Empirical Software Engineering
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 1
-
Empirical assessment of the effort needed to attack programs protected with client/server code splittingViticchié, Alessio / Regano, Leonardo / Basile, Cataldo et al. | 2019
- 49
-
Improving change prediction models with code smell-related informationCatolino, Gemma / Palomba, Fabio / Fontana, Francesca Arcelli et al. | 2019
- 96
-
A benchmark-based evaluation of search-based crash reproductionSoltani, Mozhan / Derakhshanfar, Pouria / Devroey, Xavier et al. | 2019
- 139
-
Bounties on technical Q&A sites: a case study of Stack Overflow bountiesZhou, Jiayuan / Wang, Shaowei / Bezemer, Cor-Paul et al. | 2019
- 178
-
Are free Android app security analysis tools effective in detecting known vulnerabilities?Ranganath, Venkatesh-Prasad / Mitra, Joydeep et al. | 2019
- 220
-
Recognizing lines of code violating company-specific coding guidelines using machine learningOchodek, Miroslaw / Hebig, Regina / Meding, Wilhelm et al. | 2019
- 266
-
An empirical assessment of baseline feature location techniquesRazzaq, Abdul / Le Gear, Andrew / Exton, Chris et al. | 2019
- 322
-
What distinguishes great software engineers?Li, Paul Luo / Ko, Amy J. / Begel, Andrew et al. | 2019
- 353
-
Meta-analysis for families of experiments in software engineering: a systematic review and reproducibility and validity assessmentKitchenham, Barbara / Madeyski, Lech / Brereton, Pearl et al. | 2019
- 402
-
On the relation between Github communication activity and merge conflictsVale, Gustavo / Schmid, Angelika / Santos, Alcemir Rodrigues et al. | 2019
- 434
-
Selecting fault revealing mutantsTitcheu Chekam, Thierry / Papadakis, Mike / Bissyandé, Tegawendé F. et al. | 2019
- 488
-
Log4Perf: suggesting and updating logging locations for web-based systems’ performance monitoringYao, Kundi / de Pádua, Guilherme B. / Shang, Weiyi et al. | 2019
- 532
-
Çorba: crowdsourcing to obtain requirements from regulations and breachesGuo, Hui / Kafalı, Özgür / Jeukeng, Anne-Liz et al. | 2019
- 562
-
An empirical investigation into merge conflicts and their effect on software qualityBrindescu, Caius / Ahmed, Iftekhar / Jensen, Carlos et al. | 2019
- 591
-
Going deeper with optimal software products selection using many-objective optimization and satisfiability solversXiang, Yi / Yang, Xiaowei / Zhou, Yuren et al. | 2019
- 627
-
Search. Review. Repeat? An empirical study of threats to replicating SLR searchesKrüger, Jacob / Lausberger, Christian / von Nostitz-Wallwitz, Ivonne et al. | 2019
- 678
-
Memory and resource leak defects and their repairs in Java projectsGhanavati, Mohammadreza / Costa, Diego / Seboek, Janos et al. | 2019
- 719
-
The effectiveness of context-based change application on automatic program repairKim, Jindae / Kim, Jeongho / Lee, Eunseok et al. | 2019
- 755
-
Why reinventing the wheels? An empirical study on library reuse and re-implementationXu, Bowen / An, Le / Thung, Ferdian et al. | 2019
- 790
-
How different are different diff algorithms in Git?Nugroho, Yusuf Sulistyo / Hata, Hideaki / Matsumoto, Kenichi et al. | 2019
- 824
-
A longitudinal study of popular ad libraries in the Google Play StoreAhasanuzzaman, Md / Hassan, Safwat / Bezemer, Cor-Paul et al. | 2019
- 859
-
Developer recommendation for Topcoder through a meta-learning based policy modelZhang, Zhenyu / Sun, Hailong / Zhang, Hongyu et al. | 2019
- 890
-
The impact of context metrics on just-in-time defect predictionKondo, Masanari / German, Daniel M. / Mizuno, Osamu et al. | 2019
- 940
-
Characterizing the transfer of program comprehension in onboarding: an information-push perspectiveYates, Rebecca / Power, Norah / Buckley, Jim et al. | 2019
- 996
-
SIEVE: Helping developers sift wheat from chaff via cross-platform analysisSulistya, Agus / Prana, Gede Artha Azriadi / Sharma, Abhishek et al. | 2019