Search results for "Software engineering"
showing 10 items of 1151 documents
Practices and Infrastructures for Machine Learning Systems : An Interview Study in Finnish Organizations
2022
Using interviews, we investigated the practices and toolchains for machine learning (ML)-enabled systems from 16 organizations across various domains in Finland. We observed some well-established artificial intelligence engineering approaches, but practices and tools are still needed for the testing and monitoring of ML-enabled systems. Peer reviewed
Best practices for International eSourcing of Software Products and Services
2008
This paper analyzes how the information and communications technology-supported international eSourcing of software products and services (IeS) can be effectively executed. The extant literature falls short of providing a systematic and detailed enough set of best practices to guide IeS. This paper presents best practices for IeS to facilitate further research, and to help managers and other stakeholders to understand, execute, and proactively improve and manage international eSourcing. The practices emphasize the need to establish and enact rigorous, mature, and quantitatively managed eSourcing life- cycles in order to transcend temporal, geographical, social, technical, and other boundari…
A Complete, Exact and Efficient Implementation for Computing the Edge-Adjacency Graph of an Arrangement of Quadrics
2011
International audience; We present a complete, exact and efficient implementation to compute the edge-adjacency graph of an arrangement of quadrics, i.e. surfaces of algebraic degree 2. This is a major step towards the computation of the full 3D arrangement. We enhanced an implementation for an exact parameterization of the intersection curves of two quadrics, such that we can compute the exact parameter value for intersection points and from that the edge-adjacency graph of the arrangement. Our implementation is complete in the sense that it can handle all kinds of inputs including all degenerate ones, i.e. singularities or tangential intersection points. It is exact in that it always comp…
Platformed Interactions: How Social Media Platforms Relate to Candidate–Constituent Interaction During Finnish 2015 Election Campaigning
2020
Interaction between candidates and constituents via social media is a well-studied domain. The article takes this research further through a synthesis with platform studies, emerging scholarship that applies a critical perspective to the role of digital platforms in society. Examination of candidate–constituent interaction via Twitter and Facebook during the 2015 Finnish parliamentary elections revealed that the types of interaction differ between the two platforms: Facebook was used for formal campaigning and for praising and expressing support, while Twitter was utilized for information and for seeking and sharing opinions. An additional finding is that interaction approaches may be plat…
Detecting Kernel Vulnerabilities During the Development Phase
2015
Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…
Exploring the critical incident technique to encourage reflection during project-based learning
2017
Previous research has reported on the challenge of promoting students' generic reflection during authentic project-based courses. This work explores a teaching intervention based on Flanagan's Critical Incident Technique (CIT) during a project-based software development course. The intervention aims at increasing students' awareness of their own learning and at encouraging reflective practice throughout the project. Students were asked to report on 'incidents' when they experienced learning during the course, and to reflect on the task itself at the end of the course. The present study focuses on how students approached the incident reporting task and how they perceived it. The results indi…
Proton shape fluctuation and its relation to DIS
2018
We review the recent progress in extracting the proton fluctuating substructure by studying exclusive processes at HERA, and the applications of these developments in the interpretation of the LHC heavy ion data. The possibilities to extract the proton geometry directly from the LHC high-multiplicity proton-nucleus and proton-proton collision data is also discussed. peerReviewed
System for Executing Encrypted Java Programs
2017
Embracing iterations in Quantum software: a vision
2022
In today’s software engineering, iterations, affordable en masse, form an important part of just about any system. However, not all computing resources are cheap to consume. In High-Performance (HPC) and Quantum Computing (QC), executions can consume considerable amounts of energy and time, which is reserved and used even if the very first steps in the process fail. This means that developers must assume a different attitude towards programming, and aim at error-free software before its execution. This is com monly facilitated using simulators, which are commonplace for both HPC and QC. However the fashion developers advance from one tool to another is ad-hoc, with no established software e…