default search action
29th SEKE 2017: Pittsburgh, PA, USA
- Xudong He:
The 29th International Conference on Software Engineering and Knowledge Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA, USA, July 5-7, 2017. KSI Research Inc. and Knowledge Systems Institute Graduate School 2017, ISBN 1-891706-41-1
Keynotes
- Gul Agha:
Actor-Oriented Programming for the Internet of Things. SEKE 2017: ix - Panos K. Chrysanthis:
User-centric Techniques for Big Data Exploration. SEKE 2017: x
Data Intensive Services based Application-I
- Lixu Shao, Yucong Duan, Xiaobing Sun, Honghao Gao, Donghai Zhu, Weikai Miao:
Answering Who/When, What, How, Why through Constructing Data Graph, Information Graph, Knowledge Graph and Wisdom Graph. 1-6 - Min Gao, Yuyu Yin, Ying Li, Xingfei Wang, Lipeng Guo, Zaidie Chen:
BPaaS: A Platform for Artifact-centric Business Process Customization in Cloud Computing. 7-11 - Guobin Zhang, Huahu Xu, Honghao Gao, Ankang Liu:
Applying Probability Model to The Genetic Algorithm Based Cloud Rendering Task Scheduling. 12-17
Software Architecture
- Alexandre Le Borgne, David Delahaye, Marianne Huchard, Christelle Urtado, Sylvain Vauttier:
Substitutability-Based Version Propagation to Manage the Evolution of Three-Level Component-Based Architectures. 18-23 - José Rogério Poggio Moreira, Rita Suzana Pitangueira Maciel:
Towards a Models Traceability and Synchronization Approach of an Enterprise Architecture. 24-29 - Gabriele Salgado Benato, Frank José Affonso, Elisa Yumi Nakagawa:
Infrastructure Based on Template Engines for Automatic Generation of Source Code for Self-adaptive Software Domain. 30-35
Risk Management
- Denise da Luz Siqueira, Lisandra M. Fontoura, Rafael H. Bordini, Luís A. Lima Silva:
A Knowledge Engineering Process for the Development of Argumentation Schemes for Risk Management in Software Projects. 36-41 - Denise da Luz Siqueira, Lisandra M. Fontoura, Rafael H. Bordini, Luís A. Lima Silva:
Argumentation Schemes for the Collaborative Debate of Requirement Risks in Software Projects. 42-47 - Leandro Bento Pompermaier, Rafael Chanin, Afonso Sales, Kellen Fraga, Rafael Prikladnicki:
An empirical study on software engineering and software startups: Findings from cases in an innovation ecosystem. 48-51
Data Intensive Services based Application-II
- Feng Guo, Guangquan Xu, Ning Zhang, Kaili Qiu:
POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension. 52-56 - Juntao Li, Yu Huang:
Logical Tree and Complex Event Processing in Power Systems. 57-60 - Li Zhou, Yifan Zhang, Youhuizi Li, Na Yun, Lifeng Yu:
I/O Performance Isolation Analysis and Optimization on Linux Containers. 61-66
Software Process
- Mirko Barbosa Perkusich, Kyller Costa Gorgônio, Hyggo O. Almeida, Angelo Perkusich:
A Framework to Build Bayesian Networks to Assess Scrum-based Development Methods. 67-73 - Ana Silva, André Silva, Thalles Araújo, Renan Barbosa, Felipe Barbosa Araújo Ramos, Antonio Alexandre Moura Costa, Mirko Barbosa Perkusich, Ednaldo Dilorenzo:
Ordering the Product Backlog in Agile Software Development Projects: A Systematic Literature Review. 74-80 - Delacyr Almeida Monteiro Ferreira, Débora Maria Barroso Paiva, Maria Istela Cagnin:
BPL-Framework 2.0: Support tool for Creation and Instantiation of Business Process Lines. 81-84
Literature Review
- Bianca Napoleão, Kátia Romero Felizardo, Érica Ferreira de Souza, Nandamudi L. Vijaykumar:
Practical similarities and differences between Systematic Literature Reviews and Systematic Mappings: a tertiary study. 85-90 - Lina Maria Garcés Rodriguez, Kátia Romero Felizardo, Lucas B. R. Oliveira, Elisa Yumi Nakagawa:
An Experience Report on Update of Systematic Literature Reviews. 91-96 - Renata Martinuzzi de Lima, Daniel de Vargas, Lisandra Manzoni Fontoura:
System of Systems Requirements: A Systematic Literature Review using Snowballing. 97-100
Big Data R&D In Knowledge Engineering-I
- Jun Ye, Zheng Xu, Yong Ding, Qin Wang:
Authenticity Protection in Outsourced Database. 101-104 - Zhiren Mao, Pingyi Zhou, Jiaxiang Zhong, Luojia Jiang, Chongzhi Deng, Jin Liu:
Constructing Drug Ingredient Interaction Network to Ensure Medication Security. 105-110 - Yiyang Jing, Jiansheng Zhang, Jin Liu:
Is the Number of Faults Helpful for Cross-Company Defect Prediction? 111-116 - Xiao Yu, Mingsong Zhou, Xu Chen, Lijun Deng:
Using Class Imbalance Learning for Cross-Company Defect Prediction. 117-122 - Xinyu Peng, Pingyi Zhou, Jin Liu, Xu Chen:
Improving Bug Triage with Relevant Search. 123-128
Performance
- Óscar Mortágua Pereira, Rui L. Aguiar:
Concurrent Call Level Interfaces Based on an Embedded Thread Safe Local Memory Structure. 129-134 - Gabriel Campeanu:
Parallel Execution Optimization of GPU-aware Components in Embedded Systems. 135-141 - Ghofrane Rehaiem, Hamza Gharsellaoui, Samir Ben Ahmed:
New Optimal Solutions for Real-Time Scheduling of Operating System Tasks Based on Neural Networks. 142-148 - Rui Wang, Shi Ying, Chengai Sun, Hongyan Wan, Huo-lin Zhang, Xiangyang Jia:
Model Construction and Data Management of Running Log in Supporting SaaS Software Performance Analysis. 149-154
Formal Methods
- Iaakov Exman, Phillip Katz:
Conceptual Software Design: Algebraic Axioms for Conceptual Integrity. 155-160 - Dewan Mohammad Moksedul Alam, Xudong He:
A Method to Analyze High Level Petri Nets using SPIN Model Checker. 161-166 - Jia She, Xiaoran Zhu, Min Zhang:
Algebraic Formalization and Verification of PKMv3 Protocol using Maude. 167-172 - Meng Sun, Guirong Fu:
A Formal Design Model for Cloud Services. 173-178
Feature Selection
- Yabin Wang, Tieke He, Weiqiang Zhang, Chunrong Fang, Bin Luo:
Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization. 179-184 - Jessie Carbonnel, Marianne Huchard, Clémentine Nebut:
Analyzing Variability in Product Families through Canonical Feature Diagrams. 185-190 - Zhou Xu, Jin Liu, Zhen Xia, Peipei Yuan:
An Empirical Study on the Equivalence and Stability of Feature Selection for Noisy Software Defect Data. 191-196 - Liangliang Li, Guilan Dai, Yong Zhang:
A Membership-based Multi-dimension Hierarchical Deep Neural Network Approach for Fault Diagnosis. 197-200
Requirements Modeling
- Sebastian Weigelt, Tobias Hey, Walter F. Tichy:
Context Model Acquisition from Spoken Utterances. 201-206 - Bingyang Wei:
A Comparison of Two Model Transformation Frameworks for Multiple-viewed Software Requirements Acquisition. 207-212 - Paulo Alberto Melo Barbosa, Plácido Rogério Pinheiro, Francisca Raquel de Vasconcelos Silveira, Marum Simão Filho:
Selection and prioritization of software requirements using the Verbal Decision Analysis paradigm. 213-217
Software Testing I
- Qiang Cui, Song Wang, Junjie Wang, Yuanzhe Hu, Qing Wang, Mingshu Li:
Multi-Objective Crowd Worker Selection in Crowdsourced Testing. 218-223 - Lucas Pereira da Silva, Patricia Vilain:
Reuse of Fixture Setup between Test Classes. 224-229 - Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-based Knowledge Management System for Software Testing. 230-235
Model Driven Development
- Xudong He, Zhijiang Dong, Heng Yin, Yujian Fu:
A Framework for Developing Cyber Physical Systems. 236-241 - Pengyi Li, Jing Sun, Hai Wang:
Towards Code Generation from Design Models. 242-247 - Marcello Thiry, Roger A. Schmidt:
Self-adaptive Systems Driven by Runtime Models. 248-253 - Rishi Saripalle:
Extending HL7 RIM Model to Capture Physical Activity Data. 254-259
Software Testing II
- Chuanqi Tao, Jerry Gao, Tiexin Wang:
An Approach to Mobile Application Testing Based on Natural Language Scripting. 260-265 - Woramet Muangsiri, Shingo Takada:
Random GUI Testing of Android Application Using Behavioral Model. 266-271 - Zhenya Zhang, Peng Wu, Yu Zhang:
Localization of Linearizability Faults on the Coarse-grained Level. 272-277 - Chunrong Fang, Qingkai Shi, Yang Feng, Zicong Liu, Xiaofang Zhang, Baowen Xu:
Predicate Interpretation Analysis Based on Soot. 278-282
Data Mining I
- Reinier Morejon, Marx L. Viana, Carlos José Pereira de Lucena:
Generating Software Agents for Data Mining: An Example for the Health Data Area. 283-288 - Deng Chen, Yanduo Zhang, Wei Wei, Rongcun Wang, Xiaolin Li, Shixun Wang, Rubing Huang:
Distributed API Protocol Mining. 289-294
Quality Assurance I
- Xiangyang Xu, Shanshan Li, Yong Guo, Wei Dong, Wang Li, Xiangke Liao:
Automatic Type Inference for Proactive Misconfiguration Prevention. 295-300 - Xiao Yu, Man Wu, Yan Zhang, Mandi Fu:
Combing Data Filter and Data Sampling for Cross-Company Defect Prediction: An Empricial Study. 301-306
Search
- Qing Huang, Xudong Wang, Yangrui Yang, Hongyan Wan, Rui Wang, Guoqing Wu:
SnippetGen: Enhancing the Code Search via Intent Predicting. 307-312 - Ghizlane Echbarthi, Hamamache Kheddouci:
LaSaS: an Aggregated Search based Graph Matching Approach. 313-318 - Marcelo Rodrigues, Rodrigo Rocha Silva, Jorge Bernardino:
An Event Search Platform Using Machine Learning. 319-322
Data Mining II
- Mariele Lanes, Eduardo N. Borges, Renata Galante:
The effects of classifiers diversity on the accuracy of stacking. 323-328 - Dongjin Yu, Jingchao Sun, Yiyu Wu, Zhiyong Ni, Youhuizi Li:
Discovering Hidden Interests from Twitter for Multidimensional Analysis. 329-334 - Hongyan Wan, Guoqing Wu, Ming Cheng, Qing Huang, Rui Wang, Mengting Yuan:
Software Defect Prediction Using Dictionary Learning. 335-340 - Ranjan Kumar Behera, Abhishek Sai Shukla, Sambit Mahapatra, Santanu Kumar Rath, Bibhudatta Sahoo, Swapan Bhattacharya:
Map-Reduce based Link Prediction for Large Scale Social Network. 341-344
Quality Assurance II
- Chuanqi Tao, Hao Chen, Tiexin Wang, Jerry Gao, Wanzhi Wen:
A Practical Study on Quality Evaluation for Age Recognition Systems. 345-350 - Xiao Yu, Ziyi Ma, Chuanxiang Ma, Yi Gu, Ruiqi Liu, Yan Zhang:
FSCR: A Feature Selection Method for Software Defect Prediction. 351-356 - Leonardo Da Costa Santos, Renata M. Saraiva, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich:
An empirical study on the influence of context in computing thresholds for Chidamber and Kemerer metrics. 357-362
Recommendation
- Xunhui Zhang, Tao Wang, Gang Yin, Cheng Yang, Huaimin Wang:
Who Will be Interested in? A Contributor Recommendation Approach for Open Source Projects. 363-369 - Zhangyuan Meng, Cheng Zhang, Beijun Shen, Yin Wei:
A GQM-based Approach for Software Process Patterns Recommendation. 370-375 - Yu Yang, Wenkai Mo, Beijun Shen, Yuting Chen:
Cold-Start Developer Recommendation in Software Crowdsourcing: A Topic Sampling Approach. 376-381 - Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han:
Automated Software Security Requirements Recommendation Based on FT-SR Model. 382-385
Big Data R&D In Knowledge Engineering-II
- Xiao Yu, Man Wu, Xiangyang Jia, Ye Liu:
A Reinforced Hungarian Algorithm for Task Allocation in Global Software Development. 386-391 - Xiao Yu, Peipei Zhou, Jiansheng Zhang, Jin Liu:
A Data Filtering Method Based on Agglomerative Clustering. 392-397 - Min Zhu, Jia Qu, Ruxue Chen, Xinzhi Wang, Quanyi Huang, Shaobo Zhong:
An Ontology-based Approach to Semantic Health Resource Knowledge Base Development for Crisis Preparation Decision Support System. 398-403 - Li Li:
Constant Evaluation of L2 Students' English Witing Ability. 404-409 - Giovanni Daián Rottoli, Hernán Merlino, Ramón García-Martínez:
Knowledge Discovery Process for Description of Spatially Referenced Clusters. 410-415
Conceptual Integrity of Software Systems
- Iaakov Exman:
Conceptual Integrity of Software Systems: Architecture, Abstraction and Algebra. 416-421 - Giorgio M. Grasso, Alice Plebe:
Conceptual Integrity without Concepts. 422-427 - Anabel Fraga, Valentin Moreno, Eugenio Parra, Javier Garcia:
Extraction of Patterns Using NLP: Genetic Deafness. 428-431 - Reuven Yagel:
Extending Software Systems While Keeping Conceptual Integrity. 432-435
Code Analysis I
- Judith F. Islam, Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider:
A Comparative Study of Software Bugs in Clone and Non-Clone Code. 436-443 - Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:
The Relationship between Traceable Code Patterns and Code Smells. 444-449 - Soumia Zellagui, Chouki Tibermacine, Hinde-Lilia Bouziane, Abdelhak-Djamel Seriai, Christophe Dony:
Refactoring Object-Oriented Applications towards a better Decoupling and Instantiation Unanticipation. 450-455 - Victor L. Winter, Betty Love, Chris Harris:
Delphi: A Source-code Analysis and Manipulation System for Bricklayer. 456-461
Reliability
- Lan Lin, Yufeng Xue, Fengguang Song:
A Simpler and More Direct Derivation of System Reliability Using Markov Chain Usage Models. 462-466 - Renata M. Saraiva, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich:
A Process to Calculate the Uncertainty of Software Metrics-based Models Using Bayesian Networks. 467-472 - Anne-Lise Courbis, Thomas Lambolais, Thanh-Hung Nguyen:
Safe Incremental Design of UML Architectures. 473-476 - Chunliang Hao, Celia Chen, Jie Shen, Mingshu Li, Barry W. Boehm:
Enhancing sample-based scheduler with collaborate-state in big data cluster. 477-480
Software Security
- Solomon Mensah, Jacky Keung, Michael Franklin Bosu, Kwabena Ebo Bennin, Patrick Kwaku Kudjo:
A Stratification and Sampling Model for Bellwether Moving Window. 481-486 - Michael E. Shin, Don Pathirage:
Security Requirements for Tolerating Security Failures. 487-490 - Yao Li, Weiyang Xu, Yong Tang, Xianya Mi, Baosheng Wang:
SemHunt: Identifying Vulnerability Type with Double Validation in Binary Code. 491-494 - Mario Casillo, Francesco Colace, Saverio Lemma, Marco Lombardi, Francesco Pascale:
A Tailor made System for providing Personalized Services. 495-500
Code Analysis II
- Chunrong Fang, Yang Feng, Qingkai Shi, Zicong Liu, Shuying Li, Baowen Xu:
Fault Interference and Coupling Effect. 501-506 - Akira Moroo, Akiko Aizawa, Takayuki Hamamoto:
Reranking-based Crash Report Deduplication. 507-510 - André M. Andrade, Rodrigo A. Vilar, Anderson A. Lima, Hyggo O. Almeida, Angelo Perkusich:
Analyzing duplication on code generated by Scaffolding frameworks for Graphical user interfaces. 511-516 - Amjad Nusayr:
Dedicated Static Sampling Pointcut Designators. 517-520
Agent
- Nathalia Moraes do Nascimento, Carlos Juliano M. Viana, Arndt von Staa, Carlos Lucena:
A Publish-Subscribe based Architecture for Testing Multiagent Systems. 521-526 - Pedro Elkind Velmovitsky, Jean-Pierre Briot, Marx L. Viana, Carlos Lucena:
Practical Reasoning in an Argumentation-based Decision BDI Agent: a Case Study for Participatory Management of Protected Areas. 527-530 - Paulo Henrique Cardoso Alves, Marx L. Viana, Carlos José Pereira de Lucena:
Working Towards a BDI‑Agent Based on Personality Traits to Improve Normative Conflicts Solution. 531-534
Software Education
- Bruno Bessa, Simone Santos:
A Virtual Environment for Problem-Based Learning in Software Engineering Education. 535-540 - Amal Shehadeh, Alexander Felfernig, Michael Jeran, Martin Stettinger, Stefan Reiterer:
Knowledge-based Learning Content Generation in the STUDYBATTLES Environment. 541-546 - Angelo F. D. Gonçalves, Alexandre M. A. Maciel, Rodrigo L. Rodrigues:
Development of a Data Mining Education Framework for Visualization of Data in Distance Learning Environments. 547-550
Ontology
- Jiawei Liu:
Morpheme-Enhanced Spectral Word Embedding. 551-556 - Lalit Sanagavarapu, Sai Gollapudi, Sridhar Chimalakonda, Y. Raghu Reddy, Venkatesh Choppella:
A Lightweight Approach for Evaluating Sufficiency of Ontologies. 557-561 - Nada Mahmoud, Haitham S. Hamza, Yasser M. K. Omar:
Understanding the Impact of Using Ontology Matching Tools for Validating Feature Models with Domain Knowledge. 562-565 - Marios Prasinos, George Spanoudakis, Dimitrios D. Koutsouris:
Towards a Model-Driven Platform for Evidence based Public Health Policy Making. 566-571
Development Tools
- Zhixing Li, Yue Yu, Gang Yin, Tao Wang, Qiang Fan, Huaimin Wang:
Automatic Classification of Review Comments in Pull-based Development Model. 572-577 - Yunxiang Xiong, Zhangyuan Meng, Beijun Shen, Wei Yin:
Mining Developer Behavior Across GitHub and StackOverflow. 578-583 - Takahiro Komamizu, Yasuhiro Hayase, Toshiyuki Amagasa, Hiroyuki Kitagawa:
Exploring Identical Users on GitHub and Stack Overflow. 584-589 - Gilberto A. Cysneiros Filho, Andrea Zisman:
D3TraceView: A Traceability Visualization Tool. 590-595
Data Analysis
- Thomas Hartmann, François Fouquet, Matthieu Jimenez, Romain Rouvoy, Yves Le Traon:
Analyzing Complex Data in Motion at Scale with Temporal Graphs. 596-601 - Pablo C. Cañizares, Alberto Núñez, Juan de Lara:
MAGICIAN: Model-based design for optimizing the configuration of data-centers. 602-607 - Fabian Kortum, Jil Klünder, Kurt Schneider:
Characterizing Relationships for System Dynamics Models Supported by Exploratory Data Analysis - A Conceptualizing Approach about the Meeting Diversity in Student Software Projects. 608-614 - Tassio Ferenzini Martins Sirqueira, Marx L. Viana, Nathalia Moraes do Nascimento, Carlos Lucena:
A Software Framework for Data Provenance. 615-618
Posters and Demos
- Marisa Panizzi, Alejandro Hossian, Ramón García-Martínez:
Systems Implantation: A Comparative Study and Identification of Gaps in Usual Methodologies. 619-621 - Rodrigo Rocha Silva, Fernanda Yuri Kimura, Jorge Bernardino, Joubert de Castro Lima:
Custom Process to Small Business. 622 - Anmol Desai, Nicholas Molloy, Jing Sun, Gillian Dobbie:
Visual Development Platform for Ruby on Rails. 623 - Gopal Singh Jamnal, Xiaodong Liu, Lu Fan:
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. 624-625 - Chuan-Yu Wu, Bom Yi Lee, Jing Sun, Yin Yin Latt, Kim Shepherd, Jared Watts:
Named Entity Extraction and Classification in Digital Publications. 626 - Felipe Santana Furtado Soares, Gustavo H. S. Alexandre, Nelson G. de Sá Leitão Júnior, Ivaldir H. de Farias Júnior, Hermano P. Moura:
Knowledge Management in a Software Development Organization: Identifying Tools, Processes and Benefits. 627 - Maral Kargarmoakhar, Mohsen Taheri, S. Masoud Sadjadi:
Implementing and Evaluating Scrum in Computer Science Senior Projects. 628-630 - Saboora Mohammadian, Ali Karsaz, Yaser M. Roshan:
A Comparative Analysis of Classification Algorithms in Diabetic Retinopathy Screening. 631 - Francesco Colace, Antonio Ferraioli, Luca Garofalo, Saverio Lemma, Marco Lombardi, Francesco Pascale, Alfredo Troiano:
A Conversational Workflow Model for Chatbot. 632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.