Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             23 results found
no title author magazine year volume issue page(s) type
1 A comprehensive evaluation of SZZ Variants through a developer-informed oracle Rosa, Giovanni

202 C p.
article
2 A first look at bug report templates on GitHub Li, Hongyan

202 C p.
article
3 An empirical study of software architecture resilience evaluation methods Pan, Jiaxin

202 C p.
article
4 ARRAY: Adaptive triple feature-weighted transfer Naive Bayes for cross-project defect prediction Tong, Haonan

202 C p.
article
5 A taxonomy of assets for the development of software-intensive products and services Zabardast, Ehsan

202 C p.
article
6 Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java Schneider, Simon

202 C p.
article
7 Checklists to support decision-making in regression testing Minhas, Nasir Mehmood

202 C p.
article
8 Do names echo semantics? A large-scale study of identifiers used in C++’s named casts Petrescu, Constantin Cezar

202 C p.
article
9 Editorial Board
202 C p.
article
10 Empirical research in software architecture — Perceptions of the community Galster, Matthias

202 C p.
article
11 Identifying refactoring opportunities for large packages by analyzing maintainability characteristics in Java OSS Mumtaz, Haris

202 C p.
article
12 Intentions to continue using agile methods: The case of the Greek banking sector Mamakou, Xenia J.

202 C p.
article
13 IT managers’ perspective on Technical Debt Management Wiese, Marion

202 C p.
article
14 LCVD: Loop-oriented code vulnerability detection via graph neural network Wang, Mingke

202 C p.
article
15 Legacy systems to cloud migration: A review from the architectural perspective Hasan, Muhammad Hafiz

202 C p.
article
16 On the granularity of linguistic reuse Bertolotti, Francesco

202 C p.
article
17 Optimal dynamic partial order reduction with context-sensitive independence and observers Albert, Elvira

202 C p.
article
18 Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding Yuan, Dawei

202 C p.
article
19 ProCon: An automated process-centric quality constraints checking framework Mayr-Dorn, Christoph

202 C p.
article
20 Reliability in software engineering qualitative research through Inter-Coder Agreement González-Prieto, Ángel

202 C p.
article
21 Simple stupid insecure practices and GitHub’s code search: A looming threat? Go, Ken Russel

202 C p.
article
22 Smart contract vulnerability detection based on semantic graph and residual graph convolutional networks with edge attention Chen, Da

202 C p.
article
23 Software runtime monitoring with adaptive sampling rate to collect representative samples of execution traces Mertz, Jhonny

202 C p.
article
                             23 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands