Dates
Tracks
Plenary
Tue 13 JunDisplayed time zone: Athens change
Tue 13 Jun
Displayed time zone: Athens change
19:00 - 21:00 | Conference ReceptionCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Merikoski Hall | ||
19:00 2hSocial Event | Conference Reception Catering |
Wed 14 JunDisplayed time zone: Athens change
Wed 14 Jun
Displayed time zone: Athens change
08:30 - 09:00 | OpeningPlenary / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Catering at Aurora Hall Chair(s): Paul Ralph Dalhousie University, Burak Turhan University of Oulu, Sira Vegas Universidad Politecnica de Madrid | ||
08:30 30mDay opening | Opening Plenary Sira Vegas Universidad Politecnica de Madrid, Burak Turhan University of Oulu, Paul Ralph Dalhousie University |
09:00 - 10:00 | KeynotePlenary / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Catering at Aurora Hall Chair(s): Burak Turhan University of Oulu, Sira Vegas Universidad Politecnica de Madrid | ||
09:00 60mKeynote | From Data Analysis to Human Input: Navigating the Complexity of Software Evaluation and Assessment Plenary Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity File Attached |
10:00 - 10:30 | |||
10:00 30mPoster | Code Privacy in Detection of Web VulnerabilitiesPoster Short Papers and Posters Jorge Martins LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal, Ibéria Medeiros LaSIGE, Faculdade de Ciências da Universidade de Lisboa, Bernardo Ferreira LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal | ||
10:00 30mPoster | Investigation of Security-related Commits in Android AppsPoster Short Papers and Posters Teerath Das University of Jyväskylä, Adam Ali Mohammad Ali JInnah University, Tommi Mikkonen University of Jyvaskyla | ||
10:00 30mPoster | Does Code Smell Frequency Have a Relationship with Fault-proneness?Poster Short Papers and Posters Md. Masudur Rahman Institute of Information Technology (IIT), University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Mahbubul Alam Joarder Institute of Information Technology (IIT), University of Dhaka, Kazi Sakib DOI Pre-print Media Attached File Attached | ||
10:00 30mPoster | Team Composition in Software Engineering EducationPoster Short Papers and Posters Sajid Ibrahim Hashmi M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland, Jouni Markkula M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland DOI Authorizer link File Attached |
10:00 - 10:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Aurora Hall | ||
10:00 30mCoffee break | Coffee Break Catering |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
15:00 - 15:30 | |||
15:00 30mPoster | Does Code Smell Frequency Have a Relationship with Fault-proneness?Poster Short Papers and Posters Md. Masudur Rahman Institute of Information Technology (IIT), University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Mahbubul Alam Joarder Institute of Information Technology (IIT), University of Dhaka, Kazi Sakib DOI Pre-print Media Attached File Attached | ||
15:00 30mPoster | Code Privacy in Detection of Web VulnerabilitiesPoster Short Papers and Posters Jorge Martins LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal, Ibéria Medeiros LaSIGE, Faculdade de Ciências da Universidade de Lisboa, Bernardo Ferreira LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal | ||
15:00 30mPoster | Team Composition in Software Engineering EducationPoster Short Papers and Posters Sajid Ibrahim Hashmi M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland, Jouni Markkula M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland DOI Authorizer link File Attached | ||
15:00 30mPoster | Investigation of Security-related Commits in Android AppsPoster Short Papers and Posters Teerath Das University of Jyväskylä, Adam Ali Mohammad Ali JInnah University, Tommi Mikkonen University of Jyvaskyla |
15:00 - 15:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Aurora Hall | ||
15:00 30mCoffee break | Coffee Break Catering |
17:00 - 18:15 | EASE Town HallCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Aurora Hall | ||
17:00 75mSocial Event | EASE Town Hall Catering |
19:00 - 21:00 | DinnerCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Joki Hall | ||
19:00 2hDinner | Dinner Catering |
Thu 15 JunDisplayed time zone: Athens change
Thu 15 Jun
Displayed time zone: Athens change
10:00 - 10:30 | |||
10:00 30mPoster | Investigation of Security-related Commits in Android AppsPoster Short Papers and Posters Teerath Das University of Jyväskylä, Adam Ali Mohammad Ali JInnah University, Tommi Mikkonen University of Jyvaskyla | ||
10:00 30mPoster | Does Code Smell Frequency Have a Relationship with Fault-proneness?Poster Short Papers and Posters Md. Masudur Rahman Institute of Information Technology (IIT), University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Mahbubul Alam Joarder Institute of Information Technology (IIT), University of Dhaka, Kazi Sakib DOI Pre-print Media Attached File Attached | ||
10:00 30mPoster | Code Privacy in Detection of Web VulnerabilitiesPoster Short Papers and Posters Jorge Martins LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal, Ibéria Medeiros LaSIGE, Faculdade de Ciências da Universidade de Lisboa, Bernardo Ferreira LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal | ||
10:00 30mPoster | Team Composition in Software Engineering EducationPoster Short Papers and Posters Sajid Ibrahim Hashmi M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland, Jouni Markkula M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland DOI Authorizer link File Attached |
10:00 - 10:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Aurora Hall | ||
10:00 30mCoffee break | Coffee Break Catering |
10:30 - 12:00 | Software ArchitectureResearch (Full Papers) / Vision and Emerging Results / Short Papers and Posters / Industry at Aurora Hall Chair(s): Andrea Janes FHV Vorarlberg University of Applied Sciences | ||
10:30 20mPaper | Impact of Architectural Smells on Software Performance Research (Full Papers) Francesca Arcelli Fontana University of Milano-Bicocca, Matteo Camilli Politecnico di Milano, Davide Rendina , Andrei Gabriel Taraboi , Catia Trubiani Gran Sasso Science Institute Pre-print File Attached | ||
10:50 10mPaper | SoHist: A Tool for Managing Technical Debt through Retro Perspective Code AnalysisIndustry Experience Report Industry Benedikt Dornauer University of Innsbruck; University of Cologne, Michael Felderer German Aerospace Center (DLR), Johannes Weinzerl c.c.com Moser GmbH, 8074 Grambach, Austria, Mircea-Cristian Racasan c.c.com Moser GmbH, 8074 Grambach, Austria, Martin Hess Software AG, 64297 Darmstadt, Germany Pre-print File Attached | ||
11:00 20mPaper | Code Reviewer Recommendation for Architecture Violation Issues: An Exploratory Study Research (Full Papers) Ruiyin Li Wuhan University, China; University of Groningen, The Netherlands, Peng Liang Wuhan University, China, Paris Avgeriou University of Groningen, The Netherlands Link to publication Pre-print Media Attached | ||
11:20 10mPaper | Towards Human-Bot Collaborative Software Architecting with ChatGPT Vision and Emerging Results Aakash Ahmad School of Computing and Communications, Lancaster University Leipzig, Leipzig, Germany, Muhammad Waseem University of Jyväskylä, Peng Liang Wuhan University, China, Mahdi Fahmideh University of Southern Queensland, Mst Shamima Aktar School of Computer Science, Wuhan University, Wuhan, China, Tommi Mikkonen University of Jyvaskyla Link to publication Pre-print Media Attached | ||
11:30 20mPaper | Do Developers Benefit from Recommendations when Repairing Inconsistent Design Models? a Controlled Experiment Research (Full Papers) Luciano Marchezan Johannes Kepler University Linz, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Gabriela Karoline Michelon Johannes Kepler University Linz, Alexander Egyed Johannes Kepler University Linz Link to publication DOI Pre-print File Attached | ||
11:50 10mShort-paper | Understanding the relationship between Technical Debt, New Code Cost and Rework Cost in Open-Source Software Projects: An Empirical StudyShort Paper Short Papers and Posters Judith Perera University of Auckland, Ewan Tempero University of Auckland, Yu-Cheng Tu The University of Auckland, Kelly Blincoe University of Auckland Link to publication DOI Pre-print File Attached |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
15:00 - 15:30 | |||
15:00 30mPoster | Team Composition in Software Engineering EducationPoster Short Papers and Posters Sajid Ibrahim Hashmi M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland, Jouni Markkula M3S Research Unit Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland DOI Authorizer link File Attached | ||
15:00 30mPoster | Does Code Smell Frequency Have a Relationship with Fault-proneness?Poster Short Papers and Posters Md. Masudur Rahman Institute of Information Technology (IIT), University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Mahbubul Alam Joarder Institute of Information Technology (IIT), University of Dhaka, Kazi Sakib DOI Pre-print Media Attached File Attached | ||
15:00 30mPoster | Code Privacy in Detection of Web VulnerabilitiesPoster Short Papers and Posters Jorge Martins LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal, Ibéria Medeiros LaSIGE, Faculdade de Ciências da Universidade de Lisboa, Bernardo Ferreira LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal | ||
15:00 30mPoster | Investigation of Security-related Commits in Android AppsPoster Short Papers and Posters Teerath Das University of Jyväskylä, Adam Ali Mohammad Ali JInnah University, Tommi Mikkonen University of Jyvaskyla |
15:00 - 15:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Aurora Hall | ||
15:00 30mCoffee break | Coffee Break Catering |
17:00 - 17:30 | ClosingPlenary / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Catering at Aurora Hall Chair(s): Burak Turhan University of Oulu, Sira Vegas Universidad Politecnica de Madrid | ||
Fri 16 JunDisplayed time zone: Athens change
Fri 16 Jun
Displayed time zone: Athens change
09:00 - 12:00 | |||
09:00 3hTalk | The 3rd International Workshop on Secure Software Workshop |
09:00 - 17:00 | |||
10:20 10mSocial Event | Welcome Doctoral Symposium | ||
10:30 30mDoctoral symposium paper | Reengineering legacy document information systems: Challenges and solutions Doctoral Symposium Delfina Ramos-Vidal University of A Coruña, S: Barbara Russo Free University of Bolzano, S: Rahul Mohanani University of Jyväskylä Link to publication DOI | ||
11:00 30mDoctoral symposium paper | Towards a User-centred Security Framework for Social Robots in Public Spaces Doctoral Symposium Samson Oruma Department of Computer Science and Communication, Østfold University College, Halden, Norway., S: Davide Fucci Blekinge Institute of Technology, S: Barbara Russo Free University of Bolzano Link to publication DOI Pre-print File Attached | ||
11:30 30mDoctoral symposium paper | Investigating the Relation between Requirements Framing and Confirmation Bias in Testing Doctoral Symposium Afsarah Jahin M3S research Unit, Faculty of ITEE, University of Oulu, Oulu, Finland, S: Davide Fucci Blekinge Institute of Technology, Oscar Dieste Universidad Politécnica de Madrid Link to publication DOI File Attached | ||
12:00 90mLunch | Lunch Catering | ||
13:30 30mDoctoral symposium paper | Automatic Data-Driven Software Change Identification via Code Representation Learning Doctoral Symposium Tjaša Heričko University of Maribor, S: Daniel Mendez Blekinge Institute of Technology, S: Iflaah Salman Lappeenranta-Lahti University of Technology (LUT) Link to publication DOI | ||
14:00 30mDoctoral symposium paper | Software Architecture Design of a Serverless System Doctoral Symposium Muhammad Hamza Lappeenranta-Lahti University of Technology (LUT), S: Daniel Mendez Blekinge Institute of Technology, S: Rahul Mohanani University of Jyväskylä | ||
14:30 30mDoctoral symposium paper | Analyzing Maintenance Activities of Software Libraries Doctoral Symposium Alexandros Tsakpinis fortiss GmbH, S: Kai Petersen University of Applied Sciences Flensburg, Germany / Blekinge Institute of Technology, Sweden, S: Iflaah Salman Lappeenranta-Lahti University of Technology (LUT) Link to publication DOI Pre-print File Attached | ||
15:00 30mCoffee break | Coffee Break Catering | ||
15:30 30mDoctoral symposium paper | Effective Agile Contracts Framework for Software Innovation Projects Doctoral Symposium Adriano Gomes UFPE, S: Efraín R. Fonseca C. Universidad de las Fuerzas Armadas ESPE, S: Kai Petersen University of Applied Sciences Flensburg, Germany / Blekinge Institute of Technology, Sweden DOI Pre-print File Attached | ||
16:00 30mTalk | Wrap-up Doctoral Symposium |
09:00 - 17:00 | |||
09:00 8hTalk | DevOps Quality Management Workshop Workshop |
09:00 - 17:00 | |||
09:00 10mTalk | Workshop Opening Workshop | ||
09:10 60mKeynote | Teaching Software Testing for Fun Workshop | ||
10:10 30mCoffee break | Coffee Break Catering | ||
10:40 20mPaper | Training Bachelor Students to Design Better Quality Web Apps: Preliminary Results from a Prospective Empirical Investigation Workshop | ||
11:00 20mPaper | Investigating Factors Influencing Students’ Assessment of Conceptual Models Workshop | ||
11:20 20mPaper | Feedback as a Process in a Large Semi-capstone Software Engineering Course Workshop | ||
11:40 20mPaper | Gamification of Business Process Modeling Notation education: an Experience Report Workshop | ||
12:00 90mLunch | Lunch Catering | ||
13:30 20mPaper | Collecting Cognitive Strategies Applied by Students during Test Case Design Workshop | ||
13:50 20mPaper | A Mixed Reality Approach for Innovative Pair Programming Education with a Conversational AI Virtual Avatar Workshop Media Attached File Attached | ||
14:10 30mPanel | Discussion on the Special Theme “Software Testing Education and Training” and Closing Workshop |
09:00 - 17:00 | |||
09:00 4hTutorial | Ethical Requirements Stack: A framework for implementing ethical requirements of AI in software engineering practices Tutorials Mamia Agbese University of Jyväskylä, Jyväskylä, Finland, Pekka Abrahamsson University of Jyväskylä, Rahul Mohanani University of Jyväskylä, Arif Ali Khan University of Oulu | ||
13:30 3h30mTutorial | Functional Size Measurement in Agile Development Tutorials File Attached |
10:00 - 10:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Joki Hall | ||
10:00 30mCoffee break | Coffee Break Catering |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 17:00 | |||
13:30 10mTalk | Workshop Opening Workshop | ||
13:40 60mKeynote | Software Architectures for Enterprise DLT-Enabled Systems Workshop | ||
14:40 20mPaper | Decentralised Autonomous Organisations for Public Procurement Workshop | ||
15:00 15mCoffee break | Coffee Break Catering | ||
15:15 20mPaper | Perceived Trust in Blockchain Systems: An Interview-based Survey Workshop | ||
15:35 40mPanel | Blockchain Software Engineering: How It Started and How It's Going Workshop |
15:00 - 15:30 | Coffee BreakCatering / Journal First / Industry / Research (Full Papers) / Tutorials / Workshop / EASIER / Short Papers and Posters / Doctoral Symposium / Vision and Emerging Results / Plenary at Joki Hall | ||
15:00 30mCoffee break | Coffee Break Catering |
Accepted Papers
Call for papers
The Doctoral Symposium aims to provide a helpful and stimulating forum for Ph.D. students to present and discuss their research proposals and early research results. Experienced members of the empirical software engineering community will serve as advisers to provide constructive feedback on the research proposals. Participants must be current doctoral students, preferably those who have identified their dissertation topic and progressed on initial results (other doctoral students are also welcome).
The submitted research proposal should be single-authored. It is limited to 6 pages. We suggest the following outline to maintain a uniform reporting style and help the advisers’ work:
- Title and abstract (up to 250 words).
- Advisor's name, email address and affiliation.
- Motivation, rationale, and contributions of the research.
- Key Research Questions/Challenges to be addressed
- Work Plan explaining how the challenges will be addressed:
- Research approach, empirical study design, and implementation.
- Definition of most important metrics (e.g., following the GQM approach).
- Data analysis methods and techniques.
- Validity threats and their mitigation strategies.
- Summary of the current status of the research (including a very brief outline of the early results) and planned next steps.
- Relevant related work.
Important dates
Papers submission: Friday, March 10th, 2023Notification: Friday, April 14th, 2023
Camera-ready: Friday, April 28th, 2023