Abstract is missing.
- Leveraging Digital Trace Data to Investigate and Support Human-Centered Work ProcessesBarbara Weber. 5
- On the Relation Between Gender and Software EngineeringLetizia Jaccheri. 7
- Enterprise-Level IS Research: Challenges and Potentials of Looking Beyond Enterprise SolutionsRobert Winter. 9
- Human-Centered Design for the Efficient Management of Smart Genomic InformationAlberto García S., Mireia Costa 0001, Ana León 0001, José F. Reyes 0003, Oscar Pastor 0001. 15-26 [doi]
- Security Tools' API Recommendation Using Machine LearningZarrin Tasnim Sworna, Anjitha Sreekumar, Chadni Islam, Muhammad Ali Babar 0001. 27-38 [doi]
- What's in a Persona? A Preliminary Taxonomy from Persona Use in Requirements EngineeringDevi Karolita, John Grundy 0001, Tanjila Kanij, Humphrey O. Obie, Jennifer McIntosh 0001. 39-51 [doi]
- Time-Constrained, Event-Driven Coordination of Composite Resources' Consumption FlowsZakaria Maamar, Amel Benna, Nabil Otsmane. 52-63 [doi]
- Live Code Smell Detection of Data Clumps in an Integrated Development EnvironmentNils Baumgartner, Firas Adleh, Elke Pulvermüller. 64-76 [doi]
- Visualizing Dynamic Data-Flow Analysis of Object-Oriented Programs Based on the Language Server ProtocolLaura Troost, Jonathan Neugebauer, Herbert Kuchen. 77-88 [doi]
- Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory StudyHina Saeeda, Muhammad Ovais Ahmad, Tomas Gustavsson. 89-101 [doi]
- Compaction of Spacecraft Operational Models with Metamodeling Domain KnowledgeKazunori Someya, Toshiaki Aoki, Naoki Ishihama. 102-113 [doi]
- Predictive Power of Two Data Flow Metrics in Software Defect PredictionAdam Roman, Rafal Brozek, Jaroslaw Hryszko. 114-125 [doi]
- Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical StudyKhlood Ahmad, Mohamed Abdelrazek 0001, Chetan Arora 0002, John Grundy 0001, Muneera Bano. 126-137 [doi]
- Toward a Deep Contextual Product Recommendation for SO-DSPL FrameworkNajla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani. 138-148 [doi]
- A Distance-Based Feature Selection Approach for Software Anomaly DetectionSuravi Akhter, Afia Sajeeda, Ahmedul Kabir. 149-157 [doi]
- Rethinking Certification for Higher Trust and Ethical Safeguarding of Autonomous SystemsDasa Kusniráková, Barbora Buhnova. 158-169 [doi]
- Methods for Model-Driven Development of IoT Applications: Requirements from Industrial PracticeBenjamin Nast, Kurt Sandkuhl. 170-181 [doi]
- Managing Domain Analysis in Software Product Lines with Decision Tables: An Approach for Decision Representation, Anomaly Detection and ResolutionNicola Boffoli, Pasquale Ardimento, Alessandro Nicola Rana. 182-192 [doi]
- Towards Automated Prediction of Software Bugs from Textual DescriptionSuyash Shukla, Sandeep Kumar 0004. 193-201 [doi]
- Git Workflow for Active Learning: A Development Methodology Proposal for Data-Centric AI ProjectsFabian Stieler, Bernhard Bauer. 202-213 [doi]
- Improved Business Analysis by Using 3D ModelsDavid Kuhlen, Andreas Speck. 214-225 [doi]
- Features and Supervised Machine Learning Based Method for Singleton Design Pattern Variants DetectionAbir Nacef, Sahbi Bahroun, Adel Khalfallah, Samir Ben Ahmed. 226-237 [doi]
- ASMS: A Metrics Suite to Measure Adaptive Strategies of Self-Adaptive SystemsKoen Kraaijveld, Claudia Raibulet. 238-249 [doi]
- Specification Based Testing of Object Detection for Automated Driving Systems via BBSLKento Tanaka, Toshiaki Aoki, Tatsuji Kawai, Takashi Tomita, Daisuke Kawakami, Nobuo Chida. 250-261 [doi]
- A Perspective from Large vs Small Companies Adoption of Agile MethodologiesManuela Petrescu, Simona Motogna. 265-272 [doi]
- Schfuzz: Detecting Concurrency Bugs with Feedback-Guided FuzzingHiromasa Ito, Yutaka Matsubara, Hiroaki Takada. 273-282 [doi]
- LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary LibraryJinquan Zhang, Pei Wang 0007, Dinghao Wu. 283-292 [doi]
- An Empirical Evaluation of System-Level Test Effectiveness for Safety-Critical SoftwareMuhammad Nouman Zafar, Wasif Afzal, Eduard Paul Enoiu. 293-305 [doi]
- VeriCombTest: Automated Test Case Generation Technique Using a Combination of Verification and Combinatorial TestingSangharatna Godboley. 306-313 [doi]
- Carbon-Box TestingSangharatna Godboley, Monika Rani Golla, Sindhu Nenavath. 314-321 [doi]
- Evaluation of Contemporary Smart Contract Analysis ToolsBaocheng Wang, Shiping Chen 0001, Qin Wang 0008. 322-329 [doi]
- Multi-Step Reasoning for IoT DevicesJosé Miguel Blanco, Bruno Rossi 0001. 330-337 [doi]
- Studying Synchronization Issues for Extended AutomataNatalia Kushik, Nina Yevtushenko 0001. 338-345 [doi]
- SmartMuVerf: A Mutant Verifier for Smart ContractsSangharatna Godboley, P. Radha Krishna 0001. 346-353 [doi]
- Supervised Machine Learning for Recovering Implicit Implementation of Singleton Design PatternAbir Nacef, Sahbi Bahroun, Adel Khalfallah, Samir Ben Ahmed. 354-361 [doi]
- A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain TrilemmaJan Werth, Nabil El Ioini, Mohammad Hajian Berenjestanaki, Hamid R. Barzegar, Claus Pahl. 362-371 [doi]
- An OWL Multi-Dimensional Information Security OntologyInes Meriah, Latifa Ben Arfa Rabai, Ridha Khédri. 372-380 [doi]
- A Step to Achieve Personalized Human Centric Privacy Policy SummaryIvan Simon, Sherif Haggag, Hussein Haggag. 381-395 [doi]
- Software Engineering Comments Sentiment Analysis Using LSTM with Various Padding SizesSanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni. 396-403 [doi]
- Evaluation of Approaches for Documentation in Continuous Software DevelopmentTheo Theunissen, Stijn Hoppenbrouwers, Sietse Overbeek. 404-411 [doi]
- Constraint-Logic Object-Oriented Programming with Free Arrays of Reference-Typed Elements via Symbolic AliasingHendrik Winkelmann, Herbert Kuchen. 412-419 [doi]
- MODINF: Exploiting Reified Computational Dependencies for Information Flow AnalysisJens Van der Plas, Jens Nicolay, Wolfgang De Meuter, Coen De Roover. 420-427 [doi]
- Mapping Process Mining Techniques to Agile Software Development PerspectivesCyrine Feres, Sonia Ayachi Ghannouchi, Ricardo Martinho. 428-435 [doi]
- Efficient Academic Retrieval System Based on Aggregated SourcesVirginia Niculescu, Horea-Adrian Grebla, Adrian Sterca, Darius Bufnea. 436-443 [doi]
- A Dynamic Service Placement in Fog InfrastructureMayssa Trabelsi, Nadjib Mohamed Mehdi Bendaoud, Samir Ben Ahmed. 444-452 [doi]
- Empirical Analysis for Investigating the Effect of Machine Learning Techniques on Malware PredictionSanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni. 453-460 [doi]
- Detecting Outliers in CI/CD Pipeline Logs Using Latent Dirichlet AllocationDaniel Atzberger, Tim Cech, Willy Scheibel, Rico Richter, Jürgen Döllner. 461-468 [doi]
- A Comparison of Source Code Representation Methods to Predict Vulnerability Inducing Code ChangesRusen Halepmollasi, Khadija Hanifi, Ramin Fadaei Fouladi, Ayse Tosun. 469-478 [doi]
- Software Vulnerability Prediction Knowledge Transferring Between Programming LanguagesKhadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag. 479-486 [doi]
- Modelling Adaptive Systems with Nets-Within-Nets in MaudeLorenzo Capra, Michael Köhler-Bussmeier. 487-496 [doi]
- Towards Synthesis of Code for Calculations Using Their SpecificationsAdvaita Datar, Amey Zare, R. Venkatesh 0001, Asia A. 497-504 [doi]
- A Study on Hybrid Classical: Quantum Computing Instructions for a Fragment of the QuickSI Algorithm for Subgraph IsomorphismRadu-Iulian Gheorghica. 505-512 [doi]
- Reverse Engineering of OpenQASM3 Quantum Programs to KDM ModelsLuis Jiménez-Navajas, Ricardo Pérez-Castillo, Mario Piattini. 513-520 [doi]
- A Reflection on the Use of Systemic Thinking in Software DevelopmentPaolo Ciancarini, Mirko Farina, Artem V. Kruglov, Giancarlo Succi, Ananga Thapaliya. 521-529 [doi]
- Clouds Coalition Detection for Business Processes OutsourcingAmina Ahmed-Nacer, Mohammed Riyadh Abdmeziem, Claude Godart. 530-537 [doi]
- From Descriptive to Predictive: Forecasting Emerging Research Areas in Software Traceability Using NLP from Systematic StudiesZaki Pauzi, Andrea Capiluppi. 538-545 [doi]
- A New Approach for Software Quality Assessment Based on Automated Code Anomalies DetectionAndrea Biaggi, Umberto Azadi, Francesca Arcelli Fontana. 546-553 [doi]
- Impact of COVID-19 on the Factors Influencing on-Time Software Project Delivery: An Empirical StudyMahmudul Islam, Farhan Khan, Mehedi Hasan, Farzana Sadia, Mahady Hasan. 554-561 [doi]
- Text Mining Studies of Software Repository ContentsBartosz Dobrzynski, Janusz Sosnowski. 562-569 [doi]
- Software Code Smells and Defects: An Empirical InvestigationReuben Brown, Des Greer. 570-580 [doi]
- A Goal-Oriented Requirements Engineering Approach for IoT ApplicationsDeepika Prakash, Naveen Prakash. 581-588 [doi]
- Using Bigrams to Detect Leaked Secrets in Source CodeAnton V. Konygin, Andrey V. Kopnin, Ilya P. Mezentsev, Alexandr A. Pankratov. 589-596 [doi]
- Sustainability-Driven Meetings as a Way to Incorporate Sustainability into Software Development PhasesAna Carolina Moises de Souza, Daniela S. Cruzes, Letizia Jaccheri. 597-604 [doi]
- mHealthSwarm: A Unified Platform for mHealth ApplicationsBen Philip, Yasmeen Anjeer Alshehhi, Mohamed Abdelrazek 0001, Scott Barnett, Alessio Bonti, John Grundy 0001. 605-612 [doi]
- Timed Transition Tour for Race Detection in Distributed SystemsEvgenii M. Vinarskii, Natalia Kushik, Nina Yevtushenko 0001, Jorge López, Djamal Zeghlache. 613-620 [doi]
- Ontology of Online Management Tools Aimed at Artificial Management Implementation: An Example of Use in Software DesignOlaf Flak. 621-628 [doi]
- Digital Twins for Trust Building in Autonomous Drones Through Dynamic Safety EvaluationDanish Iqbal, Barbora Buhnova, Emilia Cioroaica. 629-639 [doi]
- A Study on Early & Non-Intrusive Security Assessment for Container ImagesMubin Ul Haque, Muhammad Ali Babar 0001. 640-647 [doi]
- Programming Language Identification in Stack Overflow Post Snippets with Regex Based Tf-Idf Vectorization over ANNAman Swaraj, Sandeep Kumar 0004. 648-655 [doi]
- Toward a Goal-Oriented Methodology for Artifact-Centric Process ModelingRazan Abualsaud, Hanh Nhi Tran, Ileana Ober, Minh Khoi Nguyen. 656-663 [doi]
- Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential BenefitsOlga Siedlecka-Lamch, Sabina Szymoniak. 664-671 [doi]
- Toward a Modeling Language Prototype for Modeling the Behavior of Wireless Body Area Networks Communication ProtocolsBethaina Touijer. 672-675 [doi]
- Web Platform for Job Recommendation Based on Machine LearningIuliana Marin, Hanoosh Amel. 676-683 [doi]
- Extracting Queryable Knowledge Graphs from User Stories: An Empirical EvaluationAyodeji Ladeinde, Chetan Arora 0002, Hourieh Khalajzadeh, Tanjila Kanij, John Grundy 0001. 684-692 [doi]
- Investigate How Developers and Managers View Security Design in SoftwareAsif Imran. 693-700 [doi]
- An Innovative Approach to Develop Persona from Application ReviewsDylan Clements, Elysia Giannis, Fiona Crowe, Mike Balapitiya, Jason Marshall, Paul Papadopoulos, Tanjila Kanij. 701-708
- Various Shades of Teaching AgileNecmettin Ozkan, Sevval Bal, Mehmet Sahin Gök. 709-717 [doi]
- Impact of Machine Learning on Software Development Life CycleMaryam Navaei, Nasseh Tabrizi. 718-726 [doi]
- Leveraging Transformer and Graph Neural Networks for Variable Misuse DetectionVitaly Romanov, Gcinizwe Dlamini, Aidar Valeev, Vladimir Ivanov 0001. 727-733 [doi]
- Enhancing Unit Tests in Refactored Java ProgramsAnna Derezinska, Olgierd Sobieraj. 734-741 [doi]
- An Empirical Study on the Relationship Between the Co-Occurrence of Design Smell and Refactoring ActivitiesLerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano. 742-749 [doi]
- Tendencies in Database Learning for Undergraduate Students: Learning In-Depth or Getting the Work Done?Emilia-Loredana Pop, Manuela Andreea Petrescu. 750-757 [doi]