Issue 1/2020
Content (25 Articles)
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
Alessio Viticchié, Leonardo Regano, Cataldo Basile, Marco Torchiano, Mariano Ceccato, Paolo Tonella
Improving change prediction models with code smell-related information
Gemma Catolino, Fabio Palomba, Francesca Arcelli Fontana, Andrea De Lucia, Andy Zaidman, Filomena Ferrucci
A benchmark-based evaluation of search-based crash reproduction
Mozhan Soltani, Pouria Derakhshanfar, Xavier Devroey, Arie van Deursen
Bounties on technical Q&A sites: a case study of Stack Overflow bounties
Jiayuan Zhou, Shaowei Wang, Cor-Paul Bezemer, Ahmed E. Hassan
Are free Android app security analysis tools effective in detecting known vulnerabilities?
Venkatesh-Prasad Ranganath, Joydeep Mitra
Recognizing lines of code violating company-specific coding guidelines using machine learning
Miroslaw Ochodek, Regina Hebig, Wilhelm Meding, Gert Frost, Miroslaw Staron
An empirical assessment of baseline feature location techniques
Abdul Razzaq, Andrew Le Gear, Chris Exton, Jim Buckley
Meta-analysis for families of experiments in software engineering: a systematic review and reproducibility and validity assessment
Barbara Kitchenham, Lech Madeyski, Pearl Brereton
On the relation between Github communication activity and merge conflicts
Gustavo Vale, Angelika Schmid, Alcemir Rodrigues Santos, Eduardo Santana de Almeida, Sven Apel
Selecting fault revealing mutants
Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon, Koushik Sen
Log4Perf: suggesting and updating logging locations for web-based systems’ performance monitoring
Kundi Yao, Guilherme B. de Pádua, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi
Çorba: crowdsourcing to obtain requirements from regulations and breaches
Hui Guo, Özgür Kafalı, Anne-Liz Jeukeng, Laurie Williams, Munindar P. Singh
An empirical investigation into merge conflicts and their effect on software quality
Caius Brindescu, Iftekhar Ahmed, Carlos Jensen, Anita Sarma
Going deeper with optimal software products selection using many-objective optimization and satisfiability solvers
Yi Xiang, Xiaowei Yang, Yuren Zhou, Zibin Zheng, Miqing Li, Han Huang
Search. Review. Repeat? An empirical study of threats to replicating SLR searches
Jacob Krüger, Christian Lausberger, Ivonne von Nostitz-Wallwitz, Gunter Saake, Thomas Leich
Memory and resource leak defects and their repairs in Java projects
Mohammadreza Ghanavati, Diego Costa, Janos Seboek, David Lo, Artur Andrzejak
The effectiveness of context-based change application on automatic program repair
Jindae Kim, Jeongho Kim, Eunseok Lee, Sunghun Kim
Why reinventing the wheels? An empirical study on library reuse and re-implementation
Bowen Xu, Le An, Ferdian Thung, Foutse Khomh, David Lo
How different are different diff algorithms in Git?
Yusuf Sulistyo Nugroho, Hideaki Hata, Kenichi Matsumoto
A longitudinal study of popular ad libraries in the Google Play Store
Md Ahasanuzzaman, Safwat Hassan, Cor-Paul Bezemer, Ahmed E. Hassan
Developer recommendation for Topcoder through a meta-learning based policy model
Zhenyu Zhang, Hailong Sun, Hongyu Zhang
The impact of context metrics on just-in-time defect prediction
Masanari Kondo, Daniel M. German, Osamu Mizuno, Eun-Hye Choi
Characterizing the transfer of program comprehension in onboarding: an information-push perspective
Rebecca Yates, Norah Power, Jim Buckley
SIEVE: Helping developers sift wheat from chaff via cross-platform analysis
Agus Sulistya, Gede Artha Azriadi Prana, Abhishek Sharma, David Lo, Christoph Treude