Tue 18 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
15:50 - 16:20 | |||
15:50 30mPoster | Toward a Human-Centered Framework for Trustworthy, Safe and Ethical Generative Artificial Intelligence: A Multi-Level Analysis of Large Language Models Social Impact Posters Berenice Fernandez Nieto University of Bari "A. Moro" File Attached | ||
15:50 30mPoster | Design and Evaluation of High-Quality Symbiotic AI Systems through a Human-Centered Approach Posters Miriana Calvano University of Bari | ||
15:50 30mPoster | A Comprehensive Framework Proposal to Design Symbiotic AI Systems Posters Antonio Curci University of Bari |
Wed 19 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:30 | OpeningResearch Papers / Posters / / Short Papers, Vision and Emerging Results / Industry / Journal-first / at Room Vietri Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
09:00 20mSocial Event | Opening Social Events | ||
09:20 70mKeynote | Why Large Language Models will (not) Kill Software Engineering Research Keynote |
Thu 20 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:10 | Keynote: Nicole NovielliResearch Papers / Posters / / Short Papers, Vision and Emerging Results / Industry / Journal-first / at Room Vietri Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
09:00 70mKeynote | Surfing the AI Wave in Software Engineering: Opportunities and Challenges Keynote |
10:10 - 10:30 | Lightning talks of the postersPosters at Room Vietri Chair(s): Anna Rita Fasolino Federico II University of Naples | ||
10:10 5m | Introduction Posters Anna Rita Fasolino Federico II University of Naples | ||
10:15 5mTalk | Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports Posters Rabaya Sultana Mim Institute of Information Technology, University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
10:20 5mTalk | Automatic detection and correction of code errors applying machine learning - current research state Posters Aneta Poniszewska-Maranda Institute of Information Technology, Lodz University of Technology, Wiktoria Sarniak Institute of Information Technology, Lodz University of Technology, Marcin Cegielski Institute of Information Technology, Lodz University of Technology | ||
10:25 5mTalk | New experimental design to capture bias using LLM to validate security threats Posters Winnie Bahati Mbaka Vrije Universiteit |
10:30 - 11:00 | |||
10:30 30mPoster | Automatic detection and correction of code errors applying machine learning - current research state Posters Aneta Poniszewska-Maranda Institute of Information Technology, Lodz University of Technology, Wiktoria Sarniak Institute of Information Technology, Lodz University of Technology, Marcin Cegielski Institute of Information Technology, Lodz University of Technology | ||
10:30 30mPoster | Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports Posters Rabaya Sultana Mim Institute of Information Technology, University of Dhaka, Toukir Ahammed Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
10:30 30mPoster | New experimental design to capture bias using LLM to validate security threats Posters Winnie Bahati Mbaka Vrije Universiteit |
Unscheduled Events
Not scheduled Talk | Lightning talks of the posters Posters |
Accepted Papers
Call for Papers
In this track, researchers will be able to publish late-breaking results, technical descriptions, smaller research contributions, and works-in-progress in a concise and visible format.
Poster submissions are intended to promote discussion on recent advances, experiences, and challenges, as well as cutting-edge or potentially disruptive ideas, in the field of empirical software engineering. The scope of the Poster Track includes novel ideas or visions of the future, industrial experiences, and early results related to evaluating and assessing software products, processes, practices, tools & techniques.
The authors need to submit an extended abstract that summarizes:
- the problem addressed by the poster;
- the approach taken by the authors;
- the main results achieved so far.
Submissions to the poster track must be written in English and are limited to up to two pages (including figures, tables, and references) using the ACM template. Accepted posters will be displayed in the conference venue, giving you an opportunity to engage in discussion with other attendees about your research.
Submission and review process
All papers must be submitted in PDF format through the web-based submission system: https://easychair.org/conferences/?conf=ease2024. Submitted papers must conform to the ACM Proceedings Format (https://www.acm.org/publications/proceedings-template). Papers submitted for consideration must not have been published elsewhere and must not be under review or submitted for review elsewhere for the duration of consideration. The conference enforces the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism-overview). After the notification deadline, authors of accepted papers will be asked to complete a copyright form and will receive further instructions for preparing their camera-ready versions. At least one author of each accepted paper is expected to register and present the results at EASE 2024. All accepted contributions will be published in the conference’s electronic proceedings and appear in the digital library of ACM.
Important dates:
Submission deadline: 14th March 2024, AoE
Submission deadline (extended): 21st March 2024, AoE
Notification: 14th April 2024, AoE
Camera-ready: 26th April 2024, AoE
Early registration deadline: 5th May 2024, AoE