As modern software scales up and becomes increasingly complex, using log files to detect anomalies and ensure software reliability has become a research ***, the accuracy of existing log anomaly detection algorithms m...
详细信息
The proceedings contain 33 papers. The special focus in this conference is on Internet Computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Da...
ISBN:
(纸本)9783031859229
The proceedings contain 33 papers. The special focus in this conference is on Internet Computing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Data for Comfort and Energy Conservation in Optimizing HVAC Systems;improving Critical Controls Using IoT and computer Vision;A Data-Driven Driving Under the Influence (DUI) Detection, Notification and Prevention System Using Artificial Intelligence and Internet-Of-Things (IoT);understanding User Interactions with IoT Process Models: A Demographic Perspective;Advancing IoT Process Modeling: A Comparative Evaluation of BPMNE4IoT and Traditional BPMN on User-Friendliness, Effectiveness, and Workload;Threat Detection Using MLP for IoT Network;harnessing Social Robotics and the Internet of Things to Reduce the Risk of Older Adults Developing Hypothermia and Dehydration;re/Imagining Smart Home Automation Framework in the Era of 6G-Enabled Smart Cities;smart Roadway Monitoring: Pothole Detection and Mapping via Google Street View;Energy-Efficiency Modeling for AI Applications on Edge Computing;optimizing Wireless Sensor Network Node Placement Using Bacterial Foraging Optimization;The Vital Role of Small and Marginal Farmer in Future of Our Climate: Democratization of Machine Learning, Artificial Intelligence, and Dairy Cow Necklace Sensors in Achieving the UN Climate Change Goals (COP21) and the Paris Agreement;autonomous Driving Prototype with Raspberry Pi by Using Image Processing Technology;towards Implementation of Privacy-Preserving Federated Learning Aggregation Using Multi-key Homomorphic Encryption;advancing Nursing Education Through Virtual Reality Training: A Revolutionary Approach to Ensuring Patient Safety;multiDrone Simulator An Open Source Multi-plataform Tool to Use in Tests of Optimized Flight of Group of Drones;Revolutionizing Multiplayer Gaming: A Deep Dive into VisionXO, a 3D Multiplayer Tic-Tac-Toe Game.
Modelling complex information systems often entails the need for dealing with scenarios of inconsistency in which several requirements either reinforce or contradict each other. This lecture summarises recent joi...
详细信息
Background: Implementing security standards is important to ensure proper functioning and avoid malicious attacks. Neglecting security can lead to Security Debt (SD), which can be disruptive. However, the industry doe...
详细信息
ISBN:
(纸本)9783031783852;9783031783869
Background: Implementing security standards is important to ensure proper functioning and avoid malicious attacks. Neglecting security can lead to Security Debt (SD), which can be disruptive. However, the industry does not have a generally accepted definition of SD thus far. Aims: This exploratory case study aims to provide a definition of SD, to find the relation between SD and Technical Debt (TD), to find the difference between SD and security vulnerabilities, and to identify SD accumulation patterns. Method: We interviewed 26 software practitioners from an international conglomerate of several software companies. Results: We propose a multifaceted SD definition. SD is a subset of TD, and security vulnerabilities have, to a varying degree, been shown to be part of SD. Conclusion: Our results can provide a clearer view of how practitioners perceive SD, facilitating its management.
With the continuous progress of drone technology, the safety issues of unmanned aerial vehicle (UAV) avionics systems are increasingly becoming a focus. As a nonlinear coupled system, the avionics system has a high de...
详细信息
Successful product development is mostly dependent on how well contributions from stakeholders are taken into account. There are signs that the way stakeholders are involved in a project is directly linked to how well...
详细信息
This research study analyzes six key factors in the education and teaching of IoT embedded direction: training objectives (which direction to teach), curriculum system (what to teach), teaching organization (how to te...
详细信息
A collective adaptive system is made up of cooperating entities that can adjust in real time to evolving, open environments and shifting requirements. To ensure such a system meets its intended goals, rigorous enginee...
详细信息
ISBN:
(纸本)9783031751066;9783031751073
A collective adaptive system is made up of cooperating entities that can adjust in real time to evolving, open environments and shifting requirements. To ensure such a system meets its intended goals, rigorous engineering must employ suitable methods and tools. This introduction offers a short overview of the 5(th) edition of the track "Rigorous engineering of Collective Adaptive Systems" and briefly presents the 20 scientific contributions, organised into seven thematic sections. Large Ensembles and Collective Dynamics, Knowledge, Consciousness and Emergence, Automated Reasoning for Better Interaction, Modelling and engineering Collective Adaptive Systems, Analysing Collective Adaptive Systems.
Requirements elicitation is a crucial activity in the software product lifecycle, ensuring a clear understanding of the user needs and project goals. This process guides the design, development, and validation phases,...
详细信息
ISBN:
(纸本)9783031783852;9783031783869
Requirements elicitation is a crucial activity in the software product lifecycle, ensuring a clear understanding of the user needs and project goals. This process guides the design, development, and validation phases, resulting in a successful and functional product. However, eliciting requirements often encounters the challenge of finding experts to gather, analyze, and validate the requirements. To address those challenges, this study aims to investigate the potential of Conversational AI, specifically utilizing OpenAI's custom GPT, to elicit requirements through stakeholder interviews. Employing an iterative design science approach, ReqGenie was implemented to gather and summarize requirements from text-based interviews. A preliminary performance evaluation of ReqGenie, conducted by comparing its outputs with two existing software Requirements Specification (SRS) documents, demonstrates promising results. The findings suggest that ReqGenie is particularly supportive for small-scale requirements elicitation tasks, including the software customization in product lines.
[Context & Motivation] Explainable autonomous systems are increasingly essential for engendering trust, especially when they are deployed in safety-critical scenarios. [Question/Problem] Despite the robust reliabi...
详细信息
暂无评论