default search action
Empirical Software Engineering, Volume 25
Volume 25, Number 1, January 2020
- Alessio Viticchié, Leonardo Regano
, Cataldo Basile
, Marco Torchiano
, Mariano Ceccato
, Paolo Tonella:
Empirical assessment of the effort needed to attack programs protected with client/server code splitting. 1-48 - Gemma Catolino
, Fabio Palomba
, Francesca Arcelli Fontana, Andrea De Lucia, Andy Zaidman, Filomena Ferrucci
:
Improving change prediction models with code smell-related information. 49-95 - Mozhan Soltani, Pouria Derakhshanfar, Xavier Devroey
, Arie van Deursen
:
A benchmark-based evaluation of search-based crash reproduction. 96-138 - Jiayuan Zhou, Shaowei Wang
, Cor-Paul Bezemer
, Ahmed E. Hassan:
Bounties on technical Q&A sites: a case study of Stack Overflow bounties. 139-177 - Venkatesh-Prasad Ranganath
, Joydeep Mitra
:
Are free Android app security analysis tools effective in detecting known vulnerabilities? 178-219 - Miroslaw Ochodek
, Regina Hebig
, Wilhelm Meding, Gert Frost, Miroslaw Staron:
Recognizing lines of code violating company-specific coding guidelines using machine learning. 220-265 - Abdul Razzaq, Andrew Le Gear, Chris Exton, Jim Buckley:
An empirical assessment of baseline feature location techniques. 266-321 - Paul Luo Li
, Amy J. Ko, Andrew Begel:
What distinguishes great software engineers? 322-352 - Barbara A. Kitchenham, Lech Madeyski
, Pearl Brereton:
Meta-analysis for families of experiments in software engineering: a systematic review and reproducibility and validity assessment. 353-401 - Gustavo Vale
, Angelika Schmid, Alcemir Rodrigues Santos
, Eduardo Santana de Almeida, Sven Apel
:
On the relation between Github communication activity and merge conflicts. 402-433 - Thierry Titcheu Chekam
, Mike Papadakis
, Tegawendé F. Bissyandé, Yves Le Traon
, Koushik Sen:
Selecting fault revealing mutants. 434-487 - Kundi Yao
, Guilherme B. de Pádua, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi
:
Log4Perf: suggesting and updating logging locations for web-based systems' performance monitoring. 488-531 - Hui Guo
, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh
:
Çorba: crowdsourcing to obtain requirements from regulations and breaches. 532-561 - Caius Brindescu
, Iftekhar Ahmed, Carlos Jensen, Anita Sarma
:
An empirical investigation into merge conflicts and their effect on software quality. 562-590 - Yi Xiang, Xiaowei Yang, Yuren Zhou, Zibin Zheng
, Miqing Li
, Han Huang:
Going deeper with optimal software products selection using many-objective optimization and satisfiability solvers. 591-626 - Jacob Krüger
, Christian Lausberger, Ivonne von Nostitz-Wallwitz, Gunter Saake, Thomas Leich:
Search. Review. Repeat? An empirical study of threats to replicating SLR searches. 627-677 - Jindae Kim
, Jeongho Kim, Eunseok Lee
, Sunghun Kim:
The effectiveness of context-based change application on automatic program repair. 719-754 - Bowen Xu, Le An
, Ferdian Thung, Foutse Khomh, David Lo
:
Why reinventing the wheels? An empirical study on library reuse and re-implementation. 755-789 - Yusuf Sulistyo Nugroho
, Hideaki Hata
, Kenichi Matsumoto:
How different are different diff algorithms in Git? 790-823 - Md. Ahasanuzzaman
, Safwat Hassan, Cor-Paul Bezemer
, Ahmed E. Hassan:
A longitudinal study of popular ad libraries in the Google Play Store. 824-858 - Zhenyu Zhang, Hailong Sun
, Hongyu Zhang
:
Developer recommendation for Topcoder through a meta-learning based policy model. 859-889 - Masanari Kondo
, Daniel M. Germán, Osamu Mizuno
, Eun-Hye Choi:
The impact of context metrics on just-in-time defect prediction. 890-939 - Rebecca Yates
, Norah Power, Jim Buckley:
Characterizing the transfer of program comprehension in onboarding: an information-push perspective. 940-995 - Agus Sulistya
, Gede Artha Azriadi Prana, Abhishek Sharma, David Lo
, Christoph Treude
:
SIEVE: Helping developers sift wheat from chaff via cross-platform analysis. 996-1030
Volume 25, Number 2, March 2020
- Melissa Fearon:
2019 Reviewer Acknowledgment. 1031-1034 - Lise Tordrup Heeager
, Peter Axel Nielsen
:
Meshing agile and plan-driven development in safety-critical software: a case study. 1035-1062 - Luca Allodi, Marco Cremonini
, Fabio Massacci
, Woohyun Shim:
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. 1063-1094 - Fiorella Zampetti, Carmine Vassallo, Sebastiano Panichella
, Gerardo Canfora, Harald C. Gall
, Massimiliano Di Penta
:
An empirical characterization of bad practices in continuous integration. 1095-1135 - Sadika Amreen, Audris Mockus
, Russell Zaretzki
, Christopher Bogart
, Yuxia Zhang:
ALFAA: Active Learning Fingerprint based Anti-Aliasing for correcting developer identity errors in version control systems. 1136-1167 - Rabe Abdalkareem
, Vinicius Oda, Suhaib Mujahid
, Emad Shihab:
On the impact of using trivial packages: an empirical case study on npm and PyPI. 1168-1204 - Nuno Amálio
, Lionel C. Briand, Pierre Kelsen:
An experimental scrutiny of visual design modelling: VCL up against UML+OCL. 1205-1258 - Mohammed Sayagh
, Noureddine Kerzazi, Fábio Petrillo, Khalil Bennani, Bram Adams
:
What should your run-time configuration framework do to help developers? 1259-1293 - Gema Rodríguez-Pérez
, Gregorio Robles
, Alexander Serebrenik
, Andy Zaidman, Daniel M. Germán, Jesús M. González-Barahona
:
How bugs are born: a model to identify how bugs are introduced in software components. 1294-1340 - Sangameshwar Patil
, Balaraman Ravindran
:
Predicting software defect type using concept-based classification. 1341-1378 - Massimiliano Di Penta, David C. Shepherd
:
Guest editorial: special section on software analysis, evolution, and reengineering. 1379-1381 - Xin Chen, He Jiang, Xiaochen Li, Liming Nie, Dongjin Yu, Tieke He, Zhenyu Chen:
A systemic framework for crowdsourced test report quality assessment. 1382-1418 - Carmine Vassallo
, Sebastiano Panichella
, Fabio Palomba, Sebastian Proksch, Harald C. Gall
, Andy Zaidman:
How developers engage with static analysis tools in different contexts. 1419-1457 - Aline Brito
, Marco Túlio Valente
, Laerte Xavier, André C. Hora:
You broke my code: understanding the motivations for breaking changes in APIs. 1458-1492 - Md. Ahasanuzzaman
, Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider:
CAPS: a supervised technique for classifying Stack Overflow posts concerning API issues. 1493-1532 - Ayse Tosun
, Shane McIntosh, Leandro L. Minku
, Burak Turhan
:
Guest Editorial: Special Issue on Predictive Models and Data Analytics in Software Engineering. 1533-1535 - Mohammad Alahmadi
, Abdulkarim Khormi, Biswas Parajuli, Jonathan Hassel, Sonia Haiduc, Piyush Kumar:
Code Localization in Programming Screencasts. 1536-1572 - Sousuke Amasaki
:
Cross-version defect prediction: use historical data, cross-project data, or both? 1573-1595 - Tapajit Dey
, Audris Mockus
:
Deriving a usage-independent software quality metric. 1596-1641
Volume 25, Number 3, May 2020
- Editor's Note: Empirical Software Engineering and COVID-19 research. 1643
- Alejandro Mazuera-Rozo, Catia Trubiani, Mario Linares-Vásquez, Gabriele Bavota
:
Investigating types and survivability of performance bugs in mobile apps. 1644-1686 - Vahid Garousi
, Markus Borg, Markku Oivo:
Practical relevance of software engineering research: synthesizing the community's voice. 1687-1754 - Thorsten Berger, Jan-Philipp Steghöfer, Tewfik Ziadi, Jacques Robin, Jabier Martinez
:
The state of adoption and the challenges of systematic variability management in industry. 1755-1797 - André C. Hora
, Romain Robbes:
Characteristics of method extractions in Java: a large scale empirical study. 1798-1833 - Ahmad Abdellatif, Khaled Badran, Emad Shihab:
MSRBot: Using bots to answer questions from software repositories. 1834-1863 - Gustavo Ansaldi Oliva
, Ahmed E. Hassan, Zhen Ming (Jack) Jiang:
An exploratory study of smart contracts in the Ethereum blockchain platform. 1864-1904 - Zhaoqiang Guo
, Yanhui Li
, Wanwangying Ma, Yuming Zhou, Hongmin Lu, Lin Chen, Baowen Xu
:
Boosting crash-inducing change localization with rank-performance-based feature subset selection. 1905-1950 - Yoshiki Higo
, Shinpei Hayashi
, Hideaki Hata
, Meiyappan Nagappan:
Ammonia: an approach for deriving project-specific bug patterns. 1951-1979 - Anil Koyuncu, Kui Liu
, Tegawendé F. Bissyandé
, Dongsun Kim
, Jacques Klein
, Martin Monperrus, Yves Le Traon
:
FixMiner: Mining relevant fix patterns for automated program repair. 1980-2024 - Clément Robert, Thierry Sotiropoulos, Hélène Waeselynck
, Jérémie Guiochet, Simon Vernhes:
The virtual lands of Oz: testing an agribot in simulation. 2025-2054 - Yasutaka Kamei, Andy Zaidman:
Guest editorial: Mining software repositories 2018. 2055-2057 - Li Li
, Jun Gao
, Tegawendé F. Bissyandé, Lei Ma, Xin Xia, Jacques Klein
:
CDA: Characterising Deprecated Android APIs. 2058-2098 - Amritanshu Agrawal
, Tim Menzies
, Leandro L. Minku
, Markus Wagner
, Zhe Yu
:
Better software analytics via "DUO": Data mining algorithms using/used-by optimizers. 2099-2136 - Janet Siegmund, Chanchal K. Roy:
Preface to the special issue on program comprehension. 2137-2139 - Sarah Fakhoury, Devjeet Roy, Yuzhan Ma, Venera Arnaoudova, Olusola O. Adesope:
Measuring the impact of lexical and structural inconsistencies on developers' cognitive load during bug localization. 2140-2178 - Xing Hu
, Ge Li, Xin Xia, David Lo
, Zhi Jin:
Deep code comment generation with hybrid lexical and syntactical information. 2179-2217 - Carmine Vassallo
, Sebastian Proksch, Timothy Zemp, Harald C. Gall
:
Every build you break: developer-oriented assistance for build failure resolution. 2218-2257 - Stefanie Beyer, Christian Macho, Massimiliano Di Penta, Martin Pinzger
:
What kind of questions do developers ask on Stack Overflow? A comparison of automated approaches to classify posts into question categories. 2258-2301 - Shanshan Li, Xu Niu
, Zhouyang Jia, Xiangke Liao, Ji Wang, Tao Li:
Guiding log revisions by learning from software evolution history. 2302-2340 - Pasquale Salza
, Fabio Palomba, Dario Di Nucci
, Andrea De Lucia, Filomena Ferrucci
:
Third-party libraries in mobile apps. 2341-2377
Volume 25, Number 4, July 2020
- Benjamin Danglot
, Martin Monperrus, Walter Rudametkin, Benoit Baudry:
An approach and benchmark to detect behavioral changes of commits in continuous integration. 2379-2415 - Thomas D. LaToza
, Maryam Arab, Dastyni Loksa, Amy J. Ko:
Explicit programming strategies. 2416-2449 - Marcello Cinque
, Raffaele Della Corte
, Antonio Pecchia:
An empirical analysis of error propagation in critical software systems. 2450-2484 - Daniel Lee, Dayi Lin
, Cor-Paul Bezemer
, Ahmed E. Hassan:
Building the perfect game - an empirical study of game modifications. 2485-2518 - Edson Oliveira
, Eduardo Fernandes
, Igor Steinmacher, Marco Cristo, Tayana Conte, Alessandro Garcia:
Code and commit metrics of developer productivity: a study on team leaders perceptions. 2519-2549 - Seifeddine Bettaieb, Seung Yeob Shin
, Mehrdad Sabetzadeh, Lionel C. Briand, Michael Garceau, Antoine Meyers:
Using machine learning to assist with the selection of security controls during security assessment. 2550-2582 - Rita Marques
, Gonçalo Costa, Miguel Mira da Silva
, Daniel Gonçalves
, Pedro Gonçalves:
A gamification solution for improving Scrum adoption. 2583-2629 - Emelie Engström
, Margaret-Anne D. Storey, Per Runeson
, Martin Höst
, Maria Teresa Baldassarre
:
How software engineering research aligns with design science: a review. 2630-2660 - Linghuan Hu, W. Eric Wong
, D. Richard Kuhn, Raghu N. Kacker:
How does combinatorial testing perform in the real world: an empirical study. 2661-2693 - Junxiao Han, Emad Shihab, Zhiyuan Wan, Shuiguang Deng
, Xin Xia:
What do Programmers Discuss about Deep Learning Frameworks. 2694-2747 - Teerath Das, Massimiliano Di Penta, Ivano Malavolta
:
Characterizing the evolution of statically-detectable performance issues of Android apps. 2748-2808 - Florian Pudlitz
, Florian Brokhausen
, Andreas Vogelsang
:
What am I testing and where? Comparing testing procedures based on lightweight requirements annotations. 2809-2843 - Sira Vegas
, Patricia Riofrío, Esperanza Marcos
, Natalia Juristo:
On (Mis)perceptions of testing effectiveness: an empirical study. 2844-2896 - Peter Pickerill, Heiko Joshua Jungen, Miroslaw Ochodek, Michal Mackowiak, Miroslaw Staron:
PHANTOM: Curating GitHub for engineered software projects using time-series clustering. 2897-2929 - Guillaume Rousseau, Roberto Di Cosmo, Stefano Zacchiroli:
Software provenance tracking at the scale of public source code. 2930-2959 - Rodrigo Morales
, Foutse Khomh, Giuliano Antoniol:
RePOR: Mimicking humans on refactoring tasks. Are we there yet? 2960-2996 - Andreas Biørn-Hansen, Christoph Rieger, Tor-Morten Grønli, Tim A. Majchrzak, Gheorghita Ghinea
:
An empirical investigation of performance overhead in cross-platform mobile development frameworks. 2997-3040 - Fabio Palomba
, Andy Zaidman:
Retraction Note: Retraction note to: The smell of fear: on the relation between test smells and flaky tests. 3041
Volume 25, Number 5, September 2020
- Kundi Yao, Heng Li, Weiyi Shang, Ahmed E. Hassan:
A study of the performance of general compressors on log files. 3043-3085 - Chris Mills, Esteban Parra
, Jevgenija Pantiuchina, Gabriele Bavota
, Sonia Haiduc:
On the relationship between bug reports and queries for text retrieval-based bug localization. 3086-3127 - Zohreh Sharafi, Bonita Sharif
, Yann-Gaël Guéhéneuc
, Andrew Begel, Roman Bednarik, Martha E. Crosby:
A practical guide on conducting eye tracking studies in software engineering. 3128-3174 - Serena Elisa Ponta
, Henrik Plate, Antonino Sabetta:
Detection, assessment and mitigation of vulnerabilities in open source dependencies. 3175-3215 - Nicolli Rios, Rodrigo Oliveira Spínola
, Manoel G. Mendonça
, Carolyn B. Seaman:
The practitioners' point of view on the concept of technical debt and its causes and consequences: a design for a global family of industrial surveys and its first results from Brazil. 3216-3287 - Zoe Kotti
, Konstantinos Kravvaritis, Konstantina Dritsa
, Diomidis Spinellis
:
Standing on shoulders or feet? An extended study on the usage of the MSR data papers. 3288-3322 - Andrey Krutauz, Tapajit Dey
, Peter C. Rigby
, Audris Mockus
:
Do code review measures explain the incidence of post-release defects? 3323-3356 - Domenico Cotroneo, Antonio Ken Iannillo
, Roberto Natella
, Roberto Pietrantuono
:
A comprehensive study on software aging across android versions and vendors. 3357-3395 - Daniel Lee, Gopi Krishnan Rajbahadur
, Dayi Lin
, Mohammed Sayagh, Cor-Paul Bezemer
, Ahmed E. Hassan:
An empirical study of the characteristics of popular Minecraft mods. 3396-3429 - Akond Rahman
, Effat Farhana, Laurie A. Williams:
The 'as code' activities: development anti-patterns for infrastructure as code. 3430-3467 - Rahul Krishna
, Tim Menzies
:
Learning actionable analytics from multiple software projects. 3468-3500 - Wladmir Araújo Chapetta
, Guilherme Horta Travassos:
Towards an evidence-based theoretical framework on factors influencing the software development productivity. 3501-3543 - Ethem Utku Aktas
, Cemal Yilmaz
:
Automated issue assignment: results and insights from an industrial case. 3544-3589 - Jirayus Jiarpakdee
, Chakkrit Tantithamthavorn, Christoph Treude
:
The impact of automated feature selection techniques on the interpretation of defect models. 3590-3638 - Adam Alami
, Peter Axel Nielsen
, Andrzej Wasowski
:
A tailored participatory action research for foss communities. 3639-3670 - Chunhui Wang
, Wei Zhang, Haiyan Zhao, Zhi Jin:
Towards a fictional collective programming scenario: an approach based on the EIF loop. 3671-3710 - Ines Hajri, Arda Goknil, Fabrizio Pastore
, Lionel C. Briand:
Automating system test case classification and prioritization for use case-driven testing in product lines. 3711-3769 - Rungroj Maipradit, Christoph Treude
, Hideaki Hata
, Kenichi Matsumoto:
Wait for it: identifying "On-Hold" self-admitted technical debt. 3770-3798 - Johan Linåker
, Björn Regnell:
What to share, when, and where: balancing the objectives and complexities of open source software contributions. 3799-3840 - Rasmus Ros
, Mikael Hammar:
Data-driven software design with Constraint Oriented Multi-variate Bandit Optimization (COMBO). 3841-3872 - Farid Feyzi
:
CGT-FL: using cooperative game theory to effective fault localization in presence of coincidental correctness. 3873-3927 - George Marsicano
, Fabio Q. B. da Silva, Carolyn B. Seaman, Breno Giovanni Adaid-Castro:
The Teamwork Process Antecedents (TPA) questionnaire: developing and validating a comprehensive measure for assessing antecedents of teamwork process quality. 3928-3976 - Sandro Morasca
, Luigi Lavazza:
On the assessment of software defect prediction models via ROC curves. 3977-4019 - Tushar Sharma
, Paramvir Singh, Diomidis Spinellis
:
An empirical investigation on the relationship between design and architecture smells. 4020-4068 - Deeksha M. Arya
, Jin L. C. Guo, Martin P. Robillard:
Information correspondence between types of documentation for APIs. 4069-4096 - Margaret-Anne D. Storey
, Neil A. Ernst
, Courtney Williams, Eirini Kalliamvakou:
The who, what, how of software engineering research: a socio-technical framework. 4097-4129 - Lizhi Liao
, Jinfu Chen, Heng Li, Yi Zeng, Weiyi Shang, Jianmei Guo, Catalin Sporea, Andrei Toma, Sarah Sajedi
:
Using black-box performance models to detect performance regressions under varying workloads: an empirical study. 4130-4160 - Theodoros Amanatidis, Nikolaos Mittas
, Athanasia Moschou, Alexander Chatzigeorgiou, Apostolos Ampatzoglou, Lefteris Angelis:
Evaluating the agreement among technical debt measurement tools: building an empirical benchmark of technical debt liabilities. 4161-4204 - Aníbal Iung
, João Carbonell
, Luciano Marchezan
, Elder Rodrigues, Maicon Bernardino, Fábio Paulo Basso, Bruno Medeiros:
Systematic mapping study on domain-specific language development tools. 4205-4249 - Md Hasan Ibrahim
, Mohammed Sayagh, Ahmed E. Hassan:
Too many images on DockerHub! How different are images for the same system? 4250-4281 - Nazanin Bayati Chaleshtari, Saeed Parsa
:
SMBFL: slice-based cost reduction of mutation-based fault localization. 4282-4314 - Ally S. Nyamawe
, Hui Liu, Nan Niu, Qasim Umer
, Zhendong Niu
:
Feature requests-based recommendation of software refactorings. 4315-4347 - Eric Knauss
, Michael Goedicke
, Paul Grünbacher
:
Foreword to the Special Issue in Empirical Software Engineering: Best Papers of REFSQ 2019. 4348-4349 - Paul Hübner
, Barbara Paech:
Interaction-based creation and maintenance of continuously usable trace links between requirements and source code. 4350-4377
Volume 25, Number 6, November 2020
- Claus Hunsen
, Janet Siegmund, Sven Apel
:
On the fulfillment of coordination requirements in open-source software projects: An exploratory study. 4379-4426 - Rodi Jolak
, Maxime Savary-Leblanc, Manuela Dalibor, Andreas Wortmann, Regina Hebig
, Juraj Vincur, Ivan Polásek
, Xavier Le Pallec, Sébastien Gérard
, Michel R. V. Chaudron:
Software engineering whispers: The effect of textual vs. graphical software design descriptions on software design communication. 4427-4471 - Rodi Jolak
, Maxime Savary-Leblanc, Manuela Dalibor, Andreas Wortmann, Regina Hebig
, Juraj Vincur, Ivan Polásek
, Xavier Le Pallec, Sébastien Gérard
, Michel R. V. Chaudron:
Correction to: Software engineering whispers: The effect of textual vs. graphical software design descriptions on software design communication. 4472 - Mario Gleirscher
, Diego Marmsoler:
Formal methods in dependable systems engineering: a survey of professionals from Europe and North America. 4473-4546 - Yisen Xu, Fan Wu
, Xiangyang Jia, Lingbo Li, Jifeng Xuan
:
Mining the use of higher-order functions. 4547-4584 - Robert Heumüller
, Sebastian Nielebock
, Jacob Krüger
, Frank Ortmeier
:
Publish or perish, but do not forget your software artifacts. 4585-4616 - Masanari Kondo
, Gustavo Ansaldi Oliva, Zhen Ming (Jack) Jiang, Ahmed E. Hassan, Osamu Mizuno
:
Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform. 4617-4675 - Tao Wang
, Xiao Yu, Zhengyi Qiu, Guoliang Jin, Frank Mueller
:
BarrierFinder: recognizing ad hoc barriers. 4676-4706 - Rodrigo Fernandes Gomes da Silva, Chanchal K. Roy, Mohammad Masudur Rahman
, Kevin A. Schneider, Klérisson V. R. Paixão, Carlos Eduardo de Carvalho Dantas, Marcelo de Almeida Maia
:
CROKAGE: effective solution recommendation for programming tasks by leveraging crowd knowledge. 4707-4758 - Wasim Said
, Jochen Quante
, Rainer Koschke:
Mining understandable state machine models from embedded code. 4759-4804 - Davide Falessi
, Jacky Huang, Likhita Narayana, Jennifer Fong Thai, Burak Turhan
:
On the need of preserving order of data when validating within-project defect classifiers. 4805-4830 - Davide Falessi
, Jacky Huang, Likhita Narayana, Jennifer Fong Thai, Burak Turhan
:
Correction to: On the need of preserving order of data when validating within-project defect classifiers. 4831-4832 - Sebastiano Panichella
, Nik Zaugg:
An Empirical Investigation of Relevant Changes and Automation Needs in Modern Code Review. 4833-4872 - Parisa Moslehi
, Bram Adams
, Juergen Rilling:
A feature location approach for mapping application features extracted from crowd-based screencasts to source code. 4873-4926 - Paul Ralph
, Sebastian Baltes, Gianisa Adisaputri, Richard Torkar, Vladimir Kovalenko, Marcos Kalinowski, Nicole Novielli, Shin Yoo, Xavier Devroey
, Xin Tan, Minghui Zhou, Burak Turhan
, Rashina Hoda, Hideaki Hata
, Gregorio Robles
, Amin Milani Fard
, Rana Alkadhi:
Pandemic programming. 4927-4961 - Zainab Masood
, Rashina Hoda, Kelly Blincoe
:
How agile teams make self-assignment work: a grounded theory study. 4962-5005 - Simone Scalabrino
, Gabriele Bavota
, Mario Linares-Vásquez
, Valentina Piantadosi
, Michele Lanza, Rocco Oliveto:
API compatibility issues in Android: Causes and effectiveness of data-driven detection techniques. 5006-5046 - Abdul Ali Bangash, Hareem Sahar
, Abram Hindle, Karim Ali:
On the time-based conclusion stability of cross-project defect prediction models. 5047-5083 - Biniam Fisseha Demissie, Mariano Ceccato
, Lwin Khin Shar
:
Security analysis of permission re-delegation vulnerabilities in Android apps. 5084-5136 - Alexander Trautsch
, Steffen Herbold
, Jens Grabowski:
A longitudinal study of static analysis warning evolution and the effects of PMD on software quality in Apache open source projects. 5137-5192 - Vincenzo Riccio
, Gunel Jahangirova, Andrea Stocco, Nargiz Humbatova, Michael Weiss
, Paolo Tonella:
Testing machine learning based systems: a systematic mapping. 5193-5254 - Mozhan Soltani
, Felienne Hermans, Thomas Bäck
:
The significance of bug report elements. 5255-5294 - Stefan Fischer, Gabriela Karoline Michelon, Rudolf Ramler, Lukas Linsbauer, Alexander Egyed:
Automated test reuse for highly configurable software. 5295-5332 - Steffen Herbold
, Alexander Trautsch
, Fabian Trautsch:
On the feasibility of automated prediction of bug and non-bug issues. 5333-5369 - Steffen Herbold, Alexander Trautsch, Fabian Trautsch:
Correction to: On the feasibility of automated prediction of bug and non-bug issues. 5370-5373 - Valentina Piantadosi
, Fabiana Fierro, Simone Scalabrino, Alexander Serebrenik
, Rocco Oliveto
:
How does code readability change during software evolution? 5374-5412 - Kelly Blincoe
, Daniela E. Damian, Anna Perini:
Preface to the empirical software engineering special issue on selected papers from RE'19. 5413-5415 - Catarina Gralha
, Miguel Goulão
, João Araújo
:
Are there gender differences when interacting with social goal models? 5416-5453 - Sallam Abualhaija
, Chetan Arora
, Mehrdad Sabetzadeh, Lionel C. Briand, Michael Traynor:
Automated demarcation of requirements in textual specifications: a machine learning-based approach. 5454-5497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.