


default search action
ACM Transactions on Software Engineering and Methodology, Volume 33
Volume 33, Number 1, January 2024
- Mauro Pezzè

:
Editorial: Toward the Future with Eight Issues Per Year. 1e:1-1e:2 - Shouguo Yang

, Chaopeng Dong
, Yang Xiao
, Yiran Cheng
, Zhiqiang Shi
, Zhi Li
, Limin Sun
:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. 1:1-1:40 - Xuanzhe Liu

, Chengxu Yang
, Ding Li
, Yuhan Zhou
, Shaofei Li
, Jiali Chen
, Zhenpeng Chen
:
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces. 2:1-2:27 - Suyu Ma

, Chunyang Chen
, Hourieh Khalajzadeh
, John Grundy
:
A First Look at Dark Mode in Real-world Android Apps. 3:1-3:26 - Jiarong Wu

, Lili Wei
, Yanyan Jiang
, Shing-Chi Cheung
, Luyao Ren
, Chang Xu
:
Programming by Example Made Easy. 4:1-4:36 - Narjes Bessghaier

, Mohammed Sayagh
, Ali Ouni
, Mohamed Wiem Mkaouer
:
What Constitutes the Deployment and Runtime Configuration System? An Empirical Study on OpenStack Projects. 5:1-5:37 - Qing Huang

, Yanbang Sun
, Zhenchang Xing
, Min Yu
, Xiwei Xu
, Qinghua Lu
:
API Entity and Relation Joint Extraction from Text via Dynamic Prompt-tuned Language Model. 6:1-6:25 - Jeho Oh

, Don S. Batory
, Ruben Heradio
:
Finding Near-optimal Configurations in Colossal Spaces with Statistical Guarantees. 7:1-7:36 - Chang-Ai Sun

, Hepeng Dai
, Ning Geng
, Huai Liu
, Tsong Yueh Chen
, Peng Wu
, Yan Cai
, Jinqiu Wang
:
An Interleaving Guided Metamorphic Testing Approach for Concurrent Programs. 8:1-8:21 - Toni Taipalus

, Hilkka Grahn
:
Framework for SQL Error Message Design: A Data-Driven Approach. 9:1-9:50 - Andrew G. Clark

, Michael Foster
, Benedikt Prifling
, Neil Walkinshaw
, Robert M. Hierons
, Volker Schmidt
, Robert D. Turner
:
Testing Causality in Scientific Modelling Software. 10:1-10:42 - Jianzhong Liu

, Yuheng Shen
, Yiru Xu
, Hao Sun
, Yu Jiang
:
Horus: Accelerating Kernel Fuzzing through Efficient Host-VM Memory Access Procedures. 11:1-11:25 - Sina Entekhabi

, Wojciech Mostowski
, Mohammad Reza Mousavi
:
Automated and Efficient Test-Generation for Grid-Based Multiagent Systems: Comparing Random Input Filtering versus Constraint Solving. 12:1-12:32 - Carlo A. Furia

, Richard Torkar
, Robert Feldt
:
Towards Causal Analysis of Empirical Software Engineering Data: The Impact of Programming Languages on Coding Competitions. 13:1-13:35 - Olivier Nourry

, Yutaro Kashiwa
, Bin Lin
, Gabriele Bavota
, Michele Lanza
, Yasutaka Kamei
:
The Human Side of Fuzzing: Challenges Faced by Developers during Fuzzing Activities. 14:1-14:26 - Pei Liu

, Yanjie Zhao
, Mattia Fazzini
, Haipeng Cai
, John Grundy
, Li Li
:
Automatically Detecting Incompatible Android APIs. 15:1-15:33 - Hengcheng Zhu

, Lili Wei
, Valerio Terragni
, Yepang Liu
, Shing-Chi Cheung
, Jiarong Wu
, Qin Sheng
, Bing Zhang
, Lihong Song
:
StubCoder: Automated Generation and Repair of Stub Code for Mock Objects. 16:1-16:31 - Yongqiang Tian

, Xueyan Zhang
, Yiwen Dong
, Zhenyang Xu
, Mengxiao Zhang
, Yu Jiang
, Shing-Chi Cheung
, Chengnian Sun
:
On the Caching Schemes to Speed Up Program Reduction. 17:1-17:30 - Claudio Mandrioli

, Max Nyberg Carlsson
, Martina Maggio
:
Testing Abstractions for Cyber-Physical Control Systems. 18:1-18:32 - Wang Fang

, Mingsheng Ying
, Xiaodi Wu
:
Differentiable Quantum Programming with Unbounded Loops. 19:1-19:63
- Yuanhang Yang

, Wei He
, Cuiyun Gao
, Zenglin Xu
, Xin Xia
, Chuanyi Liu
:
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site. 20:1-20:25 - Tianlin Li

, Xiaofei Xie
, Jian Wang
, Qing Guo
, Aishan Liu
, Lei Ma
, Yang Liu
:
Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis. 21:1-21:24 - Xueqi Dang

, Yinghua Li
, Mike Papadakis
, Jacques Klein
, Tegawendé F. Bissyandé
, Yves Le Traon
:
GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks. 22:1-22:40 - Yuhan Zhi

, Xiaofei Xie
, Chao Shen
, Jun Sun
, Xiaoyu Zhang
, Xiaohong Guan
:
Seed Selection for Testing Deep Neural Networks. 23:1-23:33 - Hanyang Guo

, Xiangping Chen
, Yuan Huang
, Yanlin Wang
, Xi Ding
, Zibin Zheng
, Xiaocong Zhou
, Hong-Ning Dai
:
Snippet Comment Generation Based on Code Context Expansion. 24:1-24:30 - Qiang Hu

, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing. 25:1-25:28
- Han Hu

, Yujin Huang
, Qiuyuan Chen
, Terry Yue Zhuo
, Chunyang Chen
:
A First Look at On-device Models in iOS Apps. 26:1-26:30
- Amid Golmohammadi

, Man Zhang
, Andrea Arcuri
:
Testing RESTful APIs: A Survey. 27:1-27:41
- Michael Weiss

, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks. 28:1-28:29
- Michael Weiss

, Paolo Tonella
:
Adopting Two Supervisors for Efficient Use of Large-Scale Remote Deep Neural Networks - RCR Report. 29:1-29:4
Volume 33, Number 2, February 2024
- Yu Zhou

, Weilin Zhan
, Zi Li
, Tingting Han
, Taolue Chen
, Harald C. Gall
:
DRIVE: Dockerfile Rule Mining and Violation Detection. 30:1-30:23 - Qing Huang

, Zhiqiang Yuan
, Zhenchang Xing
, Xin Peng
, Xiwei Xu
, Qinghua Lu
:
FQN Inference in Partial Code by Prompt-tuned Language Model of Code. 31:1-31:32 - Jaekwon Lee

, Seung Yeob Shin
, Lionel C. Briand
, Shiva Nejati
:
Probabilistic Safe WCET Estimation for Weakly Hard Real-time Systems at Design Stages. 32:1-32:34 - Knut H. Rolland

, Brian Fitzgerald
, Torgeir Dingsøyr
, Klaas-Jan Stol
:
Acrobats and Safety Nets: Problematizing Large-Scale Agile Software Development. 33:1-33:45 - Xiaoye Zheng

, Zhiyuan Wan
, Yun Zhang
, Rui Chang
, David Lo
:
A Closer Look at the Security Risks in the Rust Ecosystem. 34:1-34:30 - Claudio Mandrioli

, Seung Yeob Shin
, Martina Maggio
, Domenico Bianculli
, Lionel C. Briand
:
Stress Testing Control Loops in Cyber-physical Systems. 35:1-35:58 - SayedHassan Khatoonabadi

, Diego Elias Costa
, Suhaib Mujahid
, Emad Shihab
:
Understanding the Helpfulness of Stale Bot for Pull-Based Development: An Empirical Study of 20 Large Open-Source Projects. 36:1-36:43 - Yixuan Zhang

, Shangtong Cao
, Haoyu Wang
, Zhenpeng Chen
, Xiapu Luo
, Dongliang Mu
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
Characterizing and Detecting WebAssembly Runtime Bugs. 37:1-37:29 - Zishuo Ding

, Yiming Tang
, Xiaoyu Cheng
, Heng Li
, Weiyi Shang
:
LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates. 38:1-38:45 - Weishi Shi

, Heather Moses
, Qi Yu
, Samuel A. Malachowsky
, Daniel E. Krutz
:
ALL: Supporting Experiential Accessibility Education and Inclusive Software Development. 39:1-39:30 - Federico Formica

, Tony Fan
, Claudio Menghi
:
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions. 40:1-40:37 - Jiajun Jiang

, Yumeng Wang
, Junjie Chen
, Delin Lv
, Mengjiao Liu
:
Variable-based Fault Localization via Enhanced Decision Tree. 41:1-41:32 - Wei Huang

, Xingyu Zhao
, Alec Banks
, Victoria Cox
, Xiaowei Huang
:
Hierarchical Distribution-aware Testing of Deep Learning. 42:1-42:35 - Sicong Cao

, Xiaobing Sun
, Lili Bo
, Rongxin Wu
, Bin Li
, Xiaoxue Wu
, Chuanqi Tao
, Tao Zhang
, Wei Liu
:
Learning to Detect Memory-related Vulnerabilities. 43:1-43:35 - Elkhan Ismayilzada

, Md Mazba Ur Rahman
, Dongsun Kim
, Jooyong Yi
:
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair. 44:1-44:39 - Yuanhang Zhou

, Fuchen Ma
, Yuanliang Chen
, Meng Ren
, Yu Jiang
:
CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing. 45:1-45:28 - Yi Xiang

, Han Huang
, Sizhe Li
, Miqing Li
, Chuan Luo
, Xiaowei Yang
:
Automated Test Suite Generation for Software Product Lines Based on Quality-Diversity Optimization. 46:1-46:52 - Han Hu

, Ruiqi Dong
, John Grundy
, Thai Minh Nguyen
, Huaxiao Liu
, Chunyang Chen
:
Automated Mapping of Adaptive App GUIs from Phones to TVs. 47:1-47:31
- Yuejun Guo

, Qiang Hu
, Xiaofei Xie
, Maxime Cordy
, Mike Papadakis
, Yves Le Traon
:
KAPE: kNN-based Performance Testing for Deep Code Search. 48:1-48:24 - Jiamou Sun

, Zhenchang Xing
, Xin Xia
, Qinghua Lu
, Xiwei Xu
, Liming Zhu
:
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. 49:1-49:38 - Jiawei Liu

, Yuheng Huang
, Zhijie Wang
, Lei Ma
, Chunrong Fang
, Mingzheng Gu
, Xufan Zhang
, Zhenyu Chen
:
Generation-based Differential Fuzzing for Deep Learning Libraries. 50:1-50:28 - Jiho Shin

, Moshi Wei
, Junjie Wang
, Lin Shi
, Song Wang
:
The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks. 51:1-51:24
- Siyuan Li

, Yongpan Wang
, Chaopeng Dong
, Shouguo Yang
, Hong Li
, Hao Sun
, Zhe Lang
, Zuxin Chen
, Weijie Wang
, Hongsong Zhu
, Limin Sun
:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. 52:1-52:35 - Rafael Dutra

, Rahul Gopinath
, Andreas Zeller
:
FormatFuzzer: Effective Fuzzing of Binary File Formats. 53:1-53:29
- Yutao Xie

, Jiayi Lin
, Hande Dong
, Lei Zhang
, Zhonghai Wu
:
Survey of Code Search Based on Deep Learning. 54:1-54:42 - Quanjun Zhang

, Chunrong Fang
, Yuxiang Ma
, Weisong Sun
, Zhenyu Chen
:
A Survey of Learning-based Automated Program Repair. 55:1-55:69
Volume 33, Number 3, March 2024
- Ya Xiao

, Wenjia Song
, Salman Ahmed
, Xinyang Ge
, Bimal Viswanath
, Na Meng
, Danfeng (Daphne) Yao
:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. 56:1-56:30 - Daniel Russo

, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-Being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic. 57:1-57:44 - Andre Lustosa

, Tim Menzies
:
Learning from Very Little Data: On the Value of Landscape Analysis for Predicting Software Project Health. 58:1-58:22 - Yanming Yang

, Xing Hu
, Xin Xia
, Xiaohu Yang
:
The Lost World: Characterizing and Detecting Undiscovered Test Smells. 59:1-59:32 - Guang Yang

, Yu Zhou
, Wenhua Yang
, Tao Yue
, Xiang Chen
, Taolue Chen
:
How Important Are Good Method Names in Neural Code Generation? A Model Robustness Perspective. 60:1-60:35 - Jiajun Jiang

, Junjie Yang
, Yingyi Zhang
, Zan Wang
, Hanmo You
, Junjie Chen
:
A Post-training Framework for Improving the Performance of Deep Learning Models via Model Transformation. 61:1-61:41 - Jia Li

, Zhuo Li
, Huangzhao Zhang
, Ge Li
, Zhi Jin
, Xing Hu
, Xin Xia
:
Poison Attack and Poison Detection on Deep Source Code Processing Models. 62:1-62:31 - Wen Li

, Austin Marino
, Haoran Yang
, Na Meng
, Li Li
, Haipeng Cai
:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. 63:1-63:46 - Sangeeth Kochanthara

, Tajinder Singh
, Alexandru Forrai
, Loek Cleophas
:
Safety of Perception Systems for Automated Driving: A Case Study on Apollo. 64:1-64:28 - Armin Zirak

, Hadi Hemmati
:
Improving Automated Program Repair with Domain Adaptation. 65:1-65:43 - Wensheng Tang

, Dejun Dong
, Shijie Li, Chengpeng Wang
, Peisen Yao
, Jinguo Zhou
, Charles Chuan Zhang
:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. 66:1-66:33 - Tingwei Zhu

, Zhong Li
, Minxue Pan
, Chaoxuan Shi
, Tian Zhang
, Yu Pei
, Xuandong Li
:
Deep Is Better? An Empirical Comparison of Information Retrieval and Deep Learning Approaches to Code Summarization. 67:1-67:37 - Zhe Zhao

, Guangke Chen
, Tong Liu
, Taishan Li
, Fu Song
, Jingyi Wang
, Jun Sun
:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. 68:1-68:45 - Junda He

, Xin Zhou
, Bowen Xu
, Ting Zhang
, Kisub Kim
, Zhou Yang
, Ferdian Thung
, Ivana Clairine Irsan
, David Lo
:
Representation Learning for Stack Overflow Posts: How Far Are We? 69:1-69:24 - Binhang Qi

, Hailong Sun
, Hongyu Zhang
, Xiang Gao
:
Reusing Convolutional Neural Network Models through Modularization and Composition. 70:1-70:39 - Md Rakib Hossain Misu

, Rohan Achar
, Cristina V. Lopes
:
SourcererJBF: A Java Build Framework For Large-Scale Compilation. 71:1-71:35
- Zhihao Li

, Chuanyi Li
, Ze Tang
, Wanhong Huang
, Jidong Ge
, Bin Luo
, Vincent Ng
, Ting Wang
, Yucheng Hu
, Xiaopeng Zhang
:
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation. 72:1-72:30 - Matteo Biagiola

, Paolo Tonella
:
Testing of Deep Reinforcement Learning Agents with Surrogate Models. 73:1-73:33 - Luca Giamattei

, Antonio Guerriero
, Roberto Pietrantuono
, Stefano Russo
:
Causality-driven Testing of Autonomous Driving Systems. 74:1-74:35 - Weisong Sun

, Chunrong Fang
, Yuchen Chen
, Quanjun Zhang
, Guanhong Tao
, Yudu You
, Tingxu Han
, Yifei Ge
, Yuling Hu
, Bin Luo
, Zhenyu Chen
:
An Extractive-and-Abstractive Framework for Source Code Summarization. 75:1-75:39 - Will Leeson

, Matthew B. Dwyer
:
Algorithm Selection for Software Verification Using Graph Neural Networks. 76:1-76:36 - Hichem Belgacem

, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
Learning-based Relaxation of Completeness Requirements for Data Entry Forms. 77:1-77:32
- Michael Fu

, Van Nguyen
, Chakkrit Tantithamthavorn
, Dinh Phung
, Trung Le
:
Vision Transformer Inspired Automated Vulnerability Repair. 78:1-78:29 - Pengfei Gao

, Fu Song
, Taolue Chen
:
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks. 79:1-79:38
- Aastha Pant

, Rashina Hoda
, Simone V. Spiegler
, Chakkrit Tantithamthavorn
, Burak Turhan
:
Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges. 80:1-80:35
- Johan Cederbladh

, Antonio Cicchetti
, Jagadish Suryadevara
:
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review. 81:1-81:67
- Daniel Russo

, Paul H. P. Hanel
, Niels van Berkel
:
Understanding Developers Well-being and Productivity: A 2-year Longitudinal Analysis during the COVID-19 Pandemic - RCR Report. 82:1-82:4
Volume 33, Number 4, May 2024
- Mauro Pezzè

:
Editorial: ICSE and the Incredible Contradictions of Software Engineering. 83:1-83:2 - Weifeng Pan

, Marouane Kessentini
, Ming Hua, Zijiang Yang
:
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches. 84:1-84:43 - Chidera Biringa

, Gökhan Kul
:
PACE: A Program Analysis Framework for Continuous Performance Prediction. 85:1-85:23 - Peng Zhang

, Yang Wang
, Xutong Liu
, Zeyu Lu
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Ziyuan Wang
, Chang-Ai Sun
, Xiao Yu
, Yuming Zhou
:
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? 86:1-86:32 - Alessio Ferrari

, Thaide Huichapa
, Paola Spoletini
, Nicole Novielli
, Davide Fucci
, Daniela Girardi
:
Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews. 87:1-87:36 - Sai Anirudh Karre

, Y. Raghu Reddy
, Raghav Mittal
:
RE Methods for Virtual Reality Software Product Development: A Mapping Study. 88:1-88:31 - Zhe Chen

, Rui Yan
, Yingzi Ma
, Yulei Sui
, Jingling Xue
:
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety. 89:1-89:47 - Pablo C. Cañizares

, Jose María López-Morales
, Sara Pérez-Soler
, Esther Guerra
, Juan de Lara
:
Measuring and Clustering Heterogeneous Chatbot Designs. 90:1-90:43 - Bentley Oakes

, Michalis Famelis
, Houari A. Sahraoui
:
Building Domain-Specific Machine Learning Workflows: A Conceptual Framework for the State of the Practice. 91:1-91:50 - Changjie Shao

, Gaolei Li
, Jun Wu
, James Xi Zheng
:
Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based Software Vulnerability Detection. 92:1-92:28 - Baharin Aliashrafi Jodat

, Abhishek Chandar
, Shiva Nejati
, Mehrdad Sabetzadeh
:
Test Generation Strategies for Building Failure Models and Explaining Spurious Failures. 93:1-93:32 - Neelofar

, Aldeida Aleti
:
Identifying and Explaining Safety-critical Scenarios for Autonomous Vehicles via Key Features. 94:1-94:32 - Donato Clun

, Donghwan Shin
, Antonio Filieri
, Domenico Bianculli
:
Rigorous Assessment of Model Inference Accuracy using Language Cardinality. 95:1-95:39 - Anshunkang Zhou

, Yikun Hu
, Xiangzhe Xu
, Charles Zhang
:
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation. 96:1-96:31 - Kai Gao

, Runzhi He
, Bing Xie
, Minghui Zhou
:
Characterizing Deep Learning Package Supply Chains in PyPI: Domains, Clusters, and Disengagement. 97:1-97:27 - Shaiful Alam Chowdhury

, Gias Uddin
, Hadi Hemmati
, Reid Holmes
:
Method-level Bug Prediction: Problems and Promises. 98:1-98:31 - Qunying Song

, Emelie Engström
, Per Runeson
:
Industry Practices for Challenging Autonomous Driving Systems with Critical Scenarios. 99:1-99:35 - Mingxuan Zhu

, Dan Hao
, Junjie Chen
:
Compiler Autotuning through Multiple-phase Learning. 100:1-100:38 - Taijara Loiola de Santana

, Paulo Anselmo da Mota Silveira Neto
, Eduardo Santana De Almeida
, Iftekhar Ahmed
:
Bug Analysis in Jupyter Notebook Projects: An Empirical Study. 101:1-101:34 - Zhenfei Huang

, Junjie Chen
, Jiajun Jiang
, Yihua Liang
, Hanmo You
, Fengjie Li
:
Mapping APIs in Dynamic-typed Programs by Leveraging Transfer Learning. 102:1-102:29
- Sungmin Kang

, Robert Feldt
, Shin Yoo
:
Deceiving Humans and Machines Alike: Search-based Test Input Generation for DNNs Using Variational Autoencoders. 103:1-103:24 - Han Wang

, Sijia Yu
, Chunyang Chen
, Burak Turhan
, Xiaodong Zhu
:
Beyond Accuracy: An Empirical Study on Unit Testing in Open-source Deep Learning Projects. 104:1-104:22 - Shikai Guo

, Dongmin Li
, Lin Huang
, Sijia Lv
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Estimating Uncertainty in Labeled Changes by SZZ Tools on Just-In-Time Defect Prediction. 105:1-105:25 - Hanyang Guo

, Yingye Chen
, Xiangping Chen
, Yuan Huang
, Zibin Zheng
:
Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization. 106:1-106:31
- Davide Pizzolotto

, Stefano Berlato
, Mariano Ceccato
:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. 107:1-107:38 - Puzhuo Liu

, Yaowen Zheng
, Chengnian Sun
, Hong Li
, Zhi Li
, Limin Sun
:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. 108:1-108:26
- Hashini Gunatilake

, John C. Grundy
, Rashina Hoda
, Ingo Mueller
:
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study. 109:1-109:41 - Xin Tan

, Xinyue Lv
, Jing Jiang
, Li Zhang
:
Understanding Real-Time Collaborative Programming: A Study of Visual Studio Live Share. 110:1-110:28
- Qiang Hu

, Yuejun Guo
, Xiaofei Xie
, Maxime Cordy
, Lei Ma
, Mike Papadakis
, Yves Le Traon
:
Test Optimization in DNN Testing: A Survey. 111:1-111:42
Volume 33, Number 5, June 2024
- Martin P. Robillard

, Deeksha M. Arya
, Neil A. Ernst
, Jin L. C. Guo
, Maxime Lamothe
, Mathieu Nassif
, Nicole Novielli
, Alexander Serebrenik
, Igor Steinmacher
, Klaas-Jan Stol
:
Communicating Study Design Trade-offs in Software Engineering. 112:1-112:10
- Raphaël Ollando

, Seung Yeob Shin
, Lionel C. Briand
:
Learning Failure-Inducing Models for Testing Software-Defined Networks. 113:1-113:25 - Cuifeng Gao

, Wenzhang Yang
, Jiaming Ye
, Yinxing Xue
, Jun Sun
:
sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts. 114:1-114:55 - Lin Yang

, Junjie Chen
, Shutao Gao
, Zhihao Gong
, Hongyu Zhang
, Yue Kang
, Huaan Li
:
Try with Simpler - An Evaluation of Improved Principal Component Analysis in Log-based Anomaly Detection. 115:1-115:27 - Yue Liu

, Thanh Le-Cong
, Ratnadira Widyasari
, Chakkrit Tantithamthavorn
, Li Li
, Xuan-Bach Dinh Le
, David Lo
:
Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues. 116:1-116:26 - Emre Sülün

, Metehan Saçakçi
, Eray Tüzün
:
An Empirical Analysis of Issue Templates Usage in Large-Scale Projects on GitHub. 117:1-117:28 - Xinmeng Xia

, Yang Feng
, Qingkai Shi
, James A. Jones
, Xiangyu Zhang
, Baowen Xu
:
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing. 118:1-118:31 - Jiawei Ren

, Yulei Sui
, Xiao Cheng
, Yuan Feng
, Jianjun Zhao
:
Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search. 119:1-119:29 - Fang Liu

, Zhiyi Fu
, Ge Li
, Zhi Jin
, Hui Liu
, Yiyang Hao
, Li Zhang
:
Non-Autoregressive Line-Level Code Completion. 120:1-120:34 - Marc Miltenberger

, Steven Arzt
:
Precisely Extracting Complex Variable Values from Android Apps. 121:1-121:56 - Yu Zhao

, Brent Harrison
, Tingting Yu
:
DinoDroid: Testing Android Apps Using Deep Q-Networks. 122:1-122:24 - Yimeng Guo

, Zhifei Chen
, Lin Chen
, Wenjie Xu
, Yanhui Li
, Yuming Zhou
, Baowen Xu
:
Generating Python Type Annotations from Type Inference: How Far Are We? 123:1-123:38
- Yu Cheng

, Jieshan Chen
, Qing Huang
, Zhenchang Xing
, Xiwei Xu
, Qinghua Lu
:
Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains. 124:1-124:24 - Quanjun Zhang

, Juan Zhai
, Chunrong Fang
, Jiawei Liu
, Weisong Sun
, Haichuan Hu
, Qingyu Wang
:
Machine Translation Testing via Syntactic Tree Pruning. 125:1-125:39 - Yue Liu

, Chakkrit Tantithamthavorn
, Yonghui Liu
, Li Li
:
On the Reliability and Explainability of Language Models for Program Generation. 126:1-126:26 - Baijun Cheng

, Shengming Zhao
, Kailong Wang
, Meizhen Wang
, Guangdong Bai
, Ruitao Feng
, Yao Guo
, Lei Ma
, Haoyu Wang
:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. 127:1-127:33 - Guodong Fan

, Shizhan Chen
, Cuiyun Gao
, Jianmao Xiao
, Tao Zhang
, Zhiyong Feng
:
RAPID: Zero-Shot Domain Adaptation for Code Search with Pre-Trained Models. 128:1-128:35 - Jiaxiang Liu

, Yunhan Xing
, Xiaomu Shi
, Fu Song
, Zhiwu Xu
, Zhong Ming
:
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks. 129:1-129:35 - Mohammed Oualid Attaoui

, Hazem M. Fahmy
, Fabrizio Pastore
, Lionel C. Briand
:
Supporting Safety Analysis of Image-processing DNNs through Clustering-based Approaches. 130:1-130:48 - Xiuwei Shang

, Shuai Zhang
, Yitong Zhang
, Shikai Guo
, Yulong Li
, Rong Chen
, Hui Li
, Xiaochen Li
, He Jiang
:
Analyzing and Detecting Information Types of Developer Live Chat Threads. 131:1-131:32 - Yinghua Li

, Xueqi Dang
, Lei Ma
, Jacques Klein
, Yves Le Traon
, Tegawendé F. Bissyandé
:
Test Input Prioritization for 3D Point Clouds. 132:1-132:44 - Wei Tao

, Yucheng Zhou
, Yanlin Wang
, Hongyu Zhang
, Haofen Wang
, Wenqiang Zhang
:
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation. 133:1-133:32
- Daan Hommersom

, Antonino Sabetta
, Bonaventura Coppola
, Dario Di Nucci
, Damian A. Tamburri
:
Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories. 134:1-134:28
- Daniel Russo

:
Navigating the Complexity of Generative AI Adoption in Software Engineering. 135:1-135:50 - Stefanie Betz

, Birgit Penzenstadler
, Leticia Duboc
, Ruzanna Chitchyan
, Sedef Akinli Koçak
, Ian Brooks
, Shola Oyedeji
, Jari Porras
, Norbert Seyff
, Colin C. Venters
:
Lessons Learned from Developing a Sustainability Awareness Framework for Software Engineering Using Design Science. 136:1-136:39
- Zhenpeng Chen

, Jie M. Zhang
, Max Hort
, Mark Harman
, Federica Sarro
:
Fairness Testing: A Comprehensive Survey and Analysis of Trends. 137:1-137:59
- Wei-Cheng Wu

, Bernard Nongpoh
, Marwan Nour
, Michaël Marcozzi
, Sébastien Bardin
, Christophe Hauser
:
Fine-grained Coverage-based Fuzzing. 138:1-138:41
- Wei-Cheng Wu

, Bernard Nongpoh
, Marwan Nour
, Michaël Marcozzi
, Sébastien Bardin
, Christophe Hauser
:
Fine-grained Coverage-based Fuzzing - RCR Report. 139:1-139:4
Volume 33, Number 6, July 2024
- Zhifei Chen

, Lin Chen
, Yibiao Yang
, Qiong Feng
, Xuansong Li
, Wei Song
:
Risky Dynamic Typing-related Practices in Python: An Empirical Study. 140 - Xiaohui Wan

, Zheng Zheng
, Fangyun Qin
, Xuhui Lu
:
Data Complexity: A New Perspective for Analyzing the Difficulty of Defect Prediction Tasks. 141 - Andrea Arcuri

, Man Zhang
, Juan P. Galeotti
:
Advanced White-Box Heuristics for Search-Based Fuzzing of REST APIs. 142 - Emanuela Guglielmi

, Giovanni Rosa
, Simone Scalabrino
, Gabriele Bavota
, Rocco Oliveto
:
Help Them Understand: Testing and Improving Voice User Interfaces. 143 - Anjana Perera

, Burak Turhan
, Aldeida Aleti
, Marcel Böhme
:
On the Impact of Lower Recall and Precision in Defect Prediction for Guiding Search-based Software Testing. 144 - Guofu Zhang

, Lei Li
, Zhaopin Su
, Feng Yue
, Yang Chen
, Miqing Li
, Xin Yao
:
On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation. 145 - Emanuele Iannone, Giulia Sellitto, Emanuele Iaccarino, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba:

Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be? 146 - Peixun Long

, Jianjun Zhao
:
Testing Multi-Subroutine Quantum Programs: From Unit Testing to Integration Testing. 147 - Xu Wang

, Hongwei Yu
, Xiangxin Meng
, Hongliang Cao
, Hongyu Zhang
, Hailong Sun
, Xudong Liu
, Chunming Hu
:
MTL-TRANSFER: Leveraging Multi-task Learning and Transferred Knowledge for Improving Fault Localization and Program Repair. 148 - Tingting Bi

, Boming Xia
, Zhenchang Xing
, Qinghua Lu
, Liming Zhu
:
On the Way to SBOMs: Investigating Design Issues and Solutions in Practice. 149 - Congying Xu

, Valerio Terragni
, Hengcheng Zhu
, Jiarong Wu
, Shing-Chi Cheung
:
MR-Scout: Automated Synthesis of Metamorphic Relations from Existing Test Cases. 150 - Sallam Abualhaija

, Fatma Basak Aydemir
, Fabiano Dalpiaz
, Davide Dell'Anna
, Alessio Ferrari
, Xavier Franch
, Davide Fucci
:
Replication in Requirements Engineering: The NLP for RE Case. 151 - Tahereh Zohdinasab

, Vincenzo Riccio
, Paolo Tonella
:
Focused Test Generation for Autonomous Driving Systems. 152 - Kashumi Madampe

, Rashina Hoda
, John C. Grundy
:
Supporting Emotional Intelligence, Productivity and Team Goals while Handling Software Requirements Changes. 153 - Yuechen Li

, Hanyu Pei
, Linzhi Huang
, Beibei Yin
, Kai-Yuan Cai
:
Automatic Repair of Quantum Programs via Unitary Operation. 154 - Chanh Duc Ngo

, Fabrizio Pastore
, Lionel C. Briand
:
Testing Updated Apps by Adapting Learned Models. 155 - Zeyu Sun

, Zhenpeng Chen
, Jie Zhang
, Dan Hao
:
Fairness Testing of Machine Translation Systems. 156 - Siyu Jiang

, Zhenhang He
, Yuwen Chen
, Mingrong Zhang
, Le Ma:
Mobile Application Online Cross-Project Just-in-Time Software Defect Prediction Framework. 157
- Zohreh Aghababaeyan

, Manel Abdellatif
, Mahboubeh Dadkhah
, Lionel C. Briand
:
DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks. 158 - Zhen Li

, Shasha Zhao
, Chen Chen
, Qian Chen
:
Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation. 159 - Xi Ding

, Rui Peng
, Xiangping Chen
, Yuan Huang
, Jing Bian
, Zibin Zheng
:
Do Code Summarization Models Process Too Much Information? Function Signature May Be All That Is Needed. 160 - Daniel Ramos

, Inês Lynce
, Vasco Manquinho
, Ruben Martins
, Claire Le Goues
:
BatFix: Repairing language model-based transpilation. 161 - Van Nguyen

, Trung Le
, Chakkrit Tantithamthavorn
, John C. Grundy
, Dinh Q. Phung
:
Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection. 162
- Han Hu

, Han Wang
, Ruiqi Dong
, Xiao Chen
, Chunyang Chen
:
Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey. 163
- Carlos Gavidia-Calderon

, Anastasia Kordoni
, Amel Bennaceur
, Mark Levine
, Bashar Nuseibeh
:
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems. 164 - Haoye Wang

, Zhipeng Gao
, Tingting Bi
, John C. Grundy
, Xinyu Wang
, Minghui Wu
, Xiaohu Yang
:
What Makes a Good TODO Comment? 165
- Weisong Sun

, Chunrong Fang
, Yifei Ge
, Yuling Hu
, Yuchen Chen
, Quanjun Zhang
, Xiuting Ge
, Yang Liu
, Zhenyu Chen
:
A Survey of Source Code Search: A 3-Dimensional Perspective. 166
Volume 33, Number 7, September 2024
- Chengcheng Wan

, Shicheng Liu
, Sophie Xie
, Yuhan Liu
, Henry Hoffmann
, Michael Maire
, Shan Lu
:
Keeper: Automated Testing and Fixing of Machine Learning Software. 167:1-167:33 - Suwichak Fungprasertkul

, Rami Bahsoon
, Rick Kazman
:
Technical Debt Monitoring Decision Making with Skin in the Game. 168:1-168:27 - Wei Ma

, Shangqing Liu
, Mengjie Zhao
, Xiaofei Xie
, Wenhan Wang
, Qiang Hu
, Jie Zhang
, Yang Liu
:
Unveiling Code Pre-Trained Models: Investigating Syntax and Semantics Capacities. 169:1-169:29 - Muhui Jiang

, Jinan Jiang
, Tao Wu
, Zuchao Ma
, Xiapu Luo
, Yajin Zhou
:
Understanding Vulnerability Inducing Commits of the Linux Kernel. 170:1-170:28 - Nicolas Dejon

, Chrystel Gaber
, Gilles Grimaud
, Narjes Jomaa
:
Code to Qed, the Project Manager's Guide to Proof Engineering. 171:1-171:50 - Rezvan Mahdavi-Hezaveh

, Sameeha Fatima
, Laurie A. Williams
:
Paving a Path for a Combined Family of Feature Toggle and Configuration Option Research. 172:1-172:27 - Rong Gu

, Eduard Baranov
, Afshin Ameri
, Cristina Seceleanu
, Eduard Paul Enoiu
, Baran Çürüklü
, Axel Legay
, Kristina Lundqvist
:
Synthesis and Verification of Mission Plans for Multiple Autonomous Agents under Complex Road Conditions. 173:1-173:46 - Yao Li

, Dawei Yuan
, Tao Zhang
, Haipeng Cai
, David Lo
, Cuiyun Gao
, Xiapu Luo
, He Jiang
:
Meta-Learning for Multi-Family Android Malware Classification. 174:1-174:27 - Shengcheng Yu

, Chunrong Fang
, Xin Li
, Yuchen Ling
, Zhenyu Chen
, Zhendong Su
:
Effective, Platform-Independent GUI Testing via Image Embedding and Reinforcement Learning. 175:1-175:27 - Jaeseong Lee

, Simin Chen
, Austin Mordahl
, Cong Liu
, Wei Yang
, Shiyi Wei
:
Automated Testing Linguistic Capabilities of NLP Models. 176:1-176:33 - Judith Perera

, Ewan D. Tempero
, Yu-Cheng Tu
, Kelly Blincoe
:
A Systematic Mapping Study Exploring Quantification Approaches to Code, Design, and Architecture Technical Debt. 177:1-177:44 - Sávio Freire

, Alexia Pacheco
, Nicolli Rios
, Boris Pérez, Camilo Castellanos
, Darío Correal
, Robert Ramac
, Vladimir Mandic
, Nebojsa Tausan
, Gustavo López, Manoel G. Mendonça
, Davide Falessi
, Clemente Izurieta
, Carolyn Seaman
, Rodrigo O. Spínola
:
A Comprehensive View on TD Prevention Practices and Reasons for Not Preventing It. 178:1-178:44 - Elijah Zolduoarrati

, Sherlock A. Licorish
, Nigel Stanger
:
Harmonising Contributions: Exploring Diversity in Software Engineering through CQA Mining on Stack Overflow. 179:1-179:54 - Yiling Lou

, Jun Yang
, Samuel Benton
, Dan Hao
, Lin Tan
, Zhenpeng Chen
, Lu Zhang
, Lingming Zhang
:
When Automated Program Repair Meets Regression Testing - An Extensive Study on Two Million Patches. 180:1-180:23 - Wei Liu

, Shouvick Mondal
, Tse-Hsun (Peter) Chen
:
An Empirical Study on the Characteristics of Database Access Bugs in Java Applications. 181:1-181:25 - Xue Jiang

, Yihong Dong
, Lecheng Wang
, Zheng Fang
, Qiwei Shang
, Ge Li
, Zhi Jin
, Wenpin Jiao
:
Self-Planning Code Generation with Large Language Models. 182:1-182:30 - Qing Huang

, Zhiwen Luo
, Zhenchang Xing
, Jinshan Zeng
, Jieshan Chen
, Xiwei Xu
, Yong Chen
:
Revealing the Unseen: AI Chain on LLMs for Predicting Implicit Dataflows to Generate Dataflow Graphs in Dynamically Typed Code. 183:1-183:29
- Yingzhe Lyu

, Heng Li
, Zhen Ming (Jack) Jiang
, Ahmed E. Hassan
:
On the Model Update Strategies for Supervised Learning in AIOps Solutions. 184:1-184:38 - Hang Xu

, Liheng Chen
, Shuitao Gan
, Chao Zhang
, Zheming Li
, Jiangan Ji
, Baojian Chen
, Fan Hu
:
Graphuzz: Data-driven Seed Scheduling for Coverage-guided Greybox Fuzzing. 185:1-185:36 - Xiaoning Feng

, Xiaohong Han
, Simin Chen
, Wei Yang
:
LLMEffiChecker: Understanding and Testing Efficiency Degradation of Large Language Models. 186:1-186:38 - Jinqiang Yu

, Michael Fu
, Alexey Ignatiev
, Chakkrit Tantithamthavorn
, Peter J. Stuckey
:
A Formal Explainer for Just-In-Time Defect Predictions. 187:1-187:31 - Dong Huang

, Qingwen Bu
, Yichao Fu
, Yuhao Qing
, Xiaofei Xie
, Junjie Chen
, Heming Cui
:
Neuron Sensitivity-Guided Test Case Selection. 188:1-188:32 - Yihong Dong

, Xue Jiang
, Zhi Jin
, Ge Li
:
Self-Collaboration Code Generation via ChatGPT. 189:1-189:38 - Zhiyu Wang

, Sihan Xu
, Lingling Fan
, Xiangrui Cai
, Linyu Li
, Zheli Liu
:
Can Coverage Criteria Guide Failure Discovery for Image Classifiers? An Empirical Study. 190:1-190:28
- Mingxi Ye

, Yuhong Nan
, Hong-Ning Dai
, Shuo Yang
, Xiapu Luo
, Zibin Zheng
:
FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency. 191:1-191:20 - Anni Peng

, Dongliang Fang
, Le Guan
, Erik van der Kouwe
, Yin Li
, Wenwen Wang
, Limin Sun
, Yuqing Zhang
:
Bitmap-Based Security Monitoring for Deeply Embedded Systems. 192:1-192:31
- Zachary Karas

, Aakash Bansal
, Yifan Zhang
, Toby Jia-Jun Li
, Collin McMillan
, Yu Huang
:
A Tale of Two Comprehensions? Analyzing Student Programmer Attention during Code Summarization. 193:1-193:37 - Carlos Luis Parra Calderón

, Julián Alberto García-García
, Juan Manuel Ramos-Cueli
, Celia Álvarez-Romero
, Esther Román-Villarán
, Alicia Martinez-García
, María José Escalona
:
IDE4ICDS: A Human-Centric and Model-Driven Proposal to Improve the Digitization of Clinical Practice Guideline. 194:1-194:38
Volume 33, Number 8, November 2024
- Margaret-Anne D. Storey

, Daniel Russo
, Nicole Novielli
, Takashi Kobayashi
, Dong Wang
:
A Disruptive Research Playbook for Studying Disruptive Innovations. 195:1-195:29
- Giovani Guizzo

, David Williams
, Mark Harman
, Justyna Petke
, Federica Sarro
:
Speeding Up Genetic Improvement via Regression Test Selection. 196:1-196:31 - Anwar Ghammam

, Rania Khalsi
, Marouane Kessentini
, Foyzul Hassan
:
Efficient Management of Containers for Software Defined Vehicles. 197:1-197:36 - Xiao-Yi Zhang

, Yang Liu
, Paolo Arcaini
, Mingyue Jiang
, Zheng Zheng
:
MET-MAPF: A Metamorphic Testing Approach for Multi-Agent Path Finding Algorithms. 198:1-198:37 - Lorenz Graf-Vlachy

, Stefan Wagner
:
Cleaning Up Confounding: Accounting for Endogeneity Using Instrumental Variables and Two-Stage Models. 199:1-199:31 - Zhouruixing Zhu

, Cheryl Lee, Xiaoying Tang
, Pinjia He
:
HeMiRCA: Fine-Grained Root Cause Analysis for Microservices with Heterogeneous Data Sources. 200:1-200:25 - Shangqing Liu

, Yanzhou Li
, Xiaofei Xie
, Wei Ma, Guozhu Meng
, Yang Liu
:
Automated Commit Intelligence by Pre-training. 201:1-201:30 - Tiehua Zhang

, Rui Xu
, Jianping Zhang
, Yuze Liu
, Xin Chen
, Jun Yin
, Xi Zheng
:
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer - A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities. 202:1-202:31 - Xiaoyuan Xie

, Shuo Jin
, Songqiang Chen
, Shing-Chi Cheung
:
Word Closure-Based Metamorphic Testing for Machine Translation. 203:1-203:46 - Jia Li

, Yunfei Zhao
, Yongmin Li
, Ge Li
, Zhi Jin
:
AceCoder: An Effective Prompting Technique Specialized in Code Generation. 204:1-204:26 - Yanjie Jiang

, Hui Liu
, Shing-Chi Cheung
, Lu Zhang
:
Shortening Overlong Method Names with Abbreviations. 205:1-205:24 - Haifeng Ruan

, Yannic Noller
, Saeid Tizpaz-Niari
, Sudipta Chattopadhyay
, Abhik Roychoudhury
:
Timing Side-Channel Mitigation via Automated Program Repair. 206:1-206:27 - Fanyi Meng

, Ying Wang
, Chun Yong Chong
, Hai Yu
, Zhiliang Zhu
:
Evolution-Aware Constraint Derivation Approach for Software Remodularization. 207:1-207:43 - Chico Sundermann

, Heiko Raab
, Tobias Heß
, Thomas Thüm
, Ina Schaefer
:
Reusing d-DNNFs for Efficient Feature-Model Counting. 208:1-208:32 - Yasaman Abedini

, Abbas Heydarnoori
:
Can GitHub Issues Help in App Review Classifications? 209:1-209:42 - Yi Song

, Xihao Zhang
, Xiaoyuan Xie
, Songqiang Chen
, Quanming Liu
, Ruizhi Gao
:
SURE: A Visualized Failure Indexing Approach Using Program Memory Spectrum. 210:1-210:43 - Saurabhsingh Rajput

, Tim Widmayer
, Ziyuan Shang
, Maria Kechagia
, Federica Sarro
, Tushar Sharma
:
Enhancing Energy-Awareness in Deep Learning through Fine-Grained Energy Measurement. 211:1-211:34 - Qing Huang

, Yanbang Sun
, Zhenchang Xing
, Yuanlong Cao
, Jieshan Chen
, Xiwei Xu
, Huan Jin
, Jiaxing Lu
:
Let's Discover More API Relations: A Large Language Model-Based AI Chain for Unsupervised API Relation Inference. 212:1-212:34 - Moataz Chouchen

, Ali Ouni
, Mohamed Wiem Mkaouer
:
MULTICR: Predicting Merged and Abandoned Code Changes in Modern Code Review Using Multi-Objective Search. 213:1-213:44
- Florian Tambon

, Foutse Khomh
, Giuliano Antoniol
:
GIST: Generated Inputs Sets Transferability in Deep Learning. 214:1-214:38 - Shiwen Yu

, Zengyu Liu
, Ting Wang
, Ji Wang
:
Neural Solving Uninterpreted Predicates with Abstract Gradient Descent. 215:1-215:47 - Dmytro Humeniuk

, Foutse Khomh
, Giuliano Antoniol
:
Reinforcement Learning Informed Evolutionary Search for Autonomous Systems Testing. 216:1-216:45 - Yue Liu

, Chakkrit Tantithamthavorn
, Yonghui Liu
, Patanamon Thongtanunam
, Li Li
:
Automatically Recommend Code Updates: Are We There Yet? 217:1-217:27
- Bianca Trinkenreich

, Fabio Santos
, Klaas-Jan Stol
:
Predicting Attrition among Software Professionals: Antecedents and Consequences of Burnout and Engagement. 218:1-218:45
- Ming Xu

, Jianling Fu
, Hui Jiang
, Yuxin Deng
, Zhi-Bin Li
:
Termination and Universal Termination Problems for Nondeterministic Quantum Programs. 219:1-219:41
- Xinyi Hou

, Yanjie Zhao
, Yue Liu
, Zhou Yang
, Kailong Wang, Li Li
, Xiapu Luo
, David Lo
, John Grundy
, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. 220:1-220:79
- Daniel Russo

:
Navigating the Complexity of Generative AI Adoption in Software Engineering - RCR Report. 221:1-221:5
- Mauro Pezzè

:
Editorial: The End of the Journey. 222:1-222:3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














