


Остановите войну!
for scientists:


default search action
IEEE Transactions on Software Engineering, Volume 48
Volume 48, Number 2, February 2022
- Dirk van der Linden
, Emma J. Williams
, Joseph Hallett
, Awais Rashid
:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. 364-376 - Jose Ricardo da Silva Junior
, Daniel Prett Campagna
, Esteban Clua
, Anita Sarma
, Leonardo Murta
:
Dominoes: An Interactive Exploratory Data Analysis Tool for Software Relationships. 377-396 - Esther Guerra
, Juan de Lara
, Marsha Chechik, Rick Salay:
Property Satisfiability Analysis for Product Lines of Modelling Languages. 397-416 - Maxime Lamothe
, Weiyi Shang
, Tse-Hsun Peter Chen
:
A3: Assisting Android API Migrations Using Code Examples. 417-431 - Beatriz Bernárdez
, Amador Durán
, José Antonio Parejo
, Natalia Juristo, Antonio Ruiz-Cortés
:
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments. 432-452 - Jackson A. Prado Lima
, Silvia Regina Vergilio
:
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. 453-465 - Pilar Rodríguez
, Cathy Urquhart, Emilia Mendes:
A Theory of Value for Value-Based Feature Selection in Software Engineering. 466-484 - Yuxing Ma
, Audris Mockus, Russell Zaretzki
, Randy V. Bradley, Bogdan C. Bichescu:
A Methodology for Analyzing Uptake of Software Technologies Among Developers. 485-501 - Aaditya Bhatia, Shaowei Wang
, Muhammad Asaduzzaman, Ahmed E. Hassan:
A Study of Bug Management Using the Stack Exchange Question and Answering Platform. 502-518 - Yanjie Jiang
, Hui Liu
, Jiahao Jin, Lu Zhang
:
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion. 519-537 - Guoxin Su
, Li Liu
, Minjie Zhang
, David S. Rosenblum
:
Quantitative Verification for Monitoring Event-Streaming Systems. 538-550 - Lei Xue
, Hao Zhou, Xiapu Luo
, Le Yu
, Dinghao Wu
, Yajin Zhou
, Xiaobo Ma
:
PackerGrind: An Adaptive Unpacking System for Android Apps. 551-570 - Hao Zhong
, Xiaoyin Wang
, Hong Mei
:
Inferring Bug Signatures to Detect Real Bugs. 571-584 - Chunhui Wang, Fabrizio Pastore
, Arda Goknil
, Lionel C. Briand
:
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach. 585-616 - Fabrizio Pastore
, Daniela Micucci
, Michell Guzmán
, Leonardo Mariani
:
TkT: Automatic Inference of Timed and Extended Pushdown Automata. 617-636 - Manish Motwani
, Mauricio Soto
, Yuriy Brun
, René Just
, Claire Le Goues
:
Quality of Automated Program Repair on Real-World Defects. 637-661 - Jie Lu
, Feng Li, Chen Liu, Lian Li
, Xiaobing Feng, Jingling Xue:
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement. 662-677 - Lisa Nguyen Quang Do
, Eric Bodden
:
Explaining Static Analysis With Rule Graphs. 678-690 - Shaoying Liu
, Shin Nakajima:
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing. 691-712 - Francisca Pérez
, Tewfik Ziadi, Carlos Cetina
:
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models. 713-731 - Jie M. Zhang
, Mark Harman, Lei Ma
, Yang Liu
:
Machine Learning Testing: Survey, Landscapes and Horizons. 1-36 - Dror G. Feitelson
, Ayelet Mizrahi
, Nofar Noy
, Aviad Ben Shabat
, Or Eliyahu
, Roy Sheffer
:
How Developers Choose Names. 37-52 - Carlos Sáenz-Adán
, Beatriz Pérez
, Francisco J. García Izquierdo
, Luc Moreau
:
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience. 53-68 - Toshiki Hirao
, Shane McIntosh
, Akinori Ihara
, Kenichi Matsumoto
:
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities. 69-81 - Meng Yan
, Xin Xia
, Yuanrui Fan
, Ahmed E. Hassan, David Lo
, Shanping Li:
Just-In-Time Defect Identification and Localization: A Two-Phase Framework. 82-101 - Wenhua Wang, Yuqun Zhang, Yulei Sui
, Yao Wan, Zhou Zhao
, Jian Wu, Philip S. Yu
, Guandong Xu
:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. 102-119 - Faeq Alrimawi
, Liliana Pasquale
, Deepak Mehta, Nobukazu Yoshioka
, Bashar Nuseibeh
:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. 120-134 - Sebastian Baltes
, Christoph Treude
, Martin P. Robillard
:
Contextual Documentation Referencing on Stack Overflow. 135-149 - Qiang He
, Bo Li
, Feifei Chen
, John C. Grundy
, Xin Xia, Yun Yang
:
Diversified Third-Party Library Prediction for Mobile App Development. 150-165 - Jirayus Jiarpakdee
, Chakkrit Kla Tantithamthavorn
, Hoa Khanh Dam
, John C. Grundy
:
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models. 166-185 - Camilo Escobar-Velásquez
, Mario Linares-Vásquez
, Gabriele Bavota
, Michele Tufano
, Kevin Moran
, Massimiliano Di Penta
, Christopher Vendome, Carlos Bernal-Cárdenas
, Denys Poshyvanyk
:
Enabling Mutant Generation for Open- and Closed-Source Android Apps. 186-208 - Md. Ahasanuzzaman
, Safwat Hassan
, Ahmed E. Hassan:
Studying Ad Library Integration Strategies of Top Free-to-Download Apps. 209-224 - André N. Meyer
, Chris Satterfield, Manuela Züger, Katja Kevic, Gail C. Murphy
, Thomas Zimmermann
, Thomas Fritz
:
Detecting Developers' Task Switches and Types. 225-240 - Hema Susmita Padala, Christopher J. Mendez, Felipe Fronchetti, Igor Steinmacher
, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Margaret Burnett
, Marco Aurélio Gerosa, Anita Sarma
:
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects. 241-259 - Ann Barcomb
, Klaas-Jan Stol
, Brian Fitzgerald, Dirk Riehle
:
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities. 260-277 - Huy Tu
, Zhe Yu
, Tim Menzies
:
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction). 278-294 - Héctor D. Menéndez, Michele Boreale
, Daniele Gorla
, David Clark
:
Output Sampling for Output Diversity in Automatic Unit Test Generation. 295-308 - Tongtong Xu
, Liushan Chen
, Yu Pei
, Tian Zhang, Minxue Pan
, Carlo A. Furia
:
Restore: Retrospective Fault Localization Enhancing Automated Program Repair. 309-326 - Jiachi Chen
, Xin Xia
, David Lo
, John C. Grundy
, Xiapu Luo
, Ting Chen
:
Defining Smart Contract Defects on Ethereum. 327-345 - Yu Wang
, Fengjuan Gao
, Linzhang Wang
, Tingting Yu
, Jianhua Zhao, Xuandong Li:
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software. 346-363
Volume 48, Number 3, March 2022
- Pedro Pinto
, João Bispo
, João M. P. Cardoso
, Jorge G. Barbosa
, Davide Gadioli
, Gianluca Palermo
, Jan Martinovic
, Martin Golasowski, Katerina Slaninová
, Radim Cmar, Cristina Silvano
:
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems. 732-754 - Mashel Albarak
, Rami Bahsoon
, Ipek Ozkaya
, Robert L. Nord
:
Managing Technical Debt in Database Normalization. 755-772 - Iris Reinhartz-Berger
, Anna Zamansky
:
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms. 773-785 - Chao Ni
, Xin Xia
, David Lo
, Xiang Chen
, Qing Gu:
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction. 786-802 - Giovani Guizzo
, Federica Sarro
, Jens Krinke
, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. 803-818 - Daniel Russo
, Klaas-Jan Stol
:
Gender Differences in Personality Traits of Software Engineers. 819-834 - Lisa Nguyen Quang Do
, James R. Wright
, Karim Ali
:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. 835-847 - Mario Janke
, Patrick Mäder
:
Graph Based Mining of Code Change Patterns From Version Control Commits. 848-863 - Chaima Abid, Marouane Kessentini
, Vahid Alizadeh
, Mouna Dhaouadi, Rick Kazman
:
How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. 864-878 - Hetong Dai
, Heng Li
, Che-Shao Chen, Weiyi Shang, Tse-Hsun Chen
:
Logram: Efficient Log Parsing Using $n$n-Gram Dictionaries. 879-892 - Rahul Krishna
, Chong Tang
, Kevin J. Sullivan, Baishakhi Ray:
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance. 893-909 - Minxue Pan
, Tongtong Xu
, Yu Pei
, Zhong Li, Tian Zhang, Xuandong Li:
GUI-Guided Test Script Repair for Mobile Apps. 910-929 - Nikolaos Tsantalis
, Ameya Ketkar
, Danny Dig:
RefactoringMiner 2.0. 930-950 - Mojtaba Bagherzadeh
, Nafiseh Kahani, Karim Jahed, Juergen Dingel:
Execution of Partial State Machine Models. 951-972 - Pengfei Gao
, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song
, Taolue Chen:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 973-1000 - Kun Qiu
, Zheng Zheng
, Tsong Yueh Chen
, Pak-Lok Poon
:
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition. 1001-1017 - Shivashree Vysali
, Shane McIntosh
, Bram Adams
:
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements. 1018-1029 - Hanefi Mercan
, Arsalan Javeed, Cemal Yilmaz
:
Flexible Combinatorial Interaction Testing. 1030-1066 - Peng Zhang
, Yanhui Li
, Wanwangying Ma, Yibiao Yang
, Lin Chen
, Hongmin Lu, Yuming Zhou
, Baowen Xu
:
CBUA: A Probabilistic, Predictive, and Practical Approach for Evaluating Test Suite Effectiveness. 1067-1096
Volume 48, Number 4, April 2022
- Jesús Sánchez Cuadrado
, Loli Burgueño
, Manuel Wimmer
, Antonio Vallecillo
:
Efficient Execution of ATL Model Transformations Using Static Analysis and Parallelism. 1097-1114 - Ting Su
, Lingling Fan
, Sen Chen
, Yang Liu
, Lihua Xu, Geguang Pu
, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. 1115-1137 - Ezekiel O. Soremekun
, Esteban Pavese, Nikolas Havrikov
, Lars Grunske
, Andreas Zeller:
Inputs From Hell. 1138-1153 - Mohammad Mehdi Pourhashem Kallehbasti
, Matteo Rossi
, Luciano Baresi
:
On How Bit-Vector Logic Can Help Verify LTL-Based Specifications. 1154-1168 - Xiangjuan Yao
, Gongjie Zhang
, Feng Pan
, Dunwei Gong
, Changqing Wei:
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing. 1169-1184 - Neng Zhang
, Qiao Huang, Xin Xia
, Ying Zou, David Lo
, Zhenchang Xing
:
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval. 1185-1211 - Mitchell J. Gerrard
, Mateus Borges, Matthew B. Dwyer
, Antonio Filieri
:
Conditional Quantitative Program Analysis. 1212-1227 - Dong Liu, He Jiang
, Xiaochen Li
, Zhilei Ren, Lei Qiao
, Zuohua Ding
:
DPWord2Vec: Better Representation of Design Patterns in Semantics. 1228-1248 - Lin Jiang
, Hui Liu
, He Jiang
, Lu Zhang
, Hong Mei:
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access. 1249-1267 - Hui Liu
, Mingzhu Shen, Jiaqi Zhu, Nan Niu
, Ge Li, Lu Zhang
:
Deep Learning Based Program Generation From Requirements Text: Are We There Yet? 1268-1289 - Di Liu, Yang Feng
, Xiaofang Zhang
, James A. Jones, Zhenyu Chen
:
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding. 1290-1308 - Zhixing Li
, Yue Yu
, Minghui Zhou
, Tao Wang, Gang Yin, Long Lan, Huaimin Wang:
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects. 1309-1335 - Baicai Sun
, Dunwei Gong
, Tian Tian
, Xiangjuan Yao
:
Integrating an Ensemble Surrogate Model's Estimation into Test Data Generation. 1336-1350 - Iflaah Salman
, Pilar Rodríguez
, Burak Turhan
, Ayse Tosun
, Arda Gureller:
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers? 1351-1368 - Raghvinder S. Sangwan
, Ashkan Negahban
, Robert L. Nord
, Ipek Ozkaya:
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value. 1369-1384 - Saikat Chakraborty
, Yangruibo Ding
, Miltiadis Allamanis
, Baishakhi Ray
:
CODIT: Code Editing With Tree-Based Neural Models. 1385-1399 - Gema Rodríguez-Pérez
, Meiyappan Nagappan
, Gregorio Robles
:
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project. 1400-1416 - Fei He
, Qianshan Yu, Liming Cai:
Efficient Summary Reuse for Software Regression Verification. 1417-1431 - Maurício Aniche
, Erick Maziero, Rafael S. Durelli
, Vinicius H. S. Durelli:
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring. 1432-1450 - Navid Teymourian
, Habib Izadkhah
, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. 1451-1462
Volume 48, Number 5, May 2022
- Yuan Huang
, Nan Jia
, Xiangping Chen
, Kai Hong, Zibin Zheng
:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. 1463-1479 - Supatsara Wattanakriengkrai
, Patanamon Thongtanunam
, Chakkrit Tantithamthavorn
, Hideaki Hata
, Kenichi Matsumoto
:
Predicting Defective Lines Using a Model-Agnostic Technique. 1480-1496 - Morteza Verdi, Ashkan Sami
, Jafar Akhondali, Foutse Khomh
, Gias Uddin
, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. 1497-1514 - Benjamin Shreeve
, Joseph Hallett
, Matthew Edwards
, Kopo M. Ramokapane, Richard Atkins, Awais Rashid
:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. 1515-1528 - Jinfu Chen
, Weiyi Shang, Emad Shihab:
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits. 1529-1544 - Meilun Li
, Andrea Turrini
, Ernst Moritz Hahn
, Zhikun She
, Lijun Zhang
:
Probabilistic Preference Planning Problem for Markov Decision Processes. 1545-1559 - Soumaya Rebai, Vahid Alizadeh
, Marouane Kessentini
, Houcem Fehri, Rick Kazman
:
Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring. 1560-1578 - Zainab Masood
, Rashina Hoda
, Kelly Blincoe
:
Real World Scrum A Grounded Theory of Variations in Practice. 1579-1591 - Ivan Pashchenko
, Henrik Plate
, Serena Elisa Ponta
, Antonino Sabetta
, Fabio Massacci
:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. 1592-1609 - Kristóf Marussy
, Oszkár Semeráth
, Dániel Varró
:
Automated Generation of Consistent Graph Models With Multiplicity Reasoning. 1610-1629 - Nico Ritschel
, Vladimir Kovalenko
, Reid Holmes
, Ronald Garcia, David C. Shepherd
:
Comparing Block-Based Programming Models for Two-Armed Robots. 1630-1643 - Bartosz Papis
, Konrad Grochowski
, Kamil Subzda
, Kamil Sijko:
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project. 1644-1664 - Wentao Wang
, Faryn Dumont, Nan Niu
, Glen Horton
:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. 1665-1675 - Zhe Yu
, Fahmid Morshed Fahid
, Huy Tu
, Tim Menzies
:
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach. 1676-1691 - Zohreh Sharafi
, Ian Bertram
, Michael Flanagan
, Westley Weimer:
Eyes on Code: A Study on Developers' Code Navigation Strategies. 1692-1704 - George Digkas
, Alexander Chatzigeorgiou
, Apostolos Ampatzoglou
, Paris Avgeriou
:
Can Clean New Code Reduce Technical Debt Density? 1705-1721 - Mohammad Bajammal
, Andrea Stocco
, Davood Mazinanian, Ali Mesbah
:
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks. 1722-1742 - Yingzhe He
, Guozhu Meng
, Kai Chen
, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. 1743-1770 - Miqing Li
, Tao Chen
, Xin Yao:
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance. 1771-1799 - Shangqing Liu
, Cuiyun Gao
, Sen Chen
, Lun Yiu Nie, Yang Liu
:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. 1800-1817 - Waqar Hussain
, Harsha Perera
, Jon Whittle
, Arif Nurwidyantoro
, Rashina Hoda
, Rifat Ara Shams
, Gillian C. Oliver
:
Human Values in Software Engineering: Contrasting Case Studies of Practice. 1818-1833
Volume 48, Number 6, June 2022
- Tingting Bi, Xin Xia
, David Lo
, John C. Grundy
, Thomas Zimmermann
:
An Empirical Study of Release Note Production and Usage in Practice. 1834-1852 - Bhaveet Nagaria
, Tracy Hall
:
How Software Developers Mitigate Their Errors When Developing Code. 1853-1867 - Federica Sarro
, Rebecca Moussa
, Alessio Petrozziello, Mark Harman:
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates. 1868-1882 - Zachary Eberhart
, Aakash Bansal, Collin McMillan:
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant. 1883-1904 - Qusay Idrees Sarhan
, Bestoun S. Ahmed
, Miroslav Bures
, Kamal Z. Zamli
:
Software Module Clustering: An In-Depth Literature Analysis. 1905-1928 - Jorge Melegati
, Henry Edison
, Xiaofeng Wang
:
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups. 1929-1946 - Xavier Franch
, Daniel Méndez
, Andreas Vogelsang
, Rogardt Heldal, Eric Knauss
, Marc Oriol, Guilherme H. Travassos
, Jeffrey C. Carver
, Thomas Zimmermann
:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? 1947-1964 - Maureen Keegan
, Víctor A. Braberman, Nicolás D'Ippolito
, Nir Piterman, Sebastián Uchitel
:
Control and Discovery of Environment Behaviour. 1965-1978 - Zi Peng, Tse-Hsun Chen
, Jinqiu Yang:
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies. 1979-1993 - Tianpei Xia