


Остановите войну!
for scientists:


default search action
12th ESEM 2018: Oulu, Finland
- Markku Oivo, Daniel Méndez Fernández, Audris Mockus:
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2018, Oulu, Finland, October 11-12, 2018. ACM 2018
Full research papers
- Florian Hofer
:
Architecture, technologies and challenges for cyber-physical systems in industry 4.0: a systematic mapping study. 1:1-1:10 - Neil Walkinshaw, Leandro L. Minku
:
Are 20% of files responsible for 80% of defects? 2:1-2:10 - Matthieu Jimenez
, Thierry Titcheu Chekam, Maxime Cordy, Mike Papadakis
, Marinos Kintis, Yves Le Traon
, Mark Harman:
Are mutants really natural?: a study on how "naturalness" helps mutant selection. 3:1-3:10 - Panagiotis Stratis, Vanya Yaneva, Ajitha Rajan:
Assessing the effect of data transformations on test suite compilation. 4:1-4:10 - Qiong Feng, Yuanfang Cai, Rick Kazman, Ran Mo:
The birth, growth, death and rejuvenation of software maintenance communities. 5:1-5:10 - Welder Pinheiro Luz, Gustavo Pinto, Rodrigo Bonifácio
:
Building a collaborative culture: a grounded theory of well succeeded devops adoption in practice. 6:1-6:10 - Kan Qi, Anandi Hira, Elaine Venson
, Barry W. Boehm:
Calibrating use case points using bayesian analysis. 7:1-7:10 - Adrian Santos, Natalia Juristo:
Comparing techniques for aggregating interrelated replications in software engineering. 8:1-8:10 - Simone Romano
, Giuseppe Scanniello
, Davide Fucci, Natalia Juristo, Burak Turhan
:
The effect of noise on software engineers' performance. 9:1-9:10 - Mansooreh Zahedi, Muhammad Ali Babar, Brenton Cooper:
An empirical investigation of transferring research to software technology innovation: a case of data-driven national security software. 10:1-10:10 - Farida Elzanaty, Toshiki Hirao, Shane McIntosh, Akinori Ihara, Kenichi Matsumoto:
An empirical study of design discussions in code review. 11:1-11:10 - Carmen Coviello, Simone Romano
, Giuseppe Scanniello
:
An empirical study of inadequate and adequate test suite reduction approaches. 12:1-12:10 - Dag I. K. Sjøberg:
An empirical study of WIP in kanban teams. 13:1-13:8 - Sulaiman Aljarallah, Russell Lock:
An exploratory study of software sustainability dimensions and characteristics: end user perspectives in the kingdom of Saudi Arabia (KSA). 14:1-14:10 - Jailton Coelho, Marco Túlio Valente, Luciana Lourdes Silva, Emad Shihab:
Identifying unmaintained projects in github. 15:1-15:10 - Carl Martin Rosenberg, Leon Moonen
:
Improving problem identification via automated log clustering using dimensionality reduction. 16:1-16:10 - Junjie Wang, Song Wang, Qing Wang:
Is there a "golden" feature set for static warning identification?: an experimental evaluation. 17:1-17:10 - Davide Fucci, Simone Romano
, Maria Teresa Baldassarre
, Danilo Caivano, Giuseppe Scanniello
, Burak Turhan
, Natalia Juristo:
A longitudinal cohort study on the retainment of test-driven development. 18:1-18:10 - Davide Fucci, Cristina Palomares
, Xavier Franch, Dolors Costal, Mikko Raatikainen
, Martin Stettinger, Zijad Kurtanovic, Tero Kojo, Lars Koenig, Andreas A. Falkner, Gottfried Schenner, Fabrizio Brasca, Tomi Männistö
, Alexander Felfernig, Walid Maalej:
Needs and challenges for a platform to support large-scale requirements engineering: a multiple-case study. 19:1-19:10 - Katsiaryna Labunets:
No search allowed: what risk modeling notation to choose? 20:1-20:10 - Bowen Xu, Amirreza Shirani, David Lo
, Mohammad Amin Alipour
:
Prediction of relatedness in stack overflow: deep learning vs. SVM: a reproducibility study. 21:1-21:10 - Ayushi Rastogi, Nachiappan Nagappan, Georgios Gousios, André van der Hoek:
Relationship between geographical location and evaluation of developer contributions in github. 22:1-22:8 - Amjed Tahir, Kwabena Ebo Bennin
, Stephen G. MacDonell, Stephen Marsland:
Revisiting the size effect in software fault prediction models. 23:1-23:10 - Norman Peitek, Janet Siegmund, Chris Parnin, Sven Apel, Johannes C. Hofmeister, André Brechmann
:
Simultaneous measurement of program comprehension with fMRI and eye tracking: a case study. 24:1-24:10 - Hennie Huijgens, Davide Spadini, Dick Stevens, Niels Visser, Arie van Deursen
:
Software analytics in continuous delivery: a case study on success factors. 25:1-25:10 - Sten Vercammen
, Serge Demeyer
, Markus Borg, Sigrid Eldh:
Speeding up mutation testing via the cloud: lessons learned for further optimisations. 26:1-26:9 - Pooyan Behnamghader, Patavee Meemeng, Iordanis Fostiropoulos, Di Huang, Kamonphop Srisopha, Barry W. Boehm:
A scalable and efficient approach for compiling and analyzing commit history. 27:1-27:10 - Partha Chakraborty, Rifat Shahriyar, Anindya Iqbal, Amiangshu Bosu
:
Understanding the software development practices of blockchain projects: a survey. 28:1-28:10 - Miikka Kuutila, Mika V. Mäntylä, Maëlick Claes
, Marko Elovainio
, Bram Adams
:
Using experience sampling to link software repositories with emotions and work well-being. 29:1-29:10 - Syed Ahmed, Mehdi Bagherzadeh:
What do concurrency developers ask about?: a large-scale study using stack overflow. 30:1-30:10
Industry papers
- Diogo S. Mendonça
, Tarcila G. da Silva, Daniel Ferreira de Oliveira, Julliany Sales Brandão, Hélio Lopes
, Simone D. J. Barbosa
, Marcos Kalinowski
, Arndt von Staa:
Applying pattern-driven maintenance: a method to prevent latent unhandled exceptions in web applications. 31:1-31:10 - Junji Shimagaki, Yasutaka Kamei, Naoyasu Ubayashi
, Abram Hindle:
Automatic topic classification of test cases using text mining at an Android smartphone vendor. 32:1-32:10 - Ronnie E. S. Santos, Cleyton V. C. de Magalhães, Luiz Fernando Capretz, Jorge S. Correia Neto, Fabio Q. B. da Silva
, Abdelrahman Saher:
Computer games are serious business and so is their quality: particularities of software testing in game development from the perspective of practitioners. 33:1-33:10 - Per Erik Strandberg, Wasif Afzal, Daniel Sundmark:
Decision making and visualizations based on test results. 34:1-34:10 - Bianca Trinkenreich, Tayana Conte
, Monalessa Perini Barcellos
, Gleison Santos:
Defining, measuring and monitoring IT service goals and strategies: preliminary results and pitfalls from a qualitative study with IT service managers. 35:1-35:10 - Di Wang, Matthias Galster:
Development processes and practices in a small but growing software industry: a practitioner survey in New Zealand. 36:1-36:10 - Dan Port, William Taber:
An empirical study of process policies and metrics to manage productivity and quality for maintenance of critical software systems at the jet propulsion laboratory. 37:1-37:10 - María Cecilia Bastarrica, Germán Espinoza, Jacqueline Marín:
Implementing agile practices: the experience of TSol. 38:1-38:10 - Nicolli Souza Rios Alves, Rodrigo Oliveira Spínola, Manoel G. Mendonça
, Carolyn B. Seaman:
The most common causes and effects of technical debt: first results from a global family of industrial surveys. 39:1-39:10 - Markus Schnappinger, Mohd Hafeez Osman
, Alexander Pretschner, Markus Pizka, Arnaud Fietzke:
Software quality assessment in practice: a hypothesis-driven framework. 40:1-40:6 - Chong Wang, Pengwei Cui, Maya Daneva
, Mohamad Kassab
:
Understanding what industry wants from requirements engineers: an exploration of RE jobs in Canada. 41:1-41:10 - Ivan Pashchenko
, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci
:
Vulnerable open source dependencies: counting those that matter. 42:1-42:10
Emerging results
- Chong Wang, Fan Zhang, Peng Liang
, Maya Daneva
, Marten van Sinderen:
Can app changelogs improve requirements classification from app reviews?: an exploratory study. 43:1-43:4 - Silvia Abrahão
, Emilio Insfrán
, Fernando González-Ladrón-de-Guevara, Marta Fernández-Diego, Carlos Cano-Genoves, Raphael Pereira de Oliveira
:
Comparing the effectiveness of goal-oriented languages: results from a controlled experiment. 44:1-44:4 - Amber van der Heijden, Cosmin Broasca, Alexander Serebrenik:
An empirical perspective on security challenges in large-scale agile software development. 45:1-45:4 - Seyed Alireza Sanaee Kohroudi
, Mostafa Jalal
, Maaz Mohiuddin, Wajeb Saab
, Jean-Yves Le Boudec:
Experimental validation of the suitability of virtualization-based replication for fault tolerance in real-time control of electric grids. 46:1-46:4 - Vilmar Nepomuceno
, Sérgio Soares:
Maintaining systematic literature reviews: benefits and drawbacks. 47:1-47:4 - Emily Winter
, Stephen Forshaw, Maria Angela Ferrario
:
Measuring human values in software engineering. 48:1-48:4 - Mika V. Mäntylä, Maëlick Claes
, Umar Farooq:
Measuring LDA topic stability from clusters of replicated runs. 49:1-49:4 - Maëlick Claes
, Mika Mäntylä, Umar Farooq:
On the use of emoticons in open source software development. 50:1-50:4 - Anh Nguyen-Duc, Xiaofeng Wang, Pekka Abrahamsson:
A preliminary study of agility in business and production: cases of early-stage hardware startups. 51:1-51:4 - Gema Rodríguez-Pérez, Andy Zaidman, Alexander Serebrenik, Gregorio Robles
, Jesús M. González-Barahona
:
What if a bug has a different origin?: making sense of bugs without an explicit bug introducing change. 52:1-52:4 - Panagiota Chatzipetrou
, Darja Smite, Rini van Solingen:
When and who leaves matters: emerging results from an empirical study of employee turnover. 53:1-53:4
Vision papers
- Hilmer Neri, Guilherme Horta Travassos:
Measuresoftgram: a future vision of software product quality. 54:1-54:4 - Lucas Gren:
Standards of validity and the validity of standards in behavioral software engineering research: the perspective of psychological test theory. 55:1-55:4
Posters
- Hui Zhao, Jimin Liang
, Xuezhen Yin, Lingfeng Yang, Peili Yang, Yuhang Wang:
Domain-specific modelware: to make the machine learning model reusable and reproducible. 56:1-56:2 - Emre Sahal, Ayse Tosun
:
Identifying bug-inducing changes for code additions. 57:1-57:2 - Waad Alhoshan
, Liping Zhao
, Riza Batista-Navarro
:
Using semantic frames to identify related textual requirements: an initial validation. 58:1-58:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.