We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. 50 Jahre ICT an der TU Wien – 20 Jahre Forschungsgruppe Embedded Systems an der FH Technikum Wien

    In Austria, Universities of Applied Sciences (UAS) are a relatively new type of education when compared to other countries. Research and development...

    Martin Horauer, Peter Rössler in e+i Elektrotechnik und Informationstechnik
    Article 15 July 2024
  2. Mass Prediction and Analysis of an Object’s Mass from Its Image Using Deep Learning

    The world is full of objects with different properties, such as volume, density, mass, material, etc. These properties are crucial for meaningful...

    Amar Nath, Divya Patel, Rajdeep Niyogi in SN Computer Science
    Article 15 July 2024
  3. Implicit–explicit two–step peer methods with RK stability for implicit part

    We develop a new family of implicit–explicit (IMEX) schemes appropriate for dealing with the systems of differential equations including two...

    Mohammad Sharifi, Ali Abdi, ... Aida Mousavi in Numerical Algorithms
    Article 15 July 2024
  4. Combinatorial refinement on circulant graphs

    The combinatorial refinement techniques have proven to be an efficient approach to isomorphism testing for particular classes of graphs. If the...

    Laurence Kluge in computational complexity
    Article Open access 15 July 2024
  5. An innovative fourth-order numerical scheme with error analysis for Lane-Emden-Fowler type systems

    In this paper, we develop a novel higher-order compact finite difference scheme for solving systems of Lane-Emden-Fowler type equations. Our method...

    Nirupam Sahoo, Randhir Singh, Higinio Ramos in Numerical Algorithms
    Article 13 July 2024
  6. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  7. A robust second-order low-rank BUG integrator based on the midpoint rule

    Dynamical low-rank approximation has become a valuable tool to perform an on-the-fly model order reduction for prohibitively large matrix...

    Gianluca Ceruti, Lukas Einkemmer, ... Christian Lubich in BIT Numerical Mathematics
    Article Open access 13 July 2024
  8. When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data

    Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...

    Edmond Awad, Sydney Levine, ... Max Kleiman-Weiner in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 July 2024
  9. Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory

    The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...

    Faouzi Sebbak, Mustapha Reda Senouci, ... Walid Cherifi in KI - Künstliche Intelligenz
    Article 13 July 2024
  10. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  11. Rethinking AI code generation: a one-shot correction approach based on user feedback

    Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...

    Kim Tuyen Le, Artur Andrzejak in Automated Software Engineering
    Article Open access 12 July 2024
  12. Software verification challenges in the blockchain ecosystem

    Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...

    Article Open access 12 July 2024
  13. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  14. Unconditional energy stability and maximum principle preserving scheme for the Allen-Cahn equation

    In this paper, we propose a novel fully implicit numerical scheme that satisfies both nonlinear energy stability and maximum principle for the space...

    Zhuangzhi Xu, Yayun Fu in Numerical Algorithms
    Article 12 July 2024
  15. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  16. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  17. Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection

    Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...

    Nicola Bena, Marco Anisetti, ... Claudio A. Ardagna in SN Computer Science
    Article Open access 11 July 2024
  18. Secure electronic monitoring of sex offenders

    Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...

    Francesco Buccafurri, Vincenzo De Angelis, ... Cecilia Labrini in Journal of Reliable Intelligent Environments
    Article Open access 11 July 2024
  19. An efficient approach of epilepsy seizure alert system using IoT and machine learning

    Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...

    Jagadeesh Basavaiah, Audre Arlene Anthony, ... H. N Naveen Kumar in Journal of Reliable Intelligent Environments
    Article 11 July 2024
  20. Weak convergence of tamed exponential integrators for stochastic differential equations

    We prove weak convergence of order one for a class of exponential based integrators for SDEs with non-globally Lipschitz drift. Our analysis covers...

    Utku Erdoğan, Gabriel J. Lord in BIT Numerical Mathematics
    Article Open access 11 July 2024
Did you find what you were looking for? Share feedback.