Department of Software Engineering - Administrative Units - Bridge of Knowledge

Search

Department of Software Engineering

Filters

total: 480

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

  • Usability of mobile applications: a systematic literature study
    Publication

    - IEEE Access - Year 2020

    Since the release of the first mobile devices, the usability of on-board applications has been the concern not only of software vendors but hardware manufacturers as well. The academia community later willingly joined the discussion on usability in terms of theory and empirical measurement, having experience and knowledge in desktop settings. At first sight, such a background should guarantee a solid foundation to conduct research...

    Full text available to download

  • Emotion Recognition and Its Applications

    The paper proposes a set of research scenarios to be applied in four domains: software engineering, website customization, education and gaming. The goal of applying the scenarios is to assess the possibility of using emotion recognition methods in these areas. It also points out the problems of defining sets of emotions to be recognized in different applications, representing the defined emotional states, gathering the data and...

    Full text to download in external service

  • Monolithic vs. Microservice Architecture: A Performance and Scalability Evaluation
    Publication

    - IEEE Access - Year 2022

    Context. Since its proclamation in 2012, microservices-based architecture has gained widespread popularity due to its advantages, such as improved availability, fault tolerance, and horizontal scalability, as well as greater software development agility. Motivation. Yet, refactoring a monolith to microservices by smaller businesses and expecting that the migration will bring benefits similar to those reported by top global companies,...

    Full text available to download

  • Emotion recognition and its application in software engineering

    In this paper a novel application of multimodal emotion recognition algorithms in software engineering is described. Several application scenarios are proposed concerning program usability testing and software process improvement. Also a set of emotional states relevant in that application area is identified. The multimodal emotion recognition method that integrates video and depth channels, physiological signals and input devices...

    Full text to download in external service

  • Artificial Intelligence Technologies in Education: Benefits, Challenges and Strategies of Implementation
    Publication

    - Year 2021

    Since the education sector is associated with highly dynamic business environments which are controlled and maintained by information systems, recent technological advancements and the increasing pace of adopting artificial intelligence (AI) technologies constitute a need to identify and analyze the issues regarding their implementation in education sector. However, a study of the contemporary literature reveled that relatively...

    Full text available to download

  • Trust Case: justifying trust in an IT solution
    Publication

    - Year 2005

    W artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...

  • Instructor Presence in Video Lectures: Preliminary Findings From an Online Experiment
    Publication

    - IEEE Access - Year 2021

    Motivation. Despite the widespread use of video lectures in online and blended learning environments, there is still debate whether the presence of an instructor in the video helps or hinders learning. According to social agency theory, seeing the instructor makes learners believe that s/he is personally teaching them, which leads to deeper cognitive processing and, in turn, better learning outcomes. Conversely, according to cognitive...

    Full text available to download

  • Improving agility and discipline of software development with the Scrum and CMMI
    Publication

    This study presents a method of combining the Scrum methodology with the CMMI maturity model to improve bothagility and discipline of software development. First, the authors propose the CMMI-Scrum reference model, which maps Scrumpractices onto 123 practices of CMMI staged levels 2 and 3. For 60% of CMMI practices, which are insufficiently covered byScrum they add new practices that improve discipline while maintaining agility....

    Full text available to download

  • Perceptions of Gender Diversity's Impact on Mood in Software Development Teams
    Publication

    - IEEE SOFTWARE - Year 2019

    Gender inequality persists in IT teams. We examine how gender differentiation affects the workplace atmosphere and analyze the results of our study of the issue. We discuss the problem of gender discrimination and consider methods to reduce inequality

    Full text available to download

  • Emotion Monitoring – Verification of Physiological Characteristics Measurement Procedures

    This paper concerns measurement procedures on an emotion monitoring stand designed for tracking human emotions in the Human-Computer Interaction with physiological characteristics. The paper addresses the key problem of physiological measurements being disturbed by a motion typical for human-computer interaction such as keyboard typing or mouse movements. An original experiment...

    Full text available to download

  • Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review
    Publication
    • K. D. Bartl-Pokorny
    • P. Uluer
    • D. E. Barkana
    • A. Baird
    • H. Kose
    • T. Zorcec
    • B. Robins
    • B. Schuller
    • A. Landowska
    • M. Pykała

    - IEEE Access - Year 2021

    Children with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...

    Full text available to download

  • A Qualitative Study on Non-functional Requirements in Agile Software Development
    Publication

    Widespread use of agile software development (ASD) methods can be observed nowadays. Non-functional requirements (NFRs) are often reported to be a problematic issue for agile projects, since ASD methods tend to neglect NFRs while focusing on incremental delivery of functional features. Despite that, only very few studies have explored the requirements engineering practices used in ASD and dedicated particularly to NFRs. Objective:...

    Full text available to download

  • Mobile Security: Threats and Best Practices
    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Making agile retrospectives more awesome
    Publication

    According to the textbook [23], Scrum exists only in its entirety, where every component is essential to Scrum’s success. However, in many organizational environments some of the components are omitted or modified in a way that is not aligned with the Scrum guidelines. Usually, such deviations result in missing the full benefits of Scrum [24]. Thereby, a Scrum process should be frequently inspected and any deviations should be...

    Full text available to download

  • Comparison of selected off-the-shelf solutions for emotion recognition based on facial expressions

    The paper concerns accuracy of emotion recognition from facial expressions. As there are a couple of ready off-the-shelf solutions available in the market today, this study aims at practical evaluation of selected solutions in order to provide some insight into what potential buyers might expect. Two solutions were compared: FaceReader by Noldus and Xpress Engine by QuantumLab. The performed evaluation revealed that the recognition...

    Full text to download in external service

  • Automatic recognition of therapy progress among children with autism
    Publication

    - Scientific Reports - Year 2017

    The article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...

    Full text available to download

  • Game-based Sprint retrospectives: multiple action research

    In today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...

    Full text available to download

  • On the Agile Mindset of an Effective Team – An Industrial Opinion Survey

    In this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within...

    Full text available to download

  • Adopting Collaborative Games into Agile Requirements Engineering
    Publication

    In agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....

    Full text available to download

  • An empirical study on the impact of AspectJ on software evolvability
    Publication

    Since its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...

    Full text available to download

  • Towards New Mappings between Emotion Representation Models
    Publication

    There are several models for representing emotions in affect-aware applications, and available emotion recognition solutions provide results using diverse emotion models. As multimodal fusion is beneficial in terms of both accuracy and reliability of emotion recognition, one of the challenges is mapping between the models of affect representation. This paper addresses this issue by: proposing a procedure to elaborate new mappings,...

    Full text available to download

  • Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers
    Publication

    Recent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...

    Full text available to download

  • A Systematic Literature Review on Implementing Non-functional Requirements in Agile Software Development: Issues and Facilitating Practices

    Agile Software Development methods have become a widespread approach used by the software industry. Non-functional requirements (NFRs) are often reported to be a problematic issue for such methods. We aimed to identify (within the context of Agile projects): (1) the issues (challenges and problems) reported as affecting the implementation of NFRs; and (2) practices that facilitate the successful implementation of NFRs. We conducted...

    Full text available to download

  • Limitations of Emotion Recognition in Software User Experience Evaluation Context

    This paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...

    Full text available to download

  • Dynamic risk assessment in autonomous vehicles motion planning
    Publication

    - Year 2008

    Arguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...

    Full text to download in external service

  • Developing Game-Structure Sensitive Matchmaking System for Massive-Multiplayer Online Games
    Publication

    - Year 2015

    Providing a fair matchmaking system is an essential issue, while developing every online video game. In the article, we show that the currently existing matchmaking system in League of Legends, one of the most popular online video games currently existing, is built on a base of conditions which do not hold true in the presence of empirical data. This, in short, decreases the effectiveness of the ranking system, and negatively affects...

    Full text to download in external service

  • Utilizing online collaborative games to facilitate Agile Software Development

    Effective collaboration and interaction among the development team and between the team and the customer as well as proactive attitude in initiating and implementing improvements play vital roles in the success of agile projects. The challenge is how to address these social aspects since neither the Agile Manifesto nor the Scrum Guide specify techniques that aid the human side of software development. To fill this gap, we developed...

    Full text available to download

  • Developing Novel Solutions to Realise the European Energy - Information Sharing & Analysis Centre
    Publication

    For more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...

    Full text available to download

  • Limitations of Emotion Recognition from Facial Expressions in e-Learning Context
    Publication

    The paper concerns technology of automatic emotion recognition applied in e-learning environment. During a study of e-learning process the authors applied facial expressions observation via multiple video cameras. Preliminary analysis of the facial expressions using automatic emotion recognition tools revealed several unexpected results, including unavailability of recognition due to face coverage and significant inconsistency...

    Full text to download in external service

  • Supporting Compliance with Security Standards by Trust Case Templates
    Publication

    - Year 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Full text available to download

  • Adopting collaborative games into Open Kanban
    Publication

    - Year 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Full text to download in external service

  • Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
    Publication

    A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...

    Full text available to download

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • On the Usefulness of the Generalised Additive Model for Mean Path Loss Estimation in Body Area Networks

    In this article, the usefulness of the Generalised Additive Model for mean path loss estimation in Body Area Networks is investigated. The research concerns a narrow-band indoor off-body network operating at 2.45 GHz, being based on measurements performed with four different users. The mean path loss is modelled as a sum of four components that depend on path length, antenna orientation angle, absolute difference between transmitting...

    Full text available to download

  • Uncertainty in emotion recognition

    Purpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...

    Full text to download in external service

  • Scaled agile framework. Dealing with software process‐related challenges of a financial group with the action research approach
    Publication

    - Journal of Software-Evolution and Process - Year 2022

    This article reports on a domain-specific software development venture at Nordea. We explore organizational constraints, challenges, and corrective actions undertaken when scaling the agile development approach of their Core Banking Platform program. The fit and required customizations of the rather complex and rigid SAFe framework in a policy-heavy financial institution are audited against the organic growth of the program. In...

    Full text available to download

  • ARIMA vs LSTM on NASDAQ stock exchange data
    Publication

    - Procedia Computer Science - Year 2022

    This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...

    Full text available to download

  • Operating system security by integrity checking and recovery using write-protected storage

    The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...

    Full text available to download

  • An Approach to Trust Case Development
    Publication

    - Year 2003

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Full text available to download

  • Methodology of Affective Intervention Design for Intelligent Systems

    This paper concerns how intelligent systems should be designed to make adequate, valuable and natural affective interventions. The article proposes a process for choosing an affective intervention model for an intelligent system. The process consists of 10 activities that allow for step-by-step design of an affective feedback loop and takes into account the following factors: expected and desired emotional states, characteristics...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • Affective reactions to playing digital games
    Publication

    - Year 2015

    The paper presents a study of emotional states during a gameplay. An experiment of two-player Tetris game is reported, followed by the analysis of the results - self-reported emotional states as well as physiological signals measurements interpretation. The study reveals the diversity of emotional reactions and concludes, that a representative player's emotional model is hard to define. Instead, an adaptive approach to emotion...

    Full text to download in external service

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • The Role of a Software Product Manager in Various Business Environments

    The aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...

    Full text available to download

  • MobileNet family tailored for Raspberry Pi

    With the advances in systems-on-a-chip technologies, there is a growing demand to deploy intelligent vision systems on low-cost microcomputers. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity of contemporary convolutional neural networks (CNNs). The state-of-the-art lightweight CNN is MobileNetV3. However, it was designed to achieve a good trade-off between...

    Full text available to download

  • The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
    Publication

    - IEEE Access - Year 2020

    Sentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...

    Full text available to download

  • Improving the Accuracy in Sentiment Classification in the Light of Modelling the Latent Semantic Relations
    Publication

    - Information - Year 2018

    The research presents the methodology of improving the accuracy in sentiment classification in the light of modelling the latent semantic relations (LSR). The objective of this methodology is to find ways of eliminating the limitations of the discriminant and probabilistic methods for LSR revealing and customizing the sentiment classification process (SCP) to the more accurate recognition of text tonality. This objective was achieved...

    Full text available to download

  • A Survey on Identifying and Addressing Business Analysis Problems

    Despite the growing body of knowledge on requirements engineering and business analysis, these areas of software project are still considered problematic. The paper focuses on problems reported by business analysts and on applicability of available business analysis techniques as solutions to such problems. A unified set of techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification...

    Full text available to download

  • System supporting behavioral therapy for children with autism

    In this paper, a system supporting behavioral therapy for autistic children is presented. The system consists of sensors network, base station and a brooch indicating person's emotional states. The system can be used to measure values of physiological parameters that are associated with changes in the emotional state. In the future, it can be useful to inform the autistic child and the therapist about the emotional state of the...

    Full text available to download

  • Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
    Publication

    Context-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...

    Full text to download in external service

  • Assurance Case Patterns On-line Catalogue
    Publication

    - Year 2017

    Assurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...

    Full text available to download

  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey
    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

  • Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping Study
    Publication

    - IEEE Access - Year 2022

    Logging is a common practice in software engineering to provide insights into working systems. The main uses of log files have always been failure identification and root cause analysis. In recent years, novel applications of logging have emerged that benefit from automated analysis of log files, for example, real-time monitoring of system health, understanding users’ behavior, and extracting domain knowledge. Although nearly every...

    Full text available to download

  • Emotion Monitor - Concept, Construction and Lessons Learned

    This paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...

    Full text available to download

  • Emotion Recognition from Physiological Channels Using Graph Neural Network

    In recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...

    Full text available to download

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
    Publication

    - Internet Research - Year 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Full text to download in external service

  • Towards the participant observation of emotions in software development teams

    Emotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...

    Full text available to download

  • The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
    Publication

    - Year 2017

    This paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...

    Full text available to download

  • Modern approaches to file system integrity checking
    Publication

    - Year 2008

    One of the means to detect intruder's activity is totrace all unauthorized changes in a file system.Programs which fulfill this functionality are called fileintegrity checkers. This paper concerns modernapproach to file system integrity checking. It reviewsarchitecture of popular systems that are widely used inproduction environment as well as scientific projects,which not only detect intruders but also take actions tostop their...

    Full text to download in external service

  • A Case Study on Implementing Agile Techniques and Practices: Rationale, Benefits, Barriers and Business Implications for Hardware Development
    Publication

    Agile methodologies, along with the corresponding tools and practices, are claimed to facilitate teams in managing their work more effectively and conducting their work more efficiently while fostering the highest quality product within the constraints of the budget. Therefore, the rate of awareness and adoption of Agile frameworks both within and outside the software industry has increased significantly. Yet, the latest studies...

    Full text available to download

  • A note on the applications of artificial intelligence in the hospitality industry: preliminary results of a survey
    Publication

    - Year 2021

    Intelligent technologies are widely implemented in different areas of modern society but specific approaches should be applied in services. Basic relationships refer to supporting customers and people responsible for services offering for these customers. The aim of the paper is to analyze and evaluate the state-of-the art of artificial intelligence (AI) applications in the hospitality industry. Our findings show that the major...

    Full text available to download

  • Things You Might Not Know about the k-Nearest Neighbors Algorithm
    Publication

    Recommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...

    Full text to download in external service

  • Communication and Documentation Practices in Agile Requirements Engineering: A Survey in Polish Software Industry

    Requirements engineering, system analysis and other analytical activities form the basis of every IT project. Such activities are not clearly defined in Agile development methods, but it does not mean that they are absent in an agile project. The aim of our work was to determine which practices related to requirements-related communication and which requirements documenting techniques are used in agile software projects. For this...

    Full text available to download

  • What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems

    Requirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...

    Full text available to download

  • Adopting Collaborative Games into Agile Software Development
    Publication

    - Year 2018

    Although the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...

    Full text to download in external service

  • Scaling scrum with a customized nexus framework: A report from a joint industry‐academia research project
    Publication

    espite a wide range of scaling frameworks available, large-scale agile transformations are not straightforward undertakings. Few organizations have structures in place that fit the predefined workflows – while once one applies an off-the-shelf framework outside of its prescribed process, guidance quickly runs out. In this paper, we demonstrate how to instantiate a method configuration process using a lightweight experimental approach...

    Full text available to download

  • Stress Detection of Children with Autism using Physiological Signals in Kaspar Robot-Based Intervention Studies
    Publication
    • B. Coskun
    • P. Uluer
    • E. Toprak
    • D. E. Barkana
    • H. Kose
    • T. Zorcec
    • B. Robins
    • A. Landowska

    - Year 2022

    This study aims to develop a stress detection system using the blood volume pulse (BVP) signals of children with Autism Spectrum Disorder (ASD) during robot-based interven- tion. This study presents the heart rate variability (HRV) analysis method to detect the stress, where HRV features are extracted from raw BVP signals recorded from an E4 wristband during interaction studies with the social robot Kaspar. Low frequency power...

    Full text to download in external service

  • Playing the Sprint Retrospective

    In agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...

    Full text available to download

  • Validation of Services Supporting Healthcare Standards Conformance

    The paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...

    Full text available to download

  • An Industrial Survey on Business Analysis Problems and Solutions

    The paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...

    Full text available to download

  • Evaluating Performance and Accuracy Improvements for Attention-OCR

    In this paper we evaluated a set of potential improvements to the successful Attention-OCR architecture, designed to predict multiline text from unconstrained scenes in real-world images. We investigated the impact of several optimizations on model’s accuracy, including employing dynamic RNNs (Recurrent Neural Networks), scheduled sampling, BiLSTM (Bidirectional Long Short-Term Memory) and a modified attention model. BiLSTM was...

    Full text to download in external service

  • Algebra of ontology modules for semantic agents
    Publication

    W środowisku Sieci Semantycznej problem precyzyjnego manipulowania jednostkami wiedzy nabiera szczególnego znaczenia. W tej publikacji dyskutujemy możliwość zaadaptowania do tego celu elastycznego aparatu algebry relacyjnej. Na bazie dysksji szkicujemy pewną szczególną analogię pomiędzy bazami danych a bazami wiedzy i używamy tej analogii do wprowadzenia algebry modułów semantycznych.

  • Towards Emotion Acquisition in IT Usability Evaluation Context
    Publication

    - Year 2015

    The paper concerns extension of IT usability studies with automatic analysis of the emotional state of a user. Affect recognition methods and emotion representation models are reviewed and evaluated for applicability in usability testing procedures. Accuracy of emotion recognition, susceptibility to disturbances, independence on human will and interference with usability testing procedures are...

    Full text to download in external service

  • Security information sharing for smart grids: Developing the right data model
    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

  • Applications for investigating therapy progress of autistic children
    Publication

    The paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...

    Full text available to download

  • Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts

    Requirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...

    Full text available to download

  • Model of distributed learning objects repository for a heterogenic internet environment

    W artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...

  • Evaluation Criteria for Affect-Annotated Databases

    In this paper a set of comprehensive evaluation criteria for affect-annotated databases is proposed. These criteria can be used for evaluation of the quality of a database on the stage of its creation as well as for evaluation and comparison of existing databases. The usefulness of these criteria is demonstrated on several databases selected from affect computing domain. The databases contain different kind of data: video or still...

    Full text to download in external service

  • Balance Between Creativity and Methodology in Software Projects
    Publication

    - Year 2015

    Taking into account trends of innovation in economy and increasing interest in applying creativity techniques in computer science, this paper focuses on relationship between creativity and methodology in software project. First, it extracts useful knowledge about creativity from creativity research. Then, it makes an attempt to combine creativity issues and dimensions with concepts from software project area. It presents also lessons...

    Full text to download in external service

  • Uniform Model Interface for Assurance Case Integration with System Models
    Publication

    - Year 2017

    Assurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...

    Full text available to download

  • Rating Prediction with Contextual Conditional Preferences
    Publication

    - Year 2016

    Exploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...

    Full text to download in external service

  • Designing effective educational games - a case study of a project management game

    This paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...

    Full text available to download

  • AgileSafe – a method of introducing agile practices into safety-critical software development processes

    This article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.

    Full text available to download

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Full text available to download

  • The algorithm of building the hierarchical contextual framework of textual corpora
    Publication

    - Year 2018

    This paper presents an approach for Modeling the Latent Semantic Relations. The approach is based on advantages of two computational approaches: Latent Semantic Analysis and Latent Dirichlet Allocation. The scientific question about the possibility of reducing the influence of these Methods limitation on the Quality of the Latent Semantic Relations Analysis Results is raised. The case study for building the Two-level Hierarchical Contextual...

    Full text available to download

  • A Note on Knowledge Management Education: Towards Implementing Active Learning Methods
    Publication

    - Year 2018

    Knowledge Management as an area of education is still a big challenge for teachers and practitioners. Nevertheless, there are several useful teaching methods in active education, especially oriented towards courses where innovation and delivering dynamic knowledge are critical. The goal of the paper is to present and discuss criteria relevant in the selection of active educational methods supporting knowledge management courses....

    Full text available to download

  • Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
    Publication

    This paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...

    Full text available to download

  • Extending GQM by argument structures
    Publication

    - Year 2007

    Effective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...

  • Extending GQM by Argument Structures
    Publication

    - Year 2008

    Effective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...

  • Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children

    This paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...

    Full text to download in external service

  • Integrating Confidence And Assurance Arguments
    Publication

    To be considered compelling an assurance case should address its potential deficits, possibly with the use of a confidence argument. Assurance argument and confidence argument should be clearly separated and consistent at the same time. We propose a way of their integration with the use of an element representing rationale for each argumentation strategy. The rationale integrates confidence argument for a given argumentation step...

    Full text available to download

  • A note on the affective computing systems and machines: a classification and appraisal
    Publication

    - Procedia Computer Science - Year 2022

    Affective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...

    Full text available to download

  • Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
    Publication

    - Year 2018

    This paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...

    Full text available to download

  • Ontological Model for Contextual Data Defining Time Series for Emotion Recognition and Analysis
    Publication

    One of the major challenges facing the field of Affective Computing is the reusability of datasets. Existing affective-related datasets are not consistent with each other, they store a variety of information in different forms, different formats, and the terms used to describe them are not unified. This paper proposes a new ontology, ROAD, as a solution to this problem, by formally describing the datasets and unifying the terms...

    Full text available to download

  • Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
    Publication

    - Year 2020

    We present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...

    Full text to download in external service

  • Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle

    Creativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...

    Full text to download in external service

  • Software development methodologies and practices in start-ups
    Publication

    - IET Software - Year 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Full text available to download

  • Towards Safety Case Integration with Hazard Analysis for Medical Devices
    Publication

    Safety case is one of system safety lifecycle products and should be consistent with other lifecycle products like hazard analysis results. In this paper we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system...

    Full text available to download

  • A comprehensive overview of software product management challenges

    The principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...

    Full text available to download