Results for 'Automated software testing'

990 found
Order:
  1.  38
    Model-based abductive reasoning in automated software testing.N. Angius - 2013 - Logic Journal of the IGPL 21 (6):931-942.
    Automated Software Testing (AST) using Model Checking is in this article epistemologically analysed in order to argue in favour of a model-based reasoning paradigm in computer science. Preliminarily, it is shown how both deductive and inductive reasoning are insufficient to determine whether a given piece of software is correct with respect to specified behavioural properties. Models algorithmically checked in Model Checking to select executions to be observed in Software Testing are acknowledged as analogical models (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  2.  21
    Automated Test Data Generation Using Cuckoo Search and Tabu Search (CSTS) Algorithm.Suhas Santebennur Ranganatha, Sanjay Kumar, Shobhit Khandelwal, Rahul Khandelwal & Praveen Ranjan Srivastava - 2012 - Journal of Intelligent Systems 21 (2):195-224.
    . Software testing is a very important phase in the development of software. Testing includes the generation of test cases which, if done manually, is time consuming. To automate this process and generate optimal test cases, several meta-heuristic techniques have been developed. These approaches include genetic algorithm, cuckoo search, tabu search, intelligent water drop, etc. This paper presents an effective approach for test data generation using the cuckoo search and tabu search algorithms. It combines the cuckoo (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  1
    ROoST: Reference Ontology on Software Testing.Érica Ferreira de Souza, Ricardo de Almeida Falbo & Nandamudi Lankalapali Vijaykumar - 2017 - Applied ontology 12 (1):59-90.
    Software testing is a complex and critical process for achieving product quality. Its importance has been increasing and well recognized, and there is a growing concern in improving the accomplishm...
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  50
    The Deskilling of Teaching and the Case for Intelligent Tutoring Systems.James Hughes - 2022 - Journal of Ethics and Emerging Technologies 31 (2):1-16.
    This essay describes trends in the organization of work that have laid the groundwork for the adoption of interactive AI-driven instruction tools, and the technological innovations that will make intelligent tutoring systems truly competitive with human teachers. Since the origin of occupational specialization, the collection and transmission of knowledge have been tied to individual careers and job roles, specifically doctors, teachers, clergy, and lawyers, the paradigmatic knowledge professionals. But these roles have also been tied to texts and organizations that can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5. The ethics of software testing.Dale Hites - 1999 - Journal of Information Ethics 8 (1):63-71.
     
    Export citation  
     
    Bookmark  
  6.  69
    The Problem of Justification of Empirical Hypotheses in Software Testing.Nicola Angius - 2014 - Philosophy and Technology 27 (3):423-439.
    This paper takes part in the methodological debate concerning the nature and the justification of hypotheses about computational systems in software engineering by providing an epistemological analysis of Software Testing, the practice of observing the programs’ executions to examine whether they fulfil software requirements. Property specifications articulating such requirements are shown to involve falsifiable hypotheses about software systems that are evaluated by means of tests which are likely to falsify those hypotheses. Software Reliability metrics, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  7. Real-Life Applications Based on Knowledge Technology-Attribute Reduction Based Expected Outputs Generation for Statistical Software Testing.Mao Ye, Boqin Feng, Li Zhu & Yao Lin - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 786-791.
     
    Export citation  
     
    Bookmark  
  8.  22
    Automatic Facial Expression Recognition in Standardized and Non-standardized Emotional Expressions.Theresa Küntzler, T. Tim A. Höfling & Georg W. Alpers - 2021 - Frontiers in Psychology 12:627561.
    Emotional facial expressions can inform researchers about an individual's emotional state. Recent technological advances open up new avenues to automatic Facial Expression Recognition (FER). Based on machine learning, such technology can tremendously increase the amount of processed data. FER is now easily accessible and has been validated for the classification of standardized prototypical facial expressions. However, applicability to more naturalistic facial expressions still remains uncertain. Hence, we test and compare performance of three different FER systems (Azure Face API, Microsoft; Face++, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  10
    Automated Test Assembly for Multistage Testing With Cognitive Diagnosis.Guiyu Li, Yan Cai, Xuliang Gao, Daxun Wang & Dongbo Tu - 2021 - Frontiers in Psychology 12.
    Computer multistage adaptive test combines the advantages of paper and pencil-based test and computer-adaptive test. As CAT, MST is adaptive based on modules; as P&P, MST can meet the need of test developers to manage test forms and keep test forms parallel. Cognitive diagnosis can accurately measure students’ knowledge states and provide diagnostic information, which is conducive to student’s self-learning and teacher’s targeted teaching. Although MST and CD have a lot of advantages, many factors prevent MST from applying to CD. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  18
    Automated facial coding software outperforms people in recognizing neutral faces as neutral from standardized datasets.Peter Lewinski - 2015 - Frontiers in Psychology 6.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11.  10
    Construct Validity and Test–Retest Reliability of the Automated Vehicle User Perception Survey.Justin Mason, Sherrilene Classen, James Wersal & Virginia Sisiopiku - 2021 - Frontiers in Psychology 12:626791.
    Fully automated vehicles (AVs) hold promise toward providing numerous societal benefits including reducing road fatalities. However, we are uncertain about how individuals’ perceptions will influence their ability to accept and adopt AVs. The 28-item Automated Vehicle User Perception Survey (AVUPS) is a visual analog scale that was previously constructed, with established face and content validity, to assess individuals’ perceptions of AVs. In this study, we examined construct validity, via exploratory factor analysis and subsequent Mokken scale analyses. Next, internal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  3
    AI-Driven Test Automation for Healthcare Data Warehousing Projects.Arun Kumar Ramachandran Sumangala Devi - forthcoming - Evolutionary Studies in Imaginative Culture:348-354.
    Healthcare data warehousing test automation is becoming a success through the help of AI-based technology that results in accuracy, efficiency, and data integrity on the automated test. The one central to personalized patient data that forms the core of traditional data warehousing solutions frequently faces problems of complexity and dissatisfaction. Deep learning with test automation solutions makes data ingestion, processing, and testing conversant through machine learning algorithms [1]. These systems encompass separate acts such as testing for data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  34
    Automation and design for prevention: Fictional accounts of misanthropic agency from the elevator (lift) to the sexbot (chatbot).Amanda Windle - 2014 - Technoetic Arts 12 (1):91-106.
    Fiction is an important tool in an artist/designer/developer’s vocabulary, but its usage is polyvalent. Speculative research in this article introduces the ‘rudiment’ to embrace the undeveloped and the improvisory phases of research practice. Fiction is used to reflect on the ways practicing designers and developers might already engage in misanthropic thinking – involving automated technologies. Tracing the misanthropic agencies in relation to automated technologies contributes to expanding the ways designers and developers reflect on the technical potential of their (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. " New, Improved, Comprehensive, and Automated Driver's License Test and Vision Screening System".Sandy H. Straus - 2002 - Journal of Experimental Psychology 11:122-132.
     
    Export citation  
     
    Bookmark  
  15.  10
    Software Blueprints: Lightweight Uses of Logic in Conceptual Modelling.David S. Robertson & Jaume Agustí - 1999 - Addison-Wesley Professional.
    Conceptual models are descriptions of our ideas about a problem, used to shape the implementation of a solution to it. Everyone who builds complex information systems uses such models - be they requirements analysts, knowledge modellers or software designers - but understanding of the pragmatics of model design tends to be informal and parochial. Lightweight uses of logic can add precision without destroying the intuitions we use to interpret our descriptions. Computing with logic allows us to make use of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   33 citations  
  17.  7
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti (eds.), Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  26
    Automated informed consent.Adam Andreotta & Bjorn Lundgren - 2024 - Big Data and Society 11 (4).
    Online privacy policies or terms and conditions ideally provide users with information about how their personal data are being used. The reality is that very few users read them: they are long, often hard to understand, and ubiquitous. The average internet user cannot realistically read and understand all aspects that apply to them and thus give informed consent to the companies who use their personal data. In this article, we provide a basic overview of a solution to the problem. We (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. The automation of science.Ross King, Rowland D., Oliver Jem, G. Stephen, Michael Young, Wayne Aubrey, Emma Byrne, Maria Liakata, Magdalena Markham, Pinar Pir, Larisa Soldatova, Sparkes N., Whelan Andrew, E. Kenneth & Amanda Clare - 2009 - Science 324 (5923):85-89.
    The basis of science is the hypothetico-deductive method and the recording of experiments in sufficient detail to enable reproducibility. We report the development of Robot Scientist "Adam," which advances the automation of both. Adam has autonomously generated functional genomics hypotheses about the yeast Saccharomyces cerevisiae and experimentally tested these hypotheses by using laboratory automation. We have confirmed Adam's conclusions through manual experiments. To describe Adam's research, we have developed an ontology and logical language. The resulting formalization involves over 10,000 different (...)
     
    Export citation  
     
    Bookmark   13 citations  
  20.  5
    Influence of open-source software on Bangladesh academic library service sustainability: a conceptual framework.Nur Ahammad, Farrah Diana Saiful Bahry & Haslinda Hussaini - 2024 - Journal of Information, Communication and Ethics in Society 22 (3):293-320.
    Purpose This research aims to develop a conceptual framework that explores the influence of open-source software (OSS) on the sustainability of library services within the context of academic libraries in Bangladesh. Design/methodology/approach The study uses a comprehensive research methodology that includes literature review and analysis to construct a robust conceptual framework. This study investigates the various dimensions of OSS adoption and its impact on library service sustainability. Findings The research findings reveal the critical factors and mechanisms through which OSS (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  54
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  22. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  23.  35
    Ethics-based auditing of automated decision-making systems: intervention points and policy implications.Jakob Mökander & Maria Axente - 2023 - AI and Society 38 (1):153-171.
    Organisations increasingly use automated decision-making systems (ADMS) to inform decisions that affect humans and their environment. While the use of ADMS can improve the accuracy and efficiency of decision-making processes, it is also coupled with ethical challenges. Unfortunately, the governance mechanisms currently used to oversee human decision-making often fail when applied to ADMS. In previous work, we proposed that ethics-based auditing (EBA)—that is, a structured process by which ADMS are assessed for consistency with relevant principles or norms—can (a) help (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  66
    Software-realized inquiry support for cultivatig a disciplinary stance.Iris Tabak & Brian J. Reiser - 2008 - Pragmatics and Cognition 16 (2):307-355.
    What role can technology play in cultivating a disciplinary stance — raising questions, planning investigations, interpreting data and constructing explanations in a way that reflects disciplinary values and principles? How can overt and tacit expert scientific knowledge be captured, represented and used to design software that enables novices to assume a disciplinary stance in their investigations? We present The Galapagos Finches software designed to foster a biological and evolutionary stance. Our approach, Discipline-Specific Strategic Support , translates the main (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  25.  61
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  26.  27
    Automating petition classification in Brazil’s legal system: a two-step deep learning approach.Yuri D. R. Costa, Hugo Oliveira, Valério Nogueira, Lucas Massa, Xu Yang, Adriano Barbosa, Krerley Oliveira & Thales Vieira - forthcoming - Artificial Intelligence and Law.
    Automated classification of legal documents has been the subject of extensive research in recent years. However, this is still a challenging task for long documents, since it is difficult for a model to identify the most relevant information for classification. In this paper, we propose a two-stage supervised learning approach for the classification of petitions, a type of legal document that requests a court order. The proposed approach is based on a word-level encoder–decoder Seq2Seq deep neural network, such as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  31
    Human Observers and Automated Assessment of Dynamic Emotional Facial Expressions: KDEF-dyn Database Validation.Manuel G. Calvo, Andrés Fernández-Martín, Guillermo Recio & Daniel Lundqvist - 2018 - Frontiers in Psychology 9:397727.
    Most experimental studies of facial expression processing have used static stimuli (photographs), yet facial expressions in daily life are generally dynamic. In its original photographic format, the Karolinska Directed Emotional Faces (KDEF) has been frequently utilized. In the current study, we validate a dynamic version of this database, the KDEF-dyn. To this end, we applied animation between neutral and emotional expressions (happy, sad, angry, fearful, disgusted, and surprised; 1,033-ms unfolding) to 40 KDEF models, with morphing software. Ninety-six human observers (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  28.  47
    Developing Automated Deceptions and the Impact on Trust.Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf - 2015 - Philosophy and Technology 28 (1):91-105.
    As software developers design artificial agents , they often have to wrestle with complex issues, issues that have philosophical and ethical importance. This paper addresses two key questions at the intersection of philosophy and technology: What is deception? And when is it permissible for the developer of a computer artifact to be deceptive in the artifact’s development? While exploring these questions from the perspective of a software developer, we examine the relationship of deception and trust. Are developers using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  29. Labor automation for fair cooperation: Why and how machines should provide meaningful work for all.Denise Celentano - 2023 - Journal of Social Philosophy (1):1-19.
    The article explores the problem of preferable technological changes in the context of work. To this end, it addresses the ‘why’ (motives and values) and the ‘how’ (organizational forms) of automation from a normative perspective. Concerning the ‘why,’ automation processes are currently mostly driven by values of economic efficiency. Yet, since automation processes are part of the basic structure of society, as is the division of labor, considerations of justice apply to them. As for the ‘how,’ the article suggests ‘fair (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Tools for Program Development and Analysis in Computational Science-A Performance Profile and Test Tool for Development of Embedded Software Using Various Report Views.Yongyun Cho & Chae-Woo Yoo - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3992--510.
  31.  10
    Automation Bias and Procedural Fairness: A Short Guide for the UK Civil Service.John Zerilli, Iñaki Goñi & Matilde Masetti Placci - 2024 - Braid Reports.
    The use of advanced AI and data-driven automation in the public sector poses several organisational, practical, and ethical challenges. One that is easy to underestimate is automation bias, which, in turn, has underappreciated legal consequences. Automation bias is an attitude in which the operator of an autonomous system will defer to its outputs to the point where the operator overlooks or ignores evidence that the system is failing. The legal problem arises when statutory office-holders (or their employees) either fetter their (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  62
    A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.M. A. Mizani & N. Baykal - 2007 - Journal of Medical Ethics 33 (12):695-698.
    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to simulate different access levels (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34.  20
    Being Nice to Software Animals and Babies.Anders Sandberg - 2014 - In Russell Blackford & Damien Broderick (eds.), Intelligence Unbound. Wiley. pp. 279–297.
    A brain emulation would be a one‐to‐one simulation where every causal process in the brain is represented, behaving in the same way as the original. Opponents of animal testing often argue that much of it is unnecessary and could be replaced with simulations. Personal identity is going to be a major issue with brain emulations, both because of the transition from an original unproblematic single human identity to successor identity/identities that might or might not be the same, and because (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  18
    Tests and Proofs: 17th International Conference, TAP 2023, Leicester, UK, July 18–19, 2023, Proceedings.Virgile Prevosto & Cristina Seceleanu (eds.) - 2023 - Springer Nature Switzerland.
    This book constitutes the proceedings of the 17th International Conference, TAP 2023, as part of STAF 2023, a federation of conferences on Software Technologies, Applications and Foundations, which includes two more conferences besides TAP: ICGT (International Conference on Graph Transformations), and ECMFA (European Conference on Modelling Foundations and Applications) in Leicester, UK, in July 2023. The 8 full papers together with 2 short papers included in this volume were carefully reviewed and selected from 14 submissions. They were organized in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  57
    Trade Liberalization, Corruption, and Software Piracy.Christopher Robertson, K. M. Gilley & William F. Crittenden - 2008 - Journal of Business Ethics 78 (4):623-634.
    As multinational firms explore new and promising national markets two of the most crucial elements in the strategic decision regarding market-entry are the level of corruption and existing trade barriers. One form of corruption that is crucially important to firms is the theft of intellectual property. In particular, software piracy has become a hotly debated topic due to the deep costs and vast levels of piracy around the world. The purpose of this paper is to assess how laissez-faire trade (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37. “How to Pay for a Post-Work World: Automation and Collective Property.".John K. Davis - 2024 - In Kory P. Schaff, Michael Cholbi, Jean-Phillipe Deranty & Denise Celentano (eds.), _Debating a Post-Work Future: Perspectives from Philosophy and the Social Sciences_. New York, NY, USA: Routledge.
    A “post-work world” can mean a couple of things. First, it can mean a world where we attach less importance to work, restructure work so that tasks and authority are distributed more equitably, and otherwise decenter and reform the world of work. Second, it can mean a world where people are no longer working because robots, artificial intelligence, and other forms of automation have replaced humans and there are no longer enough jobs for everyone. This paper is about the second (...)
    No categories
     
    Export citation  
     
    Bookmark  
  38. Software Immortals—Science or Faith?Diane Proudfoot - 2012 - In Amnon H. Eden & James H. Moor (eds.), Singularity Hypotheses: A Scientific and Philosophical Assessment. Springer. pp. 367-389.
    According to the early futurist Julian Huxley, human life as we know it is ‘a wretched makeshift, rooted in ignorance’. With modern science, however, ‘the present limitations and miserable frustrations of our existence could be in large measure surmounted’ and human life could be ‘transcended by a state of existence based on the illumination of knowledge’ (1957b, p. 16).
    No categories
     
    Export citation  
     
    Bookmark   6 citations  
  39. Iudicium ex Machinae – The Ethical Challenges of Automated Decision-Making in Criminal Sentencing.Frej Thomsen - 2022 - In Julian Roberts & Jesper Ryberg (eds.), Principled Sentencing and Artificial Intelligence. Oxford University Press.
    Automated decision making for sentencing is the use of a software algorithm to analyse a convicted offender’s case and deliver a sentence. This chapter reviews the moral arguments for and against employing automated decision making for sentencing and finds that its use is in principle morally permissible. Specifically, it argues that well-designed automated decision making for sentencing will better approximate the just sentence than human sentencers. Moreover, it dismisses common concerns about transparency, privacy and bias as (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  11
    Comparing Text-Matching Software Systems Using the Document Set in the Latvian Language.Laima Kamzola & Alla Anohina-Naumeca - 2020 - Journal of Academic Ethics 18 (2):129-141.
    There are many internationally developed text-matching software systems that help successfully identify potentially plagiarized content in English texts using both their internal databases and web resources. However, many other languages are not so widely spread but they are used daily to communicate, conduct research and acquire education. Each language has its peculiarities, so, in the context of finding content similarities, it is necessary to determine what systems are more suitable for a document set written in a specific language. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  49
    Computational Idealizations in Software Intensive Science: a Comment on Symons’ and Horner’s paper.Nicola Angius - 2014 - Philosophy and Technology 27 (3):479-484.
    This commentary on John Symons’ and Jack Horner’s paper, besides sharing its main argument, challenges the authors’ statement that there is no effective method to evaluate software-intensive systems as a distinguishing feature of software intensive science. It is underlined here how analogous methodological limitations characterise the evaluations of empirical systems in non-software intensive sciences. The authors’ claim that formal methods establish the correctness of computational models rather than of the represented programme is here compared with the empirical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  22
    An Architecture Paradigm for Providing Cloud Services in School Labs Based on Open Source Software to Enhance ICT in Education.Yannis Siahos, Iasonas Papanagiotou, Alkis Georgopoulos, Fotis Tsamis & Ioannis Papaioannou - 2012 - International Journal of Cyber Ethics in Education 2 (1):44-57.
    The authors present their experience and practices of introducing cloud services, as a means to simplify the adoption of ICT in education, using Free/Open Source Software. The solution creates a hybrid cloud infrastructure, in order to provide a pre-installed virtual machine, acting as a server inside the school, providing desktop environment based on the Software as a Service cloud model, where legacy PCs act as stateless devices. Classroom management is accomplished using the application “Epoptes.” To minimize administration tasks, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  66
    Unsupervised and supervised text similarity systems for automated identification of national implementing measures of European directives.Rohan Nanda, Giovanni Siragusa, Luigi Di Caro, Guido Boella, Lorenzo Grossio, Marco Gerbaudo & Francesco Costamagna - 2019 - Artificial Intelligence and Law 27 (2):199-225.
    The automated identification of national implementations of European directives by text similarity techniques has shown promising preliminary results. Previous works have proposed and utilized unsupervised lexical and semantic similarity techniques based on vector space models, latent semantic analysis and topic models. However, these techniques were evaluated on a small multilingual corpus of directives and NIMs. In this paper, we utilize word and paragraph embedding models learned by shallow neural networks from a multilingual legal corpus of European directives and national (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  64
    Information modeling aspects of software development.Timothy R. Colburn - 1998 - Minds and Machines 8 (3):375-393.
    The distinction between the modeling of information and the modeling of data in the creation of automated systems has historically been important because the development tools available to programmers have been wedded to machine oriented data types and processes. However, advances in software engineering, particularly the move toward data abstraction in software design, allow activities reasonably described as information modeling to be performed in the software creation process. An examination of the evolution of programming languages and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  20
    Automated Multiclass Artifact Detection in Diffusion MRI Volumes via 3D Residual Squeeze-and-Excitation Convolutional Neural Networks.Nabil Ettehadi, Pratik Kashyap, Xuzhe Zhang, Yun Wang, David Semanek, Karan Desai, Jia Guo, Jonathan Posner & Andrew F. Laine - 2022 - Frontiers in Human Neuroscience 16.
    Diffusion MRI is widely used to investigate neuronal and structural development of brain. dMRI data is often contaminated with various types of artifacts. Hence, artifact type identification in dMRI volumes is an essential pre-processing step prior to carrying out any further analysis. Manual artifact identification amongst a large pool of dMRI data is a highly labor-intensive task. Previous attempts at automating this process are often limited to a binary classification of the dMRI volumes or focus on detecting a single type (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. The Automated Laplacean Demon: How ML Challenges Our Views on Prediction and Explanation.Sanja Srećković, Andrea Berber & Nenad Filipović - 2021 - Minds and Machines 32 (1):159-183.
    Certain characteristics make machine learning a powerful tool for processing large amounts of data, and also particularly unsuitable for explanatory purposes. There are worries that its increasing use in science may sideline the explanatory goals of research. We analyze the key characteristics of ML that might have implications for the future directions in scientific research: epistemic opacity and the ‘theory-agnostic’ modeling. These characteristics are further analyzed in a comparison of ML with the traditional statistical methods, in order to demonstrate what (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  21
    Automatic Generation and Optimization of Test case using Hybrid Cuckoo Search and Bee Colony Algorithm.T. V. SureshKumar & P. Lakshminarayana - 2020 - Journal of Intelligent Systems 30 (1):59-72.
    Software testing is a very important technique to design the faultless software and takes approximately 60% of resources for the software development. It is the process of executing a program or application to detect the software bugs. In software development life cycle, the testing phase takes around 60% of cost and time. Test case generation is a method to identify the test data and satisfy the software testing criteria. Test case generation (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  22
    Cross-cultural adaptation and initial validation of the Brazilian-Portuguese version of the pediatric automated neuropsychological assessment metrics.Jaqueline Cristina de Amorim, Simone Thiemi Kishimoto, Cibele Longobardi Cutinhola Elorza, Flávia Alegretti Cavaletti, Roberto Marini, Clovis Artur Silva, Claudia Saad-Magalhães, Paula Teixeira Fernandes, Hermine I. Brunner & Simone Appenzeller - 2022 - Frontiers in Psychology 13:945425.
    Automated neuropsychiatric batteries have been used in research and clinical practice, including for chronic diseases, such as Systemic Lupus Erythematosus. The Pediatric Automated Neuropsychological Assessment Metrics battery, originally developed for use in American-English speaking individuals, allows tracking of cognitive functions. It can be applied to people over 9 years old. The aim of this study was to translate and present initial validation data from the Ped-ANAM into Brazilian-Portuguese. We translated the battery according to Beaton’s guidelines. Psychometric properties were (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Patient Perceptions on the Advancement of Noninvasive Prenatal Testing for Sickle Cell Disease among Black Women in the United States.Shameka P. Thomas, Faith E. Fletcher, Rachele Willard, Tiara Monet Ranson & Vence L. Bonham - 2024 - AJOB Empirical Bioethics 15 (2):154-163.
    Background Noninvasive prenatal testing (NIPT) designed to screen for fetal genetic conditions, is increasingly being implemented as a part of routine prenatal care screening in the United States (US). However, these advances in reproductive genetic technology necessitate empirical research on the ethical and social implications of NIPT among populations underrepresented in genetic research, particularly Black women with sickle cell disease (SCD).Methods Forty (N = 40) semi-structured interviews were conducted virtually with Black women in the US (19 participants with SCD; (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  47
    Administrative due process when using automated decision-making in public administration: some notes from a Finnish perspective.Markku Suksi - 2020 - Artificial Intelligence and Law 29 (1):87-110.
    Various due process provisions designed for use by civil servants in administrative decision-making may become redundant when automated decision-making is taken into use in public administration. Problems with mechanisms of good government, responsibility and liability for automated decisions and the rule of law require attention of the law-maker in adapting legal provisions to this new form of decision-making. Although the general data protection regulation of the European Union is important in acknowledging automated decision-making, most of the legal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 990