Department of Software Engineering - Administrative Units - MOST Wiedzy

Search

Department of Software Engineering

Filters

total: 398

  • Category
  • Year
  • Options

Catalog Publications

2020
2019
  • A New Rehabilitation Device for Balance Impaired Individuals
    Publication

    - 2019

    In the paper authors present a device designed to improve the rehabilitation process of people with balance impairment. The discussed device (JStep) utilizes a commercially available static standing frame (stander) modified in order to fit force sensing units under the feet and in the pillows around the hips of a patient. While executing rehabilitation tasks, the patient may compensate his balance deficiency by leaning on the pillows...

    Full text in external service

  • Antecedents to Achieve Kanban Optimum Benefits in Software Companies
    Publication
    • M. Ahmad
    • A. Rohunen
    • P. Raulamo-Jurvanen

    - 2019

    In 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...

    Full text in external service

  • Artificial intelligence for software development — the present and the challenges for the future

    Since the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...

    Full text available

  • Communication and Documentation Practices in Agile Requirements Engineering: A Survey in Polish Software Industry

    Requirements engineering, system analysis and other analytical activities form the basis of every IT project. Such activities are not clearly defined in Agile development methods, but it does not mean that they are absent in an agile project. The aim of our work was to determine which practices related to requirements-related communication and which requirements documenting techniques are used in agile software projects. For this...

    Full text in external service

  • Developing Novel Solutions to Realise the European Energy - Information Sharing \& Analysis Centre
    Publication

    For more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...

    Full text in external service

  • Enriching the Context: Methods of Improving the Non-contextual Assessment of Sentence Credibility
    Publication

    - 2019

    This paper presents several methods of automatic context enrichment of sentences that need to be evaluated, tagged or fact-checked by human judges. We have created a corpus of medical Web articles. Sentences from this corpus have been fact-checked by medical experts in two modes: contextually (reading the entire article and evaluating sentence by sentence) and without context (evaluating sentences from all articles in random order)....

    Full text in external service

  • Enterprise and Organizational Modeling and Simulation
    Publication
    • R. Pergl
    • E. Babkin
    • R. Lock
    • P. Malyzhenkov
    • V. Merunka
    • A. Bobkowska

    - 2019

    This book constitutes the refereed proceedings of the 15th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2019, held in Rome, Italy, in June 2019. The main focus of EOMAS is on the role, importance, and application of modeling and simulation within the extended organizational and enterprise context. The 12 full papers presented in this volume were carefully reviewed and selected from 25...

    Full text in external service

  • Evaluating Performance and Accuracy Improvements for Attention-OCR

    In this paper we evaluated a set of potential improvements to the successful Attention-OCR architecture, designed to predict multiline text from unconstrained scenes in real-world images. We investigated the impact of several optimizations on model’s accuracy, including employing dynamic RNNs (Recurrent Neural Networks), scheduled sampling, BiLSTM (Bidirectional Long Short-Term Memory) and a modified attention model. BiLSTM was...

    Full text in external service

  • Evaluation of Selected UX Techniques by Product Managers - A Preliminary Survey
    Publication

    - 2019

    In this paper we present the results of an opinion survey among 28 IT product managers who evaluated the subjective usefulness of 24 selected UX techniques to 6 IT product management tasks derived from ProdBOK®. We selected the UX techniques based on the literature review and 6 interviews with experienced IT product managers. Based on the survey results, we propose our recommendation of useful techniques for 5 of the 6 studied...

    Full text in external service

  • Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle

    Creativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...

    Full text in external service

  • Method of selecting programming practices for the safety-critical software development projects
    Publication

    In recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...

    Full text available

  • On the Agile Mindset of an Effective Team – An Industrial Opinion Survey

    In this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within...

    Full text in external service

  • Perceptions of Gender Diversity's Impact on Mood in Software Development Teams
    Publication

    - IEEE SOFTWARE - 2019

    Gender inequality persists in IT teams. We examine how gender differentiation affects the workplace atmosphere and analyze the results of our study of the issue. We discuss the problem of gender discrimination and consider methods to reduce inequality

    Full text in external service

  • Playing the Sprint Retrospective

    In agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...

    Full text in external service

  • Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)

    This study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...

    Full text in external service

  • Residual MobileNets

    As modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...

    Full text in external service

  • Resilience of Cyber-Physical Systems, From Risk Modelling to Threat Counteraction
    Publication

    Cyber-physical systems (CPS) study the close interaction and the deep integrationbetween cyber information systems and dynamic physical systems. Those physicalsystems could be energy systems, automotive systems, human activities, surround-ing environment, etc. The key is to identify the deep underlying links betweenthe information system and the target physical system. In particular, CPS securitystudies the security...

    Full text in external service

  • Scoreboard Architectural Pattern and Integration of Emotion Recognition Results
    Publication

    This paper proposes a new design pattern, named Scoreboard , dedicated for applications solving complex, multi-stage, non-deterministic problems. The pattern provides a computational framework for the design and implementation of systems that integrate a large number of diverse specialized modules that may vary in accuracy, solution level, and modality. The Scoreboard is an extension of Blackboard design pattern and comes under...

    Full text available

  • Security-oriented agile approach with AgileSafe and OWASP ASVS
    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Software development methodologies and practices in start-ups
    Publication

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Full text in external service

  • Software Factory project for enhancement of student experiential learning
    Publication

    - 2019

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
    Publication

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Full text in external service

  • Things You Might Not Know about the k-Nearest Neighbors Algorithm

    Recommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...

    Full text in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text in external service

  • Uncertainty in emotion recognition

    Purpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...

    Full text in external service

  • Using Evidence-based Argumnts to Support Dependability Assurance-Experiences and Challenges
    Publication

    The article introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them

2018