default search action
18th ENASE 2023: Prague, Czech Republic
- Hermann Kaindl, Mike Mannion, Leszek A. Maciaszek:
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2023, Prague, Czech Republic, April 24-25, 2023. SCITEPRESS 2023, ISBN 978-989-758-647-7
Invited Speakers
- Barbara Weber:
Leveraging Digital Trace Data to Investigate and Support Human-Centered Work Processes. ENASE 2023: 5 - Letizia Jaccheri:
On the Relation Between Gender and Software Engineering. ENASE 2023: 7 - Robert Winter:
Enterprise-Level IS Research: Challenges and Potentials of Looking Beyond Enterprise Solutions. ENASE 2023: 9
Papers
- Alberto García S., Mireia Costa, Ana León, José F. Reyes, Oscar Pastor:
Human-Centered Design for the Efficient Management of Smart Genomic Information. 15-26 - Zarrin Tasnim Sworna, Anjitha Sreekumar, Chadni Islam, Muhammad Ali Babar:
Security Tools' API Recommendation Using Machine Learning. 27-38 - Devi Karolita, John Grundy, Tanjila Kanij, Humphrey O. Obie, Jennifer McIntosh:
What's in a Persona? A Preliminary Taxonomy from Persona Use in Requirements Engineering. 39-51 - Zakaria Maamar, Amel Benna, Nabil Otsmane:
Time-Constrained, Event-Driven Coordination of Composite Resources' Consumption Flows. 52-63 - Nils Baumgartner, Firas Adleh, Elke Pulvermüller:
Live Code Smell Detection of Data Clumps in an Integrated Development Environment. 64-76 - Laura Troost, Jonathan Neugebauer, Herbert Kuchen:
Visualizing Dynamic Data-Flow Analysis of Object-Oriented Programs Based on the Language Server Protocol. 77-88 - Hina Saeeda, Muhammad Ovais Ahmad, Tomas Gustavsson:
Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory Study. 89-101 - Kazunori Someya, Toshiaki Aoki, Naoki Ishihama:
Compaction of Spacecraft Operational Models with Metamodeling Domain Knowledge. 102-113 - Adam Roman, Rafal Brozek, Jaroslaw Hryszko:
Predictive Power of Two Data Flow Metrics in Software Defect Prediction. 114-125 - Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora, John Grundy, Muneera Bano:
Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical Study. 126-137 - Najla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani:
Toward a Deep Contextual Product Recommendation for SO-DSPL Framework. 138-148 - Suravi Akhter, Afia Sajeeda, Ahmedul Kabir:
A Distance-Based Feature Selection Approach for Software Anomaly Detection. 149-157 - Dasa Kusniráková, Barbora Buhnova:
Rethinking Certification for Higher Trust and Ethical Safeguarding of Autonomous Systems. 158-169 - Benjamin Nast, Kurt Sandkuhl:
Methods for Model-Driven Development of IoT Applications: Requirements from Industrial Practice. 170-181 - Nicola Boffoli, Pasquale Ardimento, Alessandro Nicola Rana:
Managing Domain Analysis in Software Product Lines with Decision Tables: An Approach for Decision Representation, Anomaly Detection and Resolution. 182-192 - Suyash Shukla, Sandeep Kumar:
Towards Automated Prediction of Software Bugs from Textual Description. 193-201 - Fabian Stieler, Bernhard Bauer:
Git Workflow for Active Learning: A Development Methodology Proposal for Data-Centric AI Projects. 202-213 - David Kuhlen, Andreas Speck:
Improved Business Analysis by Using 3D Models. 214-225 - Abir Nacef, Sahbi Bahroun, Adel Khalfallah, Samir Ben Ahmed:
Features and Supervised Machine Learning Based Method for Singleton Design Pattern Variants Detection. 226-237 - Koen Kraaijveld, Claudia Raibulet:
ASMS: A Metrics Suite to Measure Adaptive Strategies of Self-Adaptive Systems. 238-249 - Kento Tanaka, Toshiaki Aoki, Tatsuji Kawai, Takashi Tomita, Daisuke Kawakami, Nobuo Chida:
Specification Based Testing of Object Detection for Automated Driving Systems via BBSL. 250-261 - Manuela Andreea Petrescu, Simona Motogna:
A Perspective from Large vs Small Companies Adoption of Agile Methodologies. 265-272 - Hiromasa Ito, Yutaka Matsubara, Hiroaki Takada:
Schfuzz: Detecting Concurrency Bugs with Feedback-Guided Fuzzing. 273-282 - Jinquan Zhang, Pei Wang, Dinghao Wu:
LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library. 283-292 - Muhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu:
An Empirical Evaluation of System-Level Test Effectiveness for Safety-Critical Software. 293-305 - Sangharatna Godboley:
VeriCombTest: Automated Test Case Generation Technique Using a Combination of Verification and Combinatorial Testing. 306-313 - Sangharatna Godboley, Monika Rani Golla, Sindhu Nenavath:
Carbon-Box Testing. 314-321 - Baocheng Wang, Shiping Chen, Qin Wang:
Evaluation of Contemporary Smart Contract Analysis Tools. 322-329 - José Miguel Blanco, Bruno Rossi:
Multi-Step Reasoning for IoT Devices. 330-337 - Natalia Kushik, Nina Yevtushenko:
Studying Synchronization Issues for Extended Automata. 338-345 - Sangharatna Godboley, P. Radha Krishna:
SmartMuVerf: A Mutant Verifier for Smart Contracts. 346-353 - Abir Nacef, Sahbi Bahroun, Adel Khalfallah, Samir Ben Ahmed:
Supervised Machine Learning for Recovering Implicit Implementation of Singleton Design Pattern. 354-361 - Jan Werth, Nabil El Ioini, Mohammad Hajian Berenjestanaki, Hamid R. Barzegar, Claus Pahl:
A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain Trilemma. 362-371 - Ines Meriah, Latifa Ben Arfa Rabai, Ridha Khédri:
An OWL Multi-Dimensional Information Security Ontology. 372-380 - Ivan Simon, Sherif Haggag, Hussein Haggag:
A Step to Achieve Personalized Human Centric Privacy Policy Summary. 381-395 - Sanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni:
Software Engineering Comments Sentiment Analysis Using LSTM with Various Padding Sizes. 396-403 - Theo Theunissen, Stijn Hoppenbrouwers, Sietse Overbeek:
Evaluation of Approaches for Documentation in Continuous Software Development. 404-411 - Hendrik Winkelmann, Herbert Kuchen:
Constraint-Logic Object-Oriented Programming with Free Arrays of Reference-Typed Elements via Symbolic Aliasing. 412-419 - Jens Van der Plas, Jens Nicolay, Wolfgang De Meuter, Coen De Roover:
MODINF: Exploiting Reified Computational Dependencies for Information Flow Analysis. 420-427 - Cyrine Feres, Sonia Ayachi Ghannouchi, Ricardo Martinho:
Mapping Process Mining Techniques to Agile Software Development Perspectives. 428-435 - Virginia Niculescu, Horea-Adrian Grebla, Adrian Sterca, Darius Bufnea:
Efficient Academic Retrieval System Based on Aggregated Sources. 436-443 - Mayssa Trabelsi, Nadjib Mohamed Mehdi Bendaoud, Samir Ben Ahmed:
A Dynamic Service Placement in Fog Infrastructure. 444-452 - Sanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni:
Empirical Analysis for Investigating the Effect of Machine Learning Techniques on Malware Prediction. 453-460 - Daniel Atzberger, Tim Cech, Willy Scheibel, Rico Richter, Jürgen Döllner:
Detecting Outliers in CI/CD Pipeline Logs Using Latent Dirichlet Allocation. 461-468 - Rusen Halepmollasi, Khadija Hanifi, Ramin Fadaei Fouladi, Ayse Tosun:
A Comparison of Source Code Representation Methods to Predict Vulnerability Inducing Code Changes. 469-478 - Khadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag:
Software Vulnerability Prediction Knowledge Transferring Between Programming Languages. 479-486 - Lorenzo Capra, Michael Köhler-Bussmeier:
Modelling Adaptive Systems with Nets-Within-Nets in Maude. 487-496 - Advaita Datar, Amey Zare, R. Venkatesh, Asia A:
Towards Synthesis of Code for Calculations Using Their Specifications. 497-504 - Radu-Iulian Gheorghica:
A Study on Hybrid Classical: Quantum Computing Instructions for a Fragment of the QuickSI Algorithm for Subgraph Isomorphism. 505-512 - Paolo Ciancarini, Mirko Farina, Artem V. Kruglov, Giancarlo Succi, Ananga Thapaliya:
A Reflection on the Use of Systemic Thinking in Software Development. 521-529 - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, Claude Godart:
Clouds Coalition Detection for Business Processes Outsourcing. 530-537 - Zaki Pauzi, Andrea Capiluppi:
From Descriptive to Predictive: Forecasting Emerging Research Areas in Software Traceability Using NLP from Systematic Studies. 538-545 - Andrea Biaggi, Umberto Azadi, Francesca Arcelli Fontana:
A New Approach for Software Quality Assessment Based on Automated Code Anomalies Detection. 546-553 - Mahmudul Islam, Farhan Khan, Mehedi Hasan, Farzana Sadia, Mahady Hasan:
Impact of COVID-19 on the Factors Influencing on-Time Software Project Delivery: An Empirical Study. 554-561 - Bartosz Dobrzynski, Janusz Sosnowski:
Text Mining Studies of Software Repository Contents. 562-569 - Reuben Brown, Des Greer:
Software Code Smells and Defects: An Empirical Investigation. 570-580 - Deepika Prakash, Naveen Prakash:
A Goal-Oriented Requirements Engineering Approach for IoT Applications. 581-588 - Anton V. Konygin, Andrey V. Kopnin, Ilya P. Mezentsev, Alexandr A. Pankratov:
Using Bigrams to Detect Leaked Secrets in Source Code. 589-596 - Ana Carolina Moises de Souza, Daniela S. Cruzes, Letizia Jaccheri:
Sustainability-Driven Meetings as a Way to Incorporate Sustainability into Software Development Phases. 597-604 - Ben Joseph Philip, Yasmeen Anjeer Alshehhi, Mohamed Abdelrazek, Scott Barnett, Alessio Bonti, John Grundy:
mHealthSwarm: A Unified Platform for mHealth Applications. 605-612 - Evgenii M. Vinarskii, Natalia Kushik, Nina Yevtushenko, Jorge López, Djamal Zeghlache:
Timed Transition Tour for Race Detection in Distributed Systems. 613-620 - Olaf Flak:
Ontology of Online Management Tools Aimed at Artificial Management Implementation: An Example of Use in Software Design. 621-628 - Danish Iqbal, Barbora Buhnova, Emilia Cioroaica:
Digital Twins for Trust Building in Autonomous Drones Through Dynamic Safety Evaluation. 629-639 - Mubin Ul Haque, Muhammad Ali Babar:
A Study on Early & Non-Intrusive Security Assessment for Container Images. 640-647 - Aman Swaraj, Sandeep Kumar:
Programming Language Identification in Stack Overflow Post Snippets with Regex Based Tf-Idf Vectorization over ANN. 648-655 - Razan Abualsaud, Hanh Nhi Tran, Ileana Ober, Minh Khoi Nguyen:
Toward a Goal-Oriented Methodology for Artifact-Centric Process Modeling. 656-663 - Olga Siedlecka-Lamch, Sabina Szymoniak:
Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits. 664-671 - Bethaina Touijer:
Toward a Modeling Language Prototype for Modeling the Behavior of Wireless Body Area Networks Communication Protocols. 672-675 - Iuliana Marin, Hanoosh Amel:
Web Platform for Job Recommendation Based on Machine Learning. 676-683 - Ayodeji Ladeinde, Chetan Arora, Hourieh Khalajzadeh, Tanjila Kanij, John Grundy:
Extracting Queryable Knowledge Graphs from User Stories: An Empirical Evaluation. 684-692 - Asif Imran:
Investigate How Developers and Managers View Security Design in Software. 693-700 - Dylan Clements, Elysia Giannis, Fiona Crowe, Mike Balapitiya, Jason Marshall, Paul Papadopoulos, Tanjila Kanij:
An Innovative Approach to Develop Persona from Application Reviews. ENASE 2023: 701-708 - Necmettin Ozkan, Sevval Bal, Mehmet Sahin Gök:
Various Shades of Teaching Agile. 709-717 - Vitaly Romanov, Gcinizwe Dlamini, Aidar Valeev, Vladimir Ivanov:
Leveraging Transformer and Graph Neural Networks for Variable Misuse Detection. 727-733 - Anna Derezinska, Olgierd Sobieraj:
Enhancing Unit Tests in Refactored Java Programs. 734-741 - Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano:
An Empirical Study on the Relationship Between the Co-Occurrence of Design Smell and Refactoring Activities. 742-749 - Emilia-Loredana Pop, Manuela Andreea Petrescu:
Tendencies in Database Learning for Undergraduate Students: Learning In-Depth or Getting the Work Done? 750-757
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.