Abstract is missing.
- A Systematic Mapping Study of Information Retrieval Approaches Applied to Requirements Trace RecoveryBangchao Wang, Heng Wang, Ruiqi Luo, Sen Zhang, Qiang Zhu. 1-6 [doi]
- A framework for Requirements specification of machine-learning systemsXi Wang, Weikai Miao. 7-12 [doi]
- Requirements debt: causes, consequences, and mitigating practicesViviane Duarte Bonfim, Fabiane Barreto Vavassori Benitti. 13-18 [doi]
- On the Implications of Human-Paper Interaction for Software Requirements Engineering EducationPankaj Kamthan. 19-24 [doi]
- Identifying Risks for Collaborative Systems during Requirements Engineering: An Ontology-Based ApproachKirthy Kolluri, Robert Ahn, Tom Hill, Julie R. Rauer, Lawrence Chung. 25-30 [doi]
- A Novel Approach to Maintain Traceability between Safety Requirements and Model DesignQian Wang, Jing Liu, John Zhang, Hui Dou, Haiying Sun, Hongtao Chen, Xiaohong Chen, Jifeng He 0001. 31-34 [doi]
- Development of a Domain Specific Modeling Language for Educational Data MiningEronita Maria Luizines Van Leijden, Alexandre Magno Andrade Maciel, Andrêza Leite de Alencar. 35-39 [doi]
- Agile and Lean Software Engineering and the SWEBOK - Position Paper for Panel: Educational and Professional Implications of SWEBOKDavid Parsons 0001. 40-41 [doi]
- Multi-Label Code Smell Detection with Hybrid Model based on Deep LearningYichen Li, Xiaofang Zhang. 42-47 [doi]
- An Enhanced Data Augmentation Approach to Support Multi-Class Code Readability ClassificationQing Mi, Yiqun Hao, Maran Wu, Liwei Ou. 48-53 [doi]
- Contrastive Learning for Multi-Modal Automatic Code ReviewBingting Wu, Xiaofang Zhang. 54-59 [doi]
- Utilizing Edge Attention in Graph-Based Code SearchWei Zhao, Yan Liu. 60-66 [doi]
- Mapping Modern JVM Language Code to Analysis-friendly Graphs: A Pilot Study with KotlinLu Li, Yan Liu. 67-72 [doi]
- Refactoring of Object-oriented Package Structure Based on Complex NetworkYoufei Huang, Yuhang Chen, Zhengting Tang, Liangyu Chen, Ningkang Jiang. 73-78 [doi]
- Reducing Mismatches in Syntax Coupled HunksChunhua Yang, Xiufang Li. 79-84 [doi]
- Adaptive Prior-Knowledge-Assisted Function Naming Based on Multi-level Information ExplorerLancong Liu, Shizhan Chen, Sen Chen, Guodong Fan, Zhiyong Feng 0002, Hongyue Wu. 85-90 [doi]
- Towards Accurate Knowledge Transfer between Transformer-based Models for Code SummarizationChaochen Shi, Yong Xiang 0001, Jiangshan Yu, Longxiang Gao. 91-94 [doi]
- Towards Lightweight Detection of Design Patterns in Source CodeJeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse. 95-99 [doi]
- A Distributed Graph Inference Computation Framework Based on Graph Neural Network ModelZeting Pan, Yue Yu 0001, Junsheng Chang. 100-105 [doi]
- PEM: A Parallel Ensemble Matching Framework for Content-based Publish/Subscribe SystemsWeidong Zhu, YuFeng Deng, Shiyou Qian, Jian Cao 0001, Guangtao Xue. 106-111 [doi]
- MFGAN: A Novel CycleGAN-Based Network for Masked Face GenerationWeiming Xiong, Mingyang Zhong, Cong Guo, Huamin Wang, Libo Zhang. 112-117 [doi]
- Analysing Product Lines of Concurrent Systems with Coloured Petri NetsElena Gómez-Martínez, Esther Guerra, Juan de Lara. 118-123 [doi]
- Inter- and Intra-Series Embeddings Fusion Network for Epidemiological ForecastingFeng Xie, Zhong Zhang, Xuechen Zhao, Bin Zhou, Yusong Tan. 124-129 [doi]
- Unsupervised Structure Confidence Sampling for Image InpaintingXinrong Hu, Tao Wang, Jinxing Liang, Junjie Jin, Junping Liu, Tao Peng 0006, Yuanjun Xia. 130-135 [doi]
- Verifying BDI Agents in Dynamic EnvironmentsBlair Archibald, Muffy Calder, Michele Sevegnani, Mengwei Xu. 136-141 [doi]
- Zero-Shot Object Detection with Multi-label ContextYongxian Wei, Yong Ma. 142-146 [doi]
- Modified Communication Parallel Compact Firefly Algorithm and Its ApplicationJianpo Li, Geng-Chen Li, Jeng-Shyang Pan 0001, Min Gao. 147-153 [doi]
- Self-Adaptive Task Allocation for Decentralized Deep Learning in Heterogeneous EnvironmentsYongyue Chao, Mingxue Liao, Jiaxin Gao, Guangyao Li. 154-159 [doi]
- A Federated Model Personalisation Method Based on Sparsity Representation and ClusteringHailin Yang, Yanhong Huang, Jianqi Shi, Fangda Cai. 160-165 [doi]
- Improving Mutation-Based Fault Localization via Mutant CategorizationXia Li, Durga Nagarjuna Tadikonda. 166-171 [doi]
- WBS: Weighted Backtracking Strategy for Symbolic Testing of Embedded SoftwareVarsha P. Suresh, Sujit Kumar Chakrabarti, Athul Suresh, Raoul Jetley. 172-177 [doi]
- An Exploratory Study of Bug Prioritization and Severity Prediction based on Source Code FeaturesChun Ying Zhou, Cheng Zeng, Peng He. 178-183 [doi]
- Taint Trace Analysis For Java Web ApplicationsYaju Li, Chenyi Zhang, Qin Li. 184-189 [doi]
- Impact of Combining Syntactic and Semantic Similarities on Patch Prioritization while using the Insertion Mutation OperatorsMohammed Raihan Ullah, Nazia Sultana Chowdhury, Fazle Mohammed Tawsif. 190-195 [doi]
- Two-Stage AST Encoding for Software Defect PredictionYanwu Zhou, Lu Lu, Quanyi Zou, Cuixu Li. 196-199 [doi]
- An efficient discrimination discovery method for fairness testingShinya Sano, Takashi Kitamura 0001, Shingo Takada 0001. 200-205 [doi]
- Data Driven Testing for Context Aware AppsRyan Michaels, Shraddha Piparia, David Adamo, Renée C. Bryce. 206-211 [doi]
- A Preliminary Study on the Explicitness of Bug AssociationsZengyang Li, Jieling Xu, Guangzong Cai, Peng Liang 0001, Ran Mo. 212-215 [doi]
- Data Selection for Cross-Project Defect Prediction with Local and Global Features of Source CodeXuan Deng, Peng He, Chun Ying Zhou. 216-219 [doi]
- RIRCNN: A Fault Diagnosis Method for Aviation Turboprop EngineLei Li, Zhe Quan, Zixu Wang, Tong Xiao, Xiaofei Jiang, Xinjian Hu, Peibing Du. 220-224 [doi]
- Automated Unit Testing of Hydrologic Modeling Software with CI/CD and JenkinsLevi T. Connelly, Melody L. Hammel, Benjamin T. Eger, Lan Lin. 225-230 [doi]
- Ensemble approaches for Test Case Prioritization in UI testingTri Cao, Tuan Vu, Huyen Le, Vu Nguyen. 231-236 [doi]
- Investigating Cognitive Workload during Comprehension and Application Tasks in Software TestingDaryl Camilleri, Mark Micallef, Chris Porter. 237-242 [doi]
- Visualization of automated program repair focusing on suspiciousness valuesNaoki Tane, Yusaku Ito, Hironori Washizaki, Yoshiaki Fukazawa. 243-248 [doi]
- Beyond Numerical - MIXATON for outlier explanation on mixed-type data (ADPBD)Jakob Nonnenmacher, Jorge Marx Gómez. 249-252 [doi]
- Log Sinks and Big Data Analytics along with User Experience Monitoring to Tell a Fuller Story (ADPBD)Vidroha Debroy, Senecca Miller, Mark Blake, Alex Hibbard, Cody Beavers. 253-256 [doi]
- A Node-Merging based Approach for Generating iStar Models from User Stories (ADPBD)Chao Wu, Chunhui Wang, Tong Li, Ye Zhai. 257-262 [doi]
- KEMA: Knowledge-Graph Embedding Using Modular ArithmeticHussein Baalbaki, Hussein Hazimeh 0002, Hassan Harb, Rafael Angarita. 263-268 [doi]
- Embedding Knowledge Graphs with Semantic-Guided WalkHao Tang, Donghong Liu, Xinhai Xu, Feng Zhang. 269-274 [doi]
- Dual Contrastive Learning for Unsupervised Knowledge SelectionXiang Cao, Lei Wang, Yujiu Yang. 275-280 [doi]
- Dynamic Heterogeneous Information Network Embedding in Hyperbolic SpaceDingyang Duan, Daren Zha, Xiao Yang, Xiaobo Guo. 281-286 [doi]
- Using Multi-feature Embedding towards Accurate Knowledge TracingYang Yu, Caidie Huang, Liangyu Chen, Mingsong Chen. 287-292 [doi]
- A Zero-Shot Relation Extraction Approach Based on Contrast LearningHongyu Zhu, Jun Zeng, Yu Yang, Yingbo Wu. 293-299 [doi]
- Similarity matching of time series based on key point alignment dynamic time warpingYangzheng Li, Zhigang Chen, Xiaoheng Deng. 300-305 [doi]
- Auto-Encoding GAN for Reducing Mode Collapse and Enhancing Feature RepresentationXiaoxiang Lu, Yang Zou, Xiaoqin Zeng, Xiangchen Wu, Pengfei Qiu. 306-311 [doi]
- An Explainable Knowledge-based AI Framework for Mobility as a ServiceEnayat Rajabi, Slawomir Nowaczyk, Sepideh Pashami, Magnus Bergquist. 312-316 [doi]
- Enhancing Pre-Trained Language Representations Based on Contrastive Learning for Unsupervised Keyphrase ExtractionZhaohui Wang, Xinghua Zhang 0001, Yanzeng Li, Yubin Wang, Jiawei Sheng, Tingwen Liu, Hongbo Xu. 317-322 [doi]
- Exploring Relevance and Coherence for Automated Text Scoring using Multi-task LearningYupin Yang, Jiang Zhong, Chen Wang, Qing Li. 323-328 [doi]
- Exp-SoftLexicon Lattice Model Integrating Radical-Level Features for Chinese NERLijie Li, Shuangyang Hu, Junhao Chen, Ye Wang, Zuobin Xiong. 329-334 [doi]
- AESPrompt: Self-supervised Constraints for Automated Essay Scoring with Prompt TuningQiuyu Tao, Jiang Zhong, Rongzhen Li. 335-340 [doi]
- Increasing Representative Ability for Topic RepresentationRong Yan, Ailing Tang, Ziyi Zhang. 341-346 [doi]
- Exploring MMSE Score Prediction Model Based on Spontaneous SpeechLi Sun, Jieyuan Zheng, Jiyun Li, Chen Qian. 347-350 [doi]
- NKind: a model checker for liveness property verification on Lustre programsJunjie Wei, Qin Li. 351-356 [doi]
- Efficient LTL Model Checking of Deep Reinforcement Learning Systems using Policy ExtractionPeng Jin, Yang Wang, Min Zhang. 357-362 [doi]
- Formal Verification of COCO Database Framework Using CSPPeimu Li, Jiaqi Yin, Huibiao Zhu. 363-368 [doi]
- Formal Verification and Analysis of Time-Sensitive Software-Defined Network ArchitectureWeiyu Xu, Xi Wu, Yongxin Zhao, Yongjian Li. 369-375 [doi]
- Metaheuristic Algorithms for Proof Searching in HOL4M. Saqib Nawaz, Muhammad Zohaib Nawaz, Osman Hasan, Philippe Fournier-Viger. 376-381 [doi]
- Formal specification and model checking of Saber lattice-based key encapsulation mechanism in MaudeDuong Dinh Tran, Kazuhiro Ogata 0001, Santiago Escobar 0001, Sedat Akleylek, Ayoub Otmani. 382-387 [doi]
- A divide and conquer approach to until and until stable model checkingCanh Minh Do, Yati Phyo, Kazuhiro Ogata 0001. 388-393 [doi]
- Managing Risks in Agile Methods: a Systematic Literature MappingFernando Vedoin Garcia, Jean Carlo Hauck, Fernanda N. Rizzo Hahn. 394-399 [doi]
- LSTMcon: A Novel System of Portfolio Management Based on Feedback LSTM with ConfidenceXinjia Xie, Shun Gai, Yunxiao Guo, Boyang Wang, Han Long. 400-405 [doi]
- Research on Identification and Refactoring Approach of Event-driven Architecture Based on OntologyLi Wang, Xianglong Kong, Xiao-Fei Wang, Bi-Xin Li. 406-411 [doi]
- Designing Microservice-Oriented Application FrameworksYunhyeok Lee, Yi Liu. 412-417 [doi]
- Collaborative Web Service Quality Prediction via Network Biased Matrix FactorizationWenhao Zhong, Yugen Du, Chuang Shan, Hanting Wang, Fan Chen. 418-423 [doi]
- A Model Based Approach for Generating Modular Manufacturing Control SystemsMahmoud El Hamlaoui, Yassine Qamsane, Youness Laghouaouta, Anant Mishra. 424-427 [doi]
- Revealing Agile Mindset Using LEGO SERIOUS PLAY: Experience from an Online Agile Training ProjectIlenia Fronza, Xiaofeng Wang 0001. 428-433 [doi]
- Quantum Software Models: Software Density Matrix is a Perfect Direct Sum of Module MatricesIaakov Exman, Alexey Nechaev. 434-439 [doi]
- SCMA: A Lightweight Tool to Analyze Swift ProjectsFazle Rabbi 0002, Syeda Sumbul Hossain, Mir Mohammad Samsul Arefin. 440-443 [doi]
- Anomaly Detection in Spot Welding Machines in the Automotive Industry for Maintenance PrioritizationLaislla Brandão, Aldonso Martins-Jr, Gabriel A. Kopte, Edson Filho, Alexandre Magno Andrade Maciel. 444-448 [doi]
- The Maintenance of Top Frameworks and Libraries Hosted on GitHub: An Empirical StudyYi Huang, XinJun Mao, Zhang Zhang. 449-452 [doi]
- Evaluating the Sustainability of Computational Science and Engineering Software: Empirical ObservationsJames M. Willenbring, Gursimran Singh Walia. 453-456 [doi]
- Decisions in Continuous Integration and Delivery: An Exploratory StudyYajing Luo, Peng Liang 0001, Mojtaba Shahin, Zengyang Li, Chen Yang 0007. 457-462 [doi]
- A THG Performance Case Study in the world of E-CommercePhilip Wilson, Rehman Arshad, James Creedy, Adam Dad, Eloise Slater, Hannah Cusworth. 463-468 [doi]
- EARS2TF: A Tool for Automated Planning Test from Semi-formalized RequirementsHui Liu, Yunfang Li, Zhi Li. 469-470 [doi]
- A Simplified Method for Automatic Verification of Java ProgramsZhi Li, Ling Xie, Yilong Yang. 471-472 [doi]
- Trace4PF: A tool for Automated Decomposition of Problem Diagrams with TraceabilityYajun Deng, Zhi Li, Hongbin Xiao. 473-474 [doi]
- Access-Pattern-Aware Personalized Buffer Management for Database SystemsYigui Yuan, Zhaole Chu, Peiquan Jin, Shouhong Wan. 475-480 [doi]
- DDMin versus QuickXplain - An Experimental Comparison of two Algorithms for Minimizing CollectionsOliver A. Tazl, Christopher Tafeit, Franz Wotawa, Alexander Felfernig. 481-486 [doi]
- Supporting Data Selection for Decision Support Systems: Towards a Decision-Making Data Value TaxonomyMathieu Lega, Christian Colot, Corentin Burnay, Isabelle Linden. 487-492 [doi]
- Data Modeling and Data Analysis in Simulation Credibility Evaluation of Autonomous Underwater VehiclesXiaojun Guo, Zhiping Huang, Shaojing Su, Yunxiao Lv. 493-498 [doi]
- Improving Database Learning with an Automatic JudgeEnrique Martin-Martin, Manuel Montenegro, Adrián Riesco 0001, Rubén Rubio. 499-502 [doi]
- Data Regulation OntologyGuillaume Delorme, Guilaine Talens, Eric Disson. 503-506 [doi]
- Smifier: A Smart Contract Verifier for Composite TransactionsYu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen 0001. 507-512 [doi]
- Ethereum Smart Contract Representation Learning for Robust Bytecode-Level Similarity DetectionZhenzhou Tian, Yaqian Huang, Jie Tian, Zhongmin Wang, Yanping Chen 0006, Lingwei Chen. 513-518 [doi]
- An Information Flow Security Logic for Permission-Based Declassification StrategyZhenheng Dong, Yongxin Zhao, Qiang Wang. 519-524 [doi]
- Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code LearningZhenlan Ji, Pingchuan Ma 0004, Shuai Wang 0011. 525-530 [doi]
- DeepController: Feedback-Directed Fuzzing for Deep Learning SystemsHepeng Dai, Chang-ai Sun, Huai Liu. 531-536 [doi]
- WasmFuzzer: A Fuzzer for WasAssembly Virtual MachinesBo Jiang 0001, Zichao Li, Yuhe Huang, Zhenyu Zhang, W. K. Chan 0001. 537-542 [doi]
- Multi-Frames Temporal Abnormal Clues Learning Method for Face Anti-SpoofingHeng Cong, Rongyu Zhang, Jiarong He, Jin Gao. 543-548 [doi]
- Paying Attention to the Insider ThreatEduardo Lopez, Kamran Sartipi. 549-552 [doi]
- A Novel Network Alert Classification Model based on Behavior SemanticZhanshi Li, Tong Li 0001, Runzi Zhang, Di Wu, Zhen Yang. 553-558 [doi]
- Analyzing Cyber-Physical Systems with Learning Enabled Components using Hybrid Predicate Transition NetsXudong He. 559-563 [doi]
- Problem-specific knowledge based artificial bee colony algorithm for the rectangle layout optimization problem in satellite designYichun Xu, Shuzhen Wan, Fanmin Dong. 564-567 [doi]
- Modeling and Verifying AUPS Using CSPHongqin Zhang, Huibiao Zhu, Jiaqi Yin, Ningning Chen. 568-573 [doi]
- Formal Verification of the Lim-Jeong-Park-Lee Autonomous Vehicle Control Protocol using the OTS/CafeOBJ MethodTatsuya Igarashi, Masaki Nakamura 0001, Kazutoshi Sakakibara. 574-579 [doi]
- Improving the Early Rumor Detection Performance of the Deep Learning Models By CGANFangmin Dong, Yumin Zhu, Shuzhen Wan, Yichun Xu. 580-585 [doi]
- Recurrent Graph Convolutional Network for Rumor DetectionSong Wu, Hailin Xiong, Ye Yang, Jinming Zhang, ChenWei Lin. 586-592 [doi]
- Chinese Spam Detection based on Prompt TuningYan Zhang, Chunyan An. 593-597 [doi]
- Identifying Gambling Websites with Co-trainingChenyang Wang, Pengfei Xue, Min Zhang, Miao Hu. 598-603 [doi]
- Social Information Popularity Prediction based on Heterogeneous Diffusion Attention NetworkXueqi Jia, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Weiwei Cao, Hong Sun. 604-609 [doi]
- Context-Aware Model for Mining User Intentions from App ReviewsJinwei Lu, Yimin Wu, Jiayan Pei, Zishan Qin, Shizhao Huang, Chao Deng. 610-615 [doi]
- COAT: A Music Recommendation Model based on Chord Progression and Attention MechanismsWeite Feng, Tong Li 0001, Zhen Yang. 616-621 [doi]
- Deep Correlation based Concept Recommendation for MOOCsShengyu Mao, Pengyi Hao, Cong Bai. 622-627 [doi]
- Postoperative MPA-AUC0-12h Prediction for Kidney Transplant Recipients based on Few-shot LearningQiao Pan, Xinyu Yu, Xinyu Li, Kun Shao. 628-633 [doi]
- Correlation Feature Mining Model Based on Dual Attention for Feature Envy DetectionShuxin Zhao, Chongyang Shi, Shaojun Ren, Hufsa Mohsin. 634-639 [doi]
- Graph Embedding Models for Community DetectionYinan Chen, Zhuanming Gao, Dong Li. 640-645 [doi]
- An Emotion Cause Detection Method Based on XLNet and Contrastive LearningHai-feng Zhang, Cheng Zeng, Peng He. 646-649 [doi]