Page 18 of 313
Abstract: Designing MMLA systems is a complex task requiring a wide range of considerations. In this paper, we identify key considerations that are essential for designing MMLA systems. These considerations include data management, human factors, sensors and modalities, learning scenarios, privacy and ethics, interpretation and feedback, and data collection. The implications of these considerations are twof...
Abstract: There is a growing number of network attacks and the data on the network is more exposed than ever with the increased activity on the Internet. Applying Machine Learning (ML) techniques for cyber-security is a popular and effective approach to address this problem. However, the data which is used by ML algorithms have to be protected. In this paper, we present a framework that combines autoencoder...
Abstract: Natural Language Processing (NLP) for Requirements Engineering (RE) (NLP4RE) seeks to apply NLP tools, techniques, and resources to the RE process to increase the quality of the requirements. There is little research involving the utilization of Generative AI-based NLP tools and techniques for requirements elicitation. In recent times, Large Language Models (LLM) like ChatGPT have gained significa...
Abstract: Mobile apps form a major proportion of the software marketplace and it is crucial to ensure that they meet both functional and nonfunctional quality thresholds. Automated test input generation can reduce the cost of the testing process. However, existing Android test generation approaches are focused on code coverage and cannot be customized to a tester's diverse goals---in particular, quality att...
Abstract: Hazard analysis for a single system focuses on identifying and evaluating potential hazards associated with the individual system, its components, and their interactions. There are well-established hazard analysis techniques that are widely used to identify hazards for single systems. However, unlike single systems, hazard analysis in a System of Systems (SoS) must focus on analyzing the potential...
Abstract: In this paper, we investigate the problem of modeling time-series as a process generated through (i) switching between several independent sub-models; (ii) where each sub-model has heteroskedastic noise, and (iii) a polynomial bias, describing nonlinear dependency on system input. First, we propose a generic nonlinear and heteroskedastic statistical model for the process. Then, we design Maximum L...
Abstract: This report describes how software professionals at the Norwegian public transport organization Entur use open source processes and tools to leverage digital transformation. Moving software acquisition from procurement to open source and in-house development can deliver value but also entails challenges....
Abstract: Software products are increasingly used in critical infrastructures, and verifying the security of these products has become a necessary part of every software development project. Effective and practical methods and processes are needed by software vendors and infrastructure operators to meet the existing extensive demand for security. This article describes a lightweight security risk assessment...
Abstract: In this note, we report on a half-day tutorial designed to introduce software architecture practitioners and researchers to the concepts and open-source implementations of blended modeling for software architectures. The tutorial covered blended modeling motivation and principles, generation of editors, generation of the synchronization infrastructure, and collaborative modeling techniques. Throug...
Abstract: Tiny machine learning (TinyML) represents an emerging research direction that aims to realize machine learning on Internet of Things (IoT) devices. The current TinyML research seems to focus on supporting the deployment of deep learning models on microprocessors, while the models themselves are trained on high performance computers or clouds. However, in the resource/time constrained IoT contexts,...
Abstract: The importance of the team, its internal dynamics, and its performance are widely recognized within the software engineering community. While popular frameworks identify wholeness, stability over time, and smallness as important factors, they offer little guidance on how to form teams that achieve these three characteristics. The objective of this study is to investigate how these team characteris...
Abstract: Practitioners report improved productivity as one of the main benefits of using autonomous dump trucks in underground mining. However, manned vehicles are still needed to transport materials and personnel in the tunnels, which requires practices that may diminish autonomy benefits. Thus, both fleets shall be efficiently mixed to maximize the autonomy potential. In addition, sufficient safety shall...
Page 18 of 313