Abstract is missing.
- Session: Internet of Things and RoboticsHuibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan-fei, Gang Lu, Ran Li. 1-6 [doi]
- The Prediction of Delay Time and Route Planning for Autonomous Vehicles (S)Yongxin Zhao, Jiawei Jiang, Ling Shi, Genwang Gou. 7-12 [doi]
- DCBlock : Efficient Module for Unpaired Image to Image Translation Using GANsMyeong Oh Lee, Geun Sik Jo, Jin Yong Kim. 13-18 [doi]
- A Detect-and-Modify Region-based Classifier to Defend Evasion AttacksYongxin Zhao, Xi Wu, Genwang Gou, Jiawei Jiang. 19-24 [doi]
- Inspect Characteristics of Rice via Machine Learning Method (S)Mingliang Li, Jinxi Kong, Siming Zhao, Wei Li, Xiaohui Cui, Xin Ma. 25-30 [doi]
- Modeling and Verifying NDN-based IoV Using CSPHuibiao Zhu, Jiaqi Yin, Lili Xiao, Yuan-fei, Ningning Chen. 31-36 [doi]
- Controller Synthesis for ROS-based Multi-Robot CollaborationRui Li, Wanwei Liu, Hao Shi, Shaoxian Shu, Wei Dong 0006, Xudong Zhao. 37-42 [doi]
- Understanding Travel Patterns of Commuting Private Cars using Big data of Electronic Registration Identification of VehiclesLinjiang Zheng, Yuhui Ye, Chenglin Ye, Junchao Lv. 43-48 [doi]
- TIMESIGHT: Discovering Time-driven Insights Automatically and FairlySuyeong Lee, Yeonghun Nam, Yohan Bae. 49-54 [doi]
- Physical Artifacts for Agents in a Cyber-Physical System: A Case Study in Oil & Gas Scenario (EEAS)Carlos Eduardo Pantoja, Leandro Samyn, Vinicius Souza de Jesus, Fabian Manoel. 55-60 [doi]
- Session: Ontologies and Knowledge GraphsYi Liu, William Patten, Onyeka Ezenwoye. 61-64 [doi]
- Modeling Relation Path for Knowledge Graph via Dynamic Projection (S)Yizhi Jiang, Xiaowen Wang, Hongfei Fan, Qin Liu, Bowen Du, Hongming Zhu. 65-70 [doi]
- Modeling HiBrinto Ontology to Develop Knowledge Management Portal for Highway Bridge ConstructionShanmuganathan Vasanthapriyan, Banujan Kuhaneswaran. 71-76 [doi]
- An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery (S)Tong Li 0001, Zhen Yang, Guoshuai Zhao. 77-82 [doi]
- Identifying Security Concerns Based on a Use Case Ontology FrameworkImano Williams, Xiaohong Yuan. 83-88 [doi]
- Towards High Quality Recommendations: A Goal-Oriented and Ontology-Based Interactive Approach (S)Robert Ahn, Tom Hill, Lawrence Chung, Ronaldo Gonçalves. 89-92 [doi]
- SHAMROQ: Towards semantic models of regulationsSusan Mengal, Siva Parameswaran, Patrick Cook. 93-100 [doi]
- On the Reuse of Knowledge to Develop Intelligent Software Engineering SolutionsLuiz Antonio Pereira Silva, Mirko Perkusich, Ademar França de Sousa Neto, Danyllo Albuquerque, Dalton Cézane Gomes Valadares, Hyggo O. Almeida, Angelo Perkusich, José Ferdinandy Silva Chagas. 101-106 [doi]
- Session: Software SpecificationRong Peng, Bangchao Wang, Dong Sun, Yuanbang Li. 107-110 [doi]
- Detecting and Modeling Method-level Hotspots in Architecture Design FlawsShaozhi Wei, Ting Hu, Ran Mo. 111-116 [doi]
- Threat and Security Modeling for Secure Software Requirements and Architecture (S)Don Pathirage, Dongsoo Jang, Michael E. Shin. 117-120 [doi]
- Knowledge-based Interface transition diagram for SRS(Software Requirements Specification) in mobile application (S)Hyungbae Park, Venkata N. Inukollu, TaegHyun Kang. 121-126 [doi]
- Correct Software by Design for Software-Defined Networking: A preliminary StudyXin Sun, Lan Lin, Zedong Peng, Liang Hao. 127-134 [doi]
- Dynamic Architecture-Implementation Mapping for Architecture-Based Runtime Software AdaptationRachel Culver, Yongjie Zheng, Cuong Cu. 135-140 [doi]
- An Automated Goal Labeling Method Based on User ReviewsHiroyuki Nakagawa, Tatsuhiro Tsuchiya, Shuaicai Ren. 141-146 [doi]
- A Co-evolutionary Method Between Architecture and CodeBixin Li, Lingyuan Zhu, Tong Wang. 147-152 [doi]
- Session: Empirical Software EngineeringXinlei Ma, Yan Liu. 153-157 [doi]
- Evaluating the Usefulness and Ease of Use of an Experimentation Definition Language (S)Florian Auer, Michael Felderer. 158-163 [doi]
- Time-Aware Models for Software Effort Estimation (S)Stephen G. MacDonell, Peter A. Whigham, Michael Franklin Bosu. 164-167 [doi]
- An Empirical Study on Issue Knowledge Transfer from Python to R for Machine Learning Software (S)Zhenlan Ji, Yanhui Li, Wen-Chin Huang. 168-173 [doi]
- Quantifying the Relationship Between Health Outcomes and Unhealthy Habits (S)Swapna S. Gokhale. 174-179 [doi]
- The Reaction of Open Source Projects to C++ Templates and Lambdas: An Empirical Replication StudyDonghoon Kim, Loc Ho. 180-185 [doi]
- Analyzing the Performance of Apps Developed by using Cross-Platform and Native TechnologiesFlávio Medeiros, Eduardo Moraes, Anderson Feitosa Júnior, Lucas Barros. 186-191 [doi]
- On the Use of Support Mechanisms to Perform Experimental Variables SelectionRogério Eduardo Garcia, Ellen Francine Barbosa, Lilian Passos Scatalon. 192-197 [doi]
- Testing the Stationarity Assumption in Software Effort Estimation DatasetsStephen G. MacDonell, Peter A. Whigham, Michael Franklin Bosu. 198-203 [doi]
- Session: Distributed Systems and Machine LearningWenting Sun, Xuancheng Fan, Nikita Butakov, Nicolas Ferlans, Sheyda Kiani Mehr. 204-209 [doi]
- F(X)-MAN: An Algebraic and Hierarchical Composition Model for Function-as-a-ServiceChen Qian, Wenjing Zhu. 210-215 [doi]
- Privacy-aware OrLa Based Access Control Model in the CloudPengfei Shao, Shuyuan Jin. 216-221 [doi]
- Formal Modelling and Verification of MCAC Router Architecture in ICNHuibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan-fei, Gang Lu, Junya Xu. 222-227 [doi]
- Data-sparsity Service Discovery using Enriched Neural Topic Model and Attentional Bi-LSTMBing Li 0010, Jian Wang 0018, Li Yao. 228-233 [doi]
- Explainable Deep Convolutional Candlestick Learner (S)Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur, Jun Hao Chen. 234-237 [doi]
- Conditional Normalizing Flow-based Generative Model for Zero-Shot RecognitionHaiping Zhang, Liming Guan, Dongjin Yu, Zhongjin Li, Xinwei Zhu. 238-243 [doi]
- An SNN Construction Method Based on CNN Conversion and Threshold SettingYongli Li, Feng You, Ying Shang. 244-249 [doi]
- Multi Classification of Alzheimer's Disease using Linear Fusion with TOP-MRI Images and Clinical IndicatorsGolddy Indra Kumara, Jiahuan Chu, Qiao Pan. 250-256 [doi]
- Deep Hashing with Large Batch Training for Cross-modal RetrievalXuewang Zhang, Yin Zhou. 257-263 [doi]
- Session: Software DevelopmentIaakov Exman, Alexey Nechaev. 264-269 [doi]
- Reliable Compilation Optimization Selection Based on Gate Graph Neural NetworkJiang Wu, Jianjun Xu. 270-275 [doi]
- Trends in Software Reverse Engineering (S)Rehman Arshad. 276-280 [doi]
- Do Experienced Programmers put too Much Confidence in Comments? (S)Abby Bechtel, Emily Daskas, Lily Foster, Raha Pirzadeh, Katie Rodeghiero, Erik Linstead, Elia Eiroa-Lledo. 281-286 [doi]
- Formal verification of an abstract version of Anderson protocol with CafeOBJ, CiMPA and CiMPG (S)Duong Dinh Tran, Kazuhiro Ogata 0001. 287-292 [doi]
- Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern MiningZhenzhou Tian, Cong Gao, Lingwei Chen, Qing Wang. 293-298 [doi]
- The Impact of Auto-Refactoring Code Smells on the Resource Utilization of Cloud SoftwareAsif Imran, Tevfik Kosar. 299-304 [doi]
- Towards Fine-Grained Compiler Identification with Neural ModelingZhenzhou Tian, Cong Gao, Lingwei Chen, Borun Xie. 305-310 [doi]
- Evaluating the Relationship of Personality and Teamwork Quality in the Context of Agile Software DevelopmentManuel Silva, Dalton Cézane Gomes Valadares, Mirko Perkusich, Danyllo Albuquerque, Hyggo O. Almeida, Angelo Perkusich, Alexandre Braga Gomes. 311-316 [doi]
- Session: Software TestingLu Lu, Yexia Qin, Xuan Zhou. 317-322 [doi]
- A Semantic Convolutional Auto-Encoder Model for Software Defect Prediction (S)Zhihan Wang, Lu Lu. 323-328 [doi]
- Revisiting Dependence Cluster Metrics based Defect PredictionXiang Chen 0005, Zhengliang Li, Chao Ni, Qing Gu, Qiguo Huang. 329-334 [doi]
- Guidelines for Quality Assurance of Machine Learning-based Artificial IntelligenceFuyuki Ishikawa, Satoshi Masuda, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita, Mineo Matsuya, Koichi Hamada. 335-341 [doi]
- Call Sequence List Distiller for Practical Stateful API Testing (S)Takao Nakagawa, Shogo Tokui, Kazuki Munakata, Koji Yamamoto. 342-346 [doi]
- Impact of Label Noise and Efficacy of Noise Filters in Software Defect PredictionNishat Tasnim Niloy, Md. Aquib Azmain, Ahmedul Kabir, Shihab Shahriar Khan. 347-352 [doi]
- Using Deep Learning Classifiers to Identify Candidate Classes for Unit Testing in Object-Oriented SystemsFadel Touré, Mourad Badri, Linda Badri, Wyao Matcha. 353-358 [doi]
- Unit Test Effort Prioritization Using Combined Datasets and Deep Learning: A Cross-Systems Validation (S)Fadel Touré, Mourad Badri. 359-364 [doi]
- An Empirical Investigation on the Relationship Between Bug Severity and Bug Fixing Change ComplexityDengwei Li, Peng Liang 0001, Ran Mo, Zengyang Li. 365-370 [doi]
- Session: Natural Language ProcessingEduardo Lopez, Kamran Sartipi. 371-374 [doi]
- Patent Technical Function-effect Representation and Mining Method (S)Piying Zhang, Wenbo Qiao, Weidong Liu. 375-379 [doi]
- Towards A Systematic Derivation Of BPMN Model From Business Process Textual Description (S)Nourchène Elleuch Ben Ayed, Faten Chihi, Wiem Khlif. 380-385 [doi]
- A Novel Self-Attention Based Automatic Code Completion Neural Network (IPA)Wanyou Lv, Jianqi Shi, Yanhong Huang, Bohao Wang. 386-391 [doi]
- An Ensemble Approach to Detect Code Comment Inconsistencies using Topic Modeling (S)Md Nazmul Haque, Md. Eusha Kadir, Md. Saeed Siddik, Ahmedul Kabir, Fazle Rabbi. 392-395 [doi]
- A Combined Model for Extractive and Abstractive summarization based on Transformer model (S)Xin Liu, Liutong Xu. 396-399 [doi]
- Modeling Topic Exhaustion for Programming Languages on StackOverflow (IPA)Rao Hamza Ali, Erik Linstead. 400-405 [doi]
- An Efficient Application Searching Approach Based on User Review Knowledge GraphFang Liu 0002, Tong Li. 406-412 [doi]
- SLK-NER: Exploiting Second-order Lexicon Knowledge for Chinese NER (S)Dou Hu, Lingwei Wei. 413-417 [doi]
- Session: Social Media MiningJian Cao, David Lo 0001, Lingjia Li. 418-423 [doi]
- Searching, Examining, and Exploiting In-demand Technical (SEE IT) Skills using Web Data MiningHyungbae Park, Sunae Shin, TaegHyun Kang. 424-428 [doi]
- Sentiment Analysis of Online Reviews with a Hierarchical Attention NetworkJingren Zhou, Peiquan Jin. 429-434 [doi]
- Cross-project Reopened Pull Request Prediction in GitHub (S)Li Zhang, Jing Jiang, Abdillah Mohamed. 435-438 [doi]
- Restaurant Failure Prediction Based on Multi-View Online DataDongjin Yu, Xiaoxiao Sun, Ping Liang. 439-444 [doi]
- Detecting Spammers from Hot Events on Microblog Platforms: An Experimental StudyJialing Liang, Peiquan Jin. 445-450 [doi]
- Automatic Identification of Architecture Smell Discussions from Stack OverflowFan Lu, Peng Liang 0001, Muhammad Ali Babar, Fangchao Tian. 451-456 [doi]
- Exploring CQA User Contributions and Their Influence on Answer Distribution (S)XinJun Mao, Zixi Xu, Yao Lu 0003, Yi Yang. 457-462 [doi]
- Copy and Paste Behavior: A Systematic Mapping Study (S)John W. Castro, Xavier Ferré, Silvia Teresita Acuña, Luqi Guan. 463-466 [doi]
- Generating Luck from Weak Ties in Social Networks (S)Omer Ganon, Asaf Yosef, Iaakov Exman. 467-472 [doi]
- Session: Recommender SystemsYe Tian 0008, Shunyao Wang, Xiangyang Gong, Xirong Que, Wendong Wang, Han Yan. 473-474 [doi]
- Mining and Predicting Micro-Process Patterns of Issue Resolution for Open Source Software ProjectsJian Cao, David Lo 0001, Yiran Wang. 477-482 [doi]
- Deep Graph Attention Neural Network for Click-Through Rate PredictionWen Fang, Lu Lu. 483-488 [doi]
- A Session-based Job Recommendation System Combining Area Knowledge and Interest Graph Neural Networks (S)Kaize Shi, Zhendong Niu, Yusen Wang. 489-492 [doi]
- Modeling and Selecting Frameworks in terms of Patterns, Tactics, and System QualitiesMichael Weiss, Stéphane S. Somé, Hind Milhem. 493-500 [doi]
- An Evaluation of Recommendation Algorithms for Tourist AttractionsFlávio Medeiros, Ivo Calado, Anderson Feitosa Júnior. 501-506 [doi]
- Who Should Close the Questions: Recommending Voters for Closing Questions Based on TagsXinJun Mao, Yao Lu, Jinyu Lu, Zhang Zhang. 507-512 [doi]
- A Deep Spatio-temporal Residual Network Model for Commercial Activeness PredictionDongjin Yu, Xiaoxiao Sun, Ping Liang. 513-518 [doi]
- Collaborative Denoising Graph Attention Autoencoders for Social RecommendationDaren Zha, Lin Zhao, Rui Gong, Nan Mu. 519-524 [doi]
- Identifying Similar Users Based on Metagraph of Check-in Trajectory DataTong Li, Xin Dong, Zhiming Ding, Rui Song. 525-531 [doi]
- Session: Security and BlockchainJing Sun 0002, Ian Warren, Nacha Chondamrongkul. 532-537 [doi]
- Characterizing Vulnerabilities in a Major Linux DistributionMoulika Bollinadi, Joshua Moore, Stephen Tate. 538-543 [doi]
- Mining DApp Repositories: Towards In-Depth Comprehension and Accurate ClassificationJianbo Gao, Tong Li 0012, Jingguo Ge, Bingzhen Wu, Yeming Lin. 544-549 [doi]
- Automated Rogue Behavior Detection for Android Applications (S)Ruixuan Li, Junwei Tang, Xiwu Gu, Shuangmin Zhang. 550-553 [doi]
- Benchmarking the efficiency of RDF-based access for blockchain environmentsAndrea Cimmino, Raúl García-Castro, Juan Cano-Benito. 554-559 [doi]
- SecureChange: An Automated Framework to Guide Programmers in Fixing VulnerabilityKazi Zakia Sultana, Tanmay Bhowmik, Sayem Mohammad Imtiaz. 560-565 [doi]
- Significant API Calls in Android Malware Detection (Using Feature Selection Techniques and Correlation Based Feature Elimination)Asadullah Hill Galib, B. M. Mainul Hossain. 566-571 [doi]
- Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning (S)Jie Yang, Qiuyun Wang, Changxin Su, Xuren Wang. 572-576 [doi]