nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An empirical study on bugs in TypeScript programming language
|
Wang, Ziyuan |
|
|
226 |
C |
p. |
artikel |
2 |
A proposal and assessment of an improved heuristic for the Eager Test smell detection
|
Tran, Huynh Khanh Vi |
|
|
226 |
C |
p. |
artikel |
3 |
Architectural tactics and trade-offs for confidentiality
|
Orellana, Cristian |
|
|
226 |
C |
p. |
artikel |
4 |
A systematic mapping study of crowd knowledge enhanced software engineering research using Stack Overflow
|
Tanzil, Minaoar Hossain |
|
|
226 |
C |
p. |
artikel |
5 |
Automated formal-specification-to-code trace links recovery using multi-dimensional similarity measures
|
Li, Jiandong |
|
|
226 |
C |
p. |
artikel |
6 |
BEACon-TD: Classifying Technical Debt and its types across diverse software projects issues using transformers
|
Shivashankar, Karthik |
|
|
226 |
C |
p. |
artikel |
7 |
Behavioral decision-making and safety verification approaches for autonomous driving system in extreme scenarios
|
Zhao, Ying |
|
|
226 |
C |
p. |
artikel |
8 |
CubeAgent: Efficient query-based video adversarial examples generation through deep reinforcement learning
|
Shi, Heyuan |
|
|
226 |
C |
p. |
artikel |
9 |
Cyber-physical systems with Human-in-the-Loop: A systematic review of socio-technical perspectives
|
Clemmensen, Torkil |
|
|
226 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
226 |
C |
p. |
artikel |
11 |
Exploring ethical values in software systems: A systematic literature review
|
Alidoosti, Razieh |
|
|
226 |
C |
p. |
artikel |
12 |
Improving distributed learning-based vulnerability detection via multi-modal prompt tuning
|
Ren, Zilong |
|
|
226 |
C |
p. |
artikel |
13 |
Improving the performance of software fault localization with effective coverage data reduction techniques
|
Fang, Chih-Chiang |
|
|
226 |
C |
p. |
artikel |
14 |
IoT systems testing: Taxonomy, empirical findings, and recommendations
|
Minani, Jean Baptiste |
|
|
226 |
C |
p. |
artikel |
15 |
Is usability testing valid with prototypes where clickable hotspots are highlighted upon misclick?
|
Krajcovic, Matus |
|
|
226 |
C |
p. |
artikel |
16 |
KPAMA: A Kubernetes based tool for Mitigating ML system Aging
|
Ding, Wenjie |
|
|
226 |
C |
p. |
artikel |
17 |
MidLog: An automated log anomaly detection method based on multi-head GRU
|
Yuan, Wanli |
|
|
226 |
C |
p. |
artikel |
18 |
Modeling and verifying resources and capabilities of ubiquitous scenarios for Unmanned Aerial Vehicle swarm
|
Zhang, Manqing |
|
|
226 |
C |
p. |
artikel |
19 |
NoSQL database education: A review of models, tools and teaching methods
|
Tripathi, Nirnaya |
|
|
226 |
C |
p. |
artikel |
20 |
Pandemic pedagogy: Evaluating remote education strategies during COVID-19
|
Russo, Daniel |
|
|
226 |
C |
p. |
artikel |
21 |
Poisoned source code detection in code models
|
Ghannoum, Ehab |
|
|
226 |
C |
p. |
artikel |
22 |
RAGVA: Engineering retrieval augmented generation-based virtual assistants in practice
|
Yang, Rui |
|
|
226 |
C |
p. |
artikel |
23 |
Requirements extraction from model-based systems engineering: A systematic literature review
|
Santos, Jefferson L. |
|
|
226 |
C |
p. |
artikel |
24 |
Sóley: Automated detection of logic vulnerabilities in Ethereum smart contracts using large language models
|
Soud, Majd |
|
|
226 |
C |
p. |
artikel |
25 |
Software engineering team project courses with industrial customers: Students’ insights on challenges and lessons learned
|
Nasir, Nayla |
|
|
226 |
C |
p. |
artikel |
26 |
Software Self-hosting: A systematic review of quantitative research
|
Hrgarek, Luka |
|
|
226 |
C |
p. |
artikel |
27 |
Success with Agile Project Management: Looking back and into the future
|
Koudriachov, Catarina |
|
|
226 |
C |
p. |
artikel |