Publikacje
Filtry
wszystkich: 477
Katalog Publikacji
-
Towards Use of OntoClean for Ontology Contextualization
PublikacjaOntologies are formal systems of concepts used to describe numerous domains of interest. Ontologies are usually very expressive, but it comes at a price of computationally expensive reasoning over them. In our previous work we discussed the possible performance benefits that can be obtained by decomposing an ontology into contexts. While the benefits are appealing, we discovered that, in our case, the main obstacle against using...
-
Residual MobileNets
PublikacjaAs modern convolutional neural networks become increasingly deeper, they also become slower and require high computational resources beyond the capabilities of many mobile and embedded platforms. To address this challenge, much of the recent research has focused on reducing the model size and computational complexity. In this paper, we propose a novel residual depth-separable convolution block, which is an improvement of the basic...
-
Positive Risk of Creativity in Software Projects: an Expected Result, a Threat or an Opportunity?
PublikacjaPositive risk of creativity appears when there is an excess of creativity. This paper aims at exploring the concept of positive risk of creativity in software projects. It presents a taxonomy of positive risks as well as case studies of positive risks in diploma software projects. It also attempts to answer the question whether positive risks should be treated as expected results of applying creativity process, or they cause additional...
-
E-technologie w diagnozie i pomiarach postępów terapii dzieci z autyzmem w Polsce
PublikacjaCelem artykułu jest przeanalizowanie możliwości wsparcia technologicznego - w szczególności z wykorzystaniem urządzeń mobilnych - diagnozy i oceny postępów terapii dzieci z autyzmem. W ramach badań dokonano przeglądu istniejących rozwiązań wspierających diagnozę i pomiar postępów terapii oraz przeprowadzono ankietę w polskich ośrodkach zajmujących się pracą z osobami dotkniętymi autyzmem. Wyniki badania wskazują na zainteresowanie...
-
Context sensitive privacy management in a distributed environment
PublikacjaArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
Terminological and Assertional Queries in KQL Knowledge Access Language
PublikacjaOne of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...
-
Web Questionnaire as Construction Method of Affect-annotated Lexicon - Risks Reduction Strategy
PublikacjaThe paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce them. The strategies are supported...
-
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism
PublikacjaThe paper concerns automatic facial expression analysis applied in a study of natural “in the wild” interaction between children with autism and a social robot. The paper reports a study that analyzed the recordings captured via a camera located in the eye of a robot. Children with autism exhibit a diverse level of deficits, including ones in social interaction and emotional expression. The aim of the study was to explore the possibility...
-
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
PublikacjaThis study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...
-
Modularized Knowledge Bases Using Contexts, Conglomerates and a Query Language
PublikacjaArtykuł prezentuje nowatorskie podejście do projektowania i budowy baz wiedzy, zorientowane na wyróżnianie kontekstów i ich implementację za pomocą semantycznych modułów wiedzy zwanych konglomeratami.
-
Quasi-controlled Experimentations on the Impact of AOP on Software Comprehensibility
PublikacjaAspect-oriented programming (AOP) emerged as a paradigm to modularize the concerns that lead to interwoven code if implemented using traditional programming techniques. Unfortunately, the new constructs introduced by aspect-oriented (AO) languages result in both: (1) obstacles in modular reasoning, and (2) high coupling between aspects and the augmented modules. There have been numerous attempts to tackle these issues, but none...
-
Integration in Multichannel Emotion Recognition
PublikacjaThe paper concerns integration of results provided by automatic emotion recognition algorithms. It presents both the challenges and the approaches to solve them. Paper shows experimental results of integration. The paper might be of interest to researchers and practitioners who deal with automatic emotion recognition and use more than one solution or multichannel observation.
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
An Empirical Study on the Impact of Gender on Mobile Applications Usability
PublikacjaIn the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and male requirements and preferences are not always similar, to the best of our knowledge,...
-
A comprehensive overview of software product management challenges
PublikacjaThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Improving the Performance of Ontological Querying by using a Contextual Approach
PublikacjaIn the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...
-
Graph Representation Integrating Signals for Emotion Recognition and Analysis
PublikacjaData reusability is an important feature of current research, just in every field of science. Modern research in Affective Computing, often rely on datasets containing experiments-originated data such as biosignals, video clips, or images. Moreover, conducting experiments with a vast number of participants to build datasets for Affective Computing research is time-consuming and expensive. Therefore, it is extremely important to...
-
DevEmo—Software Developers’ Facial Expression Dataset
PublikacjaThe COVID-19 pandemic has increased the relevance of remote activities and digital tools for education, work, and other aspects of daily life. This reality has highlighted the need for emotion recognition technology to better understand the emotions of computer users and provide support in remote environments. Emotion recognition can play a critical role in improving the remote experience and ensuring that individuals are able...
-
Selection of physiological parameters for optoelectronic system supporting behavioral therapy of autistic children
PublikacjaIn this article the procedure of selection of physiological parameters for optoelectronic system supporting behavioral therapy of autistic children is proposed. Authors designed and conducted an experiment in which a group of 30 health volunteers (16 females and 14 males) were examined. Under controlled conditions people were exposed to a stressful situation caused by the picture or sound (1kHz constant sound, which was gradually...
-
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
PublikacjaArtykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...
-
Measures for Evaluation of Structure and Semantics of Ontologies
PublikacjaArtykuł przedstawia zagadnienie miar jakości ontologii ze szczególnym uwzględnieniem ich podziału na syntaktyczne (strukturalne) i semantyczne. Na tym tle przedstawione jest nowe podejście do pomiaru właściwości semantycznych ontologii bazujące na kartografii wiedzy.
-
Syntactic modular decomposition of large ontologies with relational database
PublikacjaSupport for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...
-
Stress Detection of Children With ASD Using Physiological Signals
PublikacjaThis paper proposes a physiological signal-based stress detection approach for children with autism spectrum disorder (ASD) to be used in social and assistive robot inter- vention. Electrodermal activity (EDA) and blood volume pulse (BVP) signals are collected with an E4 smart wristband from children with ASD in different countries. The peak count and signal amplitude features are derived from EDA signal and used in order to detect...
-
Choosing Exploration Process Path in Data Mining Processes for Complex Internet Objects
PublikacjaWe present an experimental case study of a novel and original framework for classifying aggregate objects, i.e. objects that consist of other objects. The features of the aggregated objects are converted into the features of aggregate ones, by use of aggregate functions. The choice of the functions, along with the specific method of classification can be automated by choosing of one of several process paths, and different paths...
-
Discovering interactions between applications with log analysis
PublikacjaApplication logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development...
-
Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
PublikacjaMethods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...
-
Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas
PublikacjaRequirements Engineering (RE) is recognized as one of the most important, but difficult areas of software engineering, with a significant impact on other areas of the IT project and its final outcome. The empirical studies investigating this impact are hard to conduct, mainly due to large effort required. It is thus difficult for researchers and even more for industry practitioners to make evidence-based evaluations, how decisions...
-
EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model
PublikacjaThe objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Software development methodologies and practices in start-ups
PublikacjaSoftware start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...
-
Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle
PublikacjaCreativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...
-
Towards Safety Case Integration with Hazard Analysis for Medical Devices
PublikacjaSafety case is one of system safety lifecycle products and should be consistent with other lifecycle products like hazard analysis results. In this paper we present a method of safety case integration with hazard tables based on the use of parametrized argument patterns. We describe a hazard table metamodel, a safety argument pattern and a mechanism of pattern instantiation using a linking table which represents references to system...
-
Ontological Model for Contextual Data Defining Time Series for Emotion Recognition and Analysis
PublikacjaOne of the major challenges facing the field of Affective Computing is the reusability of datasets. Existing affective-related datasets are not consistent with each other, they store a variety of information in different forms, different formats, and the terms used to describe them are not unified. This paper proposes a new ontology, ROAD, as a solution to this problem, by formally describing the datasets and unifying the terms...
-
Mobile Activity Plan Applications for Behavioral Therapy of Autistic Children
PublikacjaThis paper concerns technological support for behavioral therapy of autistic children. A family of tools dedicated for mobile devices is presented, that allows to design and perform an activity schedule in behavioral therapy. The paper describes the main challenges, that were encountered, especially in meeting the non-functional requirements of the application: simplicity, repeatability, robustness, personalization, re-usability...
-
Integrating Confidence And Assurance Arguments
PublikacjaTo be considered compelling an assurance case should address its potential deficits, possibly with the use of a confidence argument. Assurance argument and confidence argument should be clearly separated and consistent at the same time. We propose a way of their integration with the use of an element representing rationale for each argumentation strategy. The rationale integrates confidence argument for a given argumentation step...
-
Extending GQM by Argument Structures
PublikacjaEffective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...
-
Extending GQM by argument structures
PublikacjaEffective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...
-
Methodology for Text Classification using Manually Created Corpora-based Sentiment Dictionary
PublikacjaThis paper presents the methodology of Textual Content Classification, which is based on a combination of algorithms: preliminary formation of a contextual framework for the texts in particular problem area; manual creation of the Hierarchical Sentiment Dictionary (HSD) on the basis of a topically-oriented Corpus; tonality texts recognition via using HSD for analysing the documents as a collection of topically completed fragments...
-
A Note on Knowledge Management Education: Towards Implementing Active Learning Methods
PublikacjaKnowledge Management as an area of education is still a big challenge for teachers and practitioners. Nevertheless, there are several useful teaching methods in active education, especially oriented towards courses where innovation and delivering dynamic knowledge are critical. The goal of the paper is to present and discuss criteria relevant in the selection of active educational methods supporting knowledge management courses....
-
A note on the affective computing systems and machines: a classification and appraisal
PublikacjaAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...
-
Keystroke Dynamics Patterns While Writing Positive and Negative Opinions
PublikacjaThis paper deals with analysis of behavioural patterns in human–computer interaction. In the study, keystroke dynamics were analysed while participants were writing positive and negative opinions. A semi-experiment with 50 participants was performed. The participants were asked to recall the most negative and positive learning experiences (subject and teacher) and write an opinion about it. Keystroke dynamics were captured and...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublikacjaAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Evaluation Criteria for Affect-Annotated Databases
PublikacjaIn this paper a set of comprehensive evaluation criteria for affect-annotated databases is proposed. These criteria can be used for evaluation of the quality of a database on the stage of its creation as well as for evaluation and comparison of existing databases. The usefulness of these criteria is demonstrated on several databases selected from affect computing domain. The databases contain different kind of data: video or still...
-
Balance Between Creativity and Methodology in Software Projects
PublikacjaTaking into account trends of innovation in economy and increasing interest in applying creativity techniques in computer science, this paper focuses on relationship between creativity and methodology in software project. First, it extracts useful knowledge about creativity from creativity research. Then, it makes an attempt to combine creativity issues and dimensions with concepts from software project area. It presents also lessons...
-
Model of distributed learning objects repository for a heterogenic internet environment
PublikacjaW artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...
-
The algorithm of building the hierarchical contextual framework of textual corpora
PublikacjaThis paper presents an approach for Modeling the Latent Semantic Relations. The approach is based on advantages of two computational approaches: Latent Semantic Analysis and Latent Dirichlet Allocation. The scientific question about the possibility of reducing the influence of these Methods limitation on the Quality of the Latent Semantic Relations Analysis Results is raised. The case study for building the Two-level Hierarchical Contextual...
-
Designing effective educational games - a case study of a project management game
PublikacjaThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Rating Prediction with Contextual Conditional Preferences
PublikacjaExploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...