default search action
IEEE Transactions on Software Engineering, Volume 48
Volume 48, Number 2, February 2022
- Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. 364-376 - Jose Ricardo da Silva Junior, Daniel Prett Campagna, Esteban Clua, Anita Sarma, Leonardo Murta:
Dominoes: An Interactive Exploratory Data Analysis Tool for Software Relationships. 377-396 - Esther Guerra, Juan de Lara, Marsha Chechik, Rick Salay:
Property Satisfiability Analysis for Product Lines of Modelling Languages. 397-416 - Maxime Lamothe, Weiyi Shang, Tse-Hsun Peter Chen:
A3: Assisting Android API Migrations Using Code Examples. 417-431 - Beatriz Bernárdez, Amador Durán, José Antonio Parejo, Natalia Juristo, Antonio Ruiz-Cortés:
Effects of Mindfulness on Conceptual Modeling Performance: A Series of Experiments. 432-452 - Jackson A. Prado Lima, Silvia Regina Vergilio:
A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. 453-465 - Pilar Rodríguez, Cathy Urquhart, Emilia Mendes:
A Theory of Value for Value-Based Feature Selection in Software Engineering. 466-484 - Yuxing Ma, Audris Mockus, Russell Zaretzki, Randy V. Bradley, Bogdan C. Bichescu:
A Methodology for Analyzing Uptake of Software Technologies Among Developers. 485-501 - Aaditya Bhatia, Shaowei Wang, Muhammad Asaduzzaman, Ahmed E. Hassan:
A Study of Bug Management Using the Stack Exchange Question and Answering Platform. 502-518 - Yanjie Jiang, Hui Liu, Jiahao Jin, Lu Zhang:
Automated Expansion of Abbreviations Based on Semantic Relation and Transfer Expansion. 519-537 - Guoxin Su, Li Liu, Minjie Zhang, David S. Rosenblum:
Quantitative Verification for Monitoring Event-Streaming Systems. 538-550 - Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. 551-570 - Hao Zhong, Xiaoyin Wang, Hong Mei:
Inferring Bug Signatures to Detect Real Bugs. 571-584 - Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand:
Automatic Generation of Acceptance Test Cases From Use Case Specifications: An NLP-Based Approach. 585-616 - Fabrizio Pastore, Daniela Micucci, Michell Guzmán, Leonardo Mariani:
TkT: Automatic Inference of Timed and Extended Pushdown Automata. 617-636 - Manish Motwani, Mauricio Soto, Yuriy Brun, René Just, Claire Le Goues:
Quality of Automated Program Repair on Real-World Defects. 637-661 - Jie Lu, Feng Li, Chen Liu, Lian Li, Xiaobing Feng, Jingling Xue:
CloudRaid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement. 662-677 - Lisa Nguyen Quang Do, Eric Bodden:
Explaining Static Analysis With Rule Graphs. 678-690 - Shaoying Liu, Shin Nakajima:
Automatic Test Case and Test Oracle Generation Based on Functional Scenarios in Formal Specifications for Conformance Testing. 691-712 - Francisca Pérez, Tewfik Ziadi, Carlos Cetina:
Utilizing Automatic Query Reformulations as Genetic Operations to Improve Feature Location in Software Models. 713-731 - Jie M. Zhang, Mark Harman, Lei Ma, Yang Liu:
Machine Learning Testing: Survey, Landscapes and Horizons. 1-36 - Dror G. Feitelson, Ayelet Mizrahi, Nofar Noy, Aviad Ben Shabat, Or Eliyahu, Roy Sheffer:
How Developers Choose Names. 37-52 - Carlos Sáenz-Adán, Beatriz Pérez, Francisco J. García Izquierdo, Luc Moreau:
Integrating Provenance Capture and UML With UML2PROV: Principles and Experience. 53-68 - Toshiki Hirao, Shane McIntosh, Akinori Ihara, Kenichi Matsumoto:
Code Reviews With Divergent Review Scores: An Empirical Study of the OpenStack and Qt Communities. 69-81 - Meng Yan, Xin Xia, Yuanrui Fan, Ahmed E. Hassan, David Lo, Shanping Li:
Just-In-Time Defect Identification and Localization: A Two-Phase Framework. 82-101 - Wenhua Wang, Yuqun Zhang, Yulei Sui, Yao Wan, Zhou Zhao, Jian Wu, Philip S. Yu, Guandong Xu:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. 102-119 - Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. 120-134 - Sebastian Baltes, Christoph Treude, Martin P. Robillard:
Contextual Documentation Referencing on Stack Overflow. 135-149 - Qiang He, Bo Li, Feifei Chen, John C. Grundy, Xin Xia, Yun Yang:
Diversified Third-Party Library Prediction for Mobile App Development. 150-165 - Jirayus Jiarpakdee, Chakkrit Kla Tantithamthavorn, Hoa Khanh Dam, John C. Grundy:
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models. 166-185 - Camilo Escobar-Velásquez, Mario Linares-Vásquez, Gabriele Bavota, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk:
Enabling Mutant Generation for Open- and Closed-Source Android Apps. 186-208 - Md. Ahasanuzzaman, Safwat Hassan, Ahmed E. Hassan:
Studying Ad Library Integration Strategies of Top Free-to-Download Apps. 209-224 - André N. Meyer, Chris Satterfield, Manuela Züger, Katja Kevic, Gail C. Murphy, Thomas Zimmermann, Thomas Fritz:
Detecting Developers' Task Switches and Types. 225-240 - Hema Susmita Padala, Christopher J. Mendez, Felipe Fronchetti, Igor Steinmacher, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Margaret Burnett, Marco Aurélio Gerosa, Anita Sarma:
How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects. 241-259 - Ann Barcomb, Klaas-Jan Stol, Brian Fitzgerald, Dirk Riehle:
Managing Episodic Volunteers in Free/Libre/Open Source Software Communities. 260-277 - Huy Tu, Zhe Yu, Tim Menzies:
Better Data Labelling With EMBLEM (and how that Impacts Defect Prediction). 278-294 - Héctor D. Menéndez, Michele Boreale, Daniele Gorla, David Clark:
Output Sampling for Output Diversity in Automatic Unit Test Generation. 295-308 - Tongtong Xu, Liushan Chen, Yu Pei, Tian Zhang, Minxue Pan, Carlo A. Furia:
Restore: Retrospective Fault Localization Enhancing Automated Program Repair. 309-326 - Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
Defining Smart Contract Defects on Ethereum. 327-345 - Yu Wang, Fengjuan Gao, Linzhang Wang, Tingting Yu, Jianhua Zhao, Xuandong Li:
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software. 346-363
Volume 48, Number 3, March 2022
- Pedro Pinto, João Bispo, João M. P. Cardoso, Jorge G. Barbosa, Davide Gadioli, Gianluca Palermo, Jan Martinovic, Martin Golasowski, Katerina Slaninová, Radim Cmar, Cristina Silvano:
Pegasus: Performance Engineering for Software Applications Targeting HPC Systems. 732-754 - Mashel Albarak, Rami Bahsoon, Ipek Ozkaya, Robert L. Nord:
Managing Technical Debt in Database Normalization. 755-772 - Iris Reinhartz-Berger, Anna Zamansky:
Reuse of Similarly Behaving Software Through Polymorphism-Inspired Variability Mechanisms. 773-785 - Chao Ni, Xin Xia, David Lo, Xiang Chen, Qing Gu:
Revisiting Supervised and Unsupervised Methods for Effort-Aware Cross-Project Defect Prediction. 786-802 - Giovani Guizzo, Federica Sarro, Jens Krinke, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. 803-818 - Daniel Russo, Klaas-Jan Stol:
Gender Differences in Personality Traits of Software Engineers. 819-834 - Lisa Nguyen Quang Do, James R. Wright, Karim Ali:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. 835-847 - Mario Janke, Patrick Mäder:
Graph Based Mining of Code Change Patterns From Version Control Commits. 848-863 - Chaima Abid, Marouane Kessentini, Vahid Alizadeh, Mouna Dhaouadi, Rick Kazman:
How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. 864-878 - Hetong Dai, Heng Li, Che-Shao Chen, Weiyi Shang, Tse-Hsun Chen:
Logram: Efficient Log Parsing Using $n$n-Gram Dictionaries. 879-892 - Rahul Krishna, Chong Tang, Kevin J. Sullivan, Baishakhi Ray:
ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance. 893-909 - Minxue Pan, Tongtong Xu, Yu Pei, Zhong Li, Tian Zhang, Xuandong Li:
GUI-Guided Test Script Repair for Mobile Apps. 910-929 - Nikolaos Tsantalis, Ameya Ketkar, Danny Dig:
RefactoringMiner 2.0. 930-950 - Mojtaba Bagherzadeh, Nafiseh Kahani, Karim Jahed, Juergen Dingel:
Execution of Partial State Machine Models. 951-972 - Pengfei Gao, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song, Taolue Chen:
Formal Verification of Masking Countermeasures for Arithmetic Programs. 973-1000 - Kun Qiu, Zheng Zheng, Tsong Yueh Chen, Pak-Lok Poon:
Theoretical and Empirical Analyses of the Effectiveness of Metamorphic Relation Composition. 1001-1017 - Shivashree Vysali, Shane McIntosh, Bram Adams:
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements. 1018-1029 - Hanefi Mercan, Arsalan Javeed, Cemal Yilmaz:
Flexible Combinatorial Interaction Testing. 1030-1066 - Peng Zhang, Yanhui Li, Wanwangying Ma, Yibiao Yang, Lin Chen, Hongmin Lu, Yuming Zhou, Baowen Xu:
CBUA: A Probabilistic, Predictive, and Practical Approach for Evaluating Test Suite Effectiveness. 1067-1096
Volume 48, Number 4, April 2022
- Jesús Sánchez Cuadrado, Loli Burgueño, Manuel Wimmer, Antonio Vallecillo:
Efficient Execution of ATL Model Transformations Using Static Analysis and Parallelism. 1097-1114 - Ting Su, Lingling Fan, Sen Chen, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. 1115-1137 - Ezekiel O. Soremekun, Esteban Pavese, Nikolas Havrikov, Lars Grunske, Andreas Zeller:
Inputs From Hell. 1138-1153 - Mohammad Mehdi Pourhashem Kallehbasti, Matteo Rossi, Luciano Baresi:
On How Bit-Vector Logic Can Help Verify LTL-Based Specifications. 1154-1168 - Xiangjuan Yao, Gongjie Zhang, Feng Pan, Dunwei Gong, Changqing Wei:
Orderly Generation of Test Data via Sorting Mutant Branches Based on Their Dominance Degrees for Weak Mutation Testing. 1169-1184 - Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing:
Chatbot4QR: Interactive Query Refinement for Technical Question Retrieval. 1185-1211 - Mitchell J. Gerrard, Mateus Borges, Matthew B. Dwyer, Antonio Filieri:
Conditional Quantitative Program Analysis. 1212-1227 - Dong Liu, He Jiang, Xiaochen Li, Zhilei Ren, Lei Qiao, Zuohua Ding:
DPWord2Vec: Better Representation of Design Patterns in Semantics. 1228-1248 - Lin Jiang, Hui Liu, He Jiang, Lu Zhang, Hong Mei:
Heuristic and Neural Network Based Prediction of Project-Specific API Member Access. 1249-1267 - Hui Liu, Mingzhu Shen, Jiaqi Zhu, Nan Niu, Ge Li, Lu Zhang:
Deep Learning Based Program Generation From Requirements Text: Are We There Yet? 1268-1289 - Di Liu, Yang Feng, Xiaofang Zhang, James A. Jones, Zhenyu Chen:
Clustering Crowdsourced Test Reports of Mobile Applications Using Image Understanding. 1290-1308 - Zhixing Li, Yue Yu, Minghui Zhou, Tao Wang, Gang Yin, Long Lan, Huaimin Wang:
Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects. 1309-1335 - Baicai Sun, Dunwei Gong, Tian Tian, Xiangjuan Yao:
Integrating an Ensemble Surrogate Model's Estimation into Test Data Generation. 1336-1350 - Iflaah Salman, Pilar Rodríguez, Burak Turhan, Ayse Tosun, Arda Gureller:
What Leads to a Confirmatory or Disconfirmatory Behavior of Software Testers? 1351-1368 - Raghvinder S. Sangwan, Ashkan Negahban, Robert L. Nord, Ipek Ozkaya:
Optimization of Software Release Planning Considering Architectural Dependencies, Cost, and Value. 1369-1384 - Saikat Chakraborty, Yangruibo Ding, Miltiadis Allamanis, Baishakhi Ray:
CODIT: Code Editing With Tree-Based Neural Models. 1385-1399 - Gema Rodríguez-Pérez, Meiyappan Nagappan, Gregorio Robles:
Watch Out for Extrinsic Bugs! A Case Study of Their Impact in Just-In-Time Bug Prediction Models on the OpenStack Project. 1400-1416 - Fei He, Qianshan Yu, Liming Cai:
Efficient Summary Reuse for Software Regression Verification. 1417-1431 - Maurício Aniche, Erick Maziero, Rafael S. Durelli, Vinicius H. S. Durelli:
The Effectiveness of Supervised Machine Learning Algorithms in Predicting Software Refactoring. 1432-1450 - Navid Teymourian, Habib Izadkhah, Ayaz Isazadeh:
A Fast Clustering Algorithm for Modularization of Large-Scale Software Systems. 1451-1462
Volume 48, Number 5, May 2022
- Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng:
Code Review Knowledge Perception: Fusing Multi-Features for Salient-Class Location. 1463-1479 - Supatsara Wattanakriengkrai, Patanamon Thongtanunam, Chakkrit Tantithamthavorn, Hideaki Hata, Kenichi Matsumoto:
Predicting Defective Lines Using a Model-Agnostic Technique. 1480-1496 - Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin, Alireza Karami Motlagh:
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. 1497-1514 - Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. 1515-1528 - Jinfu Chen, Weiyi Shang, Emad Shihab:
PerfJIT: Test-Level Just-in-Time Prediction for Performance Regression Introducing Commits. 1529-1544 - Meilun Li, Andrea Turrini, Ernst Moritz Hahn, Zhikun She, Lijun Zhang:
Probabilistic Preference Planning Problem for Markov Decision Processes. 1545-1559 - Soumaya Rebai, Vahid Alizadeh, Marouane Kessentini, Houcem Fehri, Rick Kazman:
Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring. 1560-1578 - Zainab Masood, Rashina Hoda, Kelly Blincoe:
Real World Scrum A Grounded Theory of Variations in Practice. 1579-1591 - Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci:
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. 1592-1609 - Kristóf Marussy, Oszkár Semeráth, Dániel Varró:
Automated Generation of Consistent Graph Models With Multiplicity Reasoning. 1610-1629 - Nico Ritschel, Vladimir Kovalenko, Reid Holmes, Ronald Garcia, David C. Shepherd:
Comparing Block-Based Programming Models for Two-Armed Robots. 1630-1643 - Bartosz Papis, Konrad Grochowski, Kamil Subzda, Kamil Sijko:
Experimental Evaluation of Test-Driven Development With Interns Working on a Real Industrial Project. 1644-1664 - Wentao Wang, Faryn Dumont, Nan Niu, Glen Horton:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. 1665-1675 - Zhe Yu, Fahmid Morshed Fahid, Huy Tu, Tim Menzies:
Identifying Self-Admitted Technical Debts With Jitterbug: A Two-Step Approach. 1676-1691 - Zohreh Sharafi, Ian Bertram, Michael Flanagan, Westley Weimer:
Eyes on Code: A Study on Developers' Code Navigation Strategies. 1692-1704 - George Digkas, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Paris Avgeriou:
Can Clean New Code Reduce Technical Debt Density? 1705-1721 - Mohammad Bajammal, Andrea Stocco, Davood Mazinanian, Ali Mesbah:
A Survey on the Use of Computer Vision to Improve Software Engineering Tasks. 1722-1742 - Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. 1743-1770 - Miqing Li, Tao Chen, Xin Yao:
How to Evaluate Solutions in Pareto-Based Search-Based Software Engineering: A Critical Review and Methodological Guidance. 1771-1799 - Shangqing Liu, Cuiyun Gao, Sen Chen, Lun Yiu Nie, Yang Liu:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. 1800-1817 - Waqar Hussain, Harsha Perera, Jon Whittle, Arif Nurwidyantoro, Rashina Hoda, Rifat Ara Shams, Gillian C. Oliver:
Human Values in Software Engineering: Contrasting Case Studies of Practice. 1818-1833
Volume 48, Number 6, June 2022
- Tingting Bi, Xin Xia, David Lo, John C. Grundy, Thomas Zimmermann:
An Empirical Study of Release Note Production and Usage in Practice. 1834-1852 - Bhaveet Nagaria, Tracy Hall:
How Software Developers Mitigate Their Errors When Developing Code. 1853-1867 - Federica Sarro, Rebecca Moussa, Alessio Petrozziello, Mark Harman:
Learning From Mistakes: Machine Learning Enhanced Human Expert Effort Estimates. 1868-1882 - Zachary Eberhart, Aakash Bansal, Collin McMillan:
A Wizard of Oz Study Simulating API Usage Dialogues With a Virtual Assistant. 1883-1904 - Qusay Idrees Sarhan, Bestoun S. Ahmed, Miroslav Bures, Kamal Z. Zamli:
Software Module Clustering: An In-Depth Literature Analysis. 1905-1928 - Jorge Melegati, Henry Edison, Xiaofeng Wang:
XPro: A Model to Explain the Limited Adoption and Implementation of Experimentation in Software Startups. 1929-1946 - Xavier Franch, Daniel Méndez, Andreas Vogelsang, Rogardt Heldal, Eric Knauss, Marc Oriol, Guilherme H. Travassos, Jeffrey C. Carver, Thomas Zimmermann:
How do Practitioners Perceive the Relevance of Requirements Engineering Research? 1947-1964 - Maureen Keegan, Víctor A. Braberman, Nicolás D'Ippolito, Nir Piterman, Sebastián Uchitel:
Control and Discovery of Environment Behaviour. 1965-1978 - Zi Peng, Tse-Hsun Chen, Jinqiu Yang:
Revisiting Test Impact Analysis in Continuous Testing From the Perspective of Code Dependencies. 1979-1993 - Tianpei Xia, Rui Shu, Xipeng Shen, Tim Menzies:
Sequential Model Optimization for Software Effort Estimation. 1994-2009