Abstract is missing.
- Perceived Quality of Artificial Intelligence in Smart Service Systems: A Structured ApproachJens Neuhüttler, Rudolf Fischer, Walter Ganz, Florian Urmetzer. 3-16 [doi]
- Towards Guidelines for Assessing Qualities of Machine Learning SystemsJulien Siebert, Lisa Jöckel, Jens Heidrich, Koji Nakamichi, Kyoko Ohashi, Isao Namba, Rieko Yamamoto, Mikio Aoyama. 17-31 [doi]
- Data Cleaning: A Case Study with OpenRefine and Trifacta WranglerDessislava Petrova-Antonova, Rumyana Tancheva. 32-40 [doi]
- NSP Dataset and Offline Signature VerificationDmitry V. Bakhteev, Roman Sudarikov. 41-49 [doi]
- Applying Machine Learning in Technical Debt Management: Future Opportunities and ChallengesAngeliki-Agathi Tsintzira, Elvira-Maria Arvanitou, Apostolos Ampatzoglou, Alexander Chatzigeorgiou. 53-67 [doi]
- On the Temporality of Introducing Code Technical DebtGeorgios Digkas, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, Paris Avgeriou. 68-82 [doi]
- Is Complexity of Re-test a Reason Why Some Refactorings Are Buggy? an Empirical PerspectiveSteve Counsell, Steve Swift, Mahir Arzoky, Giuseppe Destefanis. 83-90 [doi]
- Suggesting Descriptive Method Names: An Exploratory Study of Two Machine Learning ApproachesOleksandr Zaitsev, Stéphane Ducasse, Alexandre Bergel, Mathieu Eveillard. 93-106 [doi]
- Challenges for Layout Validation: Lessons LearnedSantiago Bragagnolo, Benoît Verhaeghe, Abderrahmane Seriai, Mustapha Derras, Anne Etien. 107-119 [doi]
- Towards Automated Taxonomy Generation for Grouping App Reviews: A Preliminary Empirical StudySaurabh Malgaonkar, Sherlock A. Licorish, Bastin Tony Roy Savarimuthu. 120-134 [doi]
- Zones of Pain: Visualising the Relationship Between Software Architecture and DefectsJean Petric, Tracy Hall, David Bowes. 135-143 [doi]
- An Empirical Study on the Persistence of SpotBugs Issues in Open-Source Software EvolutionLuigi Lavazza, Davide Tosi, Sandro Morasca. 144-151 [doi]
- Applying Continual Service Improvement Practices to Study Quality of Healthcare Information System Services: A Case StudySanna Heikkinen, Marko Jäntti, Kaija Saranto. 155-168 [doi]
- A Personal Opinion Survey on Process Compliance Checking in the Safety ContextJulieth Patricia Castellanos Ardila, Barbara Gallina. 169-183 [doi]
- Systematic Literature Review of DevOps ModelsMonika Gasparaite, Kristina Naudziunaite, Saulius Ragaisis. 184-198 [doi]
- Measuring the Maturity of BizDevOpsEduardo Sanjurjo, Oscar Pedreira, Félix García 0001, Mario Piattini. 199-210 [doi]
- Process Compliance Re-Certification Efficiency Enabled by EPF-C $\circ $ BVR-T: A Case StudyBarbara Gallina, Aleksandër Pulla, Antonela Bregu, Julieth Patricia Castellanos Ardila. 211-219 [doi]
- Design of Secure Coding Challenges for Cybersecurity Education in the IndustryTiago Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Alae Zouitni. 223-237 [doi]
- Q-Scrum: A Framework for Quality in Safety-Critical DevelopmentJohnny Cardoso Marques, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 238-245 [doi]
- Reverse Engineering of Quantum Programs Toward KDM ModelsLuis Jiménez-Navajas, Ricardo Pérez-Castillo, Mario Piattini. 249-262 [doi]
- Math and Physics Tools for Quality Quantum ProgrammingEzequiel Murina. 263-273 [doi]
- Adapting COBIT for Quantum Computing GovernanceMiguel Ángel Blanco, Mario Piattini. 274-283 [doi]
- Quantum Agile Development FrameworkGuillermo José Hernández González, Claudio Andrés Paradela. 284-291 [doi]
- On the Source Code Structure of Quantum Code: Insights from Q# and QDKMiguel-Ángel Sicilia, Salvador Sánchez Alonso, Marçal Mora Cantallops, Elena García Barriocanal. 292-299 [doi]
- Towards a Framework for Improving Experiments on DoS AttacksMarta Catillo, Antonio Pecchia, Umberto Villano. 303-316 [doi]
- A Cloud SecDevOps Methodology: From Design to TestingValentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giovanni Salzillo. 317-331 [doi]
- Accountability in the A Posteriori Access Control: A Requirement and a MechanismFarah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud. 332-342 [doi]
- Secure Agile Software Development: Policies and Practices for Agile TeamsCarlos Magnum M. Bezerra, Suzana Cândido de Barros Sampaio, Marcelo L. M. Marinho. 343-357 [doi]
- A Privacy-By-Design Architecture for Indoor Localization SystemsPaolo Barsocchi, Antonello Calabrò, Antonino Crivello, Said Daoudagh, Francesco Furfari, Michele Girolami, Eda Marchetti. 358-366 [doi]
- Reverse Engineering of Android Applications: REiMPAcTMarco A. Gonçalves, Ana C. R. Paiva. 369-382 [doi]
- An Approach and a Prototype Tool for Generating Executable IoT System Test CasesDario Olianas, Maurizio Leotta, Filippo Ricca. 383-398 [doi]
- Applied Statistical Model Checking for a Sensor Behavior AnalysisSalim Chehida, Abdelhakim Baouya, Saddek Bensalem, Marius Bozga. 399-411 [doi]
- Preliminary Experiences in Requirements-Based Security TestingJoão Miranda, Ana C. R. Paiva, Alberto Rodrigues da Silva. 412-425 [doi]
- Testing Chatbots with CharmSergio Bravo-Santos, Esther Guerra, Juan de Lara. 426-438 [doi]
- A Dataset of Regressions in Web Applications Detected by End-to-End TestsÓscar Soto-Sánchez, Michel Maes-Bermejo, Micael Gallego, Francisco Gortázar. 439-448 [doi]
- Towards Failure Prediction in Scientific Workflows Using Stochastic Petri Nets and Dynamic LogicBruno Lopes, Daniel de Oliveira 0001. 449-456 [doi]
- From Rigorous Requirements and User Interfaces Specifications into Software Business ApplicationsIvo Gamito, Alberto Rodrigues da Silva. 459-473 [doi]
- The Human Factors of the Agile Software TesterLucas Paruch, Viktoria Stray, Raluca Florea. 474-487 [doi]
- An Experience with the Application of Three NLP Tools for the Analysis of Natural Language RequirementsMonica Arrabito, Alessandro Fantechi, Stefania Gnesi, Laura Semini. 488-498 [doi]