Abstract is missing.
- Digital Technologies, Business Model Innovation & Innovation Ecosystem Management in Institutionalized IndustriesWim Vanhaverbeke. 5
- Technological Adoption in the Era of Generative AILoic Bachelart. 7
- A Brief Journey Through History: From Distributed Objects Over SOA to MicroservicesPhilipp Leitner 0001. 9
- A Conceptual Model-Based Application for the Treatment and Management of Data in Pediatric Oncology: The Neuroblastoma Use CaseJesús Carreño-Bolufer, José Fabián Reyes Román, Sergio Pérez Andrés, Désirée Ramal Pons, Víctor Juárez Vidal, Adela Cañete Nieto, Óscar Pastor 0001. 15-26 [doi]
- Exploring and Evaluating Interplays of BPpy with Deep Reinforcement Learning and Formal MethodsTom Yaacov, Gera Weiss, Adiel Ashrov, Guy Katz, Jules Zisser. 27-40 [doi]
- SQL vs NoSQL: Six Systems ComparedMartin Corovcák, Pavel Koupil. 41-53 [doi]
- Agile Effort Estimation Improved by Feature Selection and Model ExplainabilityVíctor Pérez-Piqueras, Pablo Bermejo López, José A. Gámez 0001. 54-66 [doi]
- Enhancing Privacy, Censorship Resistance, and User Engagement in a Blockchain-Based Social NetworkMyo Thiha, Halil Yetgin, Luca Piras 0003, Mohammed Ghazi Al-Obeidallah. 67-79 [doi]
- Multi-Perspective Analyses of Spatio-Temporal Data About Well-BeingYunji Zhang, Franck Ravat, Sébastien Laborie, Philippe Roose. 80-91 [doi]
- Supporting Automated Documentation Updates in Continuous Software Development with Large Language ModelsHenok Birru, Antonio Cicchetti, Malvina Latifaj. 92-106 [doi]
- uBSaaS: A Unified Blockchain Service as a Service Framework for Streamlined Blockchain Services IntegrationHuynh Thanh Thien Pham, Frank Jiang 0001, Lei Pan 0002, Alessio Bonti, Mohamed Abdelrazek 0001. 107-119 [doi]
- Towards an Approach for Project-Library Recommendation Based on Graph NormalizationAbhinav Jamwal, Sandeep Kumar. 120-127 [doi]
- Evaluating ChatGPT's Ability to Detect Naming Bugs in Java MethodsKinari Nishiura, Atsuya Matsutomo, Akito Monden. 128-136 [doi]
- The Scent of Test Effectiveness: Can Scriptless Testing Reveal Code Smells?Olivia Rodríguez-Valdés, Domenico Amalfitano, Otto Sybrandi, Beatriz Marín, Tanja E. J. Vos. 137-148 [doi]
- Automated Social Media Feedback Analysis for Software Requirements Elicitation: A Case Study in the Streaming IndustryMelissa Silva, João Pascoal Faria. 149-160 [doi]
- LLM-Generated Microservice Implementations from RESTful API DefinitionsSaurabh Chauhan, Zeeshan Rasheed, Malik Abdul Sami, Zheying Zhang, Jussi Rasku, Kai-Kristian Kemell, Pekka Abrahamsson. 161-173 [doi]
- Reshaping Reality: Creating Multi-Model Data and Queries from Real-World InputsIrena Holubová, Alzbeta Srutková, Jáchym Bártík. 174-184 [doi]
- Autonomous Legacy Web Application Upgrades Using a Multi-Agent SystemValtteri Ala-Salmi, Zeeshan Rasheed, Malik Abdul Sami, Zheying Zhang, Kai-Kristian Kemell, Jussi Rasku, Shahbaz Siddeeq, Mika Saari, Pekka Abrahamsson. 185-196 [doi]
- Software Sustainability Perceptions in the Industry: A Questionnaire StudyJennifer Gross, Temesgen Hagos Mengesha, Sofia Ouhbi. 197-207 [doi]
- S4BP: An Approach for Assessing Business Process StabilityHajer Ben Haj Ayech, Ricardo Martinho 0001, Sonia Ayachi Ghannouchi. 208-216 [doi]
- Combining Goal and Process Models for the Specification of Human-Robot CollaborationsShaza Elbishbishy, Jeshwitha Jesus Raja, Philipp Kranz, Marian Daun. 217-228 [doi]
- VRSLOG: An Approach to Log Immersive Experiences in Virtual Reality SystemsDivij D., Y. Raghu Reddy, Radha Krishna B., Sai Anirudh Karre. 229-239 [doi]
- Exploring Feature Extraction Techniques and SVM for Facial Recognition with Image Generation Using Diffusion ModelsNabila Daly, Faten Khemakhem, Hela Ltifi. 240-251 [doi]
- A Study on the Comprehensibility of Behavioral Programming VariantsAdiel Ashrov, Arnon Sturm, Achiya Elyasaf, Guy Katz. 252-267 [doi]
- Identifying Testing Behaviour in Open Source Projects: A Case Analysis for Apache SparkAsli Sari, Ayse Tosun, Gülfem Isiklar Alptekin. 268-279 [doi]
- Information-Theoretic Patient Record Matching in Medical Databases: A Discriminative Power and Feature Analysis Using MIMIC-IVVitalijs Teze, Erika Nazaruka, Dmitrijs Bliznuks. 280-291 [doi]
- A Heuristic Approach to Localize CSS Properties for Responsive Layout FailuresTasmia Zerin, B. M. Mainul Hossain, Kazi Sakib. 292-303 [doi]
- Cross-Version Defect Prediction: Does Excessive Train-Test Similarity Affect the Reliability of Evaluation?Zsuzsanna Onet-Marian, Diana-Lucia Hotea. 304-315 [doi]
- Maude Strategies-Based SoSs Workflow ModelingCharaf Eddine Dridi, Nabil Hameurlain, Faiza Belala. 316-327 [doi]
- Model-Driven Development Using LLMs: The Case of ChatGPTVirginia Niculescu, Maria-Camelia Chisalita-Cretu, Cristina-Claudia Osman, Adrian Sterca. 328-339 [doi]
- Advancing Network Anomaly Detection Using Deep Learning and Federated Learning in an Interconnected EnvironmentHanen Dhrir, Maha Charfeddine, Habib M. Kammoun. 343-350 [doi]
- Optimising IIoT Control Systems at Demcon: Integrating MQTT, Sparkplug B, and ISA-88 for Unified AutomationAna Pintilie, Remco Poelarends, Andrea Capiluppi. 351-358 [doi]
- Impact of Business Process Masking on Organizations' PoliciesZakaria Maamar, Amel Benna, Hirad Baradaran Rezaei, Amin Beheshti, Fethi Rabhi. 359-366 [doi]
- Runtime Verification for Deep Learning SystemsBirk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen. 367-377 [doi]
- Best Practices and Evaluation Methods for Narrative Information Visualizations: A Systematic ReviewAndrea Lezcano Airaldi, Emanuel Irrazábal 0002, J. Andrés Díaz Pace. 378-389 [doi]
- Mutation Operators for Mutation Testing of Angular Web ApplicationsSarah Augustin, Hendrik Winkelmann, Herbert Kuchen. 390-397 [doi]
- Querying Digital Twin ModelsEmilio Carrión, Pedro Valderas, Óscar Pastor 0001. 398-405 [doi]
- Exploring the Willingness of Nigerian Community Policing Stakeholders to Adopt Technology Through SurveyOtuu Obinna Ogbonnia, Joseph Henry Anajemba, Deepak Sahoo. 406-413 [doi]
- Recommender Systems Approaches for Software Defect Prediction: A Comparative StudyAhmed-Reda Rhazi, Oumayma Banouar, Fadel Touré, Said Raghay. 414-424 [doi]
- Challenges in Software Metrics Adoption: Insights from Cluj-Napoca's Development CommunityLaura Diana Cernau, Laura Diosan, Camelia Serban. 425-432 [doi]
- Exploring the Role of Service Design in Software Development: A Systematic MappingHenrique Pucci Pinto, Júlia de Souza, Elaine Venson, Rejane Maria da Costa Figueiredo. 433-440 [doi]
- MODE: A Customizable Open-Source Testing Framework for IoT Systems and MethodologiesRares Cristea, Ciprian Paduraru, Alin Stefanescu. 441-448 [doi]
- Exhaustive Model Identification on Process MiningTakeharu Mitsuda, Hiroyuki Nakagawa, Haruhiko Kaiya, Hironori Takeuchi, Sinpei Ogata, Tatsuhiro Tsuchiya. 449-456 [doi]
- Is It Professional or Exploratory? Classifying Repositories Through README AnalysisMaximilian Auch, Maximilian Balluff, Peter Mandl 0001, Christian Wolff 0001. 457-467 [doi]
- Trends and Challenges in Machine Learning for Code Summarization and Comprehension: A Systematic Literature ReviewPanagiotis Mantos, Fotis Kokkoras, George Kakarontzas. 468-475 [doi]
- Genetic Algorithm for Optimal Response Time Scheduling of Electric Vehicle ModelZouhaira Abdellaoui, Houda Meddeb. 476-483 [doi]
- Lessons Learned from Implementing a Language-Agnostic Dependency Graph ParserFrancesco Refolli, Darius Sas, Francesca Arcelli Fontana. 484-491 [doi]
- A Study on Different Spectra in Fault LocalizationNícolas Hamparsomian, Marcos Lordello Chaim. 492-499 [doi]
- An Innovative Approach to Represent Tacit Knowledge of Fishing with Knowledge GraphsTanjila Kanij, Shafia Husna, Afzal Azeem Chowdhary, Misita Anwar, Md Khalid Hossain, John Grundy 0001. 500-507 [doi]
- Design Thinking and a Human-Centered Approach to Explore the Potential of Mobile Phone and AI-Enabled Just-in-Time Mental Health Solution for University Students in IndiaRaman Saxena. 508-519 [doi]
- Detecting Duplicate Effort in GitHub ContributionsJames Galbraith, Des Greer. 520-529 [doi]
- Towards an Evaluation Framework for Explainable Artificial Intelligence Systems for Health and Well-BeingEsperança Amengual Alcover, Antoni Jaume-i-Capó, Miquel Miró-Nicolau, Gabriel Moyà Alcover, Antonia Paniza Fullana. 530-540 [doi]
- Automated Testing of Tezos Blockchain-Oriented SoftwareAfef Jmal Maâlej, Achraf Weli. 541-548 [doi]
- Automated Migration of Legacy Code from the C++14 to C++23 StandardAleksander Swiniarski, Anna Derezinska. 549-556 [doi]
- Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud EnvironmentsSabbir M. Saleh, Nazim H. Madhavji, John Steinbacher. 557-564 [doi]
- AADT: Asset-Driven Attack-Defense TreeNan Messe, Avi Shaked. 565-572 [doi]
- Licy: A Chatbot Assistant to Better Understand and Select Open Source Software LicensesGiorgos Shittas, Georgia M. Kapitsaki, Maria Papoutsoglou 0001. 573-581 [doi]
- A Replicated Study on Factors Affecting Software UnderstandabilityGeorgia M. Kapitsaki, Luigi Lavazza, Sandro Morasca, Gabriele Rotoloni. 582-591 [doi]
- VP-IAFSP: Vulnerability Prediction Using Information Augmented Few-Shot Prompting with Open Source LLMsMithilesh Pandey, Sandeep Kumar 0004. 592-599 [doi]
- Medical Chatbot for Disease Prediction Using Machine Learning and Symptom AnalysisOltean Anisia Veronica, Ioan-Daniel Pop, Adriana Mihaela Coroiu. 600-607 [doi]
- Interpreting Workflow Architectures by LLMsMichal Töpfer, Tomás Bures, Frantisek Plásil, Petr Hnetynka. 608-617 [doi]
- Variability-Driven User-Story Generation Using LLM and Triadic Concept AnalysisAlexandre Bazin, Alain Gutierrez, Marianne Huchard, Pierre Martin 0001, Yulin Zhang 0002. 618-625 [doi]
- The Impact of the European Product Liability Directive on Software EngineeringDoriana Cobârzan, Richard Bubel, Torsten Ullrich. 626-634 [doi]
- Third-Party Library Recommendations Through Robust Similarity MeasuresAbhinav Jamwal, Sandeep Kumar 0004. 635-642 [doi]
- Sustainable Software Development: An ADKAR-Based Framework for Project Managers and TeamsYassine Talas, Hajer Rabii. 643-651 [doi]
- LICA-HE: Optimal Lossless Image Compression Algorithm for Color Passport-Photo CompressionTaif Ammash, Hamza Gharsellaoui, Leila Ben Ayed. 652-659
- CyberGuardian 2: Integrating LLMs and Agentic AI Assistants for Securing Distributed NetworksCiprian Paduraru, Catalina Camelia Patilea, Alin Stefanescu. 660-667 [doi]
- Machine Learning for Ontology AlignmentFaten Abbassi, Yousra Bendaly Hlaoui, Faouzi Ben Charrada. 668-675 [doi]
- Anomaly Detection in Surveillance VideosPriyanka H., Ankitha A. C., Pratyusha Satish Rao, Urja Modi, Chandu Naik. 676-683 [doi]
- A Progressive Step Towards Automated Fact-Checking by Detecting Context in Diverse Languages: A Prototype for Bangla Facebook PostsMahbuba Shefa, Tasnuva Ferdous, Afzal Azeem Chowdhary, Md. Jannatul Rakib Joy, Tanjila Kanij, Md. Al Mamun. 684-691 [doi]
- A User-Centered Design Approach to Develop a Privacy Awareness ApplicationAnika Tabassum Era, Tanjila Kanij, John Grundy 0001, Md. Al Mamun. 692-699 [doi]
- The Impact of Context-Oriented Programming on Declarative UI Design in ReactKoshi You, Hiroaki Fukuda, Paul Leger. 700-707 [doi]
- Exploring the Influence of User Interface on User Trust in Generative AIMorteza Ahmadianmanzary, Sofia Ouhbi. 708-714 [doi]
- VReqDV: Model Based Design Generation & Design Versioning Tool for Virtual Reality Product DevelopmentShambhavi Jahagirdar, Sai Anirudh Karre, Y. Raghu Reddy. 715-722 [doi]
- Integrating Process Mining and Success Factors in Information Systems Projects: A Decision Support System ApproachJoana Pedrosa, Luís Gonzaga Magalhães, Ricardo Martinho 0001. 723-730 [doi]
- On Improving the Efficiency of AI-Generated Text DetectionBogdan Ichim, Andrei-Cristian Nastase. 731-738 [doi]
- A Near-Optimal Steganography-Based Solution for Embedding Data in Video Cover MediumAli Mohammed Abed, Houcemeddine Hermassi, Walid Barhoumi. 739-745
- Agile Retrospectives: What Went Well? What Didn't Go Well? What Should We Do?Maria Spichkova, Hina Lee, Kevin Iwan, Madeleine Zwart, Yuwon Yoon, Xiaohan Qin. 746-753 [doi]
- A Multivocal Mapping Study on Artifact Traceability Complexities in PracticeZaki Pauzi, Andrea Capiluppi. 754-761 [doi]
- Integrating Data Lakes with Self-Adaptive Serious GamesMichalis Pingos, Spyros Loizou, Andreas S. Andreou. 762-772 [doi]
- Key Artefacts in the Initial Phases of IT Project Management: Systematic Mapping StudyOksana Nikiforova, Kristaps Babris, Megija Krista Milune, Navyasri Tanguturi, Óscar Pastor 0001. 773-781 [doi]
- Towards a Cultural Perspective on Human-Robot InteractionBhavishya Swami, Jeshwitha Jesus Raja, Meenakshi Manjunath, Amruta Rout, Marian Daun. 782-789 [doi]
- Students' Perception of Big Data Engineering in Higher Education Curricula: Expectations, Interest and Ethical ImplicationsIoana Georgiana Ciuciu, Manuela Andreea Petrescu. 790-797 [doi]
- Data-Driven Personas for Software Engineering ResearchJefferson Seide Molléri, Bogdan Marculescu. 798-805 [doi]
- Design of a Serious Game on Exploratory Software Testing to Improve Student EngagementNiels Doorn, Tanja E. J. Vos, Beatriz Marín. 806-813 [doi]
- An Empirical Framework for Automatic Identification of Video Game Development Problems Using Multilayer PerceptronPratham Maan, Lov Kumar, Vikram Singh 0005, Lalita Bhanu Murthy Neti, Aneesh Krishna. 814-821 [doi]
- Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological ApproachesElias Seid, Oliver Popov, Fredrik Blix. 822-834 [doi]
- Healthcare Bias in AI: A Systematic Literature ReviewAndrada-Mihaela-Nicoleta Moldovan, Andreea Vescan, Crina Grosan. 835-842 [doi]
- Analyzing Deforestation Dynamics in Romania Using Random Forest Algorithm and Google Earth EngineAndrei Varan, Adriana Mihaela Coroiu, Liviu-Mihai Iacob. 843-847 [doi]
- Generating Formal Process Models and Decisions from Examination Rules in Natural Text with ChatGPTAndreas Speck, Melanie Windrich, Jan Hesse, Melina Sentz, David Kuhlen, Thomas Stuht, Elke Pulvermüller. 848-857 [doi]
- A Risk Assessment of Information Security in a Diet Centre Business: A Case StudyTasneem Annahdi, Duaa Alkubaisy, Luca Piras 0003. 858-867 [doi]