


default search action
ACM Transactions on Software Engineering and Methodology, Volume 30
Volume 30, Number 1, January 2021
- Michele Guerriero

, Damian Andrew Tamburri
, Elisabetta Di Nitto:
StreamGen: Model-driven Development of Distributed Streaming Applications. 1:1-1:30 - Janet Siegmund, Norman Peitek, Sven Apel

, Norbert Siegmund:
Mastering Variation in Human Studies: The Role of Aggregation. 2:1-2:40 - Akond Rahman

, Md. Rayhanur Rahman
, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. 3:1-3:31 - Huihui Zhang, Man Zhang

, Tao Yue
, Shaukat Ali, Yan Li:
Uncertainty-wise Requirements Prioritization with Search. 4:1-4:54 - Ahmad Salim Al-Sibahi

, Thomas P. Jensen
, Aleksandar S. Dimovski
, Andrzej Wasowski
:
Verification of Program Transformations with Inductive Refinement Types. 5:1-5:33 - Ridwan Salihin Shariffdeen

, Shin Hwei Tan
, Mingyuan Gao, Abhik Roychoudhury
:
Automated Patch Transplantation. 6:1-6:36 - Xiaoxue Ma

, Shangru Wu, Ernest Bota Pobee
, Xiupei Mei
, Hao Zhang, Bo Jiang, Wing Kwong Chan:
RegionTrack: A Trace-Based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces. 7:1-7:49 - Osama Ehsan, Safwat Hassan, Mariam El Mezouar, Ying Zou:

An Empirical Study of Developer Discussions in the Gitter Platform. 8:1-8:39 - Roberto Bagnara, Michele Chiari, Roberta Gori, Abramo Bagnara:

A Practical Approach to Verification of Floating-Point C/C++ Programs with math.h/cmath Functions. 9:1-9:53 - Xiaoqin Fu, Haipeng Cai

, Wen Li, Li Li
:
SEADS: Scalable and Cost-effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning. 10:1-10:45
- Zhipeng Gao

, Xin Xia
, David Lo
, John Grundy:
Technical Q8A Site Answer Recommendation via Question Boosting. 11:1-11:34
Volume 30, Number 2, March 2021
- Javier Godoy

, Juan Pablo Galeotti, Diego Garbervetsky, Sebastián Uchitel:
Enabledness-based Testing of Object Protocols. 12:1-12:36 - Wei Ma, Mike Papadakis

, Anestis Tsakmalis, Maxime Cordy
, Yves Le Traon
:
Test Selection for Deep Learning Systems. 13:1-13:22 - Xiang Gao, Bo Wang

, Gregory J. Duck
, Ruyi Ji, Yingfei Xiong, Abhik Roychoudhury:
Beyond Tests: Program Vulnerability Repair via Crash Constraint Extraction. 14:1-14:27 - Manuel Ohrndorf, Christopher Pietsch, Udo Kelter, Lars Grunske

, Timo Kehrer:
History-based Model Repair Recommendations. 15:1-15:46 - Hong Jin Kang

, David Lo
:
Adversarial Specification Mining. 16:1-16:40 - Dunwei Gong, Baicai Sun

, Xiangjuan Yao, Tian Tian:
Test Data Generation for Path Coverage of MPI Programs Using SAEO. 17:1-17:37 - Zhenpeng Chen

, Yanbin Cao, Huihan Yao, Xuan Lu
, Xin Peng, Hong Mei, Xuanzhe Liu
:
Emoji-powered Sentiment and Emotion Detection from Software Developers' Communication Data. 18:1-18:48 - Thierry Titcheu Chekam

, Mike Papadakis
, Maxime Cordy
, Yves Le Traon
:
Killing Stubborn Mutants with Symbolic Execution. 19:1-19:23 - John-Paul Ore

, Carrick Detweiler
, Sebastian G. Elbaum:
An Empirical Study on Type Annotations: Accuracy, Speed, and Suggestion Effectiveness. 20:1-20:29
- Bozhi Wu

, Sen Chen
, Cuiyun Gao, Lingling Fan, Yang Liu
, Weiping Wen, Michael R. Lyu
:
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. 21:1-21:29 - Haoxiang Zhang, Shaowei Wang, Tse-Hsun (Peter) Chen

, Ahmed E. Hassan:
Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers? 22:1-22:31 - Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:

Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. 23:1-23:31 - Bailey Vandehei, Daniel Alencar da Costa, Davide Falessi:

Leveraging the Defects Life Cycle to Label Affected Versions and Defective Classes. 24:1-24:35 - Qiuyuan Chen, Xin Xia, Han Hu, David Lo

, Shanping Li:
Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction. 25:1-25:29
Volume 30, Number 3, May 2021
- Mauro Pezzè

:
Editorial. 26e:1 - Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen

:
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs. 26:1-26:42 - Juan de Lara, Esther Guerra

, Jörg Kienzle:
Facet-oriented Modelling. 27:1-27:59 - Abdullah A. Zarir, Gustavo Ansaldi Oliva, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:

Developing Cost-Effective Blockchain-Powered Applications: A Case Study of the Gas Usage of Smart Contract Transactions in the Ethereum Blockchain Platform. 28:1-28:38 - Mouna Abidi, Md. Saidur Rahman, Moses Openja, Foutse Khomh:

Are Multi-Language Design Smells Fault-Prone? An Empirical Study. 29:1-29:56 - Zohreh Sharafi, Yu Huang, Kevin Leach, Westley Weimer:

Toward an Objective Measure of Developers' Cognitive Activities. 30:1-30:40 - Gias Uddin, Foutse Khomh, Chanchal K. Roy:

Automatic API Usage Scenario Documentation from Technical Q&A Sites. 31:1-31:45 - Xiaoyu Sun

, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
, Damien Octeau, John C. Grundy:
Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. 32:1-32:36 - Guoliang Zhao

, Safwat Hassan, Ying Zou, Derek Truong, Toby Corbin:
Predicting Performance Anomalies in Software Systems at Run-time. 33:1-33:33 - Thiago M. Castro

, Leopoldo Teixeira, Vander Alves, Sven Apel
, Maxime Cordy
, Rohit Gheyi:
A Formal Framework of Software Product Line Analyses. 34:1-34:37 - Wendy Yánez, Rami Bahsoon, Yuqun Zhang, Rick Kazman:

Architecting Internet of Things Systems with Blockchain: A Catalog of Tactics. 35:1-35:46 - Simone Scalabrino

, Antonio Mastropaolo, Gabriele Bavota
, Rocco Oliveto:
An Adaptive Search Budget Allocation Approach for Search-Based Test Case Generation. 36:1-36:26 - Qiuyuan Chen, Chunyang Chen

, Safwat Hassan, Zhengchang Xing, Xin Xia, Ahmed E. Hassan:
How Should I Improve the UI of My App?: A Study of User Reviews of Popular Apps in the Google Play. 37:1-37:38
- Xiao Cheng

, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. 38:1-38:33 - Deqing Zou, Yueming Wu

, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, Hai Jin:
IntDroid: Android Malware Detection Based on API Intimacy Analysis. 39:1-39:32 - Yanjie Zhao

, Li Li
, Haoyu Wang, Haipeng Cai
, Tegawendé F. Bissyandé
, Jacques Klein
, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. 40:1-40:38
Volume 30, Number 4, July 2021
- Jianhui Chen, Fei He

:
Leveraging Control Flow Knowledge in SMT Solving of Program Verification. 41:1-41:26 - Chris Bogart

, Christian Kästner
, James D. Herbsleb, Ferdian Thung:
When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems. 42:1-42:56 - Angelo Ferrando

, Louise A. Dennis
, Rafael C. Cardoso
, Michael Fisher
, Davide Ancona
, Viviana Mascardi:
Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems. 43:1-43:43 - Héctor D. Menéndez

, Gunel Jahangirova, Federica Sarro
, Paolo Tonella, David Clark
:
Diversifying Focused Testing for Unit Testing. 44:1-44:24 - Zhaoqiang Guo

, Shiran Liu, Jinping Liu, Yanhui Li
, Lin Chen, Hongmin Lu, Yuming Zhou:
How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study. 45:1-45:56 - Jingbo Lu

, Dongjie He
, Jingling Xue:
Eagle: CFL-Reachability-Based Precision-Preserving Acceleration of Object-Sensitive Pointer Analysis with Partial Context Sensitivity. 46:1-46:46 - Philipp Paulweber

, Georg Simhandl, Uwe Zdun
:
Specifying with Interface and Trait Abstractions in Abstract State Machines: A Controlled Experiment. 47:1-47:29 - Preetha Chatterjee

, Kostadin Damevski
, Nicholas A. Kraft, Lori L. Pollock:
Automatically Identifying the Quality of Developer Chats for Post Hoc Use. 48:1-48:28 - Yida Tao

, Shan Tang, Yepang Liu
, Zhiwu Xu
, Shengchao Qin
:
Speeding Up Data Manipulation Tasks with Alternative Implementations: An Exploratory Study. 49:1-49:28 - Nacha Chondamrongkul, Jing Sun, Ian Warren:

Software Architectural Migration: An Automated Planning Approach. 50:1-50:35 - Dalia Sobhy

, Rami Bahsoon, Leandro L. Minku
, Rick Kazman:
Evaluation of Software Architectures under Uncertainty: A Systematic Literature Review. 51:1-51:50 - Daniel Russo

:
The Agile Success Model: A Mixed-methods Study of a Large-scale Agile Transformation. 52:1-52:46 - Safdar Aqeel Safdar

, Tao Yue, Shaukat Ali:
Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search. 53:1-53:36
- Yingzhe Lyu, Heng Li, Mohammed Sayagh, Zhen Ming (Jack) Jiang, Ahmed E. Hassan:

An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions. 54:1-54:38 - Malinda Dilhara, Ameya Ketkar, Danny Dig

:
Understanding Software-2.0: A Study of Machine Learning Library Usage and Evolution. 55:1-55:42 - Haoye Wang

, Xin Xia, David Lo
, Qiang He, Xinyu Wang, John Grundy:
Context-aware Retrieval-based Deep Commit Message Generation. 56:1-56:30

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














