default search action
27th EASE 2023: Oulu, Finland
- Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, EASE 2023, Oulu, Finland, June 14-16, 2023. ACM 2023
Keynote
- Sigrid Eldh
:
From Data Analysis to Human Input: Navigating the Complexity of Software Evaluation and Assessment. 1
Research Track
- Carl Smestad
, Jingyue Li
:
A Systematic Literature Review on Client Selection in Federated Learning. 2-11 - Christoph Matthies
, Robert Heinrich
, Rebekka Wohlrab
:
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects. 12-21 - Francesca Arcelli Fontana
, Matteo Camilli
, Davide Rendina
, Andrei Gabriel Taraboi
, Catia Trubiani
:
Impact of Architectural Smells on Software Performance: an Exploratory Study. 22-31 - Firas Bayram
, Bestoun S. Ahmed
, Erik Hallin
, Anton Engman
:
DQSOps: Data Quality Scoring Operations Framework for Data-Driven Applications. 32-41 - Ruiyin Li
, Peng Liang
, Paris Avgeriou
:
Code Reviewer Recommendation for Architecture Violations: An Exploratory Study. 42-51 - Daniel Gaspar-Figueiredo
, Silvia Abrahão
, Emilio Insfrán
, Jean Vanderdonckt
:
Measuring User Experience of Adaptive User Interfaces using EEG: A Replication Study. 52-61 - Mamia Agbese
, Rahul Mohanani
, Arif Ali Khan
, Pekka Abrahamsson
:
Implementing AI Ethics: Making Sense of the Ethical Requirements. 62-71 - Linus Wagner
, Maximilian Mayer
, Andrea Marino
, Alireza Soldani Nezhad
, Hugo Zwaan
, Ivano Malavolta
:
On the Energy Consumption and Performance of WebAssembly Binaries across Programming Languages and Runtimes in IoT. 72-82 - Anzhela Sukhanova
, Valentyn Sobol
:
HornFuzz: Fuzzing CHC solvers. 83-92 - Luigi Lavazza
, Sandro Morasca
, Gabriele Rotoloni
:
On the Reliability of the Area Under the ROC Curve in Empirical Software Engineering. 93-100 - Danilo Monteiro Ribeiro
, Rayfran Rocha Lima
, César França
, Alberto Luiz Oliveira Tavares de Souza, Isadora Silva
, Gustavo H. L. Pinto
:
Understanding Self-Efficacy in Software Engineering Industry: An Interview study. 101-110 - Noric Couderc
, Christoph Reichenbach
, Emma Söderberg
:
Classification-based Static Collection Selection for Java: Effectiveness and Adaptability. 111-120 - Sk Golam Saroar
, Maleknaz Nayebi
:
Developers' Perception of GitHub Actions: A Survey Analysis. 121-130 - Luciano Marchezan
, Wesley K. G. Assunção
, Gabriela Karoline Michelon
, Alexander Egyed
:
Do Developers Benefit from Recommendations when Repairing Inconsistent Design Models? a Controlled Experiment. 131-140 - Ali Ouni
, Islem Saidani
, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer
:
An Empirical Study on Continuous Integration Trends, Topics and Challenges in Stack Overflow. 141-151 - Wellington Oliveira
, Bernardo Moraes
, Fernando Castor
, João Paulo Fernandes
:
Analyzing the Resource Usage Overhead of Mobile App Development Frameworks. 152-161 - Çagri Eren, Kerem Sahin
, Eray Tüzün
:
Analyzing Bug Life Cycles to Derive Practical Insights. 162-171
Industry Track
- Huseyin Dursun
:
Full Spec Software via Platform Engineering: Transition from Bolting-on to Building-in. 172-175 - Siwei Wang
, Xue Mao
, Ziguang Cao
, Yujun Gao
, Qucheng Shen
, Chao Peng
:
NxtUnit: Automated Unit Test Generation for Go. 176-179 - Zaki Pauzi
, Rajvir Thind
, Andrea Capiluppi
:
Artifact Traceability in DevOps: An Industrial Experience Report. 180-183 - Benedikt Dornauer
, Michael Felderer
, Johannes Weinzerl
, Mircea-Cristian Racasan
, Martin Hess
:
SoHist: A Tool for Managing Technical Debt through Retro Perspective Code Analysis. 184-187 - Farid Bagirov
, Pouria Derakhshanfar
, Alexey Kalina
, Elena Kartysheva
, Vladimir Kovalenko
:
Assessing the Impact of File Ordering Strategies on Code Review Process. 188-191 - Pawan Kumar Sarika
, Deepika Badampudi
, Sai Prashanth Josyula
, Muhammad Usman
:
Automating Microservices Test Failure Analysis using Kubernetes Cluster Logs. 192-195 - Sofia Reis
, Rui Abreu
, Corina S. Pasareanu
:
Are security commit messages informative? Not enough! 196-199 - Thomas Fehlmann
, Andrea Gelli
:
Functional Size Measurement in Agile Development: Velocity in Agile Sprints. 200-204
Short Papers and Posters
- Dag I. K. Sjøberg
, Gunnar R. Bergersen
:
Improving the Reporting of Threats to Construct Validity. 205-209 - Marcel Valový
:
Psychological Aspects of Pair Programming: A Mixed-methods Experimental Study. 210-216 - Bastin Tony Roy Savarimuthu
, Zoofishan Zareen
, Jithin Cheriyan
, Muhammad Yasir
, Matthias Galster
:
Barriers for Social Inclusion in Online Software Engineering Communities - A Study of Offensive Language Use in Gitter Projects. 217-222 - Minshun Yang
, Seiji Sato
, Hironori Washizaki
, Yoshiaki Fukazawa
, Juichi Takahashi
:
Identifying Characteristics of the Agile Development Process That Impact User Satisfaction. 223-228 - Anh Ho
, Anh M. T. Bui
, Phuong T. Nguyen
, Amleto Di Salle
:
Fusion of deep convolutional and LSTM recurrent neural networks for automated detection of code smells. 229-234 - Sien Reeve Ordonez Peralta
, Hironori Washizaki
, Yoshiaki Fukazawa
, Yuki Noyori
, Shuhei Nojiri
, Hideyuki Kanuka
:
Analysis of Bug Report Qualities with Fixing Time using a Bayesian Network. 235-240 - Sébastien Bertrand
, Silvia Ciappelloni
, Pierre-Alexandre Favier
, Jean-Marc André
:
Replication and Extension of Schnappinger's Study on Human-level Ordinal Maintainability Prediction Based on Static Code Metrics. 241-246 - Judith Perera
, Ewan D. Tempero
, Yu-Cheng Tu
, Kelly Blincoe
:
Understanding the relationship between Technical Debt, New Code Cost and Rework Cost in Open-Source Software Projects: An Empirical Study. 247-252 - Matús Sulír
, Sergej Chodarev
, Milan Nosál
:
Outside the Sandbox: A Study of Input/Output Methods in Java. 253-258 - Teerath Das
, Adam Ali
, Tommi Mikkonen
:
Investigation of Security-related Commits in Android Apps. 259-260 - Md. Masudur Rahman
, Toukir Ahammed
, Md. Mahbubul Alam Joarder
, Kazi Sakib
:
Does Code Smell Frequency Have a Relationship with Fault-proneness? 261-262 - Sajid Ibrahim Hashmi
, Jouni Markkula
:
Team Composition in Software Engineering Education. 263-264 - Jorge Martins
, Ibéria Medeiros
, Bernardo Ferreira
:
Code Privacy in Detection of Web Vulnerabilities. 265-266
Vision and Emerging Results
- Thu Thu Ha Doan
, Phuong T. Nguyen
, Juri Di Rocco
, Davide Di Ruscio
:
Too long; didn't read: Automatic summarization of GitHub README.MD with Transformers. 267-272 - Sam Attwood
, Ashley Williams
:
Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK). 273-278 - Aakash Ahmad
, Muhammad Waseem
, Peng Liang
, Mahdi Fahmideh
, Mst Shamima Aktar
, Tommi Mikkonen
:
Towards Human-Bot Collaborative Software Architecting with ChatGPT. 279-285
Doctoral Symposium
- Delfina Ramos-Vidal
:
Reengineering legacy document information systems: Challenges and solutions. 286-291 - Samson Ogheneovo Oruma
:
Towards a User-centred Security Framework for Social Robots in Public Spaces. 292-297 - Afsarah Jahin
:
Investigating the Relation between Requirements Framing and Confirmation Bias in Testing. 298-303 - Muhammad Hamza
:
Software Architecture Design of a Serverless System. 304-306 - Adriano Gomes
:
Effective Agile Contracts Framework for Software Innovation Projects. 307-312 - Alexandros Tsakpinis
:
Analyzing Maintenance Activities of Software Libraries. 313-318 - Tjasa Hericko
:
Automatic Data-Driven Software Change Identification via Code Representation Learning. 319-323
Tutorials
- Thomas Fehlmann
, Andrea Gelli
:
Functional Size Measurement in Agile Development: Velocity in Agile Sprints. 324-325 - Mamia Agbese
, Rahul Mohanani
, Arif Ali Khan
, Pekka Abrahamsson
:
Ethical Requirements Stack: A framework for implementing ethical requirements of AI in software engineering practices. 326-328
EASIER
- Hannah Deters
, Jakob Droste
, Kurt Schneider
:
A Means to what End? Evaluating the Explainability of Software Systems using Goal-Oriented Heuristics. 329-338 - Marian Daun
, Jennifer Brings
:
Aggregating N-fold Requirements Inspection Results. 339-347 - Xingru Chen
, Muhammad Usman
, Deepika Badampudi
:
Using InnerSource for Improving Internal Reuse: An Industrial Case Study. 348-357 - Vita Santa Barletta
, Danilo Caivano
, Domenico Gigante
, Azzurra Ragone
:
A Rapid Review of Responsible AI frameworks: How to guide the development of ethical AI. 358-367 - Markus Borg
, Adam Tornhill
, Enys Mones
:
U Owns the Code That Changes and How Marginal Owners Resolve Issues Slower in Low-Quality Source Code. 368-377
4th Blockchain Software Engineering Workshop
- Felix Monteiro
, Miguel Correia
:
Decentralised Autonomous Organisations for Public Procurement. 378-385 - Huikun Liu
, Yanze Wang
, Zhaowei Jiang
, He Zhang
, Jingyue Li
, Sigurd Eileras
, Haakon Pelsholen Busterud
:
Perceived Trust in Blockchain Systems: An Interview-based Survey. 386-393
DevOps Quality Management Workshop 2023
- Maira Khanam
, Saima Rafi
, Muhammad Azeem Akbar
:
Understandings of Ethics in DevOps Teams: A Preliminary Investigation. 394-397 - Yasir Hussain
, Zhiqiu Huang
, Yu Zhou
, Izhar Ahmed Khan
, Nasrullah Khan
, Muhammad Zahid Abbas
:
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study. 398-405 - Ramya Sri Simhadri
, Mohammad Shameem
:
Challenges in Requirements Gathering for Agile Software Development. 406-413 - Muhammad Waqas Qaisar
, Mujtaba Hassan
, Muhammad Tanveer Riaz
, Muhammad Shahid
, Ahmad Abdul Ghani
, Muhammad Abbas Khan
, Kashif Hussain
:
Comparative Analysis of Fuzzy and Neural Controller for a Boost Converter. 414-422 - Sidra Ramzan
, Saif Ur Rehman Khan
, Shahid Hussain
, Wen-Li Wang
, Mei-Huei Tang
:
Identification of Influential Factors for Successful Adoption of DevOps and Cloud. 423-429 - Syed Muhammad Faaiz
, Saif Ur Rehman Khan
, Shahid Hussain
, Wen-Li Wang
, Naseem Ibrahim
:
A Study on Management Challenges and Practices in DevOps. 430-437 - Ankur Kumar, Mohammad Nadeem, Mohammad Shameem:
Prioritization of DevOps Maturity models using Fuzzy TOPSIS. 438-443 - Asma Shamshad
, Muhammad Tanveer Riaz
, Ali Raza
, Muhammad Abbas Khan
:
An Intelligent Automation of Power Transformer using PLC and SCADA at Substation. 444-449
LEARNER 2023 Workshop
- Gilda Manfredi
, Ugo Erra
, Gabriele Gilio
:
A Mixed Reality Approach for Innovative Pair Programming Education with a Conversational AI Virtual Avatar. 450-454 - Felix Cammaerts
, Monique Snoeck
, Ana C. R. Paiva
:
Collecting cognitive strategies applied by students during test case design. 455-459 - Giacomo Garaccione
, Riccardo Coppola
, Luca Ardito
, Marco Torchiano
:
Gamification of Business Process Modeling Notation education: an experience report. 460-464 - Sabato Nocera
, Rita Francese
, Giuseppe Scanniello
:
Training Bachelor Students to Design Better Quality Web Apps: Preliminary Results from a Prospective Empirical Investigation. 465-469 - Marian Daun
, Jennifer Brings
:
Investigating Factors Influencing Students' Assessment of Conceptual Models. 470-474 - Marius Mikalsen
, Torgeir Dingsøyr
:
Feedback as a process in a large semi-capstone software engineering course. 475-479
The 3rd International Workshop on Secure Software: Challenges, Opportunities and Lessons Learned.
- Muhammad Mustafa Qureshi
, Muhammad Tanveer Riaz
, Saba Waseem
, Muhammad Abbas Khan
, Sidra Riaz
:
The Advancements in 6G Technology based on its Applications, Research Challenges and Problems: A Review. 480-486 - Azzah A. Alghamdi
, Mahmood Niazi
:
Toward Successful Secure Software Deployment: An Empirical Study. 487-492 - Dorieh M. Alomari
, Fatima M. Anis
, Maryam Alabdullatif
, Hamoud Aljamaan
:
A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models. 493-498 - Norah Alsunaidi
, Sara Aljbali
, Yasmin Yasin
, Hamoud Aljamaan
:
Arabic Cyberbullying Detection Using Machine Learning: State of the Art Survey. 499-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.