Search
Search Results
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
A network intrusion detection system based on deep learning in the IoT
As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...
-
Intelligent and efficient task caching for mobile edge computing
Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory
The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...
-
Rethinking AI code generation: a one-shot correction approach based on user feedback
Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Research on satellite link allocation algorithm for Earth-Moon space information network
With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...
-
Secure electronic monitoring of sex offenders
Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...
-
An efficient approach of epilepsy seizure alert system using IoT and machine learning
Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...
-
Machine learning-driven performance assessment of network-on-chip architectures
System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...
-
Emergent cooperation from mutual acknowledgment exchange in multi-agent reinforcement learning
Peer incentivization (PI) is a recent approach where all agents learn to reward or penalize each other in a distributed fashion, which often leads to...
-
Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net
A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...
-
A new integrated steganography scheme for quantum color images
In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...
-
An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm
After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...
-
Analyzing Data Streams from Cyber-Physical-Systems: A Case Study
We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...