International Journal of Software Engineering and Knowledge Engineerin

Papers
(The median citation count of International Journal of Software Engineering and Knowledge Engineerin is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Smart Street Litter Detection and Classification Based on Faster R-CNN and Edge Computing25
Deep Transfer Learning for Source Code Modeling15
Guidelines for Quality Assurance of Machine Learning-Based Artificial Intelligence14
Online Judge System: Requirements, Architecture, and Experiences13
DEJIT: A Differential Evolution Algorithm for Effort-Aware Just-in-Time Software Defect Prediction13
On the Use of Generative Deep Learning Approaches for Generating Hidden Test Scripts12
Improved Entity Linking for Simple Question Answering Over Knowledge Graph9
An Improved Faster R-CNN for UAV-Based Catenary Support Device Inspection9
Code Clone Detection with Hierarchical Attentive Graph Embedding9
Trusted Service Provider Discovery Based on Data, Information, Knowledge, and Wisdom9
AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups8
An Approach to Software Maintenance: A Case Study in Small and Medium-Sized Businesses IT Organizations8
Social Network Analysis in Software Development Projects: A Systematic Literature Review8
Feature Selection and Spatial-Temporal Forecast of Oceanic Niño Index Using Deep Learning7
Patterns for Reuse in Production Systems Engineering6
Is Bug Severity in Line with Bug Fixing Change Complexity?6
Semantic Service Search in IT Crowdsourcing Platform: A Knowledge Graph-Based Approach6
Knowledge Graph Construction for SOFL Formal Specifications6
An Effective Method of Evaluating Pension Service Quality Using Multi-Dimension Attention Convolutional Neural Networks6
A Novel Overlapping Method to Alleviate the Cold-Start Problem in Recommendation Systems6
Software Agent-Centric Semantic Social Network for Cyber-Physical Interaction and Collaboration5
An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay5
Predicting of Open Source Software Component Reusability Level Using Object-Oriented Metrics by Taguchi Approach5
A Generic Approach on How to Formally Specify and Model Check Path Finding Algorithms: Dijkstra, A* and LPA*5
Personalized Learning Path Recommendation for E-Learning Based on Knowledge Graph and Graph Convolutional Network5
A Data-Driven Two-Stage Prediction Model for Train Primary-Delay Recovery Time5
Understanding the Working Habits of GH-SO Users on GitHub Commit Activity and Stack Overflow Post Activity5
An Efficient Sorting Algorithm for Non-Volatile Memory5
Correlation of Agile Principles and Practices to Software Project Performance: An AHP–Delphi Analysis4
A General Framework to Detect Design Patterns by Combining Static and Dynamic Analysis Techniques4
Extracting Prerequisite Relations among Concepts From the Course Descriptions4
On Representing Resilience Requirements of Microservice Architecture Systems4
Exploiting Declarative Mapping Rules for Generating GraphQL Servers with Morph-GraphQL4
An Intelligent Service Middleware Based on Sensors in IoT Environments4
Identifying Possible Improvements of Software Development Life Cycle (SDLC) Process of a Bank by Using Process Mining4
Context-Dependent Feature Values in Text Categorization3
Regression Test Case Prioritization Based on Fixed Size Candidate Set ART Algorithm3
An Automated Hybrid Approach for Generating Requirements Trace Links3
Formal Verification of Multitask Hybrid Systems by the OTS/CafeOBJ Method3
Leveraging SPARQL Queries for UML Consistency Checking3
The Turnout Abnormality Diagnosis Based on Semi-Supervised Learning Method3
Multiclass Classification of UML Diagrams from Images Using Deep Learning3
MuSim: Mutation-based Fault Localization Using Test Case Proximity3
Generation and Application of Constrained Interaction Test Suites Using Base Forbidden Tuples with a Mixed Neighborhood Tabu Search3
Integrated Formal Tools for Software Architecture Smell Detection3
Creativity and Design Thinking as Facilitators in Requirements Elicitation3
Refactoring Legacy Software for Layer Separation3
Supporting Requirements to Code Traceability Creation by Code Comments3
Predicting Software Defects for Object-Oriented Software Using Search-based Techniques3
The Experience of Tests during the COVID-19 Pandemic-Induced Emergency Remote Teaching3
An Empirical Study on Higher-Order Mutation-Based Fault Localization3
Urban Region Function Mining Service Based on Social Media Text Analysis3
An Empirical Study on the Impact of Python Dynamic Typing on the Project Maintenance3
Detecting Duplicate Questions in Stack Overflow via Source Code Modeling3
Semi-supervised Heterogeneous Defect Prediction with Open-source Projects on GitHub3
Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security3
Positive Influence Maximization in the Signed Social Networks Considering Polarity Relationship and Propagation Probability2
Python Code Smell Refactoring Route Generation Based on Association Rule and Correlation2
Applying Class Distance to Decide Similarity on Information Models for Automated Data Interoperability2
An Extensible Compiler for Implementing Software Design Patterns as Concise Language Constructs2
Automatically Generating Release Notes with Content Classification Models2
Identifying the Optimal Refactoring Dependencies Using Heuristic Search Algorithms to Maximize Maintainability2
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis2
Parallel Execution of Programs as a Support for Mutation Testing: A Replication Study2
Semantic Restful Service Composition Using Task Specification2
Use of Journey Maps and Personas in Software Requirements Elicitation2
A Novel Method for Identifying Microservices by Considering Quality Expectations and Deployment Constraints2
Lecture Information Service Based on Multiple Features Fusion2
A Revisit of Metrics for Test Case Prioritization Problems2
Reverse Engineering of Object Oriented Systems to ALF2
Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code2
Automatic Analysis of Available Source Code of Top Artificial Intelligence Conference Papers2
Winning Strategy Tree Construction for BDD-Based ATL Model Checkers2
Personalized API Recommendations2
Using API Call Sequences for IoT Malware Classification Based on Convolutional Neural Networks2
Inconsistency-Tolerant Hierarchical Probabilistic CTL Model Checking: Logical Foundations and Illustrative Examples2
A Literature-Based Thematic Network to Provide a Comprehensive Understanding of Agile Teamwork (106)2
Investigating Different Metrics for Evaluation and Selection of Mutation Operators for Java2
Metaheuristics and Software Engineering: Past, Present, and Future2
A Novel Effort Measure Method for Effort-Aware Just-in-Time Software Defect Prediction2
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining2
Generating Optimal Class Integration Test Orders Using Genetic Algorithms2
Predicting Ride Hailing Service Demand Using Autoencoder and Convolutional Neural Network2
Memory-Aware Scheduling Parallel Real-Time Tasks for Multicore Systems2
Linear Software Models: An Occam’s Razor Set of Algebraic Connectors Integrates Modules into a Whole Software System2
A Proactive Approach to Test Case Selection — An Efficient Implementation of Adaptive Random Testing2
Conversion-based Approach to Obtain an SNN Construction2
Automated Test Input Generation via Model Inference Based on User Story and Acceptance Criteria for Mobile Application Development2
Agent-Oriented Methodologies Evaluation Frameworks: A Review2
Semantic Recovery of Traceability Links between System Artifacts2
Equivalent Mutants Detection Based on Weighted Software Behavior Graph1
Scalable Influence Maximization Meets Efficiency and Effectiveness in Large-Scale Social Networks1
Falsification-Aware Semantics for Temporal Logics and Their Inconsistency-Tolerant Subsystems: Theoretical Foundations of Falsification-Aware Model Checking1
Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints1
Mutual Inference Model for User Roles and Urban Functional Zones1
An Ontology-Based Information Extraction System for Residential Land-Use Suitability Analysis1
Sequence-Aware API Recommendation Based on Collaborative Filtering1
An Empirical Study on Rule Violation History of JavaScript Code Blocks on Stack Overflow1
GASSER: A Multi-Objective Evolutionary Approach for Test Suite Reduction1
DockerPedia: A Knowledge Graph of Software Images and Their Metadata1
FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115)1
Enabling Reliability-Driven Optimization Selection with Gate Graph Attention Neural Network1
A Proposed Framework for Student’s Skills-Driven Personalization of Cloud-Based Course Content1
Mapping Modern JVM Language Code to Analysis-Friendly Graphs: A Study with Kotlin1
A Comparative Study of Ensemble Techniques Based on Genetic Programming: A Case Study in Semantic Similarity Assessment1
A Context-Aware Architecture for Realizing Business Process Adaptation Strategies Using Fuzzy Planning1
Prediction of Regional Commercial Activeness and Entity Condition Based on Online Reviews1
An Empirical Study on GitHub Sponsor Mechanism1
An Approach of Automated Anomalous Microservice Ranking in Cloud-Native Environments1
A Formal Approach for Consistency Management in UML Models1
Novel Strategy Generating Variable-Length State Machine Test Paths1
Test Oracle Generation Based on BPNN by Using the Values of Variables at Different Breakpoints for Programs1
A New Semantic-based Multi-Level Classification Approach for Activity Recognition Using Smartphones1
Guest Editor’s Introduction: Software Mathematical Models for Human Understanding1
Studying the Co-Evolution of Source Code and Acceptance Tests1
Matching Logic for Concurrent Programs Based on Rely/Guarantee and Abstract Patterns1
A Unifying Coalgebraic Semantics Framework for Quantum Systems1
Clean and Learn: Improving Robustness to Spurious Solutions in API Question Answering1
Constructing Bug Knowledge Graph as a Service for Bug Search1
An Empirical Study on Code Smell Introduction and Removal in Deep Learning Software Projects1
Forecasting Stock Index Using a Volume-Aware Positional Attention-Based Recurrent Neural Network1
Static Privacy Analysis by Flow Reconstruction of Tainted Data1
Data-Driven Persona Retrospective Based on Persona Significance Index in B-to-B Software Development1
ATLDesigner: ATL Model Checking Using An Attribute Grammar1
An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network1
Editorial: A New Emphasis on Software Engineering and Knowledge Engineering Education1
Embodying the Number of an Entity’s Relations for Knowledge Representation Learning1
BSR-TC: Adaptively Sampling for Accurate Triangle Counting over Evolving Graph Streams1
dSubSign: Classification of Instance-Feature Data Using Discriminative Subgraphs as Class Signatures1
Modeling and Selecting Frameworks in Terms of Patterns, Tactics and System Qualities1
Global Sensitivity Analysis for Fuzzy RDF Data1
An Empirical Study on Bugs in PHP1
Construction and Analysis of Scientific and Technological Personnel Relational Graph for Group Recognition1
Identifying Temporal Corpus for Enhanced User Comments Analysis1
Method for Predicting Mobile Service Evolution from User Reviews and Update Logs1
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 250101
Guest Editor’s Introduction1
Automatic Identification of High-Impact Bug Report by Product and Test Code Quality1
Automated Priority Prediction for Bug Reports Using Comment Intensiveness Features and SMOTE Data Balancing1
The Technical Debt Density Over Multiple Releases and the Refactoring Story1
Verifiable Model Construction for Business Processes1
DHLBT: Efficient Cross-Modal Hashing Retrieval Method Based on Deep Learning Using Large Batch Training1
Semantics-Driven Programming of Self-Adaptive Reactive Systems1
Collaborative Inference Acceleration Integrating DNN Partitioning and Task Offloading in Mobile Edge Computing1
Impact Analysis About Response Time Considering Deployment Change of SaaS Software1
Three Approaches for Detecting Direct Output Cheating in Program Online Judge Systems1
Automatic Voter Recommendation Method for Closing Questions in Stack Overflow1
Regular Expression Learning from Positive Examples Based on Integer Programming1
A Fully Parallel Approach of Model Checking Via Probe Machine1
Concurrent Bug Finding Based on Bounded Model Checking1
Mutation-Based Minimal Test Suite Generation for Boolean Expressions1
SWEBOK Matters: Report and Reflection of a SEKE Panel on the Educational and Professional Implications of SWEBOK1
Refactoring Cost Estimation for Architectural Technical Debt1
SQL#: A Language for Maintainable and Debuggable Database Queries1
BPMN Data Model for Multi-Perspective Process Mining on Blockchain1
An Approach to Software Defect Prediction Combining Semantic Features and Code Changes1
Class Change Prediction by Incorporating Community Smell: An Empirical Study1
Reuse-Based Agile Development Process for Drone Software Systems1
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine0
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model0
Exact Learning of Qualitative Constraint Networks from Membership Queries0
Recommending Relevant Tutorial Fragments for API-Related Natural Language Questions0
Author Index Volume 32 (2022)0
Deep Understanding of Runtime Configuration Intention0
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search0
ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method’s External Dependencies0
Semantic Discovery of Composite GIS Services0
A Dynamic Drilling Sampling Method and Evaluation Model for Big Streaming Data0
Matching Logic Based on Ownership Transfer0
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification0
Author Index Volume 30 (2020)0
Benchmarking Whole Knowledge Graph Embedding Techniques0
Guest Editorial Special Issue on Best Papers from SEKE20220
EFSP: An Enhanced Full Scrum Process Model0
Remaining Activity Sequence Prediction for Ongoing Process Instances0
Review and Application of Knowledge Graph in Crisis Management0
Guest Editor’s Introduction0
A Combined Usage of NLP Libraries Towards Analyzing Software Documents0
Multi-Intent Inline Code Comment Generation via Large Language Model0
Guest Editor’s Introduction0
Software Testing Integration-Based Model (I-BM) Framework for Recognizing Measure Fault Output Accuracy Using Machine Learning Approach0
EFSM Model-Based Testing for Android Applications0
Software Industry Perception of Technical Debt and Its Management0
Modeling of Security Fault-Tolerant Requirements for Secure Systems0
Guest Editor’s Introduction0
Which Exceptions Do We Have to Catch in the Python Code for AI Projects?0
The Safety and Performance of Prominent Programming Languages0
Deep Tasks Summarization for Comprehending Mixed Tasks in a Commit0
Understanding the Role of Stack Overflow in Supporting Software Development Tasks: A Research Perspective0
Constructing RDF Knowledge Base with Object-Oriented Databases0
Guest Editor’s Introduction0
NISe: Non-Invasive Secure Framework for Multi-Access Edge Computing0
A Hierarchical Feature Ensemble Deep Learning Approach for Software Defect Prediction0
Guest Editor’s Introduction0
OdegVul: An Approach for Statement-Level Defect Prediction0
AutoWPR: An Automatic Web Page Recoloring Method0
Generation of C++ Code from Isabelle/HOL Specification0
Python API Misuse Mining and Classification Based on Hybrid Analysis and Attention Mechanism0
Author Reputation Measurement on Question and Answer Sites by the Classification of Author-Generated Content0
Enhancing Reusability: An Integrated Framework for Software Requirements Classification and Prioritization0
CodeGen-Search: A Code Generation Model Incorporating Similar Sample Information0
iMER-FM: Iterative Process of System Feature Model Extraction from the Requirements0
Applying Scrum to Knowledge Transfer Among Software Developers0
A Dual Decision-making Continuous Reinforcement Learning Method Based on Sim2Real0
A Modeling and Verification Method of Cyber-Physical Systems Based on AADL and Process Algebra0
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning0
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment0
DTester: Diversity-Driven Test Case Generation for Web Applications0
Aligning Software Architecture Training with Software Industry Requirements0
Bug Localization with Features Crossing and Structured Semantic Information Matching0
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach0
STMultiple: Sparse Transformer Based on RFID for Multi-Object Activity Recognition0
An Adaptive Semantic Annotation Tool for Teachers Based on Context-Aware and Internet of Things0
Agile Effort Estimation: Comparing the Accuracy and Efficiency of Planning Poker, Bucket System, and Affinity Estimation Methods0
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion0
Boosting Just-In-Time Code Comment Updating Via Programming Context and Refactor0
Extension of a Simulation Software to Incorporate Quality-Related Factors in Investigations on Software Engineering Economics0
Cross-Project Transfer Learning on Lightweight Code Semantic Graphs for Defect Prediction0
KEMA++: A Full Representative Knowledge-Graph Embedding Model (036)0
VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications0
Guest Editors’ Introduction0
Methods on Detecting Closely Related Topics and Spatial Events0
An Optimal WSN Coverage Based on Adapted Transit Search Algorithm0
Enhancing Answer Selection via Ad-Hoc Knowledge Extraction from Unstructured Web Texts0
Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion0
Enhancing Reusability: An Integrated Framework for Software Requirements Classification and Prioritization0
XL-BPMN Model-Based Service Similarity Measurement Technique0
GTFP: Network Fault Prediction Based on Graph and Time Series0
Identifying High-impact Bug Reports with Imbalance Distribution by Instance Fuzzy Entropy0
Using an Experimental Framework to Support Variables Selection: An Exploratory Study0
Guest Editor’s Introduction0
Graph-Based Root Cause Localization in Microservice Systems with Protection Mechanisms0
Root Cause Analysis of Anomalies Based on Graph Convolutional Neural Network0
Towards Exogenous Coordination of Concurrent Cloud Applications0
A Case Study of Software Project Replacement: A Time Series Analysis0
An Extensible Modeling Method Supporting Ontology-Based Scenario Specification and Domain-Specific Extension0
Split Attention Pointer Network for Source Code Language Modeling0
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction0
Sentiment-Time Heterogeneous Residual Graph Attention Transformer for session-based recommendation0
Towards Generating Realistic and High Coverage Test Data for Constraint-Based Fault Injection0
Authentication and Authorization Management in SOA with the Focus on RESTful Services0
An imperfect debugging non-homogeneous Poisson process software reliability model based on a 3-parameter S-shaped function0
Enhancing Code Summarization with Graph Embedding and Pre-Trained Model0
Enhancing Multi-Behavior Recommendations Through Capturing Dynamic Preferences0
Automated Visual Testing of Application User Interfaces Using Static Analysis of Screenshots0
OC-Detector: Detecting Smart Contract Vulnerabilities Based on Clustering Opcode Instructions0
Automated Localization Testing of Mobile Applications Method0
From SATD Recognition to an Interpretation Method Based on the Dataset0
CodeLabeller: A Web-Based Code Annotation Tool for Java Design Patterns and Summaries0
Hybrid Model with Multi-Level Code Representation for Multi-Label Code Smell Detection (077)0
0.034319877624512