


default search action
IEEE Transactions on Software Engineering, Volume 45
Volume 45, Number 1, January 2019
- Nenad Medvidovic
:
Editorial: State of the Journal. 1 - Andrea Margheri
, Massimiliano Masi
, Rosario Pugliese
, Francesco Tiezzi
:
A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies. 2-33 - Luca Gazzola, Daniela Micucci
, Leonardo Mariani
:
Automatic Software Repair: A Survey. 34-67 - Simone Scalabrino
, Gabriele Bavota
, Barbara Russo
, Massimiliano Di Penta
, Rocco Oliveto
:
Listening to the Crowd for the Release Planning of Mobile Apps. 68-86 - Eirini Kalliamvakou
, Christian Bird, Thomas Zimmermann
, Andrew Begel
, Robert DeLine, Daniel M. Germán:
What Makes a Great Manager of Software Engineers? 87-106
Volume 45, Number 2, February 2019
- Seyedrebvar Hosseini
, Burak Turhan
, Dimuthu Gunarathna
:
A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction. 111-147 - Hong Lu, Shuai Wang
, Tao Yue
, Shaukat Ali
, Jan F. Nygård
:
Automated Refactoring of OCL Constraints with Search. 148-170 - Yao Pan
, Jules White, Yu Sun, Jeff Gray
:
Gray Computing: A Framework for Computing with Background JavaScript Tasks. 171-193 - Fabio Palomba
, Marco Zanoni
, Francesca Arcelli Fontana
, Andrea De Lucia
, Rocco Oliveto
:
Toward a Smell-Aware Bug Prediction Model. 194-218
Volume 45, Number 3, March 2019
- Jonathan Dorn
, Jeremy Lacomis
, Westley Weimer, Stephanie Forrest
:
Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs. 219-236 - Klaas-Jan Stol
, Bora Caglayan, Brian Fitzgerald
:
Competition-Based Crowdsourcing Software Development: A Multi-Method Study from a Customer Perspective. 237-260 - Moritz Beller
, Georgios Gousios
, Annibale Panichella
, Sebastian Proksch
, Sven Amann
, Andy Zaidman
:
Developer Testing in the IDE: Patterns, Beliefs, and Behavior. 261-284 - Narayan Ramasubbu
, Chris F. Kemerer
:
Integrating Technical Debt Management and Software Quality Management Processes: A Normative Framework and Field Tests. 285-300 - Ruizhi Gao
, W. Eric Wong
:
MSeer - An Advanced Technique for Locating Multiple Bugs in Parallel. 301-318
Volume 45, Number 4, April 2019
- Hao Zhong
, Hong Mei
:
An Empirical Study on API Usages. 319-334 - Sadeeq Jan
, Annibale Panichella
, Andrea Arcuri, Lionel C. Briand
:
Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications. 335-362 - Alessandro Marchetto
, Giuseppe Scanniello
, Angelo Susi
:
Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction. 363-390 - Zhiqiang Li
, Xiao-Yuan Jing
, Xiaoke Zhu
, Hongyu Zhang
, Baowen Xu
, Shi Ying:
On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction. 391-411 - Robert Clarisó
, Carlos A. González
, Jordi Cabot
:
Smart Bound Selection for the Verification of UML/OCL Class Diagrams. 412-426
Volume 45, Number 5, May 2019
- Phil McMinn
, Chris J. Wright
, Colton J. McCurdy, Gregory M. Kapfhammer:
Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas. 427-463 - Marcel Böhme
, Van-Thuan Pham
, Abhik Roychoudhury
:
Coverage-Based Greybox Fuzzing as Markov Chain. 489-506 - Paolo Arcaini
, Angelo Gargantini
, Elvinia Riccobene
:
Decomposition-Based Approach for Model-Based Test Generation. 507-520 - Sylvain Frey
, Awais Rashid
, Pauline Anthonysamy, Maria Pinto-Albuquerque
, Syed Asad Naqvi:
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. 521-536 - Luca Ponzanelli
, Gabriele Bavota
, Andrea Mocci
, Rocco Oliveto
, Massimiliano Di Penta
, Sonia Haiduc, Barbara Russo
, Michele Lanza
:
Automatic Identification and Classification of Software Development Video Tutorial Fragments. 464-488
Volume 45, Number 6, June 2019
- Xiaofei Xie
, Bihuan Chen
, Liang Zou, Yang Liu
, Wei Le
, Xiaohong Li
:
Automatic Loop Summarization via Path Dependency Analysis. 537-557 - Tingting Yu
, Wei Wen, Xue Han
, Jane Huffman Hayes
:
ConPredictor: Concurrency Defect Prediction in Real-World Applications. 558-575 - Luca Mottola
, Gian Pietro Picco
, Felix Jonathan Oppermann, Joakim Eriksson, Niclas Finne, Harald Fuchs, Andrea Gaglione
, Stamatis Karnouskos
, Patricio Moreno Montero, Nina Oertel, Kay Römer
, Patrik Spieß, Stefano Tranquillini, Thiemo Voigt:
makeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes. 576-596 - Jianfeng Chen
, Vivek Nair
, Rahul Krishna, Tim Menzies
:
"Sampling" as a Baseline Optimizer for Search-Based Software Engineering. 597-614 - Fayola Peters
, Thein Than Tun, Yijun Yu
, Bashar Nuseibeh
:
Text Filtering and Ranking for Security Bug Report Prediction. 615-631 - Steffen Herbold
, Alexander Trautsch
, Jens Grabowski:
Correction of "A Comparative Study to Benchmark Cross-Project Defect Prediction Approaches". 632-636
Volume 45, Number 7, July 2019
- Morakot Choetkiertikul
, Hoa Khanh Dam
, Truyen Tran
, Trang Pham
, Aditya Ghose, Tim Menzies
:
A Deep Learning Model for Estimating Story Points. 637-656 - Yuanfang Cai
, Lu Xiao
, Rick Kazman
, Ran Mo, Qiong Feng:
Design Rule Spaces: A New Model for Representing and Analyzing Software Architecture. 657-682 - Chakkrit Tantithamthavorn
, Shane McIntosh
, Ahmed E. Hassan, Kenichi Matsumoto:
The Impact of Automated Parameter Optimization on Defect Prediction Models. 683-711 - Paul Ralph
:
Toward Methodological Guidelines for Process Theories and Taxonomies in Software Engineering. 712-735
Volume 45, Number 8, August 2019
- Dirk van der Linden
, Irit Hadar:
A Systematic Literature Review of Applications of the Physics of Notations. 736-759 - Aurora Ramírez
, José Raúl Romero
, Christopher L. Simons
:
A Systematic Review of Interaction in Search-Based Software Engineering. 760-781 - Wei Song
, Xiaoxing Ma
, Hans-Arno Jacobsen
:
Instance Migration Validity for Dynamic Evolution of Data-Aware Processes. 782-801 - Michael D. Harrison
, Paolo Masci
, José Creissac Campos
:
Verification Templates for the Analysis of User Interface Software Design. 802-822 - Lingfeng Bao, Zhenchang Xing, Xin Xia
, David Lo
:
VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System. 823-838
Volume 45, Number 9, September 2019
- Maleknaz Nayebi
, Guenther Ruhe:
Asymmetric Release Planning: Compromising Satisfaction against Dissatisfaction. 839-857 - Guido Chari
, Diego Garbervetsky, Stefan Marr
, Stéphane Ducasse
:
Fully Reflective Execution Environments: Virtual Machines for More Flexible Software. 858-876 - Justin Smith
, Brittany Johnson, Emerson R. Murphy-Hill
, Bill Chu, Heather Richter Lipford:
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool. 877-897 - Jie Zhang
, Lingming Zhang, Mark Harman, Dan Hao
, Yue Jia, Lu Zhang:
Predictive Mutation Testing. 898-918 - Reza Matinnejad, Shiva Nejati
, Lionel C. Briand
, Thomas Bruckmann:
Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior. 919-944
Volume 45, Number 10, October 2019
- Stanislav Dashevskyi
, Achim D. Brucker
, Fabio Massacci
:
A Screening Test for Disclosed Vulnerabilities in FOSS Components. 945-966 - Mostafa Mesgari
, Chitu Okoli
, Ana Ortiz de Guinea
:
Creating Rich and Representative Personas by Discovering Affordances. 967-983 - Pan Bian
, Bin Liang, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai
:
Detecting Bugs by Discovering Expectations and Their Violations. 984-1001 - Thong Hoang
, Richard Jayadi Oentaryo, Tien-Duy B. Le, David Lo
:
Network-Clustered Multi-Modal Bug Localization. 1002-1023 - Francis Palma
, Naouel Moha, Yann-Gaël Guéhéneuc:
UniDoSA: The Unified Specification and Detection of Service Antipatterns. 1024-1053
Volume 45, Number 11, November 2019
- Qi Luo
, Kevin Moran, Lingming Zhang, Denys Poshyvanyk
:
How Do Static and Dynamic Test Case Prioritization Techniques Perform on Modern Software Systems? An Extensive Study on GitHub Projects. 1054-1080 - Rahul Krishna
, Tim Menzies
:
Bellwethers: A Baseline Method for Transfer Learning. 1081-1105 - Thomas D. LaToza
, Arturo Di Lecce, Fabio Ricci, W. Ben Towne
, André van der Hoek
:
Microtask Programming. 1106-1124 - Yinxing Xue
, Zhengzi Xu
, Mahinthan Chandramohan, Yang Liu
:
Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation. 1125-1149 - Bobby R. Bruce
, Justyna Petke
, Mark Harman, Earl T. Barr
:
Approximate Oracles and Synergy in Software Energy Search Spaces. 1150-1169
Volume 45, Number 12, December 2019
- Sven Amann
, Hoan Anh Nguyen
, Sarah Nadi
, Tien N. Nguyen, Mira Mezini:
A Systematic Evaluation of Static API-Misuse Detectors. 1170-1188 - Osama Al-Baik
, James Miller
:
Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations. 1189-1210 - Meng Yan
, Xin Xia
, Emad Shihab, David Lo
, Jianwei Yin, Xiaohu Yang
:
Automating Change-Level Self-Admitted Technical Debt Determination. 1211-1229 - Gerardo Canfora
, Fabio Martinelli, Francesco Mercaldo
, Vittoria Nardone, Antonella Santone
, Corrado Aaron Visaggio:
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour. 1230-1252 - Qinbao Song, Yuchen Guo
, Martin J. Shepperd
:
A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction. 1253-1269 - Hanefi Mercan
, Cemal Yilmaz
, Kamer Kaya:
CHiP: A Configurable Hybrid Parallel Covering Array Constructor. 1270-1291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.