Search results for "Software engineering"

showing 10 items of 1151 documents

A Comprehensive Survey of Indoor Localization Methods Based on Computer Vision

2020

Computer vision based indoor localization methods use either an infrastructure of static cameras to track mobile entities (e.g., people, robots) or cameras attached to the mobile entities. Methods in the first category employ object tracking, while the others map images from mobile cameras with images acquired during a configuration stage or extracted from 3D reconstructed models of the space. This paper offers an overview of the computer vision based indoor localization domain, presenting application areas, commercial tools, existing benchmarks, and other reviews. It provides a survey of indoor localization research solutions, proposing a new classification based on the configuration stage…

0209 industrial biotechnologyQR codesComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologylcsh:Chemical technologyBiochemistryArticlecomputer visionAnalytical ChemistryDomain (software engineering)fiducial markers020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringComputer visionlcsh:TP1-11853D reconstructionElectrical and Electronic EngineeringInstrumentationOrientation (computer vision)business.industry3D reconstructionAtomic and Molecular Physics and Opticsindoor localizationVideo trackingRobot020201 artificial intelligence & image processingAugmented realityArtificial intelligencebusinessSensors
researchProduct

Evaluation Framework for Analyzing the Applicability of Criteria Lists for the Selection of Requirements Management Tools Supporting Distributed Coll…

2016

Effective requirements management and enabling tools are critical for successfully developing and maintaining services and products. The identification and selection of an appropriate requirements management tool can be a costly, time-consuming, and error-prone undertaking especially in the context of software product line requirements management, requiring the tools to support both product and platform development activities that often involve geographically distributed, collaborating, and competing stakeholders. Criteria lists have been developed to facilitate the selection. This research (1) creates an evaluation framework to review the applicability of the lists for the selection of req…

0209 industrial biotechnologyRequirementBusiness requirementsComputer sciencesoftware managementSoftware requirements specification02 engineering and technologySoftware peer reviewApplication lifecycle management020901 industrial engineering & automationsoftware product lines0202 electrical engineering electronic engineering information engineeringSoftware requirementsformal verificationSoftware product lineRequirements analysisVision documentta113formal specificationsoftware toolsRequirements managementRequirements traceabilitybusiness.industrySoftware as a serviceSoftware developmenthallintajärjestelmät020207 software engineeringvaatimusmäärittelytdistributed collaborationMarket requirements documentRequirement prioritizationSoftware constructiontuotekehitysohjelmistoliiketoimintaSoftware engineeringbusinessSoftware project management2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Enriching standards-based digital thread by fusing as-designed and as-inspected data using knowledge graphs

2020

Abstract Realizing the digital thread is essential for linking and orchestrating data across the product lifecycle in smart manufacturing. Linking heterogeneous lifecycle data is critical to maintain associativity and traceability in a digital thread. Recently, researchers have successfully leveraged ontology models with knowledge graphs in engineering domains for threading different lifecycle data. One of the most successful of such efforts is OntoSTEP which enables the formal capture of information embedded in the STandard for Exchange of Product model data (STEP) data representation, or ISO 10303. Meanwhile, an emerging inspection standard, called the Quality Information Framework (QIF),…

0209 industrial biotechnologyTraceabilityComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologycomputer.file_formatThread (computing)External Data Representation020901 industrial engineering & automationProduct lifecycleArtificial IntelligenceInformation model021105 building & constructionThreading (manufacturing)Software engineeringbusinessISO 10303computerQuality assuranceInformation SystemsAdvanced Engineering Informatics
researchProduct

Exploring Virtual Reality as an Integrated Development Environment for Cyber-Physical Systems

2019

Cyber Physical Systems (CPS) development approaches tend to start from the physical (hardware) perspective, and the software is the final element in the process. However, this approach is unfit for the more software-intensive world that is increasingly iterative, connected, and constantly online. Many constraints prevent the application of iterative, incremental, and agile development methodologies, which now are the norm for many other fields of software. Time-consuming system validation can only start when both hardware and software components are ready, which implies that the software delivery and quality is almost always the final bottleneck in the CPS development and integration. Also …

0209 industrial biotechnologybusiness.industryComputer scienceProcess (engineering)Integrated softwareeducationCyber-physical system020207 software engineering02 engineering and technologyVirtualizationcomputer.software_genre113 Computer and information sciencesBottleneck020901 industrial engineering & automationSoftwareComponent-based software engineering0202 electrical engineering electronic engineering information engineeringbusinessSoftware engineeringcomputerAgile software development
researchProduct

Types of Mimetics for the Design of Intelligent Technologies

2019

Mimetic design means using a source in the natural or artificial worlds as an inspiration for technological solutions. It is based around the abstraction of the relevant operating principles in a source domain. This means that one must be able to identify the correct level of analysis and extract the relevant patterns. How this should be done is based on the type of source. From a mimetic perspective, if the design goal is intelligent technology, an obvious source of inspiration is human information processing, which we have called cognitive mimetics. This article offers some conceptual clarification on the nature of cognitive mimetics by contrasting it with biomimetics in the context of in…

0209 industrial biotechnologydesign mimeticsComputer scienceContext (language use)02 engineering and technologyOntology (information science)tekoälyDomain (software engineering)intelligent technology020901 industrial engineering & automationHuman–computer interactionDesign mimeticsdesign methods0202 electrical engineering electronic engineering information engineeringDesign methodsAbstraction (linguistics)Intelligent technologyInformation processingCognitionDesign methodssuunnitteluAImimesisälytekniikka020201 artificial intelligence & image processingBiomimetics
researchProduct

DESDEO: The Modular and Open Source Framework for Interactive Multiobjective Optimization

2021

Interactive multiobjective optimization methods incorporate preferences from a human decision maker in the optimization process iteratively. This allows the decision maker to focus on a subset of solutions, learn about the underlying trade-offs among the conflicting objective functions in the problem and adjust preferences during the solution process. Incorporating preference information allows computing only solutions that are interesting to the decision maker, decreasing computation time significantly. Thus, interactive methods have many strengths making them viable for various applications. However, there is a lack of existing software frameworks to apply and experiment with interactive …

0209 industrial biotechnologylineaarinen optimointiPareto optimizationGeneral Computer Sciencemulti-criteria decision makingComputer sciencepäätöksentekoevoluutiolaskenta02 engineering and technologyData-driven multiobjective optimizationcomputer.software_genrenonlinear optimizationMulti-objective optimizationData modelingopen source softwareavoin lähdekoodi020901 industrial engineering & automationSoftwareoptimointi0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageGraphical user interfacepareto-tehokkuusbusiness.industryGeneral Engineeringinteractive methodsModular designPython (programming language)monitavoiteoptimointiTK1-9971Software frameworkdata-driven multiobjective optimizationevolutionary computation020201 artificial intelligence & image processingElectrical engineering. Electronics. Nuclear engineeringbusinessSoftware engineeringcomputerIEEE Access
researchProduct

Digital Volunteers in Disaster Response: Accessibility Challenges

2019

The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…

021110 strategic defence & security studiesEmergency managementCrisis mappingbusiness.industryComputer scienceInternet privacy0211 other engineering and technologies02 engineering and technologyAccessibilityDisaster responseCrisis mappingCrowdsourcingField (computer science)Digital humanitarian volunteersDomain (software engineering)020204 information systems0202 electrical engineering electronic engineering information engineeringCrowdsourcingSituational ethicsbusiness
researchProduct

Ensuring the Reliability of an Autonomous Vehicle

2017

International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…

021110 strategic defence & security studiesFocus (computing)021103 operations researchComputer sciencebusiness.industryDistributed computingReliability (computer networking)0211 other engineering and technologiesAutomotive industry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTask (project management)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Systems Modeling LanguageComponent (UML)Systems architectureTime constraint[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct

Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help

2016

International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…

021110 strategic defence & security studiesManagement sciencebusiness.industry020209 energy0211 other engineering and technologiesComplex systemModeling and simulation02 engineering and technologyDomain (software engineering)System dynamicsManagementModeling and simulationCritical infrastructuresIncentiveRisk analysis (engineering)0202 electrical engineering electronic engineering information engineeringInformation systemSecurity managementThe Internet[INFO]Computer Science [cs]BusinessPolicies
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct