default search action
ACM Transactions on Software Engineering and Methodology, Volume 31
Volume 31, Number 1, January 2022
- Andrea Arcuri, Juan P. Galeotti:
Enhancing Search-based Testing with Testability Transformations for Existing APIs. 1:1-1:34 - Man Zhang, Andrea Arcuri:
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster. 2:1-2:52 - Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou, Michael R. Lyu:
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs. 3:1-3:25 - Davide Falessi, Aalok Ahluwalia, Massimiliano Di Penta:
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects. 4:1-4:26 - Birgit Vogel-Heuser, Eva-Maria Neumann, Juliane Fischer:
MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software. 5:1-5:24 - Anders Sundelin, Javier González-Huerta, Krzysztof Wnuk, Tony Gorschek:
Towards an Anatomy of Software Craftsmanship. 6:1-6:49 - Daniel Graziotin, Per Lenberg, Robert Feldt, Stefan Wagner:
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines. 7:1-7:36 - Jianyi Zhou, Junjie Chen, Dan Hao:
Parallel Test Prioritization. 8:1-8:50 - Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk van der Linden, John N. Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh:
The Case for Adaptive Security Interventions. 9:1-9:52 - Lorena Arcega, Jaime Font, Øystein Haugen, Carlos Cetina:
Bug Localization in Model-Based Systems in the Wild. 10:1-10:32
- Cuiyun Gao, Wenjie Zhou, Xin Xia, David Lo, Qi Xie, Michael R. Lyu:
Automating App Review Response Generation Based on Contextual Knowledge. 11:1-11:36 - Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li:
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words. 12:1-12:37 - Yaqin Zhou, Jing Kai Siow, Chenyu Wang, Shangqing Liu, Yang Liu:
SPI: Automated Identification of Security Patches via Commits. 13:1-13:27 - Amin Nikanjam, Houssem Ben Braiek, Mohammad Mehdi Morovati, Foutse Khomh:
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations. 14:1-14:27 - Chao Liu, Cuiyun Gao, Xin Xia, David Lo, John C. Grundy, Xiaohu Yang:
On the Reproducibility and Replicability of Deep Learning in Software Engineering. 15:1-15:46 - Yingzhe Lyu, Gopi Krishnan Rajbahadur, Dayi Lin, Boyuan Chen, Zhen Ming (Jack) Jiang:
Towards a Consistent Interpretation of AIOps Models. 16:1-16:38 - Owain Parry, Gregory M. Kapfhammer, Michael Hilton, Phil McMinn:
A Survey of Flaky Tests. 17:1-17:74
Volume 31, Number 2, April 2022
- Mauro Pezzè:
Editorial: A Retrospective and Prospective Reflection. 18e:1-18e:2 - Kevin Lano, Shekoufeh Kolahdouz Rahimi, Shichao Fang:
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example. 18:1-18:71 - Thomas Bock, Angelika Schmid, Sven Apel:
Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach. 19:1-19:50 - Fahimeh Ebrahimi, Miroslav Tushev, Anas Mahmoud:
Classifying Mobile Applications Using Word Embeddings. 20:1-20:30 - Luca Ardito, Andrea Bottino, Riccardo Coppola, Fabrizio Lamberti, Francesco Manigrasso, Lia Morra, Marco Torchiano:
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing. 21:1-21:32 - Chandra Shekhar Maddila, Nachiappan Nagappan, Christian Bird, Georgios Gousios, Arie van Deursen:
ConE: A Concurrent Edit Detection Tool for Large-scale Software Development. 22:1-22:26 - Jevgenija Pantiuchina, Bin Lin, Fiorella Zampetti, Massimiliano Di Penta, Michele Lanza, Gabriele Bavota:
Why Do Developers Reject Refactorings in Open-Source Projects? 23:1-23:23 - Olawole Oni, Emmanuel Letier:
Analyzing Uncertainty in Release Planning: A Method and Experiment for Fixed-Date Release Cycles. 24:1-24:39 - Luca Traini, Daniele Di Pompeo, Michele Tucci, Bin Lin, Simone Scalabrino, Gabriele Bavota, Michele Lanza, Rocco Oliveto, Vittorio Cortellessa:
How Software Refactoring Impacts Execution Time. 25:1-25:23 - Katherine Hough, Jonathan Bell:
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships. 26:1-26:43 - Denae Ford, Margaret-Anne D. Storey, Thomas Zimmermann, Christian Bird, Sonia Jaffe, Chandra Shekhar Maddila, Jenna L. Butler, Brian Houck, Nachiappan Nagappan:
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic. 27:1-27:37 - Ryan Williams, Tongwei Ren, Lorenzo De Carli, Long Lu, Gillian Smith:
Guided Feature Identification and Removal for Resource-constrained Firmware. 28:1-28:25 - Frank F. Xu, Bogdan Vasilescu, Graham Neubig:
In-IDE Code Generation from Natural Language: Promise and Challenges. 29:1-29:47 - Jiachi Chen, Xin Xia, David Lo, John C. Grundy:
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum. 30:1-30:37
- Patrick Keller, Abdoul Kader Kaboré, Laura Plein, Jacques Klein, Yves Le Traon, Tegawendé F. Bissyandé:
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning. 31:1-31:34 - Cody Watson, Nathan Cooper, David Nader-Palacio, Kevin Moran, Denys Poshyvanyk:
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research. 32:1-32:58 - Ritu Kapur, Balwinder Sodhi:
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics. 33:1-33:35 - Jialun Cao, Meiziniu Li, Yeting Li, Ming Wen, Shing-Chi Cheung, Haiming Chen:
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems. 34e:1-34e:36
- Changwei Zou, Xudong Wang, Yaoqing Gao, Jingling Xue:
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization. 35e:1-35e:37 - Sabreen Ahmadjee, Carlos Joseph Mera-Gómez, Rami Bahsoon, Rick Kazman:
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats. 36e:1-36e:45 - Silverio Martínez-Fernández, Justus Bogner, Xavier Franch, Marc Oriol, Julien Siebert, Adam Trendowicz, Anna Maria Vollmer, Stefan Wagner:
Software Engineering for AI-Based Systems: A Survey. 37e:1-37e:59
Volume 31, Number 3, July 2022
- Yingfei Xiong, Bo Wang:
L2S: A Framework for Synthesizing the Most Probable Program under a Specification. 34:1-34:45 - Junjie Wang, Ye Yang, Song Wang, Jun Hu, Qing Wang:
Context- and Fairness-Aware In-Process Crowdworker Recommendation. 35:1-35:31 - Yu Zhao, Ting Su, Yang Liu, Wei Zheng, Xiaoxue Wu, Ramakanth Kavuluru, William G. J. Halfond, Tingting Yu:
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps. 36:1-36:33 - Luca Di Stefano, Rocco De Nicola, Omar Inverso:
Verification of Distributed Systems via Sequential Emulation. 37:1-37:41 - Bin Lin, Nathan Cassee, Alexander Serebrenik, Gabriele Bavota, Nicole Novielli, Michele Lanza:
Opinion Mining for Software Development: A Systematic Literature Review. 38:1-38:41 - Daniel Barcelona Pons, Pierre Sutra, Marc Sánchez Artigas, Gerard París, Pedro García López:
Stateful Serverless Computing with Crucial. 39:1-39:38 - Carlo A. Furia, Richard Torkar, Robert Feldt:
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality. 40:1-40:38 - Bogdan Marculescu, Man Zhang, Andrea Arcuri:
On the Faults Found in REST APIs by Automated Test Generation. 41:1-41:43 - Fabio Calefato, Filippo Lanubile:
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go? 42:1-42:48 - Si Liu:
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions. 43:1-43:44 - Wenhua Yang, Chong Zhang, Minxue Pan, Chang Xu, Yu Zhou, Zhiqiu Huang:
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow. 44:1-44:29 - Dusica Marijan, Sagar Sen:
Industry-Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns. 45:1-45:52 - Dalia Sobhy, Leandro L. Minku, Rami Bahsoon, Rick Kazman:
Continuous and Proactive Software Architecture Evaluation: An IoT Case. 46:1-46:54
- Xiaofei Xie, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu, Yang Liu:
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks. 47:1-47:27 - Gias Uddin, Yann-Gaël Guéhéneuc, Foutse Khomh, Chanchal K. Roy:
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets. 48:1-48:38 - Hao Guo, Sen Chen, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. 49:1-49:27 - Huangzhao Zhang, Zhiyi Fu, Ge Li, Lei Ma, Zhehao Zhao, Hua'an Yang, Yizhe Sun, Yang Liu, Zhi Jin:
Towards Robustness of Deep Program Processing Models - Detection, Estimation, and Enhancement. 50:1-50:40 - Bo Lin, Shangwen Wang, Ming Wen, Xiaoguang Mao:
Context-Aware Code Change Embedding for Better Patch Correctness Assessment. 51:1-51:29 - Zehao Lin, Guodun Li, Jingfeng Zhang, Yue Deng, Xiangji Zeng, Yin Zhang, Yao Wan:
XCode: Towards Cross-Language Code Representation with Large-Scale Pre-Training. 52:1-52:44 - Lizhi Liao, Heng Li, Weiyi Shang, Lei Ma:
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks. 53:1-53:40
- Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. 54:1-54:33 - Benjamin S. Meyers, Sultan Fahad Almassari, Brandon N. Keller, Andrew Meneely:
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition. 55:1-55:25 - Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang:
Predictive Models in Software Engineering: Challenges and Opportunities. 56:1-56:72
Volume 31, Number 4, October 2022
- Dirk Beyer, Matthias Dangl, Daniel Dietsch, Matthias Heizmann, Thomas Lemberger, Michael Tautschnig:
Verification Witnesses. 57:1-57:69 - Ridhi Jain, Rahul Purandare, Subodh Sharma:
BiRD: Race Detection in Software Binaries under Relaxed Memory Models. 58:1-58:29 - Jhon Masso, Félix García, César Jesús Pardo Calvache, Francisco J. Pino, Mario Piattini:
A Common Terminology for Software Risk Management. 59:1-59:47 - Yu Zhou, Xiaoqing Zhang, Juanjuan Shen, Tingting Han, Taolue Chen, Harald C. Gall:
Adversarial Robustness of Deep Code Comment Generation. 60:1-60:30 - Chanh Duc Ngo, Fabrizio Pastore, Lionel C. Briand:
Automated, Cost-effective, and Update-driven App Testing. 61:1-61:51 - Hao Yu, Xing Hu, Ge Li, Ying Li, Qianxiang Wang, Tao Xie:
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning. 62:1-62:25 - Xing Hu, Qiuyuan Chen, Haoye Wang, Xin Xia, David Lo, Thomas Zimmermann:
Correlating Automated and Human Evaluation of Code Documentation Generation Quality. 63:1-63:28 - Étienne André, Didier Lime, Dylan Marinho, Jun Sun:
Guaranteeing Timed Opacity using Parametric Timed Model Checking. 64:1-64:36 - Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Deep Reinforcement Learning for Black-box Testing of Android Apps. 65:1-65:29 - Tingting Bi, Xin Xia, David Lo, John C. Grundy, Thomas Zimmermann, Denae Ford:
Accessibility in Software Practice: A Practitioner's Perspective. 66:1-66:26 - Mitchell Joblin, Sven Apel:
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis. 67:1-67:24 - Giuseppe De Giacomo, Riccardo De Masellis, Fabrizio Maria Maggi, Marco Montali:
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces. 68:1-68:44 - Peng Zhang, Yang Wang, Xutong Liu, Yanhui Li, Yibiao Yang, Ziyuan Wang, Xiaoyu Zhou, Lin Chen, Yuming Zhou:
Mutant Reduction Evaluation: What is There and What is Missing? 69:1-69:46 - Elvira Albert, Pablo Gordillo, Alejandro Hernández-Cerezo, Albert Rubio, Maria Anna Schett:
Super-optimization of Smart Contracts. 70:1-70:29 - Henrich Lauko, Lukás Korencik, Petr Rockai:
Verification of Programs Sensitive to Heap Layout. 71:1-71:27 - Junjie Chen, Chenyao Suo:
Boosting Compiler Testing via Compiler Optimization Exploration. 72:1-72:33 - Jinhan Kim, Juyoung Jeon, Shin Hong, Shin Yoo:
Predictive Mutation Analysis via the Natural Language Channel in Source Code. 73:1-73:27 - Umair Z. Ahmed, Zhiyu Fan, Jooyong Yi, Omar I. Al-Bataineh, Abhik Roychoudhury:
Verifix: Verified Repair of Programming Assignments. 74:1-74:31 - Yuxia Zhang, Hui Liu, Xin Tan, Minghui Zhou, Zhi Jin, Jiaxin Zhu:
Turnover of Companies in OpenStack: Prevalence and Rationale. 75:1-75:24
- Chao Ni, Xin Xia, David Lo, Xiaohu Yang, Ahmed E. Hassan:
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study. 76:1-76:38 - Haoye Tian, Yinghua Li, Weiguo Pian, Abdoul Kader Kaboré, Kui Liu, Andrew Habib, Jacques Klein, Tegawendé F. Bissyandé:
Predicting Patch Correctness Based on the Similarity of Failing Test Cases. 77:1-77:30 - Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Lei Ma, Mike Papadakis, Yves Le Traon:
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. 78:1-78:30 - Ferhat Özgür Çatak, Tao Yue, Shaukat Ali:
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data. 79:1-79:31 - Matteo Biagiola, Paolo Tonella:
Testing the Plasticity of Reinforcement Learning-based Systems. 80:1-80:46 - Bianca Trinkenreich, Igor Wiese, Anita Sarma, Marco Aurélio Gerosa, Igor Steinmacher:
Women's Participation in Open Source Software: A Survey of the Literature. 81:1-81:37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.