SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Orthous Daunay Francois Regis) "

Sökning: WFRF:(Orthous Daunay Francois Regis)

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Frattini, Julian, 1995-, et al. (författare)
  • CiRA : An Open-Source Python Package for Automated Generation of Test Case Descriptions from Natural Language Requirements
  • 2023
  • Ingår i: Proceedings - 31st IEEE International Requirements Engineering Conference Workshops, REW 2023. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350326918 ; , s. 68-71
  • Konferensbidrag (refereegranskat)abstract
    • Deriving acceptance tests from high-level, natural language requirements that achieve full coverage is a major manual challenge at the interface between requirements engineering and testing. Conditional requirements (e.g., 'If A or B then C.') imply causal relationships which - when extracted - allow to generate these acceptance tests automatically. This paper presents a tool from the CiRA (Causality In Requirements Artifacts) initiative, which automatically processes conditional natural language requirements and generates a minimal set of test case descriptions achieving full coverage. We evaluate the tool on a publicly available data set of 61 requirements from the requirements specification of the German Corona-Warn-App. The tool infers the correct test variables in 84.5% and correct variable configurations in 92.3% of all cases, which corroborates the feasibility of our approach. © 2023 IEEE.
  •  
2.
  • Kruegel, Christoffer, et al. (författare)
  • FORWARD -- Second Workshop Report
  • 2009
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This deliverable summarizes the activity of the second FORWARDworkshop. Thisworkshop constituted the end of the second phase of the project. The aim of thissecond phase was to establish a number of working groups; each working grouphad to identify a number of emerging threats in their respective areas (malware andfraud, smart environments, and critical systems). These threats were summarizedin three threat reports (Deliverable D2.1.x), one per working group. The goal ofthe second workshop was to checkpoint and critically review the work that hasbeen done in the working groups, in particular, the threat reports. More precisely,each working group should present their threats to a larger audience comprisedof experts. In discussions and presentations, we wanted to make sure that thelists of threats are comprehensive – that is, each working group has identified allmajor threats in their respective areas. Moreover, we wanted to use the workshopto establish an initial ranking for the threats presented by each working group.Clearly, at one point, it is necessary to prioritize threats and focus the attention onthose that present the largest threat potential to ICT infrastructures and the societyat large. Of course, the assessment of the danger that each threat poses, as wellas an analysis of inter-dependencies among threats, is a focus of the third projectphase (which is to be completed by the end of the year). However, we attemptedto leverage the presence of a large amount of domain experts to obtain an initialranking that would combine and reflect the viewpoints of a large audience.For the second workshop, we decided to invite a number of selected speakersthat would give presentations at the beginning of the workshop on the first dayand later during the second day. The talks set a framework in which the detailedtechnical discussions about the individual threat reports could take place. For thesediscussions, the attendees would first break into working group sessions to performthe necessary review of the threats that each group had defined. Then, in a next step,the outcome of each discussion was presented to the audience at large. This twostepprocess served two purposes. First, in the actual discussion sessions, we hadless people involved. Thismade the discussion process manageable and interactive.In the second step, we presented our findings in a succinct fashion to the whole audience. This allowed everybody who participated in the first discussion round toensure that their opinions were correctly reflected. In addition, it allowed peoplethat were present in other working group discussions to see what other groups did,and to provide feedback.According to Annex 1, a total of 60 attendees was considered to be the thresholdfor a successful workshop. This threshold was significantly exceeded, witha total of 103 attendees. This clearly demonstrates the significant interest andparticipation to the FORWARD working groups and workshops. Moreover, nonacademicparticipation remains to be strong. 39 attendees (37.8% of the participants)came from industry or policy-making institutions.In this document, we first summarize the three working group discussions thatwere held during the two-day workshop. In addition to the discussion sessions, atotal of 11 talks were given in the form of plenary talks and keynotes. Moreover,we had 7 five-minute work-in-progress talks. These talks are summarized in thesubsequent chapter. Finally, we discuss the conclusions that the consortium hasdrawn from the workshop, and we briefly outline the future actions that we plan totake in the subsequent, third phase of the project.
  •  
3.
  • Schultze, Ulrike (författare)
  • Performing embodied identity in virtual worlds
  • 2014
  • Ingår i: European Journal of Information Systems. - : Informa UK Limited. - 0960-085X .- 1476-9344. ; 23:1, s. 84-95
  • Tidskriftsartikel (refereegranskat)abstract
    • Embodied identity, that is, who we are as a result of our interactions with the world around us with and through our bodies, is increasingly challenged in online environments where identity performances are seemingly untethered from the user's body that is sitting at the computer. Even though disembodiment has been severely criticized in the literature, most conceptualizations of the role of users' bodies in virtuality nevertheless reflect a representational logic, which fails to capture contemporary users' experience of cyborgism. Relying on data collected from nine entrepreneurs in the virtual world Second Life (SL), this paper asks how embodied identity is performed in virtual worlds. Contrasting representationalism with performativity, this study highlights that the SL entrepreneurs intentionally re-presented in their avatars some of the attributes of physical bodies, but that they also engaged in habitual practices in-world, thereby unconsciously enacting embodied identities in both their 'real' and virtual lives.
  •  
4.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy