


default search action
IEEE Transactions on Software Engineering, Volume 40
Volume 40, Number 1, January 2014
- Bashar Nuseibeh:

Signing Off: The State of the Journal. 1-3 - Huai Liu

, Fei-Ching Kuo, Dave Towey
, Tsong Yueh Chen
:
How Effectively Does Metamorphic Testing Alleviate the Oracle Problem? 4-22 - Lech Madeyski

, Wojciech Orzeszyna, Richard Torkar
, Mariusz Jozala:
Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation. 23-42 - Cemal Yilmaz

, Emine Dumlu
, Myra B. Cohen, Adam A. Porter:
Reducing Masking Effects in CombinatorialInteraction Testing: A Feedback DrivenAdaptive Approach. 43-66 - Christian Kästner

, Alexander Dreiling, Klaus Ostermann:
Variability Mining: Consistent Semi-automatic Detection of Product-Line Features. 67-82 - Leandro L. Minku

, Dirk Sudholt, Xin Yao
:
Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis. 83-102
Volume 40, Number 2, February 2014
- Yulei Sui

, Ding Ye, Jingling Xue
:
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis. 107-122 - François Taïani

, Shen Lin, Gordon S. Blair
:
GossipKit: A Unified ComponentFramework for Gossip. 123-136 - Shang-Wei Lin

, Étienne André
, Yang Liu
, Jun Sun
, Jin Song Dong:
Learning Assumptions for CompositionalVerification of Timed Systems. 137-153 - Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:

Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. 154-166 - Immanuel Trummer, Boi Faltings, Walter Binder

:
Multi-Objective Quality-Driven Service Selection - A Fully Polynomial Time Approximation Scheme. 167-191 - Qiang He, Jun Yan

, Hai Jin, Yun Yang:
Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction. 192-215
Volume 40, Number 3, March 2014
- Bao N. Nguyen, Atif M. Memon:

An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input Spaces. 216-234 - Narayan Ramasubbu

:
Governing Software Process Improvementsin Globally Distributed Product Development. 235-250 - Charles Song, Adam A. Porter, Jeffrey S. Foster:

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees. 251-265 - Yan Cai

, W. K. Chan
:
Magiclock: Scalable Detection ofPotential Deadlocks in Large-ScaleMultithreaded Programs. 266-281 - Matthias Galster, Danny Weyns

, Dan Tofan
, Bartosz Michalik, Paris Avgeriou
:
Variability in Software Systems - A Systematic Literature Review. 282-306 - Alex Groce, Todd Kulesza, Chaoqiang Zhang, Shalini Shamasunder, Margaret M. Burnett, Weng-Keen Wong, Simone Stumpf

, Shubhomoy Das, Amber Shinsel, Forrest Bice, Kevin McIntosh:
You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems. 307-323
Volume 40, Number 4, April 2014
- David A. Basin

, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania:
A Model-Driven Methodology for Developing Secure Data-Management Applications. 324-337 - Christophe Damas, Bernard Lambeau, Axel van Lamsweerde:

Analyzing Critical Decision-Based Processes. 338-365 - Sarah Rastkar, Gail C. Murphy, Gabriel Murray:

Automatic Summarization of Bug Reports. 366-380 - Roberto Latorre

:
Effects of Developer Experience on Learningand Applying Unit Test-Driven Development. 381-395 - Junpeng Lv, Bei-Bei Yin, Kai-Yuan Cai:

On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment. 396-412 - Saehwa Kim:

Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation. 413-426
Volume 40, Number 5, May 2014
- Yu Pei

, Carlo A. Furia, Martin Nordio, Yi Wei, Bertrand Meyer, Andreas Zeller
:
Automated Fixing of Programs with Contracts. 427-449 - Les Hatton:

Conservation of Information: Software'sHidden Clockwork? 450-460 - Qiang He, Jun Han, Yun Yang, Hai Jin, Jean-Guy Schneider

, Steven Versteeg:
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems. 461-482 - Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto, Koichi Takahashi:

Modular Software Model Checking for Distributed Systems. 483-501 - Venera Arnaoudova, Laleh Mousavi Eshkevari, Massimiliano Di Penta

, Rocco Oliveto, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
REPENT: Analyzing the Nature of Identifier Renamings. 502-532
Volume 40, Number 6, June 2014
- Ayse Tosun Misirli

, Ayse Basar Bener
:
Bayesian Networks For Evidence-Based Decision-Making in Software Engineering. 533-554 - Juan Manuel Vara

, Verónica Andrea Bollati
, Álvaro Jiménez, Esperanza Marcos
:
Dealing with Traceability in the MDDof Model Transformations. 555-583 - Jonathan Lee, Kuo-Hsun Hsu

:
GEA: A Goal-Driven Approach toDiscovering Early Aspects. 584-602 - Martin J. Shepperd

, David Bowes
, Tracy Hall
:
Researcher Bias: The Use of Machine Learning in Software Defect Prediction. 603-616 - Alexandre Bartel, Jacques Klein

, Martin Monperrus
, Yves Le Traon
:
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android. 617-632
Volume 40, Number 7, July 2014
- Miryung Kim, Thomas Zimmermann, Nachiappan Nagappan:

An Empirical Study of RefactoringChallenges and Benefits at Microsoft. 633-649 - Christopher Henard, Mike Papadakis

, Gilles Perrouin
, Jacques Klein
, Patrick Heymans, Yves Le Traon
:
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines. 650-670 - Gabriele Bavota

, Rocco Oliveto, Malcom Gethers, Denys Poshyvanyk
, Andrea De Lucia
:
Methodbook: Recommending Move Method Refactorings via Relational Topic Models. 671-694 - JaeSeung Song

, Cristian Cadar
, Peter R. Pietzuch
:
SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications. 695-709 - Peter Collingbourne, Cristian Cadar

, Paul H. J. Kelly:
Symbolic Crosschecking of Data-Parallel Floating-Point Code. 710-737
Volume 40, Number 8, August 2014
- Matej Hertis, Matjaz B. Juric:

An Empirical Analysis of Business Process Execution Language Usage. 738-757 - Narayan Ramasubbu

, Chris F. Kemerer:
Managing Technical Debt in EnterpriseSoftware Packages. 758-772 - Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:

Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time. 773-794 - Gregorio Díaz

, María-Emilia Cambronero, Enrique Martínez, Gerardo Schneider:
Specification and Verification of NormativeTexts Using C-O Diagrams. 795-817 - Henrik Leopold, Jan Mendling

, Artem Polyvyanyy
:
Supporting Process Model Validation through Natural Language Generation. 818-840
Volume 40, Number 9, September 2014
- Wael Kessentini, Marouane Kessentini, Houari A. Sahraoui, Slim Bechikh

, Ali Ouni
:
A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection. 841-861 - Ismael Rodríguez

, Luis Llana
, Pablo Rabanal
:
A General Testability Theory: Classes, Properties, Complexity, and Testing Reductions. 862-894 - David Fernández-Amorós

, Ruben Heradio
, José Antonio Cerrada
, Carlos Cerrada
:
A Scalable Approach to Exact Model and Commonality Counting for Extended Feature Models. 895-910 - Yepang Liu

, Chang Xu, Shing-Chi Cheung
, Jian Lu:
GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications. 911-940
Volume 40, Number 10, October 2014
- Erik Casagrande, Selamawit Woldeamlak, Wei Lee Woon

, Hatem H. Zeineldin, Davor Svetinovic
:
NLP-KAOS for Systems Goal Elicitation: Smart Metering System Case Study. 941-956 - Ying-Dar Lin, José F. Rojas, Edward T.-H. Chu, Yuan-Cheng Lai:

On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices. 957-970 - Wladimir Araujo, Lionel C. Briand, Yvan Labiche

:
On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object-Oriented Software. 971-992 - Riccardo Scandariato, James Walden

, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. 993-1006 - Tim Miller

, Bin Lu, Leon Sterling, Ghassan Beydoun
, Kuldar Taveter:
Requirements Elicitation and Specification Using the Agent Paradigm: The Case Study of an Aircraft Turnaround Simulator. 1007-1024 - Arilo Claudio Dias-Neto, Guilherme Horta Travassos:

Supporting the Combined Selection of Model-Based Testing Techniques. 1025-1041
Volume 40, Number 11, November 2014
- Jesús Sánchez Cuadrado

, Esther Guerra
, Juan de Lara:
A Component Model for Model Transformations. 1042-1060 - Sebastian Draxler, Gunnar Stevens, Alexander Boden:

Keeping the Development Environment Up to Date - A Study of the Situated Practices of Appropriating the Eclipse IDE. 1061-1074 - Chu-Ti Lin, Yan-Fu Li:

Rate-Based Queueing Simulation Model of Open Source Software Debugging Activities. 1075-1099 - Dimitrios Athanasiou, Ariadi Nugroho

, Joost Visser
, Andy Zaidman
:
Test Code Quality and Its Relation to Issue Handling Performance. 1100-1125 - Barthélémy Dagenais, Martin P. Robillard:

Using Traceability Links to Recommend Adaptive Changes for Documentation Evolution. 1126-1146
Volume 40, Number 12, December 2014
- Fabio Massacci

, Viet Hung Nguyen:
An Empirical Methodology to Evaluate Vulnerability Discovery Models. 1147-1162 - Gunnar R. Bergersen, Dag I. K. Sjøberg, Tore Dybå:

Construction and Validation of an Instrument for Measuring Programming Skill. 1163-1184 - Emilio Coppa

, Camil Demetrescu, Irene Finocchi
:
Input-Sensitive Profiling. 1185-1205 - Cong Tian, Zhenhua Duan, Zhao Duan:

Making CEGAR More Efficient in Software Model Checking. 1206-1223 - Kevin Lano, Shekoufeh Kolahdouz Rahimi:

Model-Transformation Design Patterns. 1224-1259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














