


default search action
IEEE Transactions on Software Engineering, Volume 46
Volume 46, Number 1, January 2020
- Davide Fucci, Giuseppe Scanniello

, Simone Romano
, Natalia Juristo:
Need for Sleep: The Impact of a Night of Sleep Deprivation on Novice Developers' Performance. 1-19 - Mathieu Nassif

, Christoph Treude
, Martin P. Robillard:
Automatically Categorizing Software Technologies. 20-32 - Keheliya Gallaba

, Shane McIntosh
:
Use and Misuse of Continuous Integration Features: An Empirical Study of Projects That (Mis)Use Travis CI. 33-50 - Malvika Rao

, David F. Bacon, David C. Parkes, Margo I. Seltzer:
Incentivizing Deep Fixes in Software Economies. 51-70 - Simone Romano

, Christopher Vendome, Giuseppe Scanniello
, Denys Poshyvanyk
:
A Multi-Study Investigation into Dead Code. 71-99 - Christoph Czepa

, Uwe Zdun
:
On the Understandability of Temporal Properties Formalized in Linear Temporal Logic, Property Specification Patterns and Event Processing Language. 100-112 - Pan Bian

, Bin Liang
, Yan Zhang, Chaoqun Yang, Wenchang Shi
, Yan Cai
:
Corrections to "Detecting Bugs by Discovering Expectations and Their Violations". 113
Volume 46, Number 2, February 2020
- A. César C. França

, Fabio Q. B. da Silva
, Helen Sharp
:
Motivation and Satisfaction of Software Engineers. 118-140 - Xintao Niu

, Changhai Nie, Jeff Yu Lei
, Hareton Leung, Xiaoyin Wang
:
Identifying Failure-Causing Schemas in the Presence of Multiple Faults. 141-162 - Julian Thomé

, Lwin Khin Shar
, Domenico Bianculli
, Lionel C. Briand
:
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving. 163-195 - Kevin Moran

, Carlos Bernal-Cárdenas
, Michael Curcio, Richard Bonett, Denys Poshyvanyk
:
Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps. 196-221
Volume 46, Number 3, March 2020
- Jéssyka Vilela

, Jaelson Castro
, Luiz Eduardo Galvão Martins
, Tony Gorschek:
Safety Practices in Requirements Engineering: The Uni-REPM Safety Module. 222-250 - Francesco Basciani

, Mattia D'Emidio
, Davide Di Ruscio
, Daniele Frigioni
, Ludovico Iovino
, Alfonso Pierantonio
:
Automated Selection of Optimal Model Transformation Chains via Shortest-Path Algorithms. 251-279 - Roberto Natella

, Stefan Winter
, Domenico Cotroneo
, Neeraj Suri
:
Analyzing the Effects of Bugs on Software Interfaces. 280-301 - Huayao Wu

, Changhai Nie, Justyna Petke
, Yue Jia, Mark Harman:
An Empirical Comparison of Combinatorial Testing, Random Testing and Adaptive Random Testing. 302-320 - Maurice H. ter Beek

, Axel Legay, Alberto Lluch-Lafuente
, Andrea Vandin
:
A Framework for Quantitative Modeling and Analysis of Highly (Re)configurable Systems. 321-345
Volume 46, Number 4, April 2020
- Luiz Eduardo Galvão Martins

, Tony Gorschek:
Requirements Engineering for Safety-Critical Systems: An Interview Study with Industry Practitioners. 346-361 - Bart Meyers

, Hans Vangheluwe
, Joachim Denil
, Rick Salay:
A Framework for Temporal Verification Support in Domain-Specific Modelling. 362-404 - Tingting Yu

, Zunchen Huang
, Chao Wang:
ConTesa: Directed Test Suite Augmentation for Concurrent Software. 405-419 - Davide Falessi

, Justin Roll, Jin L. C. Guo, Jane Cleland-Huang
:
Leveraging Historical Associations between Requirements and Source Code to Identify Impacted Classes. 420-441 - Norman Peitek

, Janet Siegmund
, Sven Apel
, Christian Kästner
, Chris Parnin
, Anja Bethmann, Thomas Leich
, Gunter Saake
, André Brechmann
:
A Look into Programmers' Heads. 442-462
Volume 46, Number 5, May 2020
- Angshuman Jana

, Raju Halder
, Kalahasti Venkata Abhishekh
, Sanjeevini Devi Ganni
, Agostino Cortesi
:
Extending Abstract Interpretation to Dependency Analysis of Database Applications. 463-494 - Yuanrui Fan

, Xin Xia
, David Lo
, Ahmed E. Hassan:
Chaff from the Wheat: Characterizing and Determining Valid Bug Reports. 495-525 - Colin Paterson

, Radu Calinescu
:
Observation-Enhanced QoS Analysis of Component-Based Systems. 526-548 - Liangze Yin

, Wei Dong
, Wanwei Liu
, Ji Wang
:
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification. 549-565 - Adrian Santos

, Omar S. Gómez
, Natalia Juristo:
Analyzing Families of Experiments in SE: A Systematic Mapping Study. 566-583
Volume 46, Number 6, June 2020
- Xintao Niu, Changhai Nie, Hareton Leung, Yu Lei, Xiaoyin Wang, Jiaxi Xu, Yan Wang:

An Interleaving Approach to Combinatorial Testing and Failure-Inducing Interaction Identification. 584-615 - Laleh Shikh Gholamhossein Ghandehari

, Yu Lei
, Raghu Kacker, D. Richard Kuhn
, Tao Xie, David Chenho Kung:
A Combinatorial Testing-Based Approach to Fault Localization. 616-645 - Mohammed Sayagh

, Noureddine Kerzazi, Bram Adams
, Fábio Petrillo
:
Software Configuration Engineering in Practice Interviews, Survey, and Systematic Literature Review. 646-673 - Dario Di Nucci

, Annibale Panichella
, Andy Zaidman
, Andrea De Lucia
:
A Test Case Prioritization Genetic Algorithm Guided by the Hypervolume Indicator. 674-696
Volume 46, Number 7, July 2020
- Lisa Nguyen Quang Do

, Stefan Krüger, Patrick Hill, Karim Ali
, Eric Bodden
:
Debugging Static Analysis. 697-709 - Vladimir Kovalenko

, Nava Tintarev
, Evgeny Pasynkov, Christian Bird, Alberto Bacchelli
:
Does Reviewer Recommendation Help Developers? 710-731 - Yanjie Jiang

, Hui Liu
, Jiaqi Zhu, Lu Zhang:
Automatic and Accurate Expansion of Abbreviations in Parameters. 732-747 - Ying Meng

, Gregory Gay
, Michael W. Whalen:
Ensuring the Observability of Structural Test Obligations. 748-772 - Safwat Hassan

, Cor-Paul Bezemer
, Ahmed E. Hassan:
Studying Bad Updates of Top Free-to-Download Apps in the Google Play Store. 773-793 - Vivek Nair

, Zhe Yu
, Tim Menzies
, Norbert Siegmund
, Sven Apel
:
Finding Faster Configurations Using FLASH. 794-811
Volume 46, Number 8, August 2020
- Yulei Sui

, Jingling Xue
:
Value-Flow-Based Demand-Driven Pointer Analysis for C and C++. 812-835 - Weiqin Zou

, David Lo
, Zhenyu Chen
, Xin Xia
, Yang Feng, Baowen Xu
:
How Practitioners Perceive Automated Bug Report Management Techniques. 836-862 - Kristín Fjóla Tómasdóttir

, Mauricio Finavaro Aniche
, Arie van Deursen
:
The Adoption of JavaScript Linters in Practice: A Case Study on ESLint. 863-891 - Gleiph Ghiotto

, Leonardo Murta
, Márcio de Oliveira Barros, André van der Hoek
:
On the Nature of Merge Conflicts: A Study of 2, 731 Open Source Java Projects Hosted by GitHub. 892-915
Volume 46, Number 9, September 2020
- Xiaodong Zhang

, Zijiang Yang, Qinghua Zheng, Yu Hao
, Pei Liu, Ting Liu
:
Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling. 916-931 - Vahid Alizadeh

, Marouane Kessentini
, Mohamed Wiem Mkaouer
, Mel Ocinneide
, Ali Ouni
, Yuanfang Cai
:
An Interactive and Dynamic Search-Based Approach to Software Refactoring Recommendations. 932-961 - Ann Barcomb

, Andreas Kaufmann
, Dirk Riehle
, Klaas-Jan Stol
, Brian Fitzgerald
:
Uncovering the Periphery: A Qualitative Survey of Episodic Volunteering in Free/Libre and Open Source Software Communities. 962-980 - Menghao Li

, Pei Wang
, Wei Wang, Shuai Wang
, Dinghao Wu
, Jian Liu
, Rui Xue
, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. 981-1003 - Yu Zhou

, Changzhi Wang
, Xin Yan
, Taolue Chen
, Sebastiano Panichella
, Harald C. Gall
:
Automatic Detection and Repair Recommendation of Directive Defects in Java API Documentation. 1004-1023 - Shaowei Wang

, Tse-Hsun Chen
, Ahmed E. Hassan:
How Do Users Revise Answers on Technical Q&A Websites? A Case Study on Stack Overflow. 1024-1038 - Yanjie Jiang

, Hui Liu
, Jiaqi Zhu, Lu Zhang
:
Corrections to "Automatic and Accurate Expansion of Abbreviations in Parameters". 1039
Volume 46, Number 10, October 2020
- Yuan Yuan

, Wolfgang Banzhaf
:
ARJA: Automated Repair of Java Programs via Multi-Objective Genetic Programming. 1040-1067 - Christopher S. Corley

, Kostadin Damevski
, Nicholas A. Kraft
:
Changeset-Based Topic Modeling of Software Repositories. 1068-1080 - Xiaochen Li

, He Jiang
, Yasutaka Kamei
, Xin Chen:
Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding. 1081-1097 - Qiao Huang, Xin Xia

, David Lo
, Gail C. Murphy
:
Automating Intention Mining. 1098-1119 - Zhi Quan Zhou

, Liqun Sun
, Tsong Yueh Chen
, Dave Towey
:
Metamorphic Relations for Enhancing System Understanding and Use. 1120-1154
Volume 46, Number 11, November 2020
- Ming Wen

, Rongxin Wu
, Shing-Chi Cheung
:
How Well Do Change Sequences Predict Defects? Sequence Learning from Software Changes. 1155-1175 - Lili Wei

, Yepang Liu
, Shing-Chi Cheung
, Huaxun Huang, Xuan Lu
, Xuanzhe Liu
:
Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps. 1176-1199 - Chakkrit Tantithamthavorn

, Ahmed E. Hassan, Kenichi Matsumoto
:
The Impact of Class Rebalancing Techniques on the Performance and Interpretation of Defect Prediction Models. 1200-1219 - Leandro Nahabedian

, Víctor A. Braberman
, Nicolás D'Ippolito
, Shinichi Honiden
, Jeff Kramer
, Kenji Tei
, Sebastián Uchitel:
Dynamic Update of Discrete Event Controllers. 1220-1240 - Zhiyuan Wan

, Xin Xia
, Ahmed E. Hassan, David Lo
, Jianwei Yin, Xiaohu Yang
:
Perceptions, Expectations, and Challenges in Defect Prediction. 1241-1266
Volume 46, Number 12, December 2020
- Song Wang

, Taiyue Liu, Jaechang Nam
, Lin Tan:
Deep Semantic Feature Learning for Software Defect Prediction. 1267-1293 - Mozhan Soltani

, Annibale Panichella
, Arie van Deursen
:
Search-Based Crash Reproduction and Its Impact on Debugging. 1294-1317 - Rahul Mohanani

, Iflaah Salman
, Burak Turhan
, Pilar Rodríguez
, Paul Ralph
:
Cognitive Biases in Software Engineering: A Systematic Mapping Study. 1318-1339 - Pilar Rodríguez

, Emilia Mendes, Burak Turhan
:
Key Stakeholders' Value Propositions for Feature Selection in Software-Intensive Products: An Industrial Case Study. 1340-1363 - Rezwana Karim, Frank Tip

, Alena Sochurková, Koushik Sen:
Platform-Independent Dynamic Taint Analysis for JavaScript. 1364-1379 - Stefano Iannucci

, Sherif Abdelwahed
, Andrea Montemaggio
, Melissa Hannis
, Leslie Leonard
, Jason S. King, John Hamilton:
A Model-Integrated Approach to Designing Self-Protecting Systems. 1380-1392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














