


default search action
17th ICSOFT 2022: Lisbon, Portugal
- Hans-Georg Fill, Marten van Sinderen, Leszek A. Maciaszek:

Proceedings of the 17th International Conference on Software Technologies, ICSOFT 2022, Lisbon, Portugal, July 11-13, 2022. SCITEPRESS 2022, ISBN 978-989-758-588-3
Invited Speakers
- Witold Pedrycz:

Federated Learning, Knowledge Transfer, and Knowledge Distillation: Developments with Information Granules. ICSOFT 2022: 5 - Peter Fettke, Wolfgang Reisig:

Breathing Life into Models: The Next Generation of Enterprise Modeling. 7-14 - Moshe Y. Vardi:

Program Verification: A 70+-Year History. ICSOFT 2022: 15
Software Engineering and Systems Development
- Gencer Erdogan, Inger Anne Tøndel, Shukun Tokas, Michele Garau, Martin Gilje Jaatun:

Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid. 21-32 - Tobias Landsberg

, Christian Dietrich, Daniel Lohmann:
TASTING: Reuse Test-case Execution by Global AST Hashing. 33-45 - Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:

Generalized Mutant Subsumption. 46-56 - Stephen R. Tate

, Bo Yuan:
Minimum Size Build Environment Sets and Graph Coloring. 57-67 - Tamás Aladics, Péter Hegedüs, Rudolf Ferenc:

A Vulnerability Introducing Commit Dataset for Java: An Improved SZZ based Approach. 68-78 - Argyrios Papoudakis, Thomas Karanikiotis, Andreas L. Symeonidis:

A Mechanism for Automatically Extracting Reusable and Maintainable Code Idioms from Software Repositories. 79-90 - Zaineb Sakhrawi

, Asma Sellami
, Nadia Bouassida:
Software Enhancement Effort Estimation using Stacking Ensemble Model within the Scrum Projects: A Proposed Web Interface. 91-100 - Benoît Verhaeghe

, Anas Shatnawi, Abderrahmane Seriai, Anne Etien
, Nicolas Anquetil, Mustapha Derras, Stéphane Ducasse:
A Hybrid Architecture for the Incremental Migration of a Web Front-end. 101-110 - Robin Nunkesser:

Using Hexagonal Architecture for Mobile Applications. 113-120 - Francesco Pilotti

, Giorgio Campea, Daniela D'Alessandro, Daniele Di Valerio, Gaetanino Paolone:
A Tool and an Approach for the Automatic Generation of Digital Networks. 121-128 - Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano

:
Is There Any Correlation between Refactoring and Design Smell Occurrence? 129-136 - Preston Moore, Thomas Wies, Marc Waldman, Phyllis G. Frankl, Justin Cappos:

Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings. 137-145 - Bram Hooimeijer

, Marc Geilen
, Jan Friso Groote
, Dennis Hendriks, Ramon R. H. Schiffelers:
Constructive Model Inference: Model Learning for Component-based Software Architectures. 146-158 - Arpita Dutta, Rajib Mall:

An Ensemble Classifier based Method for Effective Fault Localization. 159-166 - Peter Lenkefi, Gergely Mezei:

Connections between Language Semantics and the Query-based Compiler Architecture. 167-174 - Robert Husák, Jan Kofron, Jakub Mísek, Filip Zavoral:

Using Procedure Cloning for Performance Optimization of Compiled Dynamic Languages. 175-186 - Aäron Munsters

, Angel Luis Scull Pupo
, Jens Nicolay:
COAST: A Conflict-free Replicated Abstract Syntax Tree. 187-196 - Juan David Mogollon

, Virginie Goepp, Oscar Avila, Roland De Guio:
Statistical and Requirement Analysis for an IDM Tool for Emergency Department Simulation. 197-204 - Noureen Islam

, Noor-E.-Sadman
, Mahmudul Islam
, Mahady Hasan
:
Air Quality Monitoring of Bangladesh (AQM): Data Driven Analysis System. 205-212 - Sébastien Salva, Jarod Sue:

Test Case Backward Generation for Communicating Systems from Event Logs. 213-220 - Ezeldin Sherif, Waleed Helmy

, Galal Hassan:
Agile Requirements Engineering's Challenges. 221-225 - Gergö Balogh, Péter Soha

:
Formal Notations and Terminology for Users' Feedback and Its Specialization for Interactive Fault Localization. 226-233 - Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. 234-241 - Fauzia Khan, Ishaya Gambo:

Incorporating Privacy Requirements in Smart Communities for Older Adults: A Research Vision. 242-249 - Michael Sildatke, Hendrik Karwanni, Bodo Kraft, Albert Zündorf:

FUSION: Feature-based Processing of Heterogeneous Documents for Automated Information Extraction. 250-260
Software Systems and Applications
- Andreea Cristina Lung, Simona Motogna, Vladiela Petrascu:

Empirical Evaluation of Reusability Models. 265-275 - Zakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, Mohammad Askar:

Multi-party Contract Management for Microservices. 276-287 - Ciprian Paduraru, Miruna Paduraru, Stefan Iordache:

Using Deep Reinforcement Learning to Build Intelligent Tutoring Systems. 288-298 - Razvan Nitu, Eduard Staniloiu, Razvan Deaconescu, Razvan Rughinis:

Adding Support for Reference Counting in the D Programming Language. 299-306 - Mikolaj Markiewicz, Jakub Koperwas:

Data Partitioning Strategies for Simulating non-IID Data Distributions in the DDM-PS-Eval Evaluation Platform. 307-318 - Jonathan Neugebauer

, Rosemary Dubbeldam
, My Linh Pham, Lokman Beser, Luka Gerlach, Yu Yuan Lee, Herbert Kuchen:
A Medical Information System for Personalized Rehabilitation after Ankle Inversion Trauma. 319-330 - Emilia Cioroaica, José Miguel Blanco

, Bruno Rossi
:
Timing Model for Predictive Simulation of Safety-critical Systems. 331-339 - Yann Pollet, Jérôme Dantan

, Hajer Baazaoui Zghal
:
Multi-factor Prediction and Parameters Identification based on Choquet Integral: Smart Farming Application. 340-348 - Hanene Rouainia

, Hanen Grichi, Laid Kahloul, Mohamed Khalgui:
Reconfigurable Wireless Sensor Networks Simulator (RWSNSim): A New Discrete-event Simulator. 349-361 - Wojciech Stecz

, Marcin Chodnicki
:
Increasing the Autonomy of the Unmanned Aerial Platform. 365-373 - Salma Abid Azzi, Chiraz Ben Othmane Zribi:

Comparing Deep Learning Models for Multi-label Classification of Arabic Abusive Texts in Social Media. 374-381 - José Manuel Lozano Domínguez, J. M. Corralejo Mora, Iñaki Fernández de Viana Gonzalez, Tomás de Jesús Mateo Sanguino, Manuel J. Redondo González:

Performance Analysis of an Embedded System for Target Detection in Smart Crosswalks using Machine Learning. 382-389 - Cosmin Striletchi

, Madalina Chitez, Karla Csürös:
Building Roger: Technical Challenges While Developing a Bilingual Corpus Management and Query Platform. 390-398 - Francisco Morais

, Tiago F. Pereira, Carlos E. Salgado, Ana Lima
, Manuel Pereira, João Oliveira, António Sousa, Helena Rodrigues
:
Deriving UML Logic Architectures of Software Product based on a Cloud Reference Architecture: An Experience Report. 399-409 - Alaa Omar, Ahmad S. Alsadeh

, Mamoun Nawahdah:
Adherence to Secure Software Development Lifecycle. 410-417 - Daan Weijs, Emiel Caron:

Customer Journey Analytics: A Model for Creating Diagnostic Insights with Process Mining. 418-424 - Ciprian Paduraru, Miruna Paduraru, Stefan Iordache

:
Continuous Procedural Network of Roads Generation using L-Systems and Reinforcement Learning. 425-432 - Laura Diana Cernau, Laura Diosan, Camelia Serban:

A Hybrid Complexity Metric in Automatic Software Defects Prediction. 433-440 - Stefan Huber, Fabio Knoll, Mario Döller:

A Pipeline-oriented Processing Approach to Continuous and Long-term Web Scraping. 441-448 - Boubou Thiam Niang, Giacomo Kahn, Nawel Amokrane, Yacine Ouzrout

, Hamza Sahli, Mustapha Derras, Jannik Laval:
Automatic Generation of Interoperability Connectors using Software Product Lines Engineering. 449-456 - Hind Bangui, Barbora Buhnova:

Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations. 457-468 - Mouncef Naji, Maroua Masmoudi, Hajer Baazaoui Zghal

, Chirine Ghedira Guegan, Vlado Stankovski, Dan Vodislav:
Semantic-based Data Integration and Mapping Maintenance: Application to Drugs Domain. 469-477 - Aman Swaraj, Sandeep Kumar

:
A Methodology for Detecting Programming Languages in Stack Overflow Questions. 478-483 - Michael E. Shin, Taeghyun Kang, Hassan Gomaa:

Secure Software Architectural Patterns Designed with Secure Connectors. 484-491 - Ciprian Paduraru, Rares Cristea

, Alin Stefanescu
:
Advancing Security and Data Protection for Smart Home Systems through Blockchain Technologies. 492-499 - Miles Q. Li, Benjamin C. M. Fung:

Interpretable Malware Classification based on Functional Analysis. 500-507 - Christophe Ponsard, Valéry Ramon:

Applying and Extending FEMMP to Select an Adequate MBSE Methodology. 508-515 - Daniel Brahneborg, Wasif Afzal, Saad Mubeen:

Resilient Conflict-free Replicated Data Types without Atomic Broadcast. 516-523 - Giuseppe Lami, Giorgio Oronzo Spagnolo:

A Lightweight Software Product Quality Evaluation Method. 524-531 - Lavinia Egidi, Paola Giannini, Lorenzo Ventura:

Multiparty-session-types Coordination for Core Erlang. 532-541 - Manuela Andreea Petrescu

, Adrian Sterca:
Agile Methodology in Online Learning and How It Can Improve Communication: A Case Study. 542-549 - Christophe Ponsard, Ward Desmet:

A SWOT Analysis of Software Technologies for Driving Museum Digital Transformation. 550-556 - Andrea Delgado, Daniel Calegari

:
Process and Organizational Data Integration from BPMS and Relational/NoSQL Sources for Process Mining. 557-566 - Sylvain Lejamble, Ilham Alloui, Sébastien Monnet, Flavien Vernier:

A New Software Architecture for the Wise Object Framework: Multidimensional Separation of Concerns. 567-574
Foundational and Trigger Technologies
- Mohammed Aissaoui, Chiraz Houaidia, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane:

Dynamic Slotted Network Coding Protocol. 579-590 - Imene Guerfi

, Lobna Kriaa, Leïla Azouz Saïdane:
Towards Automatic Block Size Tuning for Image Processing Algorithms on CUDA. 591-601 - Anwer Slimi, Henri Nicolas, Mounir Zrigui:

Hybrid Time Distributed CNN-transformer for Speech Emotion Recognition. 602-611 - Mourad Ellouze, Seifeddine Mechti, Lamia Hadrich Belguith

:
Deep Learning CNN-LSTM Approach for Identifying Twitter Users Suffering from Paranoid Personality Disorder. 612-621 - Enes Bilgin, Tolga Ovatman:

Coordinated Access to Shared Data Sources for Geo-replicated State Machines. 625-629 - Maroua Idi

, Sana Younès, Riadh Robbana:
Performance Evaluation of Call Admission Control Strategy in Cloud Radio Access Network using Formal Methods. 630-640 - Tamara Gunkel, Thomas Hupperich

:
Discovering Vulnerabilities and Patches for Open Source Security. 641-648 - Henry Hosseini

, Julian Rengstorf, Thomas Hupperich
:
Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned? 649-656 - Peter Schneider-Kamp

:
Approximate Dictionary Searching at a Scale using Ternary Search Trees and Implicit Levenshtein Automata. 657-662

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














