


default search action
20th ENASE 2025: Porto, Portugal
- Mike Mannion

, Tomi Männistö, Leszek A. Maciaszek:
Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2025, Porto, Portugal, April 4-6, 2025. SCITEPRESS 2025, ISBN 978-989-758-742-9
Invited Speakers
- Wim Vanhaverbeke:

Digital Technologies, Business Model Innovation & Innovation Ecosystem Management in Institutionalized Industries. ENASE 2025: 5 - Loic Bachelart:

Technological Adoption in the Era of Generative AI. ENASE 2025: 7 - Philipp Leitner:

A Brief Journey Through History: From Distributed Objects Over SOA to Microservices. ENASE 2025: 9
Papers
- Jesús Carreño-Bolufer

, José Fabián Reyes Román, Sergio Pérez Andrés, Désirée Ramal Pons, Víctor Juárez Vidal, Adela Cañete Nieto, Óscar Pastor:
A Conceptual Model-Based Application for the Treatment and Management of Data in Pediatric Oncology: The Neuroblastoma Use Case. 15-26 - Tom Yaacov, Gera Weiss, Adiel Ashrov, Guy Katz, Jules Zisser:

Exploring and Evaluating Interplays of BPpy with Deep Reinforcement Learning and Formal Methods. 27-40 - Martin Corovcák

, Pavel Koupil:
SQL vs NoSQL: Six Systems Compared. 41-53 - Víctor Pérez-Piqueras

, Pablo Bermejo López, José A. Gámez:
Agile Effort Estimation Improved by Feature Selection and Model Explainability. 54-66 - Myo Thiha, Halil Yetgin, Luca Piras

, Mohammed Ghazi Al-Obeidallah:
Enhancing Privacy, Censorship Resistance, and User Engagement in a Blockchain-Based Social Network. 67-79 - Yunji Zhang, Franck Ravat

, Sébastien Laborie, Philippe Roose:
Multi-Perspective Analyses of Spatio-Temporal Data About Well-Being. 80-91 - Henok Birru, Antonio Cicchetti, Malvina Latifaj:

Supporting Automated Documentation Updates in Continuous Software Development with Large Language Models. 92-106 - Huynh Thanh Thien Pham

, Frank Jiang, Lei Pan, Alessio Bonti, Mohamed Abdelrazek:
uBSaaS: A Unified Blockchain Service as a Service Framework for Streamlined Blockchain Services Integration. 107-119 - Abhinav Jamwal

, Sandeep Kumar
:
Towards an Approach for Project-Library Recommendation Based on Graph Normalization. 120-127 - Kinari Nishiura, Atsuya Matsutomo, Akito Monden:

Evaluating ChatGPT's Ability to Detect Naming Bugs in Java Methods. 128-136 - Olivia Rodríguez-Valdés, Domenico Amalfitano, Otto Sybrandi, Beatriz Marín, Tanja E. J. Vos:

The Scent of Test Effectiveness: Can Scriptless Testing Reveal Code Smells? 137-148 - Melissa Silva, João Pascoal Faria:

Automated Social Media Feedback Analysis for Software Requirements Elicitation: A Case Study in the Streaming Industry. 149-160 - Saurabh Chauhan, Zeeshan Rasheed, Malik Abdul Sami, Zheying Zhang

, Jussi Rasku, Kai-Kristian Kemell, Pekka Abrahamsson
:
LLM-Generated Microservice Implementations from RESTful API Definitions. 161-173 - Irena Holubová, Alzbeta Srutková, Jáchym Bártík:

Reshaping Reality: Creating Multi-Model Data and Queries from Real-World Inputs. 174-184 - Valtteri Ala-Salmi

, Zeeshan Rasheed, Malik Abdul Sami
, Zheying Zhang
, Kai-Kristian Kemell, Jussi Rasku, Shahbaz Siddeeq, Mika Saari
, Pekka Abrahamsson
:
Autonomous Legacy Web Application Upgrades Using a Multi-Agent System. 185-196 - Jennifer Gross, Temesgen Hagos Mengesha, Sofia Ouhbi

:
Software Sustainability Perceptions in the Industry: A Questionnaire Study. 197-207 - Hajer Ben Haj Ayech, Ricardo Martinho, Sonia Ayachi Ghannouchi:

S4BP: An Approach for Assessing Business Process Stability. 208-216 - Shaza Elbishbishy, Jeshwitha Jesus Raja, Philipp Kranz, Marian Daun:

Combining Goal and Process Models for the Specification of Human-Robot Collaborations. 217-228 - Divij D., Y. Raghu Reddy, Radha Krishna B., Sai Anirudh Karre:

VRSLOG: An Approach to Log Immersive Experiences in Virtual Reality Systems. 229-239 - Nabila Daly, Faten Khemakhem, Hela Ltifi:

Exploring Feature Extraction Techniques and SVM for Facial Recognition with Image Generation Using Diffusion Models. 240-251 - Adiel Ashrov, Arnon Sturm, Achiya Elyasaf, Guy Katz:

A Study on the Comprehensibility of Behavioral Programming Variants. 252-267 - Asli Sari, Ayse Tosun, Gülfem Isiklar Alptekin:

Identifying Testing Behaviour in Open Source Projects: A Case Analysis for Apache Spark. 268-279 - Vitalijs Teze, Erika Nazaruka, Dmitrijs Bliznuks:

Information-Theoretic Patient Record Matching in Medical Databases: A Discriminative Power and Feature Analysis Using MIMIC-IV. 280-291 - Tasmia Zerin, B. M. Mainul Hossain, Kazi Sakib:

A Heuristic Approach to Localize CSS Properties for Responsive Layout Failures. 292-303 - Zsuzsanna Onet-Marian, Diana-Lucia Hotea:

Cross-Version Defect Prediction: Does Excessive Train-Test Similarity Affect the Reliability of Evaluation? 304-315 - Charaf Eddine Dridi, Nabil Hameurlain, Faiza Belala:

Maude Strategies-Based SoSs Workflow Modeling. 316-327 - Virginia Niculescu, Maria-Camelia Chisalita-Cretu, Cristina-Claudia Osman, Adrian Sterca:

Model-Driven Development Using LLMs: The Case of ChatGPT. 328-339 - Hanen Dhrir, Maha Charfeddine, Habib M. Kammoun:

Advancing Network Anomaly Detection Using Deep Learning and Federated Learning in an Interconnected Environment. 343-350 - Ana Pintilie, Remco Poelarends, Andrea Capiluppi:

Optimising IIoT Control Systems at Demcon: Integrating MQTT, Sparkplug B, and ISA-88 for Unified Automation. 351-358 - Zakaria Maamar, Amel Benna, Hirad Baradaran Rezaei, Amin Beheshti, Fethi Rabhi

:
Impact of Business Process Masking on Organizations' Policies. 359-366 - Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen:

Runtime Verification for Deep Learning Systems. 367-377 - Andrea Lezcano Airaldi

, Emanuel Irrazábal, J. Andrés Díaz Pace:
Best Practices and Evaluation Methods for Narrative Information Visualizations: A Systematic Review. 378-389 - Sarah Augustin, Hendrik Winkelmann, Herbert Kuchen:

Mutation Operators for Mutation Testing of Angular Web Applications. 390-397 - Emilio Carrión, Pedro Valderas, Óscar Pastor:

Querying Digital Twin Models. 398-405 - Otuu Obinna Ogbonnia, Joseph Henry Anajemba, Deepak Ranjan Sahoo:

Exploring the Willingness of Nigerian Community Policing Stakeholders to Adopt Technology Through Survey. 406-413 - Ahmed-Reda Rhazi

, Oumayma Banouar, Fadel Touré, Said Raghay:
Recommender Systems Approaches for Software Defect Prediction: A Comparative Study. 414-424 - Laura Diana Cernau, Laura Diosan, Camelia Serban:

Challenges in Software Metrics Adoption: Insights from Cluj-Napoca's Development Community. 425-432 - Henrique Pucci Pinto, Júlia de Souza, Elaine Venson, Rejane Maria da Costa Figueiredo:

Exploring the Role of Service Design in Software Development: A Systematic Mapping. 433-440 - Rares Cristea

, Ciprian Paduraru, Alin Stefanescu:
MODE: A Customizable Open-Source Testing Framework for IoT Systems and Methodologies. 441-448 - Takeharu Mitsuda, Hiroyuki Nakagawa, Haruhiko Kaiya, Hironori Takeuchi, Sinpei Ogata, Tatsuhiro Tsuchiya:

Exhaustive Model Identification on Process Mining. 449-456 - Maximilian Auch, Maximilian Balluff, Peter Mandl, Christian Wolff:

Is It Professional or Exploratory? Classifying Repositories Through README Analysis. 457-467 - Panagiotis Mantos, Fotis Kokkoras, George Kakarontzas:

Trends and Challenges in Machine Learning for Code Summarization and Comprehension: A Systematic Literature Review. 468-475 - Zouhaira Abdellaoui, Houda Meddeb:

Genetic Algorithm for Optimal Response Time Scheduling of Electric Vehicle Model. 476-483 - Francesco Refolli, Darius Sas, Francesca Arcelli Fontana:

Lessons Learned from Implementing a Language-Agnostic Dependency Graph Parser. 484-491 - Nícolas Hamparsomian, Marcos Lordello Chaim:

A Study on Different Spectra in Fault Localization. 492-499 - Tanjila Kanij, Shafia Husna, Afzal Azeem Chowdhary, Misita Anwar, Md Khalid Hossain, John Grundy:

An Innovative Approach to Represent Tacit Knowledge of Fishing with Knowledge Graphs. 500-507 - Raman Saxena:

Design Thinking and a Human-Centered Approach to Explore the Potential of Mobile Phone and AI-Enabled Just-in-Time Mental Health Solution for University Students in India. 508-519 - James Galbraith, Des Greer

:
Detecting Duplicate Effort in GitHub Contributions. 520-529 - Esperança Amengual Alcover, Antoni Jaume-i-Capó, Miquel Miró-Nicolau, Gabriel Moyà-Alcover, Antonia Paniza Fullana:

Towards an Evaluation Framework for Explainable Artificial Intelligence Systems for Health and Well-Being. 530-540 - Afef Jmal Maâlej, Achraf Weli:

Automated Testing of Tezos Blockchain-Oriented Software. 541-548 - Aleksander Swiniarski, Anna Derezinska:

Automated Migration of Legacy Code from the C++14 to C++23 Standard. 549-556 - Sabbir M. Saleh, Nazim H. Madhavji, John Steinbacher:

Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments. 557-564 - Nan Messe, Avi Shaked:

AADT: Asset-Driven Attack-Defense Tree. 565-572 - Giorgos Shittas, Georgia M. Kapitsaki, Maria Papoutsoglou:

Licy: A Chatbot Assistant to Better Understand and Select Open Source Software Licenses. 573-581 - Georgia M. Kapitsaki, Luigi Lavazza, Sandro Morasca, Gabriele Rotoloni:

A Replicated Study on Factors Affecting Software Understandability. 582-591 - Mithilesh Pandey, Sandeep Kumar

:
VP-IAFSP: Vulnerability Prediction Using Information Augmented Few-Shot Prompting with Open Source LLMs. 592-599 - Oltean Anisia Veronica, Ioan-Daniel Pop, Adriana Mihaela Coroiu:

Medical Chatbot for Disease Prediction Using Machine Learning and Symptom Analysis. 600-607 - Michal Töpfer

, Tomás Bures, Frantisek Plásil, Petr Hnetynka
:
Interpreting Workflow Architectures by LLMs. 608-617 - Alexandre Bazin, Alain Gutierrez, Marianne Huchard, Pierre Martin, Yulin Zhang:

Variability-Driven User-Story Generation Using LLM and Triadic Concept Analysis. 618-625 - Doriana Cobârzan, Richard Bubel, Torsten Ullrich:

The Impact of the European Product Liability Directive on Software Engineering. 626-634 - Abhinav Jamwal

, Sandeep Kumar
:
Third-Party Library Recommendations Through Robust Similarity Measures. 635-642 - Yassine Talas, Hajer Rabii:

Sustainable Software Development: An ADKAR-Based Framework for Project Managers and Teams. 643-651 - Taif Ammash, Hamza Gharsellaoui, Leila Ben Ayed:

LICA-HE: Optimal Lossless Image Compression Algorithm for Color Passport-Photo Compression. ENASE 2025: 652-659 - Ciprian Paduraru, Catalina Camelia Patilea, Alin Stefanescu:

CyberGuardian 2: Integrating LLMs and Agentic AI Assistants for Securing Distributed Networks. 660-667 - Faten Abbassi, Yousra Bendaly Hlaoui, Faouzi Ben Charrada:

Machine Learning for Ontology Alignment. 668-675 - Priyanka H., Ankitha A. C., Pratyusha Satish Rao, Urja Modi, Chandu Naik:

Anomaly Detection in Surveillance Videos. 676-683 - Mahbuba Shefa, Tasnuva Ferdous, Afzal Azeem Chowdhary, Md. Jannatul Rakib Joy, Tanjila Kanij, Md. Al Mamun:

A Progressive Step Towards Automated Fact-Checking by Detecting Context in Diverse Languages: A Prototype for Bangla Facebook Posts. 684-691 - Anika Tabassum Era, Tanjila Kanij, John Grundy, Md. Al Mamun:

A User-Centered Design Approach to Develop a Privacy Awareness Application. 692-699 - Koshi You, Hiroaki Fukuda, Paul Leger:

The Impact of Context-Oriented Programming on Declarative UI Design in React. 700-707 - Morteza Ahmadianmanzary, Sofia Ouhbi

:
Exploring the Influence of User Interface on User Trust in Generative AI. 708-714 - Shambhavi Jahagirdar, Sai Anirudh Karre, Y. Raghu Reddy:

VReqDV: Model Based Design Generation & Design Versioning Tool for Virtual Reality Product Development. 715-722 - Joana Pedrosa, Luís Gonzaga Magalhães, Ricardo Martinho:

Integrating Process Mining and Success Factors in Information Systems Projects: A Decision Support System Approach. 723-730 - Bogdan Ichim, Andrei-Cristian Nastase:

On Improving the Efficiency of AI-Generated Text Detection. 731-738 - Ali Mohammed Abed, Houcemeddine Hermassi, Walid Barhoumi:

A Near-Optimal Steganography-Based Solution for Embedding Data in Video Cover Medium. ENASE 2025: 739-745 - Maria Spichkova, Hina Lee, Kevin Iwan, Madeleine Zwart, Yuwon Yoon, Xiaohan Qin:

Agile Retrospectives: What Went Well? What Didn't Go Well? What Should We Do? 746-753 - Zaki Pauzi, Andrea Capiluppi:

A Multivocal Mapping Study on Artifact Traceability Complexities in Practice. 754-761 - Michalis Pingos, Spyros Loizou, Andreas S. Andreou:

Integrating Data Lakes with Self-Adaptive Serious Games. 762-772 - Oksana Nikiforova, Kristaps Babris, Megija Krista Milune

, Navyasri Tanguturi, Óscar Pastor:
Key Artefacts in the Initial Phases of IT Project Management: Systematic Mapping Study. 773-781 - Bhavishya Swami, Jeshwitha Jesus Raja, Meenakshi Manjunath, Amruta Rout, Marian Daun:

Towards a Cultural Perspective on Human-Robot Interaction. 782-789 - Ioana Georgiana Ciuciu, Manuela Andreea Petrescu:

Students' Perception of Big Data Engineering in Higher Education Curricula: Expectations, Interest and Ethical Implications. 790-797 - Jefferson Seide Molléri, Bogdan Marculescu:

Data-Driven Personas for Software Engineering Research. 798-805 - Niels Doorn

, Tanja E. J. Vos, Beatriz Marín:
Design of a Serious Game on Exploratory Software Testing to Improve Student Engagement. 806-813 - Pratham Maan, Lov Kumar, Vikram Singh, Lalita Bhanu Murthy Neti, Aneesh Krishna:

An Empirical Framework for Automatic Identification of Video Game Development Problems Using Multilayer Perceptron. 814-821 - Elias Seid, Oliver Popov, Fredrik Blix:

Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches. 822-834 - Andrada-Mihaela-Nicoleta Moldovan, Andreea Vescan, Crina Grosan:

Healthcare Bias in AI: A Systematic Literature Review. 835-842 - Andrei Varan

, Adriana Mihaela Coroiu, Liviu-Mihai Iacob:
Analyzing Deforestation Dynamics in Romania Using Random Forest Algorithm and Google Earth Engine. 843-847 - Andreas Speck, Melanie Windrich, Jan Hesse, Melina Sentz, David Kuhlen, Thomas Stuht, Elke Pulvermüller:

Generating Formal Process Models and Decisions from Examination Rules in Natural Text with ChatGPT. 848-857 - Tasneem Annahdi

, Duaa Alkubaisy, Luca Piras
:
A Risk Assessment of Information Security in a Diet Centre Business: A Case Study. 858-867

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














