Last update:
Thu May 20 08:42:20 MDT 2021
J. Kramer Editorial: A New Editor in Chief and the State of the Journal . . . . . . . . . . 1--2 B. Nuseibeh Editorial: A New Decade of TSE . . . . . 3--6 S. Horwitz and B. Liblit and M. Polishchuk Better Debugging via Output Tracing and Callstack-Sensitive Slicing . . . . . . 7--19 N. Moha and Y. G. Guéhéneuc and L. Duchien and A. F. Le Meur DECOR: A Method for the Specification and Detection of Code and Design Smells 20--36 H. Aljazzar and S. Leue Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking . . . . . . . 37--60 J. E. Hannay and E. Arisholm and H. Engvik and D. I. K. Sjoberg Effects of Personality on Pair Programming . . . . . . . . . . . . . . 61--80 X. Yuan and A. M. Memon Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback 81--95 F. Ricca and M. Di Penta and M. Torchiano and P. Tonella and M. Ceccato How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: A Series of Four Experiments . . . . . . . 96--118 I. Malavolta and H. Muccini and P. Pelliccione and D. Tamburri Providing Architectural Languages and Tools Interoperability through Model Transformation Technologies . . . . . . 119--140 Anonymous 2009 Reviewers List . . . . . . . . . . 141--143 Anonymous 7 Great Reasons for Joining the IEEE Computer Society [advertisement] . . . . 144--144 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: Readers, Writers, Reviewers, and Editors . . . . . . . . . . . . . . 145--156 A. Garcia and A. Romanovsky and V. Issarny Guest Editors' Introduction to the Special Section on Exception Handling: From Requirements to Software Maintenance . . . . . . . . . . . . . . 147--149 H. Shah and C. Gorg and M. J. Harrold Understanding Exception Handling: Viewpoints of Novices and Experts . . . 150--161 B. S. Lerner and S. Christov and L. J. Osterweil and R. Bendraou and U. Kannengiesser and A. Wise Exception Handling Patterns for Process Modeling . . . . . . . . . . . . . . . . 162--183 D. Kulkarni and A. Tripathi A Framework for Programming Robust Context-Aware Applications . . . . . . . 184--197 G. Friedrich and M. G. Fugini and E. Mussi and B. Pernici and G. Tagni Exception Handling for Repair in Service-Based Processes . . . . . . . . 198--215 R. Shatnawi A Quantitative Investigation of the Acceptable Risk Levels of Object-Oriented Metrics in Open-Source Systems . . . . . . . . . . . . . . . . 216--225 M. Harman and P. McMinn A Theoretical and Empirical Study of Search-Based Testing: Local, Global, and Hybrid Search . . . . . . . . . . . . . 226--247 D. Kimelman and M. Kimelman and D. Mandelin and D. Yellin Bayesian Approaches to Matching Architectural Diagrams . . . . . . . . . 248--274 P. Chalin Engineering a Sound Assertion Semantics for the Verifying Compiler . . . . . . . 275--287 J. Skene and F. Raimondi and W. Emmerich Service-Level Agreements for Electronic Services . . . . . . . . . . . . . . . . 288--304 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh In Memoriam: Robin Milner and Amir Pnueli . . . . . . . . . . . . . . . . . 305--305 K. Goseva-Popstojanova and K. Kanoun Guest Editors' Introduction to the Special Section on Evaluation and Improvement of Software Dependability 306--308 E. Uzuncaova and S. Khurshid and D. Batory Incremental Test Generation for Software Product Lines . . . . . . . . . . . . . 309--322 R. Pietrantuono and S. Russo and K. S. Trivedi Software Reliability and Testing Time Allocation: An Architecture-Based Approach . . . . . . . . . . . . . . . . 323--337 G. Georg and K. Anastasakis and B. Bordbar and S. H. Houmb and I. Ray and M. Toahchoodee Verification and Trade-Off Analysis of Security Properties in UML System Models 338--356 J. Antunes and N. Neves and M. Correia and P. Verissimo and R. Neves Vulnerability Discovery with Attack Injection . . . . . . . . . . . . . . . 357--370 G. Spanoudakis and A. Zisman Discovering Services during Service-Based System Design Using UML 371--389 B. Bollig and J. P. Katoen and C. Kern and M. Leucker Learning Communicating Automata from MSCs . . . . . . . . . . . . . . . . . . 390--408 R. Meier and V. Cahill On Event-Based Middleware for Location-Aware Mobile Applications . . . 409--430 C. Zhao and J. Kong and K. Zhang Program Behavior Discovery and Verification: A Graph Grammar Approach 431--448 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: How Special Should Issues Be? 449--450 B. G. Ryder and A. Zeller Introduction: The Best Papers of ISSTA 451--452 D. Balzarotti and G. Banks and M. Cova and V. Felmetsger and R. Kemmerer and W. Robertson and F. Valeur and G. Vigna An Experience in Testing the Security of Real-World Electronic Voting Systems . . 453--473 S. Artzi and A. Kiezun and J. Dolby and F. Tip and D. Dig and A. Paradkar and M. D. Ernst Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking . . . . . 474--494 N. E. Beckman and A. V. Nori and S. K. Rajamani and R. J. Simmons and S. D. Tetali and A. V. Thakur Proofs from Tests . . . . . . . . . . . 495--508 E. Bodden and K. Havelund Aspect-Oriented Race Detection in Java 509--527 G. K. Baah and A. Podgurski and M. J. Harrold The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis . . . . . . . . . . . . . . . 528--545 R. P. L. Buse and W. R. Weimer Learning a Metric for Code Readability 546--558 N. Limam and R. Boutaba Assessing Software Service Quality and Trustworthiness at Selection Time . . . 559--574 N. Pettersson and W. Lowe and J. Nivre Evaluation of Accuracy in Design Pattern Occurrence Detection . . . . . . . . . . 575--590 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
G. C. Murphy and W. Schafer Guest Editors' Introduction: 2008 Conference on the Foundations of Software Engineering . . . . . . . . . . 591--592 H. Do and S. Mirarab and L. Tahvildari and G. Rothermel The Effects of Time Constraints on Test Case Prioritization: A Series of Controlled Experiments . . . . . . . . . 593--617 T. Zimmermann and R. Premraj and N. Bettenburg and S. Just and A. Schroter and C. Weiss What Makes a Good Bug Report? . . . . . 618--643 M. Sama and S. Elbaum and F. Raimondi and D. S. Rosenblum and Z. Wang Context-Aware Adaptive Applications: Fault Patterns and Their Automated Identification . . . . . . . . . . . . . 644--661 R. Bendraou and J. M. Jezequel and M. P. Gervais and X. Blanc A Comparison of Six UML-Based Languages for Software Process Modeling . . . . . 662--675 S. MacDonell and M. Shepperd and B. Kitchenham and E. Mendes How Reliable Are Systematic Reviews in Empirical Software Engineering? . . . . 676--687 Z. Lin and X. Zhang and D. Xu Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications . . . . . . . . . . . . . . 688--703 P. Emberson and I. Bate Stressing Search with Scenarios for Flexible Solutions to Real-Time Task Allocation Problems . . . . . . . . . . 704--718 R. Lanotte and A. Maggiolo-Schettini and A. Troina Time and Probability-Based Information Flow Analysis . . . . . . . . . . . . . 719--734 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial . . . . . . . . . . . . . . . 735--736 M. Harman and A. Mansouri Search Based Software Engineering: Introduction to the Special Issue of the \booktitleIEEE Transactions on Software Engineering . . . . . . . . . . . . . . 737--741 S. Ali and L. C. Briand and H. Hemmati and R. K. Panesar-Walawege A Systematic Review of the Application and Empirical Investigation of Search-Based Test Case Generation . . . 742--762 S. Poulding and J. A. Clark Efficient Software Verification: Statistical Testing Using Automated Search . . . . . . . . . . . . . . . . . 763--777 V. Garousi A Genetic Algorithm-Based Stress Test Requirements Generator Tool and Its Empirical Evaluation . . . . . . . . . . 778--797 Christopher L. Simons and Ian C. Parmee and Rhys Gwynllyw Interactive, Evolutionary Search in Upstream Object-Oriented Class Design 798--816 M. Bowman and L. C. Briand and Y. Labiche Solving the Class Responsibility Assignment Problem in Object-Oriented Analysis with Multi-Objective Genetic Algorithms . . . . . . . . . . . . . . . 817--837 J. White and B. Doughtery and D. C. Schmidt ASCENT: An Algorithmic Technique for Designing Hardware and Software in Tandem . . . . . . . . . . . . . . . . . 838--851 Y. Liu and T. M. Khoshgoftaar and N. Seliya Evolutionary Optimization of Software Quality Modeling with Multiple Repositories . . . . . . . . . . . . . . 852--864 K. Krogmann and M. Kuperberg and R. Reussner Using Genetic Search for Reverse Engineering of Parametric Behavior Models for Performance Prediction . . . 865--877 Anonymous IEEE Computer Society CSDP [advertisement] . . . . . . . . . . . . 878--878 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: State of the Journal . . . . 1--3 B. Demsky and S. Sundaramurthy Bristlecone: Language Support for Robust Software Applications . . . . . . . . . 4--23 M. P. Ward and H. Zedan Deriving a Slicing Algorithm via Fermat Transformations . . . . . . . . . . . . 24--47 R. C. Bryce and S. Sampath and A. M. Memon Developing a Single Model and Test Prioritization Strategies for Event-Driven Software . . . . . . . . . 48--64 S. Distefano and M. Scarpa and A. Puliafito From UML to Petri Nets: The PCM-Based Methodology . . . . . . . . . . . . . . 65--79 J. H. Andrews and T. Menzies and F. C. H. Li Genetic Algorithms for Randomized Unit Testing . . . . . . . . . . . . . . . . 80--94 L. Prechelt Plat\_Forms: A Web Development Platform Comparison by an Exploratory Experiment Searching for Emergent Platform Properties . . . . . . . . . . . . . . . 95--108 T. Y. Chen and T. H. Tse and Z. Q. Zhou Semi-Proving: An Integrated Method for Program Proving, Testing, and Debugging 109--125 Y. Kwon and G. Agha Verifying the Evolution of Probability Distributions Governed by a DTMC . . . . 126--141 Anonymous 2010 Reviewers List . . . . . . . . . . 142--144 Anonymous 2010 Annual Index . . . . . . . . . . . Online Only--Online Only Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Nuseibeh Editorial: What Makes a Publication Archival? . . . . . . . . . . . . . . . 145--145 M. Kim and Y. Kim and H. Kim A Comparative Study of Software Model Checkers as Unit Testing Tools: An Industrial Case Study . . . . . . . . . 146--160 S. Mouchawrab and L. C. Briand and Y. Labiche and M. Di Penta Assessing, Comparing, and Combining State Machine-Based Testing and Structural Testing: A Series of Experiments . . . . . . . . . . . . . . 161--187 A. Egyed Automatically Detecting and Tracking Inconsistencies in Software Design Models . . . . . . . . . . . . . . . . . 188--204 A. De Lucia and M. Di Penta and R. Oliveto Improving Source Code Lexicon via Traceability and Information Retrieval 205--227 L. Baresi and C. Ghezzi and L. Mottola Loupe: Verifying Publish--Subscribe Architectures with a Magnifying Lens . . 228--246 L. Baresi and S. Guinea Self-Supervising BPEL Processes . . . . 247--263 K. Praditwong and M. Harman and X. Yao Software Module Clustering as a Multi-Objective Search Problem . . . . . 264--282 O. Dieste and N. Juristo Systematic review and aggregation of empirical studies on elicitation techniques . . . . . . . . . . . . . . . 283--304 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
M. Cataldo and K. Ehrlich and A. Mockus Guest Editors' Introduction: Special Section on the Socio-Technical Environment of Software Development Projects . . . . . . . . . . . . . . . . 305--306 I. Kwan and A. Schroter and D. Damian Does Socio-Technical Congruence Have an Effect on Software Build Success? A Study of Coordination in a Software Project . . . . . . . . . . . . . . . . 307--324 C. R. B. de Souza and D. F. Redmiles The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? . . . . . . . . . . . 325--340 B. Cornelissen and A. Zaidman and A. van Deursen A Controlled Experiment for Program Comprehension through Trace Visualization . . . . . . . . . . . . . 341--355 Q. Song and Z. Jia and M. Shepperd and S. Ying and J. Liu A General Software Defect-Proneness Prediction Framework . . . . . . . . . . 356--370 P. K. Manadhata and J. M. Wing An Attack Surface Metric . . . . . . . . 371--386 R. Calinescu and L. Grunske and M. Kwiatkowska and R. Mirandola and G. Tamburrelli Dynamic QoS Management and Optimization in Service-Based Systems . . . . . . . . 387--409 M. Weidlich and J. Mendling and M. Weske Efficient Consistency Measurement Based on Behavioral Profiles of Process Models 410--429 D. Kim and X. Wang and S. Kim and A. Zeller and S. C. Cheung and S. Park Which Crashes Should I Fix First?: Predicting Top Crashes at an Early Stage to Prioritize Debugging Efforts . . . . 430--447 Anonymous Distinguish yourself with the CSDP [advertisement] . . . . . . . . . . . . 448--448 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
M. Perepletchikov and C. Ryan A Controlled Experiment for Evaluating the Impact of Coupling on the Maintainability of Service-Oriented Software . . . . . . . . . . . . . . . . 449--465 M. Ying and Y. Feng A Flowchart Language for Quantum Programming . . . . . . . . . . . . . . 466--485 L. Mariani and F. Pastore and M. Pezze Dynamic Analysis for Diagnosing Integration Faults . . . . . . . . . . . 486--508 N. Salleh and E. Mendes and J. Grundy Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review . . . . . 509--525 A. Bergel and W. Harrison and V. Cahill and S. Clarke FlowTalk: Language Support for Long-Latency Operations in Embedded Devices . . . . . . . . . . . . . . . . 526--543 X. Amatriain and P. Arumi Frameworks Generate Domain-Specific Languages: A Case Study in the Multimedia Domain . . . . . . . . . . . 544--558 X. Yuan and M. B. Cohen and A. M. Memon GUI Interaction Testing: Incorporating Event Context . . . . . . . . . . . . . 559--574 L. Burgy and L. Reveillere and J. Lawall and G. Muller Zebu: A Language-Based Approach for Network Protocol Message Processing . . 575--591 Anonymous Distinguish yourself with the CSDP [advertisement] . . . . . . . . . . . . 592--592 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
I. Crnkovic and S. Sentilles and A. Vulgarakis and M. R. V. Chaudron A Classification Framework for Software Component Models . . . . . . . . . . . . 593--615 X. Feng and D. L. Parnas and T. H. Tse and T. O'Callaghan A Comparison of Tabular Expression-Based Testing Strategies . . . . . . . . . . . 616--634 T. W. Kwan and H. K. N. Leung A Risk Management Methodology for Project Risk Dependencies . . . . . . . 635--648 Y. Jia and M. Harman An Analysis and Survey of the Development of Mutation Testing . . . . 649--678 H. Chen and J. Yu and C. Hang and B. Zang and P. C. Yew Dynamic Software Updating Using a Relaxed Consistency Model . . . . . . . 679--694 M. Jorgensen and S. Grimstad The Impact of Irrelevant and Misleading Information on Software Development Effort Estimates: A Randomized Controlled Field Experiment . . . . . . 695--707 P. Bishop and R. Bloomfield and B. Littlewood and A. Povyakalo and D. Wright Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems . . . . . . . . . 708--717 D. Krishnamurthy and J. Rolia and M. Xu WAM --- The Weighted Average Method for Predicting the Performance of Systems with Bursts of Customer Sessions . . . . 718--735 Anonymous IEEE Computer Society Magazines and Transactions available in ePUB format [advertisement] . . . . . . . . . . . . 736--736 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. T. Lallchandani and R. Mall A Dynamic Slicing Technique for UML Architectural Models . . . . . . . . . . 737--771 Y. Shin and A. Meneely and L. Williams and J. A. Osborne Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities . . . . . . 772--787 J. Al Dallal Measuring the Discriminative Power of Object-Oriented Class Cohesion Metrics 788--804 X. Liu and Y. Yang and Y. Jiang and J. Chen Preventing Temporal Violations in Scientific Workflows: Where and How . . 805--825 L. Carnevali and L. Ridi and E. Vicario Putting Preemptive Time Petri Nets to Work in a V-Model SW Life Cycle . . . . 826--844 G. J. Holzmann and R. Joshi and A. Groce Swarm Verification Techniques . . . . . 845--857 L. Pauleve and M. Magnin and O. Roux Tuning Temporal Features within the Stochastic $ \pi $-Calculus . . . . . . 858--871 G. Concas and M. Marchesi and A. Murgia and R. Tonelli and I. Turnu On the Distribution of Bugs in the Eclipse System . . . . . . . . . . . . . 872--877 Anonymous IEEE Computer Society Magazines and Transactions available in ePUB format [advertisement] . . . . . . . . . . . . 878--878 Anonymous New Transactions Issue Alerts . . . . . 879--879 Anonymous What's new in Transactions [advertisement] . . . . . . . . . . . . 880--880 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside back cover] . . . . . . . . . . c3--c3 Anonymous [Inside front cover] . . . . . . . . . . c2--c2
B. Nuseibeh State of the Journal . . . . . . . . . . 1--2 J. M. Atlee and P. Inverardi Guest Editor's Introduction: International Conference on Software Engineering . . . . . . . . . . . . . . 3--4 E. Murphy-Hill and C. Parnin and A. P. Black How We Refactor, and How We Know It . . 5--18 C. Treude and M. A. Storey Work Item Tagging: Communicating Concerns in Collaborative Software Development . . . . . . . . . . . . . . 19--34 A. Mesbah and A. van Deursen and D. Roest Invariant-Based Automatic Testing of Modern Web Applications . . . . . . . . 35--53 C. Le Goues and T. Nguyen and S. Forrest and W. Weimer GenProg: A Generic Method for Automatic Software Repair . . . . . . . . . . . . 54--72 S. Malek and N. Medvidovic and M. Mikic-Rakic An Extensible Framework for Improving a Distributed Software System's Deployment Architecture . . . . . . . . . . . . . . 73--100 R. Toledo and A. Nunez and E. Tanter and J. Noye Aspectizing Java Access Control . . . . 101--117 M. Mortensen and S. Ghosh and J. Bieman Aspect-Oriented Refactoring of Legacy Applications: An Evaluation . . . . . . 118--140 G. de Caso and V. Braberman and D. Garbervetsky and S. Uchitel Automated Abstractions for Contract Validation . . . . . . . . . . . . . . . 141--162 U. Raja and M. J. Tretter Defining and Evaluating a Measure of Open Source Project Survivability . . . 163--174 C. Le Goues and W. Weimer Measuring Code Quality to Improve Specification Mining . . . . . . . . . . 175--190 P. C. Van Oorschot and G. Wurster Reducing Unauthorized Modification of Digital Objects . . . . . . . . . . . . 191--204 M. Tribastone and S. Gilmore and J. Hillston Scalable Differential Analysis of Process Algebra Models . . . . . . . . . 205--219 H. Liu and Z. Ma and W. Shao and Z. Niu Schedule of Bad Smell Detection and Resolution: A New Way to Save Effort . . 220--235 Anonymous 2011 Reviewers List . . . . . . . . . . 236--238 Anonymous Introduction to OnlinePlus Video [advertisement] . . . . . . . . . . . . 239--239 Anonymous What's new in Transactions [advertisement] . . . . . . . . . . . . 240--240 Anonymous 2011 Annual Index . . . . . . . . . . . Online Only Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Cover3] . . . . . . . . . . . . . . . . c3--c3 Anonymous [Front inside cover] . . . . . . . . . . c2--c2 Anonymous Table of Contents [Front cover] . . . . c1--c1
A. Orso and P. Tonella Guest Editorial: Special Section on the International Symposium on Software Testing and Analysis 2010 . . . . . . . 241--242 V. Dallmeier and N. Knopp and C. Mallon and G. Fraser and S. Hack and A. Zeller Automatically Generating Test Cases for Specification Mining . . . . . . . . . . 243--257 A. Arcuri and M. Z. Iqbal and L. Briand Random Testing: Theoretical Results and Practical Implications . . . . . . . . . 258--277 G. Fraser and A. Zeller Mutation-Driven Generation of Unit Tests and Oracles . . . . . . . . . . . . . . 278--292 T. Kwon and Z. Su Automatic Detection of Unsafe Dynamic Component Loadings . . . . . . . . . . . 293--313 S. Artzi and J. Dolby and F. Tip and M. Pistoia Fault Localization for Dynamic Web Applications . . . . . . . . . . . . . . 314--335 A. Sen and K. Ramamurthy and A. P. Sinha A Model of Data Warehousing Process Maturity . . . . . . . . . . . . . . . . 336--353 M. Shousha and L. Briand and Y. Labiche A UML/MARTE Model Analysis Method for Uncovering Scenarios Leading to Starvation and Deadlocks in Concurrent Systems . . . . . . . . . . . . . . . . 354--374 K. Dejaeger and W. Verbeke and D. Martens and B. Baesens Data Mining Techniques for Software Effort Estimation: A Comparative Study 375--397 M. Unterkalmsteiner and T. Gorschek and A. K. M. M. Islam and C. K. Cheng and R. B. Permadi and R. Feldt Evaluation and Measurement of Software Process Improvement --- a Systematic Literature Review . . . . . . . . . . . 398--424 E. Kocaguneli and T. Menzies and A. Bener and J. W. Keung Exploiting the Essential Assumptions of Analogy-Based Effort Estimation . . . . 425--438 J. L. Salmeron and C. Lopez Forecasting Risk Impact on ERP Maintenance with Augmented Fuzzy Cognitive Maps . . . . . . . . . . . . . 439--452 P. McMinn and M. Harman and K. Lakhotia and Y. Hassoun and J. Wegener Input Domain Reduction through Irrelevant Variable Removal and Its Effect on Local, Global, and Hybrid Search-Based Structural Test Data Generation . . . . . . . . . . . . . . . 453--477 F. A. Schreiber and R. Camplani and M. Fortunato and M. Marelli and G. Rota PerLa: A Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems . . . . . . . . . . . . . . . . 478--496 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Cover2] . . . . . . . . . . . . . . . . c2--c2 Anonymous [Inside back cover] . . . . . . . . . . c3--c3 Anonymous Table of Contents [Front cover] . . . . c1--c1
A. Arcuri A Theoretical and Empirical Analysis of the Role of Test Sequence Length in Software Testing for Structural Coverage 497--519 F. Cuadrado and J. C. Duenas and R. Garcia-Carmona An Autonomous Engine for Services Configuration and Deployment . . . . . . 520--536 J. Brickey and S. Walczak and T. Burgess Comparing Semi-Automated Clustering Methods for Persona Development . . . . 537--546 J. W. Wilkerson and J. F. Nunamaker and R. Mercer Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development . . . . . . . . . . . . . . 547--560 A. Kalbasi and D. Krishnamurthy and J. Rolia and S. Dawson DEC: Service Demand Estimation with Confidence . . . . . . . . . . . . . . . 561--578 D. Rothlisberger and M. Harry and W. Binder and P. Moret and D. Ansaloni and A. Villazon and O. Nierstrasz Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks . . . . . . . 579--591 I. Di Pietro and F. Pagliarecci and L. Spalazzi Model Checking Semantically Annotated Services . . . . . . . . . . . . . . . . 592--608 V. Andrikopoulos and S. Benbernou and M. P. Papazoglou On the Evolution of Services . . . . . . 609--628 R. M. Hierons Oracles for Distributed Testing . . . . 629--641 R. Khatchadourian and P. Greenwood and A. Rashid and G. Xu Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software . . . . . . . . 642--657 W. Li QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems . . . . . . . . . . . . 658--676 M. Jorgensen and S. Grimstad Software Development Estimation Biases: The Role of Interdependence . . . . . . 677--693 A. Lienhard and T. Girba and O. Nierstrasz Specifying Dynamic Analyses by Extending Language Semantics . . . . . . . . . . . 694--706 S. L. Lim and A. Finkelstein StakeRare: Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation . . . . . . . . 707--735 Anonymous IEEE Computer Society OnlinePlus Coming Soon to TSE . . . . . . . . . . . . . . 736--736 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Inside back cover] . . . . . . . . . . c3--c3 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous Table of Contents [Front cover] . . . . c1--c1
M. T. Valente and V. Borges and L. Passos A Semi-Automatic Approach for Extracting Software Product Lines . . . . . . . . . 737--754 R. Mateescu and P. Poizat and G. Salaün Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques . . . . . . . . . . . . . . . 755--777 G. Casale and A. Kalbasi and D. Krishnamurthy and J. Rolia BURN: Enabling Workload Burstiness in Customized Service Benchmarks . . . . . 778--793 T. Y. Chen and P. L. Poon and S. F. Tang and T. H. Tse DESSERT: a DividE-and-conquer methodology for identifying categorieS, choiceS, and choicE Relations for Test case generation . . . . . . . . . . . . 794--809 D. E. Harter and C. F. Kemerer and S. A. Slaughter Does Software Process Improvement Reduce the Severity of Defects? A Longitudinal Field Study . . . . . . . . . . . . . . 810--827 O. Moser and F. Rosenberg and S. Dustdar Domain-Specific Service Selection for Composite Services . . . . . . . . . . . 828--843 S. Lu and S. Park and Y. Zhou Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing . . 844--860 M. Tribastone and J. Ding and S. Gilmore and J. Hillston Fluid Rewards for a Stochastic Process Algebra . . . . . . . . . . . . . . . . 861--874 G. Parmer and R. West Mutable Protection Domains: Adapting System Fault Isolation for Reliability and Efficiency . . . . . . . . . . . . . 875--888 A. Sarma and D. F. Redmiles and A. van der Hoek Palantir: Early Detection of Development Conflicts Arising from Parallel Code Changes . . . . . . . . . . . . . . . . 889--908 P. Liu and C. Zhang Pert: The Application-Aware Tailoring of Java Object Persistence . . . . . . . . 909--922 R. Berntsson Svensson and T. Gorschek and B. Regnell and R. Torkar and A. Shahrokni and R. Feldt Quality Requirements in Industrial Practice --- an Extended Interview Study at Eleven Companies . . . . . . . . . . 923--935 S. Mirarab and S. Akhlaghi and L. Tahvildari Size-Constrained Regression Test Case Selection Using Multicriteria Optimization . . . . . . . . . . . . . . 936--956 L. Cordeiro and B. Fischer and J. Marques-Silva SMT-Based Bounded Model Checking for Embedded ANSI-C Software . . . . . . . . 957--974 A. Coronato and G. De Pietro Tools for the Rapid Prototyping of Provably Correct Ambient Intelligence Applications . . . . . . . . . . . . . . 975--991 Anonymous New Transactions Newsletter [advertisement] . . . . . . . . . . . . 992--992 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Inside back cover] . . . . . . . . . . c3--c3 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous Table of Contents [Front cover] . . . . c1--c1
K. Lind and R. Heldal A Practical Approach to Size Estimation of Embedded Software Components . . . . 993--1007 H. A. Nguyen and T. T. Nguyen and N. H. Pham and J. Al-Kofahi and T. N. Nguyen Clone Management for Evolving Software 1008--1026 F. Zickert and R. Beck Coping with Existing Systems in Information Systems Development . . . . 1027--1039 G. Casale and N. Mi and L. Cherkasova and E. Smirni Dealing with Burstiness in Multi-Tier Applications: Models and Their Parameterization . . . . . . . . . . . . 1040--1053 N. Ramasubbu and C. F. Kemerer and J. Hong Structural Complexity and Programmer Team Strategy: An Experimental Test . . 1054--1068 C. McMillan and M. Grechanik and D. Poshyvanyk and C. Fu and Q. Xie Exemplar: A Source Code Search Engine for Finding Highly Relevant Applications 1069--1087 A. Arcuri and L. Briand Formal Analysis of the Probability of Interaction Fault Detection Using Random Testing . . . . . . . . . . . . . . . . 1088--1099 S. Liu and Y. Chen and F. Nagoya and J. A. McDermid Formal Specification-Based Inspection for Verification of Programs . . . . . . 1100--1122 C. Zhang and H. A. Jacobsen Mining Crosscutting Concerns through Random Walks . . . . . . . . . . . . . . 1123--1137 V. Cardellini and E. Casalicchio and V. Grassi and S. Iannucci and F. L. Presti and R. Mirandola MOSES: A Framework for QoS Driven Runtime Adaptation of Service-Oriented Systems . . . . . . . . . . . . . . . . 1138--1159 W. N. Sumner and Y. Zheng and D. Weeratunge and X. Zhang Precise Calling Context Encoding . . . . 1160--1177 B. Littlewood and J. Rushby Reasoning about the Reliability of Diverse Two-Channel Systems in Which One Channel Is ``Possibly Perfect'' . . . . 1178--1194 J. Xuan and H. Jiang and Z. Ren and Z. Luo Solving the Large Scale Next Release Problem with a Backbone-Based Multilevel Algorithm . . . . . . . . . . . . . . . 1195--1212 C. Zhang and D. Budgen What Do We Know about the Effectiveness of Software Design Patterns? . . . . . . 1213--1231 Anonymous IEEE Open Access Publishing [advertisement] . . . . . . . . . . . . 1232--1232 Anonymous IEEE Computer Society [Back cover] . . . c4--c4 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous Table of Contents [Front cover] . . . . c1--c1 Anonymous TSE information for authors [inside back cover] . . . . . . . . . . . . . . . . . c3--c3
M. Schäfer and A. Thies and F. Steimann and F. Tip A Comprehensive Approach to Naming and Accessibility in Refactoring Java Programs . . . . . . . . . . . . . . . . 1233--1257 H. Mei and D. Hao and L. Zhang and L. Zhang and J. Zhou and G. Rothermel A Static Approach to Prioritizing JUnit Test Cases . . . . . . . . . . . . . . . 1258--1275 T. Hall and S. Beecham and D. Bowes and D. Gray and S. Counsell A Systematic Literature Review on Fault Prediction Performance in Software Engineering . . . . . . . . . . . . . . 1276--1304 L. Búrdalo and A. Terrasa and A. Espinosa and A. García-Fornes Analyzing the Effect of Gain Time on Soft-Task Scheduling Policies in Real-Time Systems . . . . . . . . . . . 1305--1318 F. Brosch and H. Koziolek and B. Buhnova and R. Reussner Architecture-Based Reliability Prediction with the Palladio Component Model . . . . . . . . . . . . . . . . . 1319--1339 C. M. Hayden and E. K. Smith and E. A. Hardisty and M. Hicks and J. S. Foster Evaluating Dynamic Software Update Safety Using Systematic Testing . . . . 1340--1354 S. Nejati and M. Sabetzadeh and M. Chechik and S. Easterbrook and P. Zave Matching and Merging of Variant Feature Specifications . . . . . . . . . . . . . 1355--1375 N. I. Altintas and S. Cetin and A. H. Dogru and H. Oguztuzun Modeling Product Line Software Assets Using Domain-Specific Kits . . . . . . . 1376--1402 E. Kocaguneli and T. Menzies and J. W. Keung On the Value of Ensemble Effort Estimation . . . . . . . . . . . . . . . 1403--1416 E. Murphy-Hill and A. P. Black Programmer-Friendly Refactoring Errors 1417--1431 M. M. Geipel and F. Schweitzer The Link between Dependency and Cochange: Empirical Evidence . . . . . . 1432--1444 D. Cassou and J. Bruneau and C. Consel and E. Balland Toward a Tool-Based Development Methodology for Pervasive Computing Applications . . . . . . . . . . . . . . 1445--1463 A. Heydarnoori and K. Czarnecki and W. Binder and T. T. Bartolomei Two Studies of Framework-Usage Templates Extracted from Dynamic Traces . . . . . 1464--1487 Anonymous OnlinePlus Coming Soon to TSE [advertisement] . . . . . . . . . . . . 1488--1488 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Back inside cover] . . . . . . . . . . c3--c3 Anonymous [Front inside cover] . . . . . . . . . . c2--c2 Anonymous [Table of contents --- Front cover] . . c1--c1
W. N. Chen and J. Zhang Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler . . . . . . . . . 1--17 D. Falessi and G. Cantone and G. Canfora Empirical Principles and an Industrial Case Study in Retrieving Equivalent Requirements via Natural Language Processing Techniques . . . . . . . . . 18--44 M. Kim and D. Notkin and D. Grossman and G. Wilson Identifying and Summarizing Systematic Code Changes via Rule Inference . . . . 45--62 S. Apel and C. Kästner and C. Lengauer Language-Independent and Automated Software Composition: The FeatureHouse Experience . . . . . . . . . . . . . . . 63--79 R. Natella and D. Cotroneo and J. A. Duraes and H. S. Madeira On Fault Representativeness of Software Fault Injection . . . . . . . . . . . . 80--96 R. A. Hayden and J. T. Bradley and A. Clark Performance Specification and Evaluation with Unified Stochastic Probes and Fluid Analysis . . . . . . . . . . . . . . . . 97--118 L. Duboc and E. Letier and D. S. Rosenblum Systematic Elaboration of Scalability Requirements through Goal-Obstacle Analysis . . . . . . . . . . . . . . . . 119--140 Anonymous 2012 Reviewers List . . . . . . . . . . 141--144 Anonymous 2012 Annual Index . . . . . . . . . . . Not in print--Not in print
B. Nuseibeh Editorial: State of the Journal . . . . 145--146 G. Soares and R. Gheyi and T. Massoni Automated Behavioral Testing of Refactoring Engines . . . . . . . . . . 147--162 A. Shahbazi and A. F. Tappenden and J. Miller Centroidal Voronoi Tessellations --- a New Approach to Random Testing . . . . . 163--183 M. Piccioni and M. Oriol and B. Meyer Class Schema Evolution for Persistent Object-Oriented Software: Model, Empirical Study, and Automated Support 184--196 J. Lawrance and C. Bogart and M. Burnett and R. Bellamy and K. Rector and S. D. Fleming How Programmers Debug, Revisited: An Information Foraging Theory Perspective 197--215 S. Leue and W. Wei Integer Linear Programming-Based Property Checking for Asynchronous Reactive Systems . . . . . . . . . . . . 216--236 K. Dejaeger and T. Verbraken and B. Baesens Toward Comprehensible Software Fault Prediction Models Using Bayesian Network Classifiers . . . . . . . . . . . . . . 237--257 S. e. Z. Haidry and T. Miller Using Dependency Structures for Prioritization of Functional Test Suites 258--275 G. Fraser and A. Arcuri Whole Test Suite Generation . . . . . . 276--291
L. Carnevali and L. Ridi and E. Vicario A Quantitative Approach to Input Generation in Real-Time Testing of Stochastic Systems . . . . . . . . . . . 292--304 J. N. Oliveira and M. A. Ferreira Alloy Meets the Algebra of Programming: A Case Study . . . . . . . . . . . . . . 305--326 S. Abrahão and C. Gravino and E. Insfran and G. Scanniello and G. Tortora Assessing the Effectiveness of Sequence Diagrams in the Comprehension of Functional Requirements: Results from a Family of Five Experiments . . . . . . . 327--342 M. Cataldo and J. D. Herbsleb Coordination Breakdowns and Their Impact on Development Productivity and Software Failures . . . . . . . . . . . . . . . . 343--360 D. Alrajeh and J. Kramer and A. Russo and S. Uchitel Elaborating Requirements Using Model Checking and Inductive Learning . . . . 361--383 M. S. Raunak and L. J. Osterweil Resource Management for Complex, Dynamic Environments . . . . . . . . . . . . . . 384--402 L. Rosa and L. Rodrigues and A. Lopes and M. Hiltunen and R. Schlichting Self-Management of Adaptable Component-Based Applications . . . . . . 403--421 R. Hoda and J. Noble and S. Marshall Self-Organizing Roles on Agile Software Development Teams . . . . . . . . . . . 422--444
A. Perini and A. Susi and P. Avesani A Machine Learning Approach to Software Requirements Prioritization . . . . . . 445--461 T. Galinac Grbac and P. Runeson and D. Huljeni\'c A Second Replicated Quantitative Analysis of Fault Distributions in Complex Software Systems . . . . . . . . 462--476 S. Ikeda and M. Jibiki and Y. Kuno Coverage Estimation in Model Checking with Bitstate Hashing . . . . . . . . . 477--486 J. C. Grundy and J. Hosking and K. N. Li and N. M. Ali and J. Huh and R. L. Li Generating Domain-Specific Visual Language Tools from Abstract Visual Specifications . . . . . . . . . . . . . 487--515 X. Wang and L. Zhang and T. Xie and H. Mei and J. Sun Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis . . . . . . . . . 516--536 N. Mittas and L. Angelis Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm . . . . . . . . . 537--551 S. Shivaji and E. James Whitehead and R. Akella and S. Kim Reducing Features to Improve Code Change-Based Bug Prediction . . . . . . 552--569 P. Reales Mateo and M. Polo Usaola and J. L. Fernández Alemán Validating Second-Order Mutation at System Level . . . . . . . . . . . . . . 570--587
B. Nuseibeh Editorial [new associate editors] . . . 588--590 V. Nallur and R. Bahsoon A decentralized self-adaptation mechanism for service-based applications in the cloud . . . . . . . . . . . . . . 591--612 M. P. Robillard and E. Bodden and D. Kawrykow and M. Mezini and T. Ratchford Automated API Property Inference Techniques . . . . . . . . . . . . . . . 613--637 L. Carnevali and A. Pinzuti and E. Vicario Compositional Verification for Hierarchical Scheduling of Real-Time Systems . . . . . . . . . . . . . . . . 638--657 A. Aleti and B. Buhnova and L. Grunske and A. Koziolek and I. Meedeniya Software Architecture Optimization Methods: A Systematic Literature Review 658--683 Cemal Yilmaz Test Case-Aware Combinatorial Interaction Testing . . . . . . . . . . 684--706 J. Itkonen and M. V. Mäntylä and C. Lassenius The Role of the Tester's Knowledge in Exploratory Software Testing . . . . . . 707--724 N. Ali and Y. G. Guéhéneuc and G. Antoniol Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links . . . . . . . . . . . 725--741
B. Nuseibeh In Memoriam --- David Notkin (1953--2013) . . . . . . . . . . . . . . 742--743 M. Tribastone A fluid model for layered queueing networks . . . . . . . . . . . . . . . . 744--756 Y. Kamei and E. Shihab and B. Adams and A. E. Hassan and A. Mockus and A. Sinha and N. Ubayashi A large-scale empirical study of just-in-time quality assurance . . . . . 757--773 M. Marron and C. Sanchez and Z. Su and M. Fahndrich Abstracting runtime heaps for program understanding . . . . . . . . . . . . . 774--786 R. Baker and I. Habli An Empirical Evaluation of Mutation Testing for Improving the Test Quality of Safety-Critical Software . . . . . . 787--805 M. Cinque and D. Cotroneo and A. Pecchia Event Logs for the Analysis of Software Failures: A Rule-Based Approach . . . . 806--821 T. Menzies and A. Butcher and D. Cok and A. Marcus and L. Layman and F. Shull and B. Turhan and T. Zimmermann Local versus Global Lessons for Defect Prediction and Effort Estimation . . . . 822--834 Y. Rafique and V. B. Mi\vsi\'c The Effects of Test-Driven Development on External Quality and Productivity: A Meta-Analysis . . . . . . . . . . . . . 835--856 G. Rodriguez-Navas and J. Proenza Using Timed Automata for Modeling Distributed Systems with Clocks: Challenges and Solutions . . . . . . . . 857--868 I. Malavolta and P. Lago and H. Muccini and P. Pelliccione and A. Tang What Industry Needs from Architectural Languages: A Survey . . . . . . . . . . 869--891
K. Androutsopoulos and D. Clark and M. Harman and R. M. Hierons and Z. Li and L. Tratt Amorphous Slicing of Extended Finite State Machines . . . . . . . . . . . . . 892--909 J. Lee and I. Shin EDZL Schedulability Analysis in Real-Time Multicore Scheduling . . . . . 910--916 J. Brandt and M. Gemünde and K. Schneider and S. K. Shukla and J. P. Talpin Embedding Polychrony into Synchrony . . 917--929 E. di Bella and I. Fronza and N. Phaphoom and A. Sillitti and G. Succi and J. Vlasenko Pair Programming and Software Defects --- a Large, Industrial Case Study . . . 930--953 A. Zisman and G. Spanoudakis and J. Dooley and I. Siveroni Proactive and Reactive Runtime Service Discovery: A Framework and Its Evaluation . . . . . . . . . . . . . . . 954--974 G. E. Sibay and V. Braberman and S. Uchitel and J. Kramer Synthesizing Modal Transition Systems from Triggered Scenarios . . . . . . . . 975--1001 B. Kitchenham and D. I. K. Sjòberg and T. Dybå and O. P. Brereton and D. Budgen and M. Höst and P. Runeson Trends in the Quality of Human-Centric Software Engineering Experiments --- a Quasi-Experiment . . . . . . . . . . . . 1002--1017 Y. Liu and W. Chen and Y. A. Liu and J. Sun and S. J. Zhang and J. S. Dong Verifying Linearizability via Optimized Refinement Checking . . . . . . . . . . 1018--1039
E. Kocaguneli and T. Menzies and J. Keung and D. Cok and R. Madachy Active learning and effort estimation: Finding the essential content of software effort estimation data . . . . 1040--1053 F. Peters and T. Menzies and L. Gong and H. Zhang Balancing Privacy and Utility in Cross-Company Defect Prediction . . . . 1054--1068 A. Classen and M. Cordy and P. Y. Schobbens and P. Heymans and A. Legay and J. F. Raskin Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking . . . . . . . . . . . . . 1069--1089 S. Kpodjedo and F. Ricca and P. Galinier and G. Antoniol and Y. G. Guéhéneuc MADMatch: Many-to-Many Approximate Diagram Matching for Design Comparison 1090--1111 H. Liu and X. Guo and W. Shao Monitor-Based Instant Software Refactoring . . . . . . . . . . . . . . 1112--1126 M. Pradel and T. R. Gross Name-Based Analysis of Equally Typed Method Arguments . . . . . . . . . . . . 1127--1143 D. I. K. Sjòberg and A. Yamashita and B. C. D. Anda and A. Mockus and T. Dybå Quantifying the Effect of Code Smells on Maintenance Effort . . . . . . . . . . . 1144--1156 N. Janevski and K. Goseva-Popstojanova Session Reliability of Web Systems under Heavy-Tailed Workloads: An Approach Based on Design and Analysis of Experiments . . . . . . . . . . . . . . 1157--1178 N. Torrado and M. P. Wiper and R. E. Lillo Software Reliability Modeling with Software Metrics Data via Gaussian Processes . . . . . . . . . . . . . . . 1179--1186
B. Nuseibeh Editorial . . . . . . . . . . . . . . . 1187--1189 D. Milicev and Z. Mijailovic Capsule-Based User Interface Modeling for Large-Scale Applications . . . . . . 1190--1207 M. Shepperd and Q. Song and Z. Sun and C. Mair Data Quality: Some Comments on the NASA Software Defect Datasets . . . . . . . . 1208--1215 W. L. Andrade and P. D. L. Machado Generating Test Cases for Real-Time Systems Based on Symbolic Models . . . . 1216--1229 L. Padgham and Z. Zhang and J. Thangarajah and T. Miller Model-Based Test Oracle Generation for Automated Unit Testing of Agent Systems 1230--1244 H. C. Jiau and L. W. Mar and J. C. Chen OBEY: Optimal Batched Refactoring Plan Execution for Class Responsibility Redistribution . . . . . . . . . . . . . 1245--1263 W. Maalej and M. P. Robillard Patterns of Knowledge in API Reference Documentation . . . . . . . . . . . . . 1264--1282 J. P. Galeotti and N. Rosner and C. G. López Pombo and M. F. Frias TACO: Efficient SAT-Based Bounded Verification Using Symmetry Breaking and Tight Bounds . . . . . . . . . . . . . . 1283--1307 Y. Moffett and J. Dingel and A. Beaulieu Verifying Protocol Conformance Using Software Model Checking for the Model-Driven Development of Embedded Systems . . . . . . . . . . . . . . . . 1307--13256
S. Sampath and R. Bryce and A. M. Memon A Uniform Representation of Hybrid Criteria for Regression Testing . . . . 1326--1344 A. Monden and T. Hayashi and S. Shinoda and K. Shirai and J. Yoshida and M. Barker and K. Matsumoto Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing 1345--1357 Y. Brun and R. Holmes and M. D. Ernst and D. Notkin Early Detection of Collaboration Conflicts and Risks . . . . . . . . . . 1358--1375 S. Ali and M. Zohaib Iqbal and A. Arcuri and L. C. Briand Generating Test Data from OCL Constraints with Search Techniques . . . 1376--1402 D. Basin and M. Harvan and F. Klaedtke and E. Zalinescu Monitoring Data Usage in Distributed Systems . . . . . . . . . . . . . . . . 1403--1426 S. W. Thomas and M. Nagappan and D. Blostein and A. E. Hassan The Impact of Classifier Configuration and Classifier Combination on Bug Localization . . . . . . . . . . . . . . 1427--1443 C. Ye and H. A. Jacobsen Whitening SOA Testing via Event Exposure 1444--1465
B. Nuseibeh In Memoriam: Mary Jean Harrold (1947--2013) . . . . . . . . . . . . . . 1466--1466 N. Esfahani and A. Elkhodary and S. Malek A Learning-Based Framework for Engineering Feature-Oriented Self-Adaptive Software Systems . . . . . 1467--1493 N. M. Ali and J. Hosking and J. Grundy A Taxonomy and Mapping of Computer-Based Critiquing Tools . . . . . . . . . . . . 1494--1520 B. Littlewood and A. Povyakalo Conservative Reasoning about the Probability of Failure on Demand of a 1-out-of-2 Software-Based System in Which One Channel Is ``Possibly Perfect'' . . . . . . . . . . . . . . . 1521--1530 A. Reder and A. Egyed Determining the Cause of a Design Model Inconsistency . . . . . . . . . . . . . 1531--1548 H. Y. Chen and T. H. Tse Equality to Equals and Unequals: A Revisit of the Equivalence and Nonequivalence Criteria in Class-Level Testing of Object-Oriented Software . . 1549--1563 S. Kailasam and N. Gnanasambandam and J. Dharanipragada and N. Sharma Optimizing Ordered Throughput Using Autonomic Cloud Bursting Schedulers . . 1564--1581 L. Carvajal and A. M. Moreno and M. I. Sánchez-Segura and A. Seffah Usability through Software Design . . . 1582--1596 D. Kim and Y. Tao and S. Kim and A. Zeller Where Should We Fix This Bug? A Two-Phase Recommendation Model . . . . . 1597--1610
T. Berger and S. She and R. Lotufo and A. Wasowski and K. Czarnecki A Study of Variability Models and Languages in the Systems Software Domain 1611--1640 B. Littlewood and A. Povyakalo Conservative Bounds for the pfd of a 1-out-of-2 Software-Based System Based on an Assessor's Subjective Probability of ``Not Worse Than Independence'' . . . 1641--1653 K. T. Stolee and S. Elbaum Identification, Impact, and Refactoring of Smells in Pipe-Like Web Mashups . . . 1654--1679 J. Maras and M. Stula and J. Carlson and I. Crnkovic Identifying Code of Individual Features in Client-Side Web Applications . . . . 1680--1697 T. Menzies and A. Brady and J. Keung and J. Hihn and S. Williams and O. El-Rawas and P. Green and B. Boehm Learning Project Management Decisions: A Case Study with Case-Based Reasoning versus Data Farming . . . . . . . . . . 1698--1713 D. Cooray and E. Kouroshfar and S. Malek and R. Roshandel Proactive Self-Adaptation for Improving the Reliability of Mission-Critical, Embedded, and Mobile Software . . . . . 1714--1735 N. Hariri and C. Castro-Herrera and M. Mirakhorli and J. Cleland-Huang and B. Mobasher Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings . . . . . . . . 1736--1752 G. Lee and J. A. Espinosa and W. H. DeLone Task Environment Complexity, Global Team Dispersion, Process Capabilities, and Coordination in Software Development . . 1753--1771
B. Nuseibeh Signing Off: The State of the Journal 1--3 H. Liu and F. C. Kuo and D. Towey and T. Y. Chen How Effectively Does Metamorphic Testing Alleviate the Oracle Problem? . . . . . 4--22 L. Madeyski and W. Orzeszyna and R. Torkar and M. Józala Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation . . . . . . . . . . . . . 23--42 C. Yilmaz and E. Dumlu and M. B. Cohen and A. Porter Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach . . . 43--66 C. Kästner and A. Dreiling and K. Ostermann Variability Mining: Consistent Semi-automatic Detection of Product-Line Features . . . . . . . . . . . . . . . . 67--82 L. L. Minku and D. Sudholt and X. Yao Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis . . . . . . . . . . 83--102 Anonymous 2013 Reviewers List . . . . . . . . . . 103--106
Y. Sui and D. Ye and J. Xue Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis . . . . 107--122 F. Ta\"\iani and S. Lin and G. S. Blair GossipKit: A Unified Component Framework for Gossip . . . . . . . . . . . . . . . 123--136 S. W. Lin and É. André and Y. Liu and J. Sun and J. S. Dong Learning Assumptions for Compositional Verification of Timed Systems . . . . . 137--153 M. A. Schumann and D. Drusinsky and J. B. Michael and D. Wijesekera Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes 154--166 I. Trummer and B. Faltings and W. Binder Multi-Objective Quality-Driven Service Selection --- a Fully Polynomial Time Approximation Scheme . . . . . . . . . . 167--191 Q. He and J. Yan and H. Jin and Y. Yang Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction 192--215
B. N. Nguyen and A. M. Memon An Observe-Model-Exercise* Paradigm to Test Event-Driven Systems with Undetermined Input Spaces . . . . . . . 216--234 N. Ramasubbu Governing Software Process Improvements in Globally Distributed Product Development . . . . . . . . . . . . . . 235--250 C. Song and A. Porter and J. S. Foster iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees . . . . . . . . . . . 251--265 Y. Cai and W. K. Chan Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs . . . . . . . . . 266--281 M. Galster and D. Weyns and D. Tofan and B. Michalik and P. Avgeriou Variability in Software Systems --- a Systematic Literature Review . . . . . . 282--306 A. Groce and T. Kulesza and C. Zhang and S. Shamasunder and M. Burnett and W. K. Wong and S. Stumpf and S. Das and A. Shinsel and F. Bice and K. McIntosh You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems 307--323
D. Basin and M. Clavel and M. Egea and M. A. G. de Dios and C. Dania A Model-Driven Methodology for Developing Secure Data-Management Applications . . . . . . . . . . . . . . 324--337 C. Damas and B. Lambeau and A. van Lamsweerde Analyzing Critical Decision-Based Processes . . . . . . . . . . . . . . . 338--365 S. Rastkar and G. C. Murphy and G. Murray Automatic Summarization of Bug Reports 366--380 R. Latorre Effects of Developer Experience on Learning and Applying Unit Test-Driven Development . . . . . . . . . . . . . . 381--395 J. Lv and B. B. Yin and K. Y. Cai On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment . . . . . . . . . 396--412 S. Kim Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation 413--426
Y. Pei and C. A. Furia and M. Nordio and Y. Wei and B. Meyer and A. Zeller Automated Fixing of Programs with Contracts . . . . . . . . . . . . . . . 427--449 L. Hatton Conservation of Information: Software's Hidden Clockwork? . . . . . . . . . . . 450--460 Q. He and J. Han and Y. Yang and H. Jin and J. G. Schneider and S. Versteeg Formulating Cost-Effective Monitoring Strategies for Service-Based Systems . . 461--482 W. Leungwattanakit and C. Artho and M. Hagiya and Y. Tanabe and M. Yamamoto and K. Takahashi Modular Software Model Checking for Distributed Systems . . . . . . . . . . 483--501 V. Arnaoudova and L. M. Eshkevari and M. D. Penta and R. Oliveto and G. Antoniol and Y. G. Guéhéneuc REPENT: Analyzing the Nature of Identifier Renamings . . . . . . . . . . 502--532
A. T. Misirli and A. B. Bener Bayesian Networks For Evidence-Based Decision-Making in Software Engineering 533--554 J. M. Vara and V. A. Bollati and Á. Jiménez and E. Marcos Dealing with Traceability in the MDD of Model Transformations . . . . . . . . . 555--583 J. Lee and K. H. Hsu GEA: A Goal-Driven Approach to Discovering Early Aspects . . . . . . . 584--602 M. Shepperd and D. Bowes and T. Hall Researcher Bias: The Use of Machine Learning in Software Defect Prediction 603--616 A. Bartel and J. Klein and M. Monperrus and Y. Le Traon Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android . . . . . . . . . 617--632
M. Kim and T. Zimmermann and N. Nagappan An Empirical Study of Refactoring Challenges and Benefits at Microsoft . . 633--649 C. Henard and M. Papadakis and G. Perrouin and J. Klein and P. Heymans and Y. Le Traon Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize $T$-Wise Test Configurations for Software Product Lines . . . . . . . 650--670 G. Bavota and R. Oliveto and M. Gethers and D. Poshyvanyk and A. De Lucia Methodbook: Recommending Move Method Refactorings via Relational Topic Models 671--694 J. Song and C. Cadar and P. Pietzuch \sc SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications . . . . . 695--709 P. Collingbourne and C. Cadar and P. H. J. Kelly Symbolic Crosschecking of Data-Parallel Floating-Point Code . . . . . . . . . . 710--737
M. Hertis and M. B. Juric An Empirical Analysis of Business Process Execution Language Usage . . . . 738--757 N. Ramasubbu and C. F. Kemerer Managing Technical Debt in Enterprise Software Packages . . . . . . . . . . . 758--772 X. Wang and Y. Dang and L. Zhang and D. Zhang and E. Lan and H. Mei Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time . . . . . . . . . . 773--794 G. Díaz and M. E. Cambronero and E. Martínez and G. Schneider Specification and Verification of Normative Texts Using C-O Diagrams . . . 795--817 H. Leopold and J. Mendling and A. Polyvyanyy Supporting Process Model Validation through Natural Language Generation . . 818--840
W. Kessentini and M. Kessentini and H. Sahraoui and S. Bechikh and A. Ouni A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection . . . . . . . . . 841--861 I. Rodríguez and L. Llana and P. Rabanal A General Testability Theory: Classes, Properties, Complexity, and Testing Reductions . . . . . . . . . . . . . . . 862--894 D. Fernandez-Amoros and R. Heradio and J. A. Cerrada and C. Cerrada A Scalable Approach to Exact Model and Commonality Counting for Extended Feature Models . . . . . . . . . . . . . 895--910 Y. Liu and C. Xu and S. C. Cheung and J. Lü GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications . . . . . . . . . . . . . . 911--940
E. Casagrande and S. Woldeamlak and W. L. Woon and H. H. Zeineldin and D. Svetinovic NLP-KAOS for Systems Goal Elicitation: Smart Metering System Case Study . . . . 941--956 Y. D. Lin and J. F. Rojas and E. T. H. Chu and Y. C. Lai On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices . . . . . . . . . . 957--970 W. Araujo and L. C. Briand and Y. Labiche On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object-Oriented Software . . 971--992 R. Scandariato and J. Walden and A. Hovsepyan and W. Joosen Predicting Vulnerable Software Components via Text Mining . . . . . . . 993--1006 T. Miller and B. Lu and L. Sterling and G. Beydoun and K. Taveter Requirements Elicitation and Specification Using the Agent Paradigm: The Case Study of an Aircraft Turnaround Simulator . . . . . . . . . . . . . . . 1007--1024 A. C. Dias-Neto and G. H. Travassos Supporting the Combined Selection of Model-Based Testing Techniques . . . . . 1025--1041
J. S. Cuadrado and E. Guerra and J. de Lara A Component Model for Model Transformations . . . . . . . . . . . . 1042--1060 S. Draxler and G. Stevens and A. Boden Keeping the Development Environment Up to Date --- a Study of the Situated Practices of Appropriating the Eclipse IDE . . . . . . . . . . . . . . . . . . 1061--1074 C. T. Lin and Y. F. Li Rate-Based Queueing Simulation Model of Open Source Software Debugging Activities . . . . . . . . . . . . . . . 1075--1099 D. Athanasiou and A. Nugroho and J. Visser and A. Zaidman Test Code Quality and Its Relation to Issue Handling Performance . . . . . . . 1100--1125 B. Dagenais and M. P. Robillard Using Traceability Links to Recommend Adaptive Changes for Documentation Evolution . . . . . . . . . . . . . . . 1126--1146
F. Massacci and V. H. Nguyen An Empirical Methodology to Evaluate Vulnerability Discovery Models . . . . . 1147--1162 G. R. Bergersen and D. I. K. Sjòberg and T. Dybå Construction and Validation of an Instrument for Measuring Programming Skill . . . . . . . . . . . . . . . . . 1163--1184 E. Coppa and C. Demetrescu and I. Finocchi Input-Sensitive Profiling . . . . . . . 1185--1205 C. Tian and Z. Duan and Z. Duan Making CEGAR More Efficient in Software Model Checking . . . . . . . . . . . . . 1206--1223 K. Lano and S. Kolahdouz-Rahimi Model-Transformation Design Patterns . . 1224--1259
M. B. Dwyer State of the Journal Editorial . . . . . 1--2 T. Wang and J. Sun and X. Wang and Y. Liu and Y. Si and J. S. Dong and X. Yang and X. Li A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata 3--18 B. M. Samuel and L. A. Watkins III and A. Ehle and V. Khatri Customizing the Representation Capabilities of Process Models: Understanding the Effects of Perceived Modeling Impediments . . . . . . . . . . 19--39 S. L. Lim and P. J. Bentley and N. Kanakam and F. Ishikawa and S. Honiden Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering . . . . . . . . 40--64 E. Murphy-Hill and T. Zimmermann and C. Bird and N. Nagappan The Design Space of Bug Fixes and How Developers Navigate It . . . . . . . . . 65--81 M. Zhou and A. Mockus Who Will Stay in the FLOSS Community? Modeling Participant's Initial Behavior 82--99 Anonymous 2014 Reviewers List* . . . . . . . . . . 100--103 Anonymous 2014 Index \booktitleIEEE Transactions on Software Engineering Vol. 40 . . . . 104--112
F. Belli and M. Beyazìt Exploiting Model Morphology for Event-Based Testing . . . . . . . . . . 113--134 N. Mangano and T. D. LaToza and M. Petre and A. van der Hoek How Software Designers Interact with Sketches at the Whiteboard . . . . . . . 135--156 F. Brosig and P. Meier and S. Becker and A. Koziolek and H. Koziolek and S. Kounev Quantitative Evaluation of Model-Driven Performance Analysis and Simulation of Component-Based Architectures . . . . . 157--175 M. D. Syer and M. Nagappan and B. Adams and A. E. Hassan Replicating and Re-Evaluating the Theory of Relative Defect-Proneness . . . . . . 176--197 N. Chen and S. Kim STAR: Stack Trace Based Automatic Crash Reproduction via Symbolic Execution . . 198--220
A. Bennaceur and V. Issarny Automated Synthesis of Mediators to Support Component Interoperability . . . 221--240 J. Cunha and J. P. Fernandes and J. Mendes and J. Saraiva Embedding, Evolution, and Validation of Model-Driven Spreadsheets . . . . . . . 241--263 J. F. Pérez and G. Casale and S. Pacheco-Sanchez Estimating Computational Requirements in Multi-Threaded Applications . . . . . . 264--278 R. M. Hierons Generating Complete Controllable Test Suites for Distributed Testing . . . . . 279--293 A. Sakti and G. Pesant and Y. G. Guéhéneuc Instance Generator and Problem Representation to Improve Object Oriented Code Coverage . . . . . . . . . 294--313 S. Lee and S. Kang and S. Kim and M. Staats The Impact of View Histories on Edit Recommendations . . . . . . . . . . . . 314--330
Y. Yang and Y. Zhou and H. Lu and L. Chen and Z. Chen and B. Xu and H. Leung and Z. Zhang Are Slice-Based Cohesion Metrics Actually Useful in Effort-Aware Post-Release Fault-Proneness Prediction? An Empirical Study . . . . . . . . . . . 331--357 A. Panichella and R. Oliveto and M. D. Penta and A. De Lucia Improving Multi-Objective Test Case Selection by Injecting Diversity in Genetic Algorithms . . . . . . . . . . . 358--383 G. Bavota and M. Linares-Vásquez and C. E. Bernal-Cárdenas and M. D. Penta and R. Oliveto and D. Poshyvanyk The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps . . . . . . . . . . . . . . 384--407 I. Beschastnikh and Y. Brun and J. Abrahamson and M. D. Ernst and A. Krishnamurthy Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms . . . . . . . 408--428
S. Mirshokraie and A. Mesbah and K. Pattabiraman Guided Mutation Testing for JavaScript Web Applications . . . . . . . . . . . . 429--444 A. Jovanovi\'c and D. Lime and O. H. Roux Integer Parameter Synthesis for Real-Time Systems . . . . . . . . . . . 445--461 F. Palomba and G. Bavota and M. D. Penta and R. Oliveto and D. Poshyvanyk and A. De Lucia Mining Version Histories for Detecting Code Smells . . . . . . . . . . . . . . 462--489 L. Burgueño and J. Troya and M. Wimmer and A. Vallecillo Static Fault Localization in Model Transformations . . . . . . . . . . . . 490--506 E. T. Barr and M. Harman and P. McMinn and M. Shahbaz and S. Yoo The Oracle Problem in Software Testing: A Survey . . . . . . . . . . . . . . . . 507--525
F. Pittke and H. Leopold and J. Mendling Automatic Detection and Resolution of Lexical Ambiguity in Process Models . . 526--544 A. K. Massey and P. N. Otto and A. I. Antón Evaluating Legal Implementation Readiness Decision-Making . . . . . . . 545--564 C. Treude and M. P. Robillard and B. Dagenais Extracting Development Tasks to Navigate Software Documentation . . . . . . . . . 565--581 T. Chaikalis and A. Chatzigeorgiou Forecasting Java Software Evolution Trends Employing Network Models . . . . 582--602 Y. Xiong and H. Zhang and A. Hubaux and S. She and J. Wang and K. Czarnecki Range Fixes: Interactive Error Resolution for Software Configuration 603--619
M. Autili and L. Grunske and M. Lumpe and P. Pelliccione and A. Tang Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar . . . . . . . . . . . . . . . . 620--638 N. Rosner and J. Geldenhuys and N. M. Aguirre and W. Visser and M. F. Frias BLISS: Improved Symbolic Execution by Bounded Lazy Initialization with SAT Support . . . . . . . . . . . . . . . . 639--660 M. El-Attar and H. Luqman and P. Kárpáti and G. Sindre and A. L. Opdahl Extending the UML Statecharts Notation to Model Security Aspects . . . . . . . 661--690 D. Maplesden and E. Tempero and J. Hosking and J. C. Grundy Performance Analysis for Object-Oriented Software: A Systematic Mapping . . . . . 691--710 H. Thimbleby Safer User Interfaces: A Case Study in Improving Number Entry . . . . . . . . . 711--729
L. Wu and K. Su and S. Cai and X. Zhang and C. Zhang and S. Wang An I/O Efficient Approach for Detecting All Accepting Cycles . . . . . . . . . . 730--744 K. Mu\cslu and Y. Brun and M. D. Ernst and D. Notkin Reducing Feedback Delay of Software Development Tools via Continuous Analysis . . . . . . . . . . . . . . . . 745--763 Y. Brun and J. y. Bang and G. Edwards and N. Medvidovic Self-Adapting Reliability in Distributed Software Systems . . . . . . . . . . . . 764--780 A. Ampatzoglou and A. Chatzigeorgiou and S. Charalampidou and P. Avgeriou The Effect of GoF Design Patterns on Stability: A Case Study . . . . . . . . 781--802 G. Gay and M. Staats and M. Whalen and M. P. E. Heimdahl The Risks of Coverage-Directed Test Case Generation . . . . . . . . . . . . . . . 803--819 S. Nadi and T. Berger and C. Kästner and K. Czarnecki Where Do Configuration Constraints Stem From? An Extraction Approach and an Empirical Study . . . . . . . . . . . . 820--841
C. Xu and W. Xi and S. C. Cheung and X. Ma and C. Cao and J. Lu \sc Cina: Suppressing the Detection of Unstable Context Inconsistency . . . . . 842--865 H. Bagheri and A. Sadeghi and J. Garcia and S. Malek COVERT: Compositional Analysis of Android Inter-App Permission Leakage . . 866--886 H. Liu and Q. Liu and Y. Liu and Z. Wang Identifying Renaming Opportunities by Expanding Conducted Rename Refactorings 887--900 J. Petke and M. B. Cohen and M. Harman and S. Yoo Practical Combinatorial Interaction Testing: Empirical Findings on Efficiency and Early Fault Detection . . 901--924 Y. C. Jhi and X. Jia and X. Wang and S. Zhu and P. Liu and D. Wu Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection . . . . . . . . . . 925--943
C. Arora and M. Sabetzadeh and L. Briand and F. Zimmer Automated Checking of Conformance to Requirements Templates Using Natural Language Processing . . . . . . . . . . 944--968 K. Blincoe and G. Valetto and D. Damian Facilitating Coordination between Software Developers: A Study and Techniques for Timely and Efficient Recommendations . . . . . . . . . . . . 969--985 X. Guo and M. Zhou and X. Song and M. Gu and J. Sun First, Debug the Test Oracle . . . . . . 986--1000 J. Krall and T. Menzies and M. Davies GALE: Geometric Active Learning for Search-Based Software Engineering . . . 1001--1018 J. P. Galeotti and C. A. Furia and E. May and G. Fraser and A. Zeller Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking 1019--1037
P. Rodeghero and C. Liu and P. W. McBurney and C. McMillan An Eye-Tracking Study of Java Programmers and Application to Source Code Summarization . . . . . . . . . . . 1038--1054 N. Tsantalis and D. Mazinanian and G. P. Krishnan Assessing the Refactorability of Software Clones . . . . . . . . . . . . 1055--1090 Z. M. Jiang and A. E. Hassan A Survey on Load Testing of Large-Scale Software Systems . . . . . . . . . . . . 1091--1118 G. Gay and M. Staats and M. Whalen and M. P. E. Heimdahl Automated Oracle Data Selection Support 1119--1137 H. Zhu and I. Bayley On the Composability of Design Patterns 1138--1152
H. A. Duran-Limon and C. A. Garcia-Rios and F. E. Castillo-Barrera and R. Capilla An Ontology-Based Product Architecture Derivation Approach . . . . . . . . . . 1153--1168 P. Clarke and R. V. O'Connor and B. Leavy and M. Yilmaz Exploring the Relationship between Software Process Adaptive Capability and Organisational Performance . . . . . . . 1169--1183 M. Schur and A. Roth and A. Zeller Mining Workflow Models from Web Applications . . . . . . . . . . . . . . 1184--1201 L. Zhang and A. Chattopadhyay and C. Wang Round-Up: Runtime Verification of Quasi Linearizability for Concurrent Data Structures . . . . . . . . . . . . . . . 1202--1216 Z. Tian and Q. Zheng and T. Liu and M. Fan and E. Zhuang and Z. Yang Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences . . . . . . . . . 1217--1235 C. Le Goues and N. Holtschulte and E. K. Smith and Y. Brun and P. Devanbu and S. Forrest and W. Weimer The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs . . . 1236--1256
M. B. Dwyer and D. S. Rosenblum Editorial: Journal-First Publication for the Software Engineering Community . . . 1--1 M. Autili and A. Bertolino and G. De Angelis and D. D. Ruscio and A. D. Sandro A Tool-Supported Methodology for Validation and Refinement of Early-Stage Domain Models . . . . . . . . . . . . . 2--25 B. Ozcelik and C. Yilmaz Seer: A Lightweight Online Failure Prediction Approach . . . . . . . . . . 26--46 K. Wnuk and T. Gorschek and D. Callele and E. A. Karlsson and E. Åhlin and B. Regnell Supporting Scope Tracking and Visualization for Very Large-Scale Requirements Engineering-Utilizing FSC+, Decision Patterns, and Atomic Decision Visualizations . . . . . . . . . . . . . 47--74 A. Filieri and G. Tamburrelli and C. Ghezzi Supporting Self-Adaptation via Quantitative Verification and Sensitivity Analysis at Run Time . . . . 75--99 Anonymous 2015 reviewers list . . . . . . . . . . 100--102
P. W. McBurney and C. McMillan Automatic Source Code Summarization of Context for Java Methods . . . . . . . . 103--119 S. Vegas and C. Apa and N. Juristo Crossover Designs in Software Engineering Experiments: Benefits and Perils . . . . . . . . . . . . . . . . . 120--135 M. Caporuscio and V. Grassi and M. Marzolla and R. Mirandola \sc GoPrime: A Fully Decentralized Middleware for Utility-Aware Service Assembly . . . . . . . . . . . . . . . . 136--152 M. Paolieri and A. Horváth and E. Vicario Probabilistic Model Checking of Regenerative Concurrent Systems . . . . 153--169 Z. Gao and Z. Chen and Y. Zou and A. M. Memon SITAR: GUI Test Script Repair . . . . . 170--186 J. Qiu and X. Su and P. Ma Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code . . . . . . . . . . . . . . . . . . 187--202
M. B. Dwyer and E. Bodden and B. Fitzgerald and M. Kim and S. Kim and A. J. Ko and E. Mendes and R. Mirandola and A. Moreira and F. Shull and S. Siegel and T. Xie and C. Zhang Connecting and Serving the Software Engineering Community . . . . . . . . . 203--280 M. Mirakhorli and J. Cleland-Huang Detecting, Tracing, and Monitoring Architectural Tactics in Code . . . . . 205--220 R. Kazman and D. Goldenson and I. Monarch and W. Nichols and G. Valetto Evaluating the Effects of Architectural Documentation: A Case Study of a Large Scale Open Source Project . . . . . . . 220--260 N. Mellegård and A. Ferwerda and K. Lind and R. Heldal and M. R. V. Chaudron Impact of Introducing Domain-Specific Modelling in Software Maintenance: An Industrial Case Study . . . . . . . . . 245--260 Z. Q. Zhou and S. Xiang and T. Y. Chen Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 264--284 Q. Shi and J. Huang and Z. Chen and B. Xu Verifying Synchronization for Atomicity Violation Fixing . . . . . . . . . . . . 280--296
J. L. Krein and L. Prechelt and N. Juristo and A. Nanthaamornphong and J. C. Carver and S. Vegas and C. D. Knutson and K. D. Seppi and D. L. Eggett A Multi-Site Joint Replication of a Design Patterns Experiment Using Moderator Variables to Generalize across Contexts . . . . . . . . . . . . . . . . 302--321 H. M. Chavez and W. Shen and R. B. France and B. A. Mechling and G. Li An Approach to Checking Consistency between UML Class Model and Its Java Implementation . . . . . . . . . . . . . 322--344 M. Böhme and S. Paul A Probabilistic Analysis of the Efficiency of Automated Software Testing 345--360 A. Shahbazi and J. Miller Black-Box String Test Case Generation through a Multi-Objective Optimization 361--378 X. Ye and R. Bunescu and C. Liu Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation . . . . . . . . . 379--402
M. Baluda and G. Denaro and M. Pezz\`e Bidirectional Symbolic Analysis for Effective Branch Testing . . . . . . . . 403--426 A. M. Aranda and O. Dieste and N. Juristo Effect of Domain Knowledge on Elicitation Effectiveness: An Internally Replicated Controlled Experiment . . . . 427--451 D. Cotroneo and R. Pietrantuono and S. Russo RELAI Testing: A Technique to Assess and Improve Software Reliability . . . . . . 452--475 D. P. Harvie and A. Agah Targeted Scrum: Applying Mission Command to Agile Software Development . . . . . 476--489 D. Hao and L. Zhang and L. Zang and Y. Wang and X. Wu and T. Xie To Be Optimal or Not in Test-Case Prioritization . . . . . . . . . . . . . 490--505
P. Degano and G. L. Ferrari and L. Galletta A Two-Component Language for Adaptation: Design, Semantics and Program Analysis 505--529 M. B. Zanjani and H. Kagdi and C. Bird Automatically Recommending Peer Reviewers in Modern Code Review . . . . 530--543 H. Liu and Q. Liu and Z. Niu and Y. Liu Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell Detection . . . . . . . . . . . . . . . 544--558 E. A. Barbosa and A. Garcia and M. P. Robillard and B. Jakobus Enforcing Exception Handling Policies with a Domain-Specific Language . . . . 559--584 C. Giardino and N. Paternoster and M. Unterkalmsteiner and T. Gorschek and P. Abrahamsson Software Development in Startup Companies: The Greenfield Startup Model 585--604
C. H. Huang and D. A. Peled and S. Schewe and F. Wang A Game-Theoretic Foundation for the Maximum Software Resilience against Dense Errors . . . . . . . . . . . . . . 605--622 G. Su and Y. Feng and T. Chen and D. S. Rosenblum Asymptotic Perturbation Bounds for Probabilistic Model Checking with Empirically Determined Probability Parameters . . . . . . . . . . . . . . . 623--639 N. Berthier and É. Rutten and N. De Palma and S. M. K. Gueye Designing Autonomic Management Systems by Using Reactive Control Techniques . . 640--657 X. Shen and L. L. Minku and R. Bahsoon and X. Yao Dynamic Software Project Scheduling through a Proactive-Rescheduling Method 658--686 N. Itzik and I. Reinhartz-Berger and Y. Wand Variability Analysis of Requirements: Considering Behavioral Differences and Reflecting Stakeholders' Perspectives 687--706
W. E. Wong and R. Gao and Y. Li and R. Abreu and F. Wotawa A Survey on Software Fault Localization 707--740 M. A. Noureddine and F. A. Zaraket Model Checking Software with First Order Logic Specifications Using AIG Solvers 741--763 R. Atachiants and G. Doherty and D. Gregg Parallel Performance Problems on Shared-Memory Multicore Systems: Taxonomy and Observation . . . . . . . . 764--785 H. Sharp and Y. Dittrich and C. R. B. de Souza The Role of Ethnographic Studies in Empirical Software Engineering . . . . . 786--804
S. Segura and G. Fraser and A. B. Sanchez and A. Ruiz-Cortés A Survey on Metamorphic Testing . . . . 805--824 Y. Cai and Q. Lu Dynamic Testing for Deadlocks via Constraints . . . . . . . . . . . . . . 825--842 E. Pavese and V. Braberman and S. Uchitel Probabilistic Interface Automata . . . . 843--865 H. Luo and X. Liu and X. Chen and T. Long and R. Jiang Software Reliability Analysis Using Weakest Preconditions in Linear Assignment Programs . . . . . . . . . . 866--885 J. Börstler and B. Paech The Role of Method Chains and Comments in Software Readability and Comprehension --- an Experiment . . . . 886--898
M. Zhang and Y. Wu and S. Lu and S. Qi and J. Ren and W. Zheng A Lightweight System for Detecting and Tolerating Concurrency Bugs . . . . . . 899--917 A. Marchetto and M. M. Islam and W. Asghar and A. Susi and G. Scanniello A Multi-Objective Technique to Prioritize Test Cases . . . . . . . . . 918--940 J. Tuya and C. d. l. Riva and M. J. Suárez-Cabal and R. Blanco Coverage-Aware Test Database Reduction 941--959 A. Namoun and A. Daskalopoulou and N. Mehandjiev and Z. Xun Exploring Mobile End User Development: Existing Use and Design Factors . . . . 960--976 X. Xia and D. Lo and S. J. Pan and N. Nagappan and X. Wang HYDRA: Massively Compositional Model for Cross-Project Defect Prediction . . . . 977--998
D. Octeau and D. Luchaup and S. Jha and P. McDaniel Composite Constant Propagation and its Application to Android Program Analysis 999--1014 T. Lee and J. Nam and D. Han and S. Kim and H. Peter In Developer Micro Interaction Metrics for Software Defect Prediction . . . . . . . 1015--1035 W. S. El-Kassas and B. A. Abdullah and A. H. Yousef and A. M. Wahba Enhanced Code Conversion Approach for the Integrated Cross-Platform Mobile Development (ICPMD) . . . . . . . . . . 1036--1053 T. Wu and J. Liu and Z. Xu and C. Guo and Y. Zhang and J. Yan and J. Zhang Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps . . . . . . . . . . . . 1054--1076 R. M. Hierons and U. C. Türker Parallel Algorithms for Testing Finite State Machines:Generating UIO Sequences 1077--1091 C. Tantithamthavorn and S. McIntosh and A. E. Hassan and K. Matsumoto Comments on ``Researcher Bias: The Use of Machine Learning in Software Defect Prediction'' . . . . . . . . . . . . . . 1092--1094
J. L. de la Vara and M. Borg and K. Wnuk and L. Moonen An Industrial Survey of Safety Evidence Change Impact Analysis Practice . . . . 1095--1117 P. A. Akiki and A. K. Bandara and Y. Yu Engineering Adaptive Model-Driven User Interfaces . . . . . . . . . . . . . . . 1118--1147 T. H. Chen and W. Shang and Z. M. Jiang and A. E. Hassan and M. Nasser and P. Flora Finding and Evaluating the Performance Impact of Redundant Data Access for Applications that are Developed Using Object-Relational Mapping Frameworks . . 1148--1161 D. Riehle and M. Capraro and D. Kips and L. Horn Inner Source in Platform-Based Product Engineering . . . . . . . . . . . . . . 1162--1177 S. Eghbali and L. Tahvildari Test Case Prioritization Using Lexicographical Ordering . . . . . . . . 1178--1195
Anonymous 2016 Index \booktitleIEEE Transactions on Software Engineering Vol. 42 . . . . 1--8 C. Tantithamthavorn and S. McIntosh and A. E. Hassan and K. Matsumoto An Empirical Comparison of Model Validation Techniques for Defect Prediction Models . . . . . . . . . . . 1--18 D. Ciolek and V. Braberman and N. D'Ippolito and N. Piterman and S. Uchitel Interaction Models and Automated Control under Partial Observable Environments 19--33 J. Xuan and M. Martinez and F. DeMarco and M. Clément and S. L. Marcote and T. Durieux and D. Le Berre and M. Monperrus Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs . . . . 34--55 A. Bosu and J. C. Carver and C. Bird and J. Orbeck and C. Chockley Process Aspects and Social Dynamics of Contemporary Code Review: Insights from Open Source Development and Industrial Practice at Microsoft . . . . . . . . . 56--75 V. Valero and G. Díaz and M. E. Cambronero Timed Automata Modeling and Verification for Publish--Subscribe Structures Using Distributed Resources . . . . . . . . . 76--99 Anonymous 2016 Reviewers List* . . . . . . . . . . 100--103
L. Moreno and G. Bavota and M. D. Penta and R. Oliveto and A. Marcus and G. Canfora ARENA: An Approach for the Automated Generation of Release Notes . . . . . . 106--127 F. S. Ocariza and K. Bajaj and K. Pattabiraman and A. Mesbah A Study of Causes and Consequences of Client-Side JavaScript Bugs . . . . . . 128--144 H. Bagheri and C. Tang and K. Sullivan Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping . . . . . . . . . . . . . . . . 145--163 A. Henderson and L. K. Yan and X. Hu and A. Prakash and H. Yin and S. McCamant DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform . . . . 164--184 M. A. Storey and A. Zagalsky and F. F. Filho and L. Singer and D. M. German How Social and Communication Channels Shape and Challenge a Participatory Culture in Software Development . . . . 185--204
M. B. Dwyer Improving Timeliness and Visibility in Publishing Software Engineering Research 205--206 C. Giuffrida and C. Iorgulescu and G. Tamburrelli and A. S. Tanenbaum Automating Live Update for Generic Server Programs . . . . . . . . . . . . 207--225 W. Dou and C. Xu and S. C. Cheung and J. Wei CACheck: Detecting and Repairing Cell Arrays in Spreadsheets . . . . . . . . . 226--251 H. Wang and T. Liu and X. Guan and C. Shen and Q. Zheng and Z. Yang Dependence Guided Symbolic Execution . . 252--271 X. Xia and D. Lo and Y. Ding and J. M. Al-Kofahi and T. N. Nguyen and X. Wang Improving Automated Bug Triaging with Specialized Topic Model . . . . . . . . 272--297
I. Bate and A. Burns and R. I. Davis An Enhanced Bailout Protocol for Mixed Criticality Embedded Software . . . . . 298--320 X. Y. Jing and F. Wu and X. Dong and B. Xu An Improved SDA Based Defect Prediction Framework for Both Within-Project and Cross-Project Class-Imbalance Problems 321--339 L. Baresi and C. Ghezzi and X. Ma and V. P. L. Manna Efficient Dynamic Updates of Distributed Components Through Version Consistency 340--358 K. Damevski and D. C. Shepherd and J. Schneider and L. Pollock Mining Sequences of Developer Interactions in Visual Studio for Usage Smells . . . . . . . . . . . . . . . . . 359--371 N. Li and J. Offutt Test Oracle Strategies for Model-Based Testing . . . . . . . . . . . . . . . . 372--395
R. Hebig and D. E. Khelladi and R. Bendraou Approaches to Co-Evolution of Metamodels and Models: A Survey . . . . . . . . . . 396--414 L. Bossi and E. Bertino and S. R. Hussain A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection . . . . . 415--431 N. Huber and F. Brosig and S. Spinner and S. Kounev and M. Bähr Model-Based Self-Aware Performance and Resource Management Using the Descartes Modeling Language . . . . . . . . . . . 432--452 T. Chen and R. Bahsoon Self-Adaptive and Online QoS Modeling for Cloud-Based Software Services . . . 453--475 F. Zhang and A. E. Hassan and S. McIntosh and Y. Zou The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models . . . . . . 476--491
A. Sadeghi and H. Bagheri and J. Garcia and S. Malek A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software . . . . . 492--530 G. Gay and S. Rayadurgam and M. P. E. Heimdahl Automated Steering of Model-Based Test Oracles to Admit Real Program Behaviors 531--555 H. Wang and L. Wang and Q. Yu and Z. Zheng and A. Bouguettaya and M. R. Lyu Online Reliability Prediction via Motifs-Based Dynamic Bayesian Networks for Service-Oriented Systems . . . . . . 556--579 L. Li and M. Harman and F. Wu and Y. Zhang The Value of Exact Analysis in Requirements Selection . . . . . . . . . 580--596
D. Fucci and H. Erdogmus and B. Turhan and M. Oivo and N. Juristo A Dissection of the Test-Driven Development Process: Does It Really Matter to Test-First or to Test-Last? 597--614 N. Macedo and T. Jorge and A. Cunha A Feature-Based Classification of Model Repair Approaches . . . . . . . . . . . 615--640 D. A. da Costa and S. McIntosh and W. Shang and U. Kulesza and R. Coelho and A. E. Hassan A Framework for Evaluating the Results of the SZZ Approach for Identifying Bug-Introducing Changes . . . . . . . . 641--657 Q. He and R. Zhou and X. Zhang and Y. Wang and D. Ye and F. Chen and J. C. Grundy and Y. Yang Keyword Search for Building Service-Based Systems . . . . . . . . . 658--674 M. Borg and K. Wnuk and B. Regnell and P. Runeson Supporting Change Impact Analysis Using a Recommendation System: An Industrial Case Study in a Safety-Critical Context 675--700
S. A. Carr and F. Logozzo and M. Payer Automatic Contract Insertion with CCBot 701--714 L. Mariani and M. Pezz\`e and M. Santoro GK-Tail+: An Efficient Approach to Learn Software Models . . . . . . . . . . . . 715--738 M. C. Platenius and A. Shaker and M. Becker and E. Hüllermeier and W. Schäfer Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic . . . . . . . . . . . 739--759 F. Li and Z. Li and W. Huo and X. Feng Locating Software Faults Based on Minimum Debugging Frontier Set . . . . . 760--776 P. Rempel and P. Mäder Preventing Defects: The Impact of Requirements Traceability Completeness on Software Quality . . . . . . . . . . 777--797
J. Mertz and I. Nunes A Qualitative Study of Application-Level Caching . . . . . . . . . . . . . . . . 798--816 W. Martin and F. Sarro and Y. Jia and Y. Zhang and M. Harman A Survey of App Store Analysis for Software Engineering . . . . . . . . . . 817--847 N. S. M. Yusop and J. Grundy and R. Vasa Reporting Usability Defects: A Systematic Literature Review . . . . . . 848--867 J. S. Cuadrado and E. Guerra and J. de Lara Static Analysis of Model Transformations 868--897
F. Sarro and F. Ferrucci and M. Harman and A. Manna and J. Ren Adaptive Multi-Objective Evolutionary Algorithms for Overtime Planning in Software Projects . . . . . . . . . . . 898--917 C. Arora and M. Sabetzadeh and L. Briand and F. Zimmer Automated Extraction and Clustering of Requirements Glossary Terms . . . . . . 918--945 K. Banerjee and D. Sarkar and C. Mandal Deriving Bisimulation Relations from Path Extension Based Equivalence Checkers . . . . . . . . . . . . . . . . 946--953 S. Charalampidou and A. Ampatzoglou and A. Chatzigeorgiou and A. Gkortzis and P. Avgeriou Identifying Extract Method Refactoring Opportunities Based on Functional Relevance . . . . . . . . . . . . . . . 954--974 E. Tang and X. Zhang and N. T. Müller and Z. Chen and X. Li Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-Precision Testing . . . . . 975--994
X. Wang and J. Sun and T. Wang and S. Qin Language Inclusion Checking of Timed Automata with Non-Zenoness . . . . . . . 995--1008 M. Fleck and J. Troya and M. Kessentini and M. Wimmer and B. Alkhazi Model Transformation Modularization as a Many-Objective Optimization Problem . . 1009--1032 R. M. Hierons Testing from Partial Finite State Machines without Harmonised Traces . . . 1033--1043 E. d. S. Maldonado and E. Shihab and N. Tsantalis Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt . . . . . . . . . . . . . 1044--1062 M. Tufano and F. Palomba and G. Bavota and R. Oliveto and M. D. Penta and A. De Lucia and D. Poshyvanyk When and Why Your Code Starts to Smell Bad (and Whether the Smells Go Away) . . 1063--1088 C. Le Goues and Y. Brun and S. Forrest and W. Weimer Clarifications on the Construction and Use of the ManyBugs Benchmark . . . . . 1089--1090 S. Herbold Comments on ScottKnottESD in response to ``An empirical comparison of model validation techniques for defect prediction models'' . . . . . . . . . . 1091--1094
J. Fowkes and P. Chanthirasegaran and R. Ranca and M. Allamanis and M. Lapata and C. Sutton Autofolding for Source Code Summarization . . . . . . . . . . . . . 1095--1109 B. Nongpoh and R. Ray and S. Dutta and A. Banerjee AutoSense: A Framework for Automated Sensitivity Analysis of Program Data . . 1110--1124 G. Salvaneschi and S. Proksch and S. Amann and S. Nadi and M. Mezini On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study . . . . . . . . . . . 1125--1143 P. Zave Reasoning About Identifier Spaces: How to Make Chord Correct . . . . . . . . . 1144--1156 L. Luo and J. Ming and D. Wu and P. Liu and S. Zhu Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection . . . . . . . . . . 1157--1177 A. N. Meyer and L. E. Barton and G. C. Murphy and T. Zimmermann and T. Fritz The Work Life of Developers: Activities, Switches and Perceived Productivity . . 1178--1193
M. Dwyer State of the Journal . . . . . . . . . . 1--2 Anonymous 2017 Index \booktitleIEEE Transactions on Software Engineering Vol. 43 . . . . 1--9 N. Medvidovi\'c Editorial from the New Editor in Chief 3--4 D. Di Nucci and F. Palomba and G. De Rosa and G. Bavota and R. Oliveto and A. De Lucia A Developer Centered Bug Prediction Model . . . . . . . . . . . . . . . . . 5--24 Q. Yi and Z. Yang and S. Guo and C. Wang and J. Liu and C. Zhao Eliminating Path Redundancy via Postconditioned Symbolic Execution . . . 25--43 J. Al Dallal and A. Abdin Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review . . . . . . . . . . . 44--69 L. Yu and W. T. Tsai Test Case Generation for Boolean Expressions by Cell Covering . . . . . . 70--99 Anonymous 2017 Reviewers List* . . . . . . . . . . 100--102
Luc Moreau and Belfrit Victor Batlajery and Trung Dong Huynh and Danius Michaelides and Heather Packer A Templating System to Generate Provenance . . . . . . . . . . . . . . . 103--121 Annibale Panichella and Fitsum Meshesha Kifetew and Paolo Tonella Automated Test Case Generation as a Many-Objective Optimisation Problem with Dynamic Selection of the Targets . . . . 122--158 Thibaud Lutellier and Devin Chollak and Joshua Garcia and Lin Tan and Derek Rayside and Nenad Medvidovi\'c and Robert Kroeger Measuring the Impact of Code Dependencies on Software Architecture Recovery Techniques . . . . . . . . . . 159--181 Yi Li and Chenguang Zhu and Julia Rubin and Marsha Chechik Semantic Slicing of Software Version Histories . . . . . . . . . . . . . . . 182--201
Ying Wang and Hai Yu and Zhiliang Zhu and Wei Zhang and Yuli Zhao Automatic Software Refactoring via Weighted Clustering in Method-Level Networks . . . . . . . . . . . . . . . . 202--236 Kai Petersen and Deepika Badampudi and Syed Muhammad Ali Shah and Krzysztof Wnuk and Tony Gorschek and Efi Papatheocharous and Jakob Axelsson and Séverine Sentilles and Ivica Crnkovic and Antonio Cicchetti Choosing Component Origins for Software Intensive Systems: In-House, COTS, OSS or Outsourcing? --- A Case Survey . . . 237--261 Luciano García-Bañuelos and Nick R. T. P. van Beest and Marlon Dumas and Marcello La Rosa and Willem Mertens Complete and Interpretable Conformance Checking of Business Processes . . . . . 262--290 Yanchun Wang and Qiang He and Dayong Ye and Yun Yang Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems . . . . . . . . . 291--307
Marinos Kintis and Mike Papadakis and Yue Jia and Nicos Malevris and Yves Le Traon and Mark Harman Detecting Trivial Mutant Equivalences via Compiler Optimisations . . . . . . . 308--333 Haipeng Cai Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction 334--364 Everton L. G. Alves and Myoungkyu Song and Tiago Massoni and Patrícia D. L. Machado and Miryung Kim Refactoring Inspection Support for Manual Refactoring Edits . . . . . . . . 365--383 Xuanzhe Liu and Huoran Li and Xuan Lu and Tao Xie and Qiaozhu Mei and Feng Feng and Hong Mei Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles . . . . . . . . . . . . . . . . 384--411
Shane McIntosh and Yasutaka Kamei Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction . . . . . 412--428 Melina Mongiovi and Rohit Gheyi and Gustavo Soares and Márcio Ribeiro and Paulo Borba and Leopoldo Teixeira Detecting Overly Strong Preconditions in Refactoring Engines . . . . . . . . . . 429--452 Flávio Medeiros and Márcio Ribeiro and Rohit Gheyi and Sven Apel and Christian Kästner and Bruno Ferreira and Luiz Carvalho and Baldoino Fonseca Discipline Matters: Refactoring of Preprocessor Directives in the #ifdef Hell . . . . . . . . . . . . . . . . . . 453--469 Abhijeet Banerjee and Lee Kee Chong and Clément Ballabriga and Abhik Roychoudhury EnergyPatch: Repairing Resource Leaks to Improve Energy-Efficiency of Android Apps . . . . . . . . . . . . . . . . . . 470--490 Zhenzhou Tian and Ting Liu and Qinghua Zheng and Eryue Zhuang and Ming Fan and Zijiang Yang Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection . . . . . . . . . . . . . . . 491--511
Cinzia Bernardeschi and Andrea Domenici and Paolo Masci A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems . . . . . . . . . 512--533 Kwabena Ebo Bennin and Jacky Keung and Passakorn Phannachitta and Akito Monden and Solomon Mensah MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction . . . . . . . . . . . . . . . 534--550 Morakot Choetkiertikul and Hoa Khanh Dam and Truyen Tran and Aditya Ghose and John Grundy Predicting Delivery Capability in Iterative Software Development . . . . . 551--573 Justyna Petke and Mark Harman and William B. Langdon and Westley Weimer Specialising Software for Different Downstream Applications Using Genetic Improvement and Code Transplantation . . 574--594 Guangdong Bai and Quanqi Ye and Yongzheng Wu and Heila Botha and Jun Sun and Yang Liu and Jin Song Dong and Willem Visser Towards Model Checking Android Applications . . . . . . . . . . . . . . 595--612
Mathew Hall and Neil Walkinshaw and Phil McMinn Effectively Incorporating Expert Knowledge in Automated Software Remodularisation . . . . . . . . . . . . 613--630 Adam Betts and Nathan Chong and Pantazis Deligiannis and Alastair F. Donaldson and Jeroen Ketema Implementing and Evaluating Candidate-Based Invariant Generation . . 631--650 Miltiadis Allamanis and Earl T. Barr and Christian Bird and Premkumar Devanbu and Mark Marron and Charles Sutton Mining Semantic Loop Idioms . . . . . . 651--668 Ganesha Upadhyaya and Hridesh Rajan On Accelerating Source Code Analysis at Massive Scale . . . . . . . . . . . . . 669--688 Alessandro Margara and Guido Salvaneschi On the Semantics of Distributed Reactive Programming: The Cost of Consistency . . 689--711
Ameer Armaly and Paige Rodeghero and Collin McMillan A Comparison of Program Comprehension Strategies by Blind and Sighted Programmers . . . . . . . . . . . . . . 712--724 Li Li and Jun Sun and Yang Liu and Meng Sun and Jin-Song Dong A Formal Specification and Verification Framework for Timed Security Protocols 725--746 Francesco Adalberto Bianchi and Alessandro Margara and Mauro Pezz\`e A Survey of Recent Trends in Testing Concurrent Software Systems . . . . . . 747--783 Stepan Shevtsov and Mihaly Berekmeri and Danny Weyns and Martina Maggio Control-Theoretical Software Adaptation: A Systematic Literature Review . . . . . 784--810
Steffen Herbold and Alexander Trautsch and Jens Grabowski A Comparative Study to Benchmark Cross-Project Defect Prediction Approaches . . . . . . . . . . . . . . . 811--833 Le Yu and Xiapu Luo and Chenxiong Qian and Shuai Wang and Hareton K. N. Leung Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy . . . . . . . . . . . . . . . . . 834--854 Eiji Adachi Barbosa and Alessandro Garcia Global-Aware Recommendations for Repairing Violations in Exception Handling . . . . . . . . . . . . . . . . 855--873 Jaechang Nam and Wei Fu and Sunghun Kim and Tim Menzies and Lin Tan Heterogeneous Defect Prediction . . . . 874--896 Paul W. McBurney and Siyuan Jiang and Marouane Kessentini and Nicholas A. Kraft and Ameer Armaly and Mohamed Wiem Mkaouer and Collin McMillan Towards Prioritizing Documentation Effort . . . . . . . . . . . . . . . . . 897--913
Donghwan Shin and Shin Yoo and Doo-Hwan Bae A Theoretical and Empirical Study of Diversity-Aware Mutation Adequacy Criterion . . . . . . . . . . . . . . . 914--931 Saskia Bick and Kai Spohrer and Rashina Hoda and Alexander Scheerer and Armin Heinzl Coordination Challenges in Large-Scale Software Development: A Case Study of Planning Misalignment in Hybrid Settings 932--950 Xin Xia and Lingfeng Bao and David Lo and Zhenchang Xing and Ahmed E. Hassan and Shanping Li Measuring Program Comprehension: A Large-Scale Field Study with Professionals . . . . . . . . . . . . . 951--976 Fabio Palomba and Annibale Panichella and Andy Zaidman and Rocco Oliveto and Andrea De Lucia The Scent of a Smell: An Extensive Comparison Between Textual and Structural Smells . . . . . . . . . . . 977--1000 Ah-Rim Han and Sungdeok Cha Two-Phase Assessment Approach to Improve the Efficiency of Refactoring Identification . . . . . . . . . . . . . 1001--1023
Miryung Kim and Thomas Zimmermann and Robert DeLine and Andrew Begel Data Scientists in Software Teams: State of the Art and Challenges . . . . . . . 1024--1038 Radu Calinescu and Danny Weyns and Simos Gerasimou and Muhammad Usman Iftikhar and Ibrahim Habli and Tim Kelly Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases 1039--1069 Feng Zhang and Haoran Niu and Iman Keivanloo and Ying Zou Expanding Queries for Code Search Using Semantically Related API Class-names . . 1070--1082 Sergio Segura and José A. Parejo and Javier Troya and Antonio Ruiz-Cortés Metamorphic Testing of RESTful Web APIs 1083--1099 Kostadin Damevski and Hui Chen and David C. Shepherd and Nicholas A. Kraft and Lori Pollock Predicting Future Developer Behavior in the IDE Using Topic Models . . . . . . . 1100--1111 Zhe Wang and Chenggang Wu and Xiang Yuan and Zhenjiang Wang and Jianjun Li and Pen-Chung Yew and Jeff Huang and Xiaobing Feng and Yanyan Lan and Yunji Chen and Yuanming Lai and Yong Guan Using Local Clocks to Reproduce Concurrency Bugs . . . . . . . . . . . . 1112--1128 Martin Shepperd and Tracy Hall and David Bowes Authors' Reply to ``Comments on Researcher Bias: The Use of Machine Learning in Software Defect Prediction'' 1129--1131
Marc Palyart and Gail C. Murphy and Vaden Masrani A Study of Social Interactions in Open Source Component Use . . . . . . . . . . 1132--1145 Mirco Franzago and Davide Di Ruscio and Ivano Malavolta and Henry Muccini Collaborative Model-Driven Software Engineering: A Classification Framework and a Research Map . . . . . . . . . . . 1146--1175 Rodrigo Morales and Rubén Saborido and Foutse Khomh and Francisco Chicano and Giuliano Antoniol EARMO: An Energy-Aware Refactoring Approach for Mobile Apps . . . . . . . . 1176--1206 V. B. Singh and Meera Sharma and Hoang Pham Entropy Based Software Reliability Analysis of Multi-Version Open Source Software . . . . . . . . . . . . . . . . 1207--1223 Mayy Habayeb and Syed Shariyar Murtaza and Andriy Miranskyy and Ayse Basar Bener On the Use of Hidden Markov Model to Predict the Time to Fix Bugs . . . . . . 1224--1244 Mohamed Sami Rakha and Cor-Paul Bezemer and Ahmed E. Hassan Revisiting the Performance Evaluation of Automated Approaches for the Retrieval of Duplicate Issue Reports . . . . . . . 1245--1268 Max Lillack and Christian Kästner and Eric Bodden Tracking Load-Time Configuration Options 1269--1291
Nenad Medvidovic Editorial: State of the Journal . . . . 1 Anonymous 2018 Index IEEE Transactions on Software Engineering Vol. 44 . . . . . . . . . . 1--9 Andrea Margheri and Massimiliano Masi and Rosario Pugliese and Francesco Tiezzi A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies . . . . . . . . . . . . 2--33 Luca Gazzola and Daniela Micucci and Leonardo Mariani Automatic Software Repair: A Survey . . 34--67 Simone Scalabrino and Gabriele Bavota and Barbara Russo and Massimiliano Di Penta and Rocco Oliveto Listening to the Crowd for the Release Planning of Mobile Apps . . . . . . . . 68--86 Eirini Kalliamvakou and Christian Bird and Thomas Zimmermann and Andrew Begel and Robert DeLine and Daniel M. German What Makes a Great Manager of Software Engineers? . . . . . . . . . . . . . . . 87--106 Anonymous 2018 Reviewers List . . . . . . . . . . 107--110
Seyedrebvar Hosseini and Burak Turhan and Dimuthu Gunarathna A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction . . . . . . . . . . . . . . . 111--147 Hong Lu and Shuai Wang and Tao Yue and Shaukat Ali and Jan F. Nygård Automated Refactoring of OCL Constraints with Search . . . . . . . . . . . . . . 148--170 Yao Pan and Jules White and Yu Sun and Jeff Gray Gray Computing: A Framework for Computing with Background JavaScript Tasks . . . . . . . . . . . . . . . . . 171--193 Fabio Palomba and Marco Zanoni and Francesca Arcelli Fontana and Andrea De Lucia and Rocco Oliveto Toward a Smell-Aware Bug Prediction Model . . . . . . . . . . . . . . . . . 194--218
Jonathan Dorn and Jeremy Lacomis and Westley Weimer and Stephanie Forrest Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs . . . . . . . . . . . . . . 219--236 Klaas-Jan Stol and Bora Caglayan and Brian Fitzgerald Competition-Based Crowdsourcing Software Development: a Multi-Method Study from a Customer Perspective . . . . . . . . . . 237--260 Moritz Beller and Georgios Gousios and Annibale Panichella and Sebastian Proksch and Sven Amann and Andy Zaidman Developer Testing in the IDE: Patterns, Beliefs, and Behavior . . . . . . . . . 261--284 Narayan Ramasubbu and Chris F. Kemerer Integrating Technical Debt Management and Software Quality Management Processes: A Normative Framework and Field Tests . . . . . . . . . . . . . . 285--300 Ruizhi Gao and W. Eric Wong MSeer --- An Advanced Technique for Locating Multiple Bugs in Parallel . . . 301--318
H. Zhong and H. Mei An Empirical Study on API Usages . . . . 319--334 S. Jan and A. Panichella and A. Arcuri and L. Briand Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications . . . . . . . . . . . . . . 335--362 A. Marchetto and G. Scanniello and A. Susi Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction . . . . . . . . . . . . . . . 363--390 Z. Li and X. Jing and X. Zhu and H. Zhang and B. Xu and S. Ying On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction . . . . . . . . . . . 391--411 R. Clarisó and C. A. González and J. Cabot Smart Bound Selection for the Verification of UML/OCL Class Diagrams 412--426
P. McMinn and C. J. Wright and C. J. McCurdy and G. M. Kapfhammer Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas 427--463 L. Ponzanelli and G. Bavota and A. Mocci and R. Oliveto and M. D. Penta and S. Haiduc and B. Russo and M. Lanza Automatic Identification and Classification of Software Development Video Tutorial Fragments . . . . . . . . 464--488 M. Böhme and V. Pham and A. Roychoudhury Coverage-Based Greybox Fuzzing as Markov Chain . . . . . . . . . . . . . . . . . 489--506 P. Arcaini and A. Gargantini and E. Riccobene Decomposition-Based Approach for Model-Based Test Generation . . . . . . 507--520 S. Frey and A. Rashid and P. Anthonysamy and M. Pinto-Albuquerque and S. A. Naqvi The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game . . . . . . 521--536
X. Xie and B. Chen and L. Zou and Y. Liu and W. Le and X. Li Automatic Loop Summarization via Path Dependency Analysis . . . . . . . . . . 537--557 T. Yu and W. Wen and X. Han and J. H. Hayes ConPredictor: Concurrency Defect Prediction in Real-World Applications 558--575 L. Mottola and G. P. Picco and F. J. Oppermann and J. Eriksson and N. Finne and H. Fuchs and A. Gaglione and S. Karnouskos and P. M. Montero and N. Oertel and K. Römer and P. Spieß and S. Tranquillini and T. Voigt makeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes . . . . . . . . . . . 576--596 J. Chen and V. Nair and R. Krishna and T. Menzies Sampling as a Baseline Optimizer for Search-Based Software Engineering . . . 597--614 F. Peters and T. T. Tun and Y. Yu and B. Nuseibeh Text Filtering and Ranking for Security Bug Report Prediction . . . . . . . . . 615--631 S. Herbold and A. Trautsch and J. Grabowski Correction of A Comparative Study to Benchmark Cross-Project Defect Prediction Approaches . . . . . . . . . 632--636
M. Choetkiertikul and H. K. Dam and T. Tran and T. Pham and A. Ghose and T. Menzies A Deep Learning Model for Estimating Story Points . . . . . . . . . . . . . . 637--656 Y. Cai and L. Xiao and R. Kazman and R. Mo and Q. Feng Design Rule Spaces: A New Model for Representing and Analyzing Software Architecture . . . . . . . . . . . . . . 657--682 C. Tantithamthavorn and S. McIntosh and A. E. Hassan and K. Matsumoto The Impact of Automated Parameter Optimization on Defect Prediction Models 683--711 P. Ralph Toward Methodological Guidelines for Process Theories and Taxonomies in Software Engineering . . . . . . . . . . 712--735
D. van der Linden and I. Hadar A Systematic Literature Review of Applications of the Physics of Notations 736--759 A. Ramírez and J. R. Romero and C. L. Simons A Systematic Review of Interaction in Search-Based Software Engineering . . . 760--781 W. Song and X. Ma and H. Jacobsen Instance Migration Validity for Dynamic Evolution of Data-Aware Processes . . . 782--801 M. D. Harrison and P. Masci and J. C. Campos Verification Templates for the Analysis of User Interface Software Design . . . 802--822 L. Bao and Z. Xing and X. Xia and D. Lo VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System . . . . . . . . . . . . . . . . . 823--838
M. Nayebi and G. Ruhe Asymmetric Release Planning: Compromising Satisfaction against Dissatisfaction . . . . . . . . . . . . 839--857 G. Chari and D. Garbervetsky and S. Marr and S. Ducasse Fully Reflective Execution Environments: Virtual Machines for More Flexible Software . . . . . . . . . . . . . . . . 858--876 J. Smith and B. Johnson and E. Murphy-Hill and B. Chu and H. R. Lipford How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool . . . . . . . . . . . . . 877--897 J. Zhang and L. Zhang and M. Harman and D. Hao and Y. Jia and L. Zhang Predictive Mutation Testing . . . . . . 898--918 R. Matinnejad and S. Nejati and L. C. Briand and T. Bruckmann Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior . . . . . . . . . . . . . . . . 919--944
S. Dashevskyi and A. D. Brucker and F. Massacci A Screening Test for Disclosed Vulnerabilities in FOSS Components . . . 945--966 M. Mesgari and C. Okoli and A. O. de Guinea Creating Rich and Representative Personas by Discovering Affordances . . 967--983 P. Bian and B. Liang and Y. Zhang and C. Yang and W. Shi and Y. Cai Detecting Bugs by Discovering Expectations and Their Violations . . . 984--1001 T. Hoang and R. J. Oentaryo and T. B. Le and D. Lo Network-Clustered Multi-Modal Bug Localization . . . . . . . . . . . . . . 1002--1023 F. Palma and N. Moha and Y. Guéhéneuc UniDoSA: The Unified Specification and Detection of Service Antipatterns . . . 1024--1053
Q. Luo and K. Moran and L. Zhang and D. Poshyvanyk How Do Static and Dynamic Test Case Prioritization Techniques Perform on Modern Software Systems? An Extensive Study on GitHub Projects . . . . . . . . 1054--1080 R. Krishna and T. Menzies Bellwethers: A Baseline Method for Transfer Learning . . . . . . . . . . . 1081--1105 T. D. LaToza and A. Di Lecce and F. Ricci and W. B. Towne and A. van der Hoek Microtask Programming . . . . . . . . . 1106--1124 Y. Xue and Z. Xu and M. Chandramohan and Y. Liu Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation . . . . . . . . . . . . . . . 1125--1149 B. R. Bruce and J. Petke and M. Harman and E. T. Barr Approximate Oracles and Synergy in Software Energy Search Spaces . . . . . 1150--1169
S. Amann and H. A. Nguyen and S. Nadi and T. N. Nguyen and M. Mezini A Systematic Evaluation of Static API-Misuse Detectors . . . . . . . . . . 1170--1188 O. Al-Baik and J. Miller Integrative Double Kaizen Loop (IDKL): Towards a Culture of Continuous Learning and Sustainable Improvements for Software Organizations . . . . . . . . . 1189--1210 M. Yan and X. Xia and E. Shihab and D. Lo and J. Yin and X. Yang Automating Change-Level Self-Admitted Technical Debt Determination . . . . . . 1211--1229 G. Canfora and F. Martinelli and F. Mercaldo and V. Nardone and A. Santone and C. A. Visaggio LEILA: Formal Tool for Identifying Mobile Malicious Behaviour . . . . . . . 1230--1252 Q. Song and Y. Guo and M. Shepperd A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction . . . . . . . . . . . 1253--1269 H. Mercan and C. Yilmaz and K. Kaya CHiP: A Configurable Hybrid Parallel Covering Array Constructor . . . . . . . 1270--1291
P. Bian and B. Liang and Y. Zhang and C. Yang and W. Shi and Y. Cai Corrections to ``Detecting Bugs by Discovering Expectations and Their Violations'' . . . . . . . . . . . . . . 113--113
C. França and F. Q. B. da Silva and H. Sharp Motivation and Satisfaction of Software Engineers . . . . . . . . . . . . . . . 118--140 X. Niu and C. Nie and J. Y. Lei and H. Leung and X. Wang Identifying Failure-Causing Schemas in the Presence of Multiple Faults . . . . 141--162 J. Thomé and L. K. Shar and D. Bianculli and L. Briand An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving . . . . . 163--195 K. Moran and C. Bernal-Cárdenas and M. Curcio and R. Bonett and D. Poshyvanyk Machine Learning-Based Prototyping of Graphical User Interfaces for Mobile Apps . . . . . . . . . . . . . . . . . . 196--221
J. Vilela and J. Castro and L. E. G. Martins and T. Gorschek Safety Practices in Requirements Engineering: The Uni-REPM Safety Module 222--250 F. Basciani and M. D'Emidio and D. D. Ruscio and D. Frigioni and L. Iovino and A. Pierantonio Automated Selection of Optimal Model Transformation Chains via Shortest-Path Algorithms . . . . . . . . . . . . . . . 251--279 R. Natella and S. Winter and D. Cotroneo and N. Suri Analyzing the Effects of Bugs on Software Interfaces . . . . . . . . . . 280--301 H. Wu and C. Nie and J. Petke and Y. Jia and M. Harman An Empirical Comparison of Combinatorial Testing, Random Testing and Adaptive Random Testing . . . . . . . . . . . . . 302--320 M. H. Ter Beek and A. Legay and A. L. Lafuente and A. Vandin A Framework for Quantitative Modeling and Analysis of Highly (Re)configurable Systems . . . . . . . . . . . . . . . . 321--345
L. E. G. Martins and T. Gorschek Requirements Engineering for Safety-Critical Systems: An Interview Study with Industry Practitioners . . . 346--361 B. Meyers and H. Vangheluwe and J. Denil and R. Salay A Framework for Temporal Verification Support in Domain-Specific Modelling . . 362--404 T. Yu and Z. Huang and C. Wang ConTesa: Directed Test Suite Augmentation for Concurrent Software . . 405--419 D. Falessi and J. Roll and J. L. C. Guo and J. Cleland-Huang Leveraging Historical Associations between Requirements and Source Code to Identify Impacted Classes . . . . . . . 420--441 N. Peitek and J. Siegmund and S. Apel and C. Kästner and C. Parnin and A. Bethmann and T. Leich and G. Saake and A. Brechmann A Look into Programmers Heads . . . . . 442--462
Yinxing Xue and Zhengzi Xu and Mahinthan Chandramohan and Yang Liu Erratum to Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation . . . . . . . . . 1088--1088