


default search action
ACM Transactions on Software Engineering and Methodology, Volume 32
Volume 32, Number 1, January 2023
- Mauro Pezzè:

EDITORIAL: Announcing Six TOSEM Issues Per Year. 1:1-1:2 - Marco Robol, Travis D. Breaux

, Elda Paja, Paolo Giorgini:
Consent Verification Monitoring. 2:1-2:33 - Pengbo Nie

, Chengcheng Wan
, Jiayu Zhu
, Ziyi Lin
, Yuting Chen
, Zhendong Su
:
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations. 3:1-3:32 - Minxue Pan

, Yifei Lu
, Yu Pei
, Tian Zhang
, Xuandong Li
:
Preference-wise Testing of Android Apps via Test Amplification. 4:1-4:37 - Tao Chen

, Miqing Li
:
The Weights Can Be Harmful: Pareto Search versus Weighted Search in Multi-objective Search-based Software Engineering. 5:1-5:40 - Francesco Bertolotti

, Walter Cazzola
:
Fold2Vec: Towards a Statement-Based Representation of Code for Code Comprehension. 6:1-6:31 - Zijing Yin

, Yiwen Xu, Fuchen Ma, Haohao Gao, Lei Qiao, Yu Jiang:
Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization. 7:1-7:30 - Yiwen Dong

, Zheyang Li
, Yongqiang Tian
, Chengnian Sun, Michael W. Godfrey
, Meiyappan Nagappan
:
Bash in the Wild: Language Usage, Code Smells, and Bugs. 8:1-8:22 - Xiong Xu

, Jean-Pierre Talpin
, Shuling Wang
, Bohua Zhan
, Naijun Zhan:
Semantics Foundation for Cyber-physical Systems Using Higher-order UTP. 9:1-9:48 - Masaki Waga

, Étienne André
, Ichiro Hasuo
:
Parametric Timed Pattern Matching. 10:1-10:35 - Benjamin Rombaut

, Filipe Roseiro Côgo, Bram Adams, Ahmed E. Hassan:
There's no Such Thing as a Free Lunch: Lessons Learned from Exploring the Overhead Introduced by the Greenkeeper Dependency Bot in Npm. 11:1-11:40 - Danny Weyns

, M. Usman Iftikhar
:
ActivFORMS: A Formally Founded Model-based Approach to Engineer Self-adaptive Systems. 12:1-12:48 - Xueliang Li

, Junyang Chen, Yepang Liu, Kaishun Wu, John P. Gallagher
:
Combatting Energy Issues for Mobile Applications. 13:1-13:44 - Milos Ojdanic

, Ezekiel O. Soremekun
, Renzo Degiovanni
, Mike Papadakis
, Yves Le Traon
:
Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution. 14:1-14:39 - SayedHassan Khatoonabadi

, Diego Elias Costa
, Rabe Abdalkareem
, Emad Shihab
:
On Wasted Contributions: Understanding the Dynamics of Contributor-Abandoned Pull Requests-A Mixed-Methods Study of 10 Large Open-Source Projects. 15:1-15:39 - Uwe Zdun

, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Microservice Security Metrics for Secure Communication, Identity Management, and Observability. 16:1-16:34 - Aitor Arrieta

, Pablo Valle
, Joseba Andoni Agirre
, Goiuria Sagardui
:
Some Seeds Are Strong: Seeding Strategies for Search-based Test Case Selection. 17:1-17:47 - Jianwei Wu

, James Clause
:
Automated Identification of Uniqueness in JUnit Tests. 18:1-18:32 - Jiahuei Lin

, Mohammed Sayagh
, Ahmed E. Hassan
:
The Co-evolution of the WordPress Platform and Its Plugins. 19:1-19:24 - Chang-Ai Sun

, Hepeng Dai
, Huai Liu
, Tsong Yueh Chen
:
Feedback-Directed Metamorphic Testing. 20:1-20:34 - Aurora Ramírez, Robert Feldt, José Raúl Romero:

A Taxonomy of Information Attributes for Test Case Prioritisation: Applicability, Machine Learning. 21:1-21:42 - Sihan Xu

, Ya Gao, Lingling Fan
, Zheli Liu, Yang Liu
, Hua Ji:
LiDetector: License Incompatibility Detection for Open Source Software. 22:1-22:28 - Shuzheng Gao

, Cuiyun Gao
, Yulan He
, Jichuan Zeng
, Lunyiu Nie
, Xin Xia
, Michael R. Lyu
:
Code Structure-Guided Transformer for Source Code Summarization. 23:1-23:32 - Zarrin Tasnim Sworna

, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. 24:1-24:42 - Imen Sayar

, Alexandre Bartel
, Eric Bodden
, Yves Le Traon
:
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. 25:1-25:45 - Zheyuan He

, Shuwei Song
, Yang Bai
, Xiapu Luo
, Ting Chen
, Wensheng Zhang
, Peng He
, Hongwei Li
, Xiaodong Lin
, Xiaosong Zhang
:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. 26:1-26:35 - Gyte Tamasauskaite

, Paul Groth
:
Defining a Knowledge Graph Development Process Through a Systematic Review. 27:1-27:40
Volume 32, Number 2, April 2023
- Christian Birchler

, Sajad Khatiri
, Pouria Derakhshanfar
, Sebastiano Panichella
, Annibale Panichella
:
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments. 28:1-28:30 - Richard Banach

:
Graded Refinement, Retrenchment, and Simulation. 29:1-29:69 - Zhen Yang

, Jacky Wai Keung
, Xiao Yu
, Yan Xiao
, Zhi Jin
, Jingyu Zhang
:
On the Significance of Category Prediction for Code-Comment Synchronization. 30:1-30:41 - Lola Burgueño

, Paula Muñoz
, Robert Clarisó
, Jordi Cabot
, Sébastien Gérard
, Antonio Vallecillo
:
Dealing with Belief Uncertainty in Domain Models. 31:1-31:34 - Profir-Petru Pârtachi

, David R. White, Earl T. Barr
:
Aide-mémoire: Improving a Project's Collective Memory via Pull Request-Issue Links. 32:1-32:36 - Ahmed Khanfir

, Anil Koyuncu
, Mike Papadakis
, Maxime Cordy
, Tegawendé F. Bissyandé
, Jacques Klein
, Yves Le Traon
:
iBiR: Bug-report-driven Fault Injection. 33:1-33:31 - Chen Zeng

, Yue Yu
, Shanshan Li
, Xin Xia
, Zhiming Wang
, Mingyang Geng
, Linxiao Bai
, Wei Dong
, Xiangke Liao
:
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search. 34:1-34:27 - Chandra Shekhar Maddila, Sai Surya Upadrasta

, Chetan Bansal
, Nachiappan Nagappan
, Georgios Gousios
, Arie van Deursen
:
Nudge: Accelerating Overdue Pull Requests toward Completion. 35:1-35:30 - Zhiqiang Zuo

, Xintao Niu
, Siyi Zhang
, Lu Fang
, Siau-Cheng Khoo
, Shan Lu
, Chengnian Sun
, Guoqing Harry Xu
:
Toward More Efficient Statistical Debugging with Abstraction Refinement. 36:1-36:38 - Jaekwon Lee

, Seung Yeob Shin
, Shiva Nejati
, Lionel C. Briand
, Yago Isasi Parache
:
Estimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages. 37:1-37:33 - César Soto-Valero

, Thomas Durieux
, Nicolas Harrand
, Benoit Baudry
:
Coverage-Based Debloating for Java Bytecode. 38:1-38:34 - Luke Dramko

, Jeremy Lacomis
, Pengcheng Yin
, Edward J. Schwartz
, Miltiadis Allamanis
, Graham Neubig
, Bogdan Vasilescu
, Claire Le Goues
:
DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class. 39:1-39:34 - Bowen Shen

, Muhammad Ali Gulzar
, Fei He
, Na Meng
:
A Characterization Study of Merge Conflicts in Java Projects. 40:1-40:28 - Andreea Costea

, Abhishek Tiwari
, Sigmund Chianasta
, Kishore R
, Abhik Roychoudhury
, Ilya Sergey
:
Hippodrome: Data Race Repair Using Static Analysis Summaries. 41:1-41:33 - Jinhan Kim

, Robert Feldt
, Shin Yoo
:
Evaluating Surprise Adequacy for Deep Learning System Testing. 42:1-42:29 - Filipe Roseiro Côgo

, Xin Xia
, Ahmed E. Hassan
:
Assessing the Alignment between the Information Needs of Developers and the Documentation of Programming Languages: A Case Study on Rust. 43:1-43:48 - Najd Altoyan

, Don S. Batory
:
On Proving the Correctness of Refactoring Class Diagrams of MDE Metamodels. 44:1-44:42 - Chao Wang

, Hao He
, Uma Pal
, Darko Marinov
, Minghui Zhou
:
Suboptimal Comments in Java Projects: From Independent Comment Changes to Commenting Practices. 45:1-45:33 - Jiezhu Cheng

, Cuiyun Gao
, Zibin Zheng
:
HINNPerf: Hierarchical Interaction Neural Network for Performance Prediction of Configurable Systems. 46:1-46:30 - Hichem Belgacem

, Xiaochen Li
, Domenico Bianculli
, Lionel C. Briand
:
A Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms. 47:1-47:40 - Zishuo Ding

, Heng Li
, Weiyi Shang
, Tse-Hsun (Peter) Chen
:
Towards Learning Generalizable Code Embeddings Using Task-agnostic Graph Convolutional Networks. 48:1-48:43 - Tahereh Zohdinasab

, Vincenzo Riccio
, Alessio Gambi
, Paolo Tonella
:
Efficient and Effective Feature Space Exploration for Testing Deep Learning Systems. 49:1-49:38 - Xiaoyu Sun

, Xiao Chen
, Li Li
, Haipeng Cai
, John Grundy
, Jordan Samhi
, Tegawendé F. Bissyandé
, Jacques Klein
:
Demystifying Hidden Sensitive Operations in Android Apps. 50:1-50:30 - Hugo Leonardo da Silva Araujo, Mohammad Reza Mousavi

, Mahsa Varshosaz
:
Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review. 51:1-51:61 - Andrea Fioraldi

, Alessandro Mantovani
, Dominik Christian Maier, Davide Balzarotti
:
Dissecting American Fuzzy Lop: A FuzzBench Evaluation. 52:1-52:26 - Zenong Zhang

, George Klees
, Eric Wang
, Michael Hicks
, Shiyi Wei
:
Fuzzing Configurations of Program Options. 53:1-53:21 - Andrea Fioraldi

, Alessandro Mantovani
, Dominik Christian Maier, Davide Balzarotti
:
Dissecting American Fuzzy Lop - A FuzzBench Evaluation - RCR Report. 54:1-54:4 - Zenong Zhang

, George Klees
, Eric Wang
, Michael Hicks
, Shiyi Wei
:
Fuzzing Configurations of Program Options - RCR Report. 55:1-55:3
Volume 32, Number 3, May 2023
- Juan Cruz-Carlon

, Mahsa Varshosaz
, Claire Le Goues
, Andrzej Wasowski
:
Patching Locking Bugs Statically with Crayons. 56:1-56:28 - Maha Ayub

, Tania Saleem
, Muhammad Umar Janjua
, Talha Ahmad
:
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts. 57:1-57:32 - Thomas Laurent

, Stefan Klikovits
, Paolo Arcaini
, Fuyuki Ishikawa
, Anthony Ventresque
:
Parameter Coverage for Testing of Autonomous Driving Systems under Uncertainty. 58:1-58:31 - Michael Pacheco

, Gustavo Ansaldi Oliva, Gopi Krishnan Rajbahadur
, Ahmed E. Hassan
:
Is My Transaction Done Yet? An Empirical Study of Transaction Processing Times in the Ethereum Blockchain Platform. 59:1-59:46 - Nikhil Patnaik

, Andrew Carl Dwyer
, Joseph Hallett
, Awais Rashid
:
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations. 60:1-60:31 - Fuchen Ma

, Meng Ren
, Lerong Ouyang
, Yuanliang Chen
, Juan Zhu
, Ting Chen
, Yingli Zheng
, Xiao Dai
, Yu Jiang
, Jiaguang Sun
:
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts. 61:1-61:24 - Yedi Zhang

, Zhe Zhao
, Guangke Chen
, Fu Song
, Taolue Chen
:
Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach. 62:1-62:51 - Francisca Pérez

, Raúl Lapeña
, Ana Cristina Marcén
, Carlos Cetina
:
How the Quality of Maintenance Tasks is Affected by Criteria for Selecting Engineers for Collaboration. 63:1-63:22 - Tamara Lopez

, Helen Sharp
, Arosha K. Bandara
, Thein Tun
, Mark Levine
, Bashar Nuseibeh
:
Security Responses in Software Development. 64:1-64:29 - Deheng Yang

, Yan Lei
, Xiaoguang Mao
, Yuhua Qi
, Xin Yi
:
Seeing the Whole Elephant: Systematically Understanding and Uncovering Evaluation Biases in Automated Program Repair. 65:1-65:37 - Chengpeng Wang

, Wenyang Wang
, Peisen Yao
, Qingkai Shi
, Jinguo Zhou
, Xiao Xiao
, Charles Zhang
:
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation. 66:1-66:39 - Andrea Di Sorbo

, Fiorella Zampetti
, Aaron Visaggio
, Massimiliano Di Penta
, Sebastiano Panichella
:
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms. 67:1-67:37 - Tao Chen, Miqing Li

:
Do Performance Aspirations Matter for Guiding Software Configuration Tuning? An Empirical Investigation under Dual Performance Objectives. 68:1-68:41 - Lina Gong

, Jingxuan Zhang
, Mingqiang Wei
, Haoxiang Zhang
, Zhiqiu Huang
:
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories. 69:1-69:57 - Chris Karanikolas

, Grigoris Dimitroulakos
, Konstantinos Masselos
:
Simulating Software Evolution to Evaluate the Reliability of Early Decision-making among Design Alternatives toward Maintainability. 70:1-70:38 - Jun-Wei Lin

, Navid Salehnamadi
, Sam Malek
:
Route: Roads Not Taken in UI Testing. 71:1-71:25 - Zhichao Chen

, Junjie Chen
, Weijing Wang
, Jianyi Zhou
, Meng Wang
, Xiang Chen
, Shan Zhou
, Jianmin Wang
:
Exploring Better Black-Box Test Case Prioritization via Log Analysis. 72:1-72:32 - Fiorella Zampetti

, Damian A. Tamburri
, Sebastiano Panichella
, Annibale Panichella
, Gerardo Canfora
, Massimiliano Di Penta
:
Continuous Integration and Delivery Practices for Cyber-Physical Systems: An Interview-Based Study. 73:1-73:44 - Christiaan Verwijs

, Daniel Russo
:
A Theory of Scrum Team Effectiveness. 74:1-74:51 - Michel Nass

, Emil Alégroth
, Robert Feldt
, Maurizio Leotta
, Filippo Ricca
:
Similarity-based Web Element Localization for Robust Test Automation. 75:1-75:30 - Yuriy Brun

, Tian Lin
, Jessie Elise Somerville
, Elisha Myers
, Natalie C. Ebner
:
Blindspots in Python and Java APIs Result in Vulnerable Code. 76:1-76:31 - Eric S. Liu

, Dylan Lukes
, William G. Griswold
:
Refactoring in Computational Notebooks. 77:1-77:24 - Zhuo Zhang

, Yan Lei
, Ting Su
, Meng Yan
, Xiaoguang Mao
, Yue Yu
:
Influential Global and Local Contexts Guided Trace Representation for Fault Localization. 78:1-78:27 - Mohammed Walid Attaoui

, Hazem M. Fahmy
, Fabrizio Pastore
, Lionel C. Briand
:
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering. 79:1-79:40 - Zhipeng Gao

, Xin Xia, David Lo
, John C. Grundy, Xindong Zhang, Zhenchang Xing:
I Know What You Are Searching for: Code Snippet Recommendation from Stack Overflow Posts. 80:1-80:42 - Swaroopa Dola

, Matthew B. Dwyer
, Mary Lou Soffa
:
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing. 81:1-81:48
Volume 32, Number 4, July 2023
- Mohan Cui

, Chengjun Chen
, Hui Xu
, Yangfan Zhou
:
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis. 82:1-82:21 - Benjamin Shreeve

, Catarina Gralha
, Awais Rashid
, João Araújo
, Miguel Goulão
:
Making Sense of the Unknown: How Managers Make Cyber Security Decisions. 83:1-83:33 - Negar Ghorbani

, Reyhaneh Jabbarvand
, Navid Salehnamadi
, Joshua Garcia
, Sam Malek
:
DeltaDroid: Dynamic Delivery Testing in Android. 84:1-84:26 - Jeongju Sohn

, Sungmin Kang
, Shin Yoo
:
Arachne: Search-Based Repair of Deep Neural Networks. 85:1-85:26 - Mitchell Joblin

, Barbara Eckl
, Thomas Bock
, Angelika Schmid
, Janet Siegmund
, Sven Apel
:
Hierarchical and Hybrid Organizational Structures in Open-source Software Projects: A Longitudinal Study. 86:1-86:29 - Ang Jia

, Ming Fan
, Wuxia Jin
, Xi Xu
, Zhaohui Zhou
, Qiyi Tang
, Sen Nie
, Shi Wu
, Ting Liu
:
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis. 87:1-87:26 - Vittoria Nardone

, Biruk Asmare Muse, Mouna Abidi
, Foutse Khomh
, Massimiliano Di Penta
:
Video Game Bad Smells: What They Are and How Developers Perceive Them. 88:1-88:35 - Xueling Zhang

, John Heaps
, Rocky Slavin
, Jianwei Niu
, Travis D. Breaux
, Xiaoyin Wang
:
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. 89:1-89:34 - Huaijin Wang

, Pingchuan Ma
, Shuai Wang
, Qiyi Tang
, Sen Nie
, Shi Wu
:
sem2vec: Semantics-aware Assembly Tracelet Embedding. 90:1-90:34 - Mahmoud Alfadel

, Diego Elias Costa
, Emad Shihab
, Bram Adams
:
On the Discoverability of npm Vulnerabilities in Node.js Projects. 91:1-91:27 - Haoye Tian

, Kui Liu
, Yinghua Li
, Abdoul Kader Kaboré
, Anil Koyuncu
, Andrew Habib
, Li Li
, Junhao Wen
, Jacques Klein
, Tegawendé F. Bissyandé
:
The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. 92:1-92:34 - Xianhao Jin

, Francisco Servant
:
HybridCISave: A Combined Build and Test Selection Approach in Continuous Integration. 93:1-93:39 - Daniel Venturini

, Filipe Roseiro Côgo
, Ivanilton Polato
, Marco Aurélio Gerosa
, Igor Scaliante Wiese
:
I Depended on You and You Broke Me: An Empirical Study of Manifesting Breaking Changes in Client Packages. 94:1-94:26 - Liping Han

, Shaukat Ali
, Tao Yue
, Aitor Arrieta
, Maite Arratibel
:
Uncertainty-Aware Robustness Assessment of Industrial Elevator Systems. 95:1-95:51 - Kui Liu

, Jingtang Zhang
, Li Li
, Anil Koyuncu
, Dongsun Kim
, Chunpeng Ge
, Zhe Liu
, Jacques Klein
, Tegawendé F. Bissyandé
:
Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. 96:1-96:38 - Ting Zhang

, DongGyun Han
, Venkatesh Vinayakarao
, Ivana Clairine Irsan
, Bowen Xu
, Ferdian Thung
, David Lo
, Lingxiao Jiang
:
Duplicate Bug Report Detection: How Far Are We? 97:1-97:32 - Chenguang Zhu, Mengshi Zhang, Xiuheng Wu, Xiufeng Xu, Yi Li

:
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery. 98:1-98:31 - Akond Rahman

, Shazibul Islam Shamim
, Dibyendu Brinto Bose
, Rahul Pandita
:
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. 99:1-99:36 - Mifta Sintaha

, Noor Nashid
, Ali Mesbah
:
Katana: Dual Slicing Based Context for Learning Bug Fixes. 100:1-100:27 - Dongjie He

, Jingbo Lu
, Jingling Xue
:
IFDS-based Context Debloating for Object-Sensitive Pointer Analysis. 101:1-101:44 - Zhaoqiang Guo

, Shiran Liu
, Xutong Liu
, Wei Lai, Mingliang Ma
, Xu Zhang
, Chao Ni
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Guoqiang Zhou
, Yuming Zhou
:
Code-line-level Bugginess Identification: How Far have We Come, and How Far have We Yet to Go? 102:1-102:55 - Nengkun Yu

:
Structured Theorem for Quantum Programs and its Applications. 103:1-103:35 - Hazem M. Fahmy

, Fabrizio Pastore
, Lionel C. Briand
, Thomas Stifter
:
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems. 104:1-104:47 - Houssem Ben Braiek

, Foutse Khomh
:
Testing Feedforward Neural Networks Training Programs. 105:1-105:61 - Zhenpeng Chen

, Jie M. Zhang
, Federica Sarro
, Mark Harman
:
A Comprehensive Empirical Study of Bias Mitigation Methods for Machine Learning Classifiers. 106:1-106:30 - Deepika Badampudi

, Michael Unterkalmsteiner
, Ricardo Britto
:
Modern Code Reviews - Survey of Literature and Practice. 107:1-107:61
Volume 32, Number 5, September 2023
- Dulaji Hidellaarachchi

, John C. Grundy
, Rashina Hoda
, Ingo Mueller
:
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners' Perspective. 108:1-108:37 - Di Wu

, Xiao-Yuan Jing
, Hongyu Zhang
, Yang Feng
, Haowen Chen
, Yuming Zhou
, Baowen Xu
:
Retrieving API Knowledge from Tutorials and Stack Overflow Based on Natural Language Queries. 109:1-109:36 - Thomas Wolter

, Ann Barcomb
, Dirk Riehle
, Nikolay Harutyunyan
:
Open Source License Inconsistencies on GitHub. 110:1-110:23 - Katharina Müller

, Christian Koch
, Dirk Riehle
, Michael Stops
, Nikolay Harutyunyan
:
Challenges of Working from Home in Software Development During Covid-19 Lockdowns. 111:1-111:41 - Sofonias Yitagesu

, Zhenchang Xing
, Xiaowang Zhang
, Zhiyong Feng
, Xiaohong Li
, Linyi Han
:
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling. 112:1-112:45 - Qinghua Xu

, Shaukat Ali
, Tao Yue
:
Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems. 113:1-113:32 - Luigi Lavazza

, Angela Locoro
, Geng Liu
, Roberto Meli
:
Estimating Software Functional Size via Machine Learning. 114:1-114:27 - Jia Yang

, Cai Fu
, Fengyang Deng
, Ming Wen
, Xiaowei Guo
, Chuanhao Wan
:
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding. 115:1-115:40 - N. C. Shrikanth

, Tim Menzies
:
Assessing the Early Bird Heuristic (for Predicting Project Quality). 116:1-116:39 - Matteo Camilli

, Carmine Colarusso
, Barbara Russo
, Eugenio Zimeo
:
Actor-Driven Decomposition of Microservices through Multi-level Scalability Assessment. 117:1-117:46 - Jaydeb Sarker

, Asif Kamal Turzo
, Ming Dong
, Amiangshu Bosu
:
Automated Identification of Toxic Code Reviews Using ToxiCR. 118:1-118:32 - Xuanzhe Liu

, Jinfeng Wen
, Zhenpeng Chen
, Ding Li
, Junkai Chen
, Yi Liu
, Haoyu Wang
, Xin Jin
:
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing. 119:1-119:29 - Matthew C. Davis

, Emad Aghayi
, Thomas D. LaToza
, Xiaoyin Wang
, Brad A. Myers
, Joshua Sunshine
:
What's (Not) Working in Programmer User Studies? 120:1-120:32 - Florian Sattler

, Sebastian Böhm
, Philipp Dominik Schubert
, Norbert Siegmund
, Sven Apel
:
SEAL: Integrating Program Analysis and Repository Mining. 121:1-121:34 - Man Zhang

, Andrea Arcuri
, Yonggang Li
, Yang Liu
, Kaiming Xue
:
White-Box Fuzzing RPC-Based APIs with EvoMaster: An Industrial Case Study. 122:1-122:38 - Hongwei Wei

, Xiaohong Su
, Cuiyun Gao
, Weining Zheng
, Wenxin Tao
:
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces. 123:1-123:28
- Shuncheng Tang, Zhenya Zhang, Yi Zhang, Jixiang Zhou, Yan Guo, Shuang Liu, Shengjian Guo, Yan-Fu Li, Lei Ma, Yinxing Xue, Yang Liu:

A Survey on Automated Driving System Testing: Landscapes and Trends. 124:1-124:62 - Jialuo Chen

, Jingyi Wang
, Xingjun Ma
, Youcheng Sun
, Jun Sun
, Peixin Zhang
, Peng Cheng
:
QuoTe: Quality-oriented Testing for Deep Learning Systems. 125:1-125:33 - Yuan Huang

, Hanyang Guo
, Xi Ding
, Junhuai Shu
, Xiangping Chen
, Xiapu Luo
, Zibin Zheng
, Xiaocong Zhou
:
A Comparative Study on Method Comment and Inline Comment. 126:1-126:26 - Meiziniu Li

, Jialun Cao
, Yongqiang Tian
, Tsz On Li
, Ming Wen
, Shing-Chi Cheung
:
COMET: Coverage-guided Model Generation For Deep Learning Library Testing. 127:1-127:34 - Yongqiang Tian

, Wuqi Zhang
, Ming Wen
, Shing-Chi Cheung
, Chengnian Sun
, Shiqing Ma
, Yu Jiang
:
Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications. 128:1-128:32 - Hua Qi

, Zhijie Wang
, Qing Guo
, Jianlang Chen
, Felix Juefei-Xu
, Fuyuan Zhang
, Lei Ma
, Jianjun Zhao
:
ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks. 129:1-129:31
- Zibin Zheng

, Weili Chen
, Zhijie Zhong
, Zhiguang Chen
, Yutong Lu
:
Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features. 130:1-130:28
- Jinfeng Wen

, Zhenpeng Chen
, Xin Jin
, Xuanzhe Liu
:
Rise of the Planet of Serverless Computing: A Systematic Review. 131:1-131:61
- Adrian Herrera

, Mathias Payer
, Antony L. Hosking
:
DatAFLow: Toward a Data-Flow-Guided Fuzzer. 132:1-132:31
- Adrian Herrera

, Mathias Payer
, Antony L. Hosking
:
DatAFLow: Toward a Data-flow-guided Fuzzer. 133:1-133:7
Volume 32, Number 6, November 2023
- Suvodeep Majumder

, Joymallya Chakraborty
, Gina R. Bai
, Kathryn T. Stolee
, Tim Menzies
:
Fair Enough: Searching for Sufficient Measures of Fairness. 134:1-134:22 - Junjie Chen

, Yihua Liang
, Qingchao Shen
, Jiajun Jiang
, Shuochuan Li
:
Toward Understanding Deep Learning Framework Bugs. 135:1-135:31 - Foyzul Hassan

, Na Meng
, Xiaoyin Wang
:
UniLoc: Unified Fault Localization of Continuous Integration Failures. 136:1-136:31 - Mengdi Zhang

, Jun Sun
, Jingyi Wang
, Bing Sun
:
TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination. 137:1-137:24 - Thomas Bock

, Nils Alznauer
, Mitchell Joblin
, Sven Apel
:
Automatic Core-Developer Identification on GitHub: A Validation Study. 138:1-138:29 - Man Zhang

, Asma Belhadi
, Andrea Arcuri
:
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs. 139:1-139:29 - Chong Wang

, Xin Peng
, Zhenchang Xing
, Yue Zhang
, Mingwei Liu
, Rong Luo
, Xiujie Meng
:
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph. 140:1-140:28 - Maram Assi

, Safwat Hassan
, Stefanos Georgiou
, Ying Zou
:
Predicting the Change Impact of Resolving Defects by Leveraging the Topics of Issue Reports in Open Source Software Systems. 141:1-141:34 - Giovanni Rosa

, Simone Scalabrino
, Gabriele Bavota
, Rocco Oliveto
:
What Quality Aspects Influence the Adoption of Docker Images? 142:1-142:30 - Jia Li

, Ge Li
, Zhuo Li
, Zhi Jin
, Xing Hu
, Kechi Zhang
, Zhiyi Fu
:
CodeEditor: Learning to Edit Source Code with Pre-trained Models. 143:1-143:22 - Man Zhang

, Andrea Arcuri
:
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools. 144:1-144:45 - Sahil Suneja

, Yufan Zhuang
, Yunhui Zheng
, Jim Laredo
, Alessandro Morari
, Udayan Khurana
:
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection. 145:1-145:40 - Mohamed Amine Batoun

, Ka Lai Yung
, Yuan Tian
, Mohammed Sayagh
:
An Empirical Study on GitHub Pull Requests' Reactions. 146:1-146:35 - Qing Huang

, Dianshu Liao
, Zhenchang Xing
, Zhengkang Zuo
, Changjing Wang
, Xin Xia
:
Semantic-Enriched Code Knowledge Graph to Reveal Unknowns in Smart Contract Code Reuse. 147:1-147:37 - Jingxuan Zhang

, Junpeng Luo
, Jiahui Liang
, Lina Gong
, Zhiqiu Huang
:
An Accurate Identifier Renaming Prediction and Suggestion Approach. 148:1-148:51 - Abbas Javan Jafari

, Diego Elias Costa
, Emad Shihab
, Rabe Abdalkareem
:
Dependency Update Strategies and Package Characteristics. 149:1-149:29 - Zhengyuan Wei

, Haipeng Wang
, Imran Ashraf
, Wing-Kwong Chan
:
DeepPatch: Maintaining Deep Learning Model Programs to Retain Standard Accuracy with Substantial Robustness Improvement. 150:1-150:49 - Canh Minh Do

, Yati Phyo
, Adrián Riesco
, Kazuhiro Ogata
:
Optimization Techniques for Model Checking Leads-to Properties in a Stratified Way. 151:1-151:38 - Weifeng Sun

, Meng Yan
, Zhongxin Liu
, Xin Xia
, Yan Lei
, David Lo
:
Revisiting the Identification of the Co-evolution of Production and Test Code. 152:1-152:37 - Ran Mo

, Yao Zhang
, Yushuo Wang
, Siyuan Zhang
, Pu Xiong
, Zengyang Li
, Yang Zhao
:
Exploring the Impact of Code Clones on Deep Learning Software. 153:1-153:34
- Yuheng Huang

, Lei Ma
, Yuanchun Li
:
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing. 154:1-154:34 - Wiebke Toussaint Hutiri

, Aaron Yi Ding
, Fahim Kawsar
, Akhil Mathur
:
Tiny, Always-on, and Fragile: Bias Propagation through Design Choices in On-device Machine Learning Workflows. 155:1-155:37 - Xuanzhe Liu

, Diandian Gu
, Zhenpeng Chen
, Jinfeng Wen
, Zili Zhang
, Yun Ma
, Haoyu Wang
, Xin Jin
:
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective. 156:1-156:26 - Shangwen Wang

, Ming Wen
, Bo Lin
, Yepang Liu
, Tegawendé F. Bissyandé
, Xiaoguang Mao
:
Pre-implementation Method Name Prediction for Object-oriented Programming. 157:1-157:35
- Shouguo Yang

, Zhengzi Xu
, Yang Xiao
, Zhe Lang
, Wei Tang
, Yang Liu
, Zhiqiang Shi
, Hong Li
, Limin Sun
:
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. 158:1-158:29
- Mohammad Masudur Rahman

, Chanchal K. Roy
:
A Systematic Review of Automated Query Reformulations in Source Code Search. 159:1-159:79
- Shisong Qin

, Fan Hu
, Zheyu Ma
, Bodong Zhao
, Tingting Yin
, Chao Zhang
:
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing. 160:1-160:26
- Fan Hu

, Shisong Qin
, Zheyu Ma
, Bodong Zhao
, Tingting Yin
, Chao Zhang
:
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing - RCR Report. 161:1-161:8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














