A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A News Verification Browser for the Detection of Clickbait, Satire, and Falsified News
2019
Journal of Open Source Software
Detection of falsified news articles Rubin & Conroy, 2012) . Each is implemented as a separate overlay option through three tabs at the bottom right of the browser. ...
The News Verification Browser is a research tool -not a replacement for a day-to-day web browser. It should not be used where security is critical. ...
doi:10.21105/joss.01208
fatcat:odrgzpwajnek7cwnigvazwvliu
Falsificationism and Software Engineering
1999
Annals of the Japan Association for Philosophy of Science
In any ways, Popper admits that falsifiability is not a sharp logical criterion. Cf., LSD, p. ...
Pressman, Software Engineering, New York: McGraw-Hill, 3rd ed., 1992, p. 597.) , there is an asymmetry of verification and falsification in software, which is adduced by Popper as an argument for falsifiability ...
doi:10.4288/jafpos1956.9.165
fatcat:k52v6zvdqbf2dmoz5y6iop55eq
Empirical analyses of the factors affecting confirmation bias and the effects of confirmation bias on software developer/tester performance
2010
Proceedings of the 6th International Conference on Predictive Models in Software Engineering - PROMISE '10
Moreover, the results of the analysis to investigate the relationship between code defect density and confirmation bias levels of software developers and testers showed that there is a direct correlation ...
These tests were conducted on the 36 employees of a large scale telecommunication company in Europe as well as 28 graduate computer engineering students of Bogazici University, resulting in a total of ...
P and Q) as a choice of a verifier, whereas the subject is defined to be a falsifier if he/she selects the cards D and 7 (i.e. P and not-Q). ...
doi:10.1145/1868328.1868344
dblp:conf/promise/CalikliB10
fatcat:ycjgwlhom5dl5lwgsmvytqjhe4
Use of computer software for technical training at rail car repair shops
2018
MATEC Web of Conferences
Therefore, there is a need for software and hardware that will provide updated information to specialists of car repair shops in a timely manner. ...
As a result of the research, the authors have developed a system that can verify training results with a probability of more than 95%. ...
A specialpurpose network software product was designed to conduct technical on-the-job training [5] . ...
doi:10.1051/matecconf/201821604001
fatcat:tvz6wjp37nffrici23vrwbuuem
Strengthening Inferred Specifications using Search Based Testing
2008
2008 IEEE International Conference on Software Testing Verification and Validation Workshop
This leads to a much tighter (accurate) inferred specifications. ...
Software specification is an important element of the software development process. However, in most cases the specifications are out-of-date or even missing. ...
Our work shows that extant search based software test data generation approaches can be used to stress each inferred invariant with a view to falsifying it. ...
doi:10.1109/icstw.2008.39
dblp:conf/icst/GhaniC08
fatcat:tuquzkervjeelg4wj44jrpwyo4
The Most Important Ethical Concerns in Science
2020
Natural Science
The most unethical behaviors in science are of falsifying data and stealing ideas from previous investigators. ...
But for publishing papers with high similarity and editing papers with coercion, it is necessary to carry out a concrete analysis case by case. ...
"Falsifying data" is a typical cheating, and so is "Stealing ideas from previous investigators". ...
doi:10.4236/ns.2020.122005
fatcat:eh7evay2efh4pn6crfthtrlmem
Uncertainty, risk, and information value in software requirements and architecture
2014
Proceedings of the 36th International Conference on Software Engineering - ICSE 2014
• Models given by design team:
Utility score defined as weighted
sum of objectives satisfaction
(unfortunately not falsifiable)
21
• Method output: A shortlist of 10
architectures with highest ...
design decisions is hard -High standard: models must be falsifiable -Weak foundations: e.g. what is an architectural decision? ...
doi:10.1145/2568225.2568239
dblp:conf/icse/LetierSB14
fatcat:zb7k22xfrjhrtguj37gaim3owq
Myths and Over-Simplifications in Software Engineering
2013
Lecture Notes on Software Engineering
Some of them may be harmless, but others may hamper evidence-based practices and contribute to a fashion-and myth-based software engineering discipline. ...
We report from a study examining this tendency. ...
With increased vagueness a myth or over-simplification may turn into a non-falsifiable claim. ...
doi:10.7763/lnse.2013.v1.2
fatcat:5h2peruwtnbyloyunjbjt5yovi
Usefulness of combined screening methods for rapid detection of falsified and/or substandard medicines in the absence of a confirmatory method
2019
Malaria Journal
The influx of substandard and falsified medicines is a global public health challenge and its rapid detection is a key solution to the menace. ...
The combined screening methods may be used for rapid detection of falsified and/or substandard medicines without using a confirmatory method. ...
Sensitivity is defined as the proportion of medicines that are determined as falsified/substandard by a screening device out of all the medicines detected as falsified/substandard by a reference method ...
doi:10.1186/s12936-019-3045-y
pmid:31805937
pmcid:PMC6896689
fatcat:64hrfofcojac7dhgyszl43cp4m
Findings of Scientific Misconduct
2001
Federal register
He further falsified the image using computer software to intensify a band he claimed was a sitespecific integration and to remove identifiable background spots present in the original image. ...
Specifically, he used computer software to scan Figure 3A in Balagué et al. and then alter the locations of three major bands in an effort to conceal the origin of the falsified image (i.e., Figure ...
Type of Request: Reinstatement of a previously approved collection for which approval has expired. ...
pmid:27737097
pmcid:PMC5019711
fatcat:afgj7u4hyvegdk4su2lnh3yvrm
Future Information Technology Tools for Fighting Substandard and Falsified Medicines in Low- and Middle-Income Countries
2018
Frontiers in Pharmacology
Substandard and falsified (SF) medicines have emerged as a global public health issue within the last two decades especially in low-and middle-income countries (LMICs). ...
The principles discussed herein are making profound impact in the fight against substandard and falsified medicines, offering cheap and accessible solutions. ...
of falsified medicines. ...
doi:10.3389/fphar.2018.00995
pmid:30233373
pmcid:PMC6127459
fatcat:bkjc4yfnpzfk7ea3ca5hsreohu
Monotone digital signatures: an application in software copy protection
2012
Procedia Technology - Elsevier
According to this idea we have built an ID generation scheme which can be used in many situations where is needed such a level of security. We will apply this technique in software copy protection. ...
One of the ways to fight duplication, software piracy and not only, is the usage of digital signatures. ...
With all these a falsifier would build "real" signatures which would not be perceived as such at level j of control. ...
doi:10.1016/j.protcy.2012.02.058
fatcat:apkini5gsnaorp65cqvyr45qyq
Quantitative screening of the pharmaceutical ingredient for the rapid identification of substandard and falsified medicines using reflectance infrared spectroscopy
2018
PLoS ONE
The World Health Organization suggests that approximately 10% of medicines worldwide are either falsified or substandard with higher figures in low and middle income countries. ...
Such poor quality medicines can seriously harm patients and pose a threat to the economy worldwide. ...
However, constituents of a mixture below 10% w/w could not be identified using this software. ...
doi:10.1371/journal.pone.0202059
pmid:30096202
pmcid:PMC6086453
fatcat:rsp42cophbbcpb3l2higiejkmu
Integration of Novel Low-Cost Colorimetric, Laser Photometric, and Visual Fluorescent Techniques for Rapid Identification of Falsified Medicines in Resource-Poor Areas: Application to Artemether–Lumefantrine
2015
American Journal of Tropical Medicine and Hygiene
Therefore, we suggest a three-tiered drug evaluation strategy for identifying a falsified drug in resource-poor areas. ...
Image analysis software is used for the assessments. Although artemether-lumefantrine is used as an example, the strategy may be adapted to other medicines. ...
As a result, specialized software may be required to interpret or detect subtle spectral differences. ...
doi:10.4269/ajtmh.14-0832
pmid:25897066
pmcid:PMC4455085
fatcat:3mbje6ilfjffnoxzhxktira5dq
Utilization of Blockchain Technology for Management E-Certificate Open Journal System
2020
Aptisi Transactions on Management (ATM)
By using blockchain technology, the data collected will be well managed and not easily falsified. ...
Observation on the open journal system and applied blockchain tools in the form of blockcerts as a place to issue e-certificates with guaranteed security so that e-certificates are verified as well as ...
Also with a different transcript each block, it will not be possible for server users to duplicate and falsify data. ...
doi:10.33050/atm.v4i2.1293
fatcat:ekukkzq4bbe2zmtpfodrrt2kli
« Previous
Showing results 1 — 15 out of 21,386 results