


default search action
IEEE Transactions on Software Engineering, Volume 48
Volume 48, Number 2, February 2022
- Dirk van der Linden

, Emma J. Williams
, Joseph Hallett
, Awais Rashid
:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. 364-376 - Jose Ricardo da Silva Junior

, Daniel Prett Campagna
, Esteban Clua
, Anita Sarma
, Leonardo Murta
:
Dominoes: An Interactive Exploratory Data Analysis Tool for Software Relationships. 377-396 - Esther Guerra

, Juan de Lara
, Marsha Chechik, Rick Salay:
Property Satisfiability Analysis for Product Lines of Modelling Languages. 397-416 - Maxime Lamothe

, Weiyi Shang
, Tse-Hsun Peter Chen
:
A3: Assisting Android API Migrations Using Code Examples. 417-431 - Beatriz Bernárdez

, Amador Durán
, José Antonio Parejo
, Natalia Juristo, Antonio Ruiz-Cortés
:
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments. 432-452 - Jackson A. Prado Lima

, Silvia Regina Vergilio
:
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. 453-465 - Pilar Rodríguez

, Cathy Urquhart, Emilia Mendes:
A Theory of Value for Value-Based Feature Selection in Software Engineering. 466-484 - Yuxing Ma

, Audris Mockus
, Russell Zaretzki
, Randy V. Bradley, Bogdan C. Bichescu:
A Methodology for Analyzing Uptake of Software Technologies Among Developers. 485-501 - Aaditya Bhatia, Shaowei Wang

, Muhammad Asaduzzaman, Ahmed E. Hassan:
A Study of Bug Management Using the Stack Exchange Question and Answering Platform. 502-518 - Yanjie Jiang

, Hui Liu
, Jiahao Jin, Lu Zhang
:
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion. 519-537 - Guoxin Su

, Li Liu
, Minjie Zhang
, David S. Rosenblum
:
Quantitative Verification for Monitoring Event-Streaming Systems. 538-550 - Lei Xue

, Hao Zhou, Xiapu Luo
, Le Yu
, Dinghao Wu
, Yajin Zhou
, Xiaobo Ma
:
PackerGrind: An Adaptive Unpacking System for Android Apps. 551-570 - Hao Zhong

, Xiaoyin Wang
, Hong Mei
:
Inferring Bug Signatures to Detect Real Bugs. 571-584 - Chunhui Wang, Fabrizio Pastore

, Arda Goknil
, Lionel C. Briand
:
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach. 585-616 - Fabrizio Pastore

, Daniela Micucci
, Michell Guzmán
, Leonardo Mariani
:
TkT: Automatic Inference of Timed and Extended Pushdown Automata. 617-636 - Manish Motwani

, Mauricio Soto
, Yuriy Brun
, René Just
, Claire Le Goues
:
Quality of Automated Program Repair on Real-World Defects. 637-661 - Jie Lu

, Feng Li, Chen Liu, Lian Li
, Xiaobing Feng, Jingling Xue:
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement. 662-677 - Lisa Nguyen Quang Do

, Eric Bodden
:
Explaining Static Analysis With Rule Graphs. 678-690 - Shaoying Liu

, Shin Nakajima:
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing. 691-712 - Francisca Pérez

, Tewfik Ziadi
, Carlos Cetina
:
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models. 713-731 - Jie M. Zhang

, Mark Harman, Lei Ma
, Yang Liu
:
Machine Learning Testing: Survey, Landscapes and Horizons. 1-36 - Dror G. Feitelson

, Ayelet Mizrahi
, Nofar Noy
, Aviad Ben Shabat
, Or Eliyahu
, Roy Sheffer
:
How Developers Choose Names. 37-52 - Carlos Sáenz-Adán

, Beatriz Pérez
, Francisco J. García Izquierdo
, Luc Moreau
:
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience. 53-68 - Toshiki Hirao

, Shane McIntosh
, Akinori Ihara
, Kenichi Matsumoto
:
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities. 69-81 - Meng Yan

, Xin Xia
, Yuanrui Fan
, Ahmed E. Hassan, David Lo
, Shanping Li:
Just-In-Time Defect Identification and Localization: A Two-Phase Framework. 82-101 - Wenhua Wang, Yuqun Zhang, Yulei Sui

, Yao Wan, Zhou Zhao
, Jian Wu, Philip S. Yu
, Guandong Xu
:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. 102-119 - Faeq Alrimawi

, Liliana Pasquale
, Deepak Mehta, Nobukazu Yoshioka
, Bashar Nuseibeh
:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. 120-134 - Sebastian Baltes

, Christoph Treude
, Martin P. Robillard
:
Contextual Documentation Referencing on Stack Overflow. 135-149 - Qiang He

, Bo Li
, Feifei Chen
, John C. Grundy
, Xin Xia, Yun Yang
:
Diversified Third-Party Library Prediction for Mobile App Development. 150-165 - Jirayus Jiarpakdee

, Chakkrit Kla Tantithamthavorn
, Hoa Khanh Dam
, John C. Grundy
:
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models. 166-185 - Camilo Escobar-Velásquez

, Mario Linares-Vásquez
, Gabriele Bavota
, Michele Tufano
, Kevin Moran
, Massimiliano Di Penta
, Christopher Vendome, Carlos Bernal-Cárdenas
, Denys Poshyvanyk
:
Enabling Mutant Generation for Open- and Closed-Source Android Apps. 186-208 - Md. Ahasanuzzaman

, Safwat Hassan
, Ahmed E. Hassan:
Studying Ad Library Integration Strategies of Top Free-to-Download Apps. 209-224 - André N. Meyer

, Chris Satterfield, Manuela Züger, Katja Kevic, Gail C. Murphy
, Thomas Zimmermann
, Thomas Fritz
:
Detecting Developers' Task Switches and Types. 225-240 - Hema Susmita Padala, Christopher J. Mendez, Felipe Fronchetti

, Igor Steinmacher
, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Margaret Burnett
, Marco Aurélio Gerosa, Anita Sarma
:
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects. 241-259 - Ann Barcomb

, Klaas-Jan Stol
, Brian Fitzgerald, Dirk Riehle
:
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities. 260-277 - Huy Tu

, Zhe Yu
, Tim Menzies
:
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction). 278-294 - Héctor D. Menéndez, Michele Boreale

, Daniele Gorla
, David Clark
:
Output Sampling for Output Diversity in Automatic Unit Test Generation. 295-308 - Tongtong Xu

, Liushan Chen
, Yu Pei
, Tian Zhang, Minxue Pan
, Carlo A. Furia
:
Restore: Retrospective Fault Localization Enhancing Automated Program Repair. 309-326 - Jiachi Chen

, Xin Xia
, David Lo
, John C. Grundy
, Xiapu Luo
, Ting Chen
:
Defining Smart Contract Defects on Ethereum. 327-345 - Yu Wang

, Fengjuan Gao
, Linzhang Wang
, Tingting Yu
, Jianhua Zhao, Xuandong Li:
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software. 346-363
Volume 48, Number 3, March 2022
- Pedro Pinto

, João Bispo
, João M. P. Cardoso
, Jorge G. Barbosa
, Davide Gadioli
, Gianluca Palermo
, Jan Martinovic
, Martin Golasowski, Katerina Slaninová
, Radim Cmar, Cristina Silvano
:
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems. 732-754 - Mashel Albarak

, Rami Bahsoon
, Ipek Ozkaya
, Robert L. Nord
:
Managing Technical Debt in Database Normalization. 755-772 - Iris Reinhartz-Berger

, Anna Zamansky
:
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms. 773-785 - Chao Ni

, Xin Xia
, David Lo
, Xiang Chen
, Qing Gu:
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction. 786-802 - Giovani Guizzo

, Federica Sarro
, Jens Krinke
, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. 803-818 - Daniel Russo

, Klaas-Jan Stol
:
Gender Differences in Personality Traits of Software Engineers. 819-834 - Lisa Nguyen Quang Do

, James R. Wright
, Karim Ali
:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. 835-847 - Mario Janke

, Patrick Mäder
:
Graph Based Mining of Code Change Patterns From Version Control Commits. 848-863 - Chaima Abid, Marouane Kessentini

, Vahid Alizadeh
, Mouna Dhaouadi, Rick Kazman
:
How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. 864-878 - Hetong Dai

, Heng Li
, Che-Shao Chen, Weiyi Shang, Tse-Hsun Chen
:
Logram: Efficient Log Parsing Using $n$n-Gram Dictionaries. 879-892 - Rahul Krishna

, Chong Tang
, Kevin J. Sullivan, Baishakhi Ray:
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance. 893-909 - Minxue Pan

, Tongtong Xu
, Yu Pei
, Zhong Li, Tian Zhang, Xuandong Li:
GUI-Guided Test Script Repair for Mobile Apps. 910-929 - Nikolaos Tsantalis

, Ameya Ketkar
, Danny Dig:
RefactoringMiner 2.0. 930-950 - Mojtaba Bagherzadeh

, Nafiseh Kahani, Karim Jahed, Juergen Dingel:
Execution of Partial State Machine Models. 951-972 - Pengfei Gao

, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song
, Taolue Chen
:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 973-1000 - Kun Qiu

, Zheng Zheng
, Tsong Yueh Chen
, Pak-Lok Poon
:
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition. 1001-1017 - Shivashree Vysali

, Shane McIntosh
, Bram Adams
:
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements. 1018-1029 - Hanefi Mercan

, Arsalan Javeed, Cemal Yilmaz
:
Flexible Combinatorial Interaction Testing. 1030-1066 - Peng Zhang

, Yanhui Li
, Wanwangying Ma, Yibiao Yang
, Lin Chen
, Hongmin Lu, Yuming Zhou
, Baowen Xu
:
CBUA: A Probabilistic, Predictive, and Practical Approach for Evaluating Test Suite Effectiveness. 1067-1096
Volume 48, Number 4, April 2022
- Jesús Sánchez Cuadrado

, Loli Burgueño
, Manuel Wimmer
, Antonio Vallecillo
:
Efficient Execution of ATL Model Transformations Using Static Analysis and Parallelism. 1097-1114 - Ting Su

, Lingling Fan
, Sen Chen
, Yang Liu
, Lihua Xu, Geguang Pu
, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. 1115-1137 - Ezekiel O. Soremekun

, Esteban Pavese, Nikolas Havrikov
, Lars Grunske
, Andreas Zeller:
Inputs From Hell. 1138-1153 - Mohammad Mehdi Pourhashem Kallehbasti

, Matteo Rossi
, Luciano Baresi
:
On How Bit-Vector Logic Can Help Verify LTL-Based Specifications. 1154-1168 - Xiangjuan Yao

, Gongjie Zhang
, Feng Pan
, Dunwei Gong
, Changqing Wei:
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing. 1169-1184 - Neng Zhang

, Qiao Huang, Xin Xia
, Ying Zou, David Lo
, Zhenchang Xing
:
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval. 1185-1211 - Mitchell J. Gerrard

, Mateus Borges, Matthew B. Dwyer
, Antonio Filieri
:
Conditional Quantitative Program Analysis. 1212-1227 - Dong Liu, He Jiang

, Xiaochen Li
, Zhilei Ren, Lei Qiao
, Zuohua Ding
:
DPWord2Vec: Better Representation of Design Patterns in Semantics. 1228-1248 - Lin Jiang

, Hui Liu
, He Jiang
, Lu Zhang
, Hong Mei:
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access. 1249-1267 - Hui Liu

, Mingzhu Shen, Jiaqi Zhu, Nan Niu
, Ge Li, Lu Zhang
:
Deep Learning Based Program Generation From Requirements Text: Are We There Yet? 1268-1289 - Di Liu, Yang Feng

, Xiaofang Zhang
, James A. Jones, Zhenyu Chen
:
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding. 1290-1308 - Zhixing Li

, Yue Yu
, Minghui Zhou
, Tao Wang, Gang Yin, Long Lan, Huaimin Wang:
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects. 1309-1335 - Baicai Sun

, Dunwei Gong
, Tian Tian
, Xiangjuan Yao
:
Integrating an Ensemble Surrogate Model's Estimation into Test Data Generation. 1336-1350 - Iflaah Salman

, Pilar Rodríguez
, Burak Turhan
, Ayse Tosun
, Arda Gureller:
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers? 1351-1368 - Raghvinder S. Sangwan

, Ashkan Negahban
, Robert L. Nord
, Ipek Ozkaya:
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value. 1369-1384 - Saikat Chakraborty

, Yangruibo Ding
, Miltiadis Allamanis
, Baishakhi Ray
:
CODIT: Code Editing With Tree-Based Neural Models. 1385-1399 - Gema Rodríguez-Pérez

, Meiyappan Nagappan
, Gregorio Robles
:
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project. 1400-1416 - Fei He

, Qianshan Yu, Liming Cai:
Efficient Summary Reuse for Software Regression Verification. 1417-1431 - Maurício Aniche

, Erick Maziero, Rafael S. Durelli
, Vinicius H. S. Durelli:
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring. 1432-1450 - Navid Teymourian

, Habib Izadkhah
, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. 1451-1462
Volume 48, Number 5, May 2022
- Yuan Huang

, Nan Jia
, Xiangping Chen
, Kai Hong, Zibin Zheng
:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. 1463-1479 - Supatsara Wattanakriengkrai

, Patanamon Thongtanunam
, Chakkrit Tantithamthavorn
, Hideaki Hata
, Kenichi Matsumoto
:
Predicting Defective Lines Using a Model-Agnostic Technique. 1480-1496 - Morteza Verdi, Ashkan Sami

, Jafar Akhondali
, Foutse Khomh
, Gias Uddin
, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. 1497-1514 - Benjamin Shreeve

, Joseph Hallett
, Matthew Edwards
, Kopo M. Ramokapane, Richard Atkins, Awais Rashid
:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. 1515-1528 - Jinfu Chen

, Weiyi Shang, Emad Shihab:
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits. 1529-1544 - Meilun Li

, Andrea Turrini
, Ernst Moritz Hahn
, Zhikun She
, Lijun Zhang
:
Probabilistic Preference Planning Problem for Markov Decision Processes. 1545-1559 - Soumaya Rebai, Vahid Alizadeh

, Marouane Kessentini
, Houcem Fehri, Rick Kazman
:
Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring. 1560-1578 - Zainab Masood

, Rashina Hoda
, Kelly Blincoe
:
Real World Scrum A Grounded Theory of Variations in Practice. 1579-1591 - Ivan Pashchenko

, Henrik Plate
, Serena Elisa Ponta
, Antonino Sabetta
, Fabio Massacci
:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. 1592-1609 - Kristóf Marussy

, Oszkár Semeráth
, Dániel Varró
:
Automated Generation of Consistent Graph Models With Multiplicity Reasoning. 1610-1629 - Nico Ritschel

, Vladimir Kovalenko
, Reid Holmes
, Ronald Garcia, David C. Shepherd
:
Comparing Block-Based Programming Models for Two-Armed Robots. 1630-1643 - Bartosz Papis

, Konrad Grochowski
, Kamil Subzda
, Kamil Sijko:
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project. 1644-1664 - Wentao Wang

, Faryn Dumont, Nan Niu
, Glen Horton
:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. 1665-1675 - Zhe Yu

, Fahmid Morshed Fahid
, Huy Tu
, Tim Menzies
:
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach. 1676-1691 - Zohreh Sharafi

, Ian Bertram
, Michael Flanagan
, Westley Weimer:
Eyes on Code: A Study on Developers' Code Navigation Strategies. 1692-1704 - George Digkas

, Alexander Chatzigeorgiou
, Apostolos Ampatzoglou
, Paris Avgeriou
:
Can Clean New Code Reduce Technical Debt Density? 1705-1721 - Mohammad Bajammal

, Andrea Stocco
, Davood Mazinanian, Ali Mesbah
:
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks. 1722-1742 - Yingzhe He

, Guozhu Meng
, Kai Chen
, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. 1743-1770 - Miqing Li

, Tao Chen
, Xin Yao:
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance. 1771-1799 - Shangqing Liu

, Cuiyun Gao
, Sen Chen
, Lun Yiu Nie, Yang Liu
:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. 1800-1817 - Waqar Hussain

, Harsha Perera
, Jon Whittle
, Arif Nurwidyantoro
, Rashina Hoda
, Rifat Ara Shams
, Gillian C. Oliver
:
Human Values in Software Engineering: Contrasting Case Studies of Practice. 1818-1833
Volume 48, Number 6, June 2022
- Tingting Bi

, Xin Xia
, David Lo
, John C. Grundy
, Thomas Zimmermann
:
An Empirical Study of Release Note Production and Usage in Practice. 1834-1852 - Bhaveet Nagaria

, Tracy Hall
:
How Software Developers Mitigate Their Errors When Developing Code. 1853-1867 - Federica Sarro

, Rebecca Moussa
, Alessio Petrozziello, Mark Harman:
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates. 1868-1882 - Zachary Eberhart

, Aakash Bansal, Collin McMillan:
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant. 1883-1904 - Qusay Idrees Sarhan

, Bestoun S. Ahmed
, Miroslav Bures
, Kamal Z. Zamli
:
Software Module Clustering: An In-Depth Literature Analysis. 1905-1928 - Jorge Melegati

, Henry Edison
, Xiaofeng Wang
:
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups. 1929-1946 - Xavier Franch

, Daniel Méndez
, Andreas Vogelsang
, Rogardt Heldal, Eric Knauss
, Marc Oriol, Guilherme H. Travassos
, Jeffrey C. Carver
, Thomas Zimmermann
:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? 1947-1964 - Maureen Keegan

, Víctor A. Braberman, Nicolás D'Ippolito
, Nir Piterman, Sebastián Uchitel
:
Control and Discovery of Environment Behaviour. 1965-1978 - Zi Peng, Tse-Hsun Chen

, Jinqiu Yang:
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies. 1979-1993 - Tianpei Xia

, Rui Shu, Xipeng Shen
, Tim Menzies
:
Sequential Model Optimization for Software Effort Estimation. 1994-2009 - Alex Cummaudo

, Rajesh Vasa
, John C. Grundy
, Mohamed Abdelrazek
:
Requirements of API Documentation: A Case Study into Computer Vision Services. 2010-2027 - Barton P. Miller

, Mengxiao Zhang
, Elisa R. Heymann
:
The Relevance of Classic Fuzz Testing: Have We Solved This One? 2028-2039 - Keheliya Gallaba

, John Ewart, Yves Junqueira, Shane McIntosh
:
Accelerating Continuous Integration by Caching Environments and Inferring Dependencies. 2040-2052 - Richard Torkar

, Carlo A. Furia
, Robert Feldt, Francisco Gomes de Oliveira Neto
, Lucas Gren
, Per Lenberg
, Neil A. Ernst:
A Method to Assess and Argue for Practical Significance in Software Engineering. 2053-2065 - Abdul Razzaq

, Anthony Ventresque
, Rainer Koschke, Andrea De Lucia
, Jim Buckley:
The Effect of Feature Characteristics on the Performance of Feature Location Techniques. 2066-2085 - Stefano Dalla Palma

, Dario Di Nucci
, Fabio Palomba
, Damian A. Tamburri
:
Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics. 2086-2104 - Dulaji Hidellaarachchi

, John C. Grundy
, Rashina Hoda
, Kashumi Madampe
:
The Effects of Human Aspects on the Requirements Engineering Process: A Systematic Literature Review. 2105-2127 - Tiago Boldt Sousa

, Hugo Sereno Ferreira
, Filipe Figueiredo Correia
:
A Survey on the Adoption of Patterns for Engineering Software for the Cloud. 2128-2140 - Xiangying Dang

, Dunwei Gong
, Xiangjuan Yao
, Tian Tian
, Huai Liu
:
Enhancement of Mutation Testing via Fuzzy Clustering and Multi-Population Genetic Algorithm. 2141-2156 - Yu Zhou

, Xinying Yang, Taolue Chen
, Zhiqiu Huang
, Xiaoxing Ma
, Harald C. Gall
:
Boosting API Recommendation With Implicit Feedback. 2157-2172 - Zhixing Li

, Yue Yu
, Tao Wang, Gang Yin, ShanShan Li
, Huaimin Wang:
Are You Still Working on This? An Empirical Study on Pull Request Abandonment. 2173-2188
Volume 48, Number 7, July 2022
- Jiachi Chen

, Xin Xia
, David Lo
, John Grundy
, Xiapu Luo
, Ting Chen
:
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. 2189-2207 - Filipe Roseiro Côgo, Gustavo Ansaldi Oliva

, Ahmed E. Hassan:
Deprecation of Packages and Releases in Software Ecosystems: A Case Study on NPM. 2208-2223 - Jia Yang

, Cai Fu
, Xiao-Yang Liu
, Heng Yin
, Pan Zhou
:
Codee: A Tensor Embedding Scheme for Binary Code Search. 2224-2244 - Gopi Krishnan Rajbahadur

, Shaowei Wang
, Gustavo Ansaldi Oliva, Yasutaka Kamei
, Ahmed E. Hassan:
The Impact of Feature Importance Methods on the Interpretation of Defect Classifiers. 2245-2261 - Devika Sondhi

, Mayank Jobanputra
, Divya Rani
, Salil Purandare
, Sakshi Sharma
, Rahul Purandare
:
Mining Similar Methods for Test Adaptation. 2262-2276 - Diego Elias Costa

, Suhaib Mujahid
, Rabe Abdalkareem
, Emad Shihab:
Breaking Type Safety in Go: An Empirical Study on the Usage of the unsafe Package. 2277-2294 - Ying Wang

, Rongxin Wu
, Chao Wang, Ming Wen
, Yepang Liu
, Shing-Chi Cheung
, Hai Yu
, Chang Xu
, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? 2295-2316 - Yi Xiang

, Han Huang
, Miqing Li
, Sizhe Li, Xiaowei Yang:
Looking For Novelty in Search-Based Software Product Line Testing. 2317-2338 - He Jiang

, Zhide Zhou
, Zhilei Ren, Jingxuan Zhang
, Xiaochen Li
:
CTOS: Compiler Testing for Optimization Sequences of LLVM. 2339-2358 - Haoxiang Zhang

, Shaowei Wang
, Heng Li
, Tse-Hsun Chen
, Ahmed E. Hassan:
A Study of C/C++ Code Weaknesses on Stack Overflow. 2359-2375 - Yuan Huang

, Jinyu Jiang, Xiapu Luo
, Xiangping Chen
, Zibin Zheng
, Nan Jia, Gang Huang
:
Change-Patterns Mapping: A Boosting Way for Change Impact Analysis. 2376-2398 - Han Wang

, Chunyang Chen
, Zhenchang Xing
, John Grundy
:
DiffTech: Differencing Similar Technologies From Crowd-Scale Comparison Discussions. 2399-2416 - Phuong T. Nguyen

, Juri Di Rocco
, Claudio Di Sipio
, Davide Di Ruscio
, Massimiliano Di Penta
:
Recommending API Function Calls and Code Snippets to Support Software Development. 2417-2438 - Joshua Garcia

, Ehsan Kouroshfar, Negar Ghorbani
, Sam Malek:
Forecasting Architectural Decay From Evolutionary History. 2439-2454 - Mohamed El-Attar

:
Empirically Evaluating the Effect of the Physics of Notations on Model Construction. 2455-2475 - Zhenhao Li

, Tse-Hsun Chen
, Jinqiu Yang, Weiyi Shang:
Studying Duplicate Logging Statements and Their Relationships With Code Clones. 2476-2494 - Emerson R. Murphy-Hill

, Jillian Dicker, Margaret Morrow Hodges, Carolyn D. Egelman
, Ciera Jaspan
, Lan Cheng, Elizabeth Kammer, Ben Holtz, Matthew A. Jorde, Andrea Knight Dolan, Collin Green
:
Engineering Impacts of Anonymous Author Code Review: A Field Experiment. 2495-2509 - Kewen Peng

, Tim Menzies
:
Defect Reduction Planning (Using TimeLIME). 2510-2525 - Xiao Ling

, Rishabh Agrawal
, Tim Menzies
:
How Different is Test Case Prioritization for Open and Closed Source Projects? 2526-2540 - Xiaoxue Wu

, Wei Zheng, Xin Xia
, David Lo
:
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction. 2541-2556 - Mikolaj Fejzer

, Jakub Narebski
, Piotr Przymus
, Krzysztof Stencel
:
Tracking Buggy Files: New Efficient Adaptive Bug Localization Algorithm. 2557-2569 - Omar Elazhary

, Colin M. Werner
, Ze Shi Li
, Derek Lowlind
, Neil A. Ernst
, Margaret-Anne D. Storey
:
Uncovering the Benefits and Challenges of Continuous Integration Practices. 2570-2583 - Valentín Valero

, Gregorio Díaz
, Juan Boubeta-Puig
, Hermenegilda Macià
, Enrique Brazález
:
A Compositional Approach for Complex Event Pattern Modeling and Transformation to Colored Petri Nets with Black Sequencing Transitions. 2584-2605 - Chang Rao

, Nan Li
, Yu Lei
, Jin Guo, Yadong Zhang, Raghu N. Kacker
, D. Richard Kuhn
:
Combinatorial Test Generation for Multiple Input Models With Shared Parameters. 2606-2628 - Colin M. Werner

, Ze Shi Li
, Derek Lowlind
, Omar Elazhary
, Neil A. Ernst
, Daniela E. Damian
:
Continuously Managing NFRs: Opportunities and Challenges in Practice. 2629-2642 - Francesco Mercaldo

, Antonella Santone
:
Formal Equivalence Checking for Mobile Malware Detection and Family Classification. 2643-2657 - Maria Kechagia

, Sergey Mechtaev, Federica Sarro
, Mark Harman:
Evaluating Automatic Program Repair Capabilities to Repair API Misuses. 2658-2679 - Boqin Qin

, Tengfei Tu, Ziheng Liu
, Tingting Yu
, Linhai Song
:
Algorithmic Profiling for Real-World Complexity Problems. 2680-2694
Volume 48, Number 8, August 2022
- Md Atique Reza Chowdhury, Rabe Abdalkareem

, Emad Shihab, Bram Adams
:
On the Untriviality of Trivial Packages: An Empirical Study of npm JavaScript Packages. 2695-2708 - Henry Edison

, Xiaofeng Wang, Kieran Conboy
:
Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review. 2709-2731 - Maryam Bagheri

, Marjan Sirjani
, Ehsan Khamespanah, Christel Baier
, Ali Movaghar
:
Magnifier: A Compositional Analysis Approach for Autonomous Traffic Control. 2732-2747 - Kundi Yao

, Mohammed Sayagh
, Weiyi Shang, Ahmed E. Hassan:
Improving State-of-the-Art Compression Techniques for Log Management Tools. 2748-2760 - Hong Jin Kang

, David Lo
:
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. 2761-2783 - Mohammad Javad Beheshtian

, Amir Hossein Bavand, Peter C. Rigby
:
Software Batch Testing to Save Build Test Resources and to Reduce Feedback Time. 2784-2801 - Barbara A. Kitchenham

, Lech Madeyski
, Giuseppe Scanniello
, Carmine Gravino
:
The Importance of the Correlation in Crossover Experiments. 2802-2813 - Dilini Rajapaksha

, Chakkrit Tantithamthavorn
, Jirayus Jiarpakdee
, Christoph Bergmeir
, John Grundy
, Wray L. Buntine
:
SQAPlanner: Generating Data-Informed Software Quality Improvement Plans. 2814-2835 - Mojtaba Bagherzadeh

, Nafiseh Kahani, Lionel C. Briand
:
Reinforcement Learning for Test Case Prioritization. 2836-2856 - Mahdi Fahmideh

, Aakash Ahmad
, Ali Behnaz, John Grundy
, Willy Susilo
:
Software Engineering for Internet of Things: The Practitioners' Perspective. 2857-2878 - Max Hort, Maria Kechagia

, Federica Sarro
, Mark Harman:
A Survey of Performance Optimization for Mobile Applications. 2879-2904 - An Ran Chen

, Tse-Hsun Chen
, Shaowei Wang
:
Pathidea: Improving Information Retrieval-Based Bug Localization by Re-Constructing Execution Paths Using Logs. 2905-2919 - He Ye

, Jian Gu, Matias Martinez
, Thomas Durieux
, Martin Monperrus
:
Automated Classification of Overfitting Patches With Statically Extracted Code Features. 2920-2938 - Amritanshu Agrawal

, Xueqi Yang, Rishabh Agrawal
, Rahul Yedida
, Xipeng Shen
, Tim Menzies
:
Simpler Hyperparameter Optimization for Software Analytics: Why, How, When? 2939-2954 - Reza Nadri

, Gema Rodríguez-Pérez
, Meiyappan Nagappan
:
On the Relationship Between the Developer's Perceptible Race and Ethnicity and the Evaluation of Contributions in OSS. 2955-2968 - Dayi Lin

, Chakkrit Tantithamthavorn
, Ahmed E. Hassan:
The Impact of Data Merging on the Interpretation of Cross-Project Just-In-Time Defect Models. 2969-2986 - Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao:

Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation. 2987-3009 - Darryl Jarman

, Jeffrey Berry, Riley Smith, Ferdian Thung
, David Lo
:
Legion: Massively Composing Rankers for Improved Bug Localization at Adobe. 3010-3024 - Cuiyun Gao

, Jichuan Zeng
, Zhiyuan Wen, David Lo
, Xin Xia, Irwin King
, Michael R. Lyu:
Emerging App Issue Identification via Online Joint Sentiment-Topic Tracing. 3025-3043 - Yutian Tang

, Haoyu Wang, Xian Zhan
, Xiapu Luo
, Yajin Zhou
, Hao Zhou, Qiben Yan
, Yulei Sui, Jacky Keung
:
A Systematical Study on Application Performance Management Libraries for Apps. 3044-3065 - Ting Chen

, Zihao Li
, Xiapu Luo
, Xiaofeng Wang, Ting Wang
, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li
, Yan Cheng, Xiaosong Zhang
:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. 3066-3086 - Ahmad Abdellatif

, Khaled Badran, Diego Elias Costa
, Emad Shihab
:
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering. 3087-3102 - Rahul Yedida

, Tim Menzies
:
On the Value of Oversampling for Deep Learning in Software Defect Prediction. 3103-3116 - Wilson Rosa

, Bradford K. Clark, Raymond J. Madachy, Barry W. Boehm:
Empirical Effort and Schedule Estimation Models for Agile Processes in the US DoD. 3117-3130 - Junjie Wang

, Ye Yang, Song Wang
, Chunyang Chen
, Dandan Wang
, Qing Wang
:
Context-Aware Personalized Crowdtesting Task Recommendation. 3131-3144 - Faizan Khan

, Boqi Chen
, Dániel Varró
, Shane McIntosh
:
An Empirical Study of Type-Related Defects in Python Projects. 3145-3158 - Wolfgang Mauerer

, Mitchell Joblin, Damian A. Tamburri
, Carlos V. Paradis, Rick Kazman
, Sven Apel
:
In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study. 3159-3184 - Vali Tawosi

, Federica Sarro
, Alessio Petrozziello, Mark Harman:
Multi-Objective Software Effort Estimation: A Replication Study. 3185-3205
Volume 48, Number 9, September 2022
- Arnaud Blouin

, Jean-Marc Jézéquel
:
Interacto: A Modern User Interaction Processing Model. 3206-3226 - Jiakun Liu

, Xin Xia
, David Lo
, Haoxiang Zhang
, Ying Zou, Ahmed E. Hassan, Shanping Li:
Broken External Links on Stack Overflow. 3242-3267 - Mathieu Nassif

, Alexa Hernandez
, Ashvitha Sridharan
, Martin P. Robillard
:
Generating Unit Tests for Documentation. 3268-3279 - Saikat Chakraborty

, Rahul Krishna
, Yangruibo Ding
, Baishakhi Ray
:
Deep Learning Based Vulnerability Detection: Are We There Yet? 3280-3296 - Christophe Rezk

, Yasutaka Kamei
, Shane McIntosh
:
The Ghost Commit Problem When Identifying Fix-Inducing Changes: An Empirical Study of Apache Projects. 3297-3309 - Xavier Franch

, Martin Glinz
, Daniel Méndez
, Norbert Seyff
:
A Study About the Knowledge and Use of Requirements Engineering Standards in Industry. 3310-3325 - Daniela Girardi

, Filippo Lanubile
, Nicole Novielli
, Alexander Serebrenik
:
Emotions and Perceived Productivity of Software Developers at the Workplace. 3326-3341 - Paulo Anselmo da Mota Silveira Neto

, Umme Ayda Mannan
, Eduardo Santana de Almeida
, Nachiappan Nagappan, David Lo
, Pavneet Singh Kochhar, Cuiyun Gao
, Iftekhar Ahmed
:
A Deep Dive into the Impact of COVID-19 on Software Development. 3342-3360 - Yong Shi, Mingzhi Wen, Filipe Roseiro Côgo, Boyuan Chen

, Zhen Ming Jiang
:
An Experience Report on Producing Verifiable Builds for Large-Scale Commercial Systems. 3361-3377 - Jorge Pérez

, Ángel González-Prieto, Jessica Díaz
, Daniel López-Fernández
, Javier García Martín, Agustín Yagüe
:
DevOps Research-Based Teaching Using Qualitative Research and Inter-Coder Agreement. 3378-3393 - Gede Artha Azriadi Prana

, Denae Ford
, Ayushi Rastogi
, David Lo
, Rahul Purandare
, Nachiappan Nagappan:
Including Everyone, Everywhere: Understanding Opportunities and Challenges of Geographic Gender-Inclusion in OSS. 3394-3409 - Maxime Lamothe

, Heng Li
, Weiyi Shang:
Assisting Example-Based API Misuse Detection via Complementary Artificial Examples. 3410-3422 - Bowen Xu

, Thong Hoang, Abhishek Sharma, Chengran Yang
, Xin Xia, David Lo
:
Post2Vec: Learning Distributed Representations of Stack Overflow Posts. 3423-3441 - Sami Ullah

, Heekuck Oh
:
BinDiffNN: Learning Distributed Representation of Assembly for Robust Binary Diffing Against Semantic Differences. 3442-3466 - Peter Leo Gorski

, Sebastian Möller
, Stephan Wiefling
, Luigi Lo Iacono
:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. 3467-3484 - Aatira Anum Ahmad

, Abdul Rafae Noor
, Hashim Sharif
, Usama Hameed, Shoaib Asif, Mubashir Anwar
, Ashish Gehani
, Fareed Zaffar, Junaid Haroon Siddiqui
:
Trimmer: An Automated System for Configuration-Based Software Debloating. 3485-3505 - Christian D. Newman

, Michael John Decker
, Reem S. Alsuhaibani
, Anthony Peruma
, Mohamed Wiem Mkaouer
, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy J. Sheldon, Emily Hill:
An Ensemble Approach for Annotating Source Code Identifiers With Part-of-Speech Tags. 3506-3522 - Marco Kuhrmann

, Paolo Tell
, Regina Hebig
, Jil Klünder
, Jürgen Münch
, Oliver Linssen, Dietmar Pfahl
, Michael Felderer
, Christian R. Prause
, Stephen G. MacDonell
, Joyce Nakatumba-Nabende
, David Raffo, Sarah Beecham, Eray Tüzün
, Gustavo López
, Nicolás Paez
, Diego Fontdevila
, Sherlock A. Licorish
, Steffen Küpper, Günther Ruhe, Eric Knauss
, Özden Özcan-Top, Paul M. Clarke
, Fergal McCaffery, Marcela Genero, Aurora Vizcaíno
, Mario Piattini
, Marcos Kalinowski
, Tayana Conte, Rafael Prikladnicki
, Stephan Krusche
, Ahmet Coskunçay
, Ezequiel Scott
, Fabio Calefato
, Svetlana Pimonova, Rolf-Helge Pfeiffer, Ulrik Pagh Schultz
, Rogardt Heldal, Masud Fazal-Baqaie
, Craig Anslow
, Maleknaz Nayebi
, Kurt Schneider, Stefan Sauer, Dietmar Winkler
, Stefan Biffl
, María Cecilia Bastarrica
, Ita Richardson
:
What Makes Agile Software Development Agile? 3523-3539 - Héctor D. Menéndez, David Clark

:
Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection. 3540-3553 - Claudio Mandrioli

, Martina Maggio
:
Testing Self-Adaptive Software With Probabilistic Guarantees on Performance Metrics: Extended and Comparative Results. 3554-3572 - Elvan Kula

, Eric Greuter, Arie van Deursen
, Georgios Gousios
:
Factors Affecting On-Time Delivery in Large-Scale Agile Software Development. 3573-3592 - Peixin Zhang

, Jingyi Wang
, Jun Sun, Xinyu Wang
, Guoliang Dong, Xingen Wang
, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling. 3593-3612 - Andreas Dann

, Henrik Plate
, Ben Hermann
, Serena Elisa Ponta
, Eric Bodden
:
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite. 3613-3625 - Zainab Masood

, Rashina Hoda
, Kelly Blincoe
:
What Drives and Sustains Self-Assignment in Agile Teams. 3626-3639 - Sooyoung Cha

, Seongjoon Hong
, Jiseong Bak
, Jingyoung Kim
, Junhee Lee, Hakjoo Oh
:
Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics. 3640-3663 - Khouloud Gaaloul

, Claudio Menghi
, Shiva Nejati
, Lionel C. Briand
, Yago Isasi Parache:
Combining Genetic Programming and Model Checking to Generate Environment Assumptions. 3664-3685 - Lu Xiao

, Yuanfang Cai
, Rick Kazman
, Ran Mo
, Qiong Feng:
Detecting the Locations and Predicting the Maintenance Costs of Compound Architectural Debts. 3686-3715 - Steven Locke

, Heng Li
, Tse-Hsun Peter Chen
, Weiyi Shang, Wei Liu
:
LogAssist: Assisting Log Analysis Through Log Summarization. 3227-3241
Volume 48, Number 10, October 2022
- Daniel López-Fernández

, Jessica Díaz
, Javier Garcia
, Jorge Pérez
, Ángel González-Prieto
:
DevOps Team Structures: Characterization and Implications. 3716-3736 - Kashumi Madampe

, Rashina Hoda
, John C. Grundy
:
A Faceted Taxonomy of Requirements Changes in Agile Contexts. 3737-3752 - Chaima Abid, Dhia Elhaq Rzig

, Thiago do Nascimento Ferreira
, Marouane Kessentini
, Tushar Sharma
:
X-SBR: On the Use of the History of Refactorings for Explainable Search-Based Refactoring and Intelligent Change Operators. 3753-3770 - Nikita Mehrotra

, Navdha Agarwal
, Piyush Gupta
, Saket Anand
, David Lo
, Rahul Purandare
:
Modeling Functional Similarity in Source Code With Graph-Based Siamese Networks. 3771-3789 - Abbas Javan Jafari

, Diego Elias Costa
, Rabe Abdalkareem
, Emad Shihab
, Nikolaos Tsantalis
:
Dependency Smells in JavaScript Projects. 3790-3807 - Rashina Hoda

:
Socio-Technical Grounded Theory for Software Engineering. 3808-3832 - Nada Almasri

, Bogdan Korel
, Luay Tahat
:
Verification Approach for Refactoring Transformation Rules of State-Based Models. 3833-3861 - Toufique Ahmed

, Premkumar T. Devanbu, Anand Ashok Sawant
:
Learning to Find Usages of Library Functions in Optimized Binaries. 3862-3876 - ThanhVu Nguyen

, KimHao Nguyen, Matthew B. Dwyer
:
Using Symbolic States to Infer Numerical Invariants. 3877-3899 - Goran Petrovic

, Marko Ivankovic
, Gordon Fraser, René Just
:
Practical Mutation Testing at Scale: A view from Google. 3900-3912 - Oscar Cornejo

, Fabrizio Pastore
, Lionel C. Briand
:
Mutation Analysis for Cyber-Physical Systems: Scalable Solutions and Results in the Space Domain. 3913-3939 - Bianca Trinkenreich

, Mariam Guizani
, Igor Wiese, Tayana Conte, Marco Aurélio Gerosa, Anita Sarma
, Igor Steinmacher
:
Pots of Gold at the End of the Rainbow: What is Success for Open Source Contributors? 3940-3953 - Sen Chen

, Chunyang Chen
, Lingling Fan
, Mingming Fan
, Xian Zhan
, Yang Liu
:
Accessible or Not? An Empirical Investigation of Android App Accessibility. 3954-3968 - Binny M. Samuel

, Hillol Bala
, Sherae L. Daniel, V. Ramesh:
Deconstructing the Nature of Collaboration in Organizations Open Source Software Development: The Impact of Developer and Task Characteristics. 3969-3987 - Mariam El Mezouar

, Daniel Alencar da Costa
, Daniel M. Germán, Ying Zou:
Exploring the Use of Chatrooms by Developers: An Empirical Study on Slack and Gitter. 3988-4001 - Toni Mancini

, Igor Melatti
, Enrico Tronci
:
Any-Horizon Uniform Random Sampling and Enumeration of Constrained Scenarios for Simulation-Based Formal Verification. 4002-4013 - Junbin Zhang

, Yingying Wang, Lina Qiu, Julia Rubin
:
Analyzing Android Taint Analysis Tools: FlowDroid, Amandroid, and DroidSafe. 4014-4040 - Ralph Hoch

, Christoph Luckeneder, Roman Popp, Hermann Kaindl
:
Verification of Consistency Between Process Models, Object Life Cycles, and Context-Dependent Semantic Specifications. 4041-4059 - Shouvick Mondal

, Rupesh Nasre:
${{\sf Colosseum}}$Colosseum: Regression Test Prioritization by Delta Displacement in Test Coverage. 4060-4073 - Rahul Mohanani

, Paul Ralph
, Burak Turhan
, Vladimir Mandic
:
How Templated Requirements Specifications Inhibit Creativity in Software Engineering. 4074-4086 - Alexandre Decan

, Tom Mens
, Ahmed Zerouali
, Coen De Roover
:
Back to the Past - Analysing Backporting Practices in Package Dependency Networks. 4087-4099 - Thu-Trang Nguyen

, Kien-Tuan Ngo, Son Nguyen, Hieu Dinh Vo
:
A Variability Fault Localization Approach for Software Product Lines. 4100-4118 - Xintao Niu

, Huayao Wu
, Changhai Nie, Yu Lei
, Xiaoyin Wang
:
A Theory of Pending Schemas in Combinatorial Testing. 4119-4151 - Simon Eismann

, Joel Scheuner
, Erwin Van Eyk
, Maximilian Schwinger, Johannes Grohmann
, Nikolas Herbst
, Cristina L. Abad
, Alexandru Iosup
:
The State of Serverless Applications: Collection, Characterization, and Community Consensus. 4152-4166 - Jianmin Guo

, Quan Zhang, Yue Zhao, Heyuan Shi
, Yu Jiang
, Jia-Guang Sun:
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems. 4167-4180 - Xian Zhan

, Tianming Liu
, Lingling Fan
, Li Li
, Sen Chen
, Xiapu Luo
, Yang Liu
:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. 4181-4213 - Tao Xiao

, Dong Wang
, Shane McIntosh
, Hideaki Hata
, Raula Gaikovina Kula
, Takashi Ishio
, Kenichi Matsumoto
:
Characterizing and Mitigating Self-Admitted Technical Debt in Build Systems. 4214-4228
Volume 48, Number 11, November 2022
- Claudia P. Ayala

, Burak Turhan
, Xavier Franch
, Natalia Juristo:
Use and Misuse of the Term "Experiment" in Mining Software Repositories Research. 4229-4248 - Xian Zhan

, Tianming Liu
, Yepang Liu
, Yang Liu
, Li Li
, Haoyu Wang, Xiapu Luo
:
A Systematic Assessment on Android Third-Party Library Detection Tools. 4249-4273 - Hugo Martin

, Mathieu Acher
, Juliana Alves Pereira
, Luc Lesoil
, Jean-Marc Jézéquel
, Djamel Eddine Khelladi:
Transfer Learning Across Variants and Versions: The Case of Linux Kernel Size. 4274-4290 - Niclas Kannengießer

, Sebastian Lins
, Christian Sander, Klaus Winter
, Hellmuth Frey, Ali Sunyaev
:
Challenges and Common Solutions in Smart Contract Development. 4291-4318 - Fatima Sabir

, Yann-Gaël Guéhéneuc
, Francis Palma
, Naouel Moha, Ghulam Rasool
, Hassan Akhtar:
A Mixed-Method Approach to Recommend Corrections and Correct REST Antipatterns. 4319-4338 - Ana Neri

, Rui Soares Barbosa
, José N. Oliveira
:
Compiling Quantamorphisms for the IBM Q Experience. 4339-4356 - Xinqiang Xie

, Xiaochun Yang
, Bin Wang
, Qiang He
:
DevRec: Multi-Relationship Embedded Software Developer Recommendation. 4357-4379 - Fuchen Ma

, Zhenyang Xu
, Meng Ren, Zijing Yin
, Yuanliang Chen, Lei Qiao, Bin Gu
, Huizhong Li, Yu Jiang
, Jia-Guang Sun:
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. 4380-4396 - John Spray, Roopak Sinha

, Arnab Sen
, Xingbin Cheng:
Building Maintainable Software Using Abstraction Layering. 4397-4410 - Yixuan Tang

, He Jiang
, Zhide Zhou
, Xiaochen Li
, Zhilei Ren, Weiqiang Kong:
Detecting Compiler Warning Defects Via Diversity-Guided Program Mutation. 4411-4432 - Renana Arizon-Peretz

, Irit Hadar
, Gil Luria
:
The Importance of Security Is in the Eye of the Beholder: Cultural, Organizational, and Personal Factors Affecting the Implementation of Security by Design. 4433-4446 - Ali Ebnenasir

:
Verification and Synthesis of Responsive Symmetric Uni-Rings. 4447-4464 - Rui Li

, Wenrui Diao
, Zhou Li
, Shishuai Yang, Shuang Li, Shanqing Guo
:
Android Custom Permissions Demystified: A Comprehensive Security Evaluation. 4465-4484 - Mingwei Liu

, Xin Peng
, Andrian Marcus
, Shuangshuang Xing, Christoph Treude
, Chengyuan Zhao
:
API-Related Developer Information Needs in Stack Overflow. 4485-4500 - Yutian Tang

, Hao Zhou, Xiapu Luo
, Ting Chen
, Haoyu Wang, Zhou Xu
, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. 4501-4520 - Matias Martinez

, Bruno Gois Mateus:
Why Did Developers Migrate Android Applications From Java to Kotlin? 4521-4534 - Afsoon Afzal

, Claire Le Goues
, Christopher Steven Timperley
:
Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems. 4535-4552 - Francisca Pérez

, Jaime Font
, Lorena Arcega
, Carlos Cetina
:
Empowering the Human as the Fitness Function in Search-Based Model-Driven Engineering. 4553-4568 - Binfa Gui, Wei Song

, Hailong Xiong
, Jeff Huang:
Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone? 4569-4589 - Georg Seibt

, Florian Heck, Guilherme Cavalcanti, Paulo Borba
, Sven Apel
:
Leveraging Structure in Software Merge: An Empirical Study. 4590-4610 - Hai Jin

, Zeli Wang
, Ming Wen
, Weiqi Dai
, Yu Zhu, Deqing Zou
:
Aroc: An Automatic Repair Framework for On-Chain Smart Contracts. 4611-4629 - Pengcheng Zhang

, Bin Ren, Hai Dong
, Qiyin Dai:
CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing for Image-Based Deep Learning Systems. 4630-4646 - Orlando Amaral

, Sallam Abualhaija
, Damiano Torre
, Mehrdad Sabetzadeh, Lionel C. Briand
:
AI-Enabled Automation for Completeness Checking of Privacy Policies. 4647-4674 - Alessio Ferrari

, Franco Mazzanti
, Davide Basile
, Maurice H. ter Beek
:
Systematic Evaluation and Usability Analysis of Formal Methods Tools for Railway Signaling System Design. 4675-4691 - Samuel Benton

, Xia Li, Yiling Lou
, Lingming Zhang:
Evaluating and Improving Unified Debugging. 4692-4716
Volume 48, Number 12, December 2022
- Nikhil Parasaram, Earl T. Barr

, Sergey Mechtaev
:
Trident: Controlling Side Effects in Automated Program Repair. 4717-4732 - Haipeng Cai

, Xiaoqin Fu:
D$^2$2Abs: A Framework for Dynamic Dependence Analysis of Distributed Programs. 4733-4761 - Laura Carnevali

, Reinhard German, Francesco Santoni, Enrico Vicario
:
Compositional Analysis of Hierarchical UML Statecharts. 4762-4788 - Stefan Wagner

, Marvin Wyrich
:
Code Comprehension Confounders: A Study of Intelligence and Personality. 4789-4801 - José Ignacio Panach

, Oscar Pastor
, Natalia Juristo
:
A Family of Experiments to Compare Two Model-Driven Development Tools vs a Traditional Development Method. 4802-4817 - Matteo Ciniselli

, Nathan Cooper
, Luca Pascarella
, Antonio Mastropaolo
, Emad Aghajani
, Denys Poshyvanyk
, Massimiliano Di Penta
, Gabriele Bavota
:
An Empirical Study on the Usage of Transformer Models for Code Completion. 4818-4837 - Adam Alami

, Raúl Pardo, Marisa Leavitt Cohn
, Andrzej Wasowski
:
Pull Request Governance in Open Source Communities. 4838-4856 - Foozhan Ataiefard

, Mohammad Jafar Mashhadi, Hadi Hemmati, Neil Walkinshaw
:
Deep State Inference: Toward Behavioral Model Inference of Black-Box Software Systems. 4857-4872 - Islem Saidani

, Ali Ouni
, Mohamed Wiem Mkaouer
:
Detecting Continuous Integration Skip Commits Using Multi-Objective Evolutionary Search. 4873-4891 - Dimitrios Tsoukalas

, Nikolaos Mittas
, Alexander Chatzigeorgiou, Dionisis D. Kehagias
, Apostolos Ampatzoglou
, Theodoros Amanatidis, Lefteris Angelis
:
Machine Learning for Technical Debt Identification. 4892-4906 - Heng Li

, Haoxiang Zhang
, Shaowei Wang
, Ahmed E. Hassan:
Studying the Practices of Logging Exception Stack Traces in Open-Source Software Projects. 4907-4924 - Maurício Aniche

, Christoph Treude
, Andy Zaidman
:
How Developers Engineer Test Cases: An Observational Study. 4925-4946 - Yao Lu

, Xinjun Mao
, Minghui Zhou
, Yang Zhang
, Zude Li, Tao Wang, Gang Yin, Huaimin Wang:
Motivation Under Gamification: An Empirical Study of Developers' Motivations and Contributions in Stack Overflow. 4947-4963 - Gustavo Vale

, Claus Hunsen, Eduardo Figueiredo, Sven Apel
:
Challenges of Resolving Merge Conflicts: A Mining and Survey Study. 4964-4985 - Lizhi Liao

, Jinfu Chen
, Heng Li
, Yi Zeng, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi
:
Locating Performance Regression Root Causes in the Field Operations of Web-Based Systems: An Experience Report. 4986-5006 - Xintao Niu

, Yanjie Sun, Huayao Wu
, Gang Li, Changhai Nie, Yu Lei, Xiaoyin Wang
:
Enhance Combinatorial Testing With Metamorphic Relations. 5007-5029 - Lina Gong

, Gopi Krishnan Rajbahadur
, Ahmed E. Hassan, Shujuan Jiang
:
Revisiting the Impact of Dependency Network Metrics on Software Defect Prediction. 5030-5049 - Julian Aron Prenner

, Romain Robbes
:
Making the Most of Small Software Engineering Datasets With Modern Machine Learning. 5050-5067 - Fangcheng Qiu, Zhipeng Gao

, Xin Xia
, David Lo
, John C. Grundy
, Xinyu Wang
:
Deep Just-In-Time Defect Localization. 5068-5086 - Muhammad Hilmi Asyrofi, Zhou Yang, Imam Nur Bani Yusuf, Hong Jin Kang

, Ferdian Thung
, David Lo
:
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems. 5087-5101 - Feng Li

, Jianyi Zhou, Yinzhu Li, Dan Hao
, Lu Zhang:
AGA: An Accelerated Greedy Additional Algorithm for Test Case Prioritization. 5102-5119 - Jia-Ju Bai

, Qiu-Liang Chen, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu
:
Hybrid Static-Dynamic Analysis of Data Races Caused by Inconsistent Locking Discipline in Device Drivers. 5120-5135 - Shachi Sharma

, Parag C. Pendharkar
, Karmeshu
:
Learning Component Size Distributions for Software Cost Estimation: Models Based on Arithmetic and Shifted Geometric Means Rules. 5136-5147 - Miroslav Tushev

, Fahimeh Ebrahimi
, Anas Mahmoud
:
A Systematic Literature Review of Anti-Discrimination Design Strategies in the Digital Sharing Economy. 5148-5157 - Waqar Hussain

, Mojtaba Shahin
, Rashina Hoda
, Jon Whittle
, Harsha Perera
, Arif Nurwidyantoro
, Rifat Ara Shams
, Gillian C. Oliver
:
How Can Human Values be Addressed in Agile Methods? A Case Study on SAFe. 5158-5175 - Weifeng Pan

, Ming Hua, Zijiang Yang, Tian Wang:
Comments on "Using $k$k-Core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance". 5176-5187 - Ezekiel O. Soremekun

, Sakshi Udeshi
, Sudipta Chattopadhyay
:
Astraea: Grammar-Based Fairness Testing. 5188-5211

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














