Aditya Ghose
YOU?
Author Swipe
View article: Game-Of-Goals: Using adversarial games to achieve strategic resilience
Game-Of-Goals: Using adversarial games to achieve strategic resilience Open
Our objective in this paper is to develop a machinery that makes a given organizational strategic plan resilient to the actions of competitor agents (adverse environmental actions). We assume that we are given a goal tree representing stra…
View article: Towards automating self-admitted technical debt repayment
Towards automating self-admitted technical debt repayment Open
Context: Self-Admitted Technical Debt (SATD) refers to the technical debt in software that is explicitly flagged, typically by the source code comment. The SATD literature has mainly focused on comprehending, describing, detecting, and rec…
View article: An empirical study of automated privacy requirements classification in issue reports
An empirical study of automated privacy requirements classification in issue reports Open
The recent advent of data protection laws and regulations has emerged to protect privacy and personal information of individuals. As the cases of privacy breaches and vulnerabilities are rapidly increasing, people are aware and more concer…
View article: Towards Knowledge-Centric Process Mining
Towards Knowledge-Centric Process Mining Open
Process analytic approaches play a critical role in supporting the practice of business process management and continuous process improvement by leveraging process-related data to identify performance bottlenecks, extracting insights about…
View article: Advances in Process Optimization: A Comprehensive Survey of Process Mining, Predictive Process Monitoring, and Process-Aware Recommender Systems
Advances in Process Optimization: A Comprehensive Survey of Process Mining, Predictive Process Monitoring, and Process-Aware Recommender Systems Open
Process analytics approaches allow organizations to support the practice of Business Process Management and continuous improvement by leveraging all process-related data to extract knowledge, improve process performance and support decisio…
View article: Data
Data Open
File 1: RQ1-privacy-related-cwe This file contains all the CWE entries in research concept and software development views. The privacy-related CWE entries are labelled with 1 in the "privacy-related" column. File 2: RQ1-privacy-related-cv…
View article: A framework for conditional statement technical debt identification and description
A framework for conditional statement technical debt identification and description Open
Technical Debt occurs when development teams favour short-term operability over long-term stability. Since this places software maintainability at risk, technical debt requires early attention to avoid paying for accumulated interest. Most…
View article: On Privacy Weaknesses and Vulnerabilities in Software Systems
On Privacy Weaknesses and Vulnerabilities in Software Systems Open
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by e…
View article: Mining and Classifying Privacy and Data Protection Requirements in Issue Reports
Mining and Classifying Privacy and Data Protection Requirements in Issue Reports Open
Digital and physical footprints are a trail of user activities collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has become challenging. With the increase of user privacy a…
View article: An Internet of Things Service Roadmap
An Internet of Things Service Roadmap Open
\n\t\t\t\t\tThe Internet of things (IoT) is taking the world by storm, thanks to the proliferation of sensors and actuators embedded in everyday things, coupled with the wide availability of high-speed Internet50 and evolution of the 5th-g…
View article: Engineering Blockchain Based Software Systems: Foundations, Survey, and Future Directions
Engineering Blockchain Based Software Systems: Foundations, Survey, and Future Directions Open
Many scientific and practical areas have shown increasing interest in reaping the benefits of blockchain technology to empower software systems. However, the unique characteristics and requirements associated with Blockchain Based Software…
View article: Software Engineering for Blockchain Based Software Systems: Foundations, Survey, and Future Directions.
Software Engineering for Blockchain Based Software Systems: Foundations, Survey, and Future Directions. Open
Many scientific and practical areas have shown increasing interest in reaping the benefits of blockchain technology to empower software systems. However, the unique characteristics and requirements associated with Blockchain Based Software…
View article: Human Values in Software Release Planning
Human Values in Software Release Planning Open
Software products have become an integral part of human lives, and therefore need to account for human values such as privacy, fairness, and equality. Ignoring human values in software development leads to biases and violations of human va…
View article: An Internet of Things Service Roadmap
An Internet of Things Service Roadmap Open
We propose a roadmap for leveraging the tremendous opportunities the Internet of Things (IoT) has to offer. We argue that the combination of the recent advances in service computing and IoT technology provide a unique framework for innovat…
View article: A Taxonomy for Mining and Classifying Privacy Requirements in Issue Reports
A Taxonomy for Mining and Classifying Privacy Requirements in Issue Reports Open
Context: Digital and physical trails of user activities are collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has become challenging. With the increase of user privacy awar…
View article: A Framework for Self-Admitted Technical Debt Identification and Description.
A Framework for Self-Admitted Technical Debt Identification and Description. Open
Technical debt occurs when software engineers favour short-term operability over long-term stability. Since this puts software stability at risk, technical debt requires early attention (failing which it accumulates interest). Most of exis…
View article: Adversarial Patch Generation for Automatic Program Repair.
Adversarial Patch Generation for Automatic Program Repair. Open
Automatic program repair (APR) has seen a growing interest in recent years with numerous techniques proposed. One notable line of research work in APR is search-based techniques which generate repair candidates via syntactic analyses and s…
View article: Adversarial Patch Generation for Automated Program Repair
Adversarial Patch Generation for Automated Program Repair Open
Automated Program Repair has attracted significant research in recent years, leading to diverse techniques that focus on two main directions: search-based and semantic-based program repair. The former techniques often face challenges due t…
View article: Workload-aware reviewer recommendation using a multi-objective search-based approach
Workload-aware reviewer recommendation using a multi-objective search-based approach Open
Reviewer recommendation approaches have been proposed to provide automated support in finding suitable reviewers to review a given patch. However, they mainly focused on reviewer experience, and did not take into account the review workloa…