Table of contents for issues of ACM Transactions on Software Engineering and Methodology

Last update: Sat Dec 21 08:01:51 MST 2024                Valid HTML 3.2!

Volume 1, Number 1, January, 1992
Volume 1, Number 2, April, 1992
Volume 1, Number 3, July, 1992
Volume 1, Number 4, October, 1992
Volume 2, Number 1, January, 1993
Volume 2, Number 2, April, 1993
Volume 2, Number 3, July, 1993
Volume 2, Number 4, October, 1993
Volume 3, Number 1, January, 1994
Volume 3, Number 2, April, 1994
Volume 3, Number 3, July, 1994
Volume 3, Number 4, October, 1994
Volume 4, Number 1, January, 1995
Volume 4, Number 2, April, 1995
Volume 4, Number 3, July, 1995
Volume 4, Number 4, October, 1995
Volume 5, Number 1, January, 1996
Volume 5, Number 2, April, 1996
Volume 5, Number 3, July, 1996
Volume 5, Number 4, October, 1996
Volume 6, Number 1, January, 1997
Volume 6, Number 2, April, 1997
Volume 6, Number 3, July, 1997
Volume 6, Number 4, October, 1997
Volume 7, Number 1, January, 1998
Volume 7, Number 2, April, 1998
Volume 7, Number 3, July, 1998
Volume 7, Number 4, October, 1998
Volume 8, Number 1, January, 1999
Volume 8, Number 2, April, 1999
Volume 8, Number 3, July, 1999
Volume 8, Number 4, October, 1999
Volume 9, Number 1, January, 2000
Volume 9, Number 2, April, 2000
Volume 9, Number 3, July, 2000
Volume 9, Number 4, October, 2000
Volume 10, Number 1, January, 2001
Volume 10, Number 2, April, 2001
Volume 10, Number 3, July, 2001
Volume 10, Number 4, October, 2001
Volume 11, Number 1, January, 2002
Volume 11, Number 2, 2002
Volume 11, Number 3, 2002
Volume 11, Number 4, 2002
Volume 12, Number 1, 2003
Volume 12, Number 2, April, 2003
Volume 12, Number 3, July, 2003
Volume 12, Number 4, October, 2003
Volume 13, Number 1, January, 2004
Volume 13, Number 2, April, 2004
Volume 13, Number 3, July, 2004
Volume 13, Number 4, October, 2004
Volume 14, Number 1, January, 2005
Volume 14, Number 2, April, 2005
Volume 14, Number 3, July, 2005
Volume 14, Number 4, October, 2005
Volume 15, Number 1, January, 2006
Volume 15, Number 2, April, 2006
Volume 15, Number 3, July, 2006
Volume 15, Number 4, October, 2006
Volume 16, Number 1, February, 2007
Volume 16, Number 2, April, 2007
Volume 16, Number 3, July, 2007
Volume 16, Number 4, September, 2007
Volume 17, Number 1, December, 2007
Volume 17, Number 2, April, 2008
Volume 17, Number 3, June, 2008
Volume 17, Number 4, August, 2008
Volume 18, Number 1, September, 2008
Volume 18, Number 2, November, 2008
Volume 18, Number 3, May, 2009
Volume 18, Number 4, July, 2009
Volume 19, Number 1, August, 2009
Volume 19, Number 2, October, 2009
Volume 19, Number 3, January, 2010
Volume 19, Number 4, April, 2010
Volume 20, Number 1, June, 2010
Volume 20, Number 2, August, 2010
Volume 20, Number 3, August, 2011
Volume 20, Number 4, September, 2011
Volume 21, Number 1, December, 2011
Volume 21, Number 2, March, 2012
Volume 21, Number 3, June, 2012
Volume 21, Number 4, November, 2012
Volume 22, Number 1, February, 2013
Volume 22, Number 2, March, 2013
Volume 22, Number 3, July, 2013
Volume 22, Number 4, October, 2013
Volume 23, Number 1, February, 2014
Volume 23, Number 2, March, 2014
Volume 23, Number 3, May, 2014
Volume 23, Number 4, August, 2014
Volume 24, Number 1, September, 2014
Volume 24, Number 2, December, 2014
Volume 24, Number 3, May, 2015
Volume 24, Number 4, August, 2015
Volume 25, Number 1, December, 2015
Volume 25, Number 2, May, 2016
Volume 25, Number 3, August, 2016
Volume 25, Number 4, May, 2017
Volume 26, Number 1, July, 2017
Volume 26, Number 2, October, 2017
Volume 26, Number 3, January, 2018
Volume 26, Number 4, February, 2018
Volume 27, Number 1, June, 2018
Volume 27, Number 2, July, 2018
Volume 27, Number 3, October, 2018
Volume 27, Number 4, November, 2018
Volume 28, Number 1, February, 2019
Volume 28, Number 2, April, 2019
Volume 28, Number 3, August, 2019
Volume 28, Number 4, October, 2019
Volume 29, Number 1, February, 2020
Volume 29, Number 2, April, 2020
Volume 29, Number 3, July, 2020
Volume 29, Number 4, October, 2020
Volume 30, Number 1, January, 2021
Volume 30, Number 2, March, 2021
Volume 30, Number 3, May, 2021
Volume 30, Number 4, July, 2021
Volume 31, Number 1, January, 2022
Volume 31, Number 2, April, 2022
Volume 31, Number 3, July, 2022
Volume 31, Number 4, October, 2022
Volume 32, Number 1, January, 2023
Volume 32, Number 2, April, 2023
Volume 32, Number 3, July, 2023
Volume 32, Number 4, July, 2023
Volume 32, Number 5, September, 2023
Volume 32, Number 6, November, 2023
Volume 33, Number 1, January, 2024
Volume 33, Number 2, February, 2024
Volume 33, Number 3, March, 2024
Volume 33, Number 4, May, 2024
Volume 33, Number 5, June, 2024
Volume 33, Number 6, July, 2024
Volume 33, Number 7, September, 2024
Volume 33, Number 8, November, 2024


ACM Transactions on Software Engineering and Methodology
Volume 1, Number 1, January, 1992

            A. Jefferson Offutt   Investigations of the software testing
                                  coupling effect  . . . . . . . . . . . . 5--20
            Kurt M. Olender and   
              Leon J. Osterweil   Interprocedural static analysis of
                                  sequencing constraints . . . . . . . . . 21--52
           Victor R. Basili and   
         Gianluigi Caldiera and   
               Giovanni Cantone   A reference architecture for the
                                  component factory  . . . . . . . . . . . 53--80
         Carmen J. Trammell and   
             Leon H. Binder and   
             Cathrine E. Snyder   The automated production control
                                  documentation system: a case study in
                                  cleanroom software engineering . . . . . 81--94
         Robert A. Ballance and   
            Susan L. Graham and   
       Michael L. Van de Vanter   The Pan language-based editing system    95--127

ACM Transactions on Software Engineering and Methodology
Volume 1, Number 2, April, 1992

                  G. Engels and   
               C. Lewerentz and   
                    M. Nagl and   
            W. Schäfer and   
                 A. Schürr   Building integrated software development
                                  environments. Part I tool specification  135--167
                 James D. Kiper   Structural testing of rule-based expert
                                  systems  . . . . . . . . . . . . . . . . 168--187
       G. Michael Schneider and   
              Johnny Martin and   
                     W. T. Tsai   An experimental study of fault detection
                                  in user requirements documents . . . . . 188--204

ACM Transactions on Software Engineering and Methodology
Volume 1, Number 3, July, 1992

           Eduardo Ostertag and   
              James Hendler and   
Rubén Prieto Díaz and   
                Christine Braun   Computing similarity in a reuse library
                                  system: an AI-based approach . . . . . . 205--228
          Kevin J. Sullivan and   
                   David Notkin   Reconciling environment integration and
                                  software evolution . . . . . . . . . . . 229--268
        Shmuel Tyszberowicz and   
                 Amiram Yehudai   OBSERV --- a prototyping language and
                                  environment  . . . . . . . . . . . . . . 269--309
                   Wuu Yang and   
              Susan Horwitz and   
                    Thomas Reps   A program integration algorithm that
                                  accommodates semantics-preserving
                                  transformations  . . . . . . . . . . . . 310--354

ACM Transactions on Software Engineering and Methodology
Volume 1, Number 4, October, 1992

                 Don Batory and   
                  Sean O'Malley   The design and implementation of
                                  hierarchical software systems with
                                  reusable components  . . . . . . . . . . 355--398
                David Harel and   
              Chaim-arie Kahana   On statecharts with overlapping  . . . . 399--421
             Steven J. Zeil and   
             Faten H. Afifi and   
                   Lee J. White   Detection of linear errors via domain
                                  testing  . . . . . . . . . . . . . . . . 422--451


ACM Transactions on Software Engineering and Methodology
Volume 2, Number 1, January, 1993

                   Manfred Broy   Functional specification of
                                  time-sensitive communicating systems . . 1--46
             Gail E. Kaiser and   
                Simon M. Kaplan   Parallel and distributed incremental
                                  attribute evaluation algorithms for
                                  multiuser software development
                                  environments . . . . . . . . . . . . . . 47--92
         James A. Whittaker and   
                    J. H. Poore   Markov analysis of software
                                  specifications . . . . . . . . . . . . . 93--106

ACM Transactions on Software Engineering and Methodology
Volume 2, Number 2, April, 1993

         Richard A. DeMillo and   
            A. Jefferson Offutt   Experimental results from an automatic
                                  test case generator  . . . . . . . . . . 109--127
          Yishai A. Feldman and   
                 Haim Schneider   Simulating reactive systems by deduction 128--175
                       P. Klint   A meta-environment for generating
                                  programming environments . . . . . . . . 176--201

ACM Transactions on Software Engineering and Methodology
Volume 2, Number 3, July, 1993

               Paolo Ciancarini   Coordinating rule-based software
                                  processes with ESP . . . . . . . . . . . 203--227
        William G. Griswold and   
                   David Notkin   Automated assistance for program
                                  restructuring  . . . . . . . . . . . . . 228--269
            M. Jean Harrold and   
                Rajiv Gupta and   
                 Mary Lou Soffa   A methodology for controlling the size
                                  of a test suite  . . . . . . . . . . . . 270--285
             Andy Podgurski and   
                    Lynn Pierce   Retrieving reusable software by sampling
                                  behavior . . . . . . . . . . . . . . . . 286--303

ACM Transactions on Software Engineering and Methodology
Volume 2, Number 4, October, 1993

                Laura K. Dillon   A visual execution model for Ada tasking 311--345
                  Farn Wang and   
            Aloysius K. Mok and   
               E. Allen Emerson   Distributed real-time system
                                  specification and verification in APTL   346--378
                Pamela Zave and   
                Michael Jackson   Conjunction as composition . . . . . . . 379--411


ACM Transactions on Software Engineering and Methodology
Volume 3, Number 1, January, 1994

                 Rolf Adams and   
               Walter Tichy and   
                Annette Weinert   The cost of selective recompilation and
                                  environment processing . . . . . . . . . 3--28
   István Forgács   Double iterative framework for
                                  flow-sensitive interprocedural data flow
                                  analysis . . . . . . . . . . . . . . . . 29--55
            Angelo Morzenti and   
           Pierluigi San Pietro   Object-oriented logical specification of
                                  time-critical systems  . . . . . . . . . 56--98

ACM Transactions on Software Engineering and Methodology
Volume 3, Number 2, April, 1994

             Roong-Ko Doong and   
              Phyllis G. Frankl   The ASTOOT approach to testing
                                  object-oriented programs . . . . . . . . 101--130
               L. K. Dillon and   
                   G. Kutty and   
                L. E. Moser and   
        P. M. Melliar-Smith and   
              Y. S. Ramakrishna   A graphical interval logic for
                                  specifying concurrent systems  . . . . . 131--165
  Francesco Parisi-Presicce and   
            Alfonso Pierantonio   An algebraic theory of class
                                  specification  . . . . . . . . . . . . . 166--199

ACM Transactions on Software Engineering and Methodology
Volume 3, Number 3, July, 1994

             Philip J. Bernhard   A reduced test suite for protocol
                                  conformance testing  . . . . . . . . . . 201--220
              Yoonsik Cheon and   
                Gary T. Leavens   The Larch/Smalltalk interface
                                  specification language . . . . . . . . . 221--253
            Bingchiang Jeng and   
              Elaine J. Weyuker   A simplified domain-testing strategy . . 254--270

ACM Transactions on Software Engineering and Methodology
Volume 3, Number 4, October, 1994

         Christian Creveuil and   
            Gruia-Catalin Roman   Formal specification and design of a
                                  message router . . . . . . . . . . . . . 271--307
              Miguel Felder and   
                Angelo Morzenti   Validating real-time systems by
                                  history-checking TRIO specifications . . 308--339
                    S. Duri and   
                     U. Buy and   
             R. Devarapalli and   
                    S. M. Shatz   Application and experimental evaluation
                                  of state space reduction methods for
                                  deadlock analysis in Ada . . . . . . . . 340--380


ACM Transactions on Software Engineering and Methodology
Volume 4, Number 1, January, 1995

              David Binkley and   
              Susan Horwitz and   
                    Thomas Reps   Program integration for languages with
                                  procedure calls  . . . . . . . . . . . . 3--35
               W. E. Howden and   
                   Yudong Huang   Software trustability analysis . . . . . 36--64
               Michal Young and   
          Richard N. Taylor and   
            David L. Levine and   
               Kari A. Nies and   
                 Debra Brodbeck   A concurrency analysis tool suite for
                                  Ada programs: rationale, design, and
                                  preliminary experience . . . . . . . . . 65--106

ACM Transactions on Software Engineering and Methodology
Volume 4, Number 2, April, 1995

                 Daniel Jackson   Aspect: detecting bugs with abstract
                                  dependences  . . . . . . . . . . . . . . 109--145
      Amy Moormann Zaremski and   
              Jeannette M. Wing   Signature matching: a tool for using
                                  software libraries . . . . . . . . . . . 146--170
              Mauro Pezz\`e and   
          Richard N. Taylor and   
                   Michal Young   Graph models for reachability analysis
                                  of concurrent programs . . . . . . . . . 171--213
                 Bevin R. Brett   Comments on ``The cost of selective
                                  recompilation and environment
                                  processing'' . . . . . . . . . . . . . . 214--216
               Walter Tichy and   
                 Rolf Adams and   
                Annette Weinert   Authors' response  . . . . . . . . . . . 217--219

ACM Transactions on Software Engineering and Methodology
Volume 4, Number 3, July, 1995

          Stanley M. Sutton and   
          Dennis Heimbigner and   
              Leon J. Osterweil   APPL/A: a language for software process
                                  programming  . . . . . . . . . . . . . . 221--286
            H. Rebecca Callison   A time-sensitive object model for
                                  real-time systems  . . . . . . . . . . . 287--317

ACM Transactions on Software Engineering and Methodology
Volume 4, Number 4, October, 1995

           Gregory D. Abowd and   
               Robert Allen and   
                   David Garlan   Formalizing style to understand
                                  descriptions of software architecture    319--364
                 Daniel Jackson   Structuring Z specifications with views  365--389


ACM Transactions on Software Engineering and Methodology
Volume 5, Number 1, January, 1996

         Mark van den Brand and   
                   Eelco Visser   Generation of formatters for
                                  context-free languages . . . . . . . . . 1--41
       Premkumar T. Devanbu and   
         David S. Rosenblum and   
              Alexander L. Wolf   Generating testing and analysis tools
                                  with Aria  . . . . . . . . . . . . . . . 42--62
             Roger Ferguson and   
                   Bogdan Korel   The chaining approach for software test
                                  data generation  . . . . . . . . . . . . 63--86

ACM Transactions on Software Engineering and Methodology
Volume 5, Number 2, April, 1996

              Elaine J. Weyuker   Using failure cost information for
                                  testing and reliability assessment . . . 87--98
        A. Jefferson Offutt and   
                  Ammei Lee and   
            Gregg Rothermel and   
            Roland H. Untch and   
                 Christian Zapf   An experimental determination of
                                  sufficient mutant operators  . . . . . . 99--118
        Francesco Bergadano and   
                Daniele Gunetti   Testing by means of inductive program
                                  learning . . . . . . . . . . . . . . . . 119--145
                Gregor Snelting   Reengineering of configurations based on
                                  mathematical concept analysis  . . . . . 146--189

ACM Transactions on Software Engineering and Methodology
Volume 5, Number 3, July, 1996

           Gianpaolo Cugola and   
        Elisabetta Di Nitto and   
           Alfonso Fuggetta and   
                   Carlo Ghezzi   A framework for formalizing
                                  inconsistencies and deviations in
                                  human-centered systems . . . . . . . . . 191--230
     Constance L. Heitmeyer and   
          Ralph D. Jeffords and   
                 Bruce G. Labaw   Automated consistency checking of
                                  requirements specifications  . . . . . . 231--261
             Gail C. Murphy and   
                   David Notkin   Lightweight lexical source model
                                  extraction . . . . . . . . . . . . . . . 262--292

ACM Transactions on Software Engineering and Methodology
Volume 5, Number 4, October, 1996

                David Harel and   
                   Amnon Naamad   The STATEMATE semantics of statecharts   293--333
           Shing Chi Cheung and   
                    Jeff Kramer   Context constraints for compositional
                                  reachability analysis  . . . . . . . . . 334--377
          Daniel J. Barrett and   
             Lori A. Clarke and   
               Peri L. Tarr and   
              Alexander E. Wise   A framework for event-based software
                                  integration  . . . . . . . . . . . . . . 378--421
                      Anonymous   Author Index . . . . . . . . . . . . . . 422--423


ACM Transactions on Software Engineering and Methodology
Volume 6, Number 1, January, 1997

                Pamela Zave and   
                Michael Jackson   Four dark corners of requirements
                                  engineering  . . . . . . . . . . . . . . 1--30
                L. E. Moser and   
          Y. S. Ramakrishna and   
                   G. Kutty and   
        P. M. Melliar-Smith and   
                   L. K. Dillon   A graphical environment for the design
                                  of concurrent real-time systems  . . . . 31--79
                Laura K. Dillon   Task dependence and termination in Ada   80--110

ACM Transactions on Software Engineering and Methodology
Volume 6, Number 2, April, 1997

                Scott Henninger   An evolutionary approach to constructing
                                  effective software reuse repositories    111--140
          Premkumar Devanbu and   
                  Mark A. Jones   The use of description logics in KBSE
                                  systems  . . . . . . . . . . . . . . . . 141--172
            Gregg Rothermel and   
              Mary Jean Harrold   A safe, efficient regression test
                                  selection technique  . . . . . . . . . . 173--210

ACM Transactions on Software Engineering and Methodology
Volume 6, Number 3, July, 1997

               Robert Allen and   
                   David Garlan   A formal basis for architectural
                                  connection . . . . . . . . . . . . . . . 213--249
        Gruia-Catalin Roman and   
            Peter J. McCann and   
                 Jerome Y. Plun   Mobile UNITY: reasoning and
                                  specification in mobile computing  . . . 250--282
          Vincenzo Ambriola and   
             Reidar Conradi and   
               Alfonso Fuggetta   Assessing process-centered software
                                  engineering environments . . . . . . . . 283--328
             Alexandre Petrenko   Comments on ``A reduced test suite for
                                  protocol conformance testing'' . . . . . 329--331

ACM Transactions on Software Engineering and Methodology
Volume 6, Number 4, October, 1997

      Amy Moormann Zaremski and   
              Jeannette M. Wing   Specification matching of software
                                  components . . . . . . . . . . . . . . . 333--369
                Rajiv Gupta and   
             Mary Lou Soffa and   
                    John Howard   Hybrid slicing: integrating dynamic
                                  information with static analysis . . . . 370--397
             Andreas Zeller and   
                Gregor Snelting   Unified versioning through feature logic 398--441


ACM Transactions on Software Engineering and Methodology
Volume 7, Number 1, January, 1998

             John C. Doppke and   
          Dennis Heimbigner and   
              Alexander L. Wolf   Software process modeling and execution
                                  within virtual environments  . . . . . . 1--40
                Adam Porter and   
                 Harvey Siy and   
              Audris Mockus and   
                 Lawrence Votta   Understanding the sources of variation
                                  in software inspections  . . . . . . . . 41--79
             Luciano Baresi and   
                  Mauro Pezz\`e   Toward formalizing structured analysis   80--107

ACM Transactions on Software Engineering and Methodology
Volume 7, Number 2, April, 1998

         Robert W. Bowdidge and   
            William G. Griswold   Supporting the restructuring of data
                                  abstractions through manipulation of a
                                  program visualization  . . . . . . . . . 109--157
             Gail C. Murphy and   
               David Notkin and   
        William G. Griswold and   
                   Erica S. Lan   An empirical study of static call graph
                                  extractors . . . . . . . . . . . . . . . 158--191
              James J. Hunt and   
              Kiem-Phong Vo and   
                Walter F. Tichy   Delta algorithms an empirical analysis   192--214

ACM Transactions on Software Engineering and Methodology
Volume 7, Number 3, July, 1998

           Jonathan E. Cook and   
              Alexander L. Wolf   Discovering models of software processes
                                  from event-based data  . . . . . . . . . 215--249
               Huo Yan Chen and   
                  T. H. Tse and   
                 F. T. Chan and   
                     T. Y. Chen   In black and white: an integrated
                                  approach to class-level testing of
                                  object-oriented programs . . . . . . . . 250--295
                Judith Crow and   
                    Ben Di Vito   Formalizing space shuttle software
                                  requirements: four case studies  . . . . 296--332
               Robert Allen and   
                   David Garlan   Errata: ``A formal basis for
                                  architectural connection'' . . . . . . . 333--334

ACM Transactions on Software Engineering and Methodology
Volume 7, Number 4, October, 1998

             Anthony Hunter and   
                Bashar Nuseibeh   Managing inconsistent specifications:
                                  reasoning, analysis, and action  . . . . 335--367
     Maria Letizia Jaccheri and   
          Gian Pietro Picco and   
                  Patricia Lago   Eliciting software process models with
                                  the E3 language  . . . . . . . . . . . . 368--410
           Alfonso Fuggetta and   
              Luigi Lavazza and   
             Sandro Morasca and   
              Stefano Cinti and   
        Giandomenico Oldano and   
                    Elena Orazi   Applying GQM in an industrial software
                                  factory  . . . . . . . . . . . . . . . . 411--448
              James J. Hunt and   
                Walter F. Tichy   Addendum to ``Delta algorithms: an
                                  empirical analysis'' . . . . . . . . . . 449--449


ACM Transactions on Software Engineering and Methodology
Volume 8, Number 1, January, 1999

            Jonathan S. Ostroff   Composition and refinement of discrete
                                  real-time systems  . . . . . . . . . . . 1--48
           Shing Chi Cheung and   
                    Jeff Kramer   Checking safety properties using
                                  compositional reachability analysis  . . 49--78
        Emanuele Ciapessoni and   
      Piergiorgio Mirandola and   
      Alberto Coen-Porisini and   
             Dino Mandrioli and   
                Angelo Morzenti   From formal models to formally based
                                  methods: an industrial experience  . . . 79--113

ACM Transactions on Software Engineering and Methodology
Volume 8, Number 2, April, 1999

            Peter J. McCann and   
            Gruia-Catalin Roman   Modeling mobile IP in mobile UNITY . . . 115--146
           Jonathan E. Cook and   
              Alexander L. Wolf   Software process validation:
                                  quantitatively measuring the
                                  correspondence of a process to a model   147--176
           Premkumar T. Devanbu   GENOA --- a customizable,
                                  front-end-retargetable source code
                                  analysis framework . . . . . . . . . . . 177--212

ACM Transactions on Software Engineering and Methodology
Volume 8, Number 3, July, 1999

                 E. Damiani and   
               M. G. Fugini and   
                  C. Bellettini   A hierarchy-aware approach to faceted
                                  classification of objected-oriented
                                  components . . . . . . . . . . . . . . . 215--262
             Andy Podgurski and   
               Wassim Masri and   
           Yolanda McCleese and   
           Francis G. Wolff and   
                   Charles Yang   Estimation of software reliability by
                                  stratified sampling  . . . . . . . . . . 263--283
Jean-Marc Jézéquel   Reifying variants in configuration
                                  management . . . . . . . . . . . . . . . 284--295

ACM Transactions on Software Engineering and Methodology
Volume 8, Number 4, October, 1999

                Steven P. Reiss   The Desert environment . . . . . . . . . 297--342
                 Klaus Pohl and   
          Klaus Weidenhaupt and   
           Ralf Dömges and   
               Peter Haumer and   
             Matthias Jarke and   
                    Ralf Klamma   PRIME --- toward process-integrated
                                  modeling environments: 1 . . . . . . . . 343--410
                D. Richard Kuhn   Fault classes and error detection
                                  capability of specification-based
                                  testing  . . . . . . . . . . . . . . . . 411--424
                 E. Damiani and   
               M. G. Fugini and   
                  C. Bellettini   Corrigenda: a hierarchy-aware approach
                                  to faceted classification of
                                  object-oriented components . . . . . . . 425--472


ACM Transactions on Software Engineering and Methodology
Volume 9, Number 1, January, 2000

              Tevfik Bultan and   
             Richard Gerber and   
             Christopher League   Composite model-checking: verification
                                  with type-specific symbolic
                                  representations  . . . . . . . . . . . . 3--50
               James C. Corbett   Using shape analysis to reduce
                                  finite-state models of concurrent Java
                                  programs . . . . . . . . . . . . . . . . 51--93
                 Carl A. Gunter   Abstracting dependencies between
                                  software configuration items . . . . . . 94--131

ACM Transactions on Software Engineering and Methodology
Volume 9, Number 2, April, 2000

           A. Prasad Sistla and   
              Viktor Gyuris and   
               E. Allen Emerson   SMC: a symmetry-based model checker for
                                  verification of safety and liveness
                                  properties . . . . . . . . . . . . . . . 133--166
              P. Ciancarini and   
           F. Franzé and   
                     C. Mascolo   Using a coordination language to specify
                                  and analyze systems containing mobile
                                  components . . . . . . . . . . . . . . . 167--198
        Panagiotis Louridas and   
           Pericles Loucopoulos   A generic model for reflective design    199--237

ACM Transactions on Software Engineering and Methodology
Volume 9, Number 3, July, 2000

            Paola Inverardi and   
          Alexander L. Wolf and   
             Daniel Yankelevich   Static checking of system behaviors
                                  using derived component assumptions  . . 239--272
          Naftaly H. Minsky and   
             Victoria Ungureanu   Law-governed interaction: a coordination
                                  and control mechanism for heterogeneous
                                  distributed systems  . . . . . . . . . . 273--305
             Kevin L. Mills and   
                   Hassan Gomaa   A knowledge-based method for inferring
                                  semantic concepts from visual models of
                                  system behavior  . . . . . . . . . . . . 306--337

ACM Transactions on Software Engineering and Methodology
Volume 9, Number 4, October, 2000

             Dan S. Wallach and   
            Andrew W. Appel and   
               Edward W. Felten   SAFKASI: a security mechanism for
                                  language-based systems . . . . . . . . . 341--378
          Philip W. L. Fong and   
              Robert D. Cameron   Proof linking: modular verification of
                                  mobile programs in the presence of lazy,
                                  dynamic linking  . . . . . . . . . . . . 379--409
            Andrew C. Myers and   
                 Barbara Liskov   Protecting privacy using the
                                  decentralized label model  . . . . . . . 410--442
               E. M. Clarke and   
                     S. Jha and   
                     W. Marrero   Verifying security protocols with Brutus 443--487
            Antonio Durante and   
           Riccardo Focardi and   
               Roberto Gorrieri   A compiler for analyzing cryptographic
                                  protocols using noninterference  . . . . 488--528


ACM Transactions on Software Engineering and Methodology
Volume 10, Number 1, January, 2001

                     F. Tip and   
                   T. B. Dinesh   A slicing-based approach for locating
                                  type errors  . . . . . . . . . . . . . . 5--55
               Huo Yan Chen and   
                  T. H. Tse and   
                     T. Y. Chen   TACCLE: a methodology for
                                  object-oriented software testing at the
                                  class and cluster levels . . . . . . . . 56--109
            Gregg Rothermel and   
           Margaret Burnett and   
                   Lixin Li and   
         Christopher Dupuis and   
                Andrei Sheretov   A methodology for testing spreadsheets   110--147

ACM Transactions on Software Engineering and Methodology
Volume 10, Number 2, April, 2001

                 John Bible and   
            Gregg Rothermel and   
             David S. Rosenblum   A comparative study of coarse- and
                                  fine-grained safe regression
                                  test-selection techniques  . . . . . . . 149--183
             Todd L. Graves and   
          Mary Jean Harrold and   
               Jung-Min Kim and   
                Adam Porter and   
                Gregg Rothermel   An empirical study of regression test
                                  selection techniques . . . . . . . . . . 184--208
              Saurabh Sinha and   
          Mary Jean Harrold and   
                Gregg Rothermel   Interprocedural control dependence . . . 209--254

ACM Transactions on Software Engineering and Methodology
Volume 10, Number 3, July, 2001

          Angelo Gargantini and   
                Angelo Morzenti   Automated deductive requirements
                                  analysis of critical systems . . . . . . 255--307
           Dewayne E. Perry and   
              Harvey P. Siy and   
              Lawrence G. Votta   Parallel changes in large-scale software
                                  development: an observational case study 308--337
          Gian Pietro Picco and   
        Gruia-Catalin Roman and   
                Peter J. McCann   Reasoning about code mobility with
                                  mobile UNITY . . . . . . . . . . . . . . 338--395

ACM Transactions on Software Engineering and Methodology
Volume 10, Number 4, October, 2001

             J.-R. Beauvais and   
                  E. Rutten and   
                 T. Gautier and   
               R. Houdebine and   
              P. Le Guernic and   
                     Y.-M. Tang   Modeling statecharts and activitycharts
                                  as signal equations  . . . . . . . . . . 397--451
            Angela Bonifati and   
           Fabiano Cattaneo and   
               Stefano Ceri and   
           Alfonso Fuggetta and   
             Stefano Paraboschi   Designing data marts for data warehouses 452--483


ACM Transactions on Software Engineering and Methodology
Volume 11, Number 1, January, 2002

           Nenad Medvidovic and   
         David S. Rosenblum and   
          David F. Redmiles and   
               Jason E. Robbins   Modeling software architectures in the
                                  Unified Modeling Language  . . . . . . . 2--57
         Tatsuhiro Tsuchiya and   
                   Tohru Kikuno   On fault classes and error detection
                                  capability of specification-based
                                  testing  . . . . . . . . . . . . . . . . 58--62
                Idit Keidar and   
               Roger Khazan and   
                Nancy Lynch and   
                Alex Shvartsman   An inheritance-based technique for
                                  building simulation proofs incrementally 63--91
            Michael Schrefl and   
               Markus Stumptner   Behavior-consistent specialization of
                                  object life cycles . . . . . . . . . . . 92--148

ACM Transactions on Software Engineering and Methodology
Volume 11, Number 2, 2002

              Miguel Felder and   
                  Mauro Pezz\`e   A formal design notation for real-time
                                  systems  . . . . . . . . . . . . . . . . 149--190
                 Don Batory and   
               Clay Johnson and   
              Bob Macdonald and   
                Dale Von Heeder   Achieving extensibility through
                                  product-lines and domain-specific
                                  languages: a case study  . . . . . . . . 191--214
         Yannis Smaragdakis and   
                     Don Batory   Mixin layers: an object-oriented
                                  implementation technique for refinements
                                  and collaboration-based designs  . . . . 215--255
                 Daniel Jackson   Alloy: a lightweight object modelling
                                  notation . . . . . . . . . . . . . . . . 256--290

ACM Transactions on Software Engineering and Methodology
Volume 11, Number 3, 2002

              Alexander P. Pons   Temporal abstract classes and virtual
                                  temporal specifications for real-time
                                  systems  . . . . . . . . . . . . . . . . 291--308
              Audris Mockus and   
            Roy T. Fielding and   
              James D. Herbsleb   Two case studies of open source software
                                  development: Apache and Mozilla  . . . . 309--346
              Donglin Liang and   
              Mary Jean Harrold   Equivalence analysis and its application
                                  in improving the efficiency of program
                                  slicing  . . . . . . . . . . . . . . . . 347--383

ACM Transactions on Software Engineering and Methodology
Volume 11, Number 4, 2002

                      Anonymous   Obituary: Ole-Johan Dahl, 1931--2002;
                                  Edsger Wybe Dijkstra, 1930--2002;
                                  Kristen Nygaard, 1926--2002  . . . . . . 385--385
             Marco Bernardo and   
           Paolo Ciancarini and   
             Lorenzo Donatiello   Architecting families of software
                                  systems with process algebras  . . . . . 386--426
                  R. M. Hierons   Comparing test sets and criteria in the
                                  presence of test hypotheses and fault
                                  domains  . . . . . . . . . . . . . . . . 427--448
                Alexander Egyed   Automated abstraction of class diagrams  449--491


ACM Transactions on Software Engineering and Methodology
Volume 12, Number 1, 2003

               Carlo Ghezzi and   
           Jeffrey N. Magee and   
             Dieter Rombach and   
                 Mary Lou Soffa   Editorial  . . . . . . . . . . . . . . . 1--2
               Amy P. Felty and   
              Kedar S. Namjoshi   Feature specification and automated
                                  conflict detection . . . . . . . . . . . 3--27
         Christian Nentwich and   
          Wolfgang Emmerich and   
        Anthony Finkelstein and   
                   Ernst Ellmer   Flexible consistency checking  . . . . . 28--63
       Antónia Lopes and   
         Michel Wermelinger and   
      José Luiz Fiadeiro   Higher-order architectural connectors    64--104
ACM Transactions on Software Engineering and   
              Methodology staff   Reviewers 2002 . . . . . . . . . . . . . 105--105

ACM Transactions on Software Engineering and Methodology
Volume 12, Number 2, April, 2003

      Alberto Coen-Porisini and   
            Matteo Pradella and   
               Matteo Rossi and   
                 Dino Mandrioli   A formal approach for designing
                                  CORBA-based applications . . . . . . . . 107--151
   Mark G. J. Van Den Brand and   
                 Paul Klint and   
                Jurgen J. Vinju   Term rewriting with traversal functions  152--190
        Martin P. Robillard and   
                 Gail C. Murphy   Static analysis to support the evolution
                                  of exception structure in
                                  object-oriented systems  . . . . . . . . 191--221
               Luca Durante and   
             Riccardo Sisto and   
              Adriano Valenzano   Automatic testing equivalence
                                  verification of spi calculus
                                  specifications . . . . . . . . . . . . . 222--284

ACM Transactions on Software Engineering and Methodology
Volume 12, Number 3, July, 2003

                Yossi Cohen and   
              Yishai A. Feldman   Automatic high-quality reengineering of
                                  database programs by abstraction,
                                  transformation and reimplementation  . . 285--316
          Franco Zambonelli and   
       Nicholas R. Jennings and   
             Michael Wooldridge   Developing multiagent systems: The Gaia
                                  methodology  . . . . . . . . . . . . . . 317--370

ACM Transactions on Software Engineering and Methodology
Volume 12, Number 4, October, 2003

             Marsha Chechik and   
             Benet Devereux and   
          Steve Easterbrook and   
                 Arie Gurfinkel   Multi-valued symbolic model-checking . . 371--408
                 Tim Miller and   
                  Paul Strooper   A framework and tool support for the
                                  systematic testing of model-based
                                  specifications . . . . . . . . . . . . . 409--439
         Gian-Luigi Ferrari and   
             Stefania Gnesi and   
              Ugo Montanari and   
                  Marco Pistore   A model-checking verification
                                  environment for mobile processes . . . . 440--473


ACM Transactions on Software Engineering and Methodology
Volume 13, Number 1, January, 2004

                    Pamela Zave   Address translation in telecommunication
                                  features . . . . . . . . . . . . . . . . 1--36
          Sebastian Uchitel and   
                Jeff Kramer and   
                     Jeff Magee   Incremental elaboration of
                                  scenario-based specifications and
                                  behavior models using implied scenarios  37--85
  Nalini Venkatasubramanian and   
            Carolyn Talcott and   
                    Gul A. Agha   A formal model for reasoning about
                                  adaptive QoS-enabled middleware  . . . . 86--147

ACM Transactions on Software Engineering and Methodology
Volume 13, Number 2, April, 2004

               Tankut Akgul and   
          Vincent J. Mooney III   Assembly instruction level reverse
                                  execution for debugging  . . . . . . . . 149--198
            Alessandro Orso and   
              Saurabh Sinha and   
              Mary Jean Harrold   Classifying data dependences in the
                                  presence of pointers for program
                                  comprehension, testing, and debugging    199--239
         Roshanak Roshandel and   
  André Van Der Hoek and   
         Marija Mikic-Rakic and   
               Nenad Medvidovic   Mae---a system model and environment for
                                  managing architectural evolution . . . . 240--276

ACM Transactions on Software Engineering and Methodology
Volume 13, Number 3, July, 2004

            Gregg Rothermel and   
           Sebastian Elbaum and   
      Alexey G. Malishevsky and   
          Praveen Kallakuri and   
                     Xuemei Qiu   On test suite composition and
                                  cost-effective regression testing  . . . 277--331
              Stefan Kramer and   
                 Hermann Kaindl   Coupling and cohesion metrics for
                                  knowledge-based systems using frames and
                                  rules  . . . . . . . . . . . . . . . . . 332--358

ACM Transactions on Software Engineering and Methodology
Volume 13, Number 4, October, 2004

           Matthew B. Dwyer and   
             Lori A. Clarke and   
       Jamieson M. Cobleigh and   
                 Gleb Naumovich   Flow analysis for verifying properties
                                  of concurrent software systems . . . . . 359--430
        Gennaro Costagliola and   
          Vincenzo Deufemia and   
                Giuseppe Polese   A framework for modeling and
                                  implementing visual notations with
                                  applications to software engineering . . 431--487


ACM Transactions on Software Engineering and Methodology
Volume 14, Number 1, January, 2005

               Ana Milanova and   
             Atanas Rountev and   
               Barbara G. Ryder   Parameterized object sensitivity for
                                  points-to analysis for Java  . . . . . . 1--41
             Luciano Baresi and   
                  Mauro Pezz\`e   Formal interpreters for diagram
                                  notations  . . . . . . . . . . . . . . . 42--84
            Ian Sommerville and   
                    Jane Ransom   An empirical study of industrial
                                  requirements engineering process
                                  assessment and improvement . . . . . . . 85--117

ACM Transactions on Software Engineering and Methodology
Volume 14, Number 2, April, 2005

                   Carlo Ghezzi   Editorial  . . . . . . . . . . . . . . . 119--123
               Jean Berstel and   
    Stefano Crespi Reghizzi and   
             Gilles Roussel and   
           Pierluigi San Pietro   A scalable formal method for design and
                                  automatic checking of user interfaces    124--167
               Martin Erwig and   
                         Zhe Fu   Software reuse for scientific computing
                                  through program generation . . . . . . . 168--198
            Eric M. Dashofy and   
  André van der Hoek and   
              Richard N. Taylor   A comprehensive approach for the
                                  development of modular software
                                  architecture description languages . . . 199--245
ACM Transactions on Software Engineering and   
              Methodology staff   Acknowledgement of referees 2004 . . . . 246--246

ACM Transactions on Software Engineering and Methodology
Volume 14, Number 3, July, 2005

                 Man F. Lau and   
                     Yuen T. Yu   An extended fault class hierarchy for
                                  specification-based testing  . . . . . . 247--276
           Vincenzo Gervasi and   
                   Didar Zowghi   Reasoning about inconsistencies in
                                  natural language requirements  . . . . . 277--330
                 Paul Klint and   
           Ralf Lämmel and   
                  Chris Verhoef   Toward an engineering discipline for
                                  grammarware  . . . . . . . . . . . . . . 331--380

ACM Transactions on Software Engineering and Methodology
Volume 14, Number 4, October, 2005

             Leon Osterweil and   
               Carlo Ghezzi and   
                Jeff Kramer and   
                 Alexander Wolf   Editorial  . . . . . . . . . . . . . . . 381--382
            Jacky Estublier and   
              David Leblang and   
  André van der Hoek and   
             Reidar Conradi and   
             Geoffrey Clemm and   
               Walter Tichy and   
             Darcy Wiborg-Weber   Impact of software engineering research
                                  on the practice of software
                                  configuration management . . . . . . . . 383--430
           Barbara G. Ryder and   
             Mary Lou Soffa and   
               Margaret Burnett   The impact of software engineering
                                  research on modern programming languages 431--477
           Marcelo F. Frias and   
Carlos G. López Pombo and   
            Gabriel A. Baum and   
        Nazareno M. Aguirre and   
           Thomas S. E. Maibaum   Reasoning about static and dynamic
                                  properties in alloy: a purely relational
                                  approach . . . . . . . . . . . . . . . . 478--526


ACM Transactions on Software Engineering and Methodology
Volume 15, Number 1, January, 2006

                     Rik Eshuis   Symbolic model checking of UML activity
                                  diagrams . . . . . . . . . . . . . . . . 1--38
                David Basin and   
          Jürgen Doser and   
            Torsten Lodderstedt   Model driven security: From UML models
                                  to access control infrastructures  . . . 39--91
                Colin Snook and   
                 Michael Butler   UML-B: Formal modeling and design aided
                                  by UML . . . . . . . . . . . . . . . . . 92--122

ACM Transactions on Software Engineering and Methodology
Volume 15, Number 2, April, 2006

             Steve Counsell and   
              Stephen Swift and   
                 Jason Crampton   The interpretation and utility of three
                                  cohesion metrics for object-oriented
                                  design . . . . . . . . . . . . . . . . . 123--149
             Marc Fisher II and   
            Gregg Rothermel and   
               Darren Brown and   
               Mingming Cao and   
                Curtis Cook and   
               Margaret Burnett   Integrating automated test generation
                                  into the WYSIWYT spreadsheet testing
                                  methodology  . . . . . . . . . . . . . . 150--194
                   Wei Zhao and   
                   Lu Zhang and   
                    Yin Liu and   
                  Jiasu Sun and   
                    Fuqing Yang   SNIAFL: Towards a static noninteractive
                                  approach to feature location . . . . . . 195--226

ACM Transactions on Software Engineering and Methodology
Volume 15, Number 3, July, 2006

                  R. M. Hierons   Avoiding coincidental correctness in
                                  boundary value analysis  . . . . . . . . 227--241
                 Avik Sinha and   
                   Carol Smidts   HOTTest: a model-based test design
                                  technique for enhanced testing of
                                  domain-specific applications . . . . . . 242--278
              Amy L. Murphy and   
          Gian Pietro Picco and   
            Gruia-Catalin Roman   LIME: a coordination model and
                                  middleware supporting mobility of hosts
                                  and agents . . . . . . . . . . . . . . . 279--328

ACM Transactions on Software Engineering and Methodology
Volume 15, Number 4, October, 2006

            Philippe Thiran and   
           Jean-Luc Hainaut and   
           Geert-Jan Houben and   
              Djamal Benslimane   Wrapper-based evolution of legacy
                                  information systems  . . . . . . . . . . 329--359
            Marco Brambilla and   
               Stefano Ceri and   
           Piero Fraternali and   
                Ioana Manolescu   Process modeling in Web applications . . 360--409
            Gregor Snelting and   
          Torsten Robschink and   
                    Jens Krinke   Efficient path conditions in dependence
                                  graphs for software safety analysis  . . 410--457


ACM Transactions on Software Engineering and Methodology
Volume 16, Number 1, February, 2007

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
                   Carlo Ghezzi   Editorial  . . . . . . . . . . . . . . . 2:1--2:??
        Martin P. Robillard and   
                 Gail C. Murphy   Representing concerns in source code . . 3:1--3:??
                   Qing Xie and   
                  Atif M. Memon   Designing and comparing automated test
                                  oracles for GUI-based software
                                  applications . . . . . . . . . . . . . . 4:1--4:??
               Manfred Broy and   
      Ingolf H. Krüger and   
              Michael Meisinger   A formal model of services . . . . . . . 5:1--5:??

ACM Transactions on Software Engineering and Methodology
Volume 16, Number 2, April, 2007

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 6:1--6:??
      Shriram Krishnamurthi and   
                   Kathi Fisler   Foundations of incremental aspect
                                  model-checking . . . . . . . . . . . . . 7:1--7:??
              David Binkley and   
               Nicolas Gold and   
                    Mark Harman   An empirical study of static program
                                  slice size . . . . . . . . . . . . . . . 8:1--8:??
   Abdoulaye Gamatié and   
            Thierry Gautier and   
            Paul Le Guernic and   
             Jean-Pierre Talpin   Polychronous design of embedded
                                  real-time applications . . . . . . . . . 9:1--9:??

ACM Transactions on Software Engineering and Methodology
Volume 16, Number 3, July, 2007

             Kalpesh Kapoor and   
              Jonathan P. Bowen   Test conditions for fault classes in
                                  Boolean specifications . . . . . . . . . 10:1--10:??
           Richard F. Paige and   
          Phillip J. Brooke and   
            Jonathan S. Ostroff   Metamodel-based model conformance and
                                  multiview consistency checking . . . . . 11:1--11:??
                 Samik Basu and   
                Scott A. Smolka   Model checking the Java metalocking
                                  algorithm  . . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Software Engineering and Methodology
Volume 16, Number 4, September, 2007

            Andrea De Lucia and   
              Fausto Fasano and   
              Rocco Oliveto and   
              Genoveffa Tortora   Recovering traceability links in
                                  software artifact management systems
                                  using information retrieval methods  . . 13:1--13:??
            Gary Wassermann and   
                 Carl Gould and   
                Zhendong Su and   
              Premkumar Devanbu   Static checking of dynamically generated
                                  queries in database applications . . . . 14:1--14:??
             Luciano Baresi and   
                 Sandro Morasca   Three empirical studies on estimating
                                  the design effort of Web applications    15:1--15:??


ACM Transactions on Software Engineering and Methodology
Volume 17, Number 1, December, 2007

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 1:1--1:2
          Timothy M. Meyers and   
                  David Binkley   An empirical study of slice-based
                                  cohesion and coupling metrics  . . . . . 2:1--2:27
               Marius Marin and   
           Arie Van Deursen and   
                    Leon Moonen   Identifying Crosscutting Concerns Using
                                  Fan-In Analysis  . . . . . . . . . . . . 3:1--3:37
           Marcelo F. Frias and   
      Carlos G. Lopez Pombo and   
           Juan P. Galeotti and   
            Nazareno M. Aguirre   Efficient Analysis of DynAlloy
                                  Specifications . . . . . . . . . . . . . 4:1--4:34

ACM Transactions on Software Engineering and Methodology
Volume 17, Number 2, April, 2008

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 5:1--5:??
               David Notkin and   
                  Mauro Pezz\`e   Introduction to the special section from
                                  the ACM international symposium on
                                  software testing and analysis (ISSTA
                                  2006)  . . . . . . . . . . . . . . . . . 6:1--6:??
       Jamieson M. Cobleigh and   
          George S. Avrunin and   
                 Lori A. Clarke   Breaking up is hard to do: an evaluation
                                  of automated assume-guarantee reasoning  7:1--7:??
         Christoph Csallner and   
         Yannis Smaragdakis and   
                        Tao Xie   DSD-Crasher: a hybrid analysis tool for
                                  bug finding  . . . . . . . . . . . . . . 8:1--8:??
            Stephen J. Fink and   
                 Eran Yahav and   
                  Nurit Dor and   
              G. Ramalingam and   
                  Emmanuel Geay   Effective typestate verification in the
                                  presence of aliasing . . . . . . . . . . 9:1--9:??
          Stephen F. Siegel and   
         Anastasia Mironova and   
          George S. Avrunin and   
                 Lori A. Clarke   Combining symbolic execution with model
                                  checking to verify parallel numerical
                                  programs . . . . . . . . . . . . . . . . 10:1--10:??
                   Amrit Tiwana   Impact of classes of development
                                  coordination tools on software
                                  development performance: a multinational
                                  empirical study  . . . . . . . . . . . . 11:1--11:??

ACM Transactions on Software Engineering and Methodology
Volume 17, Number 3, June, 2008

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 12:1--12:??
        Parastoo Mohagheghi and   
                 Reidar Conradi   An empirical investigation of software
                                  reuse benefits in a large telecom
                                  product  . . . . . . . . . . . . . . . . 13:1--13:??
            Johannes Henkel and   
      Christoph Reichenbach and   
                     Amer Diwan   Developing and debugging algebraic
                                  specifications for Java classes  . . . . 14:1--14:??
              Cigdem Gencel and   
                  Onur Demirors   Functional size measurement revisited    15:1--15:??
            Tsong Yueh Chen and   
                  Robert Merkel   An upper bound on software testing
                                  effectiveness  . . . . . . . . . . . . . 16:1--16:??

ACM Transactions on Software Engineering and Methodology
Volume 17, Number 4, August, 2008

              Pankaj Jalote and   
             Brendan Murphy and   
          Vibhu Saujanya Sharma   Post-release reliability growth in
                                  software products  . . . . . . . . . . . 17:1--17:??
            Martin P. Robillard   Topology analysis of software
                                  dependencies . . . . . . . . . . . . . . 18:1--18:??
          Wolfgang Emmerich and   
               Mikio Aoyama and   
                    Joe Sventek   The impact of research on the
                                  development of middleware technology . . 19:1--19:??
          Tanja M. Gruschke and   
         Magne Jòrgensen   The role of outcome feedback in
                                  improving the uncertainty assessment of
                                  software development effort estimates    20:1--20:??


ACM Transactions on Software Engineering and Methodology
Volume 18, Number 1, September, 2008

            Marcel R. Karam and   
          Trevor J. Smedley and   
              Sergiu M. Dascalu   Unit-level test adequacy criteria for
                                  visual dataflow languages and a testing
                                  methodology  . . . . . . . . . . . . . . 1:1--1:??
        Panagiotis Louridas and   
         Diomidis Spinellis and   
              Vasileios Vlachos   Power laws in software . . . . . . . . . 2:1--2:??
     Ond\vrej Lhoták and   
                 Laurie Hendren   Evaluating the benefits of
                                  context-sensitive points-to analysis
                                  using a BDD-based implementation . . . . 3:1--3:??

ACM Transactions on Software Engineering and Methodology
Volume 18, Number 2, November, 2008

                  Atif M. Memon   Automatically repairing event
                                  sequence-based GUI test suites for
                                  regression testing . . . . . . . . . . . 4:1--4:??
           Travis D. Breaux and   
      Annie I. Antón and   
                      Jon Doyle   Semantic parameterization: a process for
                                  modeling domain descriptions . . . . . . 5:1--5:??
            Shan Shan Huang and   
                 David Zook and   
             Yannis Smaragdakis   Domain-specific languages and program
                                  generation with meta-AspectJ . . . . . . 6:1--6:??
                   Qing Xie and   
                  Atif M. Memon   Using a pilot study to derive a GUI
                                  model for automated testing  . . . . . . 7:1--7:??

ACM Transactions on Software Engineering and Methodology
Volume 18, Number 3, May, 2009

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 8:1--8:??
                 Lujo Bauer and   
                Jay Ligatti and   
                   David Walker   Composing expressive runtime security
                                  policies . . . . . . . . . . . . . . . . 9:1--9:??
                 Tracy Hall and   
              Nathan Baddoo and   
              Sarah Beecham and   
              Hugh Robinson and   
                    Helen Sharp   A systematic review of theory use in
                                  studies investigating the motivations of
                                  software engineers . . . . . . . . . . . 10:1--10:??
                Phil McMinn and   
              David Binkley and   
                    Mark Harman   Empirical evaluation of a nesting
                                  testability transformation for
                                  evolutionary testing . . . . . . . . . . 11:1--11:??
                    Dick Hamlet   Tools and experiments supporting a
                                  testing-based theory of component
                                  composition  . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Software Engineering and Methodology
Volume 18, Number 4, July, 2009

                 Ankit Goel and   
         Abhik Roychoudhury and   
              P. S. Thiagarajan   Interacting process classes  . . . . . . 13:1--13:??
              Robert M. Hierons   Verdict functions in testing with a
                                  fault domain or test hypotheses  . . . . 14:1--14:??
                Marco Mamei and   
              Franco Zambonelli   Programming pervasive and mobile
                                  computing applications: The TOTA
                                  approach . . . . . . . . . . . . . . . . 15:1--15:??


ACM Transactions on Software Engineering and Methodology
Volume 19, Number 1, August, 2009

               Eli Tilevich and   
             Yannis Smaragdakis   J-Orchestra: Enhancing Java programs
                                  with distribution capabilities . . . . . 1:1--1:??
                Chun Ouyang and   
               Marlon Dumas and   
    Wil M. P. Van Der Aalst and   
  Arthur H. M. Ter Hofstede and   
                   Jan Mendling   From business process models to
                                  process-oriented software systems  . . . 2:1--2:??
              Hridesh Rajan and   
              Kevin J. Sullivan   Unifying aspect- and object-oriented
                                  design . . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Software Engineering and Methodology
Volume 19, Number 2, October, 2009

          Hee Beng Kuan Tan and   
                  Yuan Zhao and   
                   Hongyu Zhang   Conceptual data model-based software
                                  size estimation for information systems  4:1--4:??
                  Wes Masri and   
                 Andy Podgurski   Measuring the strength of information
                                  flows in programs  . . . . . . . . . . . 5:1--5:??
               Nirmit Desai and   
             Amit K. Chopra and   
              Munindar P. Singh   Amoeba: a methodology for modeling and
                                  evolving cross-organizational business
                                  processes  . . . . . . . . . . . . . . . 6:1--6:??

ACM Transactions on Software Engineering and Methodology
Volume 19, Number 3, January, 2010

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 7:1--7:??
                Jon Whittle and   
           Praveen K. Jayaraman   Synthesizing hierarchical state machines
                                  from expressive scenario descriptions    8:1--8:??
                   Chang Xu and   
               S. C. Cheung and   
                 W. K. Chan and   
                    Chunyang Ye   Partial constraint checking for context
                                  consistency in pervasive computing . . . 9:1--9:??
              Antonio Brogi and   
             Razvan Popescu and   
                   Matteo Tanca   Design and implementation of Sator: a
                                  Web service aggregator . . . . . . . . . 10:1--10:??

ACM Transactions on Software Engineering and Methodology
Volume 19, Number 4, April, 2010

               Julien Ponge and   
         Boualem Benatallah and   
               Fabio Casati and   
                 Farouk Toumani   Analysis and applications of timed
                                  service protocols  . . . . . . . . . . . 11:1--11:??
               Jamie Payton and   
           Christine Julien and   
        Gruia-Catalin Roman and   
               Vasanth Rajamani   Semantic self-assessment of query
                                  results in dynamic environments  . . . . 12:1--12:??
              Chunqing Chen and   
              Jin Song Dong and   
                    Jun Sun and   
                  Andrew Martin   A verification system for interval-based
                                  specification languages  . . . . . . . . 13:1--13:??


ACM Transactions on Software Engineering and Methodology
Volume 20, Number 1, June, 2010

         Friedrich Steimann and   
           Thomas Pawlitzki and   
                  Sven Apel and   
         Christian Kästner   Types and modularity for implicit
                                  invocation with implicit announcement    1:1--1:??
              Kieran Conboy and   
               Brian Fitzgerald   Method and developer characteristics for
                                  effective agile method tailoring: a
                                  study of XP expert opinion . . . . . . . 2:1--2:??
           Ekwa Duala-Ekoko and   
            Martin P. Robillard   Clone region descriptors: Representing
                                  and tracking duplication in source code  3:1--3:??

ACM Transactions on Software Engineering and Methodology
Volume 20, Number 2, August, 2010

               Andrew J. Ko and   
                  Brad A. Myers   Extracting and answering why and why not
                                  questions about Java program output  . . 4:1--4:??
             Kevin Sullivan and   
        William G. Griswold and   
              Hridesh Rajan and   
              Yuanyuan Song and   
               Yuanfang Cai and   
             Macneil Shonle and   
                  Nishit Tewari   Modular aspect-oriented design with XPIs 5:1--5:??
                Param Vir Singh   The small-world effect: The influence of
                                  macro-level properties of developer
                                  collaboration networks on open-source
                                  project success  . . . . . . . . . . . . 6:1--6:??
                Robert Dyer and   
                  Hridesh Rajan   Supporting dynamic aspect-oriented
                                  features . . . . . . . . . . . . . . . . 7:1--7:??

ACM Transactions on Software Engineering and Methodology
Volume 20, Number 3, August, 2011

                Simon Miles and   
                 Paul Groth and   
               Steve Munroe and   
                     Luc Moreau   PrIMe: a methodology for developing
                                  provenance-aware applications  . . . . . 8:1--8:??
                Jinjun Chen and   
                       Yun Yang   Temporal dependency-based checkpoint
                                  selection for dynamic verification of
                                  temporal constraints in scientific
                                  workflow systems . . . . . . . . . . . . 9:1--9:??
                 John Anvik and   
                 Gail C. Murphy   Reducing the effort of bug report
                                  triage: Recommenders for
                                  development-oriented decisions . . . . . 10:1--10:??
                  Lee Naish and   
                Hua Jie Lee and   
         Kotagiri Ramamohanarao   A model for spectra-based software
                                  diagnosis  . . . . . . . . . . . . . . . 11:1--11:??
           David W. Binkley and   
                Mark Harman and   
                 Kiran Lakhotia   FlagRemover: a testability
                                  transformation for transforming
                                  loop-assigned flags  . . . . . . . . . . 12:1--12:??
                Zhenyu Chen and   
            Tsong Yueh Chen and   
                      Baowen Xu   A revisit of fault class hierarchies in
                                  general Boolean specifications . . . . . 13:1--13:??

ACM Transactions on Software Engineering and Methodology
Volume 20, Number 4, September, 2011

              Andreas Bauer and   
             Martin Leucker and   
           Christian Schallhart   Runtime Verification for LTL and TLTL    14:1--14:??
               Changhai Nie and   
                  Hareton Leung   The Minimal Failure-Causing Schema of
                                  Combinatorial Testing  . . . . . . . . . 15:1--15:??
               R. A. Gandhi and   
                      S. W. Lee   Discovering Multidimensional
                                  Correlations among Regulatory
                                  Requirements to Understand Risk  . . . . 16:1--16:??
             Josh Dehlinger and   
                  Robyn R. Lutz   Gaia-PL: a Product Line Engineering
                                  Approach for Efficiently Designing
                                  Multiagent Systems . . . . . . . . . . . 17:1--17:??
                Shahar Maoz and   
                David Harel and   
                 Asaf Kleinbort   A Compiler for Multimodal Scenarios:
                                  Transforming LSCs into AspectJ . . . . . 18:1--18:??
Barthélémy Dagenais and   
            Martin P. Robillard   Recommending Adaptive Changes for
                                  Framework Evolution  . . . . . . . . . . 19:1--19:??


ACM Transactions on Software Engineering and Methodology
Volume 21, Number 1, December, 2011

              Ali Ebnenasir and   
            Sandeep S. Kulkarni   Feasibility of Stepwise Design of
                                  Multitolerant Programs . . . . . . . . . 1:1--1:??
             Matthew Arnold and   
              Martin Vechev and   
                     Eran Yahav   QVM: An Efficient Runtime for Detecting
                                  Defects in Deployed Systems  . . . . . . 2:1--2:??
               Eli Tilevich and   
                   Sriram Gopal   Expressive and Extensible Parameter
                                  Passing for Distributed Object Systems   3:1--3:??
          Susan Elliott Sim and   
               Medha Umarji and   
      Sukanya Ratanotayanon and   
              Cristina V. Lopes   How Well Do Search Engines Support Code
                                  Retrieval on the Web?  . . . . . . . . . 4:1--4:??
           Madeline M. Diep and   
           Matthew B. Dwyer and   
               Sebastian Elbaum   Lattice-Based Sampling for Path Property
                                  Monitoring . . . . . . . . . . . . . . . 5:1--5:??
               Martin Erwig and   
               Eric Walkingshaw   The Choice Calculus: a Representation
                                  for Software Variation . . . . . . . . . 6:1--6:??

ACM Transactions on Software Engineering and Methodology
Volume 21, Number 2, March, 2012

                   David Notkin   Editorial  . . . . . . . . . . . . . . . 7:1--7:??
            Jehad Al Dallal and   
               Lionel C. Briand   A Precise Method-Method
                                  Interaction-Based Cohesion Metric for
                                  Object-Oriented Classes  . . . . . . . . 8:1--8:??
            Dario Fischbein and   
         Nicolas D'Ippolito and   
                Greg Brunet and   
             Marsha Chechik and   
              Sebastian Uchitel   Weak Alphabet Merging of Partial
                                  Behavior Models  . . . . . . . . . . . . 9:1--9:??
            Anders Mattsson and   
           Brian Fitzgerald and   
         Björn Lundell and   
                    Brian Lings   An Approach for Modeling Architectural
                                  Design Rules in UML and its Application
                                  to Embedded Software . . . . . . . . . . 10:1--10:??
          Devdatta Kulkarni and   
               Tanvir Ahmed and   
                 Anand Tripathi   A Generative Programming Framework for
                                  Context-Aware CSCW Applications  . . . . 11:1--11:??
         Abhik Roychoudhury and   
                 Ankit Goel and   
                Bikram Sengupta   Symbolic Message Sequence Charts . . . . 12:1--12:??
               Anna Queralt and   
                Ernest Teniente   Verification and Validation of UML
                                  Conceptual Schemas with OCL Constraints  13:1--13:??

ACM Transactions on Software Engineering and Methodology
Volume 21, Number 3, June, 2012

     Christian Kästner and   
                  Sven Apel and   
           Thomas Thüm and   
                   Gunter Saake   Type checking annotation-based product
                                  lines  . . . . . . . . . . . . . . . . . 14:1--14:??
             Macneil Shonle and   
        William G. Griswold and   
                   Sorin Lerner   A framework for the checking and
                                  refactoring of crosscutting concepts . . 15:1--15:??
        Alessandro Fantechi and   
             Stefania Gnesi and   
        Alessandro Lapadula and   
            Franco Mazzanti and   
           Rosario Pugliese and   
               Francesco Tiezzi   A logical verification methodology for
                                  service-oriented computing . . . . . . . 16:1--16:??
            Jaymie Strecker and   
                  Atif M. Memon   Accounting for defect characteristics in
                                  evaluations of testing techniques  . . . 17:1--17:??
              Paul Jennings and   
              Arka P. Ghosh and   
                     Samik Basu   A two-phase approximation for model
                                  checking probabilistic unbounded until
                                  properties of probabilistic systems  . . 18:1--18:??
                   Dawei Qi and   
         Abhik Roychoudhury and   
              Zhenkai Liang and   
                  Kapil Vaswani   DARWIN: an approach to debugging
                                  evolving programs  . . . . . . . . . . . 19:1--19:??

ACM Transactions on Software Engineering and Methodology
Volume 21, Number 4, November, 2012

                Reid Holmes and   
               Robert J. Walker   Systematizing pragmatic software reuse   20:1--20:??
               Yuanfang Cai and   
                 Kevin Sullivan   A formal model for automated software
                                  modularity and evolvability analysis . . 21:1--21:??
         Alessandro Cimatti and   
               Marco Roveri and   
                Angelo Susi and   
                Stefano Tonetta   Validation of requirements for hybrid
                                  systems: a formal approach . . . . . . . 22:1--22:??
           Denys Poshyvanyk and   
             Malcom Gethers and   
                 Andrian Marcus   Concept location using formal concept
                                  analysis and information retrieval . . . 23:1--23:??
             Andrew Meneely and   
                  Ben Smith and   
                Laurie Williams   Validating software metrics: a spectrum
                                  of philosophies  . . . . . . . . . . . . 24:1--24:??
                Adam Kiezun and   
               Vijay Ganesh and   
                 Shay Artzi and   
              Philip J. Guo and   
          Pieter Hooimeijer and   
               Michael D. Ernst   HAMPI: a solver for word equations over
                                  strings, regular expressions, and
                                  context-free grammars  . . . . . . . . . 25:1--25:??


ACM Transactions on Software Engineering and Methodology
Volume 22, Number 1, February, 2013

                   David Notkin   Editorial --- looking back . . . . . . . 1:1--1:??
             David S. Rosenblum   Editorial --- looking forward  . . . . . 2:1--2:??
                    Jun Sun and   
                   Yang Liu and   
              Jin Song Dong and   
                    Yan Liu and   
                   Ling Shi and   
    Étienne André   Modeling and verifying hierarchical
                                  real-time systems using stateful timed
                                  CSP  . . . . . . . . . . . . . . . . . . 3:1--3:??
               Brian Demsky and   
                    Patrick Lam   Views: Synthesizing fine-grained
                                  concurrency control  . . . . . . . . . . 4:1--4:??
                    Tao Yue and   
           Lionel C. Briand and   
                   Yvan Labiche   Facilitating the transition from use
                                  case models to analysis models: Approach
                                  and experiments  . . . . . . . . . . . . 5:1--5:??
               Hadi Hemmati and   
              Andrea Arcuri and   
                  Lionel Briand   Achieving scalable model-based testing
                                  through test case diversity  . . . . . . 6:1--6:??
           Martin Monperrus and   
                    Mira Mezini   Detecting missing method calls as
                                  violations of the majority rule  . . . . 7:1--7:??
                 Jeff Huang and   
                Jinguo Zhou and   
                  Charles Zhang   Scaling predictive analysis of
                                  concurrent programs by removing trace
                                  redundancy . . . . . . . . . . . . . . . 8:1--8:??
  Nicolás D'ippolito and   
           Victor Braberman and   
               Nir Piterman and   
       Sebastián Uchitel   Synthesizing nonanomalous event-based
                                  controllers for liveness goals . . . . . 9:1--9:??

ACM Transactions on Software Engineering and Methodology
Volume 22, Number 2, March, 2013

                  Wei Zhang and   
                  Chong Sun and   
                Junghee Lim and   
                    Shan Lu and   
                    Thomas Reps   ConMem: Detecting Crash-Triggering
                                  Concurrency Bugs through an
                                  Effect-Oriented Approach . . . . . . . . 10:1--10:??
           Marcello La Rosa and   
               Marlon Dumas and   
                  Reina Uba and   
                  Remco Dijkman   Business Process Model Merging: An
                                  Approach to Business Process
                                  Consolidation  . . . . . . . . . . . . . 11:1--11:??
                Zibin Zheng and   
                 Michael R. Lyu   Personalized Reliability Prediction of
                                  Web Services . . . . . . . . . . . . . . 12:1--12:??
            Neil Walkinshaw and   
                Kirill Bogdanov   Automated Comparison of State-Based
                                  Software Models in Terms of Their
                                  Language and Structure . . . . . . . . . 13:1--13:??
           Scott D. Fleming and   
             Chris Scaffidi and   
           David Piorkowski and   
           Margaret Burnett and   
             Rachel Bellamy and   
            Joseph Lawrance and   
                     Irwin Kwan   An Information Foraging Theory
                                  Perspective on Tools for Debugging,
                                  Refactoring, and Reuse Tasks . . . . . . 14:1--14:??
                Sagar Chaki and   
       Christian Schallhart and   
                   Helmut Veith   Verification across Intellectual
                                  Property Boundaries  . . . . . . . . . . 15:1--15:??

ACM Transactions on Software Engineering and Methodology
Volume 22, Number 3, July, 2013

             David S. Rosenblum   In memoriam: David Notkin (1955--2013)   16:1--16:??
                 Guoqing Xu and   
                 Atanas Rountev   Precise memory leak detection for Java
                                  software using container profiling . . . 17:1--17:??
                     Wei Le and   
                 Mary Lou Soffa   Marple: Detecting faults in path
                                  segments using automatically generated
                                  analyses . . . . . . . . . . . . . . . . 18:1--18:??
                   Shin Yoo and   
                Mark Harman and   
                    David Clark   Fault localization prioritization:
                                  Comparing information-theoretic and
                                  coverage-based approaches  . . . . . . . 19:1--19:??
            Matteo Pradella and   
            Angelo Morzenti and   
           Pierluigi San Pietro   Bounded satisfiability checking of
                                  metric temporal logic specifications . . 20:1--20:??
             Davide Falessi and   
           Lionel C. Briand and   
           Giovanni Cantone and   
             Rafael Capilla and   
              Philippe Kruchten   The value of design rationale
                                  information  . . . . . . . . . . . . . . 21:1--21:??
              Kevin Hoffman and   
                Patrick Eugster   Trading obliviousness for modularity
                                  with cooperative aspect-oriented
                                  programming  . . . . . . . . . . . . . . 22:1--22:??
                   Hong Zhu and   
                     Ian Bayley   An algebra of design patterns  . . . . . 23:1--23:??
               Mira Balaban and   
                   Azzam Maraee   Finite satisfiability of UML class
                                  diagrams with constrained class
                                  hierarchy  . . . . . . . . . . . . . . . 24:1--24:??
              Guido De Caso and   
           Victor Braberman and   
         Diego Garbervetsky and   
              Sebastian Uchitel   Enabledness-based program abstractions
                                  for behavior validation  . . . . . . . . 25:1--25:??
       Beatriz Marín and   
         Giovanni Giachetti and   
               Oscar Pastor and   
            Tanja E. J. Vos and   
                    Alain Abran   Using a functional size measurement
                                  procedure to evaluate the quality of
                                  models in MDD environments . . . . . . . 26:1--26:??
              Daniel Sinnig and   
             Patrice Chalin and   
                 Ferhat Khendek   Use case and task models: an integrated
                                  development methodology and its formal
                                  foundation . . . . . . . . . . . . . . . 27:1--27:??

ACM Transactions on Software Engineering and Methodology
Volume 22, Number 4, October, 2013

            Giovanni Denaro and   
              Mauro Pezz\`e and   
                    Davide Tosi   Test-and-adapt: an approach for
                                  improving service interchangeability . . 28:1--28:??
         Lorenzo Martignoni and   
            Roberto Paleari and   
           Alessandro Reina and   
     Giampaolo Fresi Roglia and   
                 Danilo Bruschi   A methodology for testing CPU emulators  29:1--29:??
         Hervé Chang and   
           Leonardo Mariani and   
                  Mauro Pezz\`e   Exception handlers for healing
                                  component-based systems  . . . . . . . . 30:1--30:??
               Xiaoyuan Xie and   
            Tsong Yueh Chen and   
              Fei-Ching Kuo and   
                      Baowen Xu   A theoretical analysis of the risk
                                  evaluation formulas for spectrum-based
                                  fault localization . . . . . . . . . . . 31:1--31:??
                   Dawei Qi and   
         Hoang D. T. Nguyen and   
             Abhik Roychoudhury   Path exploration based on symbolic
                                  output . . . . . . . . . . . . . . . . . 32:1--32:??
           Takaaki Tateishi and   
              Marco Pistoia and   
                     Omer Tripp   Path- and index-sensitive string
                                  analysis based on monadic second-order
                                  logic  . . . . . . . . . . . . . . . . . 33:1--33:??
Jérôme Vouillon and   
               Roberto Di Cosmo   On software component co-installability  34:1--34:??
           Leandro L. Minku and   
                        Xin Yao   Software effort estimation as a
                                  multiobjective learning problem  . . . . 35:1--35:??
              David Lizcano and   
            Fernando Alonso and   
             Javier Soriano and   
                 Genoveva Lopez   A web-centred approach to end-user
                                  software engineering . . . . . . . . . . 36:1--36:??
            Collin Mcmillan and   
           Denys Poshyvanyk and   
             Mark Grechanik and   
                   Qing Xie and   
                        Chen Fu   Portfolio: Searching for relevant
                                  functions and their usages in millions
                                  of lines of code . . . . . . . . . . . . 37:1--37:??
        Michael Würsch and   
              Emanuel Giger and   
                 Harald C. Gall   Evaluating a query framework for
                                  software evolution data  . . . . . . . . 38:1--38:??


ACM Transactions on Software Engineering and Methodology
Volume 23, Number 1, February, 2014

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
        Robrecht Haesevoets and   
                Danny Weyns and   
                    Tom Holvoet   Architecture-centric support for
                                  adaptive service collaborations  . . . . 2:1--2:??
        Andrew F. Tappenden and   
                   James Miller   Automated cookie collection testing  . . 3:1--3:??
            Gabriele Bavota and   
             Malcom Gethers and   
              Rocco Oliveto and   
           Denys Poshyvanyk and   
                Andrea de Lucia   Improving software modularization via
                                  automated analysis of latent topics and
                                  dependencies . . . . . . . . . . . . . . 4:1--4:??
                   Xiao Liu and   
                   Yun Yang and   
                  Dong Yuan and   
                    Jinjun Chen   Do we need to handle every temporal
                                  violation in scientific workflow
                                  systems? . . . . . . . . . . . . . . . . 5:1--5:??
              Federico Mari and   
               Igor Melatti and   
                Ivano Salvo and   
                  Enrico Tronci   Model-based synthesis of control
                                  software from system-level formal
                                  specifications . . . . . . . . . . . . . 6:1--6:??
                Eric Bodden and   
         Éric Tanter and   
               Milton Inostroza   Join point interfaces for safe and
                                  flexible decoupling of aspects . . . . . 7:1--7:??
                  Wes Masri and   
                Rawad Abou Assi   Prevalence of coincidental correctness
                                  and mitigation of its impact on fault
                                  localization . . . . . . . . . . . . . . 8:1--8:??
              Lionel Briand and   
             Davide Falessi and   
               Shiva Nejati and   
         Mehrdad Sabetzadeh and   
                        Tao Yue   Traceability and SysML design slices to
                                  support safety inspections: a controlled
                                  experiment . . . . . . . . . . . . . . . 9:1--9:??
                Yuming Zhou and   
                  Baowen Xu and   
              Hareton Leung and   
                       Lin Chen   An in-depth study of the potentially
                                  confounding effect of class size in
                                  fault prediction . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Software Engineering and Methodology
Volume 23, Number 2, March, 2014

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 11:1--11:??
                    Kai Pan and   
                  Xintao Wu and   
                        Tao Xie   Guided test generation for database
                                  applications via synthesized database
                                  interactions . . . . . . . . . . . . . . 12:1--12:??
        Giuseppe Scanniello and   
            Carmine Gravino and   
             Marcela Genero and   
        Jose' A. Cruz-Lemus and   
              Genoveffa Tortora   On the impact of UML analysis models on
                                  source-code comprehensibility and
                                  modifiability  . . . . . . . . . . . . . 13:1--13:??
               Thomas Fritz and   
             Gail C. Murphy and   
        Emerson Murphy-Hill and   
                 Jingwen Ou and   
                     Emily Hill   Degree-of-knowledge: Modeling a
                                  developer's knowledge of code  . . . . . 14:1--14:??
                  Lunjin Lu and   
                   Dae-Kyoo Kim   Required behavior of sequence diagrams:
                                  Semantics and conformance  . . . . . . . 15:1--15:??
        M. Unterkalmsteiner and   
                   R. Feldt and   
                    T. Gorschek   A taxonomy for requirements engineering
                                  and software test alignment  . . . . . . 16:1--16:??
       Dharmalingam Ganesan and   
                Mikael Lindvall   ADAM: External dependency-driven
                                  architecture discovery and analysis of
                                  quality attributes . . . . . . . . . . . 17:1--17:??
             Klaas-Jan Stol and   
             Paris Avgeriou and   
         Muhammad Ali Babar and   
                  Yan Lucas and   
               Brian Fitzgerald   Key factors for adopting inner source    18:1--18:??
                Mark Harman and   
                Jens Krinke and   
     Inmaculada Medina-Bulo and   
    Francisco Palomo-Lozano and   
                   Jian Ren and   
                       Shin Yoo   Exact scalable sensitivity analysis for
                                  the next release problem . . . . . . . . 19:1--19:??
         Mariano M. Moscato and   
      Carlos G. Lopez Pombo and   
               Marcelo F. Frias   Dynamite: a tool for the verification of
                                  alloy models based on PVS  . . . . . . . 20:1--20:??

ACM Transactions on Software Engineering and Methodology
Volume 23, Number 3, May, 2014

               Mainul Islam and   
             Christoph Csallner   Generating Test Cases for Programs that
                                  Are Coded against Interfaces and
                                  Annotations  . . . . . . . . . . . . . . 21:1--21:??
               Lucas Layman and   
           Victor R. Basili and   
            Marvin V. Zelkowitz   A Methodology for Exposing Risk in
                                  Achieving Emergent System Properties . . 22:1--22:??
                 Guoqing Xu and   
              Nick Mitchell and   
             Matthew Arnold and   
             Atanas Rountev and   
            Edith Schonberg and   
                  Gary Sevitsky   Scalable Runtime Bloat Detection Using
                                  Abstract Dynamic Slicing . . . . . . . . 23:1--23:??
     Nicoletta de Francesco and   
          Giuseppe Lettieri and   
          Antonella Santone and   
               Gigliola Vaglini   GreASE: a Tool for Efficient
                                  ``Nonequivalence'' Checking  . . . . . . 24:1--24:??
             Razieh Behjati and   
               Shiva Nejati and   
               Lionel C. Briand   Architecture-Level Configuration of
                                  Large-Scale Embedded Software Systems    25:1--25:??
          Kathryn T. Stolee and   
           Sebastian Elbaum and   
                   Daniel Dobos   Solving the Search for Source Code . . . 26:1--26:??

ACM Transactions on Software Engineering and Methodology
Volume 23, Number 4, August, 2014

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 27:1--27:??
             Gail C. Murphy and   
             Mauro Pezzé   Introduction to the Special Issue
                                  International Conference on Software
                                  Engineering (ICSE 2012)  . . . . . . . . 28:1--28:??
       Anders Mòller and   
                Mathias Schwarz   Automated Detection of Client-State
                                  Manipulation Vulnerabilities . . . . . . 29:1--29:??
             Thanhvu Nguyen and   
               Deepak Kapur and   
             Westley Weimer and   
              Stephanie Forrest   DIG: a Dynamic Invariant Generator for
                                  Polynomial and Array Invariants  . . . . 30:1--30:??
               Walid Maalej and   
             Rebecca Tiarks and   
               Tobias Roehm and   
                 Rainer Koschke   On the Comprehension of Program
                                  Comprehension  . . . . . . . . . . . . . 31:1--31:??
               Pingyu Zhang and   
               Sebastian Elbaum   Amplifying Tests to Validate Exception
                                  Handling Code: an Extended Study in the
                                  Mobile Application Domain  . . . . . . . 32:1--32:??
                 Tracy Hall and   
                  Min Zhang and   
                David Bowes and   
                         Yi Sun   Some Code Smells Have a Significant but
                                  Small Effect on Faults . . . . . . . . . 33:1--33:??
                   Yueqi Li and   
               S. C. Cheung and   
              Xiangyu Zhang and   
                     Yepang Liu   Scaling Up Symbolic Analysis by Removing
                                  $z$-Equivalent States  . . . . . . . . . 34:1--34:??
             Peter C. Rigby and   
           Daniel M. German and   
                Laura Cowen and   
           Margaret-Anne Storey   Peer Review on Open-Source Software
                                  Projects: Parameters, Statistical
                                  Models, and Theory . . . . . . . . . . . 35:1--35:??


ACM Transactions on Software Engineering and Methodology
Volume 24, Number 1, September, 2014

              Filippo Ricca and   
        Giuseppe Scanniello and   
            Marco Torchiano and   
              Gianna Reggio and   
               Egidio Astesiano   Assessing the Effect of Screen Mockups
                                  on the Comprehension of Functional
                                  Requirements . . . . . . . . . . . . . . 1:1--1:??
             Richard Banach and   
                Huibiao Zhu and   
                     Wen Su and   
                    Xiaofeng Wu   A Continuous ASM Modelling Approach to
                                  Pacemaker Sensing  . . . . . . . . . . . 2:1--2:??
                Guowei Yang and   
             Suzette Person and   
                Neha Rungta and   
               Sarfraz Khurshid   Directed Incremental Symbolic Execution  3:1--3:??
           Anirudh Santhiar and   
              Omesh Pandita and   
                  Aditya Kanade   Mining Unit Tests for Discovery and
                                  Migration of Math APIs . . . . . . . . . 4:1--4:??
              Robert M. Hierons   Combining Centralised and Distributed
                                  Testing  . . . . . . . . . . . . . . . . 5:1--5:??
                Dilan Sahin and   
        Marouane Kessentini and   
               Slim Bechikh and   
                  Kalyanmoy Deb   Code-Smell Detection as a Bilevel
                                  Problem  . . . . . . . . . . . . . . . . 6:1--6:??

ACM Transactions on Software Engineering and Methodology
Volume 24, Number 2, December, 2014

                  Kaituo Li and   
      Christoph Reichenbach and   
         Christoph Csallner and   
             Yannis Smaragdakis   Residual Investigation: Predictive and
                                  Precise Bug Detection  . . . . . . . . . 7:1--7:??
              Gordon Fraser and   
                  Andrea Arcuri   A Large-Scale Evaluation of Automated
                                  Unit Test Generation Using EvoSuite  . . 8:1--8:??
             Warda El Kholy and   
             Jamal Bentahar and   
        Mohamed El Menshawy and   
                Hongyang Qu and   
                Rachida Dssouli   Conditional Commitments: Reasoning and
                                  Model Checking . . . . . . . . . . . . . 9:1--9:??
                    Dan Hao and   
             Lingming Zhang and   
                   Lu Zhang and   
            Gregg Rothermel and   
                       Hong Mei   A Unified Test Case Prioritization
                                  Approach . . . . . . . . . . . . . . . . 10:1--10:??
               Hassan Eldib and   
                  Chao Wang and   
              Patrick Schaumont   Formal Verification of Software
                                  Countermeasures against Side-Channel
                                  Attacks  . . . . . . . . . . . . . . . . 11:1--11:??
               Juan De Lara and   
              Esther Guerra and   
Jesús Sánchez Cuadrado   When and How to Use Multilevel Modelling 12:1--12:??

ACM Transactions on Software Engineering and Methodology
Volume 24, Number 3, May, 2015

                    Tao Yue and   
           Lionel C. Briand and   
                   Yvan Labiche   aToucan: an Automated Framework to
                                  Derive UML Analysis Models from Use Case
                                  Models . . . . . . . . . . . . . . . . . 13:1--13:??
        Giuseppe Scanniello and   
            Carmine Gravino and   
               Michele Risi and   
          Genoveffa Tortora and   
               Gabriella Dodero   Documenting Design-Pattern Instances: a
                                  Family of Experiments on Source-Code
                                  Comprehensibility  . . . . . . . . . . . 14:1--14:??
              Elena Sherman and   
            Brady J. Garvin and   
               Matthew B. Dwyer   Deciding Type-Based Partial-Order
                                  Constraints for Path-Sensitive Analysis  15:1--15:??
          Antonio Carzaniga and   
           Alessandra Gorla and   
            Nicol\`o Perino and   
                  Mauro Pezz\`e   Automatic Workarounds: Exploiting the
                                  Intrinsic Redundancy of Web Applications 16:1--16:??
               Wiem Mkaouer and   
        Marouane Kessentini and   
               Adnan Shaout and   
           Patrice Koligheu and   
               Slim Bechikh and   
              Kalyanmoy Deb and   
                       Ali Ouni   Many-Objective Software Remodularization
                                  Using NSGA-III . . . . . . . . . . . . . 17:1--17:??
                 Jooyong Yi and   
                   Dawei Qi and   
              Shin Hwei Tan and   
             Abhik Roychoudhury   Software Change Contracts  . . . . . . . 18:1--18:??
    Pradeep K. Murukannaiah and   
              Munindar P. Singh   Platys: an Active Learning Framework for
                                  Place-Aware Application Development and
                                  Its Evaluation . . . . . . . . . . . . . 19:1--19:??
           Peter A. Whigham and   
            Caitlin A. Owen and   
           Stephen G. Macdonell   A Baseline Model for Software Effort
                                  Estimation . . . . . . . . . . . . . . . 20:1--20:??

ACM Transactions on Software Engineering and Methodology
Volume 24, Number 4, August, 2015

                Mark Harman and   
             Mauro Pezzé   Introduction to the Special Issue on
                                  ISSTA 2013 . . . . . . . . . . . . . . . 21:1--21:??
             Milos Gligoric and   
                 Alex Groce and   
            Chaoqiang Zhang and   
               Rohan Sharma and   
      Mohammad Amin Alipour and   
                  Darko Marinov   Guidelines for Coverage-Based
                                  Comparisons of Non-Adequate Test Suites  22:1--22:??
              Gordon Fraser and   
                Matt Staats and   
                Phil McMinn and   
              Andrea Arcuri and   
                  Frank Padberg   Does Automated Unit Test Generation
                                  Really Help Software Testers? A
                                  Controlled Empirical Study . . . . . . . 23:1--23:??
               Cosmin Radoi and   
                      Danny Dig   Effective Techniques for Static Race
                                  Detection in Java Parallel Loops . . . . 24:1--24:??
             Jaideep Nijjar and   
               Ivan Boci\'c and   
                  Tevfik Bultan   Data Model Property Inference,
                                  Verification, and Repair for Web
                                  Applications . . . . . . . . . . . . . . 25:1--25:??
                    Wei Jin and   
                Alessandro Orso   Automated Support for Reproducing and
                                  Debugging Field Failures . . . . . . . . 26:1--26:??


ACM Transactions on Software Engineering and Methodology
Volume 25, Number 1, December, 2015

           Matthew B. Dwyer and   
             David S. Rosenblum   Editorial: Journal-First Publication for
                                  the Software Engineering Community . . . 1:1--1:??
                 Will Dietz and   
                    Peng Li and   
                John Regehr and   
                    Vikram Adve   Understanding Integer Overflow in C/C++  2:1--2:29
          Sebastian Proksch and   
             Johannes Lerch and   
                    Mira Mezini   Intelligent Code Completion with
                                  Bayesian Networks  . . . . . . . . . . . 3:1--3:??
          Stefano Di Alesio and   
           Lionel C. Briand and   
               Shiva Nejati and   
                 Arnaud Gotlieb   Combining Genetic Algorithms and
                                  Constraint Programming to Support Stress
                                  Testing of Task Deadlines  . . . . . . . 4:1--4:??
            Mariano Ceccato and   
       Alessandro Marchetto and   
           Leonardo Mariani and   
               Cu D. Nguyen and   
                  Paolo Tonella   Do Automatically Generated Test Cases
                                  Make Debugging Easier? An Experimental
                                  Assessment of Debugging Effectiveness
                                  and Efficiency . . . . . . . . . . . . . 5:1--5:??
       Seyedeh Sepideh Emam and   
                   James Miller   Test Case Prioritization Using Extended
                                  Digraphs . . . . . . . . . . . . . . . . 6:1--6:??
                Robert Dyer and   
            Hoan Anh Nguyen and   
              Hridesh Rajan and   
                 Tien N. Nguyen   Boa: Ultra-Large-Scale Software
                                  Repository and Source-Code Mining  . . . 7:1--7:??
                Phil Mcminn and   
            Chris J. Wright and   
          Gregory M. Kapfhammer   The Effectiveness of Test Coverage
                                  Criteria for Relational Database Schema
                                  Integrity Constraints  . . . . . . . . . 8:1--8:??
                  Karim Ali and   
          Marianna Rapoport and   
       Ondrej Lhoták and   
               Julian Dolby and   
                      Frank Tip   Type-Based Call Graph Construction
                                  Algorithms for Scala . . . . . . . . . . 9:1--9:??
               Anas Mahmoud and   
                  Gary Bradshaw   Estimating Semantic Relatedness in
                                  Source Code  . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Software Engineering and Methodology
Volume 25, Number 2, May, 2016

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 11:1--11:??
             Saba Alimadadi and   
           Sheldon Sequeira and   
                 Ali Mesbah and   
           Karthik Pattabiraman   Understanding JavaScript Event-Based
                                  Interactions with Clematis . . . . . . . 12:1--12:??
               Minghui Zhou and   
              Audris Mockus and   
                 Xiujuan Ma and   
                   Lu Zhang and   
                       Hong Mei   Inflow and Retention in OSS Communities
                                  with Commercial Involvement: a Case
                                  Study of Three Hybrid Projects . . . . . 13:1--13:??
               Nuno Machado and   
              Daniel Quinta and   
              Brandon Lucia and   
          Luís Rodrigues   Concurrency Debugging with Differential
                                  Schedule Projections . . . . . . . . . . 14:1--14:??
                 Petr Bauch and   
              Vojtech Havel and   
             Jirí Barnat   Control Explicit-Data Symbolic Model
                                  Checking . . . . . . . . . . . . . . . . 15:1--15:??
             Esteban Pavese and   
    Víctor Braberman and   
              Sebastian Uchitel   Less is More: Estimating Probabilistic
                                  Rewards over Partial System Explorations 16:1--16:??
          Robert M. Hierons and   
                  Miqing Li and   
                Xiaohui Liu and   
              Sergio Segura and   
                      Wei Zheng   SIP: Optimal Product Selection from
                                  Feature Models Using Many-Objective
                                  Evolutionary Optimization  . . . . . . . 17:1--17:??
                Haipeng Cai and   
            Raul Santelices and   
                  Douglas Thain   DiaPro: Unifying Dynamic Impact Analyses
                                  for Improved and Variable
                                  Cost-Effectiveness . . . . . . . . . . . 18:1--18:??
                Kapil Anand and   
            Khaled Elwazeer and   
               Aparna Kotha and   
           Matthew Smithson and   
               Rajeev Barua and   
              Angelos Keromytis   A Stack Memory Abstraction and Symbolic
                                  Analysis Framework for Executables . . . 19:1--19:??

ACM Transactions on Software Engineering and Methodology
Volume 25, Number 3, August, 2016

                 Islem Baki and   
                Houari Sahraoui   Multi-Step Learning and Adaptive Search
                                  for Learning Complex Model
                                  Transformations from Examples  . . . . . 20:1--20:??
                     Fei He and   
                Xiaowei Gao and   
               Miaofei Wang and   
               Bow-Yaw Wang and   
                    Lijun Zhang   Learning Weighted Assumptions for
                                  Compositional Verification of Markov
                                  Decision Processes . . . . . . . . . . . 21:1--21:??
            Jaspreet Bhatia and   
           Travis D. Breaux and   
                 Florian Schaub   Mining Privacy Goals from Privacy
                                  Policies Using Hybridized Task
                                  Recomposition  . . . . . . . . . . . . . 22:1--22:??
                   Ali Ouni and   
        Marouane Kessentini and   
            Houari Sahraoui and   
              Katsuro Inoue and   
                  Kalyanmoy Deb   Multi-Criteria Code Refactoring Using
                                  Search-Based Software Engineering: an
                                  Industrial Case Study  . . . . . . . . . 23:1--23:??
               Ivan Candela and   
            Gabriele Bavota and   
              Barbara Russo and   
                  Rocco Oliveto   Using Cohesion and Coupling for Software
                                  Remodularization: Is It Enough?  . . . . 24:1--24:??
                Gregory Gay and   
               Ajitha Rajan and   
                Matt Staats and   
             Michael Whalen and   
            Mats P. E. Heimdahl   The Effect of Program and Model
                                  Structure on the Effectiveness of MC/DC
                                  Test Adequacy Coverage . . . . . . . . . 25:1--25:??
        Ricardo M. Czekster and   
            Paulo Fernandes and   
             Lucelene Lopes and   
               Afonso Sales and   
             Alan R. Santos and   
                   Thais Webber   Stochastic Performance Analysis of
                                  Global Software Development Teams  . . . 26:1--26:??
               Chunbai Yang and   
                 Shangru Wu and   
                     W. K. Chan   Hierarchical Program Paths . . . . . . . 27:1--27:??

ACM Transactions on Software Engineering and Methodology
Volume 25, Number 4, May, 2017

           Artem Polyvyanyy and   
    Wil M. P. Van Der Aalst and   
  Arthur H. M. Ter Hofstede and   
                    Moe T. Wynn   Impact-Driven Process Model Repair . . . 28:1--28:??
                 Shams Azad and   
             Peter C. Rigby and   
                Latifa Guerrouj   Generating API Call Rules from Version
                                  History and Stack Overflow Posts . . . . 29:1--29:??
       Vijay Krishna Palepu and   
                 Guoqing Xu and   
                 James A. Jones   Dynamic Dependence Summaries . . . . . . 30:1--30:??
               Juan De Lara and   
                  Esther Guerra   A Posteriori Typing for Model-Driven
                                  Engineering: Concepts, Analysis, and
                                  Applications . . . . . . . . . . . . . . 31:1--31:??


ACM Transactions on Software Engineering and Methodology
Volume 26, Number 1, July, 2017

            Daniel Di Nardo and   
           Fabrizio Pastore and   
                  Lionel Briand   Augmenting Field Data for Testing
                                  Systems Subject to Incremental
                                  Requirements Changes . . . . . . . . . . 1:1--1:??
            Alireza Sadeghi and   
             Naeem Esfahani and   
                      Sam Malek   Ensuring the Consistency of Adaptation
                                  through Inter- and Intra-Component
                                  Dependency Analysis  . . . . . . . . . . 2:1--2:??
                Chris Mills and   
            Gabriele Bavota and   
               Sonia Haiduc and   
              Rocco Oliveto and   
             Andrian Marcus and   
                Andrea De Lucia   Predicting Query Quality for
                                  Applications of Text Retrieval to
                                  Software Engineering Tasks . . . . . . . 3:1--3:??
                   Shin Yoo and   
               Xiaoyuan Xie and   
              Fei-Ching Kuo and   
            Tsong Yueh Chen and   
                    Mark Harman   Human Competitiveness of Genetic
                                  Programming in Spectrum-Based Fault
                                  Localisation: Theoretical and Empirical
                                  Analysis . . . . . . . . . . . . . . . . 4:1--4:??
          Robert M. Hierons and   
        Uraz Cengiz Türker   Parallel Algorithms for Generating
                                  Distinguishing Sequences for Observable
                                  Non-deterministic FSMs . . . . . . . . . 5:1--5:??

ACM Transactions on Software Engineering and Methodology
Volume 26, Number 2, October, 2017

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 6:1--6:??
        Giuseppe Scanniello and   
               Michele Risi and   
        Porfirio Tramontana and   
                  Simone Romano   Fixing Faults in C and Java Source Code:
                                  Abbreviated vs. Full-Word Identifier
                                  Names  . . . . . . . . . . . . . . . . . 6:1--6:??
             Luciano Baresi and   
            Angelo Morzenti and   
              Alfredo Motta and   
Mohammad Mehdi Pourhashem K. and   
                   Matteo Rossi   A Logic-Based Approach for the
                                  Verification of UML Timed Models . . . . 7:1--7:??
          Chris Karanikolas and   
     Grigoris Dimitroulakos and   
          Konstantinos Masselos   Early Evaluation of Implementation
                                  Alternatives of Composite Data
                                  Structures Toward Maintainability  . . . 8:1--8:??

ACM Transactions on Software Engineering and Methodology
Volume 26, Number 3, January, 2018

              Paul C. Attie and   
            Saddek Bensalem and   
               Marius Bozga and   
              Mohamad Jaber and   
             Joseph Sifakis and   
                Fadi A. Zaraket   Global and Local Deadlock Freedom in BIP 9:1--9:??
                  Iago Abal and   
                  Jean Melo and   
        Stefan Stanciulescu and   
             Claus Brabrand and   
      Márcio Ribeiro and   
               Andrzej Wasowski   Variability Bugs in Highly Configurable
                                  Systems: a Qualitative Analysis  . . . . 10:1--10:??
              Joshua Garcia and   
             Mahmoud Hammad and   
                      Sam Malek   Lightweight, Obfuscation-Resilient
                                  Detection and Family Identification of
                                  Android Malware  . . . . . . . . . . . . 11:1--11:??

ACM Transactions on Software Engineering and Methodology
Volume 26, Number 4, February, 2018

               Khanh Nguyen and   
                   Kai Wang and   
                  Yingyi Bu and   
                    Lu Fang and   
                     Guoqing Xu   Understanding and Combating Memory Bloat
                                  in Managed Data-Intensive Systems  . . . 12:1--12:41
            Andrea De Lucia and   
          Vincenzo Deufemia and   
            Carmine Gravino and   
                   Michele Risi   Detecting the Behavior of Design
                                  Patterns through Model Checking and
                                  Dynamic Analysis . . . . . . . . . . . . 13:1--13:??
                   Yi Xiang and   
                 Yuren Zhou and   
                Zibin Zheng and   
                      Miqing Li   Configuring Software Product Lines by
                                  Combining Many-Objective Optimization
                                  and SAT Solvers  . . . . . . . . . . . . 14:1--14:??


ACM Transactions on Software Engineering and Methodology
Volume 27, Number 1, June, 2018

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
                Yuming Zhou and   
                Yibiao Yang and   
                 Hongmin Lu and   
                   Lin Chen and   
                  Yanhui Li and   
              Yangyang Zhao and   
                Junyan Qian and   
                      Baowen Xu   How Far We Have Progressed in the
                                  Journey? An Examination of Cross-Project
                                  Defect Prediction  . . . . . . . . . . . 1:1--1:??
             Santiago Vidal and   
         Iñaki Berra and   
          Santiago Zulliani and   
             Claudia Marcos and   
J. Andrés Díaz Pace   Assessing the Refactoring of Brain
                                  Methods  . . . . . . . . . . . . . . . . 2:1--2:??
             Yuanyuan Zhang and   
                Mark Harman and   
             Gabriela Ochoa and   
              Guenther Ruhe and   
              Sjaak Brinkkemper   An Empirical Study of Meta- and
                                  Hyper-Heuristic Search for
                                  Multi-Objective Release Planning . . . . 3:1--3:??
                 S. S. Emam and   
                      J. Miller   Inferring Extended Probabilistic
                                  Finite-State Automaton Models from
                                  Software Executions  . . . . . . . . . . 4:1--4:??

ACM Transactions on Software Engineering and Methodology
Volume 27, Number 2, July, 2018

                   Tao Chen and   
                      Ke Li and   
               Rami Bahsoon and   
                        Xin Yao   FEMOSAA: Feature-Guided and Knee-Driven
                                  Multi-Objective Optimization for
                                  Self-Adaptive Software . . . . . . . . . 5:1--5:??
       Adrián Riesco and   
                 Kazuhiro Ogata   Prove it! Inferring Formal Proof Scripts
                                  from CafeOBJ Proof Scores  . . . . . . . 6:1--6:??
              Marcel Böhme   STADS: Software Testing as Species
                                  Discovery  . . . . . . . . . . . . . . . 7:1--7:??
              Yongjie Zheng and   
                   Cuong Cu and   
              Richard N. Taylor   Maintaining Architecture-Implementation
                                  Conformance to Support Architecture
                                  Centrality: From Single System to
                                  Product Line Development . . . . . . . . 8:1--8:??

ACM Transactions on Software Engineering and Methodology
Volume 27, Number 3, October, 2018

             David S. Rosenblum   Editorial  . . . . . . . . . . . . . . . 9:1--9:??
              Tomasz Kuchta and   
        Hristina Palikareva and   
                 Cristian Cadar   Shadow Symbolic Execution for Testing
                                  Software Patches . . . . . . . . . . . . 10:1--10:??
             Klaas-Jan Stol and   
               Brian Fitzgerald   The ABC of Software Engineering Research 11:1--11:??
             Federica Sarro and   
           Alessio Petrozziello   Linear Programming as a Baseline for
                                  Software Effort Estimation . . . . . . . 12:1--12:??
               Javier Troya and   
              Sergio Segura and   
        Jose Antonio Parejo and   
     Antonio Ruiz-Cortés   Spectrum-Based Fault Localization in
                                  Model Transformations  . . . . . . . . . 13:1--13:??
Mario Linares-Vásquez and   
            Gabriele Bavota and   
Carlos Bernal-Cárdenas and   
      Massimiliano Di Penta and   
              Rocco Oliveto and   
               Denys Poshyvanyk   Multi-Objective Optimization of Energy
                                  Consumption of GUIs in Android Apps  . . 14:1--14:??

ACM Transactions on Software Engineering and Methodology
Volume 27, Number 4, November, 2018

            Sergey Mechtaev and   
                  Xiang Gao and   
              Shin Hwei Tan and   
             Abhik Roychoudhury   Test-Equivalence Analysis for Automatic
                                  Patch Generation . . . . . . . . . . . . 15:1--15:??
            Abhishek Sharma and   
                  Yuan Tian and   
              Agus Sulistya and   
           Dinusha Wijedasa and   
                       David Lo   Recommending Who to Follow in the
                                  Software Engineering Twitter Space . . . 16:1--16:??
               Juan De Lara and   
                  Esther Guerra   Refactoring Multi-Level Models . . . . . 17:1--17:??
        Alexander Von Rhein and   
           Jörg Liebig and   
             Andreas Janker and   
     Christian Kästner and   
                      Sven Apel   Variability-Aware Static Analysis at
                                  Scale: an Empirical Study  . . . . . . . 18:1--18:??


ACM Transactions on Software Engineering and Methodology
Volume 28, Number 1, February, 2019

                  Mauro Pezz\`e   Editorial from the Incoming
                                  Editor-in-Chief  . . . . . . . . . . . . 1:1--1:??
             David S. Rosenblum   Farewell Editorial from the Outgoing
                                  Editor-in-Chief  . . . . . . . . . . . . 1:1--1:??
               Chunhui Wang and   
           Fabrizio Pastore and   
                  Lionel Briand   Oracles for Testing Software Timeliness
                                  with Uncertainty . . . . . . . . . . . . 1:1--1:??
               Abdul Razzaq and   
              Asanka Wasala and   
                Chris Exton and   
                    Jim Buckley   The State of Empirical Evaluation in
                                  Static Feature Location  . . . . . . . . 2:1--2:??
                  Andrea Arcuri   RESTful API Automated Test Case
                                  Generation with EvoMaster  . . . . . . . 3:1--3:??
               Chetan Arora and   
         Mehrdad Sabetzadeh and   
               Shiva Nejati and   
                  Lionel Briand   An Active Learning Approach for
                                  Improving the Accuracy of Automated
                                  Domain Model Extraction  . . . . . . . . 4:1--4:??
                 Liyan Song and   
           Leandro L. Minku and   
                        Xin Yao   Software Effort Interval Prediction via
                                  Bayesian Inference and Synthetic
                                  Bootstrap Resampling . . . . . . . . . . 5:1--5:??

ACM Transactions on Software Engineering and Methodology
Volume 28, Number 2, April, 2019

            Samuel J. Ellis and   
            Titus H. Klinge and   
           James I. Lathrop and   
               Jack H. Lutz and   
              Robyn R. Lutz and   
            Andrew S. Miner and   
                 Hugh D. Potter   Runtime Fault Detection in Programmed
                                  Molecular Systems  . . . . . . . . . . . 6:1--6:??
                  Mauro Pezz\`e   Editorial  . . . . . . . . . . . . . . . 6:1--6:??
                     Yue Li and   
                   Tian Tan and   
                   Jingling Xue   Understanding and Analyzing Java
                                  Reflection . . . . . . . . . . . . . . . 7:1--7:??
           Dines Bjòrner   Domain Analysis and Description
                                  Principles, Techniques, and Modelling
                                  Languages  . . . . . . . . . . . . . . . 8:1--8:??
              Stefan Wagner and   
Daniel Méndez Fernández and   
           Michael Felderer and   
            Antonio Vetr\`o and   
          Marcos Kalinowski and   
              Roel Wieringa and   
              Dietmar Pfahl and   
               Tayana Conte and   
Marie-Therese Christiansson and   
              Desmond Greer and   
           Casper Lassenius and   
    Tomi Männistö and   
            Maleknaz Nayebi and   
                Markku Oivo and   
       Birgit Penzenstadler and   
        Rafael Prikladnicki and   
              Guenther Ruhe and   
   André Schekelmann and   
                  Sagar Sen and   
     Rodrigo Spínola and   
                Ahmed Tuzcu and   
       Jose Luis De La Vara and   
                Dietmar Winkler   Status Quo in Requirements Engineering:
                                  a Theory and a Global Family of Surveys  9:1--9:??
             Jian-Min Jiang and   
                Huibiao Zhu and   
                     Qin Li and   
               Yongxin Zhao and   
                 Zhong Hong and   
                  Shi Zhang and   
                      Ping Gong   Isolation Modeling and Analysis Based on
                                  Mobility . . . . . . . . . . . . . . . . 10:1--10:??
            Christoph Czepa and   
                       Uwe Zdun   How Understandable Are Pattern-based
                                  Behavioral Constraints for Novice
                                  Software Designers?  . . . . . . . . . . 11:1--11:??

ACM Transactions on Software Engineering and Methodology
Volume 28, Number 3, August, 2019

             Mauro Pezzé   Editorial  . . . . . . . . . . . . . . . 12:1--12:??
             Dennis Reuling and   
                 Udo Kelter and   
       Johannes Bürdek and   
                   Malte Lochau   Automated $N$-way Program Merging for
                                  Facilitating Family-based Analyses of
                                  Variant-rich Software  . . . . . . . . . 13:1--13:??
                 Feng Sheng and   
                Huibiao Zhu and   
                  Jifeng He and   
              Zongyuan Yang and   
              Jonathan P. Bowen   Theoretical and Practical Aspects of
                                  Linking Operational and Algebraic
                                  Semantics for MDESL  . . . . . . . . . . 14:1--14:??
                Xiaoxue Ren and   
             Zhenchang Xing and   
                    Xin Xia and   
                   David Lo and   
                 Xinyu Wang and   
                    John Grundy   Neural Network-based Detection of
                                  Self-Admitted Technical Debt: From
                                  Performance to Explainability  . . . . . 15:1--15:??
                Pengfei Gao and   
                  Jun Zhang and   
                    Fu Song and   
                      Chao Wang   Verifying and Quantifying Side-channel
                                  Resistance of Masked Software
                                  Implementations  . . . . . . . . . . . . 16:1--16:??
        Porfirio Tramontana and   
        Domenico Amalfitano and   
            Nicola Amatucci and   
                 Atif Memon and   
             Anna Rita Fasolino   Developing and Evaluating Objective
                                  Termination Criteria for Random Testing  17:1--17:??
             Pedro Antonino and   
     Thomas Gibson-Robinson and   
                   A. W. Roscoe   Efficient Verification of Concurrent
                                  Systems Using Synchronisation Analysis
                                  and SAT/SMT Solving  . . . . . . . . . . 18:1--18:??

ACM Transactions on Software Engineering and Methodology
Volume 28, Number 4, October, 2019

                  Mauro Pezz\`e   Editorial  . . . . . . . . . . . . . . . 19:1--19:??
             Michele Tufano and   
                Cody Watson and   
            Gabriele Bavota and   
      Massimiliano Di Penta and   
               Martin White and   
               Denys Poshyvanyk   An Empirical Study on Learning
                                  Bug-Fixing Patches in the Wild via
                                  Neural Machine Translation . . . . . . . 19:1--19:??
          Carlo Bernaschina and   
           Emanuele Falzone and   
           Piero Fraternali and   
   Sergio Luis Herrera Gonzalez   The Virtual Developer: Integrating Code
                                  Generation and Manual Development with
                                  Conflict Resolution  . . . . . . . . . . 20:1--20:??
               Juan De Lara and   
              Esther Guerra and   
           Davide Di Ruscio and   
              Juri Di Rocco and   
Jesús S'nchez Cuadrado and   
            Ludovico Iovino and   
            Alfonso Pierantonio   Automated Reuse of Model Transformations
                                  through Typing Requirements Models . . . 21:1--21:??
                   He Jiang and   
             Jingxuan Zhang and   
                Xiaochen Li and   
                 Zhilei Ren and   
                   David Lo and   
                 Xindong Wu and   
                  Zhongxuan Luo   Recommending New Features from Mobile
                                  App Descriptions . . . . . . . . . . . . 22:1--22:??
                  Yunho Kim and   
              Seokhyeon Mun and   
                   Shin Yoo and   
                    Moonzoo Kim   Precise Learn-to-Rank Fault Localization
                                  Using Dynamic and Static Features of
                                  Target Programs  . . . . . . . . . . . . 23:1--23:??
                  Cong Tian and   
                   Chu Chen and   
               Zhenhua Duan and   
                     Liang Zhao   Differential Testing of Certificate
                                  Validation in SSL/TLS Implementations:
                                  an RFC-guided Approach . . . . . . . . . 24:1--24:??


ACM Transactions on Software Engineering and Methodology
Volume 29, Number 1, February, 2020

         Antoine El-Hokayem and   
                Yli\`es Falcone   On the Monitoring of Decentralized
                                  Specifications: Semantics, Properties,
                                  Analysis, and Simulation . . . . . . . . 1:1--1:57
          Robert M. Hierons and   
                  Miqing Li and   
                Xiaohui Liu and   
        Jose Antonio Parejo and   
              Sergio Segura and   
                        Xin Yao   Many-Objective Test Suite Generation for
                                  Software Product Lines . . . . . . . . . 2:1--2:46
                   Lin Chen and   
                      Di Wu and   
             Wanwangying Ma and   
                Yuming Zhou and   
                  Baowen Xu and   
                  Hareton Leung   How C++ Templates Are Used for Generic
                                  Programming: an Empirical Study on 50
                                  Open Source Systems  . . . . . . . . . . 3:1--3:49
                 Gaogao Yan and   
                    Li Jiao and   
               Shuling Wang and   
               Lingtai Wang and   
                    Naijun Zhan   Automatically Generating SystemC Code
                                  from HCSP Formal Models  . . . . . . . . 4:1--4:39
                  Yuan Yuan and   
               Wolfgang Banzhaf   Toward Better Evolutionary Program
                                  Repair: an Integrated Approach . . . . . 5:1--5:53
                 Roman Haas and   
          Rainer Niedermayr and   
               Tobias Roehm and   
                      Sven Apel   Is Static Analysis Able to Identify
                                  Unnecessary Source Code? . . . . . . . . 6:1--6:23
     Özgür Kafali and   
               Nirav Ajmeri and   
              Munindar P. Singh   DESEN: Specification of Sociotechnical
                                  Systems via Patterns of Regulation and
                                  Control  . . . . . . . . . . . . . . . . 7:1--7:50

ACM Transactions on Software Engineering and Methodology
Volume 29, Number 2, April, 2020

                  Mauro Pezz\`e   Editorial  . . . . . . . . . . . . . . . 8e:1--8e:1
                    Haipeng Cai   Assessing and Improving Malware
                                  Detection Sustainability through App
                                  Evolution Studies  . . . . . . . . . . . 8:1--8:28
          Ivan Beschastnikh and   
                  Perry Liu and   
                Albert Xing and   
                 Patty Wang and   
                 Yuriy Brun and   
               Michael D. Ernst   Visualizing Distributed System
                                  Executions . . . . . . . . . . . . . . . 9:1--9:38
                Shaukat Ali and   
              Paolo Arcaini and   
             Dipesh Pradhan and   
        Safdar Aqeel Safdar and   
                        Tao Yue   Quality Indicators in Search-based
                                  Software Engineering: an Empirical
                                  Evaluation . . . . . . . . . . . . . . . 10:1--10:29
             Ghanem Soltana and   
         Mehrdad Sabetzadeh and   
               Lionel C. Briand   Practical Constraint Solving for
                                  Generating System Test Data  . . . . . . 11:1--11:48
                 Ritu Kapur and   
                Balwinder Sodhi   A Defect Estimator for Source Code:
                                  Linking Defect Reports with Programming
                                  Constructs Usage Metrics . . . . . . . . 12:1--12:35
               Yangguang Li and   
     Zhen Ming (Jack) Jiang and   
                    Heng Li and   
            Ahmed E. Hassan and   
                   Cheng He and   
               Ruirui Huang and   
               Zhengda Zeng and   
                  Mian Wang and   
                     Pinan Chen   Predicting Node Failures in an
                                  Ultra-Large-Scale Cloud Computing
                                  Platform: an AIOps Solution  . . . . . . 13:1--13:24

ACM Transactions on Software Engineering and Methodology
Volume 29, Number 3, July, 2020

                  Mauro Pezz\`e   Editorial  . . . . . . . . . . . . . . . 14e:1--14e:1
               Guanhua Wang and   
      Sudipta Chattopadhyay and   
         Arnab Kumar Biswas and   
               Tulika Mitra and   
             Abhik Roychoudhury   KLEESpectre: Detecting Information
                                  Leakage through Speculative Cache
                                  Attacks via Symbolic Execution . . . . . 14:1--14:31
            Farbod Taymouri and   
                  Josep Carmona   Computing Alignments of Well-Formed
                                  Process Models using Local Search  . . . 15:1--15:41
              Zhendong Wang and   
                  Yang Feng and   
                    Yi Wang and   
             James A. Jones and   
                 David Redmiles   Unveiling Elite Developers' Activities
                                  in Open Source Projects  . . . . . . . . 16:1--16:35
           Artem Polyvyanyy and   
              Andreas Solti and   
          Matthias Weidlich and   
          Claudio Di Ciccio and   
                   Jan Mendling   Monotone Precision and Recall Measures
                                  for Comparing Executions and
                                  Specifications of Dynamic Systems  . . . 17:1--17:41
              Breno Miranda and   
              Antonia Bertolino   Testing Relative to Usage Scope:
                                  Revisiting Software Coverage Criteria    18:1--18:24
               Jieshan Chen and   
              Chunyang Chen and   
             Zhenchang Xing and   
                    Xin Xia and   
                 Liming Zhu and   
                John Grundy and   
                   Jinshui Wang   Wireframe-based UI Design Search through
                                  Image Autoencoder  . . . . . . . . . . . 19:1--19:31
                Yinxing Xue and   
                      Yan-Fu Li   Multi-objective Integer Programming
                                  Approaches for Solving the
                                  Multi-criteria Test-suite Minimization
                                  Problem: Towards Sound and Complete
                                  Solutions of a Particular Search-based
                                  Software-engineering Problem . . . . . . 20:1--20:50
               Lingfeng Bao and   
             Zhenchang Xing and   
                    Xin Xia and   
                   David Lo and   
                 Minghui Wu and   
                    Xiaohu Yang   psc2code: Denoising Code Extraction from
                                  Programming Screencasts  . . . . . . . . 21:1--21:38

ACM Transactions on Software Engineering and Methodology
Volume 29, Number 4, October, 2020

              Andrea Arcuri and   
               Juan P. Galeotti   Handling SQL Databases in Automated
                                  System Test Generation . . . . . . . . . 22:1--22:31
           Aleksandr Pilgun and   
           Olga Gadyatskaya and   
         Yury Zhauniarovich and   
       Stanislav Dashevskyi and   
         Artsiom Kushniarou and   
                    Sjouke Mauw   Fine-grained Code Coverage Measurement
                                  in Automated Black-box Android Testing   23:1--23:35
                Junjie Wang and   
                    Ye Yang and   
                Tim Menzies and   
                      Qing Wang   iSENSE2.0: Improving Completion-aware
                                  Crowdtesting Management with Duplicate
                                  Tagger and Sanity Checker  . . . . . . . 24:1--24:27
                Xihui Zhang and   
         Thomas F. Stafford and   
                     Tao Hu and   
                        Hua Dai   Measuring Task Conflict and Person
                                  Conflict in Software Testing . . . . . . 25:1--25:19
                Zhipeng Gao and   
                    Xin Xia and   
                John Grundy and   
                   David Lo and   
                   Yuan-Fang Li   Generating Question Titles for Stack
                                  Overflow from Mined Code Snippets  . . . 26:1--26:37
              Xiao Liang Yu and   
           Omar Al-Bataineh and   
                   David Lo and   
             Abhik Roychoudhury   Smart Contract Repair  . . . . . . . . . 27:1--27:32
               Josie Holmes and   
             Iftekhar Ahmed and   
            Caius Brindescu and   
             Rahul Gopinath and   
                   He Zhang and   
                     Alex Groce   Using Relative Lines of Code to Guide
                                  Automated Test Generation for Python . . 28:1--28:38
      Jevgenija Pantiuchina and   
          Fiorella Zampetti and   
          Simone Scalabrino and   
       Valentina Piantadosi and   
              Rocco Oliveto and   
            Gabriele Bavota and   
          Massimiliano Di Penta   Why Developers Refactor Source Code: a
                                  Mining-based Study . . . . . . . . . . . 29:1--29:30
                Junjie Chen and   
                    Zhuo Wu and   
                   Zan Wang and   
                  Hanmo You and   
             Lingming Zhang and   
                       Ming Yan   Practical Accuracy Estimation for
                                  Efficient Deep Neural Network Testing    30:1--30:35
                Wenhan Wang and   
                      Ge Li and   
                 Sijie Shen and   
                    Xin Xia and   
                        Zhi Jin   Modular Tree Network for Source Code
                                  Representation Learning  . . . . . . . . 31:1--31:23


ACM Transactions on Software Engineering and Methodology
Volume 30, Number 1, January, 2021

          Michele Guerriero and   
     Damian Andrew Tamburri and   
            Elisabetta Di Nitto   StreamGen: Model-driven Development of
                                  Distributed Streaming Applications . . . 1:1--1:30
             Janet Siegmund and   
              Norman Peitek and   
                  Sven Apel and   
               Norbert Siegmund   Mastering Variation in Human Studies:
                                  The Role of Aggregation  . . . . . . . . 2:1--2:40
               Akond Rahman and   
         Md Rayhanur Rahman and   
               Chris Parnin and   
                Laurie Williams   Security Smells in Ansible and Chef
                                  Scripts: a Replication Study . . . . . . 3:1--3:31
               Huihui Zhang and   
                  Man Zhang and   
                    Tao Yue and   
                Shaukat Ali and   
                         Yan Li   Uncertainty-wise Requirements
                                  Prioritization with Search . . . . . . . 4:1--4:54
      Ahmad Salim Al-Sibahi and   
           Thomas P. Jensen and   
     Aleksandar S. Dimovski and   
               Andrzej Wasowski   Verification of Program Transformations
                                  with Inductive Refinement Types  . . . . 5:1--5:33
 Ridwan Salihin Shariffdeen and   
              Shin Hwei Tan and   
               Mingyuan Gao and   
             Abhik Roychoudhury   Automated Patch Transplantation  . . . . 6:1--6:36
                 Xiaoxue Ma and   
                 Shangru Wu and   
               Ernest Pobee and   
                 Xiupei Mei and   
                  Hao Zhang and   
                   Bo Jiang and   
                Wing-Kwong Chan   RegionTrack: a Trace-Based Sound and
                                  Complete Checker to Debug Transactional
                                  Atomicity Violations and
                                  Non-Serializable Traces  . . . . . . . . 7:1--7:49
                Osama Ehsan and   
              Safwat Hassan and   
          Mariam El Mezouar and   
                       Ying Zou   An Empirical Study of Developer
                                  Discussions in the Gitter Platform . . . 8:1--8:39
            Roberto Bagnara and   
             Michele Chiari and   
               Roberta Gori and   
                 Abramo Bagnara   A Practical Approach to Verification of
                                  Floating-Point C/C++ Programs with \tt
                                  math.h/\tt cmath Functions . . . . . . . 9:1--9:53
                 Xiaoqin Fu and   
                Haipeng Cai and   
                     Wen Li and   
                          Li Li   SEADS: Scalable and Cost-effective
                                  Dynamic Dependence Analysis of
                                  Distributed Systems via Reinforcement
                                  Learning . . . . . . . . . . . . . . . . 10:1--10:45
                Zhipeng Gao and   
                    Xin Xia and   
                   David Lo and   
                    John Grundy   Technical Q8A Site Answer Recommendation
                                  via Question Boosting  . . . . . . . . . 11:1--11:34

ACM Transactions on Software Engineering and Methodology
Volume 30, Number 2, March, 2021

               Javier Godoy and   
        Juan Pablo Galeotti and   
         Diego Garbervetsky and   
       Sebastián Uchitel   Enabledness-based Testing of Object
                                  Protocols  . . . . . . . . . . . . . . . 12:1--12:36
                     Wei Ma and   
             Mike Papadakis and   
          Anestis Tsakmalis and   
               Maxime Cordy and   
                  Yves Le Traon   Test Selection for Deep Learning Systems 13:1--13:22
                  Xiang Gao and   
                    Bo Wang and   
            Gregory J. Duck and   
                    Ruyi Ji and   
              Yingfei Xiong and   
             Abhik Roychoudhury   Beyond Tests: Program Vulnerability
                                  Repair via Crash Constraint Extraction   14:1--14:27
            Manuel Ohrndorf and   
        Christopher Pietsch and   
                 Udo Kelter and   
               Lars Grunske and   
                    Timo Kehrer   History-based Model Repair
                                  Recommendations  . . . . . . . . . . . . 15:1--15:46
              Hong Jin Kang and   
                       David Lo   Adversarial Specification Mining . . . . 16:1--16:40
                Dunwei Gong and   
                 Baicai Sun and   
              Xiangjuan Yao and   
                      Tian Tian   Test Data Generation for Path Coverage
                                  of MPI Programs Using SAEO . . . . . . . 17:1--17:37
              Zhenpeng Chen and   
                 Yanbin Cao and   
                 Huihan Yao and   
                    Xuan Lu and   
                   Xin Peng and   
                   Hong Mei and   
                    Xuanzhe Liu   Emoji-powered Sentiment and Emotion
                                  Detection from Software Developers'
                                  Communication Data . . . . . . . . . . . 18:1--18:48
     Thierry Titcheu Chekam and   
             Mike Papadakis and   
               Maxime Cordy and   
                  Yves Le Traon   Killing Stubborn Mutants with Symbolic
                                  Execution  . . . . . . . . . . . . . . . 19:1--19:23
              John-Paul Ore and   
          Carrick Detweiler and   
               Sebastian Elbaum   An Empirical Study on Type Annotations:
                                  Accuracy, Speed, and Suggestion
                                  Effectiveness  . . . . . . . . . . . . . 20:1--20:29
                   Bozhi Wu and   
                   Sen Chen and   
                 Cuiyun Gao and   
               Lingling Fan and   
                   Yang Liu and   
                Weiping Wen and   
                 Michael R. Lyu   Why an Android App Is Classified as
                                  Malware: Toward Malware Classification
                                  Interpretation . . . . . . . . . . . . . 21:1--21:29
             Haoxiang Zhang and   
               Shaowei Wang and   
      Tse-Hsun (Peter) Chen and   
                Ahmed E. Hassan   Are Comments on Stack Overflow Well
                                  Organized for Easy Retrieval by
                                  Developers?  . . . . . . . . . . . . . . 22:1--22:31
                 Deqing Zou and   
                  Yawei Zhu and   
                Shouhuai Xu and   
                    Zhen Li and   
                    Hai Jin and   
                     Hengkai Ye   Interpreting Deep Learning-based
                                  Vulnerability Detector Predictions Based
                                  on Heuristic Searching . . . . . . . . . 23:1--23:31
            Bailey Vandehei and   
    Daniel Alencar Da Costa and   
                 Davide Falessi   Leveraging the Defects Life Cycle to
                                  Label Affected Versions and Defective
                                  Classes  . . . . . . . . . . . . . . . . 24:1--24:35
               Qiuyuan Chen and   
                    Xin Xia and   
                     Han Hu and   
                   David Lo and   
                    Shanping Li   Why My Code Summarization Model Does Not
                                  Work: Code Comment Improvement with
                                  Category Prediction  . . . . . . . . . . 25:1--25:29

ACM Transactions on Software Engineering and Methodology
Volume 30, Number 3, May, 2021

                  Mauro Pezz\`e   Editorial  . . . . . . . . . . . . . . . 26e:1--26e:1
                Pengfei Gao and   
                 Hongyi Xie and   
                    Fu Song and   
                    Taolue Chen   A Hybrid Approach to Formal Verification
                                  of Higher-Order Masked Arithmetic
                                  Programs . . . . . . . . . . . . . . . . 26:1--26:42
               Juan De Lara and   
              Esther Guerra and   
              Jörg Kienzle   Facet-oriented Modelling . . . . . . . . 27:1--27:59
          Abdullah A. Zarir and   
           Gustavo A. Oliva and   
       Zhen M. (Jack) Jiang and   
                Ahmed E. Hassan   Developing Cost-Effective
                                  Blockchain-Powered Applications: a Case
                                  Study of the Gas Usage of Smart Contract
                                  Transactions in the Ethereum Blockchain
                                  Platform . . . . . . . . . . . . . . . . 28:1--28:38
                Mouna Abidi and   
           Md Saidur Rahman and   
               Moses Openja and   
                   Foutse Khomh   Are Multi-Language Design Smells
                                  Fault-Prone? An Empirical Study  . . . . 29:1--29:56
             Zohreh Sharafi and   
                   Yu Huang and   
                Kevin Leach and   
                 Westley Weimer   Toward an Objective Measure of
                                  Developers' Cognitive Activities . . . . 30:1--30:40
                 Gias Uddin and   
               Foutse Khomh and   
                Chanchal K. Roy   Automatic API Usage Scenario
                                  Documentation from Technical Q&A Sites    31:1--31:45
                 Xiaoyu Sun and   
                      Li Li and   
Tegawendé F. Bissyandé and   
              Jacques Klein and   
              Damien Octeau and   
                    John Grundy   Taming Reflection: an Essential Step
                                  Toward Whole-program Analysis of Android
                                  Apps . . . . . . . . . . . . . . . . . . 32:1--32:36
              Guoliang Zhao and   
              Safwat Hassan and   
                   Ying Zou and   
               Derek Truong and   
                    Toby Corbin   Predicting Performance Anomalies in
                                  Software Systems at Run-time . . . . . . 33:1--33:33
              Thiago Castro and   
          Leopoldo Teixeira and   
               Vander Alves and   
                  Sven Apel and   
               Maxime Cordy and   
                    Rohit Gheyi   A Formal Framework of Software Product
                                  Line Analyses  . . . . . . . . . . . . . 34:1--34:37
         Wendy Yánez and   
               Rami Bahsoon and   
                Yuqun Zhang and   
                    Rick Kazman   Architecting Internet of Things Systems
                                  with Blockchain: a Catalog of Tactics    35:1--35:46
          Simone Scalabrino and   
        Antonio Mastropaolo and   
            Gabriele Bavota and   
                  Rocco Oliveto   An Adaptive Search Budget Allocation
                                  Approach for Search-Based Test Case
                                  Generation . . . . . . . . . . . . . . . 36:1--36:26
               Qiuyuan Chen and   
              Chunyang Chen and   
              Safwat Hassan and   
            Zhengchang Xing and   
                    Xin Xia and   
                Ahmed E. Hassan   How Should I Improve the UI of My App?:
                                  a Study of User Reviews of Popular Apps
                                  in the Google Play . . . . . . . . . . . 37:1--37:38
                 Xiao Cheng and   
                 Haoyu Wang and   
                  Jiayi Hua and   
                   Guoai Xu and   
                      Yulei Sui   DeepWukong: Statically Detecting
                                  Software Vulnerabilities Using Deep
                                  Graph Neural Network . . . . . . . . . . 38:1--38:33
                 Deqing Zou and   
                 Yueming Wu and   
                  Siru Yang and   
               Anki Chauhan and   
                   Wei Yang and   
            Jiangying Zhong and   
                 Shihan Dou and   
                        Hai Jin   IntDroid: Android Malware Detection
                                  Based on API Intimacy Analysis . . . . . 39:1--39:32
                Yanjie Zhao and   
                      Li Li and   
                 Haoyu Wang and   
                Haipeng Cai and   
Tegawendé F. Bissyandé and   
              Jacques Klein and   
                    John Grundy   On the Impact of Sample Duplication in
                                  Machine-Learning-Based Android Malware
                                  Detection  . . . . . . . . . . . . . . . 40:1--40:38

ACM Transactions on Software Engineering and Methodology
Volume 30, Number 4, July, 2021

               Jianhui Chen and   
                         Fei He   Leveraging Control Flow Knowledge in SMT
                                  Solving of Program Verification  . . . . 41:1--41:26
               Chris Bogart and   
     Christian Kästner and   
             James Herbsleb and   
                  Ferdian Thung   When and How to Make Breaking Changes:
                                  Policies and Practices in 18 Open Source
                                  Software Ecosystems  . . . . . . . . . . 42:1--42:56
            Angelo Ferrando and   
           Louise A. Dennis and   
          Rafael C. Cardoso and   
             Michael Fisher and   
              Davide Ancona and   
               Viviana Mascardi   Toward a Holistic Approach to
                                  Verification and Validation of
                                  Autonomous Cognitive Systems . . . . . . 43:1--43:43
Héctor D. Menéndez and   
          Gunel Jahangirova and   
             Federica Sarro and   
              Paolo Tonella and   
                    David Clark   Diversifying Focused Testing for Unit
                                  Testing  . . . . . . . . . . . . . . . . 44:1--44:24
              Zhaoqiang Guo and   
                 Shiran Liu and   
                Jinping Liu and   
                  Yanhui Li and   
                   Lin Chen and   
                 Hongmin Lu and   
                    Yuming Zhou   How Far Have We Progressed in
                                  Identifying Self-admitted Technical
                                  Debts? A Comprehensive Empirical Study   45:1--45:56
                  Jingbo Lu and   
                 Dongjie He and   
                   Jingling Xue   Eagle: CFL-Reachability-Based
                                  Precision-Preserving Acceleration of
                                  Object-Sensitive Pointer Analysis with
                                  Partial Context Sensitivity  . . . . . . 46:1--46:46
          Philipp Paulweber and   
             Georg Simhandl and   
                       Uwe Zdun   Specifying with Interface and Trait
                                  Abstractions in Abstract State Machines:
                                  a Controlled Experiment  . . . . . . . . 47:1--47:29
         Preetha Chatterjee and   
          Kostadin Damevski and   
          Nicholas A. Kraft and   
                   Lori Pollock   Automatically Identifying the Quality of
                                  Developer Chats for Post Hoc Use . . . . 48:1--48:28
                   Yida Tao and   
                  Shan Tang and   
                 Yepang Liu and   
                   Zhiwu Xu and   
                  Shengchao Qin   Speeding Up Data Manipulation Tasks with
                                  Alternative Implementations: an
                                  Exploratory Study  . . . . . . . . . . . 49:1--49:28
       Nacha Chondamrongkul and   
                   Jing Sun and   
                     Ian Warren   Software Architectural Migration: an
                                  Automated Planning Approach  . . . . . . 50:1--50:35
                Dalia Sobhy and   
               Rami Bahsoon and   
              Leandro Minku and   
                    Rick Kazman   Evaluation of Software Architectures
                                  under Uncertainty: a Systematic
                                  Literature Review  . . . . . . . . . . . 51:1--51:50
                   Daniel Russo   The Agile Success Model: a Mixed-methods
                                  Study of a Large-scale Agile
                                  Transformation . . . . . . . . . . . . . 52:1--52:46
        Safdar Aqeel Safdar and   
                    Tao Yue and   
                    Shaukat Ali   Recommending Faulty Configurations for
                                  Interacting Systems Under Test Using
                                  Multi-objective Search . . . . . . . . . 53:1--53:36
                Yingzhe Lyu and   
                    Heng Li and   
            Mohammed Sayagh and   
     Zhen Ming (Jack) Jiang and   
                Ahmed E. Hassan   An Empirical Study of the Impact of Data
                                  Splitting Decisions on the Performance
                                  of AIOps Solutions . . . . . . . . . . . 54:1--54:38
            Malinda Dilhara and   
               Ameya Ketkar and   
                      Danny Dig   Understanding Software-2.0: a Study of
                                  Machine Learning Library Usage and
                                  Evolution  . . . . . . . . . . . . . . . 55:1--55:42
                 Haoye Wang and   
                    Xin Xia and   
                   David Lo and   
                   Qiang He and   
                 Xinyu Wang and   
                    John Grundy   Context-aware Retrieval-based Deep
                                  Commit Message Generation  . . . . . . . 56:1--56:30


ACM Transactions on Software Engineering and Methodology
Volume 31, Number 1, January, 2022

              Andrea Arcuri and   
               Juan P. Galeotti   Enhancing Search-based Testing with
                                  Testability Transformations for Existing
                                  APIs . . . . . . . . . . . . . . . . . . 1:1--1:34
                  Man Zhang and   
                  Andrea Arcuri   Adaptive Hypermutation for Search-Based
                                  System Test Generation: a Study on REST
                                  APIs with EvoMaster  . . . . . . . . . . 2:1--2:52
                     Hui Xu and   
             Zhuangbin Chen and   
               Mingshen Sun and   
               Yangfan Zhou and   
                 Michael R. Lyu   Memory-Safety Challenge Considered
                                  Solved? An In-Depth Study with All Rust
                                  CVEs . . . . . . . . . . . . . . . . . . 3:1--3:25
             Davide Falessi and   
            Aalok Ahluwalia and   
          Massimiliano DI Penta   The Impact of Dormant Defects on Defect
                                  Prediction: a Study of 19 Apache
                                  Projects . . . . . . . . . . . . . . . . 4:1--4:26
        Birgit Vogel-Heuser and   
          Eva-Maria Neumann and   
                Juliane Fischer   MICOSE4aPS: Industrially Applicable
                                  Maturity Metric to Improve Systematic
                                  Reuse of Control Software  . . . . . . . 5:1--5:24
            Anders Sundelin and   
     Javier Gonzalez-huerta and   
             Krzysztof Wnuk and   
                  Tony Gorschek   Towards an Anatomy of Software
                                  Craftsmanship  . . . . . . . . . . . . . 6:1--6:49
           Daniel Graziotin and   
                Per Lenberg and   
               Robert Feldt and   
                  Stefan Wagner   Psychometrics in Behavioral Software
                                  Engineering: a Methodological
                                  Introduction with Guidelines . . . . . . 7:1--7:36
                Jianyi Zhou and   
                Junjie Chen and   
                        Dan Hao   Parallel Test Prioritization . . . . . . 8:1--8:50
                  Irum Rauf and   
               Marian Petre and   
                  Thein Tun and   
               Tamara Lopez and   
                  Paul Lunn and   
        Dirk Van Der Linden and   
                 John Towse and   
                Helen Sharp and   
                Mark Levine and   
               Awais Rashid and   
                Bashar Nuseibeh   The Case for Adaptive Security
                                  Interventions  . . . . . . . . . . . . . 9:1--9:52
              Lorena Arcega and   
                 Jaime Font and   
      Òystein Haugen and   
                  Carlos Cetina   Bug Localization in Model-Based Systems
                                  in the Wild  . . . . . . . . . . . . . . 10:1--10:32
                 Cuiyun Gao and   
                Wenjie Zhou and   
                    Xin Xia and   
                   David Lo and   
                     Qi Xie and   
                 Michael R. Lyu   Automating App Review Response
                                  Generation Based on Contextual Knowledge 11:1--11:36
                   Chao Liu and   
                    Xin Xia and   
                   David Lo and   
                  Zhiwe Liu and   
            Ahmed E. Hassan and   
                    Shanping Li   CodeMatcher: Searching Code Based on
                                  Sequential Semantics of Important Query
                                  Words  . . . . . . . . . . . . . . . . . 12:1--12:37
                 Yaqin Zhou and   
              Jing Kai Siow and   
                Chenyu Wang and   
              Shangqing Liu and   
                       Yang Liu   SPI: Automated Identification of
                                  Security Patches via Commits . . . . . . 13:1--13:27
              Amin Nikanjam and   
         Houssem Ben Braiek and   
    Mohammad Mehdi Morovati and   
                   Foutse Khomh   Automatic Fault Detection for Deep
                                  Learning Programs Using Graph
                                  Transformations  . . . . . . . . . . . . 14:1--14:27
                   Chao Liu and   
                 Cuiyun Gao and   
                    Xin Xia and   
                   David Lo and   
                John Grundy and   
                    Xiaohu Yang   On the Reproducibility and Replicability
                                  of Deep Learning in Software Engineering 15:1--15:46
                Yingzhe Lyu and   
   Gopi Krishnan Rajbahadur and   
                   Dayi Lin and   
                Boyuan Chen and   
         Zhen Ming (Jack) Jiang   Towards a Consistent Interpretation of
                                  AIOps Models . . . . . . . . . . . . . . 16:1--16:38
                Owain Parry and   
      Gregory M. Kapfhammer and   
             Michael Hilton and   
                    Phil McMinn   A Survey of Flaky Tests  . . . . . . . . 17:1--17:74

ACM Transactions on Software Engineering and Methodology
Volume 31, Number 2, April, 2022

                  Mauro Pezz\`e   Editorial: a Retrospective and
                                  Prospective Reflection . . . . . . . . . 18e:1--18e:2
                    K. Lano and   
        S. Kolahdouz-Rahimi and   
                        S. Fang   Model Transformation Development Using
                                  Automated Requirements Analysis,
                                  Metamodel Matching, and Transformation
                                  by Example . . . . . . . . . . . . . . . 18:1--18:71
                Thomas Bock and   
            Angelika Schmid and   
                      Sven Apel   Measuring and Modeling Group Dynamics in
                                  Open-Source Software Development: a
                                  Tensor Decomposition Approach  . . . . . 19:1--19:50
           Fahimeh Ebrahimi and   
            Miroslav Tushev and   
                   Anas Mahmoud   Classifying Mobile Applications Using
                                  Word Embeddings  . . . . . . . . . . . . 20:1--20:30
                Luca Ardito and   
             Andrea Bottino and   
           Riccardo Coppola and   
          Fabrizio Lamberti and   
       Francesco Manigrasso and   
                  Lia Morra and   
                Marco Torchiano   Feature Matching-based Approaches to
                                  Improve the Robustness of Android Visual
                                  GUI Testing  . . . . . . . . . . . . . . 21:1--21:32
            Chandra Maddila and   
        Nachiappan Nagappan and   
             Christian Bird and   
           Georgios Gousios and   
               Arie van Deursen   ConE: a Concurrent Edit Detection Tool
                                  for Large-scale Software Development . . 22:1--22:26
      Jevgenija Pantiuchina and   
                    Bin Lin and   
          Fiorella Zampetti and   
      Massimiliano Di Penta and   
              Michele Lanza and   
                Gabriele Bavota   Why Do Developers Reject Refactorings in
                                  Open-Source Projects?  . . . . . . . . . 23:1--23:23
                Olawole Oni and   
                Emmanuel Letier   Analyzing Uncertainty in Release
                                  Planning: a Method and Experiment for
                                  Fixed-Date Release Cycles  . . . . . . . 24:1--24:39
                Luca Traini and   
          Daniele Di Pompeo and   
              Michele Tucci and   
                    Bin Lin and   
          Simone Scalabrino and   
            Gabriele Bavota and   
              Michele Lanza and   
              Rocco Oliveto and   
           Vittorio Cortellessa   How Software Refactoring Impacts
                                  Execution Time . . . . . . . . . . . . . 25:1--25:23
            Katherine Hough and   
                  Jonathan Bell   A Practical Approach for Dynamic Taint
                                  Tracking with Control-flow Relationships 26:1--26:43
                 Denae Ford and   
       Margaret-Anne Storey and   
          Thomas Zimmermann and   
             Christian Bird and   
                Sonia Jaffe and   
            Chandra Maddila and   
            Jenna L. Butler and   
                Brian Houck and   
            Nachiappan Nagappan   A Tale of Two Cities: Software
                                  Developers Working from Home during the
                                  COVID-19 Pandemic  . . . . . . . . . . . 27:1--27:37
              Ryan Williams and   
                Tongwei Ren and   
           Lorenzo De Carli and   
                    Long Lu and   
                  Gillian Smith   Guided Feature Identification and
                                  Removal for Resource-constrained
                                  Firmware . . . . . . . . . . . . . . . . 28:1--28:25
                Frank F. Xu and   
           Bogdan Vasilescu and   
                  Graham Neubig   In-IDE Code Generation from Natural
                                  Language: Promise and Challenges . . . . 29:1--29:47
                Jiachi Chen and   
                    Xin Xia and   
                   David Lo and   
                    John Grundy   Why Do Smart Contracts Self-Destruct?
                                  Investigating the Selfdestruct Function
                                  on Ethereum  . . . . . . . . . . . . . . 30:1--30:37
             Patrick Keller and   
 Abdoul Kader Kaboré and   
                Laura Plein and   
              Jacques Klein and   
              Yves Le Traon and   
Tegawendé F. Bissyandé   What You See is What it Means! Semantic
                                  Representation Learning of Code based on
                                  Visualization and Transfer Learning  . . 31:1--31:34
                Cody Watson and   
              Nathan Cooper and   
        David Nader Palacio and   
                Kevin Moran and   
               Denys Poshyvanyk   A Systematic Literature Review on the
                                  Use of Deep Learning in Software
                                  Engineering Research . . . . . . . . . . 32:1--32:58
                 Ritu Kapur and   
                Balwinder Sodhi   OSS Effort Estimation Using Software
                                  Features Similarity and Developer
                                  Activity-Based Metrics . . . . . . . . . 33:1--33:35
                 Jialun Cao and   
                Meiziniu Li and   
                  Yeting Li and   
                   Ming Wen and   
           Shing-Chi Cheung and   
                   Haiming Chen   SemMT: a Semantic-Based Testing Approach
                                  for Machine Translation Systems  . . . . 34e:1--34e:36
               Changwei Zou and   
                Xudong Wang and   
                Yaoqing Gao and   
                   Jingling Xue   Buddy Stacks: Protecting Return
                                  Addresses with Efficient Thread-Local
                                  Storage and Runtime Re-Randomization . . 35e:1--35e:37
           Sabreen Ahmadjee and   
   Carlos Mera-Gómez and   
               Rami Bahsoon and   
                    Rick Kazman   A Study on Blockchain Architecture
                                  Design Decisions and Their Security
                                  Attacks and Threats  . . . . . . . . . . 36e:1--36e:45
Silverio Martínez-Fernández and   
              Justus Bogner and   
              Xavier Franch and   
                 Marc Oriol and   
             Julien Siebert and   
            Adam Trendowicz and   
         Anna Maria Vollmer and   
                  Stefan Wagner   Software Engineering for AI-Based
                                  Systems: a Survey  . . . . . . . . . . . 37e:1--37e:59

ACM Transactions on Software Engineering and Methodology
Volume 31, Number 3, July, 2022

              Yingfei Xiong and   
                        Bo Wang   L2S: a Framework for Synthesizing the
                                  Most Probable Program under a
                                  Specification  . . . . . . . . . . . . . 34:1--34:45
                Junjie Wang and   
                    Ye Yang and   
                  Song Wang and   
                     Jun Hu and   
                      Qing Wang   Context- and Fairness-Aware In-Process
                                  Crowdworker Recommendation . . . . . . . 35:1--35:31
                    Yu Zhao and   
                    Ting Su and   
                   Yang Liu and   
                  Wei Zheng and   
                 Xiaoxue Wu and   
         Ramakanth Kavuluru and   
      William G. J. Halfond and   
                    Tingting Yu   ReCDroid+: Automated End-to-End Crash
                                  Reproduction from Bug Reports for
                                  Android Apps . . . . . . . . . . . . . . 36:1--36:33
            Luca Di Stefano and   
            Rocco De Nicola and   
                   Omar Inverso   Verification of Distributed Systems via
                                  Sequential Emulation . . . . . . . . . . 37:1--37:41
                    Bin Lin and   
              Nathan Cassee and   
       Alexander Serebrenik and   
            Gabriele Bavota and   
            Nicole Novielli and   
                  Michele Lanza   Opinion Mining for Software Development:
                                  a Systematic Literature Review . . . . . 38:1--38:41
      Daniel Barcelona-Pons and   
               Pierre Sutra and   
Marc Sánchez-Artigas and   
        Gerard París and   
Pedro García-López   Stateful Serverless Computing with
                                  Crucial  . . . . . . . . . . . . . . . . 39:1--39:38
             Carlo A. Furia and   
             Richard Torkar and   
                   Robert Feldt   Applying Bayesian Analysis Guidelines to
                                  Empirical Software Engineering Data: The
                                  Case of Programming Languages and Code
                                  Quality  . . . . . . . . . . . . . . . . 40:1--40:38
          Bogdan Marculescu and   
                  Man Zhang and   
                  Andrea Arcuri   On the Faults Found in REST APIs by
                                  Automated Test Generation  . . . . . . . 41:1--41:43
             Fabio Calefato and   
               Filippo Lanubile   Using Personality Detection Tools for
                                  Software Engineering Research: How Far
                                  Can We Go? . . . . . . . . . . . . . . . 42:1--42:48
                         Si Liu   All in One: Design, Verification, and
                                  Implementation of SNOW-optimal Read
                                  Atomic Transactions  . . . . . . . . . . 43:1--43:44
                Wenhua Yang and   
                Chong Zhang and   
                 Minxue Pan and   
                   Chang Xu and   
                    Yu Zhou and   
                   Zhiqiu Huang   Do Developers Really Know How to Use Git
                                  Commands? A Large-scale Study Using
                                  Stack Overflow . . . . . . . . . . . . . 44:1--44:29
             Dusica Marijan and   
                      Sagar Sen   Industry-Academia Research Collaboration
                                  and Knowledge Co-creation: Patterns and
                                  Anti-patterns  . . . . . . . . . . . . . 45:1--45:52
                Dalia Sobhy and   
              Leandro Minku and   
               Rami Bahsoon and   
                    Rick Kazman   Continuous and Proactive Software
                                  Architecture Evaluation: an IoT Case . . 46:1--46:54
                Xiaofei Xie and   
                 Tianlin Li and   
                  Jian Wang and   
                     Lei Ma and   
                   Qing Guo and   
            Felix Juefei-Xu and   
                       Yang Liu   NPC: Neuron Path Coverage via
                                  Characterizing Decision Logic of Deep
                                  Neural Networks  . . . . . . . . . . . . 47:1--47:27
                 Gias Uddin and   
Yann-Gaël Guéhénuc and   
               Foutse Khomh and   
                Chanchal K. Roy   An Empirical Study of the Effectiveness
                                  of an Ensemble of Stand-alone Sentiment
                                  Detection Tools for Software Engineering
                                  Datasets . . . . . . . . . . . . . . . . 48:1--48:38
                    Hao Guo and   
                   Sen Chen and   
             Zhenchang Xing and   
                Xiaohong Li and   
                   Yude Bai and   
                     Jiamou Sun   Detecting and Augmenting Missing Key
                                  Aspects in Vulnerability Descriptions    49:1--49:27
            Huangzhao Zhang and   
                   Zhiyi Fu and   
                      Ge Li and   
                     Lei Ma and   
                Zhehao Zhao and   
                Hua'an Yang and   
                  Yizhe Sun and   
                   Yang Liu and   
                        Zhi Jin   Towards Robustness of Deep Program
                                  Processing Models-Detection, Estimation,
                                  and Enhancement  . . . . . . . . . . . . 50:1--50:40
                     Bo Lin and   
              Shangwen Wang and   
                   Ming Wen and   
                  Xiaoguang Mao   Context-Aware Code Change Embedding for
                                  Better Patch Correctness Assessment  . . 51:1--51:29
                  Zehao Lin and   
                  Guodun Li and   
             Jingfeng Zhang and   
                   Yue Deng and   
               Xiangji Zeng and   
                  Yin Zhang and   
                        Yao Wan   XCode: Towards Cross-Language Code
                                  Representation with Large-Scale
                                  Pre-Training . . . . . . . . . . . . . . 52:1--52:44
                 Lizhi Liao and   
                    Heng Li and   
                Weiyi Shang and   
                         Lei Ma   An Empirical Study of the Impact of
                                  Hyperparameter Tuning and Model
                                  Optimization on the Performance
                                  Properties of Deep Neural Networks . . . 53:1--53:40
                   Siwei Wu and   
                     Lei Wu and   
                 Yajin Zhou and   
                 Runhuai Li and   
                   Zhi Wang and   
                  Xiapu Luo and   
                  Cong Wang and   
                        Kui Ren   Time-travel Investigation: Toward
                                  Building a Scalable Attack Detection
                                  Framework on Ethereum  . . . . . . . . . 54:1--54:33
         Benjamin S. Meyers and   
     Sultan Fahad Almassari and   
          Brandon N. Keller and   
                 Andrew Meneely   Examining Penetration Tester Behavior in
                                  the Collegiate Penetration Testing
                                  Competition  . . . . . . . . . . . . . . 55:1--55:25
               Yanming Yang and   
                    Xin Xia and   
                   David Lo and   
                Tingting Bi and   
                John Grundy and   
                    Xiaohu Yang   Predictive Models in Software
                                  Engineering: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 56:1--56:72

ACM Transactions on Software Engineering and Methodology
Volume 31, Number 4, October, 2022

                 Dirk Beyer and   
             Matthias Dangl and   
             Daniel Dietsch and   
          Matthias Heizmann and   
           Thomas Lemberger and   
             Michael Tautschnig   Verification Witnesses . . . . . . . . . 57:1--57:??
                 Ridhi Jain and   
            Rahul Purandare and   
                  Subodh Sharma   BiRD: Race Detection in Software
                                  Binaries under Relaxed Memory Models . . 58:1--58:??
                 Jhon Masso and   
 Félix García and   
         César Pardo and   
          Francisco J. Pino and   
                 Mario Piattini   A Common Terminology for Software Risk
                                  Management . . . . . . . . . . . . . . . 59:1--59:??
                    Yu Zhou and   
             Xiaoqing Zhang and   
              Juanjuan Shen and   
               Tingting Han and   
                Taolue Chen and   
                    Harald Gall   Adversarial Robustness of Deep Code
                                  Comment Generation . . . . . . . . . . . 60:1--60:??
              Chanh Duc Ngo and   
           Fabrizio Pastore and   
                  Lionel Briand   Automated, Cost-effective, and
                                  Update-driven App Testing  . . . . . . . 61:1--61:??
                     Hao Yu and   
                    Xing Hu and   
                      Ge Li and   
                    Ying Li and   
             Qianxiang Wang and   
                        Tao Xie   Assessing and Improving an Evaluation
                                  Dataset for Detecting Semantic Code
                                  Clones via Deep Learning . . . . . . . . 62:1--62:??
                    Xing Hu and   
               Qiuyuan Chen and   
                 Haoye Wang and   
                    Xin Xia and   
                   David Lo and   
              Thomas Zimmermann   Correlating Automated and Human
                                  Evaluation of Code Documentation
                                  Generation Quality . . . . . . . . . . . 63:1--63:??
Étienne André and   
                Didier Lime and   
              Dylan Marinho and   
                        Jun Sun   Guaranteeing Timed Opacity using
                                  Parametric Timed Model Checking  . . . . 64:1--64:??
            Andrea Romdhana and   
              Alessio Merlo and   
            Mariano Ceccato and   
                  Paolo Tonella   Deep Reinforcement Learning for
                                  Black-box Testing of Android Apps  . . . 65:1--65:??
                Tingting Bi and   
                    Xin Xia and   
                   David Lo and   
                John Grundy and   
          Thomas Zimmermann and   
                     Denae Ford   Accessibility in Software Practice: a
                                  Practitioner's Perspective . . . . . . . 66:1--66:??
            Mitchell Joblin and   
                      Sven Apel   How Do Successful and Failed Projects
                                  Differ? A Socio-Technical Analysis . . . 67:1--67:??
        Giuseppe De Giacomo and   
       Riccardo De Masellis and   
       Fabrizio Maria Maggi and   
                  Marco Montali   Monitoring Constraints and
                                  Metaconstraints with Temporal Logics on
                                  Finite Traces  . . . . . . . . . . . . . 68:1--68:??
                 Peng Zhang and   
                  Yang Wang and   
                 Xutong Liu and   
                  Yanhui Li and   
                Yibiao Yang and   
                Ziyuan Wang and   
                Xiaoyu Zhou and   
                   Lin Chen and   
                    Yuming Zhou   Mutant Reduction Evaluation: What is
                                  There and What is Missing? . . . . . . . 69:1--69:??
              Elvira Albert and   
             Pablo Gordillo and   
Alejandro Hernández-Cerezo and   
               Albert Rubio and   
                Maria A. Schett   Super-optimization of Smart Contracts    70:1--70:??
              Henrich Lauko and   
      Lukás Korencik and   
                    Petr Rockai   Verification of Programs Sensitive to
                                  Heap Layout  . . . . . . . . . . . . . . 71:1--71:??
                Junjie Chen and   
                    Chenyao Suo   Boosting Compiler Testing via Compiler
                                  Optimization Exploration . . . . . . . . 72:1--72:??
                 Jinhan Kim and   
               Juyoung Jeon and   
                  Shin Hong and   
                       Shin Yoo   Predictive Mutation Analysis via the
                                  Natural Language Channel in Source Code  73:1--73:??
             Umair Z. Ahmed and   
                  Zhiyu Fan and   
                 Jooyong Yi and   
        Omar I. Al-Bataineh and   
             Abhik Roychoudhury   Verifix: Verified Repair of Programming
                                  Assignments  . . . . . . . . . . . . . . 74:1--74:??
                Yuxia Zhang and   
                    Hui Liu and   
                    Xin Tan and   
               Minghui Zhou and   
                    Zhi Jin and   
                     Jiaxin Zhu   Turnover of Companies in OpenStack:
                                  Prevalence and Rationale . . . . . . . . 75:1--75:??
                    Chao Ni and   
                    Xin Xia and   
                   David Lo and   
                Xiaohu Yang and   
                Ahmed E. Hassan   Just-In-Time Defect Prediction on
                                  JavaScript Projects: a Replication Study 76:1--76:??
                 Haoye Tian and   
                 Yinghua Li and   
                Weiguo Pian and   
 Abdoul Kader Kaboré and   
                    Kui Liu and   
               Andrew Habib and   
              Jacques Klein and   
Tegawendé F. Bissyandé   Predicting Patch Correctness Based on
                                  the Similarity of Failing Test Cases . . 77:1--77:??
                   Qiang Hu and   
                 Yuejun Guo and   
               Maxime Cordy and   
                Xiaofei Xie and   
                     Lei Ma and   
             Mike Papadakis and   
                  Yves Le Traon   An Empirical Study on Data
                                  Distribution-Aware Test Selection for
                                  Deep Learning Enhancement  . . . . . . . 78:1--78:??
         Ferhat Ozgur Catak and   
                    Tao Yue and   
                    Shaukat Ali   Uncertainty-aware Prediction Validator
                                  in Deep Learning Models for
                                  Cyber-physical System Data . . . . . . . 79:1--79:??
            Matteo Biagiola and   
                  Paolo Tonella   Testing the Plasticity of Reinforcement
                                  Learning-based Systems . . . . . . . . . 80:1--80:??
        Bianca Trinkenreich and   
                 Igor Wiese and   
                Anita Sarma and   
               Marco Gerosa and   
               Igor Steinmacher   Women's Participation in Open Source
                                  Software: a Survey of the Literature . . 81:1--81:??


ACM Transactions on Software Engineering and Methodology
Volume 32, Number 1, January, 2023

                  Mauro Pezz\`e   Editorial: Announcing Six TOSEM Issues
                                  Per Year . . . . . . . . . . . . . . . . 1:1--1:??
                Marco Robol and   
           Travis D. Breaux and   
                  Elda Paja and   
                 Paolo Giorgini   Consent Verification Monitoring  . . . . 2:1--2:??
                 Pengbo Nie and   
             Chengcheng Wan and   
                  Jiayu Zhu and   
                   Ziyi Lin and   
                Yuting Chen and   
                    Zhendong Su   Coverage-directed Differential Testing
                                  of X.509 Certificate Validation in
                                  SSL/TLS Implementations  . . . . . . . . 3:1--3:??
                 Minxue Pan and   
                   Yifei Lu and   
                     Yu Pei and   
                 Tian Zhang and   
                    Xuandong Li   Preference-wise Testing of Android Apps
                                  via Test Amplification . . . . . . . . . 4:1--4:??
                   Tao Chen and   
                      Miqing Li   The Weights Can Be Harmful: Pareto
                                  Search versus Weighted Search in
                                  Multi-objective Search-based Software
                                  Engineering  . . . . . . . . . . . . . . 5:1--5:??
       Francesco Bertolotti and   
                 Walter Cazzola   Fold2Vec: Towards a Statement-Based
                                  Representation of Code for Code
                                  Comprehension  . . . . . . . . . . . . . 6:1--6:??
                 Zijing Yin and   
                   Yiwen Xu and   
                  Fuchen Ma and   
                 Haohao Gao and   
                   Lei Qiao and   
                       Yu Jiang   Scanner++: Enhanced Vulnerability
                                  Detection of Web Applications with
                                  Attack Intent Synchronization  . . . . . 7:1--7:??
                 Yiwen Dong and   
                 Zheyang Li and   
             Yongqiang Tian and   
              Chengnian Sun and   
         Michael W. Godfrey and   
             Meiyappan Nagappan   Bash in the Wild: Language Usage, Code
                                  Smells, and Bugs . . . . . . . . . . . . 8:1--8:22
                   Xiong Xu and   
         Jean-Pierre Talpin and   
               Shuling Wang and   
                 Bohua Zhan and   
                    Naijun Zhan   Semantics Foundation for Cyber-physical
                                  Systems Using Higher-order UTP . . . . . 9:1--9:??
                Masaki Waga and   
Étienne André and   
                   Ichiro Hasuo   Parametric Timed Pattern Matching  . . . 10:1--10:??
           Benjamin Rombaut and   
             Filipe R. Cogo and   
                 Bram Adams and   
                Ahmed E. Hassan   There's no Such Thing as a Free Lunch:
                                  Lessons Learned from Exploring the
                                  Overhead Introduced by the Greenkeeper
                                  Dependency Bot in Npm  . . . . . . . . . 11:1--11:??
                Danny Weyns and   
              Usman M. Iftikhar   ActivFORMS: a Formally Founded
                                  Model-based Approach to Engineer
                                  Self-adaptive Systems  . . . . . . . . . 12:1--12:??
                Xueliang Li and   
               Junyang Chen and   
                 Yepang Liu and   
                 Kaishun Wu and   
              John P. Gallagher   Combatting Energy Issues for Mobile
                                  Applications . . . . . . . . . . . . . . 13:1--13:??
              Milos Ojdanic and   
          Ezekiel Soremekun and   
           Renzo Degiovanni and   
             Mike Papadakis and   
                  Yves Le Traon   Mutation Testing in Evolving Systems:
                                  Studying the Relevance of Mutants to
                                  Code Evolution . . . . . . . . . . . . . 14:1--14:??
   Sayedhassan Khatoonabadi and   
          Diego Elias Costa and   
           Rabe Abdalkareem and   
                    Emad Shihab   On Wasted Contributions: Understanding
                                  the Dynamics of Contributor-Abandoned
                                  Pull Requests --- a Mixed-Methods Study
                                  of 10 Large Open-Source Projects . . . . 15:1--15:??
                   Uwe Zdun and   
         Pierre-Jean Queval and   
             Georg Simhandl and   
       Riccardo Scandariato and   
          Somik Chakravarty and   
               Marjan Jelic and   
           Aleksandar Jovanovic   Microservice Security Metrics for Secure
                                  Communication, Identity Management, and
                                  Observability  . . . . . . . . . . . . . 16:1--16:??
              Aitor Arrieta and   
                Pablo Valle and   
           Joseba A. Agirre and   
               Goiuria Sagardui   Some Seeds Are Strong: Seeding
                                  Strategies for Search-based Test Case
                                  Selection  . . . . . . . . . . . . . . . 17:1--17:??
                 Jianwei Wu and   
                   James Clause   Automated Identification of Uniqueness
                                  in JUnit Tests . . . . . . . . . . . . . 18:1--18:??
                Jiahuei Lin and   
            Mohammed Sayagh and   
                Ahmed E. Hassan   The Co-evolution of the WordPress
                                  Platform and Its Plugins . . . . . . . . 19:1--19:??
               Chang-Ai Sun and   
                 Hepeng Dai and   
                   Huai Liu and   
                Tsong Yueh Chen   Feedback-Directed Metamorphic Testing    20:1--20:??
      Aurora Ramírez and   
               Robert Feldt and   
 José Raúl Romero   A Taxonomy of Information Attributes for
                                  Test Case Prioritisation: Applicability,
                                  Machine Learning . . . . . . . . . . . . 21:1--21:??
                   Sihan Xu and   
                     Ya Gao and   
               Lingling Fan and   
                  Zheli Liu and   
                   Yang Liu and   
                         Hua Ji   LiDetector: License Incompatibility
                                  Detection for Open Source Software . . . 22:1--22:??
               Shuzheng Gao and   
                 Cuiyun Gao and   
                   Yulan He and   
               Jichuan Zeng and   
                 Lunyiu Nie and   
                    Xin Xia and   
                    Michael Lyu   Code Structure-Guided Transformer for
                                  Source Code Summarization  . . . . . . . 23:1--23:??
       Zarrin Tasnim Sworna and   
               Chadni Islam and   
             Muhammad Ali Babar   APIRO: a Framework for Automated
                                  Security Tools API Recommendation  . . . 24:1--24:??
                 Imen Sayar and   
           Alexandre Bartel and   
                Eric Bodden and   
                  Yves Le Traon   An In-depth Study of Java
                                  Deserialization Remote-Code Execution
                                  Exploits and Vulnerabilities . . . . . . 25:1--25:??
                 Zheyuan He and   
                Shuwei Song and   
                   Yang Bai and   
                  Xiapu Luo and   
                  Ting Chen and   
             Wensheng Zhang and   
                    Peng He and   
                 Hongwei Li and   
               Xiaodong Lin and   
                 Xiaosong Zhang   TokenAware: Accurate and Efficient
                                  Bookkeeping Recognition for Token Smart
                                  Contracts  . . . . . . . . . . . . . . . 26:1--26:??
         Gyte Tamasauskaite and   
                     Paul Groth   Defining a Knowledge Graph Development
                                  Process Through a Systematic Review  . . 27:1--27:??

ACM Transactions on Software Engineering and Methodology
Volume 32, Number 2, April, 2023

         Christian Birchler and   
              Sajad Khatiri and   
       Pouria Derakhshanfar and   
      Sebastiano Panichella and   
            Annibale Panichella   Single and Multi-objective Test Cases
                                  Prioritization for Self-driving Cars in
                                  Virtual Environments . . . . . . . . . . 28:1--28:??
                 Richard Banach   Graded Refinement, Retrenchment, and
                                  Simulation . . . . . . . . . . . . . . . 29:1--29:??
                  Zhen Yang and   
            Jacky Wai Keung and   
                    Xiao Yu and   
                   Yan Xiao and   
                    Zhi Jin and   
                   Jingyu Zhang   On the Significance of Category
                                  Prediction for Code-Comment
                                  Synchronization  . . . . . . . . . . . . 30:1--30:??
       Lola Burgueño and   
         Paula Muñoz and   
      Robert Clarisó and   
                Jordi Cabot and   
Sébastien Gérard and   
             Antonio Vallecillo   Dealing with Belief Uncertainty in
                                  Domain Models  . . . . . . . . . . . . . 31:1--31:??
Profir-Petru Pârtachi and   
             David R. White and   
                   Earl T. Barr   Aide-mémoire: Improving a Project's
                                  Collective Memory via Pull Request-Issue
                                  Links  . . . . . . . . . . . . . . . . . 32:1--32:??
              Ahmed Khanfir and   
               Anil Koyuncu and   
             Mike Papadakis and   
               Maxime Cordy and   
Tegawende F. Bissyandé and   
              Jacques Klein and   
                  Yves Le Traon   iBiR: Bug-report-driven Fault Injection  33:1--33:??
                  Chen Zeng and   
                     Yue Yu and   
                Shanshan Li and   
                    Xin Xia and   
               Zhiming Wang and   
              Mingyang Geng and   
                Linxiao Bai and   
                   Wei Dong and   
                   Xiangke Liao   deGraphCS: Embedding Variable-based Flow
                                  Graph for Neural Code Search . . . . . . 34:1--34:??
            Chandra Maddila and   
        Sai Surya Upadrasta and   
              Chetan Bansal and   
        Nachiappan Nagappan and   
           Georgios Gousios and   
               Arie van Deursen   Nudge: Accelerating Overdue Pull
                                  Requests toward Completion . . . . . . . 35:1--35:??
               Zhiqiang Zuo and   
                 Xintao Niu and   
                 Siyi Zhang and   
                    Lu Fang and   
            Siau Cheng Khoo and   
                    Shan Lu and   
              Chengnian Sun and   
               Guoqing Harry Xu   Toward More Efficient Statistical
                                  Debugging with Abstraction Refinement    36:1--36:??
                Jaekwon Lee and   
            Seung Yeob Shin and   
               Shiva Nejati and   
              Lionel Briand and   
             Yago Isasi Parache   Estimating Probabilistic Safe WCET
                                  Ranges of Real-Time Systems at Design
                                  Stages . . . . . . . . . . . . . . . . . 37:1--37:??
   César Soto-Valero and   
             Thomas Durieux and   
            Nicolas Harrand and   
                  Benoit Baudry   Coverage-Based Debloating for Java
                                  Bytecode . . . . . . . . . . . . . . . . 38:1--38:??
                Luke Dramko and   
             Jeremy Lacomis and   
              Pengcheng Yin and   
                Ed Schwartz and   
        Miltiadis Allamanis and   
              Graham Neubig and   
           Bogdan Vasilescu and   
                Claire Le Goues   DIRE and its Data: Neural Decompiled
                                  Variable Renamings with Respect to
                                  Software Class . . . . . . . . . . . . . 39:1--39:??
                 Bowen Shen and   
        Muhammad Ali Gulzar and   
                     Fei He and   
                        Na Meng   A Characterization Study of Merge
                                  Conflicts in Java Projects . . . . . . . 40:1--40:??
             Andreea Costea and   
            Abhishek Tiwari and   
          Sigmund Chianasta and   
                 Kishore R. and   
         Abhik Roychoudhury and   
                    Ilya Sergey   Hippodrome: Data Race Repair Using
                                  Static Analysis Summaries  . . . . . . . 41:1--41:??
                 Jinhan Kim and   
               Robert Feldt and   
                       Shin Yoo   Evaluating Surprise Adequacy for Deep
                                  Learning System Testing  . . . . . . . . 42:1--42:??
        Filipe Roseiro Cogo and   
                    Xin Xia and   
                Ahmed E. Hassan   Assessing the Alignment between the
                                  Information Needs of Developers and the
                                  Documentation of Programming Languages:
                                  a Case Study on Rust . . . . . . . . . . 43:1--43:??
               Najd Altoyan and   
                     Don Batory   On Proving the Correctness of
                                  Refactoring Class Diagrams of MDE
                                  Metamodels . . . . . . . . . . . . . . . 44:1--44:??
                  Chao Wang and   
                     Hao He and   
                    Uma Pal and   
              Darko Marinov and   
                   Minghui Zhou   Suboptimal Comments in Java Projects:
                                  From Independent Comment Changes to
                                  Commenting Practices . . . . . . . . . . 45:1--45:??
               Jiezhu Cheng and   
                 Cuiyun Gao and   
                    Zibin Zheng   HINNPerf: Hierarchical Interaction
                                  Neural Network for Performance
                                  Prediction of Configurable Systems . . . 46:1--46:??
            Hichem Belgacem and   
                Xiaochen Li and   
         Domenico Bianculli and   
                  Lionel Briand   A Machine Learning Approach for
                                  Automated Filling of Categorical Fields
                                  in Data Entry Forms  . . . . . . . . . . 47:1--47:??
                Zishuo Ding and   
                    Heng Li and   
                Weiyi Shang and   
          Tse-Hsun (Peter) Chen   Towards Learning Generalizable Code
                                  Embeddings Using Task-agnostic Graph
                                  Convolutional Networks . . . . . . . . . 48:1--48:??
         Tahereh Zohdinasab and   
            Vincenzo Riccio and   
              Alessio Gambi and   
                  Paolo Tonella   Efficient and Effective Feature Space
                                  Exploration for Testing Deep Learning
                                  Systems  . . . . . . . . . . . . . . . . 49:1--49:??
                 Xiaoyu Sun and   
                  Xiao Chen and   
                      Li Li and   
                Haipeng Cai and   
                John Grundy and   
               Jordan Samhi and   
Tegawendé Bissyandé and   
                  Jacques Klein   Demystifying Hidden Sensitive Operations
                                  in Android Apps  . . . . . . . . . . . . 50:1--50:??
                Hugo Araujo and   
      Mohammad Reza Mousavi and   
                Mahsa Varshosaz   Testing, Validation, and Verification of
                                  Robotic and Autonomous Systems: a
                                  Systematic Review  . . . . . . . . . . . 51:1--51:??
            Andrea Fioraldi and   
       Alessandro Mantovani and   
              Dominik Maier and   
              Davide Balzarotti   Dissecting American Fuzzy Lop: a
                                  FuzzBench Evaluation . . . . . . . . . . 52:1--52:??
               Zenong Zhang and   
               George Klees and   
                  Eric Wang and   
              Michael Hicks and   
                      Shiyi Wei   Fuzzing Configurations of Program
                                  Options  . . . . . . . . . . . . . . . . 53:1--53:??
            Andrea Fioraldi and   
       Alessandro Mantovani and   
              Dominik Maier and   
              Davide Balzarotti   Dissecting American Fuzzy Lop --- a
                                  FuzzBench Evaluation --- RCR Report  . . 54:1--54:??
               Zenong Zhang and   
               George Klees and   
                  Eric Wang and   
              Michael Hicks and   
                      Shiyi Wei   Fuzzing Configurations of Program
                                  Options --- RCR Report . . . . . . . . . 55:1--55:??

ACM Transactions on Software Engineering and Methodology
Volume 32, Number 3, July, 2023

           Juan Cruz-Carlon and   
            Mahsa Varshosaz and   
            Claire Le Goues and   
               Andrzej Wasowski   Patching Locking Bugs Statically with
                                  Crayons  . . . . . . . . . . . . . . . . 56:1--56:??
                  Maha Ayub and   
               Tania Saleem and   
            Muhammad Janjua and   
                    Talha Ahmad   Storage State Analysis and Extraction of
                                  Ethereum Blockchain Smart Contracts  . . 57:1--57:??
             Thomas Laurent and   
           Stefan Klikovits and   
              Paolo Arcaini and   
            Fuyuki Ishikawa and   
             Anthony Ventresque   Parameter Coverage for Testing of
                                  Autonomous Driving Systems under
                                  Uncertainty  . . . . . . . . . . . . . . 58:1--58:??
            Michael Pacheco and   
              Gustavo Oliva and   
   Gopi Krishnan Rajbahadur and   
                   Ahmed Hassan   Is My Transaction Done Yet? An Empirical
                                  Study of Transaction Processing Times in
                                  the Ethereum Blockchain Platform . . . . 59:1--59:??
             Nikhil Patnaik and   
               Andrew Dwyer and   
             Joseph Hallett and   
                   Awais Rashid   SLR: From Saltzer and Schroeder to 2021
                                  \ldots 47 Years of Research on the
                                  Development and Validation of Security
                                  API Recommendations  . . . . . . . . . . 60:1--60:??
                  Fuchen Ma and   
                   Meng Ren and   
              Lerong Ouyang and   
             Yuanliang Chen and   
                   Juan Zhu and   
                  Ting Chen and   
               Yingli Zheng and   
                   Xiao Dai and   
                   Yu Jiang and   
                   Jiaguang Sun   Pied-Piper: Revealing the Backdoor
                                  Threats in Ethereum ERC Token Contracts  61:1--61:??
                 Yedi Zhang and   
                   Zhe Zhao and   
               Guangke Chen and   
                    Fu Song and   
                    Taolue Chen   Precise Quantitative Analysis of
                                  Binarized Neural Networks: a BDD-based
                                  Approach . . . . . . . . . . . . . . . . 62:1--62:??
     Francisca Pérez and   
  Raúl Lapeña and   
          Ana Marcén and   
                  Carlos Cetina   How the Quality of Maintenance Tasks is
                                  Affected by Criteria for Selecting
                                  Engineers for Collaboration  . . . . . . 63:1--63:??
               Tamara Lopez and   
                Helen Sharp and   
             Arosha Bandara and   
                  Thein Tun and   
                Mark Levine and   
                Bashar Nuseibeh   Security Responses in Software
                                  Development  . . . . . . . . . . . . . . 64:1--64:??
                Deheng Yang and   
                    Yan Lei and   
              Xiaoguang Mao and   
                   Yuhua Qi and   
                         Xin Yi   Seeing the Whole Elephant:
                                  Systematically Understanding and
                                  Uncovering Evaluation Biases in
                                  Automated Program Repair . . . . . . . . 65:1--65:??
             Chengpeng Wang and   
               Wenyang Wang and   
                 Peisen Yao and   
                Qingkai Shi and   
                Jinguo Zhou and   
                  Xiao Xiao and   
                  Charles Zhang   Anchor: Fast and Precise Value-flow
                                  Analysis for Containers via Memory
                                  Orientation  . . . . . . . . . . . . . . 66:1--66:??
            Andrea Di Sorbo and   
          Fiorella Zampetti and   
             Aaron Visaggio and   
      Massimiliano Di Penta and   
          Sebastiano Panichella   Automated Identification and Qualitative
                                  Characterization of Safety Concerns
                                  Reported in UAV Software Platforms . . . 67:1--67:??
                   Tao Chen and   
                      Miqing Li   Do Performance Aspirations Matter for
                                  Guiding Software Configuration Tuning?
                                  An Empirical Investigation under Dual
                                  Performance Objectives . . . . . . . . . 68:1--68:??
                  Lina Gong and   
             Jingxuan Zhang and   
              Mingqiang Wei and   
             Haoxiang Zhang and   
                   Zhiqiu Huang   What Is the Intended Usage Context of
                                  This Model? An Exploratory Study of
                                  Pre-Trained Models on Various Model
                                  Repositories . . . . . . . . . . . . . . 69:1--69:??
          Chris Karanikolas and   
     Grigoris Dimitroulakos and   
          Konstantinos Masselos   Simulating Software Evolution to
                                  Evaluate the Reliability of Early
                                  Decision-making among Design
                                  Alternatives toward Maintainability  . . 70:1--70:??
                Jun-Wei Lin and   
          Navid Salehnamadi and   
                      Sam Malek   Route: Roads Not Taken in UI Testing . . 71:1--71:??
               Zhichao Chen and   
                Junjie Chen and   
               Weijing Wang and   
                Jianyi Zhou and   
                  Meng Wang and   
                 Xiang Chen and   
                  Shan Zhou and   
                   Jianmin Wang   Exploring Better Black-Box Test Case
                                  Prioritization via Log Analysis  . . . . 72:1--72:??
          Fiorella Zampetti and   
            Damian Tamburri and   
      Sebastiano Panichella and   
        Annibale Panichella and   
            Gerardo Canfora and   
          Massimiliano Di Penta   Continuous Integration and Delivery
                                  Practices for Cyber-Physical Systems: an
                                  Interview-Based Study  . . . . . . . . . 73:1--73:??
         Christiaan Verwijs and   
                   Daniel Russo   A Theory of Scrum Team Effectiveness . . 74:1--74:??
                Michel Nass and   
       Emil Alégroth and   
               Robert Feldt and   
            Maurizio Leotta and   
                  Filippo Ricca   Similarity-based Web Element
                                  Localization for Robust Test Automation  75:1--75:??
                 Yuriy Brun and   
                   Tian Lin and   
    Jessie Elise Somerville and   
            Elisha M. Myers and   
                  Natalie Ebner   Blindspots in Python and Java APIs
                                  Result in Vulnerable Code  . . . . . . . 76:1--76:??
                Eric S. Liu and   
             Dylan A. Lukes and   
            William G. Griswold   Refactoring in Computational Notebooks   77:1--77:??
                 Zhuo Zhang and   
                    Yan Lei and   
                    Ting Su and   
                   Meng Yan and   
              Xiaoguang Mao and   
                         Yue Yu   Influential Global and Local Contexts
                                  Guided Trace Representation for Fault
                                  Localization . . . . . . . . . . . . . . 78:1--78:??
           Mohammed Attaoui and   
                Hazem Fahmy and   
           Fabrizio Pastore and   
                  Lionel Briand   Black-box Safety Analysis and Retraining
                                  of DNNs based on Feature Extraction and
                                  Clustering . . . . . . . . . . . . . . . 79:1--79:??
                Zhipeng Gao and   
                    Xin Xia and   
                   David Lo and   
                John Grundy and   
              Xindong Zhang and   
                 Zhenchang Xing   I Know What You Are Searching for: Code
                                  Snippet Recommendation from Stack
                                  Overflow Posts . . . . . . . . . . . . . 80:1--80:??
              Swaroopa Dola and   
           Matthew B. Dwyer and   
                 Mary Lou Soffa   Input Distribution Coverage: Measuring
                                  Feature Interaction Adequacy in Neural
                                  Network Testing  . . . . . . . . . . . . 81:1--81:??

ACM Transactions on Software Engineering and Methodology
Volume 32, Number 4, July, 2023

                  Mohan Cui and   
              Chengjun Chen and   
                     Hui Xu and   
                   Yangfan Zhou   SafeDrop: Detecting Memory Deallocation
                                  Bugs of Rust Programs via Static
                                  Data-flow Analysis . . . . . . . . . . . 82:1--82:??
           Benjamin Shreeve and   
            Catarina Gralha and   
               Awais Rashid and   
  João Araújo and   
           Miguel Goulão   Making Sense of the Unknown: How
                                  Managers Make Cyber Security Decisions   83:1--83:??
             Negar Ghorbani and   
        Reyhaneh Jabbarvand and   
          Navid Salehnamadi and   
              Joshua Garcia and   
                      Sam Malek   DeltaDroid: Dynamic Delivery Testing in
                                  Android  . . . . . . . . . . . . . . . . 84:1--84:??
               Jeongju Sohn and   
               Sungmin Kang and   
                       Shin Yoo   Arachne: Search-Based Repair of Deep
                                  Neural Networks  . . . . . . . . . . . . 85:1--85:??
            Mitchell Joblin and   
               Barbara Eckl and   
                Thomas Bock and   
            Angelika Schmid and   
             Janet Siegmund and   
                      Sven Apel   Hierarchical and Hybrid Organizational
                                  Structures in Open-source Software
                                  Projects: a Longitudinal Study . . . . . 86:1--86:??
                    Ang Jia and   
                   Ming Fan and   
                  Wuxia Jin and   
                      Xi Xu and   
               Zhaohui Zhou and   
                  Qiyi Tang and   
                    Sen Nie and   
                     Shi Wu and   
                       Ting Liu   $1$-to-$1$ or $1$-to-$n$? Investigating
                                  the Effect of Function Inlining on
                                  Binary Similarity Analysis . . . . . . . 87:1--87:??
           Vittoria Nardone and   
                 Biruk Muse and   
                Mouna Abidi and   
               Foutse Khomh and   
          Massimiliano Di Penta   Video Game Bad Smells: What They Are and
                                  How Developers Perceive Them . . . . . . 88:1--88:??
              Xueling Zhang and   
                 John Heaps and   
               Rocky Slavin and   
                Jianwei Niu and   
              Travis Breaux and   
                   Xiaoyin Wang   DAISY: Dynamic-Analysis-Induced Source
                                  Discovery for Sensitive Data . . . . . . 89:1--89:??
               Huaijin Wang and   
               Pingchuan Ma and   
                 Shuai Wang and   
                  Qiyi Tang and   
                    Sen Nie and   
                         Shi Wu   sem2vec: Semantics-aware Assembly
                                  Tracelet Embedding . . . . . . . . . . . 90:1--90:??
            Mahmoud Alfadel and   
          Diego Elias Costa and   
                Emad Shihab and   
                     Bram Adams   On the Discoverability of npm
                                  Vulnerabilities in \tt Node.js Projects  91:1--91:??
                 Haoye Tian and   
                    Kui Liu and   
                 Yinghua Li and   
 Abdoul Kader Kaboré and   
               Anil Koyuncu and   
               Andrew Habib and   
                      Li Li and   
                 Junhao Wen and   
              Jacques Klein and   
Tegawendé F. Bissyandé   The Best of Both Worlds: Combining
                                  Learned Embeddings with Engineered
                                  Features for Accurate Prediction of
                                  Correct Patches  . . . . . . . . . . . . 92:1--92:??
                Xianhao Jin and   
              Francisco Servant   HybridCISave: a Combined Build and Test
                                  Selection Approach in Continuous
                                  Integration  . . . . . . . . . . . . . . 93:1--93:??
           Daniel Venturini and   
        Filipe Roseiro Cogo and   
           Ivanilton Polato and   
            Marco A. Gerosa and   
           Igor Scaliante Wiese   I Depended on You and You Broke Me: an
                                  Empirical Study of Manifesting Breaking
                                  Changes in Client Packages . . . . . . . 94:1--94:??
                 Liping Han and   
                Shaukat Ali and   
                    Tao Yue and   
              Aitor Arrieta and   
                Maite Arratibel   Uncertainty-Aware Robustness Assessment
                                  of Industrial Elevator Systems . . . . . 95:1--95:??
                    Kui Liu and   
             Jingtang Zhang and   
                      Li Li and   
               Anil Koyuncu and   
                Dongsun Kim and   
                Chunpeng Ge and   
                    Zhe Liu and   
              Jacques Klein and   
Tegawendé F. Bissyandé   Reliable Fix Patterns Inferred from
                                  Static Checkers for Automated Program
                                  Repair . . . . . . . . . . . . . . . . . 96:1--96:??
                 Ting Zhang and   
               Donggyun Han and   
      Venkatesh Vinayakarao and   
       Ivana Clairine Irsan and   
                   Bowen Xu and   
              Ferdian Thung and   
                   David Lo and   
                 Lingxiao Jiang   Duplicate Bug Report Detection: How Far
                                  Are We?  . . . . . . . . . . . . . . . . 97:1--97:??
              Chenguang Zhu and   
              Mengshi Zhang and   
                 Xiuheng Wu and   
                 Xiufeng Xu and   
                          Yi Li   Client-Specific Upgrade Compatibility
                                  Checking via Knowledge-Guided Discovery  98:1--98:??
               Akond Rahman and   
      Shazibul Islam Shamim and   
       Dibyendu Brinto Bose and   
                  Rahul Pandita   Security Misconfigurations in Open
                                  Source Kubernetes Manifests: an
                                  Empirical Study  . . . . . . . . . . . . 99:1--99:??
              Mifta Sintaha and   
                Noor Nashid and   
                     Ali Mesbah   Katana: Dual Slicing Based Context for
                                  Learning Bug Fixes . . . . . . . . . . . 100:1--100:??
                 Dongjie He and   
                  Jingbo Lu and   
                   Jingling Xue   IFDS-based Context Debloating for
                                  Object-Sensitive Pointer Analysis  . . . 101:1--101:??
              Zhaoqiang Guo and   
                 Shiran Liu and   
                 Xutong Liu and   
                    Wei Lai and   
               Mingliang Ma and   
                   Xu Zhang and   
                    Chao Ni and   
                Yibiao Yang and   
                  Yanhui Li and   
                   Lin Chen and   
              Guoqiang Zhou and   
                    Yuming Zhou   Code-line-level Bugginess
                                  Identification: How Far have We Come,
                                  and How Far have We Yet to Go? . . . . . 102:1--102:??
                     Nengkun Yu   Structured Theorem for Quantum Programs
                                  and its Applications . . . . . . . . . . 103:1--103:??
                Hazem Fahmy and   
           Fabrizio Pastore and   
              Lionel Briand and   
                 Thomas Stifter   Simulator-based Explanation and
                                  Debugging of Hazard-triggering Events in
                                  DNN-based Safety-critical Systems  . . . 104:1--104:??
         Houssem Ben Braiek and   
                   Foutse Khomh   Testing Feedforward Neural Networks
                                  Training Programs  . . . . . . . . . . . 105:1--105:??
              Zhenpeng Chen and   
               Jie M. Zhang and   
             Federica Sarro and   
                    Mark Harman   A Comprehensive Empirical Study of Bias
                                  Mitigation Methods for Machine Learning
                                  Classifiers  . . . . . . . . . . . . . . 106:1--106:??
          Deepika Badampudi and   
   Michael Unterkalmsteiner and   
                 Ricardo Britto   Modern Code Reviews --- Survey of
                                  Literature and Practice  . . . . . . . . 107:1--107:??

ACM Transactions on Software Engineering and Methodology
Volume 32, Number 5, September, 2023

     Dulaji Hidellaarachchi and   
                John Grundy and   
               Rashina Hoda and   
                   Ingo Mueller   The Influence of Human Aspects on
                                  Requirements Engineering-related
                                  Activities: Software Practitioners'
                                  Perspective  . . . . . . . . . . . . . . 108:1--108:??
                      Di Wu and   
             Xiao-Yuan Jing and   
               Hongyu Zhang and   
                  Yang Feng and   
                Haowen Chen and   
                Yuming Zhou and   
                      Baowen Xu   Retrieving API Knowledge from Tutorials
                                  and Stack Overflow Based on Natural
                                  Language Queries . . . . . . . . . . . . 109:1--109:??
              Thomas Wolter and   
                Ann Barcomb and   
                Dirk Riehle and   
            Nikolay Harutyunyan   Open Source License Inconsistencies on
                                  GitHub . . . . . . . . . . . . . . . . . 110:1--110:??
      Katharina Müller and   
             Christian Koch and   
                Dirk Riehle and   
              Michael Stops and   
            Nikolay Harutyunyan   Challenges of Working from Home in
                                  Software Development During Covid-19
                                  Lockdowns  . . . . . . . . . . . . . . . 111:1--111:??
          Sofonias Yitagesu and   
             Zhenchang Xing and   
             Xiaowang Zhang and   
               Zhiyong Feng and   
                Xiaohong Li and   
                      Linyi Han   Extraction of Phrase-based Concepts in
                                  Vulnerability Descriptions through
                                  Unsupervised Labeling  . . . . . . . . . 112:1--112:??
                 Qinghua Xu and   
                Shaukat Ali and   
                        Tao Yue   Digital Twin-based Anomaly Detection
                                  with Curriculum Learning in
                                  Cyber-physical Systems . . . . . . . . . 113:1--113:??
              Luigi Lavazza and   
              Angela Locoro and   
                   Geng Liu and   
                   Roberto Meli   Estimating Software Functional Size via
                                  Machine Learning . . . . . . . . . . . . 114:1--114:??
                   Jia Yang and   
                     Cai Fu and   
              Fengyang Deng and   
                   Ming Wen and   
                Xiaowei Guo and   
                   Chuanhao Wan   Toward Interpretable Graph Tensor
                                  Convolution Neural Network for Code
                                  Semantics Embedding  . . . . . . . . . . 115:1--115:??
            Shrikanth N. C. and   
                    Tim Menzies   Assessing the Early Bird Heuristic (for
                                  Predicting Project Quality)  . . . . . . 116:1--116:??
             Matteo Camilli and   
          Carmine Colarusso and   
              Barbara Russo and   
                  Eugenio Zimeo   Actor-Driven Decomposition of
                                  Microservices through Multi-level
                                  Scalability Assessment . . . . . . . . . 117:1--117:??
              Jaydeb Sarker and   
           Asif Kamal Turzo and   
                  Ming Dong and   
                 Amiangshu Bosu   Automated Identification of Toxic Code
                                  Reviews Using ToxiCR . . . . . . . . . . 118:1--118:??
                Xuanzhe Liu and   
                Jinfeng Wen and   
              Zhenpeng Chen and   
                    Ding Li and   
                Junkai Chen and   
                     Yi Liu and   
                 Haoyu Wang and   
                        Xin Jin   FaaSLight: General Application-level
                                  Cold-start Latency Optimization for
                                  Function-as-a-Service in Serverless
                                  Computing  . . . . . . . . . . . . . . . 119:1--119:??
           Matthew C. Davis and   
                Emad Aghayi and   
           Thomas D. Latoza and   
               Xiaoyin Wang and   
              Brad A. Myers and   
                Joshua Sunshine   What's (Not) Working in Programmer User
                                  Studies? . . . . . . . . . . . . . . . . 120:1--120:??
            Florian Sattler and   
        Sebastian Böhm and   
   Philipp Dominik Schubert and   
           Norbert Siegmund and   
                      Sven Apel   SEAL: Integrating Program Analysis and
                                  Repository Mining  . . . . . . . . . . . 121:1--121:??
                  Man Zhang and   
              Andrea Arcuri and   
                Yonggang Li and   
                   Yang Liu and   
                    Kaiming Xue   White-Box Fuzzing RPC-Based APIs with
                                  EvoMaster: an Industrial Case Study  . . 122:1--122:??
                Hongwei Wei and   
                Xiaohong Su and   
                 Cuiyun Gao and   
              Weining Zheng and   
                     Wenxin Tao   A Hypothesis Testing-based Framework for
                                  Software Cross-modal Retrieval in
                                  Heterogeneous Semantic Spaces  . . . . . 123:1--123:??
             Shuncheng Tang and   
               Zhenya Zhang and   
                   Yi Zhang and   
               Jixiang Zhou and   
                    Yan Guo and   
                 Shuang Liu and   
              Shengjian Guo and   
                  Yan-Fu Li and   
                     Lei Ma and   
                Yinxing Xue and   
                       Yang Liu   A Survey on Automated Driving System
                                  Testing: Landscapes and Trends . . . . . 124:1--124:??
                Jialuo Chen and   
                Jingyi Wang and   
                 Xingjun Ma and   
               Youcheng Sun and   
                    Jun Sun and   
               Peixin Zhang and   
                     Peng Cheng   QuoTe: Quality-oriented Testing for Deep
                                  Learning Systems . . . . . . . . . . . . 125:1--125:??
                 Yuan Huang and   
                Hanyang Guo and   
                    Xi Ding and   
                Junhuai Shu and   
             Xiangping Chen and   
                  Xiapu Luo and   
                Zibin Zheng and   
                  Xiaocong Zhou   A Comparative Study on Method Comment
                                  and Inline Comment . . . . . . . . . . . 126:1--126:??
                Meiziniu Li and   
                 Jialun Cao and   
             Yongqiang Tian and   
                  Tsz On Li and   
                   Ming Wen and   
               Shing-Chi Cheung   COMET: Coverage-guided Model Generation
                                  For Deep Learning Library Testing  . . . 127:1--127:??
             Yongqiang Tian and   
                 Wuqi Zhang and   
                   Ming Wen and   
           Shing-Chi Cheung and   
              Chengnian Sun and   
                 Shiqing Ma and   
                       Yu Jiang   Finding Deviated Behaviors of the
                                  Compressed DNN Models for Image
                                  Classifications  . . . . . . . . . . . . 128:1--128:??
                     Hua Qi and   
                Zhijie Wang and   
                   Qing Guo and   
              Jianlang Chen and   
            Felix Juefei-Xu and   
               Fuyuan Zhang and   
                     Lei Ma and   
                   Jianjun Zhao   ArchRepair: Block-Level
                                  Architecture-Oriented Repairing for Deep
                                  Neural Networks  . . . . . . . . . . . . 129:1--129:??
                Zibin Zheng and   
                 Weili Chen and   
               Zhijie Zhong and   
              Zhiguang Chen and   
                      Yutong Lu   Securing the Ethereum from Smart Ponzi
                                  Schemes: Identification Using Static
                                  Features . . . . . . . . . . . . . . . . 130:1--130:??
                Jinfeng Wen and   
              Zhenpeng Chen and   
                    Xin Jin and   
                    Xuanzhe Liu   Rise of the Planet of Serverless
                                  Computing: a Systematic Review . . . . . 131:1--131:??
             Adrian Herrera and   
              Mathias Payer and   
              Antony L. Hosking   DatAFLow: Toward a Data-Flow-Guided
                                  Fuzzer . . . . . . . . . . . . . . . . . 132:1--132:??
             Adrian Herrera and   
              Mathias Payer and   
              Antony L. Hosking   DatAFLow: Toward a Data-flow-guided
                                  Fuzzer . . . . . . . . . . . . . . . . . 133:1--133:??

ACM Transactions on Software Engineering and Methodology
Volume 32, Number 6, November, 2023

          Suvodeep Majumder and   
      Joymallya Chakraborty and   
                Gina R. Bai and   
          Kathryn T. Stolee and   
                    Tim Menzies   Fair Enough: Searching for Sufficient
                                  Measures of Fairness . . . . . . . . . . 134:1--134:??
                Junjie Chen and   
                Yihua Liang and   
              Qingchao Shen and   
               Jiajun Jiang and   
                   Shuochuan Li   Toward Understanding Deep Learning
                                  Framework Bugs . . . . . . . . . . . . . 135:1--135:??
              Foyzul Hassan and   
                    Na Meng and   
                   Xiaoyin Wang   UniLoc: Unified Fault Localization of
                                  Continuous Integration Failures  . . . . 136:1--136:??
               Mengdi Zhang and   
                    Jun Sun and   
                Jingyi Wang and   
                       Bing Sun   TestSGD: Interpretable Testing of Neural
                                  Networks against Subtle Group
                                  Discrimination . . . . . . . . . . . . . 137:1--137:??
                Thomas Bock and   
              Nils Alznauer and   
            Mitchell Joblin and   
                      Sven Apel   Automatic Core-Developer Identification
                                  on GitHub: a Validation Study  . . . . . 138:1--138:??
                  Man Zhang and   
               Asma Belhadi and   
                  Andrea Arcuri   JavaScript SBST Heuristics to Enable
                                  Effective Fuzzing of NodeJS Web APIs . . 139:1--139:??
                 Chong Wang and   
                   Xin Peng and   
             Zhenchang Xing and   
                  Yue Zhang and   
                Mingwei Liu and   
                   Rong Luo and   
                    Xiujie Meng   XCoS: Explainable Code Search Based on
                                  Query Scoping and Knowledge Graph  . . . 140:1--140:??
                 Maram Assi and   
              Safwat Hassan and   
          Stefanos Georgiou and   
                       Ying Zou   Predicting the Change Impact of
                                  Resolving Defects by Leveraging the
                                  Topics of Issue Reports in Open Source
                                  Software Systems . . . . . . . . . . . . 141:1--141:??
              Giovanni Rosa and   
          Simone Scalabrino and   
            Gabriele Bavota and   
                  Rocco Oliveto   What Quality Aspects Influence the
                                  Adoption of Docker Images? . . . . . . . 142:1--142:??
                     Jia Li and   
                      Ge Li and   
                    Zhuo Li and   
                    Zhi Jin and   
                    Xing Hu and   
                Kechi Zhang and   
                       Zhiyi Fu   CodeEditor: Learning to Edit Source Code
                                  with Pre-trained Models  . . . . . . . . 143:1--143:??
                  Man Zhang and   
                  Andrea Arcuri   Open Problems in Fuzzing RESTful APIs: a
                                  Comparison of Tools  . . . . . . . . . . 144:1--144:??
               Sahil Suneja and   
               Yufan Zhuang and   
               Yunhui Zheng and   
                 Jim Laredo and   
          Alessandro Morari and   
                 Udayan Khurana   Incorporating Signal Awareness in Source
                                  Code Modeling: an Application to
                                  Vulnerability Detection  . . . . . . . . 145:1--145:??
       Mohamed Amine Batoun and   
                Ka Lai Yung and   
                  Yuan Tian and   
                Mohammed Sayagh   An Empirical Study on GitHub Pull
                                  Requests' Reactions  . . . . . . . . . . 146:1--146:??
                 Qing Huang and   
               Dianshu Liao and   
             Zhenchang Xing and   
              Zhengkang Zuo and   
             Changjing Wang and   
                        Xin Xia   Semantic-Enriched Code Knowledge Graph
                                  to Reveal Unknowns in Smart Contract
                                  Code Reuse . . . . . . . . . . . . . . . 147:1--147:??
             Jingxuan Zhang and   
                Junpeng Luo and   
               Jiahui Liang and   
                  Lina Gong and   
                   Zhiqiu Huang   An Accurate Identifier Renaming
                                  Prediction and Suggestion Approach . . . 148:1--148:??
         Abbas Javan Jafari and   
          Diego Elias Costa and   
                Emad Shihab and   
               Rabe Abdalkareem   Dependency Update Strategies and Package
                                  Characteristics  . . . . . . . . . . . . 149:1--149:??
              Zhengyuan Wei and   
               Haipeng Wang and   
               Imran Ashraf and   
                Wing-Kwong Chan   DeepPatch: Maintaining Deep Learning
                                  Model Programs to Retain Standard
                                  Accuracy with Substantial Robustness
                                  Improvement  . . . . . . . . . . . . . . 150:1--150:??
               Canh Minh Do and   
                  Yati Phyo and   
       Adrián Riesco and   
                 Kazuhiro Ogata   Optimization Techniques for Model
                                  Checking Leads-to Properties in a
                                  Stratified Way . . . . . . . . . . . . . 151:1--151:??
                Weifeng Sun and   
                   Meng Yan and   
               Zhongxin Liu and   
                    Xin Xia and   
                    Yan Lei and   
                       David Lo   Revisiting the Identification of the
                                  Co-evolution of Production and Test Code 152:1--152:??
                     Ran Mo and   
                  Yao Zhang and   
                Yushuo Wang and   
               Siyuan Zhang and   
                   Pu Xiong and   
                Zengyang Li and   
                      Yang Zhao   Exploring the Impact of Code Clones on
                                  Deep Learning Software . . . . . . . . . 153:1--153:??
               Yuheng Huang and   
                     Lei Ma and   
                    Yuanchun Li   PatchCensor: Patch Robustness
                                  Certification for Transformers via
                                  Exhaustive Testing . . . . . . . . . . . 154:1--154:??
  Wiebke (Toussaint) Hutiri and   
              Aaron Yi Ding and   
               Fahim Kawsar and   
                   Akhil Mathur   Tiny, Always-on, and Fragile: Bias
                                  Propagation through Design Choices in
                                  On-device Machine Learning Workflows . . 155:1--155:??
                Xuanzhe Liu and   
                Diandian Gu and   
              Zhenpeng Chen and   
                Jinfeng Wen and   
                 Zili Zhang and   
                     Yun Ma and   
                 Haoyu Wang and   
                        Xin Jin   Rise of Distributed Deep Learning
                                  Training in the Big Model Era: From a
                                  Software Engineering Perspective . . . . 156:1--156:??
              Shangwen Wang and   
                   Ming Wen and   
                     Bo Lin and   
                 Yepang Liu and   
Tegawendé F. Bissyandé and   
                  Xiaoguang Mao   Pre-implementation Method Name
                                  Prediction for Object-oriented
                                  Programming  . . . . . . . . . . . . . . 157:1--157:??
               Shouguo Yang and   
                 Zhengzi Xu and   
                  Yang Xiao and   
                   Zhe Lang and   
                   Wei Tang and   
                   Yang Liu and   
               Zhiqiang Shi and   
                    Hong Li and   
                      Limin Sun   Towards Practical Binary Code Similarity
                                  Detection: Vulnerability Verification
                                  via Patch Semantic Analysis  . . . . . . 158:1--158:??
    Mohammad Masudur Rahman and   
                Chanchal K. Roy   A Systematic Review of Automated Query
                                  Reformulations in Source Code Search . . 159:1--159:??
                Shisong Qin and   
                     Fan Hu and   
                   Zheyu Ma and   
                Bodong Zhao and   
               Tingting Yin and   
                     Chao Zhang   NSFuzz: Towards Efficient and
                                  State-Aware Network Service Fuzzing  . . 160:1--160:??
                     Fan Hu and   
                Shisong Qin and   
                   Zheyu Ma and   
                Bodong Zhao and   
               Tingting Yin and   
                     Chao Zhang   NSFuzz: Towards Efficient and
                                  State-Aware Network Service Fuzzing ---
                                  RCR Report . . . . . . . . . . . . . . . 161:1--161:??


ACM Transactions on Software Engineering and Methodology
Volume 33, Number 1, January, 2024

                  Mauro Pezz\`e   Editorial: Toward the Future with Eight
                                  Issues Per Year  . . . . . . . . . . . . 1:1--1:??
               Shouguo Yang and   
              Chaopeng Dong and   
                  Yang Xiao and   
                Yiran Cheng and   
               Zhiqiang Shi and   
                     Zhi Li and   
                      Limin Sun   Asteria-Pro: Enhancing Deep
                                  Learning-based Binary Code Similarity
                                  Detection by Incorporating Domain
                                  Knowledge  . . . . . . . . . . . . . . . 1:1--1:??
                Xuanzhe Liu and   
               Chengxu Yang and   
                    Ding Li and   
                 Yuhan Zhou and   
                 Shaofei Li and   
                 Jiali Chen and   
                  Zhenpeng Chen   Adonis: Practical and Efficient Control
                                  Flow Recovery through OS-level Traces    2:1--2:??
                    Suyu Ma and   
              Chunyang Chen and   
        Hourieh Khalajzadeh and   
                    John Grundy   A First Look at Dark Mode in Real-world
                                  Android Apps . . . . . . . . . . . . . . 3:1--3:??
                 Jiarong Wu and   
                   Lili Wei and   
               Yanyan Jiang and   
           Shing-Chi Cheung and   
                  Luyao Ren and   
                       Chang Xu   Programming by Example Made Easy . . . . 4:1--4:??
          Narjes Bessghaier and   
            Mohammed Sayagh and   
                   Ali Ouni and   
           Mohamed Wiem Mkaouer   What Constitutes the Deployment and
                                  Runtime Configuration System? An
                                  Empirical Study on OpenStack Projects    5:1--5:??
                 Qing Huang and   
                Yanbang Sun and   
             Zhenchang Xing and   
                     Min Yu and   
                   Xiwei Xu and   
                     Qinghua Lu   API Entity and Relation Joint Extraction
                                  from Text via Dynamic Prompt-tuned
                                  Language Model . . . . . . . . . . . . . 6:1--6:??
                    Jeho Oh and   
                 Don Batory and   
           Rubén Heradio   Finding Near-optimal Configurations in
                                  Colossal Spaces with Statistical
                                  Guarantees . . . . . . . . . . . . . . . 7:1--7:??
               Chang-Ai Sun and   
                 Hepeng Dai and   
                  Ning Geng and   
                   Huai Liu and   
            Tsong Yueh Chen and   
                    Peng Wu and   
                    Yan Cai and   
                    Jinqiu Wang   An Interleaving Guided Metamorphic
                                  Testing Approach for Concurrent Programs 8:1--8:??
              Toni Taipalus and   
                   Hilkka Grahn   Framework for SQL Error Message Design:
                                  a Data-Driven Approach . . . . . . . . . 9:1--9:??
            Andrew G. Clark and   
             Michael Foster and   
          Benedikt Prifling and   
            Neil Walkinshaw and   
          Robert M. Hierons and   
             Volker Schmidt and   
               Robert D. Turner   Testing Causality in Scientific
                                  Modelling Software . . . . . . . . . . . 10:1--10:??
              Jianzhong Liu and   
                Yuheng Shen and   
                    Yiru Xu and   
                    Hao Sun and   
                       Yu Jiang   Horus: Accelerating Kernel Fuzzing
                                  through Efficient Host--VM Memory Access
                                  Procedures . . . . . . . . . . . . . . . 11:1--11:??
             Sina Entekhabi and   
         Wojciech Mostowski and   
          Mohammad Reza Mousavi   Automated and Efficient Test-Generation
                                  for Grid-Based Multiagent Systems:
                                  Comparing Random Input Filtering versus
                                  Constraint Solving . . . . . . . . . . . 12:1--12:??
             Carlo A. Furia and   
             Richard Torkar and   
                   Robert Feldt   Towards Causal Analysis of Empirical
                                  Software Engineering Data: The Impact of
                                  Programming Languages on Coding
                                  Competitions . . . . . . . . . . . . . . 13:1--13:??
             Olivier Nourry and   
             Yutaro Kashiwa and   
                    Bin Lin and   
            Gabriele Bavota and   
              Michele Lanza and   
                 Yasutaka Kamei   The Human Side of Fuzzing: Challenges
                                  Faced by Developers during Fuzzing
                                  Activities . . . . . . . . . . . . . . . 14:1--14:??
                    Pei Liu and   
                Yanjie Zhao and   
             Mattia Fazzini and   
                Haipeng Cai and   
                John Grundy and   
                          Li Li   Automatically Detecting Incompatible
                                  Android APIs . . . . . . . . . . . . . . 15:1--15:??
              Hengcheng Zhu and   
                   Lili Wei and   
           Valerio Terragni and   
                 Yepang Liu and   
           Shing-Chi Cheung and   
                 Jiarong Wu and   
                  Qin Sheng and   
                 Bing Zhang and   
                    Lihong Song   StubCoder: Automated Generation and
                                  Repair of Stub Code for Mock Objects . . 16:1--16:??
             Yongqiang Tian and   
               Xueyan Zhang and   
                 Yiwen Dong and   
                Zhenyang Xu and   
             Mengxiao Zhang and   
                   Yu Jiang and   
           Shing-Chi Cheung and   
                  Chengnian Sun   On the Caching Schemes to Speed Up
                                  Program Reduction  . . . . . . . . . . . 17:1--17:??
          Claudio Mandrioli and   
        Max Nyberg Carlsson and   
                 Martina Maggio   Testing Abstractions for Cyber-Physical
                                  Control Systems  . . . . . . . . . . . . 18:1--18:??
                  Wang Fang and   
             Mingsheng Ying and   
                      Xiaodi Wu   Differentiable Quantum Programming with
                                  Unbounded Loops  . . . . . . . . . . . . 19:1--19:??
              Yuanhang Yang and   
                     Wei He and   
                 Cuiyun Gao and   
                 Zenglin Xu and   
                    Xin Xia and   
                    Chuanyi Liu   TopicAns: Topic-informed Architecture
                                  for Answer Recommendation on Technical
                                  Q&A Site  . . . . . . . . . . . . . . . . 20:1--20:??
                 Tianlin Li and   
                Xiaofei Xie and   
                  Jian Wang and   
                   Qing Guo and   
                 Aishan Liu and   
                     Lei Ma and   
                       Yang Liu   Faire: Repairing Fairness of Neural
                                  Networks via Neuron Condition Synthesis  21:1--21:??
                 Xueqi Dang and   
                 Yinghua Li and   
             Mike Papadakis and   
              Jacques Klein and   
Tegawendé F. Bissyandé and   
                  Yves Le Traon   GraphPrior: Mutation-based Test Input
                                  Prioritization for Graph Neural Networks 22:1--22:??
                  Yuhan Zhi and   
                Xiaofei Xie and   
                  Chao Shen and   
                    Jun Sun and   
               Xiaoyu Zhang and   
                  Xiaohong Guan   Seed Selection for Testing Deep Neural
                                  Networks . . . . . . . . . . . . . . . . 23:1--23:??
                Hanyang Guo and   
             Xiangping Chen and   
                 Yuan Huang and   
                Yanlin Wang and   
                    Xi Ding and   
                Zibin Zheng and   
              Xiaocong Zhou and   
                  Hong-Ning Dai   Snippet Comment Generation Based on Code
                                  Context Expansion  . . . . . . . . . . . 24:1--24:??
                   Qiang Hu and   
                 Yuejun Guo and   
                Xiaofei Xie and   
               Maxime Cordy and   
             Mike Papadakis and   
                  Yves Le Traon   LaF: Labeling-free Model Selection for
                                  Automated Deep Neural Network Reusing    25:1--25:??
                     Han Hu and   
                Yujin Huang and   
               Qiuyuan Chen and   
             Terry Yue Zhuo and   
                  Chunyang Chen   A First Look at On-device Models in iOS
                                  Apps . . . . . . . . . . . . . . . . . . 26:1--26:??
          Amid Golmohammadi and   
                  Man Zhang and   
                  Andrea Arcuri   Testing RESTful APIs: a Survey . . . . . 27:1--27:??
              Michael Weiss and   
                  Paolo Tonella   Adopting Two Supervisors for Efficient
                                  Use of Large-Scale Remote Deep Neural
                                  Networks . . . . . . . . . . . . . . . . 28:1--28:??
              Michael Weiss and   
                  Paolo Tonella   Adopting Two Supervisors for Efficient
                                  Use of Large-Scale Remote Deep Neural
                                  Networks --- RCR Report  . . . . . . . . 29:1--29:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 2, February, 2024

                    Yu Zhou and   
                Weilin Zhan and   
                      Zi Li and   
               Tingting Han and   
                Taolue Chen and   
                    Harald Gall   DRIVE: Dockerfile Rule Mining and
                                  Violation Detection  . . . . . . . . . . 30:1--30:??
                 Qing Huang and   
              Zhiqiang Yuan and   
             Zhenchang Xing and   
                   Xin Peng and   
                   Xiwei Xu and   
                     Qinghua Lu   FQN Inference in Partial Code by
                                  Prompt-tuned Language Model of Code  . . 31:1--31:??
                Jaekwon Lee and   
            Seung Yeob Shin and   
           Lionel C. Briand and   
                   Shiva Nejati   Probabilistic Safe WCET Estimation for
                                  Weakly Hard Real-time Systems at Design
                                  Stages . . . . . . . . . . . . . . . . . 32:1--32:??
            Knut H. Rolland and   
           Brian Fitzgerald and   
    Torgeir Dingsòyr and   
                 Klaas-Jan Stol   Acrobats and Safety Nets: Problematizing
                                  Large-Scale Agile Software Development   33:1--33:??
               Xiaoye Zheng and   
                Zhiyuan Wan and   
                  Yun Zhang and   
                  Rui Chang and   
                       David Lo   A Closer Look at the Security Risks in
                                  the Rust Ecosystem . . . . . . . . . . . 34:1--34:??
          Claudio Mandrioli and   
            Seung Yeob Shin and   
             Martina Maggio and   
         Domenico Bianculli and   
                  Lionel Briand   Stress Testing Control Loops in
                                  Cyber-physical Systems . . . . . . . . . 35:1--35:??
   Sayedhassan Khatoonabadi and   
          Diego Elias Costa and   
             Suhaib Mujahid and   
                    Emad Shihab   Understanding the Helpfulness of Stale
                                  Bot for Pull-Based Development: an
                                  Empirical Study of 20 Large Open-Source
                                  Projects . . . . . . . . . . . . . . . . 36:1--36:??
               Yixuan Zhang and   
              Shangtong Cao and   
                 Haoyu Wang and   
              Zhenpeng Chen and   
                  Xiapu Luo and   
               Dongliang Mu and   
                     Yun Ma and   
                 Gang Huang and   
                    Xuanzhe Liu   Characterizing and Detecting WebAssembly
                                  Runtime Bugs . . . . . . . . . . . . . . 37:1--37:??
                Zishuo Ding and   
                Yiming Tang and   
               Xiaoyu Cheng and   
                    Heng Li and   
                    Weiyi Shang   LoGenText-Plus: Improving Neural Machine
                                  Translation Based Logging Texts
                                  Generation with Syntactic Templates  . . 38:1--38:??
                 Weishi Shi and   
              Heather Moses and   
                      Qi Yu and   
         Samuel Malachowsky and   
                Daniel E. Krutz   ALL: Supporting Experiential
                                  Accessibility Education and Inclusive
                                  Software Development . . . . . . . . . . 39:1--39:??
           Federico Formica and   
                   Tony Fan and   
                 Claudio Menghi   Search-Based Software Testing Driven by
                                  Automatically Generated and Manually
                                  Defined Fitness Functions  . . . . . . . 40:1--40:??
               Jiajun Jiang and   
                Yumeng Wang and   
                Junjie Chen and   
                   Delin Lv and   
                   Mengjiao Liu   Variable-based Fault Localization via
                                  Enhanced Decision Tree . . . . . . . . . 41:1--41:??
                  Wei Huang and   
                Xingyu Zhao and   
                 Alec Banks and   
               Victoria Cox and   
                  Xiaowei Huang   Hierarchical Distribution-aware Testing
                                  of Deep Learning . . . . . . . . . . . . 42:1--42:??
                 Sicong Cao and   
               Xiaobing Sun and   
                    Lili Bo and   
                 Rongxin Wu and   
                     Bin Li and   
                 Xiaoxue Wu and   
                Chuanqi Tao and   
                  Tao Zhang and   
                        Wei Liu   Learning to Detect Memory-related
                                  Vulnerabilities  . . . . . . . . . . . . 43:1--43:??
         Elkhan Ismayilzada and   
         Md Mazba Ur Rahman and   
                Dongsun Kim and   
                     Jooyong Yi   Poracle: Testing Patches under
                                  Preservation Conditions to Combat the
                                  Overfitting Problem of Program Repair    44:1--44:??
              Yuanhang Zhou and   
                  Fuchen Ma and   
             Yuanliang Chen and   
                   Meng Ren and   
                       Yu Jiang   CLFuzz: Vulnerability Detection of
                                  Cryptographic Algorithm Implementation
                                  via Semantic-aware Fuzzing . . . . . . . 45:1--45:??
                   Yi Xiang and   
                  Han Huang and   
                   Sizhe Li and   
                  Miqing Li and   
                  Chuan Luo and   
                   Xiaowei Yang   Automated Test Suite Generation for
                                  Software Product Lines Based on
                                  Quality-Diversity Optimization . . . . . 46:1--46:??
                     Han Hu and   
                 Ruiqi Dong and   
                John Grundy and   
           Thai Minh Nguyen and   
                Huaxiao Liu and   
                  Chunyang Chen   Automated Mapping of Adaptive App GUIs
                                  from Phones to TVs . . . . . . . . . . . 47:1--47:??
                 Yuejun Guo and   
                   Qiang Hu and   
                Xiaofei Xie and   
               Maxime Cordy and   
             Mike Papadakis and   
                  Yves Le Traon   KAPE: $k$ NN-based Performance Testing
                                  for Deep Code Search . . . . . . . . . . 48:1--48:??
                 Jiamou Sun and   
             Zhenchang Xing and   
                    Xin Xia and   
                 Qinghua Lu and   
                   Xiwei Xu and   
                     Liming Zhu   Aspect-level Information Discrepancies
                                  across Heterogeneous Vulnerability
                                  Reports: Severity, Types and Detection
                                  Methods  . . . . . . . . . . . . . . . . 49:1--49:??
                 Jiawei Liu and   
               Yuheng Huang and   
                Zhijie Wang and   
                     Lei Ma and   
              Chunrong Fang and   
               Mingzheng Gu and   
                Xufan Zhang and   
                    Zhenyu Chen   Generation-based Differential Fuzzing
                                  for Deep Learning Libraries  . . . . . . 50:1--50:??
                  Jiho Shin and   
                  Moshi Wei and   
                Junjie Wang and   
                    Lin Shi and   
                      Song Wang   The Good, the Bad, and the Missing:
                                  Neural Code Generation for Machine
                                  Learning Tasks . . . . . . . . . . . . . 51:1--51:??
                  Siyuan Li and   
               Yongpan Wang and   
              Chaopeng Dong and   
               Shouguo Yang and   
                    Hong Li and   
                    Hao Sun and   
                   Zhe Lang and   
                 Zuxin Chen and   
                Weijie Wang and   
               Hongsong Zhu and   
                      Limin Sun   LibAM: an Area Matching Framework for
                                  Detecting Third-Party Libraries in
                                  Binaries . . . . . . . . . . . . . . . . 52:1--52:??
               Rafael Dutra and   
             Rahul Gopinath and   
                 Andreas Zeller   FormatFuzzer: Effective Fuzzing of
                                  Binary File Formats  . . . . . . . . . . 53:1--53:??
                  Yutao Xie and   
                  Jiayi Lin and   
                 Hande Dong and   
                  Lei Zhang and   
                    Zhonghai Wu   Survey of Code Search Based on Deep
                                  Learning . . . . . . . . . . . . . . . . 54:1--54:??
              Quanjun Zhang and   
              Chunrong Fang and   
                 Yuxiang Ma and   
                Weisong Sun and   
                    Zhenyu Chen   A Survey of Learning-based Automated
                                  Program Repair . . . . . . . . . . . . . 55:1--55:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 3, March, 2024

                    Ya Xiao and   
                Wenjia Song and   
               Salman Ahmed and   
                 Xinyang Ge and   
            Bimal Viswanath and   
                    Na Meng and   
           Danfeng (Daphne) Yao   Measurement of Embedding Choices on
                                  Cryptographic API Completion Tasks . . . 56:1--56:??
               Daniel Russo and   
           Paul H. P. Hanel and   
               Niels Van Berkel   Understanding Developers Well-Being and
                                  Productivity: a 2-year Longitudinal
                                  Analysis during the COVID-19 Pandemic    57:1--57:??
              Andre Lustosa and   
                    Tim Menzies   Learning from Very Little Data: On the
                                  Value of Landscape Analysis for
                                  Predicting Software Project Health . . . 58:1--58:??
               Yanming Yang and   
                    Xing Hu and   
                    Xin Xia and   
                    Xiaohu Yang   The Lost World: Characterizing and
                                  Detecting Undiscovered Test Smells . . . 59:1--59:??
                 Guang Yang and   
                    Yu Zhou and   
                Wenhua Yang and   
                    Tao Yue and   
                 Xiang Chen and   
                    Taolue Chen   How Important Are Good Method Names in
                                  Neural Code Generation? A Model
                                  Robustness Perspective . . . . . . . . . 60:1--60:??
               Jiajun Jiang and   
                Junjie Yang and   
               Yingyi Zhang and   
                   Zan Wang and   
                  Hanmo You and   
                    Junjie Chen   A Post-training Framework for Improving
                                  the Performance of Deep Learning Models
                                  via Model Transformation . . . . . . . . 61:1--61:??
                     Jia Li and   
                    Zhuo Li and   
            Huangzhao Zhang and   
                      Ge Li and   
                    Zhi Jin and   
                    Xing Hu and   
                        Xin Xia   Poison Attack and Poison Detection on
                                  Deep Source Code Processing Models . . . 62:1--62:??
                     Wen Li and   
              Austin Marino and   
                Haoran Yang and   
                    Na Meng and   
                      Li Li and   
                    Haipeng Cai   How Are Multilingual Systems
                                  Constructed: Characterizing Language Use
                                  and Selection in Open-Source
                                  Multilingual Software  . . . . . . . . . 63:1--63:??
       Sangeeth Kochanthara and   
             Tajinder Singh and   
           Alexandru Forrai and   
                  Loek Cleophas   Safety of Perception Systems for
                                  Automated Driving: a Case Study on
                                  Apollo . . . . . . . . . . . . . . . . . 64:1--64:??
                Armin Zirak and   
                   Hadi Hemmati   Improving Automated Program Repair with
                                  Domain Adaptation  . . . . . . . . . . . 65:1--65:??
              Wensheng Tang and   
                 Dejun Dong and   
                  Shijie Li and   
             Chengpeng Wang and   
                 Peisen Yao and   
                Jinguo Zhou and   
                  Charles Zhang   Octopus: Scaling Value-Flow Analysis via
                                  Parallel Collection of Realizable Path
                                  Conditions . . . . . . . . . . . . . . . 66:1--66:??
                Tingwei Zhu and   
                   Zhong Li and   
                 Minxue Pan and   
               Chaoxuan Shi and   
                 Tian Zhang and   
                     Yu Pei and   
                    Xuandong Li   Deep Is Better? An Empirical Comparison
                                  of Information Retrieval and Deep
                                  Learning Approaches to Code
                                  Summarization  . . . . . . . . . . . . . 67:1--67:??
                   Zhe Zhao and   
               Guangke Chen and   
                   Tong Liu and   
                 Taishan Li and   
                    Fu Song and   
                Jingyi Wang and   
                        Jun Sun   Attack as Detection: Using Adversarial
                                  Attack Methods to Detect Abnormal
                                  Examples . . . . . . . . . . . . . . . . 68:1--68:??
                   Junda He and   
                   Xin Zhou and   
                   Bowen Xu and   
                 Ting Zhang and   
                  Kisub Kim and   
                  Zhou Yang and   
              Ferdian Thung and   
       Ivana Clairine Irsan and   
                       David Lo   Representation Learning for Stack
                                  Overflow Posts: How Far Are We?  . . . . 69:1--69:??
                 Binhang Qi and   
                Hailong Sun and   
               Hongyu Zhang and   
                      Xiang Gao   Reusing Convolutional Neural Network
                                  Models through Modularization and
                                  Composition  . . . . . . . . . . . . . . 70:1--70:??
      Md Rakib Hossain Misu and   
                Rohan Achar and   
              Cristina V. Lopes   SourcererJBF: a Java Build Framework For
                                  Large-Scale Compilation  . . . . . . . . 71:1--71:??
                  Zhihao Li and   
                 Chuanyi Li and   
                    Ze Tang and   
              Wanhong Huang and   
                  Jidong Ge and   
                    Bin Luo and   
                 Vincent Ng and   
                  Ting Wang and   
                 Yucheng Hu and   
                 Xiaopeng Zhang   PTM-APIRec: Leveraging Pre-trained
                                  Models of Source Code in API
                                  Recommendation . . . . . . . . . . . . . 72:1--72:??
            Matteo Biagiola and   
                  Paolo Tonella   Testing of Deep Reinforcement Learning
                                  Agents with Surrogate Models . . . . . . 73:1--73:??
             Luca Giamattei and   
          Antonio Guerriero and   
       Roberto Pietrantuono and   
                  Stefano Russo   Causality-driven Testing of Autonomous
                                  Driving Systems  . . . . . . . . . . . . 74:1--74:??
                Weisong Sun and   
              Chunrong Fang and   
                Yuchen Chen and   
              Quanjun Zhang and   
               Guanhong Tao and   
                   Yudu You and   
                 Tingxu Han and   
                   Yifei Ge and   
                  Yuling Hu and   
                    Bin Luo and   
                    Zhenyu Chen   An Extractive-and-Abstractive Framework
                                  for Source Code Summarization  . . . . . 75:1--75:??
                Will Leeson and   
               Matthew B. Dwyer   Algorithm Selection for Software
                                  Verification Using Graph Neural Networks 76:1--76:??
            Hichem Belgacem and   
                Xiaochen Li and   
         Domenico Bianculli and   
                  Lionel Briand   Learning-based Relaxation of
                                  Completeness Requirements for Data Entry
                                  Forms  . . . . . . . . . . . . . . . . . 77:1--77:??
                 Michael Fu and   
                 Van Nguyen and   
  Chakkrit Tantithamthavorn and   
                 Dinh Phung and   
                       Trung Le   Vision Transformer Inspired Automated
                                  Vulnerability Repair . . . . . . . . . . 78:1--78:??
                Pengfei Gao and   
                    Fu Song and   
                    Taolue Chen   Compositional Verification of
                                  First-Order Masking Countermeasures
                                  against Power Side-Channel Attacks . . . 79:1--79:??
                Aastha Pant and   
               Rashina Hoda and   
         Simone V. Spiegler and   
  Chakkrit Tantithamthavorn and   
                   Burak Turhan   Ethics in the Age of AI: an Analysis of
                                  AI Practitioners' Awareness and
                                  Challenges . . . . . . . . . . . . . . . 80:1--80:??
           Johan Cederbladh and   
          Antonio Cicchetti and   
           Jagadish Suryadevara   Early Validation and Verification of
                                  System Behaviour in Model-based Systems
                                  Engineering: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 81:1--81:??
               Daniel Russo and   
           Paul H. P. Hanel and   
               Niels van Berkel   Understanding Developers Well-being and
                                  Productivity: a 2-year Longitudinal
                                  Analysis during the COVID-19
                                  Pandemic-RCR Report  . . . . . . . . . . 82:1--82:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 4, May, 2024

                  Mauro Pezz\`e   Editorial: ICSE and the Incredible
                                  Contradictions of Software Engineering   83:1--83:??
                Weifeng Pan and   
        Marouane Kessentini and   
                   Hua Ming and   
                   Zijiang Yang   EASE: an Effort-aware Extension of
                                  Unsupervised Key Class Identification
                                  Approaches . . . . . . . . . . . . . . . 84:1--84:??
            Chidera Biringa and   
                Gökhan Kul   PACE: a Program Analysis Framework for
                                  Continuous Performance Prediction  . . . 85:1--85:??
                 Peng Zhang and   
                  Yang Wang and   
                 Xutong Liu and   
                    Zeyu Lu and   
                Yibiao Yang and   
                  Yanhui Li and   
                   Lin Chen and   
                Ziyuan Wang and   
               Chang-Ai Sun and   
                    Xiao Yu and   
                    Yuming Zhou   Assessing Effectiveness of Test Suites:
                                  What Do We Know and What Should We Do?   86:1--86:??
            Alessio Ferrari and   
            Thaide Huichapa and   
            Paola Spoletini and   
            Nicole Novielli and   
               Davide Fucci and   
                Daniela Girardi   Using Voice and Biofeedback to Predict
                                  User Engagement during Product Feedback
                                  Interviews . . . . . . . . . . . . . . . 87:1--87:??
          Sai Anirudh Karre and   
             Y. Raghu Reddy and   
                  Raghav Mittal   RE Methods for Virtual Reality Software
                                  Product Development: a Mapping Study . . 88:1--88:??
                   Zhe Chen and   
                    Rui Yan and   
                  Yingzi Ma and   
                  Yulei Sui and   
                   Jingling Xue   A Smart Status Based Monitoring
                                  Algorithm for the Dynamic Analysis of
                                  Memory Safety  . . . . . . . . . . . . . 89:1--89:??
  Pablo C. Cañizares and   
Jose María López-Morales and   
    Sara Pérez-Soler and   
              Esther Guerra and   
                   Juan de Lara   Measuring and Clustering Heterogeneous
                                  Chatbot Designs  . . . . . . . . . . . . 90:1--90:??
        Bentley James Oakes and   
           Michalis Famelis and   
                Houari Sahraoui   Building Domain-Specific Machine
                                  Learning Workflows: a Conceptual
                                  Framework for the State of the Practice  91:1--91:??
              Changjie Shao and   
                  Gaolei Li and   
                     Jun Wu and   
                       Xi Zheng   Exploring Semantic Redundancy using
                                  Backdoor Triggers: a Complementary
                                  Insight into the Challenges Facing
                                  DNN-based Software Vulnerability
                                  Detection  . . . . . . . . . . . . . . . 92:1--92:??
           Baharin A. Jodat and   
           Abhishek Chandar and   
               Shiva Nejati and   
             Mehrdad Sabetzadeh   Test Generation Strategies for Building
                                  Failure Models and Explaining Spurious
                                  Failures . . . . . . . . . . . . . . . . 93:1--93:??
          Neelofar Neelofar and   
                  Aldeida Aleti   Identifying and Explaining
                                  Safety-critical Scenarios for Autonomous
                                  Vehicles via Key Features  . . . . . . . 94:1--94:??
                Donato Clun and   
              Donghwan Shin and   
            Antonio Filieri and   
             Domenico Bianculli   Rigorous Assessment of Model Inference
                                  Accuracy using Language Cardinality  . . 95:1--95:??
            Anshunkang Zhou and   
                   Yikun Hu and   
                Xiangzhe Xu and   
                  Charles Zhang   ARCTURUS: Full Coverage Binary
                                  Similarity Analysis with
                                  Reachability-guided Emulation  . . . . . 96:1--96:??
                    Kai Gao and   
                  Runzhi He and   
                   Bing Xie and   
                   Minghui Zhou   Characterizing Deep Learning Package
                                  Supply Chains in PyPI: Domains,
                                  Clusters, and Disengagement  . . . . . . 97:1--97:??
          Shaiful Chowdhury and   
                 Gias Uddin and   
               Hadi Hemmati and   
                    Reid Holmes   Method-level Bug Prediction: Problems
                                  and Promises . . . . . . . . . . . . . . 98:1--98:??
               Qunying Song and   
       Emelie Engström and   
                    Per Runeson   Industry Practices for Challenging
                                  Autonomous Driving Systems with Critical
                                  Scenarios  . . . . . . . . . . . . . . . 99:1--99:??
               Mingxuan Zhu and   
                    Dan Hao and   
                    Junjie Chen   Compiler Autotuning through
                                  Multiple-phase Learning  . . . . . . . . 100:1--100:??
  Taijara Loiola De Santana and   
Paulo Anselmo Da Mota Silveira Neto and   
 Eduardo Santana De Almeida and   
                 Iftekhar Ahmed   Bug Analysis in Jupyter Notebook
                                  Projects: an Empirical Study . . . . . . 101:1--101:??
              Zhenfei Huang and   
                Junjie Chen and   
               Jiajun Jiang and   
                Yihua Liang and   
                  Hanmo You and   
                     Fengjie Li   Mapping APIs in Dynamic-typed Programs
                                  by Leveraging Transfer Learning  . . . . 102:1--102:??
               Sungmin Kang and   
               Robert Feldt and   
                       Shin Yoo   Deceiving Humans and Machines Alike:
                                  Search-based Test Input Generation for
                                  DNNs Using Variational Autoencoders  . . 103:1--103:??
                   Han Wang and   
                   Sijia Yu and   
              Chunyang Chen and   
               Burak Turhan and   
                   Xiaodong Zhu   Beyond Accuracy: an Empirical Study on
                                  Unit Testing in Open-source Deep
                                  Learning Projects  . . . . . . . . . . . 104:1--104:??
                 Shikai Guo and   
                 Dongmin Li and   
                  Lin Huang and   
                   Sijia Lv and   
                  Rong Chen and   
                     Hui Li and   
                Xiaochen Li and   
                       He Jiang   Estimating Uncertainty in Labeled
                                  Changes by SZZ Tools on Just-In-Time
                                  Defect Prediction  . . . . . . . . . . . 105:1--105:??
                Hanyang Guo and   
                Yingye Chen and   
             Xiangping Chen and   
                 Yuan Huang and   
                    Zibin Zheng   Smart Contract Code Repair
                                  Recommendation based on Reinforcement
                                  Learning and Multi-metric Optimization   106:1--106:??
          Davide Pizzolotto and   
            Stefano Berlato and   
                Mariano Ceccato   Mitigating Debugger-based Attacks to
                                  Java Applications with Self-debugging    107:1--107:??
                 Puzhuo Liu and   
               Yaowen Zheng and   
              Chengnian Sun and   
                    Hong Li and   
                     Zhi Li and   
                      Limin Sun   Battling against Protocol Fuzzing:
                                  Protecting Networked Embedded Devices
                                  from Dynamic Fuzzers . . . . . . . . . . 108:1--108:??
         Hashini Gunatilake and   
                John Grundy and   
               Rashina Hoda and   
                   Ingo Mueller   Enablers and Barriers of Empathy in
                                  Software Developer and User
                                  Interactions: a Mixed Methods Case Study 109:1--109:??
                    Xin Tan and   
                  Xinyue Lv and   
                 Jing Jiang and   
                       Li Zhang   Understanding Real-Time Collaborative
                                  Programming: a Study of Visual Studio
                                  Live Share . . . . . . . . . . . . . . . 110:1--110:??
                   Qiang Hu and   
                 Yuejun Guo and   
                Xiaofei Xie and   
               Maxime Cordy and   
                     Lei Ma and   
             Mike Papadakis and   
                  Yves Le Traon   Test Optimization in DNN Testing: a
                                  Survey . . . . . . . . . . . . . . . . . 111:1--111:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 5, June, 2024

        Martin P. Robillard and   
            Deeksha M. Arya and   
              Neil A. Ernst and   
              Jin L. C. Guo and   
             Maxime Lamothe and   
             Mathieu Nassif and   
            Nicole Novielli and   
       Alexander Serebrenik and   
           Igor Steinmacher and   
                 Klaas-Jan Stol   Communicating Study Design Trade-offs in
                                  Software Engineering . . . . . . . . . . 112:1--112:??
       Raphaël Ollando and   
            Seung Yeob Shin and   
               Lionel C. Briand   Learning Failure-Inducing Models for
                                  Testing Software-Defined Networks  . . . 113:1--113:??
                Cuifeng Gao and   
              Wenzhang Yang and   
                 Jiaming Ye and   
                Yinxing Xue and   
                        Jun Sun   sGuard+: Machine Learning Guided
                                  Rule-Based Automated Vulnerability
                                  Repair on Smart Contracts  . . . . . . . 114:1--114:??
                   Lin Yang and   
                Junjie Chen and   
                 Shutao Gao and   
                Zhihao Gong and   
               Hongyu Zhang and   
                   Yue Kang and   
                       Huaan Li   Try with Simpler --- an Evaluation of
                                  Improved Principal Component Analysis in
                                  Log-based Anomaly Detection  . . . . . . 115:1--115:??
                    Yue Liu and   
              Thanh Le-Cong and   
        Ratnadira Widyasari and   
  Chakkrit Tantithamthavorn and   
                      Li Li and   
            Xuan-Bach D. Le and   
                       David Lo   Refining ChatGPT-Generated Code:
                                  Characterizing and Mitigating Code
                                  Quality Issues . . . . . . . . . . . . . 116:1--116:??
       Emre Sülün and   
Metehan Saçakçi and   
           Eray Tüzün   An Empirical Analysis of Issue Templates
                                  Usage in Large-Scale Projects on GitHub  117:1--117:??
                Xinmeng Xia and   
                  Yang Feng and   
                Qingkai Shi and   
             James A. Jones and   
              Xiangyu Zhang and   
                      Baowen Xu   Enumerating Valid Non-Alpha-Equivalent
                                  Programs for Interpreter Testing . . . . 118:1--118:??
                 Jiawei Ren and   
                  Yulei Sui and   
                 Xiao Cheng and   
                  Yuan Feng and   
                   Jianjun Zhao   Dynamic Transitive Closure-based Static
                                  Analysis through the Lens of Quantum
                                  Search . . . . . . . . . . . . . . . . . 119:1--119:??
                   Fang Liu and   
                   Zhiyi Fu and   
                      Ge Li and   
                    Zhi Jin and   
                    Hui Liu and   
                 Yiyang Hao and   
                       Li Zhang   Non-Autoregressive Line-Level Code
                                  Completion . . . . . . . . . . . . . . . 120:1--120:??
          Marc Miltenberger and   
                    Steven Arzt   Precisely Extracting Complex Variable
                                  Values from Android Apps . . . . . . . . 121:1--121:??
                    Yu Zhao and   
             Brent Harrison and   
                    Tingting Yu   DinoDroid: Testing Android Apps Using
                                  Deep Q-Networks  . . . . . . . . . . . . 122:1--122:??
                 Yimeng Guo and   
                Zhifei Chen and   
                   Lin Chen and   
                  Wenjie Xu and   
                  Yanhui Li and   
                Yuming Zhou and   
                      Baowen Xu   Generating Python Type Annotations from
                                  Type Inference: How Far Are We?  . . . . 123:1--123:??
                   Yu Cheng and   
               Jieshan Chen and   
                 Qing Huang and   
             Zhenchang Xing and   
                   Xiwei Xu and   
                     Qinghua Lu   Prompt Sapper: a LLM-Empowered
                                  Production Tool for Building AI Chains   124:1--124:??
              Quanjun Zhang and   
                  Juan Zhai and   
              Chunrong Fang and   
                 Jiawei Liu and   
                Weisong Sun and   
                Haichuan Hu and   
                    Qingyu Wang   Machine Translation Testing via
                                  Syntactic Tree Pruning . . . . . . . . . 125:1--125:??
                    Yue Liu and   
  Chakkrit Tantithamthavorn and   
                Yonghui Liu and   
                          Li Li   On the Reliability and Explainability of
                                  Language Models for Program Generation   126:1--126:??
               Baijun Cheng and   
             Shengming Zhao and   
               Kailong Wang and   
               Meizhen Wang and   
              Guangdong Bai and   
                Ruitao Feng and   
                    Yao Guo and   
                     Lei Ma and   
                     Haoyu Wang   Beyond Fidelity: Explaining
                                  Vulnerability Localization of
                                  Learning-Based Detectors . . . . . . . . 127:1--127:??
                Guodong Fan and   
               Shizhan Chen and   
                 Cuiyun Gao and   
               Jianmao Xiao and   
                  Tao Zhang and   
                   Zhiyong Feng   RAPID: Zero-Shot Domain Adaptation for
                                  Code Search with Pre-Trained Models  . . 128:1--128:??
               Jiaxiang Liu and   
                Yunhan Xing and   
                 Xiaomu Shi and   
                    Fu Song and   
                   Zhiwu Xu and   
                     Zhong Ming   Abstraction and Refinement: Towards
                                  Scalable and Exact Verification of
                                  Neural Networks  . . . . . . . . . . . . 129:1--129:??
    Mohammed Oualid Attaoui and   
                Hazem Fahmy and   
           Fabrizio Pastore and   
                  Lionel Briand   Supporting Safety Analysis of
                                  Image-processing DNNs through
                                  Clustering-based Approaches  . . . . . . 130:1--130:??
               Xiuwei Shang and   
                Shuai Zhang and   
               Yitong Zhang and   
                 Shikai Guo and   
                  Yulong Li and   
                  Rong Chen and   
                     Hui Li and   
                Xiaochen Li and   
                       He Jiang   Analyzing and Detecting Information
                                  Types of Developer Live Chat Threads . . 131:1--131:??
                 Yinghua Li and   
                 Xueqi Dang and   
                     Lei Ma and   
              Jacques Klein and   
              Yves Le Traon and   
Tegawendé F. Bissyandé   Test Input Prioritization for $3$D Point
                                  Clouds . . . . . . . . . . . . . . . . . 132:1--132:??
                    Wei Tao and   
               Yucheng Zhou and   
                Yanlin Wang and   
               Hongyu Zhang and   
                Haofen Wang and   
                 Wenqiang Zhang   KADEL: Knowledge-Aware Denoising
                                  Learning for Commit Message Generation   133:1--133:??
             Daan Hommersom and   
           Antonino Sabetta and   
        Bonaventura Coppola and   
             Dario Di Nucci and   
             Damian A. Tamburri   Automated Mapping of Vulnerability
                                  Advisories onto their Fix Commits in
                                  Open Source Repositories . . . . . . . . 134:1--134:??
                   Daniel Russo   Navigating the Complexity of Generative
                                  AI Adoption in Software Engineering  . . 135:1--135:??
              Stefanie Betz and   
       Birgit Penzenstadler and   
              Leticia Duboc and   
          Ruzanna Chitchyan and   
         Sedef Akinli Kocak and   
                 Ian Brooks and   
              Shola Oyedeji and   
                Jari Porras and   
              Norbert Seyff and   
               Colin C. Venters   Lessons Learned from Developing a
                                  Sustainability Awareness Framework for
                                  Software Engineering Using Design
                                  Science  . . . . . . . . . . . . . . . . 136:1--136:??
              Zhenpeng Chen and   
               Jie M. Zhang and   
                   Max Hort and   
                Mark Harman and   
                 Federica Sarro   Fairness Testing: a Comprehensive Survey
                                  and Analysis of Trends . . . . . . . . . 137:1--137:??
               Wei-Cheng Wu and   
            Bernard Nongpoh and   
                Marwan Nour and   
      Michaël Marcozzi and   
    Sébastien Bardin and   
              Christophe Hauser   Fine-grained Coverage-based Fuzzing  . . 138:1--138:??
               Wei-Cheng Wu and   
            Bernard Nongpoh and   
                Marwan Nour and   
      Michaël Marcozzi and   
    Sébastien Bardin and   
              Christophe Hauser   Fine-grained Coverage-based Fuzzing ---
                                  RCR Report . . . . . . . . . . . . . . . 139:1--139:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 6, July, 2024

                Zhifei Chen and   
                   Lin Chen and   
                Yibiao Yang and   
                 Qiong Feng and   
                Xuansong Li and   
                       Wei Song   Risky Dynamic Typing-related Practices
                                  in Python: an Empirical Study  . . . . . 140:1--140:??
                Xiaohui Wan and   
                Zheng Zheng and   
                Fangyun Qin and   
                       Xuhui Lu   Data Complexity: a New Perspective for
                                  Analyzing the Difficulty of Defect
                                  Prediction Tasks . . . . . . . . . . . . 141:1--141:??
              Andrea Arcuri and   
                  Man Zhang and   
                  Juan Galeotti   Advanced White-Box Heuristics for
                                  Search-Based Fuzzing of REST APIs  . . . 142:1--142:??
         Emanuela Guglielmi and   
              Giovanni Rosa and   
          Simone Scalabrino and   
            Gabriele Bavota and   
                  Rocco Oliveto   Help Them Understand: Testing and
                                  Improving Voice User Interfaces  . . . . 143:1--143:??
              Anjana Perera and   
               Burak Turhan and   
              Aldeida Aleti and   
              Marcel Böhme   On the Impact of Lower Recall and
                                  Precision in Defect Prediction for
                                  Guiding Search-based Software Testing    144:1--144:??
                Guofu Zhang and   
                     Lei Li and   
                 Zhaopin Su and   
                   Feng Yue and   
                  Yang Chen and   
                  Miqing Li and   
                        Xin Yao   On Estimating the Feasible Solution
                                  Space of Multi-objective Testing
                                  Resource Allocation  . . . . . . . . . . 145:1--145:??
           Emanuele Iannone and   
            Giulia Sellitto and   
         Emanuele Iaccarino and   
          Filomena Ferrucci and   
            Andrea De Lucia and   
                  Fabio Palomba   Early and Realistic Exploitability
                                  Prediction of Just-Disclosed Software
                                  Vulnerabilities: How Reliable Can It Be? 146:1--146:??
                Peixun Long and   
                   Jianjun Zhao   Testing Multi-Subroutine Quantum
                                  Programs: From Unit Testing to
                                  Integration Testing  . . . . . . . . . . 147:1--147:??
                    Xu Wang and   
                 Hongwei Yu and   
              Xiangxin Meng and   
              Hongliang Cao and   
               Hongyu Zhang and   
                Hailong Sun and   
                 Xudong Liu and   
                    Chunming Hu   MTL-TRANSFER: Leveraging Multi-task
                                  Learning and Transferred Knowledge for
                                  Improving Fault Localization and Program
                                  Repair . . . . . . . . . . . . . . . . . 148:1--148:??
                Tingting Bi and   
                 Boming Xia and   
             Zhenchang Xing and   
                 Qinghua Lu and   
                     Liming Zhu   On the Way to SBOMs: Investigating
                                  Design Issues and Solutions in Practice  149:1--149:??
                Congying Xu and   
           Valerio Terragni and   
              Hengcheng Zhu and   
                 Jiarong Wu and   
               Shing-Chi Cheung   MR-Scout: Automated Synthesis of
                                  Metamorphic Relations from Existing Test
                                  Cases  . . . . . . . . . . . . . . . . . 150:1--150:??
          Sallam Abualhaija and   
           F. Basak Aydemir and   
            Fabiano Dalpiaz and   
           Davide Dell'Anna and   
            Alessio Ferrari and   
              Xavier Franch and   
                   Davide Fucci   Replication in Requirements Engineering:
                                  The NLP for RE Case  . . . . . . . . . . 151:1--151:??
         Tahereh Zohdinasab and   
            Vincenzo Riccio and   
                  Paolo Tonella   Focused Test Generation for Autonomous
                                  Driving Systems  . . . . . . . . . . . . 152:1--152:??
            Kashumi Madampe and   
               Rashina Hoda and   
                    John Grundy   Supporting Emotional Intelligence,
                                  Productivity and Team Goals while
                                  Handling Software Requirements Changes   153:1--153:??
                 Yuechen Li and   
                  Hanyu Pei and   
               Linzhi Huang and   
                 Beibei Yin and   
                   Kai-Yuan Cai   Automatic Repair of Quantum Programs via
                                  Unitary Operation  . . . . . . . . . . . 154:1--154:??
              Chanh Duc Ngo and   
           Fabrizio Pastore and   
                  Lionel Briand   Testing Updated Apps by Adapting Learned
                                  Models . . . . . . . . . . . . . . . . . 155:1--155:??
                   Zeyu Sun and   
              Zhenpeng Chen and   
                  Jie Zhang and   
                        Dan Hao   Fairness Testing of Machine Translation
                                  Systems  . . . . . . . . . . . . . . . . 156:1--156:??
                 Siyu Jiang and   
                Zhenhang He and   
                 Yuwen Chen and   
             Mingrong Zhang and   
                          Le Ma   Mobile Application Online Cross-Project
                                  Just-in-Time Software Defect Prediction
                                  Framework  . . . . . . . . . . . . . . . 157:1--157:??
        Zohreh Aghababaeyan and   
           Manel Abdellatif and   
          Mahboubeh Dadkhah and   
                  Lionel Briand   DeepGD: a Multi-Objective Black-Box Test
                                  Selection Approach for Deep Neural
                                  Networks . . . . . . . . . . . . . . . . 158:1--158:??
                    Zhen Li and   
                Shasha Zhao and   
                  Chen Chen and   
                      Qian Chen   Reducing the Impact of Time Evolution on
                                  Source Code Authorship Attribution via
                                  Domain Adaptation  . . . . . . . . . . . 159:1--159:??
                    Xi Ding and   
                   Rui Peng and   
             Xiangping Chen and   
                 Yuan Huang and   
                  Jing Bian and   
                    Zibin Zheng   Do Code Summarization Models Process Too
                                  Much Information? Function Signature May
                                  Be All That Is Needed  . . . . . . . . . 160:1--160:??
               Daniel Ramos and   
           Inês Lynce and   
            Vasco Manquinho and   
              Ruben Martins and   
                Claire Le Goues   BatFix: Repairing language model-based
                                  transpilation  . . . . . . . . . . . . . 161:1--161:??
                 Van Nguyen and   
                   Trung Le and   
  Chakkrit Tantithamthavorn and   
                John Grundy and   
                     Dinh Phung   Deep Domain Adaptation With Max-Margin
                                  Principle for Cross-Project Imbalanced
                                  Software Vulnerability Detection . . . . 162:1--162:??
                     Han Hu and   
                   Han Wang and   
                 Ruiqi Dong and   
                  Xiao Chen and   
                  Chunyang Chen   Enhancing GUI Exploration Coverage of
                                  Android Apps with Deep Link-Integrated
                                  Monkey . . . . . . . . . . . . . . . . . 163:1--163:??
    Carlos Gavidia-Calderon and   
          Anastasia Kordoni and   
             Amel Bennaceur and   
                Mark Levine and   
                Bashar Nuseibeh   The IDEA of Us: an Identity-Aware
                                  Architecture for Autonomous Systems  . . 164:1--164:??
                 Haoye Wang and   
                Zhipeng Gao and   
                Tingting Bi and   
                John Grundy and   
                 Xinyu Wang and   
                 Minghui Wu and   
                    Xiaohu Yang   What Makes a Good TODO Comment?  . . . . 165:1--165:??
                Weisong Sun and   
              Chunrong Fang and   
                   Yifei Ge and   
                  Yuling Hu and   
                Yuchen Chen and   
              Quanjun Zhang and   
                 Xiuting Ge and   
                   Yang Liu and   
                    Zhenyu Chen   A Survey of Source Code Search: a
                                  $3$-Dimensional Perspective  . . . . . . 166:1--166:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 7, September, 2024

             Chengcheng Wan and   
               Shicheng Liu and   
                 Sophie Xie and   
                  Yuhan Liu and   
             Henry Hoffmann and   
              Michael Maire and   
                        Shan Lu   Keeper: Automated Testing and Fixing of
                                  Machine Learning Software  . . . . . . . 167:1--167:??
    Suwichak Fungprasertkul and   
               Rami Bahsoon and   
                    Rick Kazman   Technical Debt Monitoring Decision
                                  Making with Skin in the Game . . . . . . 168:1--168:??
                     Wei Ma and   
              Shangqing Liu and   
               Mengjie Zhao and   
                Xiaofei Xie and   
               Wenhang Wang and   
                   Qiang Hu and   
                  Jie Zhang and   
                       Yang Liu   Unveiling Code Pre-Trained Models:
                                  Investigating Syntax and Semantics
                                  Capacities . . . . . . . . . . . . . . . 169:1--169:??
                Muhui Jiang and   
                Jinan Jiang and   
                     Tao Wu and   
                  Zuchao Ma and   
                  Xiapu Luo and   
                     Yajin Zhou   Understanding Vulnerability Inducing
                                  Commits of the Linux Kernel  . . . . . . 170:1--170:??
              Nicolas Dejon and   
             Chrystel Gaber and   
             Gilles Grimaud and   
                   Narjes Jomaa   Code to Qed, the Project Manager's Guide
                                  to Proof Engineering . . . . . . . . . . 171:1--171:??
     Rezvan Mahdavi-Hezaveh and   
             Sameeha Fatima and   
                Laurie Williams   Paving a Path for a Combined Family of
                                  Feature Toggle and Configuration Option
                                  Research . . . . . . . . . . . . . . . . 172:1--172:??
                    Rong Gu and   
             Eduard Baranov and   
               Afshin Ameri and   
         Cristina Seceleanu and   
          Eduard Paul Enoiu and   
Baran Cürüklü and   
                 Axel Legay and   
             Kristina Lundqvist   Synthesis and Verification of Mission
                                  Plans for Multiple Autonomous Agents
                                  under Complex Road Conditions  . . . . . 173:1--173:??
                     Yao Li and   
                 Dawei Yuan and   
                  Tao Zhang and   
                Haipeng Cai and   
                   David Lo and   
                 Cuiyun Gao and   
                  Xiapu Luo and   
                       He Jiang   Meta-Learning for Multi-Family Android
                                  Malware Classification . . . . . . . . . 174:1--174:??
              Shengcheng Yu and   
              Chunrong Fang and   
                     Xin Li and   
                Yuchen Ling and   
                Zhenyu Chen and   
                    Zhendong Su   Effective, Platform-Independent GUI
                                  Testing via Image Embedding and
                                  Reinforcement Learning . . . . . . . . . 175:1--175:??
               Jaeseong Lee and   
                 Simin Chen and   
             Austin Mordahl and   
                   Cong Liu and   
                   Wei Yang and   
                      Shiyi Wei   Automated Testing Linguistic
                                  Capabilities of NLP Models . . . . . . . 176:1--176:??
              Judith Perera and   
               Ewan Tempero and   
                Yu-Cheng Tu and   
                  Kelly Blincoe   A Systematic Mapping Study Exploring
                                  Quantification Approaches to Code,
                                  Design, and Architecture Technical Debt  177:1--177:??
        Sávio Freire and   
             Alexia Pacheco and   
               Nicolli Rios and   
         Boris Pérez and   
         Camilo Castellanos and   
       Darío Correal and   
               Robert Ramac and   
          Vladimir Mandi\'c and   
             Nebojsa Tausan and   
       Gustavo López and   
     Manoel Mendonça and   
             Davide Falessi and   
          Clemente Izurieta and   
             Carolyn Seaman and   
         Rodrigo Spínola   A Comprehensive View on TD Prevention
                                  Practices and Reasons for Not Preventing
                                  It . . . . . . . . . . . . . . . . . . . 178:1--178:??
        Elijah Zolduoarrati and   
       Sherlock A. Licorish and   
                  Nigel Stanger   Harmonising Contributions: Exploring
                                  Diversity in Software Engineering
                                  through CQA Mining on Stack Overflow . . 179:1--179:??
                 Yiling Lou and   
                   Jun Yang and   
              Samuel Benton and   
                    Dan Hao and   
                    Lin Tan and   
              Zhenpeng Chen and   
                   Lu Zhang and   
                 Lingming Zhang   When Automated Program Repair Meets
                                  Regression Testing --- An Extensive
                                  Study on Two Million Patches . . . . . . 180:1--180:??
                    Wei Liu and   
            Shouvick Mondal and   
          Tse-Hsun (Peter) Chen   An Empirical Study on the
                                  Characteristics of Database Access Bugs
                                  in Java Applications . . . . . . . . . . 181:1--181:??
                  Xue Jiang and   
                Yihong Dong and   
               Lecheng Wang and   
                 Zheng Fang and   
                Qiwei Shang and   
                      Ge Li and   
                    Zhi Jin and   
                    Wenpin Jiao   Self-Planning Code Generation with Large
                                  Language Models  . . . . . . . . . . . . 182:1--182:??
                 Qing Huang and   
                 Zhiwen Luo and   
             Zhenchang Xing and   
               Jinshan Zeng and   
               Jieshan Chen and   
                   Xiwei Xu and   
                      Yong Chen   Revealing the Unseen: AI Chain on LLMs
                                  for Predicting Implicit Dataflows to
                                  Generate Dataflow Graphs in Dynamically
                                  Typed Code . . . . . . . . . . . . . . . 183:1--183:??
                Yingzhe Lyu and   
                    Heng Li and   
     Zhen Ming (Jack) Jiang and   
                Ahmed E. Hassan   On the Model Update Strategies for
                                  Supervised Learning in AIOps Solutions   184:1--184:??
                    Hang Xu and   
                Liheng Chen and   
                Shuitao Gan and   
                 Chao Zhang and   
                 Zheming Li and   
                 Jiangan Ji and   
               Baojian Chen and   
                         Fan Hu   Graphuzz: Data-driven Seed Scheduling
                                  for Coverage-guided Greybox Fuzzing  . . 185:1--185:??
              Xiaoning Feng and   
               Xiaohong Han and   
                 Simin Chen and   
                       Wei Yang   LLMEffiChecker: Understanding and
                                  Testing Efficiency Degradation of Large
                                  Language Models  . . . . . . . . . . . . 186:1--186:??
                Jinqiang Yu and   
                 Michael Fu and   
            Alexey Ignatiev and   
  Chakkrit Tantithamthavorn and   
                  Peter Stuckey   A Formal Explainer for Just-In-Time
                                  Defect Predictions . . . . . . . . . . . 187:1--187:??
                 Dong Huang and   
                 Qingwen Bu and   
                  Yichao Fu and   
                 Yuhao Qing and   
                Xiaofei Xie and   
                Junjie Chen and   
                     Heming Cui   Neuron Sensitivity-Guided Test Case
                                  Selection  . . . . . . . . . . . . . . . 188:1--188:??
                Yihong Dong and   
                  Xue Jiang and   
                    Zhi Jin and   
                          Ge Li   Self-Collaboration Code Generation via
                                  ChatGPT  . . . . . . . . . . . . . . . . 189:1--189:??
                 Zhiyu Wang and   
                   Sihan Xu and   
               Lingling Fan and   
               Xiangrui Cai and   
                   Linyu Li and   
                      Zheli Liu   Can Coverage Criteria Guide Failure
                                  Discovery for Image Classifiers? An
                                  Empirical Study  . . . . . . . . . . . . 190:1--190:??
                  Mingxi Ye and   
                 Yuhong Nan and   
              Hong-Ning Dai and   
                  Shuo Yang and   
                  Xiapu Luo and   
                    Zibin Zheng   FunFuzz: a Function-Oriented Fuzzer for
                                  Smart Contract Vulnerability Detection
                                  with High Effectiveness and Efficiency   191:1--191:??
                  Anni Peng and   
             Dongliang Fang and   
                    Le Guan and   
         Erik van der Kouwe and   
                     Yin Li and   
                Wenwen Wang and   
                  Limin Sun and   
                   Yuqing Zhang   Bitmap-Based Security Monitoring for
                                  Deeply Embedded Systems  . . . . . . . . 192:1--192:??
              Zachary Karas and   
              Aakash Bansal and   
                Yifan Zhang and   
                    Toby Li and   
            Collin McMillan and   
                       Yu Huang   A Tale of Two Comprehensions? Analyzing
                                  Student Programmer Attention during Code
                                  Summarization  . . . . . . . . . . . . . 193:1--193:??
Carlos Parra-Calderón and   
Julián Alberto García-García and   
    Juan Manuel Ramos-Cueli and   
       Celia Alvarez-Romero and   
Esther Román-Villarán and   
Alicia Martínez-García and   
María José Escalona   IDE 4 ICDS: a Human-Centric and
                                  Model-Driven Proposal to Improve the
                                  Digitization of Clinical Practice
                                  Guideline  . . . . . . . . . . . . . . . 194:1--194:??

ACM Transactions on Software Engineering and Methodology
Volume 33, Number 8, November, 2024

       Margaret-Anne Storey and   
               Daniel Russo and   
            Nicole Novielli and   
          Takashi Kobayashi and   
                      Dong Wang   A Disruptive Research Playbook for
                                  Studying Disruptive Innovations  . . . . 195:1--195:??
             Giovani Guizzo and   
             David Williams and   
                Mark Harman and   
              Justyna Petke and   
                 Federica Sarro   Speeding Up Genetic Improvement via
                                  Regression Test Selection  . . . . . . . 196:1--196:??
              Anwar Ghammam and   
               Rania Khalsi and   
        Marouane Kessentini and   
                  Foyzul Hassan   Efficient Management of Containers for
                                  Software Defined Vehicles  . . . . . . . 197:1--197:??
              Xiao-Yi Zhang and   
                   Yang Liu and   
              Paolo Arcaini and   
              Mingyue Jiang and   
                    Zheng Zheng   MET-MAPF: a Metamorphic Testing Approach
                                  for Multi-Agent Path Finding Algorithms  198:1--198:??
         Lorenz Graf-Vlachy and   
                  Stefan Wagner   Cleaning Up Confounding: Accounting for
                                  Endogeneity Using Instrumental Variables
                                  and Two-Stage Models . . . . . . . . . . 199:1--199:??
            Zhouruixing Zhu and   
                 Cheryl Lee and   
              Xiaoying Tang and   
                      Pinjia He   HeMiRCA: Fine-Grained Root Cause
                                  Analysis for Microservices with
                                  Heterogeneous Data Sources . . . . . . . 200:1--200:??
              Shangqing Liu and   
                 Yanzhou Li and   
                Xiaofei Xie and   
                     Wei Ma and   
                Guozhu Meng and   
                       Yang Liu   Automated Commit Intelligence by
                                  Pre-training . . . . . . . . . . . . . . 201:1--201:??
               Tiehua Zhang and   
                     Rui Xu and   
             Jianping Zhang and   
                   Yuze Liu and   
                   Xin Chen and   
                    Jun Yin and   
                       Xi Zheng   DSHGT: Dual-Supervisors Heterogeneous
                                  Graph Transformer-A Pioneer Study of
                                  Using Heterogeneous Graph Learning for
                                  Detecting Software Vulnerabilities . . . 202:1--202:??
               Xiaoyuan Xie and   
                   Shuo Jin and   
             Songqiang Chen and   
               Shing-Chi Cheung   Word Closure-Based Metamorphic Testing
                                  for Machine Translation  . . . . . . . . 203:1--203:??
                     Jia Li and   
                Yunfei Zhao and   
                 Yongmin Li and   
                      Ge Li and   
                        Zhi Jin   AceCoder: an Effective Prompting
                                  Technique Specialized in Code Generation 204:1--204:??
               Yanjie Jiang and   
                    Hui Liu and   
           Shing Chi Cheung and   
                       Lu Zhang   Shortening Overlong Method Names with
                                  Abbreviations  . . . . . . . . . . . . . 205:1--205:??
               Haifeng Ruan and   
              Yannic Noller and   
         Saeid Tizpaz-Niari and   
      Sudipta Chattopadhyay and   
             Abhik Roychoudhury   Timing Side-Channel Mitigation via
                                  Automated Program Repair . . . . . . . . 206:1--206:??
                 Fanyi Meng and   
                  Ying Wang and   
            Chun Yong Chong and   
                     Hai Yu and   
                   Zhiliang Zhu   Evolution-Aware Constraint Derivation
                                  Approach for Software Remodularization   207:1--207:??
           Chico Sundermann and   
                 Heiko Raab and   
           Tobias Heß and   
           Thomas Thüm and   
                   Ina Schaefer   Reusing d-DNNFs for Efficient
                                  Feature-Model Counting . . . . . . . . . 208:1--208:??
            Yasaman Abedini and   
              Abbas Heydarnoori   Can GitHub Issues Help in App Review
                                  Classifications? . . . . . . . . . . . . 209:1--209:??
                    Yi Song and   
                Xihao Zhang and   
               Xiaoyuan Xie and   
             Songqiang Chen and   
               Quanming Liu and   
                     Ruizhi Gao   SURE: a Visualized Failure Indexing
                                  Approach Using Program Memory Spectrum   210:1--210:??
        Saurabhsingh Rajput and   
               Tim Widmayer and   
               Ziyuan Shang and   
             Maria Kechagia and   
             Federica Sarro and   
                  Tushar Sharma   Enhancing Energy-Awareness in Deep
                                  Learning through Fine-Grained Energy
                                  Measurement  . . . . . . . . . . . . . . 211:1--211:??
                 Qing Huang and   
                Yanbang Sun and   
             Zhenchang Xing and   
               Yuanlong Cao and   
               Jieshan Chen and   
                   Xiwei Xu and   
                   Huan Jin and   
                     Jiaxing Lu   Let's Discover More API Relations: a
                                  Large Language Model-Based AI Chain for
                                  Unsupervised API Relation Inference  . . 212:1--212:??
            Moataz Chouchen and   
                   Ali Ouni and   
           Mohamed Wiem Mkaouer   MULTICR: Predicting Merged and Abandoned
                                  Code Changes in Modern Code Review Using
                                  Multi-Objective Search . . . . . . . . . 213:1--213:??
             Florian Tambon and   
               Foutse Khomh and   
              Giuliano Antoniol   GIST: Generated Inputs Sets
                                  Transferability in Deep Learning . . . . 214:1--214:??
                  Shiwen Yu and   
                 Zengyu Liu and   
                  Ting Wang and   
                        Ji Wang   Neural Solving Uninterpreted Predicates
                                  with Abstract Gradient Descent . . . . . 215:1--215:??
            Dmytro Humeniuk and   
               Foutse Khomh and   
              Giuliano Antoniol   Reinforcement Learning Informed
                                  Evolutionary Search for Autonomous
                                  Systems Testing  . . . . . . . . . . . . 216:1--216:??
                    Yue Liu and   
  Chakkrit Tantithamthavorn and   
                Yonghui Liu and   
     Patanamon Thongtanunam and   
                          Li Li   Automatically Recommend Code Updates:
                                  Are We There Yet?  . . . . . . . . . . . 217:1--217:??
        Bianca Trinkenreich and   
               Fabio Santos and   
                 Klaas-Jan Stol   Predicting Attrition among Software
                                  Professionals: Antecedents and
                                  Consequences of Burnout and Engagement   218:1--218:??
                    Ming Xu and   
                Jianling Fu and   
                  Hui Jiang and   
                 Yuxin Deng and   
                     Zhi-Bin Li   Termination and Universal Termination
                                  Problems for Nondeterministic Quantum
                                  Programs . . . . . . . . . . . . . . . . 219:1--219:??
                  Xinyi Hou and   
                Yanjie Zhao and   
                    Yue Liu and   
                  Zhou Yang and   
               Kailong Wang and   
                      Li Li and   
                  Xiapu Luo and   
                   David Lo and   
                John Grundy and   
                     Haoyu Wang   Large Language Models for Software
                                  Engineering: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 220:1--220:??
                   Daniel Russo   Navigating the Complexity of Generative
                                  AI Adoption in Software Engineering ---
                                  RCR Report . . . . . . . . . . . . . . . 221:1--221:??
                  Mauro Pezz\`e   Editorial: The End of the Journey  . . . 222:1--222:??