


default search action
Journal of Software: Evolution and Process, Volume 37
Volume 37, Number 1, January 2025
Research Article - Methodology
- Ghulam Murtaza Khan

, Siffat Ullah Khan
, Mahmood Niazi
, Muhammad Ilyas
, Mamoona Humayun
, Akash Ahmad
, Javed Ali Khan
, Sajjad Mahmood
:
Complex outsourcing relationships management model.
Research Article - Technology
- Yuan Huang, Yinan Chen

, Xiangping Chen, Xiaocong Zhou:
Are your comments outdated? Toward automatically detecting code-comment consistency.
Special Issue - Standard Paper
- Richard Messnarz

, Vesna Djordjevic, Viktor Grémen, Winifred Menezes, Ahmed Alborae, Rainer Dreves, So Norimatsu, Thomas Wegner, Bernhard Sechser:
The PIM.3 process improvement process - Part of the iNTACS certified process expert training.
Research Article - Methodology
- Xiaoxue Wu

, Shiyu Weng, Bin Zheng, Wei Zheng, Xiang Chen, Xiaobing Sun:
NG_MDERANK: A software vulnerability feature knowledge extraction method based on N-gram similarity. - Barbara Gallina

, Gergo László Steierhoffer, Thomas Young Olesen, Eszter Parajdi, Mike Aarup:
Towards an ontology for process compliance with the (machinery) legislations.
Special Issue - Methodology Paper
- Ruilian Zhao, Shukai Zhang

, Zhifan Zhu, Ying Shang, Weiwei Wang:
E2E test execution optimization for web application based on state reuse.
Research Article - Methodology
- Jingwen Zhao

, Yanxia Wu, Yun Feng, Jibin Dong, Changting Shi:
Detect atomicity violations in concurrent programs through user assistance and identification of suspicious variable access patterns.
Special Issue - Empirical Paper
- Yue Li

, He Zhang, Lanxin Yang
, Liming Dong, Juzheng Zhang, Bohan Liu:
Measuring software engineer's contribution in practice: An industrial experience report. - Mohamed Nejjar

, Luca Zacharias
, Fabian Stiehle
, Ingo Weber
:
LLMs for science: Usage for code generation and data analysis.
Research Article - Methodology
- Mohd Mustaqeem

, Tamanna Siddiqui
, Suhel Mustajab
:
A hybrid-ensemble model for software defect prediction for balanced and imbalanced datasets using AI-based techniques with feature preservation: SMERKP-XGB.
Editorial
- Zhenchang Xing

:
Editorial for the special issue on software refactoring: Application breadth and technical depth.
Research Article - Technology
- Anmol Bilal

, Christoph Mayr-Dorn, Alexander Egyed:
Ranking guidance actions to support engineers in fulfilling process constraints.
Special Issue - Technology Paper
- Yibin Xu

, Tijs Slaats, Boris Düdder
, Thomas Troels Hildebrandt, Tom Van Cutsem
:
Safe design and evolution of smart contracts using dynamic condition response graphs to model generic role-based behaviors.
Editorial
- Ricardo Colomo-Palacios, Richard Messnarz

, Miklós Biró:
Contributions to Systems Software and Service Process Improvement and Innovation Based on Recent Advances.
Research Article - Methodology
- Ankur Kumar, Mohammad Nadeem, Mohammad Shameem:

A Systematic Literature Review for Investigating DevOps Metrics to Implement in Software Development Organizations.
Special Issue - Methodology Paper
- Philipp Diebold:

From Backlogs to Bots: Generative AI's Impact on Agile Role Evolution.
Review Article
- Tugba Gurgen Erdogan

, Haluk Altunel, Ayça Kolukisa Tarhan:
A Process Model for AI-Enabled Software Development: A Synthesis From Validation Studies in White Literature.
Research Article - Methodology
- Yu Qiao

, Xiangfei Lu, Chong Wang
, Jian Wang, Wei Tang, Bing Li:
Predicting Issue Resolution Time of OSS Using Multiple Features.
Research Article - Empirical
- Ayesha Khalid, Mushtaq Raza, Palwasha Afsar, Rafiq Ahmad Khan

, Muhammad Ismail Mohmand, Hanif Ur Rahman
:
A SWOT Analysis of Software Development Life Cycle Security Metrics.
Special Issue - Empirical Paper
- Ítalo Belo

, Carina Alves:
Strategic Patterns to Foster the Evolution of Emerging Software Ecosystems.
Special Issue - Technology Paper
- Richárd Szalay, Zoltán Porkoláb

:
Refactoring to Standard C++20 Modules.
Perspective
- Carolline Pena

, Bruno Cartaxo, Igor Steinmacher
, Deepika Badampudi, Deyvson da Silva, Williby da Silva Ferreira, Adauto Almeida, Fernando Kamei, Sérgio Soares:
Comparing the Efficacy of Rapid Review With a Systematic Review in the Software Engineering Field.
Research Article - Standard
- Syed Sarmad Ali

, Jian Ren, Ji Wu, Kui Zhang, Chao Liu:
Advancing Software Project Effort Estimation: Leveraging a NIVIM for Enhanced Preprocessing.
Research Article - Empirical
- Affan Yasin, Rubia Fatima, Ira Puspitasari, Jiangbin Zheng, Zhi Li:

Enhancing Literature Quality Assessment Skill in Novice Researchers: A Collaborative Card-Based Learning Approach. - Muhammad Ovais Ahmad

:
Strengthening Large-Scale Agile Teams: The Interplay of High-Quality Relationships, Psychological Safety, and Learning From Failures.
Review Article
- Y. Sun:

Cloud and Edge Computing as Effective Trends in Business Model Innovation: A Bibliometric Review.
Research Article - Empirical
- Aurora Vizcaíno

, Julio Suarez Albanchez, Darja Smite, Félix García:
Understanding Remote Work Experience: Insights Into Well-Being. - Rafiq Ahmad Khan

, Ismail Keshta, Hussein Ali Al Hashimi
, Alaa Omran Almagrabi, Hathal Salamah Alwageed, Musaad Alzahrani:
A Fuzzy-AHP Decision-Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems.
Research Article - Standards
- Sergio Salomón

, Rafael Duque
, Santos Bringas, Káthia Marçal de Oliveira:
Quality-in-Use in Practice: A Study for Context-Aware Software Systems in Pervasive Environments.
Research Article - Methodology
- Yuying Wang

, Yichen Li
, Haozhao Wang, Lei Zhao, Xiaofang Zhang
:
Better Knowledge Enhancement for Privacy-Preserving Cross-Project Defect Prediction.
Research Article - Empirical
- Yangyang Zhao

, Chenglin Li, Zhifei Chen
, Zuohua Ding:
Dissecting Code Features: An Evolutionary Analysis of Kernel Versus Nonkernel Code in Operating Systems.
Perspective
- Tahir Ahmad

, Amy Van Looy
:
Process-Technology Fit Decisions: Evidence From an Expert Panel and Case Studies.
Research Article - Technology
- Achim D. Brucker

, Sakine Yalman
:
Ensuring Confidentiality in Supply Chains With an Application to Life-Cycle Assessment.
Research Article - Empirical
- Ye Wang, Weihao Xue, Qiao Huang

, Bo Jiang, Hua Zhang:
Exploring ChatGPT's Potential in Java API Method Recommendation: An Empirical Study.
Volume 37, Number 2, February 2025
Research Article - Empirical
- Jaime Sayago-Heredia

, Gustavo Chango Sailema, Ricardo Pérez-Castillo
, Mario Piattini:
Analyzing the Correlation Between Toxic Comments and Code Quality.
Research Article - Technology
- T. Pandiyavathi

, B. Sivakumar:
Software Refactoring Network: An Improved Software Refactoring Prediction Framework Using Hybrid Networking-Based Deep Learning Approach.
Special Issue - Technology Paper
- Tafline Ramos

, Amanda Dean, David McGregor:
AI-Augmented Software Engineering: Revolutionizing or Challenging Software Quality and Testing?
Review Article
- Maria Monserrat Barceló

, Antònia Mas, Antoni Lluís Mesquida
:
A Study of Factors That Influence the Software Project Success.
Research Article - Empirical
- Madhu Kumari, Rashmi Singh, V. B. Singh

:
Prioritization of Software Bugs Using Entropy-Based Measures. - Baris Ardiç, Eray Tüzün

:
A Serious Game Approach to Introduce the Code Review Practice.
Review Article
- Fatima Ezzahra Boujida

, Fatima Azzahra Amazal
, Ali Idri
:
Neural Networks-Based Software Development Effort Estimation: A Systematic Literature Review.
Research Article - Empirical
- Mariana Maia Peixoto

, Tony Gorschek, Daniel Méndez, Carla Silva
, Davide Fucci:
The Perspective of Agile Software Developers on Data Privacy.
Research Article - Technology
- Lingxiao Zhao, Hui Li

, Yongqian Chen, Xiaowei Pan, Shikai Guo
:
Structuring Semantic-Aware Relations Between Bugs and Patches for Accurate Patch Evaluation.
Review Article
- T. Pandiyavathi

, B. Sivakumar:
Ensemble Deep Network for Secured Refactoring Framework by Predicting Code-Bad Smells in Software Projects.
Research Article - Methodology
- Yousra Bendaly Hlaoui, Salma Ayari

:
An Approach to Develop Correct-by-Construction Business Process Models Using a Formal Domain Specific Language.
Research Article - Empirical
- Weiwei Wang, Shukai Zhang, Kepeng Qiu, Xuejun Liu, Xiaodan Li, Ruilian Zhao:

Influencing Factors' Analysis for the Performance of Parallel Evolutionary Test Case Generation for Web Applications.
Research Article - Technology
- Casper van Schothorst

, Slinger Jansen
, Liza Lausberg:
The Indispensable Role of Software Ecosystem Services.
Volume 37, Number 3, March 2025
Editorial
- Banani Roy, Mohammad Ghafari, Mariano Ceccato

:
Guest Editorial for the Special Issue on Source Code Analysis and Manipulation, SCAM 2022.
Research Article - Standards
- Jalil Abbas

, Cheng Zhang, Bin Luo:
BET-BiLSTM Model: A Robust Solution for Automated Requirements Classification.
Research Article - Empirical
- Zhifei Chen

, Chiheng Jia, Yanhui Li
, Lin Chen:
Using Dynamic and Static Techniques to Establish Traceability Links Between Production Code and Test Code on Python Projects: A Replication Study.
Research Article - Technology
- Atif Ali Wagan

, Shuaiyong Li
:
Multilabeled Emotions Classification in Software Engineering Text Using Convolutional Neural Networks and Word Embeddings.
Review Article
- Müge Canpolat Sahin, Ayça Kolukisa Tarhan:

A Multi-Perspective Review on Embedded Systems Quality: State of the Field, Challenges, and Research Directions.
Volume 37, Number 4, 2025
- Zhang Zhang, Xinjun Mao, Shangwen Wang, Kang Yang, Tanghaoran Zhang, Yao Lu:

CARLDA: An Approach for Stack Overflow API Mention Recognition Driven by Context and LLM-Based Data Augmentation. - Igor Pereira, Tiago G. S. Carneiro, Eduardo Figueiredo:

Manipulating a CI/CD Pipeline in an IoT Embedded Project: A Quasi-Experiment. - Issue Information.

- Yang Gao, Siqi Lu, Yongjuan Wang, Haopeng Fan, Qingdi Han, Jingsheng Li:

ECP: Coprocessor Architecture to Protect Program Logic Consistency. - Bahar Gezici, Ayça Kolukisa Tarhan:

Explainable AI Framework for Software Defect Prediction. - Déaglán Connolly Bree, Mel Ó Cinnéide:

How Software Design Affects Energy Performance: A Systematic Literature Review. - Huijie Tu, Xiangjuan Yao, Tingting Hou, Dunwei Gong, Mengyi Yang:

Community Detection of Directed Network for Software Ecosystems Based on a Two-Step Information Dissemination Model. - Peixuan Feng, Yongjuan Wang, Siqi Lu, Qingjun Yuan, Gang Yu, Xiangyu Wang, Jianan Liu, Huaiguang Wu:

Evaluation Framework for Smart Contract Fuzzers. - Muhammad Yaseen, Zara Karamat:

Requirements Engineering Model (REM): An Assessment Model for Software Vendor Organizations. - Muhammad Yaseen, Muhammad Asif Nauman, Roobaea Alroobaea, Hamed Alsufyani, Umar Farooq Khattak:

Prioritization of Functional Requirements Using Directed Graph and K-Means Clustering. - Antonio Martini, Viktoria Stray, Terese Besker, Nils Brede Moe, Jan Bosch:

Process Debt: Definition, Risks, and Management. - Balaji Barmavat, Dhanaraju M, K. Sreerama Murthy, Hari Krishna Madthala, Satya Krupa Prakash Karey, Rajesh Palthya:

Multilabel Vulnerability Classification in Decentralized Blockchain-Based Reputation System.
Volume 37, Number 5, 2025
- Jin-Fu Chen, Jiapeng Zhou, Wei Lin, Dave Towey, Saihua Cai, Haibo Chen, Jinfu Chen, Yemin Yin:

A Novel Vulnerability-Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation. - Ala Arman, Emiliano Di Reto, Massimo Mecella, Giuseppe Santucci:

Functional Size Measurement With Conceptual Models: A Systematic Literature Review. - Robin Korfmann, Patrick Beyersdorffer, Rainer Gerlich, Jürgen Münch, Marco Kuhrmann:

Overcoming Data Shortage in Critical Domains With Data Augmentation for Natural Language Software Requirements. - Everaldo Gomes, Eduardo Guerra, Phyllipe Lima, Paulo Meirelles:

An Approach Based on Metadata to Implement Convention Over Configuration Decoupled From Framework Logic. - Issue Information.

- Gökhan Sit, Süleyman Ersöz, Mehmet Burak Bilgin:

Improvement of Software Testing Processes With Test Maturity Model Integration.
Volume 37, Number 6, 2025
- Maysa Sinan, Mojtaba Shahin, Iqbal Gondal:

Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions. - Issue Information.

Volume 37, Number 7, 2025
- Shuoxiao Zhang, Enyi Tang, Xinyu Gao, Zhekai Zhang, Yixiao Shan, Haofeng Zhang, Ziyang He, Jianhua Zhao, Xuandong Li:

Exploring the Effectiveness of Open-Source Donation Platform: An Empirical Study on Opencollective. - Anup Kumar Behera, Priyanka Agarwal:

Modeling Software Reliability With Power Law Testing Effort Function Under Operational Uncertain Environment. - Xiangyue Liu, Xiaobing Sun, Lili Bo, Yufei Hu, Xinwei Liu, Zhenlei Ye:

Evaluating the Test Adequacy of Benchmarks for LLMs on Code Generation. - Charles Miranda, Guilherme Avelino, Pedro de A. Santos Neto:

Test Co-Evolution in Software Projects: A Large-Scale Empirical Study. - Alexander Poth, Olsi Rrjolli:

"Eco-Friendly" Micro-Services: Resource Footprint of Cloud-Native Micro-Services Written in Java - A Balance Between Build-Time and Run-Time Effects of Releases. - Issue Information.

Volume 37, Number 8, 2025
- Laura Aschbacher, Mikus Zelmenis, Richard Messnarz, Damjan Ekert:

Strategic Intelligence Management (ISO 56006) - Using AI by the Innovation Agent Task Force in the Automotive Skills Alliance (ASA). - Yubin Qu, Song Huang, Yongming Yao, Peng Nie:

A Simple Yet Practical Backdoor Prompt Attack Against Black-Box Code Summarization Engines. - Issue Information.

- Fiza Talha, Touseef Tahir, Talha Nadeem:

A Semiautomated Approach for Detecting Ambiguities in Software Requirements Using SpanBERT and Named Entity Recognition. - Raimel Sobrino-Duque, Juan Antonio Plasencia, María Ángeles Moraga, Félix García, Begoña Moros, Joaquín Nicolás, José Luis Fernández-Alemán:

Evaluating Sustainability Through Business Processes Indicators: A Case Study. - Muhammad Yaseen, Waqar Mehmood, Fazal Hameed, Muhammad Asif Nauman:

Scalability and Limitations of Existing Software Requirements Prioritization Techniques: A Systematic Literature Review.
Volume 37, Number 9, 2025
- Issue Information.

- Matteo Pancini, Matteo Camilli, Giovanni Quattrocchi, Damian Andrew Tamburri:

Engineering MLOps Pipelines With Data Quality: A Case Study on Tabular Datasets in Kaggle. - José A. Calvo-Manzano, Tomás San Feliu, Ángel Herranz, Julio Mariño, Lars-Åke Fredlund, Ana María Moreno:

CyberESP: An Integrated Cybersecurity Framework for SMEs. - Yifan Zou, Huiqiang Wang, Hongwu Lv, Shuai Zhao:

UFR-OSFA: Unified Feature Representation and Oppositional Structure Feature Alignment for Mixed-Project Heterogeneous Defect Prediction. - Qing Mi, Zhiyou Xiao, Yi Zhan, Liyan Tao, Jiahe Zhang:

Towards Explainable Code Readability Classification With Graph Neural Networks. - Huijie Tu, Xiangjuan Yao, Dunwei Gong, Yan Yang:

Prioritization Method for Crowdsourced Test Report by Integrating Text and Image Information. - Shabbab Ali Algamdi, Abdul Wahid Khan, Jamshid Ahmad, Moulay Ibrahim El-khalil Ghembaza:

Key Success Factors of Cybersecurity Awareness in Distributed Teams. - Shiyu Weng, Xiaoxue Wu, Tianci Li, Chen Yao, Wenjing Shan, Xiaobing Sun:

From Data to Knowledge: Mining Linux Vulnerability Characteristics and Evolution With Knowledge Graphs. - Roshan Namal Rajapakse, Claudia Szabo:

Towards Multi-Class Socio-Technical Congruence: Assessing Coordination in Collaborative Software Development Settings. - Reem Alfayez, Amal Alazba:

Merge Conflict Prediction Using Feature Selection and Stacking Heterogeneous Ensembles: An Empirical Investigation. - Linyi Han, Hang Li, Xiaowang Zhang, Youmeng Li, Zhi-Yong Feng:

UCLP: Unsupervised Classification of Key Aspects in Vulnerability Descriptions Through Label Profile. - Rodrigo Pereira dos Santos, Antonia Bertolino, Pablo Oliveira Antonino, Doo-Hwan Bae:

Advances in Software Engineering Research for Systems-of-Systems and Software Ecosystems. - Shah Nawaz, Muhammad Yaseen, Gohar Rahman, Jasim Saeed:

Cluster Analysis of Security Threats in Web Applications: A Multiphase SDLC Analysis. - Rafiq Ahmad Khan, Hussein Ali Al Hashimi, Hathal Salamah Alwageed, Ismail Keshta, Alaa Omran Almagrabi, Sarra Ayouni:

Securing Software Development Through People Maturity: A Fuzzy-AHP Decision-Making Framework.
Volume 37, Number 10, 2025
- Islam Zada, Sara Shahzad, Esraa Omran, Abdullah Alshahrani, Hessa Alfraihi, Yasir Hamid, Mohd Asif Shah:

The LAGSSE Framework: Integrating Lean, Agile, and Green Principles for Sustainable Software Engineering. - Emanuele De Angelis, Guglielmo De Angelis, Maurizio Mongelli, Maurizio Proietti:

A Validation Methodology for XAI Decision Support Systems Against Relational Domain Properties. - Suyash Shukla, Sandeep Kumar:

PredictPP: A Rank-Based Weighted Ensemble Model for Prediction of Software Project Productivity. - Lili Quan, Jin Wen, Qiang Hu, Maxime Cordy, Yuheng Huang, Lei Ma, Xiaohong Li:

Evaluation and Improvement of Test Selection for Large Language Models. - Issue Information.

- Ibtesam Bashir Gwasem:

A Comprehensive Framework for Testing Goal-Oriented NFPs in Software Product Lines.
Volume 37, Number 11, 2025
- Christoph Mayr-Dorn, Anmol Bilal, Cosmina-Cristina Ratiu, Alexander Egyed:

Generating Quality Assurance Constraints From Natural Language With LLMs. - Muhammad Yaseen, Anum Bahar, Gohar Rahman, Mirjalol Ashurov, Erkin Kholiyarov:

Minimizing Inter-Dependencies in Functional Requirements for Timely Delivery of Software Projects: A Prioritization Approach Using AHP and Spanning Trees. - Issue Information.

- Feifei Niu, Chuanyi Li, Heng Chen, Jidong Ge, Bin Luo, Alexander Egyed:

Utilizing Creator Profiles for Predicting Valuable User Enhancement Reports. - Yilong Yang, Yihui Jian, Shaohong Zhu, Runkun Zhang, Zhi Li, Li Zhang:

RM2EIS: Automatic Generation of Enterprise Information Systems From Contract-Based Requirements Model. - Yongchao Xing, Weipan Yang, Yiming Lv, Dianhui Chu, Zhiying Tu:

How Far Is Machine Learning From the Detection of Complex Microservice Bad Smells? - Correction to "Key Success Factors of Cybersecurity Awareness in Distributed Teams".

- Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Filomena Ferrucci, Fabio Palomba:

A Novel, Tool-Supported Catalog of Community Smell Symptoms.
Volume 37, Number 12, 2025
- Vasil Shteriyanov, Rimma Dzhusupova, Jan Bosch, Helena Holmström Olsson:

Enhancing OCR-based Engineering Diagram Analysis by Integrating Diverse External Legends with VLMs. - Thomas Liedtke, Richard Messnarz, Damjan Ekert, Alexander Much:

A Multilevel Approach to TARA: Proposals for Attack Feasibility in Interference-Free Scenarios. - Michele Chiari, Matteo Camilli, Marcello M. Bersani, Rutger van Beusekom, Damian A. Tamburri:

Reality Check on Formal Methods in Industry: A Study of Verum Dezyne. - Malek Al zeibak, Mohammad R. Alshayeb, Malak Baslyman, Mahmood Niazi:

A Cybersecurity Maturity Model for Digitally Transformed Organizations. - Karthik Shivashankar, Kristian Marison Haugerud, Antonio Martini:

Enhancing Task Prioritization in Software Development Issues Tracking System. - Runhan Zhang, Shah Nazir:

Software Asset Management Roles and Responsibilities for Projects Using AHP and WASPAS. - Issue Information.

- Ioannis Zozas, Stamatia Bibi, Apostolos Ampatzoglou, Elvira-Maria Arvanitou, Pantelis Angelidis, Markos G. Tsipouras:

A Mapping Study on JavaScript Quality Attributes and Metrics.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














