nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A catalogue of game-specific anti-patterns based on GitHub and Game Development Stack Exchange
|
Agrahari, Vartika |
|
|
204 |
C |
p. |
artikel |
2 |
Adaptive robustness evaluation for complex system prognostics and health management software platform
|
Liu, He |
|
|
204 |
C |
p. |
artikel |
3 |
Agile software engineers’ affective states, their performance and software quality: A systematic mapping review
|
Salido O., Martín G. |
|
|
204 |
C |
p. |
artikel |
4 |
An effective fault localization approach based on PageRank and mutation analysis
|
Yan, Yue |
|
|
204 |
C |
p. |
artikel |
5 |
An empirical study on real bug fixes from solidity smart contract projects
|
Wang, Yilin |
|
|
204 |
C |
p. |
artikel |
6 |
Application of metamorphic testing on UAV path planning software
|
Wu, Lvyuan |
|
|
204 |
C |
p. |
artikel |
7 |
Architecting complex, long-lived scientific software
|
Ernst, Neil A. |
|
|
204 |
C |
p. |
artikel |
8 |
ARist: An effective API argument recommendation approach
|
Nguyen, Son |
|
|
204 |
C |
p. |
artikel |
9 |
A systematic literature review on source code similarity measurement and clone detection: Techniques, applications, and challenges
|
Zakeri-Nasrabadi, Morteza |
|
|
204 |
C |
p. |
artikel |
10 |
A systematic mapping study on group work research in computing education projects
|
Kokkoniemi, Mikko |
|
|
204 |
C |
p. |
artikel |
11 |
Automatic software vulnerability assessment by extracting vulnerability elements
|
Sun, Xiaobing |
|
|
204 |
C |
p. |
artikel |
12 |
Backsourcing of IT with focus on software development—A systematic literature review
|
Molléri, Jefferson Seide |
|
|
204 |
C |
p. |
artikel |
13 |
BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network
|
Chen, Jinfu |
|
|
204 |
C |
p. |
artikel |
14 |
BPEL process defects prediction using multi-objective evolutionary search
|
Daaji, Marwa |
|
|
204 |
C |
p. |
artikel |
15 |
Characteristics, causes, and consequences of technical debt in the automation domain
|
Bi, Fandi |
|
|
204 |
C |
p. |
artikel |
16 |
Dialog summarization for software collaborative platform via tuning pre-trained models
|
Fan, Guodong |
|
|
204 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
204 |
C |
p. |
artikel |
18 |
Effective software security enhancement using an improved PointNet++
|
Zhao, Yi |
|
|
204 |
C |
p. |
artikel |
19 |
How do microservices evolve? An empirical analysis of changes in open-source microservice repositories
|
Assunção, Wesley K.G. |
|
|
204 |
C |
p. |
artikel |
20 |
Human-centric software engineering – Approaches, technologies, and applications
|
Liu, Xiao |
|
|
204 |
C |
p. |
artikel |
21 |
Microservice architecture recovery based on intra-service and inter-service features
|
Wang, Lulu |
|
|
204 |
C |
p. |
artikel |
22 |
On the maintenance support for microservice-based systems through the specification and the detection of microservice antipatterns
|
Tighilt, Rafik |
|
|
204 |
C |
p. |
artikel |
23 |
On the roles of software testers: An exploratory study
|
Florea, Raluca |
|
|
204 |
C |
p. |
artikel |
24 |
Open tracing tools: Overview and critical comparison
|
Janes, Andrea |
|
|
204 |
C |
p. |
artikel |
25 |
Semantic feature learning for software defect prediction from source code and external knowledge
|
Liu, Jingyu |
|
|
204 |
C |
p. |
artikel |
26 |
Snapshot testing in practice: Benefits and drawbacks
|
Gazzinelli Cruz, Victor Pezzi |
|
|
204 |
C |
p. |
artikel |
27 |
Sustaining human health: A requirements engineering perspective
|
Levy, Meira |
|
|
204 |
C |
p. |
artikel |
28 |
Transforming Numerical Feature Models into Propositional Formulas and the Universal Variability Language
|
Munoz, Daniel-Jesus |
|
|
204 |
C |
p. |
artikel |
29 |
Using expression parsing and algebraic operations to generate test sequences.
|
Liu, Pan |
|
|
204 |
C |
p. |
artikel |
30 |
Variable-strength combinatorial testing of exported activities based on misexposure prediction
|
Deng, Xi |
|
|
204 |
C |
p. |
artikel |
31 |
Vulnerable smart contract function locating based on Multi-Relational Nested Graph Convolutional Network
|
Liu, Haiyang |
|
|
204 |
C |
p. |
artikel |
32 |
“We do not appreciate being experimented on”: Developer and researcher views on the ethics of experiments on open-source projects
|
Feitelson, Dror G. |
|
|
204 |
C |
p. |
artikel |