Abstract is missing.
- PR-SZZ: How pull requests can support the tracing of defects in software repositoriesPeter Bludau, Alexander Pretschner. 1-12 [doi]
- Source Code Summarization with Structural Relative Position Guided TransformerZi Gong, Cuiyun Gao, Yasheng Wang, Wenchao Gu, Yun Peng, Zenglin Xu. 13-24 [doi]
- Do Developers Refactor Data Access Code? An Empirical StudyBiruk Asmare Muse, Foutse Khomh, Giuliano Antoniol. 25-35 [doi]
- Towards a Robust Approach to Analyze Time-Dependent Data in Software EngineeringNyyti Saarimäki, Sergio Moreschini, Francesco Lomio, Rafael Peñaloza, Valentina Lenarduzzi. 36-40 [doi]
- First-class artifacts as building blocks for live in-IDE documentationNitish Patkar, Andrei Chis, Nataliia Stulova, Oscar Nierstrasz. 41-45 [doi]
- On the Benefits of the Accelerate Metrics: An Industrial Survey at VendastaFrancesco Lomio, Zadia Codabux, Dale Birtch, Dale Hopkins, Davide Taibi 0001. 46-50 [doi]
- HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing CommitsGiang Nguyen-Truong, Hong Jin Kang, David Lo 0001, Abhishek Sharma 0002, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang. 51-62 [doi]
- Lessons from Research to Practice on Writing Better Quality Puppet ScriptsAkond Rahman, Tushar Sharma. 63-67 [doi]
- Program Transformations for Precise Analysis of Enterprise Information SystemsShrishti Pradhan, Raveendra Kumar Medicherla, Shivani Kondewar, Ravindra Naik. 68-72 [doi]
- Efficient Search of Live-Coding Screencasts from Online VideosChengran Yang, Ferdian Thung, David Lo 0001. 73-77 [doi]
- Lifelong Dynamic Optimization for Self-Adaptive Systems: Fact or Fiction?Tao Chen. 78-89 [doi]
- An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS ProjectsSara Forootani, Andrea Di Sorbo, Corrado Aaron Visaggio. 90-100 [doi]
- A Study on Screen Logging Risks of Secure Keyboards of Android Financial AppsXinyue Liang, Jun Ma. 101-111 [doi]
- DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High AccuracyLigeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao. 112-122 [doi]
- Evolution of GitHub Action WorkflowsPablo Valenzuela-Toledo, Alexandre Bergel. 123-127 [doi]
- On the Influence of Biases in Bug Localization: Evaluation and BenchmarkRatnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo 0001. 128-139 [doi]
- Generating Clarifying Questions for Query Refinement in Source Code SearchZachary Eberhart, Collin McMillan. 140-151 [doi]
- Adapting Software Architectures to Machine Learning ChallengesAlex Serban, Joost Visser 0001. 152-163 [doi]
- Cost-effective Simulation-based Test Selection in Self-driving Cars Software with SDC-ScissorChristian Birchler, Nicolas Ganz, Sajad Khatiri, Alessio Gambi, Sebastiano Panichella. 164-168 [doi]
- Exploring API Deprecation Evolution in JavaScriptRomulo Nascimento, André C. Hora, Eduardo Figueiredo 0001. 169-173 [doi]
- Hits and Misses: Newcomers' ability to identify Skills needed for OSS tasksÍtalo Santos, Igor Wiese, Igor Steinmacher, Anita Sarma, Marco Aurélio Gerosa. 174-183 [doi]
- DAPSTEP: Deep Assignee Prediction for Stack Trace Error rePresentationDenis Sushentsev, Aleksandr Khvorov, Roman Vasiliev, Yaroslav Golubev, Timofey Bryksin. 184-195 [doi]
- Machine Learning Regression Techniques for Test Case Prioritization in Continuous Integration EnvironmentEnrique A. da Roza, Jackson A. Prado Lima, Rogério C. Silva, Silvia Regina Vergilio. 196-206 [doi]
- Uncovering Library Features from API Usage on Stack OverflowCamilo Velázquez-Rodríguez, Eleni Constantinou, Coen De Roover. 207-217 [doi]
- Identifying Software Engineering Challenges in Software SMEs: A Case Study in ThailandChaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta, Federica Sarro. 218-222 [doi]
- Extracting Vulnerabilities from GitHub CommitsNicholas Chan, John A. Chandy. 235-239 [doi]
- Evaluating the Use of Semantics for Identifying Task-relevant Textual InformationArthur Marques, Gail C. Murphy. 240-251 [doi]
- Kuber: Cost-Efficient Microservice Deployment PlannerHarshavardhan Kadiyala, Alberto Misail, Julia Rubin. 252-262 [doi]
- PANDORA: Continuous Mining Software Repository and Dataset GenerationHung Nguyen, Francesco Lomio, Fabiano Pecorelli, Valentina Lenarduzzi. 263-267 [doi]
- FuzzingDriver: the Missing Dictionary to Increase Code Coverage in FuzzersArash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari. 268-272 [doi]
- Gender Diversity and Community Smells: A Double-Replication Study on Brazilian Software TeamsCamila Sarmento, Tiago Massoni, Alexander Serebrenik, Gemma Catolino, Damian A. Tamburri, Fabio Palomba. 273-283 [doi]
- Automating Test Oracle Generation in DevOps for Industrial ElevatorsAitor Arrieta, Maialen Otaegi, Liping Han, Goiuria Sagardui, Shaukat Ali 0001, Maite Arratibel. 284-288 [doi]
- BCL-FL: A Data Augmentation Approach with Between-Class Learning for Fault LocalizationYan Lei, Chunyan Liu, Huan Xie, Sheng Huang 0001, Meng Yan, Zhou Xu 0003. 289-300 [doi]
- What really is software design?Giovanni Viviani, Gail C. Murphy. 301-308 [doi]
- A Lightweight Approach of Human-Like Playtest for Android AppsYan Zhao, Enyi Tang, Haipeng Cai, Xi Guo, Xiaoyin Wang, Na Meng 0001. 309-320 [doi]
- An Empirical Investigation into the Reproduction of Bug Reports for Android AppsJack Johnson, Junayed Mahmud, Tyler Wendland, Kevin Moran, Julia Rubin, Mattia Fazzini. 321-322 [doi]
- ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of ProjectsMohammed A. Shehab, Abdelwahab Hamou-Lhadj, Luay Alawneh. 333-337 [doi]
- An Investigation into Inconsistency of Software Vulnerability Severity across Data SourcesRoland Croft, Muhammad Ali Babar, Li Li. 338-348 [doi]
- LoGenText: Automatically Generating Logging Texts Using Neural Machine TranslationZishuo Ding, Heng Li 0007, Weiyi Shang. 349-360 [doi]
- DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual LearningGuang Yang 0019, Xiang Chen 0005, Yanlin Zhou, Chi Yu. 361-372 [doi]
- Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural NetworksRongfan Li, Bihuan Chen 0001, Fengyi Zhang, Chao Sun, Xin Peng 0001. 373-384 [doi]
- Aspect-Based API Review Classification: How Far Can Pre-Trained Transformer Model Go?Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin 0001, DongGyun Han, Zhou Yang 0003, David Lo 0001. 385-395 [doi]
- Fine-grained Co-Attentive Representation Learning for Semantic Code SearchZhongyang Deng, Ling Xu, Chao Liu 0014, Meng Yan, Zhou Xu 0003, Yan Lei. 396-407 [doi]
- Revisiting Neuron Coverage Metrics and Quality of Deep Neural NetworksZhou Yang 0003, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo 0001. 408-419 [doi]
- KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator ConfigurationMubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar. 420-431 [doi]
- On the Way to Microservices: Exploring Problems and Solutions from Online Q&A CommunityMenghan Wu, Yang Zhang, Jiakun Liu, Shangwen Wang, Zhang Zhang, Xin Xia, XinJun Mao. 432-443 [doi]
- A Preliminary Analysis of GPL-Related License Violations in Docker ImagesYunosuke Higashi, Katsunori Fukui, Yutaro Kashiwa, Masao Ohira. 444-448 [doi]
- Recommending Base Image for Docker Containers based on Deep Configuration ComprehensionYinyuan Zhang, Yang Zhang, XinJun Mao, Yiwen Wu, Bo Lin, Shangwen Wang. 449-453 [doi]
- A Preliminary Study on Accessibility of Augmented Reality Features in Mobile AppsSergio Naranjo-Puentes, Camilo Escobar-Velásquez, Christopher Vendome, Mario Linares Vásquez. 454-458 [doi]
- Bunk8s: Enabling Easy Integration Testing of Microservices in KubernetesChristoph Reile, Mohak Chadha, Valentin Hauner, Anshul Jindal, Benjamin Hofmann, Michael Gerndt. 459-463 [doi]
- desync-cc: An Automatic Disassembly-Desynchronization ObfuscatorUlf Kargén, Ivar Härnqvist, Johannes Wilson, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri. 464-468 [doi]
- Crème de la crème. Investigating Metadata and Survivability of Top Android AppsAnamaria Mojica-Hanke, Laura Bello-Jiménez, Camilo Escobar-Velásquez, Mario Linares Vásquez. 469-480 [doi]
- Isolating Compiler Optimization Faults via Differentiating Finer-grained OptionsJing Yang, Yibiao Yang, Maolin Sun, Ming Wen 0001, Yuming Zhou, Hai Jin 0001. 481-491 [doi]
- ReSplit: Improving the Structure of Jupyter Notebooks by Re-Splitting Their CellsSergey Titov, Yaroslav Golubev, Timofey Bryksin. 492-496 [doi]
- JISDLab: A web-based interactive literate debugging environmentSakutaro Sugiyama, Takashi Kobayashi, Kazumasa Shimari, Takashi Ishio. 497-501 [doi]
- Phrase2Set: Phrase-to-Set Machine Translation and Its Software Engineering ApplicationsThanh V. Nguyen, Aashish Yadavally, Tien N. Nguyen. 502-513 [doi]
- An Empirical Investigation into the Use of Image Captioning for Automated Software DocumentationKevin Moran, Ali Yachnes, George Purnell, Junayed Mahmud, Michele Tufano, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Zach H'Doubler. 514-525 [doi]
- Semantic Robustness of Models of Source CodeJordan Henkel, Goutham Ramakrishnan, Zi Wang, Aws Albarghouthi, Somesh Jha, Thomas W. Reps. 526-537 [doi]
- How and Why Developers Migrate Python TestsLívia Barbosa, André C. Hora. 538-548 [doi]
- Towards the Isolation of Failure-Inducing Inputs in Cyber-Physical Systems: is Delta Debugging Enough?Pablo Valle, Aitor Arrieta. 549-553 [doi]
- Learning Program Semantics with Code Representations: An Empirical StudyJing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu 0003. 554-565 [doi]
- ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in CodeNing Ge, Ze Wang, Li Zhang, Jiuang Zhao, Yufei Zhou, Zewei Liu. 566-576 [doi]
- SOTitle: A Transformer-based Post Title Generation Approach for Stack OverflowKe Liu, Guang Yang 0019, Xiang Chen 0005, Chi Yu. 577-588 [doi]
- VCMatch: A Ranking-based Approach for Automatic Security Patches Localization for OSS VulnerabilitiesShichao Wang, Yun Zhang 0011, Liagfeng Bao, Xin Xia 0001, Minghui Wu. 589-600 [doi]
- Cross-Language Binary-Source Code Matching with Intermediate RepresentationsYi Gui, Yao Wan, Hongyu Zhang 0002, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin 0001. 601-612 [doi]
- CoolTeD: A Web-based Collaborative Labeling Tool for the Textual DatasetChong Wang 0004, Jingwen Jiang, Maya Daneva, Marten van Sinderen. 613-617 [doi]
- Gelato: Feedback-driven and Guided Security Analysis of Client-side Web ApplicationsBehnaz Hassanshahi, HyunJun Lee, Paddy Krishnan. 618-629 [doi]
- Recommending Code Reviewers for Proprietary Software Projects: A Large Scale StudyDezhen Kong, Qiuyuan Chen, Lingfeng Bao, Chenxing Sun, Xin Xia 0001, Shanping Li. 630-640 [doi]
- RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol ImplementationsJingting Chen, Feng Li, Mingjie Xu, Jianhua Zhou, Wei Huo. 641-651 [doi]
- HyDRa: A Framework for Modeling, Manipulating and Evolving Hybrid PolystoresMaxime Gobert 0001, Loup Meurice, Anthony Cleve. 652-656 [doi]
- Identifying Relevant Changes for Incremental Verification of Evolving Software SystemsBharti Chimdyalwar, Anushri Jana, Shrawan Kumar, Ankita Khadsare, Vaidehi Ghime. 657-661 [doi]
- On the rise and fall of CI services in GitHubMehdi Golzadeh, Alexandre Decan, Tom Mens. 662-672 [doi]
- FUM - A Framework for API Usage constraint and Misuse ClassificationMichael Schlichtig, Steffen Sassalla, Krishna Narasimhan, Eric Bodden. 673-684 [doi]
- DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse DetectionYi Liu, Yadong Yan, Chaofeng Sha, Xin Peng 0001, Bihuan Chen 0001, Chong Wang. 685-696 [doi]
- Detecting Connectivity Issues in Android AppsAlejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares Vásquez, Gabriele Bavota. 697-708 [doi]
- A Replication Study on Predicting Metamorphic Relations at Unit Testing LevelAlejandra Duque-Torres, Dietmar Pfahl, Rudolf Ramler, Claus Klammer. 709-719 [doi]
- State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol FuzzingDongge Liu, Van-Thuan Pham, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein. 720-730 [doi]
- Toward Understanding the Impact of Refactoring on Program ComprehensionGiulia Sellitto, Emanuele Iannone, Zadia Codabux, Valentina Lenarduzzi, Andrea De Lucia, Fabio Palomba, Filomena Ferrucci. 731-742 [doi]
- Common Programming Mistakes Leading to Information Disclosure: A Preliminary StudyGowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, Kazi Zakia Sultana, Zadia Codabux. 743-747 [doi]
- Towards a Fine-grained Analysis of Cognitive Load During Program ComprehensionThierry Sorg, Amine Abbad Andaloussi, Barbara Weber. 748-752 [doi]
- On the Influential Interactive Factors on Degrees of Design Decay: A Multi-Project StudyDaniel Coutinho, Anderson G. Uchôa, Caio Barbosa, Vinícius Soares, Alessandro F. Garcia 0001, Marcelo Schots, Juliana Alves Pereira, Wesley K. G. Assunção. 753-764 [doi]
- Automatic Detection and Analysis of Technical Debts in Peer-Review Documentation of R PackagesJunaed Younus Khan, Gias Uddin 0001. 765-776 [doi]
- Rebot: An Automatic Multi-modal Requirements Review BotMing Ye, Jicheng Cao, Shengyu Cheng. 777-781 [doi]
- Can We Automatically Fix Bugs by Learning Edit Operations?Aidan Connor, Aaron Harris, Nathan Cooper, Denys Poshyvanyk. 782-792 [doi]
- How Do Injected Bugs Affect Deep Learning?Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Zexuan Li. 793-804 [doi]
- Static Analysis Warnings and Automatic Fixing: A Replication for C# ProjectsMartin Odermatt, Diego Marcilio, Carlo A. Furia. 805-816 [doi]
- Endowing third-party libraries recommender systems with explicit user feedback mechanismsRiccardo Rubei, Claudio Di Sipio, Juri Di Rocco, Davide Di Ruscio, Phuong T. Nguyen. 817-821 [doi]
- Towards Attribute Grammar Mining by Symbolic ExecutionMichael Moser, Josef Pichler, Andreas Pointner. 822-826 [doi]
- Investigating the Effectiveness of Clustering for Story Point EstimationVali Tawosi, Afnan A. Al-Subaihin, Federica Sarro. 827-838 [doi]
- Kraken 2.0: A platform-agnostic and cross-device interaction testing toolWilliam Ravelo-Méndez, Camilo Escobar-Velásquez, Mario Linares Vásquez. 839-843 [doi]
- An Empirical Study on the Impact of Deep Parameters on Mobile App Energy UsageQiang Xu, James C. Davis, Y. Charlie Hu, Abhilash Jindal. 844-855 [doi]
- ExcePy: A Python Benchmark for Bugs with Python Built-in TypesXin Zhang, Rongjie Yan, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang 0001. 856-866 [doi]
- Variant Forks - Motivations and ImpedimentsJohn Businge, Ahmed Zerouali, Alexandre Decan, Tom Mens, Serge Demeyer, Coen De Roover. 867-877 [doi]
- Flexible semi-automatic support for type migration of primitives for C/C++ programsRichárd Szalay, Zoltán Porkoláb. 878-889 [doi]
- On the Importance of Performing App Analysis Within Peer GroupsSafwat Hassan, Heng Li 0007, Ahmed E. Hassan. 890-901 [doi]
- Removing Decorator to Improve Energy EfficiencyDéaglán Connolly Bree, Mel Ó Cinnéide. 902-912 [doi]
- Mining Software Information Sites to Recommend Cross-Language Analogical LibrariesKawser Wazed Nafi, Muhammad Asaduzzaman, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 913-924 [doi]
- Detect, Fix, and Verify TensorFlow API MisusesWilson Baker, Michael O'Connor, Seyed Reza Shahamiri, Valerio Terragni. 925-929 [doi]
- Static Analysis of Database Accesses in MongoDB ApplicationsBoris Cherry, Pol Benats, Maxime Gobert 0001, Loup Meurice, Csaba Nagy 0001, Anthony Cleve. 930-934 [doi]
- Assemble Foundation Models for Automatic Code SummarizationJian Gu, Pasquale Salza, Harald C. Gall. 935-946 [doi]
- On the Evolution of Inheritance and Delegation Mechanisms and Their Impact on Code QualityGiammaria Giordano, Antonio Fasulo, Gemma Catolino, Fabio Palomba, Filomena Ferrucci, Carmine Gravino. 947-958 [doi]
- VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatementsYangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray. 959-970 [doi]
- Characterizing and Improving Bug-Finders with Synthetic BugsYu Hu, Zekun Shen, Brendan Dolan-Gavitt. 971-982 [doi]
- Phishing Kits Source Code Similarity Distribution: A Case StudyEttore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut. 983-994 [doi]
- When They Go Low: Automated Replacement of Low-level Functions in Ethereum Smart ContractsRui Xi, Karthik Pattabiraman. 995-1005 [doi]
- Learning CI Configuration Correctness for Early Build FeedbackMark Santolucito, Jialu Zhang, Ennan Zhai, Jürgen Cito, Ruzica Piskac. 1006-1017 [doi]
- Searching for Technical Debt - An Empirical, Exploratory, and Descriptive Case StudyRolf-Helge Pfeiffer. 1018-1022 [doi]
- BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language ModelQige Song, Yongzheng Zhang 0002, Linshu Ouyang, Yige Chen. 1023-1033 [doi]
- Where Should I Look at? Recommending Lines that Reviewers Should Pay Attention ToYang Hong, Chakkrit Kla Tantithamthavorn, Patanamon Thongtanunam. 1034-1045 [doi]
- A Bytecode-based Approach for Smart Contract ClassificationChaochen Shi, Yong Xiang 0001, Jiangshan Yu, Longxiang Gao, Keshav Sood, Robin Ram Mohan Doss. 1046-1054 [doi]
- Web Element Identification by Combining NLP and Heuristic Search for Web TestingHiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto. 1055-1065 [doi]
- Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image VulnerabilitiesMubin Ul Haque, Muhammad Ali Babar. 1066-1077 [doi]
- Automatically Generating Code Comment Using Heterogeneous Graph Neural NetworksDun Jin, Peiyu Liu 0001, Zhenfang Zhu. 1078-1088 [doi]
- A Simple Retrieval-based Method for Code Comment GenerationXiaoning Zhu, Chaofeng Sha, Junyu Niu. 1089-1100 [doi]
- Method Name Generation Based on Code Structure GuidanceZhiheng Qu, Yi Hu, Jianhui Zeng, Bo Cai, Shun Yang. 1101-1110 [doi]
- NeuRecover: Regression-Controlled Repair of Deep Neural Networks with Training HistoryShogo Tokui, Susumu Tokumoto, Akihito Yoshii, Fuyuki Ishikawa, Takao Nakagawa, Kazuki Munakata, Shinji Kikuchi. 1111-1121 [doi]
- Analyzing Offline Social Engagements: An Empirical Study of Meetup Events Related to Software DevelopmentAbhishek Sharma 0002, Gede Artha Azriadi Prana, Anamika Sawhney, Nachiappan Nagappan, David Lo 0001. 1122-1133 [doi]
- Can Identifier Splitting Improve Open-Vocabulary Language Model of Code?Jieke Shi, Zhou Yang 0003, Junda He, Bowen Xu, David Lo 0001. 1134-1138 [doi]
- Fault Localization in Server-Side Applications Using Spectrum-Based Fault LocalizationYoshitomo Sha, Masataka Nagura, Shingo Takada 0001. 1139-1146 [doi]
- Using Source Code Metrics for Predicting Metamorphic Relations at Method LevelAlejandra Duque-Torres, Dietmar Pfahl, Claus Klammer, Stefan Fischer 0006. 1147-1154 [doi]
- iTest: Using coverage measurements to improve test efficiencyStefan Fischer, Denise Rigoni, Nikola Obrenovic. 1155-1158 [doi]
- An Exploratory Study on the Usage of Gherkin Features in Open-Source ProjectsAdwait Chandorkar, Nitish Patkar, Andrea Di Sorbo, Oscar Nierstrasz. 1159-1166 [doi]
- What Do We Know About Readability of Test Code? - A Systematic Mapping StudyDietmar Winkler 0001, Pirmin Urbanke, Rudolf Ramler. 1167-1174 [doi]
- Type Profiling to the Rescue: Test Amplification in Python and SmalltalkSerge Demeyer, Mehrdad Abdi, Ebert Schoofs. 1175-1178 [doi]
- ProPy: Prolog-based Fault Localization Tool for PythonJanneke Morin, Krishnendu Ghosh. 1179-1182 [doi]
- Visualizing Web Application Execution Logs to Improve Software Security Defect LocalizationMatthew A. Puentes, Yunsen Lei, Noëlle Rakotondravony, Lane T. Harrison, Craig A. Shue. 1183-1190 [doi]
- Blockchain-Oriented Software Variant Forks: A Preliminary StudyHenrique Rocha, John Businge. 1191-1196 [doi]
- A Tool to check the Ownership of Solana's Smart ContractsGiuseppe Antonio Pierro, Andy Amoordon. 1197-1202 [doi]
- Stone: A Privacy Policy Enforcement System for Smart ContractsJihyeon Kim, Dae-hyeon Jeong, Jisoo Kim, Eun-Sun Cho. 1203-1206 [doi]
- On the use of Petri Nets in Smart Contracts modeling, generation and verificationAndrea Pinna 0002, Roberto Tonelli. 1207-1211 [doi]
- Analysis Of The Relationship Between Smart Contracts' Categories and VulnerabilitiesGiacomo Ibba, Marco Ortu. 1212-1218 [doi]
- Can Solana be the Solution to the Blockchain Scalability Problem?Giuseppe Antonio Pierro, Roberto Tonelli. 1219-1226 [doi]
- Goal and Policy Based Code Generation and Deployment of Smart ContractsKonstantinos Tsiounis, Kostas Kontogiannis. 1227-1230 [doi]
- A Blockchain-based Data Notarization System for Smart Mobility ServicesRaimondo Cossu, Maria Ilaria Lunesu, Marco Uras, Alessandro Floris. 1231-1238 [doi]
- A Comprehensive Study of Bug Fixes in Quantum ProgramsJunjie Luo 0005, Pengzhan Zhao, Zhongtao Miao, Shuhan Lan, Jianjun Zhao. 1239-1246 [doi]
- 1-2-3 Reproducibility for Quantum Software ExperimentsWolfgang Mauerer, Stefanie Scherzinger. 1247-1248 [doi]
- How to Approximate any Objective Function via Quadratic Unconstrained Binary OptimizationThomas Gabor, Marian Lingsch Rosenfeld, Claudia Linnhoff-Popien, Sebastian Feld. 1249-1257 [doi]
- Prioritization of Compiled Quantum Circuits for Different Quantum ComputersMarie Salm, Johanna Barzen, Frank Leymann, Benjamin Weder. 1258-1265 [doi]
- Towards using focus groups to identify software developer's interests regarding their development processLynn von Kurnatowski, Annika Meinecke, Adriana Rieger. 1266-1269 [doi]
- Exploring Relevant Artifacts of Release Notes: The Practitioners' PerspectiveSristy Sumana Nath, Banani Roy. 1270-1277 [doi]
- Accessing the Presentation of Causal Graphs and an Application of Gestalt Principles with Eye TrackingLisa Grabinger, Florian Hauser, Jürgen Mottok. 1278-1285 [doi]
- Humans in Empirical Software Engineering Studies: An Experience ReportBonita Sharif, Niloofar Mansoor. 1286-1292 [doi]
- MLOps for evolvable AI intensive software systemsSergio Moreschini, Francesco Lomio, David Hästbacka, Davide Taibi 0001. 1293-1294 [doi]
- Knowledge Management Challenges for AI QualityXiaozhou Li 0002, Sergio Moreschini, Aleksandra Filatova, Davide Taibi 0001. 1295-1296 [doi]