default search action
International Journal of Software Engineering and Knowledge Engineering, Volume 30
Volume 30, Number 1, January 2020
- Shuhan Yan, Tianjiao Du, Beijun Shen, Yuting Chen, Zhilei Ren:
Feedback2Code: A Deep Learning Approach to Identifying User-Feedback-Related Source Code Files. 1-22 - Mamta Pandey, Ratnesh Litoriya, Prateek Pandey:
Applicability of Machine Learning Methods on Mobile App Effort Estimation: Validation and Performance Evaluation. 23-41 - Muaz Gultekin, Oya Kalipsiz:
Story Point-Based Effort Estimation Model with Machine Learning Techniques. 43-66 - Theresia Ratih Dewi Saputri, Seok-Won Lee:
Software Analysis Method for Assessing Software Sustainability. 67-95 - Junxia Guo, Zheng Li, CunFeng Shi, Ruilian Zhao:
Thread Scheduling Sequence Generation Based on All Synchronization Pair Coverage Criteria. 97-118 - Nady Slam, Wushour Slamu, Pei Wang:
A Case Representation and Similarity Measurement Model with Experience-Grounded Semantics. 119-146
Volume 30, Number 2, February 2020
- Jasmina Nalic, Goran Martinovic:
Building a Credit Scoring Model Based on Data Mining Approaches. 147-169 - Rohayanti Hassan, Noor Atikah Amira Fauzi, Shahreen Kasim, Herman Khalid Omer:
Usability Requirements Extraction Method from Software Document. 171-189 - Jihyun Lee, Sungwon Kang:
Case Study Investigation of the Fault Detection and Error Locating Effects of Architecture-based Software Testing. 191-216 - Achraf Ben Miled, Rahma Dhaouadi, Romany Fouad Mansour:
Knowledge Deduction and Reuse Application to the Products' Design Process. 217-237 - Bingming Wang, Shi Ying, Guoli Cheng, Rui Wang, Zhe Yang, Bo Dong:
Log-Based Anomaly Detection with the Improved K-Nearest Neighbor. 239-262 - Dan Wei, Qingying Sun, Xingqi Wang, Tianning Zhang, Bin Chen:
A Model-Based Test Case Prioritization Approach Based on Fault Urgency and Severity. 263-290
Volume 30, Number 3, March 2020
- Rongcun Wang, Zhengmin Li, Shujuan Jiang, Chuanqi Tao:
Regression Test Case Prioritization Based on Fixed Size Candidate Set ART Algorithm. 291-320 - Roland Robert Schreiber, Matthäus Paul Zylka:
Social Network Analysis in Software Development Projects: A Systematic Literature Review. 321-362 - Imad H. Hasan, Bestoun S. Ahmed, Moayad Y. Potrus, Kamal Z. Zamli:
Generation and Application of Constrained Interaction Test Suites Using Base Forbidden Tuples with a Mixed Neighborhood Tabu Search. 363-398 - Duc-Man Nguyen, Quyet-Thang Huynh, Nhu-Hang Ha, Thanh-Hung Nguyen:
Automated Test Input Generation via Model Inference Based on User Story and Acceptance Criteria for Mobile Application Development. 399-425 - Ibrahim Alper Dogru, Murat Önder:
AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups. 427-450 - Ju Qian, Yan Wang, Fusheng Lin, Changjian Li, Zhiyi Zhang, Xuefeng Yan:
Towards Generating Realistic and High Coverage Test Data for Constraint-Based Fault Injection. 451-479
Volume 30, Number 4, April 2020
- Jerry Gao:
Guest Editor's Introduction. 481-482 - Shi-Kuo Chang, Hanzhong Zheng, Tian Yi Cui, Nannan Wen, Hao Zhai, Lu Zhang:
A Computation Model for Senior Citizen Health Self-Care. 483-501 - Haitao Wang, Yanli Chen, Juan Wang, Hao Peng, Hongfang Liu:
Mutual Inference Model for User Roles and Urban Functional Zones. 503-521 - Jong-Hyun Park:
An Intelligent Service Middleware Based on Sensors in IoT Environments. 523-536 - Ping Ping, Guoyan Xu, Effendy Kumala, Jerry Gao:
Smart Street Litter Detection and Classification Based on Faster R-CNN and Edge Computing. 537-553 - Wonhong Nam, Haejin Yang, Hyunyoung Kil:
Winning Strategy Tree Construction for BDD-Based ATL Model Checkers. 555-573 - Raquel Fialho de Queiroz Lafetá, Thiago Fialho de Queiroz Lafetá, Marcelo de Almeida Maia:
An Automated Approach for Constructing Framework Instantiation Documentation. 575-601
Volume 30, Number 5, May 2020
- Alexandre L'Erário, Hellen Christine Serodio Thomazinho, José Augusto Fabri:
An Approach to Software Maintenance: A Case Study in Small and Medium-Sized Businesses IT Organizations. 603-630 - Yi-Hui Chen, Eric Jui-Lin Lu, Ya-Wen Cheng:
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis. 631-647 - Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Deep Transfer Learning for Source Code Modeling. 649-668 - Milena Vujosevic-Janicic:
Concurrent Bug Finding Based on Bounded Model Checking. 669-694 - Bing Zhang, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang:
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns. 695-719
Volume 30, Number 6, June 2020
- Jing Sun:
Guest Editor's Introduction. 721 - Nacha Chondamrongkul, Jing Sun, Ian Warren, Scott Uk-Jin Lee:
Integrated Formal Tools for Software Architecture Smell Detection. 723-763 - Qinyue Wu, Duankang Fu, Beijun Shen, Yuting Chen:
Semantic Service Search in IT Crowdsourcing Platform: A Knowledge Graph-Based Approach. 765-783 - David Chaves-Fraga, Freddy Priyatna, Ahmad Alobaid, Óscar Corcho:
Exploiting Declarative Mapping Rules for Generating GraphQL Servers with Morph-GraphQL. 785-803 - Ester Giallonardo, Francesco Poggi, Davide Rossi, Eugenio Zimeo:
Semantics-Driven Programming of Self-Adaptive Reactive Systems. 805-834 - Shang-Pin Ma, Hsuan-Ju Lin, Ming-Jen Hsu:
Semantic Restful Service Composition Using Task Specification. 835-857 - Nazmul Hussain, Hai H. Wang, Christopher D. Buckingham, Xiaoyuan Zhang:
Software Agent-Centric Semantic Social Network for Cyber-Physical Interaction and Collaboration. 859-893
Volume 30, Number 7, July 2020
- Yong Qin, Min An, Limin Jia:
Guest Editors' Introduction. 895-899 - Yinggui Zhang, Zengru Chen, Min An, Aliyu Mani Umar:
An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay. 901-919 - Bowen Gao, Dongxiu Ou, Decun Dong, Yusen Wu:
A Data-Driven Two-Stage Prediction Model for Train Primary-Delay Recovery Time. 921-940 - Jiahao Liu, Zhipeng Wang, Yunpeng Wu, Yong Qin, Xianbin Cao, Yonghui Huang:
An Improved Faster R-CNN for UAV-Based Catenary Support Device Inspection. 941-959 - Zengshu Shi, Yiman Du, Tao Du, Guochao Shan:
The Turnout Abnormality Diagnosis Based on Semi-Supervised Learning Method. 961-976
- Bo Dong, Shi Ying, Lin Li, Hui Luo, Zhe Yang:
Impact Analysis About Response Time Considering Deployment Change of SaaS Software. 977-1004 - Bangchao Wang, Rong Peng, Zhuo Wang, Xiaomin Wang, Yuanbang Li:
An Automated Hybrid Approach for Generating Requirements Trace Links. 1005-1048
Volume 30, Number 8, August 2020
- S. K. Chang:
Guest Editor's Introduction. 1049-1050 - Ghassen Ben Brahim, Wassim El-Hajj, Cynthia El-Hayek, Hazem M. Hajj:
A New Semantic-based Multi-Level Classification Approach for Activity Recognition Using Smartphones. 1051-1078 - Liqing Qiu, Shuang Zhang, Chunmei Gu, Xiangbo Tian:
Scalable Influence Maximization Meets Efficiency and Effectiveness in Large-Scale Social Networks. 1079-1096 - Zehao Yu:
Two Improved Topic Word Detection Algorithms. 1097-1118
- Mingwan Kim, Neunghoe Kim, Hoh Peter In:
Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code. 1119-1137 - Ziyuan Wang, Chunrong Fang, Lin Chen, Zhiyi Zhang:
A Revisit of Metrics for Test Case Prioritization Problems. 1139-1167 - Michael Omari, Jinfu Chen, Robert French-Baidoo, Yunting Sun:
A Proactive Approach to Test Case Selection - An Efficient Implementation of Adaptive Random Testing. 1169-1198
Volume 30, Number 9, September 2020
- Edward Kai Fung Dang, Robert Wing Pong Luk, James Allan:
Context-Dependent Feature Values in Text Categorization. 1199-1219 - Zhimin Zhou, Zhongwen Chen:
Split Attention Pointer Network for Source Code Language Modeling. 1221-1244 - Quyet-Thang Huynh, Le-Trinh Pham, Nhu-Hang Ha, Duc-Man Nguyen:
An Effective Approach for Context Driven Testing in Practice - A Case Study. 1245-1262 - Yutaka Watanobe, Nikolay N. Mirenkov:
Algorithmic Transparency of Large-Scale *AIDA Programs. 1263-1288 - Atish Kumar Dipongkor, Iftekhar Ahmed, Rayhanul Islam, Nadia Nahar, Abdus Satter, Md. Saeed Siddik:
ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method's External Dependencies. 1289-1307 - Yonghao Long, Xiangping Chen, Fan Zhou:
AutoWPR: An Automatic Web Page Recoloring Method. 1309-1336 - Ali Jazayeri, Ellen J. Bass:
Agent-Oriented Methodologies Evaluation Frameworks: A Review. 1337-1370
Volume 30, Number 10, October 2020
- Iaakov Exman:
Guest Editor's Introduction: Software Mathematical Models for Human Understanding. 1371-1374 - Iaakov Exman, Harel Wallach:
Linear Software Models: An Occam's Razor Set of Algebraic Connectors Integrates Modules into a Whole Software System. 1375-1413 - José María Álvarez Rodríguez, Roy Mendieta, Valentin Moreno, Miguel Sánchez-Puebla, Juan Lloréns:
Semantic Recovery of Traceability Links between System Artifacts. 1415-1442 - Juntao Gao, Yingqian Zhang:
Regular Expression Learning from Positive Examples Based on Integer Programming. 1443-1479 - Kazuhiro Ogata:
A Generic Approach on How to Formally Specify and Model Check Path Finding Algorithms: Dijkstra, A* and LPA. 1481-1523
- Abu Saleh Md Tayeen, Thanh Hai Nguyen, Van Duc Nguyen, Enrico Pontelli:
Design and Implementation of Phylotastic, a Service Architecture for Evolutionary Biology. 1525-1550 - Jiafei Song, Zhongjie Wang, Zhiying Tu, Xiaofei Xu:
Method for Predicting Mobile Service Evolution from User Reviews and Update Logs. 1551-1586
Volume 30, Numbers 11&12, 2020
- Shi-Kuo Chang:
Guest Editor's Introduction. 1587
- Gaku Fujii, Koichi Hamada, Fuyuki Ishikawa, Satoshi Masuda, Mineo Matsuya, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita:
Guidelines for Quality Assurance of Machine Learning-Based Artificial Intelligence. 1589-1606 - Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham:
Analyzing the Stationarity Process in Software Effort Estimation Datasets. 1607-1640 - Jiang Wu, Jianjun Xu, Xiankai Meng, Haoyu Zhang, Zhuo Zhang:
Enabling Reliability-Driven Optimization Selection with Gate Graph Attention Neural Network. 1641-1665 - Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, Dinghao Wu:
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining. 1667-1688 - Dongjin Yu, Xinfeng Wang, Xiaoxiao Sun:
Prediction of Regional Commercial Activeness and Entity Condition Based on Online Reviews. 1689-1705 - Zhang Zhang, Xinjun Mao, Yao Lu, Jinyu Lu, Yue Yu, Zhixing Li:
Automatic Voter Recommendation Method for Closing Questions in Stack Overflow. 1707-1733 - Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Their Check-in Data: A Graph Embedding Approach. 1735-1757 - Jialing Liang, Peiquan Jin, Lin Mu, Jie Zhao:
An Experimental Study of Spammer Detection on Chinese Microblogs. 1759-1777 - Zengyang Li, Peng Liang, Dengwei Li, Ran Mo, Bing Li:
Is Bug Severity in Line with Bug Fixing Change Complexity? 1779-1800 - Ying Shang, Yongli Li, Feng You, Ruilian Zhao:
Conversion-based Approach to Obtain an SNN Construction. 1801-1818 - Hind Milhem, Michael Weiss, Stéphane S. Somé:
Modeling and Selecting Frameworks in Terms of Patterns, Tactics and System Qualities. 1819-1850
- Yunpeng Zhang, Xin Liu:
An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network. 1851-1865
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.