SEDE 2019: Volume InformationProceedings of 28th International Conference on Software Engineering and Data Engineering24 articles•233 pages•Published: September 26, 2019 PapersSoftware Engineering I | Andrew Munoz, Xiang Li, Bahadir Pehlivan, Frederick C. Harris and Sergiu Dascalu 1-10 | Ming-Chang Huang 11-20 | Terri Heglar, Andrew Penrose, Austin Yount, Kristine Galek, Yantao Shen, Sergiu Dascalu and Frederick C. Harris 21-30 | Sarika Rajeev and Sharad Sharma 31-40 | Data Engineering I | David Wilson, Wen-Chi Hou and Feng Yu 41-50 | Sri Teja Bodempudi, Sharad Sharma, Atma Sahu and Rajeev Agrawal 51-60 | Ajay Bandi and Aziz Fellah 61-67 | Mohammad Hossain, Maninder Singh and Sameer Abufardeh 68-77 | Software Engineering II | Rita Cortés and Fulvio Lizano 78-87 | Armando Arce-Orozco, Antonio González-Torres and Erick Mata-Montero 88-97 | Aziz Fellah and Ajay Bandi 98-108 | James Stigall and Sharad Sharma 109-118 | Osama Barack and Liguo Huang 119-128 | Data Engineering II | Timothy Oladunni and Sharad Sharma 129-138 | Cuauhtémoc López-Martín 139-147 | Vijaya Kumar Eluri, Shahram Sarkani and Thomas Mazzuchi 148-157 | Milad A. Khalil and Jiang Guo 158-164 | Brodie Boldt, Christopher Cooper, Ryan Fox, Jared Parks and Erin Keith 165-173 | CAINE-SEDE Joint Session on Cybersecurity followed by Joint Panel | Azene Zenebe, Mufaro Shumba, Andrei Carillo and Sofia Cuenca 174-183 | Software Engineering III | Rakesh Matta, Rui Wu and Shanyue Guan 184-193 | Corey Thibeault 194-203 | Santiago Hyun Dorado and Julio Ariel Hurtado 204-214 | Nikkolas J. Irwin, Anthony Bennett, Kevin Carlos, Jalal Kiswani, Cynthia R. Harris, Sergiu Dascalu and Frederick C. Harris 215-224 | Alexander Redei 225-233 |
KeyphrasesAForge, AForge.NET, Android, Android App, Architectural decay, Architectural Rationale Documentation, architectural smell, architectural violation, architecture conformance, Augmented Reality, Bayesian algorithm, Big Data2, blob detection, Boarder Detection, Boolean operations, Bradley Local Thresholding, Building Evacuation, chin tuck against resistance, Cloud Computing2, clustering/grouping algorithm, code decay, Creational Patterns, Cryptography, Cyber Analytic, cyber threat intelligence, Data Classification, Data Mining, data visualization, Deep Web or Darknet, defect analysis, defect classification, Defect density analysis, Defect density prediction, design patterns, drift, dynamic programming, Dysphagia, edge detection, educational game, Educational Modules, Encryption, environment, Erosion, Event Management, event scheduling, Exploit Type, Extreme Value Theory, Festival, Finantial metrics, free-riding, full stack, fully homomorphic, Fuzzy Logic, game theme-based learning, GitHub, Google, graphics, GTI, hacker forums, Human-Centric Approach, Human Computer Interaction2, Immersive Environment, information visualization, ISBSG, library, machine learning3, machine learning classification, magic, Magic The Gathering, map, Microservice, MLP, mobile application2, OCR, Open Source Software, Optical Character Recognition, Orthogonal Defect Classification (ODC), Outliers, P2P network, partially homomorphic, payment processing, portals, Postgres, PostgreSQL, predicate trees, Project software, Quadrilateral Transformation, query approximation, query size estimation, Rehabilitation, reputation system, ROI, sampling, Scrum, search engine, Sentiment Analysis, Situational Awareness, sliding window, SMQII, software architecture2, software complexity, Software Engineering, somewhat homomorphic, Source Code Annotations, Speed Gain, Tesseract, threshold, Tree-based Algorithm, User Interface (UI), vertical processing, Virtual Reality2, Vuforia, web application, web design. |
|