SEDE 2019: Volume Information

Proceedings of 28th International Conference on Software Engineering and Data Engineering

24 articles233 pagesPublished: September 26, 2019

Papers

Software Engineering I
Andrew Munoz, Xiang Li, Bahadir Pehlivan, Frederick C. Harris and Sergiu Dascalu
1-10
Ming-Chang Huang
11-20
Terri Heglar, Andrew Penrose, Austin Yount, Kristine Galek, Yantao Shen, Sergiu Dascalu and Frederick C. Harris
21-30
Sarika Rajeev and Sharad Sharma
31-40
Data Engineering I
David Wilson, Wen-Chi Hou and Feng Yu
41-50
Sri Teja Bodempudi, Sharad Sharma, Atma Sahu and Rajeev Agrawal
51-60
Ajay Bandi and Aziz Fellah
61-67
Mohammad Hossain, Maninder Singh and Sameer Abufardeh
68-77
Software Engineering II
Rita Cortés and Fulvio Lizano
78-87
Armando Arce-Orozco, Antonio González-Torres and Erick Mata-Montero
88-97
Aziz Fellah and Ajay Bandi
98-108
James Stigall and Sharad Sharma
109-118
Osama Barack and Liguo Huang
119-128
Data Engineering II
Timothy Oladunni and Sharad Sharma
129-138
Cuauhtémoc López-Martín
139-147
Vijaya Kumar Eluri, Shahram Sarkani and Thomas Mazzuchi
148-157
Milad A. Khalil and Jiang Guo
158-164
Brodie Boldt, Christopher Cooper, Ryan Fox, Jared Parks and Erin Keith
165-173
CAINE-SEDE Joint Session on Cybersecurity followed by Joint Panel
Azene Zenebe, Mufaro Shumba, Andrei Carillo and Sofia Cuenca
174-183
Software Engineering III
Rakesh Matta, Rui Wu and Shanyue Guan
184-193
Corey Thibeault
194-203
Santiago Hyun Dorado and Julio Ariel Hurtado
204-214
Nikkolas J. Irwin, Anthony Bennett, Kevin Carlos, Jalal Kiswani, Cynthia R. Harris, Sergiu Dascalu and Frederick C. Harris
215-224
Alexander Redei
225-233

Keyphrases

AForge, AForge.NET, Android, Android App, Architectural decay, Architectural Rationale Documentation, architectural smell, architectural violation, architecture conformance, Augmented Reality, Bayesian algorithm, Big Data2, blob detection, Boarder Detection, Boolean operations, Bradley Local Thresholding, Building Evacuation, chin tuck against resistance, Cloud Computing2, clustering/grouping algorithm, code decay, Creational Patterns, Cryptography, Cyber Analytic, cyber threat intelligence, Data Classification, Data Mining, data visualization, Deep Web or Darknet, defect analysis, defect classification, Defect density analysis, Defect density prediction, design patterns, drift, dynamic programming, Dysphagia, edge detection, educational game, Educational Modules, Encryption, environment, Erosion, Event Management, event scheduling, Exploit Type, Extreme Value Theory, Festival, Finantial metrics, free-riding, full stack, fully homomorphic, Fuzzy Logic, game theme-based learning, GitHub, Google, graphics, GTI, hacker forums, Human-Centric Approach, Human Computer Interaction2, Immersive Environment, information visualization, ISBSG, library, machine learning3, machine learning classification, magic, Magic The Gathering, map, Microservice, MLP, mobile application2, OCR, Open Source Software, Optical Character Recognition, Orthogonal Defect Classification (ODC), Outliers, P2P network, partially homomorphic, payment processing, portals, Postgres, PostgreSQL, predicate trees, Project software, Quadrilateral Transformation, query approximation, query size estimation, Rehabilitation, reputation system, ROI, sampling, Scrum, search engine, Sentiment Analysis, Situational Awareness, sliding window, SMQII, software architecture2, software complexity, Software Engineering, somewhat homomorphic, Source Code Annotations, Speed Gain, Tesseract, threshold, Tree-based Algorithm, User Interface (UI), vertical processing, Virtual Reality2, Vuforia, web application, web design.