


default search action
International Journal of Software Engineering and Knowledge Engineering, Volume 34
Volume 34, Number 1, January 2024
- Trinh Le-Khanh
, Hoang-Gia Nguyen, Simon Bliudze, Philippe Merle:
Towards Exogenous Coordination of Concurrent Cloud Applications. 1-25 - Alejandro Miguel Güemes Esperón
, Francisco Maciá Pérez
, José Vicente Berná-Martínez, Martha Dunia Delgado Dapena, Iren Lorenzo-Fonseca
:
Specifying Requirements for Modern Software Development: A Test-Oriented Methodology. 27-48 - Zhen Li, Zining Cao, Fujun Wang, Chao Xing:
A Modeling and Verification Method of Cyber-Physical Systems Based on AADL and Process Algebra. 49-89 - Young Min Baek
, Esther Cho, Donghwan Shin
, Doo-Hwan Bae
:
An Extensible Modeling Method Supporting Ontology-Based Scenario Specification and Domain-Specific Extension. 91-162 - Pieter Bonte
, Sander Vanden Hautte, Filip De Turck
, Sofie Van Hoecke
, Femke Ongenae
:
Benchmarking Whole Knowledge Graph Embedding Techniques. 163-184 - Thanh Trong Vu, Thanh-Dat Do
, Hieu Dinh Vo
:
Context-Encoded Code Change Representation for Automated Commit Message Generation. 185-202
Volume 34, Number 2, February 2024
- Fevzi Belli
, Tugkan Tuglular
, Ekincan Ufuktepe
:
Unifying Behavioral and Feature Modeling for Testing of Software Product Lines. 203-238 - Hao Chen
, Shengyang Zhou, Chen Chen, Zheng Dai, Bixin Li
:
A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively. 239-271 - Haiyi Liu
, Shaoying Liu
, Guangquan Xu, Ai Liu
, Dingbang Fang
:
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification. 273-300 - Sini Chen
, Ran Li
, Huibiao Zhu
:
Formalization and Verification of Enhanced Group Communication CoAP. 301-330 - Xiaowei Zhang
, Lin Chen
, Weiqin Zou
, Yulu Cao
, Hao Ren
, Zhi Wang
, Yanhui Li
, Yuming Zhou
:
ICG: A Machine Learning Benchmark Dataset and Baselines for Inline Code Comments Generation Task. 331-356 - Shumei Wu
, Zexing Chang
, Zhanwen Zhang
, Zheng Li
, Yong Liu
:
DTester: Diversity-Driven Test Case Generation for Web Applications. 357-390
Volume 34, Number 3, March 2024
- Xinzhi Wang:
Guest Editor's Introduction - Special Issue on Social Computing and Engineering. 391-392 - Xinzhi Wang
, Mengyue Li, Weiwang Chen
, Yige Yao
, Zhennan Li, Yi Liu, Hui Zhang
:
Review and Application of Knowledge Graph in Crisis Management. 393-425 - Xiao Wei
, Yidian Lin
, Qitao Hu:
Dialogue Generation Model with Hierarchical Encoding and Semantic Segmentation of Dialogue Context. 427-447 - Weidong Liu
, Fei Li, Senjun Pei, Chunming Cheng
:
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model. 449-465 - Wenwen Xiao
, Xinzhi Wang
, Xiangfeng Luo
, Shaorong Xie
:
A Dual Decision-Making Continuous Reinforcement Learning Method Based on Sim2Real. 467-488 - Zhongliang Li, Junjun Ding, Zongmin Ma
:
GTFP: Network Fault Prediction Based on Graph and Time Series. 489-510 - Yi Zhu
, Yuxiang Gao
, Qiao Yu
:
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction. 511-544
Volume 34, Number 4, April 2024
- Yanfang Ma
, Wei Zhou:
The Allocation Scheme of Software Development Budget with Minimal Conflict Attributes. 545-568 - Guoqiang Yin, Wei Wang
, Haiyan Li
:
OdegVul: An Approach for Statement-Level Defect Prediction. 569-595 - Weiwei Wang
, Junxia Guo
, Beite Li, Ying Shang
, Ruilian Zhao
:
EFSM Model-Based Testing for Android Applications. 597-621 - Winnie Mbaka
, Katja Tuma
:
On the Measures of Success in Replication of Controlled Experiments with STRIDE. 623-650 - Zhenzhou Tian
, Ruikang He, Hongliang Zhao, Lingwei Chen
:
Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion. 651-673 - Yang Qu, Jinchen Xu
, Bei Zhou
, Jiangwei Hao
, Fei Li, Zuoyan Zhang
:
SCR-LIBM: A Correctly Rounded Elementary Function Library in Double-Precision. 675-703
Volume 34, Number 5, May 2024
- Yasir Hussain
, Zhiqiu Huang
, Yu Zhou
, Izhar Ahmed Khan
:
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach. 705-727 - Naglaa A. Eldanasory
, Amira M. Idrees
, Engy Yehia
:
EFSP: An Enhanced Full Scrum Process Model. 729-749 - Pingyan Wang
, Shaoying Liu
:
Toward Pointer-Analysis-Based Vulnerability Discovery in Human-Machine Pair Programming. 751-774 - Carlos Calatayud Asensi
, José Vicente Berná-Martínez
, Lucia Arnau Muñoz
, Francisco Maciá Pérez
:
Modeling and Control of Drinking Water Supply Infrastructures Through Multi-Agent Systems for Sustainability. 775-791 - Jun Wang
, Shuang Zhang
:
Sentiment-Time Heterogeneous Residual Graph Attention Transformer for Session-Based Recommendation. 793-820 - Di Wu
, Tong Li
, Yiran Zhao
, Junrui Liu
, Zifang Tang, Zhen Yang
:
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment. 821-843
Volume 34, Number 6, June 2024
- Xiaowei Zhang
, Zhifei Chen
, Yulu Cao
, Lin Chen
, Yuming Zhou
:
Multi-Intent Inline Code Comment Generation via Large Language Model. 845-868 - Nguyen Hung-Cuong
, Huynh Quyet Thang:
An Imperfect Debugging Non-Homogeneous Poisson Process Software Reliability Model Based on a 3-Parameter S-Shaped Function. 869-889 - Reynaldo Alvarez Luna
, Irene Garrigós
, José Jacobo Zubcoff, César González-Mora
:
Model-Driven Approach for Making Citizen Science Data FAIR. 891-907 - S. Syed Suhaila, K. Sundara Krishnan
:
Improving Windows Malware Detection Using the Random Forest Algorithm and Multi-View Analysis. 909-939 - Mahum Adil
, Ilenia Fronza
, Claus Pahl
:
How Did COVID-19 Impact Software Design Activities in Global Software Engineering - Systematic Review. 941-971 - Xiaoming Zhang
, Kaikai Meng, Huiyong Wang
:
TRAFMEL: Multimodal Entity Linking Based on Transformer Reranking and Multimodal Co-Attention Fusion. 973-997
Volume 34, Number 7, July 2024
- Yulu Cao
, Lin Chen
, Zhifei Chen
, Jiacheng Zhong
, Xiaowei Zhang
, Linzhang Wang
:
Efficient Construction of Practical Python Call Graphs with Entity Knowledge Base. 999-1024 - Yuqiong Wang
, Yuxiao Zhao
, Xiang Wang
, Weidong Tang
, Jinhui Zhang
, Shaolei Wang
, Peng Wang
, Jian Hu
:
Robotic Process Automation Efficiency for Mobile App Testing: An Empirical Investigation. 1025-1046 - Aiman Abibullayeva
, Hüma Kiliç Ünlü, Aydin Çetin
:
An Ensemble Keyword Extraction Model for News Texts with Statistical and Graphical Features. 1047-1061 - Yang Zhang
, Jingjing Liu, Lin Qi, Grant Meredith
:
Consistency Checking for Refactoring from Coarse-Grained Locks to Fine-Grained Locks. 1063-1093 - Yanfang Ma
, Liang Chen
:
The Evolution Mechanism of Correctness for Cyber-Physical System. 1095-1134 - Yifan Zou
, Huiqiang Wang
, Hongwu Lv
, Shuai Zhao, Haoye Tian
:
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information. 1135-1171 - Bing Zhang
, Hongchang Zhang
, Rong Ren, Zhen Wen, Qian Wang
:
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm. 1173-1197
Volume 34, Number 8, August 2024
- Huanzhang Xiong, Gang Hou
, Yueyuan Qin, Jie Wang
, Weiqiang Kong
:
A Dual Relaxation Method for Neural Network Verification. 1199-1220 - Shuwen Liang
, Zhitao He
:
Automated Test Case Generation for Path Coverage by Using Multi-Objective Particle Swarm Optimization Algorithm with Reinforcement Learning and Relationship Matrix Strategies. 1221-1249 - Tiaokang Gao
, Xiaoning Jin
:
Group-Based Federated Knowledge Distillation Intrusion Detection. 1251-1279 - Zhongchen Yuan
, Xingda Hu, Gang Zhang
, Zongmin Ma
:
Integration of UML Class Diagrams Based on Semantics and Structure. 1281-1312 - Weixi Zhang
, Weiwei Wang
, Ruilian Zhao
:
Flaky Test Detection Based on Adaptive Latest Position Execution for Concurrent Android Applications. 1313-1338 - Xiaoming Zhang
, Xinrui Li, Huiyong Wang
:
Fine-Grained Entity-Type Completion Based on Neighborhood-Attention and Cartesian-Polar Coordinates Mapping. 1339-1366
Volume 34, Number 9, September 2024
- Iaakov Exman
:
Quantum Software: The Brain of Quantum - Guest Editor's Introduction. 1367-1370 - Javier Romero-Álvarez
, Jaime Alvarado-Valiente, Jorge Casco-Seco
, Enrique Moguel
, José García-Alonso, Juan Manuel Murillo:
A Noise Validation for Quantum Circuit Scheduling Through a Service-Oriented Architecture. 1371-1386 - Mario Piattini
, Jose Luis Hevia Oliver, Guido Peterssen:
Quantum Software Engineering: Practical Challenges. 1387-1413 - Francisco P. Romero
, José A. Cruz-Lemus
, Sergio Jiménez-Fernández, Mario Piattini
:
Automata-Based Quantum Circuit Design Patterns Identification: A Novel Approach and Experimental Verification. 1415-1439 - Iaakov Exman
:
Quantum Software Encompasses Classical Software: Density Matrix from the Laplacian. 1441-1456
- Yang Yang
, Weiwei Wang
, Zheng Li
, Lieshan Zhang
, Chaoyue Pan
:
Security Development Lifecycle-Based Adaptive Reward Mechanism for Reinforcement Learning in Continuous Integration Testing Optimization. 1457-1483 - Rongcun Wang
, Mingmei Fan, Yue Yan
, Shujuan Jiang
:
Combining Error Guessing and Logical Reasoning for Software Fault Localization via Deep Learning. 1485-1511 - Caiyun Mao
, Longjie Li
, Li Liu
, Zhixin Ma:
Identification of Key Classes in Software Systems Based on Static Analysis and Voting Mechanism. 1513-1535
Volume 34, Number 10, October 2024
- Haifeng Wang
, Kun Yang, Tong Wu
:
Optimizing Mutation-Based Fault Localization Through Contribution-Based Test Case Reduction. 1537-1564 - Lei Rao
, Shaoying Liu
, Ai Liu
:
Program Segment Testing for Human-Machine Pair Programming. 1565-1591 - Xiuting Ge
, Xuanye Li, Yuanyuan Sun, Mingshuang Qing, Haitao Zheng, Huibin Zhang, Xianyu Wu:
Pattern Mining-Based Warning Prioritization by Refining Abstract Syntax Tree. 1593-1619 - Yanzhao Wang
, Fei Xie
, Zhenkun Yang
, Pasquale Cocchini
, Jin Yang
:
A Systematic Translation Validation Framework for MLIR-Based Compilers. 1621-1640 - Bin Gao
, Hongwu Qin
, Xiuqin Ma
:
Multi-Label Classification of Pure Code. 1641-1659 - Zexuan Wan, Chunli Xie
, Quanrun Lv, Yasheng Fan
:
Semantic Code Clone Detection Based on Community Detection. 1661-1692
Volume 34, Number 11, November 2024
- Marcelo Falkowski Burkard
, Lisandra M. Fontoura
:
Towards Effective People Management in Software Projects: A Comprehensive Catalog of Good Practices. 1693-1715
- Federico Cirett Galán
, Raquel Torres Peralta
, René Navarro-Hernández, José Luis Ochoa-Hernández
, San Contreras-Rivera
, Luis Arturo Estrada-Ríos
, Germán Machado-Encinas:
Assessing the Use of GitHub Copilot on Students of Engineering of Information Systems. 1717-1734 - Hidekazu Saito, Kinari Nishiura
, Akito Monden
, Shuji Morisaki
:
Extended Association Rule Mining and Its Application to Software Engineering Data Sets. 1735-1756 - Huayu Li
, Yang Yue
, Xiaojun Man, Haiyang Li:
Video Multimodal Entity Linking via Multi-Perspective Enhanced Subgraph Contrastive Network. 1757-1781 - Fujun Wang
, Lixing Tan
, Zining Cao
, Yan Ma
, Li Zhang
:
A Formal Language for Performance Evaluation Based on Reinforcement Learning. 1783-1805 - Tolga Büyüktanir
, Mehmet S. Aktas
:
Predictive Prefetching in Client-Server Systems: A Navigational Behavior Modeling Approach. 1807-1830
Volume 34, Number 12, December 2024
- Emrullah Gultekin
, Mehmet S. Aktas
:
Toward Proactive Maintenance: A Multi-Tiered Architecture for Industrial Equipment Health Monitoring and Remaining Useful Life Prediction. 1831-1856 - Mehreen Tabassum, Wasi Haider Butt
, Abdul Wahab Muzaffar
, Saima Anwar Lashari
:
Selecting Third-Party Libraries: The Web Developers' Perspective. 1857-1893 - Hui Han
, Qiao Yu
, Yi Zhu
, Shengyi Cheng
, Yu Zhang:
An Empirical Study of the Impact of Class Overlap on the Performance and Interpretability of Cross-Version Defect Prediction. 1895-1918 - Lei Chen
, Shinpei Hayashi
:
MORCoRA: Multi-Objective Refactoring Recommendation Considering Review Availability. 1919-1947 - Yuhan Wu
, Yingling Li, Ziao Wang, Qushan Tan, Jing Liu, Yuao Jiang:
Boosting Commit Classification Based on Multivariate Mixed Features and Heterogeneous Classifier Selection. 1949-1970 - Yuzhang Li, Tao Xu, Chunlu Wang:
IRaDT: LLVM IR as Target for Efficient Neural Decompilation. 1971-1992

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.