We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Cybersyn, big data, variety engineering and governance

    This contribution offers reflections about Chilean Cybersyn, 50 years ago. In recent years, Cybersyn, has received significant attention. It was the...

    Raul Espejo in AI & SOCIETY
    Article 04 January 2022
  2. The capabilities approach and variety engineering. A case for social cocreation of value

    The purpose of this paper is to show an application of variety engineering in the social realm (Beer in The heart of enterprise. Wiley, Chichester,...

    Alfonso Reyes Alvarado in AI & SOCIETY
    Article 21 January 2022
  3. Engineering the Human Mind: Social Engineering Attack Using Kali Linux

    This in-depth review article examines social engineering attacks and their implementation through the Kali Linux operating system, delving into the...

    Joy Winston James in SN Computer Science
    Article 04 November 2023
  4. CoVaMaT: Functionality for Variety Reuse Through a Supporting Tool

    Develo** reusable Big Data Systems (BDSs) implies dealing with modeling variety as reusable assets. Conceptually speaking, these assets might be...
    Líam Osycka, Alejandra Cechich, ... Angel Muñoz in Cloud Computing, Big Data & Emerging Topics
    Conference paper 2023
  5. Using reactive links to propagate changes across engineering models

    Collaborative model-driven development is a de facto practice to create software-intensive systems in several domains (e.g., aerospace, automotive,...

    Cosmina-Cristina Raţiu, Wesley K. G. Assunção, ... Alexander Egyed in Software and Systems Modeling
    Article Open access 10 June 2024
  6. Social Engineering

    In the realm of cybersecurity, social engineering refers to a broad spectrum of malicious activities accomplished through human interactions. It...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  7. Feature Engineering

    In this chapter, we will introduce to you the key part in the algorithm competition that has the heaviest workload and that determines whether the...
    Wang He, Peng Liu, Qian Qian in Machine Learning Contests: A Guidebook
    Chapter 2023
  8. Ontological Engineering in Complex Systems Based on Meta-Associative Graphs

    Abstract —

    The paper proposes a variety of metagraphs focused on the use in ontological engineering of complex systems characterized by complexity of...

    V. V. Borisov, A. E. Misnik in Pattern Recognition and Image Analysis
    Article 26 September 2023
  9. Persistent spectral theory-guided protein engineering

    Although protein engineering, which iteratively optimizes protein fitness by screening the gigantic mutational space, is constrained by experimental...

    Yuchi Qiu, Guo-Wei Wei in Nature Computational Science
    Article 20 February 2023
  10. Prompt Engineering Techniques

    In this day and age, it’s easy to make use of ChatGPT and other LLMs as a super-powered search engine and ask for information or even small tasks...
    Chapter 2024
  11. Registered reports in software engineering

    Registered reports are scientific publications which begin the publication process by first having the detailed research protocol, including key...

    Neil A. Ernst, Maria Teresa Baldassarre in Empirical Software Engineering
    Article 11 March 2023
  12. Modelling and analysis of social engineering threats using the attack tree and the Markov model

    Social Engineering Threats (SETs) exploit human vulnerabilities in information system security. Due to its ability to bypass technical security,...

    Mohammad Aijaz, Mohammed Nazir in International Journal of Information Technology
    Article 23 October 2023
  13. Quantum software engineering and quantum software development lifecycle: a survey

    Quantum software engineering is advancing in the domain of quantum computing research and application, yet the documentation is scattered. The slow...

    Kanishk Dwivedi, Majid Haghparast, Tommi Mikkonen in Cluster Computing
    Article Open access 25 March 2024
  14. Terraform and Reverse Engineering

    In the previous chapter, we studied the fundamentals of reverse engineering and its operation. Additionally, we discussed Terraform with you and the...
    Sumit Bhatia, Chetan Gabhane in Reverse Engineering with Terraform
    Chapter 2024
  15. Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems

    This paper proposes a new intelligent optimization algorithm named Black Eagle Optimizer (BEO) based on the biological behaviour of the black eagle....

    Haobin Zhang, Hongjun San, ... **ngmei Wu in Cluster Computing
    Article 13 June 2024
  16. The Variety of Data Science Learners

    Since data science is considered to be an important twenty-first centurySkills21st century skill, it should be acquired by everyone—children as well...
    Orit Hazzan, Koby Mike in Guide to Teaching Data Science
    Chapter 2023
  17. Towards a systematic and knowledge-based requirements and conceptual engineering for modular electrolysis plants

    The production of green hydrogen and its scale-up require the enginering and installation of new electrolysis plants. Modular electrolysis plants...

    Artan Markaj, Julius Lorenz, ... Alexander Fay in Energy Informatics
    Article Open access 26 October 2023
  18. The Impact of Personality on Requirements Engineering Activities: A Mixed-Methods Study

    Context

    Requirements engineering (RE) is an important part of Software Engineering (SE), consisting of various human-centric activities that require...

    Dulaji Hidellaarachchi , John Grundy, ... Ingo Mueller in Empirical Software Engineering
    Article 28 December 2023
  19. A multi-layered security model to counter social engineering attacks: a learning-based approach

    Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...

    Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan in International Cybersecurity Law Review
    Article 18 April 2024
  20. Forecasting the software engineering model’s effort estimation using constructive cost estimation models

    Machine learning models are increasingly being developed to solve various problems in academic and corporate settings. However, data scientists...

    Mohammed Naif Alatawi in Iran Journal of Computer Science
    Article 13 June 2024
Did you find what you were looking for? Share feedback.