Search
Search Results
-
50 Jahre ICT an der TU Wien – 20 Jahre Forschungsgruppe Embedded Systems an der FH Technikum Wien
In Austria, Universities of Applied Sciences (UAS) are a relatively new type of education when compared to other countries. Research and development...
-
Mass Prediction and Analysis of an Object’s Mass from Its Image Using Deep Learning
The world is full of objects with different properties, such as volume, density, mass, material, etc. These properties are crucial for meaningful...
-
Implicit–explicit two–step peer methods with RK stability for implicit part
We develop a new family of implicit–explicit (IMEX) schemes appropriate for dealing with the systems of differential equations including two...
-
Combinatorial refinement on circulant graphs
The combinatorial refinement techniques have proven to be an efficient approach to isomorphism testing for particular classes of graphs. If the...
-
An innovative fourth-order numerical scheme with error analysis for Lane-Emden-Fowler type systems
In this paper, we develop a novel higher-order compact finite difference scheme for solving systems of Lane-Emden-Fowler type equations. Our method...
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
A robust second-order low-rank BUG integrator based on the midpoint rule
Dynamical low-rank approximation has become a valuable tool to perform an on-the-fly model order reduction for prohibitively large matrix...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory
The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...
-
Sublinear Algorithms in T-Interval Dynamic Networks
We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...
-
Rethinking AI code generation: a one-shot correction approach based on user feedback
Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
Unconditional energy stability and maximum principle preserving scheme for the Allen-Cahn equation
In this paper, we propose a novel fully implicit numerical scheme that satisfies both nonlinear energy stability and maximum principle for the space...
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...
-
Secure electronic monitoring of sex offenders
Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...
-
An efficient approach of epilepsy seizure alert system using IoT and machine learning
Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...
-
Weak convergence of tamed exponential integrators for stochastic differential equations
We prove weak convergence of order one for a class of exponential based integrators for SDEs with non-globally Lipschitz drift. Our analysis covers...