


default search action
International Journal of Software Engineering and Knowledge Engineering, Volume 34
Volume 34, Number 1, January 2024
- Trinh Le-Khanh

, Hoang-Gia Nguyen, Simon Bliudze, Philippe Merle:
Towards Exogenous Coordination of Concurrent Cloud Applications. 1-25 - Alejandro Miguel Güemes Esperón

, Francisco Maciá Pérez
, José Vicente Berná-Martínez, Martha Dunia Delgado Dapena, Iren Lorenzo-Fonseca
:
Specifying Requirements for Modern Software Development: A Test-Oriented Methodology. 27-48 - Zhen Li, Zining Cao, Fujun Wang, Chao Xing:

A Modeling and Verification Method of Cyber-Physical Systems Based on AADL and Process Algebra. 49-89 - Young Min Baek

, Esther Cho, Donghwan Shin
, Doo-Hwan Bae
:
An Extensible Modeling Method Supporting Ontology-Based Scenario Specification and Domain-Specific Extension. 91-162 - Pieter Bonte

, Sander Vanden Hautte, Filip De Turck
, Sofie Van Hoecke
, Femke Ongenae
:
Benchmarking Whole Knowledge Graph Embedding Techniques. 163-184 - Thanh Trong Vu, Thanh-Dat Do

, Hieu Dinh Vo
:
Context-Encoded Code Change Representation for Automated Commit Message Generation. 185-202
Volume 34, Number 2, February 2024
- Fevzi Belli

, Tugkan Tuglular
, Ekincan Ufuktepe
:
Unifying Behavioral and Feature Modeling for Testing of Software Product Lines. 203-238 - Hao Chen

, Shengyang Zhou, Chen Chen, Zheng Dai, Bixin Li
:
A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively. 239-271 - Haiyi Liu

, Shaoying Liu
, Guangquan Xu, Ai Liu
, Dingbang Fang
:
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification. 273-300 - Sini Chen

, Ran Li
, Huibiao Zhu
:
Formalization and Verification of Enhanced Group Communication CoAP. 301-330 - Xiaowei Zhang

, Lin Chen
, Weiqin Zou
, Yulu Cao
, Hao Ren
, Zhi Wang
, Yanhui Li
, Yuming Zhou
:
ICG: A Machine Learning Benchmark Dataset and Baselines for Inline Code Comments Generation Task. 331-356 - Shumei Wu

, Zexing Chang
, Zhanwen Zhang
, Zheng Li
, Yong Liu
:
DTester: Diversity-Driven Test Case Generation for Web Applications. 357-390
Volume 34, Number 3, March 2024
- Xinzhi Wang:

Guest Editor's Introduction - Special Issue on Social Computing and Engineering. 391-392 - Xinzhi Wang

, Mengyue Li, Weiwang Chen
, Yige Yao
, Zhennan Li, Yi Liu, Hui Zhang
:
Review and Application of Knowledge Graph in Crisis Management. 393-425 - Xiao Wei

, Yidian Lin
, Qitao Hu:
Dialogue Generation Model with Hierarchical Encoding and Semantic Segmentation of Dialogue Context. 427-447 - Weidong Liu

, Fei Li, Senjun Pei, Chunming Cheng
:
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model. 449-465 - Wenwen Xiao

, Xinzhi Wang
, Xiangfeng Luo
, Shaorong Xie
:
A Dual Decision-Making Continuous Reinforcement Learning Method Based on Sim2Real. 467-488 - Zhongliang Li, Junjun Ding, Zongmin Ma

:
GTFP: Network Fault Prediction Based on Graph and Time Series. 489-510 - Yi Zhu

, Yuxiang Gao
, Qiao Yu
:
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction. 511-544
Volume 34, Number 4, April 2024
- Yanfang Ma

, Wei Zhou:
The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes. 545-568 - Guoqiang Yin, Wei Wang

, Haiyan Li
:
OdegVul: An Approach for Statement-Level Defect Prediction. 569-595 - Weiwei Wang

, Junxia Guo
, Beite Li, Ying Shang
, Ruilian Zhao
:
EFSM Model-Based Testing for Android Applications. 597-621 - Winnie Mbaka

, Katja Tuma
:
On the Measures of Success in Replication of Controlled Experiments with STRIDE. 623-650 - Zhenzhou Tian

, Ruikang He, Hongliang Zhao, Lingwei Chen
:
Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion. 651-673 - Yang Qu, Jinchen Xu

, Bei Zhou
, Jiangwei Hao
, Fei Li, Zuoyan Zhang
:
SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision. 675-703
Volume 34, Number 5, May 2024
- Yasir Hussain

, Zhiqiu Huang
, Yu Zhou
, Izhar Ahmed Khan
:
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach. 705-727 - Naglaa A. Eldanasory

, Amira M. Idrees
, Engy Yehia
:
EFSP: An Enhanced Full Scrum Process Model. 729-749 - Pingyan Wang

, Shaoying Liu
:
Toward Pointer-Analysis-Based Vulnerability Discovery in Human-Machine Pair Programming. 751-774 - Carlos Calatayud Asensi

, José Vicente Berná-Martínez
, Lucia Arnau Muñoz
, Francisco Maciá Pérez
:
Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability. 775-791 - Jun Wang

, Shuang Zhang
:
Sentiment-Time Heterogeneous Residual Graph Attention Transformer for Session-Based Recommendation. 793-820 - Di Wu

, Tong Li
, Yiran Zhao
, Junrui Liu
, Zifang Tang, Zhen Yang
:
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment. 821-843
Volume 34, Number 6, June 2024
- Xiaowei Zhang

, Zhifei Chen
, Yulu Cao
, Lin Chen
, Yuming Zhou
:
Multi-Intent Inline Code Comment Generation via Large Language Model. 845-868 - Nguyen Hung-Cuong

, Huynh Quyet Thang:
An Imperfect Debugging Non-Homogeneous Poisson Process Software Reliability Model Based on a 3-Parameter S-Shaped Function. 869-889 - Reynaldo Alvarez Luna

, Irene Garrigós
, José Jacobo Zubcoff, César González-Mora
:
Model-Driven Approach for Making Citizen Science Data FAIR. 891-907 - S. Syed Suhaila, K. Sundara Krishnan

:
Improving Windows Malware Detection Using the Random Forest Algorithm and Multi-View Analysis. 909-939 - Mahum Adil

, Ilenia Fronza
, Claus Pahl
:
How Did COVID-19 Impact Software Design Activities in Global Software Engineering - Systematic Review. 941-971 - Xiaoming Zhang

, Kaikai Meng, Huiyong Wang
:
TRAFMEL: Multimodal Entity Linking Based on Transformer Reranking and Multimodal Co-Attention Fusion. 973-997
Volume 34, Number 7, July 2024
- Yulu Cao

, Lin Chen
, Zhifei Chen
, Jiacheng Zhong
, Xiaowei Zhang
, Linzhang Wang
:
Efficient Construction of Practical Python Call Graphs with Entity Knowledge Base. 999-1024 - Yuqiong Wang

, Yuxiao Zhao
, Xiang Wang
, Weidong Tang
, Jinhui Zhang
, Shaolei Wang
, Peng Wang
, Jian Hu
:
Robotic Process Automation Efficiency for Mobile App Testing: An Empirical Investigation. 1025-1046 - Aiman Abibullayeva

, Hüma Kiliç Ünlü, Aydin Çetin
:
An Ensemble Keyword Extraction Model for News Texts with Statistical and Graphical Features. 1047-1061 - Yang Zhang

, Jingjing Liu, Lin Qi, Grant Meredith
:
Consistency Checking for Refactoring from Coarse-Grained Locks to Fine-Grained Locks. 1063-1093 - Yanfang Ma

, Liang Chen
:
The Evolution Mechanism of Correctness for Cyber-Physical System. 1095-1134 - Yifan Zou

, Huiqiang Wang
, Hongwu Lv
, Shuai Zhao, Haoye Tian
:
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information. 1135-1171 - Bing Zhang

, Hongchang Zhang
, Rong Ren, Zhen Wen, Qian Wang
:
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm. 1173-1197
Volume 34, Number 8, August 2024
- Huanzhang Xiong, Gang Hou

, Yueyuan Qin, Jie Wang
, Weiqiang Kong
:
A Dual Relaxation Method for Neural Network Verification. 1199-1220 - Shuwen Liang

, Zhitao He
:
Automated Test Case Generation for Path Coverage by Using Multi-Objective Particle Swarm Optimization Algorithm with Reinforcement Learning and Relationship Matrix Strategies. 1221-1249 - Tiaokang Gao

, Xiaoning Jin
:
Group-Based Federated Knowledge Distillation Intrusion Detection. 1251-1279 - Zhongchen Yuan

, Xingda Hu, Gang Zhang
, Zongmin Ma
:
Integration of UML Class Diagrams Based on Semantics and Structure. 1281-1312 - Weixi Zhang

, Weiwei Wang
, Ruilian Zhao
:
Flaky Test Detection Based on Adaptive Latest Position Execution for Concurrent Android Applications. 1313-1338 - Xiaoming Zhang

, Xinrui Li, Huiyong Wang
:
Fine-Grained Entity-Type Completion Based on Neighborhood-Attention and Cartesian-Polar Coordinates Mapping. 1339-1366
Volume 34, Number 9, September 2024
- Iaakov Exman

:
Quantum Software: The Brain of Quantum - Guest Editor's Introduction. 1367-1370 - Javier Romero-Álvarez

, Jaime Alvarado-Valiente, Jorge Casco-Seco
, Enrique Moguel
, José García-Alonso
, Juan Manuel Murillo:
A Noise Validation for Quantum Circuit Scheduling Through a Service-Oriented Architecture. 1371-1386 - Mario Piattini

, Jose Luis Hevia Oliver, Guido Peterssen:
Quantum Software Engineering: Practical Challenges. 1387-1413 - Francisco P. Romero

, José A. Cruz-Lemus
, Sergio Jiménez-Fernández, Mario Piattini
:
Automata-Based Quantum Circuit Design Patterns Identification: A Novel Approach and Experimental Verification. 1415-1439 - Iaakov Exman

:
Quantum Software Encompasses Classical Software: Density Matrix from the Laplacian. 1441-1456
- Yang Yang

, Weiwei Wang
, Zheng Li
, Lieshan Zhang
, Chaoyue Pan
:
Security Development Lifecycle-Based Adaptive Reward Mechanism for Reinforcement Learning in Continuous Integration Testing Optimization. 1457-1483 - Rongcun Wang

, Mingmei Fan, Yue Yan
, Shujuan Jiang
:
Combining Error Guessing and Logical Reasoning for Software Fault Localization via Deep Learning. 1485-1511 - Caiyun Mao

, Longjie Li
, Li Liu
, Zhixin Ma
:
Identification of Key Classes in Software Systems Based on Static Analysis and Voting Mechanism. 1513-1535
Volume 34, Number 10, October 2024
- Haifeng Wang

, Kun Yang, Tong Wu
:
Optimizing Mutation-Based Fault Localization Through Contribution-Based Test Case Reduction. 1537-1564 - Lei Rao

, Shaoying Liu
, Ai Liu
:
Program Segment Testing for Human-Machine Pair Programming. 1565-1591 - Xiuting Ge

, Xuanye Li, Yuanyuan Sun, Mingshuang Qing, Haitao Zheng, Huibin Zhang, Xianyu Wu:
Pattern Mining-Based Warning Prioritization by Refining Abstract Syntax Tree. 1593-1619 - Yanzhao Wang

, Fei Xie
, Zhenkun Yang
, Pasquale Cocchini
, Jin Yang
:
A Systematic Translation Validation Framework for MLIR-Based Compilers. 1621-1640 - Bin Gao

, Hongwu Qin
, Xiuqin Ma
:
Multi-Label Classification of Pure Code. 1641-1659 - Zexuan Wan, Chunli Xie

, Quanrun Lv, Yasheng Fan
:
Semantic Code Clone Detection Based on Community Detection. 1661-1692
Volume 34, Number 11, November 2024
- Marcelo Falkowski Burkard

, Lisandra M. Fontoura
:
Towards Effective People Management in Software Projects: A Comprehensive Catalog of Good Practices. 1693-1715
- Federico Cirett Galán

, Raquel Torres Peralta
, René Navarro-Hernández, José Luis Ochoa-Hernández
, San Contreras-Rivera
, Luis Arturo Estrada-Ríos
, Germán Machado-Encinas:
Assessing the Use of GitHub Copilot on Students of Engineering of Information Systems. 1717-1734 - Hidekazu Saito, Kinari Nishiura

, Akito Monden
, Shuji Morisaki
:
Extended Association Rule Mining and Its Application to Software Engineering Data Sets. 1735-1756 - Huayu Li

, Yang Yue
, Xiaojun Man, Haiyang Li:
Video Multimodal Entity Linking via Multi-Perspective Enhanced Subgraph Contrastive Network. 1757-1781 - Fujun Wang

, Lixing Tan
, Zining Cao
, Yan Ma
, Li Zhang
:
A Formal Language for Performance Evaluation Based on Reinforcement Learning. 1783-1805 - Tolga Büyüktanir

, Mehmet S. Aktas
:
Predictive Prefetching in Client-Server Systems: A Navigational Behavior Modeling Approach. 1807-1830
Volume 34, Number 12, December 2024
- Emrullah Gultekin

, Mehmet S. Aktas
:
Toward Proactive Maintenance: A Multi-Tiered Architecture for Industrial Equipment Health Monitoring and Remaining Useful Life Prediction. 1831-1856 - Mehreen Tabassum, Wasi Haider Butt

, Abdul Wahab Muzaffar
, Saima Anwar Lashari
:
Selecting Third-Party Libraries: The Web Developers' Perspective. 1857-1893 - Hui Han

, Qiao Yu
, Yi Zhu
, Shengyi Cheng
, Yu Zhang:
An Empirical Study of the Impact of Class Overlap on the Performance and Interpretability of Cross-Version Defect Prediction. 1895-1918 - Lei Chen

, Shinpei Hayashi
:
MORCoRA: Multi-Objective Refactoring Recommendation Considering Review Availability. 1919-1947 - Yuhan Wu

, Yingling Li, Ziao Wang, Qushan Tan, Jing Liu, Yuao Jiang:
Boosting Commit Classification Based on Multivariate Mixed Features and Heterogeneous Classifier Selection. 1949-1970 - Yuzhang Li, Tao Xu, Chunlu Wang:

IRaDT: LLVM IR as Target for Efficient Neural Decompilation. 1971-1992

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














