


default search action
IEEE Transactions on Software Engineering, Volume 49
Volume 49, Number 1, January 2023
- Zhongxin Liu

, Xin Xia
, David Lo
, Meng Yan
, Shanping Li:
Just-In-Time Obsolete Comment Detection and Update. 1-23 - Aayush Garg

, Milos Ojdanic, Renzo Degiovanni
, Thierry Titcheu Chekam, Mike Papadakis
, Yves Le Traon
:
Cerebro: Static Subsuming Mutant Selection. 24-43 - Emanuele Iannone

, Roberta Guadagni, Filomena Ferrucci
, Andrea De Lucia
, Fabio Palomba
:
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. 44-63 - Simon Larsén

, Jean-Rémy Falleri
, Benoit Baudry
, Martin Monperrus
:
Spork: Structured Merge for Java With Formatting Preservation. 64-83 - Yingquan Zhao

, Zan Wang
, Shuang Liu
, Jun Sun
, Junjie Chen
, Xiang Chen
:
Achieving High MAP-Coverage Through Pattern Constraint Reduction. 99-112 - Yanjie Zhao

, Li Li
, Haoyu Wang, Qiang He
, John C. Grundy
:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. 113-130 - Anjana Perera

, Aldeida Aleti
, Burak Turhan
, Marcel Böhme
:
An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing. 131-146 - Zimin Chen

, Steve Kommrusch
, Martin Monperrus
:
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. 147-165 - Ellen Arteca

, Max Schäfer, Frank Tip
:
Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs. 166-184 - Ying Wang

, Yibo Wang, Sinan Wang, Yepang Liu
, Chang Xu
, Shing-Chi Cheung
, Hai Yu
, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. 185-210 - Marco Hoffmann

, Daniel Méndez
, Fabian Fagerholm
, Anton Luckhardt
:
The Human Side of Software Engineering Teams: An Investigation of Contemporary Challenges. 211-225 - Huaijin Wang

, Pingchuan Ma, Yuanyuan Yuan
, Zhibo Liu
, Shuai Wang
, Qiyi Tang
, Sen Nie, Shi Wu:
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking. 226-250 - Juan M. Ferreira

, Francy D. Rodríguez
, Adrián Santos
, Oscar Dieste
, Silvia Teresita Acuña, Natalia Juristo:
Impact of Usability Mechanisms: A Family of Experiments on Efficiency, Effectiveness and User Satisfaction. 251-267 - Sadia Tabassum

, Leandro L. Minku
, Danyi Feng
:
Cross-Project Online Just-In-Time Software Defect Prediction. 268-287 - Ying Zhang

, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao
, Na Meng
:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? 288-303 - Ai Liu

, Shaoying Liu
:
Enhancing the Capability of Testing-Based Formal Verification by Handling Operations in Software Packages. 304-324 - Damian A. Tamburri

, Rick Kazman
, Hamed Fahimi:
On the Relationship Between Organizational Structure Patterns and Architecture in Agile Teams. 325-347 - Juan C. Alonso

, Alberto Martin-Lopez
, Sergio Segura
, José María García
, Antonio Ruiz-Cortés
:
ARTE: Automated Generation of Realistic Test Inputs for Web APIs. 348-363 - Ranci Ren, John W. Castro

, Adrián Santos
, Oscar Dieste
, Silvia Teresita Acuña:
Using the SOCIO Chatbot for UML Modelling: A Family of Experiments. 364-383 - Chengjie Lu

, Yize Shi, Huihui Zhang, Man Zhang
, Tiexin Wang
, Tao Yue
, Shaukat Ali
:
Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions. 384-402 - Zhe Liu

, Chunyang Chen
, Junjie Wang
, Yuekai Huang, Jun Hu, Qing Wang
:
Nighthawk: Fully Automated Localizing UI Display Issues via Visual Understanding. 403-418 - Emily Winter

, Vesna Nowack
, David Bowes
, Steve Counsell
, Tracy Hall
, Sæmundur Óskar Haraldsson
, John R. Woodward
:
Let's Talk With Developers, Not About Developers: A Review of Automatic Program Repair Research. 419-436 - Hao Li

, Filipe Roseiro Côgo, Cor-Paul Bezemer
:
An Empirical Study of Yanked Releases in the Rust Package Registry. 437-449 - Leping Li

, Hui Liu
, Kejun Li, Yanjie Jiang, Rui Sun:
Generating Concise Patches for Newly Released Programming Assignments. 450-467 - Chanathip Pornprasit

, Chakkrit Kla Tantithamthavorn
:
DeepLineDP: Towards a Deep Learning Approach for Line-Level Defect Prediction. 84-98
Volume 49, Number 2, February 2023
- Youssef Esseddiq Ouatiti

, Mohammed Sayagh
, Noureddine Kerzazi, Ahmed E. Hassan:
An Empirical Study on Log Level Prediction for Multi-Component Systems. 473-484 - Sharmin Afrose

, Ya Xiao, Sazzadur Rahaman, Barton P. Miller
, Danfeng Yao
:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. 485-497 - Neng Zhang

, Ying Zou, Xin Xia
, Qiao Huang, David Lo
, Shanping Li:
Web APIs: Features, Issues, and Expectations - A Large-Scale Empirical Study of Web APIs From Two Publicly Accessible Registries Using Stack Overflow and a User Survey. 498-528 - Yang Yue

, Yi Wang
, David F. Redmiles:
Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer's Early Career. 529-548 - Jesús Manuel Almendros-Jiménez

, Antonio Becerra-Terón
, Mercedes G. Merayo
, Manuel Núñez
:
Using Metamorphic Testing to Improve the Quality of Tags in OpenStreetMap. 549-563 - Jianlei Chi

, Yu Qu
, Ting Liu
, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. 564-585 - Shiran Liu

, Zhaoqiang Guo, Yanhui Li
, Chuanqi Wang, Lin Chen
, Zhongbin Sun, Yuming Zhou
, Baowen Xu
:
Inconsistent Defect Labels: Essence, Causes, and Influence. 586-610 - Michael Fu

, Chakkrit Tantithamthavorn
:
GPT2SP: A Transformer-Based Agile Story Point Estimation Approach. 611-625 - Haytham Hijazi

, João Durães
, Ricardo Couceiro, João Castelhano
, Raul Barbosa
, Júlio Medeiros
, Miguel Castelo-Branco
, Paulo de Carvalho
, Henrique Madeira
:
Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension. 626-645 - Liyan Song

, Leandro L. Minku
:
A Procedure to Continuously Evaluate Predictive Performance of Just-In-Time Software Defect Prediction Models During Software Development. 646-666 - Sen Chen

, Lingling Fan
, Chunyang Chen
, Yang Liu
:
Automatically Distilling Storyboard With Rich Features for Android Apps. 667-683 - Dongyang Zhan

, Xiangzhan Yu, Hongli Zhang
, Lin Ye
:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. 684-698 - Marthe Nordengen Berntzen

, Rashina Hoda
, Nils Brede Moe
, Viktoria Stray
:
A Taxonomy of Inter-Team Coordination Mechanisms in Large-Scale Agile. 699-718 - Dongjie He

, Jingbo Lu
, Yaoqing Gao
, Jingling Xue
:
Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis. 719-742 - Elias Eid, Nancy A. Day

:
Static Profiling of Alloy Models. 743-759 - Kai Gao

, Zhixing Wang
, Audris Mockus
, Minghui Zhou
:
On the Variability of Software Engineering Needs for Deep Learning: Stages, Trends, and Application Types. 760-776 - Zhou Liao, Shuwei Song

, Hang Zhu, Xiapu Luo
, Zheyuan He, Renkai Jiang, Ting Chen
, Jiachi Chen
, Tao Zhang
, Xiaosong Zhang
:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. 777-801 - Giulio Rossolini

, Alessandro Biondi
, Giorgio C. Buttazzo
:
Increasing the Confidence of Deep Neural Networks by Coverage Analysis. 802-815 - Frank Ebbers

:
A Large-Scale Analysis of IoT Firmware Version Distribution in the Wild. 816-830 - Liushan Chen

, Yu Pei
, Minxue Pan
, Tian Zhang, Qixin Wang, Carlo A. Furia
:
Program Repair With Repeated Learning. 831-848 - Xunhui Zhang

, Yue Yu
, Georgios Gousios
, Ayushi Rastogi
:
Pull Request Decisions Explained: An Empirical Overview. 849-871 - Barbara A. Kitchenham

, Lech Madeyski
, David Budgen
:
How Should Software Engineering Secondary Studies Include Grey Material? 872-882 - Ricardo Amaro

, Rúben Pereira, Miguel Mira da Silva
:
Capabilities and Practices in DevOps: A Multivocal Literature Review. 883-901 - Shenghui Gu

, Guoping Rong
, He Zhang, Haifeng Shen
:
Logging Practices in Software Engineering: A Systematic Mapping Study. 902-923 - Yutong Zhao

, Lu Xiao
, Andre B. Bondi
, Bihuan Chen
, Yang Liu
:
A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects. 924-946
Volume 49, Number 3, March 2023
- Yao Zhang

, Xiaofei Xie
, Yi Li
, Yun Lin
, Sen Chen
, Yang Liu
, Xiaohong Li
:
Demystifying Performance Regressions in String Solvers. 947-961 - Néstor Cataño

:
Program Synthesis for Cyber-Resilience. 962-972 - Maria Angela Ferrario

, Emily Winter
:
Applying Human Values Theory to Software Engineering Practice: Lessons and Implications. 973-990 - Xinhai Zhang

, Jianbo Tao, Kaige Tan
, Martin Törngren
, José Manuel Gaspar Sánchez, Muhammad Rusyadi Ramli
, Xin Tao
, Magnus Gyllenhammar
, Franz Wotawa
, Naveen Mohan, Mihai Nica, Hermann Felbinger:
Finding Critical Scenarios for Automated Driving Systems: A Systematic Mapping Study. 991-1026 - Markos Viggiato

, Dale Paas, Chris Buzon, Cor-Paul Bezemer
:
Identifying Similar Test Cases That Are Specified in Natural Language. 1027-1043 - Roland Croft

, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. 1044-1063 - Wuxia Jin

, Dinghong Zhong, Yuanfang Cai
, Rick Kazman
, Ting Liu
:
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability. 1064-1085 - Rahul Krishna Yandrapally

, Ali Mesbah
:
Fragment-Based Test Generation for Web Apps. 1086-1101 - José Miguel Horcas

, Daniel Strüber
, Alexandru Burdusel, Jabier Martinez
, Steffen Zschaler
:
We're Not Gonna Break It! Consistency-Preserving Operators for Efficient Product Line Configuration. 1102-1117 - Weifeng Pan

, Ming Hua, Dae-Kyoo Kim
, Zijiang Yang:
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules. 1118-1151 - Elvys Soares

, Márcio Ribeiro
, Rohit Gheyi
, Guilherme Amaral
, André L. M. Santos
:
Refactoring Test Smells With JUnit 5: Why Should Developers Keep Up-to-Date? 1152-1170 - Kashumi Madampe

, Rashina Hoda
, John Grundy
:
The Emotional Roller Coaster of Responding to Requirements Changes in Software Engineering. 1171-1187 - Simin Wang

, Liguo Huang
, Amiao Gao, Jidong Ge
, Tengfei Zhang, Haitao Feng
, Ishna Satyarth
, Ming Li, He Zhang
, Vincent Ng
:
Machine/Deep Learning for Software Engineering: A Systematic Literature Review. 1188-1231 - Pravas Ranjan Bal

, Sandeep Kumar
:
A Data Transfer and Relevant Metrics Matching Based Approach for Heterogeneous Defect Prediction. 1232-1245 - Mattia Fazzini

, Kevin Moran
, Carlos Bernal-Cárdenas
, Tyler Wendland, Alessandro Orso
, Denys Poshyvanyk
:
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps. 1246-1272 - Barbara A. Kitchenham

, Lech Madeyski
, David Budgen
:
SEGRESS: Software Engineering Guidelines for REporting Secondary Studies. 1273-1298 - Kenji Tei

, Yasuyuki Tahara
, Akihiko Ohsuga
:
Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems. 1299-1322 - Ramy Shahin

, Murad Akhundov
, Marsha Chechik:
Annotative Software Product Line Analysis Using Variability-Aware Datalog. 1323-1341 - George G. Cabral

, Leandro L. Minku
:
Towards Reliable Online Just-in-Time Software Defect Prediction. 1342-1358 - Giorgio Di Tizio

, Michele Armellini
, Fabio Massacci
:
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats. 1359-1373 - Dag I. K. Sjøberg

, Gunnar Rye Bergersen
:
Construct Validity in Software Engineering. 1374-1396
Volume 49, Number 4, April 2023
- George Mathew

, Amritanshu Agrawal
, Tim Menzies
:
Finding Trends in Software Research. 1397-1410 - Michaela Greiler

, Margaret-Anne D. Storey
, Abi Noda:
An Actionable Framework for Understanding and Improving Developer Experience. 1411-1425 - Weihan Ou

, Steven H. H. Ding
, Yuan Tian
, Leo Song
:
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification. 1426-1442 - Yanjie Jiang

, Hui Liu
, Xiaoqing Luo, Zhihao Zhu, Xiaye Chi, Nan Niu
, Yuxia Zhang, Yamin Hu
, Pan Bian, Lu Zhang
:
BugBuilder: An Automated Approach to Building Bug Repository. 1443-1463 - Le Yu

, Haoyu Wang, Xiapu Luo
, Tao Zhang
, Kang Liu, Jiachi Chen
, Hao Zhou
, Yutian Tang
, Xusheng Xiao
:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. 1464-1486 - Julian von der Mosel

, Alexander Trautsch
, Steffen Herbold
:
On the Validity of Pre-Trained Transformers for Natural Language Processing in the Software Engineering Domain. 1487-1507 - Kevin Jesse

, Premkumar T. Devanbu
, Anand Ashok Sawant
:
Learning to Predict User-Defined Types. 1508-1522 - Mohannad Alhanahnah

, Clay Stevens
, Bocheng Chen, Qiben Yan
, Hamid Bagheri
:
IoTCom: Dissecting Interaction Threats in IoT Systems. 1523-1539 - Nasif Imtiaz

, Aniqa Khanom, Laurie A. Williams
:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. 1540-1560 - Zhanyao Lei

, Yixiong Chen
, Yang Yang, Mingyuan Xia
, Zhengwei Qi
:
Bootstrapping Automated Testing for RESTful Web Services. 1561-1579 - Antonio Mastropaolo

, Nathan Cooper
, David Nader-Palacio, Simone Scalabrino
, Denys Poshyvanyk
, Rocco Oliveto
, Gabriele Bavota
:
Using Transfer Learning for Code-Related Tasks. 1580-1598 - Elizabeth Dinella

, Todd Mytkowicz, Alexey Svyatkovskiy, Christian Bird
, Mayur Naik, Shuvendu K. Lahiri:
DeepMerge: Learning to Merge Programs. 1599-1614 - Ahmadreza Saboor Yaraghi

, Mojtaba Bagherzadeh, Nafiseh Kahani, Lionel C. Briand
:
Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts. 1615-1639 - Bo Lin

, Shangwen Wang
, Zhongxin Liu
, Xin Xia
, Xiaoguang Mao
:
Predictive Comment Updating With Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach. 1640-1660 - Dongkwan Kim

, Eunsoo Kim, Sang Kil Cha
, Sooel Son
, Yongdae Kim
:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. 1661-1682 - Muhui Jiang

, Qinming Dai, Wenlong Zhang, Rui Chang
, Yajin Zhou
, Xiapu Luo
, Ruoyu Wang, Yang Liu
, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. 1683-1703 - Mostafa Jangali

, Yiming Tang
, Niclas Alexandersson
, Philipp Leitner
, Jinqiu Yang, Weiyi Shang:
Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests. 1704-1725 - Mohammad Alahmadi

:
VID2XML: Automatic Extraction of a Complete XML Data From Mobile Programming Screencasts. 1726-1740 - Yulu Cao

, Lin Chen
, Wanwangying Ma, Yanhui Li
, Yuming Zhou
, Linzhang Wang
:
Towards Better Dependency Management: A First Look at Dependency Smells in Python Projects. 1741-1765 - Abu Naser Masud

:
The Duality in Computing SSA Programs and Control Dependency. 1766-1781 - Carlos Bernal-Cárdenas

, Nathan Cooper
, Madeleine Havranek, Kevin Moran
, Oscar Chaparro
, Denys Poshyvanyk
, Andrian Marcus
:
Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios. 1782-1803 - Pasquale Salza

, Christoph Schwizer, Jian Gu, Harald C. Gall
:
On the Effectiveness of Transfer Learning for Code Search. 1804-1822 - Emily Winter

, David Bowes
, Steve Counsell
, Tracy Hall
, Saemundur O. Haraldsson
, Vesna Nowack
, John R. Woodward
:
How do Developers Really Feel About Bug Fixing? Directions for Automatic Program Repair. 1823-1841 - Zhenya Zhang

, Deyun Lyu
, Paolo Arcaini
, Lei Ma
, Ichiro Hasuo
, Jianjun Zhao:
FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria. 1842-1859 - Ziyuan Zhong

, Gail E. Kaiser
, Baishakhi Ray
:
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles. 1860-1875 - Yun Peng

, Shuqing Li
, Wenwei Gu, Yichen Li
, Wenxuan Wang, Cuiyun Gao
, Michael R. Lyu:
Revisiting, Benchmarking and Exploring API Recommendation: How Far Are We? 1876-1897 - Leonardo A. F. Leite

, Nelson Lago, Claudia de O. Melo, Fabio Kon
, Paulo Meirelles
:
A Theory of Organizational Structures for Development and Infrastructure Professionals. 1898-1911 - Sakina Fatima

, Taher Ahmed Ghaleb
, Lionel C. Briand
:
Flakify: A Black-Box, Language Model-Based Predictor for Flaky Tests. 1912-1927 - Andrea Stocco

, Brian Pulfer, Paolo Tonella
:
Mind the Gap! A Study on the Transferability of Virtual Versus Physical-World Testing of Autonomous Driving Systems. 1928-1940 - Zhiqiang Li

, Hongyu Zhang
, Xiao-Yuan Jing
, Juanying Xie
, Min Guo, Jie Ren
:
DSSDPP: Data Selection and Sampling Based Domain Programming Predictor for Cross-Project Defect Prediction. 1941-1963 - Yao Deng

, James Xi Zheng
, Tianyi Zhang, Huai Liu
, Guannan Lou
, Miryung Kim
, Tsong Yueh Chen
:
A Declarative Metamorphic Testing Framework for Autonomous Driving. 1964-1982 - Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj

, Xiapu Luo
, Haipeng Cai
:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. 1983-2005 - Faizan Khan

, Istvan David
, Dániel Varró
, Shane McIntosh
:
Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study. 2006-2019 - Zoe Kotti

, Georgios Gousios
, Diomidis Spinellis
:
Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis. 2020-2038 - Keila Barbosa

, Ronivaldo Ferreira
, Gustavo Pinto
, Marcelo d'Amorim
, Breno Miranda
:
Test Flakiness Across Programming Languages. 2039-2052 - Ming Wen

, Zifan Xie
, Kaixuan Luo
, Xiao Chen, Yibiao Yang
, Hai Jin
:
Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis. 2053-2068 - Pouria Derakhshanfar

, Xavier Devroey
, Annibale Panichella, Andy Zaidman
, Arie van Deursen
:
Generating Class-Level Integration Tests Using Call Site Information. 2069-2087 - Alejandrina M. Aranda, Oscar Dieste

, José Ignacio Panach
, Natalia Juristo:
Effect of Requirements Analyst Experience on Elicitation Effectiveness: A Family of Quasi-Experiments. 2088-2106 - Zhe Chen

, Qi Zhang, Jun Wu, Junqi Yan, Jingling Xue
:
A Source-Level Instrumentation Framework for the Dynamic Analysis of Memory Safety. 2107-2127 - Mikko Raatikainen

, Quim Motger
, Clara Marie Lüders
, Xavier Franch
, Lalli Myllyaho
, Elina Kettunen
, Jordi Marco
, Juha Tiihonen, Mikko Halonen, Tomi Männistö
:
Improved Management of Issue Dependencies in Issue Trackers of Large Collaborative Projects. 2128-2148 - Hourieh Khalajzadeh

, Mojtaba Shahin
, Humphrey O. Obie, Pragya Agrawal, John C. Grundy
:
Supporting Developers in Addressing Human-Centric Issues in Mobile Apps. 2149-2168 - Toufique Ahmed

, Noah Rose Ledesma, Premkumar T. Devanbu:
SynShine: Improved Fixing of Syntax Errors. 2169-2181 - Enrico Viganò, Oscar Cornejo

, Fabrizio Pastore
, Lionel C. Briand
:
Data-Driven Mutation Analysis for Cyber-Physical Systems. 2182-2201 - Danyllo Albuquerque

, Everton Guimarães
, Graziela Tonin, Pilar Rodríguez
, Mirko Perkusich
, Hyggo O. Almeida, Angelo Perkusich
, Ferdinandy Chagas:
Managing Technical Debt Using Intelligent Techniques - A Systematic Mapping Study. 2202-2220 - Iason Papapanagiotakis-Bousy

, Earl T. Barr
, David Clark
:
PopArt: Ranked Testing Efficiency. 2221-2238 - Shuyao Jiang

, Jiacheng Shen
, Shengnan Wu, Yu Cai, Yue Yu
, Yangfan Zhou
:
Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study. 2239-2254 - Sergio Luis Herrera Gonzalez

, Piero Fraternali
:
Almost Rerere: Learning to Resolve Conflicts in Distributed Projects. 2255-2271 - Jianjun Huang

, Bo Xue
, Jiasheng Jiang
, Wei You
, Bin Liang
, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. 2272-2284 - Xiaowei Zhang

, Weiqin Zou
, Lin Chen
, Yanhui Li
, Yuming Zhou
:
Towards the Analysis and Completion of Syntactic Structure Ellipsis for Inline Comments. 2285-2302 - Achiya Elyasaf

, Tom Yaacov
, Gera Weiss
:
What Petri Nets Oblige us to Say Comparing Approaches for Behavior Composition. 2303-2317 - Xiuting Ge, Shengcheng Yu

, Chunrong Fang
, Qi Zhu, Zhihong Zhao:
Leveraging Android Automated Testing to Assist Crowdsourced Testing. 2318-2336 - Lucas Zamprogno

, Braxton Hall, Reid Holmes
, Joanne M. Atlee:
Dynamic Human-in-the-Loop Assertion Generation. 2337-2351 - An Ran Chen

, Tse-Hsun Peter Chen
, Shaowei Wang
:
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure. 2352-2365 - Luca Di Grazia

, Paul Bredl
, Michael Pradel
:
DiffSearch: A Scalable and Precise Search Engine for Code Changes. 2366-2380 - James Tizard

, Peter Devine, Hechen Wang
, Kelly Blincoe
:
A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management. 2381-2393 - Xu Zhou

, Pengfei Wang
, Chenyifan Liu, Tai Yue
, Yingying Liu, Congxi Song
, Kai Lu, Qidi Yin, Xu Han:
UltraFuzz: Towards Resource-Saving in Distributed Fuzzing. 2394-2412 - Ifeanyi G. Ndukwe

, Sherlock A. Licorish
, Stephen G. MacDonell
:
Perceptions on the Utility of Community Question and Answer Websites Like Stack Overflow to Software Developers. 2413-2425 - Kewen Peng

, Joymallya Chakraborty, Tim Menzies
:
FairMask: Better Fairness via Model-Based Rebalancing of Protected Attributes. 2426-2439 - Lina Gong

, Haoxiang Zhang
, Jingxuan Zhang
, Mingqiang Wei
, Zhiqiu Huang
:
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction. 2440-2458 - Michel Benaroch

, Kalle Lyytinen
:
How Much Does Software Complexity Matter for Maintenance Productivity? The Link Between Team Instability and Diversity. 2459-2475 - Taher Ahmed Ghaleb

, Safwat Hassan
, Ying Zou:
Studying the Interplay Between the Durations and Breakages of Continuous Integration Builds. 2476-2497 - Ioannis Zozas

, Stamatia Bibi
, Apostolos Ampatzoglou
:
Forecasting the Principal of Code Technical Debt in JavaScript Applications. 2498-2512 - Guofu Zhang

, Lei Li, Zhaopin Su
, Zhisheng Shao, Miqing Li
, Bin Li
, Xin Yao
:
New Reliability-Driven Bounds for Architecture-Based Multi-Objective Testing Resource Allocation. 2513-2529 - Zhixing Li

, Yue Yu
, Tao Wang, Yan Lei
, Ying Wang
, Huaimin Wang:
To Follow or Not to Follow: Understanding Issue/Pull-Request Templates on GitHub. 2530-2544 - Yikun Li

, Mohamed Soliman, Paris Avgeriou
, Lou Somers:
Self-Admitted Technical Debt in the Embedded Systems Industry: An Exploratory Case Study. 2545-2565 - Supatsara Wattanakriengkrai

, Dong Wang
, Raula Gaikovina Kula
, Christoph Treude
, Patanamon Thongtanunam
, Takashi Ishio
, Kenichi Matsumoto
:
Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem. 2566-2579 - Pedro Delgado-Pérez

, Aurora Ramírez
, Kevin J. Valle-Gómez
, Inmaculada Medina-Bulo
, José Raúl Romero
:
InterEvo-TR: Interactive Evolutionary Test Generation With Readability Assessment. 2580-2596 - Jingxuan Zhang

, Siyuan Liu, Lina Gong
, Haoxiang Zhang
, Zhiqiu Huang
, He Jiang
:
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System. 2597-2620 - Bernhard Schäfer

, Han van der Aa
, Henrik Leopold
, Heiner Stuckenschmidt
:
Sketch2Process: End-to-End BPMN Sketch Recognition Based on Neural Networks. 2621-2641 - Neelofar

, Kate Smith-Miles
, Mario Andrés Muñoz
, Aldeida Aleti
:
Instance Space Analysis of Search-Based Software Testing. 2642-2660 - José Antonio Hernández López

, Jesús Sánchez Cuadrado
:
Generating Structurally Realistic Models With Deep Autoregressive Networks. 2661-2676 - Vali Tawosi

, Rebecca Moussa
, Federica Sarro
:
Agile Effort Estimation: Have We Solved the Problem Yet? Insights From a Replication Study. 2677-2697 - Max Ellis

, Sarah Nadi
, Danny Dig:
Operation-Based Refactoring-Aware Merging: An Empirical Evaluation. 2698-2721 - Naweiluo Zhou

, Huan Zhou
, Dennis Hoppe:
Containerization for High Performance Computing Systems: Survey and Prospects. 2722-2740 - Claudio Menghi

, Christos Tsigkanos, Mehrnoosh Askarpour, Patrizio Pelliccione
, Gricel Vázquez, Radu Calinescu
, Sergio García:
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties. 2741-2760 - Mohannad Alhanahnah

, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. 2761-2775 - Kexin Pei

, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray
:
Learning Approximate Execution Semantics From Traces for Binary Function Similarity. 2776-2790 - Xiao Wang

, Lu Xiao
, Tingting Yu
, Anne Woepse
, Sunny Wong
:
From Inheritance to Mockito: An Automatic Refactoring Approach. 2791-2814 - Jingzhe Guo

, Mingsheng Ying
:
Software Pipelining for Quantum Loop Programs. 2815-2828 - Kizito Salako

, Xingyu Zhao
:
The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments. 2829-2838 - Shangqing Liu

, Xiaofei Xie
, Jing Kai Siow, Lei Ma
, Guozhu Meng
, Yang Liu
:
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search. 2839-2855 - Rahul Yedida

, Hong Jin Kang
, Huy Tu, Xueqi Yang, David Lo
, Tim Menzies
:
How to Find Actionable Static Analysis Warnings: A Case Study With FindBugs. 2856-2872 - Catia Trubiani

, Riccardo Pinciroli
, Andrea Biaggi
, Francesca Arcelli Fontana
:
Automated Detection of Software Performance Antipatterns in Java-Based Applications. 2873-2891 - Enrique Larios Vargas

, Omar Elazhary
, Soroush Yousefi, Derek Lowlind, Michael L. W. Vliek, Margaret-Anne D. Storey
:
DASP: A Framework for Driving the Adoption of Software Security Practices. 2892-2919 - He Jiang

, Yulong Li
, Shikai Guo
, Xiaochen Li, Tao Zhang
, Hui Li
, Rong Chen
:
DupHunter: Detecting Duplicate Pull Requests in Fork-Based Development. 2920-2940 - Jingling Sun

, Ting Su
, Kai Liu, Chao Peng
, Zhao Zhang
, Geguang Pu
, Tao Xie, Zhendong Su
:
Characterizing and Finding System Setting-Related Defects in Android Apps. 2941-2963 - Kaspar Hageman, Álvaro Feal

, Julien Gamba
, Aniketh Girish
, Jakob Bleier, Martina Lindorfer, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. 2964-2979 - Yibo Wang

, Kai Li
, Yuzhe Tang
, Jiaqi Chen
, Qi Zhang
, Xiapu Luo
, Ting Chen
:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. 2980-2995 - Nikolaos Nikolaidis, Nikolaos Mittas

, Apostolos Ampatzoglou
, Elvira-Maria Arvanitou, Alexander Chatzigeorgiou
:
Assessing TD Macro-Management: A Nested Modeling Statistical Approach. 2996-3007 - Ziyi Zhou

, Huiqun Yu
, Guisheng Fan
, Zijie Huang
, Kang Yang:
Towards Retrieval-Based Neural Code Summarization: A Meta-Learning Approach. 3008-3031
Volume 49, Number 5, May 2023
- Chunrong Fang

, Shengcheng Yu
, Ting Su
, Jing Zhang
, Yuanhan Tian
, Yang Liu
:
Test Report Generation for Android App Testing Via Heterogeneous Data Analysis. 3032-3051 - Weiwei Zhang

, Shengjian Guo, Hongyu Zhang
, Yulei Sui, Yinxing Xue
, Yun Xu:
Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations. 3052-3070 - Shenghui Gu

, Guoping Rong
, Tian Ren, He Zhang
, Haifeng Shen
, Yongda Yu, Xian Li, Jian Ouyang
, Chunan Chen
:
TrinityRCL: Multi-Granular and Code-Level Root Cause Localization Using Multiple Types of Telemetry Data in Microservice Systems. 3071-3088 - Jihee Park

, Sungho Lee
, Jaemin Hong
, Sukyoung Ryu
:
Static Analysis of JNI Programs via Binary Decompilation. 3089-3105 - Xin Tan

, Minghui Zhou
, Li Zhang
:
Understanding Mentors' Engagement in OSS Communities via Google Summer of Code. 3106-3130 - Chaima Boufaied

, Claudio Menghi
, Domenico Bianculli
, Lionel C. Briand
:
Trace Diagnostics for Signal-Based Temporal Properties. 3131-3154 - Ying Wang

, Peng Sun
, Lin Pei, Yue Yu
, Chang Xu
, Shing-Chi Cheung
, Hai Yu
, Zhiliang Zhu:
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. 3155-3181 - Zohreh Aghababaeyan

, Manel Abdellatif
, Lionel C. Briand
, Ramesh S.
, Mojtaba Bagherzadeh
:
Black-Box Testing of Deep Neural Networks through Test Case Diversity. 3182-3204 - Brittany Reid

, Marcelo d'Amorim
, Markus Wagner
, Christoph Treude
:
NCQ: Code Reuse Support for Node.js Developers. 3205-3225 - Chong Wang

, Xin Peng
, Zhenchang Xing
, Xiujie Meng:
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking. 3226-3240 - Ahmet Okutan

, Peter Mell
, Mehdi Mirakhorli
, Igor Khokhlov
, Joanna C. S. Santos
, Danielle Gonzalez, Steven Simmons:
Empirical Validation of Automated Vulnerability Curation and Characterization. 3241-3260 - Neil Walkinshaw

, Robert M. Hierons
:
Modelling Second-Order Uncertainty in State Machines. 3261-3276 - Jack H. Good

, Nicholas Gisolfi, James Kyle Miller
, Artur Dubrawski
:
Verification of Fuzzy Decision Trees. 3277-3288 - Yujia Chen

, Cuiyun Gao
, Xiaoxue Ren, Yun Peng
, Xin Xia
, Michael R. Lyu:
API Usage Recommendation Via Multi-View Heterogeneous Graph Representation Learning. 3289-3304 - Chenhao Wei

, Lu Xiao
, Tingting Yu
, Xinyu Chen
, Xiao Wang
, Sunny Wong
, Abigail Clune:
Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models. 3305-3324 - Kashumi Madampe

, Rashina Hoda
, John Grundy
:
A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering. 3325-3343
Volume 49, Number 6, June 2023
- Thiago do Nascimento Ferreira, James Ivers

, Jeffrey J. Yackley
, Marouane Kessentini
, Ipek Ozkaya, Khouloud Gaaloul
:
Dependent or Not: Detecting and Understanding Collections of Refactorings. 3344-3358 - Quentin L. Meunier

, Etienne Pons, Karine Heydemann
:
LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions. 3359-3375 - Wei Liu

, Tse-Hsun Chen
:
SLocator: Localizing the Origin of SQL Queries in Database-Backed Web Applications. 3376-3390 - Yuan Zhou

, Yang Sun
, Yun Tang
, Yuqi Chen, Jun Sun
, Christopher M. Poskitt
, Yang Liu
, Zijiang Yang:
Specification-Based Autonomous Driving System Testing. 3391-3410 - Thanh Le-Cong

, Duc-Minh Luong, Xuan-Bach Dinh Le
, David Lo
, Nhat-Hoa Tran, Bui Quang Huy, Quyet-Thang Huynh
:
Invalidator: Automated Patch Correctness Assessment Via Semantic and Syntactic Reasoning. 3411-3429 - Nazanin Bayati Chaleshtari

, Fabrizio Pastore
, Arda Goknil
, Lionel C. Briand
:
Metamorphic Testing for Web System Security. 3430-3471 - Chaochen Shi

, Borui Cai
, Yao Zhao
, Longxiang Gao
, Keshav Sood
, Yong Xiang
:
CoSS: Leveraging Statement Semantics for Code Summarization. 3472-3486 - Joseph Poremba

, Nancy A. Day
, Amirhossein Vakili:
New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding. 3487-3503 - Baicai Sun

, Dunwei Gong
, Feng Pan
, Xiangjuan Yao
, Tian Tian
:
Evolutionary Generation of Test Suites for Multi-Path Coverage of MPI Programs With Non-Determinism. 3504-3523 - Ya Xiao

, Wenjia Song
, Jingyuan Qi
, Bimal Viswanath
, Patrick D. McDaniel
, Danfeng Yao
:
Specializing Neural Networks for Cryptographic Code Completion Applications. 3524-3535 - Akond Rahman

, Chris Parnin
:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management. 3536-3553 - Luca Traini

, Vittorio Cortellessa
:
DeLag: Using Multi-Objective Optimization to Enhance the Detection of Latency Degradation Patterns in Service-Based Systems. 3554-3580 - Boyuan Li

, Carol S. Smidts
:
A Zone-Based Model for Analysis of Dependent Failures in Requirements Inspection. 3581-3598 - Xiaoyu Sun

, Xiao Chen
, Yonghui Liu
, John C. Grundy
, Li Li
:
Taming Android Fragmentation Through Lightweight Crowdsourced Testing. 3599-3615 - Mario Janke

, Patrick Mäder
:
${\text{FS}^{3}}_{\text{change}}$FS3change: A Scalable Method for Change Pattern Mining. 3616-3629 - Wuqi Zhang

, Lili Wei
, Shing-Chi Cheung
, Yepang Liu
, Shuqing Li
, Lu Liu
, Michael R. Lyu
:
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. 3630-3646 - Finlay Macklon

, Markos Viggiato
, Natalia Romanova, Chris Buzon, Dale Paas, Cor-Paul Bezemer
:
A Taxonomy of Testable HTML5 Canvas Issues. 3647-3659
Volume 49, Number 7, July 2023
- Mathieu Nassif

, Martin P. Robillard
:
Identifying Concepts in Software Projects. 3660-3674 - Federico Cassano

, John Gouwar
, Daniel Nguyen
, Sydney Nguyen
, Luna Phipps-Costin
, Donald Pinckney
, Ming-Ho Yee
, Yangtian Zi
, Carolyn Jane Anderson
, Molly Q. Feldman
, Arjun Guha
, Michael Greenberg
, Abhinav Jangda
:
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation. 3675-3691 - Ivano Malavolta

, Kishan Nirghin
, Gian Luca Scoccia
, Simone Romano
, Salvatore Lombardi
, Giuseppe Scanniello
, Patricia Lago
:
JavaScript Dead Code Identification, Elimination, and Empirical Assessment. 3692-3714 - Amirhossein Zolfagharian

, Manel Abdellatif
, Lionel C. Briand
, Mojtaba Bagherzadeh
, Ramesh S.
:
A Search-Based Testing Approach for Deep Reinforcement Learning Agents. 3715-3735 - Priscila Santiesteban

, Yu Huang
, Westley Weimer
, Hammad Ahmad
:
CirFix: Automated Hardware Repair and its Real-World Applications. 3736-3752 - Souvick Das

, Novarun Deb
, Nabendu Chaki
, Agostino Cortesi
:
Driving the Technology Value Stream by Analyzing App Reviews. 3753-3770 - Steve Kommrusch

, Martin Monperrus
, Louis-Noël Pouchet
:
Self-Supervised Learning to Prove Equivalence Between Straight-Line Programs via Rewrite Rules. 3771-3792 - Peng Qian

, Jianting He
, Lingling Lu
, Siwei Wu
, Zhipeng Lu
, Lei Wu
, Yajin Zhou
, Qinming He
:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. 3793-3810 - Xiao Ling

, Tim Menzies
:
What Not to Test (For Cyber-Physical Systems). 3811-3826 - Hafedh Mili

, Imen Benzarti
, Amal Elkharraz, Ghizlane El-Boussaidi
, Yann-Gaël Guéhéneuc
, Petko Valtchev
:
Discovering Reusable Functional Features in Legacy Object-Oriented Systems. 3827-3856 - Tarek Mahmud

, Meiru Che
, Guowei Yang
:
Detecting Android API Compatibility Issues With API Differences. 3857-3871 - Zhongxing Yu

, Matias Martinez
, Zimin Chen
, Tegawendé F. Bissyandé
, Martin Monperrus
:
Learning the Relation Between Code Features and Code Transforms With Structured Prediction. 3872-3900 - Qinsheng Hou

, Wenrui Diao
, Yanhao Wang
, Chenglin Mao
, Lingyun Ying
, Song Liu
, Xiaofeng Liu
, Yuanzhi Li
, Shanqing Guo
, Meining Nie
, Haixin Duan
:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. 3901-3921 - Milos Ojdanic

, Aayush Garg
, Ahmed Khanfir
, Renzo Degiovanni
, Mike Papadakis
, Yves Le Traon
:
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies. 3922-3938 - Zhuo Zhang

, Yan Lei
, Xiaoguang Mao
, Meng Yan
, Xin Xia
, David Lo
:
Context-Aware Neural Fault Localization. 3939-3954
Volume 49, Number 8, August 2023
- Sebastian Simon

, Nicolai Ruckel
, Norbert Siegmund
:
CfgNet: A Framework for Tracking Equality-Based Configuration Dependencies Across a Software Project. 3955-3971 - Essa A. Alhazami

, Abdullah M. Sheneamer
:
Graph-of-Code: Semantic Clone Detection Using Graph Fingerprints. 3972-3988 - Weiyi Zhang

, Zoran Salcic
, Avinash Malik
:
Designing, Modeling and Analysis of GALS Software Systems. 3989-4003 - Runzhi He

, Hao He
, Yuxia Zhang
, Minghui Zhou
:
Automating Dependency Updates in Practice: An Exploratory Study on GitHub Dependabot. 4004-4022 - Achiya Elyasaf

, Eitan Farchi
, Oded Margalit
, Gera Weiss
, Yeshayahu Weiss
:
Generalized Coverage Criteria for Combinatorial Sequence Testing. 4023-4034 - Truong Giang Nguyen

, Thanh Le-Cong
, Hong Jin Kang
, Ratnadira Widyasari
, Chengran Yang
, Zhipeng Zhao
, Bowen Xu
, Jiayuan Zhou
, Xin Xia
, Ahmed E. Hassan, Xuan-Bach Dinh Le
, David Lo
:
Multi-Granularity Detector for Vulnerability Fixes. 4035-4057 - Jiayang Song

, Xuan Xie
, Lei Ma
:
$\mathtt {SIEGE}$SIEGE: A Semantics-Guided Safety Enhancement Framework for AI-Enabled Cyber-Physical Systems. 4058-4080 - Mingwei Liu

, Chengyuan Zhao
, Xin Peng
, Simin Yu
, Haofen Wang
, Chaofeng Sha
:
Task-Oriented ML/DL Library Recommendation Based on a Knowledge Graph. 4081-4096 - Huayao Wu

, Senyao Yu
, Xintao Niu
, Changhai Nie
, Yu Pei
, Qiang He
, Yun Yang
:
Enhancing Fault Injection Testing of Service Systems via Fault-Tolerance Bottleneck. 4097-4114 - Shengcheng Yu

, Chunrong Fang
, Quanjun Zhang
, Zhihao Cao
, Yexiao Yun
, Zhenfei Cao
, Kai Mei
, Zhenyu Chen
:
Mobile App Crowdsourced Test Report Consistency Detection via Deep Image-and-Text Fusion Understanding. 4115-4134 - Youshuai Tan

, Jinfu Chen
, Weiyi Shang
, Tao Zhang
, Sen Fang
, Xiapu Luo
, Zijie Chen
, Shuhao Qi
:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. 4135-4151 - Chunyong Zhang

, Bin Liu
, Yang Xin
, Liangwei Yao
:
CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation. 4152-4168 - Darius Sas

, Paris Avgeriou
:
An Architectural Technical Debt Index Based on Machine Learning and Architectural Smells. 4169-4195 - Junwei Zhang

, Zhongxin Liu
, Xing Hu
, Xin Xia
, Shanping Li
:
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code. 4196-4212 - Yalemisew M. Abgaz

, Andrew McCarren
, Peter Elger, David Solan
, Neil Lapuz
, Marin Bivol, Glenn Jackson
, Murat Yilmaz
, Jim Buckley
, Paul M. Clarke
:
Decomposition of Monolith Applications Into Microservices Architectures: A Systematic Review. 4213-4242
Volume 49, Number 9, September 2023
- Razan Ghzouli

, Thorsten Berger
, Einar Broch Johnsen
, Andrzej Wasowski
, Swaib Dragule
:
Behavior Trees and State Machines in Robotics Applications. 4243-4267 - Aakash Bansal

, Zachary Eberhart
, Zachary Karas
, Yu Huang
, Collin McMillan
:
Function Call Graph Context Encoding for Neural Source Code Summarization. 4268-4281 - Orlando Amaral Cejas

, Muhammad Ilyas Azeem
, Sallam Abualhaija
, Lionel C. Briand
:
NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR. 4282-4303 - Amir Mohammad Ebrahimi

, Gustavo Ansaldi Oliva
, Ahmed E. Hassan
:
Self-Admitted Technical Debt in Ethereum Smart Contracts: A Large-Scale Exploratory Study. 4304-4323 - Leonardo Horn Iwaya

, Muhammad Ali Babar
, Awais Rashid
:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. 4324-4348 - Ulrike Maria Graetsch

, Hourieh Khalajzadeh
, Mojtaba Shahin
, Rashina Hoda
, John C. Grundy
:
Dealing With Data Challenges When Delivering Data-Intensive Software Solutions. 4349-4370 - Uraz Cengiz Türker

, Robert M. Hierons
, Gerassimos D. Barlas
, Khaled El-Fakih
:
Incomplete Adaptive Distinguishing Sequences for Non-Deterministic FSMs. 4371-4389 - Ke Liu

, Xiang Chen
, Chunyang Chen
, Xiaofei Xie
, Zhanqi Cui
:
Automated Question Title Reformulation by Mining Modification Logs From Stack Overflow. 4390-4410 - Yihui Wang

, Huaxiao Liu
, Shanquan Gao
, Xiao Tang
:
Animation2API: API Recommendation for the Implementation of Android UI Animations. 4411-4428 - Yutao Hu

, Yilin Fang
, Yifan Sun
, Yaru Jia
, Yueming Wu
, Deqing Zou
, Hai Jin
:
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection. 4429-4442 - Toni Mancini

, Igor Melatti
, Enrico Tronci
:
Optimizing Highly-Parallel Simulation-Based Verification of Cyber-Physical Systems. 4443-4455 - Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:

BiAn: Smart Contract Source Code Obfuscation. 4456-4476 - Jakob Svennevik Notland

, Mariusz Nowostawski
, Jingyue Li
:
Runtime Evolution of Bitcoin's Consensus Rules. 4477-4495
Volume 49, Number 10, October 2023
- Meriel von Stein

, David Shriver
, Sebastian G. Elbaum
:
DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles. 4496-4509 - Adriano Torres

, Pedro Henrique Teixeira Costa, Luis Henrique Vieira Amaral
, Jonata Pastro
, Rodrigo Bonifácio
, Marcelo d'Amorim
, Owolabi Legunsen
, Eric Bodden
, Edna Dias Canedo
:
Runtime Verification of Crypto APIs: An Empirical Study. 4510-4525 - Charaka Geethal

, Marcel Böhme
, Van-Thuan Pham
:
Human-in-the-Loop Automatic Program Repair. 4526-4549 - Michael Fu

, Van Nguyen
, Chakkrit Kla Tantithamthavorn
, Trung Le
, Dinh Q. Phung
:
VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types. 4550-4565 - Xu Guo

, Xiaoyu Song
, Jiantao Zhou
, Feiyu Wang
, Kecheng Tang
:
An Effective Approach to High Strength Covering Array Generation in Combinatorial Testing. 4566-4593 - Hadi Jahanshahi

, Mucahit Cevik
, Kianoush Mousavi
, Ayse Basar:
ADPTriage: Approximate Dynamic Programming for Bug Triage. 4594-4609 - Michele Guerra

, Simone Scalabrino
, Fausto Fasano
, Rocco Oliveto
:
An Empirical Study on the Effectiveness of Privacy Indicators. 4610-4623 - Yingnan Zhou

, Xue Hu
, Sihan Xu
, Yan Jia
, Yuhao Liu
, Junyong Wang
, Guangquan Xu
, Wei Wang
, Shaoying Liu
, Thar Baker
:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. 4624-4638 - Yao Li

, Tao Zhang
, Xiapu Luo
, Haipeng Cai
, Sen Fang
, Dawei Yuan
:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? 4639-4655 - Yuqi Huai

, Sumaya Almanee
, Yuntianyi Chen
, Xiafa Wu
, Qi Alfred Chen
, Joshua Garcia
:
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning. 4656-4676 - Francesco Bertolotti

, Walter Cazzola
:
CombTransformers: Statement-Wise Transformers for Statement-Wise Representations. 4677-4690 - Tiezhu Sun

, Kevin Allix
, Kisub Kim
, Xin Zhou
, Dongsun Kim
, David Lo
, Tegawendé F. Bissyandé
, Jacques Klein
:
DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. 4691-4706 - Xinwei Fang

, Radu Calinescu
, Simos Gerasimou
, Faisal Alhwikem
:
Fast Parametric Model Checking With Applications to Software Performability Analysis. 4707-4730 - Armstrong Foundjem

, Ellis E. Eghan
, Bram Adams
:
A Grounded Theory of Cross-Community SECOs: Feedback Diversity Versus Synchronization. 4731-4750 - Shikai Guo

, Haorui Lin
, Jiaoru Zhao
, Hui Li
, Rong Chen
, Xiaochen Li
, He Jiang
:
An Easy Data Augmentation Approach for Application Reviews Event Inference. 4751-4772 - Eduardo Santana de Almeida

, Iftekhar Ahmed
, André van der Hoek
:
Let's Go to the Whiteboard (Again): Perceptions From Software Architects on Whiteboard Architecture Meetings. 4773-4795 - Kun Wang

, Jingyi Wang
, Christopher M. Poskitt
, Xiangxiang Chen
, Jun Sun
, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. 4796-4813 - Matias Martinez

, Jean-Rémy Falleri
, Martin Monperrus
:
Hyperparameter Optimization for AST Differencing. 4814-4828
Volume 49, Number 11, November 2023
- Fan Zhang

, Qianmei Wu
, Bohan Xuan
, Yuqi Chen, Wei Lin
, Christopher M. Poskitt
, Jun Sun
, Binbin Chen
:
Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. 4829-4845 - Nikita Mehrotra

, Akash Sharma, Anmol Jindal, Rahul Purandare
:
Improving Cross-Language Code Clone Detection via Code Representation Learning and Graph Neural Networks. 4846-4868 - Chaozheng Wang

, Yuanhang Yang
, Cuiyun Gao
, Yun Peng
, Hongyu Zhang
, Michael R. Lyu
:
Prompt Tuning in Code Intelligence: An Experimental Evaluation. 4869-4885 - Zhaoxuan Li

, Siqi Lu
, Rui Zhang
, Ziming Zhao
, Rujin Liang
, Rui Xue
, Wenhao Li
, Fan Zhang
, Sheng Gao
:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. 4886-4916 - Nick van Beest

, Heerko Groefsema
, Adrian Cryer
, Guido Governatori
, Silvano Colombo Tosatto
, Hannah M. S. Burke
:
Cross-Instance Regulatory Compliance Checking of Business Process Event Logs. 4917-4931 - Nasif Imtiaz

, Laurie A. Williams
:
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates. 4932-4945 - César Cornejo

, Germán Regis
, Nazareno Aguirre
, Marcelo F. Frias
:
A Study of the Electrum and DynAlloy Dynamic Behavior Notations. 4946-4963 - Yang Wang

, Peng Zhang
, Maolin Sun
, Zeyu Lu
, Yibiao Yang
, Yutian Tang
, Junyan Qian
, Zhi Li
, Yuming Zhou
:
Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving. 4964-4987 - Khashayar Etemadi

, Aman Sharma
, Fernanda Madeiral
, Martin Monperrus
:
Augmenting Diffs With Runtime Information. 4988-5007 - Kevin Jesse

, Christoph Kuhmünch
, Anand Ashok Sawant
:
RefactorScore: Evaluating Refactor Prone Code. 5008-5026 - César Soto-Valero

, Deepika Tiwari
, Tim Toady
, Benoit Baudry
:
Automatic Specialization of Third-Party Java Dependencies. 5027-5045
Volume 49, Number 12, December 2023
- Shuang Liu

, Shujie Dou
, Junjie Chen
, Zhirun Zhang
, Ye Lu
:
Differential Testing of Machine Translators Based on Compositional Semantics. 5046-5059 - Mukelabai Mukelabai

, Kevin Hermann
, Thorsten Berger
, Jan-Philipp Steghöfer
:
FeatRacer: Locating Features Through Assisted Traceability. 5060-5083 - Dan Iorga

, John Wickerson
, Alastair F. Donaldson
:
Simulating Operational Memory Models Using Off-the-Shelf Program Analysis Tools. 5084-5102 - Shayan Noei

, Heng Li
, Stefanos Georgiou
, Ying Zou
:
An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process. 5103-5119 - Sepehr Sharifi

, Donghwan Shin
, Lionel C. Briand
, Nathan Aschbacher
:
Identifying the Hazard Boundary of ML-Enabled Autonomous Systems Using Cooperative Coevolutionary Search. 5120-5138 - Giovanni Denaro

, Rahim Heydarov
, Ali Mohebbi
, Mauro Pezzè
:
Prevent: An Unsupervised Approach to Predict Software Failures in Production. 5139-5153 - Zhaoqiang Guo

, Tingting Tan
, Shiran Liu
, Xutong Liu
, Wei Lai
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Wei Dong
, Yuming Zhou
:
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities. 5154-5188 - Rodrigo Casamayor

, Carlos Cetina
, Oscar Pastor
, Francisca Pérez
:
Studying the Influence and Distribution of the Human Effort in a Hybrid Fitness Function for Search-Based Model-Driven Engineering. 5189-5202 - Iflaah Salman

, Burak Turhan
, Robert Ramac
, Vladimir Mandic
:
Confirmation Bias and Time Pressure: A Family of Experiments in Software Testing. 5203-5222 - Bohan Liu

, He Zhang
, Weigang Ma
, Gongyuan Li
, Shanshan Li
, Haifeng Shen
:
The Why, When, What, and How About Predictive Continuous Integration: A Simulation-Based Investigation. 5223-5249 - Weifeng Sun

, Meng Yan
, Zhongxin Liu
, David Lo
:
Robust Test Selection for Deep Neural Networks. 5250-5278 - Xi Xu

, Qinghua Zheng, Zheng Yan
, Ming Fan
, Ang Jia
, Zhaohui Zhou
, Haijun Wang
, Ting Liu
:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. 5279-5294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














