nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A data-driven approach for understanding invalid bug reports: An industrial case study
|
Laiq, Muhammad |
|
|
164 |
C |
p. |
artikel |
2 |
A large-scale exploratory study of android sports apps in the google play store
|
Chembakottu, Bhagya |
|
|
164 |
C |
p. |
artikel |
3 |
An empirical experiment of a usability requirements elicitation method to design GUIs based on interviews
|
Ormeño, Yeshica Isela |
|
|
164 |
C |
p. |
artikel |
4 |
Application of knowledge graph in software engineering field: A systematic literature review
|
Wang, Lu |
|
|
164 |
C |
p. |
artikel |
5 |
A reflection on the impact of model mining from GitHub
|
Robles, Gregorio |
|
|
164 |
C |
p. |
artikel |
6 |
A software vulnerability detection method based on deep learning with complex network analysis and subgraph partition
|
Cai, Wenjing |
|
|
164 |
C |
p. |
artikel |
7 |
Auto-COP: Adaptation generation in Context-oriented Programming using Reinforcement Learning options
|
Cardozo, Nicolás |
|
|
164 |
C |
p. |
artikel |
8 |
Business-driven technical debt management using Continuous Debt Valuation Approach (CoDVA)
|
Stochel, Marek G. |
|
|
164 |
C |
p. |
artikel |
9 |
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?
|
Vo, Hieu Dinh |
|
|
164 |
C |
p. |
artikel |
10 |
CLeBPI: Contrastive Learning for Bug Priority Inference
|
Wang, Wen-Yao |
|
|
164 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
164 |
C |
p. |
artikel |
12 |
FrMi: Fault-revealing Mutant Identification using killability severity
|
Rostami, Taha |
|
|
164 |
C |
p. |
artikel |
13 |
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants
|
Eyal Salman, Hamzeh |
|
|
164 |
C |
p. |
artikel |
14 |
Model-based security testing in IoT systems: A Rapid Review
|
Lonetti, Francesca |
|
|
164 |
C |
p. |
artikel |
15 |
Revisiting the reproducibility of empirical software engineering studies based on data retrieved from development repositories
|
Gonzalez-Barahona, Jesus M. |
|
|
164 |
C |
p. |
artikel |
16 |
Software design analysis and technical debt management based on design rule theory
|
Cai, Yuanfang |
|
|
164 |
C |
p. |
artikel |
17 |
Software vulnerability prediction: A systematic mapping study
|
Kalouptsoglou, Ilias |
|
|
164 |
C |
p. |
artikel |
18 |
Sustainable software engineering: Reflections on advances in research and practice
|
Venters, Colin C. |
|
|
164 |
C |
p. |
artikel |
19 |
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review
|
Heinonen, Ava |
|
|
164 |
C |
p. |
artikel |
20 |
Systematic reviews in mobile app software engineering: A tertiary study
|
Zein, Samer |
|
|
164 |
C |
p. |
artikel |
21 |
The role of Reinforcement Learning in software testing
|
Abo-eleneen, Amr |
|
|
164 |
C |
p. |
artikel |
22 |
Threats to validity in software engineering research: A critical reflection
|
Verdecchia, Roberto |
|
|
164 |
C |
p. |
artikel |
23 |
Towards accurate recommendations of merge conflicts resolution strategies
|
Elias, Paulo |
|
|
164 |
C |
p. |
artikel |
24 |
Towards a successful secure software acquisition
|
Alnaseef, Faisal |
|
|
164 |
C |
p. |
artikel |
25 |
Warnings: Violation symptoms indicating architecture erosion
|
Li, Ruiyin |
|
|
164 |
C |
p. |
artikel |
26 |
Work and career-related features of technology: A grounded theory study of software professionals
|
Tomer, Gunjan |
|
|
164 |
C |
p. |
artikel |