


default search action
34th SEKE 2022: KSIR Virtual Conference Center, USA
- Rong Peng, Carlos Eduardo Pantoja, Pankaj Kamthan:

The 34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022, KSIR Virtual Conference Center, USA, July 1 - July 10, 2022. KSI Research Inc. 2022, ISBN 1-891706-54-3
Session REDE Requirements Engineering and Domain Engineering
- Bangchao Wang

, Heng Wang, Ruiqi Luo, Sen Zhang, Qiang Zhu:
A Systematic Mapping Study of Information Retrieval Approaches Applied to Requirements Trace Recovery. 1-6 - Xi Wang, Weikai Miao:

A framework for Requirements specification of machine-learning systems. 7-12 - Viviane Duarte Bonfim, Fabiane Barreto Vavassori Benitti:

Requirements debt: causes, consequences, and mitigating practices. 13-18 - Pankaj Kamthan:

On the Implications of Human-Paper Interaction for Software Requirements Engineering Education. 19-24 - Kirthy Kolluri, Robert Ahn, Tom Hill, Julie R. Rauer, Lawrence Chung:

Identifying Risks for Collaborative Systems during Requirements Engineering: An Ontology-Based Approach. 25-30 - Qian Wang, Jing Liu, John Zhang, Hui Dou, Haiying Sun, HongTao Chen, Xiaohong Chen, Jifeng He:

A Novel Approach to Maintain Traceability between Safety Requirements and Model Design. 31-34 - Eronita Maria Luizines Van Leijden, Alexandre Magno Andrade Maciel, Andrêza Leite de Alencar:

Development of a Domain Specific Modeling Language for Educational Data Mining. 35-39
Session ESEKE Education and SEKE
- David Parsons

:
Agile and Lean Software Engineering and the SWEBOK - Position Paper for Panel: Educational and Professional Implications of SWEBOK. 40-41
Session CQA Code Quality and Analysis
- Yichen Li, Xiaofang Zhang:

Multi-Label Code Smell Detection with Hybrid Model based on Deep Learning. 42-47 - Qing Mi, Yiqun Hao, Maran Wu, Liwei Ou:

An Enhanced Data Augmentation Approach to Support Multi-Class Code Readability Classification. 48-53 - Bingting Wu, Xiaofang Zhang:

Contrastive Learning for Multi-Modal Automatic Code Review. 54-59 - Wei Zhao, Yan Liu:

Utilizing Edge Attention in Graph-Based Code Search. 60-66 - Lu Li, Yan Liu:

Mapping Modern JVM Language Code to Analysis-friendly Graphs: A Pilot Study with Kotlin. 67-72 - Youfei Huang, Yuhang Chen, Zhengting Tang, Liangyu Chen, Ningkang Jiang:

Refactoring of Object-oriented Package Structure Based on Complex Network. 73-78 - Chunhua Yang, Xiufang Li:

Reducing Mismatches in Syntax Coupled Hunks. 79-84 - Lancong Liu, Shizhan Chen, Sen Chen, Guodong Fan, Zhiyong Feng, Hongyue Wu:

Adaptive Prior-Knowledge-Assisted Function Naming Based on Multi-level Information Explorer. 85-90 - Chaochen Shi, Yong Xiang, Jiangshan Yu

, Longxiang Gao:
Towards Accurate Knowledge Transfer between Transformer-based Models for Code Summarization. 91-94 - Jeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse:

Towards Lightweight Detection of Design Patterns in Source Code. 95-99
Session DSML Distributed Systems and Machine Learning
- Zeting Pan, Yue Yu, Junsheng Chang:

A Distributed Graph Inference Computation Framework Based on Graph Neural Network Model. 100-105 - Weidong Zhu, Yufeng Deng, Shiyou Qian, Jian Cao, Guangtao Xue:

PEM: A Parallel Ensemble Matching Framework for Content-based Publish/Subscribe Systems. 106-111 - Weiming Xiong, Mingyang Zhong, Cong Guo, Huamin Wang, Libo Zhang:

MFGAN: A Novel CycleGAN-Based Network for Masked Face Generation. 112-117 - Elena Gómez-Martínez, Esther Guerra, Juan de Lara:

Analysing Product Lines of Concurrent Systems with Coloured Petri Nets. 118-123 - Feng Xie

, Zhong Zhang, Xuechen Zhao, Bin Zhou, Yusong Tan:
Inter- and Intra-Series Embeddings Fusion Network for Epidemiological Forecasting. 124-129 - Xinrong Hu, Tao Wang, Jinxing Liang, Junjie Jin, Junping Liu, Tao Peng, Yuanjun Xia:

Unsupervised Structure Confidence Sampling for Image Inpainting. 130-135 - Blair Archibald, Muffy Calder, Michele Sevegnani, Mengwei Xu

:
Verifying BDI Agents in Dynamic Environments. 136-141 - Yongxian Wei, Yong Ma:

Zero-Shot Object Detection with Multi-label Context. 142-146 - Jianpo Li, Geng-Chen Li, Jeng-Shyang Pan, Min Gao:

Modified Communication Parallel Compact Firefly Algorithm and Its Application. 147-153 - Yongyue Chao, Mingxue Liao, Jiaxin Gao, Guangyao Li:

Self-Adaptive Task Allocation for Decentralized Deep Learning in Heterogeneous Environments. 154-159 - Hailin Yang, Yanhong Huang, Jianqi Shi, Fangda Cai:

A Federated Model Personalisation Method Based on Sparsity Representation and Clustering. 160-165
Session STDP Software Testing and Defect Prediction
- Xia Li, Durga Nagarjuna Tadikonda:

Improving Mutation-Based Fault Localization via Mutant Categorization. 166-171 - Varsha P. Suresh

, Sujit Kumar Chakrabarti, Athul Suresh, Raoul Jetley:
WBS: Weighted Backtracking Strategy for Symbolic Testing of Embedded Software. 172-177 - Chun Ying Zhou, Cheng Zeng, Peng He:

An Exploratory Study of Bug Prioritization and Severity Prediction based on Source Code Features. 178-183 - Yaju Li, Chenyi Zhang, Qin Li:

Taint Trace Analysis For Java Web Applications. 184-189 - Mohammed Raihan Ullah, Nazia Sultana Chowdhury, Fazle Mohammed Tawsif

:
Impact of Combining Syntactic and Semantic Similarities on Patch Prioritization while using the Insertion Mutation Operators. 190-195 - Yanwu Zhou, Lu Lu, Quanyi Zou, Cuixu Li:

Two-Stage AST Encoding for Software Defect Prediction. 196-199 - Shinya Sano, Takashi Kitamura, Shingo Takada:

An efficient discrimination discovery method for fairness testing. 200-205 - Ryan Michaels, Shraddha Piparia, David Adamo, Renée C. Bryce:

Data Driven Testing for Context Aware Apps. 206-211 - Zengyang Li, Jieling Xu, Guangzong Cai, Peng Liang

, Ran Mo:
A Preliminary Study on the Explicitness of Bug Associations. 212-215 - Xuan Deng, Peng He, Chun Ying Zhou:

Data Selection for Cross-Project Defect Prediction with Local and Global Features of Source Code. 216-219 - Lei Li, Zhe Quan, Zixu Wang, Tong Xiao, Xiaofei Jiang, Xinjian Hu, Peibing Du:

RIRCNN: A Fault Diagnosis Method for Aviation Turboprop Engine. 220-224 - Levi T. Connelly, Melody L. Hammel, Benjamin T. Eger, Lan Lin:

Automated Unit Testing of Hydrologic Modeling Software with CI/CD and Jenkins. 225-230 - Tri Cao, Tuan Vu, Huyen Le, Vu Nguyen:

Ensemble approaches for Test Case Prioritization in UI testing. 231-236 - Daryl Camilleri, Mark Micallef, Chris Porter:

Investigating Cognitive Workload during Comprehension and Application Tasks in Software Testing. 237-242 - Naoki Tane, Yusaku Ito, Hironori Washizaki, Yoshiaki Fukazawa:

Visualization of automated program repair focusing on suspiciousness values. 243-248
Session ADPBD Agile Development Practices for Big Data Analytics
- Jakob Nonnenmacher

, Jorge Marx Gómez:
Beyond Numerical - MIXATON for outlier explanation on mixed-type data (ADPBD). 249-252 - Vidroha Debroy, Senecca Miller, Mark Blake, Alex Hibbard, Cody Beavers:

Log Sinks and Big Data Analytics along with User Experience Monitoring to Tell a Fuller Story (ADPBD). 253-256 - Chao Wu, Chunhui Wang, Tong Li, Ye Zhai:

A Node-Merging based Approach for Generating iStar Models from User Stories (ADPBD). 257-262
Session KE Knowledge Engineering
- Hussein Baalbaki, Hussein Hazimeh

, Hassan Harb, Rafael Angarita:
KEMA: Knowledge-Graph Embedding Using Modular Arithmetic. 263-268 - Hao Tang, Donghong Liu, Xinhai Xu, Feng Zhang:

Embedding Knowledge Graphs with Semantic-Guided Walk. 269-274 - Xiang Cao, Lei Wang, Yujiu Yang

:
Dual Contrastive Learning for Unsupervised Knowledge Selection. 275-280 - Dingyang Duan, Daren Zha, Xiao Yang, Xiaobo Guo:

Dynamic Heterogeneous Information Network Embedding in Hyperbolic Space. 281-286 - Yang Yu, Caidie Huang, Liangyu Chen, Mingsong Chen:

Using Multi-feature Embedding towards Accurate Knowledge Tracing. 287-292 - Hongyu Zhu, Jun Zeng, Yu Yang, Yingbo Wu:

A Zero-Shot Relation Extraction Approach Based on Contrast Learning. 293-299 - Yangzheng Li, Zhigang Chen, Xiaoheng Deng:

Similarity matching of time series based on key point alignment dynamic time warping. 300-305 - Xiaoxiang Lu, Yang Zou, Xiaoqin Zeng, Xiangchen Wu, Pengfei Qiu:

Auto-Encoding GAN for Reducing Mode Collapse and Enhancing Feature Representation. 306-311 - Enayat Rajabi, Slawomir Nowaczyk, Sepideh Pashami, Magnus Bergquist:

An Explainable Knowledge-based AI Framework for Mobility as a Service. 312-316
Session NLP Natural Language Processing
- Zhaohui Wang, Xinghua Zhang

, Yanzeng Li, Yubin Wang, Jiawei Sheng, Tingwen Liu
, Hongbo Xu:
Enhancing Pre-Trained Language Representations Based on Contrastive Learning for Unsupervised Keyphrase Extraction. 317-322 - Yupin Yang, Jiang Zhong, Chen Wang, Qing Li:

Exploring Relevance and Coherence for Automated Text Scoring using Multi-task Learning. 323-328 - Lijie Li, Shuangyang Hu, Junhao Chen, Ye Wang, Zuobin Xiong

:
Exp-SoftLexicon Lattice Model Integrating Radical-Level Features for Chinese NER. 329-334 - Qiuyu Tao, Jiang Zhong, Rongzhen Li:

AESPrompt: Self-supervised Constraints for Automated Essay Scoring with Prompt Tuning. 335-340 - Rong Yan, Ailing Tang, Ziyi Zhang:

Increasing Representative Ability for Topic Representation. 341-346 - Li Sun, Jieyuan Zheng, Jiyun Li, Chen Qian:

Exploring MMSE Score Prediction Model Based on Spontaneous Speech. 347-350
Session FSVM Formal Specification, Verification and Model Checking
- Junjie Wei, Qin Li:

NKind: a model checker for liveness property verification on Lustre programs. 351-356 - Peng Jin, Yang Wang, Min Zhang

:
Efficient LTL Model Checking of Deep Reinforcement Learning Systems using Policy Extraction. 357-362 - Peimu Li, Jiaqi Yin, Huibiao Zhu:

Formal Verification of COCO Database Framework Using CSP. 363-368 - Weiyu Xu, Xi Wu, Yongxin Zhao, Yongjian Li:

Formal Verification and Analysis of Time-Sensitive Software-Defined Network Architecture. 369-375 - M. Saqib Nawaz

, Muhammad Zohaib Nawaz, Osman Hasan, Philippe Fournier-Viger:
Metaheuristic Algorithms for Proof Searching in HOL4. 376-381 - Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:

Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude. 382-387 - Canh Minh Do, Yati Phyo

, Kazuhiro Ogata:
A divide and conquer approach to until and until stable model checking. 388-393
Session SDMP Software Development and Maintenance Processes
- Fernando Vedoin Garcia, Jean Carlo Hauck, Fernanda N. Rizzo Hahn:

Managing Risks in Agile Methods: a Systematic Literature Mapping. 394-399 - Xinjia Xie

, Shun Gai, Yunxiao Guo
, Boyang Wang, Han Long
:
LSTMcon: A Novel System of Portfolio Management Based on Feedback LSTM with Confidence. 400-405 - Li Wang, Xianglong Kong

, Xiao-Fei Wang, Bi-Xin Li:
Research on Identification and Refactoring Approach of Event-driven Architecture Based on Ontology. 406-411 - Yunhyeok Lee, Yi Liu

:
Designing Microservice-Oriented Application Frameworks. 412-417 - Wenhao Zhong, Yugen Du, Chuang Shan, Hanting Wang, Fan Chen:

Collaborative Web Service Quality Prediction via Network Biased Matrix Factorization. 418-423 - Mahmoud El Hamlaoui

, Yassine Qamsane, Youness Laghouaouta, Anant Mishra:
A Model Based Approach for Generating Modular Manufacturing Control Systems. 424-427 - Ilenia Fronza, Xiaofeng Wang:

Revealing Agile Mindset Using LEGO SERIOUS PLAY: Experience from an Online Agile Training Project. 428-433 - Iaakov Exman, Alexey Nechaev:

Quantum Software Models: Software Density Matrix is a Perfect Direct Sum of Module Matrices. 434-439 - Fazle Rabbi, Syeda Sumbul Hossain, Mir Mohammad Samsul Arefin:

SCMA: A Lightweight Tool to Analyze Swift Projects. 440-443 - Laislla Brandão, Aldonso Martins-Jr

, Gabriel A. Kopte, Edson Filho, Alexandre Magno Andrade Maciel:
Anomaly Detection in Spot Welding Machines in the Automotive Industry for Maintenance Prioritization. 444-448 - Yi Huang, Xinjun Mao, Zhang Zhang:

The Maintenance of Top Frameworks and Libraries Hosted on GitHub: An Empirical Study. 449-452 - James M. Willenbring

, Gursimran Singh Walia:
Evaluating the Sustainability of Computational Science and Engineering Software: Empirical Observations. 453-456 - Yajing Luo, Peng Liang

, Mojtaba Shahin, Zengyang Li, Chen Yang:
Decisions in Continuous Integration and Delivery: An Exploratory Study. 457-462 - Philip Wilson, Rehman Arshad

, James Creedy, Adam Dad, Eloise Slater, Hannah Cusworth:
A THG Performance Case Study in the world of E-Commerce. 463-468
Session DEMO Technical Demos
- Hui Liu, Yunfang Li, Zhi Li:

EARS2TF: A Tool for Automated Planning Test from Semi-formalized Requirements. 469-470 - Zhi Li, Ling Xie, Yilong Yang:

A Simplified Method for Automatic Verification of Java Programs. 471-472 - Yajun Deng, Zhi Li, Hongbin Xiao

:
Trace4PF: A tool for Automated Decomposition of Problem Diagrams with Traceability. 473-474
Session DMMA Data Modeling, Mining and Analysis
- Yigui Yuan, Zhaole Chu, Peiquan Jin, Shouhong Wan:

Access-Pattern-Aware Personalized Buffer Management for Database Systems. 475-480 - Oliver A. Tazl, Christopher Tafeit, Franz Wotawa

, Alexander Felfernig:
DDMin versus QuickXplain - An Experimental Comparison of two Algorithms for Minimizing Collections. 481-486 - Mathieu Lega, Christian Colot, Corentin Burnay, Isabelle Linden

:
Supporting Data Selection for Decision Support Systems: Towards a Decision-Making Data Value Taxonomy. 487-492 - Xiaojun Guo, Zhiping Huang, Shaojing Su, Yunxiao Lv:

Data Modeling and Data Analysis in Simulation Credibility Evaluation of Autonomous Underwater Vehicles. 493-498 - Enrique Martin-Martin

, Manuel Montenegro, Adrián Riesco
, Rubén Rubio
:
Improving Database Learning with an Automatic Judge. 499-502 - Guillaume Delorme, Guilaine Talens, Eric Disson:

Data Regulation Ontology. 503-506
Session IOTS IoT and Security
- Yu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen:

Smifier: A Smart Contract Verifier for Composite Transactions. 507-512 - Zhenzhou Tian, Yaqian Huang, Jie Tian, Zhongmin Wang, Yanping Chen, Lingwei Chen:

Ethereum Smart Contract Representation Learning for Robust Bytecode-Level Similarity Detection. 513-518 - Zhenheng Dong, Yongxin Zhao, Qiang Wang:

An Information Flow Security Logic for Permission-Based Declassification Strategy. 519-524 - Zhenlan Ji

, Pingchuan Ma, Shuai Wang:
Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning. 525-530 - Hepeng Dai, Chang-Ai Sun, Huai Liu

:
DeepController: Feedback-Directed Fuzzing for Deep Learning Systems. 531-536 - Bo Jiang, Zichao Li, Yuhe Huang, Zhenyu Zhang, W. K. Chan:

WasmFuzzer: A Fuzzer for WasAssembly Virtual Machines. 537-542 - Heng Cong, Rongyu Zhang, Jiarong He, Jin Gao:

Multi-Frames Temporal Abnormal Clues Learning Method for Face Anti-Spoofing. 543-548 - Eduardo Lopez, Kamran Sartipi:

Paying Attention to the Insider Threat. 549-552 - Zhanshi Li, Tong Li, Runzi Zhang

, Di Wu, Zhen Yang:
A Novel Network Alert Classification Model based on Behavior Semantic. 553-558 - Xudong He:

Analyzing Cyber-Physical Systems with Learning Enabled Components using Hybrid Predicate Transition Nets. 559-563 - Yichun Xu, Shuzhen Wan, Fanmin Dong:

Problem-specific knowledge based artificial bee colony algorithm for the rectangle layout optimization problem in satellite design. 564-567 - Hongqin Zhang, Huibiao Zhu, Jiaqi Yin, Ningning Chen:

Modeling and Verifying AUPS Using CSP. 568-573 - Tatsuya Igarashi, Masaki Nakamura, Kazutoshi Sakakibara:

Formal Verification of the Lim-Jeong-Park-Lee Autonomous Vehicle Control Protocol using the OTS/CafeOBJ Method. 574-579
Session SNRS Social Network and Recommendation Systems
- Fangmin Dong, Yumin Zhu, Shuzhen Wan, Yichun Xu:

Improving the Early Rumor Detection Performance of the Deep Learning Models By CGAN. 580-585 - Song Wu, Hailin Xiong, Ye Yang, Jinming Zhang, Chenwei Lin:

Recurrent Graph Convolutional Network for Rumor Detection. 586-592 - Yan Zhang, Chunyan An

:
Chinese Spam Detection based on Prompt Tuning. 593-597 - Chenyang Wang, Pengfei Xue, Min Zhang, Miao Hu:

Identifying Gambling Websites with Co-training. 598-603 - Xueqi Jia, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Weiwei Cao, Hong Sun:

Social Information Popularity Prediction based on Heterogeneous Diffusion Attention Network. 604-609 - Jinwei Lu, Yimin Wu, Jiayan Pei, Zishan Qin, Shizhao Huang, Chao Deng:

Context-Aware Model for Mining User Intentions from App Reviews. 610-615 - Weite Feng, Tong Li, Zhen Yang:

COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. 616-621 - Shengyu Mao, Pengyi Hao, Cong Bai:

Deep Correlation based Concept Recommendation for MOOCs. 622-627 - Qiao Pan

, Xinyu Yu, Xinyu Li, Kun Shao:
Postoperative MPA-AUC0-12h Prediction for Kidney Transplant Recipients based on Few-shot Learning. 628-633 - Shuxin Zhao, Chongyang Shi, Shaojun Ren, Hufsa Mohsin:

Correlation Feature Mining Model Based on Dual Attention for Feature Envy Detection. 634-639 - Yinan Chen

, Zhuanming Gao, Dong Li:
Graph Embedding Models for Community Detection. 640-645 - Hai Feng Zhang, Cheng Zeng, Peng He:

An Emotion Cause Detection Method Based on XLNet and Contrastive Learning. 646-649

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














