


default search action
ACM Transactions on Software Engineering and Methodology, Volume 33
Volume 33, Number 1, January 2024
- Mauro Pezzè
:
Editorial: Toward the Future with Eight Issues Per Year. 1e:1-1e:2 - Shouguo Yang
, Chaopeng Dong
, Yang Xiao
, Yiran Cheng
, Zhiqiang Shi
, Zhi Li
, Limin Sun
:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. 1:1-1:40 - Xuanzhe Liu
, Chengxu Yang
, Ding Li
, Yuhan Zhou
, Shaofei Li
, Jiali Chen
, Zhenpeng Chen
:
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces. 2:1-2:27 - Suyu Ma
, Chunyang Chen
, Hourieh Khalajzadeh
, John Grundy
:
A First Look at Dark Mode in Real-world Android Apps. 3:1-3:26 - Jiarong Wu
, Lili Wei
, Yanyan Jiang
, Shing-Chi Cheung
, Luyao Ren
, Chang Xu
:
Programming by Example Made Easy. 4:1-4:36 - Narjes Bessghaier
, Mohammed Sayagh
, Ali Ouni
, Mohamed Wiem Mkaouer
:
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects. 5:1-5:37 - Qing Huang
, Yanbang Sun
, Zhenchang Xing
, Min Yu
, Xiwei Xu
, Qinghua Lu
:
API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model. 6:1-6:25 - Jeho Oh
, Don S. Batory
, Ruben Heradio
:
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees. 7:1-7:36 - Chang-Ai Sun
, Hepeng Dai
, Ning Geng
, Huai Liu
, Tsong Yueh Chen
, Peng Wu
, Yan Cai
, Jinqiu Wang
:
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs. 8:1-8:21 - Toni Taipalus
, Hilkka Grahn
:
Framework for SQL Error Message Design: A Data-Driven Approach. 9:1-9:50 - Andrew G. Clark
, Michael Foster
, Benedikt Prifling
, Neil Walkinshaw
, Robert M. Hierons
, Volker Schmidt
, Robert D. Turner
:
Testing Causality in Scientific Modelling Software. 10:1-10:42 - Jianzhong Liu
, Yuheng Shen
, Yiru Xu
, Hao Sun
, Yu Jiang
:
Horus: Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures. 11:1-11:25 - Sina Entekhabi
, Wojciech Mostowski
, Mohammad Reza Mousavi
:
Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving. 12:1-12:32 - Carlo A. Furia
, Richard Torkar
, Robert Feldt
:
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions. 13:1-13:35 - Olivier Nourry
, Yutaro Kashiwa
, Bin Lin
, Gabriele Bavota
, Michele Lanza
, Yasutaka Kamei
:
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities. 14:1-14:26 - Pei Liu
, Yanjie Zhao
, Mattia Fazzini
, Haipeng Cai
, John Grundy
, Li Li
:
Automatically Detecting Incompatible Android APIs. 15:1-15:33 - Hengcheng Zhu
, Lili Wei
, Valerio Terragni
, Yepang Liu
, Shing-Chi Cheung
, Jiarong Wu
, Qin Sheng
, Bing Zhang
, Lihong Song
:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. 16:1-16:31 - Yongqiang Tian
, Xueyan Zhang
, Yiwen Dong
, Zhenyang Xu
, Mengxiao Zhang
, Yu Jiang
, Shing-Chi Cheung
, Chengnian Sun
:
On the Caching Schemes to Speed Up Program Reduction. 17:1-17:30 - Claudio Mandrioli
, Max Nyberg Carlsson
, Martina Maggio
:
Testing Abstractions for Cyber-Physical Control Systems. 18:1-18:32 - Wang Fang
, Mingsheng Ying
, Xiaodi Wu
:
Differentiable Quantum Programming with Unbounded Loops. 19:1-19:63
- Yuanhang Yang
, Wei He
, Cuiyun Gao
, Zenglin Xu
, Xin Xia
, Chuanyi Liu
:
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site. 20:1-20:25 - Tianlin Li
, Xiaofei Xie
, Jian Wang
, Qing Guo
, Aishan Liu
, Lei Ma
, Yang Liu
:
Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis. 21:1-21:24 - Xueqi Dang
, Yinghua Li
, Mike Papadakis
, Jacques Klein
, Tegawendé F. Bissyandé
, Yves Le Traon
:
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. 22:1-22:40 - Yuhan Zhi
, Xiaofei Xie
, Chao Shen
, Jun Sun
, Xiaoyu Zhang
, Xiaohong Guan
:
Seed Selection for Testing Deep Neural Networks. 23:1-23:33 - Hanyang Guo
, Xiangping Chen
, Yuan Huang
, Yanlin Wang
, Xi Ding
, Zibin Zheng
, Xiaocong Zhou
, Hong-Ning Dai
:
Snippet Comment Generation Based on Code Context Expansion. 24:1-24:30 - Qiang Hu
, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing. 25:1-25:28
- Han Hu
, Yujin Huang
, Qiuyuan Chen
, Terry Yue Zhuo
, Chunyang Chen
:
A First Look at On-device Models in iOS Apps. 26:1-26:30
- Amid Golmohammadi
, Man Zhang
, Andrea Arcuri
:
Testing RESTful APIs: A Survey. 27:1-27:41
- Michael Weiss
, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks. 28:1-28:29
- Michael Weiss
, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report. 29:1-29:4
Volume 33, Number 2, February 2024
- Yu Zhou
, Weilin Zhan
, Zi Li
, Tingting Han
, Taolue Chen
, Harald C. Gall
:
DRIVE: Dockerfile Rule Mining and Violation Detection. 30:1-30:23 - Qing Huang
, Zhiqiang Yuan
, Zhenchang Xing
, Xin Peng
, Xiwei Xu
, Qinghua Lu
:
FQN Inference in Partial Code by Prompt-tuned Language Model of Code. 31:1-31:32 - Jaekwon Lee
, Seung Yeob Shin
, Lionel C. Briand
, Shiva Nejati
:
Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages. 32:1-32:34 - Knut H. Rolland
, Brian Fitzgerald
, Torgeir Dingsøyr
, Klaas-Jan Stol
:
Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development. 33:1-33:45 - Xiaoye Zheng
, Zhiyuan Wan
, Yun Zhang
, Rui Chang
, David Lo
:
A Closer Look at the Security Risks in the Rust Ecosystem. 34:1-34:30 - Claudio Mandrioli
, Seung Yeob Shin
, Martina Maggio
, Domenico Bianculli
, Lionel C. Briand
:
Stress Testing Control Loops in Cyber-physical Systems. 35:1-35:58 - SayedHassan Khatoonabadi
, Diego Elias Costa
, Suhaib Mujahid
, Emad Shihab
:
Understanding the Helpfulness of Stale Bot for Pull-Based Development: An Empirical Study of 20 Large Open-Source Projects. 36:1-36:43 - Yixuan Zhang
, Shangtong Cao
, Haoyu Wang
, Zhenpeng Chen
, Xiapu Luo
, Dongliang Mu
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
Characterizing and Detecting WebAssembly Runtime Bugs. 37:1-37:29 - Zishuo Ding
, Yiming Tang
, Xiaoyu Cheng
, Heng Li
, Weiyi Shang
:
LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates. 38:1-38:45 - Weishi Shi
, Heather Moses
, Qi Yu
, Samuel A. Malachowsky
, Daniel E. Krutz
:
ALL: Supporting Experiential Accessibility Education and Inclusive Software Development. 39:1-39:30 - Federico Formica
, Tony Fan
, Claudio Menghi
:
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions. 40:1-40:37 - Jiajun Jiang
, Yumeng Wang
, Junjie Chen
, Delin Lv
, Mengjiao Liu
:
Variable-based Fault Localization via Enhanced Decision Tree. 41:1-41:32 - Wei Huang
, Xingyu Zhao
, Alec Banks
, Victoria Cox
, Xiaowei Huang
:
Hierarchical Distribution-aware Testing of Deep Learning. 42:1-42:35 - Sicong Cao
, Xiaobing Sun
, Lili Bo
, Rongxin Wu
, Bin Li
, Xiaoxue Wu
, Chuanqi Tao
, Tao Zhang
, Wei Liu
:
Learning to Detect Memory-related Vulnerabilities. 43:1-43:35 - Elkhan Ismayilzada
, Md Mazba Ur Rahman
, Dongsun Kim
, Jooyong Yi
:
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair. 44:1-44:39 - Yuanhang Zhou
, Fuchen Ma
, Yuanliang Chen
, Meng Ren
, Yu Jiang
:
CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing. 45:1-45:28 - Yi Xiang
, Han Huang
, Sizhe Li
, Miqing Li
, Chuan Luo
, Xiaowei Yang
:
Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization. 46:1-46:52 - Han Hu
, Ruiqi Dong
, John Grundy
, Thai Minh Nguyen
, Huaxiao Liu
, Chunyang Chen
:
Automated Mapping of Adaptive App GUIs from Phones to TVs. 47:1-47:31
- Yuejun Guo
, Qiang Hu
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
KAPE: kNN-based Performance Testing for Deep Code Search. 48:1-48:24 - Jiamou Sun
, Zhenchang Xing
, Xin Xia
, Qinghua Lu
, Xiwei Xu
, Liming Zhu
:
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. 49:1-49:38 - Jiawei Liu
, Yuheng Huang
, Zhijie Wang
, Lei Ma
, Chunrong Fang
, Mingzheng Gu
, Xufan Zhang
, Zhenyu Chen
:
Generation-based Differential Fuzzing for Deep Learning Libraries. 50:1-50:28 - Jiho Shin
, Moshi Wei
, Junjie Wang
, Lin Shi
, Song Wang
:
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks. 51:1-51:24
- Siyuan Li
, Yongpan Wang
, Chaopeng Dong
, Shouguo Yang
, Hong Li
, Hao Sun
, Zhe Lang
, Zuxin Chen
, Weijie Wang
, Hongsong Zhu
, Limin Sun
:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. 52:1-52:35 - Rafael Dutra
, Rahul Gopinath
, Andreas Zeller
:
FormatFuzzer: Effective Fuzzing of Binary File Formats. 53:1-53:29
- Yutao Xie
, Jiayi Lin
, Hande Dong
, Lei Zhang
, Zhonghai Wu
:
Survey of Code Search Based on Deep Learning. 54:1-54:42 - Quanjun Zhang
, Chunrong Fang
, Yuxiang Ma
, Weisong Sun
, Zhenyu Chen
:
A Survey of Learning-based Automated Program Repair. 55:1-55:69
Volume 33, Number 3, March 2024
- Ya Xiao
, Wenjia Song
, Salman Ahmed
, Xinyang Ge
, Bimal Viswanath
, Na Meng
, Danfeng (Daphne) Yao
:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. 56:1-56:30 - Daniel Russo
, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-Being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic. 57:1-57:44 - Andre Lustosa
, Tim Menzies
:
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health. 58:1-58:22 - Yanming Yang
, Xing Hu
, Xin Xia
, Xiaohu Yang
:
The Lost World: Characterizing and Detecting Undiscovered Test Smells. 59:1-59:32 - Guang Yang
, Yu Zhou
, Wenhua Yang
, Tao Yue
, Xiang Chen
, Taolue Chen
:
How Important Are Good Method Names in Neural Code Generation? A Model Robustness Perspective. 60:1-60:35 - Jiajun Jiang
, Junjie Yang
, Yingyi Zhang
, Zan Wang
, Hanmo You
, Junjie Chen
:
A Post-training Framework for Improving the Performance of Deep Learning Models via Model Transformation. 61:1-61:41 - Jia Li
, Zhuo Li
, Huangzhao Zhang
, Ge Li
, Zhi Jin
, Xing Hu
, Xin Xia
:
Poison Attack and Poison Detection on Deep Source Code Processing Models. 62:1-62:31 - Wen Li
, Austin Marino
, Haoran Yang
, Na Meng
, Li Li
, Haipeng Cai
:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. 63:1-63:46 - Sangeeth Kochanthara
, Tajinder Singh
, Alexandru Forrai
, Loek Cleophas
:
Safety of Perception Systems for Automated Driving: A Case Study on Apollo. 64:1-64:28 - Armin Zirak
, Hadi Hemmati
:
Improving Automated Program Repair with Domain Adaptation. 65:1-65:43 - Wensheng Tang
, Dejun Dong
, Shijie Li, Chengpeng Wang
, Peisen Yao
, Jinguo Zhou
, Charles Chuan Zhang
:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. 66:1-66:33 - Tingwei Zhu
, Zhong Li
, Minxue Pan
, Chaoxuan Shi
, Tian Zhang
, Yu Pei
, Xuandong Li
:
Deep Is Better? An Empirical Comparison of Information Retrieval and Deep Learning Approaches to Code Summarization. 67:1-67:37 - Zhe Zhao
, Guangke Chen
, Tong Liu
, Taishan Li
, Fu Song
, Jingyi Wang
, Jun Sun
:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. 68:1-68:45 - Junda He
, Xin Zhou
, Bowen Xu
, Ting Zhang
, Kisub Kim
, Zhou Yang
, Ferdian Thung
, Ivana Clairine Irsan
, David Lo
:
Representation Learning for Stack Overflow Posts: How Far Are We? 69:1-69:24 - Binhang Qi
, Hailong Sun
, Hongyu Zhang
, Xiang Gao
:
Reusing Convolutional Neural Network Models through Modularization and Composition. 70:1-70:39 - Md Rakib Hossain Misu
, Rohan Achar
, Cristina V. Lopes
:
SourcererJBF: A Java Build Framework For Large-Scale Compilation. 71:1-71:35
- Zhihao Li
, Chuanyi Li
, Ze Tang
, Wanhong Huang
, Jidong Ge
, Bin Luo
, Vincent Ng
, Ting Wang
, Yucheng Hu
, Xiaopeng Zhang
:
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation. 72:1-72:30 - Matteo Biagiola
, Paolo Tonella
:
Testing of Deep Reinforcement Learning Agents with Surrogate Models. 73:1-73:33 - Luca Giamattei
, Antonio Guerriero
, Roberto Pietrantuono
, Stefano Russo
:
Causality-driven Testing of Autonomous Driving Systems. 74:1-74:35 - Weisong Sun
, Chunrong Fang
, Yuchen Chen
, Quanjun Zhang
, Guanhong Tao
, Yudu You
, Tingxu Han
, Yifei Ge
, Yuling Hu
, Bin Luo
, Zhenyu Chen
:
An Extractive-and-Abstractive Framework for Source Code Summarization. 75:1-75:39 - Will Leeson
, Matthew B. Dwyer
:
Algorithm Selection for Software Verification Using Graph Neural Networks. 76:1-76:36 - Hichem Belgacem
, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
Learning-based Relaxation of Completeness Requirements for Data Entry Forms. 77:1-77:32
- Michael Fu
, Van Nguyen
, Chakkrit Tantithamthavorn
, Dinh Phung
, Trung Le
:
Vision Transformer Inspired Automated Vulnerability Repair. 78:1-78:29 - Pengfei Gao
, Fu Song
, Taolue Chen
:
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks. 79:1-79:38
- Aastha Pant
, Rashina Hoda
, Simone V. Spiegler
, Chakkrit Tantithamthavorn
, Burak Turhan
:
Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges. 80:1-80:35
- Johan Cederbladh
, Antonio Cicchetti
, Jagadish Suryadevara
:
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review. 81:1-81:67
- Daniel Russo
, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic - RCR Report. 82:1-82:4
Volume 33, Number 4, May 2024
- Mauro Pezzè
:
Editorial: ICSE and the Incredible Contradictions of Software Engineering. 83:1-83:2 - Weifeng Pan
, Marouane Kessentini
, Ming Hua, Zijiang Yang
:
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches. 84:1-84:43 - Chidera Biringa
, Gökhan Kul
:
PACE: A Program Analysis Framework for Continuous Performance Prediction. 85:1-85:23 - Peng Zhang
, Yang Wang
, Xutong Liu
, Zeyu Lu
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Ziyuan Wang
, Chang-Ai Sun
, Xiao Yu
, Yuming Zhou
:
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? 86:1-86:32 - Alessio Ferrari
, Thaide Huichapa
, Paola Spoletini
, Nicole Novielli
, Davide Fucci
, Daniela Girardi
:
Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews. 87:1-87:36 - Sai Anirudh Karre
, Y. Raghu Reddy
, Raghav Mittal
:
RE Methods for Virtual Reality Software Product Development: A Mapping Study. 88:1-88:31 - Zhe Chen
, Rui Yan
, Yingzi Ma
, Yulei Sui
, Jingling Xue
:
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety. 89:1-89:47 - Pablo C. Cañizares
, Jose María López-Morales
, Sara Pérez-Soler
, Esther Guerra
, Juan de Lara
:
Measuring and Clustering Heterogeneous Chatbot Designs. 90:1-90:43 - Bentley James Oakes
, Michalis Famelis
, Houari A. Sahraoui
:
Building Domain-Specific Machine Learning Workflows: A Conceptual Framework for the State of the Practice. 91:1-91:50 - Changjie Shao
, Gaolei Li
, Jun Wu
, James Xi Zheng
:
Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based Software Vulnerability Detection. 92:1-92:28 - Baharin Aliashrafi Jodat
, Abhishek Chandar
, Shiva Nejati
, Mehrdad Sabetzadeh
:
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures. 93:1-93:32 - Neelofar
, Aldeida Aleti
:
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features. 94:1-94:32 - Donato Clun
, Donghwan Shin
, Antonio Filieri
, Domenico Bianculli
:
Rigorous Assessment of Model Inference Accuracy using Language Cardinality. 95:1-95:39 - Anshunkang Zhou
, Yikun Hu
, Xiangzhe Xu
, Charles Zhang
:
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation. 96:1-96:31 - Kai Gao
, Runzhi He
, Bing Xie
, Minghui Zhou
:
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement. 97:1-97:27 - Shaiful Alam Chowdhury
, Gias Uddin
, Hadi Hemmati
, Reid Holmes
:
Method-level Bug Prediction: Problems and Promises. 98:1-98:31 - Qunying Song
, Emelie Engström
, Per Runeson
:
Industry Practices for Challenging Autonomous Driving Systems with Critical Scenarios. 99:1-99:35 - Mingxuan Zhu
, Dan Hao
, Junjie Chen
:
Compiler Autotuning through Multiple-phase Learning. 100:1-100:38 - Taijara Loiola de Santana
, Paulo Anselmo da Mota Silveira Neto
, Eduardo Santana De Almeida
, Iftekhar Ahmed
:
Bug Analysis in Jupyter Notebook Projects: An Empirical Study. 101:1-101:34 - Zhenfei Huang
, Junjie Chen
, Jiajun Jiang
, Yihua Liang
, Hanmo You
, Fengjie Li
:
Mapping APIs in Dynamic-typed Programs by Leveraging Transfer Learning. 102:1-102:29
- Sungmin Kang
, Robert Feldt
, Shin Yoo
:
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders. 103:1-103:24 - Han Wang
, Sijia Yu
, Chunyang Chen
, Burak Turhan
, Xiaodong Zhu
:
Beyond Accuracy: An Empirical Study on Unit Testing in Open-source Deep Learning Projects. 104:1-104:22 - Shikai Guo
, Dongmin Li
, Lin Huang
, Sijia Lv
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction. 105:1-105:25 - Hanyang Guo
, Yingye Chen
, Xiangping Chen
, Yuan Huang
, Zibin Zheng
:
Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization. 106:1-106:31
- Davide Pizzolotto
, Stefano Berlato
, Mariano Ceccato
:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. 107:1-107:38 - Puzhuo Liu
, Yaowen Zheng
, Chengnian Sun
, Hong Li
, Zhi Li
, Limin Sun
:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. 108:1-108:26
- Hashini Gunatilake
, John C. Grundy
, Rashina Hoda
, Ingo Mueller
:
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study. 109:1-109:41 - Xin Tan
, Xinyue Lv
, Jing Jiang
, Li Zhang
:
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share. 110:1-110:28
- Qiang Hu
, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Lei Ma
, Mike Papadakis
, Yves Le Traon
:
Test Optimization in DNN Testing: A Survey. 111:1-111:42
Volume 33, Number 5, June 2024
- Martin P. Robillard
, Deeksha M. Arya
, Neil A. Ernst
, Jin L. C. Guo
, Maxime Lamothe
, Mathieu Nassif
, Nicole Novielli
, Alexander Serebrenik
, Igor Steinmacher
, Klaas-Jan Stol
:
Communicating Study Design Trade-offs in Software Engineering. 112:1-112:10
- Raphaël Ollando
, Seung Yeob Shin
, Lionel C. Briand
:
Learning Failure-Inducing Models for Testing Software-Defined Networks. 113:1-113:25 - Cuifeng Gao
, Wenzhang Yang
, Jiaming Ye
, Yinxing Xue
, Jun Sun
:
sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts. 114:1-114:55 - Lin Yang
, Junjie Chen
, Shutao Gao
, Zhihao Gong
, Hongyu Zhang
, Yue Kang
, Huaan Li
:
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection. 115:1-115:27 - Yue Liu
, Thanh Le-Cong
, Ratnadira Widyasari
, Chakkrit Tantithamthavorn
, Li Li
, Xuan-Bach Dinh Le
, David Lo
:
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues. 116:1-116:26 - Emre Sülün
, Metehan Saçakçi
, Eray Tüzün
:
An Empirical Analysis of Issue Templates Usage in Large-Scale Projects on GitHub. 117:1-117:28 - Xinmeng Xia
, Yang Feng
, Qingkai Shi
, James A. Jones
, Xiangyu Zhang
, Baowen Xu
:
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing. 118:1-118:31 - Jiawei Ren
, Yulei Sui
, Xiao Cheng
, Yuan Feng
, Jianjun Zhao
:
Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search. 119:1-119:29 - Fang Liu
, Zhiyi Fu
, Ge Li
, Zhi Jin
, Hui Liu
, Yiyang Hao
, Li Zhang
:
Non-Autoregressive Line-Level Code Completion. 120:1-120:34 - Marc Miltenberger
, Steven Arzt
:
Precisely Extracting Complex Variable Values from Android Apps. 121:1-121:56 - Yu Zhao
, Brent Harrison
, Tingting Yu
:
DinoDroid: Testing Android Apps Using Deep Q-Networks. 122:1-122:24 - Yimeng Guo
, Zhifei Chen
, Lin Chen
, Wenjie Xu
, Yanhui Li
, Yuming Zhou
, Baowen Xu
:
Generating Python Type Annotations from Type Inference: How Far Are We? 123:1-123:38
- Yu Cheng
, Jieshan Chen
, Qing Huang
, Zhenchang Xing
, Xiwei Xu
, Qinghua Lu
:
Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains. 124:1-124:24 - Quanjun Zhang
, Juan Zhai
, Chunrong Fang
, Jiawei Liu
, Weisong Sun
, Haichuan Hu
, Qingyu Wang
:
Machine Translation Testing via Syntactic Tree Pruning. 125:1-125:39 - Yue Liu
, Chakkrit Tantithamthavorn
, Yonghui Liu
, Li Li
:
On the Reliability and Explainability of Language Models for Program Generation. 126:1-126:26 - Baijun Cheng
, Shengming Zhao
, Kailong Wang
, Meizhen Wang
, Guangdong Bai
, Ruitao Feng
, Yao Guo
, Lei Ma
, Haoyu Wang
:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. 127:1-127:33 - Guodong Fan
, Shizhan Chen
, Cuiyun Gao
, Jianmao Xiao
, Tao Zhang
, Zhiyong Feng
:
RAPID: Zero-Shot Domain Adaptation for Code Search with Pre-Trained Models. 128:1-128:35 - Jiaxiang Liu
, Yunhan Xing
, Xiaomu Shi
, Fu Song
, Zhiwu Xu
, Zhong Ming
:
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks. 129:1-129:35 - Mohammed Oualid Attaoui
, Hazem M. Fahmy
, Fabrizio Pastore
, Lionel C. Briand
:
Supporting Safety Analysis of Image-processing DNNs through Clustering-based Approaches. 130:1-130:48 - Xiuwei Shang
, Shuai Zhang
, Yitong Zhang
, Shikai Guo
, Yulong Li
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Analyzing and Detecting Information Types of Developer Live Chat Threads. 131:1-131:32 - Yinghua Li
, Xueqi Dang
, Lei Ma
, Jacques Klein
, Yves Le Traon
, Tegawendé F. Bissyandé
:
Test Input Prioritization for 3D Point Clouds. 132:1-132:44 - Wei Tao
, Yucheng Zhou
, Yanlin Wang
, Hongyu Zhang
, Haofen Wang
, Wenqiang Zhang
:
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation. 133:1-133:32
- Daan Hommersom
, Antonino Sabetta
, Bonaventura Coppola
, Dario Di Nucci
, Damian A. Tamburri
:
Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories. 134:1-134:28
- Daniel Russo
:
Navigating the Complexity of Generative AI Adoption in Software Engineering. 135:1-135:50 - Stefanie Betz
, Birgit Penzenstadler
, Leticia Duboc
, Ruzanna Chitchyan
, Sedef Akinli Koçak
, Ian Brooks
, Shola Oyedeji
, Jari Porras
, Norbert Seyff
, Colin C. Venters
:
Lessons Learned from Developing a Sustainability Awareness Framework for Software Engineering Using Design Science. 136:1-136:39
- Zhenpeng Chen
, Jie M. Zhang
, Max Hort
, Mark Harman
, Federica Sarro
:
Fairness Testing: A Comprehensive Survey and Analysis of Trends. 137:1-137:59
- Wei-Cheng Wu
, Bernard Nongpoh
, Marwan Nour
, Michaël Marcozzi
, Sébastien Bardin
, Christophe Hauser
:
Fine-grained Coverage-based Fuzzing. 138:1-138:41
- Wei-Cheng Wu
, Bernard Nongpoh
, Marwan Nour
, Michaël Marcozzi
, Sébastien Bardin
, Christophe Hauser
:
Fine-grained Coverage-based Fuzzing - RCR Report. 139:1-139:4
Volume 33, Number 6, July 2024
- Zhifei Chen
, Lin Chen
, Yibiao Yang
, Qiong Feng
, Xuansong Li
, Wei Song
:
Risky Dynamic Typing-related Practices in Python: An Empirical Study. 140 - Xiaohui Wan
, Zheng Zheng
, Fangyun Qin
, Xuhui Lu
:
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks. 141 - Andrea Arcuri
, Man Zhang
, Juan P. Galeotti
:
Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs. 142 - Emanuela Guglielmi
, Giovanni Rosa
, Simone Scalabrino
, Gabriele Bavota
, Rocco Oliveto
:
Help Them Understand: Testing and Improving Voice User Interfaces. 143 - Anjana Perera
, Burak Turhan
, Aldeida Aleti
, Marcel Böhme
:
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing. 144 - Guofu Zhang
, Lei Li
, Zhaopin Su
, Feng Yue
, Yang Chen
, Miqing Li
, Xin Yao
:
On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation. 145 - Emanuele Iannone, Giulia Sellitto, Emanuele Iaccarino, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba:
Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be? 146 - Peixun Long
, Jianjun Zhao
:
Testing Multi-Subroutine Quantum Programs: From Unit Testing to Integration Testing. 147 - Xu Wang
, Hongwei Yu
, Xiangxin Meng
, Hongliang Cao
, Hongyu Zhang
, Hailong Sun
, Xudong Liu
, Chunming Hu
:
MTL-TRANSFER: Leveraging Multi-task Learning and Transferred Knowledge for Improving Fault Localization and Program Repair. 148 - Tingting Bi
, Boming Xia
, Zhenchang Xing
, Qinghua Lu
, Liming Zhu
:
On the Way to SBOMs: Investigating Design Issues and Solutions in Practice. 149 - Congying Xu
, Valerio Terragni
, Hengcheng Zhu
, Jiarong Wu
, Shing-Chi Cheung
:
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases. 150 - Sallam Abualhaija
, Fatma Basak Aydemir
, Fabiano Dalpiaz
, Davide Dell'Anna
, Alessio Ferrari
, Xavier Franch
, Davide Fucci
:
Replication in Requirements Engineering: The NLP for RE Case. 151 - Tahereh Zohdinasab
, Vincenzo Riccio
, Paolo Tonella
:
Focused Test Generation for Autonomous Driving Systems. 152 - Kashumi Madampe
, Rashina Hoda
, John C. Grundy
:
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes. 153 - Yuechen Li
, Hanyu Pei
, Linzhi Huang
, Beibei Yin
, Kai-Yuan Cai
:
Automatic Repair of Quantum Programs via Unitary Operation. 154 - Chanh Duc Ngo
, Fabrizio Pastore
, Lionel C. Briand
:
Testing Updated Apps by Adapting Learned Models. 155 - Zeyu Sun
, Zhenpeng Chen
, Jie Zhang
, Dan Hao
:
Fairness Testing of Machine Translation Systems. 156 - Siyu Jiang
, Zhenhang He
, Yuwen Chen
, Mingrong Zhang
, Le Ma:
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework. 157
- Zohreh Aghababaeyan
, Manel Abdellatif
, Mahboubeh Dadkhah
, Lionel C. Briand
:
DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks. 158 - Zhen Li
, Shasha Zhao
, Chen Chen
, Qian Chen
:
Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation. 159 - Xi Ding
, Rui Peng
, Xiangping Chen
, Yuan Huang
, Jing Bian
, Zibin Zheng
:
Do Code Summarization Models Process Too Much Information? Function Signature May Be All That Is Needed. 160 - Daniel Ramos
, Inês Lynce
, Vasco Manquinho
, Ruben Martins
, Claire Le Goues
:
BatFix: Repairing language model-based transpilation. 161 - Van Nguyen
, Trung Le
, Chakkrit Tantithamthavorn
, John C. Grundy
, Dinh Q. Phung
:
Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection. 162
- Han Hu
, Han Wang
, Ruiqi Dong
, Xiao Chen
, Chunyang Chen
:
Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey. 163
- Carlos Gavidia-Calderon
, Anastasia Kordoni
, Amel Bennaceur
, Mark Levine
, Bashar Nuseibeh
:
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems. 164 - Haoye Wang
, Zhipeng Gao
, Tingting Bi
, John C. Grundy
, Xinyu Wang
, Minghui Wu
, Xiaohu Yang
:
What Makes a Good TODO Comment? 165
- Weisong Sun
, Chunrong Fang
, Yifei Ge
, Yuling Hu
, Yuchen Chen
, Quanjun Zhang
, Xiuting Ge
, Yang Liu
, Zhenyu Chen
:
A Survey of Source Code Search: A 3-Dimensional Perspective. 166
Volume 33, Number 7, September 2024
- Chengcheng Wan
, Shicheng Liu
, Sophie Xie
, Yuhan Liu
, Henry Hoffmann
, Michael Maire
, Shan Lu
:
Keeper: Automated Testing and Fixing of Machine Learning Software. 167:1-167:33 - Suwichak Fungprasertkul
, Rami Bahsoon
, Rick Kazman
:
Technical Debt Monitoring Decision Making with Skin in the Game. 168:1-168:27 - Wei Ma
, Shangqing Liu
, Mengjie Zhao
, Xiaofei Xie
, Wenhan Wang
, Qiang Hu
, Jie Zhang
, Yang Liu
:
Unveiling Code Pre-Trained Models: Investigating Syntax and Semantics Capacities. 169:1-169:29 - Muhui Jiang
, Jinan Jiang
, Tao Wu
, Zuchao Ma
, Xiapu Luo
, Yajin Zhou
:
Understanding Vulnerability Inducing Commits of the Linux Kernel. 170:1-170:28 - Nicolas Dejon
, Chrystel Gaber
, Gilles Grimaud
, Narjes Jomaa
:
Code to Qed, the Project Manager's Guide to Proof Engineering. 171:1-171:50 - Rezvan Mahdavi-Hezaveh
, Sameeha Fatima
, Laurie A. Williams
:
Paving a Path for a Combined Family of Feature Toggle and Configuration Option Research. 172:1-172:27 - Rong Gu
, Eduard Baranov
, Afshin Ameri
, Cristina Seceleanu
, Eduard Paul Enoiu
, Baran Çürüklü
, Axel Legay
, Kristina Lundqvist
:
Synthesis and Verification of Mission Plans for Multiple Autonomous Agents under Complex Road Conditions. 173:1-173:46 - Yao Li
, Dawei Yuan
, Tao Zhang
, Haipeng Cai
, David Lo
, Cuiyun Gao
, Xiapu Luo
, He Jiang
:
Meta-Learning for Multi-Family Android Malware Classification. 174:1-174:27 - Shengcheng Yu
, Chunrong Fang
, Xin Li
, Yuchen Ling
, Zhenyu Chen
, Zhendong Su
:
Effective, Platform-Independent GUI Testing via Image Embedding and Reinforcement Learning. 175:1-175:27 - Jaeseong Lee
, Simin Chen
, Austin Mordahl
, Cong Liu
, Wei Yang
, Shiyi Wei
:
Automated Testing Linguistic Capabilities of NLP Models. 176:1-176:33 - Judith Perera
, Ewan D. Tempero
, Yu-Cheng Tu
, Kelly Blincoe
:
A Systematic Mapping Study Exploring Quantification Approaches to Code, Design, and Architecture Technical Debt. 177:1-177:44 - Sávio Freire
, Alexia Pacheco
, Nicolli Rios
, Boris Pérez, Camilo Castellanos
, Darío Correal
, Robert Ramac
, Vladimir Mandic
, Nebojsa Tausan
, Gustavo López, Manoel G. Mendonça
, Davide Falessi
, Clemente Izurieta
, Carolyn Seaman
, Rodrigo O. Spínola:
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It. 178:1-178:44 - Elijah Zolduoarrati
, Sherlock A. Licorish
, Nigel Stanger
:
Harmonising Contributions: Exploring Diversity in Software Engineering through CQA Mining on Stack Overflow. 179:1-179:54 - Yiling Lou
, Jun Yang
, Samuel Benton
, Dan Hao
, Lin Tan
, Zhenpeng Chen
, Lu Zhang
, Lingming Zhang
:
When Automated Program Repair Meets Regression Testing - An Extensive Study on Two Million Patches. 180:1-180:23 - Wei Liu
, Shouvick Mondal
, Tse-Hsun (Peter) Chen
:
An Empirical Study on the Characteristics of Database Access Bugs in Java Applications. 181:1-181:25 - Xue Jiang
, Yihong Dong
, Lecheng Wang
, Zheng Fang
, Qiwei Shang
, Ge Li
, Zhi Jin
, Wenpin Jiao
:
Self-Planning Code Generation with Large Language Models. 182:1-182:30 - Qing Huang
, Zhiwen Luo
, Zhenchang Xing
, Jinshan Zeng
, Jieshan Chen
, Xiwei Xu
, Yong Chen
:
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code. 183:1-183:29
- Yingzhe Lyu
, Heng Li
, Zhen Ming (Jack) Jiang
, Ahmed E. Hassan
:
On the Model Update Strategies for Supervised Learning in AIOps Solutions. 184:1-184:38 - Hang Xu
, Liheng Chen
, Shuitao Gan
, Chao Zhang
, Zheming Li
, Jiangan Ji
, Baojian Chen
, Fan Hu
:
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing. 185:1-185:36 - Xiaoning Feng
, Xiaohong Han
, Simin Chen
, Wei Yang
:
LLMEffiChecker: Understanding and Testing Efficiency Degradation of Large Language Models. 186:1-186:38 - Jinqiang Yu
, Michael Fu
, Alexey Ignatiev
, Chakkrit Tantithamthavorn
, Peter J. Stuckey
:
A Formal Explainer for Just-In-Time Defect Predictions. 187:1-187:31 - Dong Huang
, Qingwen Bu
, Yichao Fu
, Yuhao Qing
, Xiaofei Xie
, Junjie Chen
, Heming Cui
:
Neuron Sensitivity-Guided Test Case Selection. 188:1-188:32 - Yihong Dong
, Xue Jiang
, Zhi Jin
, Ge Li
:
Self-Collaboration Code Generation via ChatGPT. 189:1-189:38 - Zhiyu Wang
, Sihan Xu
, Lingling Fan
, Xiangrui Cai
, Linyu Li
, Zheli Liu
:
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study. 190:1-190:28
- Mingxi Ye
, Yuhong Nan
, Hong-Ning Dai
, Shuo Yang
, Xiapu Luo
, Zibin Zheng
:
FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency. 191:1-191:20 - Anni Peng
, Dongliang Fang
, Le Guan
, Erik van der Kouwe
, Yin Li
, Wenwen Wang
, Limin Sun
, Yuqing Zhang
:
Bitmap-Based Security Monitoring for Deeply Embedded Systems. 192:1-192:31
- Zachary Karas
, Aakash Bansal
, Yifan Zhang
, Toby Jia-Jun Li
, Collin McMillan
, Yu Huang
:
A Tale of Two Comprehensions? Analyzing Student Programmer Attention during Code Summarization. 193:1-193:37 - Carlos Luis Parra Calderón
, Julián Alberto García-García
, Juan Manuel Ramos-Cueli
, Celia Álvarez-Romero
, Esther Román-Villarán
, Alicia Martinez-García
, María José Escalona
:
IDE4ICDS: A Human-Centric and Model-Driven Proposal to Improve the Digitization of Clinical Practice Guideline. 194:1-194:38
Volume 33, Number 8, November 2024
- Margaret-Anne D. Storey
, Daniel Russo
, Nicole Novielli
, Takashi Kobayashi
, Dong Wang
:
A Disruptive Research Playbook for Studying Disruptive Innovations. 195:1-195:29
- Giovani Guizzo
, David Williams
, Mark Harman
, Justyna Petke
, Federica Sarro
:
Speeding Up Genetic Improvement via Regression Test Selection. 196:1-196:31 - Anwar Ghammam
, Rania Khalsi
, Marouane Kessentini
, Foyzul Hassan
:
Efficient Management of Containers for Software Defined Vehicles. 197:1-197:36 - Xiao-Yi Zhang
, Yang Liu
, Paolo Arcaini
, Mingyue Jiang
, Zheng Zheng
:
MET-MAPF: A Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms. 198:1-198:37 - Lorenz Graf-Vlachy
, Stefan Wagner
:
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models. 199:1-199:31 - Zhouruixing Zhu
, Cheryl Lee, Xiaoying Tang
, Pinjia He
:
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources. 200:1-200:25 - Shangqing Liu
, Yanzhou Li
, Xiaofei Xie
, Wei Ma, Guozhu Meng
, Yang Liu
:
Automated Commit Intelligence by Pre-training. 201:1-201:30 - Tiehua Zhang
, Rui Xu
, Jianping Zhang
, Yuze Liu
, Xin Chen
, Jun Yin
, Xi Zheng
:
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer - A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities. 202:1-202:31 - Xiaoyuan Xie
, Shuo Jin
, Songqiang Chen
, Shing-Chi Cheung
:
Word Closure-Based Metamorphic Testing for Machine Translation. 203:1-203:46 - Jia Li
, Yunfei Zhao
, Yongmin Li
, Ge Li
, Zhi Jin
:
AceCoder: An Effective Prompting Technique Specialized in Code Generation. 204:1-204:26 - Yanjie Jiang
, Hui Liu
, Shing-Chi Cheung
, Lu Zhang
:
Shortening Overlong Method Names with Abbreviations. 205:1-205:24 - Haifeng Ruan
, Yannic Noller
, Saeid Tizpaz-Niari
, Sudipta Chattopadhyay
, Abhik Roychoudhury
:
Timing Side-Channel Mitigation via Automated Program Repair. 206:1-206:27 - Fanyi Meng
, Ying Wang
, Chun Yong Chong
, Hai Yu
, Zhiliang Zhu
:
Evolution-Aware Constraint Derivation Approach for Software Remodularization. 207:1-207:43 - Chico Sundermann
, Heiko Raab
, Tobias Heß
, Thomas Thüm
, Ina Schaefer
:
Reusing d-DNNFs for Efficient Feature-Model Counting. 208:1-208:32 - Yasaman Abedini
, Abbas Heydarnoori
:
Can GitHub Issues Help in App Review Classifications? 209:1-209:42 - Yi Song
, Xihao Zhang
, Xiaoyuan Xie
, Songqiang Chen
, Quanming Liu
, Ruizhi Gao
:
SURE: A Visualized Failure Indexing Approach Using Program Memory Spectrum. 210:1-210:43 - Saurabhsingh Rajput
, Tim Widmayer
, Ziyuan Shang
, Maria Kechagia
, Federica Sarro
, Tushar Sharma
:
Enhancing Energy-Awareness in Deep Learning through Fine-Grained Energy Measurement. 211:1-211:34 - Qing Huang
, Yanbang Sun
, Zhenchang Xing
, Yuanlong Cao
, Jieshan Chen
, Xiwei Xu
, Huan Jin
, Jiaxing Lu
:
Let's Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference. 212:1-212:34 - Moataz Chouchen
, Ali Ouni
, Mohamed Wiem Mkaouer
:
MULTICR: Predicting Merged and Abandoned Code Changes in Modern Code Review Using Multi-Objective Search. 213:1-213:44
- Florian Tambon
, Foutse Khomh
, Giuliano Antoniol
:
GIST: Generated Inputs Sets Transferability in Deep Learning. 214:1-214:38 - Shiwen Yu
, Zengyu Liu
, Ting Wang
, Ji Wang
:
Neural Solving Uninterpreted Predicates with Abstract Gradient Descent. 215:1-215:47 - Dmytro Humeniuk
, Foutse Khomh
, Giuliano Antoniol
:
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing. 216:1-216:45 - Yue Liu
, Chakkrit Tantithamthavorn
, Yonghui Liu
, Patanamon Thongtanunam
, Li Li
:
Automatically Recommend Code Updates: Are We There Yet? 217:1-217:27
- Bianca Trinkenreich
, Fabio Santos
, Klaas-Jan Stol
:
Predicting Attrition among Software Professionals: Antecedents and Consequences of Burnout and Engagement. 218:1-218:45
- Ming Xu
, Jianling Fu
, Hui Jiang
, Yuxin Deng
, Zhi-Bin Li
:
Termination and Universal Termination Problems for Nondeterministic Quantum Programs. 219:1-219:41
- Xinyi Hou, Yanjie Zhao
, Yue Liu
, Zhou Yang
, Kailong Wang, Li Li
, Xiapu Luo
, David Lo, John Grundy
, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. 220:1-220:79
- Daniel Russo
:
Navigating the Complexity of Generative AI Adoption in Software Engineering - RCR Report. 221:1-221:5
- Mauro Pezzè
:
Editorial: The End of the Journey. 222:1-222:3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.