callback( { "result":{ "query":":facetid:toc:\"db/conf/esem/esem2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.51" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"59", "@dc":"59", "@oc":"59", "@id":"43380104", "text":":facetid:toc:db/conf/esem/esem2016.bht" } }, "hits":{ "@total":"59", "@computed":"59", "@sent":"59", "@first":"0", "hit":[{ "@score":"1", "@id":"3241535", "info":{"authors":{"author":[{"@pid":"186/0407","text":"Nemitari Ajienka"},{"@pid":"32/5889","text":"Andrea Capiluppi"}]},"title":"Semantic Coupling Between Classes: Corpora or Identifiers?","venue":"ESEM","pages":"40:1-40:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/AjienkaC16","doi":"10.1145/2961111.2962622","ee":"https://doi.org/10.1145/2961111.2962622","url":"https://dblp.org/rec/conf/esem/AjienkaC16"}, "url":"URL#3241535" }, { "@score":"1", "@id":"3241536", "info":{"authors":{"author":[{"@pid":"26/9982","text":"Afnan A. Al-Subaihin"},{"@pid":"18/7526","text":"Federica Sarro"},{"@pid":"91/3071","text":"Sue Black 0001"},{"@pid":"80/3200","text":"Licia Capra"},{"@pid":"h/MarkHarman","text":"Mark Harman"},{"@pid":"44/4993-1","text":"Yue Jia 0001"},{"@pid":"23/6185-3","text":"Yuanyuan Zhang 0003"}]},"title":"Clustering Mobile Apps Based on Mined Textual Features.","venue":"ESEM","pages":"38:1-38:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Al-SubaihinSBCH16","doi":"10.1145/2961111.2962600","ee":"https://doi.org/10.1145/2961111.2962600","url":"https://dblp.org/rec/conf/esem/Al-SubaihinSBCH16"}, "url":"URL#3241536" }, { "@score":"1", "@id":"3241537", "info":{"authors":{"author":[{"@pid":"150/8823","text":"S. M. Didar Al Alam"},{"@pid":"p/DietmarPfahl","text":"Dietmar Pfahl"},{"@pid":"42/6131","text":"Guenther Ruhe"}]},"title":"Release Readiness Classification: An Explorative Case Study.","venue":"ESEM","pages":"27:1-27:7","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/AlamPR16","doi":"10.1145/2961111.2962629","ee":"https://doi.org/10.1145/2961111.2962629","url":"https://dblp.org/rec/conf/esem/AlamPR16"}, "url":"URL#3241537" }, { "@score":"1", "@id":"3241538", "info":{"authors":{"author":{"@pid":"37/10608","text":"Nauman Bin Ali"}},"title":"Is effectiveness sufficient to choose an intervention?: Considering resource use in empirical software engineering.","venue":"ESEM","pages":"54:1-54:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Ali16","doi":"10.1145/2961111.2962631","ee":"https://doi.org/10.1145/2961111.2962631","url":"https://dblp.org/rec/conf/esem/Ali16"}, "url":"URL#3241538" }, { "@score":"1", "@id":"3241539", "info":{"authors":{"author":[{"@pid":"186/0406","text":"Joop Aué"},{"@pid":"186/0412","text":"Michiel Haisma"},{"@pid":"186/0424","text":"Kristín Fjóla Tómasdóttir"},{"@pid":"83/5261","text":"Alberto Bacchelli"}]},"title":"Social Diversity and Growth Levels of Open Source Software Projects on GitHub.","venue":"ESEM","pages":"41:1-41:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/AueHTB16","doi":"10.1145/2961111.2962633","ee":"https://doi.org/10.1145/2961111.2962633","url":"https://dblp.org/rec/conf/esem/AueHTB16"}, "url":"URL#3241539" }, { "@score":"1", "@id":"3241541", "info":{"authors":{"author":[{"@pid":"145/3950","text":"Sebastian Baltes"},{"@pid":"d/StephanDiehl1","text":"Stephan Diehl 0001"}]},"title":"Worse Than Spam: Issues In Sampling Software Developers.","venue":"ESEM","pages":"52:1-52:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Baltes016","doi":"10.1145/2961111.2962628","ee":"https://doi.org/10.1145/2961111.2962628","url":"https://dblp.org/rec/conf/esem/Baltes016"}, "url":"URL#3241541" }, { "@score":"1", "@id":"3241542", "info":{"authors":{"author":[{"@pid":"117/4593","text":"Ricardo Britto 0001"},{"@pid":"30/4138","text":"Darja Smite"},{"@pid":"34/1211","text":"Lars-Ola Damm"}]},"title":"Experiences from Measuring Learning and Performance in Large-Scale Distributed Software Development.","venue":"ESEM","pages":"17:1-17:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/BrittoSD16","doi":"10.1145/2961111.2962636","ee":"https://doi.org/10.1145/2961111.2962636","url":"https://dblp.org/rec/conf/esem/BrittoSD16"}, "url":"URL#3241542" }, { "@score":"1", "@id":"3241543", "info":{"authors":{"author":[{"@pid":"48/5662","text":"Fabio Calefato"},{"@pid":"29/4646","text":"Filippo Lanubile"},{"@pid":"09/1798","text":"Nicole Novielli"}]},"title":"Moving to Stack Overflow: Best-Answer Prediction in Legacy Developer Forums.","venue":"ESEM","pages":"13:1-13:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CalefatoLN16","doi":"10.1145/2961111.2962585","ee":"https://doi.org/10.1145/2961111.2962585","url":"https://dblp.org/rec/conf/esem/CalefatoLN16"}, "url":"URL#3241543" }, { "@score":"1", "@id":"3241544", "info":{"authors":{"author":[{"@pid":"144/8274","text":"Bruno Cartaxo"},{"@pid":"36/11116-1","text":"Gustavo Pinto 0001"},{"@pid":"186/0408","text":"Elton Vieira"},{"@pid":"58/232","text":"Sérgio Soares"}]},"title":"Evidence Briefings: Towards a Medium to Transfer Knowledge from Systematic Reviews to Practitioners.","venue":"ESEM","pages":"57:1-57:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CartaxoPVS16","doi":"10.1145/2961111.2962603","ee":"https://doi.org/10.1145/2961111.2962603","url":"https://dblp.org/rec/conf/esem/CartaxoPVS16"}, "url":"URL#3241544" }, { "@score":"1", "@id":"3241545", "info":{"authors":{"author":[{"@pid":"c/JeffreyCCarver","text":"Jeffrey C. Carver"},{"@pid":"24/1437","text":"Oscar Dieste"},{"@pid":"31/2231","text":"Nicholas A. Kraft"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"19/3622-1","text":"Thomas Zimmermann 0001"}]},"title":"How Practitioners Perceive the Relevance of ESEM Research.","venue":"ESEM","pages":"56:1-56:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CarverDKL016","doi":"10.1145/2961111.2962597","ee":"https://doi.org/10.1145/2961111.2962597","url":"https://dblp.org/rec/conf/esem/CarverDKL016"}, "url":"URL#3241545" }, { "@score":"1", "@id":"3241546", "info":{"authors":{"author":[{"@pid":"52/3888","text":"Mariano Ceccato"},{"@pid":"82/5205","text":"Riccardo Scandariato"}]},"title":"Static Analysis and Penetration Testing from the Perspective of Maintenance Teams.","venue":"ESEM","pages":"25:1-25:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CeccatoS16","doi":"10.1145/2961111.2962611","ee":"https://doi.org/10.1145/2961111.2962611","url":"https://dblp.org/rec/conf/esem/CeccatoS16"}, "url":"URL#3241546" }, { "@score":"1", "@id":"3241547", "info":{"authors":{"author":[{"@pid":"180/7246","text":"Chunyang Chen"},{"@pid":"52/6482","text":"Zhenchang Xing"}]},"title":"Mining Technology Landscape from Stack Overflow.","venue":"ESEM","pages":"14:1-14:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ChenX16","doi":"10.1145/2961111.2962588","ee":"https://doi.org/10.1145/2961111.2962588","url":"https://dblp.org/rec/conf/esem/ChenX16"}, "url":"URL#3241547" }, { "@score":"1", "@id":"3241548", "info":{"authors":{"author":[{"@pid":"180/3214","text":"José Adson O. G. da Cunha"},{"@pid":"66/5081","text":"Fabio Q. B. da Silva"},{"@pid":"03/6598","text":"Hermano P. de Moura"},{"@pid":"54/2705","text":"Francisco J. S. Vasconcellos"}]},"title":"Towards a Substantive Theory of Decision-Making in Software Project Management: Preliminary Findings from a Qualitative Study.","venue":"ESEM","pages":"20:1-20:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/CunhaSMV16","doi":"10.1145/2961111.2962604","ee":"https://doi.org/10.1145/2961111.2962604","url":"https://dblp.org/rec/conf/esem/CunhaSMV16"}, "url":"URL#3241548" }, { "@score":"1", "@id":"3241550", "info":{"authors":{"author":[{"@pid":"163/5362","text":"Jorge Echeverría"},{"@pid":"17/4106","text":"Francisca Pérez 0001"},{"@pid":"186/0422","text":"Andrés Abellanas"},{"@pid":"97/5511","text":"José Ignacio Panach"},{"@pid":"67/4958","text":"Carlos Cetina"},{"@pid":"p/OscarPastor","text":"Oscar Pastor 0001"}]},"title":"Evaluating Bug-Fixing in Software Product Lines: an Industrial Case Study.","venue":"ESEM","pages":"24:1-24:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/EcheverriaPAPCP16","doi":"10.1145/2961111.2962635","ee":"https://doi.org/10.1145/2961111.2962635","url":"https://dblp.org/rec/conf/esem/EcheverriaPAPCP16"}, "url":"URL#3241550" }, { "@score":"1", "@id":"3241551", "info":{"authors":{"author":[{"@pid":"53/8384","text":"Kátia Romero Felizardo"},{"@pid":"m/EMendes","text":"Emilia Mendes"},{"@pid":"38/3792","text":"Marcos Kalinowski"},{"@pid":"92/7665","text":"Érica Ferreira de Souza"},{"@pid":"39/841","text":"Nandamudi L. Vijaykumar"}]},"title":"Using Forward Snowballing to update Systematic Reviews in Software Engineering.","venue":"ESEM","pages":"53:1-53:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/FelizardoMKSV16","doi":"10.1145/2961111.2962630","ee":"https://doi.org/10.1145/2961111.2962630","url":"https://dblp.org/rec/conf/esem/FelizardoMKSV16"}, "url":"URL#3241551" }, { "@score":"1", "@id":"3241552", "info":{"authors":{"author":[{"@pid":"150/9014","text":"A. César C. França"},{"@pid":"81/8107","text":"Eduardo Peixoto"},{"@pid":"186/0404","text":"Bruno Falcão"},{"@pid":"36/9791","text":"Cleviton V. F. Monteiro"}]},"title":"The Obscure Process of Innovation Assessment: A Report of an Industrial Survey.","venue":"ESEM","pages":"51:1-51:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/FrancaPFM16","doi":"10.1145/2961111.2962634","ee":"https://doi.org/10.1145/2961111.2962634","url":"https://dblp.org/rec/conf/esem/FrancaPFM16"}, "url":"URL#3241552" }, { "@score":"1", "@id":"3241553", "info":{"authors":{"author":[{"@pid":"70/9016","text":"Davide Fucci"},{"@pid":"45/4173","text":"Giuseppe Scanniello"},{"@pid":"13/10505-1","text":"Simone Romano 0001"},{"@pid":"08/3451","text":"Martin J. Shepperd"},{"@pid":"148/1317","text":"Boyce Sigweni"},{"@pid":"67/2436","text":"Fernando Uyaguari Uyaguari"},{"@pid":"62/1974","text":"Burak Turhan"},{"@pid":"35/4144","text":"Natalia Juristo"},{"@pid":"49/2801","text":"Markku Oivo"}]},"title":"An External Replication on the Effects of Test-driven Development Using a Multi-site Blind Analysis Approach.","venue":"ESEM","pages":"3:1-3:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/FucciS0SSUTJO16","doi":"10.1145/2961111.2962592","ee":"https://doi.org/10.1145/2961111.2962592","url":"https://dblp.org/rec/conf/esem/FucciS0SSUTJO16"}, "url":"URL#3241553" }, { "@score":"1", "@id":"3241554", "info":{"authors":{"author":[{"@pid":"139/3865","text":"Anurag Goswami"},{"@pid":"00/6421","text":"Gursimran S. Walia"},{"@pid":"182/2634","text":"Mark E. McCourt"},{"@pid":"186/0425","text":"Ganesh Padmanabhan"}]},"title":"Using Eye Tracking to Investigate Reading Patterns and Learning Styles of Software Requirement Inspectors to Enhance Inspection Team Outcome.","venue":"ESEM","pages":"34:1-34:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/GoswamiWMP16","doi":"10.1145/2961111.2962598","ee":"https://doi.org/10.1145/2961111.2962598","url":"https://dblp.org/rec/conf/esem/GoswamiWMP16"}, "url":"URL#3241554" }, { "@score":"1", "@id":"3241555", "info":{"authors":{"author":[{"@pid":"17/6400","text":"Xue Han"},{"@pid":"51/8403","text":"Tingting Yu"}]},"title":"An Empirical Study on Performance Bugs for Highly Configurable Software Systems.","venue":"ESEM","pages":"23:1-23:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HanY16","doi":"10.1145/2961111.2962602","ee":"https://doi.org/10.1145/2961111.2962602","url":"https://dblp.org/rec/conf/esem/HanY16"}, "url":"URL#3241555" }, { "@score":"1", "@id":"3241556", "info":{"authors":{"author":[{"@pid":"180/2030","text":"Anandi Hira"},{"@pid":"b/BarryWBoehm","text":"Barry W. Boehm"}]},"title":"Function Point Analysis for Software Maintenance.","venue":"ESEM","pages":"48:1-48:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HiraB16","doi":"10.1145/2961111.2962613","ee":"https://doi.org/10.1145/2961111.2962613","url":"https://dblp.org/rec/conf/esem/HiraB16"}, "url":"URL#3241556" }, { "@score":"1", "@id":"3241557", "info":{"authors":{"author":[{"@pid":"180/2030","text":"Anandi Hira"},{"@pid":"b/BarryWBoehm","text":"Barry W. Boehm"}]},"title":"Using Software Non-Functional Assessment Process to Complement Function Points for Software Maintenance.","venue":"ESEM","pages":"50:1-50:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HiraB16a","doi":"10.1145/2961111.2962615","ee":"https://doi.org/10.1145/2961111.2962615","url":"https://dblp.org/rec/conf/esem/HiraB16a"}, "url":"URL#3241557" }, { "@score":"1", "@id":"3241558", "info":{"authors":{"author":[{"@pid":"129/0254","text":"Daniel Honsel"},{"@pid":"160/6018","text":"Verena Honsel"},{"@pid":"150/0093","text":"Marlon Welter"},{"@pid":"w/StephanWaack","text":"Stephan Waack"},{"@pid":"g/JensGrabowski","text":"Jens Grabowski"}]},"title":"Monitoring Software Quality by Means of Simulation Methods.","venue":"ESEM","pages":"11:1-11:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HonselHWWG16","doi":"10.1145/2961111.2962617","ee":"https://doi.org/10.1145/2961111.2962617","url":"https://dblp.org/rec/conf/esem/HonselHWWG16"}, "url":"URL#3241558" }, { "@score":"1", "@id":"3241559", "info":{"authors":{"author":[{"@pid":"31/4943","text":"Aram Hovsepyan"},{"@pid":"82/5205","text":"Riccardo Scandariato"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Is Newer Always Better?: The Case of Vulnerability Prediction Models.","venue":"ESEM","pages":"26:1-26:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HovsepyanSJ16","doi":"10.1145/2961111.2962612","ee":"https://doi.org/10.1145/2961111.2962612","url":"https://dblp.org/rec/conf/esem/HovsepyanSJ16"}, "url":"URL#3241559" }, { "@score":"1", "@id":"3241560", "info":{"authors":{"author":[{"@pid":"46/7506","text":"Wenhua Hu"},{"@pid":"c/JeffreyCCarver","text":"Jeffrey C. Carver"},{"@pid":"183/9159","text":"Vaibhav K. Anu"},{"@pid":"00/6421","text":"Gursimran S. Walia"},{"@pid":"96/4396","text":"Gary L. Bradshaw"}]},"title":"Detection of Requirement Errors and Faults via a Human Error Taxonomy: A Feasibility Study.","venue":"ESEM","pages":"30:1-30:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/HuCAWB16","doi":"10.1145/2961111.2962596","ee":"https://doi.org/10.1145/2961111.2962596","url":"https://dblp.org/rec/conf/esem/HuCAWB16"}, "url":"URL#3241560" }, { "@score":"1", "@id":"3241561", "info":{"authors":{"author":[{"@pid":"62/754","text":"Juha Itkonen"},{"@pid":"186/0421","text":"Raoul Udd"},{"@pid":"28/3392","text":"Casper Lassenius"},{"@pid":"03/8941","text":"Timo Lehtonen"}]},"title":"Perceived Benefits of Adopting Continuous Delivery Practices.","venue":"ESEM","pages":"42:1-42:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ItkonenULL16","doi":"10.1145/2961111.2962627","ee":"https://doi.org/10.1145/2961111.2962627","url":"https://dblp.org/rec/conf/esem/ItkonenULL16"}, "url":"URL#3241561" }, { "@score":"1", "@id":"3241562", "info":{"authors":{"author":[{"@pid":"k/EricKnauss","text":"Eric Knauss"},{"@pid":"p/PatrizioPelliccione","text":"Patrizio Pelliccione"},{"@pid":"70/2264","text":"Rogardt Heldal"},{"@pid":"134/3170-1","text":"Magnus Ågren 0001"},{"@pid":"186/0409","text":"Sofia Hellman"},{"@pid":"186/0415","text":"Daniel Maniette"}]},"title":"Continuous Integration Beyond the Team: A Tooling Perspective on Challenges in the Automotive Industry.","venue":"ESEM","pages":"43:1-43:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/KnaussPHAHM16","doi":"10.1145/2961111.2962639","ee":"https://doi.org/10.1145/2961111.2962639","url":"https://dblp.org/rec/conf/esem/KnaussPHAHM16"}, "url":"URL#3241562" }, { "@score":"1", "@id":"3241563", "info":{"authors":{"author":[{"@pid":"118/9591","text":"Kati Kuusinen"},{"@pid":"42/7312","text":"Peggy Gregory"},{"@pid":"s/HelenSharp","text":"Helen Sharp"},{"@pid":"75/2785","text":"Leonor Barroca 0001"}]},"title":"Strategies for doing Agile in a non-Agile Environment.","venue":"ESEM","pages":"5:1-5:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/KuusinenGSB16","doi":"10.1145/2961111.2962623","ee":"https://doi.org/10.1145/2961111.2962623","url":"https://dblp.org/rec/conf/esem/KuusinenGSB16"}, "url":"URL#3241563" }, { "@score":"1", "@id":"3241564", "info":{"authors":{"author":[{"@pid":"37/10607","text":"Eero I. Laukkanen"},{"@pid":"69/9859","text":"Timo O. A. Lehtinen"},{"@pid":"62/754","text":"Juha Itkonen"},{"@pid":"86/1975","text":"Maria Paasivaara"},{"@pid":"28/3392","text":"Casper Lassenius"}]},"title":"Bottom-up Adoption of Continuous Delivery in a Stage-Gate Managed Software Organization.","venue":"ESEM","pages":"45:1-45:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/LaukkanenLIPL16","doi":"10.1145/2961111.2962608","ee":"https://doi.org/10.1145/2961111.2962608","url":"https://dblp.org/rec/conf/esem/LaukkanenLIPL16"}, "url":"URL#3241564" }, { "@score":"1", "@id":"3241565", "info":{"authors":{"author":[{"@pid":"23/1696","text":"Luigi Lavazza"},{"@pid":"m/SandroMorasca","text":"Sandro Morasca"}]},"title":"Identifying Thresholds for Software Faultiness via Optimistic and Pessimistic Estimations.","venue":"ESEM","pages":"28:1-28:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/LavazzaM16","doi":"10.1145/2961111.2962595","ee":"https://doi.org/10.1145/2961111.2962595","url":"https://dblp.org/rec/conf/esem/LavazzaM16"}, "url":"URL#3241565" }, { "@score":"1", "@id":"3241566", "info":{"authors":{"author":[{"@pid":"121/2507","text":"Rafael Maiani de Mello"},{"@pid":"t/GuilhermeTravassos","text":"Guilherme Horta Travassos"}]},"title":"Surveys in Software Engineering: Identifying Representative Samples.","venue":"ESEM","pages":"55:1-55:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/MelloT16","doi":"10.1145/2961111.2962632","ee":"https://doi.org/10.1145/2961111.2962632","url":"https://dblp.org/rec/conf/esem/MelloT16"}, "url":"URL#3241566" }, { "@score":"1", "@id":"3241567", "info":{"authors":{"author":[{"@pid":"186/0405","text":"Keisuke Miura"},{"@pid":"31/8127","text":"Shane McIntosh"},{"@pid":"88/3251","text":"Yasutaka Kamei"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"},{"@pid":"85/2856","text":"Naoyasu Ubayashi"}]},"title":"The Impact of Task Granularity on Co-evolution Analyses.","venue":"ESEM","pages":"47:1-47:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/MiuraMKHU16","doi":"10.1145/2961111.2962607","ee":"https://doi.org/10.1145/2961111.2962607","url":"https://dblp.org/rec/conf/esem/MiuraMKHU16"}, "url":"URL#3241567" }, { "@score":"1", "@id":"3241568", "info":{"authors":{"author":[{"@pid":"117/5621","text":"Jefferson Seide Molléri"},{"@pid":"63/2360","text":"Kai Petersen"},{"@pid":"m/EMendes","text":"Emilia Mendes"}]},"title":"Survey Guidelines in Software Engineering: An Annotated Review.","venue":"ESEM","pages":"58:1-58:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/MolleriPM16","doi":"10.1145/2961111.2962619","ee":"https://doi.org/10.1145/2961111.2962619","url":"https://dblp.org/rec/conf/esem/MolleriPM16"}, "url":"URL#3241568" }, { "@score":"1", "@id":"3241569", "info":{"authors":{"author":[{"@pid":"36/9791","text":"Cleviton V. F. Monteiro"},{"@pid":"66/5081","text":"Fabio Q. B. da Silva"},{"@pid":"c/LuizFernandoCapretz","text":"Luiz Fernando Capretz"}]},"title":"The Innovative Behaviour of Software Engineers: Findings from a Pilot Case Study.","venue":"ESEM","pages":"7:1-7:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/MonteiroSC16","doi":"10.1145/2961111.2962589","ee":"https://doi.org/10.1145/2961111.2962589","url":"https://dblp.org/rec/conf/esem/MonteiroSC16"}, "url":"URL#3241569" }, { "@score":"1", "@id":"3241570", "info":{"authors":{"author":[{"@pid":"36/9791","text":"Cleviton V. F. Monteiro"},{"@pid":"66/5081","text":"Fabio Q. B. da Silva"},{"@pid":"c/LuizFernandoCapretz","text":"Luiz Fernando Capretz"}]},"title":"A Pilot Case Study on Innovative Behaviour: Lessons Learned and Directions for Future Work.","venue":"ESEM","pages":"9:1-9:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/MonteiroSC16a","doi":"10.1145/2961111.2962618","ee":"https://doi.org/10.1145/2961111.2962618","url":"https://dblp.org/rec/conf/esem/MonteiroSC16a"}, "url":"URL#3241570" }, { "@score":"1", "@id":"3241571", "info":{"authors":{"author":[{"@pid":"166/0998","text":"Edson César Cunha de Oliveira"},{"@pid":"48/5","text":"Tayana Conte"},{"@pid":"c/MarcoCristo","text":"Marco Cristo"},{"@pid":"m/EMendes","text":"Emilia Mendes"}]},"title":"Software Project Managers' Perceptions of Productivity Factors: Findings from a Qualitative Study.","venue":"ESEM","pages":"15:1-15:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/OliveiraCCM16","doi":"10.1145/2961111.2962626","ee":"https://doi.org/10.1145/2961111.2962626","url":"https://dblp.org/rec/conf/esem/OliveiraCCM16"}, "url":"URL#3241571" }, { "@score":"1", "@id":"3241573", "info":{"authors":{"author":{"@pid":"81/2724","text":"Joe Peppard"}},"title":"What about the Benefits?: A Missing Perspective in Software Engineering.","venue":"ESEM","pages":"2:1","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Peppard16","doi":"10.1145/2961111.2962642","ee":"https://doi.org/10.1145/2961111.2962642","url":"https://dblp.org/rec/conf/esem/Peppard16"}, "url":"URL#3241573" }, { "@score":"1", "@id":"3241574", "info":{"authors":{"author":[{"@pid":"148/1313","text":"Jean Petric"},{"@pid":"39/7630","text":"David Bowes"},{"@pid":"69/3214","text":"Tracy Hall"},{"@pid":"81/3167","text":"Bruce Christianson"},{"@pid":"66/2636","text":"Nathan Baddoo"}]},"title":"Building an Ensemble for Software Defect Prediction Based on Diversity Selection.","venue":"ESEM","pages":"46:1-46:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/PetricBHCB16","doi":"10.1145/2961111.2962610","ee":"https://doi.org/10.1145/2961111.2962610","url":"https://dblp.org/rec/conf/esem/PetricBHCB16"}, "url":"URL#3241574" }, { "@score":"1", "@id":"3241576", "info":{"authors":{"author":[{"@pid":"39/5605","text":"Rafael Prikladnicki"},{"@pid":"167/2594","text":"Marcelo Gattermann Perin"},{"@pid":"05/6533","text":"Sabrina Marczak"}]},"title":"Virtual Team Configurations that Promote Better Product Quality.","venue":"ESEM","pages":"18:1-18:5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/PrikladnickiPM16","doi":"10.1145/2961111.2962638","ee":"https://doi.org/10.1145/2961111.2962638","url":"https://dblp.org/rec/conf/esem/PrikladnickiPM16"}, "url":"URL#3241576" }, { "@score":"1", "@id":"3241577", "info":{"authors":{"author":[{"@pid":"93/10009","text":"Giuseppe Procaccianti"},{"@pid":"40/5357","text":"Patricia Lago"},{"@pid":"186/0423","text":"Wouter Diesveld"}]},"title":"Energy Efficiency of ORM Approaches: an Empirical Evaluation.","venue":"ESEM","pages":"36:1-36:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ProcacciantiLD16","doi":"10.1145/2961111.2962586","ee":"https://doi.org/10.1145/2961111.2962586","url":"https://dblp.org/rec/conf/esem/ProcacciantiLD16"}, "url":"URL#3241577" }, { "@score":"1", "@id":"3241578", "info":{"authors":{"author":[{"@pid":"33/3526","text":"Ajitha Rajan"},{"@pid":"118/7695","text":"Adel Noureddine"},{"@pid":"98/3462","text":"Panagiotis Stratis"}]},"title":"A Study on the Influence of Software and Hardware Features on Program Energy.","venue":"ESEM","pages":"37:1-37:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/RajanNS16","doi":"10.1145/2961111.2962593","ee":"https://doi.org/10.1145/2961111.2962593","url":"https://dblp.org/rec/conf/esem/RajanNS16"}, "url":"URL#3241578" }, { "@score":"1", "@id":"3241579", "info":{"authors":{"author":[{"@pid":"61/1663","text":"Maria Riaz"},{"@pid":"186/0403","text":"Jonathan Stallings"},{"@pid":"s/MunindarPSingh","text":"Munindar P. Singh"},{"@pid":"119/9526","text":"John Slankas"},{"@pid":"w/LaurieAWilliams","text":"Laurie A. Williams"}]},"title":"DIGS: A Framework for Discovering Goals for Security Requirements Engineering.","venue":"ESEM","pages":"35:1-35:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/RiazSSSW16","doi":"10.1145/2961111.2962599","ee":"https://doi.org/10.1145/2961111.2962599","url":"https://dblp.org/rec/conf/esem/RiazSSSW16"}, "url":"URL#3241579" }, { "@score":"1", "@id":"3241580", "info":{"authors":{"author":[{"@pid":"150/8954","text":"Danilo Monteiro Ribeiro"},{"@pid":"66/5081","text":"Fabio Q. B. da Silva"},{"@pid":"186/0417","text":"Diana Valença"},{"@pid":"166/4415","text":"Elyda L. S. X. Freitas"},{"@pid":"150/9014","text":"A. César C. França"}]},"title":"Advantages and Disadvantages of using Shared code from the Developers Perspective: A qualitative study.","venue":"ESEM","pages":"33:1-33:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/RibeiroSVFF16","doi":"10.1145/2961111.2962624","ee":"https://doi.org/10.1145/2961111.2962624","url":"https://dblp.org/rec/conf/esem/RibeiroSVFF16"}, "url":"URL#3241580" }, { "@score":"1", "@id":"3241581", "info":{"authors":{"author":[{"@pid":"49/9746","text":"Todd Sedano"},{"@pid":"71/2904","text":"Paul Ralph"},{"@pid":"88/6473","text":"Cécile Péraire"}]},"title":"Sustainable Software Development through Overlapping Pair Rotation.","venue":"ESEM","pages":"19:1-19:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/SedanoRP16","doi":"10.1145/2961111.2962590","ee":"https://doi.org/10.1145/2961111.2962590","url":"https://dblp.org/rec/conf/esem/SedanoRP16"}, "url":"URL#3241581" }, { "@score":"1", "@id":"3241582", "info":{"authors":{"author":[{"@pid":"13/7475","text":"Mojtaba Shahin"},{"@pid":"03/1909","text":"Muhammad Ali Babar 0001"},{"@pid":"52/4318-1","text":"Liming Zhu 0001"}]},"title":"The Intersection of Continuous Deployment and Architecting Process: Practitioners' Perspectives.","venue":"ESEM","pages":"44:1-44:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ShahinBZ16","doi":"10.1145/2961111.2962587","ee":"https://doi.org/10.1145/2961111.2962587","url":"https://dblp.org/rec/conf/esem/ShahinBZ16"}, "url":"URL#3241582" }, { "@score":"1", "@id":"3241583", "info":{"authors":{"author":[{"@pid":"122/4841","text":"Thomas Shippey"},{"@pid":"69/3214","text":"Tracy Hall"},{"@pid":"93/6557","text":"Steve Counsell"},{"@pid":"39/7630","text":"David Bowes"}]},"title":"So You Need More Method Level Datasets for Your Software Defect Prediction?: Voilà!","venue":"ESEM","pages":"12:1-12:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ShippeyHCB16","doi":"10.1145/2961111.2962620","ee":"https://doi.org/10.1145/2961111.2962620","url":"https://dblp.org/rec/conf/esem/ShippeyHCB16"}, "url":"URL#3241583" }, { "@score":"1", "@id":"3241584", "info":{"authors":{"author":[{"@pid":"66/5081","text":"Fabio Q. B. da Silva"},{"@pid":"150/9014","text":"A. César C. França"},{"@pid":"128/2725","text":"Cleyton V. C. de Magalhães"},{"@pid":"128/2872","text":"Ronnie E. S. Santos"}]},"title":"Preliminary Findings about the Nature of Work in Software Engineering: An Exploratory Survey.","venue":"ESEM","pages":"10:1-10:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/SilvaFMS16","doi":"10.1145/2961111.2962625","ee":"https://doi.org/10.1145/2961111.2962625","url":"https://dblp.org/rec/conf/esem/SilvaFMS16"}, "url":"URL#3241584" }, { "@score":"1", "@id":"3241585", "info":{"authors":{"author":[{"@pid":"180/3236","text":"Behjat Soltanifar"},{"@pid":"183/2527","text":"Atakan Erdem"},{"@pid":"55/2997","text":"Ayse Bener"}]},"title":"Predicting Defectiveness of Software Patches.","venue":"ESEM","pages":"22:1-22:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/SoltanifarEB16","doi":"10.1145/2961111.2962601","ee":"https://doi.org/10.1145/2961111.2962601","url":"https://dblp.org/rec/conf/esem/SoltanifarEB16"}, "url":"URL#3241585" }, { "@score":"1", "@id":"3241586", "info":{"authors":{"author":{"@pid":"39/5044","text":"Harald Störrle"}},"title":"Diagram Size vs. Layout Flaws: Understanding Quality Factors of UML Diagrams.","venue":"ESEM","pages":"31:1-31:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Storrle16","doi":"10.1145/2961111.2962609","ee":"https://doi.org/10.1145/2961111.2962609","url":"https://dblp.org/rec/conf/esem/Storrle16"}, "url":"URL#3241586" }, { "@score":"1", "@id":"3241587", "info":{"authors":{"author":[{"@pid":"181/2323","text":"Yan Sun"},{"@pid":"97/6505-1","text":"Qing Wang 0001"},{"@pid":"90/4570-1","text":"Mingshu Li 0001"}]},"title":"Understanding the Contribution of Non-source Documents in Improving Missing Link Recovery: An Empirical Study.","venue":"ESEM","pages":"39:1-39:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/SunWL16","doi":"10.1145/2961111.2962605","ee":"https://doi.org/10.1145/2961111.2962605","url":"https://dblp.org/rec/conf/esem/SunWL16"}, "url":"URL#3241587" }, { "@score":"1", "@id":"3241588", "info":{"authors":{"author":[{"@pid":"150/9075","text":"William Taber"},{"@pid":"p/DanielPort","text":"Dan Port"}]},"title":"Staffing Strategies for Maintenance of Critical Software Systems at the Jet Propulsion Laboratory.","venue":"ESEM","pages":"49:1-49:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/TaberP16","doi":"10.1145/2961111.2962640","ee":"https://doi.org/10.1145/2961111.2962640","url":"https://dblp.org/rec/conf/esem/TaberP16"}, "url":"URL#3241588" }, { "@score":"1", "@id":"3241590", "info":{"authors":{"author":[{"@pid":"08/1361","text":"Jose Luis de la Vara"},{"@pid":"46/187","text":"Beatriz Marín"},{"@pid":"57/1676","text":"Giovanni Giachetti"},{"@pid":"22/9220","text":"Clara Ayora"}]},"title":"Do Models Improve the Understanding of Safety Compliance Needs?: Insights from a Pilot Experiment.","venue":"ESEM","pages":"32:1-32:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/VaraMGA16","doi":"10.1145/2961111.2962621","ee":"https://doi.org/10.1145/2961111.2962621","url":"https://dblp.org/rec/conf/esem/VaraMGA16"}, "url":"URL#3241590" }, { "@score":"1", "@id":"3241591", "info":{"authors":{"author":[{"@pid":"41/3558","text":"Stefan Voigt"},{"@pid":"186/0419","text":"Jörg von Garrel"},{"@pid":"38/7903","text":"Julia Müller"},{"@pid":"186/0418","text":"Dominic Wirth"}]},"title":"A Study of Documentation in Agile Software Projects.","venue":"ESEM","pages":"4:1-4:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/VoigtGMW16","doi":"10.1145/2961111.2962616","ee":"https://doi.org/10.1145/2961111.2962616","url":"https://dblp.org/rec/conf/esem/VoigtGMW16"}, "url":"URL#3241591" }, { "@score":"1", "@id":"3241592", "info":{"authors":{"author":[{"@pid":"14/1915-1","text":"Junjie Wang 0001"},{"@pid":"99/6854-1","text":"Qiang Cui 0001"},{"@pid":"97/6505-1","text":"Qing Wang 0001"},{"@pid":"62/3151-9","text":"Song Wang 0009"}]},"title":"Towards Effectively Test Report Classification to Assist Crowdsourced Testing.","venue":"ESEM","pages":"6:1-6:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/WangCWW16","doi":"10.1145/2961111.2962584","ee":"https://doi.org/10.1145/2961111.2962584","url":"https://dblp.org/rec/conf/esem/WangCWW16"}, "url":"URL#3241592" }, { "@score":"1", "@id":"3241593", "info":{"authors":{"author":{"@pid":"w/ClaesWohlin","text":"Claes Wohlin"}},"title":"Is there a Future for Empirical Software Engineering?","venue":"ESEM","pages":"1:1","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/Wohlin16","doi":"10.1145/2961111.2962641","ee":"https://doi.org/10.1145/2961111.2962641","url":"https://dblp.org/rec/conf/esem/Wohlin16"}, "url":"URL#3241593" }, { "@score":"1", "@id":"3241594", "info":{"authors":{"author":[{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"05/5996","text":"Emad Shihab"},{"@pid":"88/3251","text":"Yasutaka Kamei"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"68/1277-1","text":"Xinyu Wang 0001"}]},"title":"Predicting Crashing Releases of Mobile Applications.","venue":"ESEM","pages":"29:1-29:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/XiaSKLW16","doi":"10.1145/2961111.2962606","ee":"https://doi.org/10.1145/2961111.2962606","url":"https://dblp.org/rec/conf/esem/XiaSKLW16"}, "url":"URL#3241594" }, { "@score":"1", "@id":"3241595", "info":{"authors":{"author":[{"@pid":"55/4341","text":"Ye Yang"},{"@pid":"42/8397-2","text":"Muhammad Rezaul Karim 0002"},{"@pid":"166/4277","text":"Razieh Lotfalian Saremi"},{"@pid":"42/6131","text":"Guenther Ruhe"}]},"title":"Who Should Take This Task?: Dynamic Decision Support for Crowd Workers.","venue":"ESEM","pages":"8:1-8:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/YangKSR16","doi":"10.1145/2961111.2962594","ee":"https://doi.org/10.1145/2961111.2962594","url":"https://dblp.org/rec/conf/esem/YangKSR16"}, "url":"URL#3241595" }, { "@score":"1", "@id":"3241596", "info":{"authors":{"author":[{"@pid":"40/3887","text":"Beth Yost"},{"@pid":"74/3855","text":"Michael J. Coblenz"},{"@pid":"54/1970","text":"Brad A. Myers"},{"@pid":"24/7473","text":"Joshua Sunshine"},{"@pid":"67/6837","text":"Jonathan Aldrich"},{"@pid":"59/1328","text":"Sam Weber"},{"@pid":"186/0410","text":"Matthew Patron"},{"@pid":"186/0411","text":"Melissa Heeren"},{"@pid":"186/0416","text":"Shelley Krueger"},{"@pid":"58/4408","text":"Mark S. Pfaff"}]},"title":"Software Development Practices, Barriers in the Field and the Relationship to Software Quality.","venue":"ESEM","pages":"16:1-16:6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/YostCMSAWPHKP16","doi":"10.1145/2961111.2962614","ee":"https://doi.org/10.1145/2961111.2962614","url":"https://dblp.org/rec/conf/esem/YostCMSAWPHKP16"}, "url":"URL#3241596" }, { "@score":"1", "@id":"3241597", "info":{"authors":{"author":[{"@pid":"57/2056-41","text":"Yu Zhao 0041"},{"@pid":"48/1294-1","text":"Feng Zhang 0001"},{"@pid":"05/5996","text":"Emad Shihab"},{"@pid":"55/3451-1","text":"Ying Zou 0001"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"}]},"title":"How Are Discussions Associated with Bug Reworking?: An Empirical Study on Open Source Projects.","venue":"ESEM","pages":"21:1-21:10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/esem/ZhaoZSZH16","doi":"10.1145/2961111.2962591","ee":"https://doi.org/10.1145/2961111.2962591","url":"https://dblp.org/rec/conf/esem/ZhaoZSZH16"}, "url":"URL#3241597" }, { "@score":"1", "@id":"3359210", "info":{"title":"Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2016, Ciudad Real, Spain, September 8-9, 2016","venue":"ESEM","publisher":"ACM","year":"2016","type":"Editorship","key":"conf/esem/2016","doi":"10.1145/2961111","ee":"https://doi.org/10.1145/2961111","url":"https://dblp.org/rec/conf/esem/2016"}, "url":"URL#3359210" } ] } } } )