Volume 27, Number 4, December 2019
Algorithms for estimating truck factors: a comparative study.

Mívian M. Ferreira Thaís Mombach Marco Tulio Valente Kecia A. M. Ferreira

Variation of risk profile across software life cycle in IS outsourcing.

Srikrishnan Sundararajan Bhasi Marath Pramod K. Vijayaraghavan

Quality-centric security pattern mutations.

Abbas Javan Jafari Abbas Rasoolzadegan

Analysis and measurement of internal usability metrics through code annotations.

Maximilian Schramme José A. Macías

Pieces of contextual information suitable for predicting co-changes? An empirical study.

Igor Scaliante Wiese Rodrigo Takashi Kuroda Igor Steinmacher Gustavo Ansaldi Oliva Reginaldo Ré Christoph Treude Marco Aurélio Gerosa

The skills that employers look for in software testers.

Raluca Florea Viktoria Stray

A partial oracle for uniformity statistics.

Krishna Patel Robert M. Hierons

An efficient regression testing approach for PHP Web applications using test selection and reusable constraints.

Ravi Eda Hyunsook Do

In this issue.

Rachel Harrison


Volume 27, Number 3, September 2019
Classifying generated white-box tests: an exploratory study.

David Honfi Zoltán Micskei

Structured information in bug report descriptions - influence on IR-based bug localization and developers.

Michael Rath Patrick Mäder

A large-scale empirical study of code smells in JavaScript projects.

David Johannes Foutse Khomh Giuliano Antoniol

A method to evaluate quality of modelling languages based on the Zachman reference taxonomy.

Fáber D. Giraldo Sergio España William J. Giraldo Oscar Pastor John Krogstie

Assisting software engineering students in analyzing their performance in software development.

Mushtaq Raza João Pascoal Faria Rafael Salazar

To var or not to var: how do C# developers use and misuse implicit and explicit typing?

Pierre A. Akiki

Risk factors in software development projects: a systematic literature review.

Júlio Menezes Jr. Cristine Gusmão Hermano Perrelli de Moura

Software Design Smell Detection: a systematic mapping study.

Khalid Alkharabsheh Yania Crespo M. Esperanza Manso José A. Taboada

CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph.

Dongdong Zhao Hong Lin Linjun Ran Mushuai Han Jing Tian Liping Lu Shengwu Xiong Jianwen Xiang

A minimization algorithm for automata generated fault trees with priority gates.

Nidhal Mahmud

API trustworthiness: an ontological approach for software library adoption.

Ellis E. Eghan Sultan S. Al-Qahtani Christopher Forbes Juergen Rilling

A new weighted naive Bayes method based on information diffusion for software defect prediction.

Haijin Ji Song Huang Yaning Wu Zhanwei Hui Changyou Zheng

Special issue on trustworthy systems and software.

Sudipto Ghosh Zhenyu Chen

In this issue.

Rachel Harrison


Volume 27, Number 2, June 2019
Test descriptions with ETSI TDL.

Philip Makedonski Gusztáv Adamis Martti Käärik Finn Kristoffersen Michele Carignani Andreas Ulrich Jens Grabowski

Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems.

M. Furkan Kiraç Baris Aktemur Hasan Sözer Ceren Sahin Gebizli

Coverage-based quality metric of mutation operators for test suite improvement.

Pedro Delgado-Pérez Louis M. Rose Inmaculada Medina-Bulo

Differences between a static and a dynamic test-to-code traceability recovery method.

Tamás Gergely Gergõ Balogh Ferenc Horváth Béla Vancsics Árpád Beszédes Tibor Gyimóthy

Learning and statistical model checking of system response times.

Bernhard K. Aichernig Priska Bauerstätter Elisabeth Jöbstl Severin Kann Robert Korosec Willibald Krenn Cristinel Mateis Rupert Schlick Richard Schumi

Virtual machine placement quality estimation in cloud infrastructures using integer linear programming.

Jorge López Natalia Kushik Djamal Zeghlache

Testing TLS using planning-based combinatorial methods and execution framework.

Dimitris E. Simos Josip Bozic Bernhard Garn Manuel Leithner Feng Duan Kristoffer Kleine Yu Lei Franz Wotawa

An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases.

Sébastien Salva Loukmen Regainia

FSM inference and checking sequence construction are two sides of the same coin.

Alexandre Petrenko Florent Avellaneda Roland Groz Catherine Oriat

Testing self-healing cyber-physical systems under uncertainty: a fragility-oriented approach.

Tao Ma Shaukat Ali Tao Yue Maged Elaasar

Safety-complete test suites.

Wen-ling Huang Sadik Özoguz Jan Peleska

n-Complete test suites for IOCO.

Petra van den Bos Ramon Janssen Joshua Moerman

Fault-based refinement-testing for CSP.

Ana Cavalcanti Adenilso Simão

Fault model-driven testing from FSM with symbolic inputs.

Omer Nguena Timo Alexandre Petrenko S. Ramesh

Guest Editorial: Special issue on Testing Software and Systems.

Hüsnü Yenigün Nina Yevtushenko Ana Rosa Cavalli

In this issue.

Rachel Harrison


Volume 27, Number 1, March 2019
Correlation of critical success factors with success of software projects: an empirical investigation.

Vahid Garousi Ayça Tarhan Dietmar Pfahl Ahmet Coskunçay Onur Demirörs

FLEX-RCA: a lean-based method for root cause analysis in software process improvement.

Joakim Pernstål Robert Feldt Tony Gorschek Dan Florén

Comparison of the FMEA and STPA safety analysis methods-a case study.

Sardar Muhammad Sulaman Armin Beer Michael Felderer Martin Höst

Modeling variability in the video domain: language and experience report.

Mauricio Alférez Mathieu Acher José Angel Galindo Benoit Baudry David Benavides

On the proposal and evaluation of a benchmark-based threshold derivation method.

Gustavo Vale Eduardo Fernandes Eduardo Figueiredo

Exploring the suitability of source code metrics for indicating architectural inconsistencies.

Jörg Lenhard Martin Blom Sebastian Herold

Usability improvement through A/B testing and refactoring.

Sergio Firmenich Alejandra Garrido Julián Grigera José Matías Rivero Gustavo Rossi

Automated functional testing of mobile applications: a systematic mapping study.

Porfirio Tramontana Domenico Amalfitano Nicola Amatucci Anna Rita Fasolino

Comprehensibility of system models during test design: a controlled experiment comparing UML activity diagrams and state machines.

Michael Felderer Andrea Herrmann

Code coverage differences of Java bytecode and source code instrumentation tools.

Ferenc Horváth Tamás Gergely Árpád Beszédes Dávid Tengeri Gergõ Balogh Tibor Gyimóthy

A vector table model-based systematic analysis of spectral fault localization techniques.

Chunyan Ma Chenyang Nie Weicheng Chao Bowei Zhang

A study examining relationships between micro patterns and security vulnerabilities.

Kazi Zakia Sultana Byron J. Williams Tanmay Bhowmik

In this issue.

Rachel Harrison