


default search action
20th ENASE 2025: Porto, Portugal
- Mike Mannion, Tomi Männistö, Leszek A. Maciaszek:
Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2025, Porto, Portugal, April 4-6, 2025. SCITEPRESS 2025, ISBN 978-989-758-742-9
Invited Speakers
- Wim Vanhaverbeke:
Digital Technologies, Business Model Innovation & Innovation Ecosystem Management in Institutionalized Industries. ENASE 2025: 5 - Loic Bachelart:
Technological Adoption in the Era of Generative AI. ENASE 2025: 7 - Philipp Leitner:
A Brief Journey Through History: From Distributed Objects Over SOA to Microservices. ENASE 2025: 9
Papers
- Jesús Carreño-Bolufer, José Fabián Reyes Román, Sergio Pérez Andrés, Désirée Ramal Pons, Víctor Juárez Vidal, Adela Cañete Nieto, Óscar Pastor:
A Conceptual Model-Based Application for the Treatment and Management of Data in Pediatric Oncology: The Neuroblastoma Use Case. 15-26 - Tom Yaacov, Gera Weiss, Adiel Ashrov, Guy Katz, Jules Zisser:
Exploring and Evaluating Interplays of BPpy with Deep Reinforcement Learning and Formal Methods. 27-40 - Martin Corovcák, Pavel Koupil:
SQL vs NoSQL: Six Systems Compared. 41-53 - Víctor Pérez-Piqueras, Pablo Bermejo López, José A. Gámez:
Agile Effort Estimation Improved by Feature Selection and Model Explainability. 54-66 - Myo Thiha, Halil Yetgin, Luca Piras, Mohammed Ghazi Al-Obeidallah:
Enhancing Privacy, Censorship Resistance, and User Engagement in a Blockchain-Based Social Network. 67-79 - Yunji Zhang, Franck Ravat, Sébastien Laborie, Philippe Roose:
Multi-Perspective Analyses of Spatio-Temporal Data About Well-Being. 80-91 - Henok Birru, Antonio Cicchetti, Malvina Latifaj:
Supporting Automated Documentation Updates in Continuous Software Development with Large Language Models. 92-106 - Huynh Thanh Thien Pham, Frank Jiang, Lei Pan, Alessio Bonti, Mohamed Abdelrazek:
uBSaaS: A Unified Blockchain Service as a Service Framework for Streamlined Blockchain Services Integration. 107-119 - Abhinav Jamwal, Sandeep Kumar:
Towards an Approach for Project-Library Recommendation Based on Graph Normalization. 120-127 - Kinari Nishiura, Atsuya Matsutomo, Akito Monden:
Evaluating ChatGPT's Ability to Detect Naming Bugs in Java Methods. 128-136 - Olivia Rodríguez-Valdés, Domenico Amalfitano, Otto Sybrandi, Beatriz Marín, Tanja E. J. Vos:
The Scent of Test Effectiveness: Can Scriptless Testing Reveal Code Smells? 137-148 - Melissa Silva, João Pascoal Faria:
Automated Social Media Feedback Analysis for Software Requirements Elicitation: A Case Study in the Streaming Industry. 149-160 - Saurabh Chauhan, Zeeshan Rasheed, Malik Abdul Sami, Zheying Zhang, Jussi Rasku, Kai-Kristian Kemell, Pekka Abrahamsson:
LLM-Generated Microservice Implementations from RESTful API Definitions. 161-173 - Irena Holubová, Alzbeta Srutková, Jáchym Bártík:
Reshaping Reality: Creating Multi-Model Data and Queries from Real-World Inputs. 174-184 - Valtteri Ala-Salmi, Zeeshan Rasheed, Malik Abdul Sami, Zheying Zhang, Kai-Kristian Kemell, Jussi Rasku, Shahbaz Siddeeq, Mika Saari, Pekka Abrahamsson:
Autonomous Legacy Web Application Upgrades Using a Multi-Agent System. 185-196 - Jennifer Gross, Temesgen Hagos Mengesha, Sofia Ouhbi:
Software Sustainability Perceptions in the Industry: A Questionnaire Study. 197-207 - Hajer Ben Haj Ayech, Ricardo Martinho, Sonia Ayachi Ghannouchi:
S4BP: An Approach for Assessing Business Process Stability. 208-216 - Shaza Elbishbishy, Jeshwitha Jesus Raja, Philipp Kranz, Marian Daun:
Combining Goal and Process Models for the Specification of Human-Robot Collaborations. 217-228 - Divij D., Y. Raghu Reddy, Radha Krishna B., Sai Anirudh Karre:
VRSLOG: An Approach to Log Immersive Experiences in Virtual Reality Systems. 229-239 - Nabila Daly, Faten Khemakhem, Hela Ltifi:
Exploring Feature Extraction Techniques and SVM for Facial Recognition with Image Generation Using Diffusion Models. 240-251 - Adiel Ashrov, Arnon Sturm, Achiya Elyasaf, Guy Katz:
A Study on the Comprehensibility of Behavioral Programming Variants. 252-267 - Asli Sari, Ayse Tosun, Gülfem Isiklar Alptekin:
Identifying Testing Behaviour in Open Source Projects: A Case Analysis for Apache Spark. 268-279 - Vitalijs Teze, Erika Nazaruka, Dmitrijs Bliznuks:
Information-Theoretic Patient Record Matching in Medical Databases: A Discriminative Power and Feature Analysis Using MIMIC-IV. 280-291 - Tasmia Zerin, B. M. Mainul Hossain, Kazi Sakib:
A Heuristic Approach to Localize CSS Properties for Responsive Layout Failures. 292-303 - Zsuzsanna Onet-Marian, Diana-Lucia Hotea:
Cross-Version Defect Prediction: Does Excessive Train-Test Similarity Affect the Reliability of Evaluation? 304-315 - Charaf Eddine Dridi, Nabil Hameurlain, Faiza Belala:
Maude Strategies-Based SoSs Workflow Modeling. 316-327 - Virginia Niculescu, Maria-Camelia Chisalita-Cretu, Cristina-Claudia Osman, Adrian Sterca:
Model-Driven Development Using LLMs: The Case of ChatGPT. 328-339 - Hanen Dhrir, Maha Charfeddine, Habib M. Kammoun:
Advancing Network Anomaly Detection Using Deep Learning and Federated Learning in an Interconnected Environment. 343-350 - Ana Pintilie, Remco Poelarends, Andrea Capiluppi:
Optimising IIoT Control Systems at Demcon: Integrating MQTT, Sparkplug B, and ISA-88 for Unified Automation. 351-358 - Zakaria Maamar, Amel Benna, Hirad Baradaran Rezaei, Amin Beheshti, Fethi Rabhi:
Impact of Business Process Masking on Organizations' Policies. 359-366 - Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen:
Runtime Verification for Deep Learning Systems. 367-377 - Andrea Lezcano Airaldi, Emanuel Irrazábal, J. Andrés Díaz Pace:
Best Practices and Evaluation Methods for Narrative Information Visualizations: A Systematic Review. 378-389 - Sarah Augustin, Hendrik Winkelmann, Herbert Kuchen:
Mutation Operators for Mutation Testing of Angular Web Applications. 390-397 - Emilio Carrión, Pedro Valderas, Óscar Pastor:
Querying Digital Twin Models. 398-405 - Otuu Obinna Ogbonnia, Joseph Henry Anajemba, Deepak Sahoo:
Exploring the Willingness of Nigerian Community Policing Stakeholders to Adopt Technology Through Survey. 406-413 - Ahmed-Reda Rhazi, Oumayma Banouar, Fadel Touré, Said Raghay:
Recommender Systems Approaches for Software Defect Prediction: A Comparative Study. 414-424 - Laura Diana Cernau, Laura Diosan, Camelia Serban:
Challenges in Software Metrics Adoption: Insights from Cluj-Napoca's Development Community. 425-432 - Henrique Pucci Pinto, Júlia de Souza, Elaine Venson, Rejane Maria da Costa Figueiredo:
Exploring the Role of Service Design in Software Development: A Systematic Mapping. 433-440 - Rares Cristea, Ciprian Paduraru, Alin Stefanescu:
MODE: A Customizable Open-Source Testing Framework for IoT Systems and Methodologies. 441-448 - Takeharu Mitsuda, Hiroyuki Nakagawa, Haruhiko Kaiya, Hironori Takeuchi, Sinpei Ogata, Tatsuhiro Tsuchiya:
Exhaustive Model Identification on Process Mining. 449-456 - Maximilian Auch, Maximilian Balluff, Peter Mandl, Christian Wolff:
Is It Professional or Exploratory? Classifying Repositories Through README Analysis. 457-467 - Panagiotis Mantos, Fotis Kokkoras, George Kakarontzas:
Trends and Challenges in Machine Learning for Code Summarization and Comprehension: A Systematic Literature Review. 468-475 - Zouhaira Abdellaoui, Houda Meddeb:
Genetic Algorithm for Optimal Response Time Scheduling of Electric Vehicle Model. 476-483 - Francesco Refolli, Darius Sas, Francesca Arcelli Fontana:
Lessons Learned from Implementing a Language-Agnostic Dependency Graph Parser. 484-491 - Nícolas Hamparsomian, Marcos Lordello Chaim:
A Study on Different Spectra in Fault Localization. 492-499 - Tanjila Kanij, Shafia Husna, Afzal Azeem Chowdhary, Misita Anwar, Md Khalid Hossain, John Grundy:
An Innovative Approach to Represent Tacit Knowledge of Fishing with Knowledge Graphs. 500-507 - Raman Saxena:
Design Thinking and a Human-Centered Approach to Explore the Potential of Mobile Phone and AI-Enabled Just-in-Time Mental Health Solution for University Students in India. 508-519 - James Galbraith, Des Greer:
Detecting Duplicate Effort in GitHub Contributions. 520-529 - Esperança Amengual Alcover, Antoni Jaume-i-Capó, Miquel Miró-Nicolau, Gabriel Moyà-Alcover, Antonia Paniza Fullana:
Towards an Evaluation Framework for Explainable Artificial Intelligence Systems for Health and Well-Being. 530-540 - Afef Jmal Maâlej, Achraf Weli:
Automated Testing of Tezos Blockchain-Oriented Software. 541-548 - Aleksander Swiniarski, Anna Derezinska:
Automated Migration of Legacy Code from the C++14 to C++23 Standard. 549-556 - Sabbir M. Saleh, Nazim H. Madhavji, John Steinbacher:
Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments. 557-564 - Nan Messe, Avi Shaked:
AADT: Asset-Driven Attack-Defense Tree. 565-572 - Giorgos Shittas, Georgia M. Kapitsaki, Maria Papoutsoglou:
Licy: A Chatbot Assistant to Better Understand and Select Open Source Software Licenses. 573-581 - Georgia M. Kapitsaki, Luigi Lavazza, Sandro Morasca, Gabriele Rotoloni:
A Replicated Study on Factors Affecting Software Understandability. 582-591 - Mithilesh Pandey, Sandeep Kumar:
VP-IAFSP: Vulnerability Prediction Using Information Augmented Few-Shot Prompting with Open Source LLMs. 592-599 - Oltean Anisia Veronica, Ioan-Daniel Pop, Adriana Mihaela Coroiu:
Medical Chatbot for Disease Prediction Using Machine Learning and Symptom Analysis. 600-607 - Michal Töpfer, Tomás Bures, Frantisek Plásil, Petr Hnetynka:
Interpreting Workflow Architectures by LLMs. 608-617 - Alexandre Bazin, Alain Gutierrez, Marianne Huchard, Pierre Martin, Yulin Zhang:
Variability-Driven User-Story Generation Using LLM and Triadic Concept Analysis. 618-625 - Doriana Cobârzan, Richard Bubel, Torsten Ullrich:
The Impact of the European Product Liability Directive on Software Engineering. 626-634 - Abhinav Jamwal, Sandeep Kumar:
Third-Party Library Recommendations Through Robust Similarity Measures. 635-642 - Yassine Talas, Hajer Rabii:
Sustainable Software Development: An ADKAR-Based Framework for Project Managers and Teams. 643-651 - Taif Ammash, Hamza Gharsellaoui, Leila Ben Ayed:
LICA-HE: Optimal Lossless Image Compression Algorithm for Color Passport-Photo Compression. ENASE 2025: 652-659 - Ciprian Paduraru, Catalina Camelia Patilea, Alin Stefanescu:
CyberGuardian 2: Integrating LLMs and Agentic AI Assistants for Securing Distributed Networks. 660-667 - Faten Abbassi, Yousra Bendaly Hlaoui, Faouzi Ben Charrada:
Machine Learning for Ontology Alignment. 668-675 - Priyanka H., Ankitha A. C., Pratyusha Satish Rao, Urja Modi, Chandu Naik:
Anomaly Detection in Surveillance Videos. 676-683 - Mahbuba Shefa, Tasnuva Ferdous, Afzal Azeem Chowdhary, Md. Jannatul Rakib Joy, Tanjila Kanij, Md. Al Mamun:
A Progressive Step Towards Automated Fact-Checking by Detecting Context in Diverse Languages: A Prototype for Bangla Facebook Posts. 684-691 - Anika Tabassum Era, Tanjila Kanij, John Grundy, Md. Al Mamun:
A User-Centered Design Approach to Develop a Privacy Awareness Application. 692-699 - Koshi You, Hiroaki Fukuda, Paul Leger:
The Impact of Context-Oriented Programming on Declarative UI Design in React. 700-707 - Morteza Ahmadianmanzary, Sofia Ouhbi:
Exploring the Influence of User Interface on User Trust in Generative AI. 708-714 - Shambhavi Jahagirdar, Sai Anirudh Karre, Y. Raghu Reddy:
VReqDV: Model Based Design Generation & Design Versioning Tool for Virtual Reality Product Development. 715-722 - Joana Pedrosa, Luís Gonzaga Magalhães, Ricardo Martinho:
Integrating Process Mining and Success Factors in Information Systems Projects: A Decision Support System Approach. 723-730 - Bogdan Ichim, Andrei-Cristian Nastase:
On Improving the Efficiency of AI-Generated Text Detection. 731-738 - Ali Mohammed Abed, Houcemeddine Hermassi, Walid Barhoumi:
A Near-Optimal Steganography-Based Solution for Embedding Data in Video Cover Medium. ENASE 2025: 739-745 - Maria Spichkova, Hina Lee, Kevin Iwan, Madeleine Zwart, Yuwon Yoon, Xiaohan Qin:
Agile Retrospectives: What Went Well? What Didn't Go Well? What Should We Do? 746-753 - Zaki Pauzi, Andrea Capiluppi:
A Multivocal Mapping Study on Artifact Traceability Complexities in Practice. 754-761 - Michalis Pingos, Spyros Loizou, Andreas S. Andreou:
Integrating Data Lakes with Self-Adaptive Serious Games. 762-772 - Oksana Nikiforova, Kristaps Babris, Megija Krista Milune, Navyasri Tanguturi, Óscar Pastor:
Key Artefacts in the Initial Phases of IT Project Management: Systematic Mapping Study. 773-781 - Bhavishya Swami, Jeshwitha Jesus Raja, Meenakshi Manjunath, Amruta Rout, Marian Daun:
Towards a Cultural Perspective on Human-Robot Interaction. 782-789 - Ioana Georgiana Ciuciu, Manuela Andreea Petrescu:
Students' Perception of Big Data Engineering in Higher Education Curricula: Expectations, Interest and Ethical Implications. 790-797 - Jefferson Seide Molléri, Bogdan Marculescu:
Data-Driven Personas for Software Engineering Research. 798-805 - Niels Doorn, Tanja E. J. Vos, Beatriz Marín:
Design of a Serious Game on Exploratory Software Testing to Improve Student Engagement. 806-813 - Pratham Maan, Lov Kumar, Vikram Singh, Lalita Bhanu Murthy Neti, Aneesh Krishna:
An Empirical Framework for Automatic Identification of Video Game Development Problems Using Multilayer Perceptron. 814-821 - Elias Seid, Oliver Popov, Fredrik Blix:
Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches. 822-834 - Andrada-Mihaela-Nicoleta Moldovan, Andreea Vescan, Crina Grosan:
Healthcare Bias in AI: A Systematic Literature Review. 835-842 - Andrei Varan, Adriana Mihaela Coroiu, Liviu-Mihai Iacob:
Analyzing Deforestation Dynamics in Romania Using Random Forest Algorithm and Google Earth Engine. 843-847 - Andreas Speck, Melanie Windrich, Jan Hesse, Melina Sentz, David Kuhlen, Thomas Stuht, Elke Pulvermüller:
Generating Formal Process Models and Decisions from Examination Rules in Natural Text with ChatGPT. 848-857 - Tasneem Annahdi, Duaa Alkubaisy, Luca Piras:
A Risk Assessment of Information Security in a Diet Centre Business: A Case Study. 858-867

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.