Department of Software Engineering - Administrative Units - Bridge of Knowledge

Search

Department of Software Engineering

Filters

total: 477

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

Year 2015
Year 2013
  • System obsługi kontekstowych baz wiedzy CongloS

    W artykule przedstawiono założenia, architekturę i niektóre aspekty implementacyjne systemu CongloS - systemu obsługi kontekstowych baz wiedzy opartych na modelu SIM. W swoim działaniu CongloS wykorzystuje wiele specyficznych elementów koncepcji organizacji bazy wiedzy: model tarsetowy, model SIM, metaontologię opisu schematu, własne sprzęgi międzymodularne i możliwość zadawania zapytań. Koncepcje te również są opisane w artykule,...

    Full text to download in external service

Year 2009
  • Syntactic modular decomposition of large ontologies with relational database
    Publication

    - Year 2009

    Support for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...

    Full text to download in external service

  • S-Modules - An Approach to Capture Semantics fo Modularized DL Knowledge Bases
    Publication

    Modularity of ontologies has been recently recognized as a key requirement for collaborative ontology engineering and distributed ontology reuse. Partitioning of an ontology into modules naturally gives rise to development of module processing methods. In this paper we describe an algebra of ontology modules developed during our work on a Knowledge Base Management System called RKaSeA. The idea differs from other algebras in the...

Year 2023
Year 2019
  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
    Publication

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Full text available to download

  • Software Factory project for enhancement of student experiential learning
    Publication

    - Year 2019

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...

  • Software development methodologies and practices in start-ups
    Publication

    - IET Software - Year 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Full text available to download

  • Security-oriented agile approach with AgileSafe and OWASP ASVS
    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Scoreboard Architectural Pattern and Integration of Emotion Recognition Results
    Publication

    This paper proposes a new design pattern, named Scoreboard , dedicated for applications solving complex, multi-stage, non-deterministic problems. The pattern provides a computational framework for the design and implementation of systems that integrate a large number of diverse specialized modules that may vary in accuracy, solution level, and modality. The Scoreboard is an extension of Blackboard design pattern and comes under...

    Full text available to download

Year 2007
  • Supporting Compliance with Security Standards by Trust Case Templates
    Publication

    - Year 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Supporting compliance with safety standards by trust case templates
    Publication

    - Year 2007

    Standard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...

  • Standard Compliance Framework for effective requirements communication

    Standard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...

Year 2012
Year 2011
Year 2014
  • Supercapacitors - charge redistribution and restoring voltage
    Publication

    - Year 2014

    The charge in supercapacitor is stored on electrodes and in electrolyte. The charges on electrodes create the Helmholtz double layer which is formed immediately with time constant of the order of seconds, while the charge storage in electrolyte is going on with time constant of the order of hundreds seconds. When the charged supercapacitor is shorted for few seconds, the charge from electrodes is discharged while the charge in...

  • Software Modeling from the Perspective of Intuitive Information Processing
    Publication

    - Year 2014

    There is psychological evidence that humans process information not only consciously but also intuitively. Intuitive information processing is present also during the activities related to software modeling. The goal of this paper is to analyze software modeling from the perspective of theories which describe intuitive (nonconscious, implicit) information processing. The paper includes presentation of relevant psychological theories,...

    Full text to download in external service

  • SMAQ - A Semantic Model for Analitical Queries
    Publication

    - Year 2014

    While the Self-Service Business Intelligence (BI) becomes an important part of organizational BI solutions there is a great need for new tools allowing to construct ad-hoc queries by users with various responsibilities and skills. The paper presents a Semantic Model for Analytical Queries – SMAQ allowing to construct queries by users familiar with business events and terms, but being unaware of database or data warehouse concepts...

  • Security information sharing for smart grids: Developing the right data model
    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

Year 2002
  • Studium Wykonalności projektu informatycznego.
    Publication

    - Year 2002

    Rozdział przedstawia przedmiot, cele i zakres Studium Wykrywalności oraz jego usytuowanie w cyklu życia projektu informatycznego. Omawiane są obszary dokonywanej oceny - wykrywalność techniczna, organizacyjna, zestawienia nakładów i oczekiwanych korzyści, elementy ryzyka i aspekty prawne. Proponowany jest zakres i kształt Raportu Wykrywalności, stanowiącego dokument kończący Studium. Prezentację kończy omówienie zawartości...

  • Struktury danych.
    Publication

    - Year 2002

    Praca stanowi podręcznik dla studentów pierwszych lat informatyki. Prezentuje ona podstawowe struktury danych stosowane w programach komputerowych wraz z algorytmami, ukierunkowanymi na przechowywanie informacji oraz operowanie informacją przy użyciu tych struktur. W podręczniku omówiono m.in. następujące zagadnienia: tablice uporządkowane, tablice rozproszone, sortowanie tablic, listy, drzewa binarne, drzewa wyszukiwawcze,...

  • Strategia zapewnienia jakości oprogramowania.
    Publication

    - Year 2002

    W referacie zaproponowano strategię zapewnienia jakości oprogramowania, bazując na działaniach w następujących obszarach: określenie definicji jakości oraz sposobu weryfikacji jej osiągnięcia; dobór technik dotyczących poprawy produktu; poprawa procesu wytwarzania oprogramowania; podnoszenie kultury jakości organizacji.

Year 2008
  • Studium porównawcze ergonomii rich internet applications i aplikacji systemowych

    W referacie poszukuje się odpowiedzi na pytanie, czy coraz częstsze zastępowanie aplikacji systemowych wzbogaconymi aplikacjami internetowymi (skr. ang. RIA) nie dzieje się kosztem ergonomii i wygody użytkowania. Artykuł przedstawia porównanie ergonomii interfejsów użytkownika aplikacji RIA i aplikacji systemowych. We wstępie wprowadzono w zagadnienie ergonomii oraz wskazano na charakterystyczne cechy aplikacji RIA. Następnie zaproponowano...

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application
    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Safety assurance strategies for autonomous vehicles
    Publication

    - Year 2008

    Assuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...

    Full text to download in external service

  • Rola agentów edukacyjnych w środowiskach zdalnego nauczania

    Agent edukacyjny jest inteligentnym i autonomicznym programem, który może być zastosowany w środowiskach kształcenia na odległość. W artykule podano definicję oraz klasyfikację agentów edukacyjnych ze szczególnym wskazaniem na agenty pedagogiczne, których celem jest wsparcie dla zdobywania kompetencji przez uczniów. Wskazano także miejsce agentów w kompleksowych środowiskach nauczania za pośrednictwem Internetu. W artykule omówiono...

    Full text available to download

Year 2010
Year 2022
  • Stress Detection of Children with Autism using Physiological Signals in Kaspar Robot-Based Intervention Studies
    Publication
    • B. Coskun
    • P. Uluer
    • E. Toprak
    • D. E. Barkana
    • H. Kose
    • T. Zorcec
    • B. Robins
    • A. Landowska

    - Year 2022

    This study aims to develop a stress detection system using the blood volume pulse (BVP) signals of children with Autism Spectrum Disorder (ASD) during robot-based interven- tion. This study presents the heart rate variability (HRV) analysis method to detect the stress, where HRV features are extracted from raw BVP signals recorded from an E4 wristband during interaction studies with the social robot Kaspar. Low frequency power...

    Full text to download in external service

  • Stress Detection of Children With ASD Using Physiological Signals
    Publication
    • S. N. B. Aktas
    • P. Uluer
    • B. Coskun
    • E. Toprak
    • D. E. Barkana
    • H. Kose
    • T. Zorcec
    • B. Robins
    • A. Landowska

    - Year 2022

    This paper proposes a physiological signal-based stress detection approach for children with autism spectrum disorder (ASD) to be used in social and assistive robot inter- vention. Electrodermal activity (EDA) and blood volume pulse (BVP) signals are collected with an E4 smart wristband from children with ASD in different countries. The peak count and signal amplitude features are derived from EDA signal and used in order to detect...

    Full text to download in external service

  • Scaled agile framework. Dealing with software process‐related challenges of a financial group with the action research approach
    Publication

    - Journal of Software-Evolution and Process - Year 2022

    This article reports on a domain-specific software development venture at Nordea. We explore organizational constraints, challenges, and corrective actions undertaken when scaling the agile development approach of their Core Banking Platform program. The fit and required customizations of the rather complex and rigid SAFe framework in a policy-heavy financial institution are audited against the organic growth of the program. In...

    Full text available to download

Year 2016
Year 2017
  • Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
    Publication

    Context-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...

    Full text to download in external service

  • Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
    Publication

    A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...

    Full text available to download

  • SACAM A Model for Describing and Classifying Sentiment Analysis Methods
    Publication

    - Year 2017

    In this paper we introduce SACAM — a model for describing and classifying sentiment analysis (SA) methods. The model focuses on the knowledge used during processing textual opinions. SACAM was designed to create informative descriptions of SA methods (or classes of SA methods) and is strongly integrated with its accompanying graphical notation suited for presenting the descriptions in diagrammatical form. The paper discusses applications...

    Full text to download in external service

Year 2020
  • Scientific Collaboration, Citation and Topic Analysis of International Conference on Agile Software Development Papers
    Publication

    - Year 2020

    The International Conference on Agile Software Development (XP) was established almost sixteen years ago. Based on data from Scopus database, a total of 789 papers have been published in between years of 2002 and 2018. We employed bibliometrics analysis and topic modeling with R/RStudio to analyze these published papers from various dimensions, including the most active authors, collaboration of authorship, most cited papers, used...

    Full text to download in external service

Year 2003
  • Safety of computer control systems: challenges and results in software development.
    Publication
    • J. Zalewski
    • W. Ehrenberger
    • F. Saglietti
    • J. Górski
    • A. Kornecki

    - ANNUAL REVIEWS IN CONTROL - Year 2003

    Artykuł dokonuje przeglądu wybranych wyników dotyczących poprawy bezpieczeństwa komputerowych systemów sterowania. Dyskusja pokrywa szeroki zakres aspektów dotyczących procesu wytwarzania takich systemów. W szczególności omówiono zagadnienia dotyczące różnorodności oprogramowania, oprogramowania off-the-shelf, analizy typów awarii i ich efektów oraz formalizacji procesu wytwórczego.

Year 2018
  • RYZYKO KREATYWNOŚCI W PROJEKTACH INFORMATYCZNYCH

    Ryzyko kreatywności dotyczy sytuacji, w których nie są osiągane zamierzone cele związane z kreatywnością lub występują niekorzystne skutki uboczne zastosowania metod kreatywności. W artykule dokonano systematyzacji tych zjawisk z wykorzystaniem wymiarów ukierunkowywania kreatywności i ujęto je w kategoriach zarządzania ryzykiem w projekcie. Wynikiem tych prac jest lista zagrożeń i czynników ryzyka kreatywności, która została zweryfikowana i...

    Full text available to download

Year 2021
  • Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review
    Publication
    • K. D. Bartl-Pokorny
    • P. Uluer
    • D. E. Barkana
    • A. Baird
    • H. Kose
    • T. Zorcec
    • B. Robins
    • B. Schuller
    • A. Landowska
    • M. Pykała

    - IEEE Access - Year 2021

    Children with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...

    Full text available to download