default search action
22nd SERA 2024: Honolulu, HI, USA
- Teruhisa Hochin, Jixin Ma, Osamu Mizuno:
22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024, Honolulu, HI, USA, May 30 - June 1, 2024. IEEE 2024, ISBN 979-8-3503-9134-3 - Hyun Yoe:
ICT-based Digital Agriculture. 1 - Fatima Ezzahra Chaabi, Reem Alfayez:
What is Asked About Ionic on Stack Overflow (SO) ? An Empirical Study. 2-7 - John Scebold, Eric Bond, Emily Gray, Jared Ziegler:
Automated Theory Substitution Toward Proof-Driven Software Development. 8-16 - Xianshan Qu, Fei Zuo, Xiaopeng Li, Junghwan Rhee:
Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing Performance. 17-23 - Ryutaro Inoue, Yoshiki Higo:
Improving Accuracy of LLM-based Code Clone Detection U sing Functionally Equivalent Methods. 24-27 - Chihiro Yoshida, Makoto Matsushita, Yoshiki Higo:
Estimating the Difficulty of Programming Problems Using Fine-tuned LLM. 28-34 - Hoyong Lee, Hayeon Park, Chang-Gun Lee:
Adaptive Frequency Cluster-Level Performance Profiler for Multi-Domain Applications. 35-42 - Wataru Otoda, Tetsuya Kanda, Yuki Manabe, Katsuro Inoue, Yoshiki Higo:
SBOM Challenges for Developers: From Analysis of Stack Overflow Questions. 43-46 - Jennifer Kim Jin, Khalil Dajani, Mira Kim, Soo Dong Kim, Bilal Khan, Daniel Hyun Jin:
Reinforcement Learning Architecture for Facial Skin Treatment Recommender. 47-54 - SeongGyeol Park, Ahtae Kim, Sookyung Lee, Haeun Lee, Chayapol Kamyod, Cheong Ghil Kim:
Design of REST API Client for Conversational Agent using Large Language Model with Open API System. 55-58 - Suhan Jiang, Jie Wu, Fei Zuo:
Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy. 59-65 - Jongho Seol, Abhilash Kancharla, Jongyeop Kim:
Enhancing Reliability in Hybrid Cross-Chain Models: Adaptive Thresholds for Performance and Adaptability. 66-72 - Jongho Seol, Jongyeop Kim, Abhilash Kancharla:
Optimizing Cross-Chain DeFi and Smart Contracts in Stochastic Integration. 73-80 - Md. Jobair Hossain Faruk, Masrura Tasnim, Jerry Q. Cheng:
Project-based Learning in Software Engineering Education: Integrating Blockchain-Oriented Repositories in SE Curriculum and Coursework. 81-87 - Xin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang, Fei Zuo:
Revising the Problem of Partial Labels from the Perspective of CNNs' Robustness. 88-93 - Yuqi Song, Xin Zhang, Bokai Yang, Fei Zuo, Xianshan Qu:
A Robust Attention-based Convolutional Neural Network for Monocular Depth Estimation. 94-99 - Saurabh Shinde:
Leveraging Conditional Generative Adversarial Networks for cosmic microwave background separation. 100-106 - Hikaru Kubo, Yoshiki Higo, Shinji Kusumoto:
Revisiting Program Suitability for Fault Localization with Large Dataset and Various Mutation Operators. 107-114 - Nozomi Aoki, Masafumi Yamazaki, Akira Hirai, Mari Yamaoka, Naoto Fukumoto, Akihiko Kasagi, Masato Oguchi:
Performance Analysis of Quantum Computer Simulators Across Different Environments. 115-120 - Seung Jae Kim, Hyun Yoe, Kyeong Il Ko, Meong Hun Lee:
Design of AI-Based Smart Crop Harvesting System. 121-124 - Sangmin Lim, Meong Hun Lee, Hyeon O Choe, Hyun Yoe:
A Study on ARIMA-Based Melon Size Prediction and Monitoring System Design. 125-128 - Tasnim Akter Onisha, Jongyeop Kim, Jongho Seol:
Multi Label Sound Classification using Deep Learning Models. 129-134 - Hong Cheng, Rupesh Konduru:
Multi-Class Label Detection and Bounding Box Regression Using Transformer with a Customized Loss Function. 135-138 - Cemil Emre Yavas, Jongyeop Kim, Lei Chen:
Exploring Flavors Through AI: The Future of Culinary Taste Prediction. 139-147 - Xiujuan Wang, Xiaotong Wu, Haochen Shi, Shuaibing Lu:
Hybrid ASCII Art Extraction Algorithm Based on String Distance. 148-152 - Shariful Alam, Jidong Xiao, Nasir U. Eisty:
Exploiting CPU Clock Modulation for Covert Communication Channel. 153-158 - Shahrzad Sayyafzadeh, Mark Weatherspoon, Jie Yan, Hongmei Chi:
Securing Against Deception: Exploring Phishing Emails Through ChatGPT and Sentiment Analysis. 159-165 - Sharif Ahmed, Rey Ortiz, Nasir U. Eisty:
Decade-long Utilization Patterns of ICSE Technical Papers and Associated Artifacts. 166-173 - Chijung Jung, Yung Ryn Choe, Junghwan Rhee, Yonghwi Kwon:
Automatic Configurator to Prevent Attacks for Azure Cloud System. 174-181 - Nour Neifar, Achraf Ben-Hamadou, Afef Mdhaffar, Mohamed Jmaiel:
DiffECG: A Versatile Probabilistic Diffusion Model for ECG Signals Synthesis. 182-188 - Rui Alves, José Rufino:
Leveraging Shared Accelerators in Kubernetes Clusters with rOpenCL. 189-192 - Takuya Nakata, Sinan Chen, Sachio Saiki, Masahide Nakamura:
A Study of Efficient Needs-Based Service Development Using Software Upcycling. 193-198 - Hikaru Tomita, Mariko Sasakura, Kinari Nishiura, Hiroki Inayoshi, Akito Monden:
Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing System. 199-205 - Toru Nakamichi, Kinari Nishiura, Mariko Sasakura, Akito Monden:
An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library Systems. 206-211 - Masaki Kaneda, Sinan Chen, Masahide Nakamura, Sachio Saiki:
Long-Term Fine-grained Forecasts of Emergency Demand Using EMS Big Data and Regional Mesh Population Estimates. 212-217 - Takeshi Yoshida, Sinan Chen, Masahide Nakamura, Sachio Saiki:
Implementing of a Remote Task Execution Service for Automated Management of Hybrid Meeting Spaces. 218-223 - Hiro Okamoto, Sinan Chen, Masahide Nakamura, Sachio Saiki:
Proposal for a Memory Impairment Support Service Integrating Voice Dialogue Agents and ChatGPT*. 224-229 - Raiki Saito, Sinan Chen, Sachio Saiki, Masahide Nakamura:
Evaluating Recognition AI and Personal Memories Using Time-Series Images in Daily Activities. 230-236 - Ruksit Rojpaisarnkit, Hathaichanok Damrongsiri, Christoph Treude, Ali Ouni, Raula Gaikovina Kula:
Characterising Contributions that Coincide with Vulnerability Mitigation in NPM Libraries. 237-242 - Supatsara Wattanakriengkrai, Christoph Treude, Raula Gaikovina Kula:
Contributing Back to the Ecosystem: A User Survey of NPM Developers. 243-248 - Vittunyuta Maeprasart, Ali Ouni, Raula Gaikovina Kula:
Drop it All or Pick it Up? How Developers Responded to the Log4JShell Vulnerability. 249-254 - Anwesha Nag, Takaaki Goto, Subhankar Roy, Partha Ghosh:
Need of Public-Private Healthcare Collaboration for Managing Seasonal Dengue Fever in West Bengal. 255-260 - Partha Ghosh, Arnab Charit, Hindol Banerjee, Debanwesa Bandhu, Agniv Ghosh, Ankita Pal, Takaaki Goto, Soumya Sen:
A Machine Learning Based Automated Model for Managing Student Dropout. 261-266 - Chase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Sergiu M. Dascalu, Frederick C. Harris Jr.:
A Spatial Data Pipeline for Streaming Smart City Data. 267-272 - Chase D. Carthen, Araam Zaremehrjardi, Zachary Estreito, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu:
SpeciServe. a gRPC Infrastructure Concept. 273-276 - Hossein Jamali, Sergiu M. Dascalu, Frederick C. Harris Jr.:
AI-Driven Analysis and Prediction of Energy Consumption in NYC's Municipal Buildings. 277-283 - Momoka Shiraishi, Haru Okazaki, Seiichi Serikawa, Yuhki Kitazono:
Proposal of Automatic Sirocco Fan Washing System. 284-289 - Yangyang Qian, Koki Hayakawa, Seiji Nishifuji, Shenglin Mu, Shota Nakashima:
Segmentation Method of Boxed Lunch Images by Weight Optimization Using Color Texture Dissimilarity. 290-294 - Motoi Nakao, Yuhei Oomachi:
Observation and Evaluation for Individual Student Using Learning Analytics of Software Programing and Functional Questionnaire. 295-299 - Motoi Nakao, Yuhei Oomachi, Michiko Matsuda:
Extraction and Application of Introspection using Lego® Serious Play® Combined with Software Method. 300-303 - Yuya Yokoyama:
Using 2-gram to Detect Potential Appropriate Respondents to Questions at Q&A Sites. 304-309 - Teruhisa Hochin:
Revised Transition Method in Impression Spaces for Multimedia Positive Computing. 310-314 - Teruhisa Hochin, Tran Thi Bich Lien:
Applying Impression Evaluation Method by Space to Multimedia Data Retrieval Using Impression Words. 316-321 - Teruhisa Hochin:
Clarifying Specification Semantics of Impression Evaluation Method by Space Based on Peaks. 322-327 - Daiki Yokoyama, Kinari Nishiura, Akito Monden:
Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPT. 328-333 - Juntong Hong, Eunjong Choi, Kinari Nishiura, Osamu Mizuno:
Global Alignment Learning for Code Search. 334-339 - Soshi Inoue, Kinari Nishiura, Eunjong Choi, Osamu Mizuno:
Analyzing the Inpact of Formal Methods on Isuue Trends Using BERTopic. 340-345 - Kaoru Yokogawa, Masashi Hiroishi, Sousuke Arnasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Comparative Study on COSMIC FP Approximation with Deep Learning and Conventional Machine Learning. 346-351 - Pattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models. 352-355 - Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names. 356-361 - Naruki Shirahama, Shinichi Kondo, Keiji Matsumoto, Kenji Moriya, Naofumi Nakaya, Kazuhiro Koshi, Satoshi Watanabe:
Quantitative Analysis of Conversational Response Nuances Using Visual Analog Scale, Data Visualization, and Clustering. 362-367 - Satoshi Watanabe, Naofumi Nakaya, Yuji Matsumoto, Naruki Shirahama:
A Study of the Distribution Between Visual Analog Scale and Likert Scale for Subjective Evaluation of "Like-Dislike". 368-372 - Naofumi Nakaya, Mutsuki Koizumi, Satoshi Watanabe, Naruki Shirahama, Takayuki Abe, Akihiro Watanabe:
A Study on the Generation of Spectrogram for the Detection of Venous Needle Dislodgement by Image Recognition Using Machine Learning. 373-376 - Takanori Matsuzaki, Shinjo Kato, Yoshihiro Asano, Yuga Sako, Kozo Horiuchi, Hiroshi Shiratsuchi:
Evaluation of Machine Tool Operating State Estimation using Channel State Information. 377-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.