- Advanced Software Engineering Methodologies
- Software Engineering Techniques and Practices
- Service-Oriented Architecture and Web Services
- Usability and User Interface Design
- Software Engineering Research
- Software System Performance and Reliability
- Business Process Modeling and Analysis
- Personal Information Management and User Behavior
- Multi-Agent Systems and Negotiation
- Access Control and Trust
- Model-Driven Software Engineering Techniques
- Blockchain Technology Applications and Security
- AI-based Problem Solving and Planning
- Data Visualization and Analytics
- IoT and Edge/Fog Computing
- Human-Automation Interaction and Safety
- Persona Design and Applications
- Robotic Process Automation Applications
- Knowledge Management and Sharing
- Information Architecture and Usability
- Complex Network Analysis Techniques
- Information Systems Theories and Implementation
- Music Technology and Sound Studies
- Reinforcement Learning in Robotics
- Data Stream Mining Techniques
Philadelphia University
2020
New York Proton Center
2020
Software602 (Czechia)
2019
Software (Germany)
2019
University of Virginia
2018
IBM (United States)
2007
U.S. National Science Foundation
2006
Verizon (United States)
2005
AT&T (United States)
2001
University of California, San Diego
1983
Human-Computer Integration (HInt) is an emerging paradigm in which computational and human systems are closely interwoven. Integrating computers with the body not new. however, we believe that rapid technological advancements, increasing real-world deployments, growing ethical societal implications, it critical to identify agenda for future research. We present a set of challenges HInt research, formulated over course five-day workshop consisting 29 experts who have designed, deployed...
Our analyses of the activities performed by users computer systems show complex patterns interleaved activities. Current human - interfaces provide little support for kinds problems encounter when attempting to accomplish several different tasks in a single session. In this paper we develop framework discussing characteristics activities, terms activity structures, and number conceptual guidelines developing an interface which supports coordination. The concept workspace is introduced as...
Different communication media create different shopping experiences, e.g., the phone vs. web. In this study, we examined early formation of trust and likelihood that a shopper will return to website for subsequent purchases. Consumers were asked select blender as gift someone they knew using one four types user interfaces: (1) standard web interface with no audio or real time interpersonal communication, (2) text descriptions products, (3) augmented Instant Messaging ability sales agent push...
Research issues related to requirements modeling are introduced and discussed through a review of the language RML, its peers successors from time it was first proposed at Sixth International Conference on Software Engineering (ICSE-6) present - ten ICSEs later. We note that central theme "Capturing More World Knowledge" in original RML proposal is becoming increasingly important engineering. The paper highlights key ideas research have driven peers, evaluates them retrospectively context...
Purpose The purpose of this paper is to introduce and illustrate the importance uncovering tacit perceptions during knowledge management (KM) audit, in order identify cultural barriers that may interfere with KM initiatives. goal such initiatives leverage a firm's capacity efficiently produce value from held by employees embedded processes. Current audit practices analyze explicit information gained through interviews questionnaires, focusing on organization's culture, existing processes...
Preserving privacy in machine learning on multi-party data is of importance to many domains. In practice, existing solutions suffer from several critical limitations, such as significantly reduced utility under constraints or excessive communication burden between the information fusion center and local providers. this paper, we propose implement a new distributed deep framework that addresses these shortcomings preserves more efficiently than previous methods. During stochastic gradient...
Information system security and privacy, once narrow topics primarily of interest to IS designers, have become critically important society at large. The scope associated challenges applications is broadening accordingly, leading new requirements approaches. networks are evolving into more open dynamic systems. Security privacy enforcement problematic in these systems due the lack a common understanding information as well user unpredictability. Shared ontologies, declarative policies, trust...
Traditionally, if someone did some act that required forgiveness, there were social norms in place for such forgiveness to happen. Over time, the is also typically forgotten. And, should person not be forgiven and pressure become too great, he had option of moving a new location fresh start. Yet with Internet, these options are no longer available. Worse, activities which traditionally even require now impacting lives unexpected ways, never There are, however, technical approaches could...
Decision structures have been proposed in a number of contexts an knowledge-based software engineering as important mechanism for recording and reasoning about the information needed to make decisions during lifecycle. We apply decision new domain, namely that business rules enterprise. Given dynamic nature rules, are seen be appropriate framework record evolve rules. The paper describes how combine within conceptual modeling framework. An architecture is presented addresses throughout...
The authors propose that an environment for defining services must be domain-specific (as opposed to a general-purpose programming environment). cornerstone of such is explicit model the network-services domain. This domain captures object universe both network capabilities and user (e.g., line, call, customer), within which are defined. A framework object-oriented conceptual modeling applies knowledge representation techniques from artificial intelligence proposed as basis. In this...
article Free Access Share on On the role of domain knowledge-based approaches to software development Author: S Greenspan View Profile Authors Info & Claims ACM SIGSOFT Software Engineering NotesVolume 11Issue 4August 1986 pp 34–36https://doi.org/10.1145/12944.12951Online:01 August 1986Publication History 11citation105DownloadsMetricsTotal Citations11Total Downloads105Last 12 Months3Last 6 weeks0 Get Citation AlertsNew Alert added!This alert has been successfully added and will be sent...
Trust in data collected by and passing through Internt of Things (IoT) networks is paramount. The quality decisions made based on this highly dependent upon the accuracy data. Currently, most trust assessment methodologies assume that follows a stationary Gaussian distribution. Often, score estimated deviation from However, underlying state system monitored an IoT network can change over time, may not consistently follow Further, faults occur within distribution go undetected. In study, we...
Organisations today have no reliable way of ensuring that all employees are aware information may be relevant to their work. In this paper we report on a 2-year project in which iteratively designed, developed and tested knowledge discovery system (KnowDis) for organizations. Early stages our study revealed that, do not know what is available the corporate intranet, or files messages they stored. KnowDis proactively fetches displays it an unobtrusive form; increases employee awareness...
We study complex work environments to enable innovative improvements. In this paper we report on a technique have created depict the of operators in IT operations control centers, developed after 3-day field large center. Because security issues and tight time constraints operators' work, environment is not accessible software teams. The Day-in-the-life scenario, which extends personas scenarios. scenario has two forms: narrative, diagram. Our narrative captures typical daily events life...
Managers and operators of modern enterprise IT environments are faced with the daunting task monitoring hundreds thousands interconnected elements, from individual hardware components virtualized applications, to logical business services. Research results [1] anecdotal evidence network administrators indicate that common visualization techniques used represent networks do not scale well for large dynamic viewers can suffer information overload. We interviewed managers an environment...
Over The Last decade, new software processes have appeared that emphasize collaboration among people involved in creating successful software. For example, agile methods stress between development teams and business clients, 1 DevOps emphasizes better deployment teams.