A welcome message from the organization chairs of the fifth edition of the international Workshop on Affective computing for Requirements engineering (AffectRE'23), co-located with the 31'st IEEE international...
详细信息
ISBN:
(纸本)9798350326918
A welcome message from the organization chairs of the fifth edition of the international Workshop on Affective computing for Requirements engineering (AffectRE'23), co-located with the 31'st IEEE international Requirements engineeringconference (RE'23) in Hannover, Germany.
The proceedings contain 84 papers. The topics discussed include: on preventing symbolic execution attacks by low cost obfuscation;code clone tracer (CCT): a tracking tool for analyzing human and social factors in crea...
ISBN:
(纸本)9781728116518
The proceedings contain 84 papers. The topics discussed include: on preventing symbolic execution attacks by low cost obfuscation;code clone tracer (CCT): a tracking tool for analyzing human and social factors in creating and reusing code clones;connecting personal health records together with EHR using tangle;an multi-client web-based interactive HCI for interactive supercomputing;toward sustainable communities with a community currency a study in car sharing;extraction of useful features from neural network for facial expression recognition;and extracting related concepts from Wikipedia by using a graph database system.
Modern-day software development and use is a product of decades of advancement and evolution. Over time as new technologies and concepts emerged, so did new terminology to describe and discuss them. Most terminology u...
详细信息
ISBN:
(纸本)9798350322613
Modern-day software development and use is a product of decades of advancement and evolution. Over time as new technologies and concepts emerged, so did new terminology to describe and discuss them. Most terminology used in computing is harmless, however, some are rooted in historically discriminatory, and potentially harmful, terms. While the landscape of individuals who develop technology has diversified over the years, the terminology has become a normalized part of modern software development and computing jargon. Despite organizations such as the ACM raising awareness of the potential harm certain terms can do and companies like GitHub working to change the systemic use of harmful terms in computing, it is still not clear what the landscape of harmful terminology in computing really is and how we can support the widespread detection and correction of harmful terminology in computing artifacts. To this end, we conducted a review of existing work and efforts at curating, detecting, and removing harmful terminology in computing. Combining and building on these prior efforts, we produce an extensible database of what we define as harmful terminology in computing and describe an open source proof-of-concept tool for detecting and replacing harmful computingrelated terminology.
This paper presents a comprehensive study on optimizing resource allocation in cloud computing environments using an ensemble of machine learning techniques and optimization algorithms. We developed a multifaceted app...
详细信息
ISBN:
(纸本)9798350391961;9798350391954
This paper presents a comprehensive study on optimizing resource allocation in cloud computing environments using an ensemble of machine learning techniques and optimization algorithms. We developed a multifaceted approach, integrating Long Short-Term Memory (LSTM) networks for forecasting resource demands, Particle Swarm Optimization (PSO) for initial resource allocation, Q-learning for dynamic resource adjustment, and Linear Regression (LR) for predicting energy consumption. Our LSTM model demonstrated high accuracy in demand forecasting, with detailed performance metrics indicating its effectiveness in diverse scenarios. The PSO algorithm significantly enhanced the efficiency of resource distribution, evidenced by a reduction in the number of utilized units. Q-learning contributed to the system's adaptability, optimizing resource allocation based on changing demands in real-time. The LR model accurately predicted energy consumption, aligning closely with observed data and highlighting the potential for energy-efficient cloud management.
With the increase in software vulnerabilities that cause significant economic and social losses, automatic vulnerability detection has become essential in software development and maintenance. Recently, large language...
详细信息
At first glance, running mission-critical applications at the edge appears to be an opportunity to benefit from scalability and reusability. The low latency to the edge makes it particularly interesting for mission-cr...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
At first glance, running mission-critical applications at the edge appears to be an opportunity to benefit from scalability and reusability. The low latency to the edge makes it particularly interesting for mission-critical applications. The hardware heterogeneity of the edge, coupled with the strict requirement for the execution time of a mission-critical application, creates the need for flexible application control and, at the same time, increases the complexity of modeling such systems. With its Feature Models (FMs), software product line engineering offers a modeling option for various alternative compositions of an application. However, the calculation of valid configurations takes too long for the dynamic adaptation of an application flow of a mission-critical application. This paper presents an approach for slicing FMs to support mission-critical applications. Our approach supports the strict requirements on the execution time of mission-critical applications.
Exploring and comprehending a software system, e.g., as preparation for its re-engineering, is a relevant, yet challenging endeavour often conducted by teams of engineers. Collaborative exploration tools aim to ease t...
详细信息
ISBN:
(纸本)9798400705861
Exploring and comprehending a software system, e.g., as preparation for its re-engineering, is a relevant, yet challenging endeavour often conducted by teams of engineers. Collaborative exploration tools aim to ease the process, e.g., via interactive visualizations in virtual reality (VR). However, these neglect to provide engineers with capabilities for persisting their thoughts and findings. We present an interactive VR visualization method that enables (distributed) teams of engineers to collaboratively (1) explore a subject system, while (2) persisting insights via free-hand diagrams, audio recordings, and in-visualization VR screenshots. We invited pairs of softwareengineering practitioners to use our method to collaboratively explore a software system. We observed how they used our method and collected their feedback and impressions before replaying their findings to the original developers of the subject system for assessment.
WhisperLink is an innovative anonymous messaging service that aims to enhance privacy in digital communication. Hosted on the secure and robust infrastructure of the Google Cloud Platform, WhisperLink enables users to...
详细信息
ISBN:
(纸本)9798350391961;9798350391954
WhisperLink is an innovative anonymous messaging service that aims to enhance privacy in digital communication. Hosted on the secure and robust infrastructure of the Google Cloud Platform, WhisperLink enables users to create secure, temporary chat rooms that self-destruct after 24 hours. By not requiring logins, WhisperLink ensures confidentiality, enabling users to communicate without worrying about the risks associated with the exposure of personal data. WhisperLink places a strong emphasis on confidentiality and anonymity by employing end-to-end encryption, which ensures that messages can only be read by the intended recipients. It also has additional authentication features such as security questions, allowing only authorized users to access chat rooms. The platform deletes messages after 24 hours and does not store any residual data, therefore keeping conversations private and transient. The platform can be used innovatively in various user scenarios, making it ideal for social, professional, and private interactions. WhisperLink provides a flexible and secure platform for immediate, private communication, offering a user-friendly and efficient messaging experience. With these features, WhisperLink stands out as a leading solution in secure, anonymous digital communication.
The increase of traffic in Internet-of multimedia Things networks leads to additional load on servers;therefore, this paper focuses on server load balancing in multimedia Internet-of-Things networks. software-defined ...
详细信息
Despite recent initiatives aimed at improving accessibility, the field of digital accessibility remains markedly behind contemporary advancements in the software industry, as many real-world software and web applicati...
详细信息
ISBN:
(纸本)9798400704987
Despite recent initiatives aimed at improving accessibility, the field of digital accessibility remains markedly behind contemporary advancements in the software industry, as many real-world software and web applications continue to fall short of accessibility requirements. A persisting skills deficit within the existing technology workforce has been an enduring impediment, hindering organizations from delivering truly accessible software products. This, in turn, elevates the risk of isolating and excluding a substantial portion of potential users. In this paper, we report lessons learned from a training program for teaching digital accessibility using the Communities of Practice (CoP) framework to industry professionals. We recruited 66 participants from a large multinational software company and assigned them to two groups: one participating in a CoP and the other using self-paced learning. We report experiences from designing the training program, conducting the actual training, and assessing the efficiency of the two approaches. Based on these findings, we provide recommendations for practitioners in Learning and Development teams and educators in designing accessibility courses for industry professionals.
暂无评论