


default search action
22nd SERA 2024: Honolulu, HI, USA
- Teruhisa Hochin, Jixin Ma, Osamu Mizuno:

22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024, Honolulu, HI, USA, May 30 - June 1, 2024. IEEE 2024, ISBN 979-8-3503-9134-3 - Hyun Yoe:

ICT-based Digital Agriculture. 1 - Fatima Ezzahra Chaabi, Reem Alfayez

:
What is Asked About Ionic on Stack Overflow (SO) ? An Empirical Study. 2-7 - John Scebold, Eric Bond, Emily Gray, Jared Ziegler:

Automated Theory Substitution Toward Proof-Driven Software Development. 8-16 - Xianshan Qu, Fei Zuo, Xiaopeng Li, Junghwan Rhee:

Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing Performance. 17-23 - Ryutaro Inoue, Yoshiki Higo:

Improving Accuracy of LLM-based Code Clone Detection U sing Functionally Equivalent Methods. 24-27 - Chihiro Yoshida, Makoto Matsushita, Yoshiki Higo:

Estimating the Difficulty of Programming Problems Using Fine-tuned LLM. 28-34 - Hoyong Lee, Hayeon Park, Chang-Gun Lee:

Adaptive Frequency Cluster-Level Performance Profiler for Multi-Domain Applications. 35-42 - Wataru Otoda, Tetsuya Kanda, Yuki Manabe, Katsuro Inoue, Yoshiki Higo:

SBOM Challenges for Developers: From Analysis of Stack Overflow Questions. 43-46 - Jennifer Kim Jin, Khalil Dajani, Mira Kim, Soo Dong Kim, Bilal Khan, Daniel Hyun Jin:

Reinforcement Learning Architecture for Facial Skin Treatment Recommender. 47-54 - SeongGyeol Park, Ahtae Kim, Sookyung Lee, Haeun Lee, Chayapol Kamyod

, Cheong Ghil Kim:
Design of REST API Client for Conversational Agent using Large Language Model with Open API System. 55-58 - Suhan Jiang, Jie Wu, Fei Zuo:

Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy. 59-65 - Jongho Seol, Abhilash Kancharla

, Jongyeop Kim:
Enhancing Reliability in Hybrid Cross-Chain Models: Adaptive Thresholds for Performance and Adaptability. 66-72 - Jongho Seol, Jongyeop Kim, Abhilash Kancharla

:
Optimizing Cross-Chain DeFi and Smart Contracts in Stochastic Integration. 73-80 - Md. Jobair Hossain Faruk, Masrura Tasnim, Jerry Q. Cheng:

Project-based Learning in Software Engineering Education: Integrating Blockchain-Oriented Repositories in SE Curriculum and Coursework. 81-87 - Xin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang, Fei Zuo:

Revising the Problem of Partial Labels from the Perspective of CNNs' Robustness. 88-93 - Yuqi Song, Xin Zhang, Bokai Yang, Fei Zuo, Xianshan Qu:

A Robust Attention-based Convolutional Neural Network for Monocular Depth Estimation. 94-99 - Saurabh Shinde:

Leveraging Conditional Generative Adversarial Networks for cosmic microwave background separation. 100-106 - Hikaru Kubo, Yoshiki Higo, Shinji Kusumoto:

Revisiting Program Suitability for Fault Localization with Large Dataset and Various Mutation Operators. 107-114 - Nozomi Aoki, Masafumi Yamazaki, Akira Hirai, Mari Yamaoka, Naoto Fukumoto, Akihiko Kasagi, Masato Oguchi:

Performance Analysis of Quantum Computer Simulators Across Different Environments. 115-120 - Seung Jae Kim, Hyun Yoe, Kyeong Il Ko, Meong Hun Lee:

Design of AI-Based Smart Crop Harvesting System. 121-124 - Sangmin Lim, Meong Hun Lee, Hyeon O Choe, Hyun Yoe:

A Study on ARIMA-Based Melon Size Prediction and Monitoring System Design. 125-128 - Tasnim Akter Onisha, Jongyeop Kim, Jongho Seol:

Multi Label Sound Classification using Deep Learning Models. 129-134 - Hong Cheng

, Rupesh Konduru:
Multi-Class Label Detection and Bounding Box Regression Using Transformer with a Customized Loss Function. 135-138 - Cemil Emre Yavas

, Jongyeop Kim, Lei Chen:
Exploring Flavors Through AI: The Future of Culinary Taste Prediction. 139-147 - Xiujuan Wang, Xiaotong Wu, Haochen Shi, Shuaibing Lu:

Hybrid ASCII Art Extraction Algorithm Based on String Distance. 148-152 - Shariful Alam, Jidong Xiao, Nasir U. Eisty:

Exploiting CPU Clock Modulation for Covert Communication Channel. 153-158 - Shahrzad Sayyafzadeh, Mark H. Weatherspoon, Jie Yan, Hongmei Chi

:
Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment Analysis. 159-165 - Sharif Ahmed, Rey Ortiz, Nasir U. Eisty:

Decade-long Utilization Patterns of ICSE Technical Papers and Associated Artifacts. 166-173 - Chijung Jung, Yung Ryn Choe, Junghwan Rhee, Yonghwi Kwon:

Automatic Configurator to Prevent Attacks for Azure Cloud System. 174-181 - Nour Neifar

, Achraf Ben-Hamadou, Afef Mdhaffar, Mohamed Jmaiel:
DiffECG: A Versatile Probabilistic Diffusion Model for ECG Signals Synthesis. 182-188 - Rui Alves

, José Rufino
:
Leveraging Shared Accelerators in Kubernetes Clusters with rOpenCL. 189-192 - Takuya Nakata

, Sinan Chen
, Sachio Saiki
, Masahide Nakamura
:
A Study of Efficient Needs-Based Service Development Using Software Upcycling. 193-198 - Hikaru Tomita, Mariko Sasakura, Kinari Nishiura, Hiroki Inayoshi, Akito Monden:

Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing System. 199-205 - Toru Nakamichi, Kinari Nishiura, Mariko Sasakura, Akito Monden:

An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library Systems. 206-211 - Masaki Kaneda, Sinan Chen, Masahide Nakamura, Sachio Saiki:

Long-Term Fine-grained Forecasts of Emergency Demand Using EMS Big Data and Regional Mesh Population Estimates. 212-217 - Takeshi Yoshida, Sinan Chen, Masahide Nakamura, Sachio Saiki:

Implementing of a Remote Task Execution Service for Automated Management of Hybrid Meeting Spaces. 218-223 - Hiro Okamoto, Sinan Chen, Masahide Nakamura, Sachio Saiki:

Proposal for a Memory Impairment Support Service Integrating Voice Dialogue Agents and ChatGPT*. 224-229 - Raiki Saito, Sinan Chen, Sachio Saiki, Masahide Nakamura:

Evaluating Recognition AI and Personal Memories Using Time-Series Images in Daily Activities. 230-236 - Ruksit Rojpaisarnkit, Hathaichanok Damrongsiri, Christoph Treude, Ali Ouni, Raula Gaikovina Kula:

Characterising Contributions that Coincide with Vulnerability Mitigation in NPM Libraries. 237-242 - Supatsara Wattanakriengkrai, Christoph Treude, Raula Gaikovina Kula:

Contributing Back to the Ecosystem: A User Survey of NPM Developers. 243-248 - Vittunyuta Maeprasart, Ali Ouni, Raula Gaikovina Kula:

Drop it All or Pick it Up? How Developers Responded to the Log4JShell Vulnerability. 249-254 - Anwesha Nag, Takaaki Goto

, Subhankar Roy
, Partha Ghosh
:
Need of Public-Private Healthcare Collaboration for Managing Seasonal Dengue Fever in West Bengal. 255-260 - Partha Ghosh

, Arnab Charit, Hindol Banerjee, Debanwesa Bandhu, Agniv Ghosh, Ankita Pal, Takaaki Goto
, Soumya Sen
:
A Machine Learning Based Automated Model for Managing Student Dropout. 261-266 - Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Sergiu M. Dascalu, Frederick C. Harris Jr.:

A Spatial Data Pipeline for Streaming Smart City Data. 267-272 - Chase D. Carthen, Araam Zaremehrjardi, Zachary Estreito, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu:

SpeciServe. a gRPC Infrastructure Concept. 273-276 - Hossein Jamali

, Sergiu M. Dascalu, Frederick C. Harris Jr.:
AI-Driven Analysis and Prediction of Energy Consumption in NYC's Municipal Buildings. 277-283 - Momoka Shiraishi, Haru Okazaki, Seiichi Serikawa, Yuhki Kitazono:

Proposal of Automatic Sirocco Fan Washing System. 284-289 - Yangyang Qian, Koki Hayakawa, Seiji Nishifuji, Shenglin Mu

, Shota Nakashima:
Segmentation Method of Boxed Lunch Images by Weight Optimization Using Color Texture Dissimilarity. 290-294 - Motoi Nakao, Yuhei Oomachi:

Observation and Evaluation for Individual Student Using Learning Analytics of Software Programing and Functional Questionnaire. 295-299 - Motoi Nakao, Yuhei Oomachi, Michiko Matsuda:

Extraction and Application of Introspection using Lego® Serious Play® Combined with Software Method. 300-303 - Yuya Yokoyama

:
Using 2-gram to Detect Potential Appropriate Respondents to Questions at Q&A Sites. 304-309 - Teruhisa Hochin:

Revised Transition Method in Impression Spaces for Multimedia Positive Computing. 310-314 - Teruhisa Hochin, Tran Thi Bich Lien:

Applying Impression Evaluation Method by Space to Multimedia Data Retrieval Using Impression Words. 316-321 - Teruhisa Hochin:

Clarifying Specification Semantics of Impression Evaluation Method by Space Based on Peaks. 322-327 - Daiki Yokoyama, Kinari Nishiura, Akito Monden:

Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPT. 328-333 - Juntong Hong, Eunjong Choi, Kinari Nishiura, Osamu Mizuno:

Global Alignment Learning for Code Search. 334-339 - Soshi Inoue, Kinari Nishiura, Eunjong Choi, Osamu Mizuno:

Analyzing the Inpact of Formal Methods on Isuue Trends Using BERTopic. 340-345 - Kaoru Yokogawa, Masashi Hiroishi, Sousuke Arnasaki, Hirohisa Aman, Tomoyuki Yokogawa:

A Comparative Study on COSMIC FP Approximation with Deep Learning and Conventional Machine Learning. 346-351 - Pattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:

A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models. 352-355 - Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:

An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names. 356-361 - Naruki Shirahama, Shinichi Kondo, Keiji Matsumoto, Kenji Moriya, Naofumi Nakaya, Kazuhiro Koshi, Satoshi Watanabe:

Quantitative Analysis of Conversational Response Nuances Using Visual Analog Scale, Data Visualization, and Clustering. 362-367 - Satoshi Watanabe, Naofumi Nakaya, Yuji Matsumoto, Naruki Shirahama:

A Study of the Distribution Between Visual Analog Scale and Likert Scale for Subjective Evaluation of "Like-Dislike". 368-372 - Naofumi Nakaya

, Mutsuki Koizumi, Satoshi Watanabe, Naruki Shirahama
, Takayuki Abe, Akihiro Watanabe:
A Study on the Generation of Spectrogram for the Detection of Venous Needle Dislodgement by Image Recognition Using Machine Learning. 373-376 - Takanori Matsuzaki, Shinjo Kato, Yoshihiro Asano, Yuga Sako, Kozo Horiuchi, Hiroshi Shiratsuchi:

Evaluation of Machine Tool Operating State Estimation using Channel State Information. 377-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














