default search action
IEEE Transactions on Software Engineering, Volume 40
Volume 40, Number 1, January 2014
- Bashar Nuseibeh:
Signing Off: The State of the Journal. 1-3 - Huai Liu, Fei-Ching Kuo, Dave Towey, Tsong Yueh Chen:
How Effectively Does Metamorphic Testing Alleviate the Oracle Problem? 4-22 - Lech Madeyski, Wojciech Orzeszyna, Richard Torkar, Mariusz Jozala:
Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation. 23-42 - Cemal Yilmaz, Emine Dumlu, Myra B. Cohen, Adam A. Porter:
Reducing Masking Effects in CombinatorialInteraction Testing: A Feedback DrivenAdaptive Approach. 43-66 - Christian Kästner, Alexander Dreiling, Klaus Ostermann:
Variability Mining: Consistent Semi-automatic Detection of Product-Line Features. 67-82 - Leandro L. Minku, Dirk Sudholt, Xin Yao:
Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis. 83-102
Volume 40, Number 2, February 2014
- Yulei Sui, Ding Ye, Jingling Xue:
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis. 107-122 - François Taïani, Shen Lin, Gordon S. Blair:
GossipKit: A Unified ComponentFramework for Gossip. 123-136 - Shang-Wei Lin, Étienne André, Yang Liu, Jun Sun, Jin Song Dong:
Learning Assumptions for CompositionalVerification of Timed Systems. 137-153 - Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. 154-166 - Immanuel Trummer, Boi Faltings, Walter Binder:
Multi-Objective Quality-Driven Service Selection - A Fully Polynomial Time Approximation Scheme. 167-191 - Qiang He, Jun Yan, Hai Jin, Yun Yang:
Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction. 192-215
Volume 40, Number 3, March 2014
- Bao N. Nguyen, Atif M. Memon:
An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input Spaces. 216-234 - Narayan Ramasubbu:
Governing Software Process Improvementsin Globally Distributed Product Development. 235-250 - Charles Song, Adam A. Porter, Jeffrey S. Foster:
iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees. 251-265 - Yan Cai, W. K. Chan:
Magiclock: Scalable Detection ofPotential Deadlocks in Large-ScaleMultithreaded Programs. 266-281 - Matthias Galster, Danny Weyns, Dan Tofan, Bartosz Michalik, Paris Avgeriou:
Variability in Software Systems - A Systematic Literature Review. 282-306 - Alex Groce, Todd Kulesza, Chaoqiang Zhang, Shalini Shamasunder, Margaret M. Burnett, Weng-Keen Wong, Simone Stumpf, Shubhomoy Das, Amber Shinsel, Forrest Bice, Kevin McIntosh:
You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems. 307-323
Volume 40, Number 4, April 2014
- David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania:
A Model-Driven Methodology for Developing Secure Data-Management Applications. 324-337 - Christophe Damas, Bernard Lambeau, Axel van Lamsweerde:
Analyzing Critical Decision-Based Processes. 338-365 - Sarah Rastkar, Gail C. Murphy, Gabriel Murray:
Automatic Summarization of Bug Reports. 366-380 - Roberto Latorre:
Effects of Developer Experience on Learningand Applying Unit Test-Driven Development. 381-395 - Junpeng Lv, Bei-Bei Yin, Kai-Yuan Cai:
On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment. 396-412 - Saehwa Kim:
Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation. 413-426
Volume 40, Number 5, May 2014
- Yu Pei, Carlo A. Furia, Martin Nordio, Yi Wei, Bertrand Meyer, Andreas Zeller:
Automated Fixing of Programs with Contracts. 427-449 - Les Hatton:
Conservation of Information: Software'sHidden Clockwork? 450-460 - Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider, Steven Versteeg:
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems. 461-482 - Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto, Koichi Takahashi:
Modular Software Model Checking for Distributed Systems. 483-501 - Venera Arnaoudova, Laleh Mousavi Eshkevari, Massimiliano Di Penta, Rocco Oliveto, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
REPENT: Analyzing the Nature of Identifier Renamings. 502-532
Volume 40, Number 6, June 2014
- Ayse Tosun Misirli, Ayse Basar Bener:
Bayesian Networks For Evidence-Based Decision-Making in Software Engineering. 533-554 - Juan Manuel Vara, Verónica Andrea Bollati, Álvaro Jiménez, Esperanza Marcos:
Dealing with Traceability in the MDDof Model Transformations. 555-583 - Jonathan Lee, Kuo-Hsun Hsu:
GEA: A Goal-Driven Approach toDiscovering Early Aspects. 584-602 - Martin J. Shepperd, David Bowes, Tracy Hall:
Researcher Bias: The Use of Machine Learning in Software Defect Prediction. 603-616 - Alexandre Bartel, Jacques Klein, Martin Monperrus, Yves Le Traon:
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android. 617-632
Volume 40, Number 7, July 2014
- Miryung Kim, Thomas Zimmermann, Nachiappan Nagappan:
An Empirical Study of RefactoringChallenges and Benefits at Microsoft. 633-649 - Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, Patrick Heymans, Yves Le Traon:
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines. 650-670 - Gabriele Bavota, Rocco Oliveto, Malcom Gethers, Denys Poshyvanyk, Andrea De Lucia:
Methodbook: Recommending Move Method Refactorings via Relational Topic Models. 671-694 - JaeSeung Song, Cristian Cadar, Peter R. Pietzuch:
SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications. 695-709 - Peter Collingbourne, Cristian Cadar, Paul H. J. Kelly:
Symbolic Crosschecking of Data-Parallel Floating-Point Code. 710-737
Volume 40, Number 8, August 2014
- Matej Hertis, Matjaz B. Juric:
An Empirical Analysis of Business Process Execution Language Usage. 738-757 - Narayan Ramasubbu, Chris F. Kemerer:
Managing Technical Debt in EnterpriseSoftware Packages. 758-772 - Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:
Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time. 773-794 - Gregorio Díaz, María-Emilia Cambronero, Enrique Martínez, Gerardo Schneider:
Specification and Verification of NormativeTexts Using C-O Diagrams. 795-817 - Henrik Leopold, Jan Mendling, Artem Polyvyanyy:
Supporting Process Model Validation through Natural Language Generation. 818-840
Volume 40, Number 9, September 2014
- Wael Kessentini, Marouane Kessentini, Houari A. Sahraoui, Slim Bechikh, Ali Ouni:
A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection. 841-861 - Ismael Rodríguez, Luis Llana, Pablo Rabanal:
A General Testability Theory: Classes, Properties, Complexity, and Testing Reductions. 862-894 - David Fernández-Amorós, Ruben Heradio, José Antonio Cerrada, Carlos Cerrada:
A Scalable Approach to Exact Model and Commonality Counting for Extended Feature Models. 895-910 - Yepang Liu, Chang Xu, Shing-Chi Cheung, Jian Lu:
GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications. 911-940
Volume 40, Number 10, October 2014
- Erik Casagrande, Selamawit Woldeamlak, Wei Lee Woon, Hatem H. Zeineldin, Davor Svetinovic:
NLP-KAOS for Systems Goal Elicitation: Smart Metering System Case Study. 941-956 - Ying-Dar Lin, José F. Rojas, Edward T.-H. Chu, Yuan-Cheng Lai:
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices. 957-970 - Wladimir Araujo, Lionel C. Briand, Yvan Labiche:
On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object-Oriented Software. 971-992 - Riccardo Scandariato, James Walden, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. 993-1006 - Tim Miller, Bin Lu, Leon Sterling, Ghassan Beydoun, Kuldar Taveter:
Requirements Elicitation and Specification Using the Agent Paradigm: The Case Study of an Aircraft Turnaround Simulator. 1007-1024 - Arilo Claudio Dias-Neto, Guilherme Horta Travassos:
Supporting the Combined Selection of Model-Based Testing Techniques. 1025-1041
Volume 40, Number 11, November 2014
- Jesús Sánchez Cuadrado, Esther Guerra, Juan de Lara:
A Component Model for Model Transformations. 1042-1060 - Sebastian Draxler, Gunnar Stevens, Alexander Boden:
Keeping the Development Environment Up to Date - A Study of the Situated Practices of Appropriating the Eclipse IDE. 1061-1074 - Chu-Ti Lin, Yan-Fu Li:
Rate-Based Queueing Simulation Model of Open Source Software Debugging Activities. 1075-1099 - Dimitrios Athanasiou, Ariadi Nugroho, Joost Visser, Andy Zaidman:
Test Code Quality and Its Relation to Issue Handling Performance. 1100-1125 - Barthélémy Dagenais, Martin P. Robillard:
Using Traceability Links to Recommend Adaptive Changes for Documentation Evolution. 1126-1146
Volume 40, Number 12, December 2014
- Fabio Massacci, Viet Hung Nguyen:
An Empirical Methodology to Evaluate Vulnerability Discovery Models. 1147-1162 - Gunnar R. Bergersen, Dag I. K. Sjøberg, Tore Dybå:
Construction and Validation of an Instrument for Measuring Programming Skill. 1163-1184 - Emilio Coppa, Camil Demetrescu, Irene Finocchi:
Input-Sensitive Profiling. 1185-1205 - Cong Tian, Zhenhua Duan, Zhao Duan:
Making CEGAR More Efficient in Software Model Checking. 1206-1223 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:
Model-Transformation Design Patterns. 1224-1259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.