Page 45 of 313
Abstract: Over the years, gamification gained consensus among researchers and practitioners as a tool to motivate people to perform activities deemed as tedious or unexciting. Hence, there exist many and heterogeneous application domains that may benefit from gamification. However, the domain expert and the designer are often separate individuals with dissimilar backgrounds, skills, and understanding. Thus,...
Abstract: This article analyses attempts to regulate the access to arms in Central America from the beginning of the World War I to the end of the 1920s. During these years, the USA was not only the politically and economically dominant force in the region – they were also the main provider of weapons. In a region where societies were reshaped by the integration into a global economy, political groups depen...
Abstract: Who should have access to weapons and who should be prevented from possessing them? Denying certain social and political groups access to arms while enabling others to purchase them has been an instrument of creating a hierarchical world order since the nineteenth century and even before. However, the historians’ prevalent focus on disarmament and demilitarisation within Europe, concerning especia...
Abstract: Unit testing is a stage of testing where the smallest segment of code that can be tested in isolation from the rest of the system - often a class - is tested. Unit tests are typically written as executable code, often in a format provided by a unit testing framework such as pytest for Python. Creating unit tests is a time and effort-intensive process with many repetitive, manual elements. To illus...
Abstract: Peer-to-peer governance of blockchain technology reemerges a number of interesting practical and theoretical questions. This article aims to bridge current research on blockchain technology to earlier research on open source software (OSS) and to suggest a number of concepts from OSS research that are useful in discussing governance of blockchain systems. Thus, the purpose of this article is to pr...
Abstract: Approximately 30% of patients with aneurysmal subarachnoid hemorrhage (aSAH) develop delayed cerebral ischemia (DCI). DCI is associated with increased mortality and persistent neurological deficits. This study aimed to analyze heart rate variability (HRV) data from patients with aSAH using machine learning to evaluate whether specific patterns could be found in patients developing DCI....
Abstract: Continuous experimentation (CE) refers to a set of practices used by software companies to rapidly assess the usage, value, and performance of deployed software using data collected from customers and systems in the field using an experimental methodology. However, despite its increasing popularity in developing web‐facing applications, CE has not been studied in the development process of busines...
Abstract: Detecting and reacting to unauthorized actions is an essential task in security monitoring. What make this task challenging are the large number and various categories of hosts and processes to monitor. To these we should add the lack of an exact definition of normal behavior for each category. Host profiling using stream clustering algorithms is an effective means of analyzing hosts' behaviors, c...
Abstract: The 2nd Workshop on Gender Equality in Software Engineering was a continuation of the first workshop with a goal to increase awareness of gender-related challenges in Software Engineering community. Further the workshop's goals were to illuminate the problem in a variety of contexts, evaluate proposed solutions, discuss approaches to move towards gender equality, and to develop a community to supp...
Abstract: Abstract Augmented Reality (AR) technologies are used as human–machine interface within various types of safety-critical systems. Several studies have shown that AR improves human performance. However, the introduction of AR might introduce risks due to new types of dependability threats. In order to avoid unreasonable risk, it is required to detect new types of dependability threats (faults, erro...
Abstract: Abstract Automated Guided Vehicles (AGVs) are widely used for materials transportation. Operating them in a platooned manner has the potential to improve safety, security and efficiency, control overall traffic flow and reduce resource usage. However, the published studies on platooning focus mainly on the design of technical solutions in the context of automotive domain. In this paper we focus on...
Abstract: Modern collaborative and dynamic systems, such as System of Systems (SoS), can be considered as a set of interacting entities where the interactions are seen as the core activity for these systems. The study of interactions is of importance in order to discover emergent and interdependent properties that impact the overall system's behaviour. We introduce a role-based approach together with a taxo...
Abstract: Context In automotive, stage-gate processes have previously been the norm, with architecture created mainly during an early phase and then used to guide subsequent development phases. Current iterative and Agile development methods, where the implementation evolves continuously, changes the role of architecture. Objective We investigate how architecture evaluation can provide useful feedback durin...
Abstract: In this paper, we report on a case study in an industrial setting where code is generated from models, and, for various reasons, that generated code is then manually modified. To enhance the maintainability of both models and code, consistency between them is imperative. A first step towards establishing that consistency is to identify the manual changes that were made to the code after it was gen...
Page 45 of 313