default search action
19th ENASE 2024: Angers, France
- Hermann Kaindl, Mike Mannion, Leszek A. Maciaszek:
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2024, Angers, France, April 28-29, 2024. SCITEPRESS 2024, ISBN 978-989-758-696-5
Invited Speakers
- Giancarlo Guizzardi:
Semantic Models for Trustworthy Systems: A Hybrid Intelligence Augmentation Program. ENASE 2024: 5 - Juliette Mattioli:
AI Engineering: A Necessary Condition to Deploy Trustworthy AI in Industry. ENASE 2024: 7 - Daniel Jackson:
Keynote Lecture. ENASE 2024: 9
Papers
- Nils Baumgartner, Elke Pulvermüller:
An Extensive Analysis of Data Clumps in UML Class Diagrams. 15-26 - Albert Contreras, Esther Guerra, Juan de Lara:
Conversational Assistants for Software Development: Integration, Traceability and Coordination. 27-38 - Laura Troost, Hendrik Winkelmann, Herbert Kuchen:
An Integrated Visualization Approach Combining Dynamic Data-Flow Analysis with Symbolic Execution. 39-50 - Fernando Pastor Ricós, Beatriz Marín, Tanja E. J. Vos, Joseph Davidson, Karel Hovorka:
Scriptless Testing for an Industrial 3D Sandbox Game. 51-62 - Suzad Mohammad, Abdullah Al Jobair, Iftekharul Abedeen:
Decoding Code Quality: A Software Metric Analysis of Open-Source JavaScript Projects. 63-74 - Jesús Ortiz, Victoria Torres, Pedro Valderas:
Combining Goal-Oriented and BPMN Modelling to Support Distributed Microservice Compositions. 75-86 - Deepika Prakash, Naveen Prakash:
A Conceptual Model for Data Warehousing. 87-98 - Maroua Idi, Sana Younès, Riadh Robbana:
Steady-State Energy Consumption Evaluation in BaseBand Units Pool in Cloud Radio Access Network. 99-109 - Arnold Szederjesi-Dragomir, Radu Dan Gaceanu, Andreea Vescan:
Industrial Validation of a Neural Network Model Using the Novel MixTCP Tool. 110-119 - Marian Daun, Meenakshi Manjunath, Jennifer Brings:
Review Time as Predictor for the Quality of Model Inspections. 120-131 - Anamaria Briciu, Mihaiela Lupea, Gabriela Czibula, István Gergely Czibula:
Enriching the Semantic Representation of the Source Code with Natural Language-Based Features from Comments for Improving the Performance of Software Defect Prediction. 132-143 - Nils Baumgartner, Padma Iyenghar, Elke Pulvermüller:
Considerations in Prioritizing for Efficiently Refactoring the Data Clumps Model Smell: A Preliminary Study. 144-155 - Rabaya Sultana Mim, Abdus Satter, Toukir Ahammed, Kazi Sakib:
Automated Software Vulnerability Detection Using CodeBERT and Convolutional Neural Network. 156-167 - Zakaria Maamar, Amel Benna, Haroune Kechaoui:
ODRL-Based Provisioning of Thing Artifacts for IoT Applications. 168-178 - Bakhta Haouari, Rania Mzid, Olfa Mosbahi:
Reinforcement Learning for Multi-Objective Task Placement on Heterogeneous Architectures with Real-Time Constraints. 179-189 - Aritra Bhaduri, Ayush Kumar Jain, Swagatika Sahoo, Raju Halder, Chandra Mohan Kumar:
Metasurance: A Blockchain-Based Insurance Management Framework for Metaverse. 190-201 - Nils Wild, Horst Lichter, Constantin Mensendiek:
Expectation-Based Integration Testing of Unidirectional Interactions in Component-Based Software Systems. 202-213 - Gabriela Czibula, Ioana-Gabriela Chelaru, Arthur Molnar, István Gergely Czibula:
PreSTyDe: Improving the Performance of within-project Defects Prediction by Learning to Classify Types of Software Faults. 214-225 - Anders W. Tell, Martin Henkel:
Review of Evaluations of Enterprise Architecture. 226-237 - Yasin Sazid, Kazi Sakib:
Prevalence and User Perception of Dark Patterns: A Case Study on E-Commerce Websites of Bangladesh. 238-249 - Ana Carolina Moises de Souza, Kaban Koochakpour, Sofia Papavlasopoulou, Letizia Jaccheri:
Exploring Social Sustainability Alignment in Software Development Projects. 250-261 - Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed:
Association Rule Learning Based Approach to Automatic Generation of Feature Model Configurations. 262-272 - Jingyuan Shen, Hourieh Khalajzadeh, Anuradha Madugalla:
Human-Centered e-Health Development: An Accessible Visual Modeling Tool. 283-290 - Federico Calabrese, Luca Piras, Mohammed Ghazi Al-Obeidallah, Benedicta Oghenevoke Egbikuadje, Duaa Alkubaisy:
Gamification of E-Learning Apps via Acceptance Requirements Analysis. 291-298 - Vitalijs Teze, Erika Nazaruka:
Ensuring User Privacy in the Digital Age: A Quality-Centric Approach to Tracking and Data Protection. 299-306 - Jens Leicht, Maritta Heisel:
Extending PriPoCoG: A Privacy Policy Editor for GDPR-Compliant Privacy Policies. 307-318 - Nalaka R. Dissanayake, Alexander Bolotov:
Applications Model: A High-Level Design Model for Rich Web-Based Applications. 319-327 - Md. Arman Hossain, Suravi Akhter, Md. Shariful Islam, Muhammad Mahbub Alam, Mohammad Shoyaib:
Can a Simple Approach Perform Better for Cross-Project Defect Prediction? 328-335 - Daniel Gerber, Lukas Meitz, Lukas Rosenbauer, Jörg Hähner:
Unsupervised Anomaly Detection in Continuous Integration Pipelines. 336-343 - Michalis Pingos, Athos Mina, Andreas S. Andreou:
Transforming Data Lakes to Data Meshes Using Semantic Data Blueprints. 344-352 - Spyros Loizou, Michalis Pingos, Andreas S. Andreou:
Enhancing Interaction with Data Lakes Using Digital Twins and Semantic Blueprints. 353-361 - Gyulai-Nagy Zoltán-Valentin:
Combining Clustering Algorithms to Extract Symmetric Clusters from Noisy Data, Applied to Parking Lots. 362-369 - Amina Jandoubi, Mohamed Taha Bennani, Olfa Mosbahi, Abdelaziz El Fazziki:
Analyzing MQTT Attack Scenarios: A Systematic Formalization and TLC Model Checker Simulation. 370-378 - Oskar Picus, Camelia Serban:
Connecting Issue Tracking Systems and Continuous Integration / Continuous Delivery Platforms for Improving Log Analysis: A Tool Support. 379-386 - Sangharatna Godboley, P. Radha Krishna:
CC-SolBMC: Condition Coverage Analysis for Smart Contracts Using Solidity Bounded Model Checker. 387-395 - Andreea Vescan, Radu Dan Gaceanu, Arnold Szederjesi-Dragomir:
Embracing Unification: A Comprehensive Approach to Modern Test Case Prioritization. 396-405 - Muhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang, Mahdi Fahmideh, Tommi Mikkonen:
ChatGPT as a Software Development Bot: A Project-Based Study. 406-413 - Madalina Dicu, Adrian Sterca, Camelia Chira, Radu Orghidan:
UICVD: A Computer Vision UI Dataset for Training RPA Agents. 414-421 - Omar Haggag, John Grundy, Mohamed Abdelrazek:
An Analysis of Privacy Issues and Policies of eHealth Apps. 422-433 - Mayssa Trabelsi, Samir Ben Ahmed:
Energy and Cost-Aware Real-Time Task Scheduling with Deadline-Constraints in Fog Computing Environments. 434-441 - Antoine Beugnard, Julien Mallet:
Making Application Build Safer Through Static Analysis of Naming. 442-449 - Kawasaki Fumitake, Shota Kishi, James Neve:
Skeet: Towards a Lightweight Serverless Framework Supporting Modern AI-Driven App Development. 450-457 - Gaetanino Paolone, Romolo Paesani, Jacopo Camplone, Paolino Di Felice:
IoTUseCase: A New Concept for the Modeling of Business Information Systems in the Age of IoT. 458-465 - Jeshwitha Jesus Raja, Meenakshi Manjunath, Marian Daun:
Towards a Goal-Oriented Approach for Engineering Digital Twins of Robotic Systems. 466-473 - Andrada-Mihaela-Nicoleta Moldovan, Andreea Vescan:
Outlier Detection Through Connectivity-Based Outlier Factor for Software Defect Prediction. 474-483 - Padma Iyenghar:
Exploring the Impact of Dataset Accuracy on Machinery Functional Safety: Insights from an AI-Based Predictive Maintenance System. 484-497 - Bastian Tenbergen, Marian Daun:
Metrics to Estimate Model Comprehension: Towards a Reliable Quantification Framework. 498-505 - Yasin Sazid, Sharmista Kuri, Kazi Solaiman Ahmed, Abdus Satter:
Commit Classification into Maintenance Activities Using In-Context Learning Capabilities of Large Language Models. 506-512 - Aljia Bouzidi, Nahla Haddar, Kais Haddar:
Comprehensive Traceability Framework for Synchronizing Design UML Sequence Diagrams with a BPMN Diagram. 513-520 - Ana-Gabriela Núñez, María Fernanda Granda, Victor Saquicela, Otto Parra:
Machine Learning-Enhanced Requirements Engineering: A Systematic Literature Review. 521-528 - Fahima Akter Anni, Muhammad Rezaul Islam, Farzana Sadia, Mahady Hasan, M. Rokonuzzaman:
Green Computing Adoption: Understanding the Role of Individual, Social, and Organizational Factors. 529-536 - Elias Seid, Mosammath Nazifa, Sneha Gupta, Oliver Popov, Fredrik Blix:
Security and SLA Monitoring for Cloud Services. 537-546 - Mohitul Shafir, Partho Protim Saha, Ahnaf Tazwar Araf, Shadat Irtisamul Haque, Mahady Hasan, Farzana Sadia, M. Rokonuzzaman:
Influential Factors of Software Firms' Performance in the Industry of Developing Countries. 547-554 - Yasmeen Anjeer Alshehhi, Khlood Ahmad, Mohamed Abdelrazek, Alessio Bonti:
6DVF: A Framework for the Development and Evaluation of Mobile Data Visualisations. 555-562 - Behnaz Rezvani, Cameron Patterson:
A Monitoring Methodology and Framework to Partition Embedded Systems Requirements. 563-570 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah:
MPED-SCRUM: An Automated Decision-Making Framework Based Measurement for Managing Requirement Change Within the SCRUM Process. 571-581 - Sébastien Salva, Jarod Sue:
Security Testing of RESTful APIs with Test Case Mutation. 582-589 - Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Evaluating the Impact of Generative Adversarial Network in Android Malware Detection. 590-597 - Omar Haggag, John Grundy, Rashina Hoda:
Towards Enhancing Mobile App Reviews: A Structured Approach to User Review Entry, Analysis and Verification. 598-604 - Anissa Kheireddine, Etienne Renault, Souheib Baarir:
Interpolation-Based Learning for Bounded Model Checking. 605-614 - Emanuel Rodrigues, José Nuno Macedo, Marcos Viera, João Saraiva:
pyZtrategic: A Zipper-Based Embedding of Strategies and Attribute Grammars in Python. 615-624 - Agnieszka Malanowska, Jaroslaw Zabuski:
Afpatoo: Tool to Automate Function Point Analysis Based on UML Class and Sequence Diagrams. 625-632 - Raja Oueslati, Ghaith Manita:
Software Defect Prediction Using Integrated Logistic Regression and Fractional Chaotic Grey Wolf Optimizer. 633-640 - Afef Walha, Faïza Ghozzi, Faïez Gargouri:
Extract-Transform-Load Process for Recognizing Sentiment from User-Generated Text on Social Media. 641-648 - Shruthi Ravikumar, Margaret Hamilton, Charles Thevathayan, Maria Spichkova, Kashif Ali, Gayan Wijesinghe:
Creating a Trajectory for Code Writing: Algorithmic Reasoning Tasks. 649-656 - Eros Cedeño, Ana Isabel Aguilera, Denisse Muñante, Jorge Correia, Leonel Guerrero, Carlos Sivira, Yudith Cardinale:
An Evaluation of the Impact of End-to-End Query Optimization Strategies on Energy Consumption. 657-665 - Ramin Fuladi, Khadija Hanifi:
CodeGrapher: An Image Representation Method to Enhance Software Vulnerability Prediction. 666-673 - Devi Karolita, John Grundy, Tanjila Kanij, Humphrey O. Obie, Jennifer McIntosh:
CRAFTER: A Persona Generation Tool for Requirements Engineering. 674-683 - Zakaria Maamar, Amel Benna, Fadwa Yahya:
Impact of Policies on Organizations Engaged in Partnership. 684-691 - Rodrigo Branco, Vinicius Cogo, Ibéria Medeiros:
Towards a Web Application Attack Detection System Based on Network Traffic and Log Classification. 692-699 - Dasa Kusniráková, Barbora Buhnova:
Taxonomy of Governance Mechanisms for Trust Management In Smart Dynamic Ecosystems. 700-710 - António Silvestre, Ibéria Medeiros, Andreia Mordido:
Towards a SQL Injection Vulnerability Detector Based on Session Types. 711-718 - Luís Ferreirinha, Ibéria Medeiros:
On the Path to Buffer Overflow Detection by Model Checking the Stack of Binary Programs. 719-726 - Evgenii M. Vinarskii, Natalia Kushik, Nina Yevtushenko, Jorge López, Djamal Zeghlache:
Races in Extended Input/Ouput Automata, Their Compositions and Related Reactive Systems. 727-734 - Virginia Niculescu, Camelia Chisalita-Cretu, Cristina-Claudia Osman, Adrian Sterca:
Vector Based Modelling of Business Processes. 735-742 - Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:
Secure Audio Watermarking for Multipurpose Defensive Applications. 743-751 - Simona Motogna, Diana Cristea, Diana-Florina Sotropa, Arthur-Jozsef Molnar:
Uncovering Bad Practices in Junior Developer Projects Using Static Analysis and Formal Concept Analysis. 752-759 - Yutan Huang, Tanjila Kanij, Anuradha Madugalla, Shruti Mahajan, Chetan Arora, John Grundy:
Unlocking Adaptive User Experience with Generative AI. 760-768 - Otto Parra, Edisson Reinozo, María Fernanda Granda:
Exploring Perspectives of Students on Using Mobile Apps to Improve English Vocabulary Through Youtube Videos: A Comparative Study. 769-776 - Akrivi Krouska, Christos Troussas, Phivos Mylonas, Cleo Sgouropoulou:
Analysing the Effectiveness of a Social Digital Repository for Learning and Teaching: A Fuzzy Comprehensive Evaluation. 777-783 - Sihem Ben Sassi:
IRatePL2C: Importance Rating-Based Approach for Product Lines Collaborative Configuration. 784-791
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.