Default Cover Image

2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)

Aug. 29 2018 to Aug. 31 2018

Prague

Table of Contents

Exploiting ALM and MDE for Supporting Questionnaire-Based Gap Analysis ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Singing the Praise of Empowerment: Or Paying the Cost of ChaosFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
Sustaining Agile Beyond AdoptionFull-text access may be available. Sign in or learn about subscription options.pp. 22-25
Influence of Structured Information in Bug Report Descriptions on IR-Based Bug LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 26-32
Challenges Concerning Test Case Specifications in Automotive Software TestingFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
Re-visiting a Test Taxonomy with Refactoring and Defect-fix DataFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Software Engineering Challenges of Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 50-59
Effective Online Controlled Experiment Analysis at Large ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Monitoring CPS at Runtime - A Case Study in the UAV DomainFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Evidence-Based Verification of Safety Properties Concerning the Cooperation of Autonomous AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Be Prepared: Learning Environment Profiles for Proactive Rule-Based Production PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Towards Co-simulation of Embedded Platforms and Physics-Based ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 97-100
Allocation Optimization for Component-Based Embedded Systems with GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
A Smart City Application Modeling Framework: A Case Study on Re-engineering a Smart Retail PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 111-118
NUMA Awareness: Improving Thread and Memory ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Security and Privacy Concerns in Connected Cars: A Systematic Mapping StudyFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
Towards Modeling Patterns for Embedded Software Industry: Feedback from the FieldFull-text access may be available. Sign in or learn about subscription options.pp. 132-136
Best Practices for Domain-Specific Modeling. A Systematic Mapping StudyFull-text access may be available. Sign in or learn about subscription options.pp. 137-145
Exploring the Use of Rapid Type Analysis for Detecting the Dead Method Smell in Java CodeFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
The Effects of Vectorization Methods on Non-Functional Requirements ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Exploring Reuse Levels in ERP Projects in Search of an Effort Estimation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 191-197
Using Self-Healing to Increase Robustness of Handling In-Browser Third-Party ContentFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Linking Personality Traits and Interpersonal Skills to Gamification AwardsFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Are We Excellent Yet? Perceptions of Software 'Test Centre of Excellence' Within a Financial InstitutionFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Enhanced Feature Selection Using Word Embeddings for Self-Admitted Technical Debt IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Code Cleaning for Software Defect Prediction: A Cautionary TaleFull-text access may be available. Sign in or learn about subscription options.pp. 239-243
An Exploratory Study of Search Based Training Data Selection for Cross Project Defect PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
Categories of Change Triggers in Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
Advanced Queueing Models for Quantitative Business Process AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Considering Non-sequential Control Flows for Process Prediction with Recurrent Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
Integrating Requirements and Business Process Models in BPM ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 273-280
A Toolbox for the Development and Implementation of Value Based Care PathwaysFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
Flexible System-Level Monitoring of Heterogeneous Big Data Streaming SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 289-292
Incremental Verification of Complex Event Processing Applications for System MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 293-297
Role-Based Runtime Model SynchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
A Consistent View of the Smart Grid: Bridging the Gap between IEC CIM and IEC 61850Full-text access may be available. Sign in or learn about subscription options.pp. 321-325
A Methodology for Domain-Spanning Change Impact AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 326-330
Current State of Research on Continuous Experimentation: A Systematic Mapping StudyFull-text access may be available. Sign in or learn about subscription options.pp. 335-344
Continuous Experimentation in Mobile Game DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 345-352
Continuous Experimentation Scenarios: A Case Study in e-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 353-356
A Collection of Software Engineering Challenges for Big Data System DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 362-369
A Large-Scale Study on Source Code Reviewer RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 378-387
CrossSim: Exploiting Mutual Relationships to Detect Similar OSS ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 388-395
An Automated Approach for Classifying Reverse-Engineered and Forward-Engineered UML Class DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 396-399
A Case Study of the Effects of Architecture Debt on Software Evolution EffortFull-text access may be available. Sign in or learn about subscription options.pp. 400-403
Towards an Architectural Debt IndexFull-text access may be available. Sign in or learn about subscription options.pp. 408-416
An Architectural Smells Detection Tool for C and C++ ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
Identifying Technical Debt in Database Normalization Using Association Rule MiningFull-text access may be available. Sign in or learn about subscription options.pp. 437-441
Challenges in Assessing Technical Debt Based on Dynamic Runtime DataFull-text access may be available. Sign in or learn about subscription options.pp. 442-445
A Systematic Mapping Study on Security in Agile Requirements EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 454-461
A Systematic Mapping Study on API Documentation Generation ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 462-469
Safety-Critical Systems and Agile Development: A Mapping StudyFull-text access may be available. Sign in or learn about subscription options.pp. 470-477
Smart Cities Evaluation – A Survey of Performance and Sustainability IndicatorsFull-text access may be available. Sign in or learn about subscription options.pp. 486-493
Hierarchical Multi-tenancy in Business to Business Software ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 494-501
Performance and Energy-Based Cost Prediction of Virtual Machines Auto-Scaling in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
Towards Generating Elastic Microservices: A Declarative Specification for Consistent Elasticity ConfigurationsFull-text access may be available. Sign in or learn about subscription options.pp. 510-513
Abstract Fog in the Bottle - Trends of Computing in History and FutureFull-text access may be available. Sign in or learn about subscription options.pp. 519-522
Showing 80 out of 80