Based on the theory of resource preservation and role theory, a mechanism model of the influence of workplace friendship on employees' deviant behavior in the workplace is constructed. Taking enterprise employees ...
详细信息
Facts-pushed verbal exchange software program layout is a critical element in the design of statistics networks. It encompasses the identification, control, and manipulate of network traffics, which includes the prior...
详细信息
The steel manufacturing industry stands as the backbone of global infrastructure development, providing the raw materials essential for constructing everything from skyscrapers to automobiles. Central to this industry...
详细信息
The proceedings contain 38 papers. The special focus in this conference is on Foundations of computerscience. The topics include: Exploring Efficient but Intricate Delivery Truck Routing Heuristics in Suppl...
ISBN:
(纸本)9783031859298
The proceedings contain 38 papers. The special focus in this conference is on Foundations of computerscience. The topics include: Exploring Efficient but Intricate Delivery Truck Routing Heuristics in Supply Chain Management;a Novel Simple Data Structure for Selecting, Inserting, and Deleting in Square Root Time;Autosymmetry Using GF(2) Matrices;TOIChain™: A Proposal for High Performance Tamper Resistant Transactions Without Scaling Limits;searching Real Numbers in Constant Time;MultiMap Implementation in OpenJDK;optimization of the Floyd-Warshall Shortest Path Algorithm;triangle Packing in Graphs with Bounded Degree;navigating the Ethical Landscape of Big Data Collection and Analysis;Assessing ABET’s Outcomes Through a softwareengineering Capstone Course;ECAF: Educational Cybersecurity Assessment Framework for Small Businesses;Leveraging Chat-GPT to Generate Educational Assessment Materials for softwareengineering;a Longitudinal Study to Investigate the Impact of a Service-Learning Course on Its Participants;tertiary Mathematics Students in Different Learning Environments: Perceptions and Achievement;using Logical Fallacies to Educate computerscience Students;Assessing ChatGPT for Algorithm Time Complexity Education;capstone Projects as Ventures to New Knowledge;exploratory Physics Laboratory Experiments;A Personal Tutoring Bot with VR/AR Tools;ES4AL: A Website for Effectiveness Study for Algorithm Learning in computerscience;INDRA: A Drone Penetration Testing Platform for Cybersecurity Education;Exploring the Potential of Generative AI in Education: Opportunities, Challenges, and Best Practices for Classroom Integration;digital Badging as a Motivator in an Undergraduate Course;Coding Process Visualizations for Improved Learning and Academic Integrity in CS1;OBDev: Wireless On Board Development Environment for Raspberry Pi Pico W;unravelling Dropout Intentions: Multifaceted Factors Influencing Student Retention in computerscience Education;to Hack or Not to H
Context & Motivation: It is crucial to ensure ethical compliance for critical systems. The Ethical Framework by Guizzardi et al. offers structured guidance on ethical challenges. Critical Systems Heuristics (CSH) ...
详细信息
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig...
详细信息
This paper focuses on covert communication in underlay cognitive radio networks (UCRNs) via energy harvesting (EH) and primary transmitter jamming, which can be applied to military communication and emergency communic...
详细信息
The rapid development of the technological sector and the need to automate a wide range of human-aiding activities defines the development and research of autonomous mobile platforms as an increasingly urgent problem....
详细信息
Transformer inrush current, a transient phenomenon characterized by high peaks and harmonic content that happens during energization, can have a big effect on how the power system works. It can result in core saturati...
详细信息
With the growing diffusion of quantum computing technology and the increasingly promising applications derived from it, the relevance of developing specific software for these systems is gaining significant momentum. ...
详细信息
ISBN:
(纸本)9783031708060;9783031708077
With the growing diffusion of quantum computing technology and the increasingly promising applications derived from it, the relevance of developing specific software for these systems is gaining significant momentum. This surge is due to the need to design and produce quantum software that meets performance and functional requirements but also follows the well-known good practices and rigorous methodologies inherent in quantum softwareengineering. In this context, one of the main challenges facing the development of hybrid (quantum-classical) systems is the effective management of the lifecycle of this new type of software, whose nature differs from traditional systems. The proposed research attempts to comprehensively address the lifecycle management of hybrid software, through the design and development of a specific support tool. To achieve this goal, the ICSM (Integrated software Cycle Management) model, which is a consolidated framework for the lifecycle management of traditional software, will be taken as a starting point. This model will be carefully adapted to meet the unique needs and challenges inherent in hybrid software, thus ensuring that the development, maintenance, and updating practices of this type of software are as robust and efficient as those applied in the realm of conventional software. Through this adaptation, the aim is not only to improve the quality of the developed hybrid software but also make developers easier to adopt the innovative and complex quantum software paradigm.
暂无评论