UGVs have enormous potential in industries such as defense, agriculture, and autonomous transportation. Efficiency and effectiveness can be achieved by UGVs through the sophistication of their control systems, mainly ...
详细信息
Causal inference is a study of causal relationships between events and the statistical study of inferring these relationships through interventions and other statistical techniques. Causal reasoning is any line of wor...
详细信息
This study examines the significant advancements in computer graphics and mechanical drawing, with an emphasis on how these developments have revolutionised engineering design precision and visualisation. For engineer...
详细信息
A one-time encryption consensus algorithm based on (t, n) threshold secret sharing is proposed to address the performance and security issues of consensus mechanisms in blockchain applications. The theoretical basis o...
详细信息
Recent methods have demonstrated that machine learning (ML) based static malware detection models are vulnerable to adversarial attacks. However, the generated malware often fails to generalize to production-level ant...
详细信息
Delivering an accurate estimation of the effort required for software system development is crucial for the success of any software project. However, the software development lifecycle (SDLC) involves multiple activit...
详细信息
We had an outdated, unsuitable pair of courses covering softwareengineering over an academic year, which were rewritten last summer. Out went the plan-driven project approach of GANNT charts, and a belief that 'b...
详细信息
ISBN:
(纸本)9798400701399
We had an outdated, unsuitable pair of courses covering softwareengineering over an academic year, which were rewritten last summer. Out went the plan-driven project approach of GANNT charts, and a belief that 'better estimates' would save the day. In came a lightweight focus on a mix of extreme programming and scrum to incrementally, and iteratively build products. The classroom changed too. Out went lecture slides in the classroom, plus self-directed pick and choose practical sessions. In came video-led lectures, experiential learning, and practical sessions to guide students in what they need know to build their product prototypes. The initial results suggest we still need more work, but shows students are developing products more confidently as teams.
[Context and Motivation] Security and Privacy (SP) compliance is an important aspect of running businesses successfully. Compliance with SP requirements by softwareengineering (SE) vendors, both in terms of the syste...
详细信息
ISBN:
(纸本)9783031573262;9783031573279
[Context and Motivation] Security and Privacy (SP) compliance is an important aspect of running businesses successfully. Compliance with SP requirements by softwareengineering (SE) vendors, both in terms of the systems they implement and the practices they follow while implementing, gives customers an assurance that their data is accessed, stored, and processed securely. Failure to comply on the other hand, can entail heavy fines, lawsuits, and may even lead to loss of business through prohibition of those software in corresponding jurisdictions. SE contracts are known to be a useful source for deriving software requirements. [Question/problem] Mining any kind of information from contracts is a dauting task given that contracts are large and complex documents employing Legalese. [Principal ideas/results] We employ an exploratory study to come up with a model for a governance-focused classification of the SP requirements present in SE contracts for governance. Next, we report experiments conducted with Recurrent Neural Networks and Transformer-based models to automate this classification. Experiments conducted on 960 SE contracts received from a large vendor organization indicate that T5 performs best for both SP identification and classification tasks. With T5, we obtained an average F1 score of 0.90 each for identification of SP requirements. For the governance-focused classification, we obtained an average F1 score of 0.81 for the Security class and 0.80 for the Privacy class. [Contribution] Through an exploratory study, we present a model for a governance-focused classification of the SP requirements present in SE contracts. We further automate the extraction and the governance-focused classification of SP requirements by conducting experiments using 960 real-life SE contracts received from a large vendor organization.
The research article described in this paper puts forward a novel method of using an integrated software approach and high-end hardware devices for adaptive and intelligent detection of potholes on asphalt roads. The ...
详细信息
Cross-Project Defect Prediction (CPDP) has gained considerable research interest due to the scarcity of historical labeled defective modules in a project. Although there are several approaches for CPDP, most of them c...
详细信息
暂无评论