The proceedings contain 15 papers. The topics discussed include: deep multiple assertions generation;MeTMaP: metamorphic testing for detecting false vector matching problems in LLM augmented generation;the emergence o...
ISBN:
(纸本)9798400706097
The proceedings contain 15 papers. The topics discussed include: deep multiple assertions generation;MeTMaP: metamorphic testing for detecting false vector matching problems in LLM augmented generation;the emergence of large language models in static analysis: a first look through micro-benchmarks;reality bites: assessing the realism of driving scenarios with large language models;assessing the impact of GPT-4 turbo in generating defeaters for assurance cases;exploring the impact of the output format on the evaluation of large language models for code translation;is attention all you need? toward a conceptual model for social awareness in large language models;and an exploratory investigation into code license infringements in large language model training datasets.
The proceedings contain 7 papers. The topics discussed include: graph neural network vs. large language model: a comparative analysis for bug report priority and severity prediction;smarter project selection for softw...
ISBN:
(纸本)9798400706752
The proceedings contain 7 papers. The topics discussed include: graph neural network vs. large language model: a comparative analysis for bug report priority and severity prediction;smarter project selection for softwareengineering research;sociotechnical dynamics in open source smart contract repositories: an exploratory data analysis of curated high market value projects;a curated solidity smart contracts repository of metrics and vulnerability;MoreFixes: a large-scale dataset of CVE fix commits mined through enhanced repository discovery;prioritizing GitHub priority labels;and predicting fairness of ML software configurations.
The proceedings contain 8 papers. The topics discussed include: BuggIn: automatic intrinsic bugs classification model using NLP and ML;do developers fix continuous integration smells?;large scale study of orphan vulne...
ISBN:
(纸本)9798400703751
The proceedings contain 8 papers. The topics discussed include: BuggIn: automatic intrinsic bugs classification model using NLP and ML;do developers fix continuous integration smells?;large scale study of orphan vulnerabilities in the software supply chain;the FormAI dataset: generative AI in software security through the lens of formal verification;comparing word-based and AST-based models for design pattern recognition;on effectiveness of further pre-training on BERT models for story point estimation;automated fairness testing with representative sampling;and model review: a PROMISEing opportunity.
The proceedings contain 10 papers. The topics discussed include: improving the performance of code vulnerability prediction using abstract syntax tree information;measuring design compliance using neural language mode...
ISBN:
(纸本)9781450398602
The proceedings contain 10 papers. The topics discussed include: improving the performance of code vulnerability prediction using abstract syntax tree information;measuring design compliance using neural language models: an automotive case study;feature sets in just-in-time defect prediction: an empirical evaluation;profiling developers to predict vulnerable code changes;predicting build outcomes in continuous integration using textual analysis of source code commits;LOGI: an empirical model of heat-induced disk drive data loss and its implications for data recovery;assessing the quality of GitHub copilot’s code generation;on the effectiveness of data balancing techniques in the context of ml-based test case prioritization;identifying security-related requirements in regulatory documents based on cross-project classification;and API + code = better code summary? insights from an exploratory study.
The proceedings contain 5 papers. The topics discussed include: heterogeneous ensemble imputation for software development effort estimation;multi-stream online transfer learning for software effort estimation: is it ...
ISBN:
(纸本)9781450386807
The proceedings contain 5 papers. The topics discussed include: heterogeneous ensemble imputation for software development effort estimation;multi-stream online transfer learning for software effort estimation: is it necessary?;comparative study of random search hyper-parameter tuning for software effort estimation;CVEfixes: automated collection of vulnerabilities and their fixes from open-source software;and a classification of code changes and test types dependencies for improving machine learning based test selection.
The proceedings contain 10 papers. The special focus in this conference is on softwareengineering and Formal Methods. The topics include: Private Memory Confers No Advantage;frequentist Probability Logic;using Maude ...
ISBN:
(纸本)9783031660207
The proceedings contain 10 papers. The special focus in this conference is on softwareengineering and Formal Methods. The topics include: Private Memory Confers No Advantage;frequentist Probability Logic;using Maude to Model Motivation in Human Behaviour;semantic Memory, Mnemonic Effort and Mnemonic Habit;scientific Understanding and the Explanatory Integration in Cognitive Sciences;code Biology and Enactivism: Bringing Adaptors to Basic Minds;clinical Cognitive Sciences;facets of Openness in a Serious Game: Opening up Format, Content, software and Hardware.
The proceedings contain 8 papers. The topics discussed include: software defect prediction using tree-based ensembles;improving real-world vulnerability characterization with vulnerable slices;workload-aware reviewer ...
ISBN:
(纸本)9781450381277
The proceedings contain 8 papers. The topics discussed include: software defect prediction using tree-based ensembles;improving real-world vulnerability characterization with vulnerable slices;workload-aware reviewer recommendation using a multi-objective search-based approach;evaluating hyper-parameter tuning using random search in support vector machines for software effort estimation;fault-insertion and fault-fixing: analyzing developer activity over time;identifying key developers using artifact traceability graphs;SEERA: a software cost estimation dataset for constrained environments;and an exploratory study on applicability of cross project defect prediction approaches to cross-company effort estimation.
The proceedings contain 12 papers. The special focus in this conference is on From Data models and Back. The topics include: A Web-Based Tool for Collaborative Modelling and Analysis in Human-Computer I...
ISBN:
(纸本)9783031160103
The proceedings contain 12 papers. The special focus in this conference is on From Data models and Back. The topics include: A Web-Based Tool for Collaborative Modelling and Analysis in Human-Computer Interaction and Cognitive Science;ten Years of DataMod: The Synergy of Data-Driven and Model-Based Approaches;analysis and Verification of Robustness Properties in Becker-Döring Model;a Secure User-Centred Healthcare System: Design and Verification;model-Based Security Assessment on the Design of a Patient-Centric Data Sharing Platform;Towards Model Checking Video Streams Using VoxLogicA on GPUs;privacy Risk and Data Utility Assessment on Network Data;detecting Anxiety Trends Using Wearable Sensor Data in Real-World Situations;combining Quantitative Data with Logic-Based Specifications for Parameter Inference;preface.
The proceedings contain 24 papers. The special focus in this conference is on New Trends in Model and Data engineering. The topics include: Record Linkage for Auto-tuning of High Performance Computing Systems;protecti...
ISBN:
(纸本)9783030876562
The proceedings contain 24 papers. The special focus in this conference is on New Trends in Model and Data engineering. The topics include: Record Linkage for Auto-tuning of High Performance Computing Systems;protecting Sensitive Data in Web of Data;COVID-DETECT: A Deep Learning Based Approach to Accelerate COVID-19 Detection;time Insertion Functions;static Checking Consistency of Temporal Requirements for Control software;visual Language for Device Management in Telecommunication Product Line;Using Process-Oriented Structured Text for IEC 61499 Function Block Specification;the DibiChain Protocol: Privacy-Preserving Discovery and Exchange of Supply Chain Information;towards a Resource-Aware Formal Modelling Language for Workflow Planning;Development of Critical Systems with UML/OCL and FoCaLiZe;systematic Literature Review of Methods for Maintaining Data Integrity;medical Data engineering – Theory and Practice;querying Medical Imaging Datasets Using Spatial Logics (Position Paper);evaluation of Anonymization Tools for Health Data;usages of the ContSys Standard: A Position Paper;systematic Assessment of Formal Methods Based models Quality Criteria;deriving Interaction Scenarios for Timed Distributed Systems by Symbolic Execution;energy Efficient Real-Time Calibration of Wireless Sensor Networks for Smart Buildings;edge-to-Fog Collaborative Computing in a Swarm of Drones;Coverage Maximization in WSN Deployment Using Particle Swarm Optimization with Voronoi Diagram;EPSAAV: An Extensible Platform for Safety Analysis of Autonomous Vehicles;bridging Trust in Runtime Open Evaluation Scenarios.
暂无评论