Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00040
Eréndira M. Jiménez-Hernández, José A. Jiménez-Murillo, M. A. Segura-Castruita, Ivonne González-Leal
This paper presents a piece of serious video game, denominated as Tree Legends with UnityChan, which has been developed with the objective of supporting the learning of Tree Traversals. This educational proposal increases the learners’ motivation by including gamification, through learning points that can be earned with each successfully completed mission. The serious video game was evaluated by means of a formal experiment, which was carried out with Discrete Mathematics students at a higher education institution in Mexico, where two groups were formed randomly: A control group, whose members attended classes and reinforced their knowledge in a traditional manner with a pencil and paper, and an experimental group, which learned receiving the same classes as the control group, but reinforcing what they had learned using the serious video game. The statistical results obtained indicate that the use of Tree Legends with UnityChan has a positive and motivating effect on learning and that a greater academic performance is achieved than when the traditional learning reinforcement method is applied.
{"title":"Using a Serious Video Game to Support the Learning of Tree Traversals","authors":"Eréndira M. Jiménez-Hernández, José A. Jiménez-Murillo, M. A. Segura-Castruita, Ivonne González-Leal","doi":"10.1109/CONISOFT52520.2021.00040","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00040","url":null,"abstract":"This paper presents a piece of serious video game, denominated as Tree Legends with UnityChan, which has been developed with the objective of supporting the learning of Tree Traversals. This educational proposal increases the learners’ motivation by including gamification, through learning points that can be earned with each successfully completed mission. The serious video game was evaluated by means of a formal experiment, which was carried out with Discrete Mathematics students at a higher education institution in Mexico, where two groups were formed randomly: A control group, whose members attended classes and reinforced their knowledge in a traditional manner with a pencil and paper, and an experimental group, which learned receiving the same classes as the control group, but reinforcing what they had learned using the serious video game. The statistical results obtained indicate that the use of Tree Legends with UnityChan has a positive and motivating effect on learning and that a greater academic performance is achieved than when the traditional learning reinforcement method is applied.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00020
S. Jayatilake, E. Ogunshile, M. Aydin, K. Phung
At present the world is moving towards alternative medicine and behavioural alteration for treating, managing, and preventing chronical diseases. With the individuality of the human beings has added more complexity in a domain where very high accuracy is demanded. Formal methods have been proven to be occupied in critical system development. This paper introduces a generic disease model called Stream X-Machine Disease Model (SXMDM) based on X-Machine theory. SXMDM has been developed as a proof of concept that formal methods, especially Stream X-Machines, can be employed to model medical conditions or diseases. We have conducted an experiment on modelling an actual disease using a case study of type 2 diabetes. The results of the experiment illustrates that the proposed SXMDM is capable of modelling chronic diseases.
{"title":"Modelling Diseases with Stream X-Machine","authors":"S. Jayatilake, E. Ogunshile, M. Aydin, K. Phung","doi":"10.1109/CONISOFT52520.2021.00020","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00020","url":null,"abstract":"At present the world is moving towards alternative medicine and behavioural alteration for treating, managing, and preventing chronical diseases. With the individuality of the human beings has added more complexity in a domain where very high accuracy is demanded. Formal methods have been proven to be occupied in critical system development. This paper introduces a generic disease model called Stream X-Machine Disease Model (SXMDM) based on X-Machine theory. SXMDM has been developed as a proof of concept that formal methods, especially Stream X-Machines, can be employed to model medical conditions or diseases. We have conducted an experiment on modelling an actual disease using a case study of type 2 diabetes. The results of the experiment illustrates that the proposed SXMDM is capable of modelling chronic diseases.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00027
Jairo Arévalo Acosta, Nicolás Barrios Carvajal, Alexander Barón Salazar
The application of good practices for the control of software changes allows saving costs, work effort and time. Also, it allows preserving the product integrity. In the software life cycle and regardless of the stage, changes occur frequently. To control these changes, in software engineering, various practices are proposed. One of the best-known practices is RUP Control Changes to Software practice. The software engineering community defines this practice in different ways. These definitions do not present a clear structure for the RUP Control Changes to Software practice, ergo, it is complex to identify and define the elements that constitute the practice. This fact creates difficulty in understanding, applying and evaluating the practice in real contexts. In this paper, the Model for the Definition of Practices in Software Engineering is applied to the RUP Control Changes to Software practice. From the application of the model, a well-formed and well-named practice is obtained, easy to understand, apply and evaluate. This process is called essentialization. An essentialized practice makes it easier for practitioners to understand, apply, and evaluate the practice. An essentialized practice has a defined structure with elements that are integrated in a systemic way. The essentialized RUP Control Changes to Software practice is validated through a case study that allows a real context to be simulated.
{"title":"Essentialization of the RUP Control Changes to Software practice: Making practical the practice","authors":"Jairo Arévalo Acosta, Nicolás Barrios Carvajal, Alexander Barón Salazar","doi":"10.1109/CONISOFT52520.2021.00027","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00027","url":null,"abstract":"The application of good practices for the control of software changes allows saving costs, work effort and time. Also, it allows preserving the product integrity. In the software life cycle and regardless of the stage, changes occur frequently. To control these changes, in software engineering, various practices are proposed. One of the best-known practices is RUP Control Changes to Software practice. The software engineering community defines this practice in different ways. These definitions do not present a clear structure for the RUP Control Changes to Software practice, ergo, it is complex to identify and define the elements that constitute the practice. This fact creates difficulty in understanding, applying and evaluating the practice in real contexts. In this paper, the Model for the Definition of Practices in Software Engineering is applied to the RUP Control Changes to Software practice. From the application of the model, a well-formed and well-named practice is obtained, easy to understand, apply and evaluate. This process is called essentialization. An essentialized practice makes it easier for practitioners to understand, apply, and evaluate the practice. An essentialized practice has a defined structure with elements that are integrated in a systemic way. The essentialized RUP Control Changes to Software practice is validated through a case study that allows a real context to be simulated.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00029
Egbeyong E. Tanjong, D. Carver
Software requirements specifications serve as instructions for any software development engagement. These instructions are mostly written in natural language for ease of manual analysis and comprehension. Since natural language is inherently ambiguous, software requirements analysis plays a pivotal role in enhancing clarity during the software development life cycle. There are several methods of software requirements analysis. We focus on analysis methods which categorize requirements. We present a comparison of the performance of three common categorization techniques of software requirements documents, using three different datasets. We evaluate three bag of words models: count vectorization, term frequency - inverse document frequency (TF-IDF), and a word embeddings technique. We report the similarity of the categories obtained using cosine similarity as a measure of similarity between the requirements vectors produced by the different methods. Syntactic techniques outperformed semantic techniques for some datasets. These results suggest that syntactic techniques produce comparable categories to semantic techniques for some requirements categorization tasks.
{"title":"Improving Impact and Dependency Analysis through Software Categorization Methods","authors":"Egbeyong E. Tanjong, D. Carver","doi":"10.1109/CONISOFT52520.2021.00029","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00029","url":null,"abstract":"Software requirements specifications serve as instructions for any software development engagement. These instructions are mostly written in natural language for ease of manual analysis and comprehension. Since natural language is inherently ambiguous, software requirements analysis plays a pivotal role in enhancing clarity during the software development life cycle. There are several methods of software requirements analysis. We focus on analysis methods which categorize requirements. We present a comparison of the performance of three common categorization techniques of software requirements documents, using three different datasets. We evaluate three bag of words models: count vectorization, term frequency - inverse document frequency (TF-IDF), and a word embeddings technique. We report the similarity of the categories obtained using cosine similarity as a measure of similarity between the requirements vectors produced by the different methods. Syntactic techniques outperformed semantic techniques for some datasets. These results suggest that syntactic techniques produce comparable categories to semantic techniques for some requirements categorization tasks.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00015
Alejandro Daniel Sánchez Rodríguez, Maria Susana Avila-Garcia, Juan Carlos Baltazar Vera
The mining industry is one of the main sectors contributing to Mexico's gross domestic product._Ventilation systems in underground mines (VSUM) play an important role to ensure health and safety conditions for workers. In Mexico, there are legal requirements as stated in the Official Mexican STANDARD NOM-015-STPS-2001 in terms of the thermo-environmental conditions that these mines must comply with and report. In this work, we introduce ventilation systems in underground mines and the terminology associated, then we review the Mexican legislation regarding thermo-environmental aspects and describe the information requirements for VSUMs based on this legislation. Furthermore, we present preliminary results of an interview conducted with three specialists in this area carried out to understand better their information needs. The results of this work will inform the design and development of a system for the management of thermo-environmental information.
{"title":"Information Requirements for Ventilation Systems in Underground Mines in Mexico","authors":"Alejandro Daniel Sánchez Rodríguez, Maria Susana Avila-Garcia, Juan Carlos Baltazar Vera","doi":"10.1109/CONISOFT52520.2021.00015","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00015","url":null,"abstract":"The mining industry is one of the main sectors contributing to Mexico's gross domestic product._Ventilation systems in underground mines (VSUM) play an important role to ensure health and safety conditions for workers. In Mexico, there are legal requirements as stated in the Official Mexican STANDARD NOM-015-STPS-2001 in terms of the thermo-environmental conditions that these mines must comply with and report. In this work, we introduce ventilation systems in underground mines and the terminology associated, then we review the Mexican legislation regarding thermo-environmental aspects and describe the information requirements for VSUMs based on this legislation. Furthermore, we present preliminary results of an interview conducted with three specialists in this area carried out to understand better their information needs. The results of this work will inform the design and development of a system for the management of thermo-environmental information.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00037
Hugo Gonzalez, R. Llamas-Contreras, C. Guerra-García
Software Engineering is a foundation of modern computer systems development. The process involves several steps, including Analysis and Design, which are the fundamentals for building software systems. This discipline is offered by several university degrees these days around the world, included among other computer science courses.Nowadays, cybersecurity problems are very related with software weakness or bad designs, as an example one can mention bad implementations, projects with poor quality, lack of testing, among others issues. Overall one bigger problem is the lack of security integration from the inception and designing of the software project.Cybersecurity had gained a lot of attention in recent years. From the everyday desktop software been abused and exploited, such as browser exploits and Windows RDP protocol exploits, to abusing the Internet of Things to create massive botnets capable to disrupt the Internet service, as such as the Mirai attack in 2017.We believe that if security played a basic role from the inception of the software project, a lot of these incidents could be prevented. We previously proposed to introduce cybersecurity basics in the software engineering courses to raise awareness of these problems to future professional software engineers. In this paper, we focus on the first steps of software engineering and how cybersecurity should be embedded as good practices for every student in any given software project.
{"title":"Cybersecurity Practices At The Initial Stages Of The Software Engineering Process","authors":"Hugo Gonzalez, R. Llamas-Contreras, C. Guerra-García","doi":"10.1109/CONISOFT52520.2021.00037","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00037","url":null,"abstract":"Software Engineering is a foundation of modern computer systems development. The process involves several steps, including Analysis and Design, which are the fundamentals for building software systems. This discipline is offered by several university degrees these days around the world, included among other computer science courses.Nowadays, cybersecurity problems are very related with software weakness or bad designs, as an example one can mention bad implementations, projects with poor quality, lack of testing, among others issues. Overall one bigger problem is the lack of security integration from the inception and designing of the software project.Cybersecurity had gained a lot of attention in recent years. From the everyday desktop software been abused and exploited, such as browser exploits and Windows RDP protocol exploits, to abusing the Internet of Things to create massive botnets capable to disrupt the Internet service, as such as the Mirai attack in 2017.We believe that if security played a basic role from the inception of the software project, a lot of these incidents could be prevented. We previously proposed to introduce cybersecurity basics in the software engineering courses to raise awareness of these problems to future professional software engineers. In this paper, we focus on the first steps of software engineering and how cybersecurity should be embedded as good practices for every student in any given software project.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00031
E. Gaona, Celeste Esperanza Pérez Camacho, Wendy Morales Castro, José Carmen Morales Castro, Alejandro Daniel Sánchez Rodríguez, M. S. Avila-Garcia
Providing timely and meaningful feedback of programming assignments to students is very important to ensure a smooth learning curve. However, this can be a time-consuming task for teachers and instructors. There are some tools that already provide support for grading programming assignments, and some are already integrated with learning management systems that allow teaching staff to manage all this information in a more effective way. In this work, an analysis of tools for automatic grading of programming assignments in Moodle is carried out. A comparison of these tools is presented and one of them is tested and recommended for its future implementation and deployment. Finally, some recommendations for further improvements are described.
{"title":"Automatic Grading of Programming Assignments in Moodle","authors":"E. Gaona, Celeste Esperanza Pérez Camacho, Wendy Morales Castro, José Carmen Morales Castro, Alejandro Daniel Sánchez Rodríguez, M. S. Avila-Garcia","doi":"10.1109/CONISOFT52520.2021.00031","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00031","url":null,"abstract":"Providing timely and meaningful feedback of programming assignments to students is very important to ensure a smooth learning curve. However, this can be a time-consuming task for teachers and instructors. There are some tools that already provide support for grading programming assignments, and some are already integrated with learning management systems that allow teaching staff to manage all this information in a more effective way. In this work, an analysis of tools for automatic grading of programming assignments in Moodle is carried out. A comparison of these tools is presented and one of them is tested and recommended for its future implementation and deployment. Finally, some recommendations for further improvements are described.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00034
Ma. José Hemández-Molinos, Á. Sánchez-García, R. Barrientos-Martínez
Within Software Engineering, it is essential to build quality software. An obstacle to the after mentioned are the defects that can be found in any phase of software development. That is why the area of software defect prediction emerged, in which different algorithms have already been evaluated, studied, and proposed. The objective of this paper is to carry out a Systematic Literature Review, to know which are the classification algorithms that help to predict software defects. In the same way, it is intended to know the features, metrics and what has been the precision of the classification algorithms for software defect prediction. This paper shows that the most widely used classifiers to predict defects are Naive Bayes and Random Forest, while those that show the best results are Naive Bayes and Boosting. Finally, it is highlighted that Precision and Recall are the most used metrics for model validation.
{"title":"Classification Algorithms for Software Defect Prediction: A Systematic Literature Review","authors":"Ma. José Hemández-Molinos, Á. Sánchez-García, R. Barrientos-Martínez","doi":"10.1109/CONISOFT52520.2021.00034","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00034","url":null,"abstract":"Within Software Engineering, it is essential to build quality software. An obstacle to the after mentioned are the defects that can be found in any phase of software development. That is why the area of software defect prediction emerged, in which different algorithms have already been evaluated, studied, and proposed. The objective of this paper is to carry out a Systematic Literature Review, to know which are the classification algorithms that help to predict software defects. In the same way, it is intended to know the features, metrics and what has been the precision of the classification algorithms for software defect prediction. This paper shows that the most widely used classifiers to predict defects are Naive Bayes and Random Forest, while those that show the best results are Naive Bayes and Boosting. Finally, it is highlighted that Precision and Recall are the most used metrics for model validation.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/CONISOFT52520.2021.00024
Mauricio Cruz-Portilla, J. C. Pérez-Arriaga, Jorge Octavio Ocharán-Hernández, Á. Sánchez-García
Accessibility is an issue that has not been given due importance, since software products developed that lack it continue to be observed. Software developers are not considering the accessibility in the Software Development Life Cycle (SDLC), giving a sense that there is not enough information about this topic. This paper presents a Systematic Literature Review (SLR) with 40 primary studies comprehended between 2015 and 2021, which addressed accessibility in any of the four main phases of the SDLC: requirements, design, construction, and testing. The results indicated that the design phase is the most considered when discussing accessibility, followed by the requirements and testing phases, leaving the construction phase as the least addressed. This SLR has the purpose of aiming software engineers with the most updated view of activities and artifacts used to address accessibility in the SDLC, including techniques to verify it in a software product.
{"title":"Accessibility in the Software Development Life Cycle: A Systematic Literature Review","authors":"Mauricio Cruz-Portilla, J. C. Pérez-Arriaga, Jorge Octavio Ocharán-Hernández, Á. Sánchez-García","doi":"10.1109/CONISOFT52520.2021.00024","DOIUrl":"https://doi.org/10.1109/CONISOFT52520.2021.00024","url":null,"abstract":"Accessibility is an issue that has not been given due importance, since software products developed that lack it continue to be observed. Software developers are not considering the accessibility in the Software Development Life Cycle (SDLC), giving a sense that there is not enough information about this topic. This paper presents a Systematic Literature Review (SLR) with 40 primary studies comprehended between 2015 and 2021, which addressed accessibility in any of the four main phases of the SDLC: requirements, design, construction, and testing. The results indicated that the design phase is the most considered when discussing accessibility, followed by the requirements and testing phases, leaving the construction phase as the least addressed. This SLR has the purpose of aiming software engineers with the most updated view of activities and artifacts used to address accessibility in the SDLC, including techniques to verify it in a software product.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133441253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.1109/conisoft52520.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/conisoft52520.2021.00003","DOIUrl":"https://doi.org/10.1109/conisoft52520.2021.00003","url":null,"abstract":"","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}