Katedra Inżynierii Oprogramowania - Jednostki Administracyjne - MOST Wiedzy

Wyszukiwarka

Katedra Inżynierii Oprogramowania

Filtry

wszystkich: 477

  • Kategoria
  • Rok
  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Katalog Publikacji

  • Towards Use of OntoClean for Ontology Contextualization
    Publikacja

    Ontologies are formal systems of concepts used to describe numerous domains of interest. Ontologies are usually very expressive, but it comes at a price of computationally expensive reasoning over them. In our previous work we discussed the possible performance benefits that can be obtained by decomposing an ontology into contexts. While the benefits are appealing, we discovered that, in our case, the main obstacle against using...

    Pełny tekst do pobrania w portalu

  • Residual MobileNets

    As modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?
    Publikacja

    - Rok 2018

    Positive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • E-technologie w diagnozie i pomiarach postępów terapii dzieci z autyzmem w Polsce
    Publikacja

    - e-mentor - Rok 2014

    Celem artykułu jest przeanalizowanie możliwości wsparcia technologicznego - w szczególności z wykorzystaniem urządzeń mobilnych - diagnozy i oceny postępów terapii dzieci z autyzmem. W ramach badań dokonano przeglądu istniejących rozwiązań wspierających diagnozę i pomiar postępów terapii oraz przeprowadzono ankietę w polskich ośrodkach zajmujących się pracą z osobami dotkniętymi autyzmem. Wyniki badania wskazują na zainteresowanie...

    Pełny tekst do pobrania w portalu

  • Context sensitive privacy management in a distributed environment

    Artykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Terminological and Assertional Queries in KQL Knowledge Access Language

    One of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...

  • Web Questionnaire as Construction Method of Affect-annotated Lexicon - Risks Reduction Strategy
    Publikacja

    - Rok 2015

    The paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce them. The strategies are supported...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism

    The paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)

    This study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...

    Pełny tekst do pobrania w portalu

  • Modularized Knowledge Bases Using Contexts, Conglomerates and a Query Language

    Artykuł prezentuje nowatorskie podejście do projektowania i budowy baz wiedzy, zorientowane na wyróżnianie kontekstów i ich implementację za pomocą semantycznych modułów wiedzy zwanych konglomeratami.

  • Quasi-controlled Experimentations on the Impact of AOP on Software Comprehensibility
    Publikacja

    - Rok 2013

    Aspect-oriented programming (AOP) emerged as a paradigm to modularize the concerns that lead to interwoven code if implemented using traditional programming techniques. Unfortunately, the new constructs introduced by aspect-oriented (AO) languages result in both: (1) obstacles in modular reasoning, and (2) high coupling between aspects and the augmented modules. There have been numerous attempts to tackle these issues, but none...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integration in Multichannel Emotion Recognition
    Publikacja

    - Rok 2018

    The paper concerns integration of results provided by automatic emotion recognition algorithms. It presents both the challenges and the approaches to solve them. Paper shows experimental results of integration. The paper might be of interest to researchers and practitioners who deal with automatic emotion recognition and use more than one solution or multichannel observation.

    Pełny tekst do pobrania w portalu

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System
    Publikacja

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An Empirical Study on the Impact of Gender on Mobile Applications Usability
    Publikacja

    - IEEE Access - Rok 2022

    In the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and male requirements and preferences are not always similar, to the best of our knowledge,...

    Pełny tekst do pobrania w portalu

  • A comprehensive overview of software product management challenges

    The principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...

    Pełny tekst do pobrania w portalu

  • Improving the Performance of Ontological Querying by using a Contextual Approach

    In the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...

    Pełny tekst do pobrania w portalu

  • Graph Representation Integrating Signals for Emotion Recognition and Analysis

    Data reusability is an important feature of current research, just in every field of science. Modern research in Affective Computing, often rely on datasets containing experiments-originated data such as biosignals, video clips, or images. Moreover, conducting experiments with a vast number of participants to build datasets for Affective Computing research is time-consuming and expensive. Therefore, it is extremely important to...

    Pełny tekst do pobrania w portalu

  • DevEmo—Software Developers’ Facial Expression Dataset

    The COVID-19 pandemic has increased the relevance of remote activities and digital tools for education, work, and other aspects of daily life. This reality has highlighted the need for emotion recognition technology to better understand the emotions of computer users and provide support in remote environments. Emotion recognition can play a critical role in improving the remote experience and ensuring that individuals are able...

    Pełny tekst do pobrania w portalu

  • Selection of physiological parameters for optoelectronic system supporting behavioral therapy of autistic children

    In this article the procedure of selection of physiological parameters for optoelectronic system supporting behavioral therapy of autistic children is proposed. Authors designed and conducted an experiment in which a group of 30 health volunteers (16 females and 14 males) were examined. Under controlled conditions people were exposed to a stressful situation caused by the picture or sound (1kHz constant sound, which was gradually...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance analysis of untraceability protocols for mobile agents using an adaptable framework
    Publikacja

    Artykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Measures for Evaluation of Structure and Semantics of Ontologies

    Artykuł przedstawia zagadnienie miar jakości ontologii ze szczególnym uwzględnieniem ich podziału na syntaktyczne (strukturalne) i semantyczne. Na tym tle przedstawione jest nowe podejście do pomiaru właściwości semantycznych ontologii bazujące na kartografii wiedzy.

    Pełny tekst do pobrania w portalu

  • Syntactic modular decomposition of large ontologies with relational database
    Publikacja

    - Rok 2009

    Support for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Stress Detection of Children With ASD Using Physiological Signals
    Publikacja
    • S. N. B. Aktas
    • P. Uluer
    • B. Coskun
    • E. Toprak
    • D. E. Barkana
    • H. Kose
    • T. Zorcec
    • B. Robins
    • A. Landowska

    - Rok 2022

    This paper proposes a physiological signal-based stress detection approach for children with autism spectrum disorder (ASD) to be used in social and assistive robot inter- vention. Electrodermal activity (EDA) and blood volume pulse (BVP) signals are collected with an E4 smart wristband from children with ASD in different countries. The peak count and signal amplitude features are derived from EDA signal and used in order to detect...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
    Publikacja

    We present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Discovering interactions between applications with log analysis
    Publikacja

    Application logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development...

    Pełny tekst do pobrania w portalu

  • Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
    Publikacja
    • A. Nabożny
    • B. Balcerzak
    • A. Wierzbicki
    • M. Morzy
    • M. Chlabicz

    - JMIR Medical Informatics - Rok 2021

    Methods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...

    Pełny tekst do pobrania w portalu

  • Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas
    Publikacja

    Requirements Engineering (RE) is recognized as one of the most important, but difficult areas of software engineering, with a significant impact on other areas of the IT project and its final outcome. The empirical studies investigating this impact are hard to conduct, mainly due to large effort required. It is thus difficult for researchers and even more for industry practitioners to make evidence-based evaluations, how decisions...

    Pełny tekst do pobrania w portalu

  • EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model
    Publikacja

    - Rok 2018

    The objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...

    Pełny tekst do pobrania w portalu

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software development methodologies and practices in start-ups
    Publikacja

    - IET Software - Rok 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Pełny tekst do pobrania w portalu

  • Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle

    Creativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards Safety Case Integration with Hazard Analysis for Medical Devices
    Publikacja

    Safety case is one of system safety lifecycle products and should be consistent with other lifecycle products like hazard analysis results. In this paper we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system...

    Pełny tekst do pobrania w portalu

  • Ontological Model for Contextual Data Defining Time Series for Emotion Recognition and Analysis
    Publikacja

    One of the major challenges facing the field of Affective Computing is the reusability of datasets. Existing affective-related datasets are not consistent with each other, they store a variety of information in different forms, different formats, and the terms used to describe them are not unified. This paper proposes a new ontology, ROAD, as a solution to this problem, by formally describing the datasets and unifying the terms...

    Pełny tekst do pobrania w portalu

  • Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children

    This paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrating Confidence And Assurance Arguments
    Publikacja

    To be considered compelling an assurance case should address its potential deficits, possibly with the use of a confidence argument. Assurance argument and confidence argument should be clearly separated and consistent at the same time. We propose a way of their integration with the use of an element representing rationale for each argumentation strategy. The rationale integrates confidence argument for a given argumentation step...

    Pełny tekst do pobrania w portalu

  • Extending GQM by Argument Structures
    Publikacja

    - Rok 2008

    Effective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...

  • Extending GQM by argument structures
    Publikacja

    - Rok 2007

    Effective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...

  • Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
    Publikacja

    - Rok 2018

    This paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...

    Pełny tekst do pobrania w portalu

  • A Note on Knowledge Management Education: Towards Implementing Active Learning Methods
    Publikacja

    - Rok 2018

    Knowledge Management as an area of education is still a big challenge for teachers and practitioners. Nevertheless, there are several useful teaching methods in active education, especially oriented towards courses where innovation and delivering dynamic knowledge are critical. The goal of the paper is to present and discuss criteria relevant in the selection of active educational methods supporting knowledge management courses....

    Pełny tekst do pobrania w portalu

  • A note on the affective computing systems and machines: a classification and appraisal
    Publikacja

    Affective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...

    Pełny tekst do pobrania w portalu

  • Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
    Publikacja

    This paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...

    Pełny tekst do pobrania w portalu

  • Uniform Model Interface for Assurance Case Integration with System Models
    Publikacja

    - Rok 2017

    Assurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...

    Pełny tekst do pobrania w portalu

  • Evaluation Criteria for Affect-Annotated Databases

    In this paper a set of comprehensive evaluation criteria for affect-annotated databases is proposed. These criteria can be used for evaluation of the quality of a database on the stage of its creation as well as for evaluation and comparison of existing databases. The usefulness of these criteria is demonstrated on several databases selected from affect computing domain. The databases contain different kind of data: video or still...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Balance Between Creativity and Methodology in Software Projects
    Publikacja

    - Rok 2015

    Taking into account trends of innovation in economy and increasing interest in applying creativity techniques in computer science, this paper focuses on relationship between creativity and methodology in software project. First, it extracts useful knowledge about creativity from creativity research. Then, it makes an attempt to combine creativity issues and dimensions with concepts from software project area. It presents also lessons...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Model of distributed learning objects repository for a heterogenic internet environment

    W artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...

  • The algorithm of building the hierarchical contextual framework of textual corpora
    Publikacja

    - Rok 2018

    This paper presents an approach for Modeling the Latent Semantic Relations. The approach is based on advantages of two computational approaches: Latent Semantic Analysis and Latent Dirichlet Allocation. The scientific question about the possibility of reducing the influence of these Methods limitation on the Quality of the Latent Semantic Relations Analysis Results is raised. The case study for building the Two-level Hierarchical Contextual...

    Pełny tekst do pobrania w portalu

  • Designing effective educational games - a case study of a project management game

    This paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...

    Pełny tekst do pobrania w portalu

  • Rating Prediction with Contextual Conditional Preferences
    Publikacja

    - Rok 2016

    Exploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • AgileSafe – a method of introducing agile practices into safety-critical software development processes

    This article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.

    Pełny tekst do pobrania w portalu

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Pełny tekst do pobrania w portalu