[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 29, Issue 3July 2020
Editor:
  • Mauro Pezzè
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Reflects downloads up to 24 Jan 2025Bibliometrics
Skip Table Of Content Section
editorial
Free
Editorial
Article No.: 14e, Page 1https://doi.org/10.1145/3402931
research-article
KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution
Article No.: 14, Pages 1–31https://doi.org/10.1145/3385897

Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side channels. Specifically, speculatively executed paths due to branch mis-prediction may bring secret data into the cache, which are then exposed via cache side ...

research-article
Computing Alignments of Well-Formed Process Models using Local Search
Article No.: 15, Pages 1–41https://doi.org/10.1145/3394056

The alignment of observed and modeled behavior is an essential element for organizations, since it opens the door for conformance checking and enhancement of processes. The state-of-the-art technique for computing alignments has exponential time and ...

research-article
Open Access
Unveiling Elite Developers’ Activities in Open Source Projects
Article No.: 16, Pages 1–35https://doi.org/10.1145/3387111

Open source developers, particularly the elite developers who own the administrative privileges for a project, maintain a diverse portfolio of contributing activities. They not only commit source code but also exert significant efforts on other ...

research-article
Monotone Precision and Recall Measures for Comparing Executions and Specifications of Dynamic Systems
Article No.: 17, Pages 1–41https://doi.org/10.1145/3387909

The behavioural comparison of systems is an important concern of software engineering research. For example, the areas of specification discovery and specification mining are concerned with measuring the consistency between a collection of execution ...

research-article
Testing Relative to Usage Scope: Revisiting Software Coverage Criteria
Article No.: 18, Pages 1–24https://doi.org/10.1145/3389126

Coverage criteria provide a useful and widely used means to guide software testing; however, indiscriminately pursuing full coverage may not always be convenient or meaningful, as not all entities are of interest in any usage context. We aim at ...

research-article
Wireframe-based UI Design Search through Image Autoencoder
Article No.: 19, Pages 1–31https://doi.org/10.1145/3391613

UI design is an integral part of software development. For many developers who do not have much UI design experience, exposing them to a large database of real-application UI designs can help them quickly build up a realistic understanding of the design ...

research-article
Multi-objective Integer Programming Approaches for Solving the Multi-criteria Test-suite Minimization Problem: Towards Sound and Complete Solutions of a Particular Search-based Software-engineering Problem
Article No.: 20, Pages 1–50https://doi.org/10.1145/3392031

Test-suite minimization is one key technique for optimizing the software testing process. Due to the need to balance multiple factors, multi-criteria test-suite minimization (MCTSM) becomes a popular research topic in the recent decade. The MCTSM ...

research-article
psc2code: Denoising Code Extraction from Programming Screencasts
Article No.: 21, Pages 1–38https://doi.org/10.1145/3392093

Programming screencasts have become a pervasive resource on the Internet, which help developers learn new programming technologies or skills. The source code in programming screencasts is an important and valuable information for developers. But the ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.