default search action
21st SERA 2023: Orlando, FL, USA
- 21st IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2023, Orlando, FL, USA, May 23-25, 2023. IEEE 2023, ISBN 979-8-3503-4588-9
- Fei Zuo, Junghwan Rhee, Myung-Ah Park, Gang Qian:
PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses. 2-7 - Suhan Jiang, Jie Wu, Fei Zuo, Alessandro Mei:
Balance-aware Cost-efficient Routing in the Payment Channel Network. 8-15 - Jonathan Elkobi, Bernd Gruner, Tim Sonnekalb, Clemens-Alexander Brust:
TIPICAL - Type Inference for Python In Critical Accuracy Level. 16-21 - Yoonsik Cheon, Ricardo Lozano, Rajasoundarya Senthil Prabhu:
A Library-Based Approach for Writing Design Assertions. 22-27 - Kubra Gundogan, Nuri Alperen Kose, Khushi Gupta, Damilola Oladimeji, Fan Liang:
A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency Communications. 28-34 - Sungwon Moon, Yujin Lim:
Split and Federated Learning with Mobility in Vehicular Edge Computing. 35-38 - Bishal Lakha, Kalyan Bhetwal, Nasir U. Eisty:
Analysis of Software Engineering Practices in General Software and Machine Learning Startups. 39-46 - Patrick Chadbourne, Nasir U. Eisty:
Applications of Causality and Causal Inference in Software Engineering. 47-52 - Alain Kabo Mbiada, Bassey Isong, Francis Lugayizi, Adnan M. Abu-Mahfouz:
Towards Integrated Framework for Efficient Educational Software Development. 53-60 - Prashanta Saha, Clemente Izurieta, Upulee Kanewala:
A Test Suite Minimization Technique for Testing Numerical Programs. 61-68 - Young Lee, Arlen P. McDonald, Jeong Yang:
Identifying Code Tampering Using A Bytecode Comparison Analysis Tool. 69-76 - Md. Fazle Rabbi, Arifa I. Champa, Minhaz F. Zibran:
Phishy? Detecting Phishing Emails Using ML and NLP. 77-83 - Wahiba Ben Abdessalem Karaa, Dridi Kawther:
Classification of Multilingual Medical Documents using Deep Learning. 84-89 - Anes Abdennebi, Alp Tuncay, Cemal Yilmaz, Anil Koyuncu, Oktay Gungor:
LSTM-AE for Anomaly Detection on Multivariate Telemetry Data. 90-97 - Achhiya Sultana, Mahmudul Islam, Mahady Hasan, Farruk Ahmed:
Fake News Detection Using Machine Learning Techniques. 98-103 - Mohammed Adib Khan, Naser Ezzati-Jivan:
Multi-level Adaptive Execution Tracing for Efficient Performance Analysis. 104-109 - Dheeraj N. Naraharisetti, Ramesh K. Karne, Joel Weymouth, Alexander L. Wijesinha:
Obsolescence in Operating Systems and Microprocessors. 110-115 - Samuel Sungmin Cho, Myoungkyu Song:
Programming Model for Information Sharing among IoT Devices: Software Engineering Perspective. 116-121 - Hengshuo Liang, Cheng Qian, Chao Lu, Lauren Burgess, John Mulo, Wei Yu:
Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems. 122-127 - Raad Haddad, Dhiah el Diehn I. Abou-Tair, Alá F. Khalifeh:
A Blockchain-Based Verification Process for Smart Cities. 128-131 - Adamu Hussaini, Cheng Qian, Yifan Guo, Chao Lu, Wei Yu:
Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis. 132-137 - John Mulo, Pu Tian, Adamu Hussaini, Hengshuo Liang, Wei Yu:
Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems. 138-143 - Daniel Ukene, Hayden Wimmer, Jongyeop Kim:
Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege. 144-152 - Krishna Chaitanya Gadepally, Sambandh Bhusan Dhal, Stavros Kalafatis, Kevin J. Nowka:
Realistic Predictors for Regression and Semantic Segmentation. 153-155 - Ioannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, Steven Drager:
An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case Study. 156-161 - Anna Sheila Crisostomo, Riah Encarnacion, Shakir Al Balushi:
A Data Mining Approach to Construct Classification Model for Predicting Tourism Graduates Employability. 162-168 - Yuya Yokoyama:
Consideration of Semantics between Q&A Statements to Obtain Factor Score. 169-175 - Jeffrey Fairbanks, Akshharaa Tharigonda, Nasir U. Eisty:
Analyzing the Effects of CI/CD on Open Source Repositories in GitHub and GitLab. 176-181 - Jason Duran, Mostofa Najmus Sakib, Nasir U. Eisty, Francesca Spezzano:
Evaluating Code Metrics in GitHub Repositories Related to Fake News and Misinformation. 182-188 - Zhicheng Xu, Weinan Gao, Zhicun Chen, Rami J. Haddad, Scot Hudson, Ezebuugo Nwaonumah, Frank Zahiri, Jeremy Johnson:
Data-Driven Smart Manufacturing Technologies for Prop Shop Systems. 189-194 - Xin Zhang, Yuqi Song, Fei Zuo, Zheqing Zhou, Xiaofeng Wang:
Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels. 195-200 - Jongyeop Kim, Jinki Kim, Matthew Sands, Seongsoo Kim:
Deep Learning Model to Improve the Stability of Damage Identification via Output-only Signal. 201-209 - Ian Trawinski, Hayden Wimmer, Jongyeop Kim:
Anomaly Detection in Intrusion Detection System using Amazon SageMaker. 210-217 - Seongsoo Kim, Lei Chen, Jongyeop Kim, Yiming Ji, Rami J. Haddad:
A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15. 218-228 - Xianshan Qu, Nathan Huynh, Robert L. Mullen, John R. Rose:
Nighttime Vehicle Classification based on Thermal Images. 229-234 - Zhengxinchao Xiao, Lei Xiao:
A Systematic Literature Review on Test Case Prioritization and Regression Test Selection. 235-242 - Marwa Chnib, Wafa Gabsi:
Detection of anomalies in the HDFS dataset. 243-250 - Jim Alves-Foss, Aditi Pokharel, Ronisha Shigdel, Jia Song:
Calibrating Cybersecurity Experiments: Evaluating Coverage Analysis for Fuzzing Benchmarks. 251-257 - Rupam Kumar Dey, Anahita Khojandi, Kalyan Perumalla:
Determining the Most Significant Metadata Features to Indicate Defective Software Commits. 258-265 - Md Athikul Islam, Rizbanul Hasan, Nasir U. Eisty:
Documentation Practices in Agile Software Development: A Systematic Literature Review. 266-273 - Jangwu Jo, Junhyun Park, Ayoung Jang, Youngsu Cho, Byeongdo Kang:
Another Software for Designing Electric Transformers. 274-275 - Hamdan Ziyad Alabsi, Majed Almotairi, Yahya Alqahtani, Mohammed Abdulkareem Alyami:
Enhancing Students' Job Seeking Process Through A Digital Badging System. 276-281 - Yong-Pil Geum:
3 B (Block Byte Bit) Cipher Algorithm for Secure Socket Layer. 282-286 - Arifa I. Champa, Md. Fazle Rabbi, Farjana Z. Eishita, Minhaz F. Zibran:
Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone Sensors. 287-294 - Sanjaikanth E. Vadakkethil Somanathan Pillai, Wen-Chen Hu:
Misinformation Detection Using an Ensemble Method with Emphasis on Sentiment and Emotional Analyses. 295-300 - Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden:
Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations. 301-306 - Nicia Guillén Yparrea, Felipe Hernández-Rodríguez:
Reinforcement of Collaborative Work in the Metaverse Through Playful Activities. 307-312 - Hyesoo Shin, Eunjo Jang, Sojeong Kim, Ki Yong Lee:
SDCG: Silhouette-based Deep Clustering with GNN for Improved Graph Node Clustering. 313-318 - Hyewon Ryu, Sara Yu, Ki Yong Lee:
TI-former: A Time-Interval Prediction Transformer for Timestamped Sequences. 319-325 - Jieun Kang, SuBi Kim, Yongik Yoon:
The Strategy of Digital Twin Convergence Service based on Metavers. 326-330 - Erdan Wang, Pouria Tayebi, Yeong-Tae Song:
Cloud-based Digital Twins Storage in Emergency Healthcare. 331-335 - Turhan Kimbrough, Pu Tian, Weixian Liao, Wei Yu:
Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images. 335-340 - Jonathan Li, Steven Pugh, Honghe Zhou, Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models. 341-344 - Fei Zuo, Xin Zhang, Yuqi Song, Junghwan Rhee, Jicheng Fu:
Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer. 345-351 - Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:
ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset. 352-357 - Deepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song:
A Statistical Method for API Usage Learning and API Misuse Violation Finding. 358-365 - Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu:
Orchestrating Apache NiFi/MiNiFi within a Spatial Data Pipeline. 366-371 - Partha Ghosh, Takaaki Goto, Leena Jana Ghosh, Soumya Sen:
Scientific Organization of Blood Donation Camp Through Lexicographic Optimization and Taxicab Path Computation. 372-376 - Haotian Yan, Takaaki Goto, Tadaaki Kirishima, Kensei Tsuchida:
Improve Accuracy of PC Skill Assessment Using PC Operation Log Data. 377-382 - Saikat Raj, Santanu Roy, Surajit Jana, Soumyadip Roy, Takaaki Goto, Soumya Sen:
Customer Segmentation Using Credit Card Data Analysis. 383-388 - Zhang Xiao, Takaaki Goto, Partha Ghosh, Tadaaki Kirishima, Kensei Tsuchida:
Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine Learning. 389-394 - Yi Wang, Takaaki Goto, Tadaaki Kirishima, Kensei Tsuchida:
Novel Music Genre Classification System Using Transfer Learning on a Small Dataset. 395-401 - Sharad Sharma:
Mobile Augmented Reality System for Emergency Response. 402-406 - Jinbao Song, Jiahui Cai, Ran Li, Yanan Li:
Design and Implementation of Scientific Research Achievement Transformation System. 407-412 - Xinqun Luo, Xingyu Tan:
Research and Application of Content-based Image Hash Retrieval Algorithm. 413-416 - Qianzhong Chen, Xianghao Meng, Feng Lin, Dongsheng Shi, Yiying Lin, Dongmei Li, Hao Gu, Xiaoping Zhang:
Construction and Application of Knowledge Graph for Food Therapy. 417-422 - Dongsheng Shi, Feng Lin, Yuxun Li, Qianzhong Chen, Yiying Lin, Wentao Zhu, Dongmei Li, Xiaoping Zhang:
Rule-Based Representation Learning for Traditional Chinese Medicine Knowledge Graph. 423-427 - Sajid Ali Khan, Mohammed Bin Abdulrahman Alawairdhi, Mousa T. Al-Akhras:
Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition. 428-433 - Ken Nishimatsu, Akiya Inoue:
Mobile User Analysis Considering Collaboration with Financial Services. 434-439 - Shigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai:
Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model. 440-445 - Yohei Hara, Hiroyuki Ono:
Study on Emissions of Environmental Impact in Chemical Industry. 446-451 - Bethsy Guerrero, María Valle, Mauricio Restrepo, Jairo Alberto Cardona, César Viloria-Núñez, Christian G. Quintero M.:
Multi-Objective Particle Swarm Optimization Approach for Population Classification in Emergency Management. 452-459 - Masumi Kawakami, Fuyuki Ishikawa:
Domain-specific Modeling Environment Construction Tool based on View Patterns: RapidDSM. 460-468 - Shirin Hasavari, Yeong-Tae Song, Benjamin Lawner:
Increase Patients' Survivability During Emergency Care Using Blockchain-Based Digital Twin Technology. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.