4.9(top 5%)
impact factor
763(top 20%)
papers
34.6K(top 10%)
citations
91(top 5%)
h-index
5.0(top 5%)
impact factor
1.0K
all documents
37.8K
doc citations
160(top 5%)
g-index

Top Articles

#TitleJournalYearCitations
1Two case studies of open source software developmentACM Transactions on Software Engineering and Methodology20021,249
2Developing multiagent systemsACM Transactions on Software Engineering and Methodology2003944
3A formal basis for architectural connectionACM Transactions on Software Engineering and Methodology1997912
4AlloyACM Transactions on Software Engineering and Methodology2002835
5The STATEMATE semantics of statechartsACM Transactions on Software Engineering and Methodology1996778
6Discovering models of software processes from event-based dataACM Transactions on Software Engineering and Methodology1998716
7A safe, efficient regression test selection techniqueACM Transactions on Software Engineering and Methodology1997570
8A methodology for controlling the size of a test suiteACM Transactions on Software Engineering and Methodology1993539
9Four dark corners of requirements engineeringACM Transactions on Software Engineering and Methodology1997528
10An experimental determination of sufficient mutant operatorsACM Transactions on Software Engineering and Methodology1996507
11Automated consistency checking of requirements specificationsACM Transactions on Software Engineering and Methodology1996448
12The design and implementation of hierarchical software systems with reusable componentsACM Transactions on Software Engineering and Methodology1992429
13Protecting privacy using the decentralized label modelACM Transactions on Software Engineering and Methodology2000396
14Model driven securityACM Transactions on Software Engineering and Methodology2006392
15Specification matching of software componentsACM Transactions on Software Engineering and Methodology1997387
16A model for spectra-based software diagnosisACM Transactions on Software Engineering and Methodology2011377
17Runtime Verification for LTL and TLTLACM Transactions on Software Engineering and Methodology2011365
18Parameterized object sensitivity for points-to analysis for JavaACM Transactions on Software Engineering and Methodology2005345
19Investigations of the software testing coupling effectACM Transactions on Software Engineering and Methodology1992275
20Recovering traceability links in software artifact management systems using information retrieval methodsACM Transactions on Software Engineering and Methodology2007269
21The chaining approach for software test data generationACM Transactions on Software Engineering and Methodology1996265
22The ASTOOT approach to testing object-oriented programsACM Transactions on Software Engineering and Methodology1994259
23An empirical study of regression test selection techniquesACM Transactions on Software Engineering and Methodology2001253
24A theoretical analysis of the risk evaluation formulas for spectrum-based fault localizationACM Transactions on Software Engineering and Methodology2013253
25Modeling software architectures in the Unified Modeling LanguageACM Transactions on Software Engineering and Methodology2002249
26Law-governed interactionACM Transactions on Software Engineering and Methodology2000232
27Signature matchingACM Transactions on Software Engineering and Methodology1995226
28Reducing the effort of bug report triageACM Transactions on Software Engineering and Methodology2011226
29UML-BACM Transactions on Software Engineering and Methodology2006219
30A meta-environment for generating programming environmentsACM Transactions on Software Engineering and Methodology1993215
31Software process validationACM Transactions on Software Engineering and Methodology1999208
32Some Code Smells Have a Significant but Small Effect on FaultsACM Transactions on Software Engineering and Methodology2014208
33LIMEACM Transactions on Software Engineering and Methodology2006206
34ViewsACM Transactions on Software Engineering and Methodology2013202
35Mixin layersACM Transactions on Software Engineering and Methodology2002197
36Many-Objective Software Remodularization Using NSGA-IIIACM Transactions on Software Engineering and Methodology2015197
37Designing data marts for data warehousesACM Transactions on Software Engineering and Methodology2001196
38Formalizing style to understand descriptions of software architectureACM Transactions on Software Engineering and Methodology1995192
39Programming pervasive and mobile computing applicationsACM Transactions on Software Engineering and Methodology2009180
40Toward an engineering discipline for grammarwareACM Transactions on Software Engineering and Methodology2005177
41A revisit of fault class hierarchies in general boolean specificationsACM Transactions on Software Engineering and Methodology2011167
42From business process models to process-oriented software systemsACM Transactions on Software Engineering and Methodology2009164
43Conjunction as compositionACM Transactions on Software Engineering and Methodology1993160
44A Large-Scale Evaluation of Automated Unit Test Generation Using EvoSuiteACM Transactions on Software Engineering and Methodology2014157
45Symbolic model checking of UML activity diagramsACM Transactions on Software Engineering and Methodology2006156
46An Empirical Study on Learning Bug-Fixing Patches in the Wild via Neural Machine TranslationACM Transactions on Software Engineering and Methodology2019151
47Power laws in softwareACM Transactions on Software Engineering and Methodology2008149
48Reasoning about inconsistencies in natural language requirementsACM Transactions on Software Engineering and Methodology2005146
49Representing concerns in source codeACM Transactions on Software Engineering and Methodology2007143
50Automated assistance for program restructuringACM Transactions on Software Engineering and Methodology1993142