Abstract is missing.
- Federated Learning, Knowledge Transfer, and Knowledge Distillation: Developments with Information GranulesWitold Pedrycz. 5
- Breathing Life into Models: The Next Generation of Enterprise ModelingPeter Fettke, Wolfgang Reisig. 7-14 [doi]
- Program Verification: A 70+-Year HistoryMoshe Y. Vardi. 15
- Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart GridGencer Erdogan, Inger Anne Tøndel, Shukun Tokas, Michele Garau, Martin Gilje Jaatun. 21-32 [doi]
- TASTING: Reuse Test-case Execution by Global AST HashingTobias Landsberg, Christian Dietrich 0001, Daniel Lohmann. 33-45 [doi]
- Generalized Mutant SubsumptionSamia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili. 46-56 [doi]
- Minimum Size Build Environment Sets and Graph ColoringStephen R. Tate, Bo Yuan. 57-67 [doi]
- A Vulnerability Introducing Commit Dataset for Java: An Improved SZZ based ApproachTamás Aladics, Péter Hegedüs, Rudolf Ferenc. 68-78 [doi]
- A Mechanism for Automatically Extracting Reusable and Maintainable Code Idioms from Software RepositoriesArgyrios Papoudakis, Thomas Karanikiotis, Andreas L. Symeonidis. 79-90 [doi]
- Software Enhancement Effort Estimation using Stacking Ensemble Model within the Scrum Projects: A Proposed Web InterfaceZaineb Sakhrawi, Asma Sellami, Nadia Bouassida. 91-100 [doi]
- A Hybrid Architecture for the Incremental Migration of a Web Front-endBenoît Verhaeghe, Anas Shatnawi, Abderrahmane Seriai, Anne Etien, Nicolas Anquetil, Mustapha Derras, Stéphane Ducasse. 101-110 [doi]
- Using Hexagonal Architecture for Mobile ApplicationsRobin Nunkesser. 113-120 [doi]
- A Tool and an Approach for the Automatic Generation of Digital NetworksFrancesco Pilotti, Giorgio Campea, Daniela D'Alessandro, Daniele Di Valerio, Gaetanino Paolone. 121-128 [doi]
- Is There Any Correlation between Refactoring and Design Smell Occurrence?Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano. 129-136 [doi]
- Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application RecordingsPreston Moore, Thomas Wies, Marc Waldman, Phyllis G. Frankl, Justin Cappos. 137-145 [doi]
- Constructive Model Inference: Model Learning for Component-based Software ArchitecturesBram Hooimeijer, Marc Geilen, Jan Friso Groote, Dennis Hendriks, Ramon R. H. Schiffelers. 146-158 [doi]
- An Ensemble Classifier based Method for Effective Fault LocalizationArpita Dutta, Rajib Mall. 159-166 [doi]
- Connections between Language Semantics and the Query-based Compiler ArchitecturePeter Lenkefi, Gergely Mezei. 167-174 [doi]
- Using Procedure Cloning for Performance Optimization of Compiled Dynamic LanguagesRobert Husák, Jan Kofron, Jakub Mísek, Filip Zavoral. 175-186 [doi]
- COAST: A Conflict-free Replicated Abstract Syntax TreeAäron Munsters, Angel Luis Scull Pupo, Jens Nicolay. 187-196 [doi]
- Statistical and Requirement Analysis for an IDM Tool for Emergency Department SimulationJuan David Mogollon, Virginie Goepp, Oscar Avila, Roland De Guio. 197-204 [doi]
- Air Quality Monitoring of Bangladesh (AQM): Data Driven Analysis SystemNoureen Islam, Noor-E.-Sadman, Mahmudul Islam, Mahady Hasan. 205-212 [doi]
- Test Case Backward Generation for Communicating Systems from Event LogsSébastien Salva, Jarod Sue. 213-220 [doi]
- Agile Requirements Engineering's ChallengesEzeldin Sherif, Waleed Helmy, Galal Hassan. 221-225 [doi]
- Formal Notations and Terminology for Users' Feedback and Its Specialization for Interactive Fault LocalizationGergõ Balogh, Péter Soha. 226-233 [doi]
- A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network TrafficZujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu-Nghia Nguyen, Edgardo Montes de Oca. 234-241 [doi]
- Incorporating Privacy Requirements in Smart Communities for Older Adults: A Research VisionFauzia Khan, Ishaya Gambo. 242-249 [doi]
- FUSION: Feature-based Processing of Heterogeneous Documents for Automated Information ExtractionMichael Sildatke, Hendrik Karwanni, Bodo Kraft, Albert Zündorf. 250-260 [doi]
- Empirical Evaluation of Reusability ModelsAndreea Cristina Lung, Simona Motogna, Vladiela Petrascu. 265-275 [doi]
- Multi-party Contract Management for MicroservicesZakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, Mohammad Askar. 276-287 [doi]
- Using Deep Reinforcement Learning to Build Intelligent Tutoring SystemsCiprian Paduraru, Miruna Paduraru, Stefan Iordache. 288-298 [doi]
- Adding Support for Reference Counting in the D Programming LanguageRazvan Nitu, Eduard Staniloiu, Razvan Deaconescu, Razvan Rughinis. 299-306 [doi]
- Data Partitioning Strategies for Simulating non-IID Data Distributions in the DDM-PS-Eval Evaluation PlatformMikolaj Markiewicz, Jakub Koperwas. 307-318 [doi]
- A Medical Information System for Personalized Rehabilitation after Ankle Inversion TraumaJonathan Neugebauer, Rosemary Dubbeldam, My Linh Pham, Lokman Beser, Luka Gerlach, Yu Yuan Lee, Herbert Kuchen. 319-330 [doi]
- Timing Model for Predictive Simulation of Safety-critical SystemsEmilia Cioroaica, José Miguel Blanco, Bruno Rossi 0001. 331-339 [doi]
- Multi-factor Prediction and Parameters Identification based on Choquet Integral: Smart Farming ApplicationYann Pollet, Jérôme Dantan, Hajer Baazaoui Zghal. 340-348 [doi]
- Reconfigurable Wireless Sensor Networks Simulator (RWSNSim): A New Discrete-event SimulatorHanene Rouainia, Hanen Grichi, Laïd Kahloul, Mohamed Khalgui. 349-361 [doi]
- Increasing the Autonomy of the Unmanned Aerial PlatformWojciech Stecz, Marcin Chodnicki. 365-373 [doi]
- Comparing Deep Learning Models for Multi-label Classification of Arabic Abusive Texts in Social MediaSalma Abid Azzi, Chiraz Ben Othmane Zribi. 374-381 [doi]
- Performance Analysis of an Embedded System for Target Detection in Smart Crosswalks using Machine LearningJosé Manuel Lozano Domínguez, J. M. Corralejo Mora, Iñaki Fernández de Viana Gonzalez, Tomás de Jesús Mateo Sanguino, Manuel J. Redondo González. 382-389 [doi]
- Building Roger: Technical Challenges While Developing a Bilingual Corpus Management and Query PlatformCosmin Striletchi, Madalina Chitez, Karla Csürös. 390-398 [doi]
- Deriving UML Logic Architectures of Software Product based on a Cloud Reference Architecture: An Experience ReportFrancisco Morais, Tiago F. Pereira, Carlos E. Salgado, Ana Lima, Manuel Pereira, João Oliveira, António Sousa, Helena Rodrigues. 399-409 [doi]
- Adherence to Secure Software Development LifecycleAlaa Omar, Ahmad Alsadeh, Mamoun Nawahdah. 410-417 [doi]
- Customer Journey Analytics: A Model for Creating Diagnostic Insights with Process MiningDaan Weijs, Emiel Caron. 418-424 [doi]
- Continuous Procedural Network of Roads Generation using L-Systems and Reinforcement LearningCiprian Paduraru, Miruna Paduraru, Stefan Iordache. 425-432 [doi]
- A Hybrid Complexity Metric in Automatic Software Defects PredictionLaura Diana Cernau, Laura Diosan, Camelia Serban. 433-440 [doi]
- A Pipeline-oriented Processing Approach to Continuous and Long-term Web ScrapingStefan Huber, Fabio Knoll, Mario Döller. 441-448 [doi]
- Automatic Generation of Interoperability Connectors using Software Product Lines EngineeringBoubou Thiam Niang, Giacomo Kahn, Nawel Amokrane, Yacine Ouzrout, Hamza Sahli, Mustapha Derras, Jannik Laval. 449-456 [doi]
- Blockchain Patterns in Critical Infrastructures: Limitations and RecommendationsHind Bangui, Barbora Buhnova. 457-468 [doi]
- Semantic-based Data Integration and Mapping Maintenance: Application to Drugs DomainMouncef Naji, Maroua Masmoudi, Hajer Baazaoui Zghal, Chirine Ghedira Guegan, Vlado Stankovski, Dan Vodislav. 469-477 [doi]
- A Methodology for Detecting Programming Languages in Stack Overflow QuestionsAman Swaraj, Sandeep Kumar. 478-483 [doi]
- Secure Software Architectural Patterns Designed with Secure ConnectorsMichael E. Shin, TaegHyun Kang, Hassan Gomaa. 484-491 [doi]
- Advancing Security and Data Protection for Smart Home Systems through Blockchain TechnologiesCiprian Paduraru, Rares Cristea, Alin Stefanescu. 492-499 [doi]
- Interpretable Malware Classification based on Functional AnalysisMiles Q. Li, Benjamin C. M. Fung. 500-507 [doi]
- Applying and Extending FEMMP to Select an Adequate MBSE MethodologyChristophe Ponsard, Valéry Ramon. 508-515 [doi]
- Resilient Conflict-free Replicated Data Types without Atomic BroadcastDaniel Brahneborg, Wasif Afzal, Saad Mubeen. 516-523 [doi]
- A Lightweight Software Product Quality Evaluation MethodGiuseppe Lami, Giorgio Oronzo Spagnolo. 524-531 [doi]
- Multiparty-session-types Coordination for Core ErlangLavinia Egidi, Paola Giannini, Lorenzo Ventura. 532-541 [doi]
- Agile Methodology in Online Learning and How It Can Improve Communication: A Case StudyManuela Petrescu, Adrian Sterca. 542-549 [doi]
- A SWOT Analysis of Software Technologies for Driving Museum Digital TransformationChristophe Ponsard, Ward Desmet. 550-556 [doi]
- Process and Organizational Data Integration from BPMS and Relational/NoSQL Sources for Process MiningAndrea Delgado, Daniel Calegari. 557-566 [doi]
- A New Software Architecture for the Wise Object Framework: Multidimensional Separation of ConcernsSylvain Lejamble, Ilham Alloui, Sébastien Monnet, Flavien Vernier. 567-574 [doi]
- Dynamic Slotted Network Coding ProtocolMohammed Aissaoui 0001, Chiraz Houaidia, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane. 579-590 [doi]
- Towards Automatic Block Size Tuning for Image Processing Algorithms on CUDAImene Guerfi, Lobna Kriaa, Leïla Azouz Saïdane. 591-601 [doi]
- Hybrid Time Distributed CNN-transformer for Speech Emotion RecognitionAnwer Slimi, Henri Nicolas, Mounir Zrigui. 602-611 [doi]
- Deep Learning CNN-LSTM Approach for Identifying Twitter Users Suffering from Paranoid Personality DisorderMourad Ellouze, Seifeddine Mechti, Lamia Hadrich Belguith. 612-621 [doi]
- Coordinated Access to Shared Data Sources for Geo-replicated State MachinesEnes Bilgin, Tolga Ovatman. 625-629 [doi]
- Performance Evaluation of Call Admission Control Strategy in Cloud Radio Access Network using Formal MethodsMaroua Idi, Sana Younès, Riadh Robbana. 630-640 [doi]
- Discovering Vulnerabilities and Patches for Open Source SecurityTamara Gunkel, Thomas Hupperich. 641-648 [doi]
- Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?Henry Hosseini, Julian Rengstorf, Thomas Hupperich. 649-656 [doi]
- Approximate Dictionary Searching at a Scale using Ternary Search Trees and Implicit Levenshtein AutomataPeter Schneider-Kamp. 657-662 [doi]