Search
Search Results
-
Odds and Ends
This chapter will cover some additions and enhancements to our existing work: -
Introduction
Hello, and welcome! I’m very excited to share with you my book about test-driven software development. I’ve been a software engineer for over 25... -
Adding Initial Models
In this chapter, we will add our first two Rails ActiveRecord models into our blog application. We will start with simple User and Page models and... -
Essentials of Blockchain Programming
Focusing on cryptography primitives and Merkle trees, this chapter examines the fundamentals of blockchain programming. The first section of the... -
Ethereum Blockchain
The Ethereum blockchain is a decentralized, open source platform that enables the creation and execution of smart contracts. It was introduced in... -
A Survey of Actor-Like Programming Models for Serverless Computing
Serverless computing promises to significantly simplify cloud computing by providing Functions-as-a-Service where invocations of functions, triggered... -
Integrated Timed Architectural Modeling/Execution Language
We discuss an integrated approach for the design, specification, automatic deployment and simulation of microservice-based applications based on the... -
Actors Upgraded for Variability, Adaptability, and Determinism
The Rebeca modeling language is designed as an imperative actor-based language with the goal of providing an easy-to-use language for modeling... -
Context-Aware Trace Contracts
The behavior of concurrent, asynchronous procedures depends in general on the call context, because of the global protocol that governs scheduling.... -
CTL-I: Infrared Few-Shot Learning via Omnidirectional Compatible Class-Incremental
Accommodating infrared novel class in deep learning models without sacrificing prior knowledge of base class is a challenging task , especially when... -
BigText-QA: Question Answering over a Large-Scale Hybrid Knowledge Graph
Answering complex questions over textual resources remains a challenge, particularly when dealing with nuanced relationships between multiple... -
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case
This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the... -
A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities
Non-Fungible Token (NFT) is an emerging blockchain-based technology. These tokens can represent digital assets, as it has proof of ownership built... -
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are... -
IoT Attacks Countermeasures: Systematic Review and Future Research Direction
In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and... -
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
With the prevalence of information sharing, preserving the confidentiality of sensitive data has become paramount. Attribute-based encryption (ABE)... -
Anticipating User Needs: Insights from Design Fiction on Conversational Agents for Computational Thinking
Computational thinking, and by extension, computer programming, is notoriously challenging to learn. Conversational agents and generative artificial... -
Voting Assistant Chatbot for Increasing Voter Turnout at Local Elections: An Exploratory Study
Local Dutch elections suffer from a voter turnout decrease with 23% between 1986 and 2022. This raises general quality concerns about the local... -
Aragón Open Data Assistant, Lesson Learned of an Intelligent Assistant for Open Data Access
Chatbots are becoming more popular on websites. To ensure their widespread adoption and effectiveness, it is crucial that the development of these... -
Model-Driven Security Smell Resolution in Microservice Architecture Using LEMMA
Effective security measures are crucial for modern Microservice Architecture (MSA)-based applications as many IT companies rely on microservices to...