Flaky tests can non-deterministically pass or fail regardless of any change to the code, which negatively impacts the effectiveness of the regression testing. Prior repair techniques for flaky tests mainly leverage pr...
详细信息
Withthe development of electronic information technology, new technology fields have posed increasingly high requirements for the voltage and current parameters of transistors. this article analyzes in detail the ban...
详细信息
As software programs continue to grow in size and complexity, the prevalence of software vulnerabilities has emerged as a significant security threat. Detecting these vulnerabilities has become a major concern due to ...
详细信息
A significant socioeconomic shift is arising from the world's and Europe's direction towards a radical change in transportation with an increasing demand for electric vehicles. In this context, the definition ...
详细信息
this study, using the Longwangxi slope in Yunyang as an example, investigates the deformation characteristics of various slope areas through field investigation, engineering analogy, and numerical simulation. the moni...
详细信息
this study, using the Longwangxi slope in Yunyang as an example, investigates the deformation characteristics of various slope areas through field investigation, engineering analogy, and numerical simulation. the monitoring plan was designed based on these analyses, with monitoring equipment deployed to collect data on surface and deep cumulative displacements in active deformation regions. the real monitoring data validated the conclusions drawn from the engineering analogy and numerical simulation. this research demonstrates that a combination of field investigation, engineering analogy, and numerical simulation can provide practical monitoring indicators and spatial layout for slope monitoring design. For deep accumulated slopes with underlying bedding bedrock, a comprehensive monitoring system that includes surface displacement, deep displacement, and rainfall should be established. the surface displacement is mainly distributed at the slope's front edge, while deep displacement is significant in the middle of the slope, where the soil-rock interface inclination is gentle, and the accumulation body is thick.
Federated Learning (FL) has emerged as a promising approach for collaborative machine learning, addressing data privacy concerns. As data security and privacy concerns continue to gain prominence, FL stands out as an ...
详细信息
ISBN:
(纸本)9798350376975;9798350376968
Federated Learning (FL) has emerged as a promising approach for collaborative machine learning, addressing data privacy concerns. As data security and privacy concerns continue to gain prominence, FL stands out as an option to enable organizations to leverage collective knowledge without compromising sensitive data. However, existing FL platforms and frameworks often present challenges for software engineers in terms of complexity, limited customization options, and scalability limitations. In this paper, we introduce EdgeFL, an edge-only lightweight decentralized FL framework, designed to overcome the limitations of centralized aggregation and scalability in FL deployments. By adopting an edge-only model training and aggregation approach, EdgeFL eliminates the need for a central server, enabling seamless scalability across diverse use cases. Our results show that EdgeFL reduces weights update latency and enables faster model evolution, enhancing the efficiency of edge model learning. Moreover, EdgeFL exhibits improved classification accuracy compared to traditional centralized FL approaches. By leveraging EdgeFL, software engineers can harness the benefits of Federated Learning while overcoming the challenges associated with existing FL platforms/frameworks.
In recent years, social aspects, including gender diversity, have gained increasing prominence in various fields, including softwareengineering. Gender diversity has emerged as a significant area of interest within t...
详细信息
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649530
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
In the field of biomedical devices and their applications, electrohydrodynamic jet (E-Jet) printing plays a crucial role in the fabrication of next-generation fine medical devices by virtue of its high resolution and ...
详细信息
Small and medium-sized software enterprises (SSMEs) are a vital part of emerging markets. Due to their size, they are not capable of adopting advanced softwareengineering techniques or automated softwareengineering ...
详细信息
ISBN:
(纸本)9781665437868
Small and medium-sized software enterprises (SSMEs) are a vital part of emerging markets. Due to their size, they are not capable of adopting advanced softwareengineering techniques or automated softwareengineering tools in the same way large and ultra-large companies are. We study the softwareengineering challenges in SSMEs in thailand, an emerging market in software development, using semi-structured interviews with four SSMEs. After performing a thematic analysis of the interview transcripts, we found a number of common challenges such as lack of testing, code-related issues, and inaccurate effort estimation. We observed that in order to introduce advanced automated softwareengineering tools and techniques, SSMEs need to adopt contemporary best practices in softwareengineering like automated testing, continuous integration and automated code review. Moreover, we suggest that softwareengineering research engage with SSMEs to enable them to improve their knowledge and adopt more advanced softwareengineering practices.
暂无评论