


default search action
SEDA 2018: Rome, Italy
- Paolo Ciancarini

, Manuel Mazzara, Angelo Messina, Alberto Sillitti, Giancarlo Succi
:
Proceedings of 6th International Conference in Software Engineering for Defence Applications, SEDA 2018, Rome, Italy, June 7-8, 2018. Advances in Intelligent Systems and Computing 925, Springer 2020, ISBN 978-3-030-14686-3 - Akinlolu Solomon Adekotujo, Jooyoung Lee

, Ayokunle Oluwatoyin Enikuomehin, Manuel Mazzara
, Segun Benjamin Aribisala:
Bi-lingual Intent Classification of Twitter Posts: A Roadmap. 1-9 - Daniel A. Ashlock

, Matthew Kreitzer:
Evolving Diverse Cellular Automata Based Level Maps. 10-23 - Hamna Aslam, Joseph Alexander Brown

, Angelo Messina:
Affordance Theory Applied to Agile Development: A Case Study of LC2EVO. 24-35 - Mirko Bastianini

, Luca Recchia, Mario Trinchera, Emiliano De Paoli
, Christian Di Biagio:
Multi-level Security Approach on Weapon Systems. 36-43 - Joseph Alexander Brown

, Marco Scirea
:
Procedural Generation for Tabletop Games: User Driven Approaches with Restrictions on Computational Resources. 44-54 - Margherita Favaretto, Tu Tran Anh, Juxhino Kavaja, Michele De Donno, Nicola Dragoni

:
When the Price Is Your Privacy: A Security Analysis of Two Cheap IoT Devices. 55-75 - Bulat Gabdrakhmanov, Aleksey Tolkachev, Giancarlo Succi

, Jooyong Yi:
An Open-Source Software Metric Tool for Defect Prediction, Its Case Study and Lessons We Learned. 76-85 - Alberto Giaretta

, Nicola Dragoni
:
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. 86-93 - Evgeniy Gryaznov, Manuel Mazzara

:
Semantic Query Language for Temporal Genealogical Trees. 94-109 - Vladimir Ivanov, Sergey Masyagin

, Marat Mingazov, Giancarlo Succi
:
Recruiting Software Developers a Survey of Current Russian Practices. 110-127 - Vladimir Ivanov, Sergey Masyagin

, Alan Rogers, Giancarlo Succi
, Alexander Tormasov, Jooyong Yi, Vasily Zorin:
Comparison of Agile, Quasi-Agile and Traditional Methodologies. 128-137 - Sergey Karapetyan, Alexander Dolgoborodov, Sergey Masyagin

, Manuel Mazzara
, Angelo Messina, Ekaterina Protsko:
Innopolis Going Global - Internationalization of a Young IT University. 138-145 - Vivek Kumar

, Manuel Mazzara
, Angelo Messina, JooYoung Lee
:
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks - Prevention and Prediction for Combating Terrorism. 146-158 - JooYoung Lee

:
Game Theoretic Framework to Mutation Testing. 159-164 - Valentina Lenarduzzi

, Alberto Sillitti, Davide Taibi
:
A Survey on Code Analysis Tools for Software Maintenance Prediction. 165-175 - Nikita Lozhnikov, Leon Derczynski, Manuel Mazzara

:
Stance Prediction for Russian: Data and Analysis. 176-186 - Luca Galantini, Angelo Messina, Mario Ruggiero:

Software Requirements Complexity Analysis to Support the "ADVISORY NETWORK IN TO THE NATION FORCES BUILD-UP". 187-197 - Angelo Messina, Ilya Voloshanovskiy:

Hybrid Agile Software Development for Smart Farming Application. 198-205 - Alexandr Naumchev:

Detection of Inconsistent Contracts Through Modular Verification. 206-220 - Jonas Juhl Nielsen, Marco Scirea

:
Balanced Map Generation Using Genetic Algorithms in the Siphon Board-Game. 221-231 - Alexander Perucci, Marco Autili

, Massimo Tivoli
, Alessandro Aloisio
, Paola Inverardi:
Distributed Composition of Highly-Collaborative Services and Sensors in Tactical Domains. 232-244 - Giuseppe Procopio:

Safety and Security in GNU/Linux Real Time Operating System Domain. 245-254 - Victor Rivera, Jooyoung Lee

, Manuel Mazzara
:
Mapping Event-B Machines into Eiffel Programming Language. 255-264 - Andrey Sadovykh

, Alessandra Bagnato
, Dragos Truscan
, Pierluigi Pierini, Hugo Bruneliere
, Abel Gómez
, Jordi Cabot
, Orlando Avila-García, Wasif Afzal
:
A Tool-Supported Approach for Building the Architecture and Roadmap in MegaM@Rt2 Project. 265-274 - Ignacio Sañudo, Paolo Cortimiglia, Luca Miccio, Marco Solieri

, Paolo Burgio
, Christian Di Biagio, Franco Felici, Giovanni Nuzzo, Marko Bertogna:
The Key Role of Memory in Next-Generation Embedded Systems for Military Applications. 275-287 - Gudmundur Sigurdsson, Alberto Giaretta

, Nicola Dragoni
:
Vulnerabilities and Security Breaches in Cryptocurrencies. 288-299 - Petr Sosnin:

Question-Answer Nets Objectifying a Conceptual Space in the Design of a System with Software. 300-311 - Jooyong Yi:

On the Time Performance of Automated Fixes. 312-324 - Adam Folohunsho Zubair

, Segun Benjamin Aribisala, Marco Manca
, Manuel Mazzara
:
On the Parcellation of Functional Magnetic Resonance Images. 325-332

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














