


default search action
32nd SEKE 2020: KSIR Virtual Conference Center, USA
- Raúl García-Castro:

The 32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020, KSIR Virtual Conference Center, USA, July 9-19, 2020. KSI Research Inc. 2020, ISBN 1-891706-50-0
Session: Internet of Things and Robotics
- Ran Li

, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:
Formalization and Verification of VANET. 1-6 - Genwang Gou, Yongxin Zhao, Jiawei Jiang, Ling Shi:

The Prediction of Delay Time and Route Planning for Autonomous Vehicles. 7-12 - Jin Yong Kim, Myeong Oh Lee, Geun Sik Jo:

DCBlock : Efficient Module for Unpaired Image to Image Translation Using GANs. 13-18 - Jiawei Jiang, Yongxin Zhao, Xi Wu, Genwang Gou:

A Detect-and-Modify Region-based Classifier to Defend Evasion Attacks. 19-24 - Xin Ma, Mingliang Li, Jinxi Kong, Siming Zhao, Wei Li, Xiaohui Cui:

Inspect Characteristics of Rice via Machine Learning Method. 25-30 - Ningning Chen, Huibiao Zhu, Jiaqi Yin, Lili Xiao, Yuan Fei:

Modeling and Verifying NDN-based IoV Using CSP. 31-36 - Xudong Zhao, Rui Li, Wanwei Liu, Hao Shi, Shaoxian Shu, Wei Dong:

Controller Synthesis for ROS-based Multi-Robot Collaboration. 37-42 - Junchao Lv, Linjiang Zheng, Yuhui Ye, Chenglin Ye:

Understanding Travel Patterns of Commuting Private Cars using Big data of Electronic Registration Identification of Vehicles. 43-48 - Yohan Bae, Suyeong Lee, Yeonghun Nam:

TIMESIGHT: Discovering Time-driven Insights Automatically and Fairly. 49-54 - Fabian Cesar Pereira Brandão Manoel

, Carlos Eduardo Pantoja
, Leandro Samyn, Vinicius Souza de Jesus:
Physical Artifacts for Agents in a Cyber-Physical System: A Case Study in Oil & Gas Scenario (EEAS). 55-60
Session: Ontologies and Knowledge Graphs
- Onyeka Ezenwoye, Yi Liu, William Patten:

Classifying Common Security Vulnerabilities by Software Type. 61-64 - Hongming Zhu, Yizhi Jiang, Xiaowen Wang, Hongfei Fan, Qin Liu, Bowen Du:

Modeling Relation Path for Knowledge Graph via Dynamic Projection. 65-70 - Shanmuganathan Vasanthapriyan, Banujan Kuhaneswaran

:
Modeling HiBrinto Ontology to Develop Knowledge Management Portal for Highway Bridge Construction. 71-76 - Guoshuai Zhao, Tong Li, Zhen Yang:

An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. 77-82 - Imano Williams, Xiaohong Yuan:

Identifying Security Concerns Based on a Use Case Ontology Framework. 83-88 - Ronaldo Gonçalves, Robert Ahn

, Tom Hill, Lawrence Chung:
Towards High Quality Recommendations: A Goal-Oriented and Ontology-Based Interactive Approach. 89-92 - Patrick D. Cook, Susan Mengal, Siva Parameswaran:

SHAMROQ: Towards semantic models of regulations. 93-100 - José Ferdinandy Silva Chagas, Luiz Antonio Pereira Silva, Mirko Barbosa Perkusich

, Ademar França de Sousa Neto, Danyllo Albuquerque, Dalton Cézane Gomes Valadares, Hyggo O. Almeida, Angelo Perkusich:
On the Reuse of Knowledge to Develop Intelligent Software Engineering Solutions. 101-106
Session: Software Specification
- Yuanbang Li, Rong Peng, Bangchao Wang

, Dong Sun:
Research on Multi Source Fusion Evolution Requirements Acquisition in Mobile Applications. 107-110 - Ran Mo, Shaozhi Wei, Ting Hu:

Detecting and Modeling Method-level Hotspots in Architecture Design Flaws. 111-116 - Michael E. Shin, Don Pathirage, Dongsoo Jang:

Threat and Security Modeling for Secure Software Requirements and Architecture. 117-120 - Taeghyun Kang, Hyungbae Park, Venkata N. Inukollu:

Knowledge-based Interface transition diagram for SRS(Software Requirements Specification) in mobile application. 121-126 - Liang Hao, Xin Sun, Lan Lin, Zedong Peng

:
Correct Software by Design for Software-Defined Networking: A preliminary Study. 127-134 - Cuong Cu, Rachel Culver, Yongjie Zheng:

Dynamic Architecture-Implementation Mapping for Architecture-Based Runtime Software Adaptation. 135-140 - Shuaicai Ren, Hiroyuki Nakagawa

, Tatsuhiro Tsuchiya:
An Automated Goal Labeling Method Based on User Reviews. 141-146 - Tong Wang, Bixin Li, Lingyuan Zhu:

A Co-evolutionary Method Between Architecture and Code. 147-152
Session: Empirical Software Engineering
- Xinlei Ma, Yan Liu:

An Empirical Study of Maven Archetype. 153-157 - Florian Auer

, Michael Felderer
:
Evaluating the Usefulness and Ease of Use of an Experimentation Definition Language. 158-163 - Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham:

Time-Aware Models for Software Effort Estimation. 164-167 - Wen-Chin Huang, Zhenlan Ji

, Yanhui Li:
An Empirical Study on Issue Knowledge Transfer from Python to R for Machine Learning Software. 168-173 - Swapna S. Gokhale:

Quantifying the Relationship Between Health Outcomes and Unhealthy Habits. 174-179 - Donghoon Kim, Loc Ho:

The Reaction of Open Source Projects to C++ Templates and Lambdas: An Empirical Replication Study. 180-185 - Lucas Barros, Flávio Medeiros, Eduardo Moraes, Anderson Feitosa Júnior:

Analyzing the Performance of Apps Developed by using Cross-Platform and Native Technologies. 186-191 - Lilian Passos Scatalon, Rogério Eduardo Garcia, Ellen Francine Barbosa:

On the Use of Support Mechanisms to Perform Experimental Variables Selection. 192-197 - Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham:

Testing the Stationarity Assumption in Software Effort Estimation Datasets. 198-203
Session: Distributed Systems and Machine Learning
- Sheyda Kiani Mehr, Wenting Sun, Xuancheng Fan, Nikita Butakov, Nicolas Ferlans:

Graph Machine Learning for Anomaly Prediction in Distributed Systems. 204-209 - Chen Qian, Wenjing Zhu:

F(X)-MAN: An Algebraic and Hierarchical Composition Model for Function-as-a-Service. 210-215 - Pengfei Shao, Shuyuan Jin:

Privacy-aware OrLa Based Access Control Model in the Cloud. 216-221 - Junya Xu, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:

Formal Modelling and Verification of MCAC Router Architecture in ICN. 222-227 - Li Yao, Bing Li, Jian Wang:

Data-sparsity Service Discovery using Enriched Neural Topic Model and Attentional Bi-LSTM. 228-233 - Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai

, Chih-Shiang Shur:
Explainable Deep Convolutional Candlestick Learner. 234-237 - Xinwei Zhu, Haiping Zhang, Liming Guan, Dongjin Yu, Zhongjin Li:

Conditional Normalizing Flow-based Generative Model for Zero-Shot Recognition. 238-243 - Ying Shang, Yongli Li, Feng You:

An SNN Construction Method Based on CNN Conversion and Threshold Setting. 244-249 - Qiao Pan

, Golddy Indra Kumara, Jiahuan Chu:
Multi Classification of Alzheimer's Disease using Linear Fusion with TOP-MRI Images and Clinical Indicators. 250-256 - Xuewang Zhang, Yin Zhou:

Deep Hashing with Large Batch Training for Cross-modal Retrieval. 257-263
Session: Software Development
- Iaakov Exman, Alexey Nechaev:

Algebraic Higher-Abstraction for Software Refactoring Automation. 264-269 - Jiang Wu, Jianjun Xu:

Reliable Compilation Optimization Selection Based on Gate Graph Neural Network. 270-275 - Rehman Arshad

:
Trends in Software Reverse Engineering. 276-280 - Elia Eiroa-Lledo, Abby Bechtel, Emily Daskas, Lily Foster, Raha Pirzadeh, Katie Rodeghiero, Erik Linstead:

Do Experienced Programmers put too Much Confidence in Comments? 281-286 - Duong Dinh Tran

, Kazuhiro Ogata:
Formal verification of an abstract version of Anderson protocol with CafeOBJ, CiMPA and CiMPG. 287-292 - Qing Wang, Zhenzhou Tian, Cong Gao, Lingwei Chen:

Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining. 293-298 - Asif Imran, Tevfik Kosar

:
The Impact of Auto-Refactoring Code Smells on the Resource Utilization of Cloud Software. 299-304 - Borun Xie, Zhenzhou Tian, Cong Gao, Lingwei Chen:

Towards Fine-Grained Compiler Identification with Neural Modeling. 305-310 - Alexandre Braga Gomes, Manuel Silva, Dalton Cézane Gomes Valadares, Mirko Barbosa Perkusich

, Danyllo Albuquerque, Hyggo O. Almeida, Angelo Perkusich:
Evaluating the Relationship of Personality and Teamwork Quality in the Context of Agile Software Development. 311-316
Session: Software Testing
- Xuan Zhou, Lu Lu, Yexia Qin:

ISC-FS: An Improved Spectral Clustering with Feature Selection for Defect Prediction. 317-322 - Zhihan Wang, Lu Lu:

A Semantic Convolutional Auto-Encoder Model for Software Defect Prediction. 323-328 - Qiguo Huang, Xiang Chen, Zhengliang Li, Chao Ni, Qing Gu:

Revisiting Dependence Cluster Metrics based Defect Prediction. 329-334 - Koichi Hamada, Fuyuki Ishikawa, Satoshi Masuda, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita, Mineo Matsuya:

Guidelines for Quality Assurance of Machine Learning-based Artificial Intelligence. 335-341 - Koji Yamamoto, Takao Nakagawa, Shogo Tokui, Kazuki Munakata:

Call Sequence List Distiller for Practical Stateful API Testing. 342-346 - Shihab Shahriar Khan, Nishat Tasnim Niloy

, Md. Aquib Azmain, Ahmedul Kabir:
Impact of Label Noise and Efficacy of Noise Filters in Software Defect Prediction. 347-352 - Wyao Matcha, Fadel Touré, Mourad Badri, Linda Badri:

Using Deep Learning Classifiers to Identify Candidate Classes for Unit Testing in Object-Oriented Systems. 353-358 - Fadel Touré, Mourad Badri:

Unit Test Effort Prioritization Using Combined Datasets and Deep Learning: A Cross-Systems Validation. 359-364 - Zengyang Li, Dengwei Li, Peng Liang

, Ran Mo:
An Empirical Investigation on the Relationship Between Bug Severity and Bug Fixing Change Complexity. 365-370
Session: Natural Language Processing
- Eduardo Lopez, Kamran Sartipi:

Can language help in the characterization of user behavior? Feature engineering experiments with Word. 371-374 - Weidong Liu, Piying Zhang, Wenbo Qiao:

Patent Technical Function-effect Representation and Mining Method. 375-379 - Wiem Khlif, Nourchène Elleuch Ben Ayed, Faten Chihi:

Towards A Systematic Derivation Of BPMN Model From Business Process Textual Description. 380-385 - Bohao Wang, Wanyou Lv, Jianqi Shi, Yanhong Huang:

A Novel Self-Attention Based Automatic Code Completion Neural Network. 386-391 - Fazle Rabbi, Md. Nazmul Haque, Md. Eusha Kadir, Md. Saeed Siddik, Ahmedul Kabir:

An Ensemble Approach to Detect Code Comment Inconsistencies using Topic Modeling. 392-395 - Xin Liu, Liutong Xu:

A Combined Model for Extractive and Abstractive summarization based on Transformer model. 396-399 - Rao Hamza Ali, Erik Linstead:

Modeling Topic Exhaustion for Programming Languages on StackOverflow. 400-405 - Fang Liu, Tong Li:

An Efficient Application Searching Approach Based on User Review Knowledge Graph. 406-412 - Dou Hu

, Lingwei Wei
:
SLK-NER: Exploiting Second-order Lexicon Knowledge for Chinese NER. 413-417
Session: Social Media Mining
- Lingjia Li, Jian Cao, David Lo

:
Sentiment Analysis over Collaborative Relationships in Open Source Software Projects. 418-423 - Taeghyun Kang, Hyungbae Park, Sunae Shin:

Searching, Examining, and Exploiting In-demand Technical (SEE IT) Skills using Web Data Mining. 424-428 - Jingren Zhou, Peiquan Jin:

Sentiment Analysis of Online Reviews with a Hierarchical Attention Network. 429-434 - Abdillah Mohamed, Li Zhang, Jing Jiang:

Cross-project Reopened Pull Request Prediction in GitHub. 435-438 - Ping Liang, Dongjin Yu, Xiaoxiao Sun:

Restaurant Failure Prediction Based on Multi-View Online Data. 439-444 - Jialing Liang, Peiquan Jin:

Detecting Spammers from Hot Events on Microblog Platforms: An Experimental Study. 445-450 - Fangchao Tian, Fan Lu, Peng Liang

, Muhammad Ali Babar:
Automatic Identification of Architecture Smell Discussions from Stack Overflow. 451-456 - Yi Yang, Xinjun Mao, Zixi Xu, Yao Lu:

Exploring CQA User Contributions and Their Influence on Answer Distribution. 457-462 - Luqi Guan, John W. Castro, Xavier Ferré, Silvia Teresita Acuña:

Copy and Paste Behavior: A Systematic Mapping Study. 463-466 - Iaakov Exman, Omer Ganon, Asaf Yosef:

Generating Luck from Weak Ties in Social Networks. 467-472
Session: Recommender Systems
- Han Yan, Ye Tian, Shunyao Wang, Xiangyang Gong, Xirong Que, Wendong Wang:

Personalized Video Recommendation Based on Latent Community. 473-474 - Yiran Wang, Jian Cao, David Lo

:
Mining and Predicting Micro-Process Patterns of Issue Resolution for Open Source Software Projects. 477-482 - Wen Fang, Lu Lu:

Deep Graph Attention Neural Network for Click-Through Rate Prediction. 483-488 - Yusen Wang, Kaize Shi, Zhendong Niu

:
A Session-based Job Recommendation System Combining Area Knowledge and Interest Graph Neural Networks. 489-492 - Michael Weiss, Hind Milhem

, Stéphane S. Somé:
Modeling and Selecting Frameworks in terms of Patterns, Tactics, and System Qualities. 493-500 - Anderson Feitosa Júnior, Flávio Medeiros, Ivo Calado:

An Evaluation of Recommendation Algorithms for Tourist Attractions. 501-506 - Zhang Zhang, Xinjun Mao, Yao Lu, Jinyu Lu:

Who Should Close the Questions: Recommending Voters for Closing Questions Based on Tags. 507-512 - Ping Liang, Dongjin Yu, Xiaoxiao Sun:

A Deep Spatio-temporal Residual Network Model for Commercial Activeness Prediction. 513-518 - Nan Mu, Daren Zha, Lin Zhao, Rui Gong:

Collaborative Denoising Graph Attention Autoencoders for Social Recommendation. 519-524 - Rui Song, Tong Li, Xin Dong, Zhiming Ding:

Identifying Similar Users Based on Metagraph of Check-in Trajectory Data. 525-531
Session: Security and Blockchain
- Nacha Chondamrongkul, Jing Sun, Ian Warren:

Formal Security Analysis for Blockchain-based Software Architecture. 532-537 - Stephen Tate, Moulika Bollinadi, Joshua Moore:

Characterizing Vulnerabilities in a Major Linux Distribution. 538-543 - Yeming Lin, Jianbo Gao, Tong Li, Jingguo Ge, Bingzhen Wu:

Mining DApp Repositories: Towards In-Depth Comprehension and Accurate Classification. 544-549 - Shuangmin Zhang, Ruixuan Li, Junwei Tang, Xiwu Gu:

Automated Rogue Behavior Detection for Android Applications. 550-553 - Juan Cano-Benito, Andrea Cimmino

, Raúl García-Castro:
Benchmarking the efficiency of RDF-based access for blockchain environments. 554-559 - Sayem Mohammad Imtiaz, Kazi Zakia Sultana, Tanmay Bhowmik:

SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability. 560-565 - Asadullah Hill Galib, B. M. Mainul Hossain

:
Significant API Calls in Android Malware Detection (Using Feature Selection Techniques and Correlation Based Feature Elimination). 566-571 - Xuren Wang, Jie Yang, Qiuyun Wang, Changxin Su:

Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning. 572-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














