Volume 28, Number 2, November 2021
The impact of the code smells of the presentation layer on the diffuseness of aesthetic defects of Android apps.

Mabrouka Chouchane Makram Soui Khaled Ghédira

Deep learning approach for intrusion detection in IoT-multi cloud environment.

D. Selvapandian R. Santhosh

Does sentiment help requirement engineering: exploring sentiments in user comments to discover informative comments.

Jongwook Jeong Neunghoe Kim

SSD based waste separation in smart garbage using augmented clustering NMS.

M. Karthikeyan T. S. Subashini R. Jebakumar

Cloud - based multiple importance sampling algorithm with AI based CNN classifier for secure infrastructure.

Dhaya Ramakrishnan Kanthavel Radhakrishnan

Guided pattern mining for API misuse detection by change-based code analysis.

Sebastian Nielebock Robert Heumüller Kevin Michael Schott Frank Ortmeier

Predicting the Defects using Stacked Ensemble Learner with Filtered Dataset.

Somya Goyal

Natural language ambiguity resolution by intelligent semantic annotation of software requirements.

Fariha Ashfaq Imran Sarwar Bajwa

Information security implications of using NLP in IT outsourcing: a Diffusion of Innovation theory perspective.

Baber Majid Bhatti Sameera Mubarak Sev V. Nagalingam

Discriminating features-based cost-sensitive approach for software defect prediction.

Aftab Ali Naveed Khan Mamun I. Abu-Tair Joost Noppen Sally I. McClean Ian R. McChesney

ANCHOR: locating android framework-specific crashing faults.

Pingfan Kong Li Li Jun Gao Timothée Riom Yanjie Zhao Tegawendé F. Bissyandé Jacques Klein

New failure rate model for iterative software development life cycle process.

Sangeeta Sitender Kapil Sharma Manju Bala

A model-driven framework for developing android-based classic multiplayer 2D board games.

Mohammad Derakhshandi Shekoufeh Kolahdouz Rahimi Javier Troya Kevin Lano

GUI visual aspect migration: a framework agnostic solution.

Benoît Verhaeghe Nicolas Anquetil Anne Etien Stéphane Ducasse Abderrahmane Seriai Mustapha Derras

IIAG: a data-driven and theory-inspired approach for advising how to interact with new remote collaborators in OSS teams.

Yi Wang David F. Redmiles

Prioritizing refactorings for security-critical code.

Chaima Abid Vahid Alizadeh Marouane Kessentini Mouna Dhaouadi Rick Kazman


Volume 28, Number 1, May 2021
Investigation and prediction of open source software evolution using automated parameter mining for agent-based simulation.

Daniel Honsel Verena Herbold Stephan Waack Jens Grabowski

ALBA: a model-driven framework for the automatic generation of android location-based apps.

Mohammadali Gharaat Mohammadreza Sharbaf Bahman Zamani Abdelwahab Hamou-Lhadj

Considering dependencies between bug reports to improve bugs triage.

Rafi Almhana Marouane Kessentini