A role model is a person who serves as an example for others to follow, especially in terms of values, behavior, achievements, and personal characteristics. In this paper, authors study how role models influence softw...
详细信息
ISBN:
(纸本)9798400705335
A role model is a person who serves as an example for others to follow, especially in terms of values, behavior, achievements, and personal characteristics. In this paper, authors study how role models influence software practitioners' careers, an aspect not studied in the literature before. By means of this study, authors aim to understand if there are any salient role model archetypes and what characteristics are valued by participants in their role models. To do so, authors use a thematic coding approach to analyze the data collected from interviewing ten Latin American software practitioners. Findings reveal that role models were perceived as sources of knowledge, yet the majority of participants, regardless of their career stage, displayed a stronger interest in the human side and the moral values that their role models embodied. this study also shows that any practitioner can be viewed as a role model.
In response to the significant rise of Home Health Care (HHC) due to technological advances, an expanding elderly demographic, and increased disease outbreaks—intensified by the COVID-19 pandemic—there is a pressing...
详细信息
In the dynamic landscape of Quantum softwareengineering (QSE), ensuring the integrity of sensitive data is critical, which stipulates integrating security and privacy measures during the Quantum software Development ...
详细信息
ISBN:
(纸本)9798400717017
In the dynamic landscape of Quantum softwareengineering (QSE), ensuring the integrity of sensitive data is critical, which stipulates integrating security and privacy measures during the Quantum software Development Life Cycle (QDLC) rather than providing cost-inefficient post-production software fixes. this paper proposes a Quantum Privacy knowledge Base (QPKB) and Quantum Privacy-Oriented software Development (QPOSD) approach that integrates privacy and security protocols into quantum hybrid software development, complementing existing software development processes. QPKB is formalized as the interrelationship between five key elements: Quantum Privacy by Design principles, Quantum Privacy Design Strategies, Quantum Privacy Patterns, Quantum Bugs and Vulnerabilities, and Quantum Hybrid Context. the step-by-step methodology for QPOSD spans analysis, design, coding, verification and validation, and deployment phases. Withthe help of a scenario, we demonstrate how QPOSD can effectively integrate security and privacy imperatives in QDLC. this study acts as a starting point for serving operational guidelines for quantum development teams, providing strategies for integrating privacy and security measures into QSE practices.
Quantum computing (QC) shows the potential to trigger a paradigm shift for numerous industries. As an emerging technology, methodological support for designing and developing QC-based applications is lacking. this pap...
详细信息
ISBN:
(纸本)9780998133171
Quantum computing (QC) shows the potential to trigger a paradigm shift for numerous industries. As an emerging technology, methodological support for designing and developing QC-based applications is lacking. this paper presents the results of a case study applying consortium research in order to perform a requirements engineering process for two QC-based applications in the manufacturing industry. the results show the differences between requirements engineering for QC applications and conventional software applications. the major findings point to the need for QC knowledge and best practices for a successful requirements engineering process and elaborate on the main differences between QC application- and software application requirements.
Nowadays cloud systems are becoming increasingly important, and at the same time, there is a need to ensure the security of those systems that pose specific problems. there is the lack of adequate skills and knowledge...
详细信息
ISBN:
(纸本)9798400717017
Nowadays cloud systems are becoming increasingly important, and at the same time, there is a need to ensure the security of those systems that pose specific problems. there is the lack of adequate skills and knowledge to deal withthe complexity and challenges determined by security in cloud systems, particularly skills related to project management. this research aims to investigate the software project management issues and challenges in the design, development, maintenance, and operation of cloud systems while ensuring adequate security, understanding best practices to address them. the ultimate goal of the research is to create a framework that offers practical recommendations to enhance overall project understanding and support project managers in managing projects and programs related to the security of cloud systems.
the women in softwareengineering continue to face a culture of discord that manifests itself in the form of underrepresentation, unpleasantness, and/or inequitableness. this somewhat dire situation was only exacerbat...
详细信息
Gamification is widely used and explored for improving learning and increase motivation. However, it has not been further explored in the context of softwareengineering managerial decision making, as a supportive too...
详细信息
this paper proposes and analyzes an equalization strategy based on the active equalization layered control of series Li-ion battery packs while using inconsistent battery charge states, and it employs a Buck-Boost bas...
详细信息
Machine learning (ML) models have become essential components in software systems across several domains, such as autonomous driving, healthcare, and finance. the robustness of these ML models is crucial for maintaini...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Machine learning (ML) models have become essential components in software systems across several domains, such as autonomous driving, healthcare, and finance. the robustness of these ML models is crucial for maintaining the software systems performance and reliability. A significant challenge arises when these systems encounter out-of-distribution (OOD) data, examples that differ from the training data distribution. OOD data can cause a degradation of the software systems performance. therefore, an effective OOD detection mechanism is essential for maintaining software system performance and robustness. Such a mechanism should identify and reject OOD inputs and alert software engineers. Current OOD detection methods rely on hyperparameters tuned with in-distribution and OOD data. However, defining the OOD data that the system will encounter in production is often infeasible. Further, the performance of these methods degrades with OOD data that has similar characteristics to the in-distribution data. In this paper, we propose a novel OOD detection method using the Gini coefficient. Our method does not require prior knowledge of OOD data or hyper-parameter tuning. On common benchmark datasets, we show that our method outperforms the existing maximum softmax probability (MSP) baseline. For a model trained on the MNIST dataset, we improve the OOD detection rate by 4% on the CIFAR10 dataset and by more than 50% for the EMNIST dataset.
the ability to simulate is influenced considerably by the software technology available to the modeler. the access, availability, and use of simulation software are, in turn, affected by cost considerations, geographi...
详细信息
暂无评论