All Stories

  1. Self-Supervised Contrastive Learning for Code Retrieval and Summarization via Semantic-Preserving Transformations
  2. A Feature Table approach to decomposing monolithic applications into microservices
  3. SAR: learning cross-language API mappings with little knowledge
  4. An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption
  5. CrowdService
  6. Locating bugs without looking back
  7. Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion
  8. POSTER
  9. Engineering Adaptive Model-Driven User Interfaces
  10. Forensically-Sound Analysis of Security Risks of Using Local Password Managers
  11. Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
  12. Locating bugs without looking back
  13. Protecting Privacy in the Cloud: Current Practices, Future Directions
  14. The Aftermath of the Missing Flight MH370: What Can Engineers Do? [Point of View]
  15. Investigating naming convention adherence in Java references
  16. An Open Framework for Semantic Code Queries on Heterogeneous Repositories
  17. Automated analysis of security requirements through risk-based argumentation
  18. An Architectural Evolution Dataset
  19. A Survey of the Forms of Java Reference Names
  20. The Role of Environmental Assumptions in Failures of DNA Nanosystems
  21. Managing Security Control Assumptions Using Causal Traceability
  22. Guest editorial: Special section: Software quality and maintainability
  23. “Why can’t I do that?”: Tracing Adaptive Security Decisions
  24. Requirements-Driven Self-Optimization of Composite Services Using Feedback Control
  25. Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit
  26. Adaptive Model-Driven User Interface Development Systems
  27. Traceability for Adaptive Information Security in the Cloud
  28. Integrating adaptive user interface capabilities in enterprise applications
  29. Self-adaptation through incremental generative model transformations at runtime
  30. Uncertainty handling in goal-driven self-optimization – Limiting the negative effect on adaptation
  31. From Model-Driven Software Development Processes to Problem Diagnoses at Runtime
  32. Run-time generation, transformation, and verification of access control models for self-protection
  33. Requirements-driven mediation for collaborative security
  34. Specifying software features for composition: A tool-supported approach
  35. Resolving vulnerability identification errors using security requirements on business process models
  36. Requirements-driven adaptive digital forensics
  37. INVocD: Identifier name vocabulary dataset
  38. Developing a domain-specific plug-in for a modelling platform: The good, the bad, the ugly
  39. Improving feature location using structural similarity and iterative graph mapping
  40. Reasoning About Dynamic Aspectual Requirements
  41. Aspect Interactions: A Requirements Engineering Perspective
  42. Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies
  43. Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications
  44. RBUIS
  45. Cedar studio
  46. Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop
  47. Analysing monitoring and switching problems for adaptive systems
  48. Stateful requirements monitoring for self-repairing socio-technical systems
  49. Privacy arguments: Analysing selective disclosure requirements for mobile applications
  50. Maintaining invariant traceability through bidirectional transformations
  51. Workshop Proposal for CSMR 2012 - SQM 2012
  52. A Tool for Managing Evolving Security Requirements
  53. EA-tracer
  54. Specifying and detecting meaningful changes in programs
  55. An evolutionary visual software analysis tool for providing insights into software evolution
  56. Mining java class naming conventions
  57. Risk and argument: A risk-based argumentation method for practical security
  58. Are your sites down? Requirements-driven self-tuning for the survivability of Web systems
  59. OpenArgue: Supporting argumentation to evolve secure software systems
  60. Analyzing evolution of variability in a software product line: From contexts and requirements to features
  61. Assessing architectural evolution: a case study
  62. PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications
  63. Iterative context-aware feature location (NIER track)
  64. The Security Twin Peaks
  65. Analysing requirements in a case study of pairing
  66. Improving the Tokenisation of Identifier Names
  67. Some Issues in the ‘Archaeology’ of Software Evolution
  68. Towards learning to detect meaningful changes in software
  69. Survivability-oriented self-tuning of web systems
  70. An Extended Ontology for Security Requirements
  71. SeCMER: A Tool to Gain Control of Security Requirements Evolution
  72. Tool support for code generation from a UMLsec property
  73. Self-Tuning of Software Systems Through Goal-based Feedback Loop Control
  74. Assure High Quality Code Using Refactoring and Obfuscation Techniques
  75. Variability Modeling for Product Line Viewpoints Integration
  76. Run-Time Security Traceability for Evolving Systems
  77. Exploring the Influence of Identifier Names on Code Quality: An Empirical Study
  78. Security Requirements Engineering for Evolving Software Systems
  79. Model-Based Argument Analysis for Evolving Security Requirements
  80. Towards a Unified Framework for Contextual Variability in Requirements
  81. Are Your Lights Off? Using Problem Frames to Diagnose System Failures
  82. AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment
  83. Relating Identifier Naming Flaws and Code Quality: An Empirical Study
  84. Using formal concept analysis to construct and visualise hierarchies of socio-technical relations
  85. Early Identification of Problem Interactions: A Tool-Supported Approach
  86. Requirements Engineering and Aspects
  87. Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design
  88. Aspects across Software Life Cycle: A Goal-Driven Approach
  89. Requirements Engineering: Foundation for Software Quality
  90. Monitoring and diagnosing software requirements
  91. Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures
  92. Supporting Requirements Model Evolution throughout the System Life-Cycle
  93. Tools for Traceability in Secure Software Development
  94. Traceability for the maintenance of secure software
  95. Design principles in architectural evolution: A case study
  96. Analyzing the evolution of eclipse plugins
  97. Configuring features with stakeholder goals
  98. Enforcing a security pattern in stakeholder goal models
  99. Tools for model-based security engineering
  100. An automated approach to monitoring and diagnosing requirements
  101. Specifying Monitoring and Switching Problems in Context
  102. Tracing and Validating Goal Aspects
  103. Blind User Requirements Engineering for Mobile Services
  104. Comparing Web Services with other Software Components
  105. On Goal-based Variability Acquisition and Analysis
  106. Visualizing non-functional requirements
  107. Requirements-driven design of autonomic application software
  108. Towards requirements-driven autonomic systems design
  109. Configuring common personal software: a requirements-driven approach
  110. Quality-Based Software Reuse
  111. Towards requirements-driven autonomic systems design
  112. Reverse engineering goal models from legacy code
  113. Improving the Build Architecture of Legacy C/C++ Software Systems
  114. Dynamically Self-Organized Service Composition in Wireless Ad Hoc Networks
  115. Making XML document markup international
  116. Reducing build time through precompilations for evolving large software
  117. Non-uniform dependences partitioned by recurrence chains
  118. Loop Parallelization using the 3D Iteration Space Visualizer
  119. A self-adaptive scheduling algorithm of on-demand broadcasts
  120. A 3D-JAVA TOOL TO VISUALIZE LOOP-CARRIED DEPENDENCES
  121. JPT: A Java Parallelization Tool
  122. Visualizing the iteration space in PEFPT
  123. Partitioning loops with variable dependence distances
  124. Security Requirements Engineering for Evolving Software Systems
  125. Performance visualizations using XML representations
  126. A Lightweight Approach to Semantic Web Service Synthesis
  127. From goals to aspects: discovering aspects from requirements goal models
  128. Requirements-Driven Design and Configuration Management of Business Processes
  129. Automated Analysis of Permission-Based Security Using UMLsec
  130. Web Service Search: Who, When, What, and How
  131. A Taxonomy of Asymmetric Requirements Aspects
  132. Web Service Composition: A Reality Check
  133. From Goals to High-Variability Software Design
  134. Security Patterns