The proceedings contain 165 papers. The topics discussed include: design of temperature monitoring system for space environment simulation and research infrastructure based on EPICS;multi-sensor fusion localization an...
ISBN:
(纸本)9781665484749
The proceedings contain 165 papers. The topics discussed include: design of temperature monitoring system for space environment simulation and research infrastructure based on EPICS;multi-sensor fusion localization and mapping of indoor mobile robot;fusion localization based on accuracy estimation;research on sway detection method of subway train based on MEMS gyroscope technology;principle and application of tunnel magnetoresistance current sensor against direct-current influence;research on design of railway supervision and obstacle removal special vehicle based on function analysis method;design and realization of conductor for spacecraft based on single-chip microcomputer;poles estimation based on backward shift method;parallel convolutional neural network based on multi-band brain networks for EEG classification;mechanical properties of interconnection interfaces in micro tin-silver-copper solder joints;and abnormal electricity detection method based on multi-dimensional unsupervised learning.
The proceedings contain 19 papers. The special focus in this conference is on Requirements engineering: Foundation for software Quality. The topics include: Vision Video Making with Novices: A Research Preview;a ...
ISBN:
(纸本)9783030984632
The proceedings contain 19 papers. The special focus in this conference is on Requirements engineering: Foundation for software Quality. The topics include: Vision Video Making with Novices: A Research Preview;a Study on the Mental Models of Users Concerning Existing software;requirements engineering for software-Enabled Art: Challenges and Guidelines;Setting AI in Context: A Case Study on Defining the Context and Operational Design Domain for Automated Driving;on Testing Security Requirements in Industry – A Survey Study;a Business Model Construction Kit for Platform Business Models - Research Preview;requirements engineering in the Market Dialogue Phase of Public Procurement: A Case Study of an Innovation Partnership for Medical technology;from User Stories to Data Flow Diagrams for Privacy Awareness: A Research Preview;guided Derivation of Conceptual Models from User Stories: A Controlled Experiment;invest in Splitting: User Story Splitting Within the software Industry;Transparency and Explainability of AI Systems: Ethical Guidelines in Practice;preface;FRETting About Requirements: Formalised Requirements for an Aircraft Engine Controller;req2Spec: Transforming software Requirements into Formal Specifications Using Natural Language Processing;Towards Explainable Formal Methods: From LTL to Natural Language with Neural Machine Translation;abbreviation-Expansion Pair Detection for Glossary Term Extraction;a Zero-Shot Learning Approach to Classifying Requirements: A Preliminary Study.
Today's software industry is global, virtual, and depending more than ever on strong and reliable processes. Stakeholders and infrastructure are distributed across the globe, posing challenges that go beyond those...
详细信息
The proceedings contain 31 papers. The topics discussed include: to get good student ratings should you only teach programming courses? investigation and implications of student evaluations of teaching in a software e...
ISBN:
(纸本)9780738133201
The proceedings contain 31 papers. The topics discussed include: to get good student ratings should you only teach programming courses? investigation and implications of student evaluations of teaching in a softwareengineering context;mutation testing and self/peer assessment: analyzing their effect on students in a software testing course;improving concept learning through specialized digital fanzines;Bluejay: a cross-tooling audit framework for agile software teams;supporting real demands in softwareengineering with a four steps project-based learning approach;effectiveness of peer review in teaching and learning user centered conceptual design among large cohorts of information technology students;and exponential competence of computer science and softwareengineering undergraduate students.
The proceedings contain 24 papers. The special focus in this conference is on CIFMA, CoSim-CPS, OpenCERT, and ASYDE. The topics include: Under What Conditions Does a Digital Shadow Track a Periodic Linear Ph...
ISBN:
(纸本)9783031124280
The proceedings contain 24 papers. The special focus in this conference is on CIFMA, CoSim-CPS, OpenCERT, and ASYDE. The topics include: Under What Conditions Does a Digital Shadow Track a Periodic Linear Physical System?;convergence Properties of Hierarchical Co-simulation Approaches;co-simulation-Based Pre-training of a Ship Trajectory Predictor;effect of Ship Propulsion Retrofit on Maneuverability Research Based on Co-simulation;co-simulation of a Model Predictive Control System for Automotive Applications;Running Large-Scale and Hybrid Real-Time Aircraft Simulations in an HLA Framework;Comparison Between the HUBCAP and DIGITBrain Platforms for Model-Based Design and Evaluation of Digital Twins;a Life-Long Learning Education Passport Powered by Blockchain technology and Verifiable Digital Credentials: The BlockAdemiC Project;open Source Discovery, Adoption, and Use: An Informal Perspective;regret from Cognition to Code;DrPython–WEB: A Tool to Help Teaching Well-Written Python Programs;formal Methods Communities of Practice: A Survey of Personal Experience;learning from Mistakes in an Open Source software Course;a Probabilistic Model Checking Approach to Self-adapting Machine Learning Systems;Integration of COTS Processing Architectures in Small Satellites for Onboard Computing Using Fault Injection Testing Methodology;In Silico Simulations and Analysis of Human Phonological Working Memory Maintenance and Learning Mechanisms with Behavior and Reasoning Description Language (BRDL);fostering Safe Behaviors via Metaphor-Based Nudging Technologies;developing the Semantic Web via the Resolution of Meaning Ambiguities;original or Fake? How to Understand the Digital Artworks’ Value in the Blockchain;grounding Psychological Shape Space in Convolutional Neural Networks;unexpectedness and Bayes’ Rule;can Reinforcement Learning Learn Itself? A Reply to ‘Reward is Enough’.
The proceedings contain 278 papers. The topics discussed include: system online upgrade scheme based on FPGA reconfiguration;the algorithm design under dead time limit in multi-pixel photon counter;talking about the k...
ISBN:
(纸本)9781665415965
The proceedings contain 278 papers. The topics discussed include: system online upgrade scheme based on FPGA reconfiguration;the algorithm design under dead time limit in multi-pixel photon counter;talking about the key technology and development direction of underwater manipulator;a semantic segmentation method based on improved u-net network;a study of passive intermodulation of analog modulated signals in coaxial connectors;traffic flow prediction based on improved SVR for VANET;analysis of distribution characteristics of underwater optical soliton received beam;improved locality affine-invariant feature matching;application research of data mining technology in customer relationship management;and research on UWB positioning trajectory prediction based on LSTM.
The proceedings contain 77 papers. The topics discussed include: what makes online reviews useful? evidence from ***;impact of electronic word-of-mouth on box office revenue: an empirical study based on web crawler te...
ISBN:
(纸本)9781665425650
The proceedings contain 77 papers. The topics discussed include: what makes online reviews useful? evidence from ***;impact of electronic word-of-mouth on box office revenue: an empirical study based on web crawler technology;research on man-machine safety of officer of the watch fatigue based on fuzzy mathematics and safety ergonomics;research on key factors of digital transformation behavior of discrete manufacturing enterprises based on NVIVO analysis;newton iteration method for nonlinear equations with parameters and arbitrary original value;study on image recognition based on computer visual angle point detection;and design and implementation of internet ticketing system based on distributed data processing platform.
The proceedings contain 60 papers. The topics discussed include: construction of perceptual security dataset for video selective encryption based on double-blind subjective experiment;a bearing fault diagnosis method ...
ISBN:
(纸本)9780738131504
The proceedings contain 60 papers. The topics discussed include: construction of perceptual security dataset for video selective encryption based on double-blind subjective experiment;a bearing fault diagnosis method based on L1 regularization transfer learning and LSTM deep learning;evaluation of image fusion methods applied to the ZY1-04 data of Chengdu area;signal demodulation algorithm for interference spectrum of Fabry-Perot Cavity with stainless steel diaphragm;fuzzy adaptive PI clock synchronization algorithm based on kalman filter;a compact and reliable software architecture for robotics control;research and development of attendance management system based on face recognition and RFID technology;multi-sensor network-based trajectory planning for an Internet of UAVs;and temporal model for transportation management.
The proceedings contain 17 papers. The topics discussed include: automatic security inspection framework for trustworthy supply chain;plugins to detect vulnerable plugins: an empirical assessment of the security scann...
ISBN:
(纸本)9781728176772
The proceedings contain 17 papers. The topics discussed include: automatic security inspection framework for trustworthy supply chain;plugins to detect vulnerable plugins: an empirical assessment of the security scanner plugins for WordPress;significance of emphasized features for good representation on deep metric learning;application of partial differential equation method in fingerprint image enhancement;integration challenges for a web-based personalized query suggestions system in information retrieval;improvement of legitimate mail server detection method using sender authentication;generating functional requirements based on classification of mobile application user reviews;and classification of database technology problems on stack overflow.
The proceedings contain 28 papers. The topics discussed include: precise command injection analysis in android applications;improving testing process to maximize validation efficiency on advanced telecommunications la...
ISBN:
(纸本)9781450389709
The proceedings contain 28 papers. The topics discussed include: precise command injection analysis in android applications;improving testing process to maximize validation efficiency on advanced telecommunications laboratory: an experience report;bus signal priority system based on GNSS electronic fence technology;a post-processing module scheme of finite element software;architecture transformation research on joint border defense systems-of-systems;understanding the blockchain ecosystem with analysis of decentralized applications: an empirical study;the design of multimedia multicast system in campus network based on three-tier architecture;a comparative study on the input validity of regional universities educational funds based on DEA and Malmquist indexes;and a study on the relationship between perceived value and behavioral intention of Wechat official account: library of Sichuan University as an example.
暂无评论