We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  2. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  3. Intelligent and efficient task caching for mobile edge computing

    Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...

    Amir Moradi, Fatemeh Rezaei in Cluster Computing
    Article 13 July 2024
  4. When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data

    Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...

    Edmond Awad, Sydney Levine, ... Max Kleiman-Weiner in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 July 2024
  5. Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory

    The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...

    Faouzi Sebbak, Mustapha Reda Senouci, ... Walid Cherifi in KI - Künstliche Intelligenz
    Article 13 July 2024
  6. Rethinking AI code generation: a one-shot correction approach based on user feedback

    Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...

    Kim Tuyen Le, Artur Andrzejak in Automated Software Engineering
    Article Open access 12 July 2024
  7. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  8. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  9. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  10. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  11. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  12. Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection

    Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...

    Nicola Bena, Marco Anisetti, ... Claudio A. Ardagna in SN Computer Science
    Article Open access 11 July 2024
  13. Secure electronic monitoring of sex offenders

    Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...

    Francesco Buccafurri, Vincenzo De Angelis, ... Cecilia Labrini in Journal of Reliable Intelligent Environments
    Article Open access 11 July 2024
  14. An efficient approach of epilepsy seizure alert system using IoT and machine learning

    Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...

    Jagadeesh Basavaiah, Audre Arlene Anthony, ... H. N Naveen Kumar in Journal of Reliable Intelligent Environments
    Article 11 July 2024
  15. Machine learning-driven performance assessment of network-on-chip architectures

    System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...

    Ramapati Patra, Prasenjit Maji, ... Hemanta Kumar Mondal in The Journal of Supercomputing
    Article 11 July 2024
  16. Emergent cooperation from mutual acknowledgment exchange in multi-agent reinforcement learning

    Peer incentivization (PI) is a recent approach where all agents learn to reward or penalize each other in a distributed fashion, which often leads to...

    Thomy Phan, Felix Sommer, ... Claudia Linnhoff-Popien in Autonomous Agents and Multi-Agent Systems
    Article Open access 11 July 2024
  17. Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net

    A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...

    S. V. N. Murthy, Kovvuri N. Bhargavi, ... E. N.Ganesh in SN Computer Science
    Article 10 July 2024
  18. A new integrated steganography scheme for quantum color images

    In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...

    Yumin Dong, Rui Yan in The Journal of Supercomputing
    Article 10 July 2024
  19. An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm

    After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...

    Razieh Asgarnezhad in SN Computer Science
    Article 10 July 2024
  20. Analyzing Data Streams from Cyber-Physical-Systems: A Case Study

    We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...

    Harry H. Beyel, Omar Makke, ... Wil M. P. van der Aalst in SN Computer Science
    Article Open access 10 July 2024
Did you find what you were looking for? Share feedback.