


default search action
Empirical Software Engineering, Volume 21
Volume 21, Number 1, February 2016
- Appreciation to empirical software engineering reviewers of 2015. 1-3

- Abdullah Khalili, Ashkan Sami

, Mahdi Azimi, Sara Moshtari
, Zahra Salehi, Mahboobe Ghiasi, Ali Akbar Safavi:
Employing secure coding practices into industrial applications: a case study. 4-16 - Paul W. McBurney, Collin McMillan:

An empirical study of the textual similarity between source code and source code summaries. 17-42 - Duksan Ryu

, Okjoo Choi, Jongmoon Baik:
Value-cognitive boosting with a support vector machine for cross-project defect prediction. 43-71 - Anna Corazza

, Sergio Di Martino
, Valerio Maggio
, Giuseppe Scanniello
:
Weighing lexical information for software clustering in the context of architecture recovery. 72-103 - Venera Arnaoudova, Massimiliano Di Penta

, Giuliano Antoniol:
Linguistic antipatterns: what they are and how developers perceive them. 104-158 - Yuepu Guo, Rodrigo Oliveira Spínola, Carolyn B. Seaman:

Exploring the costs of technical debt management - a case study. 159-182 - Kevin Allix

, Tegawendé F. Bissyandé
, Quentin Jérome, Jacques Klein
, Radu State, Yves Le Traon
:
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios. 183-211 - Ana M. Fernández-Sáez

, Marcela Genero
, Danilo Caivano
, Michel R. V. Chaudron:
Does the level of detail of UML diagrams affect the maintainability of source code?: a family of experiments. 212-259 - Daniel M. Germán, Bram Adams

, Ahmed E. Hassan:
Continuously mining distributed version control systems: an empirical study of how Linux uses Git. 260-299
Volume 21, Number 2, April 2016
- Massimiliano Di Penta

, Sunghun Kim:
Guest editorial: Special section on mining software repositories. 301-302 - Kim Herzig, Sascha Just, Andreas Zeller

:
The impact of tangled code changes on defect prediction models. 303-336 - Shaohua Wang

, Foutse Khomh, Ying Zou:
Improving bug management using correlations in crash reports. 337-367 - Abram Hindle, Anahita Alipour, Eleni Stroulia:

A contextual approach towards more accurate duplicate bug report detection and ranking. 368-410 - Heiko Koziolek, Thomas Goldschmidt, Thijmen de Gooijer, Dominik Domis, Stephan Sehestedt, Thomas Gamer

, Markus Aleksy
:
Assessing software product line potential: an exploratory industrial case study. 411-448 - Claus Hunsen, Bo Zhang, Janet Siegmund, Christian Kästner

, Olaf Leßenich
, Martin Becker, Sven Apel
:
Preprocessor-based variability in open-source and industrial software systems: An empirical study. 449-482 - Santiago A. Vidal

, Alexandre Bergel, Claudia A. Marcos, J. Andrés Díaz Pace:
Understanding and addressing exhibitionism in Java empirical research about method accessibility. 483-516 - Wai Ting Cheung, Sukyoung Ryu

, Sunghun Kim:
Development nature matters: An empirical study of code clones in JavaScript applications. 517-564 - Suntae Kim, Dongsun Kim

:
Automatic identifier inconsistency detection using code dictionary. 565-604 - Ayse Tosun Misirli

, Emad Shihab, Yasutaka Kamei:
Studying high impact fix-inducing changes. 605-641 - Ingo Scholtes

, Pavlin Mavrodiev, Frank Schweitzer:
From Aristotle to Ringelmann: a large-scale analysis of team productivity and coordination in Open Source Software projects. 642-683 - Hussan Munir

, Krzysztof Wnuk, Per Runeson
:
Open innovation in software engineering: a systematic mapping study. 684-723 - Kostadin Damevski

, David C. Shepherd
, Lori L. Pollock:
A field study of how developers locate features in source code. 724-747
Volume 21, Number 3, June 2016
- Romain Robbes, Rocco Oliveto, Massimiliano Di Penta

:
Guest editorial: special section on software reverse engineering. 749-752 - Xi Chen, Asia Slowinska, Herbert Bos

:
On the detection of custom memory allocators in C binaries. 753-777 - István Haller, Asia Slowinska, Herbert Bos

:
Scalable data structure detection and classification for C/C++ binaries. 778-810 - Neil Walkinshaw

, Ramsay Taylor
, John Derrick
:
Inferring extended finite state machine models from software executions. 811-853 - Cristiano Amaral Maffort, Marco Túlio Valente

, Ricardo Terra, Mariza Andrade da Silva Bigonha
, Nicolas Anquetil
, André C. Hora
:
Mining architectural violations from version history. 854-895 - Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel

, Foutse Khomh, Mohammad Zulkernine:
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. 896-931 - Olga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey:

Investigating technical and non-technical factors influencing modern code review. 932-959 - Bram Adams

, Ryan Kavanagh
, Ahmed E. Hassan, Daniel M. Germán:
An empirical study of integration activities in distributions of open source software. 960-1001 - Fabio Calefato

, Filippo Lanubile
, Tayana Conte
, Rafael Prikladnicki:
Assessing the impact of real-time machine translation on multilingual meetings in global software projects. 1002-1034 - Yu-Cheng Tu

, Ewan D. Tempero, Clark D. Thomborson
:
An experiment on the impact of transparency on the effectiveness of requirements documents. 1035-1066 - Stuart McIlroy, Nasir Ali, Hammad Khalid, Ahmed E. Hassan:

Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews. 1067-1106 - Surafel Lemma Abebe

, Nasir Ali, Ahmed E. Hassan:
An empirical study of software release notes. 1107-1142 - Francesca Arcelli Fontana

, Mika V. Mäntylä
, Marco Zanoni
, Alessandro Marino:
Comparing and experimenting machine learning techniques for code smell detection. 1143-1191 - Christoffer Rosen, Emad Shihab:

What are mobile developers asking about? A large scale study using stack overflow. 1192-1223 - Julián Grigera

, Alejandra Garrido
, José Ignacio Panach
, Damiano Distante
, Gustavo Rossi:
Assessing refactorings for usability in e-commerce applications. 1224-1271 - Saleh M. Alnaeli, Jonathan I. Maletic, Michael L. Collard:

An empirical examination of the prevalence of inhibitors to the parallelizability of open source software systems. 1272-1301 - Breno Bernard Nicolau de França

, Guilherme Horta Travassos:
Experimentation with dynamic simulation models in software engineering: planning and reporting guidelines. 1302-1345 - Stuart McIlroy, Nasir Ali, Ahmed E. Hassan:

Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store. 1346-1370 - Jens Dietrich

, Kamil Jezek, Premek Brada
:
What Java developers know about compatibility, and why this matters. 1371-1396 - Jie Chen, Junchao Xiao, Qing Wang, Leon J. Osterweil, Mingshu Li:

Perspectives on refactoring planning and practice: an empirical study. 1397-1436
Volume 21, Number 4, August 2016
- Saïd Assar

, Markus Borg
, Dietmar Pfahl
:
Using text clustering to predict defect resolution time: a conceptual replication and an evaluation of prediction accuracy. 1437-1475 - Debarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft:

Code clones and developer behavior: results of two surveys of the clone research community. 1476-1508 - Makrina Viola Kosti, Robert Feldt, Lefteris Angelis:

Archetypal personalities of software engineers and their work preferences: a new perspective for empirical studies. 1509-1532 - Leif Jonsson

, Markus Borg
, David Broman, Kristian Sandahl, Sigrid Eldh
, Per Runeson
:
Automated bug assignment: Ensemble-based machine learning in large scale industrial contexts. 1533-1578 - Ebrahim Bagheri

, David Benavides, Klaus Schmid
, Per Runeson
:
Foreword to the special issue on empirical evidence on software product line engineering. 1579-1585 - Shuai Wang, Shaukat Ali

, Arnaud Gotlieb, Marius Liaaen:
A systematic test case selection methodology for product lines: results and insights from an industrial case study. 1586-1622 - Varvana Myllärniemi, Juha Savolainen, Mikko Raatikainen

, Tomi Männistö
:
Performance variability in software product lines: proposing theories from a case study. 1623-1669 - Stefan Sobernig, Sven Apel

, Sergiy S. Kolesnikov, Norbert Siegmund:
Quantifying structural attributes of system decompositions in 28 feature-oriented software product lines - An exploratory study. 1670-1705 - Mohsen Asadi, Samaneh Soltani, Dragan Gasevic

, Marek Hatala:
The effects of visualization and interaction techniques on feature model configuration. 1706-1743 - Leonardo Teixeira Passos, Leopoldo Teixeira, Nicolas Dintzner, Sven Apel

, Andrzej Wasowski
, Krzysztof Czarnecki, Paulo Borba, Jianmei Guo:
Coevolution of variability models and related software artifacts - A fresh look at evolution patterns in the Linux kernel. 1744-1793 - Guillaume Bécan, Mathieu Acher

, Benoit Baudry, Sana Ben Nasr:
Breathing ontological knowledge into feature model synthesis: an empirical study. 1794-1841
Volume 21, Number 5, October 2016
- Tse-Hsun Chen

, Stephen W. Thomas, Ahmed E. Hassan:
A survey on the use of topic models when mining software repositories. 1843-1919 - Munawar Hafiz, Ming Fang:

Game of detections: how are security vulnerabilities discovered in the wild? 1920-1959 - Mohamed Sami Rakha, Weiyi Shang, Ahmed E. Hassan:

Studying the needed effort for identifying duplicate issues. 1960-1989 - Quinten David Soetens, Serge Demeyer

, Andy Zaidman
, Javier Pérez:
Change-based test selection: an empirical evaluation. 1990-2032 - Martin Pinzger, Sunghun Kim:

Guest editorial: mining software repositories. 2033-2034 - Eirini Kalliamvakou, Georgios Gousios

, Kelly Blincoe
, Leif Singer, Daniel M. Germán, Daniela E. Damian:
An in-depth study of the promises and perils of mining GitHub. 2035-2071 - Yasutaka Kamei, Takafumi Fukushima, Shane McIntosh, Kazuhiro Yamashita, Naoyasu Ubayashi

, Ahmed E. Hassan:
Studying just-in-time defect prediction using cross-project models. 2072-2106 - Feng Zhang

, Audris Mockus
, Iman Keivanloo, Ying Zou:
Towards building a universal defect prediction model with rank transformed predictors. 2107-2145 - Shane McIntosh, Yasutaka Kamei, Bram Adams

, Ahmed E. Hassan:
An empirical study of the impact of modern code review practices on software quality. 2146-2189 - Luca Ponzanelli

, Gabriele Bavota
, Massimiliano Di Penta
, Rocco Oliveto, Michele Lanza
:
Prompter - Turning the IDE into a self-confident programming assistant. 2190-2231
Volume 21, Number 6, December 2016
- Yi Wang, David F. Redmiles

:
Cheap talk, cooperation, and trust in global software engineering - An evolutionary game theory model with empirical support. 2233-2267 - Viet Hung Nguyen, Stanislav Dashevskyi, Fabio Massacci

:
An automatic method for assessing the versions affected by a vulnerability. 2268-2297 - Yuan Tian, Nasir Ali, David Lo

, Ahmed E. Hassan:
On the unreliability of bug severity data. 2298-2323 - Michael Unterkalmsteiner

, Tony Gorschek, Robert Feldt, Niklas Lavesson:
Large-scale information retrieval in software engineering - an experience report from industrial application. 2324-2365 - Wei Wu, Foutse Khomh, Bram Adams

, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
An exploratory study of api changes and usages based on apache and eclipse ecosystems. 2366-2412 - Xiang Li, Chetan Mutha, Carol S. Smidts:

An automated software reliability prediction system for safety critical software. 2413-2455 - Marouane Kessentini, Günther Ruhe:

A guest editorial: special section on search-based software engineering. 2456-2458 - Shaukat Ali

, Muhammad Zohaib Iqbal
, Maham Khalid, Andrea Arcuri:
Improving the performance of OCL constraint solving with novel heuristics for logical operations: a search-based approach. 2459-2502 - Mohamed Wiem Mkaouer

, Marouane Kessentini, Slim Bechikh
, Mel Ó Cinnéide, Kalyanmoy Deb:
On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach. 2503-2545 - Aurora Ramírez

, José Raúl Romero
, Sebastián Ventura:
A comparative study of many-objective evolutionary algorithms for the discovery of software architectures. 2546-2600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














