Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019, Revised Selected Papers

Automated extraction of semantic information from textual descriptions can be implemented by processing results of application of Stanford CoreNLP tools. This paper presents a sequence of processing steps and initial results of their application for two examples of a description of system’s functionality. The processing steps allow identifying main functional characteristics of the system and its operational domain. Results obtained as a result of application of the steps are compared with data obtained as a result of analysis by a developer. Application of Stanford CoreNLP parsers in certain cases can produce errors and can influence results of further processing. The comparison of the two results sets showed that variability of language constructs in descriptions affects an amount of implicitly expressed knowledge. Nevertheless, results of this research can be used as a start point of automated text processing for creation of analysis models.

[1]  Anas N. Al-Rabadi,et al.  A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .

[2]  Maurice H. Halstead,et al.  Elements of software science , 1977 .

[3]  Barbara G. Ryder,et al.  Constructing the Call Graph of a Program , 1979, IEEE Transactions on Software Engineering.

[4]  Roger S. Pressman,et al.  Software Engineering: A Practitioner's Approach , 1982 .

[5]  Tom DeMarco,et al.  Controlling Software Projects: Management, Measurement, and Estimates , 1986 .

[6]  G. Guyatt,et al.  Clinical Prediction Rules , 2004 .

[7]  David Harel,et al.  Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..

[8]  Gautam Mitra,et al.  Mathematical Models for Decision Support , 1987, NATO ASI Series.

[9]  Amnon Naamad,et al.  Statemate: a working environment for the development of complex reactive systems , 1988, ICSE '88.

[10]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[11]  Steven L. Tanimoto,et al.  VIVA: A visual language for image processing , 1990, J. Vis. Lang. Comput..

[12]  M. Field,et al.  Guidelines for Clinical Practice: From Development to Use , 1992 .

[13]  Sallie M. Henry,et al.  Maintenance metrics for the object oriented paradigm , 1993, [1993] Proceedings First International Software Metrics Symposium.

[14]  Michael Löwe,et al.  Algebraic Approach to Single-Pushout Graph Transformation , 1993, Theor. Comput. Sci..

[15]  Chris F. Kemerer,et al.  A Metrics Suite for Object Oriented Design , 2015, IEEE Trans. Software Eng..

[16]  Michael von der Beeck,et al.  A Comparison of Statecharts Variants , 1994, FTRTFT.

[17]  Olly Gotel,et al.  An analysis of the requirements traceability problem , 1994, Proceedings of IEEE International Conference on Requirements Engineering.

[18]  Martin Hitz,et al.  Measuring coupling and cohesion in object-oriented systems , 1995 .

[19]  H.-M. Hanisch,et al.  Net condition/event systems with multiple condition outputs , 1995, Proceedings 1995 INRIA/IEEE Symposium on Emerging Technologies and Factory Automation. ETFA'95.

[20]  Victor R. Basili,et al.  A Validation of Object-Oriented Design Metrics as Quality Indicators , 1996, IEEE Trans. Software Eng..

[21]  H.-M. Hanisch,et al.  Modeling of PLC behavior by means of timed net condition/event systems , 1997, 1997 IEEE 6th International Conference on Emerging Technologies and Factory Automation Proceedings, EFTA '97.

[22]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[23]  Third Expert Panel on theDiagnosis,et al.  Expert Panel Report 3: Guidelines for the Diagnosis and Management of Asthma , 1997 .

[24]  R. Fitzpatrick,et al.  The Parkinson's Disease Questionnaire (PDQ-39): development and validation of a Parkinson's disease summary index score. , 1997, Age and ageing.

[25]  Victor R. Basili,et al.  Measuring the Impact of Reuse on Quality and Productivity in Object-Oriented Systems , 1998 .

[26]  René L. Krikhaar,et al.  A relational approach to support software architecture analysis , 1998, Softw. Pract. Exp..

[27]  James Riely,et al.  Resource Access Control in Systems of Mobile Agents , 2002, HLCL.

[28]  Eric Badouel,et al.  Reconfigurable Nets, a Class of High Level Petri Nets Supporting Dynamic Changes , 1998 .

[29]  Rob Pooley,et al.  The unified modelling language , 1999, IEE Proc. Softw..

[30]  Paulo César Masiero,et al.  Mutation testing applied to validate specifications based on statecharts , 1999, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443).

[31]  M. Cabana,et al.  Why don't physicians follow clinical practice guidelines? A framework for improvement. , 1999, JAMA.

[32]  J. Wootton Clinical practice guidelines. , 1999, Journal of women's health & gender-based medicine.

[33]  Luca Cardelli,et al.  Secrecy and Group Creation , 2000, CONCUR.

[34]  Norman E. Fenton,et al.  Software metrics: roadmap , 2000, ICSE '00.

[35]  S. Marriott,et al.  Disseminating healthcare information: getting the message across , 2000, Quality in health care : QHC.

[36]  M. Cabana,et al.  Barriers pediatricians face when using asthma practice guidelines. , 2000, Archives of pediatrics & adolescent medicine.

[37]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[38]  Stephan Merz,et al.  Model Checking , 2000 .

[39]  Andrew W. Moore,et al.  X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.

[40]  Nick Mitchell,et al.  Visualizing the Execution of Java Programs , 2001, Software Visualization.

[41]  William G. Griswold,et al.  An Overview of AspectJ , 2001, ECOOP.

[42]  Alastair Baker,et al.  Crossing the Quality Chasm: A New Health System for the 21st Century , 2001, BMJ : British Medical Journal.

[43]  Rudolf K. Keller,et al.  Software visualization tools: survey and analysis , 2001, Proceedings 9th International Workshop on Program Comprehension. IWPC 2001.

[44]  Nagraj Balakrishnan,et al.  Introduction to configuration management , 2001 .

[45]  Jean Bézivin,et al.  Towards a precise definition of the OMG/MDA framework , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).

[46]  Khaled El Emam,et al.  The Confounding Effect of Class Size on the Validity of Object-Oriented Metrics , 2001, IEEE Trans. Software Eng..

[47]  Giuliano Antoniol,et al.  Recovering Traceability Links between Code and Documentation , 2002, IEEE Trans. Software Eng..

[48]  S. Krishnan,et al.  2 XLANG : Web Services for Business Process Design , 2002 .

[49]  Joseph S. Dumas,et al.  Usability in practice: formative usability evaluations - evolution and revolution , 2002, CHI Extended Abstracts.

[50]  Christopher S. G. Khoo,et al.  The Many Facets of the Cause-Effect Relation , 2002 .

[51]  Jan Jürjens,et al.  UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[52]  Miro Samek,et al.  Practical statecharts in C/C++: Quantum programming for embedded systems , 2002 .

[53]  Roberto Battiti,et al.  Location-aware computing: a neural network model for determining location in wireless LANs , 2002 .

[54]  Anna Derezinska Object-oriented mutation to assess the quality of tests , 2003, 2003 Proceedings 29th Euromicro Conference.

[55]  Kent L. Beck,et al.  Test-driven Development - by example , 2002, The Addison-Wesley signature series.

[56]  Mitchel Resnick,et al.  Real-time programming and the big ideas of computational literacy , 2003 .

[57]  Stéphane Ducasse,et al.  Polymetric Views - A Lightweight Visual Approach to Reverse Engineering , 2003, IEEE Trans. Software Eng..

[58]  Bart Du Bois,et al.  Describing the impact of refactoring on internal program quality , 2003 .

[59]  J. L. Roux An Introduction to the Kalman Filter , 2003 .

[60]  W. Lim,et al.  Defining community acquired pneumonia severity on presentation to hospital: an international derivation and validation study , 2003, Thorax.

[61]  Rainer Koschke,et al.  Journal of Software Maintenance and Evolution: Research and Practice Software Visualization in Software Maintenance, Reverse Engineering, and Re-engineering: a Research Survey , 2022 .

[62]  Richard N. Shiffman,et al.  Model Formulation: Bridging the Guideline Implementation Gap: A Systematic, Document-Centered Approach to Guideline Implementation , 2004, J. Am. Medical Informatics Assoc..

[63]  Kim G. Larsen,et al.  A Tutorial on Uppaal , 2004, SFM.

[64]  Michele Lanza CodeCrawler - polymetric views in action , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..

[65]  Yann-Gaël Guéhéneuc,et al.  A reverse engineering tool for precise class diagrams , 2004, CASCON.

[66]  Taghi M. Khoshgoftaar,et al.  Unsupervised learning for expert-based software quality estimation , 2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings..

[67]  Taghi M. Khoshgoftaar,et al.  Analyzing software measurement data with clustering techniques , 2004, IEEE Intelligent Systems.

[68]  Tibor Gyimóthy,et al.  Empirical validation of object-oriented metrics on open source software for fault prediction , 2005, IEEE Transactions on Software Engineering.

[69]  M Mernik,et al.  When and how to develop domain-specific languages , 2005, CSUR.

[70]  Michael Havey,et al.  Essential business process modeling , 2005 .

[71]  Julian Rathke,et al.  safeDpi: a language for controlling mobile code , 2005, Acta Informatica.

[72]  Jean-Marc Jézéquel,et al.  Code generation from UML models with semantic variation points , 2005, MoDELS'05.

[73]  Janice Singer,et al.  NavTracks: supporting navigation in software maintenance , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).

[74]  Radu Marinescu,et al.  Measurement and Quality in Object-Oriented Design , 2005, ICSM.

[75]  A. Wasowski Code Generation and Model Driven Development for Constrained Embedded Sotware , 2005 .

[76]  Greg Hamerly,et al.  PG-means: learning the number of clusters in data , 2006, NIPS.

[77]  M. Kosinski,et al.  Asthma Control Test: reliability, validity, and responsiveness in patients not previously followed by asthma specialists. , 2006, The Journal of allergy and clinical immunology.

[78]  Ståle Walderhaug,et al.  Towards a Generic Solution for Traceability in MDD , 2006 .

[79]  Xavier Franch,et al.  Extending the ISO/IEC 9126-1 quality model with non-technical factors for COTS components selection , 2006, WoSQ '06.

[80]  Daniele Gorla,et al.  Role-based access control for a distributed calculus , 2006, J. Comput. Secur..

[81]  Julia Rubin,et al.  Model traceability , 2006, IBM Syst. J..

[82]  Douglas C. Schmidt,et al.  Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.

[83]  René Santaolaya Salgado,et al.  The Conceptual Coupling Metrics for Object-Oriented Systems , 2006, 2006 22nd IEEE International Conference on Software Maintenance.

[84]  Rocco Moretti,et al.  Model Driven Architecture (MDA) , 2007 .

[85]  M. Trakhtenbrot,et al.  New Mutations for Evaluation of Specification and Implementation Levels of Adequacy in Testing of Statecharts Models , 2007, Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007).

[86]  Andrew D. Gordon,et al.  A Type Discipline for Authorization in Distributed Systems , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[87]  Matthew Hennessy,et al.  A distributed Pi-calculus , 2007 .

[88]  Anna Derezińska,et al.  Code Generation and Execution Framework for UML 2.0 Classes and State Machines , 2007 .

[89]  Joost Visser,et al.  A Practical Model for Measuring Maintainability , 2007, 6th International Conference on the Quality of Information and Communications Technology (QUATIC 2007).

[90]  Yan Zhang,et al.  System Modification Case Studies , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[91]  R. Smith,et al.  An Overview of the Tesseract OCR Engine , 2007, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).

[92]  Ajay Chander,et al.  JavaScript instrumentation for browser security , 2007, POPL '07.

[93]  Erika Asnina,et al.  Computation Independent Modeling within the MDA , 2007, IEEE International Conference on Software-Science, Technology & Engineering (SwSTE'07).

[94]  Barbara G. Ryder,et al.  Heuristic ranking of java program edits for fault localization , 2007, ISSTA '07.

[95]  Frederick P. Brooks,et al.  "No silver bullet" reloaded: retrospective on "essence and accidents of software engineering" , 2007, OOPSLA '07.

[96]  Henrik Kniberg,et al.  Scrum and XP from the Trenches: Enterprise Software Development , 2007 .

[97]  Philippe Dugerdil,et al.  EvoSpaces: 3D Visualization of Software Architecture , 2007, SEKE.

[98]  Yan Zhang,et al.  CTL Model Update for System Modifications , 2011, J. Artif. Intell. Res..

[99]  A. Laukaitis,et al.  Investigation of Electromagnetic Wave Absorber Based on Carbon Fiber Reinforced Aerated Concrete, Using Time-Domain Method , 2008 .

[100]  Ayse Basar Bener,et al.  Software Defect Prediction Using Call Graph Based Ranking (CGBR) Framework , 2008, 2008 34th Euromicro Conference Software Engineering and Advanced Applications.

[101]  Christel Baier,et al.  Principles of model checking , 2008 .

[102]  Adriana B. Compagnoni,et al.  Role-based access control for boxed ambients , 2008, Theor. Comput. Sci..

[103]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[104]  Enrico Biermann,et al.  Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets , 2008, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[105]  Vitus S. W. Lam On pi-Calculus Semantics as a Formal Basis for UML Activity Diagrams , 2008, Int. J. Softw. Eng. Knowl. Eng..

[106]  J. Jankovic,et al.  Movement Disorder Society‐sponsored revision of the Unified Parkinson's Disease Rating Scale (MDS‐UPDRS): Scale presentation and clinimetric testing results , 2008, Movement disorders : official journal of the Movement Disorder Society.

[107]  Anneke Kleppe,et al.  Software Language Engineering: Creating Domain-Specific Languages Using Metamodels , 2008 .

[108]  Rüdiger Lincke,et al.  Comparing software metrics tools , 2008, ISSTA '08.

[109]  Andrew D. Gordon,et al.  Refinement Types for Secure Implementations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[110]  Michael Backes,et al.  Type-checking zero-knowledge , 2008, CCS.

[111]  Iakovos S. Venieris,et al.  Model-driven development of composite web applications , 2008, iiWAS.

[112]  Iakovos S. Venieris,et al.  PCP: privacy-aware context profile towards context-aware application development , 2008, iiWAS.

[113]  Nicolas Anquetil,et al.  A model-driven traceability framework for software product lines , 2010, Software & Systems Modeling.

[114]  John Mylopoulos,et al.  Design Requirements Engineering: A Ten-Year Perspective , 2009 .

[115]  Frank Budinsky,et al.  EMF: Eclipse Modeling Framework 2.0 , 2009 .

[116]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[117]  Yngve Lamo,et al.  Dynamic Content Manager - A New Conceptual Model for E-Learning , 2009, WISM.

[118]  Benjamin Livshits,et al.  GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code , 2009, USENIX Security Symposium.

[119]  Jin-hua Li,et al.  Mutation Analysis for Testing Finite State Machines , 2009, 2009 Second International Symposium on Electronic Commerce and Security.

[120]  Patricia Bouyer,et al.  Model-checking Timed Temporal Logics , 2009, M4M.

[121]  Patrick Ogao,et al.  Evaluation of software visualization tools: Lessons learned , 2009, 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis.

[122]  Welf Löwe,et al.  Quantitative Evaluation of Software Quality Metrics in Open-Source Projects , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[123]  Ilka Philippow,et al.  Getting back to basics: Promoting the use of a traceability information model in practice , 2009, 2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering.

[124]  Anna Derezinska,et al.  Interpretation of History Pseudostates in Orthogonal States of UML State Machines , 2009, NGITS.

[125]  A. Hasman,et al.  Effect of guideline based computerised decision support on decision making of multidisciplinary teams: cluster randomised trial in cardiac rehabilitation , 2009, BMJ : British Medical Journal.

[126]  Eric S. K. Yu,et al.  A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.

[127]  Jeffrey P. Landry,et al.  A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.

[128]  Anna Derezinska,et al.  Object-Oriented Testing Capabilities and Performance Evaluation of the C# Mutation System , 2009, CEE-SET.

[129]  Adrian Rutle,et al.  A Diagrammatic Formalisation of MOF-Based Modelling Languages , 2009, TOOLS.

[130]  Peter Thiemann,et al.  Type Analysis for JavaScript , 2009, SAS.

[131]  Michele Bugliesi,et al.  A type system for Discretionary Access Control , 2009, Math. Struct. Comput. Sci..

[132]  Martin Kardos,et al.  Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA) , 2010 .

[133]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[134]  Alexander Sahm,et al.  Assisting engineers in switching artifacts by using task semantic and interaction history , 2010, RSSE '10.

[135]  Mariangiola Dezani-Ciancaglini,et al.  Types for Role-Based Access Control of Dynamic Web Data , 2010, WFLP.

[136]  Nancy A. Day,et al.  Code generation for a family of executable modelling notations , 2010, Software & Systems Modeling.

[137]  Mark B. Trakhtenbrot Implementation-Oriented Mutation Testing of Statechart Models , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.

[138]  Evangelos Theodoridis,et al.  Code Quality Evaluation Methodology Using The ISO/IEC 9126 Standard , 2010, ArXiv.

[139]  Scott R. Klemmer,et al.  What would other programmers do: suggesting solutions to error messages , 2010, CHI.

[140]  Richard N. Taylor,et al.  Software traceability with topic modeling , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.

[141]  Lionel C. Briand,et al.  An object-oriented high-level design-based class cohesion metric , 2010, Inf. Softw. Technol..

[142]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[143]  Peter Kapec Visualizing software artifacts using hypergraphs , 2010, SCCG.

[144]  John A. Clark,et al.  Semantic Mutation Testing , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.

[145]  Diane J. Cook,et al.  Human Activity Recognition and Pattern Discovery , 2010, IEEE Pervasive Computing.

[146]  Mohamed Khalgui NCES-based modelling and CTL-based verification of reconfigurable embedded control systems , 2010, Comput. Ind..

[147]  Armands Slihte,et al.  Transforming Textual use Cases to a Computation Independent Model , 2010, MDA/MTDD.

[148]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[149]  Erika Asnina,et al.  Computation Independent Models: Bridging Problem and Solution Domains , 2010, MDA/MTDD.

[150]  Adrian Rutle,et al.  Diagram predicate framework: A formal approach to MDE , 2010 .

[151]  Cong Jin,et al.  Applications of Support Vector Mathine and Unsupervised Learning for Predicting Maintainability Using Object-Oriented Metrics , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[152]  Barbara Kitchenham,et al.  What's up with software metrics? - A preliminary mapping study , 2010, J. Syst. Softw..

[153]  Ketil Stølen,et al.  Model-Driven Risk Analysis - The CORAS Approach , 2010 .

[154]  Michael Carl Tschantz,et al.  On the Semantics of Purpose Requirements in Privacy Policies , 2011, ArXiv.

[155]  Zhiwu Li,et al.  Reconfigurable Multiagent Embedded Control Systems: From Modeling to Implementation , 2011, IEEE Transactions on Computers.

[156]  Peter A. Dinda,et al.  Indoor localization without infrastructure using the acoustic background spectrum , 2011, MobiSys '11.

[157]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[158]  Shahid Ali,et al.  Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[159]  Christine Julien,et al.  Comparative evaluation of Received Signal-Strength Index (RSSI) based indoor localization techniques for construction jobsites , 2011, Adv. Eng. Informatics.

[160]  Laurie A. Williams,et al.  Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.

[161]  Francesco Benzi,et al.  Electricity Smart Meters Interfacing the Households , 2011, IEEE Transactions on Industrial Electronics.

[162]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[163]  P. Densen Challenges and opportunities facing medical education. , 2011, Transactions of the American Clinical and Climatological Association.

[164]  Mark Harman,et al.  An Analysis and Survey of the Development of Mutation Testing , 2011, IEEE Transactions on Software Engineering.

[165]  Armands Slihte,et al.  Knowledge Integration for Domain Modeling , 2011, MDA/MDSD.

[166]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[167]  Erika Asnina,et al.  Topological Functioning Model as a CIM-Business Model , 2011, Model-Driven Domain Analysis and Software Development.

[168]  H. Klocker,et al.  Importance of prostate volume in the European Randomised Study of Screening for Prostate Cancer (ERSPC) risk calculators: results from the prostate biopsy collaborative group , 2011, World Journal of Urology.

[169]  Rajkumar Buyya,et al.  Cloud Computing Principles and Paradigms , 2011 .

[170]  Erika Asnina,et al.  Is Modeling a Treatment for the Weakness of Software Engineering? , 2011, Model-Driven Domain Analysis and Software Development.

[171]  Zhang Kun,et al.  Automatic meter reading system , 2011 .

[172]  Mohamed Khalgui,et al.  Automatic NCES-based specification and SESA-based verification of feasible control components in benchmark production systems , 2011, Int. J. Model. Identif. Control..

[173]  Håkan Burden,et al.  Executable and Translatable UML -- How Difficult Can it Be? , 2011, 2011 18th Asia-Pacific Software Engineering Conference.

[174]  Taghi M. Khoshgoftaar,et al.  Choosing software metrics for defect prediction: an investigation on feature selection techniques , 2011, Softw. Pract. Exp..

[175]  I. Rubinstein Regulating Privacy by Design , 2011 .

[176]  Reihaneh Safavi-Naini,et al.  Towards defining semantic foundations for purpose-based privacy policies , 2011, CODASPY '11.

[177]  Ken W. Collier,et al.  Agile Analytics: A Value-Driven Approach to Business Intelligence and Data Warehousing , 2011 .

[178]  E. Höfig,et al.  Interpretation of Behaviour Models at Runtime: Performance Benchmark and Case Studies , 2011 .

[179]  Lennart E. Nacke,et al.  From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.

[180]  Erika Asnina,et al.  Topological Modeling for Model-Driven Domain Analysis and Software Development: Functions and Architectures , 2011, Model-Driven Domain Analysis and Software Development.

[181]  Suhaimi Ibrahim,et al.  An evaluation of requirements management and traceability tools , 2011 .

[182]  José R. Casar,et al.  An energy-efficient strategy for combined RSS-PDR indoor localization , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[183]  Kenton O'Hara,et al.  Gamification. using game-design elements in non-gaming contexts , 2011, CHI Extended Abstracts.

[184]  Hoon-Jae Lee,et al.  Indoor Location Tracking Using Received Signal Strength Indicator , 2011 .

[185]  Yajnaseni Dash,et al.  Maintainability Prediction of Object Oriented Software System by Using Artificial Neural Network Approach , 2012 .

[186]  Eladio Domínguez,et al.  A systematic review of code generation proposals from state machine specifications , 2012, Inf. Softw. Technol..

[187]  Walid Maalej,et al.  Automatically detecting developer activities and problems in software development work , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[188]  Erika Asnina,et al.  System Thinking for Formal Analysis of Domain Functioning in the Computation Independent Model , 2012, ENASE.

[189]  Anna Dereziska,et al.  Interpretation Problems in Code Generation from UML State Machines - a Comparative Study , 2012 .

[190]  N. S. A. A. Bakar,et al.  Validation of measurement tools to extract metrics from open source projects , 2012, 2012 IEEE Conference on Open Systems.

[191]  Michael Carl Tschantz,et al.  Formalizing and Enforcing Purpose Restrictions in Privacy Policies , 2012, 2012 IEEE Symposium on Security and Privacy.

[192]  Tom Mens,et al.  On the Complexity of Software Systems , 2012, Computer.

[193]  G. Thompson Clinical Scoring Systems in the Management of Suspected Appendicitis in Children , 2012 .

[194]  Ammar Ahmed E. Elhadi,et al.  Malware detection based on hybrid signature behavior application programming interface call graph , 2012 .

[195]  Adrian Rutle,et al.  A formal approach to the specification and transformation of constraints in MDE , 2012, J. Log. Algebraic Methods Program..

[196]  Martin Schäf,et al.  Grey-box GUI Testing: Efficient Generation of Event Sequences , 2012, ArXiv.

[197]  Qian Dong,et al.  Evaluation of the reliability of RSSI for indoor localization , 2012, 2012 International Conference on Wireless Communications in Underground and Confined Areas.

[198]  Cheng-Long Chuang,et al.  High-Precision RSSI-based Indoor Localization Using a Transmission Power Adjustment Strategy for Wireless Sensor Networks , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[199]  Gareth Halfacree,et al.  Raspberry Pi User Guide , 2012 .

[200]  Yang Li,et al.  Which Traceability Visualization Is Suitable in This Context? A Comparative Study , 2012, REFSQ.

[201]  Mike Loukides,et al.  What is DevOps , 2012 .

[202]  John W. Rice,et al.  The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education , 2012, Int. J. Gaming Comput. Mediat. Simulations.

[203]  T. Soni Madhulatha,et al.  An Overview on Clustering Methods , 2012, ArXiv.

[204]  Dana Petcu,et al.  MODAClouds: A model-driven approach for the design and execution of applications on multiple Clouds , 2012, 2012 4th International Workshop on Modeling in Software Engineering (MISE).

[205]  Silvia Santini,et al.  Occupancy Detection from Electricity Consumption Data , 2013, BuildSys@SenSys.

[206]  Yi Zhang,et al.  Strategic Traceability for Safety-Critical Projects , 2013, IEEE Software.

[207]  Ana R. Cavalli,et al.  Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols , 2013, Comput. Networks.

[208]  Arie van Deursen,et al.  Evaluating usefulness of software metrics: An industrial experience report , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[209]  Hannes Schwarz,et al.  Model-Driven Software Development , 2013 .

[210]  Li Lin,et al.  Smart Meters in Smart Grid: An Overview , 2013, 2013 IEEE Green Technologies Conference (GreenTech).

[211]  N. Malik,et al.  Experimental study and design of smart energy meter for the smart grid , 2013, 2013 International Renewable and Sustainable Energy Conference (IRSEC).

[212]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[213]  Hamid Sharif,et al.  An efficient security protocol for advanced metering infrastructure in smart grid , 2013, IEEE Network.

[214]  Olfa Mosbahi,et al.  R-TNCES: A Novel Formalism for Reconfigurable Discrete Event Control Systems , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[215]  Nan Niu,et al.  Supporting requirements traceability through refactoring , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[216]  Sean McDirmid,et al.  Usable live programming , 2013, Onward!.

[217]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[218]  Nataliia Bielova Survey on JavaScript security policies and their enforcement mechanisms in a web browser , 2013, J. Log. Algebraic Methods Program..

[219]  Benjamin Livshits,et al.  Practical static analysis of JavaScript applications in the presence of frameworks and libraries , 2013, ESEC/FSE 2013.

[220]  Bernd Brügge,et al.  Monitoring user interactions for supporting failure reproduction , 2013, 2013 21st International Conference on Program Comprehension (ICPC).

[221]  Bernhard Turban,et al.  Tool-Based Requirement Traceability between Requirement and Design Artifacts , 2013, Springer Fachmedien Wiesbaden.

[222]  Anna Derezińska,et al.  Towards C# Application Development Using UML State Machines: A Case Study , 2013 .

[223]  Jorge Cabral,et al.  Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[224]  Ariel Farkash,et al.  A Model-Driven Approach to Clinical Practice Guidelines Representation and Evaluation Using Standards , 2013, MedInfo.

[225]  Eelco Visser,et al.  DSL Engineering - Designing, Implementing and Using Domain-Specific Languages , 2013 .

[226]  Konrad Rieck,et al.  Structural detection of android malware using embedded call graphs , 2013, AISec.

[227]  Empirical Characterization of Propagation Path Loss and Performance Evaluation for Co-Site Urban Environment , 2013 .

[228]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[229]  Lionel C. Briand,et al.  Environment modeling and simulation for automated testing of soft real-time embedded software , 2013, Software & Systems Modeling.

[230]  Frank Tip,et al.  Efficient construction of approximate call graphs for JavaScript IDE services , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[231]  Steven L. Tanimoto,et al.  A perspective on the evolution of live programming , 2013, 2013 1st International Workshop on Live Programming (LIVE).

[232]  H. Vincent Poor,et al.  Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.

[233]  Ibrahim Tekin,et al.  Indoor positioning based on global positioning system signals , 2013 .

[234]  Ram Rajagopal,et al.  Smart Meter Driven Segmentation: What Your Consumption Says About You , 2013, IEEE Transactions on Power Systems.

[235]  Prashant J. Shenoy,et al.  Non-Intrusive Occupancy Monitoring using Smart Meters , 2013, BuildSys@SenSys.

[236]  Wilhelm Hasselbring,et al.  Live trace visualization for comprehending large software landscapes: The ExplorViz approach , 2013, 2013 First IEEE Working Conference on Software Visualization (VISSOFT).

[237]  C. Meijer,et al.  The effect of population aging on health expenditure growth: a critical review , 2013, European Journal of Ageing.

[238]  Robert Dabrowski,et al.  Magnify - A new tool for software visualization , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[239]  Lisa Rajbhandari Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management , 2013, 2013 European Intelligence and Security Informatics Conference.

[240]  Saifur Rahman,et al.  Communication network requirements for major smart grid applications in HAN, NAN and WAN , 2014, Comput. Networks.

[241]  Mani B. Srivastava,et al.  Inferring occupancy from opportunistically available sensor data , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[242]  Patrick Mäder,et al.  Software traceability: trends and future directions , 2014, FOSE.

[243]  Timothy Lethbridge,et al.  Enhanced code generation from UML composite state machines , 2014, 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD).

[244]  Tarcísio da Rocha,et al.  Model-based Approach to Automatic Software Deployment in Cloud , 2014, CLOSER.

[245]  Mihai Surdeanu,et al.  The Stanford CoreNLP Natural Language Processing Toolkit , 2014, ACL.

[246]  Tajkia Rahman Toma,et al.  An efficient mechanism of generating call graph for JavaScript using dynamic analysis in web application , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).

[247]  Ulises Martinez-Araiza,et al.  A CTL model repair method for Petri Nets , 2014, 2014 World Automation Congress (WAC).

[248]  Yngve Lamo,et al.  Co-ordination of Multiple Metamodels, with Application to Healthcare Systems , 2014, EUSPN/ICTH.

[249]  Thomas Fritz,et al.  Collecting and Processing Interaction Data for Recommendation Systems , 2014, Recommendation Systems in Software Engineering.

[250]  Michael J. Kavis,et al.  Architecting the Cloud: Design Decisions for Cloud Computing Service Models (Saas, Paas, and Iaas) , 2014 .

[251]  Alexander Serebrenik,et al.  Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods , 2014, 2014 IEEE International Conference on Software Maintenance and Evolution.

[252]  Prashant J. Shenoy,et al.  Combined heat and privacy: Preventing occupancy detection from smart meters , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[253]  Anjana Gosain,et al.  A Survey of Dynamic Program Analysis Techniques and Tools , 2014, FICTA.

[254]  Feng Tian,et al.  Critical review of vendor lock-in and its impact on adoption of cloud computing , 2014, International Conference on Information Society (i-Society 2014).

[255]  David A. Rosenblueth,et al.  CTL update of Kripke models through protections , 2014, Artif. Intell..

[256]  Leszek . Borzemski Information systems architecture and technology : contemporary approaches to design and evaluation of information systems , 2014 .

[257]  Alexander Egyed,et al.  Do developers benefit from requirements traceability when evolving and maintaining a software system? , 2014, Empirical Software Engineering.

[258]  Tracy Hall,et al.  Researcher Bias: The Use of Machine Learning in Software Defect Prediction , 2014, IEEE Transactions on Software Engineering.

[259]  Toni Mastelic,et al.  Towards Uniform Management of Cloud Services by Applying Model-Driven Development , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.

[260]  Zabih Ghassemlooy,et al.  Visible light communications: real time 10 Mb/s link with a low bandwidth polymer light-emitting diode. , 2014, Optics express.

[261]  Indika Perera,et al.  Establishing traceability links among software artefacts , 2014, 2014 14th International Conference on Advances in ICT for Emerging Regions (ICTer).

[262]  Nassim Masoudifar,et al.  Monitoring occupancy and office equipment energy consumption using real-time location system and wireless energy meters , 2014, Proceedings of the Winter Simulation Conference 2014.

[263]  Silvia Santini,et al.  Revealing Household Characteristics from Smart Meter Data , 2014 .

[264]  Elias Yaacoub,et al.  Automatic meter reading in the smart grid using contention based random access over the free cellular spectrum , 2014, Comput. Networks.

[265]  Yang Xiao,et al.  Robust Localization Algorithm Based on the RSSI Ranging Scope , 2015, Int. J. Distributed Sens. Networks.

[266]  Sofiène Tahar,et al.  Formal Verification Methods , 2015 .

[267]  Allaoua Chaoui,et al.  An automatic approach to transform BPMN models to Pi-Calculus , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[268]  Valeriy Vyatkin,et al.  Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse Safe Net Condition/Event Systems , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[269]  P. Schauer,et al.  Development of a sleeve gastrectomy risk calculator. , 2015, Surgery for obesity and related diseases : official journal of the American Society for Bariatric Surgery.

[270]  Ryo Yanase,et al.  Formal verification of dynamically reconfigurable systems , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).

[271]  Chiara Ghidini,et al.  A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies , 2015, STM.

[272]  Anna Derezinska,et al.  Mutation Testing Process Combined with Test-Driven Development in .NET Environment , 2015, DepCoS-RELCOMEX.

[273]  Weidong Xiao,et al.  The meter tells you are at home! Non-intrusive occupancy detection via load curve data , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[274]  Olfa Mosbahi,et al.  GR-TNCES: New extensions of R-TNCES for modelling and verification of flexible systems under energy and memory constraints , 2015, 2015 10th International Joint Conference on Software Technologies (ICSOFT).

[275]  Dominik Engel,et al.  Influence of Data Granularity on Smart Meter Privacy , 2015, IEEE Transactions on Smart Grid.

[276]  Ulises Martinez-Araiza,et al.  CTL model repair for bounded and deadlock free Petri nets , 2015 .

[277]  Andrija Bernik,et al.  Gamification in E-Learning: Introducing Gamified Design Elements into E-Learning Systems , 2015, J. Comput. Sci..

[278]  Mohsen Vakilian,et al.  A Practical Guide to Analyzing IDE Usage Data , 2015, The Art and Science of Analyzing Software Data.

[279]  Wassim Mohamed Boussahel,et al.  Modeling and Verification of Reconfigurable and Energy-Efficient Manufacturing Systems , 2015 .

[280]  James Lyke,et al.  An Introduction to Reconfigurable Systems , 2015, Proceedings of the IEEE.

[281]  Olfa Mosbahi,et al.  Reconfigurable Coordination of Distributed Discrete Event Control Systems , 2015, IEEE Transactions on Control Systems Technology.

[282]  Josune Hernantes,et al.  Infrastructure as a Service and Cloud Technologies , 2015, IEEE Software.

[283]  Nobuko Yoshida,et al.  Protocols by Default - Safe MPI Code Generation Based on Session Types , 2015, CC.

[284]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[285]  Jie Liu,et al.  A realistic evaluation and comparison of indoor location technologies: experiences and lessons learned , 2015, IPSN.

[286]  Wilhelm Hasselbring,et al.  Exploring software cities in virtual reality , 2015, 2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT).

[287]  Mohammad Alshayeb,et al.  Software defect prediction using ensemble learning on selected features , 2015, Inf. Softw. Technol..

[288]  Andrea Bondavalli,et al.  Towards a UML Profile for Privacy-Aware Applications , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[289]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[290]  Frank Tip,et al.  Static analysis of event-driven Node.js JavaScript applications , 2015, OOPSLA.

[291]  J. F. Avila-Tomas,et al.  Effectiveness of a game-based educational strategy e-EDUCAGUIA for implementing antimicrobial clinical practice guidelines in family medicine residents in Spain: a randomized clinical trial by cluster , 2022, BMC medical education.

[292]  Prashant J. Shenoy,et al.  Preventing Occupancy Detection From Smart Meters , 2015, IEEE Transactions on Smart Grid.

[293]  Chris Parnin,et al.  Virtual Reality in Software Engineering: Affordances, Applications, and Challenges , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[294]  J. Antonio García-Macías,et al.  Abnormal Behavioral Patterns Detection from Activity Records of Institutionalized Older Adults , 2015, HBU.

[295]  Valeriy Vyatkin,et al.  Counterexample-guided simulation framework for formal verification of flexible automation systems , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[296]  Christian Neureiter,et al.  Privacy-relevant smart metering use cases , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).

[297]  Zhenyu Na,et al.  Extended Kalman Filter for Real Time Indoor Localization by Fusing WiFi and Smartphone Inertial Sensors , 2015, Micromachines.

[298]  Anurag Dwivedi,et al.  An approach for estimating cyber attack level of effort , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[299]  Maria Spichkova,et al.  Enhancing learning experience by collaborative industrial projects , 2016 .

[300]  Joanna Strug Applying mutation testing for assessing test suites quality at model level , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).

[301]  Matthes Elstermann,et al.  Automatic Tool Support Possibilities for the Text-Based S-BPM Process Modelling Methodology , 2016, S-BPM ONE.

[302]  Yunsick Sung RSSI-Based Distance Estimation Framework Using a Kalman Filter for Sustainable Indoor Computing Environments , 2016 .

[303]  Jaspaljeet Singh Dhillon,et al.  A systematic review of factors influencing the effective use of mHealth apps for self-care , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[304]  Willem F. G. Haselager,et al.  Human SLAM, Indoor Localisation of Devices and Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[305]  Fevzi Belli,et al.  Model-based mutation testing - Approach and case studies , 2016, Sci. Comput. Program..

[306]  Mohamed Khalgui,et al.  ZiZo: A Complete Tool Chain for the Modeling and Verification of Reconfigurable Function Blocks , 2016 .

[307]  Bayu Hendradjaya,et al.  Reverse engineering of source code to sequence diagram using abstract syntax tree , 2016, 2016 International Conference on Data and Software Engineering (ICoDSE).

[308]  Roel Wieringa,et al.  ArgueSecure: Out-of-the-Box Security Risk Assessment , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[309]  R. Simon,et al.  Improvement in Asthma Control Using a Minimally Burdensome and Proactive Smartphone Application. , 2016, The journal of allergy and clinical immunology. In practice.

[310]  Reiner R. Dumke,et al.  Big Data Benefits for the Software Measurement Community , 2016, 2016 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement (IWSM-MENSURA).

[311]  Mohamed Khalgui,et al.  Verification of Reconfigurable NoC under Quality of Service Constraints , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[312]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[313]  Xi Wang,et al.  Dynamic Multiple-Period Reconfiguration of Real-Time Scheduling Based on Timed DES Supervisory Control , 2016, IEEE Transactions on Industrial Informatics.

[314]  Sean McDirmid The Promise of Live Programming , 2016 .

[315]  Martin J. Tunnicliffe,et al.  A layered defense mechanism for a social engineering aware perimeter , 2016, 2016 SAI Computing Conference (SAI).

[316]  Mohamed Yassine Haouam,et al.  Towards Automated Traceability Maintenance in Model Driven Engineering , 2016 .

[317]  Philip Samuel,et al.  Object Oriented Method to Implement the Hierarchical and Concurrent States in UML State Chart Diagrams , 2016 .

[318]  Jason Jianjun Gu,et al.  Deep Neural Networks for wireless localization in indoor and outdoor environments , 2016, Neurocomputing.

[319]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[320]  Rahul Dev Garg,et al.  Regional electricity consumption analysis for consumers using data mining techniques and consumer meter reading data , 2016 .

[321]  Nesreen I. Ziedan,et al.  Effects of Walls and Floors in Indoor Localization Using Tracking Algorithm , 2016 .

[322]  David S. Linthicum Understanding Complex Cloud Patterns , 2016, IEEE Cloud Computing.

[323]  Bram Adams,et al.  Who Needs Release and DevOps Engineers, and Why? , 2016, 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED).

[324]  Kristin Decker,et al.  Uml Distilled A Brief Guide To The Standard Object Modeling Language , 2016 .

[325]  Chokri Ben Amar,et al.  Models and mechanisms for implementing playful scenarios , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[326]  Fritz Solms,et al.  Synchronized Agile , 2016, SAICSIT '16.

[327]  Tetiana Hovorushchenko,et al.  Evaluation of mutual influences of software quality characteristics based ISO 25010:2011 , 2016, 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT).

[328]  Jörgen Hansson,et al.  Model-based engineering in the embedded systems domain: an industrial survey on the state-of-practice , 2018, Software & Systems Modeling.

[329]  Ernesto López-Mellado,et al.  CTL Model Repair for Inter-organizational Business Processes Modelled as oWFN , 2016 .

[330]  Abram Hindle,et al.  Visualizing Project Evolution through Abstract Syntax Tree Analysis , 2016, 2016 IEEE Working Conference on Software Visualization (VISSOFT).

[331]  Cesare Bartolini,et al.  Software Testing Techniques Revisited for OWL Ontologies , 2016, MODELSWARD.

[332]  Lionel M. Ni,et al.  A Survey on Wireless Indoor Localization from the Device Perspective , 2016, ACM Comput. Surv..

[333]  Padma Iyenghar,et al.  A model-based framework encompassing a complete workflow from specification until validation of timing requirements in embedded software systems , 2016, Software Quality Journal.

[334]  Tomas Olovsson,et al.  A Risk Assessment Framework for Automotive Embedded Systems , 2016, CPSS@AsiaCCS.

[335]  Mohamed Talea,et al.  Automation in code generation: Tertiary and systematic mapping review , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[336]  Lech Madeyski,et al.  Factors influencing user story estimations: an industrial interview and a conceptual model , 2016 .

[337]  Samir Bourekkache,et al.  Designing reconfigurable manufacturing systems using reconfigurable object Petri nets , 2016, Int. J. Comput. Integr. Manuf..

[338]  K. Harald Gjermundrød,et al.  privacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls , 2016, ICWE Workshops.

[339]  Mirko Perkusich,et al.  A systematic review on the use of Definition of Done on agile software development projects , 2017, EASE.

[340]  N. Pereira-Azevedo,et al.  Rotterdam Prostate Cancer Risk Calculator: Development and Usability Testing of the Mobile Phone App , 2017, JMIR cancer.

[341]  Mark B. Trakhtenbrot Mutation Patterns for Temporal Requirements of Reactive Systems , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).

[342]  Andrei Vasilateanu,et al.  Cyber-physical system for assisted living and home monitoring , 2017, 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP).

[343]  Christian Wimmer,et al.  Practical partial evaluation for high-performance dynamic language runtimes , 2017, PLDI.

[344]  Bernhard K. Aichernig,et al.  Statistical Model Checking Meets Property-Based Testing , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[345]  Mohammad Ghafari,et al.  CityVR: Gameful Software Visualization , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).

[346]  Dimitrios Kouzapas,et al.  Privacy by typing in the π-calculus , 2017, Log. Methods Comput. Sci..

[347]  Shashikala Tapaswi,et al.  RSSI based adaptive indoor location tracker , 2017 .

[348]  Erika Nazaruka,et al.  Meaning of Cause-and-effect Relations of the Topological Functioning Model in the UML Analysis Model , 2017, ENASE.

[349]  D. A. Meedeniya,et al.  Tool support for traceability management of software artefacts with DevOps practices , 2017, 2017 Moratuwa Engineering Research Conference (MERCon).

[350]  Johannes Schneider,et al.  Mining Sequences of Developer Interactions in Visual Studio for Usage Smells , 2017, IEEE Transactions on Software Engineering.

[351]  Olfa Mosbahi,et al.  New Verification Approach for Reconfigurable Distributed Systems , 2017, ICSOFT.

[352]  Vitaly Herasevich,et al.  Automating Clinical Score Calculation within the Electronic Health Record , 2017, Applied Clinical Informatics.

[353]  Torgeir Dingsøyr,et al.  Emerging research themes and updated research agenda for large-scale agile development: a summary of the 5th international workshop at XP2017 , 2017, XP Workshops.

[354]  Milan Simic,et al.  Autonomous Systems Research Embedded in Teaching , 2018, IIMSS.

[355]  Deepak L. Bhatt,et al.  Individualized Metabolic Surgery Score: Procedure Selection Based on Diabetes Severity , 2017, Annals of surgery.

[356]  Olfa Mosbahi,et al.  BROMETH: Methodology to design safe reconfigurable medical robotic systems , 2017, The international journal of medical robotics + computer assisted surgery : MRCAS.

[357]  Smartphone-based indoor positioning using Wi-Fi, inertial sensors and Bluetooth. (Positionnement intérieur basé sur les smartphones à l'aide de Wi-Fi, des capteurs inertiels et Bluetooth) , 2017 .

[358]  Francesco Ricci,et al.  A context model for IDE-based recommendation systems , 2017, J. Syst. Softw..

[359]  Jean-Marc Jézéquel,et al.  Model Driven Engineering , 2017, Encyclopedia of GIS.

[360]  Jungho Kim,et al.  Machine Learning Frameworks for Automated Software Testing Tools : A Study , 2017 .

[361]  Simona Motogna,et al.  Discovering maintainability changes in large software systems , 2017, IWSM-Mensura.

[362]  Matthew Ormsby,et al.  A Standardized Procedure to Conceptualizing and Completing User Stories , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).

[363]  Mike Hintze,et al.  Meeting Upcoming GDPR Requirements While Maximizing the Full Value of Data Analytics , 2017 .

[364]  Antonius Rachmat Chrismanto,et al.  Recurrent neural networks model for WiFi-based indoor positioning system , 2017, 2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS).

[365]  P. Schauer,et al.  Who Should Get Extended Thromboprophylaxis After Bariatric Surgery?: A Risk Assessment Tool to Guide Indications for Post-discharge Pharmacoprophylaxis , 2015, Annals of surgery.

[366]  Dominik Huth,et al.  A Pattern Catalog for GDPR Compliant Data Protection , 2017, PoEM Doctoral Consortium.

[367]  Fabio Massacci,et al.  On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment , 2017, REFSQ.

[368]  Chunhui Wang,et al.  System Testing of Timing Requirements Based on Use Cases and Timed Automata , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[369]  Paolo Giorgini,et al.  Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework , 2017, PoEM.

[370]  Patrick Mäder,et al.  Preventing Defects: The Impact of Requirements Traceability Completeness on Software Quality , 2017, IEEE Transactions on Software Engineering.

[371]  Mikhail A. Dziadzko,et al.  Towards automated calculation of evidence-based clinical scores , 2017, World journal of methodology.

[372]  Ramón F. Brena,et al.  Evolution of Indoor Positioning Technologies: A Survey , 2017, J. Sensors.

[373]  Oliver E. Theel,et al.  An Improved BLE Indoor Localization with Kalman-Based Fusion: An Experimental Study , 2017, Sensors.

[374]  Paolo Arcaini,et al.  Formal Design and Verification of Self-Adaptive Systems with Decentralized Control , 2017, ACM Trans. Auton. Adapt. Syst..

[375]  Maria Spichkova,et al.  Modelling and Implementation of Humanoid Robot Behaviour , 2017, KES.

[376]  Janis Osis,et al.  Joint Usage of Frames and the Topological Functioning Model for Domain Knowledge Presentation and Analysis , 2017, ENASE.

[377]  Max Mühlhäuser,et al.  Systemic Risk Analysis Through SE Methods And Techniques , 2017, CIISE.

[378]  Jan Pries-Heje,et al.  The SAFe way to the agile organization , 2017, XP Workshops.

[379]  Silvia Mara Abrahão,et al.  An Infrastructure Modelling Tool for Cloud Provisioning , 2017, 2017 IEEE International Conference on Services Computing (SCC).

[380]  Andrei Vasilateanu,et al.  A Quantitative Research to Decide the User Requirements for the i-Light System , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[381]  Fatemeh Ghassemi,et al.  Purpose-Based Policy Enforcement in Actor-Based Systems , 2017, FSEN.

[382]  Fernando Castor Filho,et al.  Visualizing Swift Projects as Cities , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).

[383]  Marina Md Din,et al.  An improved indoor location technique using Kalman Filter , 2018 .

[384]  Maritta Heisel,et al.  A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements , 2018, CRiSIS.

[385]  A. Samková,et al.  Improving Electromagnetic Shielding Ability of Plaster-Based Composites by Addition of Carbon Fibers , 2018, Advances in Materials Science and Engineering.

[386]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[387]  Sebastian Herold,et al.  Exploring the suitability of source code metrics for indicating architectural inconsistencies , 2018, Software Quality Journal.

[388]  Dong Wang,et al.  Enhancing the user experience with vertical transportation solutions , 2018, KES.

[389]  Yu Pang,et al.  Indoor Positioning Algorithm Based on the Improved RSSI Distance Model , 2018, Sensors.

[390]  Yuwei Zhang,et al.  Software Development for Autonomous and Social Robotics Systems , 2018, IIMSS.

[391]  Maria Spichkova,et al.  Automated Analysis of the Impact of Weather Conditions on Medicine Consumption , 2018, 2018 25th Australasian Software Engineering Conference (ASWEC).

[392]  Anna Derezinska,et al.  Approaches to Semantic Mutation of Behavioral State Machines in Model-Driven Software Development , 2018, 2018 Federated Conference on Computer Science and Information Systems (FedCSIS).

[393]  George D. Magoulas,et al.  The cloudUPDRS app: A medical device for the clinical assessment of Parkinson's Disease , 2018, Pervasive Mob. Comput..

[394]  Haiyang Sun,et al.  Efficient dynamic analysis for Node.js , 2018, CC.

[395]  Søren Debois,et al.  On Purpose and by Necessity: Compliance Under the GDPR , 2018, Financial Cryptography.

[396]  Kai Petersen,et al.  A Preliminary Checklist for Capturing Baseline Situations in Studying the Impacts of Agile Practices Introduction , 2018, 2018 IEEE/ACM 6th International Workshop on Conducting Empirical Studies in Industry (CESI).

[397]  Haralambos Mouratidis,et al.  Risk-aware decision support with constrained goal models , 2018, Inf. Comput. Secur..

[398]  Sudeep Pasricha,et al.  Adapting Convolutional Neural Networks for Indoor Localization with Smart Mobile Devices , 2018, ACM Great Lakes Symposium on VLSI.

[399]  Ting Qu,et al.  Analysis and Control of Dynamic Reconfiguration Processes of Manufacturing Systems , 2018, IEEE Access.

[400]  Janis Osis,et al.  Determination of Natural Language Processing Tasks and Tools for Topological Functioning Modelling , 2018, ENASE.

[401]  Andreas Unterweger,et al.  Detecting Swimming Pools in 15-Minute Load Data , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[402]  João Pascoal Faria,et al.  A Reactive and Model-Based Approach for Developing Internet-of-Things Systems , 2018, 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC).

[403]  Mohamed Khalgui,et al.  Automatic Properties Classification Approach for Guiding the Verification of Complex Reconfigurable Systems , 2018, ICSOFT.

[404]  Julia Padberg,et al.  Overview of Reconfigurable Petri Nets , 2018, Graph Transformation, Specifications, and Nets.

[405]  Andrija Bernik,et al.  Measurement of the effects of e-learning courses gamification on motivation and satisfaction of students , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[406]  Pietro Ferrara,et al.  Static Analysis for GDPR Compliance , 2018, ITASEC.

[407]  Thomas A. Henzinger,et al.  Handbook of Model Checking , 2018, Springer International Publishing.

[408]  Xing Zhao,et al.  SMI: Stack Management Interface , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).

[409]  Dominik Engel,et al.  Unsupervised Holiday Detection from Low-resolution Smart Metering Data , 2018, ICISSP.

[410]  Jan Jürjens,et al.  Supporting privacy impact assessment by model-based privacy analysis , 2018, SAC.

[411]  Olfa Mosbahi,et al.  Multiagent Architecture for Distributed Adaptive Scheduling of Reconfigurable Real-Time Tasks With Energy Harvesting Constraints , 2018, IEEE Access.

[412]  Georgia M. Kapitsaki,et al.  Linked USDL Privacy: Describing Privacy Policies for Services , 2018, 2018 IEEE International Conference on Web Services (ICWS).

[413]  Beatriz A. Sanchez Context-aware traceability across heterogeneous modelling environments , 2018, MoDELS Companion.

[414]  Janis Osis,et al.  Verification of Causality in the Frame System based on the Topological Functioning Modelling , 2018, ENASE.

[415]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[416]  Ross MacDonald,et al.  Software Defect Prediction from Code Quality Measurements via Machine Learning , 2018, Canadian Conference on AI.

[417]  Markus Endler,et al.  Deklaer: An Ontology-Driven Framework for Generating IoT Applications using ContextNet , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[418]  Constantinos Patsakis,et al.  Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions , 2018, J. Cybersecur..

[419]  Stéphane Maag,et al.  A Novel Formal Approach to Automatically Suggest Metrics in Software Measurement Plans , 2018, ENASE.

[420]  Lihua Xie,et al.  Building occupancy estimation and detection: A review , 2018, Energy and Buildings.

[421]  Iuliana Marin,et al.  i-Light—Intelligent Luminaire Based Platform for Home Monitoring and Assisted Living , 2018, Electronics.

[422]  Petros Spachos,et al.  RSSI-Based Indoor Localization With the Internet of Things , 2018, IEEE Access.

[423]  Duarte Pinto,et al.  Dynamic Allocation of Serverless Functions in IoT Environments , 2018, 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC).

[424]  Ke Huang,et al.  A Hybrid Method to Improve the BLE-Based Indoor Positioning in a Dense Bluetooth Environment , 2019, Sensors.

[425]  Xiaohui Liang,et al.  Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.

[426]  Benjamin Sovacool,et al.  Further reflections on vulnerability and resistance in the United Kingdom's smart meter transition , 2019, Energy Policy.

[427]  Mohamed Khalgui,et al.  On Improved Verification of Reconfigurable Real-Time Systems , 2019, ENASE.

[428]  Zoltán Herczeg,et al.  Evaluation and Comparison of Dynamic Call Graph Generators for JavaScript , 2019, ENASE.

[429]  Maria Spichkova,et al.  Industry-Oriented Project-Based Learning of Software Engineering , 2019, 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS).

[430]  Matthew Ormsby,et al.  Scaling a Standardized Procedure to Conceptualizing and Completing User Stories across Scrum Teams and Industries , 2019, ENASE.

[431]  Maria Spichkova,et al.  Easy Mobile Meter Reading for Non-smart Meters: Comparison of AWS Rekognition and Google Cloud Vision Approaches , 2019, ENASE.

[432]  Takuro Yonezawa,et al.  Basic Study of BLE Indoor Localization using LSTM-based Neural Network (poster) , 2019, MobiSys.

[433]  G. Kurdi,et al.  Ontology-Based Generation of Medical, Multi-term MCQs , 2019, International Journal of Artificial Intelligence in Education.

[434]  Ademar Aguiar,et al.  Live Software Development Environment for Java using Virtual Reality , 2019, ENASE.

[435]  R. Stedman,et al.  A synthetic view of acceptance and engagement with smart meters in the United States , 2019, Energy Research & Social Science.

[436]  Janis Osis,et al.  Extracting Core Elements of TFM Functional Characteristics from Stanford CoreNLP Application Outcomes , 2019, ENASE.

[437]  Maria-Iuliana Bocicor,et al.  Indoor Localisation with Intelligent Luminaires for Home Monitoring , 2019, ENASE.

[438]  Davi Viana,et al.  A Domain-Specific Modeling Language for Specification of Clinical Scores in Mobile Health , 2019, ENASE.

[439]  Yuntian Brian Bai,et al.  A New Approach for Wi-Fi-Based People Localization in a Long Narrow Space , 2019, Wirel. Commun. Mob. Comput..

[440]  Joel J. P. C. Rodrigues,et al.  Energy meters evolution in smart grids: A review , 2019, Journal of Cleaner Production.

[441]  Ademar Aguiar,et al.  CloudCity: A Live Environment for the Management of Cloud Infrastructures , 2019, ENASE.

[442]  Alberto Sillitti,et al.  Analyzing Load Profiles of Energy Consumption to Infer Household Characteristics Using Smart Meters , 2019, Energies.

[443]  Dimitrios Kouzapas,et al.  A Formal Modeling Scheme for Analyzing a Software System Design against the GDPR , 2019, ENASE.

[444]  Yngve Lamo,et al.  A Model Driven Approach to the Development of Gamified Interactive Clinical Practice Guidelines , 2019, ENASE.

[445]  Yves Le Traon,et al.  Chapter Six - Mutation Testing Advances: An Analysis and Survey , 2019, Adv. Comput..

[446]  Mohamed Khalgui,et al.  Multiobjective Optimization Approach for a Portable Development of Reconfigurable Real-Time Systems: From Specification to Implementation , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[447]  Stéphane Maag,et al.  Suggesting Software Measurement Plans with Unsupervised Learning Data Analysis , 2019, ENASE.

[448]  Maritta Heisel,et al.  CVSS-based Estimation and Prioritization for Security Risks , 2019, ENASE.

[449]  Nidhi Chawla,et al.  Automated gathering and analysis of cannabinoids treatment data , 2019, KES.

[450]  Maria Spichkova,et al.  Voice-activated solutions for agile retrospective sessions , 2019, KES.

[451]  Mohamed Khalgui,et al.  On Improving R-TNCES Rebuilding for Reconfigurable Real-Time Systems , 2019, ENASE.

[452]  Anna Derezinska,et al.  Mutating UML State Machine Behavior with Semantic Mutation Operators , 2019, ENASE.

[453]  Mohamed Khalgui,et al.  R-TNCES Rebuilding: A New Method of CTL Model Update for Reconfigurable Systems , 2019, ENASE.

[454]  Elke Pulvermüller,et al.  Using Developer-tool-Interactions to Expand Tracing Capabilities , 2019, ENASE.

[455]  Ademar Aguiar,et al.  Live software development: tightening the feedback loops , 2019, Programming.

[456]  Ting Qu,et al.  On Methodology for the Verification of Reconfigurable Timed Net Condition/Event Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[457]  Xiangyu Wang,et al.  Deep Convolutional Neural Networks for Indoor Localization with CSI Images , 2020, IEEE Transactions on Network Science and Engineering.