


default search action
17th ISEC 2024: Bangalore, India
- Sujit Kumar Charkrabarti, Raghavan Komondoor, Raveendra Kumar Medicherla, Aseem Rastogi, Sudipto Ghosh:
Proceedings of the 17th Innovations in Software Engineering Conference, ISEC 2024, Bangalore, India, February 22-24, 2024. ACM 2024 - Akash Lal
:
Concurrency Testing: A Journey from Research to Practice. 1:1 - Abhik Roychoudhury
:
Program Repair and Trusted Automatic Programming. 2:1 - Alessandra Gorla
:
On the Analysis of Mobile Apps. Why is most of our Research on Android? 3:1 - Shilin He
:
SPINE: A Scalable Log Parser with Feedback Guidance. 4:1 - Asha Rajbhoj
, Akanksha Somase
, Piyush Kulkarni
, Vinay Kulkarni
:
Accelerating Software Development Using Generative AI: ChatGPT Case Study. 5:1-5:11 - Tumu Akshar
, Vikram Singh
, N. L. Bhanu Murthy
, Aneesh Krishna
, Lov Kumar
:
A Codebert Based Empirical Framework for Evaluating Classification-Enabled Vulnerability Prediction Models. 6:1-6:11 - Surya Prakash Sahu
, Madhurima Mandal
, Shikhar Bharadwaj
, Aditya Kanade
, Petros Maniatis
, Shirish K. Shevade
:
CodeQueries: A Dataset of Semantic Queries over Code. 7:1-7:11 - Mrityunjay Kumar
, Venkatesh Choppella
:
Enhancing MVC architecture pattern description using its System of Systems model. 8:1-8:11 - Shivani Balwani
, Saurabh Tiwari
, Sourish Dasgupta
, Akhilesh Sharma
:
An Approach for Providing Recommendation for Requirements Non-Conformant with Requirement Templates (RTs). 9:1-9:11 - Atanu Kundu
, Sauvik Gon
, Rajarshi Ray
:
Data-Driven Falsification of Cyber-Physical Systems. 10:1-10:5 - Kanchanjot Kaur Phokela
, Kapil Singi
, Vikrant Kaulgud
:
Embedding Privacy First Human Centric in User Experience for Mobile Applications. 11:1-11:5 - Anurag Yadav
, Santosh Singh Rathore
:
A Hierarchical Attention Networks based Model for Bug Report Prioritization. 12:1-12:5 - Dhiraj SM Varanasi
, Sai Anirudh Karre
, Raghu Reddy
:
Software Development Waste amidst COVID-19 Pandemic: An Industry Study. 13:1-13:5 - Samarth Sikand
, Kanchanjot Kaur Phokela
, Vibhu Saujanya Sharma
, Kapil Singi
, Vikrant Kaulgud
, Teresa Tung
, Pragya Sharma
, Adam P. Burden
:
How much SPACE do metrics have in GenAI assisted software development? 14:1-14:5 - Devdan Dey
, Mir Md Sajid Sarwar
, Rajarshi Ray
, Ansuman Banerjee
:
A Contrastive Explanation Tool for Plans in Hybrid Domains. 15:1-15:5 - Sangharatna Godboley
, P. Radha Krishna
, Ritesh Kumar Jha
:
Atomic Condition Coverage Analysis for Structured Text Based Programmable Logic Controller (PLC). 16:1-16:5 - Anil Kant Choudhary
, Manoj Kumar Lal
, Rajesh Vaishampayan
, Sumi Lal
:
Tutorial Report on A Framework for Structured Industry Knowledge for Requirement Understanding in Software Development. 17:1 - Karnika Shivhare
:
Business Process Modeling and Challenges through Examples. 18:1-18:3 - Shivali Agarwal
, Sridhar Chimalakonda
, Saravanan Krishnan
, Vini Kanvar
, Samveg Shah
:
Tutorial Report on Legacy Software Modernization: A Journey From Non-AI to Generative AI Approaches. 19:1-19:3 - Santosh Singh Rathore
, Saurabh Tiwari
, Sheikh Umar Farooq
:
Workshop Report on Emerging Software Engineering Education. 20:1-20:2 - Ravindra Naik
, Asha Rajbhoj
, Manasi Patwardhan
, Raveendra Kumar Medicherla
:
Workshop Report on Generative AI-based Software Engineering. 21:1-21:5 - Souvik Barat
, Varun Ramamohan
:
Workshop Report on Reimagining Future Enterprises and Society using Digital Twin. 22:1-22:2 - Chavhan Sujeet Yashavant
:
SecSEC: Securing Smart Ethereum Contracts. 23:1-23:4 - Nimisha Agarwal
:
Finding and Investigating Buggy Codes to Make CS1 Learning Efficient. 24:1-24:3 - Divyanjali Sharma
, Subodh Sharma
:
Parameterized Static Analysis for Weak Memory Models. 25:1-25:4 - Priyanka Maity
:
Neural Networks Verification: Perspectives from Formal Method. 26:1-26:2 - Pankaj Upadhyay
, Subodh Sharma
, Guangdong Bai
:
Symbolic Verification of Mesh Commissioning Protocol of Thread. 27:1-27:4 - Ganesha
, Sujit Kumar Chakrabarti
:
Safeguarding Controller Variables from SEUs using Static Analysis. 28:1-28:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.