default search action
Software Quality Journal, Volume 27
Volume 27, Number 1, March 2019
- Rachel Harrison:
In this issue. 1-3 - Kazi Zakia Sultana, Byron J. Williams, Tanmay Bhowmik:
A study examining relationships between micro patterns and security vulnerabilities. 5-41 - Chunyan Ma, Chenyang Nie, Weicheng Chao, Bowei Zhang:
A vector table model-based systematic analysis of spectral fault localization techniques. 43-78 - Ferenc Horváth, Tamás Gergely, Árpád Beszédes, Dávid Tengeri, Gergö Balogh, Tibor Gyimóthy:
Code coverage differences of Java bytecode and source code instrumentation tools. 79-123 - Michael Felderer, Andrea Herrmann:
Comprehensibility of system models during test design: a controlled experiment comparing UML activity diagrams and state machines. 125-147 - Porfirio Tramontana, Domenico Amalfitano, Nicola Amatucci, Anna Rita Fasolino:
Automated functional testing of mobile applications: a systematic mapping study. 149-201 - Sergio Firmenich, Alejandra Garrido, Julián Grigera, José Matías Rivero, Gustavo Rossi:
Usability improvement through A/B testing and refactoring. 203-240 - Jörg Lenhard, Martin Blom, Sebastian Herold:
Exploring the suitability of source code metrics for indicating architectural inconsistencies. 241-274 - Gustavo Vale, Eduardo Fernandes, Eduardo Figueiredo:
On the proposal and evaluation of a benchmark-based threshold derivation method. 275-306 - Mauricio Alférez, Mathieu Acher, José Angel Galindo, Benoit Baudry, David Benavides:
Modeling variability in the video domain: language and experience report. 307-347 - Sardar Muhammad Sulaman, Armin Beer, Michael Felderer, Martin Höst:
Comparison of the FMEA and STPA safety analysis methods-a case study. 349-387 - Joakim Pernstål, Robert Feldt, Tony Gorschek, Dan Florén:
FLEX-RCA: a lean-based method for root cause analysis in software process improvement. 389-428 - Vahid Garousi, Ayça Tarhan, Dietmar Pfahl, Ahmet Coskunçay, Onur Demirörs:
Correlation of critical success factors with success of software projects: an empirical investigation. 429-493
Volume 27, Number 2, June 2019
- Rachel Harrison:
In this issue. 495 - Hüsnü Yenigün, Nina Yevtushenko, Ana Rosa Cavalli:
Guest Editorial: Special issue on Testing Software and Systems. 497-499 - Omer Nguena Timo, Alexandre Petrenko, S. Ramesh:
Fault model-driven testing from FSM with symbolic inputs. 501-527 - Ana Cavalcanti, Adenilso Simão:
Fault-based refinement-testing for CSP. 529-562 - Petra van den Bos, Ramon Janssen, Joshua Moerman:
n-Complete test suites for IOCO. 563-588 - Wen-ling Huang, Sadik Özoguz, Jan Peleska:
Safety-complete test suites. 589-613 - Tao Ma, Shaukat Ali, Tao Yue, Maged Elaasar:
Testing self-healing cyber-physical systems under uncertainty: a fragility-oriented approach. 615-649 - Alexandre Petrenko, Florent Avellaneda, Roland Groz, Catherine Oriat:
FSM inference and checking sequence construction are two sides of the same coin. 651-674 - Sébastien Salva, Loukmen Regainia:
An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases. 675-701 - Dimitris E. Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS using planning-based combinatorial methods and execution framework. 703-729 - Jorge López, Natalia Kushik, Djamal Zeghlache:
Virtual machine placement quality estimation in cloud infrastructures using integer linear programming. 731-755 - Bernhard K. Aichernig, Priska Bauerstätter, Elisabeth Jöbstl, Severin Kann, Robert Korosec, Willibald Krenn, Cristinel Mateis, Rupert Schlick, Richard Schumi:
Learning and statistical model checking of system response times. 757-795 - Tamás Gergely, Gergö Balogh, Ferenc Horváth, Béla Vancsics, Árpád Beszédes, Tibor Gyimóthy:
Differences between a static and a dynamic test-to-code traceability recovery method. 797-822 - Pedro Delgado-Pérez, Louis M. Rose, Inmaculada Medina-Bulo:
Coverage-based quality metric of mutation operators for test suite improvement. 823-859 - M. Furkan Kiraç, Baris Aktemur, Hasan Sözer, Ceren Sahin Gebizli:
Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems. 861-883 - Philip Makedonski, Gusztáv Adamis, Martti Käärik, Finn Kristoffersen, Michele Carignani, Andreas Ulrich, Jens Grabowski:
Test descriptions with ETSI TDL. 885-917
Volume 27, Number 3, September 2019
- Rachel Harrison:
In this issue. 919-920 - Sudipto Ghosh, Zhenyu Chen:
Special issue on trustworthy systems and software. 921-922 - Haijin Ji, Song Huang, Yaning Wu, Zhanwei Hui, Changyou Zheng:
A new weighted naive Bayes method based on information diffusion for software defect prediction. 923-968 - Ellis E. Eghan, Sultan S. Al-Qahtani, Christopher Forbes, Juergen Rilling:
API trustworthiness: an ontological approach for software library adoption. 969-1014 - Nidhal Mahmud:
A minimization algorithm for automata generated fault trees with priority gates. 1015-1043 - Dongdong Zhao, Hong Lin, Linjun Ran, Mushuai Han, Jing Tian, Liping Lu, Shengwu Xiong, Jianwen Xiang:
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. 1045-1068 - Khalid Alkharabsheh, Yania Crespo, M. Esperanza Manso, José A. Taboada:
Software Design Smell Detection: a systematic mapping study. 1069-1148 - Júlio Menezes Jr., Cristine Gusmão, Hermano Perrelli de Moura:
Risk factors in software development projects: a systematic literature review. 1149-1174 - Pierre A. Akiki:
To var or not to var: how do C# developers use and misuse implicit and explicit typing? 1175-1207 - Mushtaq Raza, João Pascoal Faria, Rafael Salazar:
Assisting software engineering students in analyzing their performance in software development. 1209-1237 - Fáber D. Giraldo, Sergio España, William J. Giraldo, Oscar Pastor, John Krogstie:
A method to evaluate quality of modelling languages based on the Zachman reference taxonomy. 1239-1269 - David Johannes, Foutse Khomh, Giuliano Antoniol:
A large-scale empirical study of code smells in JavaScript projects. 1271-1314 - Michael Rath, Patrick Mäder:
Structured information in bug report descriptions - influence on IR-based bug localization and developers. 1315-1337 - David Honfi, Zoltán Micskei:
Classifying generated white-box tests: an exploratory study. 1339-1380
Volume 27, Number 4, December 2019
- Rachel Harrison:
In this issue. 1381-1382 - Ravi Eda, Hyunsook Do:
An efficient regression testing approach for PHP Web applications using test selection and reusable constraints. 1383-1417 - Krishna Patel, Robert M. Hierons:
A partial oracle for uniformity statistics. 1419-1447 - Raluca Florea, Viktoria Stray:
The skills that employers look for in software testers. 1449-1479 - Igor Scaliante Wiese, Rodrigo Takashi Kuroda, Igor Steinmacher, Gustavo Ansaldi Oliva, Reginaldo Ré, Christoph Treude, Marco Aurélio Gerosa:
Pieces of contextual information suitable for predicting co-changes? An empirical study. 1481-1503 - Maximilian Schramme, José A. Macías:
Analysis and measurement of internal usability metrics through code annotations. 1505-1530 - Abbas Javan Jafari, Abbas Rasoolzadegan:
Quality-centric security pattern mutations. 1531-1561 - Srikrishnan Sundararajan, Bhasi Marath, Pramod K. Vijayaraghavan:
Variation of risk profile across software life cycle in IS outsourcing. 1563-1582 - Mívian M. Ferreira, Thaís Mombach, Marco Túlio Valente, Kecia A. M. Ferreira:
Algorithms for estimating truck factors: a comparative study. 1583-1617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.