Abstract is missing.
- Myths and Misconceptions about Machine Learning and How They Are Related to Software EngineeringStefan Kramer. 5
- What Can We Learn from Play?Panos Markopoulos. 7
- Impact of End User Human Aspects on Software EngineeringJohn C. Grundy. 9-20 [doi]
- Applying User Centred Design to Improve the Design of Genomic User InterfacesAlberto García S., Carlos Iñiguez-Jarrín, Oscar Pastor López, Daniel Gonzalez-Ibea, Estela Pérez-Román, Carles Borredà, Javier Terol, Victoria Ibanez, Manuel Talón. 25-35 [doi]
- A Hybrid Approach to MVC Architectural Layers AnalysisDragos Dobrean, Laura Diosan. 36-46 [doi]
- An Extreme Learning Machine based Approach for Software Effort EstimationSuyash Shukla, Sandeep Kumar 0004. 47-57 [doi]
- Cultural Influences on Requirement Engineering in Designing an LMS Prototype for Emerging Economies: A Papua New Guinea and Pacific Islands' Case StudyPhilemon Yalamu, Wendy Doube, Caslon Chua. 58-67 [doi]
- Improving the Modelling of Human-centric Aspects of Software Systems: A Case Study of Modelling End User Age in Wirefame DesignsAria YukFan Jim, Hyun Shim, Jue Wang, Lionel Richie Wijaya, Rongbin Xu, Hourieh Khalajzadeh, John Grundy 0001, Tanjila Kanij. 68-79 [doi]
- ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-DesignDuaa Alkubaisy, Luca Piras, Mohammed Ghazi Al-Obeidallah, Karl Cox, Haralambos Mouratidis. 80-91 [doi]
- Cognitive-Driven Development: Preliminary Results on Software RefactoringsVictor Hugo Santiago C. Pinto, Alberto Luiz Oliveira Tavares de Souza, Yuri Matheus Barboza de Oliveira, Danilo Monteiro Ribeiro. 92-102 [doi]
- Experimental Analysis of the Relevance of Features and Effects on Gender Classification Models for Social Media Author ProfilingPaloma Piot-Perez-Abadin, Patricia Martín-Rodilla, Javier Parapar. 103-113 [doi]
- Completeness of Knowledge in Models Extracted from Natural TextViktorija Gribermane, Erika Nazaruka. 114-125 [doi]
- BloatLibD: Detecting Bloat Libraries in Java ApplicationsAgrim Dewan, Poojith U. Rao, Balwinder Sodhi, Ritu Kapur. 126-137 [doi]
- A Direct Formal Semantics for BPMN Time-related ConstructsSara Houhou, Souheib Baarir, Pascal Poizat, Philippe Quéinnec. 138-149 [doi]
- An Approach to Assess the Performance of Mobile Applications: A Case Study of Multiplatform Development FrameworksDany Mota, Ricardo Martinho. 150-157 [doi]
- Identifying and Resolving Conflicts in Requirements by Stakeholders: A Clustering ApproachIshaya Gambo, Kuldar Taveter. 158-169 [doi]
- A Method for Estimating Potential Knowledge Increase after Updating Ontology MappingAdrianna Kozierkiewicz, Marcin Pietranik, Karolina Kania. 173-180 [doi]
- Time Influence on Security ProtocolSabina Szymoniak. 181-188 [doi]
- Generating Automatic Unit Tests of JavaScript Code from UML Class and Activity DiagramsAgnieszka Malanowska, Adrianna Malkiewicz-Blotniak. 189-196 [doi]
- Dy-COPECA: A Dynamic Version of MC/DC Analyzer for C ProgramSangharatna Godboley, Arpita Dutta. 197-204 [doi]
- A Stacking Ensemble-based Approach for Software Effort EstimationSuyash Shukla, Sandeep Kumar 0004. 205-212 [doi]
- Problem of Inconsistency in Textual Requirements SpecificationDavid Senkýr, Petr Kroha. 213-220 [doi]
- Modeling Methodology for Reconfigurable Distributed Systems using Transformations from GR-UML to GR-TNCES and IEC 61499Soumoud Fkaier, Mohamed Khalgui, Georg Frey. 221-230 [doi]
- An Integrated Dependability Analysis and Design Method for Distributed Systems EngineeringClaus Pahl. 231-238 [doi]
- P2P Frames: Pattern-based Characterization of Functional Requirements for Peer-to-peer SystemsLirijan Sabani, Roman Wirtz, Maritta Heisel. 239-250 [doi]
- DesPat: A Modeling Toolset for Designing and Implementing Software Systems using Design PatternsMert Ozkaya, Mehmet Alp Kose. 251-260 [doi]
- Mixin based Adaptation of Design PatternsVirginia Niculescu. 261-268 [doi]
- Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media ApplicationAngela Borchert, Aidmar Wainakh, Nicole Krämer 0001, Max Mühlhäuser, Maritta Heisel. 269-280 [doi]
- Hybrid Recommendation Systems: A State of ArtFatima Zohra Trabelsi, Amal Khtira, Bouchra El Asri. 281-288 [doi]
- Public Processes Legal Issues Verification using YAWLKaouther Mezaache, Latifa Mahdaoui. 289-296 [doi]
- Supporting Automated Verification of Reconfigurable Systems with Product Lines and Model CheckingFaiz Ul Muram, Samina Kanwal, Muhammad Atif Javed. 297-305 [doi]
- Facilitating the Compliance of Process Models with Critical System Engineering Standards using Natural Language ProcessingFaiz Ul Muram, Muhammad Atif Javed, Samina Kanwal. 306-313 [doi]
- An Ontology for Service-Oriented Dynamic Software Product Lines Knowledge ManagementNajla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani, Raúl Mazo. 314-322 [doi]
- A Methodology for Generating BPEL Models from a Business Process Textual DescriptionWiem Khlif, Nadia Aloui, Nourchène Elleuch Ben Ayed. 323-330 [doi]
- Expert Review of Taxonomy based Testing: A Testing Framework for Medical Device SoftwareHamsini Ketheswarasarma Rajaram, John Loane, Silvana Togneri MacMahon, Fergal Hugh Mc Caffery. 331-339 [doi]
- Software Development Context: Critiquing Often Used TermsDiana Kirk. 340-347 [doi]
- Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database ApplicationPierrette Annie Evina, Faouzi Jaïdi, Faten Labbene-Ayachi, Adel Bouhoula. 348-355 [doi]
- Systemic Theory for Software Teams: A PerspectiveSergey Masyagin, Giancarlo Succi, Ananga Thapaliya. 356-361 [doi]
- Investigating Student Insight in Software Engineering Team ProjectsSimona Motogna, Dan-Mircea Suciu, Arthur-Jozsef Molnar. 362-371 [doi]
- A Method of Deep Reinforcement Learning for Simulation of Autonomous Vehicle ControlAnh T. Huynh, Ba Tung Nguyen, Hoai-Thu Nguyen, Sang Vu, Hien D. Nguyen. 372-379 [doi]
- Transformation of BPMN Model into an OWL2 OntologyMariem Kchaou, Wiem Khlif, Faïez Gargouri, Mariem Mahfoudh. 380-388 [doi]
- A Reinforcement Learning Approach to Feature Model Maintainability ImprovementOlfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani. 389-396 [doi]
- Using Type Analysis for Dealing with Incompetent Mutants in Mutation Testing of Python ProgramsAnna Derezinska, Anna Skupinska. 397-404 [doi]
- Improving Web Application Vulnerability Detection Leveraging Ensemble FuzzingJoão Caseirito, Ibéria Medeiros. 405-412 [doi]
- Derivation of Logical Aspects in Praxeme from ReLEL ModelsRapatsalahy Miary Andrianjaka, Hajarisena Razafimahatratra, Mihaela Ilie, Thomas Mahatody, Sorin Ilie, Nicolas Raft Razafindrakoto. 413-420 [doi]
- Preventive Model-based Verification and Repairing for SDN RequestsIgor B. Burdonov, Alexandre Kossachev, Nina Yevtushenko, Jorge López, Natalia Kushik, Djamal Zeghlache. 421-428 [doi]
- Towards Profiling Runtime Architecture Code Contributors in Software ProjectsQuentin Perez, Alexandre Le Borgne, Christelle Urtado, Sylvain Vauttier. 429-436 [doi]
- Preliminary Evaluation of a Survey Checklist in the Context of Evidence-based Software Engineering EducationKai Petersen, Jefferson Seide Molléri. 437-444 [doi]
- Decision Model and Notation for Describing Variability in Business Process Product LinesAndreas Speck, Aljoscha Jagenow, Melanie Windrich. 445-452 [doi]
- Towards a Model-Driven Testing Framework for GUI Test Cases Generation from User StoriesMaria Fernanda Granda, Otto Parra, Bryan Alba-Sarango. 453-460 [doi]
- Automated Repair of Asymmetric Web Pages during Resolution of Mobile Friendly ProblemsMd. Aquib Azmain, Kishan Kumar Ganguly. 461-468 [doi]
- Understanding the Relationship between Missing Link Community Smell and Fix-inducing ChangesToukir Ahammed, Moumita Asad, Kazi Sakib. 469-475 [doi]
- Toward Understanding Personalities Working on Computer: A Preliminary Study Focusing on Collusion/PlagiarismAyomide Bakare, Sergey Masyagin, Giancarlo Succi, Xavier Zelada Vasquez. 476-483 [doi]
- Text Processing Techniques in Approaches for Automated Composition of Domain ModelsViktorija Gribermane, Erika Nazaruka. 489-500 [doi]
- Agile Enterprise Architecture by Leveraging Use CasesHong Guo 0004, Jingyue Li, Shang Gao 0002, Darja Smite. 501-509 [doi]
- Overview of Model Interpretation Techniques and Their ApplicationsVladislavs Nazaruks, Janis Osis. 513-520 [doi]
- Property Lifecycle Diagram for Tracing State Machine Diagram ChangesShinpei Ogata, Yusuke Nishizawa, Erina Makihara, Mizue Kayama, Kozo Okano. 521-528 [doi]
- Using MDE for Teaching Database Query OptimizerAbdelkader Ouared, Abdelhafid Chadli. 529-536 [doi]