


default search action
ACM Transactions on Software Engineering and Methodology, Volume 31
Volume 31, Number 1, January 2022
- Andrea Arcuri
, Juan P. Galeotti
:
Enhancing Search-based Testing with Testability Transformations for Existing APIs. 1:1-1:34 - Man Zhang
, Andrea Arcuri:
Adaptive Hypermutation for Search-Based System Test Generation: A Study on REST APIs with EvoMaster. 2:1-2:52 - Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou, Michael R. Lyu:
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs. 3:1-3:25 - Davide Falessi, Aalok Ahluwalia, Massimiliano Di Penta:
The Impact of Dormant Defects on Defect Prediction: A Study of 19 Apache Projects. 4:1-4:26 - Birgit Vogel-Heuser, Eva-Maria Neumann
, Juliane Fischer:
MICOSE4aPS: Industrially Applicable Maturity Metric to Improve Systematic Reuse of Control Software. 5:1-5:24 - Anders Sundelin
, Javier González-Huerta
, Krzysztof Wnuk, Tony Gorschek:
Towards an Anatomy of Software Craftsmanship. 6:1-6:49 - Daniel Graziotin, Per Lenberg, Robert Feldt, Stefan Wagner
:
Psychometrics in Behavioral Software Engineering: A Methodological Introduction with Guidelines. 7:1-7:36 - Jianyi Zhou, Junjie Chen, Dan Hao:
Parallel Test Prioritization. 8:1-8:50 - Irum Rauf
, Marian Petre, Thein Tun, Tamara Lopez
, Paul Lunn, Dirk van der Linden, John N. Towse
, Helen Sharp
, Mark Levine
, Awais Rashid
, Bashar Nuseibeh
:
The Case for Adaptive Security Interventions. 9:1-9:52 - Lorena Arcega
, Jaime Font, Øystein Haugen, Carlos Cetina:
Bug Localization in Model-Based Systems in the Wild. 10:1-10:32
- Cuiyun Gao, Wenjie Zhou, Xin Xia, David Lo
, Qi Xie, Michael R. Lyu:
Automating App Review Response Generation Based on Contextual Knowledge. 11:1-11:36 - Chao Liu, Xin Xia, David Lo
, Zhiwei Liu, Ahmed E. Hassan, Shanping Li:
CodeMatcher: Searching Code Based on Sequential Semantics of Important Query Words. 12:1-12:37 - Yaqin Zhou, Jing Kai Siow, Chenyu Wang, Shangqing Liu, Yang Liu:
SPI: Automated Identification of Security Patches via Commits. 13:1-13:27 - Amin Nikanjam
, Houssem Ben Braiek, Mohammad Mehdi Morovati
, Foutse Khomh:
Automatic Fault Detection for Deep Learning Programs Using Graph Transformations. 14:1-14:27 - Chao Liu, Cuiyun Gao, Xin Xia, David Lo
, John C. Grundy, Xiaohu Yang:
On the Reproducibility and Replicability of Deep Learning in Software Engineering. 15:1-15:46 - Yingzhe Lyu, Gopi Krishnan Rajbahadur
, Dayi Lin
, Boyuan Chen, Zhen Ming (Jack) Jiang:
Towards a Consistent Interpretation of AIOps Models. 16:1-16:38 - Owain Parry
, Gregory M. Kapfhammer, Michael Hilton
, Phil McMinn:
A Survey of Flaky Tests. 17:1-17:74
Volume 31, Number 2, April 2022
- Mauro Pezzè
:
Editorial: A Retrospective and Prospective Reflection. 18e:1-18e:2 - Kevin Lano
, Shekoufeh Kolahdouz Rahimi, Shichao Fang:
Model Transformation Development Using Automated Requirements Analysis, Metamodel Matching, and Transformation by Example. 18:1-18:71 - Thomas Bock
, Angelika Schmid
, Sven Apel
:
Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach. 19:1-19:50 - Fahimeh Ebrahimi, Miroslav Tushev, Anas Mahmoud:
Classifying Mobile Applications Using Word Embeddings. 20:1-20:30 - Luca Ardito
, Andrea Bottino, Riccardo Coppola, Fabrizio Lamberti, Francesco Manigrasso, Lia Morra, Marco Torchiano
:
Feature Matching-based Approaches to Improve the Robustness of Android Visual GUI Testing. 21:1-21:32 - Chandra Shekhar Maddila, Nachiappan Nagappan, Christian Bird, Georgios Gousios, Arie van Deursen
:
ConE: A Concurrent Edit Detection Tool for Large-scale Software Development. 22:1-22:26 - Jevgenija Pantiuchina, Bin Lin
, Fiorella Zampetti, Massimiliano Di Penta, Michele Lanza, Gabriele Bavota
:
Why Do Developers Reject Refactorings in Open-Source Projects? 23:1-23:23 - Olawole Oni, Emmanuel Letier
:
Analyzing Uncertainty in Release Planning: A Method and Experiment for Fixed-Date Release Cycles. 24:1-24:39 - Luca Traini
, Daniele Di Pompeo
, Michele Tucci
, Bin Lin
, Simone Scalabrino
, Gabriele Bavota
, Michele Lanza, Rocco Oliveto, Vittorio Cortellessa:
How Software Refactoring Impacts Execution Time. 25:1-25:23 - Katherine Hough
, Jonathan Bell
:
A Practical Approach for Dynamic Taint Tracking with Control-flow Relationships. 26:1-26:43 - Denae Ford, Margaret-Anne D. Storey, Thomas Zimmermann
, Christian Bird, Sonia Jaffe, Chandra Shekhar Maddila, Jenna L. Butler, Brian Houck, Nachiappan Nagappan
:
A Tale of Two Cities: Software Developers Working from Home during the COVID-19 Pandemic. 27:1-27:37 - Ryan Williams
, Tongwei Ren, Lorenzo De Carli, Long Lu, Gillian Smith
:
Guided Feature Identification and Removal for Resource-constrained Firmware. 28:1-28:25 - Frank F. Xu, Bogdan Vasilescu, Graham Neubig:
In-IDE Code Generation from Natural Language: Promise and Challenges. 29:1-29:47 - Jiachi Chen
, Xin Xia
, David Lo
, John C. Grundy:
Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum. 30:1-30:37
- Patrick Keller, Abdoul Kader Kaboré
, Laura Plein, Jacques Klein
, Yves Le Traon, Tegawendé F. Bissyandé:
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning. 31:1-31:34 - Cody Watson, Nathan Cooper, David Nader-Palacio, Kevin Moran
, Denys Poshyvanyk
:
A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research. 32:1-32:58 - Ritu Kapur
, Balwinder Sodhi:
OSS Effort Estimation Using Software Features Similarity and Developer Activity-Based Metrics. 33:1-33:35 - Jialun Cao
, Meiziniu Li
, Yeting Li
, Ming Wen
, Shing-Chi Cheung
, Haiming Chen
:
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems. 34e:1-34e:36
- Changwei Zou
, Xudong Wang, Yaoqing Gao, Jingling Xue:
Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization. 35e:1-35e:37 - Sabreen Ahmadjee
, Carlos Joseph Mera-Gómez, Rami Bahsoon, Rick Kazman:
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats. 36e:1-36e:45 - Silverio Martínez-Fernández
, Justus Bogner
, Xavier Franch
, Marc Oriol
, Julien Siebert
, Adam Trendowicz, Anna Maria Vollmer
, Stefan Wagner
:
Software Engineering for AI-Based Systems: A Survey. 37e:1-37e:59
Volume 31, Number 3, July 2022
- Yingfei Xiong, Bo Wang
:
L2S: A Framework for Synthesizing the Most Probable Program under a Specification. 34:1-34:45 - Junjie Wang, Ye Yang, Song Wang, Jun Hu, Qing Wang:
Context- and Fairness-Aware In-Process Crowdworker Recommendation. 35:1-35:31 - Yu Zhao
, Ting Su, Yang Liu
, Wei Zheng, Xiaoxue Wu, Ramakanth Kavuluru, William G. J. Halfond, Tingting Yu:
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps. 36:1-36:33 - Luca Di Stefano
, Rocco De Nicola
, Omar Inverso
:
Verification of Distributed Systems via Sequential Emulation. 37:1-37:41 - Bin Lin
, Nathan Cassee
, Alexander Serebrenik
, Gabriele Bavota
, Nicole Novielli, Michele Lanza:
Opinion Mining for Software Development: A Systematic Literature Review. 38:1-38:41 - Daniel Barcelona Pons
, Pierre Sutra
, Marc Sánchez Artigas, Gerard París, Pedro García López:
Stateful Serverless Computing with Crucial. 39:1-39:38 - Carlo A. Furia
, Richard Torkar
, Robert Feldt
:
Applying Bayesian Analysis Guidelines to Empirical Software Engineering Data: The Case of Programming Languages and Code Quality. 40:1-40:38 - Bogdan Marculescu, Man Zhang
, Andrea Arcuri:
On the Faults Found in REST APIs by Automated Test Generation. 41:1-41:43 - Fabio Calefato
, Filippo Lanubile
:
Using Personality Detection Tools for Software Engineering Research: How Far Can We Go? 42:1-42:48 - Si Liu
:
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions. 43:1-43:44 - Wenhua Yang
, Chong Zhang, Minxue Pan
, Chang Xu, Yu Zhou
, Zhiqiu Huang:
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow. 44:1-44:29 - Dusica Marijan, Sagar Sen:
Industry-Academia Research Collaboration and Knowledge Co-creation: Patterns and Anti-patterns. 45:1-45:52 - Dalia Sobhy
, Leandro L. Minku
, Rami Bahsoon, Rick Kazman:
Continuous and Proactive Software Architecture Evaluation: An IoT Case. 46:1-46:54
- Xiaofei Xie
, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu
, Yang Liu
:
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks. 47:1-47:27 - Gias Uddin
, Yann-Gaël Guéhéneuc, Foutse Khomh, Chanchal K. Roy:
An Empirical Study of the Effectiveness of an Ensemble of Stand-alone Sentiment Detection Tools for Software Engineering Datasets. 48:1-48:38 - Hao Guo
, Sen Chen
, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. 49:1-49:27 - Huangzhao Zhang
, Zhiyi Fu
, Ge Li
, Lei Ma
, Zhehao Zhao
, Hua'an Yang, Yizhe Sun
, Yang Liu
, Zhi Jin
:
Towards Robustness of Deep Program Processing Models - Detection, Estimation, and Enhancement. 50:1-50:40 - Bo Lin
, Shangwen Wang
, Ming Wen
, Xiaoguang Mao
:
Context-Aware Code Change Embedding for Better Patch Correctness Assessment. 51:1-51:29 - Zehao Lin
, Guodun Li, Jingfeng Zhang, Yue Deng, Xiangji Zeng, Yin Zhang, Yao Wan:
XCode: Towards Cross-Language Code Representation with Large-Scale Pre-Training. 52:1-52:44 - Lizhi Liao
, Heng Li
, Weiyi Shang, Lei Ma:
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks. 53:1-53:40
- Siwei Wu, Lei Wu
, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo
, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. 54:1-54:33 - Benjamin S. Meyers
, Sultan Fahad Almassari, Brandon N. Keller
, Andrew Meneely:
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition. 55:1-55:25 - Yanming Yang
, Xin Xia
, David Lo
, Tingting Bi
, John C. Grundy
, Xiaohu Yang
:
Predictive Models in Software Engineering: Challenges and Opportunities. 56:1-56:72
Volume 31, Number 4, October 2022
- Dirk Beyer
, Matthias Dangl
, Daniel Dietsch
, Matthias Heizmann
, Thomas Lemberger
, Michael Tautschnig
:
Verification Witnesses. 57:1-57:69 - Ridhi Jain
, Rahul Purandare
, Subodh Sharma:
BiRD: Race Detection in Software Binaries under Relaxed Memory Models. 58:1-58:29 - Jhon Masso
, Félix García
, César Jesús Pardo Calvache, Francisco J. Pino, Mario Piattini:
A Common Terminology for Software Risk Management. 59:1-59:47 - Yu Zhou
, Xiaoqing Zhang, Juanjuan Shen, Tingting Han, Taolue Chen
, Harald C. Gall:
Adversarial Robustness of Deep Code Comment Generation. 60:1-60:30 - Chanh Duc Ngo, Fabrizio Pastore
, Lionel C. Briand:
Automated, Cost-effective, and Update-driven App Testing. 61:1-61:51 - Hao Yu
, Xing Hu
, Ge Li
, Ying Li
, Qianxiang Wang
, Tao Xie
:
Assessing and Improving an Evaluation Dataset for Detecting Semantic Code Clones via Deep Learning. 62:1-62:25 - Xing Hu, Qiuyuan Chen, Haoye Wang
, Xin Xia
, David Lo
, Thomas Zimmermann
:
Correlating Automated and Human Evaluation of Code Documentation Generation Quality. 63:1-63:28 - Étienne André
, Didier Lime
, Dylan Marinho
, Jun Sun
:
Guaranteeing Timed Opacity using Parametric Timed Model Checking. 64:1-64:36 - Andrea Romdhana
, Alessio Merlo, Mariano Ceccato
, Paolo Tonella:
Deep Reinforcement Learning for Black-box Testing of Android Apps. 65:1-65:29 - Tingting Bi, Xin Xia
, David Lo
, John C. Grundy, Thomas Zimmermann
, Denae Ford:
Accessibility in Software Practice: A Practitioner's Perspective. 66:1-66:26 - Mitchell Joblin
, Sven Apel
:
How Do Successful and Failed Projects Differ? A Socio-Technical Analysis. 67:1-67:24 - Giuseppe De Giacomo
, Riccardo De Masellis, Fabrizio Maria Maggi, Marco Montali
:
Monitoring Constraints and Metaconstraints with Temporal Logics on Finite Traces. 68:1-68:44 - Peng Zhang
, Yang Wang
, Xutong Liu
, Yanhui Li
, Yibiao Yang
, Ziyuan Wang
, Xiaoyu Zhou
, Lin Chen
, Yuming Zhou
:
Mutant Reduction Evaluation: What is There and What is Missing? 69:1-69:46 - Elvira Albert, Pablo Gordillo
, Alejandro Hernández-Cerezo
, Albert Rubio
, Maria Anna Schett:
Super-optimization of Smart Contracts. 70:1-70:29 - Henrich Lauko
, Lukás Korencik
, Petr Rockai
:
Verification of Programs Sensitive to Heap Layout. 71:1-71:27 - Junjie Chen
, Chenyao Suo:
Boosting Compiler Testing via Compiler Optimization Exploration. 72:1-72:33 - Jinhan Kim
, Juyoung Jeon, Shin Hong, Shin Yoo
:
Predictive Mutation Analysis via the Natural Language Channel in Source Code. 73:1-73:27 - Umair Z. Ahmed, Zhiyu Fan
, Jooyong Yi
, Omar I. Al-Bataineh, Abhik Roychoudhury
:
Verifix: Verified Repair of Programming Assignments. 74:1-74:31 - Yuxia Zhang
, Hui Liu, Xin Tan, Minghui Zhou, Zhi Jin, Jiaxin Zhu:
Turnover of Companies in OpenStack: Prevalence and Rationale. 75:1-75:24
- Chao Ni
, Xin Xia
, David Lo
, Xiaohu Yang, Ahmed E. Hassan:
Just-In-Time Defect Prediction on JavaScript Projects: A Replication Study. 76:1-76:38 - Haoye Tian
, Yinghua Li
, Weiguo Pian, Abdoul Kader Kaboré
, Kui Liu
, Andrew Habib
, Jacques Klein, Tegawendé F. Bissyandé
:
Predicting Patch Correctness Based on the Similarity of Failing Test Cases. 77:1-77:30 - Qiang Hu
, Yuejun Guo
, Maxime Cordy
, Xiaofei Xie
, Lei Ma, Mike Papadakis, Yves Le Traon:
An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement. 78:1-78:30 - Ferhat Özgür Çatak
, Tao Yue
, Shaukat Ali
:
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data. 79:1-79:31 - Matteo Biagiola
, Paolo Tonella:
Testing the Plasticity of Reinforcement Learning-based Systems. 80:1-80:46 - Bianca Trinkenreich
, Igor Wiese
, Anita Sarma, Marco Aurélio Gerosa, Igor Steinmacher:
Women's Participation in Open Source Software: A Survey of the Literature. 81:1-81:37

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.