We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  2. When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data

    Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...

    Edmond Awad, Sydney Levine, ... Max Kleiman-Weiner in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 July 2024
  3. Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory

    The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...

    Faouzi Sebbak, Mustapha Reda Senouci, ... Walid Cherifi in KI - Künstliche Intelligenz
    Article 13 July 2024
  4. Rethinking AI code generation: a one-shot correction approach based on user feedback

    Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...

    Kim Tuyen Le, Artur Andrzejak in Automated Software Engineering
    Article Open access 12 July 2024
  5. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  6. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  7. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  8. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  9. Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection

    Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...

    Nicola Bena, Marco Anisetti, ... Claudio A. Ardagna in SN Computer Science
    Article Open access 11 July 2024
  10. Secure electronic monitoring of sex offenders

    Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...

    Francesco Buccafurri, Vincenzo De Angelis, ... Cecilia Labrini in Journal of Reliable Intelligent Environments
    Article Open access 11 July 2024
  11. An efficient approach of epilepsy seizure alert system using IoT and machine learning

    Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...

    Jagadeesh Basavaiah, Audre Arlene Anthony, ... H. N Naveen Kumar in Journal of Reliable Intelligent Environments
    Article 11 July 2024
  12. Emergent cooperation from mutual acknowledgment exchange in multi-agent reinforcement learning

    Peer incentivization (PI) is a recent approach where all agents learn to reward or penalize each other in a distributed fashion, which often leads to...

    Thomy Phan, Felix Sommer, ... Claudia Linnhoff-Popien in Autonomous Agents and Multi-Agent Systems
    Article Open access 11 July 2024
  13. Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net

    A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...

    S. V. N. Murthy, Kovvuri N. Bhargavi, ... E. N.Ganesh in SN Computer Science
    Article 10 July 2024
  14. An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm

    After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...

    Razieh Asgarnezhad in SN Computer Science
    Article 10 July 2024
  15. Analyzing Data Streams from Cyber-Physical-Systems: A Case Study

    We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...

    Harry H. Beyel, Omar Makke, ... Wil M. P. van der Aalst in SN Computer Science
    Article Open access 10 July 2024
  16. Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine

    Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...

    Archana Yashodhar, Shashidhar Kini in SN Computer Science
    Article 10 July 2024
  17. Designing an Intelligent Contract with Communications and Risk Data

    Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...

    Georgios Stathis, Athanasios Trantas, ... Jaap van den Herik in SN Computer Science
    Article Open access 10 July 2024
  18. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  19. Interactive search-based Product Line Architecture design

    Software Product Line (SPL) is an approach derived from other engineering fields that use reuse techniques for a family of products in a given...

    Willian Marques Freire, Cláudia Tupan Rosa, ... Thelma Elita Colanzi in Automated Software Engineering
    Article 09 July 2024
  20. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.