


default search action
19th ENASE 2024: Angers, France
- Hermann Kaindl

, Mike Mannion
, Leszek A. Maciaszek:
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2024, Angers, France, April 28-29, 2024. SCITEPRESS 2024, ISBN 978-989-758-696-5
Invited Speakers
- Giancarlo Guizzardi:

Semantic Models for Trustworthy Systems: A Hybrid Intelligence Augmentation Program. ENASE 2024: 5 - Juliette Mattioli:

AI Engineering: A Necessary Condition to Deploy Trustworthy AI in Industry. ENASE 2024: 7 - Daniel Jackson:

Keynote Lecture. ENASE 2024: 9
Papers
- Nils Baumgartner, Elke Pulvermüller:

An Extensive Analysis of Data Clumps in UML Class Diagrams. 15-26 - Albert Contreras

, Esther Guerra, Juan de Lara:
Conversational Assistants for Software Development: Integration, Traceability and Coordination. 27-38 - Laura Troost, Hendrik Winkelmann, Herbert Kuchen:

An Integrated Visualization Approach Combining Dynamic Data-Flow Analysis with Symbolic Execution. 39-50 - Fernando Pastor Ricós, Beatriz Marín, Tanja E. J. Vos, Joseph Davidson, Karel Hovorka:

Scriptless Testing for an Industrial 3D Sandbox Game. 51-62 - Suzad Mohammad

, Abdullah Al Jobair
, Iftekharul Abedeen
:
Decoding Code Quality: A Software Metric Analysis of Open-Source JavaScript Projects. 63-74 - Jesús Ortiz, Victoria Torres, Pedro Valderas:

Combining Goal-Oriented and BPMN Modelling to Support Distributed Microservice Compositions. 75-86 - Deepika Prakash, Naveen Prakash:

A Conceptual Model for Data Warehousing. 87-98 - Maroua Idi

, Sana Younès, Riadh Robbana:
Steady-State Energy Consumption Evaluation in BaseBand Units Pool in Cloud Radio Access Network. 99-109 - Arnold Szederjesi-Dragomir, Radu Dan Gaceanu, Andreea Vescan:

Industrial Validation of a Neural Network Model Using the Novel MixTCP Tool. 110-119 - Marian Daun, Meenakshi Manjunath, Jennifer Brings:

Review Time as Predictor for the Quality of Model Inspections. 120-131 - Anamaria Briciu, Mihaiela Lupea, Gabriela Czibula, István Gergely Czibula:

Enriching the Semantic Representation of the Source Code with Natural Language-Based Features from Comments for Improving the Performance of Software Defect Prediction. 132-143 - Nils Baumgartner, Padma Iyenghar, Elke Pulvermüller:

Considerations in Prioritizing for Efficiently Refactoring the Data Clumps Model Smell: A Preliminary Study. 144-155 - Rabaya Sultana Mim, Abdus Satter, Toukir Ahammed, Kazi Sakib:

Automated Software Vulnerability Detection Using CodeBERT and Convolutional Neural Network. 156-167 - Zakaria Maamar, Amel Benna, Haroune Kechaoui:

ODRL-Based Provisioning of Thing Artifacts for IoT Applications. 168-178 - Bakhta Haouari, Rania Mzid, Olfa Mosbahi:

Reinforcement Learning for Multi-Objective Task Placement on Heterogeneous Architectures with Real-Time Constraints. 179-189 - Aritra Bhaduri, Ayush Kumar Jain, Swagatika Sahoo, Raju Halder, Chandra Mohan Kumar:

Metasurance: A Blockchain-Based Insurance Management Framework for Metaverse. 190-201 - Nils Wild, Horst Lichter, Constantin Mensendiek:

Expectation-Based Integration Testing of Unidirectional Interactions in Component-Based Software Systems. 202-213 - Gabriela Czibula, Ioana-Gabriela Chelaru, Arthur Molnar, István Gergely Czibula:

PreSTyDe: Improving the Performance of within-project Defects Prediction by Learning to Classify Types of Software Faults. 214-225 - Anders W. Tell, Martin Henkel:

Review of Evaluations of Enterprise Architecture. 226-237 - Yasin Sazid

, Kazi Sakib:
Prevalence and User Perception of Dark Patterns: A Case Study on E-Commerce Websites of Bangladesh. 238-249 - Ana Carolina Moises de Souza

, Kaban Koochakpour, Sofia Papavlasopoulou, Letizia Jaccheri:
Exploring Social Sustainability Alignment in Software Development Projects. 250-261 - Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed:

Association Rule Learning Based Approach to Automatic Generation of Feature Model Configurations. 262-272 - Jingyuan Shen, Hourieh Khalajzadeh, Anuradha Madugalla:

Human-Centered e-Health Development: An Accessible Visual Modeling Tool. 283-290 - Federico Calabrese, Luca Piras, Mohammed Ghazi Al-Obeidallah, Benedicta Oghenevoke Egbikuadje, Duaa Alkubaisy:

Gamification of E-Learning Apps via Acceptance Requirements Analysis. 291-298 - Vitalijs Teze

, Erika Nazaruka
:
Ensuring User Privacy in the Digital Age: A Quality-Centric Approach to Tracking and Data Protection. 299-306 - Jens Leicht

, Maritta Heisel:
Extending PriPoCoG: A Privacy Policy Editor for GDPR-Compliant Privacy Policies. 307-318 - Nalaka R. Dissanayake

, Alexander Bolotov:
Applications Model: A High-Level Design Model for Rich Web-Based Applications. 319-327 - Md. Arman Hossain, Suravi Akhter, Md. Shariful Islam, Muhammad Mahbub Alam, Mohammad Shoyaib:

Can a Simple Approach Perform Better for Cross-Project Defect Prediction? 328-335 - Daniel Gerber, Lukas Meitz, Lukas Rosenbauer, Jörg Hähner:

Unsupervised Anomaly Detection in Continuous Integration Pipelines. 336-343 - Michalis Pingos, Athos Mina, Andreas S. Andreou:

Transforming Data Lakes to Data Meshes Using Semantic Data Blueprints. 344-352 - Spyros Loizou, Michalis Pingos, Andreas S. Andreou:

Enhancing Interaction with Data Lakes Using Digital Twins and Semantic Blueprints. 353-361 - Gyulai-Nagy Zoltán-Valentin

:
Combining Clustering Algorithms to Extract Symmetric Clusters from Noisy Data, Applied to Parking Lots. 362-369 - Amina Jandoubi, Mohamed Taha Bennani

, Olfa Mosbahi, Abdelaziz El Fazziki:
Analyzing MQTT Attack Scenarios: A Systematic Formalization and TLC Model Checker Simulation. 370-378 - Oskar Picus

, Camelia Serban:
Connecting Issue Tracking Systems and Continuous Integration / Continuous Delivery Platforms for Improving Log Analysis: A Tool Support. 379-386 - Sangharatna Godboley, P. Radha Krishna:

CC-SolBMC: Condition Coverage Analysis for Smart Contracts Using Solidity Bounded Model Checker. 387-395 - Andreea Vescan, Radu Dan Gaceanu, Arnold Szederjesi-Dragomir:

Embracing Unification: A Comprehensive Approach to Modern Test Case Prioritization. 396-405 - Muhammad Waseem

, Teerath Das, Aakash Ahmad
, Peng Liang, Mahdi Fahmideh, Tommi Mikkonen:
ChatGPT as a Software Development Bot: A Project-Based Study. 406-413 - Madalina Dicu, Adrian Sterca, Camelia Chira, Radu Orghidan:

UICVD: A Computer Vision UI Dataset for Training RPA Agents. 414-421 - Omar Haggag, John Grundy, Mohamed Abdelrazek:

An Analysis of Privacy Issues and Policies of eHealth Apps. 422-433 - Mayssa Trabelsi, Samir Ben Ahmed:

Energy and Cost-Aware Real-Time Task Scheduling with Deadline-Constraints in Fog Computing Environments. 434-441 - Antoine Beugnard, Julien Mallet:

Making Application Build Safer Through Static Analysis of Naming. 442-449 - Kawasaki Fumitake, Shota Kishi, James Neve:

Skeet: Towards a Lightweight Serverless Framework Supporting Modern AI-Driven App Development. 450-457 - Gaetanino Paolone, Romolo Paesani, Jacopo Camplone, Paolino Di Felice:

IoTUseCase: A New Concept for the Modeling of Business Information Systems in the Age of IoT. 458-465 - Jeshwitha Jesus Raja, Meenakshi Manjunath, Marian Daun:

Towards a Goal-Oriented Approach for Engineering Digital Twins of Robotic Systems. 466-473 - Andrada-Mihaela-Nicoleta Moldovan, Andreea Vescan:

Outlier Detection Through Connectivity-Based Outlier Factor for Software Defect Prediction. 474-483 - Padma Iyenghar:

Exploring the Impact of Dataset Accuracy on Machinery Functional Safety: Insights from an AI-Based Predictive Maintenance System. 484-497 - Bastian Tenbergen, Marian Daun:

Metrics to Estimate Model Comprehension: Towards a Reliable Quantification Framework. 498-505 - Yasin Sazid

, Sharmista Kuri, Kazi Solaiman Ahmed, Abdus Satter:
Commit Classification into Maintenance Activities Using In-Context Learning Capabilities of Large Language Models. 506-512 - Aljia Bouzidi, Nahla Haddar, Kais Haddar:

Comprehensive Traceability Framework for Synchronizing Design UML Sequence Diagrams with a BPMN Diagram. 513-520 - Ana-Gabriela Núñez, María Fernanda Granda

, Victor Saquicela, Otto Parra:
Machine Learning-Enhanced Requirements Engineering: A Systematic Literature Review. 521-528 - Fahima Akter Anni, Muhammad Rezaul Islam

, Farzana Sadia, Mahady Hasan
, M. Rokonuzzaman:
Green Computing Adoption: Understanding the Role of Individual, Social, and Organizational Factors. 529-536 - Elias Seid, Mosammath Nazifa, Sneha Gupta, Oliver Popov, Fredrik Blix:

Security and SLA Monitoring for Cloud Services. 537-546 - Mohitul Shafir

, Partho Protim Saha, Ahnaf Tazwar Araf, Shadat Irtisamul Haque, Mahady Hasan, Farzana Sadia, M. Rokonuzzaman:
Influential Factors of Software Firms' Performance in the Industry of Developing Countries. 547-554 - Yasmeen Anjeer Alshehhi, Khlood Ahmad, Mohamed Abdelrazek, Alessio Bonti:

6DVF: A Framework for the Development and Evaluation of Mobile Data Visualisations. 555-562 - Behnaz Rezvani, Cameron Patterson:

A Monitoring Methodology and Framework to Partition Embedded Systems Requirements. 563-570 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah

:
MPED-SCRUM: An Automated Decision-Making Framework Based Measurement for Managing Requirement Change Within the SCRUM Process. 571-581 - Sébastien Salva, Jarod Sue:

Security Testing of RESTful APIs with Test Case Mutation. 582-589 - Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Evaluating the Impact of Generative Adversarial Network in Android Malware Detection. 590-597 - Omar Haggag, John Grundy, Rashina Hoda:

Towards Enhancing Mobile App Reviews: A Structured Approach to User Review Entry, Analysis and Verification. 598-604 - Anissa Kheireddine, Etienne Renault, Souheib Baarir:

Interpolation-Based Learning for Bounded Model Checking. 605-614 - Emanuel Rodrigues, José Nuno Macedo

, Marcos Viera, João Saraiva:
pyZtrategic: A Zipper-Based Embedding of Strategies and Attribute Grammars in Python. 615-624 - Agnieszka Malanowska

, Jaroslaw Zabuski:
Afpatoo: Tool to Automate Function Point Analysis Based on UML Class and Sequence Diagrams. 625-632 - Raja Oueslati

, Ghaith Manita:
Software Defect Prediction Using Integrated Logistic Regression and Fractional Chaotic Grey Wolf Optimizer. 633-640 - Afef Walha, Faïza Ghozzi

, Faïez Gargouri
:
Extract-Transform-Load Process for Recognizing Sentiment from User-Generated Text on Social Media. 641-648 - Shruthi Ravikumar, Margaret Hamilton

, Charles Thevathayan, Maria Spichkova, Kashif Ali, Gayan Wijesinghe:
Creating a Trajectory for Code Writing: Algorithmic Reasoning Tasks. 649-656 - Eros Cedeño, Ana Isabel Aguilera, Denisse Muñante

, Jorge Correia, Leonel Guerrero, Carlos Sivira, Yudith Cardinale:
An Evaluation of the Impact of End-to-End Query Optimization Strategies on Energy Consumption. 657-665 - Ramin Fuladi, Khadija Hanifi:

CodeGrapher: An Image Representation Method to Enhance Software Vulnerability Prediction. 666-673 - Devi Karolita, John Grundy, Tanjila Kanij, Humphrey O. Obie, Jennifer McIntosh:

CRAFTER: A Persona Generation Tool for Requirements Engineering. 674-683 - Zakaria Maamar, Amel Benna, Fadwa Yahya:

Impact of Policies on Organizations Engaged in Partnership. 684-691 - Rodrigo Branco, Vinicius Vielmo Cogo

, Ibéria Medeiros:
Towards a Web Application Attack Detection System Based on Network Traffic and Log Classification. 692-699 - Dasa Kusniráková, Barbora Buhnova:

Taxonomy of Governance Mechanisms for Trust Management In Smart Dynamic Ecosystems. 700-710 - António Silvestre, Ibéria Medeiros, Andreia Mordido:

Towards a SQL Injection Vulnerability Detector Based on Session Types. 711-718 - Luís Ferreirinha, Ibéria Medeiros:

On the Path to Buffer Overflow Detection by Model Checking the Stack of Binary Programs. 719-726 - Evgenii M. Vinarskii, Natalia Kushik, Nina Yevtushenko, Jorge López, Djamal Zeghlache:

Races in Extended Input/Ouput Automata, Their Compositions and Related Reactive Systems. 727-734 - Virginia Niculescu, Camelia Chisalita-Cretu, Cristina-Claudia Osman

, Adrian Sterca:
Vector Based Modelling of Business Processes. 735-742 - Masmoudi Salma, Maha Charfeddine, Chokri Ben Amar:

Secure Audio Watermarking for Multipurpose Defensive Applications. 743-751 - Simona Motogna, Diana Cristea, Diana-Florina Sotropa, Arthur-Jozsef Molnar:

Uncovering Bad Practices in Junior Developer Projects Using Static Analysis and Formal Concept Analysis. 752-759 - Yutan Huang, Tanjila Kanij, Anuradha Madugalla, Shruti Mahajan, Chetan Arora, John Grundy:

Unlocking Adaptive User Experience with Generative AI. 760-768 - Otto Parra, Edisson Reinozo, María Fernanda Granda

:
Exploring Perspectives of Students on Using Mobile Apps to Improve English Vocabulary Through Youtube Videos: A Comparative Study. 769-776 - Akrivi Krouska, Christos Troussas, Phivos Mylonas, Cleo Sgouropoulou:

Analysing the Effectiveness of a Social Digital Repository for Learning and Teaching: A Fuzzy Comprehensive Evaluation. 777-783 - Sihem Ben Sassi:

IRatePL2C: Importance Rating-Based Approach for Product Lines Collaborative Configuration. 784-791

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














