Search results for "020207 software engineering"

showing 10 items of 475 documents

Numerical methods for a nonlinear impact model: A comparative study with closed-form corrections

2011

A physically based impact model-already known and exploited in the field of sound synthesis-is studied using both analytical tools and numerical simulations. It is shown that the Hamiltonian of a physical system composed of a mass impacting on a wall can be expressed analytically as a function of the mass velocity during contact. Moreover, an efficient and accurate approximation for the mass outbound velocity is presented, which allows to estimate the Hamiltonian at the end of the contact. Analytical results are then compared to numerical simulations obtained by discretizing the system with several numerical methods. It is shown that, for some regions of the parameter space, the trajectorie…

sound synthesis0209 industrial biotechnologyMathematical optimizationnumerical analysisaudio signal processingAcoustics and UltrasonicsDiscretizationComputer sciencePhysical system02 engineering and technologyParameter spaceEnergy conservationsymbols.namesake020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComputer simulationSettore INF/01 - Informaticasound synthesis; numerical analysis; audio signal processingNumerical analysisMathematical analysisphysics computing020207 software engineeringimpact modelingimpact soundsEnergy conservationNonlinear systemnumerical simulationsymbolsnonlinear dynamical systemHamiltonian (quantum mechanics)
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

A Serendipity-Oriented Greedy Algorithm for Recommendations

2017

Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …

ta113SerendipityComputer sciencebusiness.industrysuosittelujärjestelmät020207 software engineeringserendipity02 engineering and technologyalgorithmsunexpectednessnoveltyalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencerecommender systemsGreedy algorithmbusinessGreedy randomized adaptive search procedure
researchProduct

Flexible entity search on surfaces

2016

Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalSettore INF/01 - InformaticaComputer science020207 software engineering02 engineering and technologyEntity searchSurface computing020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Information explorationDocument retrievalInformation explorationSurface computing
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Recommending Serendipitous Items using Transfer Learning

2018

Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…

ta113recommender systemInformation retrievalTraining setArtificial neural networkComputer sciencebusiness.industrySerendipityDeep learningsuosittelujärjestelmätdeep learning020207 software engineeringserendipity02 engineering and technologyRecommender systemtransfer learningalgorithmskoneoppiminenalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Artificial intelligenceTransfer of learningbusiness
researchProduct

Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation

2018

Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed

ta113software development methodbusiness.industryComputer scienceSEMAT020206 networking & telecommunications020207 software engineering02 engineering and technologyNotationessenceArchiMatekernel0202 electrical engineering electronic engineering information engineeringReference architectureSoftware engineeringbusinessohjelmistokehitys
researchProduct

Looking for Peace of Mind? Manage your (Technical) Debt : An Exploratory Field Study

2017

Background: In the last two decades Technical Debt (TD) has received a considerable amount of attention from software engineering research and practice. Recently, a small group of studies suggests that, in addition to its technical and economic consequences, TD can affect developers’ psychological states and morale. However, until now there has been a lack of empirical research clarifying such influences. Aims: In this study, we aim at taking the first step in filling this gap by investigating the potential impacts of TD and its management on developers’ morale. Method: Drawing from previous literature on morale, we decided to explore the influence of TD and its management on three dimensio…

ta222media_common.quotation_subjectApplied psychology02 engineering and technologyInterpersonal communicationthematic analysisAffect (psychology)Field (computer science)Empirical researchPolitical science0502 economics and business0202 electrical engineering electronic engineering information engineeringProductivityta512media_commonmixed-methodta113Management scienceQualitative interviews05 social sciences020207 software engineeringexploratory field studyinformation systems developmentFeelingtechnical debtTechnical debtsoftware developmentmoralebehavioral software engineeringohjelmistokehitys050203 business & management
researchProduct

Design of mobile phones for older adults : An empirical analysis of design guidelines and checklists for feature phones and smartphones

2017

Design guidelines and checklists are suggested as a useful tool in the development and evaluation of interface design of mobile phones for older adults. Given the intense evolution of mobile phone design, understanding how the design guidelines and checklists have taken into account the advances in mobile phone usability for older adults is important for their correct application and future development. Thus, this study explores the usability dimensions of mobile phone design for older adults and the related changes in terms of time and the type of device (feature phones vs. smartphones) based on an expert coding of the eight mobile phone design guidelines and checklists for older adults pu…

tarkistuslistattoimintaohjeetComputer sciencedesignHuman Factors and Ergonomics02 engineering and technologycomputer.software_genreHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesText entryguidelinesFeature phoneta518Interface designheuristic analysis050107 human factorschecklistsolder adultsHaptic technologyta113High contrastmobile phoneMultimediakäytettävyysbusiness.industry05 social sciences020207 software engineeringUsabilityta5142Computer Science ApplicationsälypuhelimetHuman-Computer InteractionusabilitymuotoiluMobile phoneComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputermatkapuhelimetikääntyneetCoding (social sciences)International Journal of Human-Computer Interaction
researchProduct