Search
Search Results
-
From Databases to Exchange Formats
This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability... -
Process Orchestration: Conceptual Design
This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as... -
Efficient Motor Learning Through Action-Perception Cycles in Deep Kinematic Inference
How does the brain adapt to slow changes in the body’s kinematic chain? And how can it perform complex operations that need tool use? Here, we... -
Dynamical Perception-Action Loop Formation with Developmental Embodiment for Hierarchical Active Inference
To adapt an autonomous system to a newly given cognitive goal, we propose a method to dynamically combine multiple perception-action loops. Focusing... -
Contextual Qualitative Deterministic Models for Self-learning Embodied Agents
This work presents an approach for embodied agents that have to learn models from the least amount of prior knowledge, solely based on knowing which... -
Amazlem: The First Amazigh Lemmatizer
Natural language processing has become the center of research, not only, in rich languages but also in low resourced ones. In this perspective and to... -
Comparison of Solution Methods the Maximal Covering Location Problem of Public Spaces for Teenagers in the Urban Environment
The article considers methods of solving the problem of optimal planning of public spaces, based on the approach of network modeling of the urban... -
The Method of Contextual Selection of the Functions of Cultural Heritage Objects Based on the Urban Environment Network Model
The article deals with the problem of managing cultural heritage. Many such objects from among the capital construction facilities have now lost... -
Use of Anomaly Detection and Object Detection as Basic Support in the Recognition of Outlier Data in Images
Despite significant advances in object detection in images, the ability to identify outlier objects in an image remains an unsolved problem. Its... -
One-Time Passwords: A Literary Review of Different Protocols and Their Applications
Currently, user authentication only based on passwords can be inadequate due to different types of vulnerabilities and attacks. To solve this... -
Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper
As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era.... -
Machine Ethics and the Architecture of Virtue
As Consequentialism and Deontology ruled the domain of ethics for the past centuries, these theories were in the pole position for robotic... -
Cooperation and Technological Capacity Development Among Companies: Evidence from Ecuador
This study aims to understand the relationship between cooperation and the development of technological capacities among companies, considering the... -
Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions
Shoulder Surfing Attacks (SSAs) represent a significant threat to user authentication (UA) methods, especially to the process based on the user’s... -
DrugChecker: Blockchain-Based Counterfeit Drug Detection System
The new technology Blockchain has moved beyond being a mere advertising slogan to practical applications in industry sectors such as the... -
A Process for Scenario Prioritization and Selection in Simulation-Based Safety Testing of Automated Driving Systems
Simulation-based safety testing of Automated Driving Systems (ADS) is a cost-effective and safe alternative to field tests. However, it is... -
Characterizing Requirements Smells
Context: Software specifications are usually written in natural language and may suffer from imprecision, ambiguity, and other quality issues, called... -
Closing the Loop: Towards a Complete Metamorphic Testing Pipeline
Metamorphic Testing (MT) address the test oracle problem, which arises when there are no practical means to verify the outputs of the System Under... -
To Memorize or to Document: A Survey of Developers’ Views on Knowledge Availability
When develo**, maintaining, or evolving a system, developers need different types of knowledge (e.g., domain, processes, architecture). They may... -
Web Image Formats: Assessment of Their Real-World-Usage and Performance Across Popular Web Browsers
In 2023, images on the web make up 41% of transmitted data, significantly impacting the performance of web apps. Fortunately, image formats like WEBP...