


default search action
Empirical Software Engineering, Volume 28
Volume 28, Number 1, February 2023
- Torgeir Dingsøyr
, Finn Olav Bjørnson
, Julian Schrof
, Tor Sporsem
:
A longitudinal explanatory case study of coordination in a very large development programme: the impact of transitioning from a first- to a second-generation large-scale agile development method. 1 - Leonardo Horn Iwaya
, Muhammad Ali Babar, Awais Rashid
, Chamila Wijayarathna:
On the privacy of mental health apps. 2 - Davide Dell'Anna
, Fatma Basak Aydemir
, Fabiano Dalpiaz:
Evaluating classifiers in SE research: the ECSER pipeline and two replication studies. 3 - Md. Abdullah Al Alamin
, Gias Uddin, Sanjay Malakar, Sadia Afroz, Tameem Bin Haider, Anindya Iqbal:
Developer discussion topics on the adoption and barriers of low code software development platforms. 4 - Sahar Mehrpour
, Thomas D. LaToza
:
Can static analysis tools find more defects? 5 - Ying Fu, Meng Yan
, Zhou Xu, Xin Xia, Xiaohong Zhang, Dan Yang:
An empirical study of the impact of log parsers on the performance of log-based anomaly detection. 6 - Dhivyabharathi Ramasamy
, Cristina Sarasua, Alberto Bacchelli, Abraham Bernstein:
Workflow analysis of data science code in public GitHub repositories. 7 - Fang Hou
, Slinger Jansen
:
A systematic literature review on trust in the software ecosystem. 8 - Saikat Mondal
, Gias Uddin, Chanchal K. Roy:
Automatic prediction of rejected edits in Stack Overflow. 9 - Emad Aghayi
, Thomas D. LaToza:
A controlled experiment on the impact of microtasking on programming. 10 - Christian Schürhoff, Stefan Hanenberg
, Volker Gruhn:
An empirical study on a single company's cost estimations of 338 software projects. 11 - Di Wu
, Xiao-Yuan Jing, Hongyu Zhang, Yuming Zhou, Baowen Xu:
Leveraging Stack Overflow to detect relevant tutorial fragments of APIs. 12 - Luca Traini
, Vittorio Cortellessa
, Daniele Di Pompeo
, Michele Tucci
:
Towards effective assessment of steady state performance in Java software: are we there yet? 13 - Jeffrey M. Young
, Paul Maximilian Bittner
, Eric Walkingshaw
, Thomas Thüm
:
Variational satisfiability solving: efficiently solving lots of related SAT problems. 14 - Arthur V. Kamienski
, Abram Hindle, Cor-Paul Bezemer
:
Analyzing Techniques for Duplicate Question Detection on Q&A Websites for Game Developers. 17 - William G. Temple
, Yue Wu, Carmen Cheh
, Yuan Li, Binbin Chen
, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
CyberSAGE: The cyber security argument graph evaluation tool. 18 - Di Liu, Yang Feng
, Yanyan Yan, Baowen Xu:
Towards understanding bugs in Python interpreters. 19 - Renaud Rwemalika
, Sarra Habchi, Mike Papadakis, Yves Le Traon, Marie-Claude Brasseur:
Smells in system user interactive tests. 20 - Charles Weir
, Ingolf Becker
, Lynne Blair
:
Incorporating software security: using developer workshops to engage product managers. 21 - Nadia Daoudi
, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein:
Assessing the opportunity of combining state-of-the-art Android malware detectors. 22 - Deeksha M. Arya
, Jin L. C. Guo
, Martin P. Robillard
:
How programmers find online learning resources. 23 - Sergio García
, Daniel Strüber, Davide Brugali, Alessandro Di Fava, Patrizio Pelliccione, Thorsten Berger:
Software variability in service robotics. 24 - Stefan Höppner
, Yves Haas, Matthias Tichy, Katharina Juhnke:
Correction to: Advantages and disadvantages of (dedicated) model transformation languages. 25 - Peter Devine
, Yun Sing Koh, Kelly Blincoe:
Evaluating software user feedback classifier performance on unseen apps, datasets, and metadata. 26
Volume 28, Number 2, March 2023
- Thaís Rocha
, Paulo Borba:
Using acceptance tests to predict merge conflict risk. 27 - Sai S. Yerramreddy
, Austin Mordahl, Ugur Koc, Shiyi Wei, Jeffrey S. Foster, Marine Carpuat, Adam A. Porter:
An empirical assessment of machine learning approaches for triaging reports of static analysis tools. 28 - Chico Sundermann
, Tobias Heß, Michael Nieke, Paul Maximilian Bittner, Jeffrey M. Young, Thomas Thüm, Ina Schaefer:
Evaluating state-of-the-art # SAT solvers on industrial configuration spaces. 29 - Alexander Trautsch
, Johannes Erbel, Steffen Herbold
, Jens Grabowski:
What really changes when developers intend to improve their source code: a commit-level study of static metric value and static analysis warning changes. 30 - Zigui Jiang, Xiuwen Tang, Zibin Zheng, Jinyan Guo, Xiapu Luo, Yin Li:
Calling relationship investigation and application on Ethereum Blockchain System. 31 - Felipe Curty do Rego Pinto
, Leonardo Gresta Paulino Murta:
On the assignment of commits to releases. 32 - Johannes Dorn
, Sven Apel
, Norbert Siegmund:
Mastering uncertainty in performance estimations of configurable software systems. 33 - Steffen Herbold
, Steffen Tunkel:
Differential testing for machine learning: an analysis for classification algorithms beyond deep learning. 34 - Reem Alfayez
, Yunyan Ding, Robert Winn, Ghaida Alfayez, Christopher Harman, Barry W. Boehm:
What is asked about technical debt (TD) on Stack Exchange question-and-answer (Q&A) websites? An observational study. 35 - Stephan Lukasczyk
, Florian Kroiß, Gordon Fraser
:
An empirical study of automated unit test generation for Python. 36 - Davide Falessi
, Simone Mesiano Laureani, Jonida Çarka
, Matteo Esposito
, Daniel Alencar da Costa:
Enhancing the defectiveness prediction of methods and classes via JIT. 37 - Kollin Napier
, Tanmay Bhowmik, Shaowei Wang:
An empirical study of text-based machine learning models for vulnerability detection. 38 - Michael Pacheco
, Gustavo Ansaldi Oliva, Gopi Krishnan Rajbahadur, Ahmed E. Hassan:
What makes Ethereum blockchain transactions be processed fast or slow? An empirical study. 39 - Ramy Shahin
, Rafael F. Toledo, Robert Hackman, S. Ramesh, Joanne M. Atlee, Marsha Chechik:
Applying declarative analysis to industrial automotive software product line models. 40 - Mehran Meidani
, Maxime Lamothe, Shane McIntosh:
Assessing the exposure of software changes. 41 - Rrezarta Krasniqi
, Hyunsook Do:
A multi-model framework for semantically enhancing detection of quality-related bug report descriptions. 42 - Nan Yang
, Pieter J. L. Cuijpers
, Dennis Hendriks, Ramon R. H. Schiffelers, Johan Lukkien, Alexander Serebrenik
:
An interview study about the use of logs in embedded software engineering. 43 - Amin Eslami Abyane
, Derui Zhu, Roberto Souza, Lei Ma, Hadi Hemmati:
Towards understanding quality challenges of the federated learning for neural networks: a first look from the lens of robustness. 44 - Antonio Mastropaolo
, Emad Aghajani, Luca Pascarella, Gabriele Bavota
:
Automated variable renaming: are we there yet? 45 - Biruk Asmare Muse
, Foutse Khomh, Giuliano Antoniol:
Refactoring practices in the context of data-intensive systems. 46 - Jiahuei Lin, Haoxiang Zhang
, Bram Adams, Ahmed E. Hassan:
Vulnerability management in Linux distributions. 47 - Ulf Kargén
, Noah Mauthe
, Nahid Shahmehri:
Android decompiler performance on benign and malicious apps: an empirical study. 48 - Kunsong Zhao, Zhou Xu, Meng Yan
, Tao Zhang
, Lei Xue, Ming Fan, Jacky Keung
:
The impact of class imbalance techniques on crashing fault residence prediction models. 49 - Maliheh Izadi
, Mahtab Nejati, Abbas Heydarnoori
:
Semantically-enhanced topic recommendation systems for software projects. 50 - Elizabeth Bjarnason
, Patrik Åberg, Nauman Bin Ali
:
Software selection in large-scale software engineering: A model and criteria based on interactive rapid reviews. 51 - Pooya Rostami Mazrae
, Tom Mens
, Mehdi Golzadeh
, Alexandre Decan
:
On the usage, co-usage and migration of CI/CD tools: A qualitative analysis. 52 - Daniel Russo
, Paul H. P. Hanel, Seraphina Altnickel, Niels van Berkel:
Satisfaction and performance of software developers during enforced work from home in the COVID-19 pandemic. 53 - Anjan Karmakar
, Miltiadis Allamanis, Romain Robbes:
JEMMA: An extensible Java dataset for ML4Code applications. 54 - Neil A. Ernst, Maria Teresa Baldassarre:
Registered reports in software engineering. 55 - Ibtissam Abnane, Ali Idri, Imane Chlioui, Alain Abran:
Evaluating ensemble imputation in software effort estimation. 56
Volume 28, Number 3, June 2023
- Kelly Blincoe, Zhenchang Xing:
Preface to the Special issue on the 36th IEEE International Conference on Software Maintenance and Evolution (ICSME 2020). 57 - Dhivyabharathi Ramasamy
, Cristina Sarasua, Alberto Bacchelli, Abraham Bernstein:
Visualising data science workflows to support third-party notebook comprehension: an empirical study. 58 - Mahmoud Alfadel
, Diego Elias Costa, Emad Shihab:
Empirical analysis of security vulnerabilities in Python packages. 59 - Aaditya Bhatia
, Ellis E. Eghan, Manel Grichi, William G. Cavanagh, Zhen Ming (Jack) Jiang, Bram Adams:
Towards a change taxonomy for machine learning pipelines. 60 - Kewen Peng
, Christian Kaltenecker, Norbert Siegmund, Sven Apel
, Tim Menzies
:
VEER: enhancing the interpretability of model-based optimizations. 61 - Mohammad Mehdi Morovati
, Amin Nikanjam
, Foutse Khomh, Zhen Ming (Jack) Jiang:
Bugs in machine learning-based systems: a faultload benchmark. 62 - Hao Zhong
, Xiaoyin Wang:
An empirical study on API usages from code search engine and local library. 63 - Danilo Caivano, Pietro Cassieri
, Simone Romano
, Giuseppe Scanniello:
On the spread and evolution of dead methods in Java desktop applications: an exploratory study. 64 - Yikun Li
, Mohamed Soliman
, Paris Avgeriou
:
Automatic identification of self-admitted technical debt from four different sources. 65 - Alexander Trautsch
, Steffen Herbold
, Jens Grabowski:
Are automated static analysis tools worth it? An investigation into relative warning density and external software quality on the example of Apache open source projects. 66 - Arif Nurwidyantoro
, Mojtaba Shahin, Michel Chaudron, Waqar Hussain, Harsha Perera, Rifat Ara Shams, Jon Whittle:
Integrating human values in software development using a human values dashboard. 67 - Shinpei Hayashi, Yann-Gaël Guéhéneuc, Michel R. V. Chaudron:
Introduction to the special issue on program comprehension. 68 - Daniel Alencar da Costa, Natalie Grattan, Nigel Stanger
, Sherlock A. Licorish:
Studying the characteristics of SQL-related development tasks: An empirical study. 69 - Osama Ehsan
, Foutse Khomh, Ying Zou, Dong Qiu:
Ranking code clones to support maintenance activities. 70 - Christian Birchler
, Sajad Khatiri
, Bill Bosshard, Alessio Gambi
, Sebastiano Panichella
:
Machine learning-based test selection for simulation-based testing of self-driving cars software. 71 - Owain Parry
, Gregory M. Kapfhammer, Michael Hilton, Phil McMinn:
Empirically evaluating flaky test detection techniques combining test case rerunning and machine learning models. 72 - Andrea Stocco
, Brian Pulfer, Paolo Tonella:
Model vs system level testing of autonomous driving systems: a replication and extension study. 73 - Andrea Stocco, Onn Shehory, Gunel Jahangirova, Vincenzo Riccio
, Guy Barash, Eitan Farchi, Diptikalyan Saha:
Software testing in the machine learning era. 74 - Noppadol Assavakamhaenghan
, Supatsara Wattanakriengkrai, Naomichi Shimada, Raula Gaikovina Kula, Takashi Ishio
, Kenichi Matsumoto:
Does the first response matter for future contributions? A study of first contributions. 75 - Damiano Torre
, Frantzy Mesadieu, Anitha Chennamaneni:
Deep learning techniques to detect cybersecurity attacks: a systematic mapping study. 76 - Amal Alazba
, Hamoud Aljamaan
, Mohammad R. Alshayeb:
Deep learning approaches for bad smell detection: a systematic literature review. 77 - Yisi Han, Zhendong Wang, Yang Feng, Zhihong Zhao, Yi Wang
:
Cross-status communication and project outcomes in OSS development. 78 - Adina Deiner, Patric Feldmeier, Gordon Fraser
, Sebastian Schweikl, Wengran Wang:
Automated test generation for Scratch programs. 79 - Luciana A. M. Zaina
, Joelma Choma, Jullia Saad, Leonor Barroca
, Helen Sharp
, Letícia Machado, Cleidson R. B. de Souza:
What do software startups need from UX work? 80
Volume 28, Number 4, July 2023
- José Aldo Silva da Costa
, Rohit Gheyi, Fernando Castor
, Pablo Roberto Fernandes de Oliveira, Márcio Ribeiro, Baldoino Fonseca:
Seeing confusion through a new lens: on the impact of atoms of confusion on novices' code comprehension. 81 - Moataz Chouchen, Ali Ouni
, Jefferson Olongo, Mohamed Wiem Mkaouer:
Learning to Predict Code Review Completion Time In Modern Code Review. 82 - Sheik Shameer, Gema Rodríguez-Pérez
, Meiyappan Nagappan:
Relationship between diversity of collaborative group members' race and ethnicity and the frequency of their collaborative contributions in GitHub. 83 - Vittunyuta Maeprasart
, Supatsara Wattanakriengkrai, Raula Gaikovina Kula, Christoph Treude
, Kenichi Matsumoto:
Understanding the role of external pull requests in the NPM ecosystem. 84 - Hamdy Michael Ayas
, Philipp Leitner, Regina Hebig:
An empirical study of the systemic and technical migration towards microservices. 85 - Adelina Ciurumelea
, Carol V. Alexandru, Harald C. Gall, Sebastian Proksch:
Completing Function Documentation Comments Using Structural Information. 86 - Qing Mi
, Yi Zhan, Han Weng, Qinghang Bao, Longjie Cui, Wei Ma
:
A graph-based code representation method to improve code readability classification. 87 - Mohammad Abdul Hadi, Fatemeh H. Fard
:
Evaluating pre-trained models for user feedback analysis in software engineering: a study on classification of app-reviews. 88 - Emanuele Iannone
, Zadia Codabux, Valentina Lenarduzzi, Andrea De Lucia, Fabio Palomba:
Rubbing salt in the wound? A large-scale investigation into the effects of refactoring on security. 89 - Katsiaryna Labunets
, Fabio Massacci, Federica Paci, Katja Tuma
:
A new, evidence-based, theory for knowledge reuse in security risk analysis. 90 - Tao Xiao
, Sebastian Baltes, Hideaki Hata
, Christoph Treude
, Raula Gaikovina Kula, Takashi Ishio
, Kenichi Matsumoto:
18 million links in commit messages: purpose, evolution, and decay. 91 - Sayma Sultana, Asif Kamal Turzo, Amiangshu Bosu
:
Code reviews in open source projects : how do gender biases affect participation and outcomes? 92 - Akond Rahman
, Dibyendu Brinto Bose, Raunak Shakya, Rahul Pandita:
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. 93 - Ozan Özkan
, Önder Babur
, Mark van den Brand
:
Refactoring with domain-driven design in an industrial context. 94 - Giovani Guizzo
, Francesco Califano, Federica Sarro, Filomena Ferrucci, Mark Harman:
Inferring test models from user bug reports using multi-objective search. 95 - Aoyang Yan, Hao Zhong
, Daohan Song, Li Jia:
How do programmers fix bugs as workarounds? An empirical study on Apache projects. 96 - Patrícia G. F. Matsubara
, Igor Steinmacher, Bruno Gadelha, Tayana Conte:
Much more than a prediction: Expert-based software effort estimation as a behavioral act. 98 - Jahanzaib Malik
, Fabrizio Pastore
:
An empirical study of vulnerabilities in edge frameworks to support security testing improvement. 99 - Héctor Cadavid
, Vasilios Andrikopoulos
, Paris Avgeriou
:
Improving hardware/software interface management in systems of systems through documentation as code. 100 - Théo Zimmermann
, Jean-Rémy Falleri:
A grounded theory of community package maintenance organizations. 101 - Lucas Francisco da Matta Vegi
, Marco Túlio Valente
:
Understanding code smells in Elixir functional language. 102 - Jinpeng Lan, Lina Gong
, Jingxuan Zhang, Haoxiang Zhang:
BTLink : automatic link recovery between issues and commits based on pre-trained BERT model. 103 - Justyna Petke
, Brad Alexander, Earl T. Barr, Alexander E. I. Brownlee, Markus Wagner, David Robert White:
Program transformation landscapes for automated program modification using Gin. 104 - Itzik David
, G. K. Roy:
Does agile methodology fit all characteristics of software projects? Review and analysis. 105 - Melina C. Vidoni
, Zadia Codabux:
Towards a taxonomy of Roxygen documentation in R packages. 106 - João Helis Bernardo
, Daniel Alencar da Costa, Uirá Kulesza, Christoph Treude
:
The impact of a continuous integration service on the delivery time of merged pull requests. 97
Volume 28, Number 5, October 2023
- Yiming Sun, Daniel M. Germán
, Stefano Zacchiroli:
Using the uniqueness of global identifiers to determine the provenance of Python software source code. 107 - Hirohisa Aman
, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs. 108 - Zainab Masood, Kelly Blincoe, Daniela E. Damian:
What have we learned? A conceptual framework on New Zealand software professionals and companies' response to COVID-19. 109 - José Carlos Pazos, Jean-Sébastien Légaré, Ivan Beschastnikh:
XSnare: application-specific client-side cross-site scripting protection. 110 - Paulina Stevia Nouwou Mindom, Amin Nikanjam
, Foutse Khomh:
A comparison of reinforcement learning frameworks for software testing tasks. 111 - Valentina Piantadosi
, Simone Scalabrino, Alexander Serebrenik
, Nicole Novielli, Rocco Oliveto:
Do attention and memory explain the performance of software developers? 112 - Yihao Chen
, Eduardo Fernandes, Bram Adams, Ahmed E. Hassan:
On practitioners' concerns when adopting service mesh frameworks. 113 - Marthe Nordengen Berntzen
, Viktoria Stray, Nils Brede Moe, Rashina Hoda:
Responding to change over time: A longitudinal case study on changes in coordination mechanisms in large-scale agile. 114 - Elizabeth Bjarnason
, Franz Lang, Alexander Mjöberg:
An empirically based model of software prototyping: a mapping study and a multi-case study. 115 - Fabio Santos
, Joseph Vargovich, Bianca Trinkenreich, Ítalo Santos, Jacob Penney, Ricardo Britto, João Felipe Pimentel, Igor Wiese, Igor Steinmacher, Anita Sarma, Marco Aurélio Gerosa:
Tag that issue: applying API-domain labels in issue tracking systems. 116 - Abdulaziz Alaboudi
, Thomas D. LaToza:
What constitutes debugging? An exploratory study of debugging episodes. 117 - Goran Piskachev
, Matthias Becker, Eric Bodden:
Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. 118 - Xiangping Chen, Peiyong Liao, Queping Kong, Yuan Huang
, Xiao-Cong Zhou:
Studying differentiated code to support smart contract update. 119 - Tushar Sharma
, Stefanos Georgiou, Maria Kechagia, Taher Ahmed Ghaleb, Federica Sarro:
Investigating developers' perception on software testability and its effects. 120 - George G. Cabral, Leandro L. Minku
, Adriano L. I. Oliveira, Dinaldo A. Pessoa, Sadia Tabassum
:
An investigation of online and offline learning models for online Just-in-Time Software Defect Prediction. 121 - Neil A. Ernst
, Martin P. Robillard:
A study of documentation for software architecture. 122 - Dong Wang
, Tao Xiao
, Teyon Son, Raula Gaikovina Kula, Takashi Ishio, Yasutaka Kamei, Kenichi Matsumoto:
More than React: Investigating the Role of Emoji Reaction in GitHub Pull Requests. 123 - Liyan Song
, Leandro L. Minku
, Xin Yao:
On the validity of retrospective predictive performance evaluation procedures in just-in-time software defect prediction. 124 - Arut Prakash Kaleeswaran, Arne Nordmann, Thomas Vogel
, Lars Grunske:
A user study for evaluation of formal verification results and their explanation at Bosch. 125 - Yuexiu Gao, Hongyu Zhang, Chen Lyu
:
EnCoSum: enhanced semantic features for multi-scale multi-modal source code summarization. 126 - Hengjie Song, Guobin Wu, Le Ma, Yufei Pan, Qingan Huang, Siyu Jiang
:
Adversarial domain adaptation for cross-project defect prediction. 127
Volume 28, Number 6, November 2023
- Jürgen Börstler
, Kwabena Ebo Bennin, Sara Hooshangi, Johan Jeuring, Hieke Keuning, Carsten Kleiner
, Bonnie K. MacKellar, Rodrigo Duran, Harald Störrle, Daniel Toll, Jelle van Assema:
Developers talking about code quality. 128 - Owura Asare
, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code? 129 - Lwin Khin Shar
, Biniam Fisseha Demissie, Mariano Ceccato
, Yan Naing Tun, David Lo
, Lingxiao Jiang
, Christoph Bienert:
Experimental comparison of features, analyses, and classifiers for Android malware detection. 130 - Mairieli Wessel
, Joseph Vargovich, Marco Aurélio Gerosa
, Christoph Treude
:
GitHub Actions: The Impact on the Pull Request Process. 131 - Justus Bogner
, Sebastian Kotstein, Timo Pfaff:
Do RESTful API design rules have an impact on the understandability of Web APIs? 132 - Ming Wen
, Yongcong Wang, Yifan Xia, Hai Jin:
Evaluating seed selection for fuzzing JavaScript engines. 133 - Humphrey O. Obie, Hung Du, Kashumi Madampe
, Mojtaba Shahin, Idowu Ilekura, John C. Grundy, Li Li, Jon Whittle, Burak Turhan, Hourieh Khalajzadeh:
Automated detection, categorisation and developers' experience with the violations of honesty in mobile apps. 134 - Ensheng Shi
, Yanlin Wang, Lun Du, Hongyu Zhang, Shi Han, Dongmei Zhang, Hongbin Sun:
CoCoAST: Representing Source Code via Hierarchical Splitting and Reconstruction of Abstract Syntax Trees. 135 - Emanuela Guglielmi
, Simone Scalabrino, Gabriele Bavota, Rocco Oliveto:
Using gameplay videos for detecting issues in video games. 136 - Xingfang Wu
, Heng Li
, Foutse Khomh
:
On the effectiveness of log representation for log-based anomaly detection. 137 - Dong Wang
, Masanari Kondo, Yasutaka Kamei, Raula Gaikovina Kula, Naoyasu Ubayashi:
When conversations turn into work: a taxonomy of converted discussions and issues in GitHub. 138 - Ranindya Paramitha
, Fabio Massacci
:
Technical leverage analysis in the Python ecosystem. 139 - Milica Ðordevic, Michel Albonico, Grace A. Lewis
, Ivano Malavolta
, Patricia Lago:
Computation offloading for ground robotic systems communicating over WiFi - an empirical exploration on performance and energy trade-offs. 140 - Guang Yang
, Yu Zhou
, Xiang Chen, Xiangyu Zhang, Yiran Xu, Tingting Han, Taolue Chen
:
A syntax-guided multi-task learning approach for Turducken-style code generation. 141 - Syeda Khairunnesa Samantha, Shibbir Ahmed, Sayem Mohammad Imtiaz, Hridesh Rajan, Gary T. Leavens:
What kinds of contracts do ML APIs need? 142 - Roozbeh Aghili
, Heng Li, Foutse Khomh:
Studying the characteristics of AIOps projects on GitHub. 143 - Liang Yu
, Emil Alégroth, Panagiota Chatzipetrou, Tony Gorschek:
Automated NFR testing in continuous integration environments: a multi-case study of Nordic companies. 144 - Déaglán Connolly Bree
, Mel Ó Cinnéide
:
Energy efficiency of the Visitor Pattern: contrasting Java and C++ implementations. 145 - Michael Weiss
, André García Gómez, Paolo Tonella:
Generating and detecting true ambiguity: a forgotten danger in DNN supervision testing. 146 - Jesús M. González-Barahona
, Sergio Raúl Montes León
, Gregorio Robles, Stefano Zacchiroli
:
The software heritage license dataset (2022 edition). 147 - Talita Vieira Ribeiro
, Paulo Sérgio Medeiros dos Santos, Guilherme Horta Travassos:
On the Investigation of Empirical Contradictions - Aggregated Results of Local Studies on Readability and Comprehensibility of Source Code. 148 - Shalini Chakraborty
, Grischa Liebel
:
We do not understand what it says - studying student perceptions of software modelling. 149 - Nimmi Rashinika Weeraddana, Xiaoyan Xu, Mahmoud Alfadel, Shane McIntosh, Meiyappan Nagappan:
An empirical comparison of ethnic and gender diversity of DevOps and non-DevOps contributions to open-source projects. 150 - Jiahuei Lin
, Bram Adams, Ahmed E. Hassan:
On the coordination of vulnerability fixes. 151 - Christian Kaltenecker
, Stefan Mühlbauer
, Alexander Grebhahn, Norbert Siegmund
, Sven Apel
:
Performance evolution of configurable software systems: an empirical study. 152 - Johannes Härtel
, Ralf Lämmel:
Operationalizing validity of empirical software engineering studies. 153 - Caique Moreira, Breno B. N. de França
, Tayana Uchôa Conte:
Analyzing the BizDev interface in an enterprise context: a case of developers acting in business. 154 - Luigi Lavazza
, Sandro Morasca
, Marco Gatto:
An empirical study on software understandability and its dependence on code characteristics. 155

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.