Seminars
- Introductory seminar 1 (8 February)
- Introductory seminar 2 (15 February)
- Introductory seminar 3 (1 March)
Weekly presentation seminars start on the 12th of April.
- Presentations 1 (12 April, 8:15-10:00)
Number | Presenter | Topic |
#1 | Meri Liis Treimann | Automated Discovery of Block-Structured Process Models From Event Logs (sup.: Dumas) |
#2 | Sten-Oliver Salumaa | Machine Learning Approaches for Traffic Sign Detection and Recognition in Color Videos (sup.: Hadachi) |
#3 | Ketevan | Deviance Mining of Business Processes (sup.: Maggi) |
#4 | Anton Yeshchenko | Predictive Monitoring with Complex Symbolic Sequences (sup.: Maggi) Video |
- Presentations 2 (12 April, 10:15-12:00)
Number | Presenter | Topic |
#5 | Vasiliy | Deep Learning for Predictive Process Monitoring (sup.: Dumas) |
#6 | Bilal Abdullah | Open source software as a measure of programmer ability (sup.: Muite) |
#7 | Kaur Järvpõld | Learning from Imbalanced Data" (sup.: Dumas) |
#8 | Kateryna Lytvyniuk | Evaluation of Sentiment analysis tools for Feature-based sentiment analysis on App Reviews (sup.: Shah) |
#9 | Artem | Systematic Survey of Modelling Approaches for Secure Software System (sup.: Matulevičius) |
#10 | Vladyslav Kopylash | Model checking smart contracts (sup.: Banuelos) |
- Presentations 3 (19 April, 8:15-10:00)
Number | Presenter | Topic |
#11 | Rando Tõnisson | Overview of Goal-oriented modelling languages (sup.: Matulevičius) |
#12 | Tõnis Kasekamp | Generation of logs from declarative process models (sup.: Maggi) |
#13 | Paria Molayemvand | Change Propagation between Business Rules and Process Models (sup.: Maggi) |
#14 | Eduard Sing | Survey of the UML extensions towards security engineering (sup.: Matulevičius) |
#15 | Mykola Rybak | Monitoring of Business Processes with Fuzzy Logic (sup.: Maggi) |
#16 | Giorgi Tsiklauri | Different ways we code (sup.: Karus) |
- Presentations 4 (19 April, 10:15-12:00)
Number | Presenter | Topic |
#17 | Artem Mateush | Data Mining for Technical Debt Analysis (sup.: Pfahl) |
#18 | Lasha Amashukeli | Detection and Analysis of Application Performance Anomalies and Changes (sup.: Dumas) |
#19 | Giorgi Topuria | Requirements Engineering/Management Tools (sup.: Raimundas Matulevičius) |
#20 | Giorgi Gogiashvili | Recommender Systems for Personalized Product Recommendation (sup.: Dumas) |
#21 | Mikheil Kenchoshvili | Software system vulnerability (sup.: Matulevicius) |
#22 | Demur | Graph reasoning (sup.: Karus) |
- Presentations 5 (26 April, 10:15-12:00)
Number | Presenter | Topic |
#23 | Madhushree Singh | Survey and comparison of security threat taxonomies (sup.: Matulevičius) |
#24 | Gerson Noboa | Blockchain as Disruptive Technology in Healthcare (sup.: Milani) |
#25 | Atakan Arıkan | Discovering Social Circles in Social Networks (sup. Dumas) |
#26 | Erdem Toraman | Automated Email Classification and Answering (sup.: Dumas) |
#27 | Talha Mahin Mir | Automatic extraction of app features from App Reviews: Evaluation on a benchmark dataset (sup.: Shah) |
#28 | Ioane Sharvadze | Cognitive Computing and Work Automation (sup.: Dumas) |
- Presentations 6 (3 May, 10:15-12:00)
Number | Presenter | Topic |
#29 | Indrek Värva | Comparison of process engines for education (sup.: Karus) |
#30 | Olev Abel | The legacy of a human coder (sup.: Karus) |
#31 | Antony Orenge | Risk-based Testing Approach for Test Case Prioritization (sup.: Nazarbakhsh) |
#32 | Margus Sellin | The Role of a Product Manager in Software Companies (sup.: Milani) |
#33 | Victor Aluko | Business processes performance profiling from event logs (sup.: Banuelos ) |
#34 | Akande Adefisayo Ayodeji | Blockchain as Disruptive Technology in Insurance (sup.: Milani) |
- Presentations 7 (10 May, 10:15-12:00)
Number | Presenter | Topic |
#35 | Junaid Ahmed | Techniques for measuring software energy consumption: A comparative analysis (sup.: Anwar) |
#36 | Denis Kovalenko | Static analysis of smart contracts as a way to finding security bugs (sup.: Banuelos) |
#37 | Karl-Kristjan Kokk | Digital Transformation (Dumas) |
#38 | Eerik Muuli | Auto-grading graphical exercises (Tõnisson) |
#39 | Dmytro Chasovskyi | Gamification of Machine Translation Evaluation (sup.: Fishel) |
- Presentations 8 (17 May, 10:15-12:00)
Number | Presenter | Topic |
#40 | Shalva Avanashvili | Test Case Generation (sup.: Nazarbakhsh) |
#41 | Geraldine King Granada | Conformance Checking of Business Processes Based on Event Logs (sup.: Dumas) |
#42 | Oleksandr Cherednychenko | Survey of the i* and Tropos extensions to security (sup.: Matulevicius) |
#43 | Osman Firat Akandere | Business Process Deviance Mining (sup.: Dumas) |
#44 | Sercan Altundas | Measuring reputation of companies (sup.: Kungas) |
#45 | Stepan Bolotnikov | Economic crime prevention via network analysis (sup.: Kungas) |
- Presentations 9 (24 May, 10:15-12:00)
Number | Presenter | Topic |
#46 | Jevgeni | Improving accuracy of brain-computer interface with multiple trials (sup.: Kuzovkin, Vicente) |
#47 | Kote Ujmajuridze | Cell Constructor (sup.: Leopold Parts) |
#48 | Andrii Khrystian | Incremental Predictive Monitoring of Business Processes (sup.: Maggi) |
#49 | Andrei Proskurin | Adapting a Stress Testing Framework to a Multi-module Security-oriented Spring Application (sup.: Oruaas, Matulevicius) |
#50 | Erik Räni | Comparison of BPMN Security Extensions (sup.: Matulevičius) |