Abstract is missing.
- Systematizing the Meta-Analytical Process in Software EngineeringLetizia Jaccheri, Zamira Kholmatova, Giancarlo Succi. 1-5 [doi]
- Merging Live Video Feeds for Remote Monitoring of a Mining MachineAndrew T. Flangas, Javad Sattarvand, Sergiu M. Dascalu, Frederick C. Harris Jr.. 6-13 [doi]
- Incorporating energy efficiency measurement into CI\CD pipelineArtem V. Kruglov, Giancarlo Succi, Xavier Vasuez. 14-20 [doi]
- Design of Secure Connectors for Complex Message Communications in Software ArchitectureMichael E. Shin, TaegHyun Kang, Hassan Gomaa. 21-28 [doi]
- Software Development in Small Software Companies: Exploring the Usage of Procedures, Techniques, Methods and Models in PracticeMicheal Tuape, Victoria T. Hasheela-Mufeti, Anna Kayanda, Jussi Kasurinen. 29-38 [doi]
- You don't need a Microservices Architecture (yet): Monoliths may do the trickDimitrios Gravanis, George Kakarontzas, Vassilis C. Gerogiannis. 39-44 [doi]
- The Impact of Undefined Behavior on Compiler OptimizationZefan Shen. 45-50 [doi]
- Software Acceleration of the Deformable Shape Tracking Application: How to eliminate the Eigen Library OverheadNikos Petrellis, Stavros Zogas, Panagiotis Christakos, Panagiotis Mousouliotis, Georgios Keramidas, Nikolaos S. Voros, Christos P. Antonopoulos. 51-57 [doi]
- Synthesis of a Leadership Model for DevOps AdoptionKrikor Maroukian, Stephen R. Gulliver. 58-66 [doi]
- Customer Satisfaction in Software Development ProjectsPanos Fitsilis, Vyron Damasiotis, Sofia Sarmanioti. 67-72 [doi]
- A Framework for the Adoption of Agile within Software SMEs in Saudi ArabiaFahad S. Altuwaijri, Maria Angela Ferrario. 73-77 [doi]
- Safe Reinforcement Learning in Simulated Environment of Self-Driving LaboratoryAndrey V. Chernov, Ilias K. Savvas, Maria A. Butakova, Oleg O. Kartashov. 78-84 [doi]
- A Lightweight Development of Outbreak Prevention Strategies Built on Formal Methods and xDSLsAkram Idani. 85-93 [doi]
- Modeling and Predicting the Outcomes of NBA Basketball GamesYasi Zhang, Sicheng Zhou, Xi Zheng, Yuyu Wang, Minrui Liang. 94-99 [doi]
- Improving Multiclass Classification of Cybersecurity Breaches in Railway Infrastructure using Imbalanced LearningAleksandr N. Nebaba, Ilias K. Savvas, Maria A. Butakova, Andrey V. Chernov, Petr S. Shevchuk. 100-105 [doi]
- An Empirical Evaluation of Machine Learning Algorithms for Indoor Localization using Dual-Band WiFiAshraf Tahat, Rozana Awwad, Nadia Baydoun, Shurooq Al-Nabih, Talal A. Edwan. 106-111 [doi]
- Alternative Acquisition Functions of Bayesian Optimization in terms of Noisy ObservationJiabin Hu, Yuze Jiang, Jiayu Li, Tianyue Yuan. 112-119 [doi]
- An Exploratory Teaching Proposal of Greek History Independence Events based on STEAM Epistemology, Educational Robotics and Smart Learning TechnologiesSpyridon Kourtis, Apostolos Xenakis, Konstantinos Kalovrektis, Antonios Plageras, Ioanna Chalvantzi. 120-128 [doi]
- Realized Volatility PredictionSabrina Wing-Yi Chio, Yifei Li, Rainie JingRan Yang. 129-135 [doi]
- On the Computational Efficiency of Geometric Multidimensional ScalingGintautas Dzemyda, Martynas Sabaliauskas. 136-141 [doi]
- The Improvement of Simulated Annealing Algorithm on the Penalty Function in Multi-agent Traveling Salesman ProblemTianchen Ren, Jiayi Yang, Jinxin Li. 142-149 [doi]
- Evaluating Performance of NBA Players with Sentiment Analysis on Twitter MessagesQiwen Li, Jiarui Zhang, Jiayu Guo, Jiaqing Li, Chenhao Kang. 150-155 [doi]
- Digital Violence Against Women: A Time Series AnalysisGregorio Arturo Reyes González, Francisco J. Cantú Ortiz. 156-162 [doi]
- Nozzle-to-Work Distance Measurement and Control in Wire Arc Additive ManufacturingRaven Thomas Reisch, Tobias Hauser, Jan Franke, Florian Heinrich, Konstantinos Theodorou, Tobias Kamps, Alois C. Knoll. 163-172 [doi]