Abstract is missing.
- Introducing AI/ML Components into Software SystemsDominik Slezak. 5
- Process Mining as the Superglue between Data and Process ManagementWil M. P. van der Aalst. 7-8
- Software Architects are Dead! Long Live Software Architects!Frank Buschmann. 9
- Consistency Analysis of AUTOSAR Timing RequirementsSteffen Beringer, Heike Wehrheim. 15-26 [doi]
- Software Test Automation Maturity: A Survey of the State of the PracticeYuqing Wang, Mika V. Mäntylä, Serge Demeyer, Kristian Wiklund, Sigrid Eldh, Tatu Kairi. 27-38 [doi]
- Accelerating Interval Iteration for Expected Rewards in Markov Decision ProcessesMohammadSadegh Mohagheghi, Khayyam Salehi. 39-50 [doi]
- Codeless Web Testing using Selenium and Machine LearningDuyen Phuc Nguyen, Stephane Maag. 51-60 [doi]
- A Data-driven Methodology towards Interpreting Readability against Software PropertiesThomas Karanikiotis, Michail D. Papamichail, Ioannis Gonidelis, Dimitra Karatza, Andreas L. Symeonidis. 61-72 [doi]
- MVCLang: A Software Modeling Language for the Model-View-Controller Design PatternMert Ozkaya, Irem Fidandan. 75-83 [doi]
- A Case Study on Performance Optimization Techniques in Java ProgrammingCiprian Khlud, Cristian Frasinaru. 84-91 [doi]
- Analysing Large-Scale Scrum Practices with Respect to Quality Requirements ChallengesWasim Alsaqaf, Maya Daneva, Roel J. Wieringa. 92-103 [doi]
- Transformation- and Pattern-based State Machine Mining from Embedded C CodeAndreas Grosche, Burkhard Igel, Olaf Spinczyk. 104-115 [doi]
- Hybrid Context-awareness Modelling and Reasoning Approach for Microgrid's Intelligent ControlSoumoud Fkaier, Mohamed Khalgui, Georg Frey. 116-127 [doi]
- A Genetic Algorithm for Automated Test Generation for Satellite On-board Image Processing ApplicationsUlrike Witteck, Denis Grießbach, Paula Herber. 128-135 [doi]
- Decifarm: A Fuzzy Decision-support Environment for Smart FarmingJérôme Dantan, Hajer Baazaoui Zghal, Yann Pollet. 136-143 [doi]
- Towards Ubiquitous Learning Situations for Disabled LearnersNesrine Ben Salah, Inés Bayoudh Saâdi, Henda Ben Ghezala. 144-151 [doi]
- A Systematic Literature Mapping of Artificial Intelligence Planning in Software TestingLuis F. de Lima, Letícia M. Peres, André Ricardo Abed Grégio, Fabiano Silva. 152-159 [doi]
- Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack ActionsMonika Maidl, Gerhard Münz, Stefan Seltzsam, Marvin Wagner, Roman Wirtz, Maritta Heisel. 160-171 [doi]
- Toward a Correct Implementation of LwM2M Client with Event-BInès Mouakher, Fatma Dhaou, J. Christian Attiogbé. 172-179 [doi]
- Investigating the Gap between Scrum Theory and Practice in PakistanMuneeba Jilani, Naveed Ikram. 180-186 [doi]
- An Approach That Stimulates Architectural Thinking during Requirements Elicitation: An Empirical EvaluationPreethu Rose Anish, Maya Daneva, Smita Ghaisas, Roel J. Wieringa. 187-195 [doi]
- Detecting Model View Controller Architectural Layers using Clustering in Mobile CodebasesDragos Dobrean, Laura Diosan. 196-203 [doi]
- Visualization Method of Important Regions by Combination of Webpage Structures and Saliency MapsYuya Inagaki, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa. 204-211 [doi]
- Investigating on the Relationships between Design Smells Removals and RefactoringsLerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Kateryna Romanyuk. 212-219 [doi]
- Failsafe Mechanism to Hazard Analysis and Risk Mitigation in Unmanned Aerial Vehicle based on NCESMohamed Naija, Rihab Khemiri, Ernesto Exposito. 220-227 [doi]
- Metrics-driven DevSecOpsWissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca. 228-233 [doi]
- Data-centric Refinement of Database-Database Dependency Analysis of Database ProgramAngshuman Jana. 234-241 [doi]
- Emerging Design Patterns for Blockchain ApplicationsVijay Rajasekar, Shiv Sondhi, Sherif Saad, Shady Mohammed. 242-249 [doi]
- Formalization and Verification of Reconfigurable Discrete-event System using Model Driven Engineering and Isabelle/HOLSohaib Soualah, Yousra Hafidi, Mohamed Khalgui, Allaoua Chaoui, Laïd Kahloul. 250-259 [doi]
- Improving UI Test Automation using Robotic Process AutomationMarina Cernat, Adelina-Nicoleta Staicu, Alin Stefanescu. 260-267 [doi]
- A Function Dependency based Approach for Fault Localization with DArpita Dutta, Rajib Mall. 273-283 [doi]
- Fuzzy Multi-objective Optimization for Ride-sharing Autonomous Mobility-on-Demand SystemsRihab Khemiri, Ernesto Exposito. 284-294 [doi]
- Generic GA-PPI-Net: Generic Evolutionary Algorithm to Detect Semantic and Topological Biological CommunitiesMarwa Ben M'Barek, Amel Borgi, Sana Ben Hamida, Marta Rukoz. 295-306 [doi]
- Bee-route: A Bee Algorithm for the Multi-objective Vehicle Routing ProblemJamila Sassi, Inès Alaya, Moncef Tagina. 307-318 [doi]
- A Bee Colony Optimization Algorithm for the Long-Term Car Pooling ProblemMouna Bouzid, Inès Alaya, Moncef Tagina. 319-327 [doi]
- Superlinear and Bandwidth Friendly Geo-replication for Store-and-forward SystemsDaniel Brahneborg, Wasif Afzal, Adnan Causevic, Mats Björkman. 328-338 [doi]
- On the Improvement of R-TNCESs Verification using Distributed Cloud-based ArchitectureChoucha Chams Eddine, Mohamed Oussama Ben Salem, Mohamed Khalgui, Laïd Kahloul, Naïma Souâd Ougouti. 339-349 [doi]
- Verifying the Application of Security Measures in IoT Software Systems with Model LearningSébastien Salva, Elliott Blot. 350-360 [doi]
- An in-Depth Requirements Change Evaluation Process using Functional and Structural Size Measures in the Context of Agile Software DevelopmentHela Hakim, Asma Sellami, Hanêne Ben-Abdallah. 361-375 [doi]
- A Real-time Integration of Semantics into Heterogeneous Sensor Stream Data with Context in the Internet of ThingsBesmir Sejdiu, Florije Ismaili, Lule Ahmedi. 376-383 [doi]
- Temporal Convolutional Networks for Just-in-Time Software Defect PredictionPasquale Ardimento, Lerina Aversano, Mario Luca Bernardi, Marta Cimitile. 384-393 [doi]
- 3D Mobility, Resizing and Mobile Sink Nodes in Reconfigurable Wireless Sensor Networks based on Multi-agent Architecture under Energy Harvesting ConstraintsHanene Rouainia, Hanen Grichi, Laïd Kahloul, Mohamed Khalgui. 394-406 [doi]
- Tool Support for Green Android Development: A Systematic Mapping StudyIffat Fatima, Hina Anwar, Dietmar Pfahl, Usman Qamar. 409-417 [doi]
- Towards Secure Data Sharing Processes in Online Social Networks: TrustyGulsum Akkuzu, Benjamin Aziz, Mo Adda. 418-425 [doi]
- Big Data Streaming Platforms to Support Real-time AnalyticsEliana Fernandes, Ana Carolina Salgado, Jorge Bernardino. 426-433 [doi]
- A Retrospective Study of Taxonomy based Testing using Empirical Data from a Medical Device Software CompanyHamsini Ketheswarasarma Rajaram, John Loane, Silvana Togneri MacMahon, Fergal Hugh Mc Caffery. 434-442 [doi]
- Developer Driven Framework for Security and Privacy in the IoMTCeara Treacy, John Loane, Fergal McCaffery. 443-451 [doi]
- New Approach for Deadline Calculation of Periodic, Sporadic and Aperiodic Real-time Software TasksAicha Goubaa, Mohamed Khalgui, Georg Frey, Zhiwu Li. 452-460 [doi]
- Towards a Better Understanding of Genetic Operators for Ordering Optimization: Application to the Capacitated Vehicle Routing ProblemSana Ben Hamida, R. Gorsane, K. Gorsan Mestiri. 461-469 [doi]
- Exploiting Exclusive Higher Resolution to Enhance Response Time of Embedded Flash StorageJung Hoon Kim, Young-Sik Lee. 470-477 [doi]
- Blockchain Project Initiation and Execution: Decision-making Practices and PerceptionsBolatzhan Kumalakov, Yassynzhan Shakan. 478-483 [doi]
- Fault Detection and Co-design Recovery for Complex Task within IoT SystemsRadia Bendimerad, Kamel Smiri, Abderrazek Jemai. 484-491 [doi]
- Towards a Data Science Framework Integrating Process and Data Mining for Organizational ImprovementAndrea Delgado, Adriana Marotta, Laura González 0001, Libertad Tansini, Daniel Calegari. 492-500 [doi]
- Using Blockchain to Implement Traceability on Fishery Value ChainEstrela Ferreira Cruz, António Miguel Rosado da Cruz. 501-508 [doi]
- An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk ModelsGencer Erdogan, Åsmund Hugo, Antonio Álvarez Romero, Dario Varano, Niccolò Zazzeri, Anze Zitnik. 509-520 [doi]
- Application of Computer Vision Technologies for Automated Utility Meters ReadingMaria Spichkova, Johan Van Zyl. 521-528 [doi]
- RiverConc: An Open-source Concolic Execution Engine for x86 BinariesCiprian Paduraru, Bogdan Ghimis, Alin Stefanescu. 529-536 [doi]
- Towards Quantitative Trade-off Analysis in Goal Models with Multiple Obstacles using Constraint ProgrammingChristophe Ponsard, Robert Darimont. 537-543 [doi]
- On Decomposing Formal Verification of CTL-based Properties on IaaS Cloud EnvironmentChams Eddine Choucha, Mohamed Ramdani, Mohamed Khalgui, Laïd Kahloul. 544-551 [doi]
- Machine Learning Models for Automatic Labeling: A Systematic Literature ReviewTeodor Fredriksson, Jan Bosch, Helena Holmström Olsson. 552-561 [doi]
- Local Rotation Pattern: A Local Descriptor of Color TexturesHela Jebali, Noël Richard, Mohamed Naouai. 567-573 [doi]
- An Efficient GPGPU based Implementation of Face Detection Algorithm using Skin Color Pre-treatmentImene Guerfi, Lobna Kriaa, Leïla Azouz Saïdane. 574-585 [doi]
- IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log FilesPatrick Kubiak, Stefan Rass, Martin Pinzger 0001. 589-596 [doi]
- A Parallel Many-core CUDA-based Graph Labeling ComputationStefano Quer. 597-605 [doi]
- A Novel Approach for Android Malware Detection and Classification using Convolutional Neural NetworksAhmed Lekssays, Bouchaib Falah, Sameer Abufardeh. 606-614 [doi]
- Bi-Objective CSO for Big Data Scientific Workflows Scheduling in the Cloud: Case of LIGO WorkflowK. Bousselmi, Sana Ben Hamida, Marta Rukoz. 615-624 [doi]
- An Optimization Method for Entity Resolution in Databases: With a Case Study on the Cleaning of Scientific References in Patent DatabasesEmiel Caron. 625-632 [doi]