default search action
IEEE Transactions on Software Engineering, Volume 50
Volume 50, Number 1, January 2024
- Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. 1-15 - Sven Peldszus, Jens Bürger, Jan Jürjens:
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering. 16-47 - Aren A. Babikian, Oszkár Semeráth, Dániel Varró:
Concretization of Abstract Traffic Scene Specifications Using Metaheuristic Search. 48-68 - Yuchen Shen, Travis D. Breaux:
Stakeholder Preference Extraction From Scenarios. 69-84 - Max Schäfer, Sarah Nadi, Aryaz Eghbali, Frank Tip:
An Empirical Evaluation of Using Large Language Models for Automated Unit Test Generation. 85-105 - Shanquan Gao, Liyuan Zhang, Huaxiao Liu, Yihui Wang:
Which Animation API Should I Use Next? A Multimodal Real-Time Animation API Recommendation Model for Android Apps. 106-122 - Mateusz Dolata, Kevin Crowston:
Making Sense of AI Systems Development. 123-140 - Christiaan Verwijs, Daniel Russo:
The Double-Edged Sword of Diversity: How Diversity, Conflict, and Psychological Safety Impact Software Teams. 141-157 - Yang Wang, Peng Zhang, Maolin Sun, Zeyu Lu, Yibiao Yang, Yutian Tang, Junyan Qian, Zhi Li, Yuming Zhou:
Corrections to "Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving". 158
Volume 50, Number 2, February 2024
- Deeksha M. Arya, Jin L. C. Guo, Martin P. Robillard:
Properties and Styles of Software Technology Tutorials. 159-172 - Mengxi Zhang, Huaxiao Liu, Chunyang Chen, Guangyong Gao, Han Li, Jian Zhao:
AccessFixer: Enhancing GUI Accessibility for Low Vision Users With R-GCN Model. 173-189 - Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Tian Wang, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. 190-208 - Daniel Long, Scott Drylie, Jonathan D. Ritschel, Clay Koschnick:
An Assessment of Rules of Thumb for Software Phase Management, and the Relationship Between Phase Effort and Schedule Success. 209-219 - Anjan Karmakar, Romain Robbes:
INSPECT: Intrinsic and Systematic Probing Evaluation for Code Transformers. 220-238 - Federico Formica, Tony Fan, Akshay Rajhans, Vera Pantelic, Mark Lawford, Claudio Menghi:
Simulation-Based Testing of Simulink Models With Test Sequence and Test Assessment Blocks. 239-257 - Wei Cheng, Wei Hu, Xiaoxing Ma:
Revisiting Knowledge-Based Inference of Python Runtime Environments: A Realistic and Adaptive Approach. 258-279 - Qing Huang, Zishuai Li, Zhenchang Xing, Zhengkang Zuo, Xin Peng, Xiwei Xu, Qinghua Lu:
Answering Uncertain, Under-Specified API Queries Assisted by Knowledge-Aware Human-AI Dialogue. 280-295 - Yanming Yang, Xing Hu, Zhipeng Gao, Jinfu Chen, Chao Ni, Xin Xia, David Lo:
Federated Learning for Software Engineering: A Case Study of Code Clone Detection and Defect Prediction. 296-321 - Riccardo Coppola, Tommaso Fulcini, Luca Ardito, Marco Torchiano, Emil Alégroth:
On Effectiveness and Efficiency of Gamified Exploratory GUI Testing. 322-337 - Rosalia Tufano, Ozren Dabic, Antonio Mastropaolo, Matteo Ciniselli, Gabriele Bavota:
Code Review Automation: Strengths and Weaknesses of the State of the Art. 338-353
Volume 50, Number 3, March 2024
- Sebastián Uchitel:
Distinguished Reviewers 2023. 359 - Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Yichen Li, Zhihong Tian, Yan Jia, Xuan Wang:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. 360-375 - Jie Zhu, Leye Wang, Xiao Han, Anmin Liu, Tao Xie:
Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment. 376-390 - Wei Zheng, Lidan Lin, Xiaoxue Wu, Xiang Chen:
An Empirical Study on Correlations Between Deep Neural Network Fairness and Neuron Coverage Criteria. 391-412 - Xueqi Dang, Yinghua Li, Mike Papadakis, Jacques Klein, Tegawendé F. Bissyandé, Yves Le Traon:
Test Input Prioritization for Machine Learning Classifiers. 413-442 - Junxiao Han, Jiahao Zhang, David Lo, Xin Xia, Shuiguang Deng, Minghui Wu:
Understanding Newcomers' Onboarding Process in Deep Learning Projects. 443-460 - Ruidong Han, Siqi Ma, Juanru Li, Surya Nepal, David Lo, Zhuo Ma, Jianfeng Ma:
Range Specification Bug Detection in Flight Control System Through Fuzzing. 461-473 - Quanjun Zhang, Chunrong Fang, Weisong Sun, Yan Liu, Tieke He, Xiaodong Hao, Zhenyu Chen:
APPT: Boosting Automated Patch Correctness Prediction via Fine-Tuning Pre-Trained Models. 474-494 - Yong Wang, Wenzhong Cui, Gai-Ge Wang, Jian Wang, Dunwei Gong:
Improving Test Data Generation for MPI Program Path Coverage With FERPSO-IMPR and Surrogate-Assisted Models. 495-511 - Haoran Yang, Yu Nong, Shaowei Wang, Haipeng Cai:
Multi-Language Software Development: Issues, Challenges, and Solutions. 512-533 - Junjie Li, Jinqiu Yang:
Tracking the Evolution of Static Code Warnings: The State-of-the-Art and a Better Approach. 534-550 - Changqing Wei, Xiangjuan Yao, Dunwei Gong, Huai Liu:
Test Data Generation for Mutation Testing Based on Markov Chain Usage Model and Estimation of Distribution Algorithm. 551-573 - Uraz Cengiz Türker, Robert M. Hierons, Khaled El-Fakih, Mohammad Reza Mousavi, Ivan Yu. Tyukin:
Accelerating Finite State Machine-Based Testing Using Reinforcement Learning. 574-597 - Zhengkang Xu, Shikai Guo, Yumiao Wang, Rong Chen, Hui Li, Xiaochen Li, He Jiang:
Code Comment Inconsistency Detection Based on Confidence Learning. 598-617 - Yuan-An Xiao, Chenyang Yang, Bo Wang, Yingfei Xiong:
Accelerating Patch Validation for Program Repair With Interception-Based Execution Scheduling. 618-635 - Zifeng Niu, Giuliano Casale:
Neural Density Estimation of Response Times in Layered Software Systems. 636-650 - Luiz Carvalho, Thelma Elita Colanzi, Wesley K. G. Assunção, Alessandro F. Garcia, Juliana Alves Pereira, Marcos Kalinowski, Rafael Maiani de Mello, Maria Julia de Lima, Carlos Lucena:
On the Usefulness of Automatically Generated Microservice Architectures. 651-667
Volume 50, Number 4, April 2024
- Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni:
Behind the Intent of Extract Method Refactoring: A Systematic Literature Review. 668-694 - Alvaro Veizaga, Seung Yeob Shin, Lionel C. Briand:
Automated Smell Detection and Recommendation in Natural Language Requirements. 695-720 - Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo:
Stealthy Backdoor Attack for Code Models. 721-741 - Anna Barzolevskaia, Enrico Branca, Natalia Stakhanova:
Measuring and Characterizing (Mis)compliance of the Android Permission System. 742-764 - Dimitri Prestat, Naouel Moha, Roger Villemaire, Florent Avellaneda:
DynAMICS: A Tool-Based Method for the Specification and Dynamic Detection of Android Behavioral Code Smells. 765-784 - Jean Baptiste Minani, Fatima Sabir, Naouel Moha, Yann-Gaël Guéhéneuc:
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges. 785-815 - Yuxia Zhang, Zhiqing Qiu, Klaas-Jan Stol, Wenhui Zhu, Jiaxin Zhu, Yingchen Tian, Hui Liu:
Automatic Commit Message Generation: A Critical Review and Directions for Future Work. 816-835 - Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani:
Guess the State: Exploiting Determinism to Improve GUI Exploration Efficiency. 836-853 - Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Xiapu Luo, Jingzhu He, Yutian Tang:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. 854-883 - Fahimeh Hajari, Samaneh Malmir, Ehsan Mirsaeedi, Peter C. Rigby:
Factoring Expertise, Workload, and Turnover Into Code Review Recommendation. 884-899 - Juraj Doncevic, Kresimir Fertalj, Mario Brcic, Mihael Kovac:
Mask-Mediator-Wrapper Architecture as a Data Mesh Driver. 900-910 - Junjie Wang, Yuchao Huang, Chunyang Chen, Zhe Liu, Song Wang, Qing Wang:
Software Testing With Large Language Models: Survey, Landscape, and Vision. 911-936 - He Jiang, Zun Wang, Zhide Zhou, Xiaochen Li, Shikai Guo, Weifeng Sun, Tao Zhang:
A Testing Program and Pragma Combination Selection Based Framework for High-Level Synthesis Tool Pragma-Related Bug Detection. 937-955 - Jesús Morán, Antonia Bertolino, Claudio de la Riva, Javier Tuya:
Automatic Debugging of Design Faults in MapReduce Applications. 956-978 - Sungjae Hwang, Sungho Lee, Sukyoung Ryu:
An Empirical Study of JVMs' Behaviors on Erroneous JNI Interoperations. 979-994 - Andrea Bombarda, Silvia Bonfanti, Martina De Sanctis, Angelo Gargantini, Patrizio Pelliccione, Elvinia Riccobene, Patrizia Scandurra:
Evaluation Framework for Autonomous Systems: The Case of Programmable Electronic Medical Systems. 995-1014
Volume 50, Number 5, May 2024
- Stephen John Warnett, Uwe Zdun:
On the Understandability of MLOps System Architectures. 1015-1039 - Yuanyuan Yuan, Qi Pang, Shuai Wang:
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing. 1040-1064 - Micha Prudjinski, Irit Hadar, Gil Luria:
Exploring the Role of Team Security Climate in the Implementation of Security by Design: A Case Study in the Defense Sector. 1065-1079 - Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon:
Active Code Learning: Benchmarking Sample-Efficient Training of Code Models. 1080-1095 - Alison Fernandez-Blanco, Araceli Queirolo Córdova, Alexandre Bergel, Juan Pablo Sandoval Alcocer:
Asking and Answering Questions During Memory Profiling. 1096-1117 - Miles Frantz, Ya Xiao, Tanmoy Sarkar Pias, Na Meng, Danfeng Yao:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. 1118-1129 - Ana Belén Sánchez, José Antonio Parejo, Sergio Segura, Amador Durán Toro, Mike Papadakis:
Mutation Testing in Practice: Insights From Open-Source Software Developers. 1130-1143 - Haofeng Li, Tian Tan, Yue Li, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, Lin Gao, Peng Di, Liang Lin, ChenXi Cui:
Generic Sensitivity: Generics-Guided Context Sensitivity for Pointer Analysis. 1144-1162 - Jiaqi Liu, Fengming Zhang, Xin Zhang, Zhiwen Yu, Liang Wang, Yao Zhang, Bin Guo:
hmCodeTrans: Human-Machine Interactive Code Translation. 1163-1181 - Rubing Huang, Chenhui Cui, Junlong Lian, Dave Towey, Weifeng Sun, Haibo Chen:
Toward Cost-Effective Adaptive Random Testing: An Approximate Nearest Neighbor Approach. 1182-1214 - David Nader-Palacio, Alejandro Velasco, Nathan Cooper, Alvaro Rodriguez, Kevin Moran, Denys Poshyvanyk:
Toward a Theory of Causation for Interpreting Neural Code Models. 1215-1243 - Zhijun Ding, Yuehao Xu, Binbin Feng, Changjun Jiang:
Microservice Extraction Based on a Comprehensive Evaluation of Logical Independence and Performance. 1244-1263 - Carolin E. Brandt, Ali Khatami, Mairieli Wessel, Andy Zaidman:
Shaken, Not Stirred: How Developers Like Their Amplified Tests. 1264-1280 - Haonan Tong, Dalin Zhang, Jiqiang Liu, Weiwei Xing, Lingyun Lu, Wei Lu, Yumei Wu:
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction. 1281-1305
Volume 50, Number 6, June 2024
- Boqin Qin, Yilun Chen, Haopeng Liu, Hua Zhang, Qiaoyan Wen, Linhai Song, Yiying Zhang:
Understanding and Detecting Real-World Safety Issues in Rust. 1306-1324 - Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. 1325-1339 - Yutian Tang, Zhijie Liu, Zhichao Zhou, Xiapu Luo:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. 1340-1359 - Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye:
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects. 1360-1373 - Radu Calinescu, Calum Imrie, Ravi Mangal, Genaína Nunes Rodrigues, Corina S. Pasareanu, Misael Alpizar Santana, Gricel Vázquez:
Controller Synthesis for Autonomous Systems With Deep-Learning Perception Components. 1374-1395 - Yinghua Li, Xueqi Dang, Weiguo Pian, Andrew Habib, Jacques Klein, Tegawendé F. Bissyandé:
Test Input Prioritization for Graph Neural Networks. 1396-1424 - Chenxing Zhong, Shanshan Li, Huang Huang, Xiaodong Liu, Zhikun Chen, Yi Zhang, He Zhang:
Domain-Driven Design for Microservices: An Evidence-Based Investigation. 1425-1449 - Nimmi Rashinika Weeraddana, Mahmoud Alfadel, Shane McIntosh:
Characterizing Timeout Builds in Continuous Integration. 1450-1463 - Qinghua Xu, Tao Yue, Shaukat Ali, Maite Arratibel:
Pretrain, Prompt, and Transfer: Evolving Digital Twins for Time-to-Event Analysis in Cyber-Physical Systems. 1464-1477 - Pengzhou Chen, Tao Chen, Miqing Li:
MMO: Meta Multi-Objectivization for Software Configuration Tuning. 1478-1504 - Yalan Lin, Chengcheng Wan, Shuwen Bai, Xiaodong Gu:
VarGAN: Adversarial Learning of Variable Semantic Representations. 1505-1517 - Shuangxiang Kan, Yuhao Gao, Zexin Zhong, Yulei Sui:
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java. 1518-1533 - Zewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Yongjuan Wang, Zibin Zheng:
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. 1534-1547 - Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, Liang Feng Zhang:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. 1548-1584 - Daniel Sokolowski, David Spielmann, Guido Salvaneschi:
Automated Infrastructure as Code Program Testing. 1585-1599 - Zixiang Xian, Rubing Huang, Dave Towey, Chunrong Fang, Zhenyu Chen:
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation. 1600-1619 - Bo Li, Haowei Quan, Jiawei Wang, Pei Liu, Haipeng Cai, Yuan Miao, Yun Yang, Li Li:
Neural Library Recommendation by Embedding Project-Library Knowledge Graph. 1620-1638 - Negar Ghorbani, Tarandeep Singh, Joshua Garcia, Sam Malek:
Darcy: Automatic Architectural Inconsistency Resolution in Java. 1639-1657
Volume 50, Number 7, July 2024
- Guoping Rong, Yongda Yu, Yifan Zhang, He Zhang, Haifeng Shen, Dong Shao, Hongyu Kuang, Min Wang, Zhao Wei, Yong Xu, Juhong Wang:
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation. 1658-1674 - Changshu Liu, Pelin Çetin, Yogesh Patodia, Baishakhi Ray, Saikat Chakraborty, Yangruibo Ding:
Automated Code Editing With Search-Generate-Modify. 1675-1686 - Christoph Laaber, Tao Yue, Shaukat Ali:
Evaluating Search-Based Software Microbenchmark Prioritization. 1687-1703 - Yutong Zhao, Lu Xiao, Sunny Wong:
A Platform-Agnostic Framework for Automatically Identifying Performance Issue Reports With Heuristic Linguistic Patterns. 1704-1725 - Hao Bu, Meng Sun:
Clopper-Pearson Algorithms for Efficient Statistical Model Checking Estimation. 1726-1746 - Haoxin Tu, Lingxiao Jiang, Jiaqi Hong, Xuhua Ding, He Jiang:
Concretely Mapped Symbolic Memory Locations for Memory Error Detection. 1747-1767 - Haoxin Tu, Zhide Zhou, He Jiang, Imam Nur Bani Yusuf, Yuxian Li, Lingxiao Jiang:
Isolating Compiler Bugs by Generating Effective Witness Programs With Large Language Models. 1768-1788 - Xite Wang, Senping Tian, Wei Cui:
ContractCheck: Checking Ethereum Smart Contracts in Fine-Grained Level. 1789-1806 - Bing Zhang, Rong Ren, Jia Liu, Mingcai Jiang, Jiadong Ren, Jingyue Li:
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections. 1807-1826 - Jia Li, Behrad Moeini, Shiva Nejati, Mehrdad Sabetzadeh, Michael McCallen:
A Lean Simulation Framework for Stress Testing IoT Cloud Systems. 1827-1851 - Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao:
Fusing Code Searchers. 1852-1866 - Lina Gong, Haoxiang Zhang:
MR${}^{2}$ 2-KG: A Multi-Relation Multi-Rationale Knowledge Graph for Modeling Software Engineering Knowledge on Stack Overflow. 1867-1887 - Jon Ayerdi, Valerio Terragni, Gunel Jahangirova, Aitor Arrieta, Paolo Tonella:
GenMorph: Automatically Generating Metamorphic Relations via Genetic Programming. 1888-1900 - Shuotong Bai, Huaxiao Liu, Enyan Dai, Lei Liu:
Improving Issue-PR Link Prediction via Knowledge-Aware Heterogeneous Graph Learning. 1901-1920 - Da Song, Xuan Xie, Jiayang Song, Derui Zhu, Yuheng Huang, Felix Juefei-Xu, Lei Ma:
LUNA: A Model-Based Universal Analysis Framework for Large Language Models. 1921-1948 - Shengcheng Yu, Chunrong Fang, Mingzhe Du, Zimin Ding, Zhenyu Chen, Zhendong Su:
Practical, Automated Scenario-Based Mobile App Testing. 1949-1966
Volume 50, Number 8, August 2024
- Yuanjie Xia, Lizhi Liao, Jinfu Chen, Heng Li, Weiyi Shang:
Reducing the Length of Field-Replay Based Load Testing. 1967-1983 - Hanouf Al Ghanmi, Rami Bahsoon:
ExplanaSC: A Framework for Determining Information Requirements for Explainable Blockchain Smart Contracts. 1984-2004 - Roman Haas, Raphael Nömmer, Elmar Juergens, Sven Apel:
Optimization of Automated and Manual Software Tests in Industrial Practice: A Survey and Historical Analysis. 2005-2020 - Eduard Baranov, Sourav Chakraborty, Axel Legay, Kuldeep S. Meel, N. Variyam Vinodchandran:
A Scalable $t$t-Wise Coverage Estimator: Algorithms and Applications. 2021-2039 - Matteo Biagiola, Paolo Tonella:
Boundary State Generation for Testing and Improvement of Autonomous Driving Systems. 2040-2053 - Minghao Yang, Shunkun Yang, W. Eric Wong:
Multi-Objective Software Defect Prediction via Multi-Source Uncertain Information Fusion and Multi-Task Multi-View Learning. 2054-2076 - Chunrong Fang, Weisong Sun, Yuchen Chen, Xiao Chen, Zhao Wei, Quanjun Zhang, Yudu You, Bin Luo, Yang Liu, Zhenyu Chen:
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization. 2077-2095 - Farshad Kazemi, Maxime Lamothe, Shane McIntosh:
Characterizing the Prevalence, Distribution, and Duration of Stale Reviewer Recommendations. 2096-2109 - Dimitrios Tsoukalas, Nikolaos Mittas, Elvira-Maria Arvanitou, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, Dionysios D. Kehagias:
Local and Global Explainability for Technical Debt Identification. 2110-2123 - Márton Elekes, Vince Molnár, Zoltán Micskei:
To Do or Not to Do: Semantics and Patterns for Do Activities in UML PSSM State Machines. 2124-2141 - Lei Cui, Junnan Yin, Jiancong Cui, Yuede Ji, Peng Liu, Zhiyu Hao, Xiaochun Yun:
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. 2142-2162 - Partha Chakraborty, Krishna Kanth Arumugam, Mahmoud Alfadel, Meiyappan Nagappan, Shane McIntosh:
Revisiting the Performance of Deep Learning-Based Vulnerability Detection on Realistic Datasets. 2163-2177 - Fangcheng Qiu, Zhongxin Liu, Xing Hu, Xin Xia, Gang Chen, Xinyu Wang:
Vulnerability Detection via Multiple-Graph-Based Code Representation. 2178-2199 - Maryam Masoudian, Heqing Huang, Morteza Amini, Charles Zhang:
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events. 2200-2218
Volume 50, Number 9, September 2024
- Yunbo Lyu, Hong Jin Kang, Ratnadira Widyasari, Julia Lawall, David Lo:
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel. 2219-2239 - Mona Nashaat, James Miller:
Towards Efficient Fine-Tuning of Language Models With Organizational Data for Automated Software Review. 2240-2253 - Sarah Fakhoury, Aaditya Naik, Georgios Sakkas, Saikat Chakraborty, Shuvendu K. Lahiri:
LLM-Based Test-Driven Interactive Code Generation: User Study and Empirical Evaluation. 2254-2268 - Ana Cristina Marcén, Antonio Iglesias, Raúl Lapeña, Francisca Pérez, Carlos Cetina:
A Systematic Literature Review of Model-Driven Engineering Using Machine Learning. 2269-2293 - Zhe Yu, Joymallya Chakraborty, Tim Menzies:
FairBalance: How to Achieve Equalized Odds With Data Pre-Processing. 2294-2312 - Qi Mo, Jianeng Wang, Zhongwen Xie, Cong Liu, Fei Dai:
Enforcing Correctness of Collaborative Business Processes Using Plans. 2313-2336 - Jiho Shin, Hadi Hemmati, Moshi Wei, Song Wang:
Assessing Evaluation Metrics for Neural Test Oracle Generation. 2337-2349 - Xiaoyan Xu, Filipe Roseiro Côgo, Shane McIntosh:
Mitigating the Uncertainty and Imprecision of Log-Based Code Coverage Without Requiring Additional Logging Statements. 2350-2362 - Zheng Li, Nicolás Saldías-Vallejos, Diego Seco, María Andrea Rodríguez Tastets, Rajiv Ranjan:
Long Live the Image: On Enabling Resilient Production Database Containers for Microservice Applications. 2363-2378 - Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving. 2379-2397 - Aniruddhan Murali, Mahmoud Alfadel, Meiyappan Nagappan, Meng Xu, Chengnian Sun:
AddressWatcher: Sanitizer-Based Localization of Memory Leak Fixes. 2398-2411 - Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani:
DBInputs: Exploiting Persistent Data to Improve Automated GUI Testing. 2412-2436 - Guang Yang, Yu Zhou, Xiang Chen, Xiangyu Zhang, Terry Yue Zhuo, Taolue Chen:
Chain-of-Thought in Neural Code Generation: From and for Lightweight Language Models. 2437-2457 - Georgios Kourtis, Clare Dixon, Michael Fisher:
Parameterized Verification of Leader/Follower Systems via Arithmetic Constraints. 2458-2471 - Mohan Cui, Hui Xu, Hongliang Tian, Yangfan Zhou:
rCanary: Detecting Memory Leaks Across Semi-Automated Memory Management Boundary in Rust. 2472-2484
Volume 50, Number 10, October 2024
- Shuai Jiang, Cai Fu, Shuai He, Jianqiang Lv, Lansheng Han, Hong Hu:
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. 2485-2497 - Anda Liang, Emerson R. Murphy-Hill, Westley Weimer, Yu Huang:
A Controlled Experiment in Age and Gender Bias When Reading Technical Articles in Software Engineering. 2498-2511 - Ziyi Zhou, Mingchen Li, Huiqun Yu, Guisheng Fan, Penghui Yang, Zijie Huang:
Learning to Generate Structured Code Summaries From Hybrid Code Context. 2512-2528 - SayedHassan Khatoonabadi, Ahmad Abdellatif, Diego Elias Costa, Emad Shihab:
Predicting the First Response Latency of Maintainers and Contributors in Pull Requests. 2529-2543 - Ricardo Caldas, Juan Antonio Piñera García, Matei Schiopu, Patrizio Pelliccione, Genaína Nunes Rodrigues, Thorsten Berger:
Runtime Verification and Field-Based Testing for ROS-Based Robotic Systems. 2544-2567 - Matteo Paltenghi, Rahul Pandita, Austin Z. Henley, Albert Ziegler:
Follow-Up Attention: An Empirical Study of Developer and Neural Model Code Exploration. 2568-2582 - Xiangbo Tian, Shi Ying, Tiangang Li, Mengting Yuan, Ruijin Wang, Yishi Zhao, Jianga Shang:
iTCRL: Causal-Intervention-Based Trace Contrastive Representation Learning for Microservice Systems. 2583-2601 - Vikram Nitin, Anne Mulhern, Sanjay Arora, Baishakhi Ray:
Yuga: Automatically Detecting Lifetime Annotation Bugs in the Rust Language. 2602-2613 - Chengjie Lu, Shaukat Ali, Tao Yue:
EpiTESTER: Testing Autonomous Vehicles With Epigenetic Algorithm and Attention Mechanism. 2614-2632 - Jingwen Liu, Wuxia Jin, Junhui Zhou, Qiong Feng, Ming Fan, Haijun Wang, Ting Liu:
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. 2633-2655 - Weifeng Sun, Zhenting Guo, Meng Yan, Zhongxin Liu, Yan Lei, Hongyu Zhang:
Method-Level Test-to-Code Traceability Link Construction by Semantic Correlation Learning. 2656-2676 - Sungmin Kang, Juyeon Yoon, Nargiz Askarbekkyzy, Shin Yoo:
Evaluating Diverse Large Language Models for Automatic and General Bug Reproduction. 2677-2694 - Partha Chakraborty, Mahmoud Alfadel, Meiyappan Nagappan:
RLocator: Reinforcement Learning for Bug Localization. 2695-2708
Volume 50, Number 11, November 2024
- Sebastián Uchitel, Marsha Chechik, Massimiliano Di Penta, Bram Adams, Nazareno Aguirre, Gabriele Bavota, Domenico Bianculli, Kelly Blincoe, Ana Cavalcanti, Yvonne Dittrich, Filomena Ferrucci, Rashina Hoda, LiGuo Huang, David Lo, Michael R. Lyu, Lei Ma, Jonathan I. Maletic, Leonardo Mariani, Collin McMillan, Tim Menzies, Martin Monperrus, Ana Moreno, Nachiappan Nagappan, Liliana Pasquale, Patrizio Pelliccione, Michael Pradel, Rahul Purandare, Sukyoung Ryu, Mehrdad Sabetzadeh, Alexander Serebrenik, Jun Sun, Chakkrit Kla Tantithamthavorn, Christoph Treude, Manuel Wimmer, Yingfei Xiong, Tao Yue, Andy Zaidman, Tao Zhang, Hao Zhong:
Scoping Software Engineering for AI: The TSE Perspective. 2709-2711 - Tanghaoran Zhang, Yao Lu, Yue Yu, Xinjun Mao, Yang Zhang, Yuxin Zhao:
How Do Developers Adapt Code Snippets to Their Contexts? An Empirical Study of Context-Based Code Snippet Adaptations. 2712-2731 - Haoye Wang, Zhipeng Gao, Xing Hu, David Lo, John Grundy, Xinyu Wang:
Just-In-Time TODO-Missed Commits Detection. 2732-2752 - Wardah Mahmood, Gül Çalikli, Daniel Strüber, Ralf Lämmel, Mukelabai Mukelabai, Thorsten Berger:
Virtual Platform: Effective and Seamless Variability Management for Software Systems. 2753-2785 - Muhui Jiang, Xiaoye Zheng, Rui Chang, Yajin Zhou, Xiapu Luo:
Examiner-Pro: Testing Arm Emulators Across Different Privileges. 2786-2806 - Hanzhi Jiang, Lin Shi, Meiru Che, Yuxia Zhang, Qing Wang:
Bringing Open Source Communication and Development Together: A Cross-Platform Study on Gitter and GitHub. 2807-2826 - Zejun Zhang, Zhenchang Xing, Dehai Zhao, Xiwei Xu, Liming Zhu, Qinghua Lu:
Automated Refactoring of Non-Idiomatic Python Code With Pythonic Idioms. 2827-2848 - Zimin Chen, Sen Fang, Martin Monperrus:
Supersonic: Learning to Generate Source Code Optimizations in C/C++. 2849-2864 - Xin Zhou, Bowen Xu, Kisub Kim, DongGyun Han, Hung Huu Nguyen, Thanh Le-Cong, Junda He, Bach Le, David Lo:
Leveraging Large Language Model for Automatic Patch Correctness Assessment. 2865-2883 - Xin Chen, Tian Sun, Dongling Zhuang, Dongjin Yu, He Jiang, Zhide Zhou, Sicheng Li:
HetFL: Heterogeneous Graph-Based Software Fault Localization. 2884-2905 - Fangyuan Zhang, Lingling Fan, Sen Chen, Miaoying Cai, Sihan Xu, Lida Zhao:
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries. 2906-2920 - Deepika Tiwari, Martin Monperrus, Benoit Baudry:
Mimicking Production Behavior With Generated Mocks. 2921-2946 - Asmar Muqeet, Tao Yue, Shaukat Ali, Paolo Arcaini:
Mitigating Noise in Quantum Software Testing Using Machine Learning. 2947-2961 - Xiaoyuan Xie, Xingpeng Li, Songqiang Chen:
Metamorphic Testing of Image Captioning Systems via Image-Level Reduction. 2962-2982 - Pengcheng Zhang, Ben Wang, Xiapu Luo, Hai Dong:
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts. 2983-3006 - Danniell Hu, Priscila Santiesteban, Madeline Endres, Westley Weimer:
Towards a Cognitive Model of Dynamic Debugging: Does Identifier Construction Matter? 3007-3021 - Yi Sun, Chengpeng Wang, Gang Fan, Qingkai Shi, Xiangyu Zhang:
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing. 3022-3036 - Lingxiao Tang, Chao Ni, Qiao Huang, Lingfeng Bao:
Enhancing Bug-Inducing Commit Identification: A Fine-Grained Semantic Analysis Approach. 3037-3052 - Rongqi Pan, Taher Ahmed Ghaleb, Lionel C. Briand:
LTM: Scalable and Black-Box Similarity-Based Test Suite Minimization Based on Language Models. 3053-3070 - Xin Yin, Chao Ni, Shaohua Wang:
Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability. 3071-3087
Volume 50, Number 12, December 2024
- Zhuo Su, Zehong Yu, Dongyan Wang, Yixiao Yang, Rui Wang, Wanli Chang, Aiguo Cui, Yu Jiang:
HSTCG: State-Aware Simulink Model Test Case Generation With Heuristic Strategy. 3088-3103 - Denini Silva, Martin Gruber, Satyajit Gokhale, Ellen Arteca, Alexi Turcotte, Marcelo d'Amorim, Wing Lam, Stefan Winter, Jonathan Bell:
The Effects of Computational Resources on Flaky Tests. 3104-3121 - Paula Muñoz, Manuel Wimmer, Javier Troya, Antonio Vallecillo:
Measuring the Fidelity of a Physical and a Digital Twin Using Trace Alignments. 3122-3145 - Sakina Fatima, Hadi Hemmati, Lionel C. Briand:
FlakyFix: Using Large Language Models for Predicting Flaky Test Fix Categories and Test Code Repair. 3146-3171 - Jorge Melegati, Kieran Conboy, Daniel Graziotin:
Qualitative Surveys in Software Engineering Research: Definition, Critical Review, and Guidelines. 3172-3187 - Yichen Li, Yintong Huo, Zhihan Jiang, Renyi Zhong, Pinjia He, Yuxin Su, Lionel C. Briand, Michael R. Lyu:
Exploring the Effectiveness of LLMs in Automated Logging Statement Generation: An Empirical Study. 3188-3207 - Pengyu Xue, Linhao Wu, Zhongxing Yu, Zhi Jin, Zhen Yang, Xinyi Li, Zhenyu Yang, Yue Tan:
Automated Commit Message Generation With Large Language Models: An Empirical Study and Beyond. 3208-3224 - Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Haijun Wang, Qi Xiong, Ting Liu:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. 3225-3248 - Xinyi Wang, Shaukat Ali, Tao Yue, Paolo Arcaini:
Quantum Approximate Optimization Algorithm for Test Case Optimization. 3249-3264 - Huan Xie, Yan Lei, Meng Yan, Shanshan Li, Xiaoguang Mao, Yue Yu, David Lo:
Towards More Precise Coincidental Correctness Detection With Deep Semantic Learning. 3265-3289 - Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo:
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models. 3290-3306 - Amin Abbasishahkoo, Mahboubeh Dadkhah, Lionel C. Briand, Dayi Lin:
TEASMA: A Practical Methodology for Test Adequacy Assessment of Deep Neural Networks. 3307-3329 - Mohammed Tayeeb Hasan, Nikolaos Tsantalis, Pouria Alikhanifard:
Refactoring-Aware Block Tracking in Commit History. 3330-3350 - Mengxi Zhang, Huaxiao Liu, Yuheng Zhou, Chunyang Chen, Pei Huang, Jian Zhao:
Don't Confuse! Redrawing GUI Navigation Flow in Mobile Apps for Visually Impaired Users. 3351-3368 - Dianshu Liao, Shidong Pan, Xiaoyu Sun, Xiaoxue Ren, Qing Huang, Zhenchang Xing, Huan Jin, Qinying Li:
$\mathbf{A^{3}}$A3-CodGen: A Repository-Level Code Generation Framework for Code Reuse With Local-Aware, Global-Aware, and Third-Party-Library-Aware. 3369-3384 - Jingyun Zhu, Kaixuan Li, Sen Chen, Lingling Fan, Junjie Wang, Xiaofei Xie:
A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android. 3385-3402 - Nazanin Bayati Chaleshtari, Yoann Marquer, Fabrizio Pastore, Lionel C. Briand:
AIM: Automated Input Set Minimization for Metamorphic Security Testing. 3403-3434 - Xiao Yu, Lei Liu, Xing Hu, Jacky Wai Keung, Jin Liu, Xin Xia:
Fight Fire With Fire: How Much Can We Trust ChatGPT on Source Code-Related Tasks? 3435-3453 - Yuan Jiang, Yujian Zhang, Xiaohong Su, Christoph Treude, Tiantian Wang:
StagedVulBERT: Multigranular Vulnerability Detection With a Novel Pretrained Code Model. 3454-3471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.