Abstract is missing.
- Short Review of Intention Mining in Social Crisis Management through Automatic TechnologiesXinzhi Wang 0001, Mengyue Li, Yige Yao, Zhennan Li, Yi Liu, Hui Zhang 0016. 2-7 [doi]
- Topic and Speaker-aware Hierarchical Encoder-Decoder Model for Dialogue GenerationQitao Hu, Xiao Wei 0002. 8-13 [doi]
- Convolution Neural Network Based Patent Infringement Detection MethodSenjun Pei, Weidong Liu. 14-19 [doi]
- DDCL: A Dual Decision-making Continuous Reinforcement Learning Method Based on Sim2RealWenwen Xiao, Xinzhi Wang 0001, Xiangfeng Luo, Shaorong Xie. 20-25 [doi]
- Inclusive Gamification: An Exploratory Study in Software Development Enterprises (S)Fayrouz Elsalmy, Nada Sherief, Walid M. Abdelmoez. 26-29 [doi]
- Will you use software development support using biosignals? A survey from software developersRyo Soga, Hideyuki Kanuka, Takatomi Kubo, Takashi Ishio, Kenichi Matsumoto. 31-36 [doi]
- Assuring Domain Software Quality through Workflow Testing and SpecificationMelody L. Hammel, Lan Lin. 37-44 [doi]
- GSAGE2defect: An Improved Approach to Software Defect Prediction based on Inductive Graph Neural NetworkJu Ma, Yi-Yang Sun, Peng He, Zhang-Fan Zeng. 45-50 [doi]
- Small Educational Steps Towards Improving the Status of Women in Software EngineeringPankaj Kamthan, Nazlie Shahmir. 51-56 [doi]
- BDC: Using BERT and Deep Clustering to Improve Chinese Proper Noun RecognitionYuanchi Ma, Hui He, Zhendong Niu. 57-62 [doi]
- Applying Reinforcement Learning for Automated Testing of Mobile Application Focusing on State Definition, Reward, and Learning MethodKeita Murase, Shingo Takada 0001. 64-69 [doi]
- A Model-Driven Development Framework for Geographical and Relational Database SystemsCarlos Eduardo Pantoja, João Victor Guinelli, Tielle Alexandre, José Viterbo. 70-75 [doi]
- Expansion Mechanism for Runtime Verification of Self-adaptive SystemsMasaya Fujimoto, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 76-81 [doi]
- Automatic Discovery of Controversial Legal Judgments by an Entropy-Based Measurement (S)Jing Zhou, Shan Leng, Fang Wang, Hansheng Wang. 82-85 [doi]
- Context, Content, Consent - How to Design User-Centered Privacy Explanations (S)Wasja Brunotte, Jakob Droste, Kurt Schneider. 86-89 [doi]
- Quantum Software Models: Quantum Modules Tomography and Recovery TheoremIaakov Exman, Ariel Zvulunov. 91-96 [doi]
- Automatic Diagnosis of Quantum Software Bug Fix MotifsKrishn Vishwas Kher, Ishan Joshi, Bharat Chandra Mukkavalli, Lei Zhang, M. V. Panduranga Rao. 97-102 [doi]
- Symbolic Model Checking Quantum Circuits in MaudeCanh Minh Do, Kazuhiro Ogata 0001. 103-108 [doi]
- Using Z3 for Formal Modeling and Verification of FNN Global Robustness (S)Yihao Zhang, Zeming Wei, Xiyue Zhang, Meng Sun 0002. 110-113 [doi]
- Blockchain-based Food Traceability System for Apulian Marketplace: Enhancing Transparency and Accountability in the Food Supply Chain (S)Marco Fiore, Marina Mongiello, Giovanni Tricarico, Francesco Bozzo, Cinzia Montemurro, Alessandro Petrontino, Clemente Giambattista, Giorgio Mercuri. 114-117 [doi]
- Applying Symbolic Execution to Semantic Code Clone Detection (S)Kazusa Takemoto, Shingo Takada 0001. 118-122 [doi]
- Practices and Challenges of Using GitHub Copilot: An Empirical StudyBeiqi Zhang, Peng Liang 0001, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem. 124-129 [doi]
- An Empirical Study of Coding Style Compliance on Stack OverflowQing Mi, Haotian Bai, Xiaozhou Wang, Wenrui Liu, Xingyue Song. 130-135 [doi]
- Mining the Relationship between Object-Relational Mapping Performance Anti-patterns and Code ClonesZeshan Xu, Jie Zhu, Li Yang, Chun Zuo. 136-141 [doi]
- Contribution-based Test Case Reduction Strategy for Mutation-based Fault Localization (S)Haifeng Wang, Kun Yang, Xiangnan Zhao, Yuchen Cui, Weiwei Wang. 142-145 [doi]
- Understanding the Pre-Contract Process of Small Software ProjectsAnelis Pereira Vale, Daniel Perovich, Sergio F. Ochoa. 146-151 [doi]
- Fortran Code Refactoring Based on MapReduce Programming ModelJunfeng Zhao, Wenhui Gai, Han Wu. 152-157 [doi]
- A Case Study of Dependency Network for Building Packages: The Fedora Linux DistributionJiman Du, Jiaxin Zhu, Hui Liu 0003, Wei Chen, Lijie Xu, Jie Liu, Zhifeng Chen. 158-161 [doi]
- EasyPip: Detect and Fix Dependency Problems in Python Dependency Declaration FilesShuo Li, Jie Liu 0008, Haoxiang Tian, Shuai Wang, Wei Chen 0018, Liangyi Kang, Dan Ye. 162-168 [doi]
- CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale SoftwarePeiyang Li, Zixin Liu, Yuening Su, Hao Wang, Bo Jiang 0001. 169-174 [doi]
- Detect Stack Overflow Bugs in Rust via Improved Fuzzing TechniqueZhiyong Ren, Hui Xu. 175-180 [doi]
- An Efficient Design Smell Detection Approach with Inter-class Relation (S)Hao Zhu, Yichen Li, Jie Li, Xiaofang Zhang. 181-186 [doi]
- Dissecting Scale-Out Applications Performance on Diverse TLB Designs (S)Tianmai Deng, Yixiao Xu, Chi Zhang, Zhengwei Qi. 187-192 [doi]
- Real-time Estimation Approach to Scrum Projects Effort: Task Point and Individual Reliability (S)Yu Guo, Jun Guo, Mohan Shi, Aixuan Dong. 193-196 [doi]
- ASC4AI: A Novel Automatic Service Composition Framework for AI Systems (S)Zhiguo Li, Qin Li. 197-202 [doi]
- A Review of Methods for Identifying Extract Method RefactoringOmkarendra Tiwari, Vrinda Yadav. 203-208 [doi]
- Towards generating contextualised fault scenarios for reliability risk analysis of cyber-physical systems (P)Lufeng Wei, Zhi Li, Yuansong Qin. 209-210 [doi]
- CCGRA: Smart Contract Code Comment Generation with Retrieval-enhanced ApproachZhenhua Zhang, Shizhan Chen, Guodong Fan, Guang Yang, Zhiyong Feng 0002. 212-217 [doi]
- Detecting Design Patterns As Described By An Explicit Specification (S)Ed van Doorn, Sylvia Stuurman. 218-221 [doi]
- Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S)Jingjing Wang, Minhuan Huang, Yuanping Nie, Xiaohui Kuang, Xiang Li 0078, Wenjing Zhong. 222-227 [doi]
- Software Defect Prediction via Positional Hierarchical Attention Network (S)Xinyan Yi, Hao Xu, Lu Lu 0011, Quanyi Zou, Zhanyu Yang. 228-231 [doi]
- Just-in-Time Defect Severity Prediction (S)Ran Mo, Yushuo Wang, Yao Zhang, Zengyang Li. 232-237 [doi]
- A Software Defect Prediction Method based on Multi-type Features and Feature SelectionJiaxin Liu, Hao Xu, Lu Lu, Quanyi Zou, Zhanyu Yang. 238-243 [doi]
- Identifying Risks and Risk Mitigation Strategies for Collaborative Systems during Requirements Engineering: A Goal-Oriented Approach (S)Kirthy Kolluri, Tom Hill, Lawrence Chung. 244-249 [doi]
- AFL2oop: Loop Coverage Guided Greybox Fuzz TestingHaochen Jin, Liwei Zheng, Zhanqi Cui. 250-255 [doi]
- Research on Directed Grey-box Fuzzing Technology Based on Target (S)Liang Sun, Peng Wu, Shaoxian Shu. 256-261 [doi]
- DeepRank: Test Case Prioritization for Deep Neural NetworksWei Li, Zhiyi Zhang, Yifan Jian, Chen Liu, Zhiqiu Huang. 262-267 [doi]
- Code Clone Detection via Software Visualization Representation LearningShaojian Qiu, Shaosheng Wang, Yujun Liang, Wenchao Jiang, Fanlong Zhang. 268-273 [doi]
- Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code ClassificationGuang Yang, Tiancheng Jin, Liang Dou. 274-279 [doi]
- Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement LearningShuaishuai Feng, Xi Wu, Yongxin Zhao, Yongjian Li. 280-285 [doi]
- GAT-Team: A Team Recommendation Model for Open-Source Software ProjectsQing Qi, Jian Cao 0001. 286-291 [doi]
- An Empirical Study of Adversarial Training in Code Comment GenerationYiheng Shen, Xiaolin Ju, Xiang Chen 0005, Guang Yang. 292-297 [doi]
- No-Reference Point Cloud Quality Assessment via Weighted Patch Quality PredictionJun Cheng, Honglei Su, Jari Korhonen. 298-303 [doi]
- GraphPLBART: Code Summarization Based on Graph Embedding and Pre-Trained ModelJie Li, Lixuan Li, Hao Zhu, Xiaofang Zhang. 304-309 [doi]
- An Efficient Lossless Graph Summarization Method for Large Streaming GraphsQia Wang, Yi Wang, Ying Wang. 311-316 [doi]
- Combining Structure Embedding and Text Semantics for Efficient Knowledge Graph CompletionWen Sun, Yifan Li, Junfeng Yao, Qingqiang Wu 0001, KunHong Liu 0001. 317-322 [doi]
- CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S)Li e Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu, ZhiGang Sun, Tianran Liu. 323-328 [doi]
- An Effective Method for Constructing Knowledge Graph to Search Reusable ROS Nodes (S)Yuxin Zhao, XinJun Mao, Sun Bo, Tanghaoran Zhang, Shuo Yang 0005. 329-332 [doi]
- Multi-Domain Feature Representation, Multi-Dimensional Feature Interaction for Person-Job FitBin Li, Jianwen Ding, Zhennan Chen, Hanpeng Jiang, Fan Lin. 333-338 [doi]
- Related Questions Detection Model in Stack Overflow based on Semantic MatchingShizhao Huang, Yimin Wu, Jinwei Lu, Chao Deng. 339-344 [doi]
- Learning Event Logic Graph Knowledge for Credit Risk ForecastYifan Wang, Jibin Wang, Jing Shang, Zhuo Chen, Xuelian Ding, Heyuan Wang. 345-350 [doi]
- SAWD: Structural-Aware Webshell Detection System with Control Flow GraphJunMin Zhu, Yizhao Yao, Xianwen Deng, Yaoguang Yong, Yanhao Wang, Libo Chen, Zhi Xue, Ruijie Zhao 0001. 351-356 [doi]
- LTLf Satisfiability Checking via Formula Progression (S)Tong Niu, Yicong Xu, Shengping Xiao, Lili Xiao, Yanhong Huang, Jianwen Li. 357-362 [doi]
- Formal Specification and Verification of an Autonomous Vehicle Control System by the OTS/CafeOBJ method (S)Yifan Wang, Masaki Nakamura 0001, Kazutoshi Sakakibara, Yuki Okura. 363-366 [doi]
- Assistance in the management of rule sets for rule-based expert systems (S)Magali Legast, Axel Legay. 367-372 [doi]
- Modeling and Verification of Autonomous Driving Systems under Stochastic Spatio-Temporal ConstraintsMengyuan Wang, Tengfei Li 0002, Jing Liu 0012, Hui Dou, Hongtao Chen, John Zhang, Lipeng Zhang. 373-378 [doi]
- Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S)Georg Grabner, Ali Ahmed 0001, Nilufar Baghaei. 380-385 [doi]
- DNN Inference Task Offloading Based on Distributed Soft Actor-Critic in Mobile Edge ComputingWenxiu Xu, Ningjiang Chen, Huan Tu. 386-391 [doi]
- Bindox: An Efficient and Secure Cross-System IPC Mechanism for Multi-Platform ContainersYuxin Xiang, Bing Deng, Hongyu Zhang, Randy Xu, Marc Mao, Yun Wang, Zhengwei Qi. 392-397 [doi]
- Smart Contract Vulnerability Detection Based on Clustering Opcode InstructionsXiguo Gu, Huiwen Yang, Shifan Liu, Zhanqi Cui. 398-403 [doi]
- Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSPYingjia Du, Yuan-fei, Sini Chen, Huibiao Zhu. 404-409 [doi]
- Survey on Data Ingestion for AutoML (S)Gabriel Mac'Hamilton Renaux Alves, Alexandre Magno Andrade Maciel. 411-414 [doi]
- DGNN: Dynamic Graph Neural Networks for Anomaly Detection in Multivariate Time SeriesBowen Chen. 415-420 [doi]
- FOODIE: A Data-centric Sifting Framework for Social Media AnalyticsDolly Agarwal, Abdullah Al Imran, Kasun S. Perera. 421-426 [doi]
- Towards Extreme Multi-label Text Classification Through Group-wise Label RankingJie Xiong, Huiyuan Li, Qiyuan Duan, Qihan Du. 427-432 [doi]
- Interactive Visualization of Temporal Brain Connectivity Data based-on Frequent Feature Mining (S)Guangwei Zhang, Ming Jing, Yunjing Liu, Li Zhang 0122, Anming Dong, Jiguo Yu. 433-436 [doi]
- A Dynamic Drilling Sampling Method and Evaluation Model for Large-Scale Streaming DataPeng Zhang, Zhaohui Zhang, Chaochao Hu, Pengwei Wang 0001. 437-442 [doi]
- ASTD: Automatic Seasonal-Trend Decomposition for Time SeriesBowen Chen. 443-448 [doi]
- A novel subjective bias detection method based on multi-information fusionLidan Zhao, Tong Li 0001, Zhen Yang 0004, Junrui Liu. 449-455 [doi]
- ASMix: An Attention-based Smooth Data Augmentation ApproachRongxi Guo, Wanrong Jiang, Xi Zhao, Ding Cao, Guiquan Liu. 456-461 [doi]
- An Optimal Spacing Approach for Sampling Small-sized DatasetsSamuel Abedu, Solomon Mensah, Frederick Boafo, Eva Bushel, Elizabeth Akuafum. 462-467 [doi]
- Heterogeneous Multi-Agent Communication Learning via Graph Information MaximizationWei Du, Shifei Ding. 468-473 [doi]
- Identifying Influential Spreaders in Complex Networks Using Neighborhood Network StructureZiyi Zhang, Rong Yan, Wei Yuan. 474-479 [doi]
- Altering Backward Pass Gradients to Improve Convergence (S)Bishshoy Das, Milton Mondal, Brejesh Lall, Shiv Dutt Joshi, Sumantra Dutta Roy. 481-486 [doi]
- BOP: A Bitset-based Optimization Paradigm for Content-based Event Matching Algorithms (S)Wei Liang, Wanghua Shi, Zhengyu Liao, Shiyou Qian, Zhonglong Zheng, Jian Cao 0001, Guangtao Xue. 487-492 [doi]
- Transient Data Caching Based on Maximum Entropy Actor-Critic in Internet-of-Things NetworksYu Zhang, Ningjiang Chen, Siyu Yu. 493-498 [doi]
- Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution EnvironmentYulong Wang, Kai Deng, Fanzhi Meng, Zhi Chen, MingYong Yin, Run Yang. 499-504 [doi]
- HaeNAS: Hardware-Aware Efficient Neural Architecture Search via Zero-Cost ProxyYaodanjun Ren, Chen Chen, Zhengwei Qi. 505-510 [doi]
- L*-Based Learning of Probabilistic Timed Automata with One Clock (S)Rong Wu. 511-516 [doi]
- DeepMultiple: A Deep Learning Model for RFID-based Multi-object Activity RecognitionShunwen Shen, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang. 518-523 [doi]
- A Dynamic Matching Time Strategy Based on Multi-Agent Reinforcement Learning in Ride-HailingShuai Li, Bing Shi, Yaping Deng. 524-529 [doi]
- mTrader: A Multi-Scale Signal Optimization Deep Reinforcement Learning Framework for Financial Trading (S)Zhennan Chen, Zhicheng Zhang, Pengfei Li, Lingyue Wei, Shibo Feng, Fan Lin. 530-535 [doi]
- Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency TreeLei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si, Xinyun Wu. 536-541 [doi]
- Smart Monitoring for Safety-Assurance in Autonomous Driving (S)Georg Stettinger, Franz Wotawa. 542-547 [doi]
- Fake News Detection with Context Awareness of the PublisherXingchen Ding, Chong Teng, Donghong Ji. 548-553 [doi]
- PSRL: A New Method for Real-Time Task Placement and Scheduling Using Reinforcement LearningBakhta Haouari, Rania Mzid, Olfa Mosbahi. 554-559 [doi]
- A Triplet Network Approach for Chinese Confusing Text ClassificationRui Xu, Cheng Zeng, Yujin Liu, Peng He, Min Chen. 560-565 [doi]
- Applications of Machine Learning in Requirements Traceability: A Systematic Mapping Study (S)Xingfu Li, Bangchao Wang, Hongyan Wan, Yang Deng, Zihan Wang. 566-571 [doi]
- FeDeFo: A Personalized Federated Deep Forest Framework for Alzheimer's Disease DiagnosisChen Qian, Hui Xiong, Jiyun Li. 572-577 [doi]
- A Detection-based Attention Alignment Method for Document-level Neural Machine TranslationKang Zhong, Wu Guo, Bin Gu 0004, Weitai Zhang, Chao Lin. 578-583 [doi]
- Widget Hierarchy Graph Guided Crash Reproduction Method for Android Applications (S)Gaoyi Lin, Zhihua Zhang, Zhanqi Cui. 584-587 [doi]
- Construction Site Fence Recognition Method Based on Multi-Scale Attention Fusion ENet Segmentation Network (S)Xing Zhang, Tinglong Tang, Yirong Wu, Tingwei Quan. 588-593 [doi]
- SLPKT: A Novel Simulated Learning Process Model for Knowledge TracingJingxia Zeng, Mianfan Chen, Jianing Liu, Yuncheng Jiang. 594-599 [doi]
- SARNet: A Self-Attention Embedded Residual Network for Multiclass Classification of Chronic Wounds (S)Chen Qian, Boyin Yang, Jiyun Li. 600-603 [doi]
- AT-NCF: An Attention-based Time-aware Neural Collaborative Filtering Approach for Personalized Recommendation (S)Yimin Peng, Rong Hu, Yiping Wen. 604-607 [doi]
- MB-DP: A Multi-behavior Recommendation Model Integrating Dynamic PreferencesCairong Yan, Xiaopeng Guan, Haixia Han, Zhaohui Zhang. 608-613 [doi]
- LMGFuse: Language Models and Graph reasoning Fuse deeply for question answeringAoxing Wang, Pengfei Duan, Yongbing Li, Wenyan Hu, Shengwu Xiong. 615-620 [doi]
- KLAPrompt: Infusing Semantic Knowledge into Pre-trained Language Models by Long-answer Prompt LearningZuotong Xie, Kai Ouyang, Xiangjin Xie, Hai-Tao Zheng 0002, Wenqiang Liu, Dongxiao Huang, Bei Wu. 621-626 [doi]
- Reinforced Multi-modal Circulant Fusion based Transformers for Rumor Detection (S)Xingang Wang, Xiaomin Li, Xiaoyu Liu. 627-631 [doi]
- A Medical Question Classification Approach Based on Prompt Tuning and Contrastive Learning (S)Qian Wang, Cheng Zeng, Yujin Liu, Peng He. 632-635 [doi]
- An intelligent question answering system based on RoBERTa-WWM under home appliance knowledge graph (S)Xiaoyan Gao, Ji Chen, Xiangqian Ding, Shuo Shi, Junhua Jia, Xiaowei Xin. 636-641 [doi]
- Variational Autoencoder with Stochastic Masks to Solve Exposure Bias in Recommendation (S)Yingshuai Kou, Neng Gao, Yifei Zhang. 642-645 [doi]
- Anaphora Ambiguity Detection Method Based on Cross-domain Pronoun Substitution (S)Fengyong Peng, Xi Wu, Yongxin Zhao, Yongjian Li. 646-649 [doi]
- Multi-source Machine Reading Comprehension with Meta-Learning and Adaptive Adversarial TrainingZhe Wen, Yatao Qi, Huan Liu, Zheng Lin 0001, Weiping Wang 0005. 650-655 [doi]
- Enhanced BERT with Graph and Topic Information for Short Text Classification (S)Tong Zhang, Ailing Tang, Rong Yan. 656-659 [doi]
- Few-Shot Link Prediction using Variational Heterogeneous Attention NetworksXi Tao, Hao Wang, Xiangfeng Luo, Pinpin Zhu. 660-665 [doi]
- HGAPT: Heterogeneous Graph Augmented Prompt Tuning for Low-Resource Fake News DetectionXingchen Ding, Chong Teng, Donghong Ji, Fei Li. 666-671 [doi]
- Token-level Input Grammar Synthesis (P)Yunlai Luo. 672-673 [doi]
- YOLOv7-marine: An Improved YOLOv7 Model for Object Detection in Marine Environments (S)Puhui Qu, Keyu Chen, En Cheng. 675-678 [doi]
- Object-Level Contrast Learning for 3D Sparse Object Detection in Ocean SceneYuheng He, Wenbin Yang, Xiangfeng Luo, Liyan Ma, Shaorong Xie. 679-684 [doi]
- Few-Shot Object Detection via Instance-wise and Prototypical Contrastive LearningQiaoning Lei, Yinsai Guo, Liyan Ma, Xiangfeng Luo. 685-690 [doi]
- SWS-NET: An Image Segmentation Framework For Chronic Wounds Based On Self-Supervised LearningJiyun Li, Sheng Yang, Qian Chen. 691-696 [doi]
- BDC-FR: Faster R-CNN with Balanced Domain Classifier for Cross-Domain Object Detection (S)Shouhong Wan, Rui Wang, Peiquan Jin, Xuebin Yang. 697-700 [doi]
- MBR-MDA: Multi-person Behavior Recognition Method Based on Multi Descriptors AggregationsYang Luo, Rongheng Lin. 701-706 [doi]