dblp: SEKE 2024 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


36th SEKE 2024: KSIR Virtual Conference Center, USA

jump to- Session I: Social Computing and Applications
- Session III: Programming Methodologies
- Session V: Software Applications
- Session VII: Source Code Analysis
- Session IX: Software Testing Requirements and Optimization
- Session XI: Data modeling and analytics
- Session XIII: Services and Architectures
- Session XV: Advanced Learning

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Shi-Kuo Chang:
The 36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024, KSIR Virtual Conference Center, USA, October 26 - November 3, 2024. KSI Research Inc. 2024, ISBN 1-891706-59-4
Session I: Social Computing and Applications

Jiamin Zhang, Weidong Liu, Yuling Yang, Fuming Ye:
A Patent Data Meta-Path based Technological Risk Prediction Method. 1-6

Zhaozheng Zhang, Wujun Wang, Weiran Yang, Ningtao Ma, Mingyang Sun, Xinxin Wang, Liangyu Ruan, Ru Yi:
Low-Light Image Enhancement Based on Retinex Reflectance Compensation. 7-12

Fuming Ye, Weidong Liu, Yu Zhang, Jiamin Zhang:
External Knowledge Network based Patent Event Extraction Model. 13-18
Session II: Learning

Farjana Yeasmin Omee, John Anvik:
Comparing Machine Learning and Feature Selection Approaches for Automated Bug Report Assignment (P). 19

Pankaj Kamthan, Nazlie Shahmir:
Why the Professor Can't Teach? (P). 20
Session III: Programming Methodologies

Yasir Glani, Pin Lo, Ke Lin:
MDASC: Advanced Dual-Layered Code Cloning Technique for Identifying Reused Malicious Code. 21-26

Shraddhaben Devaiya, John Anvik:
Automatically Identifying Planning Comments in Bug Reports (P). 27-29

Jun Ruan, Xiaohu Yang, Yuan Fan:
Fault Injection with Enhanced Observability for Resilient Cloud-Edge Computing. 30-35
Session IV: Modeling and Coding

Hiroyuki Nakagawa, Shimon Sumita, Shinobu Saito
:
Code Reachability Visualization Based on Probabilistic Model Checking. 36-41

Jianhao Liu, Zhiru Hou, Huibiao Zhu:
Validating Secure Cloud Communication Mechanisms of Graphene with CSP-based Modeling. 42-47

Hazim Shatnawi, Jamil Saquer:
Neo4j's BFS and DFS Evaluation in GDS and APOC Libraries with SPL Feature Models (P). 48-50
Session V: Software Applications

Hongming Zhu, Zeju Wang, Manxin Xu, Jipeng Zhang, Qin Liu, Bowen Du:
STGAN-CR: A Swin Transformer-Enhanced GAN Framework for Effective Cloud Removal in Satellite Imagery. 51-56

Junjun Si, Yang Xiang, Li Li, Bo Tu:
A two-stage Map-matching Method for Sparse Trajectories with Small-scale Ground Truth Data (S). 57-62

Zishuo Jin, Feng Ye, Peng Zhang:
Digital Twin System for River Network Based on Graph Neural Network. 63-68

Mohammad Shameem, Mohammad Nadeem, Mahmood Niazi:
AI-enabled Software Engineer: A Taxonomy of Challenges and Success Factors (P). 69-71
Session VI: Social Computing and Applications

Li Li:
Sentence-level Representation Learning for English- Assisted Teaching System. 75-80

Qing Zhou, Subin Huang, Chengzhen Yu, Daoyu Li, Junjie Chen
, Sanmin Liu:
Improving Event Detection via Trigger Word Expansion. 81-86

Daoyu Li, Subin Huang, Chenzhen Yu, Junjie Chen
, Qing Zhou, Sanmin Liu:
Chinese Abbreviation Prediction Using Multi-Feature Fusion and Global Context. 87-92

Jinwei Ma, Meian Li, Lumeng Chao:
Low-cost irrigation system based on multi-tenant and WSN technologies. 93-97

ZongHan Bai, Ying Zhang, Shuqing Zhang:
Data-fusion-based Patent Valuation: Discovering the Market Need. 98-102
Session VII: Source Code Analysis

Linhai Li, Mingjie Xing, Ling Li:
Using Context and Hierarchy Features to Enhance Code Completion in Code Modification Scenarios. 110-115

Qing Mi, Tengyuan Zhang, Keru Cai, Yuhe Wang:
Towards Understanding the Distribution and Evolution of Code Smells: An Empirical Study on Java and Python Projects (S). 116-119

Qing Mi, Yueyue Xi, Junyang Li, Yuanjun Zhao, Shijia Tang:
WCL-CRC: A Weakly-Supervised Contrastive Learning Framework for Few-Shot Code Readability Classification. 120-125

Yang Xu, Chaowei Chen:
Build a Dataset of Query-Code Pairs Based on CodeSearchNet for Code Search (S). 126-131

Imran Pinjari, Michael Shin, Pushkar Ogale:
Integrity for Interfaces and Lambda Expressions with Static Analysis (S). 132-135

Qihong Song, Jianxun Liu, Haize Hu:
HACS: An Enhancement Framework for Deep Code Search Benefiting from Hard Negative Samples (S). 136-139
Session VIII: Neurosymboic Systems

Bicheng Xu, Rong Peng, Yongchang Ding
, Lin Fang:
An interpretable logic KBQA method based on open-source large language models. 140-145

Jianfeng Liu, Jingxiang Ren, Jing Xie, Jianbin Fang, Ting Wang:
Enhancing Compiler Optimization with Reinforcement Learning and Monte Carlo Tree Search. 146-151

Xiao Peng, Xuefeng Zhang, Hanyu Zhao, Liangyu Chen:
GeoExpert: Geometry Problem Solving Based on RoBERTa and Graph Attention Networks. 158-163
Session IX: Software Testing Requirements and Optimization

Shaojian Qiu, Shaosheng Wang
, Wei Rong, Lili Liao, Yishen Lin:
Software Defect Prediction via Code Grayscale Pixel Visualization with Fusion Attention (S). 170-174

Qixiang Zhou, Jiaxuan Li, Jiahong Sun, Tong Li:
An LLM-based Multi-stage Approach for Automated Test Case Generation from User Stories (S). 175-178

Huijuan Hao, Sijian Zhu, Yu Chen
, Changle Yi, Hongge Zhao, Yue Feng, Rong Yang:
MTRNet: An Efficient Hybrid Network Model for Surface Defect Detection of Sheet Metal (S). 179-182

Weixiang Hong
, Yi Wu, Hui Li, Shikai Guo:
Deep Just-In-Time Defect Prediction Based on Double-Source Input Self-Attention Mechanism (S). 183-188

Tiankuo Wang, Liwei Zheng:
From Domain Models to Natural Language Requirement Documents: An Exploration of Requirement Missing Problems (P). 189

Zhenbang Peng, Yi Zhang, Mingjie Xing, Yanjun Wu, Chen Zhao:
Time-Series based phase-ordering selection for code-size reduction. 190-195

Yanfeng Hu, Weihong Chen, Yilong Zhao, Ruiyu Zhang, Liangze Yin, Wei Dong:
RustPruner: A Program Slicing Tool for Rust Programs. 196-201
Session X: AI Methods in Complex Environments

Zhengwu Wang, Wenwei Lan, Zhanqi Cui:
SDA-FirmFuzz: Fuzz Testing IoT Device Firmwares Based on Seed Differential Analysis. 202-207

Safa Shubbar, Shivani Ganta, Thejeswar Reddy Timmapuram, Lakshmi Poojitha Vangapalli, Komal Jilkara, Hanan Muhajab, Areej Muhajab, Kambiz Ghazinour, Stacy Miner
:
Bridging the Communication Gap: Sign Language Recognition Technology for the Speech and Hearing Impaired. 208-213

Aldo Dagnino:
Importance of Good Data Quality in AI Business Information Systems for IIoT Enterprises. 214-219

Xuyan Hu, Yicheng Gu, Zhengwei Qi:
gHermes: Application-Unaware Acceleration for Cloud Rendering and Computing with Efficient GPU Utilization. 220-225

Attique Ur Rehman, Songfeng Lu:
An Efficient Smart Contract-Enabled Blockchain Framework for Data Sharing in Cloud based IoT Systems (S). 226-231
Session XI: Data modeling and analytics

Yuanlin Sun, Peiquan Jin:
How Will ZNS SSDs Perform on Real Key-Value Stores? An Experimental Test of RocksDB. 232-237

Qiwen Ke, Yiming Zhang:
CFS: Enhancing Metadata Management in Cross-Domain File Systems with CRDTs. 238-244

José Ferreira, Eduardo Figueiredo, Johnatan Oliveira:
Unveiling Experts in Data Science: A Mining Software Repository Perspective (S). 245-248

Zijian Jiang, Peiquan Jin:
How Will ZNS SSDs Perform on Real SQL DBMSs? An Experimental Analysis of MyRocks. 249-254

Zhaohui Zhang, Dongxue Zhang, Ke Liu, Pei Zhang, Pengwei Wang:
Streaming Data Evolution Analysis based on Class Kernel. 255-260
Session XII: Vulnerability Detection

Hui Luo, Lu Lu, Zhihong Liang, Siliang Suo:
Vulnerability Detection Based on Adapter Tuning and Enhanced Feature Learning. 261-266

Qing Yu Quan, Cheng Zeng, Yi Feng Wang, Jiao Ran Wang:
Intelligent Contract Timestamp Vulnerability Detection Based on Key Control FlowGraph. 267-272

Jiao Ran Wang, Cheng Zeng, Qing Yu Quan, Yi Feng Wang:
Smart Contract Vulnerability Detection Based on Mixed Channel Attention. 273-278

Yahui Zhao, Lu Lu, Zhihong Liang, Siliang Suo:
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection. 279-284

Tingfeng Liao, Lu Lu, Zhihong Liang, Siliang Suo:
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network. 285-288

Xudong He:
Developing Deep Neural Net Controllers to Assure System Stability with Non-Zero Equilibrium Points. 289-294
Session XIII: Services and Architectures

Dionysis Athanasopoulos
:
Benchmark for Evaluating the Design Quality of Object-Oriented Microservices. 295-300

Guoxing Tang, Yugen Du, Xia Chen
, Yingwei Luo, Benchi Ma:
Fuzzy Information Entropy and Region Biased Matrix Factorization for Web Service QoS Prediction. 301-306

Xia Chen
, Yugen Du, Guoxing Tang, Yingwei Luo, Benchi Ma:
RAHN: A Reputation Based Hourglass Network for Web Service QoS Prediction (S). 307-310

Zifan Liang
, Wei Lin, Sini Chen, Huibiao Zhu:
Modeling and Verifying OPC UA of Aggregating Server Architecture for Vertical Integration. 311-316

Wenbin Wu, Zhiru Hou, Huibiao Zhu:
Formalization and Verification of the Message Delivery Mechanism of Apache Pulsar. 317-322

Yubiao Gu, Pengwei Wang, Zhaohui Zhang, Yaping Wang:
Joint Coverage and Latency for Data-intensive Application Deployment in Mobile Edge Computing Environment (S). 323-326

Yukun Dai, Jian Li, Yuan Wan, Liang Xie, Pengfei Fan:
Enhanced Multidimensional Root Cause Localization with JSqueeze in AIOps (S). 327-332
Session XIV: Prediction and Recommendation

Zhongqin Bi, Xiaoyu Wang, Weina Zhang, Xueni Hu:
Stochastic Embeddings in Multi-Intent Contrastive Learning for Sequential Recommendation. 333-338

Jing Xiao, Tianyu Liang:
Co-REX: A Collaborative Transformer for Try Location Detection and Catch Exception Prediction. 339-344

Haoying Jin:
Machine Learning Techniques for Credit Card Risk Prediction: An Experimental Study. 345-350

Zhiling Zhu
, Tieming Chen
, Lizi Wu, Qijie Song:
CoreCast: Leveraging Project Metrics to Predict Core Contributor Trends in Open Source C57. 351-356

Xiangfu Meng, Weipeng Xie, Jiangyan Cui:
MMGCRN: Multimodal and Multiview Graph Convolutional Recurrent Network for Traffic Prediction. 363-368
Session XV: Advanced Learning

Chen Qian, Yingzhe Liu, Jiyun Li, Ying Liu:
PyM-FL: A Prototyping Approach for Multimodal Federated Learning. 369-374

Jiawen Weng, Zeke Xia, Ran Li, Ming Hu, Mingsong Chen:
FedQP: Towards Accurate Federated Learning using Quadratic Programming Guided Mutation. 375-380

Qing Mi, Yueyue Xi, Junyang Li, Yuanjun Zhao, Shijia Tang:
WCL-CRC: A Weakly-Supervised Contrastive Learning Framework for Few-Shot Code Readability Classification. 385-390

Enjing Li, Xiang Li
, Zhigang Zhao, Lu Wu, Yinglong Wang
:
An adaptive time-convolutional network online prediction method for ocean observation data. 391-397

LiPeng Huang, ZhuoHan Tao, Xiaowen Pei, Jiayu Bao, Yicheng Di, Yuan Liu:
Hierarchy Knowledge-aware Contrastive Learning for Recommendation. 398-404

Hang Xu, Jiangan Ji, Jianshan Peng, Liheng Chen:
Crash Deduplication using Hybrid Runtime Features and Multi-Structure Neural Network. 405-411
Session XVI: AI Applications with Complex Data

Jian Niu, Zhijun Fang, Chen Qian, Xihe Qiu:
A Medical Image Segmentation Method based on Multi-scale Features and Contour Loss Constrain (S). 412-415

Jianfeng Shi, Qifei Zhang
, Furen Bai, Wenjuan Li:
Revolutionizing Lip Reading: The Power of Temporal Attention (S). 416-421

Zhiping Zhang, Tao Sun, Hongyan Zheng, Hao Liu, Gengchen Liu, Zhi Yang, Xiaoyu Wang:
PNRITR: Research on Positive and Negative Entity Region Perception Methods for Image-Text Retrieval (S). 422-425

Huishan Yang, Xi Wu, Fengyong Peng, Yongxin Zhao, Yongjian Li:
Detecting Semantic-level Polysemy Ambiguity by Fusing External Semantic Knowledge (S). 426-429

Guangcheng Dongye, Li Zhang, Wenhao Bi:
A research of ADHD resting-state brain functional networks based on minimum spanning tree and hierarchical graph clustering. 430-433

Hang Fu, Cheng Zeng:
Robust Network For Segmenting Roof Planes From Sparse Point Clouds (S). 434-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






