and Validation of Safety, Cybersecurity, and Privacy of Automated SystemsJose Luis de la Vara, Thomas Bauer, Bernhard Fischer, Mustafa Karaca, Henrique Madeira, Martin Matschnig, Silvia Mazzini, Giann Spilere Nandi, Fabio Patrone, David Pereira, José Proença, Rupert Schlick, Stefano Tonetta, Ugur Yayan, Behrooz Sangchoolie. 325-340 [doi]
- Risk Identification Based on Architectural PatternsMaritta Heisel, Aida Omerovic. 341-355 [doi]
- Expressing Structural Temporal Properties of Safety Critical Hierarchical SystemsMassimo Benerecetti, Fabio Mogavero, Adriano Peron, Luigi Libero Lucio Starace. 356-369 [doi]
- Facing Many Objectives for Fairness in Machine LearningDavid Villar, Jorge Casillas. 373-386 [doi]
- A Streaming Approach for Association Rule Analysis of Spanish Politics on TwitterPedro J. López, Elena Ruiz, Jorge Casillas. 387-400 [doi]
- On the Trade-off Between Robustness and Complexity in Data PipelinesAiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson. 401-415 [doi]
- Big Data Quality Models: A Systematic Mapping StudyOsbel Montero, Yania Crespo, Mario Piattini. 416-430 [doi]
- Business Process and Organizational Data Quality Model (BPODQM) for Integrated Process and Data MiningFrancisco Betancor, Federico Pérez, Adriana Marotta, Andrea Delgado. 431-445 [doi]
- A Checklist for Explainable AI in the Insurance DomainOlivier Koster, Ruud Kosman, Joost Visser 0001. 446-456 [doi]
- Where the Bugs are: A Quasi-replication Study of the Effect of Inheritance Depth and Width in Java SystemsSteve Counsell, Stephen Swift, Amjed Tahir. 459-472 [doi]
- 30 Years of Automated GUI Testing: A Bibliometric AnalysisOlivia Rodriguez Valdés, Tanja E. J. Vos, Pekka Aho, Beatriz Marín. 473-488 [doi]
- A Large-Scale Investigation of Local Variable Names in Java Programs: Is Longer Name Better for Broader Scope Variable?Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 489-500 [doi]
- KNN-Averaging for Noisy Multi-objective OptimisationStefan Klikovits, Paolo Arcaini. 503-518 [doi]
- Exercise Perceptions: Experience Report from a Secure Software Development CourseAkond Rahman, Shahriar Hossain, Dibyendu Brinto Bose. 521-535 [doi]
- A Software Quality Course: The Breadth ApproachLuigia Petre. 536-552 [doi]
- Students Projects' Source Code Changes Impact on Software Quality Through Static AnalysisSivana Hamer, Christian Quesada-López, Marcelo Jenkins. 553-564 [doi]