Abstract is missing.
- User-centric Techniques for Big Data ExplorationPanos K. Chrysanthis.
- Actor-Oriented Programming for the Internet of ThingsGul Agha.
- Answering Who/When, What, How, Why through Constructing Data Graph, Information Graph, Knowledge Graph and Wisdom GraphLixu Shao, Yucong Duan, Xiaobing Sun, Honghao Gao, Donghai Zhu, Weikai Miao. 1-6 [doi]
- BPaaS: A Platform for Artifact-centric Business Process Customization in Cloud ComputingMin Gao, Yuyu Yin, Ying Li, Xingfei Wang, Lipeng Guo, Zaidie Chen. 7-11 [doi]
- Applying Probability Model to The Genetic Algorithm Based Cloud Rendering Task SchedulingGuobin Zhang, Huahu Xu, Honghao Gao, Ankang Liu. 12-17 [doi]
- Substitutability-Based Version Propagation to Manage the Evolution of Three-Level Component-Based ArchitecturesAlexandre Le Borgne, David Delahaye, Marianne Huchard, Christelle Urtado, Sylvain Vauttier. 18-23 [doi]
- Towards a Models Traceability and Synchronization Approach of an Enterprise ArchitectureJosé Rogério Poggio Moreira, Rita Suzana Pitangueira Maciel. 24-29 [doi]
- Infrastructure Based on Template Engines for Automatic Generation of Source Code for Self-adaptive Software DomainGabriele Salgado Benato, Frank José Affonso, Elisa Yumi Nakagawa. 30-35 [doi]
- A Knowledge Engineering Process for the Development of Argumentation Schemes for Risk Management in Software ProjectsDenise Da Luz Siqueira, Lisandra M. Fontoura, Rafael H. Bordini, Luís A. Lima Silva. 36-41 [doi]
- Argumentation Schemes for the Collaborative Debate of Requirement Risks in Software ProjectsDenise Da Luz Siqueira, Lisandra M. Fontoura, Rafael H. Bordini, Luís A. Lima Silva. 42-47 [doi]
- An empirical study on software engineering and software startups: Findings from cases in an innovation ecosystemLeandro Bento Pompermaier, Rafael Chanin, Afonso Sales, Kellen Fraga, Rafael Prikladnicki. 48-51 [doi]
- POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic ComprehensionFeng Guo, Guangquan Xu, Ning Zhang, Kaili Qiu. 52-56 [doi]
- Logical Tree and Complex Event Processing in Power SystemsJuntao Li, Yu Huang. 57-60 [doi]
- I/O Performance Isolation Analysis and Optimization on Linux ContainersLi Zhou, Yifan Zhang, Youhuizi Li, Na Yun, Lifeng Yu. 61-66 [doi]
- A Framework to Build Bayesian Networks to Assess Scrum-based Development MethodsMirko Perkusich, Kyller Costa Gorgônio, Hyggo O. Almeida, Angelo Perkusich. 67-73 [doi]
- Ordering the Product Backlog in Agile Software Development Projects: A Systematic Literature ReviewAna Silva, André Silva, Thalles Araújo, Renan Barbosa, Felipe Barbosa Araújo Ramos, Antonio Alexandre Moura Costa, Mirko Perkusich, Ednaldo Dilorenzo. 74-80 [doi]
- BPL-Framework 2.0: Support tool for Creation and Instantiation of Business Process LinesDelacyr Almeida Monteiro Ferreira, Débora Maria Barroso Paiva, Maria Istela Cagnin. 81-84 [doi]
- Practical similarities and differences between Systematic Literature Reviews and Systematic Mappings: a tertiary studyBianca Napoleão, Katia Romero Felizardo, Érica Ferreira de Souza, Nandamudi L. Vijaykumar. 85-90 [doi]
- An Experience Report on Update of Systematic Literature ReviewsLina Maria Garcés Rodriguez, Katia Romero Felizardo, Lucas B. R. Oliveira, Elisa Yumi Nakagawa. 91-96 [doi]
- System of Systems Requirements: A Systematic Literature Review using SnowballingRenata Martinuzzi de Lima, Daniel de Vargas, Lisandra Manzoni Fontoura. 97-100 [doi]
- Authenticity Protection in Outsourced DatabaseJun Ye, Zheng Xu, Yong Ding, Qin Wang. 101-104 [doi]
- Constructing Drug Ingredient Interaction Network to Ensure Medication SecurityZhiren Mao, Pingyi Zhou, Jiaxiang Zhong, Luojia Jiang, Chongzhi Deng, Jin Liu. 105-110 [doi]
- Is the Number of Faults Helpful for Cross-Company Defect Prediction?Yiyang Jing, JianSheng Zhang, Jin Liu. 111-116 [doi]
- Using Class Imbalance Learning for Cross-Company Defect PredictionXiao Yu, Mingsong Zhou, Xu Chen, Lijun Deng. 117-122 [doi]
- Improving Bug Triage with Relevant SearchXinyu Peng, Pingyi Zhou, Jin Liu, Xu Chen. 123-128 [doi]
- Concurrent Call Level Interfaces Based on an Embedded Thread Safe Local Memory StructureÓscar Mortágua Pereira, Rui L. Aguiar. 129-134 [doi]
- Parallel Execution Optimization of GPU-aware Components in Embedded SystemsGabriel Campeanu. 135-141 [doi]
- New Optimal Solutions for Real-Time Scheduling of Operating System Tasks Based on Neural NetworksGhofrane Rehaiem, Hamza Gharsellaoui, Samir Ben Ahmed. 142-148 [doi]
- Model Construction and Data Management of Running Log in Supporting SaaS Software Performance AnalysisRui Wang, Shi Ying, Chengai Sun, Hongyan Wan, Huo-lin Zhang, Xiangyang Jia. 149-154 [doi]
- Conceptual Software Design: Algebraic Axioms for Conceptual IntegrityIaakov Exman, Phillip Katz. 155-160 [doi]
- A Method to Analyze High Level Petri Nets using SPIN Model CheckerDewan Mohammad Moksedul Alam, Xudong He. 161-166 [doi]
- Algebraic Formalization and Verification of PKMv3 Protocol using MaudeJia She, Xiaoran Zhu, Min Zhang. 167-172 [doi]
- A Formal Design Model for Cloud ServicesMeng Sun, Guirong Fu. 173-178 [doi]
- Exploring the Influence of Feature Selection Techniques on Bug Report PrioritizationYabin Wang, Tieke He, Weiqiang Zhang, Chunrong Fang, Bin Luo. 179-184 [doi]
- Analyzing Variability in Product Families through Canonical Feature DiagramsJessie Carbonnel, Marianne Huchard, Clémentine Nebut. 185-190 [doi]
- An Empirical Study on the Equivalence and Stability of Feature Selection for Noisy Software Defect DataZhou Xu, Jin Liu, Zhen Xia, Peipei Yuan. 191-196 [doi]
- A Membership-based Multi-dimension Hierarchical Deep Neural Network Approach for Fault DiagnosisLiangliang Li, Guilan Dai, Yong Zhang. 197-200 [doi]
- Context Model Acquisition from Spoken UtterancesSebastian Weigelt, Tobias Hey, Walter F. Tichy. 201-206 [doi]
- A Comparison of Two Model Transformation Frameworks for Multiple-viewed Software Requirements AcquisitionBingyang Wei. 207-212 [doi]
- Selection and prioritization of software requirements using the Verbal Decision Analysis paradigmPaulo Alberto Melo Barbosa, Plácido Rogério Pinheiro, Francisca Raquel de Vasconcelos Silveira, Marum Simão Filho. 213-217 [doi]
- Multi-Objective Crowd Worker Selection in Crowdsourced TestingQiang Cui, Song Wang, Junjie Wang, Yuanzhe Hu, Qing Wang, Mingshu Li. 218-223 [doi]
- Reuse of Fixture Setup between Test ClassesLucas Pereira da Silva, Patricia Vilain. 224-229 [doi]
- An Ontology-based Knowledge Management System for Software TestingShanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang. 230-235 [doi]
- A Framework for Developing Cyber Physical SystemsXudong He, Zhijiang Dong, Heng Yin, Yujian Fu. 236-241 [doi]
- Towards Code Generation from Design ModelsPengyi Li, Jing Sun 0002, Hai Wang. 242-247 [doi]
- Self-adaptive Systems Driven by Runtime ModelsMarcello Thiry, Roger A. Schmidt. 248-253 [doi]
- Extending HL7 RIM Model to Capture Physical Activity DataRishi Saripalle. 254-259 [doi]
- An Approach to Mobile Application Testing Based on Natural Language ScriptingChuanqi Tao, Jerry Gao, Tiexin Wang. 260-265 [doi]
- Random GUI Testing of Android Application Using Behavioral ModelWoramet Muangsiri, Shingo Takada 0001. 266-271 [doi]
- Localization of Linearizability Faults on the Coarse-grained LevelZhenya Zhang, Peng Wu, Yu Zhang. 272-277 [doi]
- Predicate Interpretation Analysis Based on SootChunrong Fang, Qingkai Shi, Yang Feng, Zicong Liu, Xiaofang Zhang, Baowen Xu. 278-282 [doi]
- Generating Software Agents for Data Mining: An Example for the Health Data AreaReinier Morejon, Marx L. Viana, Carlos José Pereira de Lucena. 283-288 [doi]
- Distributed API Protocol MiningDeng Chen, Yanduo Zhang, Wei Wei, Rongcun Wang, Xiaolin Li, Shixun Wang, Rubing Huang. 289-294 [doi]
- Automatic Type Inference for Proactive Misconfiguration PreventionXiangyang Xu, Shanshan Li, Yong Guo, Wei Dong, Li Wang, Xiangke Liao. 295-300 [doi]
- Combing Data Filter and Data Sampling for Cross-Company Defect Prediction: An Empricial StudyXiao Yu, Man Wu, Yan Zhang, Mandi Fu. 301-306 [doi]
- SnippetGen: Enhancing the Code Search via Intent PredictingQing Huang, Xudong Wang, Yangrui Yang, Hongyan Wan, Rui Wang, Guoqing Wu. 307-312 [doi]
- LaSaS: an Aggregated Search based Graph Matching ApproachGhizlane Echbarthi, Hamamache Kheddouci. 313-318 [doi]
- An Event Search Platform Using Machine LearningMarcelo Rodrigues, Rodrigo Rocha Silva, Jorge Benardino. 319-322 [doi]
- The effects of classifiers diversity on the accuracy of stackingMariele Lanes, Eduardo N. Borges, Renata Galante. 323-328 [doi]
- Discovering Hidden Interests from Twitter for Multidimensional AnalysisDongjin Yu, Jingchao Sun, Yiyu Wu, Zhiyong Ni, Youhuizi Li. 329-334 [doi]
- Software Defect Prediction Using Dictionary LearningHongyan Wan, Guoqing Wu, Ming Cheng, Qing Huang, Rui Wang, Mengting Yuan. 335-340 [doi]
- Map-Reduce based Link Prediction for Large Scale Social NetworkRanjan Kumar Behera, Abhishek Sai Sukla, Sambit Mahapatra, Santanu Kumar Rath, Bibhudatta Sahoo, Swapan Bhattacharya. 341-344 [doi]
- A Practical Study on Quality Evaluation for Age Recognition SystemsChuanqi Tao, Chen Hao, Jerry Gao, Tiexin Wang, Wanzhi Wen. 345-350 [doi]
- FSCR: A Feature Selection Method for Software Defect PredictionXiao Yu, Ziyi Ma, Chuanxiang Ma, Yi Gu, Ruiqi Liu, Yan Zhang. 351-356 [doi]
- An empirical study on the influence of context in computing thresholds for Chidamber and Kemerer metricsLeonardo Da Costa Santos, Renata M. Saraiva, Mirko Perkusich, Hyggo O. Almeida, Angelo Perkusich. 357-362 [doi]
- Who Will be Interested in? A Contributor Recommendation Approach for Open Source ProjectsXunhui Zhang, Tao Wang, Gang Yin, Cheng Yang, Huaimin Wang. 363-369 [doi]
- A GQM-based Approach for Software Process Patterns RecommendationZhangyuan Meng, Cheng Zhang, Beijun Shen, Yin Wei. 370-375 [doi]
- Cold-Start Developer Recommendation in Software Crowdsourcing: A Topic Sampling ApproachYu Yang, Wenkai Mo, Beijun Shen, Yuting Chen. 376-381 [doi]
- Automated Software Security Requirements Recommendation Based on FT-SR ModelJiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. 382-385 [doi]
- A Reinforced Hungarian Algorithm for Task Allocation in Global Software DevelopmentXiao Yu, Man Wu, Xiangyang Jia, Ye Liu. 386-391 [doi]
- A Data Filtering Method Based on Agglomerative ClusteringXiao Yu, Peipei Zhou, JianSheng Zhang, Jin Liu. 392-397 [doi]
- An Ontology-based Approach to Semantic Health Resource Knowledge Base Development for Crisis Preparation Decision Support SystemMin Zhu, Jia Qu, Ruxue Chen, Xinzhi Wang, Quanyi Huang, Shaobo Zhong. 398-403 [doi]
- Constant Evaluation of L2 Students' English Witing AbilityLi Li. 404-409 [doi]
- Knowledge Discovery Process for Description of Spatially Referenced ClustersGiovanni Daián Rottoli, Hernán Merlino, Ramón García-Martínez. 410-415 [doi]
- Conceptual Integrity of Software Systems: Architecture, Abstraction and AlgebraIaakov Exman. 416-421 [doi]
- Conceptual Integrity without ConceptsGiorgio Grasso, Alice Plebe. 422-427 [doi]
- Extraction of Patterns Using NLP: Genetic DeafnessAnabel Fraga, Valentin Moreno, Eugenio Parra, Javier Garcia. 428-431 [doi]
- Extending Software Systems While Keeping Conceptual IntegrityReuven Yagel. 432-435 [doi]
- A Comparative Study of Software Bugs in Clone and Non-Clone CodeJudith F. Islam, Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider. 436-443 [doi]
- The Relationship between Traceable Code Patterns and Code SmellsZadia Codabux, Kazi Zakia Sultana, Byron J. Williams. 444-449 [doi]
- Refactoring Object-Oriented Applications towards a better Decoupling and Instantiation UnanticipationSoumia Zellagui, Chouki Tibermacine, Hinde-Lilia Bouziane, Abdelhak-Djamel Seriai, Christophe Dony. 450-455 [doi]
- Delphi: A Source-code Analysis and Manipulation System for BricklayerVictor Winter, Betty Love, Chris Harris. 456-461 [doi]
- A Simpler and More Direct Derivation of System Reliability Using Markov Chain Usage ModelsLan Lin, Yufeng Xue, Fengguang Song. 462-466 [doi]
- A Process to Calculate the Uncertainty of Software Metrics-based Models Using Bayesian NetworksRenata M. Saraiva, Mirko Perkusich, Hyggo O. Almeida, Angelo Perkusich. 467-472 [doi]
- Safe Incremental Design of UML ArchitecturesAnne-lise Courbis, Thomas Lambolais, Thanh-Hung Nguyen. 473-476 [doi]
- Enhancing sample-based scheduler with collaborate-state in big data clusterChunliang Hao, Celia Chen, Jie Shen, Mingshu Li, Barry W. Boehm. 477-480 [doi]
- A Stratification and Sampling Model for Bellwether Moving WindowSolomon Mensah, Jacky Keung, Michael Franklin Bosu, Kwabena Ebo Bennin, Patrick Kwaku Kudjo. 481-486 [doi]
- Security Requirements for Tolerating Security FailuresMichael E. Shin, Don Pathirage. 487-490 [doi]
- SemHunt: Identifying Vulnerability Type with Double Validation in Binary CodeYao Li, Weiyang Xu, Yong Tang, Xianya Mi, Baosheng Wang. 491-494 [doi]
- A Tailor made System for providing Personalized ServicesMario Casillo, Francesco Colace, Saverio Lemma, Marco Lombardi, Francesco Pascale. 495-500 [doi]
- Fault Interference and Coupling EffectChunrong Fang, Yang Feng, Qingkai Shi, Zicong Liu, Shuying Li, Baowen Xu. 501-506 [doi]
- Reranking-based Crash Report DeduplicationAkira Moroo, Akiko Aizawa, Takayuki Hamamoto. 507-510 [doi]
- Analyzing duplication on code generated by Scaffolding frameworks for Graphical user interfacesAndré M. Andrade, Rodrigo A. Vilar, Anderson A. Lima, Hyggo O. Almeida, Angelo Perkusich. 511-516 [doi]
- Dedicated Static Sampling Pointcut DesignatorsAmjad Nusayr. 517-520 [doi]
- A Publish-Subscribe based Architecture for Testing Multiagent SystemsNathalia Moraes do Nascimento, Carlos Juliano M. Viana, Arndt von Staa, Carlos Lucena. 521-526 [doi]
- Practical Reasoning in an Argumentation-based Decision BDI Agent: a Case Study for Participatory Management of Protected AreasPedro Elkind Velmovitsky, Jean-Pierre Briot, Marx L. Viana, Carlos Lucena. 527-530 [doi]
- Working Towards a BDI‑Agent Based on Personality Traits to Improve Normative Conflicts SolutionPaulo Henrique Cardoso Alves, Marx L. Viana, Carlos José Pereira de Lucena. 531-534 [doi]
- A Virtual Environment for Problem-Based Learning in Software Engineering EducationBruno Bessa, Simone Santos. 535-540 [doi]
- Knowledge-based Learning Content Generation in the STUDYBATTLES EnvironmentAmal Shehadeh, Alexander Felfernig, Michael Jeran, Martin Stettinger, Stefan Reiterer. 541-546 [doi]
- Development of a Data Mining Education Framework for Visualization of Data in Distance Learning EnvironmentsAngelo F. D. Gonçalves, Alexandre M. A. Maciel, Rodrigo L. Rodrigues. 547-550 [doi]
- Morpheme-Enhanced Spectral Word EmbeddingJiawei Liu. 551-556 [doi]
- A Lightweight Approach for Evaluating Sufficiency of OntologiesLalit Sanagavarapu, Sai Gollapudi, Sridhar Chimalakonda, Y. Raghu Reddy, Venkatesh Choppella. 557-561 [doi]
- Understanding the Impact of Using Ontology Matching Tools for Validating Feature Models with Domain KnowledgeNada Mahmoud, Haitham S. Hamza, Yasser M. K. Omar. 562-565 [doi]
- Towards a Model-Driven Platform for Evidence based Public Health Policy MakingMarios Prasinos, George Spanoudakis, Dimitrios D. Koutsouris. 566-571 [doi]
- Automatic Classification of Review Comments in Pull-based Development ModelZhixing Li, Yue Yu, Gang Yin, Tao Wang, Qiang Fan, Huaimin Wang. 572-577 [doi]
- Mining Developer Behavior Across GitHub and StackOverflowYunxiang Xiong, Zhangyuan Meng, Beijun Shen, Wei Yin. 578-583 [doi]
- Exploring Identical Users on GitHub and Stack OverflowTakahiro Komamizu, Yasuhiro Hayase, Toshiyuki Amagasa, Hiroyuki Kitagawa. 584-589 [doi]
- D3TraceView: A Traceability Visualization ToolGilberto A. Cysneiros Filho, Andrea Zisman. 590-595 [doi]
- Analyzing Complex Data in Motion at Scale with Temporal GraphsThomas Hartmann 0001, François Fouquet, Matthieu Jimenez, Romain Rouvoy, Yves Le Traon. 596-601 [doi]
- MAGICIAN: Model-based design for optimizing the configuration of data-centersPablo C. Cañizares, Alberto Núñez, Juan de Lara. 602-607 [doi]
- Characterizing Relationships for System Dynamics Models Supported by Exploratory Data Analysis - A Conceptualizing Approach about the Meeting Diversity in Student Software ProjectsFabian Kortum, Jil Klünder, Kurt Schneider. 608-614 [doi]
- A Software Framework for Data ProvenanceTassio Sirqueira, Marx L. Viana, Nathalia Moraes do Nascimento, Carlos Lucena. 615-618 [doi]
- Systems Implantation: A Comparative Study and Identification of Gaps in Usual MethodologiesMarisa Panizzi, Alejandro Hossian, Ramón García-Martínez. 619-621 [doi]
- Custom Process to Small BusinessRodrigo Rocha Silva, Fernanda Yuri Kimura, Jorge Bernardino, Joubert de Castro Lima. 622 [doi]
- Visual Development Platform for Ruby on RailsAnmol Desai, Nicholas Molloy, Jing Sun 0002, Gillian Dobbie. 623 [doi]
- Home automation: HMM based fuzzy rule engine for Ambient intelligent smart spaceGopal Jamnal, Xiaodong Liu, Lu Fan. 624-625 [doi]
- Named Entity Extraction and Classification in Digital PublicationsChuan-Yu Wu, Bom Yi Lee, Jing Sun 0002, Yin Yin Latt, Kim Shepherd, Jared Watts. 626 [doi]
- Knowledge Management in a Software Development Organization: Identifying Tools, Processes and BenefitsFelipe Furtado, Gustavo Alexandre, Nelson Leitão Júnior, Ivaldir H. de Farias Junior, Hermano Moura. 627 [doi]
- Implementing and Evaluating Scrum in Computer Science Senior ProjectsMaral Kargarmoakhar, Mohsen Taheri, S. Masoud Sadjadi. 628-630 [doi]
- A Comparative Analysis of Classification Algorithms in Diabetic Retinopathy ScreeningSaboora Mohammadian, Ali Karsaz, Yaser M. Roshan. 631 [doi]
- A Conversational Workflow Model for ChatbotFrancesco Colace, Antonio Ferraioli, Luca Garofalo, Saverio Lemma, Marco Lombardi, Francesco Pascale, Alfredo Troiano. 632 [doi]