Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
An empirical study of AI techniques in mobile applications
Journal of Systems and Software (JSSO), Volume 219, Issue Chttps://doi.org/10.1016/j.jss.2024.112233AbstractThe integration of artificial intelligence (AI) into mobile applications has significantly transformed various domains, enhancing user experiences and providing personalized services through advanced machine learning (ML) and deep learning (DL) ...
Highlights- Developed AI Discriminator, identifying 56,682 AI apps from AndroZoo.
- Analyzed AI app popularity, update trends, and market distribution.
- Examined AI framework usage and model protection across the collected AI apps.
- ...
- research-articleDecember 2024
Analysis of efficient preconditioner for solving Poisson equation with Dirichlet boundary condition in irregular three-dimensional domains
Journal of Computational Physics (JOCP), Volume 519, Issue Chttps://doi.org/10.1016/j.jcp.2024.113418AbstractThis paper analyzes modified ILU (MILU)-type preconditioners for efficiently solving the Poisson equation with Dirichlet boundary conditions on irregular domains. In [1], the second-order accuracy of a finite difference scheme developed by Gibou ...
Highlights- This study extends the analysis of the Gibou method to irregular three-dimensional domains, demonstrating second-order convergence in irregular domains.
- This section presents proof of the optimality of the MILU preconditioner, which ...
- ArticleDecember 2024
On SMC-Based Dependability Analysis in LoLiPoP-IoT Project
AbstractMany systems require certain level of dependability to fulfill their purpose in predefined conditions. To check whether such a requirement can be met, the designer of a system must use proper means to assess dependability qualitatively or ...
- research-articleOctober 2024
Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis
ESEM '24: Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and MeasurementPages 517–527https://doi.org/10.1145/3674805.3695401Context. Risk analysis assesses potential risks in specific scenarios. Risk analysis principles are context-less; the same methodology can be applied to a risk connected to health and information technology security. Risk analysis requires a vast ...
- research-articleOctober 2024
Who is holding the pen? Annotating collaborative processes
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer InteractionArticle No.: 65, Pages 1–12https://doi.org/10.1145/3679318.3685401Sketchnoting is a form of visual notetaking that we use to com- municate and unpack our design research work in collaborative settings. However, the more we rely on these sketches we find that while they provide clarity, they can also obscure ...
-
- extended-abstractOctober 2024
Analyzing User Preferences and Quality Improvement on Bing's WebPage Recommendation Experience with Large Language Models
RecSys '24: Proceedings of the 18th ACM Conference on Recommender SystemsPages 751–754https://doi.org/10.1145/3640457.3688062Explore Further @ Bing (Web Recommendations) is a web-scale query independent webpage-to-webpage recommendation system with an index size of over 200 billion webpages. Due to the significant variability in webpage quality across the web and the reliance ...
- research-articleOctober 2024
Modified LMS and NLMS algorithms with non-negative weights
AbstractNon-negative constraints arise in certain system identification problems when the systems to be identified have only positive coefficients. This paper studies the stochastic behavior of modified LMS and NLMS algorithms, modified so as to only ...
Highlights- Convergence of LMS and NLMS algorithms under non-negative weight constraints.
- At each iteration, the weight vector is projected onto the feasible space.
- The new algorithm optimally projects the weight vector onto the feasible set.
- research-articleOctober 2024
The Drill model: A renewed perspective adapted to the volatile, uncertain, complex and agile (VUCA) world to improve situation analysis and support decision-making
International Journal of Information Management: The Journal for Information Professionals (IJIM), Volume 78, Issue Chttps://doi.org/10.1016/j.ijinfomgt.2024.102786AbstractTraditional models that are dedicated to environment analysis and anticipation help deciders reinforce decision-making in both the academic and professional worlds. Nevertheless, as useful as these models are, it seems they are not effective, as ...
Highlights- The paper addresses the need for a new research approach in intelligence & strategy.
- It offers an approach to analyze situations in VUCA contexts.
- The Drill Model is comprehensive approach joining qualitative & quantitative method.
- short-paperSeptember 2024
Quality Assurance for Non-trivial Systems: Use Case GCC Plugins
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1915–1916https://doi.org/10.1145/3650212.3685557There are software systems that function without human interven- tion. Such systems work according to preset rules, algorithms, or data. In this doctoral research, we aim to explore the testing-related challenges associated with such systems with GCC ...
- research-articleSeptember 2024
A SHAP-based controversy analysis through communities on Twitter
AbstractControversy encompasses content that draws diverse perspectives, along with positive and negative feedback on a specific event, resulting in the formation of distinct user communities. we explore the explainability of controversy through the lens ...
- research-articleSeptember 2024
Exploring BI Data Transition to the Cloud: Analysis & Recommendations
CTCNet '24: Proceedings of the 2024 Asia Pacific Conference on Computing Technologies, Communications and NetworkingPages 131–136https://doi.org/10.1145/3685767.3685789The process of transitioning Business Intelligence (BI) data to cloud environments involves migrating data, on-premises BI tools, services, and to a distributed cloud-based infrastructure. The success of this transition depends on meticulous planning and ...
- ArticleJuly 2024
Formalising Analysis in Lean: Compactness and Dimensionality
AbstractThe theorem that a closed unit ball is compact if, and only if, its vector space is finite dimensional showcases how unintuitive infinite dimensional spaces can be. Many proofs skip over what’s considered obvious, leaving readers unaware of the ...
- research-articleJuly 2024
Rational gaze: Presenting the open-source HYPEtools R package for analysis, visualization, and interpretation of hydrological models and datasets
Environmental Modelling & Software (ENMS), Volume 178, Issue Chttps://doi.org/10.1016/j.envsoft.2024.106094AbstractThe open-source HYPEtools R package aims to address current challenges in hydrological modeling and data analysis by providing a suite of tools for data management, visualization, interpretation, and exploration. Originally developed as a ...
Highlights- HYPEtools is an R package for analysis and visualization of hydrological data.
- HYPEtools supports development & calibration of hydrological models such as HYPE.
- The package includes interactive features for mapping, plotting, & ...
- ArticleSeptember 2024
Legal Text Analysis Using Large Language Models
Natural Language Processing and Information SystemsPages 258–268https://doi.org/10.1007/978-3-031-70242-6_25AbstractLarge Language Models are revolutionizing legal work by automating tasks like legal research, contract review, document drafting, and generating summaries from complex legal documents, making these processes more efficient. They’re trained in ...
- research-articleJune 2024
Creativity and Ethnography: An Expansive Proposal for ’in the Wild’ Research of Ideas in Practice in Design Studios
C&C '24: Proceedings of the 16th Conference on Creativity & CognitionPages 268–279https://doi.org/10.1145/3635636.3656205A growing number of scholars are exploring ideas ‘in the wild’ and across different timescales through qualitative research, and especially ethnography. Previous controlled and lab-based studies have formalized techniques to encourage idea development ...
- short-paperJune 2024
Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringPages 442–445https://doi.org/10.1145/3661167.3661226Preliminary security risk analysis (PSRA) provides a quick approach to identify, evaluate, and propose remediation to potential risks in specific scenarios. The extensive expertise required for an effective PSRA and the substantial textual-related tasks ...
- research-articleJuly 2024
Analyzing acoustic patterns of vowel sounds produced by native Rangri speakers
International Journal of Speech Technology (SPIJST), Volume 27, Issue 2Pages 471–481https://doi.org/10.1007/s10772-024-10122-8AbstractThe foundational-cum-descriptive study aims to document Rangri vowel realizations acoustically. The Rangri is a member of the Indo-Aryan language family. Ranghar Muhajir of Pakistani Punjab and some parts of Sindh speak Rangri-a zero-resource ...
- research-articleJune 2024
Analysis of a Diffusion LMS Algorithm with Probing Delays for Cyclostationary White Gaussian and Non-Gaussian Inputs
Highlights- Behavior of the diffusion LMS algorithm is analyzed in the presence of delays in probing the unknown system.
- Cyclostationary white Gaussian and non-Gaussian nodal inputs are considered.
- The types of input distribution and the ...
The paper studies the behavior of the diffusion least mean square (DLMS) algorithm in the presence of delays in probing the unknown system by the nodes. The types of input distribution and the probing delays can be different for different nodes. ...
- articleMay 2024
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue Chttps://doi.org/10.1016/j.comnet.2024.110358AbstractFederated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling multiple parties to train a model collaboratively without sharing their data. With the upcoming Sixth Generation (6 G) era, FL is expected to adopt a more ...
TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load
EuroSys '24: Proceedings of the Nineteenth European Conference on Computer SystemsPages 942–961https://doi.org/10.1145/3627703.3629581Trace replay is a common approach for evaluating systems by rerunning historical traffic patterns, but it is not always possible to find suitable real-world traces at the desired level of system load. Experimenting with higher traffic loads requires ...