Last update:
Thu May 20 08:42:20 MDT 2021
J. Kramer Editorial: A New Editor in Chief and the
State of the Journal . . . . . . . . . . 1--2
B. Nuseibeh Editorial: A New Decade of TSE . . . . . 3--6
S. Horwitz and
B. Liblit and
M. Polishchuk Better Debugging via Output Tracing and
Callstack-Sensitive Slicing . . . . . . 7--19
N. Moha and
Y. G. Guéhéneuc and
L. Duchien and
A. F. Le Meur DECOR: A Method for the Specification
and Detection of Code and Design Smells 20--36
H. Aljazzar and
S. Leue Directed Explicit State-Space Search in
the Generation of Counterexamples for
Stochastic Model Checking . . . . . . . 37--60
J. E. Hannay and
E. Arisholm and
H. Engvik and
D. I. K. Sjoberg Effects of Personality on Pair
Programming . . . . . . . . . . . . . . 61--80
X. Yuan and
A. M. Memon Generating Event Sequence-Based Test
Cases Using GUI Runtime State Feedback 81--95
F. Ricca and
M. Di Penta and
M. Torchiano and
P. Tonella and
M. Ceccato How Developers' Experience and Ability
Influence Web Application Comprehension
Tasks Supported by UML Stereotypes: A
Series of Four Experiments . . . . . . . 96--118
I. Malavolta and
H. Muccini and
P. Pelliccione and
D. Tamburri Providing Architectural Languages and
Tools Interoperability through Model
Transformation Technologies . . . . . . 119--140
Anonymous 2009 Reviewers List . . . . . . . . . . 141--143
Anonymous 7 Great Reasons for Joining the IEEE
Computer Society [advertisement] . . . . 144--144
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: Readers, Writers, Reviewers,
and Editors . . . . . . . . . . . . . . 145--156
A. Garcia and
A. Romanovsky and
V. Issarny Guest Editors' Introduction to the
Special Section on Exception Handling:
From Requirements to Software
Maintenance . . . . . . . . . . . . . . 147--149
H. Shah and
C. Gorg and
M. J. Harrold Understanding Exception Handling:
Viewpoints of Novices and Experts . . . 150--161
B. S. Lerner and
S. Christov and
L. J. Osterweil and
R. Bendraou and
U. Kannengiesser and
A. Wise Exception Handling Patterns for Process
Modeling . . . . . . . . . . . . . . . . 162--183
D. Kulkarni and
A. Tripathi A Framework for Programming Robust
Context-Aware Applications . . . . . . . 184--197
G. Friedrich and
M. G. Fugini and
E. Mussi and
B. Pernici and
G. Tagni Exception Handling for Repair in
Service-Based Processes . . . . . . . . 198--215
R. Shatnawi A Quantitative Investigation of the
Acceptable Risk Levels of
Object-Oriented Metrics in Open-Source
Systems . . . . . . . . . . . . . . . . 216--225
M. Harman and
P. McMinn A Theoretical and Empirical Study of
Search-Based Testing: Local, Global, and
Hybrid Search . . . . . . . . . . . . . 226--247
D. Kimelman and
M. Kimelman and
D. Mandelin and
D. Yellin Bayesian Approaches to Matching
Architectural Diagrams . . . . . . . . . 248--274
P. Chalin Engineering a Sound Assertion Semantics
for the Verifying Compiler . . . . . . . 275--287
J. Skene and
F. Raimondi and
W. Emmerich Service-Level Agreements for Electronic
Services . . . . . . . . . . . . . . . . 288--304
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh In Memoriam: Robin Milner and Amir
Pnueli . . . . . . . . . . . . . . . . . 305--305
K. Goseva-Popstojanova and
K. Kanoun Guest Editors' Introduction to the
Special Section on Evaluation and
Improvement of Software Dependability 306--308
E. Uzuncaova and
S. Khurshid and
D. Batory Incremental Test Generation for Software
Product Lines . . . . . . . . . . . . . 309--322
R. Pietrantuono and
S. Russo and
K. S. Trivedi Software Reliability and Testing Time
Allocation: An Architecture-Based
Approach . . . . . . . . . . . . . . . . 323--337
G. Georg and
K. Anastasakis and
B. Bordbar and
S. H. Houmb and
I. Ray and
M. Toahchoodee Verification and Trade-Off Analysis of
Security Properties in UML System Models 338--356
J. Antunes and
N. Neves and
M. Correia and
P. Verissimo and
R. Neves Vulnerability Discovery with Attack
Injection . . . . . . . . . . . . . . . 357--370
G. Spanoudakis and
A. Zisman Discovering Services during
Service-Based System Design Using UML 371--389
B. Bollig and
J. P. Katoen and
C. Kern and
M. Leucker Learning Communicating Automata from
MSCs . . . . . . . . . . . . . . . . . . 390--408
R. Meier and
V. Cahill On Event-Based Middleware for
Location-Aware Mobile Applications . . . 409--430
C. Zhao and
J. Kong and
K. Zhang Program Behavior Discovery and
Verification: A Graph Grammar Approach 431--448
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: How Special Should Issues Be? 449--450
B. G. Ryder and
A. Zeller Introduction: The Best Papers of ISSTA 451--452
D. Balzarotti and
G. Banks and
M. Cova and
V. Felmetsger and
R. Kemmerer and
W. Robertson and
F. Valeur and
G. Vigna An Experience in Testing the Security of
Real-World Electronic Voting Systems . . 453--473
S. Artzi and
A. Kiezun and
J. Dolby and
F. Tip and
D. Dig and
A. Paradkar and
M. D. Ernst Finding Bugs in Web Applications Using
Dynamic Test Generation and
Explicit-State Model Checking . . . . . 474--494
N. E. Beckman and
A. V. Nori and
S. K. Rajamani and
R. J. Simmons and
S. D. Tetali and
A. V. Thakur Proofs from Tests . . . . . . . . . . . 495--508
E. Bodden and
K. Havelund Aspect-Oriented Race Detection in Java 509--527
G. K. Baah and
A. Podgurski and
M. J. Harrold The Probabilistic Program Dependence
Graph and Its Application to Fault
Diagnosis . . . . . . . . . . . . . . . 528--545
R. P. L. Buse and
W. R. Weimer Learning a Metric for Code Readability 546--558
N. Limam and
R. Boutaba Assessing Software Service Quality and
Trustworthiness at Selection Time . . . 559--574
N. Pettersson and
W. Lowe and
J. Nivre Evaluation of Accuracy in Design Pattern
Occurrence Detection . . . . . . . . . . 575--590
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
G. C. Murphy and
W. Schafer Guest Editors' Introduction: 2008
Conference on the Foundations of
Software Engineering . . . . . . . . . . 591--592
H. Do and
S. Mirarab and
L. Tahvildari and
G. Rothermel The Effects of Time Constraints on Test
Case Prioritization: A Series of
Controlled Experiments . . . . . . . . . 593--617
T. Zimmermann and
R. Premraj and
N. Bettenburg and
S. Just and
A. Schroter and
C. Weiss What Makes a Good Bug Report? . . . . . 618--643
M. Sama and
S. Elbaum and
F. Raimondi and
D. S. Rosenblum and
Z. Wang Context-Aware Adaptive Applications:
Fault Patterns and Their Automated
Identification . . . . . . . . . . . . . 644--661
R. Bendraou and
J. M. Jezequel and
M. P. Gervais and
X. Blanc A Comparison of Six UML-Based Languages
for Software Process Modeling . . . . . 662--675
S. MacDonell and
M. Shepperd and
B. Kitchenham and
E. Mendes How Reliable Are Systematic Reviews in
Empirical Software Engineering? . . . . 676--687
Z. Lin and
X. Zhang and
D. Xu Reverse Engineering Input Syntactic
Structure from Program Execution and Its
Applications . . . . . . . . . . . . . . 688--703
P. Emberson and
I. Bate Stressing Search with Scenarios for
Flexible Solutions to Real-Time Task
Allocation Problems . . . . . . . . . . 704--718
R. Lanotte and
A. Maggiolo-Schettini and
A. Troina Time and Probability-Based Information
Flow Analysis . . . . . . . . . . . . . 719--734
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial . . . . . . . . . . . . . . . 735--736
M. Harman and
A. Mansouri Search Based Software Engineering:
Introduction to the Special Issue of the
\booktitleIEEE Transactions on Software
Engineering . . . . . . . . . . . . . . 737--741
S. Ali and
L. C. Briand and
H. Hemmati and
R. K. Panesar-Walawege A Systematic Review of the Application
and Empirical Investigation of
Search-Based Test Case Generation . . . 742--762
S. Poulding and
J. A. Clark Efficient Software Verification:
Statistical Testing Using Automated
Search . . . . . . . . . . . . . . . . . 763--777
V. Garousi A Genetic Algorithm-Based Stress Test
Requirements Generator Tool and Its
Empirical Evaluation . . . . . . . . . . 778--797
Christopher L. Simons and
Ian C. Parmee and
Rhys Gwynllyw Interactive, Evolutionary Search in
Upstream Object-Oriented Class Design 798--816
M. Bowman and
L. C. Briand and
Y. Labiche Solving the Class Responsibility
Assignment Problem in Object-Oriented
Analysis with Multi-Objective Genetic
Algorithms . . . . . . . . . . . . . . . 817--837
J. White and
B. Doughtery and
D. C. Schmidt ASCENT: An Algorithmic Technique for
Designing Hardware and Software in
Tandem . . . . . . . . . . . . . . . . . 838--851
Y. Liu and
T. M. Khoshgoftaar and
N. Seliya Evolutionary Optimization of Software
Quality Modeling with Multiple
Repositories . . . . . . . . . . . . . . 852--864
K. Krogmann and
M. Kuperberg and
R. Reussner Using Genetic Search for Reverse
Engineering of Parametric Behavior
Models for Performance Prediction . . . 865--877
Anonymous IEEE Computer Society CSDP
[advertisement] . . . . . . . . . . . . 878--878
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: State of the Journal . . . . 1--3
B. Demsky and
S. Sundaramurthy Bristlecone: Language Support for Robust
Software Applications . . . . . . . . . 4--23
M. P. Ward and
H. Zedan Deriving a Slicing Algorithm via Fermat
Transformations . . . . . . . . . . . . 24--47
R. C. Bryce and
S. Sampath and
A. M. Memon Developing a Single Model and Test
Prioritization Strategies for
Event-Driven Software . . . . . . . . . 48--64
S. Distefano and
M. Scarpa and
A. Puliafito From UML to Petri Nets: The PCM-Based
Methodology . . . . . . . . . . . . . . 65--79
J. H. Andrews and
T. Menzies and
F. C. H. Li Genetic Algorithms for Randomized Unit
Testing . . . . . . . . . . . . . . . . 80--94
L. Prechelt Plat\_Forms: A Web Development Platform
Comparison by an Exploratory Experiment
Searching for Emergent Platform
Properties . . . . . . . . . . . . . . . 95--108
T. Y. Chen and
T. H. Tse and
Z. Q. Zhou Semi-Proving: An Integrated Method for
Program Proving, Testing, and Debugging 109--125
Y. Kwon and
G. Agha Verifying the Evolution of Probability
Distributions Governed by a DTMC . . . . 126--141
Anonymous 2010 Reviewers List . . . . . . . . . . 142--144
Anonymous 2010 Annual Index . . . . . . . . . . . Online Only--Online Only
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: What Makes a Publication
Archival? . . . . . . . . . . . . . . . 145--145
M. Kim and
Y. Kim and
H. Kim A Comparative Study of Software Model
Checkers as Unit Testing Tools: An
Industrial Case Study . . . . . . . . . 146--160
S. Mouchawrab and
L. C. Briand and
Y. Labiche and
M. Di Penta Assessing, Comparing, and Combining
State Machine-Based Testing and
Structural Testing: A Series of
Experiments . . . . . . . . . . . . . . 161--187
A. Egyed Automatically Detecting and Tracking
Inconsistencies in Software Design
Models . . . . . . . . . . . . . . . . . 188--204
A. De Lucia and
M. Di Penta and
R. Oliveto Improving Source Code Lexicon via
Traceability and Information Retrieval 205--227
L. Baresi and
C. Ghezzi and
L. Mottola Loupe: Verifying Publish--Subscribe
Architectures with a Magnifying Lens . . 228--246
L. Baresi and
S. Guinea Self-Supervising BPEL Processes . . . . 247--263
K. Praditwong and
M. Harman and
X. Yao Software Module Clustering as a
Multi-Objective Search Problem . . . . . 264--282
O. Dieste and
N. Juristo Systematic review and aggregation of
empirical studies on elicitation
techniques . . . . . . . . . . . . . . . 283--304
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
M. Cataldo and
K. Ehrlich and
A. Mockus Guest Editors' Introduction: Special
Section on the Socio-Technical
Environment of Software Development
Projects . . . . . . . . . . . . . . . . 305--306
I. Kwan and
A. Schroter and
D. Damian Does Socio-Technical Congruence Have an
Effect on Software Build Success? A
Study of Coordination in a Software
Project . . . . . . . . . . . . . . . . 307--324
C. R. B. de Souza and
D. F. Redmiles The Awareness Network, To Whom Should I
Display My Actions? And, Whose Actions
Should I Monitor? . . . . . . . . . . . 325--340
B. Cornelissen and
A. Zaidman and
A. van Deursen A Controlled Experiment for Program
Comprehension through Trace
Visualization . . . . . . . . . . . . . 341--355
Q. Song and
Z. Jia and
M. Shepperd and
S. Ying and
J. Liu A General Software Defect-Proneness
Prediction Framework . . . . . . . . . . 356--370
P. K. Manadhata and
J. M. Wing An Attack Surface Metric . . . . . . . . 371--386
R. Calinescu and
L. Grunske and
M. Kwiatkowska and
R. Mirandola and
G. Tamburrelli Dynamic QoS Management and Optimization
in Service-Based Systems . . . . . . . . 387--409
M. Weidlich and
J. Mendling and
M. Weske Efficient Consistency Measurement Based
on Behavioral Profiles of Process Models 410--429
D. Kim and
X. Wang and
S. Kim and
A. Zeller and
S. C. Cheung and
S. Park Which Crashes Should I Fix First?:
Predicting Top Crashes at an Early Stage
to Prioritize Debugging Efforts . . . . 430--447
Anonymous Distinguish yourself with the CSDP
[advertisement] . . . . . . . . . . . . 448--448
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
M. Perepletchikov and
C. Ryan A Controlled Experiment for Evaluating
the Impact of Coupling on the
Maintainability of Service-Oriented
Software . . . . . . . . . . . . . . . . 449--465
M. Ying and
Y. Feng A Flowchart Language for Quantum
Programming . . . . . . . . . . . . . . 466--485
L. Mariani and
F. Pastore and
M. Pezze Dynamic Analysis for Diagnosing
Integration Faults . . . . . . . . . . . 486--508
N. Salleh and
E. Mendes and
J. Grundy Empirical Studies of Pair Programming
for CS/SE Teaching in Higher Education:
A Systematic Literature Review . . . . . 509--525
A. Bergel and
W. Harrison and
V. Cahill and
S. Clarke FlowTalk: Language Support for
Long-Latency Operations in Embedded
Devices . . . . . . . . . . . . . . . . 526--543
X. Amatriain and
P. Arumi Frameworks Generate Domain-Specific
Languages: A Case Study in the
Multimedia Domain . . . . . . . . . . . 544--558
X. Yuan and
M. B. Cohen and
A. M. Memon GUI Interaction Testing: Incorporating
Event Context . . . . . . . . . . . . . 559--574
L. Burgy and
L. Reveillere and
J. Lawall and
G. Muller Zebu: A Language-Based Approach for
Network Protocol Message Processing . . 575--591
Anonymous Distinguish yourself with the CSDP
[advertisement] . . . . . . . . . . . . 592--592
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
I. Crnkovic and
S. Sentilles and
A. Vulgarakis and
M. R. V. Chaudron A Classification Framework for Software
Component Models . . . . . . . . . . . . 593--615
X. Feng and
D. L. Parnas and
T. H. Tse and
T. O'Callaghan A Comparison of Tabular Expression-Based
Testing Strategies . . . . . . . . . . . 616--634
T. W. Kwan and
H. K. N. Leung A Risk Management Methodology for
Project Risk Dependencies . . . . . . . 635--648
Y. Jia and
M. Harman An Analysis and Survey of the
Development of Mutation Testing . . . . 649--678
H. Chen and
J. Yu and
C. Hang and
B. Zang and
P. C. Yew Dynamic Software Updating Using a
Relaxed Consistency Model . . . . . . . 679--694
M. Jorgensen and
S. Grimstad The Impact of Irrelevant and Misleading
Information on Software Development
Effort Estimates: A Randomized
Controlled Field Experiment . . . . . . 695--707
P. Bishop and
R. Bloomfield and
B. Littlewood and
A. Povyakalo and
D. Wright Toward a Formalism for Conservative
Claims about the Dependability of
Software-Based Systems . . . . . . . . . 708--717
D. Krishnamurthy and
J. Rolia and
M. Xu WAM --- The Weighted Average Method for
Predicting the Performance of Systems
with Bursts of Customer Sessions . . . . 718--735
Anonymous IEEE Computer Society Magazines and
Transactions available in ePUB format
[advertisement] . . . . . . . . . . . . 736--736
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. T. Lallchandani and
R. Mall A Dynamic Slicing Technique for UML
Architectural Models . . . . . . . . . . 737--771
Y. Shin and
A. Meneely and
L. Williams and
J. A. Osborne Evaluating Complexity, Code Churn, and
Developer Activity Metrics as Indicators
of Software Vulnerabilities . . . . . . 772--787
J. Al Dallal Measuring the Discriminative Power of
Object-Oriented Class Cohesion Metrics 788--804
X. Liu and
Y. Yang and
Y. Jiang and
J. Chen Preventing Temporal Violations in
Scientific Workflows: Where and How . . 805--825
L. Carnevali and
L. Ridi and
E. Vicario Putting Preemptive Time Petri Nets to
Work in a V-Model SW Life Cycle . . . . 826--844
G. J. Holzmann and
R. Joshi and
A. Groce Swarm Verification Techniques . . . . . 845--857
L. Pauleve and
M. Magnin and
O. Roux Tuning Temporal Features within the
Stochastic $ \pi $-Calculus . . . . . . 858--871
G. Concas and
M. Marchesi and
A. Murgia and
R. Tonelli and
I. Turnu On the Distribution of Bugs in the
Eclipse System . . . . . . . . . . . . . 872--877
Anonymous IEEE Computer Society Magazines and
Transactions available in ePUB format
[advertisement] . . . . . . . . . . . . 878--878
Anonymous New Transactions Issue Alerts . . . . . 879--879
Anonymous What's new in Transactions
[advertisement] . . . . . . . . . . . . 880--880
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside back cover] . . . . . . . . . . c3--c3
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
B. Nuseibeh State of the Journal . . . . . . . . . . 1--2
J. M. Atlee and
P. Inverardi Guest Editor's Introduction:
International Conference on Software
Engineering . . . . . . . . . . . . . . 3--4
E. Murphy-Hill and
C. Parnin and
A. P. Black How We Refactor, and How We Know It . . 5--18
C. Treude and
M. A. Storey Work Item Tagging: Communicating
Concerns in Collaborative Software
Development . . . . . . . . . . . . . . 19--34
A. Mesbah and
A. van Deursen and
D. Roest Invariant-Based Automatic Testing of
Modern Web Applications . . . . . . . . 35--53
C. Le Goues and
T. Nguyen and
S. Forrest and
W. Weimer GenProg: A Generic Method for Automatic
Software Repair . . . . . . . . . . . . 54--72
S. Malek and
N. Medvidovic and
M. Mikic-Rakic An Extensible Framework for Improving a
Distributed Software System's Deployment
Architecture . . . . . . . . . . . . . . 73--100
R. Toledo and
A. Nunez and
E. Tanter and
J. Noye Aspectizing Java Access Control . . . . 101--117
M. Mortensen and
S. Ghosh and
J. Bieman Aspect-Oriented Refactoring of Legacy
Applications: An Evaluation . . . . . . 118--140
G. de Caso and
V. Braberman and
D. Garbervetsky and
S. Uchitel Automated Abstractions for Contract
Validation . . . . . . . . . . . . . . . 141--162
U. Raja and
M. J. Tretter Defining and Evaluating a Measure of
Open Source Project Survivability . . . 163--174
C. Le Goues and
W. Weimer Measuring Code Quality to Improve
Specification Mining . . . . . . . . . . 175--190
P. C. Van Oorschot and
G. Wurster Reducing Unauthorized Modification of
Digital Objects . . . . . . . . . . . . 191--204
M. Tribastone and
S. Gilmore and
J. Hillston Scalable Differential Analysis of
Process Algebra Models . . . . . . . . . 205--219
H. Liu and
Z. Ma and
W. Shao and
Z. Niu Schedule of Bad Smell Detection and
Resolution: A New Way to Save Effort . . 220--235
Anonymous 2011 Reviewers List . . . . . . . . . . 236--238
Anonymous Introduction to OnlinePlus Video
[advertisement] . . . . . . . . . . . . 239--239
Anonymous What's new in Transactions
[advertisement] . . . . . . . . . . . . 240--240
Anonymous 2011 Annual Index . . . . . . . . . . . Online Only
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Cover3] . . . . . . . . . . . . . . . . c3--c3
Anonymous [Front inside cover] . . . . . . . . . . c2--c2
Anonymous Table of Contents [Front cover] . . . . c1--c1
A. Orso and
P. Tonella Guest Editorial: Special Section on the
International Symposium on Software
Testing and Analysis 2010 . . . . . . . 241--242
V. Dallmeier and
N. Knopp and
C. Mallon and
G. Fraser and
S. Hack and
A. Zeller Automatically Generating Test Cases for
Specification Mining . . . . . . . . . . 243--257
A. Arcuri and
M. Z. Iqbal and
L. Briand Random Testing: Theoretical Results and
Practical Implications . . . . . . . . . 258--277
G. Fraser and
A. Zeller Mutation-Driven Generation of Unit Tests
and Oracles . . . . . . . . . . . . . . 278--292
T. Kwon and
Z. Su Automatic Detection of Unsafe Dynamic
Component Loadings . . . . . . . . . . . 293--313
S. Artzi and
J. Dolby and
F. Tip and
M. Pistoia Fault Localization for Dynamic Web
Applications . . . . . . . . . . . . . . 314--335
A. Sen and
K. Ramamurthy and
A. P. Sinha A Model of Data Warehousing Process
Maturity . . . . . . . . . . . . . . . . 336--353
M. Shousha and
L. Briand and
Y. Labiche A UML/MARTE Model Analysis Method for
Uncovering Scenarios Leading to
Starvation and Deadlocks in Concurrent
Systems . . . . . . . . . . . . . . . . 354--374
K. Dejaeger and
W. Verbeke and
D. Martens and
B. Baesens Data Mining Techniques for Software
Effort Estimation: A Comparative Study 375--397
M. Unterkalmsteiner and
T. Gorschek and
A. K. M. M. Islam and
C. K. Cheng and
R. B. Permadi and
R. Feldt Evaluation and Measurement of Software
Process Improvement --- a Systematic
Literature Review . . . . . . . . . . . 398--424
E. Kocaguneli and
T. Menzies and
A. Bener and
J. W. Keung Exploiting the Essential Assumptions of
Analogy-Based Effort Estimation . . . . 425--438
J. L. Salmeron and
C. Lopez Forecasting Risk Impact on ERP
Maintenance with Augmented Fuzzy
Cognitive Maps . . . . . . . . . . . . . 439--452
P. McMinn and
M. Harman and
K. Lakhotia and
Y. Hassoun and
J. Wegener Input Domain Reduction through
Irrelevant Variable Removal and Its
Effect on Local, Global, and Hybrid
Search-Based Structural Test Data
Generation . . . . . . . . . . . . . . . 453--477
F. A. Schreiber and
R. Camplani and
M. Fortunato and
M. Marelli and
G. Rota PerLa: A Language and Middleware
Architecture for Data Management and
Integration in Pervasive Information
Systems . . . . . . . . . . . . . . . . 478--496
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Cover2] . . . . . . . . . . . . . . . . c2--c2
Anonymous [Inside back cover] . . . . . . . . . . c3--c3
Anonymous Table of Contents [Front cover] . . . . c1--c1
A. Arcuri A Theoretical and Empirical Analysis of
the Role of Test Sequence Length in
Software Testing for Structural Coverage 497--519
F. Cuadrado and
J. C. Duenas and
R. Garcia-Carmona An Autonomous Engine for Services
Configuration and Deployment . . . . . . 520--536
J. Brickey and
S. Walczak and
T. Burgess Comparing Semi-Automated Clustering
Methods for Persona Development . . . . 537--546
J. W. Wilkerson and
J. F. Nunamaker and
R. Mercer Comparing the Defect Reduction Benefits
of Code Inspection and Test-Driven
Development . . . . . . . . . . . . . . 547--560
A. Kalbasi and
D. Krishnamurthy and
J. Rolia and
S. Dawson DEC: Service Demand Estimation with
Confidence . . . . . . . . . . . . . . . 561--578
D. Rothlisberger and
M. Harry and
W. Binder and
P. Moret and
D. Ansaloni and
A. Villazon and
O. Nierstrasz Exploiting Dynamic Information in IDEs
Improves Speed and Correctness of
Software Maintenance Tasks . . . . . . . 579--591
I. Di Pietro and
F. Pagliarecci and
L. Spalazzi Model Checking Semantically Annotated
Services . . . . . . . . . . . . . . . . 592--608
V. Andrikopoulos and
S. Benbernou and
M. P. Papazoglou On the Evolution of Services . . . . . . 609--628
R. M. Hierons Oracles for Distributed Testing . . . . 629--641
R. Khatchadourian and
P. Greenwood and
A. Rashid and
G. Xu Pointcut Rejuvenation: Recovering
Pointcut Expressions in Evolving
Aspect-Oriented Software . . . . . . . . 642--657
W. Li QoS Assurance for Dynamic
Reconfiguration of Component-Based
Software Systems . . . . . . . . . . . . 658--676
M. Jorgensen and
S. Grimstad Software Development Estimation Biases:
The Role of Interdependence . . . . . . 677--693
A. Lienhard and
T. Girba and
O. Nierstrasz Specifying Dynamic Analyses by Extending
Language Semantics . . . . . . . . . . . 694--706
S. L. Lim and
A. Finkelstein StakeRare: Using Social Networks and
Collaborative Filtering for Large-Scale
Requirements Elicitation . . . . . . . . 707--735
Anonymous IEEE Computer Society OnlinePlus Coming
Soon to TSE . . . . . . . . . . . . . . 736--736
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Inside back cover] . . . . . . . . . . c3--c3
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous Table of Contents [Front cover] . . . . c1--c1
M. T. Valente and
V. Borges and
L. Passos A Semi-Automatic Approach for Extracting
Software Product Lines . . . . . . . . . 737--754
R. Mateescu and
P. Poizat and
G. Salaün Adaptation of Service Protocols Using
Process Algebra and On-the-Fly Reduction
Techniques . . . . . . . . . . . . . . . 755--777
G. Casale and
A. Kalbasi and
D. Krishnamurthy and
J. Rolia BURN: Enabling Workload Burstiness in
Customized Service Benchmarks . . . . . 778--793
T. Y. Chen and
P. L. Poon and
S. F. Tang and
T. H. Tse DESSERT: a DividE-and-conquer
methodology for identifying categorieS,
choiceS, and choicE Relations for Test
case generation . . . . . . . . . . . . 794--809
D. E. Harter and
C. F. Kemerer and
S. A. Slaughter Does Software Process Improvement Reduce
the Severity of Defects? A Longitudinal
Field Study . . . . . . . . . . . . . . 810--827
O. Moser and
F. Rosenberg and
S. Dustdar Domain-Specific Service Selection for
Composite Services . . . . . . . . . . . 828--843
S. Lu and
S. Park and
Y. Zhou Finding Atomicity-Violation Bugs through
Unserializable Interleaving Testing . . 844--860
M. Tribastone and
J. Ding and
S. Gilmore and
J. Hillston Fluid Rewards for a Stochastic Process
Algebra . . . . . . . . . . . . . . . . 861--874
G. Parmer and
R. West Mutable Protection Domains: Adapting
System Fault Isolation for Reliability
and Efficiency . . . . . . . . . . . . . 875--888
A. Sarma and
D. F. Redmiles and
A. van der Hoek Palantir: Early Detection of Development
Conflicts Arising from Parallel Code
Changes . . . . . . . . . . . . . . . . 889--908
P. Liu and
C. Zhang Pert: The Application-Aware Tailoring of
Java Object Persistence . . . . . . . . 909--922
R. Berntsson Svensson and
T. Gorschek and
B. Regnell and
R. Torkar and
A. Shahrokni and
R. Feldt Quality Requirements in Industrial
Practice --- an Extended Interview Study
at Eleven Companies . . . . . . . . . . 923--935
S. Mirarab and
S. Akhlaghi and
L. Tahvildari Size-Constrained Regression Test Case
Selection Using Multicriteria
Optimization . . . . . . . . . . . . . . 936--956
L. Cordeiro and
B. Fischer and
J. Marques-Silva SMT-Based Bounded Model Checking for
Embedded ANSI-C Software . . . . . . . . 957--974
A. Coronato and
G. De Pietro Tools for the Rapid Prototyping of
Provably Correct Ambient Intelligence
Applications . . . . . . . . . . . . . . 975--991
Anonymous New Transactions Newsletter
[advertisement] . . . . . . . . . . . . 992--992
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Inside back cover] . . . . . . . . . . c3--c3
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous Table of Contents [Front cover] . . . . c1--c1
K. Lind and
R. Heldal A Practical Approach to Size Estimation
of Embedded Software Components . . . . 993--1007
H. A. Nguyen and
T. T. Nguyen and
N. H. Pham and
J. Al-Kofahi and
T. N. Nguyen Clone Management for Evolving Software 1008--1026
F. Zickert and
R. Beck Coping with Existing Systems in
Information Systems Development . . . . 1027--1039
G. Casale and
N. Mi and
L. Cherkasova and
E. Smirni Dealing with Burstiness in Multi-Tier
Applications: Models and Their
Parameterization . . . . . . . . . . . . 1040--1053
N. Ramasubbu and
C. F. Kemerer and
J. Hong Structural Complexity and Programmer
Team Strategy: An Experimental Test . . 1054--1068
C. McMillan and
M. Grechanik and
D. Poshyvanyk and
C. Fu and
Q. Xie Exemplar: A Source Code Search Engine
for Finding Highly Relevant Applications 1069--1087
A. Arcuri and
L. Briand Formal Analysis of the Probability of
Interaction Fault Detection Using Random
Testing . . . . . . . . . . . . . . . . 1088--1099
S. Liu and
Y. Chen and
F. Nagoya and
J. A. McDermid Formal Specification-Based Inspection
for Verification of Programs . . . . . . 1100--1122
C. Zhang and
H. A. Jacobsen Mining Crosscutting Concerns through
Random Walks . . . . . . . . . . . . . . 1123--1137
V. Cardellini and
E. Casalicchio and
V. Grassi and
S. Iannucci and
F. L. Presti and
R. Mirandola MOSES: A Framework for QoS Driven
Runtime Adaptation of Service-Oriented
Systems . . . . . . . . . . . . . . . . 1138--1159
W. N. Sumner and
Y. Zheng and
D. Weeratunge and
X. Zhang Precise Calling Context Encoding . . . . 1160--1177
B. Littlewood and
J. Rushby Reasoning about the Reliability of
Diverse Two-Channel Systems in Which One
Channel Is ``Possibly Perfect'' . . . . 1178--1194
J. Xuan and
H. Jiang and
Z. Ren and
Z. Luo Solving the Large Scale Next Release
Problem with a Backbone-Based Multilevel
Algorithm . . . . . . . . . . . . . . . 1195--1212
C. Zhang and
D. Budgen What Do We Know about the Effectiveness
of Software Design Patterns? . . . . . . 1213--1231
Anonymous IEEE Open Access Publishing
[advertisement] . . . . . . . . . . . . 1232--1232
Anonymous IEEE Computer Society [Back cover] . . . c4--c4
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous Table of Contents [Front cover] . . . . c1--c1
Anonymous TSE information for authors [inside back
cover] . . . . . . . . . . . . . . . . . c3--c3
M. Schäfer and
A. Thies and
F. Steimann and
F. Tip A Comprehensive Approach to Naming and
Accessibility in Refactoring Java
Programs . . . . . . . . . . . . . . . . 1233--1257
H. Mei and
D. Hao and
L. Zhang and
L. Zhang and
J. Zhou and
G. Rothermel A Static Approach to Prioritizing JUnit
Test Cases . . . . . . . . . . . . . . . 1258--1275
T. Hall and
S. Beecham and
D. Bowes and
D. Gray and
S. Counsell A Systematic Literature Review on Fault
Prediction Performance in Software
Engineering . . . . . . . . . . . . . . 1276--1304
L. Búrdalo and
A. Terrasa and
A. Espinosa and
A. García-Fornes Analyzing the Effect of Gain Time on
Soft-Task Scheduling Policies in
Real-Time Systems . . . . . . . . . . . 1305--1318
F. Brosch and
H. Koziolek and
B. Buhnova and
R. Reussner Architecture-Based Reliability
Prediction with the Palladio Component
Model . . . . . . . . . . . . . . . . . 1319--1339
C. M. Hayden and
E. K. Smith and
E. A. Hardisty and
M. Hicks and
J. S. Foster Evaluating Dynamic Software Update
Safety Using Systematic Testing . . . . 1340--1354
S. Nejati and
M. Sabetzadeh and
M. Chechik and
S. Easterbrook and
P. Zave Matching and Merging of Variant Feature
Specifications . . . . . . . . . . . . . 1355--1375
N. I. Altintas and
S. Cetin and
A. H. Dogru and
H. Oguztuzun Modeling Product Line Software Assets
Using Domain-Specific Kits . . . . . . . 1376--1402
E. Kocaguneli and
T. Menzies and
J. W. Keung On the Value of Ensemble Effort
Estimation . . . . . . . . . . . . . . . 1403--1416
E. Murphy-Hill and
A. P. Black Programmer-Friendly Refactoring Errors 1417--1431
M. M. Geipel and
F. Schweitzer The Link between Dependency and
Cochange: Empirical Evidence . . . . . . 1432--1444
D. Cassou and
J. Bruneau and
C. Consel and
E. Balland Toward a Tool-Based Development
Methodology for Pervasive Computing
Applications . . . . . . . . . . . . . . 1445--1463
A. Heydarnoori and
K. Czarnecki and
W. Binder and
T. T. Bartolomei Two Studies of Framework-Usage Templates
Extracted from Dynamic Traces . . . . . 1464--1487
Anonymous OnlinePlus Coming Soon to TSE
[advertisement] . . . . . . . . . . . . 1488--1488
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Back inside cover] . . . . . . . . . . c3--c3
Anonymous [Front inside cover] . . . . . . . . . . c2--c2
Anonymous [Table of contents --- Front cover] . . c1--c1
W. N. Chen and
J. Zhang Ant Colony Optimization for Software
Project Scheduling and Staffing with an
Event-Based Scheduler . . . . . . . . . 1--17
D. Falessi and
G. Cantone and
G. Canfora Empirical Principles and an Industrial
Case Study in Retrieving Equivalent
Requirements via Natural Language
Processing Techniques . . . . . . . . . 18--44
M. Kim and
D. Notkin and
D. Grossman and
G. Wilson Identifying and Summarizing Systematic
Code Changes via Rule Inference . . . . 45--62
S. Apel and
C. Kästner and
C. Lengauer Language-Independent and Automated
Software Composition: The FeatureHouse
Experience . . . . . . . . . . . . . . . 63--79
R. Natella and
D. Cotroneo and
J. A. Duraes and
H. S. Madeira On Fault Representativeness of Software
Fault Injection . . . . . . . . . . . . 80--96
R. A. Hayden and
J. T. Bradley and
A. Clark Performance Specification and Evaluation
with Unified Stochastic Probes and Fluid
Analysis . . . . . . . . . . . . . . . . 97--118
L. Duboc and
E. Letier and
D. S. Rosenblum Systematic Elaboration of Scalability
Requirements through Goal-Obstacle
Analysis . . . . . . . . . . . . . . . . 119--140
Anonymous 2012 Reviewers List . . . . . . . . . . 141--144
Anonymous 2012 Annual Index . . . . . . . . . . . Not in print--Not in print
B. Nuseibeh Editorial: State of the Journal . . . . 145--146
G. Soares and
R. Gheyi and
T. Massoni Automated Behavioral Testing of
Refactoring Engines . . . . . . . . . . 147--162
A. Shahbazi and
A. F. Tappenden and
J. Miller Centroidal Voronoi Tessellations --- a
New Approach to Random Testing . . . . . 163--183
M. Piccioni and
M. Oriol and
B. Meyer Class Schema Evolution for Persistent
Object-Oriented Software: Model,
Empirical Study, and Automated Support 184--196
J. Lawrance and
C. Bogart and
M. Burnett and
R. Bellamy and
K. Rector and
S. D. Fleming How Programmers Debug, Revisited: An
Information Foraging Theory Perspective 197--215
S. Leue and
W. Wei Integer Linear Programming-Based
Property Checking for Asynchronous
Reactive Systems . . . . . . . . . . . . 216--236
K. Dejaeger and
T. Verbraken and
B. Baesens Toward Comprehensible Software Fault
Prediction Models Using Bayesian Network
Classifiers . . . . . . . . . . . . . . 237--257
S. e. Z. Haidry and
T. Miller Using Dependency Structures for
Prioritization of Functional Test Suites 258--275
G. Fraser and
A. Arcuri Whole Test Suite Generation . . . . . . 276--291
L. Carnevali and
L. Ridi and
E. Vicario A Quantitative Approach to Input
Generation in Real-Time Testing of
Stochastic Systems . . . . . . . . . . . 292--304
J. N. Oliveira and
M. A. Ferreira Alloy Meets the Algebra of Programming:
A Case Study . . . . . . . . . . . . . . 305--326
S. Abrahão and
C. Gravino and
E. Insfran and
G. Scanniello and
G. Tortora Assessing the Effectiveness of Sequence
Diagrams in the Comprehension of
Functional Requirements: Results from a
Family of Five Experiments . . . . . . . 327--342
M. Cataldo and
J. D. Herbsleb Coordination Breakdowns and Their Impact
on Development Productivity and Software
Failures . . . . . . . . . . . . . . . . 343--360
D. Alrajeh and
J. Kramer and
A. Russo and
S. Uchitel Elaborating Requirements Using Model
Checking and Inductive Learning . . . . 361--383
M. S. Raunak and
L. J. Osterweil Resource Management for Complex, Dynamic
Environments . . . . . . . . . . . . . . 384--402
L. Rosa and
L. Rodrigues and
A. Lopes and
M. Hiltunen and
R. Schlichting Self-Management of Adaptable
Component-Based Applications . . . . . . 403--421
R. Hoda and
J. Noble and
S. Marshall Self-Organizing Roles on Agile Software
Development Teams . . . . . . . . . . . 422--444
A. Perini and
A. Susi and
P. Avesani A Machine Learning Approach to Software
Requirements Prioritization . . . . . . 445--461
T. Galinac Grbac and
P. Runeson and
D. Huljeni\'c A Second Replicated Quantitative
Analysis of Fault Distributions in
Complex Software Systems . . . . . . . . 462--476
S. Ikeda and
M. Jibiki and
Y. Kuno Coverage Estimation in Model Checking
with Bitstate Hashing . . . . . . . . . 477--486
J. C. Grundy and
J. Hosking and
K. N. Li and
N. M. Ali and
J. Huh and
R. L. Li Generating Domain-Specific Visual
Language Tools from Abstract Visual
Specifications . . . . . . . . . . . . . 487--515
X. Wang and
L. Zhang and
T. Xie and
H. Mei and
J. Sun Locating Need-to-Externalize Constant
Strings for Software
Internationalization with Generalized
String-Taint Analysis . . . . . . . . . 516--536
N. Mittas and
L. Angelis Ranking and Clustering Software Cost
Estimation Models through a Multiple
Comparisons Algorithm . . . . . . . . . 537--551
S. Shivaji and
E. James Whitehead and
R. Akella and
S. Kim Reducing Features to Improve Code
Change-Based Bug Prediction . . . . . . 552--569
P. Reales Mateo and
M. Polo Usaola and
J. L. Fernández Alemán Validating Second-Order Mutation at
System Level . . . . . . . . . . . . . . 570--587
B. Nuseibeh Editorial [new associate editors] . . . 588--590
V. Nallur and
R. Bahsoon A decentralized self-adaptation
mechanism for service-based applications
in the cloud . . . . . . . . . . . . . . 591--612
M. P. Robillard and
E. Bodden and
D. Kawrykow and
M. Mezini and
T. Ratchford Automated API Property Inference
Techniques . . . . . . . . . . . . . . . 613--637
L. Carnevali and
A. Pinzuti and
E. Vicario Compositional Verification for
Hierarchical Scheduling of Real-Time
Systems . . . . . . . . . . . . . . . . 638--657
A. Aleti and
B. Buhnova and
L. Grunske and
A. Koziolek and
I. Meedeniya Software Architecture Optimization
Methods: A Systematic Literature Review 658--683
Cemal Yilmaz Test Case-Aware Combinatorial
Interaction Testing . . . . . . . . . . 684--706
J. Itkonen and
M. V. Mäntylä and
C. Lassenius The Role of the Tester's Knowledge in
Exploratory Software Testing . . . . . . 707--724
N. Ali and
Y. G. Guéhéneuc and
G. Antoniol Trustrace: Mining Software Repositories
to Improve the Accuracy of Requirement
Traceability Links . . . . . . . . . . . 725--741
B. Nuseibeh In Memoriam --- David Notkin
(1953--2013) . . . . . . . . . . . . . . 742--743
M. Tribastone A fluid model for layered queueing
networks . . . . . . . . . . . . . . . . 744--756
Y. Kamei and
E. Shihab and
B. Adams and
A. E. Hassan and
A. Mockus and
A. Sinha and
N. Ubayashi A large-scale empirical study of
just-in-time quality assurance . . . . . 757--773
M. Marron and
C. Sanchez and
Z. Su and
M. Fahndrich Abstracting runtime heaps for program
understanding . . . . . . . . . . . . . 774--786
R. Baker and
I. Habli An Empirical Evaluation of Mutation
Testing for Improving the Test Quality
of Safety-Critical Software . . . . . . 787--805
M. Cinque and
D. Cotroneo and
A. Pecchia Event Logs for the Analysis of Software
Failures: A Rule-Based Approach . . . . 806--821
T. Menzies and
A. Butcher and
D. Cok and
A. Marcus and
L. Layman and
F. Shull and
B. Turhan and
T. Zimmermann Local versus Global Lessons for Defect
Prediction and Effort Estimation . . . . 822--834
Y. Rafique and
V. B. Mi\vsi\'c The Effects of Test-Driven Development
on External Quality and Productivity: A
Meta-Analysis . . . . . . . . . . . . . 835--856
G. Rodriguez-Navas and
J. Proenza Using Timed Automata for Modeling
Distributed Systems with Clocks:
Challenges and Solutions . . . . . . . . 857--868
I. Malavolta and
P. Lago and
H. Muccini and
P. Pelliccione and
A. Tang What Industry Needs from Architectural
Languages: A Survey . . . . . . . . . . 869--891
K. Androutsopoulos and
D. Clark and
M. Harman and
R. M. Hierons and
Z. Li and
L. Tratt Amorphous Slicing of Extended Finite
State Machines . . . . . . . . . . . . . 892--909
J. Lee and
I. Shin EDZL Schedulability Analysis in
Real-Time Multicore Scheduling . . . . . 910--916
J. Brandt and
M. Gemünde and
K. Schneider and
S. K. Shukla and
J. P. Talpin Embedding Polychrony into Synchrony . . 917--929
E. di Bella and
I. Fronza and
N. Phaphoom and
A. Sillitti and
G. Succi and
J. Vlasenko Pair Programming and Software Defects
--- a Large, Industrial Case Study . . . 930--953
A. Zisman and
G. Spanoudakis and
J. Dooley and
I. Siveroni Proactive and Reactive Runtime Service
Discovery: A Framework and Its
Evaluation . . . . . . . . . . . . . . . 954--974
G. E. Sibay and
V. Braberman and
S. Uchitel and
J. Kramer Synthesizing Modal Transition Systems
from Triggered Scenarios . . . . . . . . 975--1001
B. Kitchenham and
D. I. K. Sjòberg and
T. Dybå and
O. P. Brereton and
D. Budgen and
M. Höst and
P. Runeson Trends in the Quality of Human-Centric
Software Engineering Experiments --- a
Quasi-Experiment . . . . . . . . . . . . 1002--1017
Y. Liu and
W. Chen and
Y. A. Liu and
J. Sun and
S. J. Zhang and
J. S. Dong Verifying Linearizability via Optimized
Refinement Checking . . . . . . . . . . 1018--1039
E. Kocaguneli and
T. Menzies and
J. Keung and
D. Cok and
R. Madachy Active learning and effort estimation:
Finding the essential content of
software effort estimation data . . . . 1040--1053
F. Peters and
T. Menzies and
L. Gong and
H. Zhang Balancing Privacy and Utility in
Cross-Company Defect Prediction . . . . 1054--1068
A. Classen and
M. Cordy and
P. Y. Schobbens and
P. Heymans and
A. Legay and
J. F. Raskin Featured Transition Systems: Foundations
for Verifying Variability-Intensive
Systems and Their Application to LTL
Model Checking . . . . . . . . . . . . . 1069--1089
S. Kpodjedo and
F. Ricca and
P. Galinier and
G. Antoniol and
Y. G. Guéhéneuc MADMatch: Many-to-Many Approximate
Diagram Matching for Design Comparison 1090--1111
H. Liu and
X. Guo and
W. Shao Monitor-Based Instant Software
Refactoring . . . . . . . . . . . . . . 1112--1126
M. Pradel and
T. R. Gross Name-Based Analysis of Equally Typed
Method Arguments . . . . . . . . . . . . 1127--1143
D. I. K. Sjòberg and
A. Yamashita and
B. C. D. Anda and
A. Mockus and
T. Dybå Quantifying the Effect of Code Smells on
Maintenance Effort . . . . . . . . . . . 1144--1156
N. Janevski and
K. Goseva-Popstojanova Session Reliability of Web Systems under
Heavy-Tailed Workloads: An Approach
Based on Design and Analysis of
Experiments . . . . . . . . . . . . . . 1157--1178
N. Torrado and
M. P. Wiper and
R. E. Lillo Software Reliability Modeling with
Software Metrics Data via Gaussian
Processes . . . . . . . . . . . . . . . 1179--1186
B. Nuseibeh Editorial . . . . . . . . . . . . . . . 1187--1189
D. Milicev and
Z. Mijailovic Capsule-Based User Interface Modeling
for Large-Scale Applications . . . . . . 1190--1207
M. Shepperd and
Q. Song and
Z. Sun and
C. Mair Data Quality: Some Comments on the NASA
Software Defect Datasets . . . . . . . . 1208--1215
W. L. Andrade and
P. D. L. Machado Generating Test Cases for Real-Time
Systems Based on Symbolic Models . . . . 1216--1229
L. Padgham and
Z. Zhang and
J. Thangarajah and
T. Miller Model-Based Test Oracle Generation for
Automated Unit Testing of Agent Systems 1230--1244
H. C. Jiau and
L. W. Mar and
J. C. Chen OBEY: Optimal Batched Refactoring Plan
Execution for Class Responsibility
Redistribution . . . . . . . . . . . . . 1245--1263
W. Maalej and
M. P. Robillard Patterns of Knowledge in API Reference
Documentation . . . . . . . . . . . . . 1264--1282
J. P. Galeotti and
N. Rosner and
C. G. López Pombo and
M. F. Frias TACO: Efficient SAT-Based Bounded
Verification Using Symmetry Breaking and
Tight Bounds . . . . . . . . . . . . . . 1283--1307
Y. Moffett and
J. Dingel and
A. Beaulieu Verifying Protocol Conformance Using
Software Model Checking for the
Model-Driven Development of Embedded
Systems . . . . . . . . . . . . . . . . 1307--13256
S. Sampath and
R. Bryce and
A. M. Memon A Uniform Representation of Hybrid
Criteria for Regression Testing . . . . 1326--1344
A. Monden and
T. Hayashi and
S. Shinoda and
K. Shirai and
J. Yoshida and
M. Barker and
K. Matsumoto Assessing the Cost Effectiveness of
Fault Prediction in Acceptance Testing 1345--1357
Y. Brun and
R. Holmes and
M. D. Ernst and
D. Notkin Early Detection of Collaboration
Conflicts and Risks . . . . . . . . . . 1358--1375
S. Ali and
M. Zohaib Iqbal and
A. Arcuri and
L. C. Briand Generating Test Data from OCL
Constraints with Search Techniques . . . 1376--1402
D. Basin and
M. Harvan and
F. Klaedtke and
E. Zalinescu Monitoring Data Usage in Distributed
Systems . . . . . . . . . . . . . . . . 1403--1426
S. W. Thomas and
M. Nagappan and
D. Blostein and
A. E. Hassan The Impact of Classifier Configuration
and Classifier Combination on Bug
Localization . . . . . . . . . . . . . . 1427--1443
C. Ye and
H. A. Jacobsen Whitening SOA Testing via Event Exposure 1444--1465
B. Nuseibeh In Memoriam: Mary Jean Harrold
(1947--2013) . . . . . . . . . . . . . . 1466--1466
N. Esfahani and
A. Elkhodary and
S. Malek A Learning-Based Framework for
Engineering Feature-Oriented
Self-Adaptive Software Systems . . . . . 1467--1493
N. M. Ali and
J. Hosking and
J. Grundy A Taxonomy and Mapping of Computer-Based
Critiquing Tools . . . . . . . . . . . . 1494--1520
B. Littlewood and
A. Povyakalo Conservative Reasoning about the
Probability of Failure on Demand of a
1-out-of-2 Software-Based System in
Which One Channel Is ``Possibly
Perfect'' . . . . . . . . . . . . . . . 1521--1530
A. Reder and
A. Egyed Determining the Cause of a Design Model
Inconsistency . . . . . . . . . . . . . 1531--1548
H. Y. Chen and
T. H. Tse Equality to Equals and Unequals: A
Revisit of the Equivalence and
Nonequivalence Criteria in Class-Level
Testing of Object-Oriented Software . . 1549--1563
S. Kailasam and
N. Gnanasambandam and
J. Dharanipragada and
N. Sharma Optimizing Ordered Throughput Using
Autonomic Cloud Bursting Schedulers . . 1564--1581
L. Carvajal and
A. M. Moreno and
M. I. Sánchez-Segura and
A. Seffah Usability through Software Design . . . 1582--1596
D. Kim and
Y. Tao and
S. Kim and
A. Zeller Where Should We Fix This Bug? A
Two-Phase Recommendation Model . . . . . 1597--1610
T. Berger and
S. She and
R. Lotufo and
A. Wasowski and
K. Czarnecki A Study of Variability Models and
Languages in the Systems Software Domain 1611--1640
B. Littlewood and
A. Povyakalo Conservative Bounds for the pfd of a
1-out-of-2 Software-Based System Based
on an Assessor's Subjective Probability
of ``Not Worse Than Independence'' . . . 1641--1653
K. T. Stolee and
S. Elbaum Identification, Impact, and Refactoring
of Smells in Pipe-Like Web Mashups . . . 1654--1679
J. Maras and
M. Stula and
J. Carlson and
I. Crnkovic Identifying Code of Individual Features
in Client-Side Web Applications . . . . 1680--1697
T. Menzies and
A. Brady and
J. Keung and
J. Hihn and
S. Williams and
O. El-Rawas and
P. Green and
B. Boehm Learning Project Management Decisions: A
Case Study with Case-Based Reasoning
versus Data Farming . . . . . . . . . . 1698--1713
D. Cooray and
E. Kouroshfar and
S. Malek and
R. Roshandel Proactive Self-Adaptation for Improving
the Reliability of Mission-Critical,
Embedded, and Mobile Software . . . . . 1714--1735
N. Hariri and
C. Castro-Herrera and
M. Mirakhorli and
J. Cleland-Huang and
B. Mobasher Supporting Domain Analysis through
Mining and Recommending Features from
Online Product Listings . . . . . . . . 1736--1752
G. Lee and
J. A. Espinosa and
W. H. DeLone Task Environment Complexity, Global Team
Dispersion, Process Capabilities, and
Coordination in Software Development . . 1753--1771
B. Nuseibeh Signing Off: The State of the Journal 1--3
H. Liu and
F. C. Kuo and
D. Towey and
T. Y. Chen How Effectively Does Metamorphic Testing
Alleviate the Oracle Problem? . . . . . 4--22
L. Madeyski and
W. Orzeszyna and
R. Torkar and
M. Józala Overcoming the Equivalent Mutant
Problem: A Systematic Literature Review
and a Comparative Experiment of Second
Order Mutation . . . . . . . . . . . . . 23--42
C. Yilmaz and
E. Dumlu and
M. B. Cohen and
A. Porter Reducing Masking Effects in
Combinatorial Interaction Testing: A
Feedback Driven Adaptive Approach . . . 43--66
C. Kästner and
A. Dreiling and
K. Ostermann Variability Mining: Consistent
Semi-automatic Detection of Product-Line
Features . . . . . . . . . . . . . . . . 67--82
L. L. Minku and
D. Sudholt and
X. Yao Improved Evolutionary Algorithm Design
for the Project Scheduling Problem Based
on Runtime Analysis . . . . . . . . . . 83--102
Anonymous 2013 Reviewers List . . . . . . . . . . 103--106
Y. Sui and
D. Ye and
J. Xue Detecting Memory Leaks Statically with
Full-Sparse Value-Flow Analysis . . . . 107--122
F. Ta\"\iani and
S. Lin and
G. S. Blair GossipKit: A Unified Component Framework
for Gossip . . . . . . . . . . . . . . . 123--136
S. W. Lin and
É. André and
Y. Liu and
J. Sun and
J. S. Dong Learning Assumptions for Compositional
Verification of Timed Systems . . . . . 137--153
M. A. Schumann and
D. Drusinsky and
J. B. Michael and
D. Wijesekera Modeling Human-in-the-Loop Security
Analysis and Decision-Making Processes 154--166
I. Trummer and
B. Faltings and
W. Binder Multi-Objective Quality-Driven Service
Selection --- a Fully Polynomial Time
Approximation Scheme . . . . . . . . . . 167--191
Q. He and
J. Yan and
H. Jin and
Y. Yang Quality-Aware Service Selection for
Service-Based Systems Based on Iterative
Multi-Attribute Combinatorial Auction 192--215
B. N. Nguyen and
A. M. Memon An Observe-Model-Exercise* Paradigm to
Test Event-Driven Systems with
Undetermined Input Spaces . . . . . . . 216--234
N. Ramasubbu Governing Software Process Improvements
in Globally Distributed Product
Development . . . . . . . . . . . . . . 235--250
C. Song and
A. Porter and
J. S. Foster iTree: Efficiently Discovering
High-Coverage Configurations Using
Interaction Trees . . . . . . . . . . . 251--265
Y. Cai and
W. K. Chan Magiclock: Scalable Detection of
Potential Deadlocks in Large-Scale
Multithreaded Programs . . . . . . . . . 266--281
M. Galster and
D. Weyns and
D. Tofan and
B. Michalik and
P. Avgeriou Variability in Software Systems --- a
Systematic Literature Review . . . . . . 282--306
A. Groce and
T. Kulesza and
C. Zhang and
S. Shamasunder and
M. Burnett and
W. K. Wong and
S. Stumpf and
S. Das and
A. Shinsel and
F. Bice and
K. McIntosh You Are the Only Possible Oracle:
Effective Test Selection for End Users
of Interactive Machine Learning Systems 307--323
D. Basin and
M. Clavel and
M. Egea and
M. A. G. de Dios and
C. Dania A Model-Driven Methodology for
Developing Secure Data-Management
Applications . . . . . . . . . . . . . . 324--337
C. Damas and
B. Lambeau and
A. van Lamsweerde Analyzing Critical Decision-Based
Processes . . . . . . . . . . . . . . . 338--365
S. Rastkar and
G. C. Murphy and
G. Murray Automatic Summarization of Bug Reports 366--380
R. Latorre Effects of Developer Experience on
Learning and Applying Unit Test-Driven
Development . . . . . . . . . . . . . . 381--395
J. Lv and
B. B. Yin and
K. Y. Cai On the Asymptotic Behavior of Adaptive
Testing Strategy for Software
Reliability Assessment . . . . . . . . . 396--412
S. Kim Synthesizing Multithreaded Code from
Real-Time Object-Oriented Models via
Schedulability-Aware Thread Derivation 413--426
Y. Pei and
C. A. Furia and
M. Nordio and
Y. Wei and
B. Meyer and
A. Zeller Automated Fixing of Programs with
Contracts . . . . . . . . . . . . . . . 427--449
L. Hatton Conservation of Information: Software's
Hidden Clockwork? . . . . . . . . . . . 450--460
Q. He and
J. Han and
Y. Yang and
H. Jin and
J. G. Schneider and
S. Versteeg Formulating Cost-Effective Monitoring
Strategies for Service-Based Systems . . 461--482
W. Leungwattanakit and
C. Artho and
M. Hagiya and
Y. Tanabe and
M. Yamamoto and
K. Takahashi Modular Software Model Checking for
Distributed Systems . . . . . . . . . . 483--501
V. Arnaoudova and
L. M. Eshkevari and
M. D. Penta and
R. Oliveto and
G. Antoniol and
Y. G. Guéhéneuc REPENT: Analyzing the Nature of
Identifier Renamings . . . . . . . . . . 502--532
A. T. Misirli and
A. B. Bener Bayesian Networks For Evidence-Based
Decision-Making in Software Engineering 533--554
J. M. Vara and
V. A. Bollati and
Á. Jiménez and
E. Marcos Dealing with Traceability in the MDD of
Model Transformations . . . . . . . . . 555--583
J. Lee and
K. H. Hsu GEA: A Goal-Driven Approach to
Discovering Early Aspects . . . . . . . 584--602
M. Shepperd and
D. Bowes and
T. Hall Researcher Bias: The Use of Machine
Learning in Software Defect Prediction 603--616
A. Bartel and
J. Klein and
M. Monperrus and
Y. Le Traon Static Analysis for Extracting
Permission Checks of a Large Scale
Framework: The Challenges and Solutions
for Analyzing Android . . . . . . . . . 617--632
M. Kim and
T. Zimmermann and
N. Nagappan An Empirical Study of Refactoring
Challenges and Benefits at Microsoft . . 633--649
C. Henard and
M. Papadakis and
G. Perrouin and
J. Klein and
P. Heymans and
Y. Le Traon Bypassing the Combinatorial Explosion:
Using Similarity to Generate and
Prioritize $T$-Wise Test Configurations
for Software Product Lines . . . . . . . 650--670
G. Bavota and
R. Oliveto and
M. Gethers and
D. Poshyvanyk and
A. De Lucia Methodbook: Recommending Move Method
Refactorings via Relational Topic Models 671--694
J. Song and
C. Cadar and
P. Pietzuch \sc SymbexNet: Testing Network Protocol
Implementations with Symbolic Execution
and Rule-Based Specifications . . . . . 695--709
P. Collingbourne and
C. Cadar and
P. H. J. Kelly Symbolic Crosschecking of Data-Parallel
Floating-Point Code . . . . . . . . . . 710--737
M. Hertis and
M. B. Juric An Empirical Analysis of Business
Process Execution Language Usage . . . . 738--757
N. Ramasubbu and
C. F. Kemerer Managing Technical Debt in Enterprise
Software Packages . . . . . . . . . . . 758--772
X. Wang and
Y. Dang and
L. Zhang and
D. Zhang and
E. Lan and
H. Mei Predicting Consistency-Maintenance
Requirement of Code Clonesat
Copy-and-Paste Time . . . . . . . . . . 773--794
G. Díaz and
M. E. Cambronero and
E. Martínez and
G. Schneider Specification and Verification of
Normative Texts Using C-O Diagrams . . . 795--817
H. Leopold and
J. Mendling and
A. Polyvyanyy Supporting Process Model Validation
through Natural Language Generation . . 818--840
W. Kessentini and
M. Kessentini and
H. Sahraoui and
S. Bechikh and
A. Ouni A Cooperative Parallel Search-Based
Software Engineering Approach for
Code-Smells Detection . . . . . . . . . 841--861
I. Rodríguez and
L. Llana and
P. Rabanal A General Testability Theory: Classes,
Properties, Complexity, and Testing
Reductions . . . . . . . . . . . . . . . 862--894
D. Fernandez-Amoros and
R. Heradio and
J. A. Cerrada and
C. Cerrada A Scalable Approach to Exact Model and
Commonality Counting for Extended
Feature Models . . . . . . . . . . . . . 895--910
Y. Liu and
C. Xu and
S. C. Cheung and
J. Lü GreenDroid: Automated Diagnosis of
Energy Inefficiency for Smartphone
Applications . . . . . . . . . . . . . . 911--940
E. Casagrande and
S. Woldeamlak and
W. L. Woon and
H. H. Zeineldin and
D. Svetinovic NLP-KAOS for Systems Goal Elicitation:
Smart Metering System Case Study . . . . 941--956
Y. D. Lin and
J. F. Rojas and
E. T. H. Chu and
Y. C. Lai On the Accuracy, Efficiency, and
Reusability of Automated Test Oracles
for Android Devices . . . . . . . . . . 957--970
W. Araujo and
L. C. Briand and
Y. Labiche On the Effectiveness of Contracts as
Test Oracles in the Detection and
Diagnosis of Functional Faults in
Concurrent Object-Oriented Software . . 971--992
R. Scandariato and
J. Walden and
A. Hovsepyan and
W. Joosen Predicting Vulnerable Software
Components via Text Mining . . . . . . . 993--1006
T. Miller and
B. Lu and
L. Sterling and
G. Beydoun and
K. Taveter Requirements Elicitation and
Specification Using the Agent Paradigm:
The Case Study of an Aircraft Turnaround
Simulator . . . . . . . . . . . . . . . 1007--1024
A. C. Dias-Neto and
G. H. Travassos Supporting the Combined Selection of
Model-Based Testing Techniques . . . . . 1025--1041
J. S. Cuadrado and
E. Guerra and
J. de Lara A Component Model for Model
Transformations . . . . . . . . . . . . 1042--1060
S. Draxler and
G. Stevens and
A. Boden Keeping the Development Environment Up
to Date --- a Study of the Situated
Practices of Appropriating the Eclipse
IDE . . . . . . . . . . . . . . . . . . 1061--1074
C. T. Lin and
Y. F. Li Rate-Based Queueing Simulation Model of
Open Source Software Debugging
Activities . . . . . . . . . . . . . . . 1075--1099
D. Athanasiou and
A. Nugroho and
J. Visser and
A. Zaidman Test Code Quality and Its Relation to
Issue Handling Performance . . . . . . . 1100--1125
B. Dagenais and
M. P. Robillard Using Traceability Links to Recommend
Adaptive Changes for Documentation
Evolution . . . . . . . . . . . . . . . 1126--1146
F. Massacci and
V. H. Nguyen An Empirical Methodology to Evaluate
Vulnerability Discovery Models . . . . . 1147--1162
G. R. Bergersen and
D. I. K. Sjòberg and
T. Dybå Construction and Validation of an
Instrument for Measuring Programming
Skill . . . . . . . . . . . . . . . . . 1163--1184
E. Coppa and
C. Demetrescu and
I. Finocchi Input-Sensitive Profiling . . . . . . . 1185--1205
C. Tian and
Z. Duan and
Z. Duan Making CEGAR More Efficient in Software
Model Checking . . . . . . . . . . . . . 1206--1223
K. Lano and
S. Kolahdouz-Rahimi Model-Transformation Design Patterns . . 1224--1259
M. B. Dwyer State of the Journal Editorial . . . . . 1--2
T. Wang and
J. Sun and
X. Wang and
Y. Liu and
Y. Si and
J. S. Dong and
X. Yang and
X. Li A Systematic Study on Explicit-State
Non-Zenoness Checking for Timed Automata 3--18
B. M. Samuel and
L. A. Watkins III and
A. Ehle and
V. Khatri Customizing the Representation
Capabilities of Process Models:
Understanding the Effects of Perceived
Modeling Impediments . . . . . . . . . . 19--39
S. L. Lim and
P. J. Bentley and
N. Kanakam and
F. Ishikawa and
S. Honiden Investigating Country Differences in
Mobile App User Behavior and Challenges
for Software Engineering . . . . . . . . 40--64
E. Murphy-Hill and
T. Zimmermann and
C. Bird and
N. Nagappan The Design Space of Bug Fixes and How
Developers Navigate It . . . . . . . . . 65--81
M. Zhou and
A. Mockus Who Will Stay in the FLOSS Community?
Modeling Participant's Initial Behavior 82--99
Anonymous 2014 Reviewers List* . . . . . . . . . . 100--103
Anonymous 2014 Index \booktitleIEEE Transactions
on Software Engineering Vol. 40 . . . . 104--112
F. Belli and
M. Beyazìt Exploiting Model Morphology for
Event-Based Testing . . . . . . . . . . 113--134
N. Mangano and
T. D. LaToza and
M. Petre and
A. van der Hoek How Software Designers Interact with
Sketches at the Whiteboard . . . . . . . 135--156
F. Brosig and
P. Meier and
S. Becker and
A. Koziolek and
H. Koziolek and
S. Kounev Quantitative Evaluation of Model-Driven
Performance Analysis and Simulation of
Component-Based Architectures . . . . . 157--175
M. D. Syer and
M. Nagappan and
B. Adams and
A. E. Hassan Replicating and Re-Evaluating the Theory
of Relative Defect-Proneness . . . . . . 176--197
N. Chen and
S. Kim STAR: Stack Trace Based Automatic Crash
Reproduction via Symbolic Execution . . 198--220
A. Bennaceur and
V. Issarny Automated Synthesis of Mediators to
Support Component Interoperability . . . 221--240
J. Cunha and
J. P. Fernandes and
J. Mendes and
J. Saraiva Embedding, Evolution, and Validation of
Model-Driven Spreadsheets . . . . . . . 241--263
J. F. Pérez and
G. Casale and
S. Pacheco-Sanchez Estimating Computational Requirements in
Multi-Threaded Applications . . . . . . 264--278
R. M. Hierons Generating Complete Controllable Test
Suites for Distributed Testing . . . . . 279--293
A. Sakti and
G. Pesant and
Y. G. Guéhéneuc Instance Generator and Problem
Representation to Improve Object
Oriented Code Coverage . . . . . . . . . 294--313
S. Lee and
S. Kang and
S. Kim and
M. Staats The Impact of View Histories on Edit
Recommendations . . . . . . . . . . . . 314--330
Y. Yang and
Y. Zhou and
H. Lu and
L. Chen and
Z. Chen and
B. Xu and
H. Leung and
Z. Zhang Are Slice-Based Cohesion Metrics
Actually Useful in Effort-Aware
Post-Release Fault-Proneness Prediction?
An Empirical Study . . . . . . . . . . . 331--357
A. Panichella and
R. Oliveto and
M. D. Penta and
A. De Lucia Improving Multi-Objective Test Case
Selection by Injecting Diversity in
Genetic Algorithms . . . . . . . . . . . 358--383
G. Bavota and
M. Linares-Vásquez and
C. E. Bernal-Cárdenas and
M. D. Penta and
R. Oliveto and
D. Poshyvanyk The Impact of API Change- and
Fault-Proneness on the User Ratings of
Android Apps . . . . . . . . . . . . . . 384--407
I. Beschastnikh and
Y. Brun and
J. Abrahamson and
M. D. Ernst and
A. Krishnamurthy Using Declarative Specification to
Improve the Understanding,
Extensibility, and Comparison of
Model-Inference Algorithms . . . . . . . 408--428
S. Mirshokraie and
A. Mesbah and
K. Pattabiraman Guided Mutation Testing for JavaScript
Web Applications . . . . . . . . . . . . 429--444
A. Jovanovi\'c and
D. Lime and
O. H. Roux Integer Parameter Synthesis for
Real-Time Systems . . . . . . . . . . . 445--461
F. Palomba and
G. Bavota and
M. D. Penta and
R. Oliveto and
D. Poshyvanyk and
A. De Lucia Mining Version Histories for Detecting
Code Smells . . . . . . . . . . . . . . 462--489
L. Burgueño and
J. Troya and
M. Wimmer and
A. Vallecillo Static Fault Localization in Model
Transformations . . . . . . . . . . . . 490--506
E. T. Barr and
M. Harman and
P. McMinn and
M. Shahbaz and
S. Yoo The Oracle Problem in Software Testing:
A Survey . . . . . . . . . . . . . . . . 507--525
F. Pittke and
H. Leopold and
J. Mendling Automatic Detection and Resolution of
Lexical Ambiguity in Process Models . . 526--544
A. K. Massey and
P. N. Otto and
A. I. Antón Evaluating Legal Implementation
Readiness Decision-Making . . . . . . . 545--564
C. Treude and
M. P. Robillard and
B. Dagenais Extracting Development Tasks to Navigate
Software Documentation . . . . . . . . . 565--581
T. Chaikalis and
A. Chatzigeorgiou Forecasting Java Software Evolution
Trends Employing Network Models . . . . 582--602
Y. Xiong and
H. Zhang and
A. Hubaux and
S. She and
J. Wang and
K. Czarnecki Range Fixes: Interactive Error
Resolution for Software Configuration 603--619
M. Autili and
L. Grunske and
M. Lumpe and
P. Pelliccione and
A. Tang Aligning Qualitative, Real-Time, and
Probabilistic Property Specification
Patterns Using a Structured English
Grammar . . . . . . . . . . . . . . . . 620--638
N. Rosner and
J. Geldenhuys and
N. M. Aguirre and
W. Visser and
M. F. Frias BLISS: Improved Symbolic Execution by
Bounded Lazy Initialization with SAT
Support . . . . . . . . . . . . . . . . 639--660
M. El-Attar and
H. Luqman and
P. Kárpáti and
G. Sindre and
A. L. Opdahl Extending the UML Statecharts Notation
to Model Security Aspects . . . . . . . 661--690
D. Maplesden and
E. Tempero and
J. Hosking and
J. C. Grundy Performance Analysis for Object-Oriented
Software: A Systematic Mapping . . . . . 691--710
H. Thimbleby Safer User Interfaces: A Case Study in
Improving Number Entry . . . . . . . . . 711--729
L. Wu and
K. Su and
S. Cai and
X. Zhang and
C. Zhang and
S. Wang An I/O Efficient Approach for Detecting
All Accepting Cycles . . . . . . . . . . 730--744
K. Mu\cslu and
Y. Brun and
M. D. Ernst and
D. Notkin Reducing Feedback Delay of Software
Development Tools via Continuous
Analysis . . . . . . . . . . . . . . . . 745--763
Y. Brun and
J. y. Bang and
G. Edwards and
N. Medvidovic Self-Adapting Reliability in Distributed
Software Systems . . . . . . . . . . . . 764--780
A. Ampatzoglou and
A. Chatzigeorgiou and
S. Charalampidou and
P. Avgeriou The Effect of GoF Design Patterns on
Stability: A Case Study . . . . . . . . 781--802
G. Gay and
M. Staats and
M. Whalen and
M. P. E. Heimdahl The Risks of Coverage-Directed Test Case
Generation . . . . . . . . . . . . . . . 803--819
S. Nadi and
T. Berger and
C. Kästner and
K. Czarnecki Where Do Configuration Constraints Stem
From? An Extraction Approach and an
Empirical Study . . . . . . . . . . . . 820--841
C. Xu and
W. Xi and
S. C. Cheung and
X. Ma and
C. Cao and
J. Lu \sc Cina: Suppressing the Detection of
Unstable Context Inconsistency . . . . . 842--865
H. Bagheri and
A. Sadeghi and
J. Garcia and
S. Malek COVERT: Compositional Analysis of
Android Inter-App Permission Leakage . . 866--886
H. Liu and
Q. Liu and
Y. Liu and
Z. Wang Identifying Renaming Opportunities by
Expanding Conducted Rename Refactorings 887--900
J. Petke and
M. B. Cohen and
M. Harman and
S. Yoo Practical Combinatorial Interaction
Testing: Empirical Findings on
Efficiency and Early Fault Detection . . 901--924
Y. C. Jhi and
X. Jia and
X. Wang and
S. Zhu and
P. Liu and
D. Wu Program Characterization Using Runtime
Values and Its Application to Software
Plagiarism Detection . . . . . . . . . . 925--943
C. Arora and
M. Sabetzadeh and
L. Briand and
F. Zimmer Automated Checking of Conformance to
Requirements Templates Using Natural
Language Processing . . . . . . . . . . 944--968
K. Blincoe and
G. Valetto and
D. Damian Facilitating Coordination between
Software Developers: A Study and
Techniques for Timely and Efficient
Recommendations . . . . . . . . . . . . 969--985
X. Guo and
M. Zhou and
X. Song and
M. Gu and
J. Sun First, Debug the Test Oracle . . . . . . 986--1000
J. Krall and
T. Menzies and
M. Davies GALE: Geometric Active Learning for
Search-Based Software Engineering . . . 1001--1018
J. P. Galeotti and
C. A. Furia and
E. May and
G. Fraser and
A. Zeller Inferring Loop Invariants by Mutation,
Dynamic Analysis, and Static Checking 1019--1037
P. Rodeghero and
C. Liu and
P. W. McBurney and
C. McMillan An Eye-Tracking Study of Java
Programmers and Application to Source
Code Summarization . . . . . . . . . . . 1038--1054
N. Tsantalis and
D. Mazinanian and
G. P. Krishnan Assessing the Refactorability of
Software Clones . . . . . . . . . . . . 1055--1090
Z. M. Jiang and
A. E. Hassan A Survey on Load Testing of Large-Scale
Software Systems . . . . . . . . . . . . 1091--1118
G. Gay and
M. Staats and
M. Whalen and
M. P. E. Heimdahl Automated Oracle Data Selection Support 1119--1137
H. Zhu and
I. Bayley On the Composability of Design Patterns 1138--1152
H. A. Duran-Limon and
C. A. Garcia-Rios and
F. E. Castillo-Barrera and
R. Capilla An Ontology-Based Product Architecture
Derivation Approach . . . . . . . . . . 1153--1168
P. Clarke and
R. V. O'Connor and
B. Leavy and
M. Yilmaz Exploring the Relationship between
Software Process Adaptive Capability and
Organisational Performance . . . . . . . 1169--1183
M. Schur and
A. Roth and
A. Zeller Mining Workflow Models from Web
Applications . . . . . . . . . . . . . . 1184--1201
L. Zhang and
A. Chattopadhyay and
C. Wang Round-Up: Runtime Verification of Quasi
Linearizability for Concurrent Data
Structures . . . . . . . . . . . . . . . 1202--1216
Z. Tian and
Q. Zheng and
T. Liu and
M. Fan and
E. Zhuang and
Z. Yang Software Plagiarism Detection with
Birthmarks Based on Dynamic Key
Instruction Sequences . . . . . . . . . 1217--1235
C. Le Goues and
N. Holtschulte and
E. K. Smith and
Y. Brun and
P. Devanbu and
S. Forrest and
W. Weimer The ManyBugs and IntroClass Benchmarks
for Automated Repair of C Programs . . . 1236--1256
M. B. Dwyer and
D. S. Rosenblum Editorial: Journal-First Publication for
the Software Engineering Community . . . 1--1
M. Autili and
A. Bertolino and
G. De Angelis and
D. D. Ruscio and
A. D. Sandro A Tool-Supported Methodology for
Validation and Refinement of Early-Stage
Domain Models . . . . . . . . . . . . . 2--25
B. Ozcelik and
C. Yilmaz Seer: A Lightweight Online Failure
Prediction Approach . . . . . . . . . . 26--46
K. Wnuk and
T. Gorschek and
D. Callele and
E. A. Karlsson and
E. Åhlin and
B. Regnell Supporting Scope Tracking and
Visualization for Very Large-Scale
Requirements Engineering-Utilizing FSC+,
Decision Patterns, and Atomic Decision
Visualizations . . . . . . . . . . . . . 47--74
A. Filieri and
G. Tamburrelli and
C. Ghezzi Supporting Self-Adaptation via
Quantitative Verification and
Sensitivity Analysis at Run Time . . . . 75--99
Anonymous 2015 reviewers list . . . . . . . . . . 100--102
P. W. McBurney and
C. McMillan Automatic Source Code Summarization of
Context for Java Methods . . . . . . . . 103--119
S. Vegas and
C. Apa and
N. Juristo Crossover Designs in Software
Engineering Experiments: Benefits and
Perils . . . . . . . . . . . . . . . . . 120--135
M. Caporuscio and
V. Grassi and
M. Marzolla and
R. Mirandola \sc GoPrime: A Fully Decentralized
Middleware for Utility-Aware Service
Assembly . . . . . . . . . . . . . . . . 136--152
M. Paolieri and
A. Horváth and
E. Vicario Probabilistic Model Checking of
Regenerative Concurrent Systems . . . . 153--169
Z. Gao and
Z. Chen and
Y. Zou and
A. M. Memon SITAR: GUI Test Script Repair . . . . . 170--186
J. Qiu and
X. Su and
P. Ma Using Reduced Execution Flow Graph to
Identify Library Functions in Binary
Code . . . . . . . . . . . . . . . . . . 187--202
M. B. Dwyer and
E. Bodden and
B. Fitzgerald and
M. Kim and
S. Kim and
A. J. Ko and
E. Mendes and
R. Mirandola and
A. Moreira and
F. Shull and
S. Siegel and
T. Xie and
C. Zhang Connecting and Serving the Software
Engineering Community . . . . . . . . . 203--280
M. Mirakhorli and
J. Cleland-Huang Detecting, Tracing, and Monitoring
Architectural Tactics in Code . . . . . 205--220
R. Kazman and
D. Goldenson and
I. Monarch and
W. Nichols and
G. Valetto Evaluating the Effects of Architectural
Documentation: A Case Study of a Large
Scale Open Source Project . . . . . . . 220--260
N. Mellegård and
A. Ferwerda and
K. Lind and
R. Heldal and
M. R. V. Chaudron Impact of Introducing Domain-Specific
Modelling in Software Maintenance: An
Industrial Case Study . . . . . . . . . 245--260
Z. Q. Zhou and
S. Xiang and
T. Y. Chen Metamorphic Testing for Software Quality
Assessment: A Study of Search Engines 264--284
Q. Shi and
J. Huang and
Z. Chen and
B. Xu Verifying Synchronization for Atomicity
Violation Fixing . . . . . . . . . . . . 280--296
J. L. Krein and
L. Prechelt and
N. Juristo and
A. Nanthaamornphong and
J. C. Carver and
S. Vegas and
C. D. Knutson and
K. D. Seppi and
D. L. Eggett A Multi-Site Joint Replication of a
Design Patterns Experiment Using
Moderator Variables to Generalize across
Contexts . . . . . . . . . . . . . . . . 302--321
H. M. Chavez and
W. Shen and
R. B. France and
B. A. Mechling and
G. Li An Approach to Checking Consistency
between UML Class Model and Its Java
Implementation . . . . . . . . . . . . . 322--344
M. Böhme and
S. Paul A Probabilistic Analysis of the
Efficiency of Automated Software Testing 345--360
A. Shahbazi and
J. Miller Black-Box String Test Case Generation
through a Multi-Objective Optimization 361--378
X. Ye and
R. Bunescu and
C. Liu Mapping Bug Reports to Relevant Files: A
Ranking Model, a Fine-Grained Benchmark,
and Feature Evaluation . . . . . . . . . 379--402
M. Baluda and
G. Denaro and
M. Pezz\`e Bidirectional Symbolic Analysis for
Effective Branch Testing . . . . . . . . 403--426
A. M. Aranda and
O. Dieste and
N. Juristo Effect of Domain Knowledge on
Elicitation Effectiveness: An Internally
Replicated Controlled Experiment . . . . 427--451
D. Cotroneo and
R. Pietrantuono and
S. Russo RELAI Testing: A Technique to Assess and
Improve Software Reliability . . . . . . 452--475
D. P. Harvie and
A. Agah Targeted Scrum: Applying Mission Command
to Agile Software Development . . . . . 476--489
D. Hao and
L. Zhang and
L. Zang and
Y. Wang and
X. Wu and
T. Xie To Be Optimal or Not in Test-Case
Prioritization . . . . . . . . . . . . . 490--505
P. Degano and
G. L. Ferrari and
L. Galletta A Two-Component Language for Adaptation:
Design, Semantics and Program Analysis 505--529
M. B. Zanjani and
H. Kagdi and
C. Bird Automatically Recommending Peer
Reviewers in Modern Code Review . . . . 530--543
H. Liu and
Q. Liu and
Z. Niu and
Y. Liu Dynamic and Automatic Feedback-Based
Threshold Adaptation for Code Smell
Detection . . . . . . . . . . . . . . . 544--558
E. A. Barbosa and
A. Garcia and
M. P. Robillard and
B. Jakobus Enforcing Exception Handling Policies
with a Domain-Specific Language . . . . 559--584
C. Giardino and
N. Paternoster and
M. Unterkalmsteiner and
T. Gorschek and
P. Abrahamsson Software Development in Startup
Companies: The Greenfield Startup Model 585--604
C. H. Huang and
D. A. Peled and
S. Schewe and
F. Wang A Game-Theoretic Foundation for the
Maximum Software Resilience against
Dense Errors . . . . . . . . . . . . . . 605--622
G. Su and
Y. Feng and
T. Chen and
D. S. Rosenblum Asymptotic Perturbation Bounds for
Probabilistic Model Checking with
Empirically Determined Probability
Parameters . . . . . . . . . . . . . . . 623--639
N. Berthier and
É. Rutten and
N. De Palma and
S. M. K. Gueye Designing Autonomic Management Systems
by Using Reactive Control Techniques . . 640--657
X. Shen and
L. L. Minku and
R. Bahsoon and
X. Yao Dynamic Software Project Scheduling
through a Proactive-Rescheduling Method 658--686
N. Itzik and
I. Reinhartz-Berger and
Y. Wand Variability Analysis of Requirements:
Considering Behavioral Differences and
Reflecting Stakeholders' Perspectives 687--706
W. E. Wong and
R. Gao and
Y. Li and
R. Abreu and
F. Wotawa A Survey on Software Fault Localization 707--740
M. A. Noureddine and
F. A. Zaraket Model Checking Software with First Order
Logic Specifications Using AIG Solvers 741--763
R. Atachiants and
G. Doherty and
D. Gregg Parallel Performance Problems on
Shared-Memory Multicore Systems:
Taxonomy and Observation . . . . . . . . 764--785
H. Sharp and
Y. Dittrich and
C. R. B. de Souza The Role of Ethnographic Studies in
Empirical Software Engineering . . . . . 786--804
S. Segura and
G. Fraser and
A. B. Sanchez and
A. Ruiz-Cortés A Survey on Metamorphic Testing . . . . 805--824
Y. Cai and
Q. Lu Dynamic Testing for Deadlocks via
Constraints . . . . . . . . . . . . . . 825--842
E. Pavese and
V. Braberman and
S. Uchitel Probabilistic Interface Automata . . . . 843--865
H. Luo and
X. Liu and
X. Chen and
T. Long and
R. Jiang Software Reliability Analysis Using
Weakest Preconditions in Linear
Assignment Programs . . . . . . . . . . 866--885
J. Börstler and
B. Paech The Role of Method Chains and Comments
in Software Readability and
Comprehension --- an Experiment . . . . 886--898
M. Zhang and
Y. Wu and
S. Lu and
S. Qi and
J. Ren and
W. Zheng A Lightweight System for Detecting and
Tolerating Concurrency Bugs . . . . . . 899--917
A. Marchetto and
M. M. Islam and
W. Asghar and
A. Susi and
G. Scanniello A Multi-Objective Technique to
Prioritize Test Cases . . . . . . . . . 918--940
J. Tuya and
C. d. l. Riva and
M. J. Suárez-Cabal and
R. Blanco Coverage-Aware Test Database Reduction 941--959
A. Namoun and
A. Daskalopoulou and
N. Mehandjiev and
Z. Xun Exploring Mobile End User Development:
Existing Use and Design Factors . . . . 960--976
X. Xia and
D. Lo and
S. J. Pan and
N. Nagappan and
X. Wang HYDRA: Massively Compositional Model for
Cross-Project Defect Prediction . . . . 977--998
D. Octeau and
D. Luchaup and
S. Jha and
P. McDaniel Composite Constant Propagation and its
Application to Android Program Analysis 999--1014
T. Lee and
J. Nam and
D. Han and
S. Kim and
H. Peter In Developer Micro Interaction Metrics for
Software Defect Prediction . . . . . . . 1015--1035
W. S. El-Kassas and
B. A. Abdullah and
A. H. Yousef and
A. M. Wahba Enhanced Code Conversion Approach for
the Integrated Cross-Platform Mobile
Development (ICPMD) . . . . . . . . . . 1036--1053
T. Wu and
J. Liu and
Z. Xu and
C. Guo and
Y. Zhang and
J. Yan and
J. Zhang Light-Weight, Inter-Procedural and
Callback-Aware Resource Leak Detection
for Android Apps . . . . . . . . . . . . 1054--1076
R. M. Hierons and
U. C. Türker Parallel Algorithms for Testing Finite
State Machines:Generating UIO Sequences 1077--1091
C. Tantithamthavorn and
S. McIntosh and
A. E. Hassan and
K. Matsumoto Comments on ``Researcher Bias: The Use
of Machine Learning in Software Defect
Prediction'' . . . . . . . . . . . . . . 1092--1094
J. L. de la Vara and
M. Borg and
K. Wnuk and
L. Moonen An Industrial Survey of Safety Evidence
Change Impact Analysis Practice . . . . 1095--1117
P. A. Akiki and
A. K. Bandara and
Y. Yu Engineering Adaptive Model-Driven User
Interfaces . . . . . . . . . . . . . . . 1118--1147
T. H. Chen and
W. Shang and
Z. M. Jiang and
A. E. Hassan and
M. Nasser and
P. Flora Finding and Evaluating the Performance
Impact of Redundant Data Access for
Applications that are Developed Using
Object-Relational Mapping Frameworks . . 1148--1161
D. Riehle and
M. Capraro and
D. Kips and
L. Horn Inner Source in Platform-Based Product
Engineering . . . . . . . . . . . . . . 1162--1177
S. Eghbali and
L. Tahvildari Test Case Prioritization Using
Lexicographical Ordering . . . . . . . . 1178--1195
Anonymous 2016 Index \booktitleIEEE Transactions
on Software Engineering Vol. 42 . . . . 1--8
C. Tantithamthavorn and
S. McIntosh and
A. E. Hassan and
K. Matsumoto An Empirical Comparison of Model
Validation Techniques for Defect
Prediction Models . . . . . . . . . . . 1--18
D. Ciolek and
V. Braberman and
N. D'Ippolito and
N. Piterman and
S. Uchitel Interaction Models and Automated Control
under Partial Observable Environments 19--33
J. Xuan and
M. Martinez and
F. DeMarco and
M. Clément and
S. L. Marcote and
T. Durieux and
D. Le Berre and
M. Monperrus Nopol: Automatic Repair of Conditional
Statement Bugs in Java Programs . . . . 34--55
A. Bosu and
J. C. Carver and
C. Bird and
J. Orbeck and
C. Chockley Process Aspects and Social Dynamics of
Contemporary Code Review: Insights from
Open Source Development and Industrial
Practice at Microsoft . . . . . . . . . 56--75
V. Valero and
G. Díaz and
M. E. Cambronero Timed Automata Modeling and Verification
for Publish--Subscribe Structures Using
Distributed Resources . . . . . . . . . 76--99
Anonymous 2016 Reviewers List* . . . . . . . . . . 100--103
L. Moreno and
G. Bavota and
M. D. Penta and
R. Oliveto and
A. Marcus and
G. Canfora ARENA: An Approach for the Automated
Generation of Release Notes . . . . . . 106--127
F. S. Ocariza and
K. Bajaj and
K. Pattabiraman and
A. Mesbah A Study of Causes and Consequences of
Client-Side JavaScript Bugs . . . . . . 128--144
H. Bagheri and
C. Tang and
K. Sullivan Automated Synthesis and Dynamic Analysis
of Tradeoff Spaces for Object-Relational
Mapping . . . . . . . . . . . . . . . . 145--163
A. Henderson and
L. K. Yan and
X. Hu and
A. Prakash and
H. Yin and
S. McCamant DECAF: A Platform-Neutral Whole-System
Dynamic Binary Analysis Platform . . . . 164--184
M. A. Storey and
A. Zagalsky and
F. F. Filho and
L. Singer and
D. M. German How Social and Communication Channels
Shape and Challenge a Participatory
Culture in Software Development . . . . 185--204
M. B. Dwyer Improving Timeliness and Visibility in
Publishing Software Engineering Research 205--206
C. Giuffrida and
C. Iorgulescu and
G. Tamburrelli and
A. S. Tanenbaum Automating Live Update for Generic
Server Programs . . . . . . . . . . . . 207--225
W. Dou and
C. Xu and
S. C. Cheung and
J. Wei CACheck: Detecting and Repairing Cell
Arrays in Spreadsheets . . . . . . . . . 226--251
H. Wang and
T. Liu and
X. Guan and
C. Shen and
Q. Zheng and
Z. Yang Dependence Guided Symbolic Execution . . 252--271
X. Xia and
D. Lo and
Y. Ding and
J. M. Al-Kofahi and
T. N. Nguyen and
X. Wang Improving Automated Bug Triaging with
Specialized Topic Model . . . . . . . . 272--297
I. Bate and
A. Burns and
R. I. Davis An Enhanced Bailout Protocol for Mixed
Criticality Embedded Software . . . . . 298--320
X. Y. Jing and
F. Wu and
X. Dong and
B. Xu An Improved SDA Based Defect Prediction
Framework for Both Within-Project and
Cross-Project Class-Imbalance Problems 321--339
L. Baresi and
C. Ghezzi and
X. Ma and
V. P. L. Manna Efficient Dynamic Updates of Distributed
Components Through Version Consistency 340--358
K. Damevski and
D. C. Shepherd and
J. Schneider and
L. Pollock Mining Sequences of Developer
Interactions in Visual Studio for Usage
Smells . . . . . . . . . . . . . . . . . 359--371
N. Li and
J. Offutt Test Oracle Strategies for Model-Based
Testing . . . . . . . . . . . . . . . . 372--395
R. Hebig and
D. E. Khelladi and
R. Bendraou Approaches to Co-Evolution of Metamodels
and Models: A Survey . . . . . . . . . . 396--414
L. Bossi and
E. Bertino and
S. R. Hussain A System for Profiling and Monitoring
Database Access Patterns by Application
Programs for Anomaly Detection . . . . . 415--431
N. Huber and
F. Brosig and
S. Spinner and
S. Kounev and
M. Bähr Model-Based Self-Aware Performance and
Resource Management Using the Descartes
Modeling Language . . . . . . . . . . . 432--452
T. Chen and
R. Bahsoon Self-Adaptive and Online QoS Modeling
for Cloud-Based Software Services . . . 453--475
F. Zhang and
A. E. Hassan and
S. McIntosh and
Y. Zou The Use of Summation to Aggregate
Software Metrics Hinders the Performance
of Defect Prediction Models . . . . . . 476--491
A. Sadeghi and
H. Bagheri and
J. Garcia and
S. Malek A Taxonomy and Qualitative Comparison of
Program Analysis Techniques for Security
Assessment of Android Software . . . . . 492--530
G. Gay and
S. Rayadurgam and
M. P. E. Heimdahl Automated Steering of Model-Based Test
Oracles to Admit Real Program Behaviors 531--555
H. Wang and
L. Wang and
Q. Yu and
Z. Zheng and
A. Bouguettaya and
M. R. Lyu Online Reliability Prediction via
Motifs-Based Dynamic Bayesian Networks
for Service-Oriented Systems . . . . . . 556--579
L. Li and
M. Harman and
F. Wu and
Y. Zhang The Value of Exact Analysis in
Requirements Selection . . . . . . . . . 580--596
D. Fucci and
H. Erdogmus and
B. Turhan and
M. Oivo and
N. Juristo A Dissection of the Test-Driven
Development Process: Does It Really
Matter to Test-First or to Test-Last? 597--614
N. Macedo and
T. Jorge and
A. Cunha A Feature-Based Classification of Model
Repair Approaches . . . . . . . . . . . 615--640
D. A. da Costa and
S. McIntosh and
W. Shang and
U. Kulesza and
R. Coelho and
A. E. Hassan A Framework for Evaluating the Results
of the SZZ Approach for Identifying
Bug-Introducing Changes . . . . . . . . 641--657
Q. He and
R. Zhou and
X. Zhang and
Y. Wang and
D. Ye and
F. Chen and
J. C. Grundy and
Y. Yang Keyword Search for Building
Service-Based Systems . . . . . . . . . 658--674
M. Borg and
K. Wnuk and
B. Regnell and
P. Runeson Supporting Change Impact Analysis Using
a Recommendation System: An Industrial
Case Study in a Safety-Critical Context 675--700
S. A. Carr and
F. Logozzo and
M. Payer Automatic Contract Insertion with CCBot 701--714
L. Mariani and
M. Pezz\`e and
M. Santoro GK-Tail+: An Efficient Approach to Learn
Software Models . . . . . . . . . . . . 715--738
M. C. Platenius and
A. Shaker and
M. Becker and
E. Hüllermeier and
W. Schäfer Imprecise Matching of Requirements
Specifications for Software Services
Using Fuzzy Logic . . . . . . . . . . . 739--759
F. Li and
Z. Li and
W. Huo and
X. Feng Locating Software Faults Based on
Minimum Debugging Frontier Set . . . . . 760--776
P. Rempel and
P. Mäder Preventing Defects: The Impact of
Requirements Traceability Completeness
on Software Quality . . . . . . . . . . 777--797
J. Mertz and
I. Nunes A Qualitative Study of Application-Level
Caching . . . . . . . . . . . . . . . . 798--816
W. Martin and
F. Sarro and
Y. Jia and
Y. Zhang and
M. Harman A Survey of App Store Analysis for
Software Engineering . . . . . . . . . . 817--847
N. S. M. Yusop and
J. Grundy and
R. Vasa Reporting Usability Defects: A
Systematic Literature Review . . . . . . 848--867
J. S. Cuadrado and
E. Guerra and
J. de Lara Static Analysis of Model Transformations 868--897
F. Sarro and
F. Ferrucci and
M. Harman and
A. Manna and
J. Ren Adaptive Multi-Objective Evolutionary
Algorithms for Overtime Planning in
Software Projects . . . . . . . . . . . 898--917
C. Arora and
M. Sabetzadeh and
L. Briand and
F. Zimmer Automated Extraction and Clustering of
Requirements Glossary Terms . . . . . . 918--945
K. Banerjee and
D. Sarkar and
C. Mandal Deriving Bisimulation Relations from
Path Extension Based Equivalence
Checkers . . . . . . . . . . . . . . . . 946--953
S. Charalampidou and
A. Ampatzoglou and
A. Chatzigeorgiou and
A. Gkortzis and
P. Avgeriou Identifying Extract Method Refactoring
Opportunities Based on Functional
Relevance . . . . . . . . . . . . . . . 954--974
E. Tang and
X. Zhang and
N. T. Müller and
Z. Chen and
X. Li Software Numerical Instability Detection
and Diagnosis by Combining Stochastic
and Infinite-Precision Testing . . . . . 975--994
X. Wang and
J. Sun and
T. Wang and
S. Qin Language Inclusion Checking of Timed
Automata with Non-Zenoness . . . . . . . 995--1008
M. Fleck and
J. Troya and
M. Kessentini and
M. Wimmer and
B. Alkhazi Model Transformation Modularization as a
Many-Objective Optimization Problem . . 1009--1032
R. M. Hierons Testing from Partial Finite State
Machines without Harmonised Traces . . . 1033--1043
E. d. S. Maldonado and
E. Shihab and
N. Tsantalis Using Natural Language Processing to
Automatically Detect Self-Admitted
Technical Debt . . . . . . . . . . . . . 1044--1062
M. Tufano and
F. Palomba and
G. Bavota and
R. Oliveto and
M. D. Penta and
A. De Lucia and
D. Poshyvanyk When and Why Your Code Starts to Smell
Bad (and Whether the Smells Go Away) . . 1063--1088
C. Le Goues and
Y. Brun and
S. Forrest and
W. Weimer Clarifications on the Construction and
Use of the ManyBugs Benchmark . . . . . 1089--1090
S. Herbold Comments on ScottKnottESD in response to
``An empirical comparison of model
validation techniques for defect
prediction models'' . . . . . . . . . . 1091--1094
J. Fowkes and
P. Chanthirasegaran and
R. Ranca and
M. Allamanis and
M. Lapata and
C. Sutton Autofolding for Source Code
Summarization . . . . . . . . . . . . . 1095--1109
B. Nongpoh and
R. Ray and
S. Dutta and
A. Banerjee AutoSense: A Framework for Automated
Sensitivity Analysis of Program Data . . 1110--1124
G. Salvaneschi and
S. Proksch and
S. Amann and
S. Nadi and
M. Mezini On the Positive Effect of Reactive
Programming on Software Comprehension:
An Empirical Study . . . . . . . . . . . 1125--1143
P. Zave Reasoning About Identifier Spaces: How
to Make Chord Correct . . . . . . . . . 1144--1156
L. Luo and
J. Ming and
D. Wu and
P. Liu and
S. Zhu Semantics-Based Obfuscation-Resilient
Binary Code Similarity Comparison with
Applications to Software and Algorithm
Plagiarism Detection . . . . . . . . . . 1157--1177
A. N. Meyer and
L. E. Barton and
G. C. Murphy and
T. Zimmermann and
T. Fritz The Work Life of Developers: Activities,
Switches and Perceived Productivity . . 1178--1193
M. Dwyer State of the Journal . . . . . . . . . . 1--2
Anonymous 2017 Index \booktitleIEEE Transactions
on Software Engineering Vol. 43 . . . . 1--9
N. Medvidovi\'c Editorial from the New Editor in Chief 3--4
D. Di Nucci and
F. Palomba and
G. De Rosa and
G. Bavota and
R. Oliveto and
A. De Lucia A Developer Centered Bug Prediction
Model . . . . . . . . . . . . . . . . . 5--24
Q. Yi and
Z. Yang and
S. Guo and
C. Wang and
J. Liu and
C. Zhao Eliminating Path Redundancy via
Postconditioned Symbolic Execution . . . 25--43
J. Al Dallal and
A. Abdin Empirical Evaluation of the Impact of
Object-Oriented Code Refactoring on
Quality Attributes: A Systematic
Literature Review . . . . . . . . . . . 44--69
L. Yu and
W. T. Tsai Test Case Generation for Boolean
Expressions by Cell Covering . . . . . . 70--99
Anonymous 2017 Reviewers List* . . . . . . . . . . 100--102
Luc Moreau and
Belfrit Victor Batlajery and
Trung Dong Huynh and
Danius Michaelides and
Heather Packer A Templating System to Generate
Provenance . . . . . . . . . . . . . . . 103--121
Annibale Panichella and
Fitsum Meshesha Kifetew and
Paolo Tonella Automated Test Case Generation as a
Many-Objective Optimisation Problem with
Dynamic Selection of the Targets . . . . 122--158
Thibaud Lutellier and
Devin Chollak and
Joshua Garcia and
Lin Tan and
Derek Rayside and
Nenad Medvidovi\'c and
Robert Kroeger Measuring the Impact of Code
Dependencies on Software Architecture
Recovery Techniques . . . . . . . . . . 159--181
Yi Li and
Chenguang Zhu and
Julia Rubin and
Marsha Chechik Semantic Slicing of Software Version
Histories . . . . . . . . . . . . . . . 182--201
Ying Wang and
Hai Yu and
Zhiliang Zhu and
Wei Zhang and
Yuli Zhao Automatic Software Refactoring via
Weighted Clustering in Method-Level
Networks . . . . . . . . . . . . . . . . 202--236
Kai Petersen and
Deepika Badampudi and
Syed Muhammad Ali Shah and
Krzysztof Wnuk and
Tony Gorschek and
Efi Papatheocharous and
Jakob Axelsson and
Séverine Sentilles and
Ivica Crnkovic and
Antonio Cicchetti Choosing Component Origins for Software
Intensive Systems: In-House, COTS, OSS
or Outsourcing? --- A Case Survey . . . 237--261
Luciano García-Bañuelos and
Nick R. T. P. van Beest and
Marlon Dumas and
Marcello La Rosa and
Willem Mertens Complete and Interpretable Conformance
Checking of Business Processes . . . . . 262--290
Yanchun Wang and
Qiang He and
Dayong Ye and
Yun Yang Formulating Criticality-Based
Cost-Effective Fault Tolerance
Strategies for Multi-Tenant
Service-Based Systems . . . . . . . . . 291--307
Marinos Kintis and
Mike Papadakis and
Yue Jia and
Nicos Malevris and
Yves Le Traon and
Mark Harman Detecting Trivial Mutant Equivalences
via Compiler Optimisations . . . . . . . 308--333
Haipeng Cai Hybrid Program Dependence Approximation
for Effective Dynamic Impact Prediction 334--364
Everton L. G. Alves and
Myoungkyu Song and
Tiago Massoni and
Patrícia D. L. Machado and
Miryung Kim Refactoring Inspection Support for
Manual Refactoring Edits . . . . . . . . 365--383
Xuanzhe Liu and
Huoran Li and
Xuan Lu and
Tao Xie and
Qiaozhu Mei and
Feng Feng and
Hong Mei Understanding Diverse Usage Patterns
from Large-Scale Appstore-Service
Profiles . . . . . . . . . . . . . . . . 384--411
Shane McIntosh and
Yasutaka Kamei Are Fix-Inducing Changes a Moving
Target? A Longitudinal Case Study of
Just-In-Time Defect Prediction . . . . . 412--428
Melina Mongiovi and
Rohit Gheyi and
Gustavo Soares and
Márcio Ribeiro and
Paulo Borba and
Leopoldo Teixeira Detecting Overly Strong Preconditions in
Refactoring Engines . . . . . . . . . . 429--452
Flávio Medeiros and
Márcio Ribeiro and
Rohit Gheyi and
Sven Apel and
Christian Kästner and
Bruno Ferreira and
Luiz Carvalho and
Baldoino Fonseca Discipline Matters: Refactoring of
Preprocessor Directives in the #ifdef
Hell . . . . . . . . . . . . . . . . . . 453--469
Abhijeet Banerjee and
Lee Kee Chong and
Clément Ballabriga and
Abhik Roychoudhury EnergyPatch: Repairing Resource Leaks to
Improve Energy-Efficiency of Android
Apps . . . . . . . . . . . . . . . . . . 470--490
Zhenzhou Tian and
Ting Liu and
Qinghua Zheng and
Eryue Zhuang and
Ming Fan and
Zijiang Yang Reviving Sequential Program Birthmarking
for Multithreaded Software Plagiarism
Detection . . . . . . . . . . . . . . . 491--511
Cinzia Bernardeschi and
Andrea Domenici and
Paolo Masci A PVS-Simulink Integrated Environment
for Model-Based Analysis of
Cyber-Physical Systems . . . . . . . . . 512--533
Kwabena Ebo Bennin and
Jacky Keung and
Passakorn Phannachitta and
Akito Monden and
Solomon Mensah MAHAKIL: Diversity Based Oversampling
Approach to Alleviate the Class
Imbalance Issue in Software Defect
Prediction . . . . . . . . . . . . . . . 534--550
Morakot Choetkiertikul and
Hoa Khanh Dam and
Truyen Tran and
Aditya Ghose and
John Grundy Predicting Delivery Capability in
Iterative Software Development . . . . . 551--573
Justyna Petke and
Mark Harman and
William B. Langdon and
Westley Weimer Specialising Software for Different
Downstream Applications Using Genetic
Improvement and Code Transplantation . . 574--594
Guangdong Bai and
Quanqi Ye and
Yongzheng Wu and
Heila Botha and
Jun Sun and
Yang Liu and
Jin Song Dong and
Willem Visser Towards Model Checking Android
Applications . . . . . . . . . . . . . . 595--612
Mathew Hall and
Neil Walkinshaw and
Phil McMinn Effectively Incorporating Expert
Knowledge in Automated Software
Remodularisation . . . . . . . . . . . . 613--630
Adam Betts and
Nathan Chong and
Pantazis Deligiannis and
Alastair F. Donaldson and
Jeroen Ketema Implementing and Evaluating
Candidate-Based Invariant Generation . . 631--650
Miltiadis Allamanis and
Earl T. Barr and
Christian Bird and
Premkumar Devanbu and
Mark Marron and
Charles Sutton Mining Semantic Loop Idioms . . . . . . 651--668
Ganesha Upadhyaya and
Hridesh Rajan On Accelerating Source Code Analysis at
Massive Scale . . . . . . . . . . . . . 669--688
Alessandro Margara and
Guido Salvaneschi On the Semantics of Distributed Reactive
Programming: The Cost of Consistency . . 689--711
Ameer Armaly and
Paige Rodeghero and
Collin McMillan A Comparison of Program Comprehension
Strategies by Blind and Sighted
Programmers . . . . . . . . . . . . . . 712--724
Li Li and
Jun Sun and
Yang Liu and
Meng Sun and
Jin-Song Dong A Formal Specification and Verification
Framework for Timed Security Protocols 725--746
Francesco Adalberto Bianchi and
Alessandro Margara and
Mauro Pezz\`e A Survey of Recent Trends in Testing
Concurrent Software Systems . . . . . . 747--783
Stepan Shevtsov and
Mihaly Berekmeri and
Danny Weyns and
Martina Maggio Control-Theoretical Software Adaptation:
A Systematic Literature Review . . . . . 784--810
Steffen Herbold and
Alexander Trautsch and
Jens Grabowski A Comparative Study to Benchmark
Cross-Project Defect Prediction
Approaches . . . . . . . . . . . . . . . 811--833
Le Yu and
Xiapu Luo and
Chenxiong Qian and
Shuai Wang and
Hareton K. N. Leung Enhancing the Description-to-Behavior
Fidelity in Android Apps with Privacy
Policy . . . . . . . . . . . . . . . . . 834--854
Eiji Adachi Barbosa and
Alessandro Garcia Global-Aware Recommendations for
Repairing Violations in Exception
Handling . . . . . . . . . . . . . . . . 855--873
Jaechang Nam and
Wei Fu and
Sunghun Kim and
Tim Menzies and
Lin Tan Heterogeneous Defect Prediction . . . . 874--896
Paul W. McBurney and
Siyuan Jiang and
Marouane Kessentini and
Nicholas A. Kraft and
Ameer Armaly and
Mohamed Wiem Mkaouer and
Collin McMillan Towards Prioritizing Documentation
Effort . . . . . . . . . . . . . . . . . 897--913
Donghwan Shin and
Shin Yoo and
Doo-Hwan Bae A Theoretical and Empirical Study of
Diversity-Aware Mutation Adequacy
Criterion . . . . . . . . . . . . . . . 914--931
Saskia Bick and
Kai Spohrer and
Rashina Hoda and
Alexander Scheerer and
Armin Heinzl Coordination Challenges in Large-Scale
Software Development: A Case Study of
Planning Misalignment in Hybrid Settings 932--950
Xin Xia and
Lingfeng Bao and
David Lo and
Zhenchang Xing and
Ahmed E. Hassan and
Shanping Li Measuring Program Comprehension: A
Large-Scale Field Study with
Professionals . . . . . . . . . . . . . 951--976
Fabio Palomba and
Annibale Panichella and
Andy Zaidman and
Rocco Oliveto and
Andrea De Lucia The Scent of a Smell: An Extensive
Comparison Between Textual and
Structural Smells . . . . . . . . . . . 977--1000
Ah-Rim Han and
Sungdeok Cha Two-Phase Assessment Approach to Improve
the Efficiency of Refactoring
Identification . . . . . . . . . . . . . 1001--1023
Miryung Kim and
Thomas Zimmermann and
Robert DeLine and
Andrew Begel Data Scientists in Software Teams: State
of the Art and Challenges . . . . . . . 1024--1038
Radu Calinescu and
Danny Weyns and
Simos Gerasimou and
Muhammad Usman Iftikhar and
Ibrahim Habli and
Tim Kelly Engineering Trustworthy Self-Adaptive
Software with Dynamic Assurance Cases 1039--1069
Feng Zhang and
Haoran Niu and
Iman Keivanloo and
Ying Zou Expanding Queries for Code Search Using
Semantically Related API Class-names . . 1070--1082
Sergio Segura and
José A. Parejo and
Javier Troya and
Antonio Ruiz-Cortés Metamorphic Testing of RESTful Web APIs 1083--1099
Kostadin Damevski and
Hui Chen and
David C. Shepherd and
Nicholas A. Kraft and
Lori Pollock Predicting Future Developer Behavior in
the IDE Using Topic Models . . . . . . . 1100--1111
Zhe Wang and
Chenggang Wu and
Xiang Yuan and
Zhenjiang Wang and
Jianjun Li and
Pen-Chung Yew and
Jeff Huang and
Xiaobing Feng and
Yanyan Lan and
Yunji Chen and
Yuanming Lai and
Yong Guan Using Local Clocks to Reproduce
Concurrency Bugs . . . . . . . . . . . . 1112--1128
Martin Shepperd and
Tracy Hall and
David Bowes Authors' Reply to ``Comments on
Researcher Bias: The Use of Machine
Learning in Software Defect Prediction'' 1129--1131
Marc Palyart and
Gail C. Murphy and
Vaden Masrani A Study of Social Interactions in Open
Source Component Use . . . . . . . . . . 1132--1145
Mirco Franzago and
Davide Di Ruscio and
Ivano Malavolta and
Henry Muccini Collaborative Model-Driven Software
Engineering: A Classification Framework
and a Research Map . . . . . . . . . . . 1146--1175
Rodrigo Morales and
Rubén Saborido and
Foutse Khomh and
Francisco Chicano and
Giuliano Antoniol EARMO: An Energy-Aware Refactoring
Approach for Mobile Apps . . . . . . . . 1176--1206
V. B. Singh and
Meera Sharma and
Hoang Pham Entropy Based Software Reliability
Analysis of Multi-Version Open Source
Software . . . . . . . . . . . . . . . . 1207--1223
Mayy Habayeb and
Syed Shariyar Murtaza and
Andriy Miranskyy and
Ayse Basar Bener On the Use of Hidden Markov Model to
Predict the Time to Fix Bugs . . . . . . 1224--1244
Mohamed Sami Rakha and
Cor-Paul Bezemer and
Ahmed E. Hassan Revisiting the Performance Evaluation of
Automated Approaches for the Retrieval
of Duplicate Issue Reports . . . . . . . 1245--1268
Max Lillack and
Christian Kästner and
Eric Bodden Tracking Load-Time Configuration Options 1269--1291
Nenad Medvidovic Editorial: State of the Journal . . . . 1
Anonymous 2018 Index IEEE Transactions on Software
Engineering Vol. 44 . . . . . . . . . . 1--9
Andrea Margheri and
Massimiliano Masi and
Rosario Pugliese and
Francesco Tiezzi A Rigorous Framework for Specification,
Analysis and Enforcement of Access
Control Policies . . . . . . . . . . . . 2--33
Luca Gazzola and
Daniela Micucci and
Leonardo Mariani Automatic Software Repair: A Survey . . 34--67
Simone Scalabrino and
Gabriele Bavota and
Barbara Russo and
Massimiliano Di Penta and
Rocco Oliveto Listening to the Crowd for the Release
Planning of Mobile Apps . . . . . . . . 68--86
Eirini Kalliamvakou and
Christian Bird and
Thomas Zimmermann and
Andrew Begel and
Robert DeLine and
Daniel M. German What Makes a Great Manager of Software
Engineers? . . . . . . . . . . . . . . . 87--106
Anonymous 2018 Reviewers List . . . . . . . . . . 107--110
Seyedrebvar Hosseini and
Burak Turhan and
Dimuthu Gunarathna A Systematic Literature Review and
Meta-Analysis on Cross Project Defect
Prediction . . . . . . . . . . . . . . . 111--147
Hong Lu and
Shuai Wang and
Tao Yue and
Shaukat Ali and
Jan F. Nygård Automated Refactoring of OCL Constraints
with Search . . . . . . . . . . . . . . 148--170
Yao Pan and
Jules White and
Yu Sun and
Jeff Gray Gray Computing: A Framework for
Computing with Background JavaScript
Tasks . . . . . . . . . . . . . . . . . 171--193
Fabio Palomba and
Marco Zanoni and
Francesca Arcelli Fontana and
Andrea De Lucia and
Rocco Oliveto Toward a Smell-Aware Bug Prediction
Model . . . . . . . . . . . . . . . . . 194--218
Jonathan Dorn and
Jeremy Lacomis and
Westley Weimer and
Stephanie Forrest Automatically Exploring Tradeoffs
Between Software Output Fidelity and
Energy Costs . . . . . . . . . . . . . . 219--236
Klaas-Jan Stol and
Bora Caglayan and
Brian Fitzgerald Competition-Based Crowdsourcing Software
Development: a Multi-Method Study from a
Customer Perspective . . . . . . . . . . 237--260
Moritz Beller and
Georgios Gousios and
Annibale Panichella and
Sebastian Proksch and
Sven Amann and
Andy Zaidman Developer Testing in the IDE: Patterns,
Beliefs, and Behavior . . . . . . . . . 261--284
Narayan Ramasubbu and
Chris F. Kemerer Integrating Technical Debt Management
and Software Quality Management
Processes: A Normative Framework and
Field Tests . . . . . . . . . . . . . . 285--300
Ruizhi Gao and
W. Eric Wong MSeer --- An Advanced Technique for
Locating Multiple Bugs in Parallel . . . 301--318
H. Zhong and
H. Mei An Empirical Study on API Usages . . . . 319--334
S. Jan and
A. Panichella and
A. Arcuri and
L. Briand Automatic Generation of Tests to Exploit
XML Injection Vulnerabilities in Web
Applications . . . . . . . . . . . . . . 335--362
A. Marchetto and
G. Scanniello and
A. Susi Combining Code and Requirements Coverage
with Execution Cost for Test Suite
Reduction . . . . . . . . . . . . . . . 363--390
Z. Li and
X. Jing and
X. Zhu and
H. Zhang and
B. Xu and
S. Ying On the Multiple Sources and Privacy
Preservation Issues for Heterogeneous
Defect Prediction . . . . . . . . . . . 391--411
R. Clarisó and
C. A. González and
J. Cabot Smart Bound Selection for the
Verification of UML/OCL Class Diagrams 412--426
P. McMinn and
C. J. Wright and
C. J. McCurdy and
G. M. Kapfhammer Automatic Detection and Removal of
Ineffective Mutants for the Mutation
Analysis of Relational Database Schemas 427--463
L. Ponzanelli and
G. Bavota and
A. Mocci and
R. Oliveto and
M. D. Penta and
S. Haiduc and
B. Russo and
M. Lanza Automatic Identification and
Classification of Software Development
Video Tutorial Fragments . . . . . . . . 464--488
M. Böhme and
V. Pham and
A. Roychoudhury Coverage-Based Greybox Fuzzing as Markov
Chain . . . . . . . . . . . . . . . . . 489--506
P. Arcaini and
A. Gargantini and
E. Riccobene Decomposition-Based Approach for
Model-Based Test Generation . . . . . . 507--520
S. Frey and
A. Rashid and
P. Anthonysamy and
M. Pinto-Albuquerque and
S. A. Naqvi The Good, the Bad and the Ugly: A Study
of Security Decisions in a
Cyber-Physical Systems Game . . . . . . 521--536
X. Xie and
B. Chen and
L. Zou and
Y. Liu and
W. Le and
X. Li Automatic Loop Summarization via Path
Dependency Analysis . . . . . . . . . . 537--557
T. Yu and
W. Wen and
X. Han and
J. H. Hayes ConPredictor: Concurrency Defect
Prediction in Real-World Applications 558--575
L. Mottola and
G. P. Picco and
F. J. Oppermann and
J. Eriksson and
N. Finne and
H. Fuchs and
A. Gaglione and
S. Karnouskos and
P. M. Montero and
N. Oertel and
K. Römer and
P. Spieß and
S. Tranquillini and
T. Voigt makeSense: Simplifying the Integration
of Wireless Sensor Networks into
Business Processes . . . . . . . . . . . 576--596
J. Chen and
V. Nair and
R. Krishna and
T. Menzies Sampling as a Baseline Optimizer for
Search-Based Software Engineering . . . 597--614
F. Peters and
T. T. Tun and
Y. Yu and
B. Nuseibeh Text Filtering and Ranking for Security
Bug Report Prediction . . . . . . . . . 615--631
S. Herbold and
A. Trautsch and
J. Grabowski Correction of A Comparative Study to
Benchmark Cross-Project Defect
Prediction Approaches . . . . . . . . . 632--636
M. Choetkiertikul and
H. K. Dam and
T. Tran and
T. Pham and
A. Ghose and
T. Menzies A Deep Learning Model for Estimating
Story Points . . . . . . . . . . . . . . 637--656
Y. Cai and
L. Xiao and
R. Kazman and
R. Mo and
Q. Feng Design Rule Spaces: A New Model for
Representing and Analyzing Software
Architecture . . . . . . . . . . . . . . 657--682
C. Tantithamthavorn and
S. McIntosh and
A. E. Hassan and
K. Matsumoto The Impact of Automated Parameter
Optimization on Defect Prediction Models 683--711
P. Ralph Toward Methodological Guidelines for
Process Theories and Taxonomies in
Software Engineering . . . . . . . . . . 712--735
D. van der Linden and
I. Hadar A Systematic Literature Review of
Applications of the Physics of Notations 736--759
A. Ramírez and
J. R. Romero and
C. L. Simons A Systematic Review of Interaction in
Search-Based Software Engineering . . . 760--781
W. Song and
X. Ma and
H. Jacobsen Instance Migration Validity for Dynamic
Evolution of Data-Aware Processes . . . 782--801
M. D. Harrison and
P. Masci and
J. C. Campos Verification Templates for the Analysis
of User Interface Software Design . . . 802--822
L. Bao and
Z. Xing and
X. Xia and
D. Lo VT-Revolution: Interactive Programming
Video Tutorial Authoring and Watching
System . . . . . . . . . . . . . . . . . 823--838
M. Nayebi and
G. Ruhe Asymmetric Release Planning:
Compromising Satisfaction against
Dissatisfaction . . . . . . . . . . . . 839--857
G. Chari and
D. Garbervetsky and
S. Marr and
S. Ducasse Fully Reflective Execution Environments:
Virtual Machines for More Flexible
Software . . . . . . . . . . . . . . . . 858--876
J. Smith and
B. Johnson and
E. Murphy-Hill and
B. Chu and
H. R. Lipford How Developers Diagnose Potential
Security Vulnerabilities with a Static
Analysis Tool . . . . . . . . . . . . . 877--897
J. Zhang and
L. Zhang and
M. Harman and
D. Hao and
Y. Jia and
L. Zhang Predictive Mutation Testing . . . . . . 898--918
R. Matinnejad and
S. Nejati and
L. C. Briand and
T. Bruckmann Test Generation and Test Prioritization
for Simulink Models with Dynamic
Behavior . . . . . . . . . . . . . . . . 919--944
S. Dashevskyi and
A. D. Brucker and
F. Massacci A Screening Test for Disclosed
Vulnerabilities in FOSS Components . . . 945--966
M. Mesgari and
C. Okoli and
A. O. de Guinea Creating Rich and Representative
Personas by Discovering Affordances . . 967--983
P. Bian and
B. Liang and
Y. Zhang and
C. Yang and
W. Shi and
Y. Cai Detecting Bugs by Discovering
Expectations and Their Violations . . . 984--1001
T. Hoang and
R. J. Oentaryo and
T. B. Le and
D. Lo Network-Clustered Multi-Modal Bug
Localization . . . . . . . . . . . . . . 1002--1023
F. Palma and
N. Moha and
Y. Guéhéneuc UniDoSA: The Unified Specification and
Detection of Service Antipatterns . . . 1024--1053
Q. Luo and
K. Moran and
L. Zhang and
D. Poshyvanyk How Do Static and Dynamic Test Case
Prioritization Techniques Perform on
Modern Software Systems? An Extensive
Study on GitHub Projects . . . . . . . . 1054--1080
R. Krishna and
T. Menzies Bellwethers: A Baseline Method for
Transfer Learning . . . . . . . . . . . 1081--1105
T. D. LaToza and
A. Di Lecce and
F. Ricci and
W. B. Towne and
A. van der Hoek Microtask Programming . . . . . . . . . 1106--1124
Y. Xue and
Z. Xu and
M. Chandramohan and
Y. Liu Accurate and Scalable Cross-Architecture
Cross-OS Binary Code Search with
Emulation . . . . . . . . . . . . . . . 1125--1149
B. R. Bruce and
J. Petke and
M. Harman and
E. T. Barr Approximate Oracles and Synergy in
Software Energy Search Spaces . . . . . 1150--1169
S. Amann and
H. A. Nguyen and
S. Nadi and
T. N. Nguyen and
M. Mezini A Systematic Evaluation of Static
API-Misuse Detectors . . . . . . . . . . 1170--1188
O. Al-Baik and
J. Miller Integrative Double Kaizen Loop (IDKL):
Towards a Culture of Continuous Learning
and Sustainable Improvements for
Software Organizations . . . . . . . . . 1189--1210
M. Yan and
X. Xia and
E. Shihab and
D. Lo and
J. Yin and
X. Yang Automating Change-Level Self-Admitted
Technical Debt Determination . . . . . . 1211--1229
G. Canfora and
F. Martinelli and
F. Mercaldo and
V. Nardone and
A. Santone and
C. A. Visaggio LEILA: Formal Tool for Identifying
Mobile Malicious Behaviour . . . . . . . 1230--1252
Q. Song and
Y. Guo and
M. Shepperd A Comprehensive Investigation of the
Role of Imbalanced Learning for Software
Defect Prediction . . . . . . . . . . . 1253--1269
H. Mercan and
C. Yilmaz and
K. Kaya CHiP: A Configurable Hybrid Parallel
Covering Array Constructor . . . . . . . 1270--1291
P. Bian and
B. Liang and
Y. Zhang and
C. Yang and
W. Shi and
Y. Cai Corrections to ``Detecting Bugs by
Discovering Expectations and Their
Violations'' . . . . . . . . . . . . . . 113--113
C. França and
F. Q. B. da Silva and
H. Sharp Motivation and Satisfaction of Software
Engineers . . . . . . . . . . . . . . . 118--140
X. Niu and
C. Nie and
J. Y. Lei and
H. Leung and
X. Wang Identifying Failure-Causing Schemas in
the Presence of Multiple Faults . . . . 141--162
J. Thomé and
L. K. Shar and
D. Bianculli and
L. Briand An Integrated Approach for Effective
Injection Vulnerability Analysis of Web
Applications Through Security Slicing
and Hybrid Constraint Solving . . . . . 163--195
K. Moran and
C. Bernal-Cárdenas and
M. Curcio and
R. Bonett and
D. Poshyvanyk Machine Learning-Based Prototyping of
Graphical User Interfaces for Mobile
Apps . . . . . . . . . . . . . . . . . . 196--221
J. Vilela and
J. Castro and
L. E. G. Martins and
T. Gorschek Safety Practices in Requirements
Engineering: The Uni-REPM Safety Module 222--250
F. Basciani and
M. D'Emidio and
D. D. Ruscio and
D. Frigioni and
L. Iovino and
A. Pierantonio Automated Selection of Optimal Model
Transformation Chains via Shortest-Path
Algorithms . . . . . . . . . . . . . . . 251--279
R. Natella and
S. Winter and
D. Cotroneo and
N. Suri Analyzing the Effects of Bugs on
Software Interfaces . . . . . . . . . . 280--301
H. Wu and
C. Nie and
J. Petke and
Y. Jia and
M. Harman An Empirical Comparison of Combinatorial
Testing, Random Testing and Adaptive
Random Testing . . . . . . . . . . . . . 302--320
M. H. Ter Beek and
A. Legay and
A. L. Lafuente and
A. Vandin A Framework for Quantitative Modeling
and Analysis of Highly (Re)configurable
Systems . . . . . . . . . . . . . . . . 321--345
L. E. G. Martins and
T. Gorschek Requirements Engineering for
Safety-Critical Systems: An Interview
Study with Industry Practitioners . . . 346--361
B. Meyers and
H. Vangheluwe and
J. Denil and
R. Salay A Framework for Temporal Verification
Support in Domain-Specific Modelling . . 362--404
T. Yu and
Z. Huang and
C. Wang ConTesa: Directed Test Suite
Augmentation for Concurrent Software . . 405--419
D. Falessi and
J. Roll and
J. L. C. Guo and
J. Cleland-Huang Leveraging Historical Associations
between Requirements and Source Code to
Identify Impacted Classes . . . . . . . 420--441
N. Peitek and
J. Siegmund and
S. Apel and
C. Kästner and
C. Parnin and
A. Bethmann and
T. Leich and
G. Saake and
A. Brechmann A Look into Programmers Heads . . . . . 442--462
Yinxing Xue and
Zhengzi Xu and
Mahinthan Chandramohan and
Yang Liu Erratum to Accurate and Scalable
Cross-Architecture Cross-OS Binary Code
Search With Emulation . . . . . . . . . 1088--1088