default search action
ACM Transactions on Software Engineering and Methodology, Volume 30
Volume 30, Number 1, January 2021
- Michele Guerriero, Damian Andrew Tamburri, Elisabetta Di Nitto:
StreamGen: Model-driven Development of Distributed Streaming Applications. 1:1-1:30 - Janet Siegmund, Norman Peitek, Sven Apel, Norbert Siegmund:
Mastering Variation in Human Studies: The Role of Aggregation. 2:1-2:40 - Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. 3:1-3:31 - Huihui Zhang, Man Zhang, Tao Yue, Shaukat Ali, Yan Li:
Uncertainty-wise Requirements Prioritization with Search. 4:1-4:54 - Ahmad Salim Al-Sibahi, Thomas P. Jensen, Aleksandar S. Dimovski, Andrzej Wasowski:
Verification of Program Transformations with Inductive Refinement Types. 5:1-5:33 - Ridwan Salihin Shariffdeen, Shin Hwei Tan, Mingyuan Gao, Abhik Roychoudhury:
Automated Patch Transplantation. 6:1-6:36 - Xiaoxue Ma, Shangru Wu, Ernest Bota Pobee, Xiupei Mei, Hao Zhang, Bo Jiang, Wing Kwong Chan:
RegionTrack: A Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces. 7:1-7:49 - Osama Ehsan, Safwat Hassan, Mariam El Mezouar, Ying Zou:
An Empirical Study of Developer Discussions in the Gitter Platform. 8:1-8:39 - Roberto Bagnara, Michele Chiari, Roberta Gori, Abramo Bagnara:
A Practical Approach to Verification of Floating-Point C/C++ Programs with math.h/cmath Functions. 9:1-9:53 - Xiaoqin Fu, Haipeng Cai, Wen Li, Li Li:
SEADS: Scalable and Cost-effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning. 10:1-10:45
- Zhipeng Gao, Xin Xia, David Lo, John Grundy:
Technical Q8A Site Answer Recommendation via Question Boosting. 11:1-11:34
Volume 30, Number 2, March 2021
- Javier Godoy, Juan Pablo Galeotti, Diego Garbervetsky, Sebastián Uchitel:
Enabledness-based Testing of Object Protocols. 12:1-12:36 - Wei Ma, Mike Papadakis, Anestis Tsakmalis, Maxime Cordy, Yves Le Traon:
Test Selection for Deep Learning Systems. 13:1-13:22 - Xiang Gao, Bo Wang, Gregory J. Duck, Ruyi Ji, Yingfei Xiong, Abhik Roychoudhury:
Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction. 14:1-14:27 - Manuel Ohrndorf, Christopher Pietsch, Udo Kelter, Lars Grunske, Timo Kehrer:
History-based Model Repair Recommendations. 15:1-15:46 - Hong Jin Kang, David Lo:
Adversarial Specification Mining. 16:1-16:40 - Dunwei Gong, Baicai Sun, Xiangjuan Yao, Tian Tian:
Test Data Generation for Path Coverage of MPI Programs Using SAEO. 17:1-17:37 - Zhenpeng Chen, Yanbin Cao, Huihan Yao, Xuan Lu, Xin Peng, Hong Mei, Xuanzhe Liu:
Emoji-powered Sentiment and Emotion Detection from Software Developers' Communication Data. 18:1-18:48 - Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon:
Killing Stubborn Mutants with Symbolic Execution. 19:1-19:23 - John-Paul Ore, Carrick Detweiler, Sebastian G. Elbaum:
An Empirical Study on Type Annotations: Accuracy, Speed, and Suggestion Effectiveness. 20:1-20:29
- Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael R. Lyu:
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. 21:1-21:29 - Haoxiang Zhang, Shaowei Wang, Tse-Hsun (Peter) Chen, Ahmed E. Hassan:
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers? 22:1-22:31 - Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. 23:1-23:31 - Bailey Vandehei, Daniel Alencar da Costa, Davide Falessi:
Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes. 24:1-24:35 - Qiuyuan Chen, Xin Xia, Han Hu, David Lo, Shanping Li:
Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction. 25:1-25:29
Volume 30, Number 3, May 2021
- Mauro Pezzè:
Editorial. 26e:1 - Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen:
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs. 26:1-26:42 - Juan de Lara, Esther Guerra, Jörg Kienzle:
Facet-oriented Modelling. 27:1-27:59 - Abdullah A. Zarir, Gustavo Ansaldi Oliva, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:
Developing Cost-Effective Blockchain-Powered Applications: A Case Study of the Gas Usage of Smart Contract Transactions in the Ethereum Blockchain Platform. 28:1-28:38 - Mouna Abidi, Md. Saidur Rahman, Moses Openja, Foutse Khomh:
Are Multi-Language Design Smells Fault-Prone? An Empirical Study. 29:1-29:56 - Zohreh Sharafi, Yu Huang, Kevin Leach, Westley Weimer:
Toward an Objective Measure of Developers' Cognitive Activities. 30:1-30:40 - Gias Uddin, Foutse Khomh, Chanchal K. Roy:
Automatic API Usage Scenario Documentation from Technical Q&A Sites. 31:1-31:45 - Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, John C. Grundy:
Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. 32:1-32:36 - Guoliang Zhao, Safwat Hassan, Ying Zou, Derek Truong, Toby Corbin:
Predicting Performance Anomalies in Software Systems at Run-time. 33:1-33:33 - Thiago M. Castro, Leopoldo Teixeira, Vander Alves, Sven Apel, Maxime Cordy, Rohit Gheyi:
A Formal Framework of Software Product Line Analyses. 34:1-34:37 - Wendy Yánez, Rami Bahsoon, Yuqun Zhang, Rick Kazman:
Architecting Internet of Things Systems with Blockchain: A Catalog of Tactics. 35:1-35:46 - Simone Scalabrino, Antonio Mastropaolo, Gabriele Bavota, Rocco Oliveto:
An Adaptive Search Budget Allocation Approach for Search-Based Test Case Generation. 36:1-36:26 - Qiuyuan Chen, Chunyang Chen, Safwat Hassan, Zhengchang Xing, Xin Xia, Ahmed E. Hassan:
How Should I Improve the UI of My App?: A Study of User Reviews of Popular Apps in the Google Play. 37:1-37:38
- Xiao Cheng, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. 38:1-38:33 - Deqing Zou, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, Hai Jin:
IntDroid: Android Malware Detection Based on API Intimacy Analysis. 39:1-39:32 - Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. 40:1-40:38
Volume 30, Number 4, July 2021
- Jianhui Chen, Fei He:
Leveraging Control Flow Knowledge in SMT Solving of Program Verification. 41:1-41:26 - Chris Bogart, Christian Kästner, James D. Herbsleb, Ferdian Thung:
When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems. 42:1-42:56 - Angelo Ferrando, Louise A. Dennis, Rafael C. Cardoso, Michael Fisher, Davide Ancona, Viviana Mascardi:
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems. 43:1-43:43 - Héctor D. Menéndez, Gunel Jahangirova, Federica Sarro, Paolo Tonella, David Clark:
Diversifying Focused Testing for Unit Testing. 44:1-44:24 - Zhaoqiang Guo, Shiran Liu, Jinping Liu, Yanhui Li, Lin Chen, Hongmin Lu, Yuming Zhou:
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study. 45:1-45:56 - Jingbo Lu, Dongjie He, Jingling Xue:
Eagle: CFL-Reachability-Based Precision-Preserving Acceleration of Object-Sensitive Pointer Analysis with Partial Context Sensitivity. 46:1-46:46 - Philipp Paulweber, Georg Simhandl, Uwe Zdun:
Specifying with Interface and Trait Abstractions in Abstract State Machines: A Controlled Experiment. 47:1-47:29 - Preetha Chatterjee, Kostadin Damevski, Nicholas A. Kraft, Lori L. Pollock:
Automatically Identifying the Quality of Developer Chats for Post Hoc Use. 48:1-48:28 - Yida Tao, Shan Tang, Yepang Liu, Zhiwu Xu, Shengchao Qin:
Speeding Up Data Manipulation Tasks with Alternative Implementations: An Exploratory Study. 49:1-49:28 - Nacha Chondamrongkul, Jing Sun, Ian Warren:
Software Architectural Migration: An Automated Planning Approach. 50:1-50:35 - Dalia Sobhy, Rami Bahsoon, Leandro L. Minku, Rick Kazman:
Evaluation of Software Architectures under Uncertainty: A Systematic Literature Review. 51:1-51:50 - Daniel Russo:
The Agile Success Model: A Mixed-methods Study of a Large-scale Agile Transformation. 52:1-52:46 - Safdar Aqeel Safdar, Tao Yue, Shaukat Ali:
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search. 53:1-53:36
- Yingzhe Lyu, Heng Li, Mohammed Sayagh, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:
An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions. 54:1-54:38 - Malinda Dilhara, Ameya Ketkar, Danny Dig:
Understanding Software-2.0: A Study of Machine Learning Library Usage and Evolution. 55:1-55:42 - Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy:
Context-aware Retrieval-based Deep Commit Message Generation. 56:1-56:30
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.