default search action
32nd SEKE 2020: KSIR Virtual Conference Center, USA
- Raúl García-Castro:
The 32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020, KSIR Virtual Conference Center, USA, July 9-19, 2020. KSI Research Inc. 2020, ISBN 1-891706-50-0
Session: Internet of Things and Robotics
- Ran Li, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:
Formalization and Verification of VANET. 1-6 - Genwang Gou, Yongxin Zhao, Jiawei Jiang, Ling Shi:
The Prediction of Delay Time and Route Planning for Autonomous Vehicles. 7-12 - Jin Yong Kim, Myeong Oh Lee, Geun Sik Jo:
DCBlock : Efficient Module for Unpaired Image to Image Translation Using GANs. 13-18 - Jiawei Jiang, Yongxin Zhao, Xi Wu, Genwang Gou:
A Detect-and-Modify Region-based Classifier to Defend Evasion Attacks. 19-24 - Xin Ma, Mingliang Li, Jinxi Kong, Siming Zhao, Wei Li, Xiaohui Cui:
Inspect Characteristics of Rice via Machine Learning Method. 25-30 - Ningning Chen, Huibiao Zhu, Jiaqi Yin, Lili Xiao, Yuan Fei:
Modeling and Verifying NDN-based IoV Using CSP. 31-36 - Xudong Zhao, Rui Li, Wanwei Liu, Hao Shi, Shaoxian Shu, Wei Dong:
Controller Synthesis for ROS-based Multi-Robot Collaboration. 37-42 - Junchao Lv, Linjiang Zheng, Yuhui Ye, Chenglin Ye:
Understanding Travel Patterns of Commuting Private Cars using Big data of Electronic Registration Identification of Vehicles. 43-48 - Yohan Bae, Suyeong Lee, Yeonghun Nam:
TIMESIGHT: Discovering Time-driven Insights Automatically and Fairly. 49-54 - Fabian Cesar Pereira Brandão Manoel, Carlos Eduardo Pantoja, Leandro Samyn, Vinicius Souza de Jesus:
Physical Artifacts for Agents in a Cyber-Physical System: A Case Study in Oil & Gas Scenario (EEAS). 55-60
Session: Ontologies and Knowledge Graphs
- Onyeka Ezenwoye, Yi Liu, William Patten:
Classifying Common Security Vulnerabilities by Software Type. 61-64 - Hongming Zhu, Yizhi Jiang, Xiaowen Wang, Hongfei Fan, Qin Liu, Bowen Du:
Modeling Relation Path for Knowledge Graph via Dynamic Projection. 65-70 - Shanmuganathan Vasanthapriyan, Banujan Kuhaneswaran:
Modeling HiBrinto Ontology to Develop Knowledge Management Portal for Highway Bridge Construction. 71-76 - Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. 77-82 - Imano Williams, Xiaohong Yuan:
Identifying Security Concerns Based on a Use Case Ontology Framework. 83-88 - Ronaldo Gonçalves, Robert Ahn, Tom Hill, Lawrence Chung:
Towards High Quality Recommendations: A Goal-Oriented and Ontology-Based Interactive Approach. 89-92 - Patrick D. Cook, Susan Mengal, Siva Parameswaran:
SHAMROQ: Towards semantic models of regulations. 93-100 - José Ferdinandy Silva Chagas, Luiz Antonio Pereira Silva, Mirko Barbosa Perkusich, Ademar França de Sousa Neto, Danyllo Albuquerque, Dalton Cézane Gomes Valadares, Hyggo O. Almeida, Angelo Perkusich:
On the Reuse of Knowledge to Develop Intelligent Software Engineering Solutions. 101-106
Session: Software Specification
- Yuanbang Li, Rong Peng, Bangchao Wang, Dong Sun:
Research on Multi Source Fusion Evolution Requirements Acquisition in Mobile Applications. 107-110 - Ran Mo, Shaozhi Wei, Ting Hu:
Detecting and Modeling Method-level Hotspots in Architecture Design Flaws. 111-116 - Michael E. Shin, Don Pathirage, Dongsoo Jang:
Threat and Security Modeling for Secure Software Requirements and Architecture. 117-120 - Taeghyun Kang, Hyungbae Park, Venkata N. Inukollu:
Knowledge-based Interface transition diagram for SRS(Software Requirements Specification) in mobile application. 121-126 - Liang Hao, Xin Sun, Lan Lin, Zedong Peng:
Correct Software by Design for Software-Defined Networking: A preliminary Study. 127-134 - Cuong Cu, Rachel Culver, Yongjie Zheng:
Dynamic Architecture-Implementation Mapping for Architecture-Based Runtime Software Adaptation. 135-140 - Shuaicai Ren, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
An Automated Goal Labeling Method Based on User Reviews. 141-146 - Tong Wang, Bixin Li, Lingyuan Zhu:
A Co-evolutionary Method Between Architecture and Code. 147-152
Session: Empirical Software Engineering
- Xinlei Ma, Yan Liu:
An Empirical Study of Maven Archetype. 153-157 - Florian Auer, Michael Felderer:
Evaluating the Usefulness and Ease of Use of an Experimentation Definition Language. 158-163 - Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham:
Time-Aware Models for Software Effort Estimation. 164-167 - Wen-Chin Huang, Zhenlan Ji, Yanhui Li:
An Empirical Study on Issue Knowledge Transfer from Python to R for Machine Learning Software. 168-173 - Swapna S. Gokhale:
Quantifying the Relationship Between Health Outcomes and Unhealthy Habits. 174-179 - Donghoon Kim, Loc Ho:
The Reaction of Open Source Projects to C++ Templates and Lambdas: An Empirical Replication Study. 180-185 - Lucas Barros, Flávio Medeiros, Eduardo Moraes, Anderson Feitosa Júnior:
Analyzing the Performance of Apps Developed by using Cross-Platform and Native Technologies. 186-191 - Lilian Passos Scatalon, Rogério Eduardo Garcia, Ellen Francine Barbosa:
On the Use of Support Mechanisms to Perform Experimental Variables Selection. 192-197 - Michael Franklin Bosu, Stephen G. MacDonell, Peter A. Whigham:
Testing the Stationarity Assumption in Software Effort Estimation Datasets. 198-203
Session: Distributed Systems and Machine Learning
- Sheyda Kiani Mehr, Wenting Sun, Xuancheng Fan, Nikita Butakov, Nicolas Ferlans:
Graph Machine Learning for Anomaly Prediction in Distributed Systems. 204-209 - Chen Qian, Wenjing Zhu:
F(X)-MAN: An Algebraic and Hierarchical Composition Model for Function-as-a-Service. 210-215 - Pengfei Shao, Shuyuan Jin:
Privacy-aware OrLa Based Access Control Model in the Cloud. 216-221 - Junya Xu, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei, Gang Lu:
Formal Modelling and Verification of MCAC Router Architecture in ICN. 222-227 - Li Yao, Bing Li, Jian Wang:
Data-sparsity Service Discovery using Enriched Neural Topic Model and Attentional Bi-LSTM. 228-233 - Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur:
Explainable Deep Convolutional Candlestick Learner. 234-237 - Xinwei Zhu, Haiping Zhang, Liming Guan, Dongjin Yu, Zhongjin Li:
Conditional Normalizing Flow-based Generative Model for Zero-Shot Recognition. 238-243 - Ying Shang, Yongli Li, Feng You:
An SNN Construction Method Based on CNN Conversion and Threshold Setting. 244-249 - Qiao Pan, Golddy Indra Kumara, Jiahuan Chu:
Multi Classification of Alzheimer's Disease using Linear Fusion with TOP-MRI Images and Clinical Indicators. 250-256 - Xuewang Zhang, Yin Zhou:
Deep Hashing with Large Batch Training for Cross-modal Retrieval. 257-263
Session: Software Development
- Iaakov Exman, Alexey Nechaev:
Algebraic Higher-Abstraction for Software Refactoring Automation. 264-269 - Jiang Wu, Jianjun Xu:
Reliable Compilation Optimization Selection Based on Gate Graph Neural Network. 270-275 - Rehman Arshad:
Trends in Software Reverse Engineering. 276-280 - Elia Eiroa-Lledo, Abby Bechtel, Emily Daskas, Lily Foster, Raha Pirzadeh, Katie Rodeghiero, Erik Linstead:
Do Experienced Programmers put too Much Confidence in Comments? 281-286 - Duong Dinh Tran, Kazuhiro Ogata:
Formal verification of an abstract version of Anderson protocol with CafeOBJ, CiMPA and CiMPG. 287-292 - Qing Wang, Zhenzhou Tian, Cong Gao, Lingwei Chen:
Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining. 293-298 - Asif Imran, Tevfik Kosar:
The Impact of Auto-Refactoring Code Smells on the Resource Utilization of Cloud Software. 299-304 - Borun Xie, Zhenzhou Tian, Cong Gao, Lingwei Chen:
Towards Fine-Grained Compiler Identification with Neural Modeling. 305-310 - Alexandre Braga Gomes, Manuel Silva, Dalton Cézane Gomes Valadares, Mirko Barbosa Perkusich, Danyllo Albuquerque, Hyggo O. Almeida, Angelo Perkusich:
Evaluating the Relationship of Personality and Teamwork Quality in the Context of Agile Software Development. 311-316
Session: Software Testing
- Xuan Zhou, Lu Lu, Yexia Qin:
ISC-FS: An Improved Spectral Clustering with Feature Selection for Defect Prediction. 317-322 - Zhihan Wang, Lu Lu:
A Semantic Convolutional Auto-Encoder Model for Software Defect Prediction. 323-328 - Qiguo Huang, Xiang Chen, Zhengliang Li, Chao Ni, Qing Gu:
Revisiting Dependence Cluster Metrics based Defect Prediction. 329-334 - Koichi Hamada, Fuyuki Ishikawa, Satoshi Masuda, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita, Mineo Matsuya:
Guidelines for Quality Assurance of Machine Learning-based Artificial Intelligence. 335-341 - Koji Yamamoto, Takao Nakagawa, Shogo Tokui, Kazuki Munakata:
Call Sequence List Distiller for Practical Stateful API Testing. 342-346 - Shihab Shahriar Khan, Nishat Tasnim Niloy, Md. Aquib Azmain, Ahmedul Kabir:
Impact of Label Noise and Efficacy of Noise Filters in Software Defect Prediction. 347-352 - Wyao Matcha, Fadel Touré, Mourad Badri, Linda Badri:
Using Deep Learning Classifiers to Identify Candidate Classes for Unit Testing in Object-Oriented Systems. 353-358 - Fadel Touré, Mourad Badri:
Unit Test Effort Prioritization Using Combined Datasets and Deep Learning: A Cross-Systems Validation. 359-364 - Zengyang Li, Dengwei Li, Peng Liang, Ran Mo:
An Empirical Investigation on the Relationship Between Bug Severity and Bug Fixing Change Complexity. 365-370
Session: Natural Language Processing
- Eduardo Lopez, Kamran Sartipi:
Can language help in the characterization of user behavior? Feature engineering experiments with Word. 371-374 - Weidong Liu, Piying Zhang, Wenbo Qiao:
Patent Technical Function-effect Representation and Mining Method. 375-379 - Wiem Khlif, Nourchène Elleuch Ben Ayed, Faten Chihi:
Towards A Systematic Derivation Of BPMN Model From Business Process Textual Description. 380-385 - Bohao Wang, Wanyou Lv, Jianqi Shi, Yanhong Huang:
A Novel Self-Attention Based Automatic Code Completion Neural Network. 386-391 - Fazle Rabbi, Md. Nazmul Haque, Md. Eusha Kadir, Md. Saeed Siddik, Ahmedul Kabir:
An Ensemble Approach to Detect Code Comment Inconsistencies using Topic Modeling. 392-395 - Xin Liu, Liutong Xu:
A Combined Model for Extractive and Abstractive summarization based on Transformer model. 396-399 - Rao Hamza Ali, Erik Linstead:
Modeling Topic Exhaustion for Programming Languages on StackOverflow. 400-405 - Fang Liu, Tong Li:
An Efficient Application Searching Approach Based on User Review Knowledge Graph. 406-412 - Dou Hu, Lingwei Wei:
SLK-NER: Exploiting Second-order Lexicon Knowledge for Chinese NER. 413-417
Session: Social Media Mining
- Lingjia Li, Jian Cao, David Lo:
Sentiment Analysis over Collaborative Relationships in Open Source Software Projects. 418-423 - Taeghyun Kang, Hyungbae Park, Sunae Shin:
Searching, Examining, and Exploiting In-demand Technical (SEE IT) Skills using Web Data Mining. 424-428 - Jingren Zhou, Peiquan Jin:
Sentiment Analysis of Online Reviews with a Hierarchical Attention Network. 429-434 - Abdillah Mohamed, Li Zhang, Jing Jiang:
Cross-project Reopened Pull Request Prediction in GitHub. 435-438 - Ping Liang, Dongjin Yu, Xiaoxiao Sun:
Restaurant Failure Prediction Based on Multi-View Online Data. 439-444 - Jialing Liang, Peiquan Jin:
Detecting Spammers from Hot Events on Microblog Platforms: An Experimental Study. 445-450 - Fangchao Tian, Fan Lu, Peng Liang, Muhammad Ali Babar:
Automatic Identification of Architecture Smell Discussions from Stack Overflow. 451-456 - Yi Yang, Xinjun Mao, Zixi Xu, Yao Lu:
Exploring CQA User Contributions and Their Influence on Answer Distribution. 457-462 - Luqi Guan, John W. Castro, Xavier Ferré, Silvia Teresita Acuña:
Copy and Paste Behavior: A Systematic Mapping Study. 463-466 - Iaakov Exman, Omer Ganon, Asaf Yosef:
Generating Luck from Weak Ties in Social Networks. 467-472
Session: Recommender Systems
- Han Yan, Ye Tian, Shunyao Wang, Xiangyang Gong, Xirong Que, Wendong Wang:
Personalized Video Recommendation Based on Latent Community. 473-474 - Yiran Wang, Jian Cao, David Lo:
Mining and Predicting Micro-Process Patterns of Issue Resolution for Open Source Software Projects. 477-482 - Wen Fang, Lu Lu:
Deep Graph Attention Neural Network for Click-Through Rate Prediction. 483-488 - Yusen Wang, Kaize Shi, Zhendong Niu:
A Session-based Job Recommendation System Combining Area Knowledge and Interest Graph Neural Networks. 489-492 - Michael Weiss, Hind Milhem, Stéphane S. Somé:
Modeling and Selecting Frameworks in terms of Patterns, Tactics, and System Qualities. 493-500 - Anderson Feitosa Júnior, Flávio Medeiros, Ivo Calado:
An Evaluation of Recommendation Algorithms for Tourist Attractions. 501-506 - Zhang Zhang, Xinjun Mao, Yao Lu, Jinyu Lu:
Who Should Close the Questions: Recommending Voters for Closing Questions Based on Tags. 507-512 - Ping Liang, Dongjin Yu, Xiaoxiao Sun:
A Deep Spatio-temporal Residual Network Model for Commercial Activeness Prediction. 513-518 - Nan Mu, Daren Zha, Lin Zhao, Rui Gong:
Collaborative Denoising Graph Attention Autoencoders for Social Recommendation. 519-524 - Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Metagraph of Check-in Trajectory Data. 525-531
Session: Security and Blockchain
- Nacha Chondamrongkul, Jing Sun, Ian Warren:
Formal Security Analysis for Blockchain-based Software Architecture. 532-537 - Stephen Tate, Moulika Bollinadi, Joshua Moore:
Characterizing Vulnerabilities in a Major Linux Distribution. 538-543 - Yeming Lin, Jianbo Gao, Tong Li, Jingguo Ge, Bingzhen Wu:
Mining DApp Repositories: Towards In-Depth Comprehension and Accurate Classification. 544-549 - Shuangmin Zhang, Ruixuan Li, Junwei Tang, Xiwu Gu:
Automated Rogue Behavior Detection for Android Applications. 550-553 - Juan Cano-Benito, Andrea Cimmino, Raúl García-Castro:
Benchmarking the efficiency of RDF-based access for blockchain environments. 554-559 - Sayem Mohammad Imtiaz, Kazi Zakia Sultana, Tanmay Bhowmik:
SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability. 560-565 - Asadullah Hill Galib, B. M. Mainul Hossain:
Significant API Calls in Android Malware Detection (Using Feature Selection Techniques and Correlation Based Feature Elimination). 566-571 - Xuren Wang, Jie Yang, Qiuyun Wang, Changxin Su:
Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning. 572-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.