Table of contents for issues of IEEE Transactions on Software Engineering

Last update: Thu May 20 08:42:20 MDT 2021                Valid HTML 3.2!

Volume 36, Number 1, January / February, 2010
Volume 36, Number 2, March / April, 2010
Volume 36, Number 3, May / June, 2010
Volume 36, Number 4, July / August, 2010
Volume 36, Number 5, September / October, 2010
Volume 36, Number 6, November / December, 2010
Volume 37, Number 1, January / February, 2011
Volume 37, Number 2, March / April, 2011
Volume 37, Number 3, May / June, 2011
Volume 37, Number 4, July / August, 2011
Volume 37, Number 5, September / October, 2011
Volume 37, Number 6, November / December, 2011
Volume 38, Number 1, January / February, 2012
Volume 38, Number 2, March / April, 2012
Volume 38, Number 3, May / June, 2012
Volume 38, Number 4, July / August, 2012
Volume 38, Number 5, September / October, 2012
Volume 38, Number 6, November / December, 2012
Volume 39, Number 1, January, 2013
Volume 39, Number 2, February, 2013
Volume 39, Number 3, March, 2013
Volume 39, Number 4, April, 2013
Volume 39, Number 5, May, 2013
Volume 39, Number 6, June, 2013
Volume 39, Number 7, July, 2013
Volume 39, Number 8, August, 2013
Volume 39, Number 9, September, 2013
Volume 39, Number 10, October, 2013
Volume 39, Number 11, November, 2013
Volume 39, Number 12, December, 2013
Volume 40, Number 1, January, 2014
Volume 40, Number 2, February, 2014
Volume 40, Number 3, March, 2014
Volume 40, Number 4, April, 2014
Volume 40, Number 5, May, 2014
Volume 40, Number 6, June, 2014
Volume 40, Number 7, July, 2014
Volume 40, Number 8, August, 2014
Volume 40, Number 9, September, 2014
Volume 40, Number 10, October, 2014
Volume 40, Number 11, November, 2014
Volume 40, Number 12, December, 2014
Volume 41, Number 1, January, 2015
Volume 41, Number 2, February, 2015
Volume 41, Number 3, March, 2015
Volume 41, Number 4, April, 2015
Volume 41, Number 5, May, 2015
Volume 41, Number 6, June, 2015
Volume 41, Number 7, July, 2015
Volume 41, Number 8, August, 2015
Volume 41, Number 9, September, 2015
Volume 41, Number 10, October, 2015
Volume 41, Number 11, November, 2015
Volume 41, Number 12, December, 2015
Volume 42, Number 1, January, 2016
Volume 42, Number 2, February, 2016
Volume 42, Number 3, March, 2016
Volume 42, Number 4, April, 2016
Volume 42, Number 5, May, 2016
Volume 42, Number 6, June, 2016
Volume 42, Number 7, July, 2016
Volume 42, Number 8, August, 2016
Volume 42, Number 9, September, 2016
Volume 42, Number 10, October, 2016
Volume 42, Number 11, November, 2016
Volume 42, Number 12, December, 2016
Volume 43, Number 1, January, 2017
Volume 43, Number 2, February, 2017
Volume 43, Number 3, March, 2017
Volume 43, Number 4, April, 2017
Volume 43, Number 5, May, 2017
Volume 43, Number 6, June, 2017
Volume 43, Number 7, July, 2017
Volume 43, Number 8, August, 2017
Volume 43, Number 9, September, 2017
Volume 43, Number 10, October, 2017
Volume 43, Number 11, November, 2017
Volume 43, Number 12, December, 2017
Volume 44, Number 1, January, 2018
Volume 44, Number 2, February, 2018
Volume 44, Number 3, 2018
Volume 44, Number 4, 2018
Volume 44, Number 5, May, 2018
Volume 44, Number 6, June, 2018
Volume 44, Number 7, July, 2018
Volume 44, Number 8, August, 2018
Volume 44, Number 9, September, 2018
Volume 44, Number 10, 2018
Volume 44, Number 11, 2018
Volume 44, Number 12, December, 2018
Volume 45, Number 1, January, 2019
Volume 45, Number 2, February, 2019
Volume 45, Number 3, March, 2019
Volume 45, Number 4, April, 2019
Volume 45, Number 5, May, 2019
Volume 45, Number 6, June, 2019
Volume 45, Number 7, July, 2019
Volume 45, Number 8, August, 2019
Volume 45, Number 9, September, 2019
Volume 45, Number 10, October, 2019
Volume 45, Number 11, November, 2019
Volume 45, Number 12, December, 2019
Volume 46, Number 1, January, 2020
Volume 46, Number 2, 2020
Volume 46, Number 3, 2020
Volume 46, Number 4, 2020
Volume 47, Number 5, 2021


IEEE Transactions on Software Engineering
Volume 36, Number 1, January / February, 2010

                      J. Kramer   Editorial: A New Editor in Chief and the
                                  State of the Journal . . . . . . . . . . 1--2
                    B. Nuseibeh   Editorial: A New Decade of TSE . . . . . 3--6
                 S. Horwitz and   
                  B. Liblit and   
                  M. Polishchuk   Better Debugging via Output Tracing and
                                  Callstack-Sensitive Slicing  . . . . . . 7--19
                    N. Moha and   
Y. G. Guéhéneuc and   
                 L. Duchien and   
                  A. F. Le Meur   DECOR: A Method for the Specification
                                  and Detection of Code and Design Smells  20--36
                H. Aljazzar and   
                        S. Leue   Directed Explicit State-Space Search in
                                  the Generation of Counterexamples for
                                  Stochastic Model Checking  . . . . . . . 37--60
               J. E. Hannay and   
                E. Arisholm and   
                  H. Engvik and   
               D. I. K. Sjoberg   Effects of Personality on Pair
                                  Programming  . . . . . . . . . . . . . . 61--80
                    X. Yuan and   
                    A. M. Memon   Generating Event Sequence-Based Test
                                  Cases Using GUI Runtime State Feedback   81--95
                   F. Ricca and   
                M. Di Penta and   
               M. Torchiano and   
                 P. Tonella and   
                     M. Ceccato   How Developers' Experience and Ability
                                  Influence Web Application Comprehension
                                  Tasks Supported by UML Stereotypes: A
                                  Series of Four Experiments . . . . . . . 96--118
               I. Malavolta and   
                 H. Muccini and   
             P. Pelliccione and   
                    D. Tamburri   Providing Architectural Languages and
                                  Tools Interoperability through Model
                                  Transformation Technologies  . . . . . . 119--140
                      Anonymous   2009 Reviewers List  . . . . . . . . . . 141--143
                      Anonymous   7 Great Reasons for Joining the IEEE
                                  Computer Society [advertisement] . . . . 144--144
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 36, Number 2, March / April, 2010

                    B. Nuseibeh   Editorial: Readers, Writers, Reviewers,
                                  and Editors  . . . . . . . . . . . . . . 145--156
                  A. Garcia and   
              A. Romanovsky and   
                     V. Issarny   Guest Editors' Introduction to the
                                  Special Section on Exception Handling:
                                  From Requirements to Software
                                  Maintenance  . . . . . . . . . . . . . . 147--149
                    H. Shah and   
                    C. Gorg and   
                  M. J. Harrold   Understanding Exception Handling:
                                  Viewpoints of Novices and Experts  . . . 150--161
               B. S. Lerner and   
                S. Christov and   
            L. J. Osterweil and   
                R. Bendraou and   
           U. Kannengiesser and   
                        A. Wise   Exception Handling Patterns for Process
                                  Modeling . . . . . . . . . . . . . . . . 162--183
                D. Kulkarni and   
                    A. Tripathi   A Framework for Programming Robust
                                  Context-Aware Applications . . . . . . . 184--197
               G. Friedrich and   
               M. G. Fugini and   
                   E. Mussi and   
                 B. Pernici and   
                       G. Tagni   Exception Handling for Repair in
                                  Service-Based Processes  . . . . . . . . 198--215
                    R. Shatnawi   A Quantitative Investigation of the
                                  Acceptable Risk Levels of
                                  Object-Oriented Metrics in Open-Source
                                  Systems  . . . . . . . . . . . . . . . . 216--225
                  M. Harman and   
                      P. McMinn   A Theoretical and Empirical Study of
                                  Search-Based Testing: Local, Global, and
                                  Hybrid Search  . . . . . . . . . . . . . 226--247
                D. Kimelman and   
                M. Kimelman and   
                D. Mandelin and   
                      D. Yellin   Bayesian Approaches to Matching
                                  Architectural Diagrams . . . . . . . . . 248--274
                      P. Chalin   Engineering a Sound Assertion Semantics
                                  for the Verifying Compiler . . . . . . . 275--287
                   J. Skene and   
                F. Raimondi and   
                    W. Emmerich   Service-Level Agreements for Electronic
                                  Services . . . . . . . . . . . . . . . . 288--304
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 36, Number 3, May / June, 2010

                    B. Nuseibeh   In Memoriam: Robin Milner and Amir
                                  Pnueli . . . . . . . . . . . . . . . . . 305--305
     K. Goseva-Popstojanova and   
                      K. Kanoun   Guest Editors' Introduction to the
                                  Special Section on Evaluation and
                                  Improvement of Software Dependability    306--308
               E. Uzuncaova and   
                S. Khurshid and   
                      D. Batory   Incremental Test Generation for Software
                                  Product Lines  . . . . . . . . . . . . . 309--322
            R. Pietrantuono and   
                   S. Russo and   
                  K. S. Trivedi   Software Reliability and Testing Time
                                  Allocation: An Architecture-Based
                                  Approach . . . . . . . . . . . . . . . . 323--337
                   G. Georg and   
             K. Anastasakis and   
                 B. Bordbar and   
                S. H. Houmb and   
                     I. Ray and   
                 M. Toahchoodee   Verification and Trade-Off Analysis of
                                  Security Properties in UML System Models 338--356
                 J. Antunes and   
                   N. Neves and   
                 M. Correia and   
               P. Verissimo and   
                       R. Neves   Vulnerability Discovery with Attack
                                  Injection  . . . . . . . . . . . . . . . 357--370
             G. Spanoudakis and   
                      A. Zisman   Discovering Services during
                                  Service-Based System Design Using UML    371--389
                  B. Bollig and   
               J. P. Katoen and   
                    C. Kern and   
                     M. Leucker   Learning Communicating Automata from
                                  MSCs . . . . . . . . . . . . . . . . . . 390--408
                   R. Meier and   
                      V. Cahill   On Event-Based Middleware for
                                  Location-Aware Mobile Applications . . . 409--430
                    C. Zhao and   
                    J. Kong and   
                       K. Zhang   Program Behavior Discovery and
                                  Verification: A Graph Grammar Approach   431--448
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 36, Number 4, July / August, 2010

                    B. Nuseibeh   Editorial: How Special Should Issues Be? 449--450
                B. G. Ryder and   
                      A. Zeller   Introduction: The Best Papers of ISSTA   451--452
              D. Balzarotti and   
                   G. Banks and   
                    M. Cova and   
              V. Felmetsger and   
                R. Kemmerer and   
               W. Robertson and   
                  F. Valeur and   
                       G. Vigna   An Experience in Testing the Security of
                                  Real-World Electronic Voting Systems . . 453--473
                   S. Artzi and   
                  A. Kiezun and   
                   J. Dolby and   
                     F. Tip and   
                     D. Dig and   
                A. Paradkar and   
                    M. D. Ernst   Finding Bugs in Web Applications Using
                                  Dynamic Test Generation and
                                  Explicit-State Model Checking  . . . . . 474--494
              N. E. Beckman and   
                 A. V. Nori and   
             S. K. Rajamani and   
              R. J. Simmons and   
               S. D. Tetali and   
                   A. V. Thakur   Proofs from Tests  . . . . . . . . . . . 495--508
                  E. Bodden and   
                    K. Havelund   Aspect-Oriented Race Detection in Java   509--527
                 G. K. Baah and   
               A. Podgurski and   
                  M. J. Harrold   The Probabilistic Program Dependence
                                  Graph and Its Application to Fault
                                  Diagnosis  . . . . . . . . . . . . . . . 528--545
              R. P. L. Buse and   
                   W. R. Weimer   Learning a Metric for Code Readability   546--558
                   N. Limam and   
                     R. Boutaba   Assessing Software Service Quality and
                                  Trustworthiness at Selection Time  . . . 559--574
              N. Pettersson and   
                    W. Lowe and   
                       J. Nivre   Evaluation of Accuracy in Design Pattern
                                  Occurrence Detection . . . . . . . . . . 575--590
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 36, Number 5, September / October, 2010

               G. C. Murphy and   
                     W. Schafer   Guest Editors' Introduction: 2008
                                  Conference on the Foundations of
                                  Software Engineering . . . . . . . . . . 591--592
                      H. Do and   
                 S. Mirarab and   
              L. Tahvildari and   
                   G. Rothermel   The Effects of Time Constraints on Test
                                  Case Prioritization: A Series of
                                  Controlled Experiments . . . . . . . . . 593--617
              T. Zimmermann and   
                 R. Premraj and   
              N. Bettenburg and   
                    S. Just and   
                A. Schroter and   
                       C. Weiss   What Makes a Good Bug Report?  . . . . . 618--643
                    M. Sama and   
                  S. Elbaum and   
                F. Raimondi and   
            D. S. Rosenblum and   
                        Z. Wang   Context-Aware Adaptive Applications:
                                  Fault Patterns and Their Automated
                                  Identification . . . . . . . . . . . . . 644--661
                R. Bendraou and   
             J. M. Jezequel and   
              M. P. Gervais and   
                       X. Blanc   A Comparison of Six UML-Based Languages
                                  for Software Process Modeling  . . . . . 662--675
               S. MacDonell and   
                M. Shepperd and   
              B. Kitchenham and   
                      E. Mendes   How Reliable Are Systematic Reviews in
                                  Empirical Software Engineering?  . . . . 676--687
                     Z. Lin and   
                   X. Zhang and   
                          D. Xu   Reverse Engineering Input Syntactic
                                  Structure from Program Execution and Its
                                  Applications . . . . . . . . . . . . . . 688--703
                P. Emberson and   
                        I. Bate   Stressing Search with Scenarios for
                                  Flexible Solutions to Real-Time Task
                                  Allocation Problems  . . . . . . . . . . 704--718
                 R. Lanotte and   
      A. Maggiolo-Schettini and   
                      A. Troina   Time and Probability-Based Information
                                  Flow Analysis  . . . . . . . . . . . . . 719--734
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 36, Number 6, November / December, 2010

                    B. Nuseibeh   Editorial  . . . . . . . . . . . . . . . 735--736
                  M. Harman and   
                    A. Mansouri   Search Based Software Engineering:
                                  Introduction to the Special Issue of the
                                  \booktitleIEEE Transactions on Software
                                  Engineering  . . . . . . . . . . . . . . 737--741
                     S. Ali and   
               L. C. Briand and   
                 H. Hemmati and   
         R. K. Panesar-Walawege   A Systematic Review of the Application
                                  and Empirical Investigation of
                                  Search-Based Test Case Generation  . . . 742--762
                S. Poulding and   
                    J. A. Clark   Efficient Software Verification:
                                  Statistical Testing Using Automated
                                  Search . . . . . . . . . . . . . . . . . 763--777
                     V. Garousi   A Genetic Algorithm-Based Stress Test
                                  Requirements Generator Tool and Its
                                  Empirical Evaluation . . . . . . . . . . 778--797
      Christopher L. Simons and   
              Ian C. Parmee and   
                  Rhys Gwynllyw   Interactive, Evolutionary Search in
                                  Upstream Object-Oriented Class Design    798--816
                  M. Bowman and   
               L. C. Briand and   
                     Y. Labiche   Solving the Class Responsibility
                                  Assignment Problem in Object-Oriented
                                  Analysis with Multi-Objective Genetic
                                  Algorithms . . . . . . . . . . . . . . . 817--837
                   J. White and   
               B. Doughtery and   
                  D. C. Schmidt   ASCENT: An Algorithmic Technique for
                                  Designing Hardware and Software in
                                  Tandem . . . . . . . . . . . . . . . . . 838--851
                     Y. Liu and   
         T. M. Khoshgoftaar and   
                      N. Seliya   Evolutionary Optimization of Software
                                  Quality Modeling with Multiple
                                  Repositories . . . . . . . . . . . . . . 852--864
                K. Krogmann and   
               M. Kuperberg and   
                    R. Reussner   Using Genetic Search for Reverse
                                  Engineering of Parametric Behavior
                                  Models for Performance Prediction  . . . 865--877
                      Anonymous   IEEE Computer Society CSDP
                                  [advertisement]  . . . . . . . . . . . . 878--878
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3


IEEE Transactions on Software Engineering
Volume 37, Number 1, January / February, 2011

                    B. Nuseibeh   Editorial: State of the Journal  . . . . 1--3
                  B. Demsky and   
               S. Sundaramurthy   Bristlecone: Language Support for Robust
                                  Software Applications  . . . . . . . . . 4--23
                 M. P. Ward and   
                       H. Zedan   Deriving a Slicing Algorithm via Fermat
                                  Transformations  . . . . . . . . . . . . 24--47
                R. C. Bryce and   
                 S. Sampath and   
                    A. M. Memon   Developing a Single Model and Test
                                  Prioritization Strategies for
                                  Event-Driven Software  . . . . . . . . . 48--64
               S. Distefano and   
                  M. Scarpa and   
                   A. Puliafito   From UML to Petri Nets: The PCM-Based
                                  Methodology  . . . . . . . . . . . . . . 65--79
              J. H. Andrews and   
                 T. Menzies and   
                    F. C. H. Li   Genetic Algorithms for Randomized Unit
                                  Testing  . . . . . . . . . . . . . . . . 80--94
                    L. Prechelt   Plat\_Forms: A Web Development Platform
                                  Comparison by an Exploratory Experiment
                                  Searching for Emergent Platform
                                  Properties . . . . . . . . . . . . . . . 95--108
                 T. Y. Chen and   
                  T. H. Tse and   
                     Z. Q. Zhou   Semi-Proving: An Integrated Method for
                                  Program Proving, Testing, and Debugging  109--125
                    Y. Kwon and   
                        G. Agha   Verifying the Evolution of Probability
                                  Distributions Governed by a DTMC . . . . 126--141
                      Anonymous   2010 Reviewers List  . . . . . . . . . . 142--144
                      Anonymous   2010 Annual Index  . . . . . . . . . . . Online Only--Online Only
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 37, Number 2, March / April, 2011

                    B. Nuseibeh   Editorial: What Makes a Publication
                                  Archival?  . . . . . . . . . . . . . . . 145--145
                     M. Kim and   
                     Y. Kim and   
                         H. Kim   A Comparative Study of Software Model
                                  Checkers as Unit Testing Tools: An
                                  Industrial Case Study  . . . . . . . . . 146--160
              S. Mouchawrab and   
               L. C. Briand and   
                 Y. Labiche and   
                    M. Di Penta   Assessing, Comparing, and Combining
                                  State Machine-Based Testing and
                                  Structural Testing: A Series of
                                  Experiments  . . . . . . . . . . . . . . 161--187
                       A. Egyed   Automatically Detecting and Tracking
                                  Inconsistencies in Software Design
                                  Models . . . . . . . . . . . . . . . . . 188--204
                A. De Lucia and   
                M. Di Penta and   
                     R. Oliveto   Improving Source Code Lexicon via
                                  Traceability and Information Retrieval   205--227
                  L. Baresi and   
                  C. Ghezzi and   
                     L. Mottola   Loupe: Verifying Publish--Subscribe
                                  Architectures with a Magnifying Lens . . 228--246
                  L. Baresi and   
                      S. Guinea   Self-Supervising BPEL Processes  . . . . 247--263
              K. Praditwong and   
                  M. Harman and   
                         X. Yao   Software Module Clustering as a
                                  Multi-Objective Search Problem . . . . . 264--282
                  O. Dieste and   
                     N. Juristo   Systematic review and aggregation of
                                  empirical studies on elicitation
                                  techniques . . . . . . . . . . . . . . . 283--304
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 37, Number 3, May / June, 2011

                 M. Cataldo and   
                 K. Ehrlich and   
                      A. Mockus   Guest Editors' Introduction: Special
                                  Section on the Socio-Technical
                                  Environment of Software Development
                                  Projects . . . . . . . . . . . . . . . . 305--306
                    I. Kwan and   
                A. Schroter and   
                      D. Damian   Does Socio-Technical Congruence Have an
                                  Effect on Software Build Success? A
                                  Study of Coordination in a Software
                                  Project  . . . . . . . . . . . . . . . . 307--324
          C. R. B. de Souza and   
                 D. F. Redmiles   The Awareness Network, To Whom Should I
                                  Display My Actions? And, Whose Actions
                                  Should I Monitor?  . . . . . . . . . . . 325--340
             B. Cornelissen and   
                 A. Zaidman and   
                 A. van Deursen   A Controlled Experiment for Program
                                  Comprehension through Trace
                                  Visualization  . . . . . . . . . . . . . 341--355
                    Q. Song and   
                     Z. Jia and   
                M. Shepperd and   
                    S. Ying and   
                         J. Liu   A General Software Defect-Proneness
                                  Prediction Framework . . . . . . . . . . 356--370
            P. K. Manadhata and   
                     J. M. Wing   An Attack Surface Metric . . . . . . . . 371--386
               R. Calinescu and   
                 L. Grunske and   
             M. Kwiatkowska and   
               R. Mirandola and   
                 G. Tamburrelli   Dynamic QoS Management and Optimization
                                  in Service-Based Systems . . . . . . . . 387--409
                M. Weidlich and   
                J. Mendling and   
                       M. Weske   Efficient Consistency Measurement Based
                                  on Behavioral Profiles of Process Models 410--429
                     D. Kim and   
                    X. Wang and   
                     S. Kim and   
                  A. Zeller and   
               S. C. Cheung and   
                        S. Park   Which Crashes Should I Fix First?:
                                  Predicting Top Crashes at an Early Stage
                                  to Prioritize Debugging Efforts  . . . . 430--447
                      Anonymous   Distinguish yourself with the CSDP
                                  [advertisement]  . . . . . . . . . . . . 448--448
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 37, Number 4, July / August, 2011

          M. Perepletchikov and   
                        C. Ryan   A Controlled Experiment for Evaluating
                                  the Impact of Coupling on the
                                  Maintainability of Service-Oriented
                                  Software . . . . . . . . . . . . . . . . 449--465
                    M. Ying and   
                        Y. Feng   A Flowchart Language for Quantum
                                  Programming  . . . . . . . . . . . . . . 466--485
                 L. Mariani and   
                 F. Pastore and   
                       M. Pezze   Dynamic Analysis for Diagnosing
                                  Integration Faults . . . . . . . . . . . 486--508
                  N. Salleh and   
                  E. Mendes and   
                      J. Grundy   Empirical Studies of Pair Programming
                                  for CS/SE Teaching in Higher Education:
                                  A Systematic Literature Review . . . . . 509--525
                  A. Bergel and   
                W. Harrison and   
                  V. Cahill and   
                      S. Clarke   FlowTalk: Language Support for
                                  Long-Latency Operations in Embedded
                                  Devices  . . . . . . . . . . . . . . . . 526--543
               X. Amatriain and   
                       P. Arumi   Frameworks Generate Domain-Specific
                                  Languages: A Case Study in the
                                  Multimedia Domain  . . . . . . . . . . . 544--558
                    X. Yuan and   
                M. B. Cohen and   
                    A. M. Memon   GUI Interaction Testing: Incorporating
                                  Event Context  . . . . . . . . . . . . . 559--574
                   L. Burgy and   
              L. Reveillere and   
                  J. Lawall and   
                      G. Muller   Zebu: A Language-Based Approach for
                                  Network Protocol Message Processing  . . 575--591
                      Anonymous   Distinguish yourself with the CSDP
                                  [advertisement]  . . . . . . . . . . . . 592--592
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 37, Number 5, September / October, 2011

                I. Crnkovic and   
               S. Sentilles and   
              A. Vulgarakis and   
              M. R. V. Chaudron   A Classification Framework for Software
                                  Component Models . . . . . . . . . . . . 593--615
                    X. Feng and   
               D. L. Parnas and   
                  T. H. Tse and   
                 T. O'Callaghan   A Comparison of Tabular Expression-Based
                                  Testing Strategies . . . . . . . . . . . 616--634
                 T. W. Kwan and   
                 H. K. N. Leung   A Risk Management Methodology for
                                  Project Risk Dependencies  . . . . . . . 635--648
                     Y. Jia and   
                      M. Harman   An Analysis and Survey of the
                                  Development of Mutation Testing  . . . . 649--678
                    H. Chen and   
                      J. Yu and   
                    C. Hang and   
                    B. Zang and   
                      P. C. Yew   Dynamic Software Updating Using a
                                  Relaxed Consistency Model  . . . . . . . 679--694
               M. Jorgensen and   
                    S. Grimstad   The Impact of Irrelevant and Misleading
                                  Information on Software Development
                                  Effort Estimates: A Randomized
                                  Controlled Field Experiment  . . . . . . 695--707
                  P. Bishop and   
              R. Bloomfield and   
              B. Littlewood and   
               A. Povyakalo and   
                      D. Wright   Toward a Formalism for Conservative
                                  Claims about the Dependability of
                                  Software-Based Systems . . . . . . . . . 708--717
           D. Krishnamurthy and   
                   J. Rolia and   
                          M. Xu   WAM --- The Weighted Average Method for
                                  Predicting the Performance of Systems
                                  with Bursts of Customer Sessions . . . . 718--735
                      Anonymous   IEEE Computer Society Magazines and
                                  Transactions available in ePUB format
                                  [advertisement]  . . . . . . . . . . . . 736--736
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   TSE Information for authors  . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 37, Number 6, November / December, 2011

         J. T. Lallchandani and   
                        R. Mall   A Dynamic Slicing Technique for UML
                                  Architectural Models . . . . . . . . . . 737--771
                    Y. Shin and   
                 A. Meneely and   
                L. Williams and   
                  J. A. Osborne   Evaluating Complexity, Code Churn, and
                                  Developer Activity Metrics as Indicators
                                  of Software Vulnerabilities  . . . . . . 772--787
                   J. Al Dallal   Measuring the Discriminative Power of
                                  Object-Oriented Class Cohesion Metrics   788--804
                     X. Liu and   
                    Y. Yang and   
                   Y. Jiang and   
                        J. Chen   Preventing Temporal Violations in
                                  Scientific Workflows: Where and How  . . 805--825
               L. Carnevali and   
                    L. Ridi and   
                     E. Vicario   Putting Preemptive Time Petri Nets to
                                  Work in a V-Model SW Life Cycle  . . . . 826--844
             G. J. Holzmann and   
                   R. Joshi and   
                       A. Groce   Swarm Verification Techniques  . . . . . 845--857
                 L. Pauleve and   
                  M. Magnin and   
                        O. Roux   Tuning Temporal Features within the
                                  Stochastic $ \pi $-Calculus  . . . . . . 858--871
                  G. Concas and   
                M. Marchesi and   
                  A. Murgia and   
                 R. Tonelli and   
                       I. Turnu   On the Distribution of Bugs in the
                                  Eclipse System . . . . . . . . . . . . . 872--877
                      Anonymous   IEEE Computer Society Magazines and
                                  Transactions available in ePUB format
                                  [advertisement]  . . . . . . . . . . . . 878--878
                      Anonymous   New Transactions Issue Alerts  . . . . . 879--879
                      Anonymous   What's new in Transactions
                                  [advertisement]  . . . . . . . . . . . . 880--880
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   [Inside back cover]  . . . . . . . . . . c3--c3
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2


IEEE Transactions on Software Engineering
Volume 38, Number 1, January / February, 2012

                    B. Nuseibeh   State of the Journal . . . . . . . . . . 1--2
                J. M. Atlee and   
                   P. Inverardi   Guest Editor's Introduction:
                                  International Conference on Software
                                  Engineering  . . . . . . . . . . . . . . 3--4
             E. Murphy-Hill and   
                  C. Parnin and   
                    A. P. Black   How We Refactor, and How We Know It  . . 5--18
                  C. Treude and   
                   M. A. Storey   Work Item Tagging: Communicating
                                  Concerns in Collaborative Software
                                  Development  . . . . . . . . . . . . . . 19--34
                  A. Mesbah and   
             A. van Deursen and   
                       D. Roest   Invariant-Based Automatic Testing of
                                  Modern Web Applications  . . . . . . . . 35--53
                C. Le Goues and   
                  T. Nguyen and   
                 S. Forrest and   
                      W. Weimer   GenProg: A Generic Method for Automatic
                                  Software Repair  . . . . . . . . . . . . 54--72
                   S. Malek and   
              N. Medvidovic and   
                 M. Mikic-Rakic   An Extensible Framework for Improving a
                                  Distributed Software System's Deployment
                                  Architecture . . . . . . . . . . . . . . 73--100
                  R. Toledo and   
                   A. Nunez and   
                  E. Tanter and   
                        J. Noye   Aspectizing Java Access Control  . . . . 101--117
               M. Mortensen and   
                   S. Ghosh and   
                      J. Bieman   Aspect-Oriented Refactoring of Legacy
                                  Applications: An Evaluation  . . . . . . 118--140
                 G. de Caso and   
               V. Braberman and   
            D. Garbervetsky and   
                     S. Uchitel   Automated Abstractions for Contract
                                  Validation . . . . . . . . . . . . . . . 141--162
                    U. Raja and   
                  M. J. Tretter   Defining and Evaluating a Measure of
                                  Open Source Project Survivability  . . . 163--174
                C. Le Goues and   
                      W. Weimer   Measuring Code Quality to Improve
                                  Specification Mining . . . . . . . . . . 175--190
         P. C. Van Oorschot and   
                     G. Wurster   Reducing Unauthorized Modification of
                                  Digital Objects  . . . . . . . . . . . . 191--204
              M. Tribastone and   
                 S. Gilmore and   
                    J. Hillston   Scalable Differential Analysis of
                                  Process Algebra Models . . . . . . . . . 205--219
                     H. Liu and   
                      Z. Ma and   
                    W. Shao and   
                         Z. Niu   Schedule of Bad Smell Detection and
                                  Resolution: A New Way to Save Effort . . 220--235
                      Anonymous   2011 Reviewers List  . . . . . . . . . . 236--238
                      Anonymous   Introduction to OnlinePlus Video
                                  [advertisement]  . . . . . . . . . . . . 239--239
                      Anonymous   What's new in Transactions
                                  [advertisement]  . . . . . . . . . . . . 240--240
                      Anonymous   2011 Annual Index  . . . . . . . . . . . Online Only
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Cover3] . . . . . . . . . . . . . . . . c3--c3
                      Anonymous   [Front inside cover] . . . . . . . . . . c2--c2
                      Anonymous   Table of Contents [Front cover]  . . . . c1--c1

IEEE Transactions on Software Engineering
Volume 38, Number 2, March / April, 2012

                    A. Orso and   
                     P. Tonella   Guest Editorial: Special Section on the
                                  International Symposium on Software
                                  Testing and Analysis 2010  . . . . . . . 241--242
               V. Dallmeier and   
                   N. Knopp and   
                  C. Mallon and   
                  G. Fraser and   
                    S. Hack and   
                      A. Zeller   Automatically Generating Test Cases for
                                  Specification Mining . . . . . . . . . . 243--257
                  A. Arcuri and   
                M. Z. Iqbal and   
                      L. Briand   Random Testing: Theoretical Results and
                                  Practical Implications . . . . . . . . . 258--277
                  G. Fraser and   
                      A. Zeller   Mutation-Driven Generation of Unit Tests
                                  and Oracles  . . . . . . . . . . . . . . 278--292
                    T. Kwon and   
                          Z. Su   Automatic Detection of Unsafe Dynamic
                                  Component Loadings . . . . . . . . . . . 293--313
                   S. Artzi and   
                   J. Dolby and   
                     F. Tip and   
                     M. Pistoia   Fault Localization for Dynamic Web
                                  Applications . . . . . . . . . . . . . . 314--335
                     A. Sen and   
              K. Ramamurthy and   
                    A. P. Sinha   A Model of Data Warehousing Process
                                  Maturity . . . . . . . . . . . . . . . . 336--353
                 M. Shousha and   
                  L. Briand and   
                     Y. Labiche   A UML/MARTE Model Analysis Method for
                                  Uncovering Scenarios Leading to
                                  Starvation and Deadlocks in Concurrent
                                  Systems  . . . . . . . . . . . . . . . . 354--374
                K. Dejaeger and   
                 W. Verbeke and   
                 D. Martens and   
                     B. Baesens   Data Mining Techniques for Software
                                  Effort Estimation: A Comparative Study   375--397
        M. Unterkalmsteiner and   
                T. Gorschek and   
          A. K. M. M. Islam and   
                C. K. Cheng and   
              R. B. Permadi and   
                       R. Feldt   Evaluation and Measurement of Software
                                  Process Improvement --- a Systematic
                                  Literature Review  . . . . . . . . . . . 398--424
              E. Kocaguneli and   
                 T. Menzies and   
                   A. Bener and   
                    J. W. Keung   Exploiting the Essential Assumptions of
                                  Analogy-Based Effort Estimation  . . . . 425--438
             J. L. Salmeron and   
                       C. Lopez   Forecasting Risk Impact on ERP
                                  Maintenance with Augmented Fuzzy
                                  Cognitive Maps . . . . . . . . . . . . . 439--452
                  P. McMinn and   
                  M. Harman and   
                K. Lakhotia and   
                 Y. Hassoun and   
                     J. Wegener   Input Domain Reduction through
                                  Irrelevant Variable Removal and Its
                                  Effect on Local, Global, and Hybrid
                                  Search-Based Structural Test Data
                                  Generation . . . . . . . . . . . . . . . 453--477
            F. A. Schreiber and   
                R. Camplani and   
               M. Fortunato and   
                 M. Marelli and   
                        G. Rota   PerLa: A Language and Middleware
                                  Architecture for Data Management and
                                  Integration in Pervasive Information
                                  Systems  . . . . . . . . . . . . . . . . 478--496
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Cover2] . . . . . . . . . . . . . . . . c2--c2
                      Anonymous   [Inside back cover]  . . . . . . . . . . c3--c3
                      Anonymous   Table of Contents [Front cover]  . . . . c1--c1

IEEE Transactions on Software Engineering
Volume 38, Number 3, May / June, 2012

                      A. Arcuri   A Theoretical and Empirical Analysis of
                                  the Role of Test Sequence Length in
                                  Software Testing for Structural Coverage 497--519
                F. Cuadrado and   
               J. C. Duenas and   
              R. Garcia-Carmona   An Autonomous Engine for Services
                                  Configuration and Deployment . . . . . . 520--536
                 J. Brickey and   
                 S. Walczak and   
                     T. Burgess   Comparing Semi-Automated Clustering
                                  Methods for Persona Development  . . . . 537--546
            J. W. Wilkerson and   
            J. F. Nunamaker and   
                      R. Mercer   Comparing the Defect Reduction Benefits
                                  of Code Inspection and Test-Driven
                                  Development  . . . . . . . . . . . . . . 547--560
                 A. Kalbasi and   
           D. Krishnamurthy and   
                   J. Rolia and   
                      S. Dawson   DEC: Service Demand Estimation with
                                  Confidence . . . . . . . . . . . . . . . 561--578
           D. Rothlisberger and   
                   M. Harry and   
                  W. Binder and   
                   P. Moret and   
                D. Ansaloni and   
                A. Villazon and   
                  O. Nierstrasz   Exploiting Dynamic Information in IDEs
                                  Improves Speed and Correctness of
                                  Software Maintenance Tasks . . . . . . . 579--591
               I. Di Pietro and   
             F. Pagliarecci and   
                    L. Spalazzi   Model Checking Semantically Annotated
                                  Services . . . . . . . . . . . . . . . . 592--608
           V. Andrikopoulos and   
               S. Benbernou and   
               M. P. Papazoglou   On the Evolution of Services . . . . . . 609--628
                  R. M. Hierons   Oracles for Distributed Testing  . . . . 629--641
          R. Khatchadourian and   
               P. Greenwood and   
                  A. Rashid and   
                          G. Xu   Pointcut Rejuvenation: Recovering
                                  Pointcut Expressions in Evolving
                                  Aspect-Oriented Software . . . . . . . . 642--657
                          W. Li   QoS Assurance for Dynamic
                                  Reconfiguration of Component-Based
                                  Software Systems . . . . . . . . . . . . 658--676
               M. Jorgensen and   
                    S. Grimstad   Software Development Estimation Biases:
                                  The Role of Interdependence  . . . . . . 677--693
                A. Lienhard and   
                   T. Girba and   
                  O. Nierstrasz   Specifying Dynamic Analyses by Extending
                                  Language Semantics . . . . . . . . . . . 694--706
                  S. L. Lim and   
                 A. Finkelstein   StakeRare: Using Social Networks and
                                  Collaborative Filtering for Large-Scale
                                  Requirements Elicitation . . . . . . . . 707--735
                      Anonymous   IEEE Computer Society OnlinePlus Coming
                                  Soon to TSE  . . . . . . . . . . . . . . 736--736
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Inside back cover]  . . . . . . . . . . c3--c3
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   Table of Contents [Front cover]  . . . . c1--c1

IEEE Transactions on Software Engineering
Volume 38, Number 4, July / August, 2012

              M. T. Valente and   
                  V. Borges and   
                      L. Passos   A Semi-Automatic Approach for Extracting
                                  Software Product Lines . . . . . . . . . 737--754
                R. Mateescu and   
                  P. Poizat and   
                 G. Salaün   Adaptation of Service Protocols Using
                                  Process Algebra and On-the-Fly Reduction
                                  Techniques . . . . . . . . . . . . . . . 755--777
                  G. Casale and   
                 A. Kalbasi and   
           D. Krishnamurthy and   
                       J. Rolia   BURN: Enabling Workload Burstiness in
                                  Customized Service Benchmarks  . . . . . 778--793
                 T. Y. Chen and   
                 P. L. Poon and   
                 S. F. Tang and   
                      T. H. Tse   DESSERT: a DividE-and-conquer
                                  methodology for identifying categorieS,
                                  choiceS, and choicE Relations for Test
                                  case generation  . . . . . . . . . . . . 794--809
               D. E. Harter and   
              C. F. Kemerer and   
                S. A. Slaughter   Does Software Process Improvement Reduce
                                  the Severity of Defects? A Longitudinal
                                  Field Study  . . . . . . . . . . . . . . 810--827
                   O. Moser and   
               F. Rosenberg and   
                     S. Dustdar   Domain-Specific Service Selection for
                                  Composite Services . . . . . . . . . . . 828--843
                      S. Lu and   
                    S. Park and   
                        Y. Zhou   Finding Atomicity-Violation Bugs through
                                  Unserializable Interleaving Testing  . . 844--860
              M. Tribastone and   
                    J. Ding and   
                 S. Gilmore and   
                    J. Hillston   Fluid Rewards for a Stochastic Process
                                  Algebra  . . . . . . . . . . . . . . . . 861--874
                  G. Parmer and   
                        R. West   Mutable Protection Domains: Adapting
                                  System Fault Isolation for Reliability
                                  and Efficiency . . . . . . . . . . . . . 875--888
                   A. Sarma and   
             D. F. Redmiles and   
                A. van der Hoek   Palantir: Early Detection of Development
                                  Conflicts Arising from Parallel Code
                                  Changes  . . . . . . . . . . . . . . . . 889--908
                     P. Liu and   
                       C. Zhang   Pert: The Application-Aware Tailoring of
                                  Java Object Persistence  . . . . . . . . 909--922
      R. Berntsson Svensson and   
                T. Gorschek and   
                 B. Regnell and   
                  R. Torkar and   
               A. Shahrokni and   
                       R. Feldt   Quality Requirements in Industrial
                                  Practice --- an Extended Interview Study
                                  at Eleven Companies  . . . . . . . . . . 923--935
                 S. Mirarab and   
                S. Akhlaghi and   
                  L. Tahvildari   Size-Constrained Regression Test Case
                                  Selection Using Multicriteria
                                  Optimization . . . . . . . . . . . . . . 936--956
                L. Cordeiro and   
                 B. Fischer and   
               J. Marques-Silva   SMT-Based Bounded Model Checking for
                                  Embedded ANSI-C Software . . . . . . . . 957--974
                A. Coronato and   
                   G. De Pietro   Tools for the Rapid Prototyping of
                                  Provably Correct Ambient Intelligence
                                  Applications . . . . . . . . . . . . . . 975--991
                      Anonymous   New Transactions Newsletter
                                  [advertisement]  . . . . . . . . . . . . 992--992
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Inside back cover]  . . . . . . . . . . c3--c3
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   Table of Contents [Front cover]  . . . . c1--c1

IEEE Transactions on Software Engineering
Volume 38, Number 5, September / October, 2012

                    K. Lind and   
                      R. Heldal   A Practical Approach to Size Estimation
                                  of Embedded Software Components  . . . . 993--1007
               H. A. Nguyen and   
               T. T. Nguyen and   
                 N. H. Pham and   
               J. Al-Kofahi and   
                   T. N. Nguyen   Clone Management for Evolving Software   1008--1026
                 F. Zickert and   
                        R. Beck   Coping with Existing Systems in
                                  Information Systems Development  . . . . 1027--1039
                  G. Casale and   
                      N. Mi and   
              L. Cherkasova and   
                      E. Smirni   Dealing with Burstiness in Multi-Tier
                                  Applications: Models and Their
                                  Parameterization . . . . . . . . . . . . 1040--1053
               N. Ramasubbu and   
              C. F. Kemerer and   
                        J. Hong   Structural Complexity and Programmer
                                  Team Strategy: An Experimental Test  . . 1054--1068
                C. McMillan and   
               M. Grechanik and   
              D. Poshyvanyk and   
                      C. Fu and   
                         Q. Xie   Exemplar: A Source Code Search Engine
                                  for Finding Highly Relevant Applications 1069--1087
                  A. Arcuri and   
                      L. Briand   Formal Analysis of the Probability of
                                  Interaction Fault Detection Using Random
                                  Testing  . . . . . . . . . . . . . . . . 1088--1099
                     S. Liu and   
                    Y. Chen and   
                  F. Nagoya and   
                 J. A. McDermid   Formal Specification-Based Inspection
                                  for Verification of Programs . . . . . . 1100--1122
                   C. Zhang and   
                 H. A. Jacobsen   Mining Crosscutting Concerns through
                                  Random Walks . . . . . . . . . . . . . . 1123--1137
              V. Cardellini and   
             E. Casalicchio and   
                  V. Grassi and   
                S. Iannucci and   
               F. L. Presti and   
                   R. Mirandola   MOSES: A Framework for QoS Driven
                                  Runtime Adaptation of Service-Oriented
                                  Systems  . . . . . . . . . . . . . . . . 1138--1159
               W. N. Sumner and   
                   Y. Zheng and   
              D. Weeratunge and   
                       X. Zhang   Precise Calling Context Encoding . . . . 1160--1177
              B. Littlewood and   
                      J. Rushby   Reasoning about the Reliability of
                                  Diverse Two-Channel Systems in Which One
                                  Channel Is ``Possibly Perfect''  . . . . 1178--1194
                    J. Xuan and   
                   H. Jiang and   
                     Z. Ren and   
                         Z. Luo   Solving the Large Scale Next Release
                                  Problem with a Backbone-Based Multilevel
                                  Algorithm  . . . . . . . . . . . . . . . 1195--1212
                   C. Zhang and   
                      D. Budgen   What Do We Know about the Effectiveness
                                  of Software Design Patterns? . . . . . . 1213--1231
                      Anonymous   IEEE Open Access Publishing
                                  [advertisement]  . . . . . . . . . . . . 1232--1232
                      Anonymous   IEEE Computer Society [Back cover] . . . c4--c4
                      Anonymous   [Inside front cover] . . . . . . . . . . c2--c2
                      Anonymous   Table of Contents [Front cover]  . . . . c1--c1
                      Anonymous   TSE information for authors [inside back
                                  cover] . . . . . . . . . . . . . . . . . c3--c3

IEEE Transactions on Software Engineering
Volume 38, Number 6, November / December, 2012

            M. Schäfer and   
                   A. Thies and   
                F. Steimann and   
                         F. Tip   A Comprehensive Approach to Naming and
                                  Accessibility in Refactoring Java
                                  Programs . . . . . . . . . . . . . . . . 1233--1257
                     H. Mei and   
                     D. Hao and   
                   L. Zhang and   
                   L. Zhang and   
                    J. Zhou and   
                   G. Rothermel   A Static Approach to Prioritizing JUnit
                                  Test Cases . . . . . . . . . . . . . . . 1258--1275
                    T. Hall and   
                 S. Beecham and   
                   D. Bowes and   
                    D. Gray and   
                    S. Counsell   A Systematic Literature Review on Fault
                                  Prediction Performance in Software
                                  Engineering  . . . . . . . . . . . . . . 1276--1304
          L. Búrdalo and   
                 A. Terrasa and   
                A. Espinosa and   
        A. García-Fornes   Analyzing the Effect of Gain Time on
                                  Soft-Task Scheduling Policies in
                                  Real-Time Systems  . . . . . . . . . . . 1305--1318
                  F. Brosch and   
                H. Koziolek and   
                 B. Buhnova and   
                    R. Reussner   Architecture-Based Reliability
                                  Prediction with the Palladio Component
                                  Model  . . . . . . . . . . . . . . . . . 1319--1339
               C. M. Hayden and   
                E. K. Smith and   
             E. A. Hardisty and   
                   M. Hicks and   
                   J. S. Foster   Evaluating Dynamic Software Update
                                  Safety Using Systematic Testing  . . . . 1340--1354
                  S. Nejati and   
              M. Sabetzadeh and   
                 M. Chechik and   
             S. Easterbrook and   
                        P. Zave   Matching and Merging of Variant Feature
                                  Specifications . . . . . . . . . . . . . 1355--1375
             N. I. Altintas and   
                   S. Cetin and   
                A. H. Dogru and   
                   H. Oguztuzun   Modeling Product Line Software Assets
                                  Using Domain-Specific Kits . . . . . . . 1376--1402
              E. Kocaguneli and   
                 T. Menzies and   
                    J. W. Keung   On the Value of Ensemble Effort
                                  Estimation . . . . . . . . . . . . . . . 1403--1416
             E. Murphy-Hill and   
                    A. P. Black   Programmer-Friendly Refactoring Errors   1417--1431
               M. M. Geipel and   
                  F. Schweitzer   The Link between Dependency and
                                  Cochange: Empirical Evidence . . . . . . 1432--1444
                  D. Cassou and   
                 J. Bruneau and   
                  C. Consel and   
                     E. Balland   Toward a Tool-Based Development
                                  Methodology for Pervasive Computing
                                  Applications . . . . . . . . . . . . . . 1445--1463
             A. Heydarnoori and   
               K. Czarnecki and   
                  W. Binder and   
               T. T. Bartolomei   Two Studies of Framework-Usage Templates
                                  Extracted from Dynamic Traces  . . . . . 1464--1487
                      Anonymous   OnlinePlus Coming Soon to TSE
                                  [advertisement]  . . . . . . . . . . . . 1488--1488
                      Anonymous   [Back cover] . . . . . . . . . . . . . . c4--c4
                      Anonymous   [Back inside cover]  . . . . . . . . . . c3--c3
                      Anonymous   [Front inside cover] . . . . . . . . . . c2--c2
                      Anonymous   [Table of contents --- Front cover]  . . c1--c1


IEEE Transactions on Software Engineering
Volume 39, Number 1, January, 2013

                 W. N. Chen and   
                       J. Zhang   Ant Colony Optimization for Software
                                  Project Scheduling and Staffing with an
                                  Event-Based Scheduler  . . . . . . . . . 1--17
                 D. Falessi and   
                 G. Cantone and   
                     G. Canfora   Empirical Principles and an Industrial
                                  Case Study in Retrieving Equivalent
                                  Requirements via Natural Language
                                  Processing Techniques  . . . . . . . . . 18--44
                     M. Kim and   
                  D. Notkin and   
                D. Grossman and   
                      G. Wilson   Identifying and Summarizing Systematic
                                  Code Changes via Rule Inference  . . . . 45--62
                    S. Apel and   
            C. Kästner and   
                    C. Lengauer   Language-Independent and Automated
                                  Software Composition: The FeatureHouse
                                  Experience . . . . . . . . . . . . . . . 63--79
                 R. Natella and   
                D. Cotroneo and   
               J. A. Duraes and   
                  H. S. Madeira   On Fault Representativeness of Software
                                  Fault Injection  . . . . . . . . . . . . 80--96
               R. A. Hayden and   
              J. T. Bradley and   
                       A. Clark   Performance Specification and Evaluation
                                  with Unified Stochastic Probes and Fluid
                                  Analysis . . . . . . . . . . . . . . . . 97--118
                   L. Duboc and   
                  E. Letier and   
                D. S. Rosenblum   Systematic Elaboration of Scalability
                                  Requirements through Goal-Obstacle
                                  Analysis . . . . . . . . . . . . . . . . 119--140
                      Anonymous   2012 Reviewers List  . . . . . . . . . . 141--144
                      Anonymous   2012 Annual Index  . . . . . . . . . . . Not in print--Not in print

IEEE Transactions on Software Engineering
Volume 39, Number 2, February, 2013

                    B. Nuseibeh   Editorial: State of the Journal  . . . . 145--146
                  G. Soares and   
                   R. Gheyi and   
                     T. Massoni   Automated Behavioral Testing of
                                  Refactoring Engines  . . . . . . . . . . 147--162
                A. Shahbazi and   
            A. F. Tappenden and   
                      J. Miller   Centroidal Voronoi Tessellations --- a
                                  New Approach to Random Testing . . . . . 163--183
                M. Piccioni and   
                   M. Oriol and   
                       B. Meyer   Class Schema Evolution for Persistent
                                  Object-Oriented Software: Model,
                                  Empirical Study, and Automated Support   184--196
                J. Lawrance and   
                  C. Bogart and   
                 M. Burnett and   
                 R. Bellamy and   
                  K. Rector and   
                  S. D. Fleming   How Programmers Debug, Revisited: An
                                  Information Foraging Theory Perspective  197--215
                    S. Leue and   
                         W. Wei   Integer Linear Programming-Based
                                  Property Checking for Asynchronous
                                  Reactive Systems . . . . . . . . . . . . 216--236
                K. Dejaeger and   
               T. Verbraken and   
                     B. Baesens   Toward Comprehensible Software Fault
                                  Prediction Models Using Bayesian Network
                                  Classifiers  . . . . . . . . . . . . . . 237--257
            S. e. Z. Haidry and   
                      T. Miller   Using Dependency Structures for
                                  Prioritization of Functional Test Suites 258--275
                  G. Fraser and   
                      A. Arcuri   Whole Test Suite Generation  . . . . . . 276--291

IEEE Transactions on Software Engineering
Volume 39, Number 3, March, 2013

               L. Carnevali and   
                    L. Ridi and   
                     E. Vicario   A Quantitative Approach to Input
                                  Generation in Real-Time Testing of
                                  Stochastic Systems . . . . . . . . . . . 292--304
             J. N. Oliveira and   
                 M. A. Ferreira   Alloy Meets the Algebra of Programming:
                                  A Case Study . . . . . . . . . . . . . . 305--326
          S. Abrahão and   
                 C. Gravino and   
                 E. Insfran and   
              G. Scanniello and   
                     G. Tortora   Assessing the Effectiveness of Sequence
                                  Diagrams in the Comprehension of
                                  Functional Requirements: Results from a
                                  Family of Five Experiments . . . . . . . 327--342
                 M. Cataldo and   
                 J. D. Herbsleb   Coordination Breakdowns and Their Impact
                                  on Development Productivity and Software
                                  Failures . . . . . . . . . . . . . . . . 343--360
                 D. Alrajeh and   
                  J. Kramer and   
                   A. Russo and   
                     S. Uchitel   Elaborating Requirements Using Model
                                  Checking and Inductive Learning  . . . . 361--383
               M. S. Raunak and   
                L. J. Osterweil   Resource Management for Complex, Dynamic
                                  Environments . . . . . . . . . . . . . . 384--402
                    L. Rosa and   
               L. Rodrigues and   
                   A. Lopes and   
                M. Hiltunen and   
                 R. Schlichting   Self-Management of Adaptable
                                  Component-Based Applications . . . . . . 403--421
                    R. Hoda and   
                   J. Noble and   
                    S. Marshall   Self-Organizing Roles on Agile Software
                                  Development Teams  . . . . . . . . . . . 422--444

IEEE Transactions on Software Engineering
Volume 39, Number 4, April, 2013

                  A. Perini and   
                    A. Susi and   
                     P. Avesani   A Machine Learning Approach to Software
                                  Requirements Prioritization  . . . . . . 445--461
           T. Galinac Grbac and   
                 P. Runeson and   
                  D. Huljeni\'c   A Second Replicated Quantitative
                                  Analysis of Fault Distributions in
                                  Complex Software Systems . . . . . . . . 462--476
                   S. Ikeda and   
                  M. Jibiki and   
                        Y. Kuno   Coverage Estimation in Model Checking
                                  with Bitstate Hashing  . . . . . . . . . 477--486
               J. C. Grundy and   
                 J. Hosking and   
                   K. N. Li and   
                  N. M. Ali and   
                     J. Huh and   
                       R. L. Li   Generating Domain-Specific Visual
                                  Language Tools from Abstract Visual
                                  Specifications . . . . . . . . . . . . . 487--515
                    X. Wang and   
                   L. Zhang and   
                     T. Xie and   
                     H. Mei and   
                         J. Sun   Locating Need-to-Externalize Constant
                                  Strings for Software
                                  Internationalization with Generalized
                                  String-Taint Analysis  . . . . . . . . . 516--536
                  N. Mittas and   
                     L. Angelis   Ranking and Clustering Software Cost
                                  Estimation Models through a Multiple
                                  Comparisons Algorithm  . . . . . . . . . 537--551
                 S. Shivaji and   
         E. James Whitehead and   
                  R. Akella and   
                         S. Kim   Reducing Features to Improve Code
                                  Change-Based Bug Prediction  . . . . . . 552--569
            P. Reales Mateo and   
             M. Polo Usaola and   
J. L. Fernández Alemán   Validating Second-Order Mutation at
                                  System Level . . . . . . . . . . . . . . 570--587

IEEE Transactions on Software Engineering
Volume 39, Number 5, May, 2013

                    B. Nuseibeh   Editorial [new associate editors]  . . . 588--590
                  V. Nallur and   
                     R. Bahsoon   A decentralized self-adaptation
                                  mechanism for service-based applications
                                  in the cloud . . . . . . . . . . . . . . 591--612
            M. P. Robillard and   
                  E. Bodden and   
                D. Kawrykow and   
                  M. Mezini and   
                   T. Ratchford   Automated API Property Inference
                                  Techniques . . . . . . . . . . . . . . . 613--637
               L. Carnevali and   
                 A. Pinzuti and   
                     E. Vicario   Compositional Verification for
                                  Hierarchical Scheduling of Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 638--657
                   A. Aleti and   
                 B. Buhnova and   
                 L. Grunske and   
                A. Koziolek and   
                   I. Meedeniya   Software Architecture Optimization
                                  Methods: A Systematic Literature Review  658--683
                   Cemal Yilmaz   Test Case-Aware Combinatorial
                                  Interaction Testing  . . . . . . . . . . 684--706
                 J. Itkonen and   
    M. V. Mäntylä and   
                   C. Lassenius   The Role of the Tester's Knowledge in
                                  Exploratory Software Testing . . . . . . 707--724
                     N. Ali and   
Y. G. Guéhéneuc and   
                    G. Antoniol   Trustrace: Mining Software Repositories
                                  to Improve the Accuracy of Requirement
                                  Traceability Links . . . . . . . . . . . 725--741

IEEE Transactions on Software Engineering
Volume 39, Number 6, June, 2013

                    B. Nuseibeh   In Memoriam --- David Notkin
                                  (1953--2013) . . . . . . . . . . . . . . 742--743
                  M. Tribastone   A fluid model for layered queueing
                                  networks . . . . . . . . . . . . . . . . 744--756
                   Y. Kamei and   
                  E. Shihab and   
                   B. Adams and   
               A. E. Hassan and   
                  A. Mockus and   
                   A. Sinha and   
                    N. Ubayashi   A large-scale empirical study of
                                  just-in-time quality assurance . . . . . 757--773
                  M. Marron and   
                 C. Sanchez and   
                      Z. Su and   
                   M. Fahndrich   Abstracting runtime heaps for program
                                  understanding  . . . . . . . . . . . . . 774--786
                   R. Baker and   
                       I. Habli   An Empirical Evaluation of Mutation
                                  Testing for Improving the Test Quality
                                  of Safety-Critical Software  . . . . . . 787--805
                  M. Cinque and   
                D. Cotroneo and   
                     A. Pecchia   Event Logs for the Analysis of Software
                                  Failures: A Rule-Based Approach  . . . . 806--821
                 T. Menzies and   
                 A. Butcher and   
                     D. Cok and   
                  A. Marcus and   
                  L. Layman and   
                   F. Shull and   
                  B. Turhan and   
                  T. Zimmermann   Local versus Global Lessons for Defect
                                  Prediction and Effort Estimation . . . . 822--834
                 Y. Rafique and   
                V. B. Mi\vsi\'c   The Effects of Test-Driven Development
                                  on External Quality and Productivity: A
                                  Meta-Analysis  . . . . . . . . . . . . . 835--856
         G. Rodriguez-Navas and   
                     J. Proenza   Using Timed Automata for Modeling
                                  Distributed Systems with Clocks:
                                  Challenges and Solutions . . . . . . . . 857--868
               I. Malavolta and   
                    P. Lago and   
                 H. Muccini and   
             P. Pelliccione and   
                        A. Tang   What Industry Needs from Architectural
                                  Languages: A Survey  . . . . . . . . . . 869--891

IEEE Transactions on Software Engineering
Volume 39, Number 7, July, 2013

         K. Androutsopoulos and   
                   D. Clark and   
                  M. Harman and   
              R. M. Hierons and   
                      Z. Li and   
                       L. Tratt   Amorphous Slicing of Extended Finite
                                  State Machines . . . . . . . . . . . . . 892--909
                     J. Lee and   
                        I. Shin   EDZL Schedulability Analysis in
                                  Real-Time Multicore Scheduling . . . . . 910--916
                  J. Brandt and   
            M. Gemünde and   
               K. Schneider and   
               S. K. Shukla and   
                   J. P. Talpin   Embedding Polychrony into Synchrony  . . 917--929
                E. di Bella and   
                  I. Fronza and   
                N. Phaphoom and   
                A. Sillitti and   
                   G. Succi and   
                    J. Vlasenko   Pair Programming and Software Defects
                                  --- a Large, Industrial Case Study . . . 930--953
                  A. Zisman and   
             G. Spanoudakis and   
                  J. Dooley and   
                    I. Siveroni   Proactive and Reactive Runtime Service
                                  Discovery: A Framework and Its
                                  Evaluation . . . . . . . . . . . . . . . 954--974
                G. E. Sibay and   
               V. Braberman and   
                 S. Uchitel and   
                      J. Kramer   Synthesizing Modal Transition Systems
                                  from Triggered Scenarios . . . . . . . . 975--1001
              B. Kitchenham and   
    D. I. K. Sjòberg and   
              T. Dybå and   
             O. P. Brereton and   
                  D. Budgen and   
               M. Höst and   
                     P. Runeson   Trends in the Quality of Human-Centric
                                  Software Engineering Experiments --- a
                                  Quasi-Experiment . . . . . . . . . . . . 1002--1017
                     Y. Liu and   
                    W. Chen and   
                  Y. A. Liu and   
                     J. Sun and   
                S. J. Zhang and   
                     J. S. Dong   Verifying Linearizability via Optimized
                                  Refinement Checking  . . . . . . . . . . 1018--1039

IEEE Transactions on Software Engineering
Volume 39, Number 8, August, 2013

              E. Kocaguneli and   
                 T. Menzies and   
                   J. Keung and   
                     D. Cok and   
                     R. Madachy   Active learning and effort estimation:
                                  Finding the essential content of
                                  software effort estimation data  . . . . 1040--1053
                  F. Peters and   
                 T. Menzies and   
                    L. Gong and   
                       H. Zhang   Balancing Privacy and Utility in
                                  Cross-Company Defect Prediction  . . . . 1054--1068
                 A. Classen and   
                   M. Cordy and   
            P. Y. Schobbens and   
                 P. Heymans and   
                   A. Legay and   
                   J. F. Raskin   Featured Transition Systems: Foundations
                                  for Verifying Variability-Intensive
                                  Systems and Their Application to LTL
                                  Model Checking . . . . . . . . . . . . . 1069--1089
                S. Kpodjedo and   
                   F. Ricca and   
                P. Galinier and   
                G. Antoniol and   
  Y. G. Guéhéneuc   MADMatch: Many-to-Many Approximate
                                  Diagram Matching for Design Comparison   1090--1111
                     H. Liu and   
                     X. Guo and   
                        W. Shao   Monitor-Based Instant Software
                                  Refactoring  . . . . . . . . . . . . . . 1112--1126
                  M. Pradel and   
                    T. R. Gross   Name-Based Analysis of Equally Typed
                                  Method Arguments . . . . . . . . . . . . 1127--1143
    D. I. K. Sjòberg and   
               A. Yamashita and   
              B. C. D. Anda and   
                  A. Mockus and   
                  T. Dybå   Quantifying the Effect of Code Smells on
                                  Maintenance Effort . . . . . . . . . . . 1144--1156
                N. Janevski and   
         K. Goseva-Popstojanova   Session Reliability of Web Systems under
                                  Heavy-Tailed Workloads: An Approach
                                  Based on Design and Analysis of
                                  Experiments  . . . . . . . . . . . . . . 1157--1178
                 N. Torrado and   
                M. P. Wiper and   
                    R. E. Lillo   Software Reliability Modeling with
                                  Software Metrics Data via Gaussian
                                  Processes  . . . . . . . . . . . . . . . 1179--1186

IEEE Transactions on Software Engineering
Volume 39, Number 9, September, 2013

                    B. Nuseibeh   Editorial  . . . . . . . . . . . . . . . 1187--1189
                 D. Milicev and   
                  Z. Mijailovic   Capsule-Based User Interface Modeling
                                  for Large-Scale Applications . . . . . . 1190--1207
                M. Shepperd and   
                    Q. Song and   
                     Z. Sun and   
                        C. Mair   Data Quality: Some Comments on the NASA
                                  Software Defect Datasets . . . . . . . . 1208--1215
              W. L. Andrade and   
               P. D. L. Machado   Generating Test Cases for Real-Time
                                  Systems Based on Symbolic Models . . . . 1216--1229
                 L. Padgham and   
                   Z. Zhang and   
             J. Thangarajah and   
                      T. Miller   Model-Based Test Oracle Generation for
                                  Automated Unit Testing of Agent Systems  1230--1244
                 H. C. Jiau and   
                  L. W. Mar and   
                     J. C. Chen   OBEY: Optimal Batched Refactoring Plan
                                  Execution for Class Responsibility
                                  Redistribution . . . . . . . . . . . . . 1245--1263
                  W. Maalej and   
                M. P. Robillard   Patterns of Knowledge in API Reference
                                  Documentation  . . . . . . . . . . . . . 1264--1282
             J. P. Galeotti and   
                  N. Rosner and   
   C. G. López Pombo and   
                    M. F. Frias   TACO: Efficient SAT-Based Bounded
                                  Verification Using Symmetry Breaking and
                                  Tight Bounds . . . . . . . . . . . . . . 1283--1307
                 Y. Moffett and   
                  J. Dingel and   
                    A. Beaulieu   Verifying Protocol Conformance Using
                                  Software Model Checking for the
                                  Model-Driven Development of Embedded
                                  Systems  . . . . . . . . . . . . . . . . 1307--13256

IEEE Transactions on Software Engineering
Volume 39, Number 10, October, 2013

                 S. Sampath and   
                   R. Bryce and   
                    A. M. Memon   A Uniform Representation of Hybrid
                                  Criteria for Regression Testing  . . . . 1326--1344
                  A. Monden and   
                 T. Hayashi and   
                 S. Shinoda and   
                  K. Shirai and   
                 J. Yoshida and   
                  M. Barker and   
                   K. Matsumoto   Assessing the Cost Effectiveness of
                                  Fault Prediction in Acceptance Testing   1345--1357
                    Y. Brun and   
                  R. Holmes and   
                M. D. Ernst and   
                      D. Notkin   Early Detection of Collaboration
                                  Conflicts and Risks  . . . . . . . . . . 1358--1375
                     S. Ali and   
            M. Zohaib Iqbal and   
                  A. Arcuri and   
                   L. C. Briand   Generating Test Data from OCL
                                  Constraints with Search Techniques . . . 1376--1402
                   D. Basin and   
                  M. Harvan and   
                F. Klaedtke and   
                   E. Zalinescu   Monitoring Data Usage in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 1403--1426
               S. W. Thomas and   
                M. Nagappan and   
                D. Blostein and   
                   A. E. Hassan   The Impact of Classifier Configuration
                                  and Classifier Combination on Bug
                                  Localization . . . . . . . . . . . . . . 1427--1443
                      C. Ye and   
                 H. A. Jacobsen   Whitening SOA Testing via Event Exposure 1444--1465

IEEE Transactions on Software Engineering
Volume 39, Number 11, November, 2013

                    B. Nuseibeh   In Memoriam: Mary Jean Harrold
                                  (1947--2013) . . . . . . . . . . . . . . 1466--1466
                N. Esfahani and   
               A. Elkhodary and   
                       S. Malek   A Learning-Based Framework for
                                  Engineering Feature-Oriented
                                  Self-Adaptive Software Systems . . . . . 1467--1493
                  N. M. Ali and   
                 J. Hosking and   
                      J. Grundy   A Taxonomy and Mapping of Computer-Based
                                  Critiquing Tools . . . . . . . . . . . . 1494--1520
              B. Littlewood and   
                   A. Povyakalo   Conservative Reasoning about the
                                  Probability of Failure on Demand of a
                                  1-out-of-2 Software-Based System in
                                  Which One Channel Is ``Possibly
                                  Perfect''  . . . . . . . . . . . . . . . 1521--1530
                   A. Reder and   
                       A. Egyed   Determining the Cause of a Design Model
                                  Inconsistency  . . . . . . . . . . . . . 1531--1548
                 H. Y. Chen and   
                      T. H. Tse   Equality to Equals and Unequals: A
                                  Revisit of the Equivalence and
                                  Nonequivalence Criteria in Class-Level
                                  Testing of Object-Oriented Software  . . 1549--1563
                S. Kailasam and   
          N. Gnanasambandam and   
          J. Dharanipragada and   
                      N. Sharma   Optimizing Ordered Throughput Using
                                  Autonomic Cloud Bursting Schedulers  . . 1564--1581
                L. Carvajal and   
               A. M. Moreno and   
M. I. Sánchez-Segura and   
                      A. Seffah   Usability through Software Design  . . . 1582--1596
                     D. Kim and   
                     Y. Tao and   
                     S. Kim and   
                      A. Zeller   Where Should We Fix This Bug? A
                                  Two-Phase Recommendation Model . . . . . 1597--1610

IEEE Transactions on Software Engineering
Volume 39, Number 12, December, 2013

                  T. Berger and   
                     S. She and   
                  R. Lotufo and   
                A. Wasowski and   
                   K. Czarnecki   A Study of Variability Models and
                                  Languages in the Systems Software Domain 1611--1640
              B. Littlewood and   
                   A. Povyakalo   Conservative Bounds for the pfd of a
                                  1-out-of-2 Software-Based System Based
                                  on an Assessor's Subjective Probability
                                  of ``Not Worse Than Independence'' . . . 1641--1653
               K. T. Stolee and   
                      S. Elbaum   Identification, Impact, and Refactoring
                                  of Smells in Pipe-Like Web Mashups . . . 1654--1679
                   J. Maras and   
                   M. Stula and   
                 J. Carlson and   
                    I. Crnkovic   Identifying Code of Individual Features
                                  in Client-Side Web Applications  . . . . 1680--1697
                 T. Menzies and   
                   A. Brady and   
                   J. Keung and   
                    J. Hihn and   
                S. Williams and   
                O. El-Rawas and   
                   P. Green and   
                       B. Boehm   Learning Project Management Decisions: A
                                  Case Study with Case-Based Reasoning
                                  versus Data Farming  . . . . . . . . . . 1698--1713
                  D. Cooray and   
              E. Kouroshfar and   
                   S. Malek and   
                   R. Roshandel   Proactive Self-Adaptation for Improving
                                  the Reliability of Mission-Critical,
                                  Embedded, and Mobile Software  . . . . . 1714--1735
                  N. Hariri and   
          C. Castro-Herrera and   
              M. Mirakhorli and   
           J. Cleland-Huang and   
                    B. Mobasher   Supporting Domain Analysis through
                                  Mining and Recommending Features from
                                  Online Product Listings  . . . . . . . . 1736--1752
                     G. Lee and   
             J. A. Espinosa and   
                   W. H. DeLone   Task Environment Complexity, Global Team
                                  Dispersion, Process Capabilities, and
                                  Coordination in Software Development . . 1753--1771


IEEE Transactions on Software Engineering
Volume 40, Number 1, January, 2014

                    B. Nuseibeh   Signing Off: The State of the Journal    1--3
                     H. Liu and   
                  F. C. Kuo and   
                   D. Towey and   
                     T. Y. Chen   How Effectively Does Metamorphic Testing
                                  Alleviate the Oracle Problem?  . . . . . 4--22
                L. Madeyski and   
               W. Orzeszyna and   
                  R. Torkar and   
               M. Józala   Overcoming the Equivalent Mutant
                                  Problem: A Systematic Literature Review
                                  and a Comparative Experiment of Second
                                  Order Mutation . . . . . . . . . . . . . 23--42
                  C. Yilmaz and   
                   E. Dumlu and   
                M. B. Cohen and   
                      A. Porter   Reducing Masking Effects in
                                  Combinatorial Interaction Testing: A
                                  Feedback Driven Adaptive Approach  . . . 43--66
            C. Kästner and   
                A. Dreiling and   
                   K. Ostermann   Variability Mining: Consistent
                                  Semi-automatic Detection of Product-Line
                                  Features . . . . . . . . . . . . . . . . 67--82
                L. L. Minku and   
                 D. Sudholt and   
                         X. Yao   Improved Evolutionary Algorithm Design
                                  for the Project Scheduling Problem Based
                                  on Runtime Analysis  . . . . . . . . . . 83--102
                      Anonymous   2013 Reviewers List  . . . . . . . . . . 103--106

IEEE Transactions on Software Engineering
Volume 40, Number 2, February, 2014

                     Y. Sui and   
                      D. Ye and   
                         J. Xue   Detecting Memory Leaks Statically with
                                  Full-Sparse Value-Flow Analysis  . . . . 107--122
               F. Ta\"\iani and   
                     S. Lin and   
                    G. S. Blair   GossipKit: A Unified Component Framework
                                  for Gossip . . . . . . . . . . . . . . . 123--136
                  S. W. Lin and   
     É. André and   
                     Y. Liu and   
                     J. Sun and   
                     J. S. Dong   Learning Assumptions for Compositional
                                  Verification of Timed Systems  . . . . . 137--153
             M. A. Schumann and   
               D. Drusinsky and   
              J. B. Michael and   
                  D. Wijesekera   Modeling Human-in-the-Loop Security
                                  Analysis and Decision-Making Processes   154--166
                 I. Trummer and   
                B. Faltings and   
                      W. Binder   Multi-Objective Quality-Driven Service
                                  Selection --- a Fully Polynomial Time
                                  Approximation Scheme . . . . . . . . . . 167--191
                      Q. He and   
                     J. Yan and   
                     H. Jin and   
                        Y. Yang   Quality-Aware Service Selection for
                                  Service-Based Systems Based on Iterative
                                  Multi-Attribute Combinatorial Auction    192--215

IEEE Transactions on Software Engineering
Volume 40, Number 3, March, 2014

               B. N. Nguyen and   
                    A. M. Memon   An Observe-Model-Exercise* Paradigm to
                                  Test Event-Driven Systems with
                                  Undetermined Input Spaces  . . . . . . . 216--234
                   N. Ramasubbu   Governing Software Process Improvements
                                  in Globally Distributed Product
                                  Development  . . . . . . . . . . . . . . 235--250
                    C. Song and   
                  A. Porter and   
                   J. S. Foster   iTree: Efficiently Discovering
                                  High-Coverage Configurations Using
                                  Interaction Trees  . . . . . . . . . . . 251--265
                     Y. Cai and   
                     W. K. Chan   Magiclock: Scalable Detection of
                                  Potential Deadlocks in Large-Scale
                                  Multithreaded Programs . . . . . . . . . 266--281
                 M. Galster and   
                   D. Weyns and   
                   D. Tofan and   
                B. Michalik and   
                    P. Avgeriou   Variability in Software Systems --- a
                                  Systematic Literature Review . . . . . . 282--306
                   A. Groce and   
                 T. Kulesza and   
                   C. Zhang and   
             S. Shamasunder and   
                 M. Burnett and   
                 W. K. Wong and   
                  S. Stumpf and   
                     S. Das and   
                 A. Shinsel and   
                    F. Bice and   
                    K. McIntosh   You Are the Only Possible Oracle:
                                  Effective Test Selection for End Users
                                  of Interactive Machine Learning Systems  307--323

IEEE Transactions on Software Engineering
Volume 40, Number 4, April, 2014

                   D. Basin and   
                  M. Clavel and   
                    M. Egea and   
           M. A. G. de Dios and   
                       C. Dania   A Model-Driven Methodology for
                                  Developing Secure Data-Management
                                  Applications . . . . . . . . . . . . . . 324--337
                   C. Damas and   
                 B. Lambeau and   
              A. van Lamsweerde   Analyzing Critical Decision-Based
                                  Processes  . . . . . . . . . . . . . . . 338--365
                 S. Rastkar and   
               G. C. Murphy and   
                      G. Murray   Automatic Summarization of Bug Reports   366--380
                     R. Latorre   Effects of Developer Experience on
                                  Learning and Applying Unit Test-Driven
                                  Development  . . . . . . . . . . . . . . 381--395
                      J. Lv and   
                  B. B. Yin and   
                      K. Y. Cai   On the Asymptotic Behavior of Adaptive
                                  Testing Strategy for Software
                                  Reliability Assessment . . . . . . . . . 396--412
                         S. Kim   Synthesizing Multithreaded Code from
                                  Real-Time Object-Oriented Models via
                                  Schedulability-Aware Thread Derivation   413--426

IEEE Transactions on Software Engineering
Volume 40, Number 5, May, 2014

                     Y. Pei and   
                C. A. Furia and   
                  M. Nordio and   
                     Y. Wei and   
                   B. Meyer and   
                      A. Zeller   Automated Fixing of Programs with
                                  Contracts  . . . . . . . . . . . . . . . 427--449
                      L. Hatton   Conservation of Information: Software's
                                  Hidden Clockwork?  . . . . . . . . . . . 450--460
                      Q. He and   
                     J. Han and   
                    Y. Yang and   
                     H. Jin and   
            J. G. Schneider and   
                    S. Versteeg   Formulating Cost-Effective Monitoring
                                  Strategies for Service-Based Systems . . 461--482
         W. Leungwattanakit and   
                   C. Artho and   
                  M. Hagiya and   
                  Y. Tanabe and   
                M. Yamamoto and   
                   K. Takahashi   Modular Software Model Checking for
                                  Distributed Systems  . . . . . . . . . . 483--501
              V. Arnaoudova and   
            L. M. Eshkevari and   
                M. D. Penta and   
                 R. Oliveto and   
                G. Antoniol and   
  Y. G. Guéhéneuc   REPENT: Analyzing the Nature of
                                  Identifier Renamings . . . . . . . . . . 502--532

IEEE Transactions on Software Engineering
Volume 40, Number 6, June, 2014

              A. T. Misirli and   
                    A. B. Bener   Bayesian Networks For Evidence-Based
                                  Decision-Making in Software Engineering  533--554
                 J. M. Vara and   
              V. A. Bollati and   
   Á. Jiménez and   
                      E. Marcos   Dealing with Traceability in the MDD of
                                  Model Transformations  . . . . . . . . . 555--583
                     J. Lee and   
                      K. H. Hsu   GEA: A Goal-Driven Approach to
                                  Discovering Early Aspects  . . . . . . . 584--602
                M. Shepperd and   
                   D. Bowes and   
                        T. Hall   Researcher Bias: The Use of Machine
                                  Learning in Software Defect Prediction   603--616
                  A. Bartel and   
                   J. Klein and   
               M. Monperrus and   
                    Y. Le Traon   Static Analysis for Extracting
                                  Permission Checks of a Large Scale
                                  Framework: The Challenges and Solutions
                                  for Analyzing Android  . . . . . . . . . 617--632

IEEE Transactions on Software Engineering
Volume 40, Number 7, July, 2014

                     M. Kim and   
              T. Zimmermann and   
                    N. Nagappan   An Empirical Study of Refactoring
                                  Challenges and Benefits at Microsoft . . 633--649
                  C. Henard and   
               M. Papadakis and   
                G. Perrouin and   
                   J. Klein and   
                 P. Heymans and   
                    Y. Le Traon   Bypassing the Combinatorial Explosion:
                                  Using Similarity to Generate and
                                  Prioritize $T$-Wise Test Configurations
                                  for Software Product Lines . . . . . . . 650--670
                  G. Bavota and   
                 R. Oliveto and   
                 M. Gethers and   
              D. Poshyvanyk and   
                    A. De Lucia   Methodbook: Recommending Move Method
                                  Refactorings via Relational Topic Models 671--694
                    J. Song and   
                   C. Cadar and   
                    P. Pietzuch   \sc SymbexNet: Testing Network Protocol
                                  Implementations with Symbolic Execution
                                  and Rule-Based Specifications  . . . . . 695--709
           P. Collingbourne and   
                   C. Cadar and   
                 P. H. J. Kelly   Symbolic Crosschecking of Data-Parallel
                                  Floating-Point Code  . . . . . . . . . . 710--737

IEEE Transactions on Software Engineering
Volume 40, Number 8, August, 2014

                  M. Hertis and   
                    M. B. Juric   An Empirical Analysis of Business
                                  Process Execution Language Usage . . . . 738--757
               N. Ramasubbu and   
                  C. F. Kemerer   Managing Technical Debt in Enterprise
                                  Software Packages  . . . . . . . . . . . 758--772
                    X. Wang and   
                    Y. Dang and   
                   L. Zhang and   
                   D. Zhang and   
                     E. Lan and   
                         H. Mei   Predicting Consistency-Maintenance
                                  Requirement of Code Clonesat
                                  Copy-and-Paste Time  . . . . . . . . . . 773--794
             G. Díaz and   
           M. E. Cambronero and   
         E. Martínez and   
                   G. Schneider   Specification and Verification of
                                  Normative Texts Using C-O Diagrams . . . 795--817
                 H. Leopold and   
                J. Mendling and   
                  A. Polyvyanyy   Supporting Process Model Validation
                                  through Natural Language Generation  . . 818--840

IEEE Transactions on Software Engineering
Volume 40, Number 9, September, 2014

              W. Kessentini and   
              M. Kessentini and   
                H. Sahraoui and   
                 S. Bechikh and   
                        A. Ouni   A Cooperative Parallel Search-Based
                                  Software Engineering Approach for
                                  Code-Smells Detection  . . . . . . . . . 841--861
        I. Rodríguez and   
                   L. Llana and   
                     P. Rabanal   A General Testability Theory: Classes,
                                  Properties, Complexity, and Testing
                                  Reductions . . . . . . . . . . . . . . . 862--894
        D. Fernandez-Amoros and   
                 R. Heradio and   
              J. A. Cerrada and   
                     C. Cerrada   A Scalable Approach to Exact Model and
                                  Commonality Counting for Extended
                                  Feature Models . . . . . . . . . . . . . 895--910
                     Y. Liu and   
                      C. Xu and   
               S. C. Cheung and   
                     J. Lü   GreenDroid: Automated Diagnosis of
                                  Energy Inefficiency for Smartphone
                                  Applications . . . . . . . . . . . . . . 911--940

IEEE Transactions on Software Engineering
Volume 40, Number 10, October, 2014

              E. Casagrande and   
              S. Woldeamlak and   
                 W. L. Woon and   
            H. H. Zeineldin and   
                  D. Svetinovic   NLP-KAOS for Systems Goal Elicitation:
                                  Smart Metering System Case Study . . . . 941--956
                  Y. D. Lin and   
                J. F. Rojas and   
               E. T. H. Chu and   
                      Y. C. Lai   On the Accuracy, Efficiency, and
                                  Reusability of Automated Test Oracles
                                  for Android Devices  . . . . . . . . . . 957--970
                  W. Araujo and   
               L. C. Briand and   
                     Y. Labiche   On the Effectiveness of Contracts as
                                  Test Oracles in the Detection and
                                  Diagnosis of Functional Faults in
                                  Concurrent Object-Oriented Software  . . 971--992
             R. Scandariato and   
                  J. Walden and   
               A. Hovsepyan and   
                      W. Joosen   Predicting Vulnerable Software
                                  Components via Text Mining . . . . . . . 993--1006
                  T. Miller and   
                      B. Lu and   
                L. Sterling and   
                 G. Beydoun and   
                     K. Taveter   Requirements Elicitation and
                                  Specification Using the Agent Paradigm:
                                  The Case Study of an Aircraft Turnaround
                                  Simulator  . . . . . . . . . . . . . . . 1007--1024
            A. C. Dias-Neto and   
                G. H. Travassos   Supporting the Combined Selection of
                                  Model-Based Testing Techniques . . . . . 1025--1041

IEEE Transactions on Software Engineering
Volume 40, Number 11, November, 2014

             J. S. Cuadrado and   
                  E. Guerra and   
                     J. de Lara   A Component Model for Model
                                  Transformations  . . . . . . . . . . . . 1042--1060
                 S. Draxler and   
                 G. Stevens and   
                       A. Boden   Keeping the Development Environment Up
                                  to Date --- a Study of the Situated
                                  Practices of Appropriating the Eclipse
                                  IDE  . . . . . . . . . . . . . . . . . . 1061--1074
                  C. T. Lin and   
                       Y. F. Li   Rate-Based Queueing Simulation Model of
                                  Open Source Software Debugging
                                  Activities . . . . . . . . . . . . . . . 1075--1099
              D. Athanasiou and   
                 A. Nugroho and   
                  J. Visser and   
                     A. Zaidman   Test Code Quality and Its Relation to
                                  Issue Handling Performance . . . . . . . 1100--1125
                B. Dagenais and   
                M. P. Robillard   Using Traceability Links to Recommend
                                  Adaptive Changes for Documentation
                                  Evolution  . . . . . . . . . . . . . . . 1126--1146

IEEE Transactions on Software Engineering
Volume 40, Number 12, December, 2014

                F. Massacci and   
                   V. H. Nguyen   An Empirical Methodology to Evaluate
                                  Vulnerability Discovery Models . . . . . 1147--1162
            G. R. Bergersen and   
    D. I. K. Sjòberg and   
                  T. Dybå   Construction and Validation of an
                                  Instrument for Measuring Programming
                                  Skill  . . . . . . . . . . . . . . . . . 1163--1184
                   E. Coppa and   
              C. Demetrescu and   
                    I. Finocchi   Input-Sensitive Profiling  . . . . . . . 1185--1205
                    C. Tian and   
                    Z. Duan and   
                        Z. Duan   Making CEGAR More Efficient in Software
                                  Model Checking . . . . . . . . . . . . . 1206--1223
                    K. Lano and   
            S. Kolahdouz-Rahimi   Model-Transformation Design Patterns . . 1224--1259


IEEE Transactions on Software Engineering
Volume 41, Number 1, January, 2015

                    M. B. Dwyer   State of the Journal Editorial . . . . . 1--2
                    T. Wang and   
                     J. Sun and   
                    X. Wang and   
                     Y. Liu and   
                      Y. Si and   
                 J. S. Dong and   
                    X. Yang and   
                          X. Li   A Systematic Study on Explicit-State
                                  Non-Zenoness Checking for Timed Automata 3--18
               B. M. Samuel and   
          L. A. Watkins III and   
                    A. Ehle and   
                      V. Khatri   Customizing the Representation
                                  Capabilities of Process Models:
                                  Understanding the Effects of Perceived
                                  Modeling Impediments . . . . . . . . . . 19--39
                  S. L. Lim and   
              P. J. Bentley and   
                 N. Kanakam and   
                F. Ishikawa and   
                     S. Honiden   Investigating Country Differences in
                                  Mobile App User Behavior and Challenges
                                  for Software Engineering . . . . . . . . 40--64
             E. Murphy-Hill and   
              T. Zimmermann and   
                    C. Bird and   
                    N. Nagappan   The Design Space of Bug Fixes and How
                                  Developers Navigate It . . . . . . . . . 65--81
                    M. Zhou and   
                      A. Mockus   Who Will Stay in the FLOSS Community?
                                  Modeling Participant's Initial Behavior  82--99
                      Anonymous   2014 Reviewers List* . . . . . . . . . . 100--103
                      Anonymous   2014 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. 40  . . . . 104--112

IEEE Transactions on Software Engineering
Volume 41, Number 2, February, 2015

                   F. Belli and   
              M. Beyazìt   Exploiting Model Morphology for
                                  Event-Based Testing  . . . . . . . . . . 113--134
                 N. Mangano and   
               T. D. LaToza and   
                   M. Petre and   
                A. van der Hoek   How Software Designers Interact with
                                  Sketches at the Whiteboard . . . . . . . 135--156
                  F. Brosig and   
                   P. Meier and   
                  S. Becker and   
                A. Koziolek and   
                H. Koziolek and   
                      S. Kounev   Quantitative Evaluation of Model-Driven
                                  Performance Analysis and Simulation of
                                  Component-Based Architectures  . . . . . 157--175
                 M. D. Syer and   
                M. Nagappan and   
                   B. Adams and   
                   A. E. Hassan   Replicating and Re-Evaluating the Theory
                                  of Relative Defect-Proneness . . . . . . 176--197
                    N. Chen and   
                         S. Kim   STAR: Stack Trace Based Automatic Crash
                                  Reproduction via Symbolic Execution  . . 198--220

IEEE Transactions on Software Engineering
Volume 41, Number 3, March, 2015

               A. Bennaceur and   
                     V. Issarny   Automated Synthesis of Mediators to
                                  Support Component Interoperability . . . 221--240
                   J. Cunha and   
            J. P. Fernandes and   
                  J. Mendes and   
                     J. Saraiva   Embedding, Evolution, and Validation of
                                  Model-Driven Spreadsheets  . . . . . . . 241--263
         J. F. Pérez and   
                  G. Casale and   
             S. Pacheco-Sanchez   Estimating Computational Requirements in
                                  Multi-Threaded Applications  . . . . . . 264--278
                  R. M. Hierons   Generating Complete Controllable Test
                                  Suites for Distributed Testing . . . . . 279--293
                   A. Sakti and   
                  G. Pesant and   
  Y. G. Guéhéneuc   Instance Generator and Problem
                                  Representation to Improve Object
                                  Oriented Code Coverage . . . . . . . . . 294--313
                     S. Lee and   
                    S. Kang and   
                     S. Kim and   
                      M. Staats   The Impact of View Histories on Edit
                                  Recommendations  . . . . . . . . . . . . 314--330

IEEE Transactions on Software Engineering
Volume 41, Number 4, April, 2015

                    Y. Yang and   
                    Y. Zhou and   
                      H. Lu and   
                    L. Chen and   
                    Z. Chen and   
                      B. Xu and   
                   H. Leung and   
                       Z. Zhang   Are Slice-Based Cohesion Metrics
                                  Actually Useful in Effort-Aware
                                  Post-Release Fault-Proneness Prediction?
                                  An Empirical Study . . . . . . . . . . . 331--357
              A. Panichella and   
                 R. Oliveto and   
                M. D. Penta and   
                    A. De Lucia   Improving Multi-Objective Test Case
                                  Selection by Injecting Diversity in
                                  Genetic Algorithms . . . . . . . . . . . 358--383
                  G. Bavota and   
  M. Linares-Vásquez and   
C. E. Bernal-Cárdenas and   
                M. D. Penta and   
                 R. Oliveto and   
                  D. Poshyvanyk   The Impact of API Change- and
                                  Fault-Proneness on the User Ratings of
                                  Android Apps . . . . . . . . . . . . . . 384--407
            I. Beschastnikh and   
                    Y. Brun and   
              J. Abrahamson and   
                M. D. Ernst and   
               A. Krishnamurthy   Using Declarative Specification to
                                  Improve the Understanding,
                                  Extensibility, and Comparison of
                                  Model-Inference Algorithms . . . . . . . 408--428

IEEE Transactions on Software Engineering
Volume 41, Number 5, May, 2015

             S. Mirshokraie and   
                  A. Mesbah and   
                K. Pattabiraman   Guided Mutation Testing for JavaScript
                                  Web Applications . . . . . . . . . . . . 429--444
             A. Jovanovi\'c and   
                    D. Lime and   
                     O. H. Roux   Integer Parameter Synthesis for
                                  Real-Time Systems  . . . . . . . . . . . 445--461
                 F. Palomba and   
                  G. Bavota and   
                M. D. Penta and   
                 R. Oliveto and   
              D. Poshyvanyk and   
                    A. De Lucia   Mining Version Histories for Detecting
                                  Code Smells  . . . . . . . . . . . . . . 462--489
         L. Burgueño and   
                   J. Troya and   
                  M. Wimmer and   
                  A. Vallecillo   Static Fault Localization in Model
                                  Transformations  . . . . . . . . . . . . 490--506
                 E. T. Barr and   
                  M. Harman and   
                  P. McMinn and   
                 M. Shahbaz and   
                         S. Yoo   The Oracle Problem in Software Testing:
                                  A Survey . . . . . . . . . . . . . . . . 507--525

IEEE Transactions on Software Engineering
Volume 41, Number 6, June, 2015

                  F. Pittke and   
                 H. Leopold and   
                    J. Mendling   Automatic Detection and Resolution of
                                  Lexical Ambiguity in Process Models  . . 526--544
               A. K. Massey and   
                 P. N. Otto and   
             A. I. Antón   Evaluating Legal Implementation
                                  Readiness Decision-Making  . . . . . . . 545--564
                  C. Treude and   
            M. P. Robillard and   
                    B. Dagenais   Extracting Development Tasks to Navigate
                                  Software Documentation . . . . . . . . . 565--581
               T. Chaikalis and   
              A. Chatzigeorgiou   Forecasting Java Software Evolution
                                  Trends Employing Network Models  . . . . 582--602
                   Y. Xiong and   
                   H. Zhang and   
                  A. Hubaux and   
                     S. She and   
                    J. Wang and   
                   K. Czarnecki   Range Fixes: Interactive Error
                                  Resolution for Software Configuration    603--619

IEEE Transactions on Software Engineering
Volume 41, Number 7, July, 2015

                  M. Autili and   
                 L. Grunske and   
                   M. Lumpe and   
             P. Pelliccione and   
                        A. Tang   Aligning Qualitative, Real-Time, and
                                  Probabilistic Property Specification
                                  Patterns Using a Structured English
                                  Grammar  . . . . . . . . . . . . . . . . 620--638
                  N. Rosner and   
              J. Geldenhuys and   
              N. M. Aguirre and   
                  W. Visser and   
                    M. F. Frias   BLISS: Improved Symbolic Execution by
                                  Bounded Lazy Initialization with SAT
                                  Support  . . . . . . . . . . . . . . . . 639--660
                M. El-Attar and   
                  H. Luqman and   
   P. Kárpáti and   
                  G. Sindre and   
                   A. L. Opdahl   Extending the UML Statecharts Notation
                                  to Model Security Aspects  . . . . . . . 661--690
               D. Maplesden and   
                 E. Tempero and   
                 J. Hosking and   
                   J. C. Grundy   Performance Analysis for Object-Oriented
                                  Software: A Systematic Mapping . . . . . 691--710
                   H. Thimbleby   Safer User Interfaces: A Case Study in
                                  Improving Number Entry . . . . . . . . . 711--729

IEEE Transactions on Software Engineering
Volume 41, Number 8, August, 2015

                      L. Wu and   
                      K. Su and   
                     S. Cai and   
                   X. Zhang and   
                   C. Zhang and   
                        S. Wang   An I/O Efficient Approach for Detecting
                                  All Accepting Cycles . . . . . . . . . . 730--744
                 K. Mu\cslu and   
                    Y. Brun and   
                M. D. Ernst and   
                      D. Notkin   Reducing Feedback Delay of Software
                                  Development Tools via Continuous
                                  Analysis . . . . . . . . . . . . . . . . 745--763
                    Y. Brun and   
                 J. y. Bang and   
                 G. Edwards and   
                  N. Medvidovic   Self-Adapting Reliability in Distributed
                                  Software Systems . . . . . . . . . . . . 764--780
             A. Ampatzoglou and   
          A. Chatzigeorgiou and   
           S. Charalampidou and   
                    P. Avgeriou   The Effect of GoF Design Patterns on
                                  Stability: A Case Study  . . . . . . . . 781--802
                     G. Gay and   
                  M. Staats and   
                  M. Whalen and   
              M. P. E. Heimdahl   The Risks of Coverage-Directed Test Case
                                  Generation . . . . . . . . . . . . . . . 803--819
                    S. Nadi and   
                  T. Berger and   
            C. Kästner and   
                   K. Czarnecki   Where Do Configuration Constraints Stem
                                  From? An Extraction Approach and an
                                  Empirical Study  . . . . . . . . . . . . 820--841

IEEE Transactions on Software Engineering
Volume 41, Number 9, September, 2015

                      C. Xu and   
                      W. Xi and   
               S. C. Cheung and   
                      X. Ma and   
                     C. Cao and   
                          J. Lu   \sc Cina: Suppressing the Detection of
                                  Unstable Context Inconsistency . . . . . 842--865
                 H. Bagheri and   
                 A. Sadeghi and   
                  J. Garcia and   
                       S. Malek   COVERT: Compositional Analysis of
                                  Android Inter-App Permission Leakage . . 866--886
                     H. Liu and   
                     Q. Liu and   
                     Y. Liu and   
                        Z. Wang   Identifying Renaming Opportunities by
                                  Expanding Conducted Rename Refactorings  887--900
                   J. Petke and   
                M. B. Cohen and   
                  M. Harman and   
                         S. Yoo   Practical Combinatorial Interaction
                                  Testing: Empirical Findings on
                                  Efficiency and Early Fault Detection . . 901--924
                  Y. C. Jhi and   
                     X. Jia and   
                    X. Wang and   
                     S. Zhu and   
                     P. Liu and   
                          D. Wu   Program Characterization Using Runtime
                                  Values and Its Application to Software
                                  Plagiarism Detection . . . . . . . . . . 925--943

IEEE Transactions on Software Engineering
Volume 41, Number 10, October, 2015

                   C. Arora and   
              M. Sabetzadeh and   
                  L. Briand and   
                      F. Zimmer   Automated Checking of Conformance to
                                  Requirements Templates Using Natural
                                  Language Processing  . . . . . . . . . . 944--968
                 K. Blincoe and   
                 G. Valetto and   
                      D. Damian   Facilitating Coordination between
                                  Software Developers: A Study and
                                  Techniques for Timely and Efficient
                                  Recommendations  . . . . . . . . . . . . 969--985
                     X. Guo and   
                    M. Zhou and   
                    X. Song and   
                      M. Gu and   
                         J. Sun   First, Debug the Test Oracle . . . . . . 986--1000
                   J. Krall and   
                 T. Menzies and   
                      M. Davies   GALE: Geometric Active Learning for
                                  Search-Based Software Engineering  . . . 1001--1018
             J. P. Galeotti and   
                C. A. Furia and   
                     E. May and   
                  G. Fraser and   
                      A. Zeller   Inferring Loop Invariants by Mutation,
                                  Dynamic Analysis, and Static Checking    1019--1037

IEEE Transactions on Software Engineering
Volume 41, Number 11, November, 2015

               P. Rodeghero and   
                     C. Liu and   
             P. W. McBurney and   
                    C. McMillan   An Eye-Tracking Study of Java
                                  Programmers and Application to Source
                                  Code Summarization . . . . . . . . . . . 1038--1054
               N. Tsantalis and   
              D. Mazinanian and   
                 G. P. Krishnan   Assessing the Refactorability of
                                  Software Clones  . . . . . . . . . . . . 1055--1090
                Z. M. Jiang and   
                   A. E. Hassan   A Survey on Load Testing of Large-Scale
                                  Software Systems . . . . . . . . . . . . 1091--1118
                     G. Gay and   
                  M. Staats and   
                  M. Whalen and   
              M. P. E. Heimdahl   Automated Oracle Data Selection Support  1119--1137
                     H. Zhu and   
                      I. Bayley   On the Composability of Design Patterns  1138--1152

IEEE Transactions on Software Engineering
Volume 41, Number 12, December, 2015

          H. A. Duran-Limon and   
          C. A. Garcia-Rios and   
     F. E. Castillo-Barrera and   
                     R. Capilla   An Ontology-Based Product Architecture
                                  Derivation Approach  . . . . . . . . . . 1153--1168
                  P. Clarke and   
             R. V. O'Connor and   
                   B. Leavy and   
                      M. Yilmaz   Exploring the Relationship between
                                  Software Process Adaptive Capability and
                                  Organisational Performance . . . . . . . 1169--1183
                   M. Schur and   
                    A. Roth and   
                      A. Zeller   Mining Workflow Models from Web
                                  Applications . . . . . . . . . . . . . . 1184--1201
                   L. Zhang and   
           A. Chattopadhyay and   
                        C. Wang   Round-Up: Runtime Verification of Quasi
                                  Linearizability for Concurrent Data
                                  Structures . . . . . . . . . . . . . . . 1202--1216
                    Z. Tian and   
                   Q. Zheng and   
                     T. Liu and   
                     M. Fan and   
                  E. Zhuang and   
                        Z. Yang   Software Plagiarism Detection with
                                  Birthmarks Based on Dynamic Key
                                  Instruction Sequences  . . . . . . . . . 1217--1235
                C. Le Goues and   
             N. Holtschulte and   
                E. K. Smith and   
                    Y. Brun and   
                 P. Devanbu and   
                 S. Forrest and   
                      W. Weimer   The ManyBugs and IntroClass Benchmarks
                                  for Automated Repair of C Programs . . . 1236--1256


IEEE Transactions on Software Engineering
Volume 42, Number 1, January, 2016

                M. B. Dwyer and   
                D. S. Rosenblum   Editorial: Journal-First Publication for
                                  the Software Engineering Community . . . 1--1
                  M. Autili and   
               A. Bertolino and   
              G. De Angelis and   
               D. D. Ruscio and   
                   A. D. Sandro   A Tool-Supported Methodology for
                                  Validation and Refinement of Early-Stage
                                  Domain Models  . . . . . . . . . . . . . 2--25
                 B. Ozcelik and   
                      C. Yilmaz   Seer: A Lightweight Online Failure
                                  Prediction Approach  . . . . . . . . . . 26--46
                    K. Wnuk and   
                T. Gorschek and   
                 D. Callele and   
             E. A. Karlsson and   
             E. Åhlin and   
                     B. Regnell   Supporting Scope Tracking and
                                  Visualization for Very Large-Scale
                                  Requirements Engineering-Utilizing FSC+,
                                  Decision Patterns, and Atomic Decision
                                  Visualizations . . . . . . . . . . . . . 47--74
                 A. Filieri and   
             G. Tamburrelli and   
                      C. Ghezzi   Supporting Self-Adaptation via
                                  Quantitative Verification and
                                  Sensitivity Analysis at Run Time . . . . 75--99
                      Anonymous   2015 reviewers list  . . . . . . . . . . 100--102

IEEE Transactions on Software Engineering
Volume 42, Number 2, February, 2016

             P. W. McBurney and   
                    C. McMillan   Automatic Source Code Summarization of
                                  Context for Java Methods . . . . . . . . 103--119
                   S. Vegas and   
                     C. Apa and   
                     N. Juristo   Crossover Designs in Software
                                  Engineering Experiments: Benefits and
                                  Perils . . . . . . . . . . . . . . . . . 120--135
              M. Caporuscio and   
                  V. Grassi and   
                M. Marzolla and   
                   R. Mirandola   \sc GoPrime: A Fully Decentralized
                                  Middleware for Utility-Aware Service
                                  Assembly . . . . . . . . . . . . . . . . 136--152
                M. Paolieri and   
          A. Horváth and   
                     E. Vicario   Probabilistic Model Checking of
                                  Regenerative Concurrent Systems  . . . . 153--169
                     Z. Gao and   
                    Z. Chen and   
                     Y. Zou and   
                    A. M. Memon   SITAR: GUI Test Script Repair  . . . . . 170--186
                     J. Qiu and   
                      X. Su and   
                          P. Ma   Using Reduced Execution Flow Graph to
                                  Identify Library Functions in Binary
                                  Code . . . . . . . . . . . . . . . . . . 187--202

IEEE Transactions on Software Engineering
Volume 42, Number 3, March, 2016

                M. B. Dwyer and   
                  E. Bodden and   
              B. Fitzgerald and   
                     M. Kim and   
                     S. Kim and   
                   A. J. Ko and   
                  E. Mendes and   
               R. Mirandola and   
                 A. Moreira and   
                   F. Shull and   
                  S. Siegel and   
                     T. Xie and   
                       C. Zhang   Connecting and Serving the Software
                                  Engineering Community  . . . . . . . . . 203--280
              M. Mirakhorli and   
               J. Cleland-Huang   Detecting, Tracing, and Monitoring
                                  Architectural Tactics in Code  . . . . . 205--220
                  R. Kazman and   
               D. Goldenson and   
                 I. Monarch and   
                 W. Nichols and   
                     G. Valetto   Evaluating the Effects of Architectural
                                  Documentation: A Case Study of a Large
                                  Scale Open Source Project  . . . . . . . 220--260
         N. Mellegård and   
                A. Ferwerda and   
                    K. Lind and   
                  R. Heldal and   
              M. R. V. Chaudron   Impact of Introducing Domain-Specific
                                  Modelling in Software Maintenance: An
                                  Industrial Case Study  . . . . . . . . . 245--260
                 Z. Q. Zhou and   
                   S. Xiang and   
                     T. Y. Chen   Metamorphic Testing for Software Quality
                                  Assessment: A Study of Search Engines    264--284
                     Q. Shi and   
                   J. Huang and   
                    Z. Chen and   
                          B. Xu   Verifying Synchronization for Atomicity
                                  Violation Fixing . . . . . . . . . . . . 280--296

IEEE Transactions on Software Engineering
Volume 42, Number 4, April, 2016

                J. L. Krein and   
                L. Prechelt and   
                 N. Juristo and   
        A. Nanthaamornphong and   
               J. C. Carver and   
                   S. Vegas and   
              C. D. Knutson and   
                K. D. Seppi and   
                   D. L. Eggett   A Multi-Site Joint Replication of a
                                  Design Patterns Experiment Using
                                  Moderator Variables to Generalize across
                                  Contexts . . . . . . . . . . . . . . . . 302--321
               H. M. Chavez and   
                    W. Shen and   
               R. B. France and   
             B. A. Mechling and   
                          G. Li   An Approach to Checking Consistency
                                  between UML Class Model and Its Java
                                  Implementation . . . . . . . . . . . . . 322--344
              M. Böhme and   
                        S. Paul   A Probabilistic Analysis of the
                                  Efficiency of Automated Software Testing 345--360
                A. Shahbazi and   
                      J. Miller   Black-Box String Test Case Generation
                                  through a Multi-Objective Optimization   361--378
                      X. Ye and   
                 R. Bunescu and   
                         C. Liu   Mapping Bug Reports to Relevant Files: A
                                  Ranking Model, a Fine-Grained Benchmark,
                                  and Feature Evaluation . . . . . . . . . 379--402

IEEE Transactions on Software Engineering
Volume 42, Number 5, May, 2016

                  M. Baluda and   
                  G. Denaro and   
                     M. Pezz\`e   Bidirectional Symbolic Analysis for
                                  Effective Branch Testing . . . . . . . . 403--426
               A. M. Aranda and   
                  O. Dieste and   
                     N. Juristo   Effect of Domain Knowledge on
                                  Elicitation Effectiveness: An Internally
                                  Replicated Controlled Experiment . . . . 427--451
                D. Cotroneo and   
            R. Pietrantuono and   
                       S. Russo   RELAI Testing: A Technique to Assess and
                                  Improve Software Reliability . . . . . . 452--475
               D. P. Harvie and   
                        A. Agah   Targeted Scrum: Applying Mission Command
                                  to Agile Software Development  . . . . . 476--489
                     D. Hao and   
                   L. Zhang and   
                    L. Zang and   
                    Y. Wang and   
                      X. Wu and   
                         T. Xie   To Be Optimal or Not in Test-Case
                                  Prioritization . . . . . . . . . . . . . 490--505

IEEE Transactions on Software Engineering
Volume 42, Number 6, June, 2016

                  P. Degano and   
              G. L. Ferrari and   
                    L. Galletta   A Two-Component Language for Adaptation:
                                  Design, Semantics and Program Analysis   505--529
              M. B. Zanjani and   
                   H. Kagdi and   
                        C. Bird   Automatically Recommending Peer
                                  Reviewers in Modern Code Review  . . . . 530--543
                     H. Liu and   
                     Q. Liu and   
                     Z. Niu and   
                         Y. Liu   Dynamic and Automatic Feedback-Based
                                  Threshold Adaptation for Code Smell
                                  Detection  . . . . . . . . . . . . . . . 544--558
              E. A. Barbosa and   
                  A. Garcia and   
            M. P. Robillard and   
                     B. Jakobus   Enforcing Exception Handling Policies
                                  with a Domain-Specific Language  . . . . 559--584
                C. Giardino and   
             N. Paternoster and   
        M. Unterkalmsteiner and   
                T. Gorschek and   
                 P. Abrahamsson   Software Development in Startup
                                  Companies: The Greenfield Startup Model  585--604

IEEE Transactions on Software Engineering
Volume 42, Number 7, July, 2016

                C. H. Huang and   
                D. A. Peled and   
                  S. Schewe and   
                        F. Wang   A Game-Theoretic Foundation for the
                                  Maximum Software Resilience against
                                  Dense Errors . . . . . . . . . . . . . . 605--622
                      G. Su and   
                    Y. Feng and   
                    T. Chen and   
                D. S. Rosenblum   Asymptotic Perturbation Bounds for
                                  Probabilistic Model Checking with
                                  Empirically Determined Probability
                                  Parameters . . . . . . . . . . . . . . . 623--639
                N. Berthier and   
           É. Rutten and   
                N. De Palma and   
                 S. M. K. Gueye   Designing Autonomic Management Systems
                                  by Using Reactive Control Techniques . . 640--657
                    X. Shen and   
                L. L. Minku and   
                 R. Bahsoon and   
                         X. Yao   Dynamic Software Project Scheduling
                                  through a Proactive-Rescheduling Method  658--686
                   N. Itzik and   
        I. Reinhartz-Berger and   
                        Y. Wand   Variability Analysis of Requirements:
                                  Considering Behavioral Differences and
                                  Reflecting Stakeholders' Perspectives    687--706

IEEE Transactions on Software Engineering
Volume 42, Number 8, August, 2016

                 W. E. Wong and   
                     R. Gao and   
                      Y. Li and   
                   R. Abreu and   
                      F. Wotawa   A Survey on Software Fault Localization  707--740
           M. A. Noureddine and   
                  F. A. Zaraket   Model Checking Software with First Order
                                  Logic Specifications Using AIG Solvers   741--763
              R. Atachiants and   
                 G. Doherty and   
                       D. Gregg   Parallel Performance Problems on
                                  Shared-Memory Multicore Systems:
                                  Taxonomy and Observation . . . . . . . . 764--785
                   H. Sharp and   
                Y. Dittrich and   
              C. R. B. de Souza   The Role of Ethnographic Studies in
                                  Empirical Software Engineering . . . . . 786--804

IEEE Transactions on Software Engineering
Volume 42, Number 9, September, 2016

                  S. Segura and   
                  G. Fraser and   
              A. B. Sanchez and   
          A. Ruiz-Cortés   A Survey on Metamorphic Testing  . . . . 805--824
                     Y. Cai and   
                          Q. Lu   Dynamic Testing for Deadlocks via
                                  Constraints  . . . . . . . . . . . . . . 825--842
                  E. Pavese and   
               V. Braberman and   
                     S. Uchitel   Probabilistic Interface Automata . . . . 843--865
                     H. Luo and   
                     X. Liu and   
                    X. Chen and   
                    T. Long and   
                       R. Jiang   Software Reliability Analysis Using
                                  Weakest Preconditions in Linear
                                  Assignment Programs  . . . . . . . . . . 866--885
           J. Börstler and   
                       B. Paech   The Role of Method Chains and Comments
                                  in Software Readability and
                                  Comprehension --- an Experiment  . . . . 886--898

IEEE Transactions on Software Engineering
Volume 42, Number 10, October, 2016

                   M. Zhang and   
                      Y. Wu and   
                      S. Lu and   
                      S. Qi and   
                     J. Ren and   
                       W. Zheng   A Lightweight System for Detecting and
                                  Tolerating Concurrency Bugs  . . . . . . 899--917
               A. Marchetto and   
                M. M. Islam and   
                  W. Asghar and   
                    A. Susi and   
                  G. Scanniello   A Multi-Objective Technique to
                                  Prioritize Test Cases  . . . . . . . . . 918--940
                    J. Tuya and   
              C. d. l. Riva and   
  M. J. Suárez-Cabal and   
                      R. Blanco   Coverage-Aware Test Database Reduction   941--959
                  A. Namoun and   
           A. Daskalopoulou and   
              N. Mehandjiev and   
                         Z. Xun   Exploring Mobile End User Development:
                                  Existing Use and Design Factors  . . . . 960--976
                     X. Xia and   
                      D. Lo and   
                  S. J. Pan and   
                N. Nagappan and   
                        X. Wang   HYDRA: Massively Compositional Model for
                                  Cross-Project Defect Prediction  . . . . 977--998

IEEE Transactions on Software Engineering
Volume 42, Number 11, November, 2016

                  D. Octeau and   
                 D. Luchaup and   
                     S. Jha and   
                    P. McDaniel   Composite Constant Propagation and its
                                  Application to Android Program Analysis  999--1014
                     T. Lee and   
                     J. Nam and   
                     D. Han and   
                     S. Kim and   
                    H. Peter In   Developer Micro Interaction Metrics for
                                  Software Defect Prediction . . . . . . . 1015--1035
            W. S. El-Kassas and   
             B. A. Abdullah and   
               A. H. Yousef and   
                    A. M. Wahba   Enhanced Code Conversion Approach for
                                  the Integrated Cross-Platform Mobile
                                  Development (ICPMD)  . . . . . . . . . . 1036--1053
                      T. Wu and   
                     J. Liu and   
                      Z. Xu and   
                     C. Guo and   
                   Y. Zhang and   
                     J. Yan and   
                       J. Zhang   Light-Weight, Inter-Procedural and
                                  Callback-Aware Resource Leak Detection
                                  for Android Apps . . . . . . . . . . . . 1054--1076
              R. M. Hierons and   
              U. C. Türker   Parallel Algorithms for Testing Finite
                                  State Machines:Generating UIO Sequences  1077--1091
        C. Tantithamthavorn and   
                S. McIntosh and   
               A. E. Hassan and   
                   K. Matsumoto   Comments on ``Researcher Bias: The Use
                                  of Machine Learning in Software Defect
                                  Prediction'' . . . . . . . . . . . . . . 1092--1094

IEEE Transactions on Software Engineering
Volume 42, Number 12, December, 2016

           J. L. de la Vara and   
                    M. Borg and   
                    K. Wnuk and   
                      L. Moonen   An Industrial Survey of Safety Evidence
                                  Change Impact Analysis Practice  . . . . 1095--1117
                P. A. Akiki and   
              A. K. Bandara and   
                          Y. Yu   Engineering Adaptive Model-Driven User
                                  Interfaces . . . . . . . . . . . . . . . 1118--1147
                 T. H. Chen and   
                   W. Shang and   
                Z. M. Jiang and   
               A. E. Hassan and   
                  M. Nasser and   
                       P. Flora   Finding and Evaluating the Performance
                                  Impact of Redundant Data Access for
                                  Applications that are Developed Using
                                  Object-Relational Mapping Frameworks . . 1148--1161
                  D. Riehle and   
                 M. Capraro and   
                    D. Kips and   
                        L. Horn   Inner Source in Platform-Based Product
                                  Engineering  . . . . . . . . . . . . . . 1162--1177
                 S. Eghbali and   
                  L. Tahvildari   Test Case Prioritization Using
                                  Lexicographical Ordering . . . . . . . . 1178--1195


IEEE Transactions on Software Engineering
Volume 43, Number 1, January, 2017

                      Anonymous   2016 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. 42  . . . . 1--8
        C. Tantithamthavorn and   
                S. McIntosh and   
               A. E. Hassan and   
                   K. Matsumoto   An Empirical Comparison of Model
                                  Validation Techniques for Defect
                                  Prediction Models  . . . . . . . . . . . 1--18
                  D. Ciolek and   
               V. Braberman and   
              N. D'Ippolito and   
                N. Piterman and   
                     S. Uchitel   Interaction Models and Automated Control
                                  under Partial Observable Environments    19--33
                    J. Xuan and   
                M. Martinez and   
                 F. DeMarco and   
          M. Clément and   
              S. L. Marcote and   
                 T. Durieux and   
                D. Le Berre and   
                   M. Monperrus   Nopol: Automatic Repair of Conditional
                                  Statement Bugs in Java Programs  . . . . 34--55
                    A. Bosu and   
               J. C. Carver and   
                    C. Bird and   
                  J. Orbeck and   
                    C. Chockley   Process Aspects and Social Dynamics of
                                  Contemporary Code Review: Insights from
                                  Open Source Development and Industrial
                                  Practice at Microsoft  . . . . . . . . . 56--75
                  V. Valero and   
             G. Díaz and   
               M. E. Cambronero   Timed Automata Modeling and Verification
                                  for Publish--Subscribe Structures Using
                                  Distributed Resources  . . . . . . . . . 76--99
                      Anonymous   2016 Reviewers List* . . . . . . . . . . 100--103

IEEE Transactions on Software Engineering
Volume 43, Number 2, February, 2017

                  L. Moreno and   
                  G. Bavota and   
                M. D. Penta and   
                 R. Oliveto and   
                  A. Marcus and   
                     G. Canfora   ARENA: An Approach for the Automated
                                  Generation of Release Notes  . . . . . . 106--127
              F. S. Ocariza and   
                   K. Bajaj and   
            K. Pattabiraman and   
                      A. Mesbah   A Study of Causes and Consequences of
                                  Client-Side JavaScript Bugs  . . . . . . 128--144
                 H. Bagheri and   
                    C. Tang and   
                    K. Sullivan   Automated Synthesis and Dynamic Analysis
                                  of Tradeoff Spaces for Object-Relational
                                  Mapping  . . . . . . . . . . . . . . . . 145--163
               A. Henderson and   
                  L. K. Yan and   
                      X. Hu and   
                 A. Prakash and   
                     H. Yin and   
                    S. McCamant   DECAF: A Platform-Neutral Whole-System
                                  Dynamic Binary Analysis Platform . . . . 164--184
               M. A. Storey and   
                A. Zagalsky and   
                F. F. Filho and   
                  L. Singer and   
                   D. M. German   How Social and Communication Channels
                                  Shape and Challenge a Participatory
                                  Culture in Software Development  . . . . 185--204

IEEE Transactions on Software Engineering
Volume 43, Number 3, March, 2017

                    M. B. Dwyer   Improving Timeliness and Visibility in
                                  Publishing Software Engineering Research 205--206
               C. Giuffrida and   
              C. Iorgulescu and   
             G. Tamburrelli and   
                A. S. Tanenbaum   Automating Live Update for Generic
                                  Server Programs  . . . . . . . . . . . . 207--225
                     W. Dou and   
                      C. Xu and   
               S. C. Cheung and   
                         J. Wei   CACheck: Detecting and Repairing Cell
                                  Arrays in Spreadsheets . . . . . . . . . 226--251
                    H. Wang and   
                     T. Liu and   
                    X. Guan and   
                    C. Shen and   
                   Q. Zheng and   
                        Z. Yang   Dependence Guided Symbolic Execution . . 252--271
                     X. Xia and   
                      D. Lo and   
                    Y. Ding and   
            J. M. Al-Kofahi and   
               T. N. Nguyen and   
                        X. Wang   Improving Automated Bug Triaging with
                                  Specialized Topic Model  . . . . . . . . 272--297

IEEE Transactions on Software Engineering
Volume 43, Number 4, April, 2017

                    I. Bate and   
                   A. Burns and   
                    R. I. Davis   An Enhanced Bailout Protocol for Mixed
                                  Criticality Embedded Software  . . . . . 298--320
                 X. Y. Jing and   
                      F. Wu and   
                    X. Dong and   
                          B. Xu   An Improved SDA Based Defect Prediction
                                  Framework for Both Within-Project and
                                  Cross-Project Class-Imbalance Problems   321--339
                  L. Baresi and   
                  C. Ghezzi and   
                      X. Ma and   
                 V. P. L. Manna   Efficient Dynamic Updates of Distributed
                                  Components Through Version Consistency   340--358
                K. Damevski and   
             D. C. Shepherd and   
               J. Schneider and   
                     L. Pollock   Mining Sequences of Developer
                                  Interactions in Visual Studio for Usage
                                  Smells . . . . . . . . . . . . . . . . . 359--371
                      N. Li and   
                      J. Offutt   Test Oracle Strategies for Model-Based
                                  Testing  . . . . . . . . . . . . . . . . 372--395

IEEE Transactions on Software Engineering
Volume 43, Number 5, May, 2017

                   R. Hebig and   
             D. E. Khelladi and   
                    R. Bendraou   Approaches to Co-Evolution of Metamodels
                                  and Models: A Survey . . . . . . . . . . 396--414
                   L. Bossi and   
                 E. Bertino and   
                  S. R. Hussain   A System for Profiling and Monitoring
                                  Database Access Patterns by Application
                                  Programs for Anomaly Detection . . . . . 415--431
                   N. Huber and   
                  F. Brosig and   
                 S. Spinner and   
                  S. Kounev and   
                   M. Bähr   Model-Based Self-Aware Performance and
                                  Resource Management Using the Descartes
                                  Modeling Language  . . . . . . . . . . . 432--452
                    T. Chen and   
                     R. Bahsoon   Self-Adaptive and Online QoS Modeling
                                  for Cloud-Based Software Services  . . . 453--475
                   F. Zhang and   
               A. E. Hassan and   
                S. McIntosh and   
                         Y. Zou   The Use of Summation to Aggregate
                                  Software Metrics Hinders the Performance
                                  of Defect Prediction Models  . . . . . . 476--491

IEEE Transactions on Software Engineering
Volume 43, Number 6, June, 2017

                 A. Sadeghi and   
                 H. Bagheri and   
                  J. Garcia and   
                       S. Malek   A Taxonomy and Qualitative Comparison of
                                  Program Analysis Techniques for Security
                                  Assessment of Android Software . . . . . 492--530
                     G. Gay and   
              S. Rayadurgam and   
              M. P. E. Heimdahl   Automated Steering of Model-Based Test
                                  Oracles to Admit Real Program Behaviors  531--555
                    H. Wang and   
                    L. Wang and   
                      Q. Yu and   
                   Z. Zheng and   
             A. Bouguettaya and   
                      M. R. Lyu   Online Reliability Prediction via
                                  Motifs-Based Dynamic Bayesian Networks
                                  for Service-Oriented Systems . . . . . . 556--579
                      L. Li and   
                  M. Harman and   
                      F. Wu and   
                       Y. Zhang   The Value of Exact Analysis in
                                  Requirements Selection . . . . . . . . . 580--596

IEEE Transactions on Software Engineering
Volume 43, Number 7, July, 2017

                   D. Fucci and   
                H. Erdogmus and   
                  B. Turhan and   
                    M. Oivo and   
                     N. Juristo   A Dissection of the Test-Driven
                                  Development Process: Does It Really
                                  Matter to Test-First or to Test-Last?    597--614
                  N. Macedo and   
                   T. Jorge and   
                       A. Cunha   A Feature-Based Classification of Model
                                  Repair Approaches  . . . . . . . . . . . 615--640
             D. A. da Costa and   
                S. McIntosh and   
                   W. Shang and   
                 U. Kulesza and   
                  R. Coelho and   
                   A. E. Hassan   A Framework for Evaluating the Results
                                  of the SZZ Approach for Identifying
                                  Bug-Introducing Changes  . . . . . . . . 641--657
                      Q. He and   
                    R. Zhou and   
                   X. Zhang and   
                    Y. Wang and   
                      D. Ye and   
                    F. Chen and   
               J. C. Grundy and   
                        Y. Yang   Keyword Search for Building
                                  Service-Based Systems  . . . . . . . . . 658--674
                    M. Borg and   
                    K. Wnuk and   
                 B. Regnell and   
                     P. Runeson   Supporting Change Impact Analysis Using
                                  a Recommendation System: An Industrial
                                  Case Study in a Safety-Critical Context  675--700

IEEE Transactions on Software Engineering
Volume 43, Number 8, August, 2017

                 S. A. Carr and   
                 F. Logozzo and   
                       M. Payer   Automatic Contract Insertion with CCBot  701--714
                 L. Mariani and   
                 M. Pezz\`e and   
                     M. Santoro   GK-Tail+: An Efficient Approach to Learn
                                  Software Models  . . . . . . . . . . . . 715--738
            M. C. Platenius and   
                  A. Shaker and   
                  M. Becker and   
        E. Hüllermeier and   
                W. Schäfer   Imprecise Matching of Requirements
                                  Specifications for Software Services
                                  Using Fuzzy Logic  . . . . . . . . . . . 739--759
                      F. Li and   
                      Z. Li and   
                     W. Huo and   
                        X. Feng   Locating Software Faults Based on
                                  Minimum Debugging Frontier Set . . . . . 760--776
                  P. Rempel and   
                  P. Mäder   Preventing Defects: The Impact of
                                  Requirements Traceability Completeness
                                  on Software Quality  . . . . . . . . . . 777--797

IEEE Transactions on Software Engineering
Volume 43, Number 9, September, 2017

                   J. Mertz and   
                       I. Nunes   A Qualitative Study of Application-Level
                                  Caching  . . . . . . . . . . . . . . . . 798--816
                  W. Martin and   
                   F. Sarro and   
                     Y. Jia and   
                   Y. Zhang and   
                      M. Harman   A Survey of App Store Analysis for
                                  Software Engineering . . . . . . . . . . 817--847
             N. S. M. Yusop and   
                  J. Grundy and   
                        R. Vasa   Reporting Usability Defects: A
                                  Systematic Literature Review . . . . . . 848--867
             J. S. Cuadrado and   
                  E. Guerra and   
                     J. de Lara   Static Analysis of Model Transformations 868--897

IEEE Transactions on Software Engineering
Volume 43, Number 10, October, 2017

                   F. Sarro and   
                F. Ferrucci and   
                  M. Harman and   
                   A. Manna and   
                         J. Ren   Adaptive Multi-Objective Evolutionary
                                  Algorithms for Overtime Planning in
                                  Software Projects  . . . . . . . . . . . 898--917
                   C. Arora and   
              M. Sabetzadeh and   
                  L. Briand and   
                      F. Zimmer   Automated Extraction and Clustering of
                                  Requirements Glossary Terms  . . . . . . 918--945
                K. Banerjee and   
                  D. Sarkar and   
                      C. Mandal   Deriving Bisimulation Relations from
                                  Path Extension Based Equivalence
                                  Checkers . . . . . . . . . . . . . . . . 946--953
           S. Charalampidou and   
             A. Ampatzoglou and   
          A. Chatzigeorgiou and   
                A. Gkortzis and   
                    P. Avgeriou   Identifying Extract Method Refactoring
                                  Opportunities Based on Functional
                                  Relevance  . . . . . . . . . . . . . . . 954--974
                    E. Tang and   
                   X. Zhang and   
          N. T. Müller and   
                    Z. Chen and   
                          X. Li   Software Numerical Instability Detection
                                  and Diagnosis by Combining Stochastic
                                  and Infinite-Precision Testing . . . . . 975--994

IEEE Transactions on Software Engineering
Volume 43, Number 11, November, 2017

                    X. Wang and   
                     J. Sun and   
                    T. Wang and   
                         S. Qin   Language Inclusion Checking of Timed
                                  Automata with Non-Zenoness . . . . . . . 995--1008
                   M. Fleck and   
                   J. Troya and   
              M. Kessentini and   
                  M. Wimmer and   
                     B. Alkhazi   Model Transformation Modularization as a
                                  Many-Objective Optimization Problem  . . 1009--1032
                  R. M. Hierons   Testing from Partial Finite State
                                  Machines without Harmonised Traces . . . 1033--1043
         E. d. S. Maldonado and   
                  E. Shihab and   
                   N. Tsantalis   Using Natural Language Processing to
                                  Automatically Detect Self-Admitted
                                  Technical Debt . . . . . . . . . . . . . 1044--1062
                  M. Tufano and   
                 F. Palomba and   
                  G. Bavota and   
                 R. Oliveto and   
                M. D. Penta and   
                A. De Lucia and   
                  D. Poshyvanyk   When and Why Your Code Starts to Smell
                                  Bad (and Whether the Smells Go Away) . . 1063--1088
                C. Le Goues and   
                    Y. Brun and   
                 S. Forrest and   
                      W. Weimer   Clarifications on the Construction and
                                  Use of the ManyBugs Benchmark  . . . . . 1089--1090
                     S. Herbold   Comments on ScottKnottESD in response to
                                  ``An empirical comparison of model
                                  validation techniques for defect
                                  prediction models''  . . . . . . . . . . 1091--1094

IEEE Transactions on Software Engineering
Volume 43, Number 12, December, 2017

                  J. Fowkes and   
        P. Chanthirasegaran and   
                   R. Ranca and   
               M. Allamanis and   
                  M. Lapata and   
                      C. Sutton   Autofolding for Source Code
                                  Summarization  . . . . . . . . . . . . . 1095--1109
                 B. Nongpoh and   
                     R. Ray and   
                   S. Dutta and   
                    A. Banerjee   AutoSense: A Framework for Automated
                                  Sensitivity Analysis of Program Data . . 1110--1124
             G. Salvaneschi and   
                 S. Proksch and   
                   S. Amann and   
                    S. Nadi and   
                      M. Mezini   On the Positive Effect of Reactive
                                  Programming on Software Comprehension:
                                  An Empirical Study . . . . . . . . . . . 1125--1143
                        P. Zave   Reasoning About Identifier Spaces: How
                                  to Make Chord Correct  . . . . . . . . . 1144--1156
                     L. Luo and   
                    J. Ming and   
                      D. Wu and   
                     P. Liu and   
                         S. Zhu   Semantics-Based Obfuscation-Resilient
                                  Binary Code Similarity Comparison with
                                  Applications to Software and Algorithm
                                  Plagiarism Detection . . . . . . . . . . 1157--1177
                A. N. Meyer and   
               L. E. Barton and   
               G. C. Murphy and   
              T. Zimmermann and   
                       T. Fritz   The Work Life of Developers: Activities,
                                  Switches and Perceived Productivity  . . 1178--1193


IEEE Transactions on Software Engineering
Volume 44, Number 1, January, 2018

                       M. Dwyer   State of the Journal . . . . . . . . . . 1--2
                      Anonymous   2017 Index \booktitleIEEE Transactions
                                  on Software Engineering Vol. 43  . . . . 1--9
                N. Medvidovi\'c   Editorial from the New Editor in Chief   3--4
                D. Di Nucci and   
                 F. Palomba and   
                 G. De Rosa and   
                  G. Bavota and   
                 R. Oliveto and   
                    A. De Lucia   A Developer Centered Bug Prediction
                                  Model  . . . . . . . . . . . . . . . . . 5--24
                      Q. Yi and   
                    Z. Yang and   
                     S. Guo and   
                    C. Wang and   
                     J. Liu and   
                        C. Zhao   Eliminating Path Redundancy via
                                  Postconditioned Symbolic Execution . . . 25--43
               J. Al Dallal and   
                       A. Abdin   Empirical Evaluation of the Impact of
                                  Object-Oriented Code Refactoring on
                                  Quality Attributes: A Systematic
                                  Literature Review  . . . . . . . . . . . 44--69
                      L. Yu and   
                     W. T. Tsai   Test Case Generation for Boolean
                                  Expressions by Cell Covering . . . . . . 70--99
                      Anonymous   2017 Reviewers List* . . . . . . . . . . 100--102

IEEE Transactions on Software Engineering
Volume 44, Number 2, February, 2018

                 Luc Moreau and   
   Belfrit Victor Batlajery and   
           Trung Dong Huynh and   
         Danius Michaelides and   
                 Heather Packer   A Templating System to Generate
                                  Provenance . . . . . . . . . . . . . . . 103--121
        Annibale Panichella and   
    Fitsum Meshesha Kifetew and   
                  Paolo Tonella   Automated Test Case Generation as a
                                  Many-Objective Optimisation Problem with
                                  Dynamic Selection of the Targets . . . . 122--158
          Thibaud Lutellier and   
              Devin Chollak and   
              Joshua Garcia and   
                    Lin Tan and   
              Derek Rayside and   
         Nenad Medvidovi\'c and   
                 Robert Kroeger   Measuring the Impact of Code
                                  Dependencies on Software Architecture
                                  Recovery Techniques  . . . . . . . . . . 159--181
                      Yi Li and   
              Chenguang Zhu and   
                Julia Rubin and   
                 Marsha Chechik   Semantic Slicing of Software Version
                                  Histories  . . . . . . . . . . . . . . . 182--201

IEEE Transactions on Software Engineering
Volume 44, Number 3, 2018

                  Ying Wang and   
                     Hai Yu and   
               Zhiliang Zhu and   
                  Wei Zhang and   
                      Yuli Zhao   Automatic Software Refactoring via
                                  Weighted Clustering in Method-Level
                                  Networks . . . . . . . . . . . . . . . . 202--236
               Kai Petersen and   
          Deepika Badampudi and   
     Syed Muhammad Ali Shah and   
             Krzysztof Wnuk and   
              Tony Gorschek and   
        Efi Papatheocharous and   
             Jakob Axelsson and   
  Séverine Sentilles and   
             Ivica Crnkovic and   
              Antonio Cicchetti   Choosing Component Origins for Software
                                  Intensive Systems: In-House, COTS, OSS
                                  or Outsourcing? --- A Case Survey  . . . 237--261
Luciano García-Bañuelos and   
    Nick R. T. P. van Beest and   
               Marlon Dumas and   
           Marcello La Rosa and   
                 Willem Mertens   Complete and Interpretable Conformance
                                  Checking of Business Processes . . . . . 262--290
               Yanchun Wang and   
                   Qiang He and   
                  Dayong Ye and   
                       Yun Yang   Formulating Criticality-Based
                                  Cost-Effective Fault Tolerance
                                  Strategies for Multi-Tenant
                                  Service-Based Systems  . . . . . . . . . 291--307

IEEE Transactions on Software Engineering
Volume 44, Number 4, 2018

             Marinos Kintis and   
             Mike Papadakis and   
                    Yue Jia and   
             Nicos Malevris and   
              Yves Le Traon and   
                    Mark Harman   Detecting Trivial Mutant Equivalences
                                  via Compiler Optimisations . . . . . . . 308--333
                    Haipeng Cai   Hybrid Program Dependence Approximation
                                  for Effective Dynamic Impact Prediction  334--364
        Everton L. G. Alves and   
             Myoungkyu Song and   
              Tiago Massoni and   
Patrícia D. L. Machado and   
                    Miryung Kim   Refactoring Inspection Support for
                                  Manual Refactoring Edits . . . . . . . . 365--383
                Xuanzhe Liu and   
                  Huoran Li and   
                    Xuan Lu and   
                    Tao Xie and   
                Qiaozhu Mei and   
                  Feng Feng and   
                       Hong Mei   Understanding Diverse Usage Patterns
                                  from Large-Scale Appstore-Service
                                  Profiles . . . . . . . . . . . . . . . . 384--411

IEEE Transactions on Software Engineering
Volume 44, Number 5, May, 2018

             Shane McIntosh and   
                 Yasutaka Kamei   Are Fix-Inducing Changes a Moving
                                  Target? A Longitudinal Case Study of
                                  Just-In-Time Defect Prediction . . . . . 412--428
            Melina Mongiovi and   
                Rohit Gheyi and   
             Gustavo Soares and   
      Márcio Ribeiro and   
                Paulo Borba and   
              Leopoldo Teixeira   Detecting Overly Strong Preconditions in
                                  Refactoring Engines  . . . . . . . . . . 429--452
     Flávio Medeiros and   
      Márcio Ribeiro and   
                Rohit Gheyi and   
                  Sven Apel and   
     Christian Kästner and   
             Bruno Ferreira and   
              Luiz Carvalho and   
               Baldoino Fonseca   Discipline Matters: Refactoring of
                                  Preprocessor Directives in the #ifdef
                                  Hell . . . . . . . . . . . . . . . . . . 453--469
          Abhijeet Banerjee and   
              Lee Kee Chong and   
  Clément Ballabriga and   
             Abhik Roychoudhury   EnergyPatch: Repairing Resource Leaks to
                                  Improve Energy-Efficiency of Android
                                  Apps . . . . . . . . . . . . . . . . . . 470--490
              Zhenzhou Tian and   
                   Ting Liu and   
              Qinghua Zheng and   
               Eryue Zhuang and   
                   Ming Fan and   
                   Zijiang Yang   Reviving Sequential Program Birthmarking
                                  for Multithreaded Software Plagiarism
                                  Detection  . . . . . . . . . . . . . . . 491--511

IEEE Transactions on Software Engineering
Volume 44, Number 6, June, 2018

        Cinzia Bernardeschi and   
            Andrea Domenici and   
                    Paolo Masci   A PVS-Simulink Integrated Environment
                                  for Model-Based Analysis of
                                  Cyber-Physical Systems . . . . . . . . . 512--533
         Kwabena Ebo Bennin and   
                Jacky Keung and   
     Passakorn Phannachitta and   
               Akito Monden and   
                 Solomon Mensah   MAHAKIL: Diversity Based Oversampling
                                  Approach to Alleviate the Class
                                  Imbalance Issue in Software Defect
                                  Prediction . . . . . . . . . . . . . . . 534--550
     Morakot Choetkiertikul and   
              Hoa Khanh Dam and   
                Truyen Tran and   
               Aditya Ghose and   
                    John Grundy   Predicting Delivery Capability in
                                  Iterative Software Development . . . . . 551--573
              Justyna Petke and   
                Mark Harman and   
         William B. Langdon and   
                 Westley Weimer   Specialising Software for Different
                                  Downstream Applications Using Genetic
                                  Improvement and Code Transplantation . . 574--594
              Guangdong Bai and   
                  Quanqi Ye and   
               Yongzheng Wu and   
                Heila Botha and   
                    Jun Sun and   
                   Yang Liu and   
              Jin Song Dong and   
                  Willem Visser   Towards Model Checking Android
                                  Applications . . . . . . . . . . . . . . 595--612

IEEE Transactions on Software Engineering
Volume 44, Number 7, July, 2018

                Mathew Hall and   
            Neil Walkinshaw and   
                    Phil McMinn   Effectively Incorporating Expert
                                  Knowledge in Automated Software
                                  Remodularisation . . . . . . . . . . . . 613--630
                 Adam Betts and   
               Nathan Chong and   
       Pantazis Deligiannis and   
      Alastair F. Donaldson and   
                  Jeroen Ketema   Implementing and Evaluating
                                  Candidate-Based Invariant Generation . . 631--650
        Miltiadis Allamanis and   
               Earl T. Barr and   
             Christian Bird and   
          Premkumar Devanbu and   
                Mark Marron and   
                 Charles Sutton   Mining Semantic Loop Idioms  . . . . . . 651--668
          Ganesha Upadhyaya and   
                  Hridesh Rajan   On Accelerating Source Code Analysis at
                                  Massive Scale  . . . . . . . . . . . . . 669--688
         Alessandro Margara and   
              Guido Salvaneschi   On the Semantics of Distributed Reactive
                                  Programming: The Cost of Consistency . . 689--711

IEEE Transactions on Software Engineering
Volume 44, Number 8, August, 2018

               Ameer Armaly and   
            Paige Rodeghero and   
                Collin McMillan   A Comparison of Program Comprehension
                                  Strategies by Blind and Sighted
                                  Programmers  . . . . . . . . . . . . . . 712--724
                      Li Li and   
                    Jun Sun and   
                   Yang Liu and   
                   Meng Sun and   
                  Jin-Song Dong   A Formal Specification and Verification
                                  Framework for Timed Security Protocols   725--746
Francesco Adalberto Bianchi and   
         Alessandro Margara and   
                  Mauro Pezz\`e   A Survey of Recent Trends in Testing
                                  Concurrent Software Systems  . . . . . . 747--783
            Stepan Shevtsov and   
           Mihaly Berekmeri and   
                Danny Weyns and   
                 Martina Maggio   Control-Theoretical Software Adaptation:
                                  A Systematic Literature Review . . . . . 784--810

IEEE Transactions on Software Engineering
Volume 44, Number 9, September, 2018

            Steffen Herbold and   
         Alexander Trautsch and   
                 Jens Grabowski   A Comparative Study to Benchmark
                                  Cross-Project Defect Prediction
                                  Approaches . . . . . . . . . . . . . . . 811--833
                      Le Yu and   
                  Xiapu Luo and   
             Chenxiong Qian and   
                 Shuai Wang and   
            Hareton K. N. Leung   Enhancing the Description-to-Behavior
                                  Fidelity in Android Apps with Privacy
                                  Policy . . . . . . . . . . . . . . . . . 834--854
        Eiji Adachi Barbosa and   
              Alessandro Garcia   Global-Aware Recommendations for
                                  Repairing Violations in Exception
                                  Handling . . . . . . . . . . . . . . . . 855--873
               Jaechang Nam and   
                     Wei Fu and   
                Sunghun Kim and   
                Tim Menzies and   
                        Lin Tan   Heterogeneous Defect Prediction  . . . . 874--896
           Paul W. McBurney and   
               Siyuan Jiang and   
        Marouane Kessentini and   
          Nicholas A. Kraft and   
               Ameer Armaly and   
       Mohamed Wiem Mkaouer and   
                Collin McMillan   Towards Prioritizing Documentation
                                  Effort . . . . . . . . . . . . . . . . . 897--913

IEEE Transactions on Software Engineering
Volume 44, Number 10, 2018

              Donghwan Shin and   
                   Shin Yoo and   
                   Doo-Hwan Bae   A Theoretical and Empirical Study of
                                  Diversity-Aware Mutation Adequacy
                                  Criterion  . . . . . . . . . . . . . . . 914--931
                Saskia Bick and   
                Kai Spohrer and   
               Rashina Hoda and   
         Alexander Scheerer and   
                   Armin Heinzl   Coordination Challenges in Large-Scale
                                  Software Development: A Case Study of
                                  Planning Misalignment in Hybrid Settings 932--950
                    Xin Xia and   
               Lingfeng Bao and   
                   David Lo and   
             Zhenchang Xing and   
            Ahmed E. Hassan and   
                    Shanping Li   Measuring Program Comprehension: A
                                  Large-Scale Field Study with
                                  Professionals  . . . . . . . . . . . . . 951--976
              Fabio Palomba and   
        Annibale Panichella and   
               Andy Zaidman and   
              Rocco Oliveto and   
                Andrea De Lucia   The Scent of a Smell: An Extensive
                                  Comparison Between Textual and
                                  Structural Smells  . . . . . . . . . . . 977--1000
                 Ah-Rim Han and   
                   Sungdeok Cha   Two-Phase Assessment Approach to Improve
                                  the Efficiency of Refactoring
                                  Identification . . . . . . . . . . . . . 1001--1023

IEEE Transactions on Software Engineering
Volume 44, Number 11, 2018

                Miryung Kim and   
          Thomas Zimmermann and   
              Robert DeLine and   
                   Andrew Begel   Data Scientists in Software Teams: State
                                  of the Art and Challenges  . . . . . . . 1024--1038
             Radu Calinescu and   
                Danny Weyns and   
            Simos Gerasimou and   
    Muhammad Usman Iftikhar and   
              Ibrahim Habli and   
                      Tim Kelly   Engineering Trustworthy Self-Adaptive
                                  Software with Dynamic Assurance Cases    1039--1069
                 Feng Zhang and   
                 Haoran Niu and   
             Iman Keivanloo and   
                       Ying Zou   Expanding Queries for Code Search Using
                                  Semantically Related API Class-names . . 1070--1082
              Sergio Segura and   
      José A. Parejo and   
               Javier Troya and   
     Antonio Ruiz-Cortés   Metamorphic Testing of RESTful Web APIs  1083--1099
          Kostadin Damevski and   
                   Hui Chen and   
          David C. Shepherd and   
          Nicholas A. Kraft and   
                   Lori Pollock   Predicting Future Developer Behavior in
                                  the IDE Using Topic Models . . . . . . . 1100--1111
                   Zhe Wang and   
               Chenggang Wu and   
                 Xiang Yuan and   
             Zhenjiang Wang and   
                 Jianjun Li and   
              Pen-Chung Yew and   
                 Jeff Huang and   
              Xiaobing Feng and   
                 Yanyan Lan and   
                 Yunji Chen and   
               Yuanming Lai and   
                      Yong Guan   Using Local Clocks to Reproduce
                                  Concurrency Bugs . . . . . . . . . . . . 1112--1128
            Martin Shepperd and   
                 Tracy Hall and   
                    David Bowes   Authors' Reply to ``Comments on
                                  Researcher Bias: The Use of Machine
                                  Learning in Software Defect Prediction'' 1129--1131

IEEE Transactions on Software Engineering
Volume 44, Number 12, December, 2018

               Marc Palyart and   
             Gail C. Murphy and   
                  Vaden Masrani   A Study of Social Interactions in Open
                                  Source Component Use . . . . . . . . . . 1132--1145
             Mirco Franzago and   
           Davide Di Ruscio and   
            Ivano Malavolta and   
                  Henry Muccini   Collaborative Model-Driven Software
                                  Engineering: A Classification Framework
                                  and a Research Map . . . . . . . . . . . 1146--1175
            Rodrigo Morales and   
      Rubén Saborido and   
               Foutse Khomh and   
          Francisco Chicano and   
              Giuliano Antoniol   EARMO: An Energy-Aware Refactoring
                                  Approach for Mobile Apps . . . . . . . . 1176--1206
                V. B. Singh and   
               Meera Sharma and   
                     Hoang Pham   Entropy Based Software Reliability
                                  Analysis of Multi-Version Open Source
                                  Software . . . . . . . . . . . . . . . . 1207--1223
               Mayy Habayeb and   
      Syed Shariyar Murtaza and   
           Andriy Miranskyy and   
               Ayse Basar Bener   On the Use of Hidden Markov Model to
                                  Predict the Time to Fix Bugs . . . . . . 1224--1244
         Mohamed Sami Rakha and   
           Cor-Paul Bezemer and   
                Ahmed E. Hassan   Revisiting the Performance Evaluation of
                                  Automated Approaches for the Retrieval
                                  of Duplicate Issue Reports . . . . . . . 1245--1268
                Max Lillack and   
     Christian Kästner and   
                    Eric Bodden   Tracking Load-Time Configuration Options 1269--1291


IEEE Transactions on Software Engineering
Volume 45, Number 1, January, 2019

               Nenad Medvidovic   Editorial: State of the Journal  . . . . 1
                      Anonymous   2018 Index IEEE Transactions on Software
                                  Engineering Vol. 44  . . . . . . . . . . 1--9
            Andrea Margheri and   
          Massimiliano Masi and   
           Rosario Pugliese and   
               Francesco Tiezzi   A Rigorous Framework for Specification,
                                  Analysis and Enforcement of Access
                                  Control Policies . . . . . . . . . . . . 2--33
               Luca Gazzola and   
            Daniela Micucci and   
               Leonardo Mariani   Automatic Software Repair: A Survey  . . 34--67
          Simone Scalabrino and   
            Gabriele Bavota and   
              Barbara Russo and   
      Massimiliano Di Penta and   
                  Rocco Oliveto   Listening to the Crowd for the Release
                                  Planning of Mobile Apps  . . . . . . . . 68--86
        Eirini Kalliamvakou and   
             Christian Bird and   
          Thomas Zimmermann and   
               Andrew Begel and   
              Robert DeLine and   
               Daniel M. German   What Makes a Great Manager of Software
                                  Engineers? . . . . . . . . . . . . . . . 87--106
                      Anonymous   2018 Reviewers List  . . . . . . . . . . 107--110

IEEE Transactions on Software Engineering
Volume 45, Number 2, February, 2019

       Seyedrebvar Hosseini and   
               Burak Turhan and   
             Dimuthu Gunarathna   A Systematic Literature Review and
                                  Meta-Analysis on Cross Project Defect
                                  Prediction . . . . . . . . . . . . . . . 111--147
                    Hong Lu and   
                 Shuai Wang and   
                    Tao Yue and   
                Shaukat Ali and   
            Jan F. Nygård   Automated Refactoring of OCL Constraints
                                  with Search  . . . . . . . . . . . . . . 148--170
                    Yao Pan and   
                Jules White and   
                     Yu Sun and   
                      Jeff Gray   Gray Computing: A Framework for
                                  Computing with Background JavaScript
                                  Tasks  . . . . . . . . . . . . . . . . . 171--193
              Fabio Palomba and   
               Marco Zanoni and   
  Francesca Arcelli Fontana and   
            Andrea De Lucia and   
                  Rocco Oliveto   Toward a Smell-Aware Bug Prediction
                                  Model  . . . . . . . . . . . . . . . . . 194--218

IEEE Transactions on Software Engineering
Volume 45, Number 3, March, 2019

              Jonathan Dorn and   
             Jeremy Lacomis and   
             Westley Weimer and   
              Stephanie Forrest   Automatically Exploring Tradeoffs
                                  Between Software Output Fidelity and
                                  Energy Costs . . . . . . . . . . . . . . 219--236
             Klaas-Jan Stol and   
              Bora Caglayan and   
               Brian Fitzgerald   Competition-Based Crowdsourcing Software
                                  Development: a Multi-Method Study from a
                                  Customer Perspective . . . . . . . . . . 237--260
              Moritz Beller and   
           Georgios Gousios and   
        Annibale Panichella and   
          Sebastian Proksch and   
                 Sven Amann and   
                   Andy Zaidman   Developer Testing in the IDE: Patterns,
                                  Beliefs, and Behavior  . . . . . . . . . 261--284
          Narayan Ramasubbu and   
               Chris F. Kemerer   Integrating Technical Debt Management
                                  and Software Quality Management
                                  Processes: A Normative Framework and
                                  Field Tests  . . . . . . . . . . . . . . 285--300
                 Ruizhi Gao and   
                   W. Eric Wong   MSeer --- An Advanced Technique for
                                  Locating Multiple Bugs in Parallel . . . 301--318

IEEE Transactions on Software Engineering
Volume 45, Number 4, April, 2019

                   H. Zhong and   
                         H. Mei   An Empirical Study on API Usages . . . . 319--334
                     S. Jan and   
              A. Panichella and   
                  A. Arcuri and   
                      L. Briand   Automatic Generation of Tests to Exploit
                                  XML Injection Vulnerabilities in Web
                                  Applications . . . . . . . . . . . . . . 335--362
               A. Marchetto and   
              G. Scanniello and   
                        A. Susi   Combining Code and Requirements Coverage
                                  with Execution Cost for Test Suite
                                  Reduction  . . . . . . . . . . . . . . . 363--390
                      Z. Li and   
                    X. Jing and   
                     X. Zhu and   
                   H. Zhang and   
                      B. Xu and   
                        S. Ying   On the Multiple Sources and Privacy
                                  Preservation Issues for Heterogeneous
                                  Defect Prediction  . . . . . . . . . . . 391--411
          R. Clarisó and   
      C. A. González and   
                       J. Cabot   Smart Bound Selection for the
                                  Verification of UML/OCL Class Diagrams   412--426

IEEE Transactions on Software Engineering
Volume 45, Number 5, May, 2019

                  P. McMinn and   
               C. J. Wright and   
              C. J. McCurdy and   
               G. M. Kapfhammer   Automatic Detection and Removal of
                                  Ineffective Mutants for the Mutation
                                  Analysis of Relational Database Schemas  427--463
              L. Ponzanelli and   
                  G. Bavota and   
                   A. Mocci and   
                 R. Oliveto and   
                M. D. Penta and   
                  S. Haiduc and   
                   B. Russo and   
                       M. Lanza   Automatic Identification and
                                  Classification of Software Development
                                  Video Tutorial Fragments . . . . . . . . 464--488
              M. Böhme and   
                    V. Pham and   
                A. Roychoudhury   Coverage-Based Greybox Fuzzing as Markov
                                  Chain  . . . . . . . . . . . . . . . . . 489--506
                 P. Arcaini and   
              A. Gargantini and   
                   E. Riccobene   Decomposition-Based Approach for
                                  Model-Based Test Generation  . . . . . . 507--520
                    S. Frey and   
                  A. Rashid and   
             P. Anthonysamy and   
       M. Pinto-Albuquerque and   
                    S. A. Naqvi   The Good, the Bad and the Ugly: A Study
                                  of Security Decisions in a
                                  Cyber-Physical Systems Game  . . . . . . 521--536

IEEE Transactions on Software Engineering
Volume 45, Number 6, June, 2019

                     X. Xie and   
                    B. Chen and   
                     L. Zou and   
                     Y. Liu and   
                      W. Le and   
                          X. Li   Automatic Loop Summarization via Path
                                  Dependency Analysis  . . . . . . . . . . 537--557
                      T. Yu and   
                     W. Wen and   
                     X. Han and   
                    J. H. Hayes   ConPredictor: Concurrency Defect
                                  Prediction in Real-World Applications    558--575
                 L. Mottola and   
                G. P. Picco and   
            F. J. Oppermann and   
                J. Eriksson and   
                   N. Finne and   
                   H. Fuchs and   
                A. Gaglione and   
              S. Karnouskos and   
              P. M. Montero and   
                  N. Oertel and   
              K. Römer and   
             P. Spieß and   
            S. Tranquillini and   
                       T. Voigt   makeSense: Simplifying the Integration
                                  of Wireless Sensor Networks into
                                  Business Processes . . . . . . . . . . . 576--596
                    J. Chen and   
                    V. Nair and   
                 R. Krishna and   
                     T. Menzies   Sampling as a Baseline Optimizer for
                                  Search-Based Software Engineering  . . . 597--614
                  F. Peters and   
                  T. T. Tun and   
                      Y. Yu and   
                    B. Nuseibeh   Text Filtering and Ranking for Security
                                  Bug Report Prediction  . . . . . . . . . 615--631
                 S. Herbold and   
                A. Trautsch and   
                   J. Grabowski   Correction of A Comparative Study to
                                  Benchmark Cross-Project Defect
                                  Prediction Approaches  . . . . . . . . . 632--636

IEEE Transactions on Software Engineering
Volume 45, Number 7, July, 2019

          M. Choetkiertikul and   
                  H. K. Dam and   
                    T. Tran and   
                    T. Pham and   
                   A. Ghose and   
                     T. Menzies   A Deep Learning Model for Estimating
                                  Story Points . . . . . . . . . . . . . . 637--656
                     Y. Cai and   
                    L. Xiao and   
                  R. Kazman and   
                      R. Mo and   
                        Q. Feng   Design Rule Spaces: A New Model for
                                  Representing and Analyzing Software
                                  Architecture . . . . . . . . . . . . . . 657--682
        C. Tantithamthavorn and   
                S. McIntosh and   
               A. E. Hassan and   
                   K. Matsumoto   The Impact of Automated Parameter
                                  Optimization on Defect Prediction Models 683--711
                       P. Ralph   Toward Methodological Guidelines for
                                  Process Theories and Taxonomies in
                                  Software Engineering . . . . . . . . . . 712--735

IEEE Transactions on Software Engineering
Volume 45, Number 8, August, 2019

          D. van der Linden and   
                       I. Hadar   A Systematic Literature Review of
                                  Applications of the Physics of Notations 736--759
          A. Ramírez and   
               J. R. Romero and   
                   C. L. Simons   A Systematic Review of Interaction in
                                  Search-Based Software Engineering  . . . 760--781
                    W. Song and   
                      X. Ma and   
                    H. Jacobsen   Instance Migration Validity for Dynamic
                                  Evolution of Data-Aware Processes  . . . 782--801
             M. D. Harrison and   
                   P. Masci and   
                   J. C. Campos   Verification Templates for the Analysis
                                  of User Interface Software Design  . . . 802--822
                     L. Bao and   
                    Z. Xing and   
                     X. Xia and   
                          D. Lo   VT-Revolution: Interactive Programming
                                  Video Tutorial Authoring and Watching
                                  System . . . . . . . . . . . . . . . . . 823--838

IEEE Transactions on Software Engineering
Volume 45, Number 9, September, 2019

                  M. Nayebi and   
                        G. Ruhe   Asymmetric Release Planning:
                                  Compromising Satisfaction against
                                  Dissatisfaction  . . . . . . . . . . . . 839--857
                   G. Chari and   
            D. Garbervetsky and   
                    S. Marr and   
                     S. Ducasse   Fully Reflective Execution Environments:
                                  Virtual Machines for More Flexible
                                  Software . . . . . . . . . . . . . . . . 858--876
                   J. Smith and   
                 B. Johnson and   
             E. Murphy-Hill and   
                     B. Chu and   
                  H. R. Lipford   How Developers Diagnose Potential
                                  Security Vulnerabilities with a Static
                                  Analysis Tool  . . . . . . . . . . . . . 877--897
                   J. Zhang and   
                   L. Zhang and   
                  M. Harman and   
                     D. Hao and   
                     Y. Jia and   
                       L. Zhang   Predictive Mutation Testing  . . . . . . 898--918
              R. Matinnejad and   
                  S. Nejati and   
               L. C. Briand and   
                   T. Bruckmann   Test Generation and Test Prioritization
                                  for Simulink Models with Dynamic
                                  Behavior . . . . . . . . . . . . . . . . 919--944

IEEE Transactions on Software Engineering
Volume 45, Number 10, October, 2019

              S. Dashevskyi and   
              A. D. Brucker and   
                    F. Massacci   A Screening Test for Disclosed
                                  Vulnerabilities in FOSS Components . . . 945--966
                 M. Mesgari and   
                   C. Okoli and   
                A. O. de Guinea   Creating Rich and Representative
                                  Personas by Discovering Affordances  . . 967--983
                    P. Bian and   
                   B. Liang and   
                   Y. Zhang and   
                    C. Yang and   
                     W. Shi and   
                         Y. Cai   Detecting Bugs by Discovering
                                  Expectations and Their Violations  . . . 984--1001
                   T. Hoang and   
             R. J. Oentaryo and   
                   T. B. Le and   
                          D. Lo   Network-Clustered Multi-Modal Bug
                                  Localization . . . . . . . . . . . . . . 1002--1023
                   F. Palma and   
                    N. Moha and   
     Y. Guéhéneuc   UniDoSA: The Unified Specification and
                                  Detection of Service Antipatterns  . . . 1024--1053

IEEE Transactions on Software Engineering
Volume 45, Number 11, November, 2019

                     Q. Luo and   
                   K. Moran and   
                   L. Zhang and   
                  D. Poshyvanyk   How Do Static and Dynamic Test Case
                                  Prioritization Techniques Perform on
                                  Modern Software Systems? An Extensive
                                  Study on GitHub Projects . . . . . . . . 1054--1080
                 R. Krishna and   
                     T. Menzies   Bellwethers: A Baseline Method for
                                  Transfer Learning  . . . . . . . . . . . 1081--1105
               T. D. LaToza and   
                A. Di Lecce and   
                   F. Ricci and   
                W. B. Towne and   
                A. van der Hoek   Microtask Programming  . . . . . . . . . 1106--1124
                     Y. Xue and   
                      Z. Xu and   
            M. Chandramohan and   
                         Y. Liu   Accurate and Scalable Cross-Architecture
                                  Cross-OS Binary Code Search with
                                  Emulation  . . . . . . . . . . . . . . . 1125--1149
                B. R. Bruce and   
                   J. Petke and   
                  M. Harman and   
                     E. T. Barr   Approximate Oracles and Synergy in
                                  Software Energy Search Spaces  . . . . . 1150--1169

IEEE Transactions on Software Engineering
Volume 45, Number 12, December, 2019

                   S. Amann and   
               H. A. Nguyen and   
                    S. Nadi and   
               T. N. Nguyen and   
                      M. Mezini   A Systematic Evaluation of Static
                                  API-Misuse Detectors . . . . . . . . . . 1170--1188
                 O. Al-Baik and   
                      J. Miller   Integrative Double Kaizen Loop (IDKL):
                                  Towards a Culture of Continuous Learning
                                  and Sustainable Improvements for
                                  Software Organizations . . . . . . . . . 1189--1210
                     M. Yan and   
                     X. Xia and   
                  E. Shihab and   
                      D. Lo and   
                     J. Yin and   
                        X. Yang   Automating Change-Level Self-Admitted
                                  Technical Debt Determination . . . . . . 1211--1229
                 G. Canfora and   
              F. Martinelli and   
                F. Mercaldo and   
                 V. Nardone and   
                 A. Santone and   
                 C. A. Visaggio   LEILA: Formal Tool for Identifying
                                  Mobile Malicious Behaviour . . . . . . . 1230--1252
                    Q. Song and   
                     Y. Guo and   
                    M. Shepperd   A Comprehensive Investigation of the
                                  Role of Imbalanced Learning for Software
                                  Defect Prediction  . . . . . . . . . . . 1253--1269
                  H. Mercan and   
                  C. Yilmaz and   
                        K. Kaya   CHiP: A Configurable Hybrid Parallel
                                  Covering Array Constructor . . . . . . . 1270--1291


IEEE Transactions on Software Engineering
Volume 46, Number 1, January, 2020

                    P. Bian and   
                   B. Liang and   
                   Y. Zhang and   
                    C. Yang and   
                     W. Shi and   
                         Y. Cai   Corrections to ``Detecting Bugs by
                                  Discovering Expectations and Their
                                  Violations'' . . . . . . . . . . . . . . 113--113

IEEE Transactions on Software Engineering
Volume 46, Number 2, 2020

           C. França and   
          F. Q. B. da Silva and   
                       H. Sharp   Motivation and Satisfaction of Software
                                  Engineers  . . . . . . . . . . . . . . . 118--140
                     X. Niu and   
                     C. Nie and   
                  J. Y. Lei and   
                   H. Leung and   
                        X. Wang   Identifying Failure-Causing Schemas in
                                  the Presence of Multiple Faults  . . . . 141--162
            J. Thomé and   
                 L. K. Shar and   
               D. Bianculli and   
                      L. Briand   An Integrated Approach for Effective
                                  Injection Vulnerability Analysis of Web
                                  Applications Through Security Slicing
                                  and Hybrid Constraint Solving  . . . . . 163--195
                   K. Moran and   
  C. Bernal-Cárdenas and   
                  M. Curcio and   
                  R. Bonett and   
                  D. Poshyvanyk   Machine Learning-Based Prototyping of
                                  Graphical User Interfaces for Mobile
                                  Apps . . . . . . . . . . . . . . . . . . 196--221

IEEE Transactions on Software Engineering
Volume 46, Number 3, 2020

                  J. Vilela and   
                  J. Castro and   
           L. E. G. Martins and   
                    T. Gorschek   Safety Practices in Requirements
                                  Engineering: The Uni-REPM Safety Module  222--250
                F. Basciani and   
                M. D'Emidio and   
               D. D. Ruscio and   
                D. Frigioni and   
                  L. Iovino and   
                 A. Pierantonio   Automated Selection of Optimal Model
                                  Transformation Chains via Shortest-Path
                                  Algorithms . . . . . . . . . . . . . . . 251--279
                 R. Natella and   
                  S. Winter and   
                D. Cotroneo and   
                        N. Suri   Analyzing the Effects of Bugs on
                                  Software Interfaces  . . . . . . . . . . 280--301
                      H. Wu and   
                     C. Nie and   
                   J. Petke and   
                     Y. Jia and   
                      M. Harman   An Empirical Comparison of Combinatorial
                                  Testing, Random Testing and Adaptive
                                  Random Testing . . . . . . . . . . . . . 302--320
             M. H. Ter Beek and   
                   A. Legay and   
             A. L. Lafuente and   
                      A. Vandin   A Framework for Quantitative Modeling
                                  and Analysis of Highly (Re)configurable
                                  Systems  . . . . . . . . . . . . . . . . 321--345

IEEE Transactions on Software Engineering
Volume 46, Number 4, 2020

           L. E. G. Martins and   
                    T. Gorschek   Requirements Engineering for
                                  Safety-Critical Systems: An Interview
                                  Study with Industry Practitioners  . . . 346--361
                  B. Meyers and   
              H. Vangheluwe and   
                   J. Denil and   
                       R. Salay   A Framework for Temporal Verification
                                  Support in Domain-Specific Modelling . . 362--404
                      T. Yu and   
                   Z. Huang and   
                        C. Wang   ConTesa: Directed Test Suite
                                  Augmentation for Concurrent Software . . 405--419
                 D. Falessi and   
                    J. Roll and   
               J. L. C. Guo and   
               J. Cleland-Huang   Leveraging Historical Associations
                                  between Requirements and Source Code to
                                  Identify Impacted Classes  . . . . . . . 420--441
                  N. Peitek and   
                J. Siegmund and   
                    S. Apel and   
            C. Kästner and   
                  C. Parnin and   
                A. Bethmann and   
                   T. Leich and   
                   G. Saake and   
                   A. Brechmann   A Look into Programmers Heads  . . . . . 442--462


IEEE Transactions on Software Engineering
Volume 47, Number 5, 2021

                Yinxing Xue and   
                 Zhengzi Xu and   
     Mahinthan Chandramohan and   
                       Yang Liu   Erratum to Accurate and Scalable
                                  Cross-Architecture Cross-OS Binary Code
                                  Search With Emulation  . . . . . . . . . 1088--1088