Volume 29, Number 1, May 2022
FLASc: a formal algebra for labeled property graph schema.

Chandan Sharma Roopak Sinha

DICE simulation: a tool for software performance assessment at the design stage.

Simona Bernardi Abel Gómez José Merseguer Diego Perez-Palacin José Ignacio Requeno

Static data-flow analysis for software product lines in C.

Philipp Dominik Schubert Paul Gazzillo Zach Patterson Julian Braha Fabian Schiebel Ben Hermann Shiyi Wei Eric Bodden

A Novel Technique for Accelerating Live Migration in Cloud Computing.

Ambika Gupta Suyel Namasudra

Improving generality and accuracy of existing public development project selection methods: a study on GitHub ecosystem.

Can Cheng Bing Li Zengyang Li Peng Liang Xiaofeng Han Jiahua Zhang

Mathematical model of social behavior for the allocation of members in software development teams.

Adriana Peña Pérez Negrón Luz M. Reyes Mirna Muñoz

Towards a behavior tree-based robotic software architecture with adjoint observation schemes for robotic software development.

Shuo Yang Xinjun Mao Yao Lu Yong Xu

Can we generate shellcodes via natural language? An empirical study.

Pietro Liguori Erfan Al-Hossami Domenico Cotroneo Roberto Natella Bojan Cukic Samira Shaikh

A three-valued model abstraction framework for PCTL* stochastic model checking.

Yang Liu Yan Ma Yongsheng Yang

UAV surveillance for violence detection and individual identification.

Anugrah Srivastava Tapas Badal Pawan Saxena Ankit Vidyarthi Rishav Singh

Leveraging structural properties of source code graphs for just-in-time bug prediction.

Md. Nadim Debajyoti Mondal Chanchal K. Roy

Towards digitalization of requirements: generating context-sensitive user stories from diverse specifications.

Padmalata V. Nistala Asha Rajbhoj Vinay Kulkarni Shivani Soni Kesav V. Nori Raghu Reddy

Identification and visualization of variability implementations in object-oriented variability-rich systems: a symmetry-based approach.

Xhevahire Tërnava Johann Mortara Philippe Collet Daniel Le Berre

Towards the identification of bug entities and relations in bug reports.

Bin Li Ying Wei Xiaobing Sun Lili Bo Dingshan Chen Chuanqi Tao

BPM supported model generation by contemplating key elements of information security.

M. Mythily Sanchari Saha Sudhakar Selvam S. Iwin Thanakumar Joseph

AIDM: artificial intelligent for digital museum autonomous system with mixed reality and software-driven data collection and analysis.

Tan Jiang Xiao'er Gan Zheng Liang Guang Luo

Improving the prediction of continuous integration build failures using deep learning.

Islem Saidani Ali Ouni Mohamed Wiem Mkaouer

Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm.

Abdullah Lakhan Mazin Abed Mohammed Omar Ibrahim Obaid Chinmay Chakraborty Karrar Hameed Abdulkareem Seifedine Kadry

Intelligent software-driven immersive environment for online political guiding based on brain-computer interface and autonomous systems.

Yingchun Wang Weijun Hu

Gradient contouring and texture modelling based CAD system for improved TB classification.

J. Rajeswari J. Raja S. Jayashri

Strategic real time framework for healthcare using fuzzy C-means systems.

N. Purandhar S. Ayyasamy N. M. Saravana Kumar

Convolutional neural network for stock trading using technical indicators.

S. Kumar Chandar

Source code change analysis with deep learning based programming model.

Babita Pathik Meena Sharma

Intelligent online guiding network regional planning based on software-driven autonomous communication system.

Zhenglin Gu Jidong Yi Hui Yao Yang Wang

Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems.

Kalaipriyan Thirugnanasambandam M. Rajeswari Debnath Bhattacharyya Jung-yoon Kim

Towards automatic business process redesign: an NLP based approach to extract redesign suggestions.

Amina Mustansir Khurram Shahzad Muhammad Kamran Malik

Towards automatic detection and prioritization of pre-logging overhead: a case study of hadoop ecosystem.

Chen Zhi Shuiguang Deng Junxiao Han Jianwei Yin

RCM-extractor: an automated NLP-based approach for extracting a semi formal representation model from natural language requirements.

Aya Zaki-Ismail Mohamed Osama Mohamed Almorsy Abdelrazek John C. Grundy Amani S. Ibrahim

On the documentation of refactoring types.

Eman Abdullah AlOmar Jiaqian Liu Kenneth Addo Mohamed Wiem Mkaouer Christian D. Newman Ali Ouni Zhe Yu

Faults in deep reinforcement learning programs: a taxonomy and a detection approach.

Amin Nikanjam Mohammad Mehdi Morovati Foutse Khomh Houssem Ben Braiek

Model checking strategy-controlled systems in rewriting logic.

Rubén Rubio Narciso Martí-Oliet Isabel Pita Alberto Verdejo

Prediction of software fault-prone classes using ensemble random forest with adaptive synthetic sampling algorithm.

A. Balaram S. Vasundra

Opinion mining for app reviews: an analysis of textual representation and predictive models.

Adailton Ferreira de Araújo Marcos Gôlo Ricardo M. Marcacini

l-PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment.

Sunitha Pachala Ch. Rupa L. Sumalatha

Synchronous development in open-source projects: A higher-level perspective.

Thomas Bock Claus Hunsen Mitchell Joblin Sven Apel

BOLD: an ontology-based log debugger for C programs.

Dileep Kumar Pattipati Rupesh Nasre Sreenivasa Kumar Puligundla

DeepGuard: a framework for safeguarding autonomous driving systems from inconsistent behaviour.

Manzoor Hussain Nazakat Ali Jang-Eui Hong