


default search action
20th SERA 2022: Las Vegas, NV, USA
- Juyeon Jo, Yeong-Tae Song, Lin Deng, Junghwan John Rhee:

20th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2022, Las Vegas, NV, USA, May 25-27, 2022. IEEE 2022, ISBN 978-1-6654-8350-6 - Haeng-Kon Kim:

IOT (Internet of Things) Applications and Current Issues in Korea: Keynote Address. 1 - Hyun Yeo:

Smart Farming Technology Review: Keynote Address. 2 - Matthew Sands, Jongyeop Kim, Jinki Kim

:
Output-only Structural Damage Detection via Enhanced Random Vibration Analysis using LSTM/GRU model. 3-9 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:

Concept of the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI. 10-15 - Alper Tolga Kocatas, Ali Hikmet Dogru:

Enhancing UML Connectors with Behavioral Specifications. 16-21 - Seongsoo Kim, Yiming Ji, Jongyeop Kim, Eric W. Montie:

Dolphin Whistle Visualization Framework: MySQL Query Approach. 22-29 - Prateek Gupta:

Introduction to Imperative Code Execution Machine - a framework for sustainable Salesforce application development. 30-38 - Hasnain Ali

, Syed Omer Gilani
, Muhammad Jawad Khan, Asim Waris
, Muazzam Ali Khan Khattak, Mohsin Jamil
:
Predicting Episodic Video Memorability using Deep Features Fusion Strategy. 39-46 - Nader Kesserwan, Jameela Al-Jaroodi, Nader Mohamed, Imad Jawhar:

Automatic Detection of Interaction Errors. 47-53 - Seongsoo Kim, Hayden Wimmer, Jongyeop Kim:

Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet. 54-62 - Herig Recalde, Santiago Soria, Diego Vallejo-Huanga

:
Internal Search Engine and Recommender System with Natural Language Processing in PaaS. 63-69 - Amrit Rajbhandari, Minhaz F. Zibran, Farjana Z. Eishita:

Security Versus Performance Bugs: How Bugs are Handled in the Chromium Project. 70-76 - Joshua J. Rodriguez, Minhaz F. Zibran, Farjana Z. Eishita:

Finding the Middle Ground: Measuring Passwords for Security and Memorability. 77-82 - Omotola Adekanbmi, Hayden Wimmer, Jongyeop Kim:

Big Cyber Security Data Analysis with Apache Mahou. 83-90 - Honghe Zhou, Lin Deng

, Weifeng Xu, Wei Yu
, Josh Dehlinger, Suranjan Chakraborty:
Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems. 91-98 - Biodoumoye George Bokolo, GaganDeep Sur, Qingzhong Liu, Fang Yuan, Fan Liang:

Hybrid Analysis Based Cross Inspection Framework for Android Malware Detection. 99-105 - Reem Alfayez

, Yunyan Ding, Robert Winn, Ghaida Alfayez:
What is Discussed About Software Engineering Ethics on Stack Exchange (Q&A) Websites? A Case Study. 106-111 - Sharif Ahmed, Arif Ahmed, Nasir U. Eisty:

Automatic Transformation of Natural to Unified Modeling Language: A Systematic Review. 112-119 - Md. Jobair Hossain Faruk

, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim:
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. 120-127 - Lin Deng

, Bingyang Wei, Jin Guo, Matt Benke, Tyler Howard, Matt Krause, Aman Patel:
Securing Sensitive Data in Java Virtual Machines. 128-131 - Ohoud Al Haqbani, Sultan Alyahya:

Supporting Coordination among Participants in Crowdsourcing Software Design. 132-139 - Prashanta Saha, Upulee Kanewala

:
Using Metamorphic Relations to Improve The Effectiveness of Automatically Generated Test Cases. 140-148 - Fred Guyton, Wei Li, Ling Wang, Ajoy Kumar:

Android Feature Selection based on Permissions, Intents, and API Calls. 149-154 - Anusha Konduru, Zhiyong Shan:

Automated Testing to Detect Status Data Loss in Android Applications. 155-160

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














