Department of Software Engineering - Administrative Units - Bridge of Knowledge

Search

Department of Software Engineering

Filters

total: 480

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

Year 2006
  • Automatyzacja określania wymagań bezpieczeństwa na podstawie wyników analizy czasowej drzew błędów

    W odpowiedzi na potrzebę wprowadzania formalnych narzędzi opisu do analizy bezpieczeństwa systemów zawierających komponenty programowalne powstała notacja ECSDM. Jej zaletą jest to iż umożliwia nie tylko definiowanie zależności czasowych obowiązujących w opisywanym systemie, ale również, przy zastosowaniu jej do drzew błędów, pozwala na prowadzenie wnioskowania odnośnie zależności czasowych pomiędzy zdarzeniami z minimalnych zbiorów...

  • Automatyczne generowanie testów na podstawie modeli UML
    Publication

    - Year 2006

    Rozdział stanowi wprowadzenie do problematyki automatycznej generacji przypadków testowych na podstawie dokumentacji wykonanej w UML. Zaprezentowano powiązania pomiędzy dokumentacją wykonaną w fazach analizy i projektowania systemu a dokumentacją testową, szersze ujęcie zagadnień automatycznego generowania testów, metody generowania przypadków testowych, wyniki podobnych prac (projekt AGEDIS, profil testowy UML) oraz dyskusję efektywności...

  • Architecture supporting security of agent systems
    Publication

    - Year 2006

    W rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...

  • Analiza problemu zaufania do ontologii dla różnych modeli wnioskowania
    Publication

    - Year 2006

    W rzeczywistych systemach zarządzania wiedzą, a przede wszystkim w systemach rozproszonych gromadzących wiedzę z różnych źródeł, problem niepewności i zaufania do ontologii, jak również odpowiedzi udzielanych przez bazy wiedzy nabiera szczególnego znaczenia. Sformalizowanie problemu i przyjęcie właściwego modelu wnioskowaniaw różnych zastosowaniach wymaga szczegółowej analizy. Niniejsza praca podejmuje próbę usystematyzowania tej...

  • An untraceability protocol for mobile agents and its enhanced security study
    Publication

    - Year 2006

    Artykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...

  • An approach for evaluating trust in it infrastructures
    Publication

    - Year 2006

    W artykule zademonstrowano metodę oceny poziomu zaufania do systemu TI w oparciu o podejście funkcji przekonania.

Year 2017
  • Automatic recognition of therapy progress among children with autism
    Publication

    - Scientific Reports - Year 2017

    The article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...

    Full text available to download

  • Assurance Case Patterns On-line Catalogue
    Publication

    - Year 2017

    Assurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...

    Full text available to download

Year 2016
Year 2012
  • Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
    Publication

    In this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...

    Full text available to download

  • Analysis of the impact of AOP on source code quality: Paradox of aspect-oriented separation of concerns
    Publication

    - Year 2012

    Almost four decades ago, Parnas advocated modularity for the sake of changeability, independent development, and comprehensibility. The recipe for modularization is to define a clean interface, hide an implementation detail, keep low coupling and high cohesion. Although modules have taken many forms over the years from functions and procedures to classes, no form has been capable of expressing so-called crosscutting concerns in...

    Full text to download in external service

  • Agile Development of Critical Software - Can It be Justified?
    Publication

    The paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering...

Year 2013
  • Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
    Publication

    - Year 2013

    The paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...

    Full text available to download

  • Algebra modułów ontologicznych
    Publication

    Bardzo ważnym problemem w środowisku Semantic Web jest efektywne korzystanie z rożnych baz wiedzy rozproszonych w Internecie. Niniejsze opracowanie rozpatruje możliwość zaadaptowania do tego celu elastycznego i potężnego aparatu, jakim jest algebra relacji. W tym celu przedstawiono różnice i podobieństwa między bazami danych i bazami wiedzy oraz leżącymi u ich podstaw modelami odwzorowywania dziedziny problemu. Zaproponowana została...

  • Affective computing and affective learning – methods, tools and prospects

    Every teacher knows that interest, active participation and motivation are important factors in the learning process. At the same time e-learning environments almost always address only the cognitive aspects of education. This paper provides a brief review of methods used for affect recognition, representation and processing as well as investigates how these methods may be used to address affective aspect of e-education. The paper...

    Full text available to download

  • Affect-awareness framework for intelligent tutoring systems
    Publication

    - Year 2013

    The paper proposes a framework for construction of Intelligent Tutoring Systems (ITS), that take into consideration student emotional states and make affective interventions. The paper provides definitions of `affect-aware systems' and `affective interventions' and describes the concept of the affect-awareness framework. The proposed framework separates emotion recognition from its definition, processing and making decisions on...

    Full text to download in external service

Year 2018
Year 2021
  • Artificial Intelligence Technologies in Education: Benefits, Challenges and Strategies of Implementation
    Publication

    - Year 2021

    Since the education sector is associated with highly dynamic business environments which are controlled and maintained by information systems, recent technological advancements and the increasing pace of adopting artificial intelligence (AI) technologies constitute a need to identify and analyze the issues regarding their implementation in education sector. However, a study of the contemporary literature reveled that relatively...

    Full text available to download

Year 2019
  • Artificial intelligence for software development — the present and the challenges for the future

    Since the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...

    Full text available to download

  • Antecedents to Achieve Kanban Optimum Benefits in Software Companies
    Publication
    • M. Ahmad
    • A. Rohunen
    • P. Raulamo-jurvanen

    - Year 2019

    In 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...

    Full text to download in external service

Year 2022
  • ARIMA vs LSTM on NASDAQ stock exchange data
    Publication

    - Procedia Computer Science - Year 2022

    This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen input data, parameters and number of features. The chosen models were compared using...

    Full text available to download

  • An Empirical Study on the Impact of Gender on Mobile Applications Usability
    Publication

    - IEEE Access - Year 2022

    In the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and male requirements and preferences are not always similar, to the best of our knowledge,...

    Full text available to download

Year 2008
  • Argument strategies and patterns of the Trust-IT framework

    Artykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...

  • An integrated method for security protocols analysis
    Publication
    • M. (. Olszewski

    - Year 2008

  • An integrated framework for security protocol analysis
    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • An approach to evaluation of arguments in trust cases
    Publication

    - Year 2008

    Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...

  • Algorithms for query processing in a distributed knowledge integration system
    Publication

    - Year 2008

    Głównym celem artykułu jest wprowadzenie modelu systemu integracji wiedzy. Przedstawiony model jest oparty na modelu Calvanese i rozszerza go o wielowarstwowy model integracji. W artykule pokazano również użycie Kartograficznej Reprezentacji Wiedzy do przechowywania i przetwarzania ontologii w źródłach wiedzy oraz do budowania odwzorowań pomiędzy ontologiami. Odwzorowania pomiędzy ontologiami budowane w oparciu o odwzorowywanie...

Year 2011
  • Applying agiile practices to the development of safety-critical software

    Development of safety critical software is subjected to numerous restrictions and recommendations. To meet these requirements classical software development models (e.g. V-model) are usually applied. Agile methodologies, although rapidly increasing their popularity, were generally regarded as unsuitable for such projects. However, they offer potential benefits which provide a strong incentive to incorporate them into safety-critical...

  • Analysis of the impact of aspect-oriented programming on source code quality
    Publication

    - Year 2011

    Celem rozprawy jest ocena wpływu paradygmatu aspektowego na: modularność, możliwość dalszego rozwoju oraz ponowne użycie oprogramowania. Jako punkt odniesienia do oceny paradygmatu aspektowego wybrano paradygmat obiektowy. W ramach pracy przeprowadzono studium przypadków, w którym zbadano implementacje obiektowe oraz aspektowe 11 rzeczywistych systemów i 23 wzorców projektowych. Ponadto zrealizowano kontrolowany eksperyment, w...

  • Analysis of Mapping within S-module Framework

    W artykule zaprezentowano wyniki prac na podejściem konglomeratowym. Podejście to polega na semantycznym opisywaniu zawartości modułów ontologicznych z wykorzystaniem zdefiniowanej algebry modułów. Głównym osiągnięciem zaprezentowanym w pracy jest opis procesu przekształcania bazy wiedzy DDL w zbiór konglomeratów. Jako że te dwie metody prezentują różne podejścia do modularyzacja, analiza procesu stanowi podstawę do dyskusji na...

  • An approach to improving agility and discipline of software development with Scrum and CMMI
    Publication

    - LogForum - Year 2011

    The paper reports on two case studies of combining the Scrum methodology with the CMMI maturity model to improve together agility and discipline of software development. First, we propose the CMMI-Scrum reference model, which maps Scrum practices onto 123 practices of CMMI Staged level 2 and 3. Then, for 60% of CMMI practices, which are insufficiently covered by Scrum we extend Scrum with new practices that improve discipline while...

Year 2010
Year 2024
Year 2003
  • An Approach to Trust Case Development
    Publication

    - Year 2003

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Full text available to download

Year 2014
  • An Analysis of Contextual Aspects of Conceptualization: A Case Study and Prospects
    Publication

    In this chapter we present a new approach to development of modularized knowledge bases. We argue that modularization should start from the very beginning of modeling, i.e. from the conceptualization stage. To make this feasible, we propose to exploit a context-oriented, semantic approach to modularization. This approach is based on the Structural Interpretation Model (SIM) presented earlier elsewhere. In the first part of thischapter...

    Full text to download in external service

  • Affective Learning Manifesto – 10 Years Later
    Publication

    - Year 2014

    In 2004 a group of affective computing researchers proclaimed a manifesto of affective learning that outlined the prospects and white spots of research at that time. Ten years passed by and affective computing developed many methods and tools for tracking human emotional states as well as models for affective systems construction. There are multiple examples of affective methods applications in Intelligent Tutoring Systems (ITS)....

Year 2009
Year 2020
  • Agile Requirements Prioritization in Practice: Results of an Industrial Survey
    Publication

    Agile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...

    Full text available to download

Year 2023
  • AffecTube — Chrome extension for YouTube video affective annotations
    Publication

    - SoftwareX - Year 2023

    The shortage of emotion-annotated video datasets suitable for training and validating machine learning models for facial expression-based emotion recognition stems primarily from the significant effort and cost required for manual annotation. In this paper, we present AffecTube as a comprehensive solution that leverages crowdsourcing to annotate videos directly on the YouTube platform, resulting in ready-to-use emotion-annotated...

    Full text available to download

Year 2015
  • Affective reactions to playing digital games
    Publication

    - Year 2015

    The paper presents a study of emotional states during a gameplay. An experiment of two-player Tetris game is reported, followed by the analysis of the results - self-reported emotional states as well as physiological signals measurements interpretation. The study reveals the diversity of emotional reactions and concludes, that a representative player's emotional model is hard to define. Instead, an adaptive approach to emotion...

    Full text to download in external service