


default search action
ACM Transactions on Software Engineering and Methodology, Volume 33
Volume 33, Number 1, January 2024
- Mauro Pezzè
:
Editorial: Toward the Future with Eight Issues Per Year. 1e:1-1e:2 - Shouguo Yang
, Chaopeng Dong
, Yang Xiao
, Yiran Cheng
, Zhiqiang Shi
, Zhi Li
, Limin Sun
:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. 1:1-1:40 - Xuanzhe Liu
, Chengxu Yang
, Ding Li
, Yuhan Zhou
, Shaofei Li
, Jiali Chen
, Zhenpeng Chen
:
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces. 2:1-2:27 - Suyu Ma
, Chunyang Chen
, Hourieh Khalajzadeh
, John Grundy
:
A First Look at Dark Mode in Real-world Android Apps. 3:1-3:26 - Jiarong Wu
, Lili Wei
, Yanyan Jiang
, Shing-Chi Cheung
, Luyao Ren
, Chang Xu
:
Programming by Example Made Easy. 4:1-4:36 - Narjes Bessghaier
, Mohammed Sayagh
, Ali Ouni
, Mohamed Wiem Mkaouer
:
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects. 5:1-5:37 - Qing Huang
, Yanbang Sun
, Zhenchang Xing
, Min Yu
, Xiwei Xu
, Qinghua Lu
:
API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model. 6:1-6:25 - Jeho Oh
, Don S. Batory
, Ruben Heradio
:
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees. 7:1-7:36 - Chang-Ai Sun
, Hepeng Dai
, Ning Geng
, Huai Liu
, Tsong Yueh Chen
, Peng Wu
, Yan Cai
, Jinqiu Wang
:
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs. 8:1-8:21 - Toni Taipalus
, Hilkka Grahn
:
Framework for SQL Error Message Design: A Data-Driven Approach. 9:1-9:50 - Andrew G. Clark
, Michael Foster
, Benedikt Prifling
, Neil Walkinshaw
, Robert M. Hierons
, Volker Schmidt
, Robert D. Turner
:
Testing Causality in Scientific Modelling Software. 10:1-10:42 - Jianzhong Liu
, Yuheng Shen
, Yiru Xu
, Hao Sun
, Yu Jiang
:
Horus: Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures. 11:1-11:25 - Sina Entekhabi
, Wojciech Mostowski
, Mohammad Reza Mousavi
:
Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving. 12:1-12:32 - Carlo A. Furia
, Richard Torkar
, Robert Feldt
:
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions. 13:1-13:35 - Olivier Nourry
, Yutaro Kashiwa
, Bin Lin
, Gabriele Bavota
, Michele Lanza
, Yasutaka Kamei
:
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities. 14:1-14:26 - Pei Liu
, Yanjie Zhao
, Mattia Fazzini
, Haipeng Cai
, John Grundy
, Li Li
:
Automatically Detecting Incompatible Android APIs. 15:1-15:33 - Hengcheng Zhu
, Lili Wei
, Valerio Terragni
, Yepang Liu
, Shing-Chi Cheung
, Jiarong Wu
, Qin Sheng
, Bing Zhang
, Lihong Song
:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. 16:1-16:31 - Yongqiang Tian
, Xueyan Zhang
, Yiwen Dong
, Zhenyang Xu
, Mengxiao Zhang
, Yu Jiang
, Shing-Chi Cheung
, Chengnian Sun
:
On the Caching Schemes to Speed Up Program Reduction. 17:1-17:30 - Claudio Mandrioli
, Max Nyberg Carlsson
, Martina Maggio
:
Testing Abstractions for Cyber-Physical Control Systems. 18:1-18:32 - Wang Fang
, Mingsheng Ying
, Xiaodi Wu
:
Differentiable Quantum Programming with Unbounded Loops. 19:1-19:63
- Yuanhang Yang
, Wei He
, Cuiyun Gao
, Zenglin Xu
, Xin Xia
, Chuanyi Liu
:
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site. 20:1-20:25 - Tianlin Li
, Xiaofei Xie
, Jian Wang
, Qing Guo
, Aishan Liu
, Lei Ma
, Yang Liu
:
Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis. 21:1-21:24 - Xueqi Dang
, Yinghua Li
, Mike Papadakis
, Jacques Klein
, Tegawendé F. Bissyandé
, Yves Le Traon
:
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. 22:1-22:40 - Yuhan Zhi
, Xiaofei Xie
, Chao Shen
, Jun Sun
, Xiaoyu Zhang
, Xiaohong Guan
:
Seed Selection for Testing Deep Neural Networks. 23:1-23:33 - Hanyang Guo
, Xiangping Chen
, Yuan Huang
, Yanlin Wang
, Xi Ding
, Zibin Zheng
, Xiaocong Zhou
, Hong-Ning Dai
:
Snippet Comment Generation Based on Code Context Expansion. 24:1-24:30 - Qiang Hu
, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing. 25:1-25:28
- Han Hu
, Yujin Huang
, Qiuyuan Chen
, Terry Yue Zhuo
, Chunyang Chen
:
A First Look at On-device Models in iOS Apps. 26:1-26:30
- Amid Golmohammadi
, Man Zhang
, Andrea Arcuri
:
Testing RESTful APIs: A Survey. 27:1-27:41
- Michael Weiss
, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks. 28:1-28:29
- Michael Weiss
, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report. 29:1-29:4
Volume 33, Number 2, February 2024
- Yu Zhou
, Weilin Zhan
, Zi Li
, Tingting Han
, Taolue Chen
, Harald C. Gall
:
DRIVE: Dockerfile Rule Mining and Violation Detection. 30:1-30:23 - Qing Huang
, Zhiqiang Yuan
, Zhenchang Xing
, Xin Peng
, Xiwei Xu
, Qinghua Lu
:
FQN Inference in Partial Code by Prompt-tuned Language Model of Code. 31:1-31:32 - Jaekwon Lee
, Seung Yeob Shin
, Lionel C. Briand
, Shiva Nejati
:
Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages. 32:1-32:34 - Knut H. Rolland
, Brian Fitzgerald
, Torgeir Dingsøyr
, Klaas-Jan Stol
:
Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development. 33:1-33:45 - Xiaoye Zheng
, Zhiyuan Wan
, Yun Zhang
, Rui Chang
, David Lo
:
A Closer Look at the Security Risks in the Rust Ecosystem. 34:1-34:30 - Claudio Mandrioli
, Seung Yeob Shin
, Martina Maggio
, Domenico Bianculli
, Lionel C. Briand
:
Stress Testing Control Loops in Cyber-physical Systems. 35:1-35:58 - SayedHassan Khatoonabadi
, Diego Elias Costa
, Suhaib Mujahid
, Emad Shihab
:
Understanding the Helpfulness of Stale Bot for Pull-Based Development: An Empirical Study of 20 Large Open-Source Projects. 36:1-36:43 - Yixuan Zhang
, Shangtong Cao
, Haoyu Wang
, Zhenpeng Chen
, Xiapu Luo
, Dongliang Mu
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
Characterizing and Detecting WebAssembly Runtime Bugs. 37:1-37:29 - Zishuo Ding
, Yiming Tang
, Xiaoyu Cheng
, Heng Li
, Weiyi Shang
:
LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates. 38:1-38:45 - Weishi Shi
, Heather Moses
, Qi Yu
, Samuel A. Malachowsky
, Daniel E. Krutz
:
ALL: Supporting Experiential Accessibility Education and Inclusive Software Development. 39:1-39:30 - Federico Formica
, Tony Fan
, Claudio Menghi
:
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions. 40:1-40:37 - Jiajun Jiang
, Yumeng Wang
, Junjie Chen
, Delin Lv
, Mengjiao Liu
:
Variable-based Fault Localization via Enhanced Decision Tree. 41:1-41:32 - Wei Huang
, Xingyu Zhao
, Alec Banks
, Victoria Cox
, Xiaowei Huang
:
Hierarchical Distribution-aware Testing of Deep Learning. 42:1-42:35 - Sicong Cao
, Xiaobing Sun
, Lili Bo
, Rongxin Wu
, Bin Li
, Xiaoxue Wu
, Chuanqi Tao
, Tao Zhang
, Wei Liu
:
Learning to Detect Memory-related Vulnerabilities. 43:1-43:35 - Elkhan Ismayilzada
, Md Mazba Ur Rahman
, Dongsun Kim
, Jooyong Yi
:
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair. 44:1-44:39 - Yuanhang Zhou
, Fuchen Ma
, Yuanliang Chen
, Meng Ren
, Yu Jiang
:
CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing. 45:1-45:28 - Yi Xiang
, Han Huang
, Sizhe Li
, Miqing Li
, Chuan Luo
, Xiaowei Yang
:
Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization. 46:1-46:52 - Han Hu
, Ruiqi Dong
, John Grundy
, Thai Minh Nguyen
, Huaxiao Liu
, Chunyang Chen
:
Automated Mapping of Adaptive App GUIs from Phones to TVs. 47:1-47:31
- Yuejun Guo
, Qiang Hu
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
KAPE: kNN-based Performance Testing for Deep Code Search. 48:1-48:24 - Jiamou Sun
, Zhenchang Xing
, Xin Xia
, Qinghua Lu
, Xiwei Xu
, Liming Zhu
:
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. 49:1-49:38 - Jiawei Liu
, Yuheng Huang
, Zhijie Wang
, Lei Ma
, Chunrong Fang
, Mingzheng Gu
, Xufan Zhang
, Zhenyu Chen
:
Generation-based Differential Fuzzing for Deep Learning Libraries. 50:1-50:28 - Jiho Shin
, Moshi Wei
, Junjie Wang
, Lin Shi
, Song Wang
:
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks. 51:1-51:24
- Siyuan Li
, Yongpan Wang
, Chaopeng Dong
, Shouguo Yang
, Hong Li
, Hao Sun
, Zhe Lang
, Zuxin Chen
, Weijie Wang
, Hongsong Zhu
, Limin Sun
:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. 52:1-52:35 - Rafael Dutra
, Rahul Gopinath
, Andreas Zeller
:
FormatFuzzer: Effective Fuzzing of Binary File Formats. 53:1-53:29
- Yutao Xie
, Jiayi Lin
, Hande Dong
, Lei Zhang
, Zhonghai Wu
:
Survey of Code Search Based on Deep Learning. 54:1-54:42 - Quanjun Zhang
, Chunrong Fang
, Yuxiang Ma
, Weisong Sun
, Zhenyu Chen
:
A Survey of Learning-based Automated Program Repair. 55:1-55:69
Volume 33, Number 3, March 2024
- Ya Xiao
, Wenjia Song
, Salman Ahmed
, Xinyang Ge
, Bimal Viswanath
, Na Meng
, Danfeng (Daphne) Yao
:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. 56:1-56:30 - Daniel Russo
, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-Being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic. 57:1-57:44 - Andre Lustosa
, Tim Menzies
:
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health. 58:1-58:22 - Yanming Yang
, Xing Hu
, Xin Xia
, Xiaohu Yang
:
The Lost World: Characterizing and Detecting Undiscovered Test Smells. 59:1-59:32 - Guang Yang
, Yu Zhou
, Wenhua Yang
, Tao Yue
, Xiang Chen
, Taolue Chen
:
How Important Are Good Method Names in Neural Code Generation? A Model Robustness Perspective. 60:1-60:35 - Jiajun Jiang
, Junjie Yang
, Yingyi Zhang
, Zan Wang
, Hanmo You
, Junjie Chen
:
A Post-training Framework for Improving the Performance of Deep Learning Models via Model Transformation. 61:1-61:41 - Jia Li
, Zhuo Li
, Huangzhao Zhang
, Ge Li
, Zhi Jin
, Xing Hu
, Xin Xia
:
Poison Attack and Poison Detection on Deep Source Code Processing Models. 62:1-62:31 - Wen Li
, Austin Marino
, Haoran Yang
, Na Meng
, Li Li
, Haipeng Cai
:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. 63:1-63:46 - Sangeeth Kochanthara
, Tajinder Singh
, Alexandru Forrai
, Loek Cleophas
:
Safety of Perception Systems for Automated Driving: A Case Study on Apollo. 64:1-64:28 - Armin Zirak
, Hadi Hemmati
:
Improving Automated Program Repair with Domain Adaptation. 65:1-65:43 - Wensheng Tang
, Dejun Dong
, Shijie Li, Chengpeng Wang
, Peisen Yao
, Jinguo Zhou
, Charles Chuan Zhang
:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. 66:1-66:33 - Tingwei Zhu
, Zhong Li
, Minxue Pan
, Chaoxuan Shi
, Tian Zhang
, Yu Pei
, Xuandong Li
:
Deep Is Better? An Empirical Comparison of Information Retrieval and Deep Learning Approaches to Code Summarization. 67:1-67:37 - Zhe Zhao
, Guangke Chen
, Tong Liu
, Taishan Li
, Fu Song
, Jingyi Wang
, Jun Sun
:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. 68:1-68:45 - Junda He
, Xin Zhou
, Bowen Xu
, Ting Zhang
, Kisub Kim
, Zhou Yang
, Ferdian Thung
, Ivana Clairine Irsan
, David Lo
:
Representation Learning for Stack Overflow Posts: How Far Are We? 69:1-69:24 - Binhang Qi
, Hailong Sun
, Hongyu Zhang
, Xiang Gao
:
Reusing Convolutional Neural Network Models through Modularization and Composition. 70:1-70:39 - Md Rakib Hossain Misu
, Rohan Achar
, Cristina V. Lopes
:
SourcererJBF: A Java Build Framework For Large-Scale Compilation. 71:1-71:35
- Zhihao Li
, Chuanyi Li
, Ze Tang
, Wanhong Huang
, Jidong Ge
, Bin Luo
, Vincent Ng
, Ting Wang
, Yucheng Hu
, Xiaopeng Zhang
:
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation. 72:1-72:30 - Matteo Biagiola
, Paolo Tonella
:
Testing of Deep Reinforcement Learning Agents with Surrogate Models. 73:1-73:33 - Luca Giamattei
, Antonio Guerriero
, Roberto Pietrantuono
, Stefano Russo
:
Causality-driven Testing of Autonomous Driving Systems. 74:1-74:35 - Weisong Sun
, Chunrong Fang
, Yuchen Chen
, Quanjun Zhang
, Guanhong Tao
, Yudu You
, Tingxu Han
, Yifei Ge
, Yuling Hu
, Bin Luo
, Zhenyu Chen
:
An Extractive-and-Abstractive Framework for Source Code Summarization. 75:1-75:39 - Will Leeson
, Matthew B. Dwyer
:
Algorithm Selection for Software Verification Using Graph Neural Networks. 76:1-76:36 - Hichem Belgacem
, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
Learning-based Relaxation of Completeness Requirements for Data Entry Forms. 77:1-77:32
- Michael Fu
, Van Nguyen
, Chakkrit Tantithamthavorn
, Dinh Phung
, Trung Le
:
Vision Transformer Inspired Automated Vulnerability Repair. 78:1-78:29 - Pengfei Gao
, Fu Song
, Taolue Chen
:
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks. 79:1-79:38
- Aastha Pant
, Rashina Hoda
, Simone V. Spiegler
, Chakkrit Tantithamthavorn
, Burak Turhan
:
Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges. 80:1-80:35
- Johan Cederbladh
, Antonio Cicchetti
, Jagadish Suryadevara
:
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review. 81:1-81:67
- Daniel Russo
, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic - RCR Report. 82:1-82:4
Volume 33, Number 4, May 2024
- Mauro Pezzè
:
Editorial: ICSE and the Incredible Contradictions of Software Engineering. 83:1-83:2 - Weifeng Pan
, Marouane Kessentini
, Ming Hua, Zijiang Yang
:
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches. 84:1-84:43 - Chidera Biringa
, Gökhan Kul
:
PACE: A Program Analysis Framework for Continuous Performance Prediction. 85:1-85:23 - Peng Zhang
, Yang Wang
, Xutong Liu
, Zeyu Lu
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Ziyuan Wang
, Chang-Ai Sun
, Xiao Yu
, Yuming Zhou
:
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? 86:1-86:32 - Alessio Ferrari
, Thaide Huichapa
, Paola Spoletini
, Nicole Novielli
, Davide Fucci
, Daniela Girardi
:
Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews. 87:1-87:36 - Sai Anirudh Karre
, Y. Raghu Reddy
, Raghav Mittal
:
RE Methods for Virtual Reality Software Product Development: A Mapping Study. 88:1-88:31 - Zhe Chen
, Rui Yan
, Yingzi Ma
, Yulei Sui
, Jingling Xue
:
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety. 89:1-89:47 - Pablo C. Cañizares
, Jose María López-Morales
, Sara Pérez-Soler
, Esther Guerra
, Juan de Lara
:
Measuring and Clustering Heterogeneous Chatbot Designs. 90:1-90:43 - Bentley James Oakes
, Michalis Famelis
, Houari A. Sahraoui
:
Building Domain-Specific Machine Learning Workflows: A Conceptual Framework for the State of the Practice. 91:1-91:50 - Changjie Shao
, Gaolei Li
, Jun Wu
, James Xi Zheng
:
Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based Software Vulnerability Detection. 92:1-92:28 - Baharin Aliashrafi Jodat
, Abhishek Chandar
, Shiva Nejati
, Mehrdad Sabetzadeh
:
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures. 93:1-93:32 - Neelofar
, Aldeida Aleti
:
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features. 94:1-94:32 - Donato Clun
, Donghwan Shin
, Antonio Filieri
, Domenico Bianculli
:
Rigorous Assessment of Model Inference Accuracy using Language Cardinality. 95:1-95:39 - Anshunkang Zhou
, Yikun Hu
, Xiangzhe Xu
, Charles Zhang
:
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation. 96:1-96:31 - Kai Gao
, Runzhi He
, Bing Xie
, Minghui Zhou
:
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement. 97:1-97:27 - Shaiful Alam Chowdhury
, Gias Uddin
, Hadi Hemmati
, Reid Holmes
:
Method-level Bug Prediction: Problems and Promises. 98:1-98:31 - Qunying Song
, Emelie Engström
, Per Runeson
:
Industry Practices for Challenging Autonomous Driving Systems with Critical Scenarios. 99:1-99:35 - Mingxuan Zhu
, Dan Hao
, Junjie Chen
:
Compiler Autotuning through Multiple-phase Learning. 100:1-100:38 - Taijara Loiola de Santana
, Paulo Anselmo da Mota Silveira Neto
, Eduardo Santana De Almeida
, Iftekhar Ahmed
:
Bug Analysis in Jupyter Notebook Projects: An Empirical Study. 101:1-101:34 - Zhenfei Huang
, Junjie Chen
, Jiajun Jiang
, Yihua Liang
, Hanmo You
, Fengjie Li
:
Mapping APIs in Dynamic-typed Programs by Leveraging Transfer Learning. 102:1-102:29
- Sungmin Kang
, Robert Feldt
, Shin Yoo
:
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders. 103:1-103:24 - Han Wang
, Sijia Yu
, Chunyang Chen
, Burak Turhan
, Xiaodong Zhu
:
Beyond Accuracy: An Empirical Study on Unit Testing in Open-source Deep Learning Projects. 104:1-104:22 - Shikai Guo
, Dongmin Li
, Lin Huang
, Sijia Lv
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction. 105:1-105:25 - Hanyang Guo
, Yingye Chen
, Xiangping Chen
, Yuan Huang
, Zibin Zheng
:
Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization. 106:1-106:31
- Davide Pizzolotto
, Stefano Berlato
, Mariano Ceccato
:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. 107:1-107:38 - Puzhuo Liu
, Yaowen Zheng
, Chengnian Sun
, Hong Li
, Zhi Li
, Limin Sun
:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. 108:1-108:26
- Hashini Gunatilake
, John C. Grundy
, Rashina Hoda
, Ingo Mueller
:
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study. 109:1-109:41 - Xin Tan
, Xinyue Lv
, Jing Jiang
, Li Zhang
:
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share. 110:1-110:28