ST: Software Technology

ST-14

Software Technology and Software Development

Jan 7
8:00 AM – 9:30 AM
Lahaina 2

Papers (4)

  • Software Architecture for Essential and Accidental Uncertainty
    Neil Harrison, George Rudolph, Peter Aldous
  • Understanding the Evolution of Serverless Computing: A Computational Literature Review
    MUHAMMAD HAMZA, Rafael Capilla, Kari Smolander
  • Developer Productivity With and Without GitHub Copilot: A Longitudinal Mixed-Methods Case Study
    Viktoria Stray, Elias Goldmann Brandtzæg, Viggo Wivestad, Astri Barbala, Nils Brede Moe
  • Investigating the Pareto Principle in Student Software Engineering Team Projects
    Aditi More, Kevin Buffardi

ST-8

Generative AI in IS Research and Education: Opportunities and Challenges

Jan 7
10:00 AM – 11:30 AM
Lahaina 2

Papers (3)

  • Prompt Engineering as a Cognitive Interface: Reframing Human-AI Collaboration and Digital Literacy in the Age of Generative AI
    Sasan Azizian, Reza Mehrabian, Vahraz Honary
  • Adaptive Kernels in DCGANs
    Shamir Khandaker, Sahan Ahmad, Aminul Islam
  • AI-Enhanced Literature Reviews: Connecting Emerging Phenomena and Bodies of Knowledge
    Syed Asad Ali Naqvi, Markus Zimmer, Martin Kauschinger, Paul Drews, Rahul Basole

ST-9

Impact of AI on Software Engineering

Jan 7
2:00 PM – 3:30 PM
Lahaina 2

Papers (4)

  • Prompt Engineering Patents in Software Development: Trends, Themes, and Future Directions
    Mohamad Kassab
  • Engineering prompts while navigating the tradeoffs of LLM integration in First Responder Software Application
    Sonipriya Paul, Abm Adnan Azmee, Dominic Thomas
  • Collaborative LLM Agents for C4 Software Architecture Design Automation
    Kamil Szczepanik, Jarosław A Chudziak
  • Rethinking Programming Skills in the Age of Generative AI
    Francesco Bolici, Kevin Crowston, Alberto Varone, Michael Fudge

ST-2

AI-Powered Cyber Attacks and Countermeasures

Jan 7
4:00 PM – 5:30 PM
Lahaina Boardroom

Papers (4)

  • An Empirical Study of Automated Adversary Emulators
    Hannes Holm, Lars Helgeson
  • AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System
    Chanti Raju Mylay, Bobin Deng, Taeyoeng Choi, Zhipeng Cai, Honghui Xu
  • Hacking Distributed Energy Resource Power Plant Infrastructure Using Reinforcement Learning
    Birk Jones, Georgios Fragkos
  • Lightweight and Privacy-Enhanced Detection Model on Aerial Imagery for Post-Disaster Building Damage Reconnaissance
    Md Abdullahil Oaphy, Da Hu, Adeel Khalid, Honghui Xu

ST-12

Real-Time Simulation of Cyber-Physical Systems

Jan 7
4:00 PM – 5:30 PM
Lahaina 2

Papers (1)

  • Virtualized Software Application: Real-Time Synchro Phasor PMU Development Utilizing IEC 61850-9-2 Based HIL Testing
    Mike Mekkanen

ST-16

Trustworthy Artificial Intelligence and Machine Learning

Jan 7
4:00 PM – 5:30 PM
Lahaina 2

Papers (3)

  • Optimizing Class Distributions for Bias-Aware Multi-Class Learning
    Mirco Felske, Stefan Stiene
  • An Empirical Framework for Evaluating Semantic Preservation Using Hugging Face
    Nan Jia, Anita Raja, Raffi Khatchadourian
  • MAEBE: Multi-Agent Emergent Behavior Framework
    Tim Gothard, Sinem Erisken, Martin Leitgab, Ram Potham

ST-4

Cyber Security, Operations, Defense, and Forensics

Jan 8
8:00 AM – 9:30 AM
Maui Suite 5

Papers (3)

  • Your Bulb Has Trust Issues
    Kaleigh Powell, William Bradley Glisson
  • Introduction of Gabor Transform Features for an Internet of Things Security Paradigm
    Reid Hessman, Christopher Rondeau, Michael Temple
  • Evading Detection or Triggering False Alarms? A Character Level Adversarial Attack on LLM Detection of Arabic Social Media Bots
    Abdullah Melhem , Ahmed Aleroud, Craig Albert

ST-5

Cyber Security, Operations, Defense, and Forensics

Jan 8
10:00 AM – 11:30 AM
Maui Suite 5

Papers (2)

  • Virtual Private Networks over Satellite Communication Systems in Support of Secure Telemedical Communication in Expeditionary Environments
    Joshua Cohen, John McEachen, Murali Tummala
  • Reinforcement Learning and Hidden Markov Models for Simulating and Analyzing Social Engineering Attacks
    Bharkavi Sachithanandam, Faranak Abri, Genya Ishigaki, Jade Webb

ST-10

Intelligent Edge Computing

Jan 8
2:00 PM – 3:30 PM
Lahaina Boardroom

Papers (4)

  • Encoding Time Series on an FPGA, with an Efficient Izhikevich Neuron Implementation
    Thomas Borrill, Louise Crockett, Kevin Thomas, Gaetano Di Caterina
  • Addressing the Lack of Neuromorphic Data in Low SNR Scenarios
    Ross Perry, Gaetano Di Caterina, Trevor Bihl, Kara Combs
  • HALO: A Hierarchical and Adaptive Large Language Model Framework with Centralized Feedback
    Yun-Hao Lee, Pouya Taaghol, Hyundong Kim, Gopal Gupta, Bingzhe Li
  • Initial Review of Goal-Directed Answer Set Programming for Orchestration of Neuro-Symbolic UAV Autonomy
    Alexis Tudor, Keegan Kimbrell, Gopal Gupta

ST-15

Tools and Processes for Enabling Agile Projects, Teams, and Organizations

Jan 8
2:00 PM – 3:30 PM
Monarchy 5

Papers (1)

  • Hybrid Work in Agile Software Teams: Practices, Challenges, and Success Factors
    Nils Brede Moe, Yashwant Singh Yadav, Susanne Semsøy

ST-7

Games for Impact

Jan 8
4:00 PM – 5:30 PM
Lahaina 2

Papers (4)

  • Developing The Strategists, an Online, AI-Aware Financial Investment Game for Technology-Enhanced Learning and Research
    Shubham Chawla, Bretho Danzy III, Jai Narula, Ashish Amresh, Chris Bryan
  • Educational Games to Teach Fundamental Principles of Cybersecurity
    Greg White, Johanna Jacob, Natalie Sjelin, Larry Sjelin
  • iFractions: Using Games to Teach Children Fractions
    Priscila da Silva Neves Lima, Wilk Oliveira, Laira das Almas Silva, Leônidas de Oliveira Brandão
  • Beyond Multiple Choice Tests: Enhancing the Effectiveness of Traffic Law Learning through Immersive Simulations and Cognitive Monitoring
    Anna Lewandowska, Agnieszka Olejnik-Krugły, Nikolas Mazur, Krzysztof Małecki

ST-11

Intelligent Edge Computing

Jan 8
4:00 PM – 5:30 PM
Lahaina Boardroom

Papers (4)

  • Edge-Based Fault diagnosis of Autonomous Ground Robots with Simultaneous Actuator and Sensor Faults
    Vaishnavi Janakiraman, Xiaodong (Frank) Zhang
  • MoCap2Radar: A Spatiotemporal Transformer For Synthesizing Micro‑Doppler Radar Signatures from Motion Capture
    Kevin Chen, Kenneth Parker, Anish Arora
  • Edge-Kalman Filter for Improved Quality of Service in Indoor Spatial Temporal Systems
    Vivya Kalidindi, Pradeep Chowriappa
  • Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel Samples
    Adam Trott, Henry Thompson, Gokhan Kul

ST-3

Artificial Intelligence Security: Ensuring Safety, Trustworthiness, and Responsibility in AI Systems

Jan 9
8:00 AM – 9:30 AM
Maui Suite 5

Papers (3)

  • Quantifying True Robustness: Synonymity-Weighted Similarity for Trustworthy XAI Evaluation
    Christopher Burger
  • Detecting Data Poisoning Attacks in Image Datasets Using a Vision-Language Hybrid Pipeline
    Sabrina Perry, Sam Perry, Yili Jiang, Charles Walter
  • Detecting Synthetic Text Profiles: Human Discernment Versus AI Analytics
    Regina Luttrell, Jason Davis, Carrie Welch

ST-13

Software Sustainability: Research on Usability, Maintainability, and Reproducibility

Jan 9
8:00 AM – 9:30 AM
Maui Suite 5

Papers (1)

  • Sustaining Research Software: A Fitness Function Approach
    Philipp Zech, Irdin Pekaric

ST-1

Advancing Software Resilience in the Age of LLM - Testing, Quality Assurance, and Metrics for Robust Engineering

Jan 9
10:00 AM – 11:30 AM
Maui Suite 5

Papers (2)

  • Using Transformer and GAN Models for Software and Security Testing
    Manfred Hauswirth, Christoph Huy
  • LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?
    Irdin Pekaric, Tom Mattson, Philipp Zech

ST-6

Cybersecurity and Software Assurance

Jan 9
10:00 AM – 11:30 AM
Maui Suite 5

Papers (2)

  • Self-Modifiable Reversible Circuits
    Michael Fiske
  • Securing Python Supply Chain: Using Graph Theory for Vulnerability Prediction
    Gianluca Zanella, Pouria Rad, Charles Zhechao Liu