Davoud Mougouei
Orcid: 0000-0002-4271-9174
  According to our database1,
  Davoud Mougouei
  authored at least 31 papers
  between 2012 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
    CoRR, March, 2025
    
  
A First Look at AI Trends in Value-Aligned Software Engineering Publications: Human-LLM Insights.
    
  
    Proceedings of the 47th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society, 2025
    
  
  2023
Beyond fear and anger: A global analysis of emotional response to Covid-19 news on Twitter.
    
  
    Online Soc. Networks Media, July, 2023
    
  
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions.
    
  
    ACM Comput. Surv., 2023
    
  
  2022
    Inf. Softw. Technol., 2022
    
  
Investigating the Emotional Response to COVID-19 News on Twitter: A Topic Modelling and Emotion Classification Approach.
    
  
    IEEE Access, 2022
    
  
  2021
    Int. J. Fuzzy Syst., 2021
    
  
Dependency-aware software requirements selection using fuzzy graphs and integer programming.
    
  
    Expert Syst. Appl., 2021
    
  
Software Engineering for Blockchain Based Software Systems: Foundations, Survey, and Future Directions.
    
  
    CoRR, 2021
    
  
A Comprehensive Framework for Analyzing IoT Platforms: A Smart City Industrial Experience.
    
  
    CoRR, 2021
    
  
A Fuzzy-Based Requirement Selection Method for Considering Value Dependencies in Software Release Planning.
    
  
    Proceedings of the 30th IEEE International Conference on Fuzzy Systems, 2021
    
  
  2020
    Soft Comput., 2020
    
  
A Fuzzy-Based Optimization Method for Integrating Value Dependencies into Software Requirement Selection.
    
  
    CoRR, 2020
    
  
An Integer Programming Model for Embedding Social Values into Software Requirement Selection.
    
  
    CoRR, 2020
    
  
A study on the prevalence of human values in software engineering publications, 2015 - 2018.
    
  
    Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
    
  
    Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
    
  
  2019
A fuzzy framework for prioritization and partial selection of security requirements in software projects.
    
  
    J. Intell. Fuzzy Syst., 2019
    
  
Dependency-aware release planning for software projects using fuzzy graphs and integer programming.
    
  
    J. Intell. Fuzzy Syst., 2019
    
  
Towards Integrating Human Values into Software: Mapping Principles and Rights of GDPR to Values.
    
  
    Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
    
  
  2018
    Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
    
  
    Proceedings of the International Workshop on Software Fairness, 2018
    
  
  2017
    Int. J. Fuzzy Syst., 2017
    
  
An Integer Programming Model for Binary Knapsack Problem with Value-Related Dependencies among Elements.
    
  
    CoRR, 2017
    
  
PAPS: A Scalable Framework for Prioritization and Partial Selection of Security Requirements.
    
  
    CoRR, 2017
    
  
    Proceedings of the 39th International Conference on Software Engineering, 2017
    
  
An Integer Linear Programming Model for Binary Knapsack Problem with Dependent Item Values.
    
  
    Proceedings of the AI 2017: Advances in Artificial Intelligence, 2017
    
  
  2016
    CoRR, 2016
    
  
Factoring requirement dependencies in software requirement selection using graphs and integer programming.
    
  
    Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016
    
  
  2012
    Proceedings of the 2012 International Conference on Cyber Security, 2012