the development of comprehensive use case descriptions is a critical task in softwareengineering, providing essential insights for requirement analysis and system design. the advent of advanced natural language proce...
详细信息
ISBN:
(纸本)9798400706226
the development of comprehensive use case descriptions is a critical task in softwareengineering, providing essential insights for requirement analysis and system design. the advent of advanced natural language processing models, such as ChatGPT, has sparked interest in their potential to automate tasks traditionally performed by humans, including the generation of use case descriptions in softwareengineering. Understanding the capabilities and limitations of ChatGPT in generating use case descriptions is crucial for software engineers. Without a clear understanding of its performance, practitioners may either overestimate its utility, leading to reliance on suboptimal drafts, or underestimate its capabilities, missing opportunities to streamline the drafting process. this paper addresses how well ChatGPT performs in generating use case descriptions, evaluating their quality compared to human-written descriptions. To do so, we employ a structured approach using established quality guidelines and the concept of "bad smells" for use case descriptions. Our study presents the first attempt to bridge the knowledge gap by offering a comparative analysis of ChatGPT-generated and human-written use case descriptions. By providing an approach to objectively assess ChatGPT's performance, we highlight its potential and limitations, offering software engineers insights to effectively integrate AI tools into their workflows.
Background Machine Learning plays an ever-growing role in everyday software. this means a paradigmatic shift in how software operators from algorithm-centered software where the developers defines the functionality to...
详细信息
the rapidly evolving biometric recognition technology has been widely applied in the detection and diagnosis of biological diseases. However, in the poultry domain, the scarcity of case information and the difficulty ...
详细信息
Nowadays, machine learning (ML) is being used in software systems with multiple application fields, from medicine to softwareengineering (SE). On the one hand, the popularity of ML in the industry can be seen in the ...
详细信息
ISBN:
(纸本)9798350322637
Nowadays, machine learning (ML) is being used in software systems with multiple application fields, from medicine to softwareengineering (SE). On the one hand, the popularity of ML in the industry can be seen in the statistics showing its growth and adoption. On the other hand, its popularity can also be seen in research, particularly in SE, where multiple studies related to the use of Machine Learning in softwareengineering have been published in conferences and journals. At the same time, researchers and practitioners have shown that machine learning has some particular challenges and pitfalls. In particular, research has shown that ML-enabled systems have a different development process than traditional software, which also describes some of the challenges of ML applications. In order to mitigate some of the identified challenges and pitfalls, white and gray literature has proposed a set of recommendations based on their own experiences and focused on their domain (e.g., biomechanics), but for the best of our knowledge, there is no guideline focused on the SE community. this thesis aims to reduce the gap of not having clear guidelines in the SE community by using possible sources of practices such as question-and-answer communities and also previous research studies. As a result, we will present a set of practices with an SE perspective, for researchers and practitioners, including a tool for searching them.
the proceedings contain 10 papers. the special focus in this conference is on Design and Architectures for Signal and Image Processing. the topics include: LiFT: Lightweight, FPGA-Tailored 3D Object Detection Based on...
ISBN:
(纸本)9783031878961
the proceedings contain 10 papers. the special focus in this conference is on Design and Architectures for Signal and Image Processing. the topics include: LiFT: Lightweight, FPGA-Tailored 3D Object Detection Based on LiDAR Data;A Practical HW-Aware NAS Flow for AI Vision Applications on Embedded Heterogeneous SoCs;Endoscopy Image Classification for Wireless Capsules with CNNs on Microcontroller-Based Platforms;joint Underwater Depth Estimation and Dehazing from a Single Image Using Attention U-Net;KD-AHOSVD: Neural Network Compression via knowledge Distillation and Tensor Decomposition;Novel Scheduling and Shifter Networks for 5G LDPC Decoders;Comparison Between In-Core Hardware IDS, Off-Core Hardware IDS and software IDS;comparative Study of Memory Optimization Techniques for Dataflow-Modeled Applications.
the core of design lies in the acquisition and application of knowledge. knowledge push technology can effectively improve the utilization efficiency of knowledge by designers, thus enabling more efficient task comple...
详细信息
the day to day of a software engineer involves a variety of tasks. While many of these tasks are collaborative and completed as such, it is not always possible or feasible to engage with other engineers for task compl...
详细信息
ISBN:
(纸本)9798350300376
the day to day of a software engineer involves a variety of tasks. While many of these tasks are collaborative and completed as such, it is not always possible or feasible to engage with other engineers for task completion. software tools, such as code generators and static analysis tools, aim to fill this gap by providing additional support for developers to effectively complete their tasks. With a steady stream of new tools that emerging to support software engineers, including a new breed of tools that rely on artificial intelligence, there are important questions we should aim to answer regarding the trust engineers can, and should, put into their software tools and what it means to build a trustworthy tool. In this paper, we present findings from an industry interview study conducted with18 engineers across and external to the Microsoft organization. Based on these interviews, we introduce the PICSE (pronounced "pixie") framework for trust in software tools to provide preliminary insights into factors that influence engineer trust in their software tools. We also discuss how the PICSE framework can be considered and applied in practice for designing and developing trustworthy software tools.
Managing a system can be critical for its successful functioning. this is especially crucial for the socio-technical systems of systems (SoS) that characterize many of modern society's critical operations. However...
详细信息
ISBN:
(纸本)9798350365924;9798350365917
Managing a system can be critical for its successful functioning. this is especially crucial for the socio-technical systems of systems (SoS) that characterize many of modern society's critical operations. However, the management of SoS becomes complex as systems are increasingly interconnected and the dependence among connected systems intensifies. this paper explores the current state of the art on SoS management and governance from a risk management perspective. Our findings show a higher focus on SoS management;however, many studies do not holistically deal withthe SoS. Moreover, our findings indicate fewer studies in SoS governance. Hence there is still a research gap. the study contributes to the body of knowledge by adding insight into how risk management fits in these domains and provides direction on the possible areas of mitigating risks.
the complexity of indoor particulate exposure intensifies at higher altitudes due to increased lung capacity developed to meet heightened oxygen demands. Altitude variations impact atmospheric pressure and alter parti...
详细信息
Background: the UK cyber skills gap/shortage amplifies the broader impact of cyber-attacks, which inflict harms such as privacy and economic loss on wider society. the demand is greatest (and growing fastest) in cyber...
详细信息
ISBN:
(纸本)9798400700446
Background: the UK cyber skills gap/shortage amplifies the broader impact of cyber-attacks, which inflict harms such as privacy and economic loss on wider society. the demand is greatest (and growing fastest) in cyber-enabled disciplines, such as softwareengineering. Objectives: In this paper, we create a term frequency-inverse document frequency representation of the Cyber Security Body of knowledge (CyBOK). We then evaluate the potential of this representation by using it to automatically map job descriptions to the different areas of the CyBOK. Method: We generate two representations of the CyBOK. the representations are mapped to a corpus of 454 job descriptions using TF-IDF. Comparing the similarity scores across these mappings allows us to identify relevant knowledge areas/groups. Results: the results are preliminary, but suggest that the approach warrants further investigation. Certain job descriptions are mapped to certain knowledge areas/groups in a way that makes intuitive sense to the authors. However, there is a degree homogeneity to the scores returned for certain knowledge areas/groups. there are several threats to validity, most notably the low number of job descriptions that have been studied. Conclusions: Our work shows that it is possible to automatically map job descriptions to the CyBOK in a meaningful way. Further research is required to address threats and to explore alternative mapping approaches. the authors intend to undertake this research culminating with a Grey Literature Informed Model of Practice in Secure softwareengineering.
暂无评论