Hoa Khanh Dam
YOU?
Author Swipe
View article: Towards autonomous normative multi-agent systems for Human-AI software engineering teams
Towards autonomous normative multi-agent systems for Human-AI software engineering teams Open
This paper envisions a transformative paradigm in software engineering, where Artificial Intelligence, embodied in fully autonomous agents, becomes the primary driver of the core software development activities. We introduce a new class of…
View article: An LLM-based multi-agent framework for agile effort estimation
An LLM-based multi-agent framework for agile effort estimation Open
Effort estimation is a crucial activity in agile software development, where teams collaboratively review, discuss, and estimate the effort required to complete user stories in a product backlog. Current practices in agile effort estimatio…
View article: Leveraging Cancer Registry Survival Data to Estimate Lung Cancer Recurrence
Leveraging Cancer Registry Survival Data to Estimate Lung Cancer Recurrence Open
Population-based insights into the risk of metastatic recurrence are typically unavailable due to the absence of recurrence-specific data in cancer registries. This study presents an innovative method for estimating recurrence risk using d…
View article: A Study on the Prevalence of Privacy in Software Engineering
A Study on the Prevalence of Privacy in Software Engineering Open
The continuous growth and widespread use of digital technologies have made the protection of personal data and individual rights one of the major concerns when developing software systems and applications. Furthermore, data protection regu…
View article: Human-understandable explanation for software vulnerability prediction
Human-understandable explanation for software vulnerability prediction Open
View article: Leveraging Large Language Models for User Story Decomposition in Agile Software Development
Leveraging Large Language Models for User Story Decomposition in Agile Software Development Open
View article: Proactive self-exploration: Leveraging information sharing and predictive modelling for anticipating and countering adversaries
Proactive self-exploration: Leveraging information sharing and predictive modelling for anticipating and countering adversaries Open
View article: Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development
Sprint2Vec: A Deep Characterization of Sprints in Iterative Software Development Open
View article: Interactive GDPR-Compliant Privacy Policy Generation for Software Applications
Interactive GDPR-Compliant Privacy Policy Generation for Software Applications Open
Software applications are designed to assist users in conducting a wide range of tasks or interactions. They have become prevalent and play an integral part in people's lives in this digital era. To use those software applications, users a…
View article: Analysing cross-border logistics operations for performance improvement: development and validation of a reference model
Analysing cross-border logistics operations for performance improvement: development and validation of a reference model Open
The critical role played by cross-border logistics (CBL) systems in sustaining fast, efficient and responsive global supply chains is widely recognised. However, scholarly research focusing on CBL systems is limited, which means that theor…
View article: Graph-based explainable vulnerability prediction
Graph-based explainable vulnerability prediction Open
View article: Human-Understandable Explanation for Software Vulnerability Prediction
Human-Understandable Explanation for Software Vulnerability Prediction Open
View article: Supporting software evolution in agent systems
Supporting software evolution in agent systems Open
Software maintenance and evolution is arguably a lengthy and expensive phase in the life cycle of a software system. A critical issue at this phase is change propagation: given a set of primary changes that have been made to software, what…
View article: Towards automating self-admitted technical debt repayment
Towards automating self-admitted technical debt repayment Open
Context: Self-Admitted Technical Debt (SATD) refers to the technical debt in software that is explicitly flagged, typically by the source code comment. The SATD literature has mainly focused on comprehending, describing, detecting, and rec…
View article: Quantum Software Analytics: Opportunities and Challenges
Quantum Software Analytics: Opportunities and Challenges Open
Quantum computing systems depend on the principles of quantum mechanics to perform multiple challenging tasks more efficiently than their classical counterparts. In classical software engineering, the software life cycle is used to documen…
View article: An empirical study of automated privacy requirements classification in issue reports
An empirical study of automated privacy requirements classification in issue reports Open
The recent advent of data protection laws and regulations has emerged to protect privacy and personal information of individuals. As the cases of privacy breaches and vulnerabilities are rapidly increasing, people are aware and more concer…
View article: Beyond fear and anger: A global analysis of emotional response to Covid-19 news on Twitter
Beyond fear and anger: A global analysis of emotional response to Covid-19 news on Twitter Open
View article: Towards Knowledge-Centric Process Mining
Towards Knowledge-Centric Process Mining Open
Process analytic approaches play a critical role in supporting the practice of business process management and continuous process improvement by leveraging process-related data to identify performance bottlenecks, extracting insights about…
View article: Advances in Process Optimization: A Comprehensive Survey of Process Mining, Predictive Process Monitoring, and Process-Aware Recommender Systems
Advances in Process Optimization: A Comprehensive Survey of Process Mining, Predictive Process Monitoring, and Process-Aware Recommender Systems Open
Process analytics approaches allow organizations to support the practice of Business Process Management and continuous improvement by leveraging all process-related data to extract knowledge, improve process performance and support decisio…
View article: Data
Data Open
File 1: RQ1-privacy-related-cwe This file contains all the CWE entries in research concept and software development views. The privacy-related CWE entries are labelled with 1 in the "privacy-related" column. File 2: RQ1-privacy-related-cv…
View article: Towards the Repayment of Self-Admitted Technical Debt
Towards the Repayment of Self-Admitted Technical Debt Open
View article: Graph-Based Explainable Vulnerability Prediction
Graph-Based Explainable Vulnerability Prediction Open
View article: Beyond Fear and Anger: A Global Analysis of Emotional Response to COVID-19 News on Twitter Using Deep Learning
Beyond Fear and Anger: A Global Analysis of Emotional Response to COVID-19 News on Twitter Using Deep Learning Open
View article: A framework for conditional statement technical debt identification and description
A framework for conditional statement technical debt identification and description Open
Technical Debt occurs when development teams favour short-term operability over long-term stability. Since this places software maintainability at risk, technical debt requires early attention to avoid paying for accumulated interest. Most…
View article: TaDeR: A New Task Dependency Recommendation for Project Management Platform
TaDeR: A New Task Dependency Recommendation for Project Management Platform Open
Many startups and companies worldwide have been using project management software and tools to monitor, track and manage their projects. For software projects, the number of tasks from the beginning to the end is quite a large number that …
View article: Mining and Classifying Privacy and Data Protection Requirements in Issue Reports
Mining and Classifying Privacy and Data Protection Requirements in Issue Reports Open
View article: Common Privacy Weaknesses and Vulnerabilities in Software Applications
Common Privacy Weaknesses and Vulnerabilities in Software Applications Open
View article: On Privacy Weaknesses and Vulnerabilities in Software Systems
On Privacy Weaknesses and Vulnerabilities in Software Systems Open
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by e…
View article: Mining and Classifying Privacy and Data Protection Requirements in Issue Reports
Mining and Classifying Privacy and Data Protection Requirements in Issue Reports Open
Digital and physical footprints are a trail of user activities collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has become challenging. With the increase of user privacy a…
View article: Human Values in Software Release Planning
Human Values in Software Release Planning Open
Software products have become an integral part of human lives, and therefore need to account for human values such as privacy, fairness, and equality. Ignoring human values in software development leads to biases and violations of human va…