default search action
ACM Transactions on Software Engineering and Methodology, Volume 32
Volume 32, Number 1, January 2023
- Mauro Pezzè:
EDITORIAL: Announcing Six TOSEM Issues Per Year. 1:1-1:2 - Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent Verification Monitoring. 2:1-2:33 - Pengbo Nie, Chengcheng Wan, Jiayu Zhu, Ziyi Lin, Yuting Chen, Zhendong Su:
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations. 3:1-3:32 - Minxue Pan, Yifei Lu, Yu Pei, Tian Zhang, Xuandong Li:
Preference-wise Testing of Android Apps via Test Amplification. 4:1-4:37 - Tao Chen, Miqing Li:
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering. 5:1-5:40 - Francesco Bertolotti, Walter Cazzola:
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension. 6:1-6:31 - Zijing Yin, Yiwen Xu, Fuchen Ma, Haohao Gao, Lei Qiao, Yu Jiang:
Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization. 7:1-7:30 - Yiwen Dong, Zheyang Li, Yongqiang Tian, Chengnian Sun, Michael W. Godfrey, Meiyappan Nagappan:
Bash in the Wild: Language Usage, Code Smells, and Bugs. 8:1-8:22 - Xiong Xu, Jean-Pierre Talpin, Shuling Wang, Bohua Zhan, Naijun Zhan:
Semantics Foundation for Cyber-physical Systems Using Higher-order UTP. 9:1-9:48 - Masaki Waga, Étienne André, Ichiro Hasuo:
Parametric Timed Pattern Matching. 10:1-10:35 - Benjamin Rombaut, Filipe Roseiro Côgo, Bram Adams, Ahmed E. Hassan:
There's no Such Thing as a Free Lunch: Lessons Learned from Exploring the Overhead Introduced by the Greenkeeper Dependency Bot in Npm. 11:1-11:40 - Danny Weyns, M. Usman Iftikhar:
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems. 12:1-12:48 - Xueliang Li, Junyang Chen, Yepang Liu, Kaishun Wu, John P. Gallagher:
Combatting Energy Issues for Mobile Applications. 13:1-13:44 - Milos Ojdanic, Ezekiel O. Soremekun, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution. 14:1-14:39 - SayedHassan Khatoonabadi, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab:
On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests-A Mixed-Methods Study of 10 Large Open-Source Projects. 15:1-15:39 - Uwe Zdun, Pierre-Jean Queval, Georg Simhandl, Riccardo Scandariato, Somik Chakravarty, Marjan Jelic, Aleksandar S. Jovanovic:
Microservice Security Metrics for Secure Communication, Identity Management, and Observability. 16:1-16:34 - Aitor Arrieta, Pablo Valle, Joseba Andoni Agirre, Goiuria Sagardui:
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection. 17:1-17:47 - Jianwei Wu, James Clause:
Automated Identification of Uniqueness in JUnit Tests. 18:1-18:32 - Jiahuei Lin, Mohammed Sayagh, Ahmed E. Hassan:
The Co-evolution of the WordPress Platform and Its Plugins. 19:1-19:24 - Chang-Ai Sun, Hepeng Dai, Huai Liu, Tsong Yueh Chen:
Feedback-Directed Metamorphic Testing. 20:1-20:34 - Aurora Ramírez, Robert Feldt, José Raúl Romero:
A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning. 21:1-21:42 - Sihan Xu, Ya Gao, Lingling Fan, Zheli Liu, Yang Liu, Hua Ji:
LiDetector: License Incompatibility Detection for Open Source Software. 22:1-22:28 - Shuzheng Gao, Cuiyun Gao, Yulan He, Jichuan Zeng, Lunyiu Nie, Xin Xia, Michael R. Lyu:
Code Structure-Guided Transformer for Source Code Summarization. 23:1-23:32 - Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. 24:1-24:42 - Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon:
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. 25:1-25:45 - Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, Xiaosong Zhang:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. 26:1-26:35 - Gyte Tamasauskaite, Paul Groth:
Defining a Knowledge Graph Development Process Through a Systematic Review. 27:1-27:40
Volume 32, Number 2, April 2023
- Christian Birchler, Sajad Khatiri, Pouria Derakhshanfar, Sebastiano Panichella, Annibale Panichella:
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments. 28:1-28:30 - Richard Banach:
Graded Refinement, Retrenchment, and Simulation. 29:1-29:69 - Zhen Yang, Jacky Wai Keung, Xiao Yu, Yan Xiao, Zhi Jin, Jingyu Zhang:
On the Significance of Category Prediction for Code-Comment Synchronization. 30:1-30:41 - Lola Burgueño, Paula Muñoz, Robert Clarisó, Jordi Cabot, Sébastien Gérard, Antonio Vallecillo:
Dealing with Belief Uncertainty in Domain Models. 31:1-31:34 - Profir-Petru Pârtachi, David R. White, Earl T. Barr:
Aide-mémoire: Improving a Project's Collective Memory via Pull Request-Issue Links. 32:1-32:36 - Ahmed Khanfir, Anil Koyuncu, Mike Papadakis, Maxime Cordy, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
iBiR: Bug-report-driven Fault Injection. 33:1-33:31 - Chen Zeng, Yue Yu, Shanshan Li, Xin Xia, Zhiming Wang, Mingyang Geng, Linxiao Bai, Wei Dong, Xiangke Liao:
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search. 34:1-34:27 - Chandra Shekhar Maddila, Sai Surya Upadrasta, Chetan Bansal, Nachiappan Nagappan, Georgios Gousios, Arie van Deursen:
Nudge: Accelerating Overdue Pull Requests toward Completion. 35:1-35:30 - Zhiqiang Zuo, Xintao Niu, Siyi Zhang, Lu Fang, Siau-Cheng Khoo, Shan Lu, Chengnian Sun, Guoqing Harry Xu:
Toward More Efficient Statistical Debugging with Abstraction Refinement. 36:1-36:38 - Jaekwon Lee, Seung Yeob Shin, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache:
Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages. 37:1-37:33 - César Soto-Valero, Thomas Durieux, Nicolas Harrand, Benoit Baudry:
Coverage-Based Debloating for Java Bytecode. 38:1-38:34 - Luke Dramko, Jeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Graham Neubig, Bogdan Vasilescu, Claire Le Goues:
DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class. 39:1-39:34 - Bowen Shen, Muhammad Ali Gulzar, Fei He, Na Meng:
A Characterization Study of Merge Conflicts in Java Projects. 40:1-40:28 - Andreea Costea, Abhishek Tiwari, Sigmund Chianasta, Kishore R, Abhik Roychoudhury, Ilya Sergey:
Hippodrome: Data Race Repair Using Static Analysis Summaries. 41:1-41:33 - Jinhan Kim, Robert Feldt, Shin Yoo:
Evaluating Surprise Adequacy for Deep Learning System Testing. 42:1-42:29 - Filipe Roseiro Côgo, Xin Xia, Ahmed E. Hassan:
Assessing the Alignment between the Information Needs of Developers and the Documentation of Programming Languages: A Case Study on Rust. 43:1-43:48 - Najd Altoyan, Don S. Batory:
On Proving the Correctness of Refactoring Class Diagrams of MDE Metamodels. 44:1-44:42 - Chao Wang, Hao He, Uma Pal, Darko Marinov, Minghui Zhou:
Suboptimal Comments in Java Projects: From Independent Comment Changes to Commenting Practices. 45:1-45:33 - Jiezhu Cheng, Cuiyun Gao, Zibin Zheng:
HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems. 46:1-46:30 - Hichem Belgacem, Xiaochen Li, Domenico Bianculli, Lionel C. Briand:
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms. 47:1-47:40 - Zishuo Ding, Heng Li, Weiyi Shang, Tse-Hsun (Peter) Chen:
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks. 48:1-48:43 - Tahereh Zohdinasab, Vincenzo Riccio, Alessio Gambi, Paolo Tonella:
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems. 49:1-49:38 - Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John Grundy, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein:
Demystifying Hidden Sensitive Operations in Android Apps. 50:1-50:30 - Hugo Leonardo da Silva Araujo, Mohammad Reza Mousavi, Mahsa Varshosaz:
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review. 51:1-51:61 - Andrea Fioraldi, Alessandro Mantovani, Dominik Christian Maier, Davide Balzarotti:
Dissecting American Fuzzy Lop: A FuzzBench Evaluation. 52:1-52:26 - Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options. 53:1-53:21 - Andrea Fioraldi, Alessandro Mantovani, Dominik Christian Maier, Davide Balzarotti:
Dissecting American Fuzzy Lop - A FuzzBench Evaluation - RCR Report. 54:1-54:4 - Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options - RCR Report. 55:1-55:3
Volume 32, Number 3, May 2023
- Juan Cruz-Carlon, Mahsa Varshosaz, Claire Le Goues, Andrzej Wasowski:
Patching Locking Bugs Statically with Crayons. 56:1-56:28 - Maha Ayub, Tania Saleem, Muhammad Umar Janjua, Talha Ahmad:
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts. 57:1-57:32 - Thomas Laurent, Stefan Klikovits, Paolo Arcaini, Fuyuki Ishikawa, Anthony Ventresque:
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty. 58:1-58:31 - Michael Pacheco, Gustavo Ansaldi Oliva, Gopi Krishnan Rajbahadur, Ahmed E. Hassan:
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform. 59:1-59:46 - Nikhil Patnaik, Andrew Carl Dwyer, Joseph Hallett, Awais Rashid:
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations. 60:1-60:31 - Fuchen Ma, Meng Ren, Lerong Ouyang, Yuanliang Chen, Juan Zhu, Ting Chen, Yingli Zheng, Xiao Dai, Yu Jiang, Jiaguang Sun:
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts. 61:1-61:24 - Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen:
Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach. 62:1-62:51 - Francisca Pérez, Raúl Lapeña, Ana Cristina Marcén, Carlos Cetina:
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration. 63:1-63:22 - Tamara Lopez, Helen Sharp, Arosha K. Bandara, Thein Tun, Mark Levine, Bashar Nuseibeh:
Security Responses in Software Development. 64:1-64:29 - Deheng Yang, Yan Lei, Xiaoguang Mao, Yuhua Qi, Xin Yi:
Seeing the Whole Elephant: Systematically Understanding and Uncovering Evaluation Biases in Automated Program Repair. 65:1-65:37 - Chengpeng Wang, Wenyang Wang, Peisen Yao, Qingkai Shi, Jinguo Zhou, Xiao Xiao, Charles Zhang:
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation. 66:1-66:39 - Andrea Di Sorbo, Fiorella Zampetti, Aaron Visaggio, Massimiliano Di Penta, Sebastiano Panichella:
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms. 67:1-67:37 - Tao Chen, Miqing Li:
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives. 68:1-68:41 - Lina Gong, Jingxuan Zhang, Mingqiang Wei, Haoxiang Zhang, Zhiqiu Huang:
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories. 69:1-69:57 - Chris Karanikolas, Grigoris Dimitroulakos, Konstantinos Masselos:
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability. 70:1-70:38 - Jun-Wei Lin, Navid Salehnamadi, Sam Malek:
Route: Roads Not Taken in UI Testing. 71:1-71:25 - Zhichao Chen, Junjie Chen, Weijing Wang, Jianyi Zhou, Meng Wang, Xiang Chen, Shan Zhou, Jianmin Wang:
Exploring Better Black-Box Test Case Prioritization via Log Analysis. 72:1-72:32 - Fiorella Zampetti, Damian A. Tamburri, Sebastiano Panichella, Annibale Panichella, Gerardo Canfora, Massimiliano Di Penta:
Continuous Integration and Delivery Practices for Cyber-Physical Systems: An Interview-Based Study. 73:1-73:44 - Christiaan Verwijs, Daniel Russo:
A Theory of Scrum Team Effectiveness. 74:1-74:51 - Michel Nass, Emil Alégroth, Robert Feldt, Maurizio Leotta, Filippo Ricca:
Similarity-based Web Element Localization for Robust Test Automation. 75:1-75:30 - Yuriy Brun, Tian Lin, Jessie Elise Somerville, Elisha Myers, Natalie C. Ebner:
Blindspots in Python and Java APIs Result in Vulnerable Code. 76:1-76:31 - Eric S. Liu, Dylan Lukes, William G. Griswold:
Refactoring in Computational Notebooks. 77:1-77:24 - Zhuo Zhang, Yan Lei, Ting Su, Meng Yan, Xiaoguang Mao, Yue Yu:
Influential Global and Local Contexts Guided Trace Representation for Fault Localization. 78:1-78:27 - Mohammed Walid Attaoui, Hazem M. Fahmy, Fabrizio Pastore, Lionel C. Briand:
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering. 79:1-79:40 - Zhipeng Gao, Xin Xia, David Lo, John C. Grundy, Xindong Zhang, Zhenchang Xing:
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts. 80:1-80:42 - Swaroopa Dola, Matthew B. Dwyer, Mary Lou Soffa:
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing. 81:1-81:48
Volume 32, Number 4, July 2023
- Mohan Cui, Chengjun Chen, Hui Xu, Yangfan Zhou:
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis. 82:1-82:21 - Benjamin Shreeve, Catarina Gralha, Awais Rashid, João Araújo, Miguel Goulão:
Making Sense of the Unknown: How Managers Make Cyber Security Decisions. 83:1-83:33 - Negar Ghorbani, Reyhaneh Jabbarvand, Navid Salehnamadi, Joshua Garcia, Sam Malek:
DeltaDroid: Dynamic Delivery Testing in Android. 84:1-84:26 - Jeongju Sohn, Sungmin Kang, Shin Yoo:
Arachne: Search-Based Repair of Deep Neural Networks. 85:1-85:26 - Mitchell Joblin, Barbara Eckl, Thomas Bock, Angelika Schmid, Janet Siegmund, Sven Apel:
Hierarchical and Hybrid Organizational Structures in Open-source Software Projects: A Longitudinal Study. 86:1-86:29 - Ang Jia, Ming Fan, Wuxia Jin, Xi Xu, Zhaohui Zhou, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu:
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis. 87:1-87:26 - Vittoria Nardone, Biruk Asmare Muse, Mouna Abidi, Foutse Khomh, Massimiliano Di Penta:
Video Game Bad Smells: What They Are and How Developers Perceive Them. 88:1-88:35 - Xueling Zhang, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux, Xiaoyin Wang:
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. 89:1-89:34 - Huaijin Wang, Pingchuan Ma, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu:
sem2vec: Semantics-aware Assembly Tracelet Embedding. 90:1-90:34 - Mahmoud Alfadel, Diego Elias Costa, Emad Shihab, Bram Adams:
On the Discoverability of npm Vulnerabilities in Node.js Projects. 91:1-91:27 - Haoye Tian, Kui Liu, Yinghua Li, Abdoul Kader Kaboré, Anil Koyuncu, Andrew Habib, Li Li, Junhao Wen, Jacques Klein, Tegawendé F. Bissyandé:
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. 92:1-92:34 - Xianhao Jin, Francisco Servant:
HybridCISave: A Combined Build and Test Selection Approach in Continuous Integration. 93:1-93:39 - Daniel Venturini, Filipe Roseiro Côgo, Ivanilton Polato, Marco Aurélio Gerosa, Igor Scaliante Wiese:
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages. 94:1-94:26 - Liping Han, Shaukat Ali, Tao Yue, Aitor Arrieta, Maite Arratibel:
Uncertainty-Aware Robustness Assessment of Industrial Elevator Systems. 95:1-95:51 - Kui Liu, Jingtang Zhang, Li Li, Anil Koyuncu, Dongsun Kim, Chunpeng Ge, Zhe Liu, Jacques Klein, Tegawendé F. Bissyandé:
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. 96:1-96:38 - Ting Zhang, DongGyun Han, Venkatesh Vinayakarao, Ivana Clairine Irsan, Bowen Xu, Ferdian Thung, David Lo, Lingxiao Jiang:
Duplicate Bug Report Detection: How Far Are We? 97:1-97:32 - Chenguang Zhu, Mengshi Zhang, Xiuheng Wu, Xiufeng Xu, Yi Li:
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery. 98:1-98:31 - Akond Rahman, Shazibul Islam Shamim, Dibyendu Brinto Bose, Rahul Pandita:
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. 99:1-99:36 - Mifta Sintaha, Noor Nashid, Ali Mesbah:
Katana: Dual Slicing Based Context for Learning Bug Fixes. 100:1-100:27 - Dongjie He, Jingbo Lu, Jingling Xue:
IFDS-based Context Debloating for Object-Sensitive Pointer Analysis. 101:1-101:44 - Zhaoqiang Guo, Shiran Liu, Xutong Liu, Wei Lai, Mingliang Ma, Xu Zhang, Chao Ni, Yibiao Yang, Yanhui Li, Lin Chen, Guoqiang Zhou, Yuming Zhou:
Code-line-level Bugginess Identification: How Far have We Come, and How Far have We Yet to Go? 102:1-102:55 - Nengkun Yu:
Structured Theorem for Quantum Programs and its Applications. 103:1-103:35 - Hazem M. Fahmy, Fabrizio Pastore, Lionel C. Briand, Thomas Stifter:
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems. 104:1-104:47 - Houssem Ben Braiek, Foutse Khomh:
Testing Feedforward Neural Networks Training Programs. 105:1-105:61 - Zhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman:
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers. 106:1-106:30 - Deepika Badampudi, Michael Unterkalmsteiner, Ricardo Britto:
Modern Code Reviews - Survey of Literature and Practice. 107:1-107:61
Volume 32, Number 5, September 2023
- Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners' Perspective. 108:1-108:37 - Di Wu, Xiao-Yuan Jing, Hongyu Zhang, Yang Feng, Haowen Chen, Yuming Zhou, Baowen Xu:
Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries. 109:1-109:36