Science of Computer Programming

Papers
(The TQCC of Science of Computer Programming is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Ranking programming languages by energy efficiency50
Predicting issue types on GitHub44
Programming interactions in collective adaptive systems by relying on attribute-based communication27
The MATLAB Toolbox for EnergyPLAN: A tool to extend energy planning studies27
Improving performance with hybrid feature selection and ensemble machine learning techniques for code smell detection26
Predicting software effort from use case points: A systematic review23
Unifying semantic foundations for automated verification tools in Isabelle/UTP19
RML: Theory and practice of a domain specific language for runtime verification18
Improving software effort estimation using bio-inspired algorithms to select relevant features: An empirical study18
Formal verification of input-output mappings of tree ensembles16
Understanding stack overflow code quality: A recommendation of caution16
Umple: Model-driven development for open source and education16
Beyond connected cars: A systems of systems perspective16
Examining the performance of kernel methods for software defect prediction based on support vector machine16
Safe automated refactoring for intelligent parallelization of Java 8 streams15
A review of code reviewer recommendation studies: Challenges and future directions13
Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial odes11
Abstracting gradual references11
Statically identifying XSS using deep learning10
EMIP: The eye movements in programming dataset10
QaSD: A Quality-aware Strategic Dashboard for supporting decision makers in Agile Software Development10
Locally weighted regression with different kernel smoothers for software effort estimation10
On the usage of JavaScript, Python and Ruby packages in Docker Hub images10
CHOReVOLUTION: Service choreography in practice10
Automated evolution of feature logging statement levels using Git histories and degree of interest9
Quantifying the interpretation overhead of Python9
SATDBailiff-mining and tracking self-admitted technical debt9
Verified synthesis of optimal safety controllers for human-robot collaboration9
Efficient testing of GUI applications by event sequence reduction9
Test case prioritization with neuron valuation based pattern9
Several lifted abstract domains for static analysis of numerical program families9
Measurement of key performance indicators of user experience based on software requirements9
A framework for verifying deadlock and nondeterminism in UML activity diagrams based on CSP9
Toward safe and efficient reconfiguration with Concerto8
Experiences on teaching alloy with an automated assessment platform8
Impacts of software community patterns on process and product: An empirical study8
A formal, scalable approach to semantic interoperability8
Evaluating the impact of feature selection consistency in software prediction8
Formally verifying consistency of sequence diagrams for safety critical systems8
Are you of value to me? A partner selection reference method for software ecosystem orchestrators8
API recommendation for the development of Android App features based on the knowledge mined from App stores8
Mutating code annotations: An empirical evaluation on Java and C# programs8
Prioritizing versions for performance regression testing: The Pharo case7
Sustaining and improving graduated graph consistency: A static analysis of graph transformations7
Programming language foundations in Agda6
HBSniff: A static analysis tool for Java Hibernate object-relational mapping code smell detection6
A fairness-based refinement strategy to transform liveness properties in Event-B models6
EUD-MARS: End-user development of model-driven adaptive robotics software systems6
Automated test generation for IEC 61131-3 ST programs via dynamic symbolic execution6
: A tool chain for choreographic design6
Contract Automata Library6
Safety assurance of an industrial robotic control system using hardware/software co-verification6
Provably correct implementation of the AbC calculus6
Adaptive selection of classifiers for bug prediction: A large-scale empirical analysis of its performances and a benchmark study5
Reversing an imperative concurrent programming language5
A debugging approach for live Big Data applications5
The orchestrator's partner management framework for software ecosystems5
Improving the success rate of applying the extract method refactoring5
Formal verification of IoT applications using rewriting logic: An MDE-based approach5
On the verification of mission-related properties in software-intensive systems-of-systems architectural design5
Model checking safety and liveness via k-induction and witness refinement with constraint generation5
Fast rule-based graph programs5
A domain-specific language for verifying software requirement constraints4
NOD4J: Near-omniscient debugging tool for Java using size-limited execution trace4
Are requirements elicitation sessions influenced by participants' gender? An empirical experiment4
A new modular implementation for stateful traits4
The ABS simulator toolchain4
Decoding techniques applied to the compilation of CNOT circuits for NISQ architectures4
Cost-effective simulation-based test selection in self-driving cars software4
Modelling digital avatars: A tuple space approach4
Ready, set, Go!4
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging4
Modelling and verifying BDI agents with bigraphs4
Quantifying the similarity of non-bisimilar labelled transition systems4
A decentralized analysis of multiparty protocols4
KinZ an Azure Kinect toolkit for Python and Matlab4
Trace semantics and refinement patterns for real-time properties in event-B models4
Synthesizing and optimizing FDIR recovery strategies from fault trees4
The prevalence and severity of persistent ambiguity in software requirements specifications: Is a special effort needed to find them?3
Qualification of proof assistants, checkers, and generators: Where are we and what next?3
Applying the Isabelle Insider framework to airplane security3
Lost in zero space – An empirical comparison of 0.y.z releases in software package distributions3
Deductive verification of active objects with Crowbar3
A polymorphic RPC calculus3
How to benefit from newbies' domain ignorance in software development projects3
Aggregate centrality measures for IoT-based coordination3
Multi-task Ada code generation from synchronous dataflow programs on multi-core: Approach and industrial study3
Reuse estimate and interval prediction using MOGA-NN and RBF-NN in the functional paradigm3
Automated model extraction: From non-deterministic C code to active objects3
On the value of project productivity for early effort estimation3
A nearest-neighbor divide-and-conquer approach for adaptive random testing3
Service-oriented decomposition and verification of hybrid system models using feature models and contracts3
Which monads Haskell developers use: An exploratory study3
Synthesizing safe policies under probabilistic constraints with reinforcement learning and Bayesian model checking3
Probabilistic model checking for human activity recognition in medical serious games3
SWQL: A new domain-specific language for mining the social Web3
Log analysis and system monitoring with nfer3
A clock-based dynamic logic for schedulability analysis of CCSL specifications3
Using word embedding and convolution neural network for bug triaging by considering design flaws3
Hermes: A reversible language for lightweight encryption3
A type-directed algorithm to generate random well-typed Java 8 programs3
Candidate test set reduction for adaptive random testing: An overheads reduction technique3
Time-symmetric Turing machines for computable involutions3
Topological consistency preservation with graph transformation schemes3
Specify and measure, cover and reveal: A unified framework for automated test generation3
Formal security analysis for software architecture design: An expressive framework to emerging architectural styles3
State identification for labeled transition systems with inputs and outputs3
0.026053905487061