


default search action
ACM Transactions on Software Engineering and Methodology, Volume 34
Volume 34, Number 1, January 2025
- Abhik Roychoudhury
:
Editorial: TOSEM Journal in 2025 and Beyond. 1:1-1:3
- Zhipeng Gao
, Yanqi Su
, Xing Hu
, Xin Xia
:
Automating TODO-missed Methods Detection and Patching. 2:1-2:28 - Jana-Rebecca Rehse
, Sander J. J. Leemans
, Peter Fettke
, Jan Martijn E. M. van der Werf
:
On Process Discovery Experimentation: Addressing the Need for Research Methodology in Process Discovery. 3:1-3:29 - Martin P. Robillard
, Mathieu Nassif
, Muhammad Sohail
:
Understanding Test Convention Consistency as a Dimension of Test Quality. 4:1-4:39 - Xinyi Wang
, Asmar Muqeet
, Tao Yue
, Shaukat Ali
, Paolo Arcaini
:
Test Case Minimization with Quantum Annealers. 5:1-5:24 - Evangelos Ntentos
, Nicole Elisabeth Lueger
, Georg Simhandl
, Uwe Zdun
, Simon Schneider
, Riccardo Scandariato
, Nicolás E. Díaz Ferreyra:
On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures. 6:1-6:37 - Moses Openja
, Foutse Khomh
, Armstrong Foundjem
, Zhen Ming (Jack) Jiang
, Mouna Abidi
, Ahmed E. Hassan
:
An Empirical Study of Testing Machine Learning in the Wild. 7:1-7:63 - Haipeng Wang
, Zhengyuan Wei
, Qilin Zhou
, Wing-Kwong Chan
:
Context-Aware Fuzzing for Robustness Enhancement of Deep Learning Models. 8:1-8:68 - Haojun Zhao
, Yueming Wu
, Deqing Zou
, Yang Liu
, Hai Jin
:
MalSensor: Fast and Robust Windows Malware Classification. 9:1-9:28 - Iren Mazloomzadeh
, Gias Uddin
, Foutse Khomh
, Ashkan Sami
:
Reputation Gaming in Crowd Technical Knowledge Sharing. 10:1-10:41 - Wenkang Zhong
, Chuanyi Li
, Kui Liu
, Jidong Ge
, Bin Luo
, Tegawendé F. Bissyandé
, Vincent Ng
:
Benchmarking and Categorizing the Performance of Neural Program Repair Systems for Java. 11:1-11:35 - Jierui Zhang
, Liang Wang
, Ying Li
, Jing Jiang
, Tao Wang
, Xianping Tao
:
Measuring and Mining Community Evolution in Developer Social Networks with Entropy-Based Indices. 12:1-12:43 - Chuan Luo
, Jianping Song
, Qiyuan Zhao
, Binqi Sun
, Junjie Chen
, Hongyu Zhang
, Jinkun Lin
, Chunming Hu
:
Solving the t-Wise Coverage Maximum Problem via Effective and Efficient Local Search-Based Sampling. 13:1-13:64 - Yongda Yu, Guoping Rong, Haifeng Shen, He Zhang, Dong Shao, Min Wang, Zhao Wei, Yong Xu, Juhong Wang:
Fine-Tuning Large Language Models to Improve Accuracy and Comprehensibility of Automated Code Review. 14:1-14:26 - Li Huang
, Weifeng Sun
, Meng Yan
, Zhongxin Liu
, Yan Lei
, David Lo
:
Neuron Semantic-Guided Test Generation for Deep Neural Networks Fuzzing. 15:1-15:38 - Jasmine Latendresse
, Samuel Abedu
, Ahmad Abdellatif
, Emad Shihab
:
An Exploratory Study on Machine Learning Model Management. 16:1-16:31
- Xu Yang
, Gopi Krishnan Rajbahadur
, Dayi Lin
, Shaowei Wang
, Zhen Ming (Jack) Jiang
:
SimClone: Detecting Tabular Data Clones Using Value Similarity. 17:1-17:27 - Jon Ayerdi
, Asier Iriarte
, Pablo Valle
, Ibai Roman
, Miren Illarramendi
, Aitor Arrieta
:
MarMot: Metamorphic Runtime Monitoring of Autonomous Driving Systems. 18:1-18:35 - Nima Shiri Harzevili
, Mohammad Mahdi Mohajer
, Moshi Wei
, Hung Viet Pham
, Song Wang
:
History-Driven Fuzzing for Deep Learning Libraries. 19:1-19:29 - Hao Li
, Gopi Krishnan Rajbahadur
, Cor-Paul Bezemer
:
Studying the Impact of TensorFlow and PyTorch Bindings on Machine Learning Software Quality. 20:1-20:31 - Zhensu Sun
, Xiaoning Du
, Fu Song
, Shangwen Wang
, Mingze Ni
, Li Li
, David Lo
:
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems. 21:1-21:22 - Kaichun Yao
, Hao Wang
, Chuan Qin
, Hengshu Zhu
, Yanjun Wu
, Libo Zhang
:
CARL: Unsupervised Code-Based Adversarial Attacks for Programming Language Models via Reinforcement Learning. 22:1-22:32
- Sabreen Ahmadjee
, Carlos Joseph Mera-Gómez, Siamak Farshidi
, Rami Bahsoon
, Rick Kazman
:
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors. 23:1-23:35
- Shandler A. Mason
, Sandeep Kaur Kuttal
:
Diversity's Double-Edged Sword: Analyzing Race's Effect on Remote Pair Programming Interactions. 24:1-24:45
- Jingzhi Gong
, Tao Chen
:
Deep Configuration Performance Learning: A Systematic Survey and Taxonomy. 25:1-25:62
- Ruixiang Qian
, Quanjun Zhang
, Chunrong Fang
, Ding Yang
, Shun Li
, Binyu Li
, Zhenyu Chen
:
DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing. 26:1-26:39
- Ruixiang Qian
, Quanjun Zhang
, Chunrong Fang
, Ding Yang
, Shun Li
, Binyu Li
, Zhenyu Chen
:
DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing - RCR Report. 27:1-27:13
Volume 34, Number 2, February 2025
- Fernando Uyaguari
, Silvia Teresita Acuña, John W. Castro
, Davide Fucci
, Oscar Dieste
, Sira Vegas
:
Relevant Information in TDD Experiment Reporting. 28:1-28:41 - Olivier Nourry
, Yutaro Kashiwa
, Weiyi Shang
, Honglin Shu
, Yasutaka Kamei
:
My Fuzzers Won't Build: An Empirical Study of Fuzzing Build Failures. 29:1-29:30 - Weifeng Pan
, Wei Wu
, Ming Hua, Dae-Kyoo Kim
, Zijiang Yang
, Yutao Ma
:
Toward the Fractal Dimension of Classes. 30:1-30:50 - Leandro O. Souza, Eduardo Santana de Almeida
, Paulo Anselmo da Mota Silveira Neto
, Earl T. Barr
, Justyna Petke
:
Software Product Line Engineering via Software Transplantation. 31:1-31:27 - Madhu Selvaraj
, Gias Uddin
:
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild. 32:1-32:40 - Xuetao Li
, Yuxia Zhang
, Cailean Osborne
, Minghui Zhou
, Zhi Jin
, Hui Liu
:
Systematic Literature Review of Commercial Participation in Open Source Software. 33:1-33:31 - Zhenyang Xu
, Yongqiang Tian
, Mengxiao Zhang
, Jiarui Zhang
, Puzhuo Liu
, Yu Jiang
, Chengnian Sun
:
T-Rec: Fine-Grained Language-Agnostic Program Reduction Guided by Lexical Syntax. 34:1-34:31 - Jongchan Park
, Tae Eun Kim
, Dongsun Kim
, Kihong Heo
:
Improving Fault Localization with External Oracle by Using Counterfactual Execution. 35:1-35:22 - Guoqing Wang
, Zeyu Sun
, Jinhao Dong
, Yuxia Zhang
, Mingxuan Zhu
, Qingyuan Liang
, Dan Hao
:
Is It Hard to Generate Holistic Commit Message? 36:1-36:28 - Jia Li
, Ge Li
, Yongmin Li
, Zhi Jin
:
Structured Chain-of-Thought Prompting for Code Generation. 37:1-37:23 - Emanuela Guglielmi
, Gabriele Bavota
, Rocco Oliveto
, Simone Scalabrino
:
Automatic Identification of Game Stuttering via Gameplay Videos Analysis. 38:1-38:29 - Ahcheong Lee
, Youngseok Choi
, Shin Hong
, Yunho Kim
, Kyutae Cho
, Moonzoo Kim
:
ZigZagFuzz: Interleaved Fuzzing of Program Options and Files. 39:1-39:31 - Pouria Alikhanifard
, Nikolaos Tsantalis
:
A Novel Refactoring and Semantic Aware Abstract Syntax Tree Differencing Tool and a Benchmark for Evaluating the Accuracy of Diff Tools. 40:1-40:63 - Zheng Zheng
, Dai-Xu Ren
, Huai Liu
, Tsong Yueh Chen
, Tiancheng Li
:
Identifying the Failure-Revealing Test Cases in Metamorphic Testing: A Statistical Approach. 41:1-41:26 - Shuyin Ouyang
, Jie M. Zhang
, Mark Harman
, Meng Wang
:
An Empirical Study of the Non-Determinism of ChatGPT in Code Generation. 42:1-42:28 - Jianhong Zhao
, Yongwang Zhao
, Peisen Yao
, Fanlang Zeng
, Bohua Zhan
, Kui Ren
:
KBX: Verified Model Synchronization via Formal Bidirectional Transformation. 43:1-43:40 - Yuekai Huang
, Junjie Wang
, Song Wang
, Moshi Wei
, Lin Shi
, Zhe Liu
, Qing Wang
:
Deep API Sequence Generation via Golden Solution Samples and API Seeds. 44:1-44:21 - Yu Pei
, Jeongju Sohn
, Sarra Habchi
, Mike Papadakis
:
Non-Flaky and Nearly Optimal Time-Based Treatment of Asynchronous Wait Web Tests. 45:1-45:29 - Jianming Chen
, Yawen Wang
, Junjie Wang
, Xiaofei Xie
, Dandan Wang
, Qing Wang
, Fanjiang Xu
:
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations. 46:1-46:28
- Qipeng Wang
, Shiqi Jiang
, Zhenpeng Chen
, Xu Cao
, Yuanchun Li
, Aoyu Li
, Yun Ma
, Ting Cao
, Xuanzhe Liu
:
Anatomizing Deep Learning Inference in Web Browsers. 47:1-47:43 - Jinjing Shi
, Zimeng Xiao
, Heyuan Shi
, Yu Jiang
, Xuelong Li
:
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems. 48:1-48:32 - Pin Ji
, Yang Feng
, Ruohao Zhang
, Ruichen Xue
, Yichi Zhang
, Weitao Huang
, Jia Liu
, Zhihong Zhao
:
NLPLego: Assembling Test Generation for Natural Language Processing Applications. 49:1-49:36 - Xinyu Sun
, Wanwei Liu
, Shangwen Wang
, Tingyu Chen
, Ye Tao
, Xiaoguang Mao
:
AutoRIC: Automated Neural Network Repairing Based on Constrained Optimization. 50:1-50:29 - Ali Rezaei Nasab
, Maedeh Dashti
, Mojtaba Shahin
, Mansooreh Zahedi
, Hourieh Khalajzadeh
, Chetan Arora
, Peng Liang
:
Fairness Concerns in App Reviews: A Study on AI-Based Mobile Apps. 51:1-51:30 - Yongqian Sun
, Zihan Lin
, Binpeng Shi
, Shenglin Zhang
, Shiyu Ma
, Pengxiang Jin
, Zhenyu Zhong
, Lemeng Pan
, Yicheng Guo
, Dan Pei
:
Interpretable Failure Localization for Microservice Systems Based on Graph Autoencoder. 52:1-52:28 - Damiano Torre
, Anitha Chennamaneni
, JaeYun Jo
, Gitika Vyas
, Brandon Sabrsula
:
Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study. 53:1-53:48
- Mathieu Nassif
, Martin P. Robillard
:
Non-Linear Software Documentation with Interactive Code Examples. 54:1-54:32
- Zhiwei Fei
, Jidong Ge
, Chuanyi Li
, Tianqi Wang
, Yuning Li
, Haodong Zhang
, LiGuo Huang
, Bin Luo
:
Patch Correctness Assessment: A Survey. 55:1-55:50
- Hichem Belgacem
, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms - RCR Report. 56:1-56:7
Volume 34, Number 3, March 2025
- Luciano Zemín
, Ariel Godio
, César Cornejo
, Renzo Degiovanni
, Simón Gutiérrez Brida
, Germán Regis
, Nazareno Aguirre
, Marcelo Fabian Frias
:
An Empirical Study on the Suitability of Test-based Patch Acceptance Criteria. 57:1-57:20 - Shangwen Wang
, Bo Lin
, Liqian Chen
, Xiaoguang Mao
:
Divide-and-Conquer: Automating Code Revisions via Localization-and-Revision. 58:1-58:26 - Beatriz Pérez
, Ángel Luis Rubio
, María A. Zapata
:
PROV-IDEA: Supporting Interoperable Schema and Data Provenance within Database Evolution. 59:1-59:27 - Ting Zhang
, Ivana Clairine Irsan
, Ferdian Thung
, David Lo
:
Revisiting Sentiment Analysis for Software Engineering in the Era of Large Language Models. 60:1-60:30 - Victor Crespo-Rodriguez
, Neelofar
, Aldeida Aleti
, Burak Turhan
:
Instance Space Analysis of Testing of Autonomous Vehicles in Critical Scenarios. 61:1-61:36 - Xiao Yu
, Guancheng Lin
, Xing Hu
, Jacky Wai Keung
, Xin Xia
:
Less Is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection. 62:1-62:37 - Jakob Svennevik Notland
, Mariusz Nowostawski
, Jingyue Li
:
An Empirical Study on Governance in Bitcoin's Consensus Evolution. 63:1-63:47 - Wenwei Gu
, Jinyang Liu
, Zhuangbin Chen
, Jianping Zhang
, Yuxin Su
, Jiazhen Gu
, Cong Feng
, Zengyin Yang
, Yongqiang Yang
, Michael R. Lyu
:
Identifying Performance Issues in Cloud Service Systems Based on Relational-Temporal Features. 64:1-64:31 - Luyao Ren
, Xing Zhang
, Ziyue Hua
, Yanyan Jiang
, Xiao He
, Yingfei Xiong
, Tao Xie
:
Validity-Preserving Delta Debugging via Generator Trace Reduction. 65:1-65:33 - Juan de Lara
, Esther Guerra
:
Adaptive Modelling Languages: Abstract Syntax and Model Migration. 66:1-66:54 - Elvira Albert
, Reiner Hähnle
, Alicia Merayo
, Dominic Steinhöfel
:
Certified Cost Bounds for Abstract Programs. 67:1-67:33 - Shayan Noei
, Heng Li
, Ying Zou
:
Detecting Refactoring Commits in Machine Learning Python Projects: A Machine Learning-Based Approach. 68:1-68:25 - Yuntong Zhang
, Andreea Costea
, Ridwan Shariffdeen
, Davin McCall
, Abhik Roychoudhury
:
EffFix: Efficient and Effective Repair of Pointer Manipulating Programs. 69:1-69:27 - Yunqi Chen
, Zhiyuan Wan
, Yifei Zhuang
, Ning Liu
, David Lo
, Xiaohu Yang
:
Understanding the OSS Communities of Deep Learning Frameworks: A Comparative Case Study of PyTorch and TensorFlow. 70:1-70:30 - Yuan Zhang
, Lei Qu
, Yifei Wu
, Leihuan Wu
, Tingting Yu
, Rui Chen
, Weiqiang Kong
:
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization. 71:1-71:33 - Mikhail Evtikhiev
, Ekaterina Koshchenko
, Vladimir Kovalenko
:
What Could Possibly Go Wrong: Undesirable Patterns in Collective Development. 72:1-72:50 - Yufei Zhou
, Haihua Tang
, Longtao Zhu
, Hao Ding
, Junyan Qian
:
Refining Code-Line-Level Bugginess Identification: Getting the Best of Both Worlds by Fusing Syntactic and Semantic Features. 73:1-73:43 - Xiaoqin Fu
, Asif Zaman
, Haipeng Cai
:
DistMeasure: A Framework for Runtime Characterization and Quality Assessment of Distributed Software via Interprocess Communications. 74:1-74:53 - Yinan Chen
, Yuan Huang
, Xiangping Chen
, Zibin Zheng
:
TG-CUP: A Transformer and GNN-Based Multi-Modal Comment Updating Method. 75:1-75:22
- Ye Fan
, Chuanyi Li
, Jidong Ge
, LiGuo Huang
, Bin Luo
:
Effective Hard Negative Mining for Contrastive Learning-Based Code Search. 76:1-76:35 - Yihong Dong
, Jiazheng Ding
, Xue Jiang
, Ge Li
, Zhuo Li
, Zhi Jin
:
CodeScore: Evaluating Code Generation by Learning Code Execution. 77:1-77:22 - Xiaodong Gu
, Meng Chen
, Yalan Lin
, Yuhan Hu
, Hongyu Zhang
, Chengcheng Wan
, Zhao Wei
, Yong Xu
, Juhong Wang
:
On the Effectiveness of Large Language Models in Domain-Specific Code Generation. 78:1-78:22 - Jianhang Xiang
, Zhipeng Gao
, Lingfeng Bao
, Xing Hu
, Jiayuan Chen
, Xin Xia
:
Automating Comment Generation for Smart Contract from Bytecode. 79:1-79:31 - Wentao Zou
, Qi Li
, Chuanyi Li
, Jidong Ge
, Xiang Chen
, LiGuo Huang
, Bin Luo
:
Improving Source Code Pre-Training via Type-Specific Masking. 80:1-80:34 - Quanjun Zhang
, Weifeng Sun
, Chunrong Fang
, Bowen Yu
, Hongyan Li
, Meng Yan
, Jianyi Zhou
, Zhenyu Chen
:
Exploring Automated Assertion Generation via Large Language Models. 81:1-81:25 - Xinyue Li
, Zhenpeng Chen
, Jie M. Zhang
, Federica Sarro
, Ying Zhang
, Xuanzhe Liu
:
Bias behind the Wheel: Fairness Testing of Autonomous Driving Systems. 82:1-82:24
- Puzhuo Liu
, Chengnian Sun
, Yaowen Zheng
, Xuan Feng
, Chuan Qin
, Yuncheng Wang
, Zhenyang Xu
, Zhi Li
, Peng Di
, Yu Jiang
, Limin Sun
:
LLM-Powered Static Binary Taint Analysis. 83:1-83:36 - Yicheng Zeng
, Zhanwei Song
, Guo Lv
, Yu Zhou
, Hongsong Zhu
, Limin Sun
:
Backsolver: Adapting Preceding Execution Paths to Solve Constraints for Concolic Execution. 84:1-84:30
- Nico Schiller
, Xinyi Xu
, Lukas Bernhard
, Nils Bars
, Moritz Schloegel
, Thorsten Holz
:
Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts. 85:1-85:32
- Nico Schiller
, Xinyi Xu
, Lukas Bernhard
, Nils Bars
, Moritz Schloegel
, Thorsten Holz
:
Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts - RCR Report. 86:1-86:3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.