Publications
Filters
total: 506
Catalog Publications
Year 2020
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublicationWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
Contextual ontology for tonality assessment
Publicationclassification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...
-
EduAkcja. Historia pewnego czasopisma
PublicationRozdział przedstawia przebieg inicjatywy powołania czasopisma poświęconego zdalnemu nauczaniu o nazwie EduAkcja. Magazyn edukacji elektronicznej
-
Evaluation of Selected UX Techniques by Product Managers - A Preliminary Survey
PublicationIn this paper we present the results of an opinion survey among 28 IT product managers who evaluated the subjective usefulness of 24 selected UX techniques to 6 IT product management tasks derived from ProdBOK®. We selected the UX techniques based on the literature review and 6 interviews with experienced IT product managers. Based on the survey results, we propose our recommendation of useful techniques for 5 of the 6 studied...
-
Exploring application relationships within enterprise system by matching messages in enterprise log
PublicationWith data becoming their key asset, large enterprises require data governance processes to maintain its quality. Because a large portion of business value in enterprise systems is usually delivered by legacy applications without proper documentation, there is a need for a better understanding of these applications and the data produced by them. In this paper, we present an approach to collecting insights into the data managed by...
-
Exploring Impact of Requirements Engineering on Other IT Project Areas – Case Study
PublicationRequirements Engineering (RE) is recognized as one of the most important (yet difficult) areas of software engineering that has a significant impact on other areas of IT projects and their final outcomes. Empirical studies investigating this impact are hard to conduct, mainly due to the great effort required. It is thus difficult for both researchers and industry practitioners to make evidence-based evaluations about how decisions...
-
Identification of the Agile Mindset and Its Comparison to the Competencies of Selected Agile Roles
PublicationIn this paper we present the results of the identification and evalua-tion of the elements of an agile mindset as well as its comparison to the compe-tence models for the roles of Scrum Master, Product Owner and agile analyst. We have identified 70 unique agile mindset elements from literature and 5 in-terviews with experts. Based on an opinion survey among 52 agile practitioners we evaluated the importance of 26 selected elements...
-
Improving the Performance of Ontological Querying by using a Contextual Approach
PublicationIn the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
On the Usefulness of the Generalised Additive Model for Mean Path Loss Estimation in Body Area Networks
PublicationIn this article, the usefulness of the Generalised Additive Model for mean path loss estimation in Body Area Networks is investigated. The research concerns a narrow-band indoor off-body network operating at 2.45 GHz, being based on measurements performed with four different users. The mean path loss is modelled as a sum of four components that depend on path length, antenna orientation angle, absolute difference between transmitting...
-
Playing the Sprint Retrospective: A Replication Study
PublicationThe Sprint Retrospective is a vehicle for continuous process improvement. Even though it is a well established agile practice, running effective retrospective meetings is challenging. There have been a lot of identified problems that commonly occur during these meetings. To address them, Przybyłek & Kotecka [20] successfully revitalized retrospective meetings by adopting collaborative games, which represent a powerful tool in improving...
-
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism
PublicationThe paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...
-
Scientific Collaboration, Citation and Topic Analysis of International Conference on Agile Software Development Papers
PublicationThe International Conference on Agile Software Development (XP) was established almost sixteen years ago. Based on data from Scopus database, a total of 789 papers have been published in between years of 2002 and 2018. We employed bibliometrics analysis and topic modeling with R/RStudio to analyze these published papers from various dimensions, including the most active authors, collaboration of authorship, most cited papers, used...
-
The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
PublicationSentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...
-
Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas
PublicationRequirements Engineering (RE) is recognized as one of the most important, but difficult areas of software engineering, with a significant impact on other areas of the IT project and its final outcome. The empirical studies investigating this impact are hard to conduct, mainly due to large effort required. It is thus difficult for researchers and even more for industry practitioners to make evidence-based evaluations, how decisions...
-
Usability of mobile applications: a systematic literature study
PublicationSince the release of the first mobile devices, the usability of on-board applications has been the concern not only of software vendors but hardware manufacturers as well. The academia community later willingly joined the discussion on usability in terms of theory and empirical measurement, having experience and knowledge in desktop settings. At first sight, such a background should guarantee a solid foundation to conduct research...
Year 2019
-
A New Rehabilitation Device for Balance Impaired Individuals
PublicationIn the paper authors present a device designed to improve the rehabilitation process of people with balance impairment. The discussed device (JStep) utilizes a commercially available static standing frame (stander) modified in order to fit force sensing units under the feet and in the pillows around the hips of a patient. While executing rehabilitation tasks, the patient may compensate his balance deficiency by leaning on the pillows...
-
Antecedents to Achieve Kanban Optimum Benefits in Software Companies
PublicationIn 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...
-
Artificial intelligence for software development — the present and the challenges for the future
PublicationSince the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...
-
Communication and Documentation Practices in Agile Requirements Engineering: A Survey in Polish Software Industry
PublicationRequirements engineering, system analysis and other analytical activities form the basis of every IT project. Such activities are not clearly defined in Agile development methods, but it does not mean that they are absent in an agile project. The aim of our work was to determine which practices related to requirements-related communication and which requirements documenting techniques are used in agile software projects. For this...
-
Comparison of technology adoption models
PublicationThere are several technology adoption models, that try to explain, how and why the technologies are adopted and used. Among those, that are widely used to explain, how the older adults accept technologies, there are some general models and models specific to the group of older users. Among the general ones I would recommend paying attention to the following models: Technology Acceptance Model (TAM) proposed by Davis...
-
Developing Novel Solutions to Realise the European Energy - Information Sharing & Analysis Centre
PublicationFor more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...
-
Enriching the Context: Methods of Improving the Non-contextual Assessment of Sentence Credibility
PublicationThis paper presents several methods of automatic context enrichment of sentences that need to be evaluated, tagged or fact-checked by human judges. We have created a corpus of medical Web articles. Sentences from this corpus have been fact-checked by medical experts in two modes: contextually (reading the entire article and evaluating sentence by sentence) and without context (evaluating sentences from all articles in random order)....
-
Evaluating Performance and Accuracy Improvements for Attention-OCR
PublicationIn this paper we evaluated a set of potential improvements to the successful Attention-OCR architecture, designed to predict multiline text from unconstrained scenes in real-world images. We investigated the impact of several optimizations on model’s accuracy, including employing dynamic RNNs (Recurrent Neural Networks), scheduled sampling, BiLSTM (Bidirectional Long Short-Term Memory) and a modified attention model. BiLSTM was...
-
Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle
PublicationCreativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...
-
Identification, Assessment and Automated Classification of Requirements Engineering Techniques
PublicationSelection of suitable techniques to be used in requirements engineering or business analysis activities is not easy, especially considering the large number of new proposals that emerged in recent years. This paper provides a summary of techniques recommended by major sources recognized by the industry. A universal attribute structure for the description of techniques is proposed and used to describe 33 techniques most frequently...
-
Method of selecting programming practices for the safety-critical software development projects
PublicationIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
On the Agile Mindset of an Effective Team – An Industrial Opinion Survey
PublicationIn this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within...
-
Perceptions of Gender Diversity's Impact on Mood in Software Development Teams
PublicationGender inequality persists in IT teams. We examine how gender differentiation affects the workplace atmosphere and analyze the results of our study of the issue. We discuss the problem of gender discrimination and consider methods to reduce inequality
-
Playing the Sprint Retrospective
PublicationIn agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...
-
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
PublicationThis study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...
-
Representing Process Characteristics to Increase Confidence in Assurance Case Arguments
PublicationAn assurance case is a structured, evidence-based argument demonstrating that a safety or other quality objective of a high integrity system is assured. Assurance cases are required or recommended in many industry domains as a means to convince the regulatory bodies to allow commissioning of such system. To be convincing, an argument should address all potential doubts and thus cover numerous additional issues, including the processes...
-
Residual MobileNets
PublicationAs modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...
-
Scoreboard Architectural Pattern and Integration of Emotion Recognition Results
PublicationThis paper proposes a new design pattern, named Scoreboard , dedicated for applications solving complex, multi-stage, non-deterministic problems. The pattern provides a computational framework for the design and implementation of systems that integrate a large number of diverse specialized modules that may vary in accuracy, solution level, and modality. The Scoreboard is an extension of Blackboard design pattern and comes under...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Software development methodologies and practices in start-ups
PublicationSoftware start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...
-
Software Factory project for enhancement of student experiential learning
PublicationProviding opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublicationThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Things You Might Not Know about the k-Nearest Neighbors Algorithm
PublicationRecommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Uncertainty in emotion recognition
PublicationPurpose–The purpose of this paper is to explore uncertainty inherent in emotion recognition technologiesand the consequences resulting from that phenomenon.Design/methodology/approach–The paper is a general overview of the concept; however, it is basedon a meta-analysis of multiple experimental and observational studies performed over the past couple of years.Findings–The mainfinding of the paper might be summarized as follows:...
-
Using Evidence-based Arguments to Support Dependability Assurance-Experiences and Challenges
PublicationThe article introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them
Year 2018
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
A Note on Knowledge Management Education: Towards Implementing Active Learning Methods
PublicationKnowledge Management as an area of education is still a big challenge for teachers and practitioners. Nevertheless, there are several useful teaching methods in active education, especially oriented towards courses where innovation and delivering dynamic knowledge are critical. The goal of the paper is to present and discuss criteria relevant in the selection of active educational methods supporting knowledge management courses....
-
A Survey Investigating the Influence of Business Analysis Techniques on Software Quality Characteristics
PublicationBusiness analysis is recognized as one of the most important areas determining the outcome (success or failure) of a software project. In this paper we explore this subject further by investigating the potential impact of techniques applied in business analysis on essential software quality characteristics. We conducted a literature search for software quality models, analyzed the existing models and selected a subset of commonly...
-
Adopting Collaborative Games into Agile Requirements Engineering
PublicationIn agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....
-
Adopting Collaborative Games into Agile Software Development
PublicationAlthough the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...
-
An empirical study on the impact of AspectJ on software evolvability
PublicationSince its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...
-
Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers
PublicationRecent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...
-
Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts
PublicationRequirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...