Abstract is missing.
- ICT-based Digital AgricultureHyun Yoe. 1 [doi]
- What is Asked About Ionic on Stack Overflow (SO) ? An Empirical StudyFatima Ezzahra Chaabi, Reem Alfayez. 2-7 [doi]
- Automated Theory Substitution Toward Proof-Driven Software DevelopmentJohn Scebold, Eric Bond, Emily Gray, Jared Ziegler. 8-16 [doi]
- Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing PerformanceXianshan Qu, Fei Zuo, Xiaopeng Li 0001, Junghwan Rhee. 17-23 [doi]
- Improving Accuracy of LLM-based Code Clone Detection U sing Functionally Equivalent MethodsRyutaro Inoue, Yoshiki Higo. 24-27 [doi]
- Estimating the Difficulty of Programming Problems Using Fine-tuned LLMChihiro Yoshida, Makoto Matsushita, Yoshiki Higo. 28-34 [doi]
- Adaptive Frequency Cluster-Level Performance Profiler for Multi-Domain ApplicationsHoyong Lee, Hayeon Park, Chang-Gun Lee. 35-42 [doi]
- SBOM Challenges for Developers: From Analysis of Stack Overflow QuestionsWataru Otoda, Tetsuya Kanda 0001, Yuki Manabe 0001, Katsuro Inoue, Yoshiki Higo. 43-46 [doi]
- Reinforcement Learning Architecture for Facial Skin Treatment RecommenderJennifer Kim Jin, Khalil Dajani, Mira Kim, Soo Dong Kim, Bilal Khan, Daniel Hyun Jin. 47-54 [doi]
- Design of REST API Client for Conversational Agent using Large Language Model with Open API SystemSeongGyeol Park, Ahtae Kim, SooKyung Lee, Haeun Lee, Chayapol Kamyod, Cheong-Ghil Kim. 55-58 [doi]
- Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And PrivacySuhan Jiang, Jie Wu 0001, Fei Zuo. 59-65 [doi]
- Enhancing Reliability in Hybrid Cross-Chain Models: Adaptive Thresholds for Performance and AdaptabilityJongho Seol, Abhilash Kancharla, Jongyeop Kim. 66-72 [doi]
- Optimizing Cross-Chain DeFi and Smart Contracts in Stochastic IntegrationJongho Seol, Jongyeop Kim, Abhilash Kancharla. 73-80 [doi]
- Project-based Learning in Software Engineering Education: Integrating Blockchain-Oriented Repositories in SE Curriculum and CourseworkMd. Jobair Hossain Faruk, Masrura Tasnim, Jerry Q. Cheng. 81-87 [doi]
- Revising the Problem of Partial Labels from the Perspective of CNNs' RobustnessXin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang, Fei Zuo. 88-93 [doi]
- A Robust Attention-based Convolutional Neural Network for Monocular Depth EstimationYuqi Song, Xin Zhang, Bokai Yang, Fei Zuo, Xianshan Qu. 94-99 [doi]
- Leveraging Conditional Generative Adversarial Networks for cosmic microwave background separationSaurabh Shinde. 100-106 [doi]
- Revisiting Program Suitability for Fault Localization with Large Dataset and Various Mutation OperatorsHikaru Kubo, Yoshiki Higo, Shinji Kusumoto. 107-114 [doi]
- Performance Analysis of Quantum Computer Simulators Across Different EnvironmentsNozomi Aoki, Masafumi Yamazaki, Akira Hirai, Mari Yamaoka, Naoto Fukumoto, Akihiko Kasagi, Masato Oguchi. 115-120 [doi]
- Design of AI-Based Smart Crop Harvesting SystemSeung-Jae Kim, Hyun Yoe, Kyeong Il Ko, Meong-hun Lee. 121-124 [doi]
- A Study on ARIMA-Based Melon Size Prediction and Monitoring System DesignSangmin Lim, Meong-hun Lee, Hyeon O Choe, Hyun Yoe. 125-128 [doi]
- Multi Label Sound Classification using Deep Learning ModelsTasnim Akter Onisha, Jongyeop Kim, Jongho Seol. 129-134 [doi]
- Multi-Class Label Detection and Bounding Box Regression Using Transformer with a Customized Loss FunctionHong Cheng, Rupesh Konduru. 135-138 [doi]
- Exploring Flavors Through AI: The Future of Culinary Taste PredictionCemil Emre Yavas, Jongyeop Kim, Lei Chen 0029. 139-147 [doi]
- Hybrid ASCII Art Extraction Algorithm Based on String DistanceXiujuan Wang, Xiaotong Wu, Haochen Shi, Shuaibing Lu. 148-152 [doi]
- Exploiting CPU Clock Modulation for Covert Communication ChannelShariful Alam, Jidong Xiao, Nasir U. Eisty. 153-158 [doi]
- Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment AnalysisShahrzad Sayyafzadeh, Mark Weatherspoon, Jie Yan, Hongmei Chi. 159-165 [doi]
- Decade-long Utilization Patterns of ICSE Technical Papers and Associated ArtifactsSharif Ahmed, Rey Ortiz, Nasir U. Eisty. 166-173 [doi]
- Automatic Configurator to Prevent Attacks for Azure Cloud SystemChijung Jung, Yung Ryn Choe, Junghwan Rhee, Yonghwi Kwon 0001. 174-181 [doi]
- DiffECG: A Versatile Probabilistic Diffusion Model for ECG Signals SynthesisNour Neifar, Achraf Ben-Hamadou, Afef Mdhaffar, Mohamed Jmaiel. 182-188 [doi]
- Leveraging Shared Accelerators in Kubernetes Clusters with rOpenCLRui Alves, José Rufino. 189-192 [doi]
- A Study of Efficient Needs-Based Service Development Using Software UpcyclingTakuya Nakata, Sinan Chen, Sachio Saiki, Masahide Nakamura. 193-198 [doi]
- Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing SystemHikaru Tomita, Mariko Sasakura, Kinari Nishiura, Hiroki Inayoshi, Akito Monden. 199-205 [doi]
- An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library SystemsToru Nakamichi, Kinari Nishiura, Mariko Sasakura, Akito Monden. 206-211 [doi]
- Long-Term Fine-grained Forecasts of Emergency Demand Using EMS Big Data and Regional Mesh Population EstimatesMasaki Kaneda, Sinan Chen, Masahide Nakamura, Sachio Saiki. 212-217 [doi]
- Implementing of a Remote Task Execution Service for Automated Management of Hybrid Meeting SpacesTakeshi Yoshida, Sinan Chen, Masahide Nakamura, Sachio Saiki. 218-223 [doi]
- *Hiro Okamoto, Sinan Chen, Masahide Nakamura, Sachio Saiki. 224-229 [doi]
- Evaluating Recognition AI and Personal Memories Using Time-Series Images in Daily ActivitiesRaiki Saito, Sinan Chen, Sachio Saiki, Masahide Nakamura. 230-236 [doi]
- Characterising Contributions that Coincide with Vulnerability Mitigation in NPM LibrariesRuksit Rojpaisarnkit, Hathaichanok Damrongsiri, Christoph Treude, Ali Ouni 0001, Raula Gaikovina Kula. 237-242 [doi]
- Contributing Back to the Ecosystem: A User Survey of NPM DevelopersSupatsara Wattanakriengkrai, Christoph Treude, Raula Gaikovina Kula. 243-248 [doi]
- Drop it All or Pick it Up? How Developers Responded to the Log4JShell VulnerabilityVittunyuta Maeprasart, Ali Ouni 0001, Raula Gaikovina Kula. 249-254 [doi]
- Need of Public-Private Healthcare Collaboration for Managing Seasonal Dengue Fever in West BengalAnwesha Nag, Takaaki Goto, Subhankar Roy, Partha Ghosh. 255-260 [doi]
- A Machine Learning Based Automated Model for Managing Student DropoutPartha Ghosh, Arnab Charit, Hindol Banerjee, Debanwesa Bandhu, Agniv Ghosh, Ankita Pal, Takaaki Goto, Soumya Sen. 261-266 [doi]
- A Spatial Data Pipeline for Streaming Smart City DataChase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Sergiu M. Dascalu, Frederick C. Harris Jr.. 267-272 [doi]
- SpeciServe. a gRPC Infrastructure ConceptChase D. Carthen, Araam Zaremehrjardi, Zachary Estreito, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu. 273-276 [doi]
- AI-Driven Analysis and Prediction of Energy Consumption in NYC's Municipal BuildingsHossein Jamali, Sergiu M. Dascalu, Frederick C. Harris Jr.. 277-283 [doi]
- Proposal of Automatic Sirocco Fan Washing SystemMomoka Shiraishi, Haru Okazaki, Seiichi Serikawa, Yuhki Kitazono. 284-289 [doi]
- Segmentation Method of Boxed Lunch Images by Weight Optimization Using Color Texture DissimilarityYangyang Qian, Koki Hayakawa, Seiji Nishifuji, Shenglin Mu, Shota Nakashima. 290-294 [doi]
- Observation and Evaluation for Individual Student Using Learning Analytics of Software Programing and Functional QuestionnaireMotoi Nakao, Yuhei Oomachi. 295-299 [doi]
- Extraction and Application of Introspection using Lego® Serious Play® Combined with Software MethodMotoi Nakao, Yuhei Oomachi, Michiko Matsuda. 300-303 [doi]
- Using 2-gram to Detect Potential Appropriate Respondents to Questions at Q&A SitesYuya Yokoyama. 304-309 [doi]
- Revised Transition Method in Impression Spaces for Multimedia Positive ComputingTeruhisa Hochin. 310-314 [doi]
- Applying Impression Evaluation Method by Space to Multimedia Data Retrieval Using Impression WordsTeruhisa Hochin, Tran Thi Bich Lien. 316-321 [doi]
- Clarifying Specification Semantics of Impression Evaluation Method by Space Based on PeaksTeruhisa Hochin. 322-327 [doi]
- Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPTDaiki Yokoyama, Kinari Nishiura, Akito Monden. 328-333 [doi]
- Global Alignment Learning for Code SearchJuntong Hong, Eunjong Choi, Kinari Nishiura, Osamu Mizuno. 334-339 [doi]
- Analyzing the Inpact of Formal Methods on Isuue Trends Using BERTopicSoshi Inoue, Kinari Nishiura, Eunjong Choi, Osamu Mizuno. 340-345 [doi]
- A Comparative Study on COSMIC FP Approximation with Deep Learning and Conventional Machine LearningKaoru Yokogawa, Masashi Hiroishi, Sousuke Arnasaki, Hirohisa Aman, Tomoyuki Yokogawa. 346-351 [doi]
- A Multi - Aspect Evaluation of DL-based SQLi Attack Detection ModelsPattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa. 352-355 [doi]
- An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate NamesYahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 356-361 [doi]
- Quantitative Analysis of Conversational Response Nuances Using Visual Analog Scale, Data Visualization, and ClusteringNaruki Shirahama, Shinichi Kondo, Keiji Matsumoto, Kenji Moriya, Naofumi Nakaya, Kazuhiro Koshi, Satoshi Watanabe. 362-367 [doi]
- A Study of the Distribution Between Visual Analog Scale and Likert Scale for Subjective Evaluation of "Like-Dislike"Satoshi Watanabe, Naofumi Nakaya, Yuji Matsumoto 0003, Naruki Shirahama. 368-372 [doi]
- A Study on the Generation of Spectrogram for the Detection of Venous Needle Dislodgement by Image Recognition Using Machine LearningNaofumi Nakaya, Mutsuki Koizumi, Satoshi Watanabe, Naruki Shirahama, Takayuki Abe, Akihiro Watanabe. 373-376 [doi]
- Evaluation of Machine Tool Operating State Estimation using Channel State InformationTakanori Matsuzaki, Shinjo Kato, Yoshihiro Asano, Yuga Sako, Kozo Horiuchi, Hiroshi Shiratsuchi. 377-382 [doi]