ASE - volume 29 - 2022 论文列表 |
点击这里查看 Automated Software Engineering 的JCR分区、影响因子等信息 |
Simona Bernardi Abel Gómez José Merseguer Diego Perez-Palacin José Ignacio Requeno
Static data-flow analysis for software product lines in C.Philipp Dominik Schubert Paul Gazzillo Zach Patterson Julian Braha Fabian Schiebel Ben Hermann Shiyi Wei Eric Bodden
A Novel Technique for Accelerating Live Migration in Cloud Computing. Improving generality and accuracy of existing public development project selection methods: a study on GitHub ecosystem.Can Cheng Bing Li Zengyang Li Peng Liang Xiaofeng Han Jiahua Zhang
Mathematical model of social behavior for the allocation of members in software development teams.Adriana Peña Pérez Negrón Luz M. Reyes Mirna Muñoz
Towards a behavior tree-based robotic software architecture with adjoint observation schemes for robotic software development.Shuo Yang Xinjun Mao Yao Lu Yong Xu
Can we generate shellcodes via natural language? An empirical study.Pietro Liguori Erfan Al-Hossami Domenico Cotroneo Roberto Natella Bojan Cukic Samira Shaikh
A three-valued model abstraction framework for PCTL* stochastic model checking.Yang Liu Yan Ma Yongsheng Yang
UAV surveillance for violence detection and individual identification.Anugrah Srivastava Tapas Badal Pawan Saxena Ankit Vidyarthi Rishav Singh
Leveraging structural properties of source code graphs for just-in-time bug prediction.Md. Nadim Debajyoti Mondal Chanchal K. Roy
Towards digitalization of requirements: generating context-sensitive user stories from diverse specifications.Padmalata V. Nistala Asha Rajbhoj Vinay Kulkarni Shivani Soni Kesav V. Nori Raghu Reddy
Identification and visualization of variability implementations in object-oriented variability-rich systems: a symmetry-based approach.Xhevahire Tërnava Johann Mortara Philippe Collet Daniel Le Berre
Towards the identification of bug entities and relations in bug reports.Bin Li Ying Wei Xiaobing Sun Lili Bo Dingshan Chen Chuanqi Tao
BPM supported model generation by contemplating key elements of information security.M. Mythily Sanchari Saha Sudhakar Selvam S. Iwin Thanakumar Joseph
AIDM: artificial intelligent for digital museum autonomous system with mixed reality and software-driven data collection and analysis.Tan Jiang Xiao'er Gan Zheng Liang Guang Luo
Improving the prediction of continuous integration build failures using deep learning.Islem Saidani Ali Ouni Mohamed Wiem Mkaouer
Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm.Abdullah Lakhan Mazin Abed Mohammed Omar Ibrahim Obaid Chinmay Chakraborty Karrar Hameed Abdulkareem Seifedine Kadry
Intelligent software-driven immersive environment for online political guiding based on brain-computer interface and autonomous systems. Gradient contouring and texture modelling based CAD system for improved TB classification.J. Rajeswari J. Raja S. Jayashri
Strategic real time framework for healthcare using fuzzy C-means systems.N. Purandhar S. Ayyasamy N. M. Saravana Kumar
Convolutional neural network for stock trading using technical indicators. Source code change analysis with deep learning based programming model. Intelligent online guiding network regional planning based on software-driven autonomous communication system.Zhenglin Gu Jidong Yi Hui Yao Yang Wang
Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems.Kalaipriyan Thirugnanasambandam M. Rajeswari Debnath Bhattacharyya Jung-yoon Kim
Towards automatic business process redesign: an NLP based approach to extract redesign suggestions.Amina Mustansir Khurram Shahzad Muhammad Kamran Malik
Towards automatic detection and prioritization of pre-logging overhead: a case study of hadoop ecosystem.Chen Zhi Shuiguang Deng Junxiao Han Jianwei Yin
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements.Aya Zaki-Ismail Mohamed Osama Mohamed Almorsy Abdelrazek John C. Grundy Amani S. Ibrahim
On the documentation of refactoring types.Eman Abdullah AlOmar Jiaqian Liu Kenneth Addo Mohamed Wiem Mkaouer Christian D. Newman Ali Ouni Zhe Yu
Faults in deep reinforcement learning programs: a taxonomy and a detection approach.Amin Nikanjam Mohammad Mehdi Morovati Foutse Khomh Houssem Ben Braiek
Model checking strategy-controlled systems in rewriting logic.Rubén Rubio Narciso Martí-Oliet Isabel Pita Alberto Verdejo
Prediction of software fault-prone classes using ensemble random forest with adaptive synthetic sampling algorithm. Opinion mining for app reviews: an analysis of textual representation and predictive models.Adailton Ferreira de Araújo Marcos Gôlo Ricardo M. Marcacini
l-PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment.Sunitha Pachala Ch. Rupa L. Sumalatha
Synchronous development in open-source projects: A higher-level perspective.Thomas Bock Claus Hunsen Mitchell Joblin Sven Apel
BOLD: an ontology-based log debugger for C programs.Dileep Kumar Pattipati Rupesh Nasre Sreenivasa Kumar Puligundla
DeepGuard: a framework for safeguarding autonomous driving systems from inconsistent behaviour.