| MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction |
23 |
| A Comparative Study to Benchmark Cross-Project Defect Prediction Approaches |
20 |
| Heterogeneous Defect Prediction |
20 |
| Automated Test Case Generation as a Many-Objective Optimisation Problem with Dynamic Selection of the Targets |
15 |
| Coverage-Based Greybox Fuzzing as Markov Chain |
12 |
| Automatic Software Repair: A Survey |
12 |
| The Impact of Automated Parameter Optimization on Defect Prediction Models |
11 |
| A Systematic Literature Review and Meta-analysis on Cross Project Defect Prediction |
11 |
| Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems |
10 |
| A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems |
10 |
| A Comprehensive Investigation of the Role of Imbalanced Learning for Software Defect Prediction |
10 |
| Predictive Mutation Testing |
9 |
| Coordination Challenges in Large-Scale Software Development: A Case Study of Planning Misalignment in Hybrid Settings |
9 |
| Expanding Queries for Code Search Using Semantically Related API Class-names |
8 |
| Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction |
8 |
| LEILA: Formal Tool for Identifying Mobile Malicious Behaviour |
8 |
| On the Multiple Sources and Privacy Preservation Issues for Heterogeneous Defect Prediction |
7 |
| A Deep Learning Model for Estimating Story Points |
7 |
| Detecting Trivial Mutant Equivalences via Compiler Optimisations |
7 |
| Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review |
7 |
| Bellwethers: A Baseline Method for Transfer Learning |
7 |
| Automatic Software Refactoring via Weighted Clustering in Method-Level Networks |
7 |
| Data Scientists in Software Teams: State of the Art and Challenges |
7 |
| Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases |
7 |
| Control-Theoretical Software Adaptation: A Systematic Literature Review |
6 |
| Complete and Interpretable Conformance Checking of Business Processes |
6 |
| Entropy Based Software Reliability Analysis of Multi-Version Open Source Software |
6 |
| Measuring Program Comprehension: A Large-Scale Field Study with Professionals |
6 |
| Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection |
6 |
| A Developer Centered Bug Prediction Model |
6 |
| Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles |
6 |
| Collaborative Model-Driven Software Engineering: A Classification Framework and a Research Map |
5 |
| EARMO: An Energy-Aware Refactoring Approach for Mobile Apps |
5 |
| Metamorphic Testing of RESTful Web APIs |
5 |
| The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game |
5 |
| EnergyPatch: Repairing Resource Leaks to Improve Energy-Efficiency of Android Apps |
5 |
| Toward a Smell-Aware Bug Prediction Model |
5 |
| Sampling as a Baseline Optimizer for Search-Based Software Engineering |
5 |
| A Survey of Recent Trends in Testing Concurrent Software Systems |
4 |
| ConPredictor: Concurrency Defect Prediction in Real-World Applications |
4 |
| Towards Model Checking Android Applications |
4 |
| MSeer-An Advanced Technique for Locating Multiple Bugs in Parallel |
4 |
| Measuring the Impact of Code Dependencies on Software Architecture Recovery Techniques |
4 |
| On the Use of Hidden Markov Model to Predict the Time to Fix Bugs |
4 |
| A Systematic Review of Interaction in Search-Based Software Engineering |
4 |
| The Scent of a Smell: An Extensive Comparison Between Textual and Structural Smells |
4 |
| A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies |
4 |
| Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior |
4 |
| Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction |
4 |
| Smart Bound Selection for the Verification of UML/OCL Class Diagrams |
4 |