


default search action
ACM Transactions on Software Engineering and Methodology, Volume 26
Volume 26, Number 1, July 2017
- Daniel Di Nardo, Fabrizio Pastore

, Lionel C. Briand:
Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes. 1:1-1:40 - Alireza Sadeghi

, Naeem Esfahani, Sam Malek:
Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis. 2:1-2:27 - Chris Mills, Gabriele Bavota

, Sonia Haiduc, Rocco Oliveto, Andrian Marcus
, Andrea De Lucia
:
Predicting Query Quality for Applications of Text Retrieval to Software Engineering Tasks. 3:1-3:45 - Shin Yoo, Xiaoyuan Xie, Fei-Ching Kuo, Tsong Yueh Chen

, Mark Harman:
Human Competitiveness of Genetic Programming in Spectrum-Based Fault Localisation: Theoretical and Empirical Analysis. 4:1-4:30 - Robert M. Hierons

, Uraz Cengiz Türker:
Parallel Algorithms for Generating Distinguishing Sequences for Observable Non-deterministic FSMs. 5:1-5:34
Volume 26, Number 2, October 2017
- David S. Rosenblum:

Editorial. 6e:1-6e:2 - Giuseppe Scanniello

, Michele Risi, Porfirio Tramontana
, Simone Romano
:
Fixing Faults in C and Java Source Code: Abbreviated vs. Full-Word Identifier Names. 6:1-6:43 - Luciano Baresi

, Angelo Morzenti
, Alfredo Motta, Mohammad Mehdi Pourhashem Kallehbasti
, Matteo Rossi:
A Logic-Based Approach for the Verification of UML Timed Models. 7:1-7:47 - Chris Karanikolas

, Grigoris Dimitroulakos, Konstantinos Masselos:
Early Evaluation of Implementation Alternatives of Composite Data Structures Toward Maintainability. 8:1-8:44
Volume 26, Number 3, January 2018
- Paul C. Attie

, Saddek Bensalem, Marius Bozga, Mohamad Jaber, Joseph Sifakis, Fadi A. Zaraket
:
Global and Local Deadlock Freedom in BIP. 9:1-9:48 - Iago Abal, Jean Melo, Stefan Stanciulescu, Claus Brabrand, Márcio Ribeiro

, Andrzej Wasowski
:
Variability Bugs in Highly Configurable Systems: A Qualitative Analysis. 10:1-10:34 - Joshua Garcia, Mahmoud Hammad

, Sam Malek:
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware. 11:1-11:29
Volume 26, Number 4, February 2018
- Khanh Nguyen

, Kai Wang, Yingyi Bu, Lu Fang, Guoqing Xu:
Understanding and Combating Memory Bloat in Managed Data-Intensive Systems. 12:1-12:41 - Andrea De Lucia

, Vincenzo Deufemia
, Carmine Gravino
, Michele Risi:
Detecting the Behavior of Design Patterns through Model Checking and Dynamic Analysis. 13:1-13:41 - Yi Xiang

, Yuren Zhou, Zibin Zheng
, Miqing Li:
Configuring Software Product Lines by Combining Many-Objective Optimization and SAT Solvers. 14:1-14:46

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














