default search action
ESEM 2023: New Orleans, LA, USA
- ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2023, New Orleans, LA, USA, October 26-27, 2023. IEEE 2023, ISBN 978-1-6654-5223-6
- Leandro de Almeida Melo, Cleidson R. B. de Souza, Marcelo Gattermann Perin, Any Caroliny Duarte Batista de Almeida, Fernando Figueira Filho:
All For One and One For All: Investigating How Global Game Jam Participants Get and Offer Help. 1-12 - Yueke Zhang, Kevin Leach, Yu Huang:
Leveraging Evidence Theory to Improve Fault Localization: An Exploratory Study. 1-12 - Sharif Ahmed, Nasir U. Eisty:
Exploring the Advances in Identifying Useful Code Review Comments. 1-7 - Zengyang Li, Wenshuo Wang, Sicheng Wang, Peng Liang, Ran Mo:
Understanding Resolution of Multi-Language Bugs: An Empirical Study on Apache Projects. 1-11 - Aitor Arrieta, Pablo Valle, Asier Iriarte, Miren Illarramendi:
How Do Deep Learning Faults Affect AI-Enabled Cyber-Physical Systems in Operation? A Preliminary Study Based on DeepCrime Mutation Operators. 1-7 - Oliver Karras, Felix Wernlein, Jil Klünder, Sören Auer:
Divide and Conquer the EmpiRE: A Community-Maintainable Knowledge Graph of Empirical Research in Requirements Engineering. 1-12 - Fabio Calefato, Luigi Quaranta, Filippo Lanubile, Marcos Kalinowski:
Assessing the Use of AutoML for Data-Driven Software Engineering. 1-12 - Anastasiia Tkalich, Nils Brede Moe, Nina Haugland Andersen, Viktoria Stray, Astri Moksnes Barbala:
Pair Programming Practiced in Hybrid Work. 1-7 - Gustavo da Silva, Ronnie Edson de Souza Santos:
Comparing Mobile Testing Tools Using Documentary Analysis. 1-6 - Dingbang Wang, Yu Zhao, Lu Xiao, Tingting Yu:
An Empirical Study of Regression Testing for Android Apps in Continuous Integration Environment. 1-11 - Elvys Soares, Manoel Aranda III, Naelson Oliveira, Márcio Ribeiro, Rohit Gheyi, Emerson Souza, Ivan Machado, André L. M. Santos, Baldoino Fonseca, Rodrigo Bonifácio:
Manual Tests Do Smell! Cataloging and Identifying Natural Language Test Smells. 1-11 - Joel Castaño, Silverio Martínez-Fernández, Xavier Franch, Justus Bogner:
Exploring the Carbon Footprint of Hugging Face's ML Models: A Repository Mining Study. 1-12 - Stefan Reijenga, Kousar Aslam, Emitzá Guzmán:
Whistleblowing in the Software Industry: a Survey. 1-12 - Max Hort, Anastasiia Grishina, Leon Moonen:
An Exploratory Literature Study on Sharing and Energy Use of Language Models for Source Code. 1-12 - Chenglin Li, Yangyang Zhao, Yibiao Yang, Yuming Zhou, Liming Nie, Zuohua Ding:
Investigating the Impact of Bug Dependencies on Bug-Fixing Time Prediction. 1-12 - Caio Barbosa, Anderson G. Uchôa, Daniel Coutinho, Wesley K. G. Assunção, Anderson Oliveira, Alessandro Garcia, Baldoino Fonseca, Matheus Rabelo, José Eric Coelho, Eryka Carvalho, Henrique Santos:
Beyond the Code: Investigating the Effects of Pull Request Conversations on Design Decay. 1-12 - Juliana Saraiva, Sérgio Soares:
Privacy and Security Documents for Agile Software Engineering: An Experiment of LGPD Inventory Adoption. 1-9 - Mahi Begoug, Narjes Bessghaier, Ali Ouni, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer:
What Do Infrastructure-as-Code Practitioners Discuss: An Empirical Study on Stack Overflow. 1-12 - Lei Zhang, Mahsa Radnejad, Andriy V. Miranskyy:
Identifying Flakiness in Quantum Programs. 1-7 - Asif Kamal Turzo, Fahim Faysal, Ovi Poddar, Jaydeb Sarker, Anindya Iqbal, Amiangshu Bosu:
Towards Automated Classification of Code Review Feedback to Support Analytics. 1-12 - Jiaxin Yu, Liming Fu, Peng Liang, Amjed Tahir, Mojtaba Shahin:
Security Defect Detection via Code Review: A Study of the OpenStack and Qt Communities. 1-12 - Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. 1-12 - Jaydeb Sarker, Sayma Sultana, Steven R. Wilson, Amiangshu Bosu:
ToxiSpanSE: An Explainable Toxicity Detection in Code Review Comments. 1-12 - Ronnie Edson de Souza Santos, Luiz Fernando de Lima, Cleyton V. C. de Magalhães:
The Perspective of Software Professionals on Algorithmic Racism. 1-10 - Jingyue Li, Per Håkon Meland, Jakob Svennevik Notland, André Storhaug, Jostein Hjortland Tysse:
Evaluating the Impact of ChatGPT on Exercises of a Software Security Course. 1-6 - Irina Safonova, Maria Paasivaara, Casper Lassenius, Ömer Uludag, Abheeshta Putta:
Experienced Challenges of Adopting Agile Scaling Frameworks. 1-10 - Dong Seon Park, Ji Young Noh:
The Effect of Sprint Duration to the Velocity in a Large-Scale Embedded Software Project. 1-5 - Alexander Berndt, Zoltán Nochta, Thomas Bach:
The Vocabulary of Flaky Tests in the Context of SAP HANA. 1-9 - Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu:
Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions. 1-12 - Sushant Kumar Pandey, Miroslaw Staron, Jennifer Horkoff, Miroslaw Ochodek, Nicholas Mucci, Darko Durisic:
TransDPR: Design Pattern Recognition Using Programming Language Models. 1-7 - Xiaofeng Wang, Henry Edison, Dron Khanna, Usman Rafiq:
How Many Papers Should You Review? A Research Synthesis of Systematic Literature Reviews in Software Engineering. 1-6 - Beatriz Bernárdez, José Antonio Parejo, Margarita Cruz, Salvador Muñoz, Antonio Ruiz-Cortés:
On the Impact and Lessons Learned from Mindfulness Practice in a Real-World Software Company. 1-12 - Yawen Wang, Junjie Wang, Hongyu Zhang, Kairui Wang, Qing Wang:
What are Pros and Cons? Stance Detection and Summarization on Feature Request. 1-12 - Tahereh Zohdinasab, Vincenzo Riccio, Paolo Tonella:
An Empirical Study on Low- and High-Level Explanations of Deep Learning Misbehaviours. 1-11 - Sohil Lal Shrestha, Shafiul Azam Chowdhury, Christoph Csallner:
Replicability Study: Corpora For Understanding Simulink Models & Projects. 1-12 - Joshua Aldrich Edbert, Sahrima Jannat Oishwee, Shubhashis Karmakar, Zadia Codabux, Roberto Verdecchia:
Exploring Technical Debt in Security Questions on Stack Overflow. 1-12 - Addi Malviya-Thakur, Audris Mockus, Russell Zaretzki, Bogdan C. Bichescu, Randy V. Bradley:
How R Developers explain their Package Choice: A Survey. 1-12
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.