Search
Search Results
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory
The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...
-
Rethinking AI code generation: a one-shot correction approach based on user feedback
Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...
-
Secure electronic monitoring of sex offenders
Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...
-
An efficient approach of epilepsy seizure alert system using IoT and machine learning
Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...
-
Emergent cooperation from mutual acknowledgment exchange in multi-agent reinforcement learning
Peer incentivization (PI) is a recent approach where all agents learn to reward or penalize each other in a distributed fashion, which often leads to...
-
Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net
A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...
-
An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm
After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...
-
Analyzing Data Streams from Cyber-Physical-Systems: A Case Study
We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...
-
Designing an Intelligent Contract with Communications and Risk Data
Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...
-
Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine
Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...
-
iDOCEM
In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...
-
Interactive search-based Product Line Architecture design
Software Product Line (SPL) is an approach derived from other engineering fields that use reuse techniques for a family of products in a given...
-
Formally understanding Rust’s ownership and borrowing system at the memory level
Rust is an emergent systems programming language highlighting memory safety through its Ownership and Borrowing System (OBS). Formalizing OBS in...