![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Automated Software Engineering, Volume 29
Volume 29, Number 1, May 2022
- Manzoor Hussain
, Nazakat Ali
, Jang-Eui Hong
:
DeepGuard: a framework for safeguarding autonomous driving systems from inconsistent behaviour. 1 - Dileep Kumar Pattipati
, Rupesh Nasre, Sreenivasa Kumar Puligundla:
BOLD: an ontology-based log debugger for C programs. 2 - Thomas Bock
, Claus Hunsen, Mitchell Joblin, Sven Apel
:
Synchronous development in open-source projects: A higher-level perspective. 3 - Sunitha Pachala, Ch. Rupa
, L. Sumalatha:
l-PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment. 4 - Adailton Ferreira de Araújo
, Marcos P. S. Gôlo, Ricardo M. Marcacini:
Opinion mining for app reviews: an analysis of textual representation and predictive models. 5 - A. Balaram, S. Vasundra
:
Prediction of software fault-prone classes using ensemble random forest with adaptive synthetic sampling algorithm. 6 - Rubén Rubio
, Narciso Martí-Oliet
, Isabel Pita
, Alberto Verdejo
:
Model checking strategy-controlled systems in rewriting logic. 7 - Amin Nikanjam
, Mohammad Mehdi Morovati, Foutse Khomh, Houssem Ben Braiek:
Faults in deep reinforcement learning programs: a taxonomy and a detection approach. 8 - Eman Abdullah AlOmar
, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer
, Christian D. Newman, Ali Ouni, Zhe Yu:
On the documentation of refactoring types. 9 - Aya Zaki-Ismail, Mohamed Osama, Mohamed Almorsy Abdelrazek, John C. Grundy, Amani S. Ibrahim:
RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements. 10 - Chen Zhi, Shuiguang Deng
, Junxiao Han, Jianwei Yin:
Towards automatic detection and prioritization of pre-logging overhead: a case study of hadoop ecosystem. 11 - Amina Mustansir
, Khurram Shahzad, Muhammad Kamran Malik:
Towards automatic business process redesign: an NLP based approach to extract redesign suggestions. 12 - Kalaipriyan Thirugnanasambandam, M. Rajeswari, Debnath Bhattacharyya
, Jung-yoon Kim:
Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems. 13 - Zhenglin Gu, Jidong Yi, Hui Yao, Yang Wang:
Intelligent online guiding network regional planning based on software-driven autonomous communication system. 14 - Babita Pathik
, Meena Sharma:
Source code change analysis with deep learning based programming model. 15 - S. Kumar Chandar:
Convolutional neural network for stock trading using technical indicators. 16 - N. Purandhar, S. Ayyasamy
, N. M. Saravana Kumar
:
Strategic real time framework for healthcare using fuzzy C-means systems. 17 - J. Rajeswari, J. Raja, S. Jayashri:
Gradient contouring and texture modelling based CAD system for improved TB classification. 18 - Yingchun Wang, Weijun Hu:
Intelligent software-driven immersive environment for online political guiding based on brain-computer interface and autonomous systems. 19 - Abdullah Lakhan
, Mazin Abed Mohammed
, Omar Ibrahim Obaid
, Chinmay Chakraborty
, Karrar Hameed Abdulkareem, Seifedine Kadry:
Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm. 20 - Islem Saidani, Ali Ouni
, Mohamed Wiem Mkaouer
:
Improving the prediction of continuous integration build failures using deep learning. 21 - Tan Jiang
, Xiao'er Gan, Zheng Liang, Guang Luo:
AIDM: artificial intelligent for digital museum autonomous system with mixed reality and software-driven data collection and analysis. 22 - M. Mythily
, Sanchari Saha, Sudhakar Selvam, S. Iwin Thanakumar Joseph
:
BPM supported model generation by contemplating key elements of information security. 23 - Bin Li, Ying Wei, Xiaobing Sun
, Lili Bo, Dingshan Chen, Chuanqi Tao:
Towards the identification of bug entities and relations in bug reports. 24 - Padmalata V. Nistala
, Asha Rajbhoj, Vinay Kulkarni, Shivani Soni, Kesav V. Nori, Raghu Reddy
:
Towards digitalization of requirements: generating context-sensitive user stories from diverse specifications. 26 - Md. Nadim
, Debajyoti Mondal, Chanchal K. Roy:
Leveraging structural properties of source code graphs for just-in-time bug prediction. 27 - Anugrah Srivastava, Tapas Badal, Pawan Saxena, Ankit Vidyarthi, Rishav Singh
:
UAV surveillance for violence detection and individual identification. 28 - Yang Liu, Yan Ma, Yongsheng Yang:
A three-valued model abstraction framework for PCTL* stochastic model checking. 29 - Pietro Liguori
, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Can we generate shellcodes via natural language? An empirical study. 30 - Shuo Yang
, Xinjun Mao, Yao Lu, Yong Xu:
Towards a behavior tree-based robotic software architecture with adjoint observation schemes for robotic software development. 31 - Adriana Peña Pérez Negrón
, Luz M. Reyes
, Mirna Muñoz:
Mathematical model of social behavior for the allocation of members in software development teams. 32 - Can Cheng
, Bing Li, Zengyang Li, Peng Liang
, Xiaofeng Han, Jiahua Zhang:
Improving generality and accuracy of existing public development project selection methods: a study on GitHub ecosystem. 33 - Ambika Gupta, Suyel Namasudra:
A Novel Technique for Accelerating Live Migration in Cloud Computing. 34 - Philipp Dominik Schubert
, Paul Gazzillo
, Zach Patterson, Julian Braha, Fabian Schiebel, Ben Hermann, Shiyi Wei, Eric Bodden:
Static data-flow analysis for software product lines in C. 35 - Simona Bernardi, Abel Gómez, José Merseguer
, Diego Perez-Palacin, José Ignacio Requeno
:
DICE simulation: a tool for software performance assessment at the design stage. 36 - Chandan Sharma
, Roopak Sinha:
FLASc: a formal algebra for labeled property graph schema. 37
Volume 29, Number 2, November 2022
- Florian Tambon
, Gabriel Laberge, Le An, Amin Nikanjam
, Paulina Stevia Nouwou Mindom, Yann Pequignot, Foutse Khomh, Giulio Antoniol, Ettore Merlo, François Laviolette:
How to certify machine learning based safety-critical systems? A systematic literature review. 38 - Mengdi Zhang, Jun Sun, Jingyi Wang:
Which neural network makes more explainable decisions? An approach towards measuring explainability. 39 - Viral Sheth, Kostadin Damevski:
Grouping related stack overflow comments for software developer recommendation. 40 - Mohammed Alqmase
, Mohammad R. Alshayeb, Lahouari Ghouti:
Quality assessment framework to rank software projects. 41 - Imano Williams
, Xiaohong Yuan, Mohd Anwar, Jeffrey Todd McDonald:
An Automated Security Concerns Recommender Based on Use Case Specification Ontology. 42 - Li Kuang
, Cong Zhou, Xiaoxian Yang:
Code comment generation based on graph neural network enhanced transformer model for code understanding in open-source software ecosystems. 43 - Anshu Parashar, Raman Kumar Goyal, Sakshi Kaushal, Sudip Kumar Sahana
:
Machine learning approach for software defect prediction using multi-core parallel computing. 44 - Yating Zhang
, Daiyan Wang, Wei Dong:
MerIt: improving neural program synthesis by merging collective intelligence. 45 - Duc-Anh Nguyen, Do Minh Kha, Minh Le Nguyen, Pham Ngoc Hung
:
A symbolic execution-based method to perform untargeted attack on feed-forward neural networks. 46 - Zhanyao Lei, Wenhua Zhao, Zhenkai Ding, Mingyuan Xia, Zhengwei Qi
:
AppSPIN: reconfiguration-based responsiveness testing and diagnosing for Android Apps. 47 - Anupriya, Anita Singhrova:
Mobile traffic flow prediction using intelligent whale optimization algorithm. 48 - Radhia Bouziane
, Labib Sadek Terrissa, Soheyb Ayad:
Semantic web services for ROS: a Robot as a Service approach. 49 - Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi
, Mohsen Mahdieh:
Test case prioritization using test case diversification and fault-proneness estimations. 50 - Noppadol Assavakamhaenghan, Waralee Tanaphantaruk, Ponlakit Suwanworaboon, Morakot Choetkiertikul, Suppawong Tuarob
:
Quantifying effectiveness of team recommendation for collaborative software development. 51 - Thomas Hirsch, Birgit Hofer:
Detecting non-natural language artifacts for de-noising bug reports. 52 - Rishab Sharma, Ramin Shahbazi, Fatemeh H. Fard
, Zadia Codabux, Melina C. Vidoni
:
Self-admitted technical debt in R: detection and causes. 53 - Yi Xiang, Xiaowei Yang, Han Huang, Zhengxin Huang, Miqing Li
:
Sampling configurations from software product lines via probability-aware diversification and SAT solving. 54 - Ziyi Zhou
, Huiqun Yu
, Guisheng Fan, Zijie Huang
, Kang Yang, Jiayin Zhang
:
HQLgen: deep learning based HQL query generation from program context. 55 - Maryam Mehrabi, Bahman Zamani
, Abdelwahab Hamou-Lhadj
:
HealMA: a model-driven framework for automatic generation of IoT-based Android health monitoring applications. 56 - Yuran Zhu, Tong Li:
An object detection-based framework for automatically recognizing iStar hand drafts. 57 - Boting Geng
, Feng Wang:
An SDN architecture for patent prior art search system based on phrase embedding. 58 - Ashish Sharma
, Sanjiv Tokekar, Sunita Varma:
Actor-critic architecture based probabilistic meta-reinforcement learning for load balancing of controllers in software defined networks. 59 - Abdulaziz Alhefdhi
, Hoa Khanh Dam, Yusuf Sulistyo Nugroho, Hideaki Hata, Takashi Ishio
, Aditya Ghose:
A framework for conditional statement technical debt identification and description. 60 - Shayan Hashemi
, Mika Mäntylä:
SiaLog: detecting anomalies in software execution logs using the siamese network. 61 - Honghao Gao, Zijian (Alex) Zhang, Ramón J. Durán Barroso, Xiong Luo:
Guest Editorial: Deep Learning in Open-Source Software Ecosystems. 62
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.