


default search action
Software Quality Journal, Volume 27
Volume 27, Number 1, March 2019
- Rachel Harrison:

In this issue. 1-3 - Kazi Zakia Sultana

, Byron J. Williams, Tanmay Bhowmik:
A study examining relationships between micro patterns and security vulnerabilities. 5-41 - Chunyan Ma, Chenyang Nie, Weicheng Chao, Bowei Zhang:

A vector table model-based systematic analysis of spectral fault localization techniques. 43-78 - Ferenc Horváth, Tamás Gergely

, Árpád Beszédes
, Dávid Tengeri, Gergö Balogh
, Tibor Gyimóthy
:
Code coverage differences of Java bytecode and source code instrumentation tools. 79-123 - Michael Felderer

, Andrea Herrmann:
Comprehensibility of system models during test design: a controlled experiment comparing UML activity diagrams and state machines. 125-147 - Porfirio Tramontana

, Domenico Amalfitano
, Nicola Amatucci, Anna Rita Fasolino
:
Automated functional testing of mobile applications: a systematic mapping study. 149-201 - Sergio Firmenich

, Alejandra Garrido
, Julián Grigera
, José Matías Rivero, Gustavo Rossi:
Usability improvement through A/B testing and refactoring. 203-240 - Jörg Lenhard

, Martin Blom, Sebastian Herold
:
Exploring the suitability of source code metrics for indicating architectural inconsistencies. 241-274 - Gustavo Vale

, Eduardo Fernandes
, Eduardo Figueiredo
:
On the proposal and evaluation of a benchmark-based threshold derivation method. 275-306 - Mauricio Alférez, Mathieu Acher

, José Angel Galindo, Benoit Baudry, David Benavides:
Modeling variability in the video domain: language and experience report. 307-347 - Sardar Muhammad Sulaman

, Armin Beer, Michael Felderer
, Martin Höst
:
Comparison of the FMEA and STPA safety analysis methods-a case study. 349-387 - Joakim Pernstål

, Robert Feldt, Tony Gorschek, Dan Florén:
FLEX-RCA: a lean-based method for root cause analysis in software process improvement. 389-428 - Vahid Garousi

, Ayça Tarhan, Dietmar Pfahl
, Ahmet Coskunçay
, Onur Demirörs
:
Correlation of critical success factors with success of software projects: an empirical investigation. 429-493
Volume 27, Number 2, June 2019
- Rachel Harrison:

In this issue. 495 - Hüsnü Yenigün, Nina Yevtushenko, Ana Rosa Cavalli

:
Guest Editorial: Special issue on Testing Software and Systems. 497-499 - Omer Nguena Timo

, Alexandre Petrenko
, S. Ramesh:
Fault model-driven testing from FSM with symbolic inputs. 501-527 - Ana Cavalcanti

, Adenilso Simão
:
Fault-based refinement-testing for CSP. 529-562 - Petra van den Bos, Ramon Janssen, Joshua Moerman

:
n-Complete test suites for IOCO. 563-588 - Wen-ling Huang, Sadik Özoguz, Jan Peleska

:
Safety-complete test suites. 589-613 - Tao Ma, Shaukat Ali, Tao Yue, Maged Elaasar

:
Testing self-healing cyber-physical systems under uncertainty: a fragility-oriented approach. 615-649 - Alexandre Petrenko

, Florent Avellaneda
, Roland Groz, Catherine Oriat:
FSM inference and checking sequence construction are two sides of the same coin. 651-674 - Sébastien Salva, Loukmen Regainia:

An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases. 675-701 - Dimitris E. Simos

, Josip Bozic
, Bernhard Garn, Manuel Leithner
, Feng Duan
, Kristoffer Kleine, Yu Lei, Franz Wotawa
:
Testing TLS using planning-based combinatorial methods and execution framework. 703-729 - Jorge López

, Natalia Kushik
, Djamal Zeghlache
:
Virtual machine placement quality estimation in cloud infrastructures using integer linear programming. 731-755 - Bernhard K. Aichernig

, Priska Bauerstätter
, Elisabeth Jöbstl, Severin Kann, Robert Korosec, Willibald Krenn, Cristinel Mateis
, Rupert Schlick
, Richard Schumi:
Learning and statistical model checking of system response times. 757-795 - Tamás Gergely

, Gergö Balogh
, Ferenc Horváth, Béla Vancsics
, Árpád Beszédes
, Tibor Gyimóthy:
Differences between a static and a dynamic test-to-code traceability recovery method. 797-822 - Pedro Delgado-Pérez

, Louis M. Rose, Inmaculada Medina-Bulo:
Coverage-based quality metric of mutation operators for test suite improvement. 823-859 - M. Furkan Kiraç, Baris Aktemur

, Hasan Sözer
, Ceren Sahin Gebizli:
Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems. 861-883 - Philip Makedonski

, Gusztáv Adamis, Martti Käärik, Finn Kristoffersen, Michele Carignani, Andreas Ulrich, Jens Grabowski:
Test descriptions with ETSI TDL. 885-917
Volume 27, Number 3, September 2019
- Rachel Harrison:

In this issue. 919-920 - Sudipto Ghosh, Zhenyu Chen:

Special issue on trustworthy systems and software. 921-922 - Haijin Ji, Song Huang

, Yaning Wu, Zhanwei Hui, Changyou Zheng:
A new weighted naive Bayes method based on information diffusion for software defect prediction. 923-968 - Ellis E. Eghan

, Sultan S. Al-Qahtani, Christopher Forbes, Juergen Rilling
:
API trustworthiness: an ontological approach for software library adoption. 969-1014 - Nidhal Mahmud

:
A minimization algorithm for automata generated fault trees with priority gates. 1015-1043 - Dongdong Zhao, Hong Lin, Linjun Ran, Mushuai Han, Jing Tian, Liping Lu, Shengwu Xiong

, Jianwen Xiang
:
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. 1045-1068 - Khalid Alkharabsheh

, Yania Crespo
, M. Esperanza Manso, José A. Taboada
:
Software Design Smell Detection: a systematic mapping study. 1069-1148 - Júlio Menezes Jr.

, Cristine Gusmão
, Hermano Perrelli de Moura:
Risk factors in software development projects: a systematic literature review. 1149-1174 - Pierre A. Akiki

:
To var or not to var: how do C# developers use and misuse implicit and explicit typing? 1175-1207 - Mushtaq Raza

, João Pascoal Faria
, Rafael Salazar:
Assisting software engineering students in analyzing their performance in software development. 1209-1237 - Fáber D. Giraldo

, Sergio España
, William J. Giraldo, Oscar Pastor
, John Krogstie
:
A method to evaluate quality of modelling languages based on the Zachman reference taxonomy. 1239-1269 - David Johannes, Foutse Khomh

, Giuliano Antoniol:
A large-scale empirical study of code smells in JavaScript projects. 1271-1314 - Michael Rath

, Patrick Mäder:
Structured information in bug report descriptions - influence on IR-based bug localization and developers. 1315-1337 - David Honfi

, Zoltán Micskei
:
Classifying generated white-box tests: an exploratory study. 1339-1380
Volume 27, Number 4, December 2019
- Rachel Harrison:

In this issue. 1381-1382 - Ravi Eda

, Hyunsook Do:
An efficient regression testing approach for PHP Web applications using test selection and reusable constraints. 1383-1417 - Krishna Patel, Robert M. Hierons

:
A partial oracle for uniformity statistics. 1419-1447 - Raluca Florea

, Viktoria Stray:
The skills that employers look for in software testers. 1449-1479 - Igor Scaliante Wiese

, Rodrigo Takashi Kuroda, Igor Steinmacher, Gustavo Ansaldi Oliva, Reginaldo Ré
, Christoph Treude
, Marco Aurélio Gerosa:
Pieces of contextual information suitable for predicting co-changes? An empirical study. 1481-1503 - Maximilian Schramme, José A. Macías

:
Analysis and measurement of internal usability metrics through code annotations. 1505-1530 - Abbas Javan Jafari, Abbas Rasoolzadegan

:
Quality-centric security pattern mutations. 1531-1561 - Srikrishnan Sundararajan, Bhasi Marath

, Pramod K. Vijayaraghavan:
Variation of risk profile across software life cycle in IS outsourcing. 1563-1582 - Mívian M. Ferreira

, Thaís Mombach, Marco Túlio Valente
, Kecia A. M. Ferreira:
Algorithms for estimating truck factors: a comparative study. 1583-1617

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














