


default search action
20th SERA 2022: Las Vegas, NV, USA
- Juyeon Jo, Yeong-Tae Song, Lin Deng, Junghwan John Rhee:
20th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2022, Las Vegas, NV, USA, May 25-27, 2022. IEEE 2022, ISBN 978-1-6654-8350-6 - Haeng-Kon Kim:
IOT (Internet of Things) Applications and Current Issues in Korea: Keynote Address. 1 - Hyun Yeo:
Smart Farming Technology Review: Keynote Address. 2 - Matthew Sands, Jongyeop Kim, Jinki Kim
:
Output-only Structural Damage Detection via Enhanced Random Vibration Analysis using LSTM/GRU model. 3-9 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:
Concept of the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI. 10-15 - Alper Tolga Kocatas, Ali Hikmet Dogru:
Enhancing UML Connectors with Behavioral Specifications. 16-21 - Seongsoo Kim, Yiming Ji, Jongyeop Kim, Eric W. Montie:
Dolphin Whistle Visualization Framework: MySQL Query Approach. 22-29 - Prateek Gupta:
Introduction to Imperative Code Execution Machine - a framework for sustainable Salesforce application development. 30-38 - Hasnain Ali
, Syed Omer Gilani
, Muhammad Jawad Khan, Asim Waris
, Muazzam Ali Khan Khattak, Mohsin Jamil
:
Predicting Episodic Video Memorability using Deep Features Fusion Strategy. 39-46 - Nader Kesserwan, Jameela Al-Jaroodi, Nader Mohamed, Imad Jawhar:
Automatic Detection of Interaction Errors. 47-53 - Seongsoo Kim, Hayden Wimmer, Jongyeop Kim:
Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet. 54-62 - Herig Recalde, Santiago Soria, Diego Vallejo-Huanga
:
Internal Search Engine and Recommender System with Natural Language Processing in PaaS. 63-69 - Amrit Rajbhandari, Minhaz F. Zibran, Farjana Z. Eishita:
Security Versus Performance Bugs: How Bugs are Handled in the Chromium Project. 70-76 - Joshua J. Rodriguez, Minhaz F. Zibran, Farjana Z. Eishita:
Finding the Middle Ground: Measuring Passwords for Security and Memorability. 77-82 - Omotola Adekanbmi, Hayden Wimmer, Jongyeop Kim:
Big Cyber Security Data Analysis with Apache Mahou. 83-90 - Honghe Zhou, Lin Deng
, Weifeng Xu, Wei Yu
, Josh Dehlinger, Suranjan Chakraborty:
Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems. 91-98 - Biodoumoye George Bokolo, GaganDeep Sur, Qingzhong Liu, Fang Yuan, Fan Liang:
Hybrid Analysis Based Cross Inspection Framework for Android Malware Detection. 99-105 - Reem Alfayez
, Yunyan Ding, Robert Winn, Ghaida Alfayez:
What is Discussed About Software Engineering Ethics on Stack Exchange (Q&A) Websites? A Case Study. 106-111 - Sharif Ahmed, Arif Ahmed, Nasir U. Eisty:
Automatic Transformation of Natural to Unified Modeling Language: A Systematic Review. 112-119 - Md. Jobair Hossain Faruk
, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim:
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. 120-127 - Lin Deng
, Bingyang Wei, Jin Guo, Matt Benke, Tyler Howard, Matt Krause, Aman Patel:
Securing Sensitive Data in Java Virtual Machines. 128-131 - Ohoud Al Haqbani, Sultan Alyahya:
Supporting Coordination among Participants in Crowdsourcing Software Design. 132-139 - Prashanta Saha, Upulee Kanewala
:
Using Metamorphic Relations to Improve The Effectiveness of Automatically Generated Test Cases. 140-148 - Fred Guyton, Wei Li, Ling Wang, Ajoy Kumar:
Android Feature Selection based on Permissions, Intents, and API Calls. 149-154 - Anusha Konduru, Zhiyong Shan:
Automated Testing to Detect Status Data Loss in Android Applications. 155-160

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.