


default search action
18th ENASE 2023: Prague, Czech Republic
- Hermann Kaindl

, Mike Mannion
, Leszek A. Maciaszek:
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2023, Prague, Czech Republic, April 24-25, 2023. SCITEPRESS 2023, ISBN 978-989-758-647-7
Invited Speakers
- Barbara Weber:

Leveraging Digital Trace Data to Investigate and Support Human-Centered Work Processes. ENASE 2023: 5 - Letizia Jaccheri:

On the Relation Between Gender and Software Engineering. ENASE 2023: 7 - Robert Winter:

Enterprise-Level IS Research: Challenges and Potentials of Looking Beyond Enterprise Solutions. ENASE 2023: 9
Papers
- Alberto García S., Mireia Costa, Ana León, José F. Reyes, Oscar Pastor:

Human-Centered Design for the Efficient Management of Smart Genomic Information. 15-26 - Zarrin Tasnim Sworna, Anjitha Sreekumar, Chadni Islam, Muhammad Ali Babar:

Security Tools' API Recommendation Using Machine Learning. 27-38 - Devi Karolita

, John Grundy, Tanjila Kanij, Humphrey O. Obie, Jennifer McIntosh:
What's in a Persona? A Preliminary Taxonomy from Persona Use in Requirements Engineering. 39-51 - Zakaria Maamar, Amel Benna, Nabil Otsmane:

Time-Constrained, Event-Driven Coordination of Composite Resources' Consumption Flows. 52-63 - Nils Baumgartner, Firas Adleh

, Elke Pulvermüller:
Live Code Smell Detection of Data Clumps in an Integrated Development Environment. 64-76 - Laura Troost, Jonathan Neugebauer

, Herbert Kuchen:
Visualizing Dynamic Data-Flow Analysis of Object-Oriented Programs Based on the Language Server Protocol. 77-88 - Hina Saeeda, Muhammad Ovais Ahmad, Tomas Gustavsson:

Multivocal Literature Review on Non-Technical Debt in Software Development: An Exploratory Study. 89-101 - Kazunori Someya, Toshiaki Aoki, Naoki Ishihama:

Compaction of Spacecraft Operational Models with Metamodeling Domain Knowledge. 102-113 - Adam Roman, Rafal Brozek, Jaroslaw Hryszko:

Predictive Power of Two Data Flow Metrics in Software Defect Prediction. 114-125 - Khlood Ahmad, Mohamed Abdelrazek, Chetan Arora

, John Grundy, Muneera Bano
:
Requirements Elicitation and Modelling of Artificial Intelligence Systems: An Empirical Study. 126-137 - Najla Maalaoui, Raoudha Beltaifa, Lamia Labed Jilani:

Toward a Deep Contextual Product Recommendation for SO-DSPL Framework. 138-148 - Suravi Akhter, Afia Sajeeda, Ahmedul Kabir:

A Distance-Based Feature Selection Approach for Software Anomaly Detection. 149-157 - Dasa Kusniráková, Barbora Buhnova:

Rethinking Certification for Higher Trust and Ethical Safeguarding of Autonomous Systems. 158-169 - Benjamin Nast

, Kurt Sandkuhl:
Methods for Model-Driven Development of IoT Applications: Requirements from Industrial Practice. 170-181 - Nicola Boffoli

, Pasquale Ardimento, Alessandro Nicola Rana:
Managing Domain Analysis in Software Product Lines with Decision Tables: An Approach for Decision Representation, Anomaly Detection and Resolution. 182-192 - Suyash Shukla

, Sandeep Kumar
:
Towards Automated Prediction of Software Bugs from Textual Description. 193-201 - Fabian Stieler

, Bernhard Bauer:
Git Workflow for Active Learning: A Development Methodology Proposal for Data-Centric AI Projects. 202-213 - David Kuhlen, Andreas Speck:

Improved Business Analysis by Using 3D Models. 214-225 - Abir Nacef, Sahbi Bahroun, Adel Khalfallah

, Samir Ben Ahmed:
Features and Supervised Machine Learning Based Method for Singleton Design Pattern Variants Detection. 226-237 - Koen Kraaijveld

, Claudia Raibulet:
ASMS: A Metrics Suite to Measure Adaptive Strategies of Self-Adaptive Systems. 238-249 - Kento Tanaka

, Toshiaki Aoki, Tatsuji Kawai, Takashi Tomita
, Daisuke Kawakami, Nobuo Chida:
Specification Based Testing of Object Detection for Automated Driving Systems via BBSL. 250-261 - Manuela Andreea Petrescu

, Simona Motogna:
A Perspective from Large vs Small Companies Adoption of Agile Methodologies. 265-272 - Hiromasa Ito

, Yutaka Matsubara, Hiroaki Takada:
Schfuzz: Detecting Concurrency Bugs with Feedback-Guided Fuzzing. 273-282 - Jinquan Zhang, Pei Wang, Dinghao Wu:

LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library. 283-292 - Muhammad Nouman Zafar, Wasif Afzal

, Eduard Paul Enoiu:
An Empirical Evaluation of System-Level Test Effectiveness for Safety-Critical Software. 293-305 - Sangharatna Godboley:

VeriCombTest: Automated Test Case Generation Technique Using a Combination of Verification and Combinatorial Testing. 306-313 - Sangharatna Godboley, Monika Rani Golla, Sindhu Nenavath:

Carbon-Box Testing. 314-321 - Baocheng Wang, Shiping Chen, Qin Wang

:
Evaluation of Contemporary Smart Contract Analysis Tools. 322-329 - José Miguel Blanco, Bruno Rossi:

Multi-Step Reasoning for IoT Devices. 330-337 - Natalia Kushik, Nina Yevtushenko:

Studying Synchronization Issues for Extended Automata. 338-345 - Sangharatna Godboley, P. Radha Krishna:

SmartMuVerf: A Mutant Verifier for Smart Contracts. 346-353 - Abir Nacef, Sahbi Bahroun, Adel Khalfallah, Samir Ben Ahmed:

Supervised Machine Learning for Recovering Implicit Implementation of Singleton Design Pattern. 354-361 - Jan Werth, Nabil El Ioini, Mohammad Hajian Berenjestanaki

, Hamid R. Barzegar, Claus Pahl
:
A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain Trilemma. 362-371 - Ines Meriah

, Latifa Ben Arfa Rabai, Ridha Khédri:
An OWL Multi-Dimensional Information Security Ontology. 372-380 - Ivan Simon, Sherif Haggag, Hussein Haggag:

A Step to Achieve Personalized Human Centric Privacy Policy Summary. 381-395 - Sanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni:

Software Engineering Comments Sentiment Analysis Using LSTM with Various Padding Sizes. 396-403 - Theo Theunissen

, Stijn Hoppenbrouwers, Sietse Overbeek:
Evaluation of Approaches for Documentation in Continuous Software Development. 404-411 - Hendrik Winkelmann, Herbert Kuchen:

Constraint-Logic Object-Oriented Programming with Free Arrays of Reference-Typed Elements via Symbolic Aliasing. 412-419 - Jens Van der Plas

, Jens Nicolay, Wolfgang De Meuter
, Coen De Roover
:
MODINF: Exploiting Reified Computational Dependencies for Information Flow Analysis. 420-427 - Cyrine Feres, Sonia Ayachi Ghannouchi, Ricardo Martinho

:
Mapping Process Mining Techniques to Agile Software Development Perspectives. 428-435 - Virginia Niculescu, Horea-Adrian Grebla, Adrian Sterca, Darius Bufnea:

Efficient Academic Retrieval System Based on Aggregated Sources. 436-443 - Mayssa Trabelsi, Nadjib Mohamed Mehdi Bendaoud, Samir Ben Ahmed:

A Dynamic Service Placement in Fog Infrastructure. 444-452 - Sanidhya Vijayvargiya, Lov Kumar, Lalita Bhanu Murthy Neti, Sanjay Misra, Aneesh Krishna, Srinivas Padmanabhuni:

Empirical Analysis for Investigating the Effect of Machine Learning Techniques on Malware Prediction. 453-460 - Daniel Atzberger, Tim Cech

, Willy Scheibel, Rico Richter, Jürgen Döllner:
Detecting Outliers in CI/CD Pipeline Logs Using Latent Dirichlet Allocation. 461-468 - Rusen Halepmollasi, Khadija Hanifi, Ramin Fadaei Fouladi, Ayse Tosun:

A Comparison of Source Code Representation Methods to Predict Vulnerability Inducing Code Changes. 469-478 - Khadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag:

Software Vulnerability Prediction Knowledge Transferring Between Programming Languages. 479-486 - Lorenzo Capra

, Michael Köhler-Bussmeier:
Modelling Adaptive Systems with Nets-Within-Nets in Maude. 487-496 - Advaita Datar, Amey Zare, R. Venkatesh, Asia A:

Towards Synthesis of Code for Calculations Using Their Specifications. 497-504 - Radu-Iulian Gheorghica

:
A Study on Hybrid Classical: Quantum Computing Instructions for a Fragment of the QuickSI Algorithm for Subgraph Isomorphism. 505-512 - Paolo Ciancarini

, Mirko Farina, Artem V. Kruglov, Giancarlo Succi
, Ananga Thapaliya:
A Reflection on the Use of Systemic Thinking in Software Development. 521-529 - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem

, Claude Godart:
Clouds Coalition Detection for Business Processes Outsourcing. 530-537 - Zaki Pauzi

, Andrea Capiluppi
:
From Descriptive to Predictive: Forecasting Emerging Research Areas in Software Traceability Using NLP from Systematic Studies. 538-545 - Andrea Biaggi, Umberto Azadi, Francesca Arcelli Fontana:

A New Approach for Software Quality Assessment Based on Automated Code Anomalies Detection. 546-553 - Mahmudul Islam, Farhan Khan

, Mehedi Hasan, Farzana Sadia, Mahady Hasan
:
Impact of COVID-19 on the Factors Influencing on-Time Software Project Delivery: An Empirical Study. 554-561 - Bartosz Dobrzynski, Janusz Sosnowski:

Text Mining Studies of Software Repository Contents. 562-569 - Reuben Brown, Des Greer

:
Software Code Smells and Defects: An Empirical Investigation. 570-580 - Deepika Prakash

, Naveen Prakash:
A Goal-Oriented Requirements Engineering Approach for IoT Applications. 581-588 - Anton V. Konygin, Andrey V. Kopnin

, Ilya P. Mezentsev, Alexandr A. Pankratov:
Using Bigrams to Detect Leaked Secrets in Source Code. 589-596 - Ana Carolina Moises de Souza

, Daniela S. Cruzes, Letizia Jaccheri:
Sustainability-Driven Meetings as a Way to Incorporate Sustainability into Software Development Phases. 597-604 - Ben Joseph Philip, Yasmeen Anjeer Alshehhi, Mohamed Abdelrazek, Scott Barnett, Alessio Bonti, John Grundy:

mHealthSwarm: A Unified Platform for mHealth Applications. 605-612 - Evgenii M. Vinarskii, Natalia Kushik, Nina Yevtushenko, Jorge López, Djamal Zeghlache:

Timed Transition Tour for Race Detection in Distributed Systems. 613-620 - Olaf Flak:

Ontology of Online Management Tools Aimed at Artificial Management Implementation: An Example of Use in Software Design. 621-628 - Danish Iqbal, Barbora Buhnova, Emilia Cioroaica:

Digital Twins for Trust Building in Autonomous Drones Through Dynamic Safety Evaluation. 629-639 - Mubin Ul Haque, Muhammad Ali Babar:

A Study on Early & Non-Intrusive Security Assessment for Container Images. 640-647 - Aman Swaraj, Sandeep Kumar

:
Programming Language Identification in Stack Overflow Post Snippets with Regex Based Tf-Idf Vectorization over ANN. 648-655 - Razan Abualsaud, Hanh Nhi Tran

, Ileana Ober, Minh Khoi Nguyen
:
Toward a Goal-Oriented Methodology for Artifact-Centric Process Modeling. 656-663 - Olga Siedlecka-Lamch, Sabina Szymoniak

:
Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits. 664-671 - Bethaina Touijer:

Toward a Modeling Language Prototype for Modeling the Behavior of Wireless Body Area Networks Communication Protocols. 672-675 - Iuliana Marin, Hanoosh Amel:

Web Platform for Job Recommendation Based on Machine Learning. 676-683 - Ayodeji Ladeinde, Chetan Arora

, Hourieh Khalajzadeh, Tanjila Kanij, John Grundy:
Extracting Queryable Knowledge Graphs from User Stories: An Empirical Evaluation. 684-692 - Asif Imran:

Investigate How Developers and Managers View Security Design in Software. 693-700 - Dylan Clements, Elysia Giannis, Fiona Crowe, Mike Balapitiya, Jason Marshall, Paul Papadopoulos, Tanjila Kanij:

An Innovative Approach to Develop Persona from Application Reviews. ENASE 2023: 701-708 - Necmettin Ozkan, Sevval Bal, Mehmet Sahin Gök

:
Various Shades of Teaching Agile. 709-717 - Vitaly Romanov, Gcinizwe Dlamini, Aidar Valeev

, Vladimir Ivanov:
Leveraging Transformer and Graph Neural Networks for Variable Misuse Detection. 727-733 - Anna Derezinska, Olgierd Sobieraj:

Enhancing Unit Tests in Refactored Java Programs. 734-741 - Lerina Aversano, Mario Luca Bernardi

, Marta Cimitile, Martina Iammarino, Debora Montano:
An Empirical Study on the Relationship Between the Co-Occurrence of Design Smell and Refactoring Activities. 742-749 - Emilia-Loredana Pop, Manuela Andreea Petrescu

:
Tendencies in Database Learning for Undergraduate Students: Learning In-Depth or Getting the Work Done? 750-757

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














