


default search action
International Journal of Software Engineering and Knowledge Engineering, Volume 35
Volume 35, Number 1, January 2025
- Marco Fiore

, Marina Mongiello
:
Using Peer Assessment Leveraging Large Language Models in Software Engineering Education. 1-18 - Yuxing Liu, Jiaxin Zhong, Qihua Hei, Xuchuan Zhou, Jingzhong Xiao

:
An Empirical Study of Fault Localization on Novice Programs and Addressing the Tie Problem. 19-44 - Yanzhao Wang

, Fei Xie
:
Enhancing Translation Validation of Compiler Transformations with Large Language Models. 45-57 - Yanfang Ma

, Xiaotong Gao
:
The Trustworthiness Metric Model of Interface Based on Defects. 59-88 - Xianglong Kong

, Zhuo Lv, Cen Chen, Hao Chang, Nuannuan Li, Fan Zhang:
Code Recommendation for Schema Evolution of Mimic Storage Systems. 89-110 - Di Liu, Yang Feng

:
Mining Fine-Grained Code Change Patterns Using Multiple Feature Analysis. 111-138
Volume 35, Number 2, February 2025
- Zulkifli Zulkifli

, Mardiana Araki
, Dikpride Despa
:
Software Quality Assessment Model: A New Approach for Software Testing Tools. 139-155 - Duc-Hieu Nguyen

, Yuichi Sei
, Yasuyuki Tahara
, Akihiko Ohsuga
:
Toward a Pattern-Based Comprehensive Framework Using Process Mining for RBAC Conformance Checks. 157-194 - Lucia Arnau Muñoz, José Vicente Berná-Martínez, Carlos Calatayud Asensi, David Saavedra Pastor

:
RESEARCH NOTES: Design of a Distributed and Highly Scalable Fog Architecture for Heterogeneous IoT Infrastructures. 195-215 - Yin Li

, Ying Zhou, Li Liao, Bixin Li
:
A Method to Evaluate the Credibility of Domain Knowledge Network Using Validated Expert Knowledge. 217-241 - Dilan Bakir

, Mehmet S. Aktas
, Beytullah Yildiz
:
A Model-Based Evaluation Metric for Question Answering Systems. 243-262 - Jianming Chang

, Lulu Wang
, Zaixing Zhang
:
HCIA: Hierarchical Change Impact Analysis Based on Hierarchy Program Slices. 263-292
Volume 35, Number 3, March 2025
- Waleed Younas

, Rui Chen, Jing Zhao
, Tahreem Iqbal, Mohamed Sharaf
, Azhar Imran
:
SPERT: Reinforcement Learning-Enhanced Transformer Model for Agile Story Point Estimation. 293-325 - Heling Cao

, Yanlong Guo, Yun Wang
, Fangchao Tian, Zhaolong Wang, Yonghe Chu
, Miaolei Deng
, Panpan Wang, Zhenghao He, Shuting Wei:
RESEARCH NOTES - GMRepair: Graph Mining Template-Based Automated Software Repair. 327-349 - Bogdan Ghimis

:
Detecting Interaction Related Bugs in a Multi-Tenant Setting Using Kubernetes. 351-374 - Xinhong Duan, Xiguo Gu

, Jiale Zhang, Zhanqi Cui
:
A Change-Level Defect Prediction Approach based on Teacher-Student Network. 375-396 - Ziyan Wang, Cheng Huang

, Yang You:
OscSe: A Practical Security Assessment Model for General Open Source Components. 397-419 - Siham Amrouch

, Ryma Guefrouchi
, Nawel Zemmal
, Sadok Ben Yahia
:
Scalable Instance Matching Using Lucene and Mongodb. 421-440
Volume 35, Number 4, April 2025
- Apostolos Kritikos

, Konstantina Papadopoulou, Ioannis Stamelos
:
Applying Epistemic Network Analysis to Open Source Software Projects. 441-467 - Peng Dai

, Xiaoqin Ma, Zebo Peng, Chen Zhao
, Qianjin Zhang
:
A Static Analysis Framework for Investigating Tainted Data Sources in Software Systems. 469-501 - Durmus Özkan Sahin

, Zeynep Altun
, Öykü Kaya, Batuhan Semiz
:
Experimental Examination of the Effect of Programming Languages and Frameworks on Mobile Application Development Processes. 503-523 - Shichen Zhai

, Hao Ji, Kun Zhang, Yongcheng Wu, Zongmin Ma
:
Approximate Query for Industrial Fault Knowledge Graph Based on Vector Index. 525-545 - Ahmet E. Topcu

, Yehia Ibrahim Alzoubi
, Ersin Elbasi
, Erdem Ozdemir
:
Deep Neural Networks for Traffic Flow Estimation for Spatial-Temporal DOMAIN. 547-567 - Yifan Zou

, Huiqiang Wang
, Hongwu Lv
, Shuai Zhao:
PEAPOD: A Heterogeneous Defect Prediction Approach Based on Deep Density Sampling and Deep Domain Adaptation. 569-607
Volume 35, Number 5, May 2025
- Lining Li, Rong Ren, Jun Dong, Bing Zhang

, Xu Kang:
A Systematic Literature Review of Software Vulnerability Mining Approaches Based on Symbolic Execution. 609-656
- Jorge Martinez-Gil

:
Augmenting the Interpretability of GraphCodeBERT for Code Similarity Tasks. 657-678 - Qijie Song, Jiaobo Jin, Tiantian Zhu

, Tieming Chen
, Mingqi Lv, Licheng Pan, Jian-Ping Mei, Xiang Pan:
VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings. 679-706 - Xiaoming Zhang

, Ziyi Zheng, Huiyong Wang
, Mehdi Naseriparsa
:
MTCEA: Guiding Multi-Modal Entity Alignment via Entity-Type Information. 707-735 - Xiaowei Zhang

, Lin Chen
, Kaiyuan Qi, Weiqin Zou
, Liye Pang
, Lianfa Zhang, Peng Zhang, Guanqun Xu
, Dong Zhang:
CodeQG: Automated Multiple Question Generation for Source Code Comprehension. 737-765 - Qiao Yu

, Siyu Ren
, Yi Zhu
, Jiaxuan Jiang, Shutao Zhang:
Class Imbalance-oriented Online Feature Selection Method for Just-in-time Software Defect Prediction. 767-791
Volume 35, Number 6, June 2025
- Rakan Alanazi

:
Advancements in Call Graph Methodologies for Enhanced Program Comprehension. 793-808
- Sandeep Ramachandra

, Vic Degraeve
, Gilles Vandewiele
, Bram Steenwinckel
, Sofie Van Hoecke
, Femke Ongenae
:
RR-GCN: Exploring Untrained Random Embeddings for Relational Graphs. 809-834 - Yiyang Du, Xingguang Yang

, Zhenyu Shu
, Zijie Huang
, Gang Wang
, Libo Xu
:
RESEARCH NOTES: Multiclass Classification for Self-Admitted Technical Debt via Large Pre-Trained Language Model. 835-860 - Erfan Zhao, Weina Niu

, Cheng Huang
, Xixuan Ren, Jiacheng Gong
, Anran Hou:
Identifying Android Malware Using Fine-Grained Path Information from HIN. 861-886 - Rongcun Wang

, Jie Zhou, Xiang Chen
, Zhanqi Cui
, Shujuan Jiang
:
SCATCom: Code Comment Generation by Fusing Multi-Information. 887-916 - Shuoming Li

, Dongjin Yu
, Xin Chen
, Xulin Fan, Dengfa Luo, Tong Wu
, Wangliang Yan
:
Generative API Recommendation Based on Global Semantics and Local Context. 917-941

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














