International Journal of Software Engineering and Knowledge Engineerin

(The median citation count of International Journal of Software Engineering and Knowledge Engineerin is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
Online Judge System: Requirements, Architecture, and Experiences20
Trusted Service Provider Discovery Based on Data, Information, Knowledge, and Wisdom14
DEJIT: A Differential Evolution Algorithm for Effort-Aware Just-in-Time Software Defect Prediction14
Guidelines for Quality Assurance of Machine Learning-Based Artificial Intelligence14
On the Use of Generative Deep Learning Approaches for Generating Hidden Test Scripts13
An Improved Faster R-CNN for UAV-Based Catenary Support Device Inspection11
Code Clone Detection with Hierarchical Attentive Graph Embedding9
Improved Entity Linking for Simple Question Answering Over Knowledge Graph9
Feature Selection and Spatial-Temporal Forecast of Oceanic Niño Index Using Deep Learning8
A Data-Driven Two-Stage Prediction Model for Train Primary-Delay Recovery Time8
Is Bug Severity in Line with Bug Fixing Change Complexity?7
Patterns for Reuse in Production Systems Engineering7
Knowledge Graph Construction for SOFL Formal Specifications7
Predicting of Open Source Software Component Reusability Level Using Object-Oriented Metrics by Taguchi Approach7
A Novel Overlapping Method to Alleviate the Cold-Start Problem in Recommendation Systems6
On Representing Resilience Requirements of Microservice Architecture Systems6
An Integration of Train Timetabling, Platforming and Routing-Based Cooperative Adjustment Methodology for Dealing with Train Delay6
A Generic Approach on How to Formally Specify and Model Check Path Finding Algorithms: Dijkstra, A* and LPA*6
Personalized Learning Path Recommendation for E-Learning Based on Knowledge Graph and Graph Convolutional Network6
An Effective Method of Evaluating Pension Service Quality Using Multi-Dimension Attention Convolutional Neural Networks6
Creativity and Design Thinking as Facilitators in Requirements Elicitation5
Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security5
Understanding the Working Habits of GH-SO Users on GitHub Commit Activity and Stack Overflow Post Activity5
Extracting Prerequisite Relations among Concepts From the Course Descriptions5
Correlation of Agile Principles and Practices to Software Project Performance: An AHP–Delphi Analysis5
Semi-supervised Heterogeneous Defect Prediction with Open-source Projects on GitHub5
An Efficient Sorting Algorithm for Non-Volatile Memory5
Formal Verification of Multitask Hybrid Systems by the OTS/CafeOBJ Method4
MuSim: Mutation-based Fault Localization Using Test Case Proximity4
Root Cause Analysis of Anomalies Based on Graph Convolutional Neural Network4
Detecting Duplicate Questions in Stack Overflow via Source Code Modeling4
Identifying Possible Improvements of Software Development Life Cycle (SDLC) Process of a Bank by Using Process Mining4
An Empirical Study on Higher-Order Mutation-Based Fault Localization4
A General Framework to Detect Design Patterns by Combining Static and Dynamic Analysis Techniques4
Multiclass Classification of UML Diagrams from Images Using Deep Learning4
An Empirical Study on the Impact of Python Dynamic Typing on the Project Maintenance3
Leveraging SPARQL Queries for UML Consistency Checking3
The Turnout Abnormality Diagnosis Based on Semi-Supervised Learning Method3
Predicting Software Defects for Object-Oriented Software Using Search-based Techniques3
Urban Region Function Mining Service Based on Social Media Text Analysis3
Static Privacy Analysis by Flow Reconstruction of Tainted Data3
Use of Journey Maps and Personas in Software Requirements Elicitation3
Supporting Requirements to Code Traceability Creation by Code Comments3
Context-Dependent Feature Values in Text Categorization3
An Automated Hybrid Approach for Generating Requirements Trace Links3
Metaheuristics and Software Engineering: Past, Present, and Future3
Refactoring Legacy Software for Layer Separation3
Automatic Analysis of Available Source Code of Top Artificial Intelligence Conference Papers3
The Experience of Tests during the COVID-19 Pandemic-Induced Emergency Remote Teaching3
Parallel Execution of Programs as a Support for Mutation Testing: A Replication Study2
Mutation-Based Minimal Test Suite Generation for Boolean Expressions2
A Novel Method for Identifying Microservices by Considering Quality Expectations and Deployment Constraints2
Semantic Recovery of Traceability Links between System Artifacts2
Positive Influence Maximization in the Signed Social Networks Considering Polarity Relationship and Propagation Probability2
A Novel Effort Measure Method for Effort-Aware Just-in-Time Software Defect Prediction2
Reverse Engineering of Object Oriented Systems to ALF2
Investigating the Relationship Between Mutants and Real Faults with Respect to Mutated Code2
Predicting Ride Hailing Service Demand Using Autoencoder and Convolutional Neural Network2
Conversion-based Approach to Obtain an SNN Construction2
Memory-Aware Scheduling Parallel Real-Time Tasks for Multicore Systems2
A Proactive Approach to Test Case Selection — An Efficient Implementation of Adaptive Random Testing2
Inconsistency-Tolerant Hierarchical Probabilistic CTL Model Checking: Logical Foundations and Illustrative Examples2
A Context-Aware Architecture for Realizing Business Process Adaptation Strategies Using Fuzzy Planning2
ATLDesigner: ATL Model Checking Using An Attribute Grammar2
Lecture Information Service Based on Multiple Features Fusion2
A Revisit of Metrics for Test Case Prioritization Problems2
An Empirical Study on Bugs in PHP2
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining2
Generating Optimal Class Integration Test Orders Using Genetic Algorithms2
Applying Class Distance to Decide Similarity on Information Models for Automated Data Interoperability2
Search for Compatible Source Code2
Identifying the Optimal Refactoring Dependencies Using Heuristic Search Algorithms to Maximize Maintainability2
Using API Call Sequences for IoT Malware Classification Based on Convolutional Neural Networks2
Supervised Classification of UML Class Diagrams Based on F-KNB2
Agent-Oriented Methodologies Evaluation Frameworks: A Review2
Investigating Different Metrics for Evaluation and Selection of Mutation Operators for Java2
A Literature-Based Thematic Network to Provide a Comprehensive Understanding of Agile Teamwork (106)2
Equivalent Mutants Detection Based on Weighted Software Behavior Graph2
Python Code Smell Refactoring Route Generation Based on Association Rule and Correlation2
Data-Driven Persona Retrospective Based on Persona Significance Index in B-to-B Software Development2
An Extensible Compiler for Implementing Software Design Patterns as Concise Language Constructs2
Automatically Generating Release Notes with Content Classification Models2
Linear Software Models: An Occam’s Razor Set of Algebraic Connectors Integrates Modules into a Whole Software System2
Personalized API Recommendations2
A Hybrid Multiple Models Transfer Approach for Cross-Project Software Defect Prediction1
Enabling Reliability-Driven Optimization Selection with Gate Graph Attention Neural Network1
dSubSign: Classification of Instance-Feature Data Using Discriminative Subgraphs as Class Signatures1
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning1
Editorial: A New Emphasis on Software Engineering and Knowledge Engineering Education1
An Empirical Study on GitHub Sponsor Mechanism1
Mapping Modern JVM Language Code to Analysis-Friendly Graphs: A Study with Kotlin1
An Approach of Automated Anomalous Microservice Ranking in Cloud-Native Environments1
Novel Strategy Generating Variable-Length State Machine Test Paths1
Analyzing the Stationarity Process in Software Effort Estimation Datasets1
Reuse-Based Agile Development Process for Drone Software Systems1
Remaining Activity Sequence Prediction for Ongoing Process Instances1
Scalable Influence Maximization Meets Efficiency and Effectiveness in Large-Scale Social Networks1
Class Change Prediction by Incorporating Community Smell: An Empirical Study1
Matching Logic for Concurrent Programs Based on Rely/Guarantee and Abstract Patterns1
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 250101
Sequence-Aware API Recommendation Based on Collaborative Filtering1
Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints1
SWEBOK Matters: Report and Reflection of a SEKE Panel on the Educational and Professional Implications of SWEBOK1
Clean and Learn: Improving Robustness to Spurious Solutions in API Question Answering1
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine1
Collaborative Inference Acceleration Integrating DNN Partitioning and Task Offloading in Mobile Edge Computing1
Constructing Bug Knowledge Graph as a Service for Bug Search1
FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115)1
Automatic Voter Recommendation Method for Closing Questions in Stack Overflow1
Regular Expression Learning from Positive Examples Based on Integer Programming1
An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network1
ICG: A Machine Learning Benchmark Dataset and Baselines for Inline Code Comments Generation Task1
An Optimal WSN Coverage Based on Adapted Transit Search Algorithm1
SQL#: A Language for Maintainable and Debuggable Database Queries1
Construction and Analysis of Scientific and Technological Personnel Relational Graph for Group Recognition1
Improving Large-Gap Clone Detection Recall Using Multiple Features1
Method for Predicting Mobile Service Evolution from User Reviews and Update Logs1
XL-BPMN Model-Based Service Similarity Measurement Technique1
A New Semantic-based Multi-Level Classification Approach for Activity Recognition Using Smartphones1
A Formal Approach for Consistency Management in UML Models1
MIAR: A Context-Aware Approach for App Review Intention Mining1
Test Oracle Generation Based on BPNN by Using the Values of Variables at Different Breakpoints for Programs1
The Technical Debt Density Over Multiple Releases and the Refactoring Story1
Guest Editor’s Introduction: Software Mathematical Models for Human Understanding1
Automated Priority Prediction for Bug Reports Using Comment Intensiveness Features and SMOTE Data Balancing1
A Unifying Coalgebraic Semantics Framework for Quantum Systems1
A Dynamic Drilling Sampling Method and Evaluation Model for Big Streaming Data1
An Empirical Study on Code Smell Introduction and Removal in Deep Learning Software Projects1
An Ontology-Based Information Extraction System for Residential Land-Use Suitability Analysis1
Three Approaches for Detecting Direct Output Cheating in Program Online Judge Systems1
Impact Analysis About Response Time Considering Deployment Change of SaaS Software1
A Proposed Framework for Student’s Skills-Driven Personalization of Cloud-Based Course Content1
DockerPedia: A Knowledge Graph of Software Images and Their Metadata1
Embodying the Number of an Entity’s Relations for Knowledge Representation Learning1
A Fully Parallel Approach of Model Checking Via Probe Machine1
Parallel Ensemble Matching Based on Subscription Partitioning for Content-Based Publish/Subscribe Systems1
Refactoring Cost Estimation for Architectural Technical Debt1
Modeling and Selecting Frameworks in Terms of Patterns, Tactics and System Qualities1
Global Sensitivity Analysis for Fuzzy RDF Data1
An Approach to Software Defect Prediction Combining Semantic Features and Code Changes1
Dual Channel Among Task and Contribution on OSS Communities: An Empirical Study1
A Comparative Study of Ensemble Techniques Based on Genetic Programming: A Case Study in Semantic Similarity Assessment1
EFSP: An Enhanced Full Scrum Process Model1
Guest Editor’s Introduction1
Identifying Temporal Corpus for Enhanced User Comments Analysis1
DHLBT: Efficient Cross-Modal Hashing Retrieval Method Based on Deep Learning Using Large Batch Training1
A Hierarchical Feature Ensemble Deep Learning Approach for Software Defect Prediction1
Studying the Co-Evolution of Source Code and Acceptance Tests1
Automatic Identification of High-Impact Bug Report by Product and Test Code Quality1
BSR-TC: Adaptively Sampling for Accurate Triangle Counting over Evolving Graph Streams1
Falsification-Aware Semantics for Temporal Logics and Their Inconsistency-Tolerant Subsystems: Theoretical Foundations of Falsification-Aware Model Checking1
Verifiable Model Construction for Business Processes1
Prediction of Regional Commercial Activeness and Entity Condition Based on Online Reviews1
Detecting Compiler Bugs Via a Deep Learning-Based Framework1
Forecasting Stock Index Using a Volume-Aware Positional Attention-Based Recurrent Neural Network1
GASSER: A Multi-Objective Evolutionary Approach for Test Suite Reduction1
An Empirical Study on Rule Violation History of JavaScript Code Blocks on Stack Overflow1
STMultiple: Sparse Transformer Based on RFID for Multi-Object Activity Recognition0
Model-Driven Approach for Making Citizen Science Data FAIR0
The Evolution Mechanism of Correctness for Cyber-Physical System0
Agile Effort Estimation: Comparing the Accuracy and Efficiency of Planning Poker, Bucket System, and Affinity Estimation Methods0
How did COVID-19 Impact Software Design Activities in Global Software Engineering — Systematic Review0
Extension of a Simulation Software to Incorporate Quality-Related Factors in Investigations on Software Engineering Economics0
Enhancing Multi-Behavior Recommendations Through Capturing Dynamic Preferences0
KEMA++: A Full Representative Knowledge-Graph Embedding Model (036)0
Automated Visual Testing of Application User Interfaces Using Static Analysis of Screenshots0
Guest Editors’ Introduction0
The Safety and Performance of Prominent Programming Languages0
Benchmarking Whole Knowledge Graph Embedding Techniques0
TRAFMEL: Multimodal Entity Linking Based on Transformer Reranking and Multimodal Co-Attention Fusion0
Cross-Project Transfer Learning on Lightweight Code Semantic Graphs for Defect Prediction0
Assessing the use of Github Copilot on students of Engineering of Information Systems0
Generation of C++ Code from Isabelle/HOL Specification0
VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications0
Recommending Relevant Tutorial Fragments for API-Related Natural Language Questions0
Enhancing Reusability: An Integrated Framework for Software Requirements Classification and Prioritization0
Methods on Detecting Closely Related Topics and Spatial Events0
ABMMRS Eradicator: Improving Accuracy in Recommending Move Methods for Web-based MVC Projects and Libraries Using Method’s External Dependencies0
Python API Misuse Mining and Classification Based on Hybrid Analysis and Attention Mechanism0
A Dual Decision-Making Continuous Reinforcement Learning Method Based on Sim2Real0
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm0
Towards Exogenous Coordination of Concurrent Cloud Applications0
Flaky Test Detection Based on Adaptive Latest Position Execution for Concurrent Android Applications0
OdegVul: An Approach for Statement-Level Defect Prediction0
Applying Scrum to Knowledge Transfer Among Software Developers0
iMER-FM: Iterative Process of System Feature Model Extraction from the Requirements0
Graph-Based Root Cause Localization in Microservice Systems with Protection Mechanisms0
Authentication and Authorization Management in SOA with the Focus on RESTful Services0
Split Attention Pointer Network for Source Code Language Modeling0
EFSM Model-Based Testing for Android Applications0
Enhancing Code Summarization with Graph Embedding and Pre-Trained Model0
Guest Editor’s Introduction0
An Imperfect Debugging Non-Homogeneous Poisson Process Software Reliability Model Based on a 3-Parameter S-Shaped Function0
OC-Detector: Detecting Smart Contract Vulnerabilities Based on Clustering Opcode Instructions0
Multi-Intent Inline Code Comment Generation via Large Language Model0
From SATD Recognition to an Interpretation Method Based on the Dataset0
DTester: Diversity-Driven Test Case Generation for Web Applications0
Hybrid Model with Multi-Level Code Representation for Multi-Label Code Smell Detection (077)0
Boosting Just-In-Time Code Comment Updating Via Programming Context and Refactor0
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification0
Modeling of Security Fault-Tolerant Requirements for Secure Systems0
A Modeling and Verification Method of Cyber-Physical Systems Based on AADL and Process Algebra0
Robotic Process Automation Efficiency for Mobile App Testing: An Empirical Investigation0
CodeLabeller: A Web-Based Code Annotation Tool for Java Design Patterns and Summaries0
NISe: Non-Invasive Secure Framework for Multi-Access Edge Computing0
Semantic Discovery of Composite GIS Services0
Improving Windows Malware Detection Using the Random Forest Algorithm and Multi-View Analysis0
Automated Test Case Generation for Path Coverage by Using Multi-Objective Particle Swarm Optimization Algorithm with Reinforcement Learning and Relationship Matrix Strategies0
An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction0
Guest Editor’s Introduction0
Author Reputation Measurement on Question and Answer Sites by the Classification of Author-Generated Content0
Identifying High-impact Bug Reports with Imbalance Distribution by Instance Fuzzy Entropy0
Author Index Volume 30 (2020)0
Multi-label Classification of Pure Code0
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment0
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach0
A Dual Relaxation Method for Neural Network Verification0
A Combined Usage of NLP Libraries Towards Analyzing Software Documents0
Guest Editorial Special Issue on Best Papers from SEKE20220
Software Testing Integration-Based Model (I-BM) Framework for Recognizing Measure Fault Output Accuracy Using Machine Learning Approach0
Aligning Software Architecture Training with Software Industry Requirements0
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information0
Software Industry Perception of Technical Debt and Its Management0
An Ensemble Keyword Extraction Model for News Texts with Statistical and Graphical Features0
Which Exceptions Do We Have to Catch in the Python Code for AI Projects?0
An Adaptive Semantic Annotation Tool for Teachers Based on Context-Aware and Internet of Things0
Deep Tasks Summarization for Comprehending Mixed Tasks in a Commit0
GTFP: Network Fault Prediction Based on Graph and Time Series0
Constructing RDF Knowledge Base with Object-Oriented Databases0
Automated Localization Testing of Mobile Applications Method0
Enhancing Answer Selection via Ad-Hoc Knowledge Extraction from Unstructured Web Texts0
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion0
An Extensible Modeling Method Supporting Ontology-Based Scenario Specification and Domain-Specific Extension0
Deep Understanding of Runtime Configuration Intention0
Understanding the Role of Stack Overflow in Supporting Software Development Tasks: A Research Perspective0
CodeGen-Search: A Code Generation Model Incorporating Similar Sample Information0
Guest Editor’s Introduction0
Guest Editor’s Introduction0
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search0
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model0
Exact Learning of Qualitative Constraint Networks from Membership Queries0
Using an Experimental Framework to Support Variables Selection: An Exploratory Study0
A Case Study of Software Project Replacement: A Time Series Analysis0
Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion0
BPMN Data Model for Multi-Perspective Process Mining on Blockchain0
Matching Logic Based on Ownership Transfer0
Sentiment-Time Heterogeneous Residual Graph Attention Transformer for Session-Based Recommendation0
Review and Application of Knowledge Graph in Crisis Management0
Bug Localization with Features Crossing and Structured Semantic Information Matching0
Consistency Checking for Refactoring from Coarse-Grained Locks to Fine-Grained Locks0