


default search action
24th EASE 2020: Trondheim, Norway
- Jingyue Li, Letizia Jaccheri, Torgeir Dingsøyr, Ruzanna Chitchyan:

EASE '20: Evaluation and Assessment in Software Engineering, Trondheim, Norway, April 15-17, 2020. ACM 2020, ISBN 978-1-4503-7731-7
Full Papers Track
- Anh Nguyen-Duc, Ingrid Sundbø, Elizamary Nascimento, Tayana Conte, Iftekhar Ahmed, Pekka Abrahamsson:

A Multiple Case Study of Artificial Intelligent System Development in Industry. 1-10 - Abdulrahman Alatawi, Weifeng Xu, Dianxiang Xu:

A Bigram-based Inference Model for Retrieving Abbreviated Phrases in Source Code. 11-20 - Bohan Liu, He Zhang, Lanxin Yang

, Liming Dong, Haifeng Shen, Kaiwen Song:
An Experimental Evaluation of Imbalanced Learning and Time-Series Validation in the Context of CI/CD Prediction. 21-30 - Rashidah Kasauli

, Eric Knauss
, Joyce Nakatumba-Nabende
, Benjamin Kanagwa:
Agile Islands in a Waterfall Environment: Challenges and Strategies in Automotive. 31-40 - Mansooreh Zahedi, Roshan Namal Rajapakse, Muhammad Ali Babar:

Mining Questions Asked about Continuous Software Engineering: A Case Study of Stack Overflow. 41-50 - Xueying Li, Peng Liang

, Zengyang Li:
Automatic Identification of Decisions from the Hibernate Developer Mailing List. 51-60 - Weichao Liu, Cheng Zhang, Futian Wang, Yun Yang:

Combining Network Analysis with Structural Matching for Design Pattern Detection. 61-70 - Claudio Di Sipio

, Riccardo Rubei
, Davide Di Ruscio
, Phuong Thanh Nguyen
:
A Multinomial Naïve Bayesian (MNB) Network to Automatically Recommend Topics for GitHub Repositories. 71-80 - Ian R. McChesney

, Raymond R. Bond:
Observations on the Linear Order of Program Code Reading Patterns in Programmers with Dyslexia. 81-89 - Yang Li, Sandro Schulze, Jiahua Xu:

Feature Terms Prediction: A Feasible Way to Indicate the Notion of Features in Software Product Line. 90-99 - Xiao-Yi Zhang, Zheng Zheng:

Exploring the Characteristics of Spectra Distribution and Their Impacts on Fault Localization. 100-109 - Andrea Capiluppi

, Nemitari Ajienka, Nour Ali, Mahir Arzoky, Steve Counsell, Giuseppe Destefanis, Alina Dana Miron, Bhaveet Nagaria, Rumyana Neykova, Martin J. Shepperd, Stephen Swift, Allan Tucker:
Using the Lexicon from Source Code to Determine Application Domain. 110-119 - Jingxiu Yao, Martin J. Shepperd:

Assessing software defection prediction performance: why using the Matthews correlation coefficient matters. 120-129 - Rolando P. Reyes

, Oscar Dieste
, Efraín R. Fonseca C.
, Natalia Juristo:
Publication Bias: A Detailed Analysis of Experiments Published in ESEM. 130-139 - Neil Walkinshaw

, Martin J. Shepperd:
Reasoning about Uncertainty in Empirical Results. 140-149 - Nils Brede Moe, Viktoria Stray, Marcus R. Goplen:

Studying Onboarding in Distributed Software Teams: A Case Study and Guidelines. 150-159 - Jean Petric

, Tracy Hall
, David Bowes
:
Which Software Faults Are Tests Not Detecting? 160-169 - Francisco Dalton, Márcio Ribeiro, Gustavo Pinto, Leonardo Fernandes

, Rohit Gheyi, Baldoino Fonseca:
Is Exceptional Behavior Testing an Exception?: An Empirical Assessment Using Java Automated Tests. 170-179 - Nitish Patkar

, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski:
Caveats in Eliciting Mobile App Requirements. 180-189 - Kwame Chan-Jong-Chu, Tanjina Islam, Miguel Morales Exposito, Sanjay Sheombar, Christian Valladares, Olivier Philippot, Eoin Martino Grua

, Ivano Malavolta
:
Investigating the Correlation between Performance Scores and Energy Consumption of Mobile Web Apps. 190-199 - Pankajeshwara Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger

:
Mining Decision-Making Processes in Open Source Software Development: A Study of Python Enhancement Proposals (PEPs) using Email Repositories. 200-209 - Sávio Freire

, Nicolli Rios, Boris Gutierrez, Darío Torres, Manoel G. Mendonça
, Clemente Izurieta, Carolyn B. Seaman, Rodrigo O. Spínola:
Surveying Software Practitioners on Technical Debt Payment Practices and Reasons for not Paying off Debt Items. 210-219 - Adam Alami, Marisa Leavitt Cohn, Andrzej Wasowski:

How Do FOSS Communities Decide to Accept Pull Requests? 220-229 - Viet Van Pham, Chris Lokan, Kathryn Kasmarik:

A Better Set of Object-Oriented Design Metrics for Within-Project Defect Prediction. 230-239 - Prabhat Ram, Pilar Rodríguez, Markku Oivo, Silverio Martínez-Fernández, Alessandra Bagnato

, Michal Choras, Rafal Kozik
, Sanja Aaramaa, Milla Ahola:
Actionable Software Metrics: An Industrial Perspective. 240-249 - Woubshet Behutiye

, Pertti Seppänen
, Pilar Rodríguez, Markku Oivo:
Documentation of Quality Requirements in Agile Software Development. 250-259 - Ranci Ren, John W. Castro, Adrián Santos, Sara Pérez-Soler

, Silvia Teresita Acuña, Juan de Lara:
Collaborative Modelling: Chatbots or On-Line Tools? An Experimental Study. 260-269
Short Papers and Artefacts Track
- Ruoxi Sun

, Minhui Xue:
Quality Assessment of Online Automated Privacy Policy Generators: An Empirical Study. 270-275 - Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:

Tricking Johnny into Granting Web Permissions. 276-281 - Orges Cico, Anh Nguyen-Duc, Letizia Jaccheri

:
An Empirical Investigation on Software Practices in Growth Phase Startups. 282-287 - Steve Counsell, Sunila Modi, Pamela Abbott

:
Themes and Difficulties in Distributed Agile Email Activity: A Qualititative Team-Based Study. 288-292 - Abdallah Salameh, Julian M. Bass:

Heterogeneous Tailoring Approach Using the Spotify Model. 293-298 - Raluca Florea, Viktoria Stray:

A Qualitative Study of the Background, Skill Acquisition, and Learning Preferences of Software Testers. 299-305 - Tomas Gustavsson:

Visualizing Inter-Team Coordination. 306-311 - Hongliang Liang, Wenqing Yu, Lu Ai, Lin Jiang:

A Practical Concolic Execution Technique for Large Scale Software Systems. 312-317 - A. Eashaan Rao, Sridhar Chimalakonda:

An Exploratory Study Towards Understanding Lambda Expressions in Python. 318-323 - Jacob Krüger

, Sebastian Nielebock
, Robert Heumüller:
How Can I Contribute?: A Qualitative Analysis of Community Websites of 25 Unix-Like Distributions. 324-329 - Bruna Prauchner Vargas, Ingrid Signoretti, Maximilian Zorzetti

, Sabrina Marczak
, Ricardo Bastos:
On the Understanding of Experimentation Usage in Light of Lean Startup in Software Development Context. 330-335 - Kamonphop Srisopha, Devendra Swami, Daniel Link, Barry W. Boehm:

How features in iOS App Store Reviews can Predict Developer Responses. 336-341 - Lech Madeyski, Tomasz Lewowski

:
MLCQ: Industry-Relevant Code Smell Data Set. 342-347
Vision Papers and Emerging Results Track
- Lucas Gren, Per Lenberg:

Agility is responsiveness to change: An essential definition. 348-353 - Tawfeeq Alsanoosy, Maria Spichkova, James Harland

:
Formal vs. Case-Study-Based Approaches for the Identification of Cultural Influences in Requirements Engineering. 354-359 - Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun:

Achieving "Good Enough" Software Security: The Role of Objectivity. 360-365
Industry Experience Reports Track
- Luca Lenz, Michael Felderer

, Sascha Schwedes, Kai Müller:
Explainable Priority Assessment of Software-Defects using Categorical Features at SAP HANA. 366-367 - Wilhelm Meding, Miroslaw Staron

:
Making Software Measurement Standards Understandable. 368-370 - Lucas Paruch

, Viktoria Stray, Charlotte Bech Blindheim:
Characteristic Traits of Software Testers. 371-372 - Babak A. Farshchian, Hilde Sætertrø, Marianne Stålaker:

Experiences from an Interpretative Case Study of Innovative Public Procurement of Digital Systems in the Norwegian Public Sector. 373-374
POSTER SESSION: Posters and Doctoral Symposium Tracks
- Ahmet Unudulmaz

, Oya Kalipsiz:
TMMI Integration with Agile and Test Process. 375-378 - Sergio Rico

:
Exploring and improving industry-academia communication in software engineering. 379-382
WORKSHOP SESSION: The First Blockchain Software Engineering Workshop
- Dina Salah, Maha Hafez Ahmed, Kamal ElDahshan:

Blockchain Applications in Human Resources Management: Opportunities and Challenges. 383-389 - Jørgen Svennevik Notland, Jakob Svennevik Notland, Donn Morrison:

The Minimum Hybrid Contract (MHC): Combining Legal and Blockchain Smart Contracts. 390-397 - Shanshan Li, Qianwen Xu, Peiyu Hou, Xiudi Chen, Yanze Wang, He Zhang, Guoping Rong:

Exploring the Challenges of Developing and Operating Consortium Blockchains: A Case Study. 398-404 - Philipp Tschannen, Ali Ahmed

:
On the Evaluation of the Security Usability of Bitcoin's APIs. 405-412
WORKSHOP SESSION: DevOps Quality Management Workshop
- Saima Rafi, Yu Wu, Muhammad Azeem Akbar

:
RMDevOps: A Road Map for Improvement in DevOps Activities in Context of Software Organizations. 413-418 - Weisong Sun, Xuefeng Yan, Arif Ali Khan:

Generative Ranking based Sequential Recommendation in Software Crowdsourcing. 419-426 - Sher Badshah, Arif Ali Khan, Bilal Khan:

Towards Process Improvement in DevOps: A Systematic Literature Review. 427-433 - Bilal Khan, Danish Iqbal, Sher Badshah:

Cross-Project Software Fault Prediction Using Data Leveraging Technique to Improve Software Quality. 434-438 - Muhammad Azeem Akbar, Zhiqiu Huang, Yu Zhou, Faisal Mehmood, Yasir Hussain, Muhammad Hamza:

Towards continues code recommendation and implementation system: An Initial Framework. 439-444 - Muhammad Shafiq

, Qinghua Zhang, Muhammad Azeem Akbar
, Tahir Kamal, Faisal Mehmood, Muhammad Tanveer Riaz:
Towards successful global software development. 445-450
WORKSHOP SESSION: Software Security: Challenges, Opportunities and Lessons Learned Workshop
- Mohammad Zarour, Mamdouh Alenezi

, Khalid Alsarayrah:
Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up. 451-456 - Saima Rafi, Yu Wu, Muhammad Azeem Akbar

:
Towards a Hypothetical Framework to Secure DevOps Adoption: Grounded Theory Approach. 457-462 - Muhammad Hamza, Haibo Hu, Muhammad Azeem Akbar, Faisal Mehmood, Yasir Hussain, Ali Mahmoud Baddour:

SIOT-RIMM: Towards Secure IOT-Requirement Implementation Maturity Model. 463-468 - Ms. Taiyaba, Muhammad Azeem Akbar, Bushra Qureshi, Muhammad Shafiq, Muhammad Hamza, Muhammad Tanveer Riaz:

Secure V2X Environment using Blockchain Technology. 469-474 - Armin Kobilica, Mohammed Ayub, Jameleddine Hassine:

Automated Identification of Security Requirements: A Machine Learning Approach. 475-480 - Tarek Gaber

, Ali Ahmed
, Amira Mostafa:
PrivDRM: A Privacy-preserving Secure Digital Right Management System. 481-486 - Rafiq Ahmad Khan

, Siffat Ullah Khan
, Muhammad Ilyas, Mohd Yazid Idris:
The State of the Art on Secure Software Engineering: A Systematic Mapping Study. 487-492 - Muhammad Azeem Akbar

, Ahmed Alsanad, Abeer Abdul-Aziz Alsanad, Abdu Gumaei, Muhammad Shafiq
, Tahir Kamal:
Towards Efficient and Secure Global Software Development using Blockchain. 493-498 - Mamdouh Alenezi

, Hamid Abdul Basit
, Faraz Idris Khan, Maham Anwar Beg:
A Comparison Study of Available Sofware Security Ontologies. 499-504 - Elias Brattli Sørensen, Edvard Kristoffer Karlsen, Jingyue Li

:
What Norwegian Developers Want and Need From Security-Directed Program Analysis Tools: A Survey. 505-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














