


default search action
IEEE Transactions on Software Engineering, Volume 51
Volume 51, Number 1, January 2025
- Zexu Wang

, Jiachi Chen
, Peilin Zheng
, Yu Zhang
, Weizhe Zhang
, Zibin Zheng
:
Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools. 1-13 - Delano Oliveira

, Reydne Santos
, Benedito de Oliveira
, Martin Monperrus
, Fernando Castor
, Fernanda Madeiral
:
Understanding Code Understandability Improvements in Code Reviews. 14-37 - Jiannan Wang

, Hung Viet Pham, Qi Li
, Lin Tan
, Yu Guo, Adnan Aziz, Erik Meijer:
D3: Differential Testing of Distributed Deep Learning With Model Generation. 38-52 - Mirko Köhler

, George Zakhour
, Pascal Weisenburger
, Guido Salvaneschi
:
Consistent Local-First Software: Enforcing Safety and Invariants for Local-First Applications. 53-65 - Xuyan Ma

, Yawen Wang
, Junjie Wang
, Xiaofei Xie
, Boyu Wu
, Yiguang Yan
, Shoubin Li
, Fanjiang Xu
, Qing Wang
:
Diversity-Oriented Testing for Competitive Game Agent via Constraint-Guided Adversarial Agent Training. 66-81 - Amirhossein Zolfagharian

, Manel Abdellatif
, Lionel C. Briand
, S. Ramesh
:
SMARLA: A Safety Monitoring Approach for Deep Reinforcement Learning Agents. 82-105 - Jingzhi Gong

, Tao Chen
, Rami Bahsoon
:
Dividable Configuration Performance Learning. 106-134 - Itir Karac

, José Ignacio Panach
, Burak Turhan
, Natalia Juristo
:
Does Treatment Adherence Impact Experiment Results in TDD? 135-152 - Yu Liu

, Tong Li
, Runzi Zhang
, Zhao Jin
, Mingkai Tong
, Wenmao Liu
, Yiting Wang
, Zhen Yang
:
A Context-Aware Clustering Approach for Assisting Operators in Classifying Security Alerts. 153-171 - Shouyu Yin

, Shikai Guo
, Hui Li
, Chenchen Li
, Rong Chen
, Xiaochen Li
, He Jiang
:
Line-Level Defect Prediction by Capturing Code Contexts With Graph Convolutional Networks. 172-191 - José Antonio Hernández López

, Boqi Chen
, Mootez Saad
, Tushar Sharma
, Dániel Varró
:
On Inter-Dataset Code Duplication and Data Leakage in Large Language Models. 192-205 - Rongxin Wu

, Zhiling Huang
, Zige Tian
, Chengpeng Wang
, Xiangyu Zhang
:
PackHunter: Recovering Missing Packages for C/C++ Projects. 206-219 - Morakot Choetkiertikul

, Peerachai Banyongrakkul
, Chaiyong Ragkhitwetsagul
, Suppawong Tuarob
, Hoa Khanh Dam
, Thanwadee Sunetnanta
:
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development. 220-242 - Xiaoxue Ma

, Huiqi Zou
, Pinjia He
, Jacky Keung
, Yishu Li
, Xiao Yu
, Federica Sarro
:
On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations. 243-261 - Johan Martinson

, Wardah Mahmood
, Jude Gyimah
, Thorsten Berger
:
FM-PRO: A Feature Modeling Process. 262-282 - Chunrong Fang

, Shengcheng Yu
, Quanjun Zhang
, Xin Li
, Yulei Liu
, Zhenyu Chen
:
Enhanced Crowdsourced Test Report Prioritization via Image-and-Text Semantic Understanding and Feature Integration. 283-304 - Ishrak Hayet

, Adam Scott
, Marcelo d'Amorim
:
ChatAssert: LLM-Based Test Oracle Generation With External Tools Assistance. 305-319
Volume 51, Number 2, February 2025
- Viktor Csuvik

, Dániel Horváth
, Márk Lajkó, László Vidács
:
GenProgJS: A Baseline System for Test-Based Automated Repair of JavaScript Programs. 325-343 - Javier Hernandez

, Vedant Das Swain
, Jina Suh
, Daniel McDuff
, Judith Amores
, Gonzalo Ramos
, Kael Rowan
, Brian Houck
, Shamsi T. Iqbal
, Mary Czerwinski
:
Triple Peak Day: Work Rhythms of Software Developers in Hybrid Work. 344-354 - Marco Edoardo Palma

, Alex Wolf
, Pasquale Salza
, Harald C. Gall
:
On-the-Fly Syntax Highlighting: Generalisation and Speed-Ups. 355-370 - Pin Ji

, Yang Feng
, Duo Wu
, Lingyue Yan
, Penglin Chen
, Jia Liu
, Zhihong Zhao
:
MoCo: Fuzzing Deep Learning Libraries via Assembling Code. 371-388 - Yixuan Tang

, Jingxuan Zhang
, Xiaochen Li, Zhiqiu Huang
, He Jiang
:
Detecting Compiler Error Recovery Defects via Program Mutation Exploration. 389-412 - Yuheng Huang

, Jiayang Song
, Zhijie Wang
, Shengming Zhao
, Huaming Chen
, Felix Juefei-Xu
, Lei Ma
:
Look Before You Leap: An Exploratory Study of Uncertainty Analysis for Large Language Models. 413-429 - Kelson Silva

, Jorge Melegati
, Fábio Fagundes Silveira
, Xiaofeng Wang
, Maurício Gonçalves Vieira Ferreira, Eduardo Guerra
:
ArchHypo: Managing Software Architecture Uncertainty Using Hypotheses Engineering. 430-448 - Hongzhou Fang

, Yuanfang Cai
, Ewan D. Tempero
, Rick Kazman
, Yu-Cheng Tu
, Jason Lefever
, Ernst Pisch
:
A Holistic Approach to Design Understanding Through Concept Explanation. 449-465 - Linyi Han

, Shidong Pan
, Zhenchang Xing
, Jiamou Sun
, Sofonias Yitagesu
, Xiaowang Zhang
, Zhiyong Feng
:
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference. 466-483 - Chenxing Zhong

, Shanshan Li
, He Zhang
, Huang Huang
, Lanxin Yang
, Yuanfang Cai
:
Refactoring Microservices to Microservices in Support of Evolutionary Design. 484-502 - Yuan Huang

, Jinbo Huang
, Xiangping Chen
, Zibin Zheng
:
Towards Improving the Performance of Comment Generation Models by Using Bytecode Information. 503-520 - Yaoxian Li

, Shiyi Qi
, Cuiyun Gao
, Yun Peng
, David Lo
, Michael R. Lyu
, Zenglin Xu
:
Understanding the Robustness of Transformer-Based Code Intelligence via Code Transformation: Challenges and Opportunities. 521-547 - Pengzhou Chen

, Jingzhi Gong
, Tao Chen
:
Accuracy Can Lie: On the Impact of Surrogate Model in Configuration Tuning. 548-580 - Guojun Chu

, Jingyu Wang
, Qi Qi
, Haifeng Sun
, Zirui Zhuang
, Bo He
, Yuhan Jing
, Lei Zhang
, Jianxin Liao
:
Anomaly Detection on Interleaved Log Data With Semantic Association Mining on Log-Entity Graph. 581-594 - Claudio Menghi

, Eugene Balai, Darren Valovcin, Christoph Sticksel, Akshay Rajhans
:
Completeness and Consistency of Tabular Requirements: An SMT-Based Verification Approach. 595-620 - Christopher Molloy

, Jeremy Banks, Steven H. H. Ding
, Furkan Alaca
, Philippe Charland
, Andrew Walenstein
:
Mecha: A Neural-Symbolic Open-Set Homogeneous Decision Fusion Approach for Zero-Day Malware Similarity Detection. 621-637 - Chaochen Shi

, Yong Xiang
, Jiangshan Yu
, Longxiang Gao
:
MM-SCS: Leveraging Multimodal Features to Enhance Smart Contract Code Search. 638-649 - Sherlock A. Licorish

:
Understanding the Effect of Agile Practice Quality on Software Product Quality. 650-662
Volume 51, Number 3, March 2025
- Sebastián Uchitel

:
50 Years of Transactions on Software Engineering. 663-665 - Nancy G. Leveson

:
Design and Assurance of Control Software. 666-672 - Jeff Kramer

:
Reflections of a Former Editor-in-Chief of TSE. 673-676 - Bashar Nuseibeh

:
Engineering Within Boundaries When Software Has None. 677-680 - Matthew B. Dwyer

:
Ten Years of Journal First Publication in Software Engineering. 681-684 - Nenad Medvidovic

:
Software Engineering Research Trends 1994-2024: Stepping Beyond the Lamppost. 685-688 - Brian Randell

, Jie Xu
:
Looking Back on Recovery Blocks and Conversations. 689-694 - Marc J. Rochkind

:
A Retrospective on the Source Code Control System. 695-699 - Dennis G. Kafura

:
Reflections on McCabe's Cyclomatic Complexity. 700-705 - Lori A. Clarke:

A Personal Retrospective on Symbolic Execution. 706-709 - David Lorge Parnas

:
Three "Influential" Software Design Papers. 710-712 - Leslie Lamport

:
A Retrospective of Proving the Correctness of Multiprocess Programs. 713-716 - Victor R. Basili

, David M. Weiss, Hans Dieter Rombach
:
Toward Measurement-Based Software Engineering. 717-719 - Keith B. Gallagher

, Suzanne J. Kozaitis
:
Program Slicing: A Brief Retrospective. 720-724 - Grady Booch

:
Object-Oriented Development, Revisited. 725-727 - Adam A. Porter

, Harvey P. Siy
, Lawrence G. Votta
:
A Reflection on "Advances in Software Inspections". 728-731 - Elaine J. Weyuker

:
Impact of "Evaluating Software Complexity Measures". 732-736 - Elaine J. Weyuker

:
Impact of "An Applicable Family of Data Flow Testing Criteria". 737-740 - David Harel

, Assaf Marron
:
From Executable Specifications to Hard-to-Specify Requirements: Challenges in Describing Reactive System Behavior. 741-745 - Jeff Kramer

, Jeff Magee
:
Dynamic Change Management: Quiescence Revisited. 746-750 - Bogdan Korel

:
Influence of the 1990 IEEE TSE Paper "Automated Software Test Data Generation" on Software Engineering. 751-753 - Jeff Offutt

, Richard A. DeMillo
:
Retrospective on: Constraint-Based Automatic Test Data Generation. 754-758 - John Mylopoulos

, Lawrence Chung
:
Representing and Reasoning With Non-Functional Requirements: A Retrospective. 759-761 - Mats P. E. Heimdahl

, Nancy G. Leveson
:
Model-Based Systems Engineering and TCAS II: Thirty Years Later. 762-767 - Mary Shaw

, Daniel V. Klein
, Theodore L. Ross
:
Revisiting Abstractions for Software Architecture and Tools to Support Them. 768-773 - Gerard J. Holzmann

:
The Analysis of Safety Critical Software Systems. 774-777 - Martin J. Shepperd

:
"Estimating Software Project Effort Using Analogies": Reflections After 28 Years. 778-782 - Carolyn B. Seaman

, Rashina Hoda
, Robert Feldt
:
Qualitative Research Methods in Software Engineering: Past, Present, and Future. 783-788 - Nenad Medvidovic

, Richard N. Taylor
, Eric M. Dashofy
:
Software Architecture Description Revisited. 789-794 - Emmanuel Letier

, Axel van Lamsweerde
:
Obstacle Analysis in Requirements Engineering: Retrospective and Emerging Challenges. 795-801 - Gregg Rothermel

, Roland H. Untch
:
On "Prioritizing Test Cases for Regression Testing". 802-807 - Toshihiro Kamiya

, Shinji Kusumoto
, Katsuro Inoue
:
A Retrospective on Developing Code Clone Detector CCFinder and Its Impact. 808-813 - Shari Lawrence Pfleeger

, Barbara Ann Kitchenham
:
Evidence-Based Software Engineering Guidelines Revisited. 814-819 - Andreas Zeller

, Ralf Hildebrandt:
Simplifying and Isolating Failure-Inducing Input: A Retrospective on Delta Debugging. 820-824 - Giulio Antoniol

, Gerardo Canfora
, Gerardo Casazza
, Andrea De Lucia
, Ettore Merlo
:
Recovering Traceability Links Between Code and Documentation: A Retrospective. 825-832 - James D. Herbsleb

, Audris Mockus
:
Retrospective: An Empirical Study of Speed and Communication in Globally Distributed Software Development. 833-835 - Liangzhao Zeng, Boualem Benatallah

, Marlon Dumas
, Jayant Kalagnanam
, Anne H. H. Ngu
:
QoS-Aware Service Composition: A Retrospective. 836-841 - Thomas Zimmermann

, Peter Weißgerber
, Stephan Diehl
, Andreas Zeller
:
A Retrospective on Mining Version Histories to Guide Software Changes. 842-847 - Amy J. Ko

, Brad A. Myers
, Michael Coblenz
, Htet Htet Aung:
A Retrospective on How Developers Seek, Relate, and Collect Information About Code. 848-851 - Beat Fluri, Michael Würsch, Martin Pinzger

, Harald C. Gall
:
A Retrospective of ChangeDistiller: Tree Differencing for Fine-Grained Source Code Change Extraction. 852-857 - Tim Menzies

:
Retrospective: Data Mining Static Code Attributes to Learn Defect Predictors. 858-863 - Sunghun Kim, Shivkumar Shivaji

, Jim Whitehead
:
A Reflection on Change Classification in the Era of Large Language Models. 864-869 - Claire Le Goues

, ThanhVu Nguyen
, Stephanie Forrest
, Westley Weimer
:
The Evolution of Automated Software Repair. 870-873 - Gordon Fraser

, Andrea Arcuri
:
A Retrospective on Whole Test Suite Generation: On the Role of SBST in the Age of LLMs. 874-878
Volume 51, Number 4, April 2025
- Jinan Jiang

, Zihao Li
, Haoran Qin
, Muhui Jiang
, Xiapu Luo
, Xiaoming Wu
, Haoyu Wang
, Yutian Tang
, Chenxiong Qian
, Ting Chen
:
Unearthing Gas-Wasting Code Smells in Smart Contracts With Large Language Models. 879-903 - Kai Huang

, Jian Zhang
, Xinlei Bao
, Xu Wang
, Yang Liu
:
Comprehensive Fine-Tuning Large Language Models of Code for Automated Program Repair. 904-928 - Zhimin Zhao

, Abdul Ali Bangash
, Filipe Roseiro Côgo
, Bram Adams
, Ahmed E. Hassan
:
On the Workflows and Smells of Leaderboard Operations (LBOps): An Exploratory Study of Foundation Model Leaderboards. 929-946 - Jianzhong Su

, Jiachi Chen
, Zhiyuan Fang
, Xingwei Lin
, Yutian Tang
, Zibin Zheng
:
SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection. 947-959 - Ruijie Meng

, Van-Thuan Pham
, Marcel Böhme
, Abhik Roychoudhury
:
AFLNet Five Years Later: On Coverage-Guided Protocol Fuzzing. 960-974 - Yuchao Huang

, Junjie Wang
, Zhe Liu
, Mingyang Li
, Song Wang
, Chunyang Chen
, Yuanzhe Hu
, Qing Wang
:
One Sentence Can Kill the Bug: Auto-Replay Mobile App Crashes From One-Sentence Overviews. 975-989 - Li Lin

, Jialin Ye
, Chao Wang
, Rongxin Wu
:
PATEN: Identifying Unpatched Third-Party APIs via Fine-Grained Patch-Enhanced AST-Level Signature. 990-1006 - Chenhao Wei

, Lu Xiao
, Tingting Yu
, Sunny Wong
, Abigail Clune
:
How Do Developers Structure Unit Test Cases? An Empirical Analysis of the AAA Pattern in Open Source Projects. 1007-1038 - Yanze Wang

, Yiling Huang, Jingyue Li
, Shanshan Li
, He Zhang
, Jun Lyu
, Chenxing Zhong
, Xiaodong Liu
, Bohan Liu
, Yue Liu
, Qinghua Lu
, Xin Zhou
:
Decision Support for Selecting Blockchain-Based Application Design Patterns With Layered Taxonomy and Quality Attributes. 1039-1066 - Zohra Kaouter Kebaili

, Djamel Eddine Khelladi
, Mathieu Acher
, Olivier Barais
:
Automated Co-Evolution of Metamodels and Code. 1067-1085 - Mohammed Oualid Attaoui

, Fabrizio Pastore
, Lionel C. Briand
:
Search-Based DNN Testing and Retraining With GAN-Enhanced Simulations. 1086-1103 - Ahmadreza Saboor Yaraghi

, Darren Holden
, Nafiseh Kahani
, Lionel C. Briand
:
Automated Test Case Repair Using Language Models. 1104-1133 - Alex Wolf

, Marco Edoardo Palma
, Pasquale Salza
, Harald C. Gall
:
Trustworthy Distributed Certification of Program Execution. 1134-1152 - Roselane Silva Farias

, Iftekhar Ahmed
, Eduardo Santana de Almeida
:
What Makes a Great Software Quality Assurance Engineer? 1153-1172 - Yihao Qin

, Shangwen Wang
, Yiling Lou
, Jinhao Dong
, Kaixin Wang
, Xiaoling Li
, Xiaoguang Mao
:
SoapFL: A Standard Operating Procedure for LLM-Based Method-Level Fault Localization. 1173-1187 - Junjie Ma

, Muhui Jiang
, Jinan Jiang
, Xiapu Luo
, Yufeng Hu
, Yajin Zhou
, Qi Wang
, Fengwei Zhang
:
Understanding Security Issues in the DAO Governance Process. 1188-1204 - Ju Qian

, Guizhou Lv
, Yiming Jin
, Zhengyu Shang
, Shuoyan Yan
, Yan Wang
, Lin Chen
:
Robotic Visual GUI Testing for Truly Non-Intrusive Test Automation of Touch Screen Applications. 1205-1231 - Quanjun Zhang

, Chunrong Fang
, Yi Zheng
, Ruixiang Qian
, Shengcheng Yu
, Yuan Zhao
, Jianyi Zhou
, Yun Yang
, Tao Zheng
, Zhenyu Chen
:
Improving Retrieval-Augmented Deep Assertion Generation via Joint Training. 1232-1247 - Mohamed Amine Ferrag

, Ammar Battah, Norbert Tihanyi
, Ridhi Jain, Diana Maimut, Fatima Alwahedi, Thierry Lestable, Narinderjit Singh Thandi, Abdechakour Mechri
, Mérouane Debbah, Lucas C. Cordeiro
:
SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection With LLMs? 1248-1265 - Xiaoli Zhang

, Yiqiao Song
, Yuefeng Du
, Chengjun Cai
, Hongbing Cheng
, Ke Xu
, Qi Li
:
SmartUpdater: Enabling Transparent, Automated, and Secure Maintenance of Stateful Smart Contracts. 1266-1283 - Chenghao Li

, Yifei Wu
, Wenbo Shen
, Rui Chang
, Chengwei Liu
, Yang Liu
:
Demystifying Rust Unstable Features at Ecosystem Scale: Evolution, Propagation, and Mitigation. 1284-1302 - Asif Kamal Turzo

, Sayma Sultana
, Amiangshu Bosu
:
From First Patch to Long-Term Contributor: Evaluating Onboarding Recommendations for OSS Newcomers. 1303-1318 - Sivana Hamer

, Nasif Imtiaz
, Mahzabin Tamanna
, Preya Shabrina
, Laurie A. Williams
:
Trusting Code in the Wild: Exploring Contributor Reputation Measures to Review Dependencies in the Rust Ecosystem. 1319-1333 - Haoyu Gao

, Christoph Treude
, Mansooreh Zahedi
:
Adapting Installation Instructions in Rapidly Evolving Software Ecosystems. 1334-1357
Volume 51, Number 5, May 2025
- Bo Liu

, Hui Liu
, Nan Niu
, Yuxia Zhang
, Guangjie Li
, He Jiang
, Yanjie Jiang
:
An Automated Approach to Discovering Software Refactorings by Comparing Successive Versions. 1358-1380 - Jiashuo Zhang

, Jiachi Chen
, Yiming Shen
, Tao Zhang
, Yanlin Wang
, Ting Chen
, Jianbo Gao
, Zhong Chen
:
When Crypto Fails: Demystifying Cryptographic Defects in Ethereum Smart Contracts. 1381-1398 - Ming Yan

, Junjie Chen
, Tianjie Jiang
, Jiajun Jiang
, Zan Wang
:
Evaluating Spectrum-Based Fault Localization on Deep Learning Libraries. 1399-1414 - Yimeng Guo

, Zhifei Chen
, Lu Xiao
, Lin Chen
, Yanhui Li
, Yuming Zhou
:
Understanding and Identifying Technical Debt in the Co-Evolution of Production and Test Code. 1415-1436 - Hanyang Guo

, Hong-Ning Dai
, Xiapu Luo
, Gengyang Xu
, Fengliang He
, Zibin Zheng
:
An Empirical Study on Meta Virtual Reality Applications: Security and Privacy Perspectives. 1437-1454 - Chuyang Xu

, Zhongxin Liu
, Xiaoxue Ren
, Gehao Zhang
, Ming Liang
, David Lo
:
FlexFL: Flexible and Effective Fault Localization With Open-Source Large Language Models. 1455-1471 - Sogol Masoumzadeh

, Nuno Saavedra
, Rungroj Maipradit
, Lili Wei
, João F. Ferreira
, Dániel Varró
, Shane McIntosh
:
Do Experts Agree About Smelly Infrastructure? 1472-1486 - Gabriele Maurina

, Walter Cazzola
, Sudipto Ghosh
:
BabelRTS: Polyglot Regression Test Selection. 1487-1499 - Gabriele De Vito

, Sergio Di Martino
, Filomena Ferrucci
, Carmine Gravino
, Fabio Palomba
:
LLM-Based Automation of COSMIC Functional Size Measurement From Use Cases. 1500-1523 - Robert Wallace

, Aakash Bansal
, Zachary Karas
, Ningzhi Tang
, Yu Huang
, Toby Jia-Jun Li
, Collin McMillan
:
Programmer Visual Attention During Context-Aware Code Summarization. 1524-1537 - Jiachi Chen

, Zhenzhe Shao
, Shuo Yang
, Yiming Shen
, Yanlin Wang
, Ting Chen
, Zhenyu Shan
, Zibin Zheng
:
NumScout: Unveiling Numerical Defects in Smart Contracts Using LLM-Pruning Symbolic Execution. 1538-1553 - Roman Haas

, Michael Sailer
, Mitchell Joblin
, Elmar Juergens
, Sven Apel
:
Prioritizing Test Gaps by Risk in Industrial Practice: An Automated Approach and Multimethod Study. 1554-1568 - Xun Li

, Lei Liu
, Yuzhou Liu
, Yu Zhao
, Peng Zhang
, Huaxiao Liu
:
Multimodal Fusion for Android Malware Detection Based on Large Pre-Trained Models. 1569-1590 - Hongyan Li

, Weifeng Sun
, Meng Yan
, Ling Xu
, Qiang Li
, Xiaohong Zhang
, Hongyu Zhang
:
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation. 1591-1614 - Yutian Tang

, Xiapu Luo
, Yuming Zhou
:
A Systematic Study on Real-World Android App Bundles. 1615-1628
Volume 51, Number 6, June 2025
- Rahul Yedida

, Tim Menzies
:
Is Hyper-Parameter Optimization Different for Software Analytics? 1629-1644 - Frank Tip

, Jonathan Bell
, Max Schäfer
:
LLMorpheus: Mutation Testing Using Large Language Models. 1645-1665 - Claudio Mandrioli

, Seung Yeob Shin
, Domenico Bianculli
, Lionel C. Briand
:
Testing CPS With Design Assumptions-Based Metamorphic Relations and Genetic Programming. 1666-1684 - Qianhui Zhao

, Fang Liu
, Xiao Long
, Chengru Wu
, Li Zhang
:
On the Applicability of Code Language Models to Scientific Computing Programs. 1685-1701 - Zhonghao Jiang

, Meng Yan
, Li Huang
, Weifeng Sun
, Chao Liu
, Song Sun
, David Lo
:
DeepVec: State-Vector Aware Test Case Selection for Enhancing Recurrent Neural Network. 1702-1723 - Jiarong Wu

, Yanyan Jiang
, Lili Wei
, Congying Xu
, Shing-Chi Cheung
, Chang Xu
:
Question Selection for Multimodal Code Search Synthesis Using Probabilistic Version Spaces. 1724-1744 - Jun Lyu

, Shanshan Li
, Bohan Liu
, He Zhang
, Guoping Rong
, Chenxing Zhong
, Xiaodong Liu
:
Detecting Build Dependency Errors by Dynamic Analysis of Build Execution Against Declaration. 1745-1761 - Bo Wang

, Chong Chen
, Junjie Chen
, Bowen Xu
, Chen Ye
, Youfang Lin
, Guoliang Dong
, Jun Sun
:
A Comprehensive Study of OOP-Related Bugs in C++ Compilers. 1762-1782 - Yuichi Sugiyama

, Shuji Morisaki
, Asako Toyama
, Kentaro Katahira
:
Relationship Between Model-Based Decision-Making and the Comprehension Performance of Source Code With Confusing Patterns. 1783-1800 - Chih-Duo Hong

, Anthony W. Lin
, Philipp Rümmer
, Rupak Majumdar
:
Probabilistic Bisimulation for Parameterized Anonymity and Uniformity Verification. 1801-1817 - Mian Qin

, Yuxia Zhang
, Minghui Zhou
, Zhe Wang
, Haoyang Li
, Hui Liu
:
Developers' Views on Commercial Involvement in OSS: A Survey From Three Projects. 1818-1837 - Yibiao Yang

, Qingyang Li
, Maolin Sun
, Jing Yang
, Jiangchang Wu
, Yuming Zhou
:
Isolating Compiler Faults Through Differentiated Compilation Configurations. 1838-1853 - Chang Xu

, Huaiyu Xu
, Liehuang Zhu
, Xiaodong Shen
, Kashif Sharif
:
Enhanced Smart Contract Vulnerability Detection via Graph Neural Networks: Achieving High Accuracy and Efficiency. 1854-1865 - Xiangyu Zhang

, Yu Zhou
, Guang Yang
, Harald C. Gall
, Taolue Chen
:
Anchor Attention, Small Cache: Code Generation With Large Language Models. 1866-1881 - Hossein Yousefizadeh

, Shenghui Gu
, Lionel C. Briand
, Ali Nasr
:
Using Cooperative Co-Evolutionary Search to Generate Metamorphic Test Cases for Autonomous Driving Systems. 1882-1911 - Gianmario Voria

, Francesco Casillo
, Carmine Gravino
, Gemma Catolino
, Fabio Palomba
:
RECOVER: Toward Requirements Generation From Stakeholders' Conversations. 1912-1933
Volume 51, Number 7, July 2025
- Shunkai Zhu

, Jun Sun
, Jingyi Wang
, Xingwei Lin
, Peng Cheng
:
OptSE: Toward Optimal Symbolic Execution. 1934-1949 - Yao Deng

, Zhi Tu
, Jiaohong Yao
, Mengshi Zhang
, Tianyi Zhang
, James Xi Zheng
:
TARGET: Traffic Rule-Based Test Generation for Autonomous Driving via Validated LLM-Guided Knowledge Extraction. 1950-1968 - Arooba Shahoor

, Satbek Abdyldayev
, Hyeongi Hong
, Jooyong Yi
, Dongsun Kim
:
Proactive Debugging of Memory Leakage Bugs in Single Page Web Applications. 1969-1995 - Xiaohong Chen

, Shi Chen
, Zhi Jin
, Zihan Chen
, Mingsong Chen
:
What You See Is What You Get: Prototype Generation for IoT End-User Programming. 1996-2014 - Musengamana Jean de Dieu

, Peng Liang
, Mojtaba Shahin
:
How Do OSS Developers Reuse Architectural Solutions From Q&A Sites: An Empirical Study. 2015-2043 - Chuyan Ge

, Tiantian Wang
, Xiaotian Yang
, Christoph Treude
:
Cross-Level Requirements Tracing Based on Large Language Models. 2044-2066 - Shujun Huang

, Sebastian Proksch
:
A Taxonomy of Contextual Factors in Continuous Integration Processes. 2067-2087 - Pasquale Polverino

, Fabio Di Lauro
, Matteo Biagiola
, Paolo Tonella
, Antonio Carzaniga
:
Parallelization in System-Level Testing: Novel Approaches to Manage Test Suite Dependencies. 2088-2101 - Dimitri Van Landuyt

:
Privacy Impact Tree Analysis (PITA): A Tree-Based Privacy Threat Modeling Approach. 2102-2124 - Peng Zhang

, Zeyu Lu
, Yang Wang
, Yibiao Yang
, Yuming Zhou
, Mike Papadakis
:
Enriching Mutation Testing With Innovative Method Invocation Mutation: Filling the Crucial Missing Piece of the Puzzle. 2125-2143 - Jiaxin Hu

, Rongxin Wu
:
SQLaw: Detecting Bugs in GPU Database Management Systems via Rule-Based Differential Execution. 2144-2160 - Yiqian Wu

, Yujie Liu
, Yi Yin
, Muhan Zeng
, Zhentao Ye
, Xin Zhang
, Yingfei Xiong
, Lu Zhang
:
SmartFL: Semantics Based Probabilistic Fault Localization. 2161-2180 - Yiran Wang

, Willem Meijer
, José Antonio Hernández López
, Ulf Nilsson
, Dániel Varró
:
Why Do Machine Learning Notebooks Crash? An Empirical Study on Public Python Jupyter Notebooks. 2181-2196 - Hui Zhang

, Jiajing Wu
, Zhiying Wu
, Zhe Chen
, Dan Lin
, Jiachi Chen
, Yuren Zhou
, Zibin Zheng
:
Malo in the Code Jungle: Explainable Fault Localization for Decentralized Applications. 2197-2210
Volume 51, Number 8, August 2025
- Massimiliano Di Penta

, Domenico Bianculli
, Michael R. Lyu
, Sebastián Uchitel
, Andy Zaidman
:
Relevance of Log Mining and Analytics Papers to IEEE Transactions on Software Engineering. 2211-2212 - Kaixiang Dong

, Peng Wu
, Yanting Chen
:
Boosting Generalizable Fairness With Mahalanobis Distances Guided Boltzmann Exploratory Testing. 2213-2231 - Yuyong Liu

, Zhifei Chen
, Lin Chen
, Yanhui Li
, Xuansong Li
, Wei Song
:
COTE: Predicting Code-to-Test Co-Evolution by Integrating Link Analysis and Pre-Trained Language Model Techniques. 2232-2253 - Partha Chakraborty

, Mahmoud Alfadel
, Meiyappan Nagappan
:
BLAZE: Cross-Language and Cross-Project Bug Localization via Dynamic Chunking and Hard Example Learning. 2254-2267 - Xiaoye Zheng

, Zhiyuan Wan
, Shun Liu
, Kaiwen Yang
, David Lo
, Xiaohu Yang
:
GNNContext: GNN-based Code Context Prediction for Programming Tasks. 2268-2284 - Wenjing Zhan

, Ran Mo
, Yingjie Jiang
, Dongyu Wang
:
Just-in-Time Prediction of Software Architectural Changes Through Commit-Level Analyses. 2285-2304 - Jiaxin Chen

, Jinliang Ding
, Kay Chen Tan
, Jiancheng Qian
, Ke Li
:
MBL-CPDP: A Multi-Objective Bilevel Method for Cross-Project Defect Prediction. 2305-2328 - Giuseppe Crupi

, Rosalia Tufano
, Alejandro Velasco
, Antonio Mastropaolo
, Denys Poshyvanyk
, Gabriele Bavota
:
On the Effectiveness of LLM-as-a-Judge for Code Generation and Summarization. 2329-2345 - Wei Wei

, Yanjie Jiang
, Yahui Li
, Lu Zhang
, Hui Liu
:
OneMoreTest: A Learning-Based Approach to Generating and Selecting Fault-Revealing Unit Tests. 2346-2365 - André Silva

, Sen Fang
, Martin Monperrus
:
RepairLLaMA: Efficient Representations and Fine-Tuned Adapters for Program Repair. 2366-2380 - Ranim Khojah

, Francisco Gomes de Oliveira Neto
, Mazen Mohamad
, Philipp Leitner
:
The Impact of Prompt Programming on Function-Level Code Generation. 2381-2395 - Siyuan Li

, Kaiyu Xie
, Yuekang Li
, Hong Li
, Yimo Ren
, Limin Sun
, Hongsong Zhu
:
TransferFuzz-Pro: Large Language Model Driven Code Debugging Technology for Verifying Propagated Vulnerability. 2396-2411
Volume 51, Number 9, September 2025
- Ke Li

, Heng Yang, Willem Visser
:
DaNuoYi: Evolutionary Multitask Injection Testing on Web Application Firewalls. 2412-2431 - Boyuan Li

, Chengwei Liu
, Lingling Fan
, Sen Chen
, Zhenlin Zhang
, Zheli Liu
:
Open Source, Hidden Costs: A Systematic Literature Review on OSS License Management. 2432-2454 - Xiaoxue Ma

, Yishu Li
, Jacky Keung
, Xiao Yu
, Huiqi Zou
, Zhen Yang
, Federica Sarro
, Earl T. Barr
:
Practitioners' Expectations on Log Anomaly Detection. 2455-2471 - Sixiang Ye

, Zeyu Sun
, Guoqing Wang
, Liwei Guo
, Qingyuan Liang
, Zheng Li
, Yong Liu
:
Prompt Alchemy: Automatic Prompt Refinement for Enhancing Code Generation. 2472-2493 - Zilong He

, Pengfei Chen
, Yu Luo
, Qiuyu Yan
, Hongyang Chen
, Guangba Yu
, Fangyuan Li
, Xiaoyun Li
, Zibin Zheng
:
Subgraphs as First-Class Citizens in Incident Management for Large-Scale Online Systems: An Evolution-Aware Framework. 2494-2511 - Lyuye Zhang

, Kaixuan Li
, Kairan Sun
, Daoyuan Wu
, Ye Liu
, Haoye Tian
, Yang Liu
:
ACFix: Guiding LLMs With Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. 2512-2532 - Ruijun Feng

, Hammond Pearce
, Pietro Liguori
, Yulei Sui
:
CGP-Tuning: Structure-Aware Soft Prompt Tuning for Code Vulnerability Detection. 2533-2548 - Yihui Wang

, Xinrou Kang
, Xun Li
, Shanquan Gao
:
R2API: A Novel Method for Web API Recommendation by Using HGNNs With Multi-Task Learning. 2549-2565 - Le Deng

, Xiaoxia Ren
, Chao Ni
, Ming Liang
, David Lo
, Zhongxin Liu
:
Enhancing Project-Specific Code Completion by Inferring Internal API Information. 2566-2582 - Qingyuan Liang

, Zeyu Sun
, Qihao Zhu
, Junhao Hu
, Yifan Zhao
, Yizhou Chen
, Mingxuan Zhu
, Guoqing Wang
, Lu Zhang
:
Directional Diffusion-Style Code Editing Pre-Training. 2583-2600 - Jian Zhao

, Wenxu Li
, Bing Zhu
, Peixing Zhang
, Yinzi Huang
, Rui Tang
:
CRADLE: An Accident Scenario Generation Method Based on Scenario Knowledge Graph Considering Accident Causation. 2601-2616 - Mengting He

, Shihao Xia
, Boqin Qin
, Nobuko Yoshida
, Tingting Yu
, Yiying Zhang
, Linhai Song
:
How to Save My Gas Fees: Understanding and Detecting Real-World Gas Issues in Solidity Programs. 2617-2633 - Dong Li

, Shanfu Shu
, Meng Yan
, Zhongxin Liu
, Chao Liu
, Xiaohong Zhang
, David Lo
:
Improving Co-Decoding Based Security Hardening of Code LLMs Leveraging Knowledge Distillation. 2634-2650 - Bo Lin

, Shangwen Wang
, Yihao Qin
, Liqian Chen
, Xiaoguang Mao
:
Large Language Models-Aided Program Debloating. 2651-2670 - Jun Wang

, Chenghao Su
, Yijie Ou
, Yanhui Li
, Jialiang Tan, Lin Chen
, Yuming Zhou
:
Translating to a Low-Resource Language with Compiler Feedback: A Case Study on Cangjie. 2671-2692 - Zhengxiong Luo

, Qingpeng Du
, Yujue Wang
, Abhik Roychoudhury
, Yu Jiang
:
Enhancing Protocol Fuzzing via Diverse Seed Corpus Generation. 2693-2709
Volume 51, Number 10, October 2025
- Frederik Reiche

, Ralf H. Reussner
, Robert Heinrich
:
Detecting Information Flow Security Vulnerabilities by Analysis Coupling. 2710-2743 - Xin Peng

, Shangwen Wang
, Yihao Qin
, Bo Lin
, Liqian Chen
, Jieren Cheng
, Xiaoguang Mao
:
Keep It Simple: Self-Adaptive Code Graph Simplification for Accurate Vulnerability Detection. 2744-2763 - Lipeng Ma

, Weidong Yang
, Sihang Jiang
, Ben Fei
, Mingjie Zhou
, Shuhao Li
, Mingyu Zhao
, Bo Xu
, Yanghua Xiao
:
LUK: Empowering Log Understanding With Expert Knowledge From Large Language Models. 2764-2786 - Dewen Suo

, Lei Xue
, Le Yu
, Runze Tan
, Weihao Huang
, Guozi Sun
:
ARAP: Demystifying Anti Runtime Analysis Code in Android Apps. 2787-2803 - Naoto Sato

, Ryota Katsube
:
Bug-Locating Method Based on Statistical Testing for Quantum Programs. 2804-2829 - Zhiyuan Wei

, Jing Sun
, Yuqiang Sun
, Ye Liu
, Daoyuan Wu
, Zijian Zhang
, Xianhao Zhang
, Meng Li
, Yang Liu
, Chunmiao Li
, Mingchao Wan
, Jin Dong
, Liehuang Zhu
:
Advanced Smart Contract Vulnerability Detection via LLM-Powered Multi-Agent Systems. 2830-2846 - Yutong Zeng

, Cheng Huang
, Jiaxuan Han
, Jianguo Zhao
, Nannan Wang
, Genpei Liang
, Shuyi Jiang
:
Wolf in Sheep's Clothing: Shearing the Camouflage of Malicious Java Components in Maven. 2847-2863 - Felipe Toledo

, Trey Woodlief
, Sebastian G. Elbaum
, Matthew B. Dwyer
:
T4PC: Training Deep Neural Networks for Property Conformance. 2864-2878 - Manel Abdellatif

, Naouel Moha
, Yann-Gaël Guéhéneuc
, Hafedh Mili
, Ghizlane El-Boussaidi
:
Identifying Reusable Services in Legacy Object-Oriented Systems: A Type-Sensitive Identification Approach. 2879-2899 - Yuan Jiang

, Zhichen Qu
, Christoph Treude
, Xiaohong Su
, Tiantian Wang
:
Enhancing Fine-Grained Vulnerability Detection With Reinforcement Learning. 2900-2920 - Tiangang Li

, Shi Ying
, Xiangbo Tian
, Ting Zhang
, Yong Wang
:
ASTRA: Adversarial Sim-to-Real Transfer Reinforcement Learning for Autoscaling in Cloud Systems. 2921-2941 - Shuo Yang

, Jiachi Chen
, Lei Xiao
, Jinyuan Hu
, Dan Lin
, Jiajing Wu
, Tao Zhang
, Zibin Zheng
:
Who Is Pulling the Strings: Unveiling Smart Contract State Manipulation Attacks Through State-Aware Dataflow Analysis. 2942-2956 - Qiheng Mao

, Zhenhao Li
, Xing Hu
, Kui Liu
, Xin Xia
, Jianling Sun
:
Towards Explainable Vulnerability Detection With Large Language Models. 2957-2971
Volume 51, Number 11, November 2025
- Imen Trabelsi

, Brahim Mahmoudi
, Jean Baptiste Minani
, Naouel Moha
, Yann-Gaël Guéhéneuc
:
A Systematic Literature Review of Machine Learning Approaches for Migrating Monolithic Systems to Microservices. 2972-2995 - Uraz Cengiz Türker

, Robert M. Hierons
, Mohammad Reza Mousavi
, Khaled El-Fakih
:
Efficient State Identification for Finite State Machine-Based Testing. 2996-3012 - Bridget Nyirongo

, Yanjie Jiang
, Nan Niu
, Hui Liu
:
An Empirical Study of Software Refactorings in Real-World Open-Source Java Projects. 3013-3037 - Yali Du

, Hui Sun
, Ming Li
:
Post-Incorporating Code Structural Knowledge Into Pretrained Models via ICL for Code Translation. 3038-3055 - Simone Corbo

, Luca Bancale
, Valeria De Gennaro
, Livia Lestingi
, Vincenzo Scotti
, Matteo Camilli
:
How Toxic Can You Get? Search-Based Toxicity Testing for Large Language Models. 3056-3071 - Zhijie Zhong

, Jiachi Chen
, Jiashui Wang
, Qing Xue
, Jiajing Wu
, Long Liu
, Xinlei Ying
, Zibin Zheng
:
Towards Exploring Developers' Struggles in Developing Upgradeable Smart Contracts. 3072-3087 - Shangqing Liu

, Daya Guo
, Jian Zhang
, Wei Ma
, Yanzhou Li
, Yang Liu
:
An Empirical Study of Exploring the Capabilities of Large Language Models in Code Learning. 3088-3102 - Canyu Qiu

, Jianxun Liu
, Xiaocong Xiao
, Yong Xiao
:
OpCodeBERT: A Method for Python Code Representation Learning by BERT With Opcode. 3103-3116 - Kushal Ramkumar

, Wanling Cai, John McCarthy
, Gavin Doherty
, Bashar Nuseibeh
, Liliana Pasquale
:
Diagnosing Unknown Attacks in Smart Homes Using Abductive Reasoning. 3117-3137 - Shahin Honarvar

, Marek Rei
, Alastair F. Donaldson
:
The "Question Neighbourhood" Approach for Systematic Evaluation of Code-Generating LLMs. 3138-3167 - Amin Abbasishahkoo

, Mahboubeh Dadkhah
, Lionel C. Briand
, Dayi Lin
:
MetaSel: A Test Selection Approach for Fine-Tuned DNN Models. 3168-3188 - Hui Chen

, Yunhua Zhao
, Kostadin Damevski
:
Improving Data Curation of Software Vulnerability Patches through Uncertainty Quantification. 3189-3203
Volume 51, Number 12, December 2025
- Sebastián Uchitel

:
State of the Journal. 3204 - Yang Wu

, Yao Wan
, Zhaoyang Chu
, Wenting Zhao
, Ye Liu
, Hongyu Zhang
, Xuanhua Shi
, Hai Jin
, Philip S. Yu
:
Can Large Language Models Serve as Evaluators for Code Summarization? 3205-3217 - Joran Leest

, Claudia Raibulet
, Patricia Lago
, Ilias Gerostathopoulos
:
From Tea Leaves to System Maps: A Survey and Framework on Context-Aware Machine Learning Monitoring. 3218-3246 - Bixin Li

, Tianyuan Hu
, Xiangfei Xu
, Lulu Wang
:
VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching. 3247-3266 - Wei Li

, Yuhong Nan
, Mingxi Ye
, Jingwen Zhang
, Peilin Zheng
, Zibin Zheng
:
ASTRO: Detecting Access Control Vulnerabilities in Smart Contracts via Graph Similarity Comparison. 3267-3283 - Zohreh Aghababaeyan

, Manel Abdellatif
, Lionel C. Briand
, S. Ramesh
:
DiffGAN: A Test Generation Approach for Differential Testing of Deep Neural Networks for Image Analysis. 3284-3309 - Zihao Li

, Zheyuan He
, Xiapu Luo
, Ting Chen
, Xiaosong Zhang
:
Finding Correctness Issues on Ethereum Verkle Tries via Preimage-Aware Differential Testing. 3310-3330 - Claudia Maria Cutrupi

, Letizia Jaccheri
, Sofia Papavlasopoulou
:
Women's Participation in Student Software Development Teams: A Cross-Sectional Study on Role Distribution. 3331-3345 - Hashini Gunatilake

, John C. Grundy
, Rashina Hoda
, Ingo Mueller
:
Manifestations of Empathy in Software Engineering: How, Why, and When It Matters. 3346-3359 - Zeqin Liao

, Yuhong Nan
, Zixu Gao, Henglong Liang
, Sicheng Hao, Jiajing Wu
, Zibin Zheng
:
Satellite: Detecting and Analyzing Smart Contract Vulnerabilities Caused by Subcontract Misuse. 3360-3375 - Tianye Sheng

, Lisong Wang
, Hao Liu
:
ReCompGPT: An NL2NL Framework for Automated Requirements Completeness. 3376-3394 - Xiaobing Sun

, Yiran Xiao
, Lili Bo
, Weisong Sun
, Xiangyue Liu
, Bin Li
, Jiale Zhang
:
Misactivation-Aware Stealthy Backdoor Attacks on Neural Code Understanding Models. 3395-3415 - Yating Zhang

, Wei Dong
, Jiaxin Liu
, Shangwen Wang
, Deze Wang
, Tiecheng Ma
, Yiwei Li
, Kang Yang
:
A Little Help Goes a Long Way: Tutoring LLMs in Solving Competitive Programming Through Hints. 3416-3434 - Youkun Shi

, Yuan Zhang
, Tianhan Luo
, Guangliang Yang
, Shengke Ye
, Chengyu Yang
, Fengyu Liu
, Xiapu Luo
, Min Yang
:
PHPJoy: A Novel Extended Graph-Based PHP Code Analysis Framework. 3435-3451 - Zhe Liu

, Cheng Li
, Chunyang Chen
, Junjie Wang
, Mengzhuo Chen
, Boyu Wu
, Yawen Wang
, Jun Hu
, Qing Wang
:
Seeing is Believing: Vision-Driven Non-Crash Functional Bug Detection for Mobile Apps. 3452-3466 - Jialu Li

, Haoyu Li
, Yuchong Xie
, Yanhao Wang
, Qinsheng Hou
, Libo Chen
, Bo Zhang
, Shenghong Li
, Zhi Xue
:
Enhancing Real-Time Operating System Security Analysis via Slice-Based Fuzzing. 3467-3485 - Yang Liu

, Jingjing Gu
, Jingxuan Zhang
, Bao Wen
, Yi Zhuang
:
CEDAR: Silent Control Flow Error Detection via Heterogeneous Relation Learning. 3486-3506 - Jianguo Zhao, Yuqiang Sun

, Cheng Huang
, Chengwei Liu
, YaoHui Guan, Yutong Zeng, Yang Liu
:
Towards Secure Code Generation With LLMs: A Study on Common Weakness Enumeration. 3507-3523 - Qingyuan Liang

, Zhao Zhang
, Chen Liu
, Zeyu Sun
, Wenjie Zhang
, Yizhou Chen
, Zixiao Zhao
, Qi Luo
, Wentao Wang
, Yanjie Jiang
, Yingfei Xiong
, Lu Zhang
:
Condor: A Code Discriminator Integrating General Semantics With Code Details. 3524-3539 - Xiaoxue Ren

, Chaoqun Dai
, Qiao Huang
, Ye Wang
, Chao Liu
, Bo Jiang
:
Hydra-Reviewer: A Holistic Multi-Agent System for Automatic Code Review Comment Generation. 3540-3557 - Xinyue Zuo

, Yan Xiao
, Xiaochun Cao
, Wenya Wang
, Jin Song Dong
:
DT4LM: Differential Testing for Reliable Language Model Updates in Classification Tasks. 3558-3573 - Zeqin Liao

, Yuhong Nan
, Zixu Gao
, Henglong Liang
, Sicheng Hao
, Peifan Reng
, Zibin Zheng
:
Augmenting Smart Contract Decompiler Output Through Fine-Grained Dependency Analysis and LLM-Facilitated Semantic Recovery. 3574-3590 - Yanjie Jiang

, Chenxu Li
, Zixiao Zhao
, Fu Fan
, Lu Zhang
, Hui Liu
:
Evaluating and Improving GPT-Based Expansion of Abbreviations. 3591-3607 - Dongjin Yu

, Yihang Xu
, Xin Chen
, Quanxin Yang
, Sixuan Wang
:
Unadmitted Technical Debt: Dataset and Detection Approaches. 3608-3631 - Mohamed Sami Rakha

, Andriy V. Miranskyy
, Daniel Alencar da Costa
:
Contrasting the Hyperparameter Tuning Impact Across Software Defect Prediction Scenarios. 3632-3653 - Shuang Liu

, Ruifeng Wang
, Yuanfeng Xie
, Junjie Chen
, Wei Lu
, Xiao Zhang
, Quanqing Xu
, Chuanhui Yang
, Xiaoyong Du
:
A Comprehensive Study of Bugs in Relational DBMS. 3654-3668 - Lukas Kirschner

, Ezekiel O. Soremekun
:
Directed Grammar-Based Test Generation. 3669-3691

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














