


default search action
21st SERA 2023: Orlando, FL, USA
- 21st IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2023, Orlando, FL, USA, May 23-25, 2023. IEEE 2023, ISBN 979-8-3503-4588-9

- Fei Zuo, Junghwan Rhee, Myung-Ah Park, Gang Qian:

PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses. 2-7 - Suhan Jiang, Jie Wu, Fei Zuo, Alessandro Mei

:
Balance-aware Cost-efficient Routing in the Payment Channel Network. 8-15 - Jonathan Elkobi, Bernd Gruner

, Tim Sonnekalb, Clemens-Alexander Brust
:
TIPICAL - Type Inference for Python In Critical Accuracy Level. 16-21 - Yoonsik Cheon, Ricardo Lozano, Rajasoundarya Senthil Prabhu:

A Library-Based Approach for Writing Design Assertions. 22-27 - Kubra Gundogan

, Nuri Alperen Kose, Khushi Gupta, Damilola Oladimeji, Fan Liang:
A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency Communications. 28-34 - Sungwon Moon, Yujin Lim:

Split and Federated Learning with Mobility in Vehicular Edge Computing. 35-38 - Bishal Lakha, Kalyan Bhetwal, Nasir U. Eisty:

Analysis of Software Engineering Practices in General Software and Machine Learning Startups. 39-46 - Patrick Chadbourne, Nasir U. Eisty:

Applications of Causality and Causal Inference in Software Engineering. 47-52 - Alain Kabo Mbiada, Bassey Isong

, Francis Lugayizi, Adnan M. Abu-Mahfouz:
Towards Integrated Framework for Efficient Educational Software Development. 53-60 - Prashanta Saha, Clemente Izurieta, Upulee Kanewala

:
A Test Suite Minimization Technique for Testing Numerical Programs. 61-68 - Young Lee, Arlen P. McDonald, Jeong Yang

:
Identifying Code Tampering Using A Bytecode Comparison Analysis Tool. 69-76 - Md. Fazle Rabbi

, Arifa I. Champa, Minhaz F. Zibran:
Phishy? Detecting Phishing Emails Using ML and NLP. 77-83 - Wahiba Ben Abdessalem Karaa, Dridi Kawther:

Classification of Multilingual Medical Documents using Deep Learning. 84-89 - Anes Abdennebi, Alp Tuncay, Cemal Yilmaz, Anil Koyuncu, Oktay Gungor:

LSTM-AE for Anomaly Detection on Multivariate Telemetry Data. 90-97 - Achhiya Sultana, Mahmudul Islam

, Mahady Hasan
, Farruk Ahmed:
Fake News Detection Using Machine Learning Techniques. 98-103 - Mohammed Adib Khan, Naser Ezzati-Jivan:

Multi-level Adaptive Execution Tracing for Efficient Performance Analysis. 104-109 - Dheeraj N. Naraharisetti, Ramesh K. Karne, Joel Weymouth, Alexander L. Wijesinha:

Obsolescence in Operating Systems and Microprocessors. 110-115 - Samuel Sungmin Cho, Myoungkyu Song:

Programming Model for Information Sharing among IoT Devices: Software Engineering Perspective. 116-121 - Hengshuo Liang, Cheng Qian

, Chao Lu, Lauren Burgess, John Mulo, Wei Yu
:
Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems. 122-127 - Raad Haddad

, Dhiah el Diehn I. Abou-Tair
, Alá F. Khalifeh:
A Blockchain-Based Verification Process for Smart Cities. 128-131 - Adamu Hussaini

, Cheng Qian
, Yifan Guo, Chao Lu, Wei Yu
:
Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis. 132-137 - John Mulo, Pu Tian

, Adamu Hussaini
, Hengshuo Liang, Wei Yu:
Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems. 138-143 - Daniel Ukene, Hayden Wimmer, Jongyeop Kim:

Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege. 144-152 - Krishna Chaitanya Gadepally, Sambandh Bhusan Dhal, Stavros Kalafatis, Kevin J. Nowka

:
Realistic Predictors for Regression and Semantic Segmentation. 153-155 - Ioannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, Steven Drager:

An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case Study. 156-161 - Anna Sheila Crisostomo

, Riah Encarnacion
, Shakir Al Balushi:
A Data Mining Approach to Construct Classification Model for Predicting Tourism Graduates Employability. 162-168 - Yuya Yokoyama:

Consideration of Semantics between Q&A Statements to Obtain Factor Score. 169-175 - Jeffrey Fairbanks, Akshharaa Tharigonda, Nasir U. Eisty:

Analyzing the Effects of CI/CD on Open Source Repositories in GitHub and GitLab. 176-181 - Jason Duran, Mostofa Najmus Sakib, Nasir U. Eisty, Francesca Spezzano:

Evaluating Code Metrics in GitHub Repositories Related to Fake News and Misinformation. 182-188 - Zhicheng Xu, Weinan Gao, Zhicun Chen, Rami J. Haddad

, Scot Hudson, Ezebuugo Nwaonumah, Frank Zahiri, Jeremy Johnson:
Data-Driven Smart Manufacturing Technologies for Prop Shop Systems. 189-194 - Xin Zhang, Yuqi Song, Fei Zuo, Zheqing Zhou, Xiaofeng Wang:

Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels. 195-200 - Jongyeop Kim, Jinki Kim

, Matthew Sands, Seongsoo Kim:
Deep Learning Model to Improve the Stability of Damage Identification via Output-only Signal. 201-209 - Ian Trawinski, Hayden Wimmer, Jongyeop Kim:

Anomaly Detection in Intrusion Detection System using Amazon SageMaker. 210-217 - Seongsoo Kim, Lei Chen, Jongyeop Kim, Yiming Ji, Rami J. Haddad

:
A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15. 218-228 - Xianshan Qu, Nathan Huynh, Robert L. Mullen, John R. Rose:

Nighttime Vehicle Classification based on Thermal Images. 229-234 - Zhengxinchao Xiao, Lei Xiao:

A Systematic Literature Review on Test Case Prioritization and Regression Test Selection. 235-242 - Marwa Chnib, Wafa Gabsi:

Detection of anomalies in the HDFS dataset. 243-250 - Jim Alves-Foss, Aditi Pokharel, Ronisha Shigdel, Jia Song:

Calibrating Cybersecurity Experiments: Evaluating Coverage Analysis for Fuzzing Benchmarks. 251-257 - Rupam Kumar Dey, Anahita Khojandi, Kalyan Perumalla:

Determining the Most Significant Metadata Features to Indicate Defective Software Commits. 258-265 - Md Athikul Islam, Rizbanul Hasan, Nasir U. Eisty:

Documentation Practices in Agile Software Development: A Systematic Literature Review. 266-273 - Jangwu Jo, Junhyun Park, Ayoung Jang, Youngsu Cho, Byeongdo Kang:

Another Software for Designing Electric Transformers. 274-275 - Hamdan Ziyad Alabsi

, Majed Almotairi
, Yahya Alqahtani, Mohammed Abdulkareem Alyami:
Enhancing Students' Job Seeking Process Through A Digital Badging System. 276-281 - Young Pil Geum:

3 B (Block Byte Bit) Cipher Algorithm for Secure Socket Layer. 282-286 - Arifa I. Champa, Md. Fazle Rabbi, Farjana Z. Eishita, Minhaz F. Zibran:

Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone Sensors. 287-294 - Sanjaikanth E. Vadakkethil Somanathan Pillai

, Wen-Chen Hu:
Misinformation Detection Using an Ensemble Method with Emphasis on Sentiment and Emotional Analyses. 295-300 - Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden:

Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations. 301-306 - Nicia Guillén Yparrea, Felipe Hernández-Rodríguez

:
Reinforcement of Collaborative Work in the Metaverse Through Playful Activities. 307-312 - Hyesoo Shin, Eunjo Jang, Sojeong Kim, Ki Yong Lee:

SDCG: Silhouette-based Deep Clustering with GNN for Improved Graph Node Clustering. 313-318 - Hyewon Ryu, Sara Yu, Ki Yong Lee:

TI-former: A Time-Interval Prediction Transformer for Timestamped Sequences. 319-325 - Jieun Kang, SuBi Kim, Yongik Yoon:

The Strategy of Digital Twin Convergence Service based on Metavers. 326-330 - Erdan Wang, Pouria Tayebi, Yeong-Tae Song:

Cloud-based Digital Twins Storage in Emergency Healthcare. 331-335 - Turhan Kimbrough, Pu Tian

, Weixian Liao, Wei Yu
:
Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images. 335-340 - Jonathan Li, Steven Pugh, Honghe Zhou, Lin Deng

, Josh Dehlinger
, Suranjan Chakraborty
:
Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models. 341-344 - Fei Zuo, Xin Zhang, Yuqi Song, Junghwan Rhee, Jicheng Fu:

Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer. 345-351 - Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:

ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset. 352-357 - Deepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song:

A Statistical Method for API Usage Learning and API Misuse Violation Finding. 358-365 - Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan

, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu:
Orchestrating Apache NiFi/MiNiFi within a Spatial Data Pipeline. 366-371 - Partha Ghosh

, Takaaki Goto
, Leena Jana Ghosh, Soumya Sen
:
Scientific Organization of Blood Donation Camp Through Lexicographic Optimization and Taxicab Path Computation. 372-376 - Haotian Yan, Takaaki Goto

, Tadaaki Kirishima, Kensei Tsuchida:
Improve Accuracy of PC Skill Assessment Using PC Operation Log Data. 377-382 - Saikat Raj

, Santanu Roy, Surajit Jana, Soumyadip Roy, Takaaki Goto
, Soumya Sen
:
Customer Segmentation Using Credit Card Data Analysis. 383-388 - Zhang Xiao, Takaaki Goto

, Partha Ghosh, Tadaaki Kirishima, Kensei Tsuchida:
Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine Learning. 389-394 - Yi Wang, Takaaki Goto

, Tadaaki Kirishima, Kensei Tsuchida:
Novel Music Genre Classification System Using Transfer Learning on a Small Dataset. 395-401 - Sharad Sharma:

Mobile Augmented Reality System for Emergency Response. 402-406 - Jinbao Song, Jiahui Cai, Ran Li, Yanan Li:

Design and Implementation of Scientific Research Achievement Transformation System. 407-412 - Xinqun Luo, Xingyu Tan:

Research and Application of Content-based Image Hash Retrieval Algorithm. 413-416 - Qianzhong Chen, Xianghao Meng, Feng Lin, Dongsheng Shi, Yiying Lin, Dongmei Li, Hao Gu, Xiaoping Zhang:

Construction and Application of Knowledge Graph for Food Therapy. 417-422 - Dongsheng Shi, Feng Lin, Yuxun Li, Qianzhong Chen, Yiying Lin, Wentao Zhu, Dongmei Li, Xiaoping Zhang:

Rule-Based Representation Learning for Traditional Chinese Medicine Knowledge Graph. 423-427 - Sajid Ali Khan, Mohammed Bin Abdulrahman Alawairdhi, Mousa T. Al-Akhras:

Texture and Orientation-based Feature Extraction for Robust Facial Expression Recognition. 428-433 - Ken Nishimatsu, Akiya Inoue:

Mobile User Analysis Considering Collaboration with Financial Services. 434-439 - Shigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai:

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model. 440-445 - Yohei Hara, Hiroyuki Ono:

Study on Emissions of Environmental Impact in Chemical Industry. 446-451 - Bethsy Guerrero, María Valle, Mauricio Restrepo, Jairo Alberto Cardona, César Viloria-Núñez

, Christian G. Quintero M.
:
Multi-Objective Particle Swarm Optimization Approach for Population Classification in Emergency Management. 452-459 - Masumi Kawakami, Fuyuki Ishikawa:

Domain-specific Modeling Environment Construction Tool based on View Patterns: RapidDSM. 460-468 - Shirin Hasavari, Yeong-Tae Song, Benjamin Lawner

:
Increase Patients' Survivability During Emergency Care Using Blockchain-Based Digital Twin Technology. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














