default search action
Empirical Software Engineering, Volume 21
Volume 21, Number 1, February 2016
- Appreciation to empirical software engineering reviewers of 2015. 1-3
- Abdullah Khalili, Ashkan Sami, Mahdi Azimi, Sara Moshtari, Zahra Salehi, Mahboobe Ghiasi, Ali Akbar Safavi:
Employing secure coding practices into industrial applications: a case study. 4-16 - Paul W. McBurney, Collin McMillan:
An empirical study of the textual similarity between source code and source code summaries. 17-42 - Duksan Ryu, Okjoo Choi, Jongmoon Baik:
Value-cognitive boosting with a support vector machine for cross-project defect prediction. 43-71 - Anna Corazza, Sergio Di Martino, Valerio Maggio, Giuseppe Scanniello:
Weighing lexical information for software clustering in the context of architecture recovery. 72-103 - Venera Arnaoudova, Massimiliano Di Penta, Giuliano Antoniol:
Linguistic antipatterns: what they are and how developers perceive them. 104-158 - Yuepu Guo, Rodrigo Oliveira Spínola, Carolyn B. Seaman:
Exploring the costs of technical debt management - a case study. 159-182 - Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon:
Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios. 183-211 - Ana M. Fernández-Sáez, Marcela Genero, Danilo Caivano, Michel R. V. Chaudron:
Does the level of detail of UML diagrams affect the maintainability of source code?: a family of experiments. 212-259 - Daniel M. Germán, Bram Adams, Ahmed E. Hassan:
Continuously mining distributed version control systems: an empirical study of how Linux uses Git. 260-299
Volume 21, Number 2, April 2016
- Massimiliano Di Penta, Sunghun Kim:
Guest editorial: Special section on mining software repositories. 301-302 - Kim Herzig, Sascha Just, Andreas Zeller:
The impact of tangled code changes on defect prediction models. 303-336 - Shaohua Wang, Foutse Khomh, Ying Zou:
Improving bug management using correlations in crash reports. 337-367 - Abram Hindle, Anahita Alipour, Eleni Stroulia:
A contextual approach towards more accurate duplicate bug report detection and ranking. 368-410 - Heiko Koziolek, Thomas Goldschmidt, Thijmen de Gooijer, Dominik Domis, Stephan Sehestedt, Thomas Gamer, Markus Aleksy:
Assessing software product line potential: an exploratory industrial case study. 411-448 - Claus Hunsen, Bo Zhang, Janet Siegmund, Christian Kästner, Olaf Leßenich, Martin Becker, Sven Apel:
Preprocessor-based variability in open-source and industrial software systems: An empirical study. 449-482 - Santiago A. Vidal, Alexandre Bergel, Claudia A. Marcos, J. Andrés Díaz Pace:
Understanding and addressing exhibitionism in Java empirical research about method accessibility. 483-516 - Wai Ting Cheung, Sukyoung Ryu, Sunghun Kim:
Development nature matters: An empirical study of code clones in JavaScript applications. 517-564 - Suntae Kim, Dongsun Kim:
Automatic identifier inconsistency detection using code dictionary. 565-604 - Ayse Tosun Misirli, Emad Shihab, Yasutaka Kamei:
Studying high impact fix-inducing changes. 605-641 - Ingo Scholtes, Pavlin Mavrodiev, Frank Schweitzer:
From Aristotle to Ringelmann: a large-scale analysis of team productivity and coordination in Open Source Software projects. 642-683 - Hussan Munir, Krzysztof Wnuk, Per Runeson:
Open innovation in software engineering: a systematic mapping study. 684-723 - Kostadin Damevski, David C. Shepherd, Lori L. Pollock:
A field study of how developers locate features in source code. 724-747
Volume 21, Number 3, June 2016
- Romain Robbes, Rocco Oliveto, Massimiliano Di Penta:
Guest editorial: special section on software reverse engineering. 749-752 - Xi Chen, Asia Slowinska, Herbert Bos:
On the detection of custom memory allocators in C binaries. 753-777 - István Haller, Asia Slowinska, Herbert Bos:
Scalable data structure detection and classification for C/C++ binaries. 778-810 - Neil Walkinshaw, Ramsay Taylor, John Derrick:
Inferring extended finite state machine models from software executions. 811-853 - Cristiano Amaral Maffort, Marco Túlio Valente, Ricardo Terra, Mariza Andrade da Silva Bigonha, Nicolas Anquetil, André C. Hora:
Mining architectural violations from version history. 854-895 - Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, Mohammad Zulkernine:
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. 896-931 - Olga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey:
Investigating technical and non-technical factors influencing modern code review. 932-959 - Bram Adams, Ryan Kavanagh, Ahmed E. Hassan, Daniel M. Germán:
An empirical study of integration activities in distributions of open source software. 960-1001 - Fabio Calefato, Filippo Lanubile, Tayana Conte, Rafael Prikladnicki:
Assessing the impact of real-time machine translation on multilingual meetings in global software projects. 1002-1034 - Yu-Cheng Tu, Ewan D. Tempero, Clark D. Thomborson:
An experiment on the impact of transparency on the effectiveness of requirements documents. 1035-1066 - Stuart McIlroy, Nasir Ali, Hammad Khalid, Ahmed E. Hassan:
Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews. 1067-1106 - Surafel Lemma Abebe, Nasir Ali, Ahmed E. Hassan:
An empirical study of software release notes. 1107-1142 - Francesca Arcelli Fontana, Mika V. Mäntylä, Marco Zanoni, Alessandro Marino:
Comparing and experimenting machine learning techniques for code smell detection. 1143-1191 - Christoffer Rosen, Emad Shihab:
What are mobile developers asking about? A large scale study using stack overflow. 1192-1223 - Julián Grigera, Alejandra Garrido, José Ignacio Panach, Damiano Distante, Gustavo Rossi:
Assessing refactorings for usability in e-commerce applications. 1224-1271 - Saleh M. Alnaeli, Jonathan I. Maletic, Michael L. Collard:
An empirical examination of the prevalence of inhibitors to the parallelizability of open source software systems. 1272-1301 - Breno Bernard Nicolau de França, Guilherme Horta Travassos:
Experimentation with dynamic simulation models in software engineering: planning and reporting guidelines. 1302-1345 - Stuart McIlroy, Nasir Ali, Ahmed E. Hassan:
Fresh apps: an empirical study of frequently-updated mobile apps in the Google play store. 1346-1370 - Jens Dietrich, Kamil Jezek, Premek Brada:
What Java developers know about compatibility, and why this matters. 1371-1396 - Jie Chen, Junchao Xiao, Qing Wang, Leon J. Osterweil, Mingshu Li:
Perspectives on refactoring planning and practice: an empirical study. 1397-1436
Volume 21, Number 4, August 2016
- Saïd Assar, Markus Borg, Dietmar Pfahl:
Using text clustering to predict defect resolution time: a conceptual replication and an evaluation of prediction accuracy. 1437-1475 - Debarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft:
Code clones and developer behavior: results of two surveys of the clone research community. 1476-1508 - Makrina Viola Kosti, Robert Feldt, Lefteris Angelis:
Archetypal personalities of software engineers and their work preferences: a new perspective for empirical studies. 1509-1532 - Leif Jonsson, Markus Borg, David Broman, Kristian Sandahl, Sigrid Eldh, Per Runeson:
Automated bug assignment: Ensemble-based machine learning in large scale industrial contexts. 1533-1578 - Ebrahim Bagheri, David Benavides, Klaus Schmid, Per Runeson:
Foreword to the special issue on empirical evidence on software product line engineering. 1579-1585 - Shuai Wang, Shaukat Ali, Arnaud Gotlieb, Marius Liaaen:
A systematic test case selection methodology for product lines: results and insights from an industrial case study. 1586-1622 - Varvana Myllärniemi, Juha Savolainen, Mikko Raatikainen, Tomi Männistö:
Performance variability in software product lines: proposing theories from a case study. 1623-1669 - Stefan Sobernig, Sven Apel, Sergiy S. Kolesnikov, Norbert Siegmund:
Quantifying structural attributes of system decompositions in 28 feature-oriented software product lines - An exploratory study. 1670-1705 - Mohsen Asadi, Samaneh Soltani, Dragan Gasevic, Marek Hatala:
The effects of visualization and interaction techniques on feature model configuration. 1706-1743 - Leonardo Teixeira Passos, Leopoldo Teixeira, Nicolas Dintzner, Sven Apel, Andrzej Wasowski, Krzysztof Czarnecki, Paulo Borba, Jianmei Guo:
Coevolution of variability models and related software artifacts - A fresh look at evolution patterns in the Linux kernel. 1744-1793 - Guillaume Bécan, Mathieu Acher, Benoit Baudry, Sana Ben Nasr:
Breathing ontological knowledge into feature model synthesis: an empirical study. 1794-1841
Volume 21, Number 5, October 2016
- Tse-Hsun Chen, Stephen W. Thomas, Ahmed E. Hassan:
A survey on the use of topic models when mining software repositories. 1843-1919 - Munawar Hafiz, Ming Fang:
Game of detections: how are security vulnerabilities discovered in the wild? 1920-1959 - Mohamed Sami Rakha, Weiyi Shang, Ahmed E. Hassan:
Studying the needed effort for identifying duplicate issues. 1960-1989 - Quinten David Soetens, Serge Demeyer, Andy Zaidman, Javier Pérez:
Change-based test selection: an empirical evaluation. 1990-2032 - Martin Pinzger, Sunghun Kim:
Guest editorial: mining software repositories. 2033-2034 - Eirini Kalliamvakou, Georgios Gousios, Kelly Blincoe, Leif Singer, Daniel M. Germán, Daniela E. Damian:
An in-depth study of the promises and perils of mining GitHub. 2035-2071 - Yasutaka Kamei, Takafumi Fukushima, Shane McIntosh, Kazuhiro Yamashita, Naoyasu Ubayashi, Ahmed E. Hassan:
Studying just-in-time defect prediction using cross-project models. 2072-2106 - Feng Zhang, Audris Mockus, Iman Keivanloo, Ying Zou:
Towards building a universal defect prediction model with rank transformed predictors. 2107-2145 - Shane McIntosh, Yasutaka Kamei, Bram Adams, Ahmed E. Hassan:
An empirical study of the impact of modern code review practices on software quality. 2146-2189 - Luca Ponzanelli, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Michele Lanza:
Prompter - Turning the IDE into a self-confident programming assistant. 2190-2231
Volume 21, Number 6, December 2016
- Yi Wang, David F. Redmiles:
Cheap talk, cooperation, and trust in global software engineering - An evolutionary game theory model with empirical support. 2233-2267 - Viet Hung Nguyen, Stanislav Dashevskyi, Fabio Massacci:
An automatic method for assessing the versions affected by a vulnerability. 2268-2297 - Yuan Tian, Nasir Ali, David Lo, Ahmed E. Hassan:
On the unreliability of bug severity data. 2298-2323 - Michael Unterkalmsteiner, Tony Gorschek, Robert Feldt, Niklas Lavesson:
Large-scale information retrieval in software engineering - an experience report from industrial application. 2324-2365 - Wei Wu, Foutse Khomh, Bram Adams, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
An exploratory study of api changes and usages based on apache and eclipse ecosystems. 2366-2412 - Xiang Li, Chetan Mutha, Carol S. Smidts:
An automated software reliability prediction system for safety critical software. 2413-2455 - Marouane Kessentini, Günther Ruhe:
A guest editorial: special section on search-based software engineering. 2456-2458 - Shaukat Ali, Muhammad Zohaib Iqbal, Maham Khalid, Andrea Arcuri:
Improving the performance of OCL constraint solving with novel heuristics for logical operations: a search-based approach. 2459-2502 - Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, Mel Ó Cinnéide, Kalyanmoy Deb:
On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach. 2503-2545 - Aurora Ramírez, José Raúl Romero, Sebastián Ventura:
A comparative study of many-objective evolutionary algorithms for the discovery of software architectures. 2546-2600
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.