default search action
15th ICSOFT 2020: Paris, France
- Marten van Sinderen, Hans-Georg Fill, Leszek A. Maciaszek:
Proceedings of the 15th International Conference on Software Technologies, ICSOFT 2020, Lieusaint, Paris, France, July 7-9, 2020. ScitePress 2020, ISBN 978-989-758-443-5
Invited Speakers
- Dominik Slezak:
Introducing AI/ML Components into Software Systems. ICSOFT 2020: 5 - Wil M. P. van der Aalst:
Process Mining as the Superglue between Data and Process Management. ICSOFT 2020: 7-8 - Frank Buschmann:
Software Architects are Dead! Long Live Software Architects! ICSOFT 2020: 9
Software Engineering and Systems Development
- Steffen Beringer, Heike Wehrheim:
Consistency Analysis of AUTOSAR Timing Requirements. 15-26 - Yuqing Wang, Mika V. Mäntylä, Serge Demeyer, Kristian Wiklund, Sigrid Eldh, Tatu Kairi:
Software Test Automation Maturity: A Survey of the State of the Practice. 27-38 - MohammadSadegh Mohagheghi, Khayyam Salehi:
Accelerating Interval Iteration for Expected Rewards in Markov Decision Processes. 39-50 - Duyen Phuc Nguyen, Stephane Maag:
Codeless Web Testing using Selenium and Machine Learning. 51-60 - Thomas Karanikiotis, Michail D. Papamichail, Ioannis Gonidelis, Dimitra Karatza, Andreas L. Symeonidis:
A Data-driven Methodology towards Interpreting Readability against Software Properties. 61-72 - Mert Ozkaya, Irem Fidandan:
MVCLang: A Software Modeling Language for the Model-View-Controller Design Pattern. 75-83 - Ciprian Khlud, Cristian Frasinaru:
A Case Study on Performance Optimization Techniques in Java Programming. 84-91 - Wasim Alsaqaf, Maya Daneva, Roel J. Wieringa:
Analysing Large-Scale Scrum Practices with Respect to Quality Requirements Challenges. 92-103 - Andreas Grosche, Burkhard Igel, Olaf Spinczyk:
Transformation- and Pattern-based State Machine Mining from Embedded C Code. 104-115 - Soumoud Fkaier, Mohamed Khalgui, Georg Frey:
Hybrid Context-awareness Modelling and Reasoning Approach for Microgrid's Intelligent Control. 116-127 - Ulrike Witteck, Denis Grießbach, Paula Herber:
A Genetic Algorithm for Automated Test Generation for Satellite On-board Image Processing Applications. 128-135 - Jérôme Dantan, Hajer Baazaoui Zghal, Yann Pollet:
Decifarm: A Fuzzy Decision-support Environment for Smart Farming. 136-143 - Nesrine Ben Salah, Inés Bayoudh Saâdi, Henda Ben Ghézala:
Towards Ubiquitous Learning Situations for Disabled Learners. 144-151 - Luis F. de Lima, Letícia M. Peres, André Ricardo Abed Grégio, Fabiano Silva:
A Systematic Literature Mapping of Artificial Intelligence Planning in Software Testing. 152-159 - Monika Maidl, Gerhard Münz, Stefan Seltzsam, Marvin Wagner, Roman Wirtz, Maritta Heisel:
Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions. 160-171 - Inès Mouakher, Fatma Dhaou, J. Christian Attiogbé:
Toward a Correct Implementation of LwM2M Client with Event-B. 172-179 - Muneeba Jilani, Naveed Ikram:
Investigating the Gap between Scrum Theory and Practice in Pakistan. 180-186 - Preethu Rose Anish, Maya Daneva, Smita Ghaisas, Roel J. Wieringa:
An Approach That Stimulates Architectural Thinking during Requirements Elicitation: An Empirical Evaluation. 187-195 - Dragos Dobrean, Laura Diosan:
Detecting Model View Controller Architectural Layers using Clustering in Mobile Codebases. 196-203 - Yuya Inagaki, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa:
Visualization Method of Important Regions by Combination of Webpage Structures and Saliency Maps. 204-211 - Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Kateryna Romanyuk:
Investigating on the Relationships between Design Smells Removals and Refactorings. 212-219 - Mohamed Naija, Rihab Khemiri, Ernesto Exposito:
Failsafe Mechanism to Hazard Analysis and Risk Mitigation in Unmanned Aerial Vehicle based on NCES. 220-227 - Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. 228-233 - Angshuman Jana:
Data-centric Refinement of Database-Database Dependency Analysis of Database Program. 234-241 - Vijay Rajasekar, Shiv Sondhi, Sherif Saad, Shady Mohammed:
Emerging Design Patterns for Blockchain Applications. 242-249 - Sohaib Soualah, Yousra Hafidi, Mohamed Khalgui, Allaoua Chaoui, Laïd Kahloul:
Formalization and Verification of Reconfigurable Discrete-event System using Model Driven Engineering and Isabelle/HOL. 250-259 - Marina Cernat, Adelina-Nicoleta Staicu, Alin Stefanescu:
Improving UI Test Automation using Robotic Process Automation. 260-267
Software Systems and Applications
- Arpita Dutta, Rajib Mall:
A Function Dependency based Approach for Fault Localization with D. 273-283 - Rihab Khemiri, Ernesto Exposito:
Fuzzy Multi-objective Optimization for Ride-sharing Autonomous Mobility-on-Demand Systems. 284-294 - Marwa Ben M'Barek, Amel Borgi, Sana Ben Hamida, Marta Rukoz:
Generic GA-PPI-Net: Generic Evolutionary Algorithm to Detect Semantic and Topological Biological Communities. 295-306 - Jamila Sassi, Inès Alaya, Moncef Tagina:
Bee-route: A Bee Algorithm for the Multi-objective Vehicle Routing Problem. 307-318 - Mouna Bouzid, Inès Alaya, Moncef Tagina:
A Bee Colony Optimization Algorithm for the Long-Term Car Pooling Problem. 319-327 - Daniel Brahneborg, Wasif Afzal, Adnan Causevic, Mats Björkman:
Superlinear and Bandwidth Friendly Geo-replication for Store-and-forward Systems. 328-338 - Chams Eddine Choucha, Mohamed Oussama Ben Salem, Mohamed Khalgui, Laïd Kahloul, Naïma Souâd Ougouti:
On the Improvement of R-TNCESs Verification using Distributed Cloud-based Architecture. 339-349 - Sébastien Salva, Elliott Blot:
Verifying the Application of Security Measures in IoT Software Systems with Model Learning. 350-360 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah:
An in-Depth Requirements Change Evaluation Process using Functional and Structural Size Measures in the Context of Agile Software Development. 361-375 - Besmir Sejdiu, Florije Ismaili, Lule Ahmedi:
A Real-time Integration of Semantics into Heterogeneous Sensor Stream Data with Context in the Internet of Things. 376-383 - Pasquale Ardimento, Lerina Aversano, Mario Luca Bernardi, Marta Cimitile:
Temporal Convolutional Networks for Just-in-Time Software Defect Prediction. 384-393 - Hanene Rouainia, Hanen Grichi, Laïd Kahloul, Mohamed Khalgui:
3D Mobility, Resizing and Mobile Sink Nodes in Reconfigurable Wireless Sensor Networks based on Multi-agent Architecture under Energy Harvesting Constraints. 394-406 - Iffat Fatima, Hina Anwar, Dietmar Pfahl, Usman Qamar:
Tool Support for Green Android Development: A Systematic Mapping Study. 409-417 - Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Towards Secure Data Sharing Processes in Online Social Networks: Trusty. 418-425 - Eliana Fernandes, Ana Carolina Salgado, Jorge Bernardino:
Big Data Streaming Platforms to Support Real-time Analytics. 426-433 - Hamsini Ketheswarasarma Rajaram, John Loane, Silvana Togneri MacMahon, Fergal McCaffery:
A Retrospective Study of Taxonomy based Testing using Empirical Data from a Medical Device Software Company. 434-442 - Ceara Treacy, John Loane, Fergal McCaffery:
Developer Driven Framework for Security and Privacy in the IoMT. 443-451 - Aicha Goubaa, Mohamed Khalgui, Georg Frey, Zhiwu Li:
New Approach for Deadline Calculation of Periodic, Sporadic and Aperiodic Real-time Software Tasks. 452-460 - Sana Ben Hamida, R. Gorsane, K. Gorsan Mestiri:
Towards a Better Understanding of Genetic Operators for Ordering Optimization: Application to the Capacitated Vehicle Routing Problem. 461-469 - Jung-Hoon Kim, Young-Sik Lee:
Exploiting Exclusive Higher Resolution to Enhance Response Time of Embedded Flash Storage. 470-477 - Bolatzhan Kumalakov, Yassynzhan Shakan:
Blockchain Project Initiation and Execution: Decision-making Practices and Perceptions. 478-483 - Radia Bendimerad, Kamel Smiri, Abderrazek Jemai:
Fault Detection and Co-design Recovery for Complex Task within IoT Systems. 484-491 - Andrea Delgado, Adriana Marotta, Laura González, Libertad Tansini, Daniel Calegari:
Towards a Data Science Framework Integrating Process and Data Mining for Organizational Improvement. 492-500 - Estrela Ferreira Cruz, António Miguel Rosado da Cruz:
Using Blockchain to Implement Traceability on Fishery Value Chain. 501-508 - Gencer Erdogan, Åsmund Hugo, Antonio Álvarez Romero, Dario Varano, Niccolò Zazzeri, Anze Zitnik:
An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models. 509-520 - Maria Spichkova, Johan Van Zyl:
Application of Computer Vision Technologies for Automated Utility Meters Reading. 521-528 - Ciprian Paduraru, Bogdan Ghimis, Alin Stefanescu:
RiverConc: An Open-source Concolic Execution Engine for x86 Binaries. 529-536 - Christophe Ponsard, Robert Darimont:
Towards Quantitative Trade-off Analysis in Goal Models with Multiple Obstacles using Constraint Programming. 537-543 - Chams Eddine Choucha, Mohamed Ramdani, Mohamed Khalgui, Laïd Kahloul:
On Decomposing Formal Verification of CTL-based Properties on IaaS Cloud Environment. 544-551 - Teodor Fredriksson, Jan Bosch, Helena Holmström Olsson:
Machine Learning Models for Automatic Labeling: A Systematic Literature Review. 552-561
Foundational and Trigger Technologies
- Hela Jebali, Noël Richard, Mohamed Naouai:
Local Rotation Pattern: A Local Descriptor of Color Textures. 567-573 - Imene Guerfi, Lobna Kriaa, Leïla Azouz Saïdane:
An Efficient GPGPU based Implementation of Face Detection Algorithm using Skin Color Pre-treatment. 574-585 - Patrick Kubiak, Stefan Rass, Martin Pinzger:
IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files. 589-596 - Stefano Quer:
A Parallel Many-core CUDA-based Graph Labeling Computation. 597-605 - Ahmed Lekssays, Bouchaib Falah, Sameer Abufardeh:
A Novel Approach for Android Malware Detection and Classification using Convolutional Neural Networks. 606-614 - Khadija Bousselmi, Sana Ben Hamida, Marta Rukoz:
Bi-Objective CSO for Big Data Scientific Workflows Scheduling in the Cloud: Case of LIGO Workflow. 615-624 - Emiel Caron:
An Optimization Method for Entity Resolution in Databases: With a Case Study on the Cleaning of Scientific References in Patent Databases. 625-632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.