


default search action
15th ICSOFT 2020: Paris, France
- Marten van Sinderen, Hans-Georg Fill, Leszek A. Maciaszek:

Proceedings of the 15th International Conference on Software Technologies, ICSOFT 2020, Lieusaint, Paris, France, July 7-9, 2020. ScitePress 2020, ISBN 978-989-758-443-5
Invited Speakers
- Dominik Slezak:

Introducing AI/ML Components into Software Systems. ICSOFT 2020: 5 - Wil M. P. van der Aalst:

Process Mining as the Superglue between Data and Process Management. ICSOFT 2020: 7-8 - Frank Buschmann:

Software Architects are Dead! Long Live Software Architects! ICSOFT 2020: 9
Software Engineering and Systems Development
- Steffen Beringer, Heike Wehrheim:

Consistency Analysis of AUTOSAR Timing Requirements. 15-26 - Yuqing Wang

, Mika V. Mäntylä, Serge Demeyer, Kristian Wiklund, Sigrid Eldh, Tatu Kairi:
Software Test Automation Maturity: A Survey of the State of the Practice. 27-38 - MohammadSadegh Mohagheghi, Khayyam Salehi

:
Accelerating Interval Iteration for Expected Rewards in Markov Decision Processes. 39-50 - Duyen Phuc Nguyen, Stephane Maag:

Codeless Web Testing using Selenium and Machine Learning. 51-60 - Thomas Karanikiotis, Michail D. Papamichail, Ioannis Gonidelis, Dimitra Karatza, Andreas L. Symeonidis:

A Data-driven Methodology towards Interpreting Readability against Software Properties. 61-72 - Mert Ozkaya, Irem Fidandan:

MVCLang: A Software Modeling Language for the Model-View-Controller Design Pattern. 75-83 - Ciprian Khlud, Cristian Frasinaru:

A Case Study on Performance Optimization Techniques in Java Programming. 84-91 - Wasim Alsaqaf, Maya Daneva, Roel J. Wieringa:

Analysing Large-Scale Scrum Practices with Respect to Quality Requirements Challenges. 92-103 - Andreas Grosche, Burkhard Igel, Olaf Spinczyk:

Transformation- and Pattern-based State Machine Mining from Embedded C Code. 104-115 - Soumoud Fkaier

, Mohamed Khalgui, Georg Frey:
Hybrid Context-awareness Modelling and Reasoning Approach for Microgrid's Intelligent Control. 116-127 - Ulrike Witteck, Denis Grießbach, Paula Herber:

A Genetic Algorithm for Automated Test Generation for Satellite On-board Image Processing Applications. 128-135 - Jérôme Dantan, Hajer Baazaoui Zghal

, Yann Pollet:
Decifarm: A Fuzzy Decision-support Environment for Smart Farming. 136-143 - Nesrine Ben Salah, Inés Bayoudh Saâdi

, Henda Ben Ghézala
:
Towards Ubiquitous Learning Situations for Disabled Learners. 144-151 - Luis F. de Lima

, Letícia M. Peres, André Ricardo Abed Grégio, Fabiano Silva:
A Systematic Literature Mapping of Artificial Intelligence Planning in Software Testing. 152-159 - Monika Maidl, Gerhard Münz, Stefan Seltzsam, Marvin Wagner, Roman Wirtz, Maritta Heisel:

Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions. 160-171 - Inès Mouakher, Fatma Dhaou, J. Christian Attiogbé:

Toward a Correct Implementation of LwM2M Client with Event-B. 172-179 - Muneeba Jilani, Naveed Ikram:

Investigating the Gap between Scrum Theory and Practice in Pakistan. 180-186 - Preethu Rose Anish, Maya Daneva, Smita Ghaisas, Roel J. Wieringa:

An Approach That Stimulates Architectural Thinking during Requirements Elicitation: An Empirical Evaluation. 187-195 - Dragos Dobrean, Laura Diosan:

Detecting Model View Controller Architectural Layers using Clustering in Mobile Codebases. 196-203 - Yuya Inagaki, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa:

Visualization Method of Important Regions by Combination of Webpage Structures and Saliency Maps. 204-211 - Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Kateryna Romanyuk:

Investigating on the Relationships between Design Smells Removals and Refactorings. 212-219 - Mohamed Naija, Rihab Khemiri, Ernesto Exposito:

Failsafe Mechanism to Hazard Analysis and Risk Mitigation in Unmanned Aerial Vehicle based on NCES. 220-227 - Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato

, Edgardo Montes de Oca:
Metrics-driven DevSecOps. 228-233 - Angshuman Jana:

Data-centric Refinement of Database-Database Dependency Analysis of Database Program. 234-241 - Vijay Rajasekar, Shiv Sondhi, Sherif Saad, Shady Mohammed:

Emerging Design Patterns for Blockchain Applications. 242-249 - Sohaib Soualah, Yousra Hafidi, Mohamed Khalgui, Allaoua Chaoui, Laid Kahloul:

Formalization and Verification of Reconfigurable Discrete-event System using Model Driven Engineering and Isabelle/HOL. 250-259 - Marina Cernat, Adelina-Nicoleta Staicu

, Alin Stefanescu:
Improving UI Test Automation using Robotic Process Automation. 260-267
Software Systems and Applications
- Arpita Dutta, Rajib Mall:

A Function Dependency based Approach for Fault Localization with D. 273-283 - Rihab Khemiri, Ernesto Exposito:

Fuzzy Multi-objective Optimization for Ride-sharing Autonomous Mobility-on-Demand Systems. 284-294 - Marwa Ben M'Barek

, Amel Borgi, Sana Ben Hamida
, Marta Rukoz
:
Generic GA-PPI-Net: Generic Evolutionary Algorithm to Detect Semantic and Topological Biological Communities. 295-306 - Jamila Sassi, Inès Alaya, Moncef Tagina:

Bee-route: A Bee Algorithm for the Multi-objective Vehicle Routing Problem. 307-318 - Mouna Bouzid, Inès Alaya, Moncef Tagina:

A Bee Colony Optimization Algorithm for the Long-Term Car Pooling Problem. 319-327 - Daniel Brahneborg, Wasif Afzal, Adnan Causevic, Mats Björkman:

Superlinear and Bandwidth Friendly Geo-replication for Store-and-forward Systems. 328-338 - Chams Eddine Choucha, Mohamed Oussama Ben Salem

, Mohamed Khalgui, Laid Kahloul, Naïma Souâd Ougouti:
On the Improvement of R-TNCESs Verification using Distributed Cloud-based Architecture. 339-349 - Sébastien Salva, Elliott Blot:

Verifying the Application of Security Measures in IoT Software Systems with Model Learning. 350-360 - Hela Hakim, Asma Sellami

, Hanêne Ben-Abdallah:
An in-Depth Requirements Change Evaluation Process using Functional and Structural Size Measures in the Context of Agile Software Development. 361-375 - Besmir Sejdiu

, Florije Ismaili, Lule Ahmedi:
A Real-time Integration of Semantics into Heterogeneous Sensor Stream Data with Context in the Internet of Things. 376-383 - Pasquale Ardimento

, Lerina Aversano, Mario Luca Bernardi, Marta Cimitile:
Temporal Convolutional Networks for Just-in-Time Software Defect Prediction. 384-393 - Hanene Rouainia

, Hanen Grichi, Laid Kahloul, Mohamed Khalgui:
3D Mobility, Resizing and Mobile Sink Nodes in Reconfigurable Wireless Sensor Networks based on Multi-agent Architecture under Energy Harvesting Constraints. 394-406 - Iffat Fatima

, Hina Anwar
, Dietmar Pfahl
, Usman Qamar:
Tool Support for Green Android Development: A Systematic Mapping Study. 409-417 - Gulsum Akkuzu, Benjamin Aziz, Mo Adda

:
Towards Secure Data Sharing Processes in Online Social Networks: Trusty. 418-425 - Eliana Fernandes, Ana Carolina Salgado, Jorge Bernardino

:
Big Data Streaming Platforms to Support Real-time Analytics. 426-433 - Hamsini Ketheswarasarma Rajaram, John Loane, Silvana Togneri MacMahon, Fergal McCaffery

:
A Retrospective Study of Taxonomy based Testing using Empirical Data from a Medical Device Software Company. 434-442 - Ceara Treacy, John Loane, Fergal McCaffery

:
Developer Driven Framework for Security and Privacy in the IoMT. 443-451 - Aicha Goubaa, Mohamed Khalgui, Georg Frey, Zhiwu Li:

New Approach for Deadline Calculation of Periodic, Sporadic and Aperiodic Real-time Software Tasks. 452-460 - Sana Ben Hamida

, R. Gorsane, K. Gorsan Mestiri:
Towards a Better Understanding of Genetic Operators for Ordering Optimization: Application to the Capacitated Vehicle Routing Problem. 461-469 - Jung-Hoon Kim

, Young-Sik Lee:
Exploiting Exclusive Higher Resolution to Enhance Response Time of Embedded Flash Storage. 470-477 - Bolatzhan Kumalakov, Yassynzhan Shakan:

Blockchain Project Initiation and Execution: Decision-making Practices and Perceptions. 478-483 - Radia Bendimerad, Kamel Smiri, Abderrazek Jemai:

Fault Detection and Co-design Recovery for Complex Task within IoT Systems. 484-491 - Andrea Delgado, Adriana Marotta, Laura González, Libertad Tansini, Daniel Calegari:

Towards a Data Science Framework Integrating Process and Data Mining for Organizational Improvement. 492-500 - Estrela Ferreira Cruz, António Miguel Rosado da Cruz:

Using Blockchain to Implement Traceability on Fishery Value Chain. 501-508 - Gencer Erdogan, Åsmund Hugo, Antonio Álvarez Romero

, Dario Varano, Niccolò Zazzeri
, Anze Zitnik
:
An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models. 509-520 - Maria Spichkova, Johan Van Zyl:

Application of Computer Vision Technologies for Automated Utility Meters Reading. 521-528 - Ciprian Paduraru, Bogdan Ghimis, Alin Stefanescu:

RiverConc: An Open-source Concolic Execution Engine for x86 Binaries. 529-536 - Christophe Ponsard, Robert Darimont:

Towards Quantitative Trade-off Analysis in Goal Models with Multiple Obstacles using Constraint Programming. 537-543 - Chams Eddine Choucha, Mohamed Ramdani

, Mohamed Khalgui, Laid Kahloul:
On Decomposing Formal Verification of CTL-based Properties on IaaS Cloud Environment. 544-551 - Teodor Fredriksson, Jan Bosch, Helena Holmström Olsson:

Machine Learning Models for Automatic Labeling: A Systematic Literature Review. 552-561
Foundational and Trigger Technologies
- Hela Jebali, Noël Richard, Mohamed Naouai:

Local Rotation Pattern: A Local Descriptor of Color Textures. 567-573 - Imene Guerfi

, Lobna Kriaa, Leïla Azouz Saïdane:
An Efficient GPGPU based Implementation of Face Detection Algorithm using Skin Color Pre-treatment. 574-585 - Patrick Kubiak

, Stefan Rass
, Martin Pinzger:
IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files. 589-596 - Stefano Quer:

A Parallel Many-core CUDA-based Graph Labeling Computation. 597-605 - Ahmed Lekssays, Bouchaib Falah, Sameer Abufardeh:

A Novel Approach for Android Malware Detection and Classification using Convolutional Neural Networks. 606-614 - Khadija Bousselmi

, Sana Ben Hamida
, Marta Rukoz:
Bi-Objective CSO for Big Data Scientific Workflows Scheduling in the Cloud: Case of LIGO Workflow. 615-624 - Emiel Caron:

An Optimization Method for Entity Resolution in Databases: With a Case Study on the Cleaning of Scientific References in Patent Databases. 625-632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














