Abstract is missing.
- Refactoring Java Code to MapReduce Framework (S)Rui Feng, Junfeng Zhao. 1-6 [doi]
- ArchiNet: A Concept-token based Approach for Determining Architectural Change CategoriesAmit Kumar Mondal, Banani Roy, Sristy Sumana Nath, Kevin A. Schneider. 7-14 [doi]
- Analyzing Open-Source Serverless Platforms: Characteristics and Performance (S)Junfeng Li, Sameer G. Kulkarni, K. K. Ramakrishnan, Dan Li 0001. 15-20 [doi]
- I-CMOMMT: A multiagent approach for patrolling and observation of mobile targets with a continuous environment representation (S)Jamy Chahal, Assia Belbachir, Amal El Fallah-Seghrouchni. 21-24 [doi]
- NVMSorting: Efficient Sorting on Non-Volatile MemoryZhaole Chu, Yongping Luo, Peiquan Jin, Shouhong Wan. 25-30 [doi]
- HHML: A Hierarchical Hybrid Modeling Language for Mode-based Periodic ControllersZhiming Hu, Zheng Wang, Hongjian Jiang, Yuyuan Zhang, Yongxin Zhao. 31-36 [doi]
- Patterns for Reuse in Production Systems EngineeringKristof Meixner, Arndt Lüder, Jan Herzog, Dietmar Winkler 0001, Stefan Biffl. 37-44 [doi]
- Software Design Pattern Analysis for Micro-Service Architecture using Queuing Networks (S)Hanzhong Zheng, Justin Kramer, Shi-Kuo Chang. 45-50 [doi]
- Correctness Arguments for an SDN MAC Learning Algorithm (S)Liang Hao, Xin Sun, Lan Lin. 51-56 [doi]
- Multiclass Classification of Four Types of UML Diagrams from Images Using Deep LearningSergei Shcherban, Peng Liang 0001, Zengyang Li, Chen Yang 0007. 57-62 [doi]
- On Integrating Ethicality in User Stories (S)Pankaj Kamthan, Nazlie Shahmir. 63-66 [doi]
- A Collaborative Forensic Framework for Detecting Advanced Persistent ThreatsWeifeng Xu, Jie Yan, Daryl Stone. 67-74 [doi]
- An Empirical Study on the Impact of Class Overlapin Just-in-Time Software Defect Prediction (S)Minyang Yi, Guisheng Fan, Huiqun Yu, Xingguang Yang. 75-78 [doi]
- FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation ExtractionXuren Wang, Mengbo Xiong, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong. 79-85 [doi]
- AAMR: Automated Anomalous Microservice Ranking in Cloud-Native EnvironmentZekun Zhang, Bing Li, Jian Wang, Yongqiang Liu. 86-91 [doi]
- Unsupervised Anomaly Detection Based on System LogsHao Chen, Ruizhi Xiao, Shuyuan Jin. 92-97 [doi]
- From Vulnerability Anti-Patterns to Secure Design Patterns (S)Alok Chandrakant Ratnaparkhi, Onyeka Ezenwoye, Yi Liu. 98-101 [doi]
- Formal Modeling and Verification of ICN-IoT Middleware Architecture (S)Hongqin Zhang, Jiaqi Yin, Huibiao Zhu, Ningning Chen. 102-107 [doi]
- AnB2Murphi: A Translator for Converting AliceBob Specifications to MurphiYongxin Zhao, Hongjian Jiang, Jin Lv, Sijun Tan, Yongjian Li. 108-113 [doi]
- Formal verification of multitask hybrid systems by the OTS/CafeOBJ methodMasaki Nakamura 0001, Kazutoshi Sakakibara, Yuki Okura, Kazuhiro Ogata 0001. 114-119 [doi]
- Formal verification of IFF and NSLPK authentication protocols with CiMPG (S)Thet Wai Mon, Shuho Fujii, Duong Dinh Tran, Kazuhiro Ogata 0001. 120-125 [doi]
- Formal verification of Anderson mutual exclusion protocol by introducing an auxiliary variable (S)Naoki Asae, Duong Dinh Tran, Kazuhiro Ogata 0001. 126-131 [doi]
- Using LSTM to Predict Tactics in CoqXiaokun Luan, Xiyue Zhang, Meng Sun. 132-137 [doi]
- Formal specification and model checking of a recoverable wait-free version of MCSDuong Dinh Tran, Kentaro Waki, Kazuhiro Ogata 0001. 138-143 [doi]
- Fine-Grained Neural Network Abstraction for Efficient Formal VerificationZhaosen Wen, Weikai Miao, Min Zhang. 144-149 [doi]
- Modeling and Verification of CKB Consensus Protocol in UPPAAL (S)Yi-Chun Feng, Yuteng Lu, Meng Sun. 150-153 [doi]
- Formalization and Verification of Dubbo Using CSPZhiru Hou, Jiaqi Yin, Huibiao Zhu. 154-159 [doi]
- Conv-Reluplex : A Verification Framework For Convolution Neural Networks (S)Jin Xu, ZiShan Li, Miaomiao Zhang, Bowen Du. 160-165 [doi]
- Tree Ensemble Property Verification from A Testing PerspectiveBohao Wang, Zhe Hou, Gelin Zhang, Jianqi Shi, Yanhong Huang. 166-171 [doi]
- DeepAuto: A First Step Towards Formal Verification of Deep Learning Systems (S)Yuteng Lu, Weidi Sun, Guangdong Bai, Meng Sun 0002. 172-176 [doi]
- Evaluating the Impact of Vaccination on COVID-19 Using Model CheckingXin Li. 177-182 [doi]
- A Novel Approach of CTL Model Checking Based on Probe MachineDong Wang, Jing Liu 0012, Jin Xu, Haiying Sun, Jiexiang Kang. 183-188 [doi]
- How MOOC Videos Affect Dropout? A Lightweight Pipeline Making Student Dropout Interpretable From Several LevelsDeming Sheng, Jingling Yuan, Xin Zhang. 189-194 [doi]
- Development of an Automated Machine Learning Solution for Educational Data Mining (S)Raniel Gomes da Silva, Vitoria Maria Pena Mendes, Rodrigo Lins Rodrigues, Alexandre Magno Andrade Maciel. 195-198 [doi]
- Towards the integration of the GDPR in the Unified Software Development Process (S)Elena Gómez-Martínez, Miguel Marroyo, Silvia T. Acuña. 199-204 [doi]
- Remaining Activity Sequence Prediction for ongoing process instancesXiaoxiao Sun, Yuke Ying, Siqing Yang, Hujun Shen. 205-210 [doi]
- Studying the Impact of the User Subscription Times in Different Cloud ConfigurationsHernán-Indibil de la Cruz, María-Emilia Cambronero, Valentín Valero, Pablo C. Cañizares, Adrian Bernal, Alberto Núñez. 211-216 [doi]
- An Analysis of the State of the Art of Machine Learning for Risk Assessment in Software Projects (S)André Sousa, João Pascoal Faria, João Mendes-Moreira. 217-222 [doi]
- Towards a Comprehensive Understanding of Agile Teamwork: A literature-based Thematic NetworkArthur Silva Freire, Manuel Neto, Mirko Barbosa Perkusich, Alexandre Costa, Kyller Costa Gorgônio, Hyggo O. Almeida, Angelo Perkusich. 223-228 [doi]
- A Comparative Study of Psychometric Instrumentsin Software EngineeringGleyser Guimarães, Mirko Barbosa Perkusich, Danyllo Albuquerque, Everton Guimarães, Danilo Santos 0001, Hyggo O. Almeida, Angelo Perkusich. 229-234 [doi]
- Evaluating a Bayesian Network to Predict Customer Satisfaction in Scrum Software Development Projects: An Empirical Study with One CompanyMirko Barbosa Perkusich, Gleyser Guimarães, Kyller Costa Gorgônio, Hyggo O. Almeida, Angelo Perkusich. 235-240 [doi]
- Towards Automatically Generating Release Notes using Extractive Summarization TechniqueSristy Sumana Nath, Banani Roy. 241-248 [doi]
- Understanding the Impact of COVID-19 on Github Developers: A Preliminary StudyLiu Wang 0002, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang 0001. 249-254 [doi]
- Analyzing Program Comprehensibility of Go ProjectsMoumita Asad, Rafed Muhammad Yasir, Shihab Shahriar Khan, Nadia Nahar, Md. Nurul Ahad Tawhid. 255-260 [doi]
- What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S)Fatma Outay, Haroon Malik, David A. Dampier. 261-264 [doi]
- Quantifying Synergy between Software Projects using README Files Only (S)Roxanne El Baff, Sivasurya Santhanam, Tobias Hecking. 265-270 [doi]
- Evaluating a Tool for Creating Bug Report Assignment Recommenders (S)Disha Devaiya, John Anvik, Meher Bheree, Farjana Yeasmin Omee. 271-274 [doi]
- A family of experiments for evaluating the usability of a collaborative modelling chatbotRanci Ren, John W. Castro, Silvia Teresita Acuña. 275-280 [doi]
- Evaluation of Chatbots Usability Experimentation (S)Ranci Ren, John W. Castro, Silvia Teresita Acuña. 281-284 [doi]
- From word embeddings to text similarities for improved semantic clustering of functional requirements (S)Takwa Kochbati, Sébastien Gérard, Shuai Li, Chokri Mraidha. 285-290 [doi]
- Investigating Process Algebra Models to Represent Structured Requirements for Time-sensitive CPSMathilde Arnaud, Boutheina Bannour, Arnault Lapitre, Guillaume Giraud. 291-296 [doi]
- Risk Analysis for Collaborative Systems during Requirements Engineering (S)Kirthy Kolluri, Robert Ahn, Lawrence Chung, Tom Hill. 297-302 [doi]
- Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S)Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim. 303-308 [doi]
- Spatial-Temporal Forecast of the probability distribution of Oceanic Nino Index for various lead timesJahnavi Jonnalagadda, Mahdi Hashemi 0001. 309-314 [doi]
- Recurrent Neural Graph Collaborative FilteringBeichuan Zhang, Zhijiao Xiao, Sheng-hua Zhong. 315-320 [doi]
- Deep Self-Attention for Sequential Recommendation (S)Beichuan Zhang, Zhijiao Xiao, Sheng-hua Zhong. 321-326 [doi]
- A recommender system to assist conceptual modeling with UMLMaxime Savary-Leblanc, Xavier Le Pallec, Sebastien Gerard. 327-333 [doi]
- Evaluating Visual Explanation of Bug Report Assignment Recommendations (S)Shayla Azad Bhuyan, John Anvik. 334-339 [doi]
- A Practical User Feedback Classifier for Software Quality CharacteristicsRubens Ideron dos Santos, Karina Villela, Diego Toralles Avila, Lucinéia Heloisa Thom. 340-345 [doi]
- Improved Multiple Part Algorithm (IMPA) to extract multiple solutions for RNA sequence classification problemNaoual Guannoni, Faouzi Mhamdi, Mourad Elloumi. 346-351 [doi]
- Attention Guided Filter for Jointly Extracting Entities and Classifying RelationsShaoze Chen, Su Wang, Wenxin Hu. 352-358 [doi]
- Multi-Label Classification of Parrott's EmotionsAbhijit Mondal, Swapna S. Gokhale. 359-364 [doi]
- On Conducting Tests in Software Engineering Courses during the COVID-19 Pandemic (S)Pankaj Kamthan. 365-368 [doi]
- Revisiting UML Class Relationship Recovery for Online Education (SEKEEO) (S)Dionysis Athanasopoulos. 369-374 [doi]
- Extracting Prerequisite Relations among Concepts from the Introduction of Online Courses(SEKEEO) (S)Zesong Wang, Kui Xiao, Zeqing Qin, Shihui Wang. 375-380 [doi]
- A Technical Capability Evaluation Model Based Concept and Prerequisite Relation in Computer Education(SEKEEO) (S)Jiwen Luo, Tao Wang, Junsheng Chang, Xiaoting Guo. 381-386 [doi]
- Triangle Counting by Adaptively Resampling over Evolving Graph StreamsWei Xuan, Huawei Cao, Mingyu Yan, Zhimin Tang, Xiaochun Ye, Dongrui Fan. 387-392 [doi]
- Influence Maximization with Consideration of PageRank Centrality and Propagation ProbabilityQi Chen, Rong Yan. 393-398 [doi]
- Grasping or Forgetting? MAKT: A Dynamic Model via Multi-head Self-Attention for Knowledge TracingDeming Sheng, Jingling Yuan, Xin Zhang. 399-404 [doi]
- Deep Similarity Preserving and Attention-based Hashing for Cross-Modal RetrievalShubai Chen, Song Wu, Yu Chen, Yuan Yuan. 405-410 [doi]
- An Efficient ROS Package Searching Approach Powered By Knowledge GraphLong Chen, XinJun Mao, Yinyuan Zhang, Shuo Yang 0005, Shuo Wang. 411-416 [doi]
- KatGCN: Knowledge-Aware Attention based Temporal Graph Convolutional Network for Multi-Event PredictionXin Song, Haiyang Wang, Kang Zeng, Yujia Liu, Bin Zhou 0004. 417-422 [doi]
- SolDetector: Detect Defects Based on Knowledge Graph of Solidity Smart ContractTianyuan Hu, Zhenyu Pan, Bixin Li. 423-428 [doi]
- SMART: Towards Automated Mapping between Data SpecificationsSafia Kalwar, Mersedeh Sadeghi, Alireza Javadian Sabet, Alexander Nemirovskiy, Matteo G. Rossi. 429-436 [doi]
- Incorporating Presuppositions of Competency Questions into Test-Driven Development of Ontologies (S)Jedrzej Potoniec, Dawid Wisniewski, Agnieszka Lawrynowicz. 437-440 [doi]
- Ride Hailing Service Demand Forecast by Integrating Convolutional and Recurrent Neural NetworksZinat Ara, Mahdi Hashemi 0001. 441-446 [doi]
- Transfer Learning-based City Similarity Measurement: A Case Study on Urban Hotel (S)Ganghua Zhang, Xiaoping Che, Shiyao Wei, Tao Na. 447-450 [doi]
- A hierarchical RNN-based model for learning recommendation with session intent detectionJinyang Liu, Chuantao Yin, Xiaoyan Zhang, Kunyang Wang, Hong Zhou. 451-457 [doi]
- Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement LearningYan Lin, Guosheng Xu, Guoai Xu, Siyi Li, Jie Deng, Jiankun Cao. 458-463 [doi]
- Inspect Defect of Power Equipment via Deep Learning MethodQi Zhang, Qingsong Cai, Jianhui Zheng. 464-469 [doi]
- A method for generating various style Chinese fonts in the absence of training data (S)Kang Shi, Tian-Ming Bu. 470-474 [doi]
- Multi-Fusion with Attention Mechanism for 3D Object DetectionNing Wang, Ping Sun. 475-480 [doi]
- SADA: Improved Data Symbolization and Optimization Method on HAR from Microscopic PerspectiveHuichao Men, Botao Wang. 481-486 [doi]
- HARP Pro: Hierarchical Representation Learning based on global and local features for social networksWei Zhang, Jing Yang, Fanshu Shang. 487-492 [doi]
- A Volume-Aware Positional Attention-Based Recurrent Neural Network for Stock Index PredictionXinpeng Yu, Dagang Li. 493-498 [doi]
- DeepSCC: Source Code Classification Based on Fine-Tuned RoBERTa (S)Guang Yang 0019, Yanlin Zhou, Chi Yu, Xiang Chen 0005. 499-502 [doi]
- Multi-Granularity Code Smell Detection using Deep Learning Method based on Abstract Syntax TreeWeiwei Xu, Xiaofang Zhang. 503-509 [doi]
- FCEP: A Fast Concolic Execution for Reaching Software PatchesMeng Fan, Wenzhi Wang, Aimin Yu, Dan Meng. 510-515 [doi]
- Leveraging Compiler Optimization for Code Clone DetectionShirish Kumar Singh, Harshit Singhal, Bharavi Mishra. 516-521 [doi]
- Which Factors Affect Q-Learning-based Automated Android Testing? - A Study Focusing on Algorithm, Learning Target, and Reward Function -Yuki Moriguchi, Shingo Takada 0001. 522-527 [doi]
- MACA: A Residual Network with Multi-Attention and Core Attributes for Code Search (S)Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong 0006. 528-531 [doi]
- Dynamically Detecting Invariants for Automatic Testing PLC Programs (S)Zeyu Lu, Xia Mao, Yanhong Huang, Jianqi Shi, Yang Yang. 532-537 [doi]
- Optimal Conjunctive Normal Form Encoding for Symbolic ExecutionWeiyu Pan, Ziqi Shuai, Ke Ma, Luyao Liu. 538-543 [doi]
- Graph queries for analyzing the coverage of requirements by test casesShingo Ariwaka, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 544-549 [doi]
- Using the Normalized Levenshtein Distance to Analyze Relationship between Faults and Local Variables with Confusing Names: A further Investigation (S)Carmine Gravino, Alessandra Orsi, Michele Risi. 550-553 [doi]
- A Framework for Mutation Testing of Machine Learning Systems (S)Raju Singh, Mukesh Kumar Rohil. 554-559 [doi]
- A Case Study of Testing an Image Recognition Application (S)Chuanqi Tao, Dongyu Cao, Hongjing Guo, Jerry Gao. 560-563 [doi]
- A Novel Text Classification Approach based on Meta-path Similarities and Graph Neural NetworksHuan Wang, Jiang Li 0004, Qing Zhou, Liang Ge. 564-569 [doi]
- Model-Agnostic Local Explanations with Genetic Algorithms for Text ClassificationQingfeng Du, Jincheng Xu. 570-575 [doi]
- Towards a Better Understanding of Gradient-Based Explanatory Methods in NLPQingfeng Du, Jincheng Xu. 576-581 [doi]
- Relation Extraction Model Based on Keywords Attention (S)Yu Chen, Jianxia Chen, Chang Liu, Qi Liu. 582-585 [doi]
- Chinese Sentence Semantic Matching With Multi-Granularity Based on Siamese Neural NetworkXuan Wen, Jianxia Chen, Yu Chen, Shirui Sheng. 586-591 [doi]
- Complementary Representation of ALBERT for Text SummarizationWenying Guo, Bin Wu 0001, Bai Wang 0001, Lianwei Li, Junwei Sun, Maham Nazir. 592-597 [doi]
- BEHIND: a 4W-oriented Method for Event Detection from TwitterKang Zeng, Yujia Liu, Xin Song, Bin Zhou 0004. 598-603 [doi]
- ATFE: A Two-dimensional Feature Encoding-based Sentence-level Attention Model for Distant Supervised Relation ExtractionShiyang Li, Qianqian Ren, Zechao Liu. 604-609 [doi]
- Extracting information from driving data using k-means clustering (S)Nour Chetouane, Lorenz Klampfl, Franz Wotawa. 610-615 [doi]
- RoBF: An Auto-Tuning Bloom Filter for Mixed Queries on LSM-TreeRuicheng Liu, Peiquan Jin, Shouhong Wan, Bei Hua. 616-621 [doi]
- Using Surrounding Text of Formula towards More Accurate Mathematical Information RetrievalCheng Chen, Yifan Dai, Yuqi Shen, Jinfang Cai, Liangyu Chen. 622-627 [doi]
- Automatic Comprehension of Geometry Problems using AMR Parser (S)Anca-Elena Iordan. 628-631 [doi]
- AutoCom: Automatic Comment Generation for C CodeZhikang Tian, Yuekang Li. 632-633 [doi]
- Water-Wheel: Real-Time Storage with High Throughput and Scalability for Big Data StreamsYanqi Lv, Ruicheng Liu, Peiquan Jin. 634-635 [doi]
- MT4ImgRec: A Metamorphic Testing Tool for Image Recognition SoftwareDongyu Cao, Hongjing Guo, Chuanqi Tao. 636 [doi]
- Post2Event: Extracting Key Events from MicroblogsChongwei Wang, Xujian Zhao, Peiquan Jin, Hui Zhang 0055, Chunming Yang, Bo Li 0065. 637-638 [doi]
- CASTR: Assisting Bug Report Assignment Recommender CreationDisha Thakarshibhai Devaiya, John Anvik, Farjana Yeasmin Omee, Meher Bheree. 639 [doi]