Search
Search Results
-
Comparison of Solution Methods the Maximal Covering Location Problem of Public Spaces for Teenagers in the Urban Environment
The article considers methods of solving the problem of optimal planning of public spaces, based on the approach of network modeling of the urban... -
The Method of Contextual Selection of the Functions of Cultural Heritage Objects Based on the Urban Environment Network Model
The article deals with the problem of managing cultural heritage. Many such objects from among the capital construction facilities have now lost... -
Use of Anomaly Detection and Object Detection as Basic Support in the Recognition of Outlier Data in Images
Despite significant advances in object detection in images, the ability to identify outlier objects in an image remains an unsolved problem. Its... -
One-Time Passwords: A Literary Review of Different Protocols and Their Applications
Currently, user authentication only based on passwords can be inadequate due to different types of vulnerabilities and attacks. To solve this... -
Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era.... -
Machine Ethics and the Architecture of Virtue
As Consequentialism and Deontology ruled the domain of ethics for the past centuries, these theories were in the pole position for robotic... -
Cooperation and Technological Capacity Development Among Companies: Evidence from Ecuador
This study aims to understand the relationship between cooperation and the development of technological capacities among companies, considering the... -
Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions
Shoulder Surfing Attacks (SSAs) represent a significant threat to user authentication (UA) methods, especially to the process based on the user’s... -
DrugChecker: Blockchain-Based Counterfeit Drug Detection System
The new technology Blockchain has moved beyond being a mere advertising slogan to practical applications in industry sectors such as the... -
A Process for Scenario Prioritization and Selection in Simulation-Based Safety Testing of Automated Driving Systems
Simulation-based safety testing of Automated Driving Systems (ADS) is a cost-effective and safe alternative to field tests. However, it is... -
Characterizing Requirements Smells
Context: Software specifications are usually written in natural language and may suffer from imprecision, ambiguity, and other quality issues, called... -
Closing the Loop: Towards a Complete Metamorphic Testing Pipeline
Metamorphic Testing (MT) address the test oracle problem, which arises when there are no practical means to verify the outputs of the System Under... -
To Memorize or to Document: A Survey of Developers’ Views on Knowledge Availability
When develo**, maintaining, or evolving a system, developers need different types of knowledge (e.g., domain, processes, architecture). They may... -
Web Image Formats: Assessment of Their Real-World-Usage and Performance Across Popular Web Browsers
In 2023, images on the web make up 41% of transmitted data, significantly impacting the performance of web apps. Fortunately, image formats like WEBP... -
Integration of Classical and Quantum Services Using an Enterprise Service Bus
Early advancements in quantum computing have opened up new possibilities to tackle complex problems across various fields, including mathematics,... -
Facilitating Security Champions in Software Projects - An Experience Report from Visma
The role of security practices is increasingly recognized in fast-paced software development paradigms in contributing to overall software security.... -
Leveraging Historical Data to Support User Story Estimation
Accurate and reliable effort and cost estimation are still challenging for agile teams in the industry. It is argued that leveraging historical data... -
Quantum Algorithm Cards: Streamlining the Development of Hybrid Classical-Quantum Applications
The emergence of quantum computing proposes a revolutionary paradigm that can radically transform numerous scientific and industrial application... -
The Effects of Soft Assertion on Spectrum-Based Fault Localization
This paper investigates the negative effects of soft assertion on the accuracy of Spectrum-based Fault Localization (SBFL). Soft assertion is a kind... -
Benefits and Challenges of an Internal Corporate Accelerator in a Software Company: An Action-Research Study
To maintain a competitive advantage and adapt to the rapid changes in both the market and technology, organizations need to continuously innovate. As...