


default search action
29th SANER 2022: Honolulu, HI, USA
- IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, Honolulu, HI, USA, March 15-18, 2022. IEEE 2022, ISBN 978-1-6654-3786-8

- Peter Bludau

, Alexander Pretschner:
PR-SZZ: How pull requests can support the tracing of defects in software repositories. 1-12 - Zi Gong, Cuiyun Gao, Yasheng Wang, Wenchao Gu, Yun Peng, Zenglin Xu:

Source Code Summarization with Structural Relative Position Guided Transformer. 13-24 - Biruk Asmare Muse, Foutse Khomh, Giuliano Antoniol:

Do Developers Refactor Data Access Code? An Empirical Study. 25-35 - Nyyti Saarimäki

, Sergio Moreschini
, Francesco Lomio
, Rafael Peñaloza, Valentina Lenarduzzi:
Towards a Robust Approach to Analyze Time-Dependent Data in Software Engineering. 36-40 - Nitish Patkar

, Andrei Chis, Nataliia Stulova, Oscar Nierstrasz:
First-class artifacts as building blocks for live in-IDE documentation. 41-45 - Francesco Lomio, Zadia Codabux, Dale Birtch, Dale Hopkins, Davide Taibi:

On the Benefits of the Accelerate Metrics: An Industrial Survey at Vendasta. 46-50 - Giang Nguyen-Truong, Hong Jin Kang

, David Lo
, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang:
HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits. 51-62 - Akond Rahman

, Tushar Sharma
:
Lessons from Research to Practice on Writing Better Quality Puppet Scripts. 63-67 - Shrishti Pradhan, Raveendra Kumar Medicherla, Shivani Kondewar, Ravindra Naik:

Program Transformations for Precise Analysis of Enterprise Information Systems. 68-72 - Chengran Yang, Ferdian Thung, David Lo

:
Efficient Search of Live-Coding Screencasts from Online Videos. 73-77 - Tao Chen:

Lifelong Dynamic Optimization for Self-Adaptive Systems: Fact or Fiction? 78-89 - Sara Forootani, Andrea Di Sorbo, Corrado Aaron Visaggio:

An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects. 90-100 - Xinyue Liang, Jun Ma:

A Study on Screen Logging Risks of Secure Keyboards of Android Financial Apps. 101-111 - Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:

DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. 112-122 - Pablo Valenzuela-Toledo, Alexandre Bergel:

Evolution of GitHub Action Workflows. 123-127 - Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi

, Constance Tan, Fiona Wee, Jack Phan, David Lo
:
On the Influence of Biases in Bug Localization: Evaluation and Benchmark. 128-139 - Zachary Eberhart, Collin McMillan:

Generating Clarifying Questions for Query Refinement in Source Code Search. 140-151 - Alex Serban, Joost Visser

:
Adapting Software Architectures to Machine Learning Challenges. 152-163 - Christian Birchler, Nicolas Ganz

, Sajad Khatiri, Alessio Gambi, Sebastiano Panichella
:
Cost-effective Simulation-based Test Selection in Self-driving Cars Software with SDC-Scissor. 164-168 - Romulo Nascimento, André C. Hora, Eduardo Figueiredo:

Exploring API Deprecation Evolution in JavaScript. 169-173 - Ítalo Santos, Igor Wiese, Igor Steinmacher, Anita Sarma, Marco Aurélio Gerosa:

Hits and Misses: Newcomers' ability to identify Skills needed for OSS tasks. 174-183 - Denis Sushentsev, Aleksandr Khvorov, Roman Vasiliev, Yaroslav Golubev

, Timofey Bryksin:
DAPSTEP: Deep Assignee Prediction for Stack Trace Error rePresentation. 184-195 - Enrique A. da Roza, Jackson A. Prado Lima

, Rogério C. Silva, Silvia Regina Vergilio:
Machine Learning Regression Techniques for Test Case Prioritization in Continuous Integration Environment. 196-206 - Camilo Velázquez-Rodríguez

, Eleni Constantinou
, Coen De Roover
:
Uncovering Library Features from API Usage on Stack Overflow. 207-217 - Chaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta

, Federica Sarro
:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand. 218-222 - Nicholas Chan, John A. Chandy

:
Extracting Vulnerabilities from GitHub Commits. 235-239 - Arthur Marques, Gail C. Murphy:

Evaluating the Use of Semantics for Identifying Task-relevant Textual Information. 240-251 - Harshavardhan Kadiyala, Alberto Misail, Julia Rubin:

Kuber: Cost-Efficient Microservice Deployment Planner. 252-262 - Hung Nguyen, Francesco Lomio

, Fabiano Pecorelli
, Valentina Lenarduzzi:
PANDORA: Continuous Mining Software Repository and Dataset Generation. 263-267 - Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:

FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. 268-272 - Camila Sarmento, Tiago Massoni

, Alexander Serebrenik, Gemma Catolino, Damian A. Tamburri
, Fabio Palomba:
Gender Diversity and Community Smells: A Double-Replication Study on Brazilian Software Teams. 273-283 - Aitor Arrieta, Maialen Otaegi, Liping Han

, Goiuria Sagardui, Shaukat Ali, Maite Arratibel:
Automating Test Oracle Generation in DevOps for Industrial Elevators. 284-288 - Yan Lei, Chunyan Liu, Huan Xie, Sheng Huang, Meng Yan

, Zhou Xu:
BCL-FL: A Data Augmentation Approach with Between-Class Learning for Fault Localization. 289-300 - Giovanni Viviani, Gail C. Murphy:

What really is software design? 301-308 - Yan Zhao, Enyi Tang, Haipeng Cai

, Xi Guo, Xiaoyin Wang, Na Meng:
A Lightweight Approach of Human-Like Playtest for Android Apps. 309-320 - Jack Johnson, Junayed Mahmud, Tyler Wendland, Kevin Moran, Julia Rubin, Mattia Fazzini

:
An Empirical Investigation into the Reproduction of Bug Reports for Android Apps. 321-322 - Mohammed A. Shehab

, Abdelwahab Hamou-Lhadj
, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. 333-337 - Roland Croft, Muhammad Ali Babar, Li Li:

An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. 338-348 - Zishuo Ding, Heng Li, Weiyi Shang:

LoGenText: Automatically Generating Logging Texts Using Neural Machine Translation. 349-360 - Guang Yang

, Xiang Chen, Yanlin Zhou, Chi Yu:
DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. 361-372 - Rongfan Li, Bihuan Chen, Fengyi Zhang, Chao Sun, Xin Peng:

Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks. 373-384 - Chengran Yang, Bowen Xu, Junaed Younus Khan

, Gias Uddin, DongGyun Han
, Zhou Yang, David Lo
:
Aspect-Based API Review Classification: How Far Can Pre-Trained Transformer Model Go? 385-395 - Zhongyang Deng, Ling Xu, Chao Liu, Meng Yan

, Zhou Xu, Yan Lei:
Fine-grained Co-Attentive Representation Learning for Semantic Code Search. 396-407 - Zhou Yang, Jieke Shi

, Muhammad Hilmi Asyrofi, David Lo
:
Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks. 408-419 - Mubin Ul Haque

, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. 420-431 - Menghan Wu, Yang Zhang, Jiakun Liu, Shangwen Wang, Zhang Zhang, Xin Xia, Xinjun Mao:

On the Way to Microservices: Exploring Problems and Solutions from Online Q&A Community. 432-443 - Yunosuke Higashi, Katsunori Fukui, Yutaro Kashiwa, Masao Ohira:

A Preliminary Analysis of GPL-Related License Violations in Docker Images. 444-448 - Yinyuan Zhang, Yang Zhang, Xinjun Mao, Yiwen Wu, Bo Lin, Shangwen Wang:

Recommending Base Image for Docker Containers based on Deep Configuration Comprehension. 449-453 - Sergio Naranjo-Puentes, Camilo Escobar-Velásquez, Christopher Vendome, Mario Linares-Vásquez:

A Preliminary Study on Accessibility of Augmented Reality Features in Mobile Apps. 454-458 - Christoph Reile, Mohak Chadha, Valentin Hauner, Anshul Jindal, Benjamin Hofmann, Michael Gerndt:

Bunk8s: Enabling Easy Integration Testing of Microservices in Kubernetes. 459-463 - Ulf Kargén

, Ivar Härnqvist, Johannes Wilson
, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri:
desync-cc: An Automatic Disassembly-Desynchronization Obfuscator. 464-468 - Anamaria Mojica-Hanke, Laura Bello-Jiménez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:

Crème de la crème. Investigating Metadata and Survivability of Top Android Apps. 469-480 - Jing Yang, Yibiao Yang

, Maolin Sun
, Ming Wen, Yuming Zhou, Hai Jin:
Isolating Compiler Optimization Faults via Differentiating Finer-grained Options. 481-491 - Sergey Titov, Yaroslav Golubev

, Timofey Bryksin:
ReSplit: Improving the Structure of Jupyter Notebooks by Re-Splitting Their Cells. 492-496 - Sakutaro Sugiyama, Takashi Kobayashi, Kazumasa Shimari, Takashi Ishio

:
JISDLab: A web-based interactive literate debugging environment. 497-501 - Thanh V. Nguyen, Aashish Yadavally, Tien N. Nguyen:

Phrase2Set: Phrase-to-Set Machine Translation and Its Software Engineering Applications. 502-513 - Kevin Moran, Ali Yachnes, George Purnell, Junayed Mahmud, Michele Tufano, Carlos Bernal-Cárdenas, Denys Poshyvanyk

, Zach H'Doubler:
An Empirical Investigation into the Use of Image Captioning for Automated Software Documentation. 514-525 - Jordan Henkel, Goutham Ramakrishnan, Zi Wang, Aws Albarghouthi, Somesh Jha, Thomas W. Reps:

Semantic Robustness of Models of Source Code. 526-537 - Lívia Barbosa, André C. Hora:

How and Why Developers Migrate Python Tests. 538-548 - Pablo Valle, Aitor Arrieta:

Towards the Isolation of Failure-Inducing Inputs in Cyber-Physical Systems: is Delta Debugging Enough? 549-553 - Jing Kai Siow, Shangqing Liu, Xiaofei Xie

, Guozhu Meng, Yang Liu
:
Learning Program Semantics with Code Representations: An Empirical Study. 554-565 - Ning Ge

, Ze Wang, Li Zhang, Jiuang Zhao, Yufei Zhou, Zewei Liu:
ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code. 566-576 - Ke Liu, Guang Yang

, Xiang Chen, Chi Yu:
SOTitle: A Transformer-based Post Title Generation Approach for Stack Overflow. 577-588 - Shichao Wang, Yun Zhang, Liagfeng Bao, Xin Xia, Minghui Wu:

VCMatch: A Ranking-based Approach for Automatic Security Patches Localization for OSS Vulnerabilities. 589-600 - Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin:

Cross-Language Binary-Source Code Matching with Intermediate Representations. 601-612 - Chong Wang, Jingwen Jiang, Maya Daneva, Marten van Sinderen

:
CoolTeD: A Web-based Collaborative Labeling Tool for the Textual Dataset. 613-617 - Behnaz Hassanshahi, Hyunjun Lee, Paddy Krishnan:

Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications. 618-629 - Dezhen Kong, Qiuyuan Chen, Lingfeng Bao, Chenxing Sun, Xin Xia, Shanping Li:

Recommending Code Reviewers for Proprietary Software Projects: A Large Scale Study. 630-640 - Jingting Chen, Feng Li, Mingjie Xu, Jianhua Zhou, Wei Huo:

RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations. 641-651 - Maxime Gobert, Loup Meurice, Anthony Cleve:

HyDRa: A Framework for Modeling, Manipulating and Evolving Hybrid Polystores. 652-656 - Bharti Chimdyalwar, Anushri Jana, Shrawan Kumar, Ankita Khadsare, Vaidehi Ghime:

Identifying Relevant Changes for Incremental Verification of Evolving Software Systems. 657-661 - Mehdi Golzadeh, Alexandre Decan, Tom Mens:

On the rise and fall of CI services in GitHub. 662-672 - Michael Schlichtig

, Steffen Sassalla
, Krishna Narasimhan, Eric Bodden:
FUM - A Framework for API Usage constraint and Misuse Classification. 673-684 - Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:

DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. 685-696 - Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares-Vásquez, Gabriele Bavota

:
Detecting Connectivity Issues in Android Apps. 697-708 - Alejandra Duque-Torres, Dietmar Pfahl

, Rudolf Ramler, Claus Klammer:
A Replication Study on Predicting Metamorphic Relations at Unit Testing Level. 709-719 - Dongge Liu

, Van-Thuan Pham, Gidon Ernst
, Toby Murray, Benjamin I. P. Rubinstein
:
State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing. 720-730 - Giulia Sellitto

, Emanuele Iannone
, Zadia Codabux, Valentina Lenarduzzi, Andrea De Lucia, Fabio Palomba, Filomena Ferrucci:
Toward Understanding the Impact of Refactoring on Program Comprehension. 731-742 - Gowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, Kazi Zakia Sultana, Zadia Codabux:

Common Programming Mistakes Leading to Information Disclosure: A Preliminary Study. 743-747 - Thierry Sorg

, Amine Abbad Andaloussi
, Barbara Weber:
Towards a Fine-grained Analysis of Cognitive Load During Program Comprehension. 748-752 - Daniel Coutinho

, Anderson G. Uchôa
, Caio Barbosa, Vinícius Soares, Alessandro F. Garcia, Marcelo Schots, Juliana Alves Pereira, Wesley K. G. Assunção
:
On the Influential Interactive Factors on Degrees of Design Decay: A Multi-Project Study. 753-764 - Junaed Younus Khan

, Gias Uddin:
Automatic Detection and Analysis of Technical Debts in Peer-Review Documentation of R Packages. 765-776 - Ming Ye, Jicheng Cao, Shengyu Cheng:

Rebot: An Automatic Multi-modal Requirements Review Bot. 777-781 - Aidan Connor, Aaron Harris, Nathan Cooper, Denys Poshyvanyk

:
Can We Automatically Fix Bugs by Learning Edit Operations? 782-792 - Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Zexuan Li:

How Do Injected Bugs Affect Deep Learning? 793-804 - Martin Odermatt, Diego Marcilio, Carlo A. Furia:

Static Analysis Warnings and Automatic Fixing: A Replication for C# Projects. 805-816 - Riccardo Rubei, Claudio Di Sipio, Juri Di Rocco, Davide Di Ruscio

, Phuong T. Nguyen
:
Endowing third-party libraries recommender systems with explicit user feedback mechanisms. 817-821 - Michael Moser, Josef Pichler, Andreas Pointner

:
Towards Attribute Grammar Mining by Symbolic Execution. 822-826 - Vali Tawosi, Afnan A. Al-Subaihin, Federica Sarro

:
Investigating the Effectiveness of Clustering for Story Point Estimation. 827-838 - William Ravelo-Méndez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:

Kraken 2.0: A platform-agnostic and cross-device interaction testing tool. 839-843 - Qiang Xu, James C. Davis

, Y. Charlie Hu, Abhilash Jindal:
An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage. 844-855 - Xin Zhang, Rongjie Yan, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang:

ExcePy: A Python Benchmark for Bugs with Python Built-in Types. 856-866 - John Businge, Ahmed Zerouali, Alexandre Decan, Tom Mens, Serge Demeyer, Coen De Roover

:
Variant Forks - Motivations and Impediments. 867-877 - Richárd Szalay

, Zoltán Porkoláb
:
Flexible semi-automatic support for type migration of primitives for C/C++ programs. 878-889 - Safwat Hassan, Heng Li, Ahmed E. Hassan:

On the Importance of Performing App Analysis Within Peer Groups. 890-901 - Déaglán Connolly Bree

, Mel Ó Cinnéide:
Removing Decorator to Improve Energy Efficiency. 902-912 - Kawser Wazed Nafi, Muhammad Asaduzzaman, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:

Mining Software Information Sites to Recommend Cross-Language Analogical Libraries. 913-924 - Wilson Baker, Michael O'Connor, Seyed Reza Shahamiri

, Valerio Terragni:
Detect, Fix, and Verify TensorFlow API Misuses. 925-929 - Boris Cherry, Pol Benats, Maxime Gobert, Loup Meurice, Csaba Nagy, Anthony Cleve:

Static Analysis of Database Accesses in MongoDB Applications. 930-934 - Jian Gu, Pasquale Salza

, Harald C. Gall:
Assemble Foundation Models for Automatic Code Summarization. 935-946 - Giammaria Giordano

, Antonio Fasulo, Gemma Catolino, Fabio Palomba, Filomena Ferrucci, Carmine Gravino:
On the Evolution of Inheritance and Delegation Mechanisms and Their Impact on Code Quality. 947-958 - Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser

, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. 959-970 - Yu Hu, Zekun Shen, Brendan Dolan-Gavitt:

Characterizing and Improving Bug-Finders with Synthetic Bugs. 971-982 - Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:

Phishing Kits Source Code Similarity Distribution: A Case Study. 983-994 - Rui Xi, Karthik Pattabiraman:

When They Go Low: Automated Replacement of Low-level Functions in Ethereum Smart Contracts. 995-1005 - Mark Santolucito, Jialu Zhang, Ennan Zhai, Jürgen Cito, Ruzica Piskac:

Learning CI Configuration Correctness for Early Build Feedback. 1006-1017 - Rolf-Helge Pfeiffer:

Searching for Technical Debt - An Empirical, Exploratory, and Descriptive Case Study. 1018-1022 - Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen:

BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model. 1023-1033 - Yang Hong, Chakkrit Kla Tantithamthavorn, Patanamon Thongtanunam:

Where Should I Look at? Recommending Lines that Reviewers Should Pay Attention To. 1034-1045 - Chaochen Shi, Yong Xiang, Jiangshan Yu

, Longxiang Gao, Keshav Sood
, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. 1046-1054 - Hiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:

Web Element Identification by Combining NLP and Heuristic Search for Web Testing. 1055-1065 - Mubin Ul Haque

, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. 1066-1077 - Dun Jin, Peiyu Liu, Zhenfang Zhu:

Automatically Generating Code Comment Using Heterogeneous Graph Neural Networks. 1078-1088 - Xiaoning Zhu, Chaofeng Sha, Junyu Niu:

A Simple Retrieval-based Method for Code Comment Generation. 1089-1100 - Zhiheng Qu, Yi Hu, Jianhui Zeng, Bo Cai

, Shun Yang:
Method Name Generation Based on Code Structure Guidance. 1101-1110 - Shogo Tokui, Susumu Tokumoto, Akihito Yoshii, Fuyuki Ishikawa, Takao Nakagawa, Kazuki Munakata, Shinji Kikuchi:

NeuRecover: Regression-Controlled Repair of Deep Neural Networks with Training History. 1111-1121 - Abhishek Sharma, Gede Artha Azriadi Prana, Anamika Sawhney, Nachiappan Nagappan, David Lo

:
Analyzing Offline Social Engagements: An Empirical Study of Meetup Events Related to Software Development. 1122-1133 - Jieke Shi

, Zhou Yang, Junda He, Bowen Xu, David Lo
:
Can Identifier Splitting Improve Open-Vocabulary Language Model of Code? 1134-1138 - Yoshitomo Sha, Masataka Nagura, Shingo Takada:

Fault Localization in Server-Side Applications Using Spectrum-Based Fault Localization. 1139-1146 - Alejandra Duque-Torres, Dietmar Pfahl

, Claus Klammer, Stefan Fischer:
Using Source Code Metrics for Predicting Metamorphic Relations at Method Level. 1147-1154 - Stefan Fischer, Denise Rigoni, Nikola Obrenovic:

iTest: Using coverage measurements to improve test efficiency. 1155-1158 - Adwait Chandorkar, Nitish Patkar

, Andrea Di Sorbo, Oscar Nierstrasz:
An Exploratory Study on the Usage of Gherkin Features in Open-Source Projects. 1159-1166 - Dietmar Winkler, Pirmin Urbanke, Rudolf Ramler:

What Do We Know About Readability of Test Code? - A Systematic Mapping Study. 1167-1174 - Serge Demeyer, Mehrdad Abdi, Ebert Schoofs:

Type Profiling to the Rescue: Test Amplification in Python and Smalltalk. 1175-1178 - Janneke Morin, Krishnendu Ghosh:

ProPy: Prolog-based Fault Localization Tool for Python. 1179-1182 - Matthew A. Puentes, Yunsen Lei, Noëlle Rakotondravony, Lane T. Harrison, Craig A. Shue:

Visualizing Web Application Execution Logs to Improve Software Security Defect Localization. 1183-1190 - Henrique Rocha, John Businge:

Blockchain-Oriented Software Variant Forks: A Preliminary Study. 1191-1196 - Giuseppe Antonio Pierro, Andy Amoordon:

A Tool to check the Ownership of Solana's Smart Contracts. 1197-1202 - Jihyeon Kim, Dae-hyeon Jeong, Jisoo Kim, Eun-Sun Cho:

Stone: A Privacy Policy Enforcement System for Smart Contracts. 1203-1206 - Andrea Pinna

, Roberto Tonelli:
On the use of Petri Nets in Smart Contracts modeling, generation and verification. 1207-1211 - Giacomo Ibba, Marco Ortu:

Analysis Of The Relationship Between Smart Contracts' Categories and Vulnerabilities. 1212-1218 - Giuseppe Antonio Pierro, Roberto Tonelli:

Can Solana be the Solution to the Blockchain Scalability Problem? 1219-1226 - Konstantinos Tsiounis, Kostas Kontogiannis:

Goal and Policy Based Code Generation and Deployment of Smart Contracts. 1227-1230 - Raimondo Cossu, Maria Ilaria Lunesu, Marco Uras, Alessandro Floris

:
A Blockchain-based Data Notarization System for Smart Mobility Services. 1231-1238 - Junjie Luo, Pengzhan Zhao

, Zhongtao Miao, Shuhan Lan, Jianjun Zhao:
A Comprehensive Study of Bug Fixes in Quantum Programs. 1239-1246 - Wolfgang Mauerer, Stefanie Scherzinger:

1-2-3 Reproducibility for Quantum Software Experiments. 1247-1248 - Thomas Gabor, Marian Lingsch Rosenfeld, Claudia Linnhoff-Popien, Sebastian Feld

:
How to Approximate any Objective Function via Quadratic Unconstrained Binary Optimization. 1249-1257 - Marie Salm, Johanna Barzen, Frank Leymann, Benjamin Weder

:
Prioritization of Compiled Quantum Circuits for Different Quantum Computers. 1258-1265 - Lynn von Kurnatowski, Annika Meinecke, Adriana Rieger

:
Towards using focus groups to identify software developer's interests regarding their development process. 1266-1269 - Sristy Sumana Nath, Banani Roy:

Exploring Relevant Artifacts of Release Notes: The Practitioners' Perspective. 1270-1277 - Lisa Grabinger

, Florian Hauser, Jürgen Mottok:
Accessing the Presentation of Causal Graphs and an Application of Gestalt Principles with Eye Tracking. 1278-1285 - Bonita Sharif

, Niloofar Mansoor:
Humans in Empirical Software Engineering Studies: An Experience Report. 1286-1292 - Sergio Moreschini

, Francesco Lomio
, David Hästbacka, Davide Taibi
:
MLOps for evolvable AI intensive software systems. 1293-1294 - Xiaozhou Li, Sergio Moreschini

, Aleksandra Filatova, Davide Taibi
:
Knowledge Management Challenges for AI Quality. 1295-1296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














