1

On the use of information retrieval to automate the detection of third-party java library migration at the method level

PRICE: Detection of Performance Regression Introducing Code Changes Using Static and Dynamic Metrics

Towards Automated Microservices Extraction Using Muti-objective Evolutionary Search

Towards Automated Microservices Extraction Using Muti-objective Evolutionary Search

A study on developer perception of transformation languages for refactoring

An empirical investigation of how and why developers rename identifiers

Automating the detection of third-party Java library migration at the function level.

CATE: concolic Android testing using Java pathfinder for Android applications

Like all software systems, Android applications are not immune to bugs, security vulnerabilities, and a wide range of other runtime errors. Concolic analysis, a hybrid software verification technique which performs symbolic execution along with a …

M-Perm: A Lightweight Detector for Android Permission Gaps

M-perm: A lightweight detector for android permission gaps

Android apps operate under a permissions-based system where access to specific APIs are restricted through the use of permissions. Unfortunately, there is no built-in verification system to ensure that apps do not request too many or too few …