


default search action
Software - Practice and Experience, Volume 55
Volume 55, Number 1, 2025
- Issue Information. 1-2
- Jun Li, Lixian Li, Jin Liu, Xiao Yu, Xiao Liu, Jacky Wai Keung:
Large language model ChatGPT versus small deep learning models for self-admitted technical debt detection: Why not together? 3-28 - Xiaocong Zhou, Quanqi Wang
, Yifan Liu, Xiangping Chen, Yuan Huang, Zibin Zheng:
Are the smart contracts on Q&A site reliable? 29-48 - Peixin Yang
, Ziyao Zeng, Lin Zhu, Yanjiao Zhang, Xin Wang, Chuanxiang Ma, Wenhua Hu:
Bug numbers matter: An empirical study of effort-aware defect prediction using class labels versus bug numbers. 49-78 - Weitao Zou
, Long Luo, Fangyu Sun, Chao Li, Guangsheng Chen, Weipeng Jing:
Fine-grained forest net primary productivity monitoring: Software system integrating multisource data and smart optimization. 79-99 - Abdul Qayum
, Mengqi Zhang, Simon Colreavy, Muslim Chochlov, Jim Buckley, Dayi Lin, Ashish Rajendra Sai:
A Framework and Taxonomy for Characterizing the Applicability of Software Architecture Recovery Approaches: A Tertiary-Mapping Study. 100-132 - Prabal Verma
, Aditya Gupta, Vibha Jain, Kumar Shashvat, Mohit Kumar
, Sukhpal Singh Gill
:
An AIoT-driven smart healthcare framework for zoonoses detection in integrated fog-cloud computing environments. 133-154 - Nevin Brackett-Rozinsky, Daniel Lemire:
Batched ranged random integer generation. 155-169 - Carlos M. Aderaldo, Thiago M. Costa, Davi M. Vasconcelos, Nabor C. Mendonça
, Javier Cámara, David Garlan:
A declarative approach and benchmark tool for controlled evaluation of microservice resiliency patterns. 170-192
Volume 55, Number 2, 2025
- Issue Information. 193-194
- José Fuentes-Sepúlveda
, Diego Gatica
, Gonzalo Navarro, M. Andrea Rodríguez, Diego Seco:
Space-efficient data structures for the inference of subsumption and disjointness relations. 195-219 - Taghi Javdani Gandomani
, Hazura Zulzalil, Rami Bahsoon:
Empowering software startups with agile methods and practices: A design science research. 220-242 - Unai Arronategui
, José Ángel Bañares
, José Manuel Colom:
Large scale system design aided by modelling and DES simulation: A Petri net approach. 243-271 - Wenbo Zhou
, Yujiao Zhao, Ye Zhang, Yiyuan Wang, Minghao Yin:
A comprehensive survey of UPPAAL-assisted formal modeling and verification. 272-297 - Vincent A. Cicirello:
Algorithms for generating small random samples. 298-306 - Gavini Sreelatha
, C. Kishor Kumar Reddy
, Marlia Mohd Hanafiah, R. Madana Mohana
:
Hybrid Electro search beetle optimization based task scheduling and game theory SOA based resource allocation in multi cloud computing. 307-331 - Morteza Jouyban, Soodeh Hosseini
:
A novel vulnerability measure based on complex network communities. 332-354 - Anis Koubaa, Adel Ammar, Wadii Boulila:
Next-generation human-robot interaction with ChatGPT and robot operating system. 355-382 - Zhaohua Zheng
, Yiming Hong, Xin Xie, Keqiu Li, Qiquan Chen:
A multi-dimensional incentive mechanism based on age of update in hierarchical federated learning. 383-406
Volume 55, Number 3, 2025
- Angelo Martella
, Antonella Longo
, Marco Zappatore, Beniamino Di Martino, Antonio Esposito
:
A semantically enabled architecture for interoperable edge-cloud continuum applied to the e-health scenario. 409-447 - Md Akram Khan, Bibhudatta Sahoo, Sambit Kumar Mishra
, Achyut Shankar:
Multi-objective based container placement strategy in CaaS. 448-472 - Md. Saddam Hossain Mukta
, Badrun Nessa Antu, Nasreen Azad, Iftekharul Abedeen
, Najmul Islam:
Analysis of Software Developers' Programming Language Preferences and Community Behavior From Big5 Personality Traits. 473-490 - Weiwei Lin
, Haojun Xu
, Haocheng Zhong, Fan Chen, Zhengyang Hu:
AMORA: An Advanced Malleable and Operational Framework for Performance Prediction of Big Data Systems. 491-523 - Michael Karatzas, Themistoklis Diamantopoulos
, Andreas L. Symeonidis:
Extracting Fix Patterns for Static Analysis Violations Based on Collective Developer Knowledge. 524-540 - Minh-Tri Nguyen
, Hong-Linh Truong
:
On Optimizing Resources for Real-Time End-to-End Machine Learning in Heterogeneous Edges. 541-558 - Otmar Ertl
:
JumpBackHash: Say Goodbye to the Modulo Operation to Distribute Keys Uniformly to Buckets. 559-570 - Hüseyin Ünlü
, Ozan Rasit Yürüm
, Ali Yildiz
, Onur Demirörs
:
Application of a Size Measurement Standard for Data Warehouse Projects. 571-588 - Akhila Sri Manasa Venigalla
, Sridhar Chimalakonda:
Is There a Correlation Between Readme Content and Project Meta-Characteristics? 589-609
Volume 55, Number 4, 2025
- Weiwei Jiang
, Jianbin Mu, Haoyu Han, Yang Zhang, Sai Huang:
Federated Learning-Based Mobile Traffic Prediction in Satellite-Terrestrial Integrated Networks. 613-628 - Kaigeng Li, Wechen Jia, Zhi Li
:
Regulation of Appropriate Prompts for Users in Text-Based Generative Artificial Intelligence Programs. 629-646 - Haifa Abdullah Al-Shammare, Mohammad R. Alshayeb
, Malak Baslyman:
Towards a Readiness Model for Usable-Software Development in Organizations. 647-671 - Ross Rannells
, James H. Hill:
Security Risks in the Encryption of Database Connection Strings. 672-682 - Vamshi Sunku Mohan
, Sriram Sankaran, Rajkumar Buyya, Krishnashree Achuthan:
Leveraging Fog Computing for Security-Aware Resource Allocation in Narrowband Internet of Things. 683-713 - Kan Hu, Minxian Xu
, Kejiang Ye, Cheng-Zhong Xu:
LSRAM: A Lightweight Autoscaling and SLO Resource Allocation Framework for Microservices Based on Gradient Descent. 714-730 - Ankit Patel
, Rutvij H. Jhaveri
, Ashish Patel
, Kaushal A. Shah
, Jigarkumar Shah
:
Enhanced Aiot Multi-Modal Fusion for Human Activity Recognition in Ambient Assisted Living Environment. 731-747 - Luís M. S. Russo:
Implementing the Link-Cut Tree. 748-777 - Jeroen Koekkoek, Daniel Lemire:
Parsing Millions of DNS Records Per Second. 778-788
Volume 55, Number 5, 2025
- Issue Information. 789-790
- Samuel V. Cowart, Simuck F. Yuk
, Corey M. James, Enoch A. Nagelli, Andrew I. Biaglow
:
Augmented and Cloud Computing With Chemical Process Simulators. 791-808 - Jacopo Soldani
, Stefano Forti
, Luca Roveroni, Antonio Brogi:
Explaining Microservices' Cascading Failures From Their Logs. 809-828 - Enze Yu
, Haipeng Dai, Haihan Zhang, Zhenzhe Zheng, Jun Zhao, Guihai Chen:
Prototype-Based Collaborative Learning in UAV-Assisted Edge Computing Networks. 829-846 - Muhammad Fawad
, Ghulam Rasool, Francis Palma:
Android Source Code Smells: A Systematic Literature Review. 847-882 - Xia Lei, Siqi Wang, Yongkai Fan, Wenqian Shang:
Hate-UDF: Explainable Hateful Meme Detection With Uncertainty-Aware Dynamic Fusion. 883-895 - Sm Zobaed
, Mohsen Amini Salehi:
Confidential Computing Across Edge-To-Cloud for Machine Learning: A Survey Study. 896-924 - Md. Masudur Rahman
, Abdus Satter, Md. Mahbubul Alam Joarder, Kazi Sakib:
Software Metric Based Impact Analysis of Code Smells - A Large Scale Empirical Study. 925-945 - Na Li
, Siamak Farshidi, Zhiming Zhao
:
Search Multiple Types of Research Assets From Jupyter Notebook. 946-965 - Igor Alberte Rodrigues Eleutério, Willian Dener de Oliveira, Larissa Roberta Teixeira, Thiago Galbiatti Vespa, William Zaniboni Silva, Agma Juci Machado Traina, Caetano Traina:
Cosim-Gres: Towards Similarity Queries Optimization Inside RDBMS. 966-980

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.