Filters








2,696 Hits in 4.9 sec

Breaking Type Safety in Go: An Empirical Study on the Usage of the unsafe Package [article]

Diego Elias Costa, Suhaib Mujahid, Rabe Abdalkareem, Emad Shihab
2021 arXiv   pre-print
In this paper, we present the first large-scale study on the usage of the unsafe package in 2,438 popular Go projects.  ...  Our investigation shows that unsafe is used in 24% of Go projects, motivated primarily by communicating with operating systems and C code, but is also commonly used as a source of performance optimization  ...  ACKNOWLEDGMENT The authors would like to thank Matthew Dempsky, for providing invaluable feedback and for communicating our work to members of the Go Team.  ... 
arXiv:2006.09973v4 fatcat:c6yglxype5bzvjr4ymn2bm43jy

A Fly in the Ointment: An Empirical Study on the Characteristics of Ethereum Smart Contracts Code Weaknesses and Vulnerabilities [article]

Majd Soud and Grischa Liebel and Mohammad Hamdaqa
2022 arXiv   pre-print
Results: The resulting classification consists of 11 categories describing the error source of a vulnerability and 13 categories describing potential impacts.  ...  We targeted the Ethereum blockchain in this paper, as it is the first and most popular blockchain to support the deployment of smart contracts, and Solidity as the most widely used language to implement  ...  Acknowledgment The authors would like to thank Mohammad Alsarhan, a security expert, for participating in the card sorting and inter-rater agreement discussions.  ... 
arXiv:2203.14850v1 fatcat:uhwgh5att5cwvjr5kzetq5zvxe

Challenges in Migrating Imperative Deep Learning Programs to Graph Execution: An Empirical Study [article]

Tatiana Castro Vélez, Raffi Khatchadourian, Mehdi Bagherzadeh, Anita Raja
2022 arXiv   pre-print
We conduct a data-driven analysis of challenges -- and resultant bugs -- involved in writing reliable yet performant imperative DL code by studying 250 open-source projects, consisting of 19.7 MLOC, along  ...  While hybrid approaches aim for the "best of both worlds," the challenges in applying them in the real world are largely unknown.  ...  To fill this gap, we conduct an empirical study on common development challenges in migrating imperative DL code to graph execution using hybridization in open-source DL systems.  ... 
arXiv:2201.09953v2 fatcat:qbvu4lfdafesdesn73kdeajlte

An Empirical Study of Bugs in COVID-19 Software Projects

Akond Ashfaque Ur Rahman, Effat Farhana
2021 Journal of Software Engineering Research and Development  
The goal of this paper is to help practitioners and researchers improve the quality of COVID19 software through an empirical study of open source software projects related to COVID19.  ...  We use 129 open source COVID19 software projects hosted on GitHub to conduct our empirical study.  ...  We also thank Farzana Ahamed Bhuiyan of Tennessee Technological University for her help as an additional rater.  ... 
doi:10.5753/jserd.2021.827 dblp:journals/jserd/RahmanF21 fatcat:txymy5v5zrfgzk3ghbdzkxjici

An Empirical Study of IoT Security Aspects at Sentence-Level in Developer Textual Discussions [article]

Nibir Chandra Mandal, Gias Uddin
2022 arXiv   pre-print
Sixth, we analyze the evolution of the topics in SO. We found that (1) SecBot is based on the retraining of the deep learning model RoBERTa.  ...  We have two goals: (1) Develop a model that can automatically find security-related IoT discussions in SO, and (2) Study the model output to learn about IoT developer security-related challenges.  ...  ., have emerged during our study period. We found the release of popular open-source IoT hardware has increased the rate of discussion about that hardware.  ... 
arXiv:2206.03079v1 fatcat:rmv7vk33xzhxlcy5ilfibxqdqq

Freelancing Models for Fostering Innovation and Problem Solving in Software Startups: An Empirical Comparative Study

Varun Gupta, Jose Maria Fernandez-Crehuet, Chetna Gupta, Thomas Hanne
2020 Sustainability  
Method: this paper performs empirical studies through case studies of three software startups located in Italy, France, and India, followed by a survey of 54 freelancers.  ...  The case study results are validated using members checking with the research participants, which shows a higher level of result agreements.  ...  ., by issuing an open call for freelancer participation.  ... 
doi:10.3390/su122310106 fatcat:77aqqwabnzfpfkzydbcu64lhpe

An Empirical Study of Wireless Carrier Authentication for SIM Swaps

Kevin Lee, Benjamin Kaiser, Jonathan Mayer, Arvind Narayanan
2020 Symposium On Usable Privacy and Security  
We rated the level of vulnerability of users of each website to a SIM swap attack, and have released our findings as an annotated dataset on issms2fasecure.com.  ...  These procedures are an important line of defense against attackers who seek to hijack victims' phone numbers by posing as the victim and calling the carrier to request that service be transferred to a  ...  This work is supported by a grant from the Ripple University Blockchain Research Initiative.  ... 
dblp:conf/soups/LeeKMN20 fatcat:wiohp24t45caxfl54rgpbvaqpe

How Does Information Transmission Influence the Value Creation Capability of a Digital Ecosystem? An Empirical Study of the Crypto-Digital Ecosystem Ethereum

He Huang
2019 Sustainability  
With the advancement of digitization, digital ecosystems are playing an increasingly important role in value creation.  ...  Empirical results show that information transmission positively influences the scale and sustainability of value creation activities in a digital ecosystem by affecting user number and transaction frequency  ...  Acknowledgments: I particularly give thanks to the editors and anonymous referees for any helpful and kind comments. Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/su11195345 fatcat:ml4hfrgo75fatfuira7f42uh2m

An Empirical Study on the Dairy Product Consumers' Intention to Adopt the Food Traceability's Technology: Push-Pull-Mooring Model Integrated by D&M ISS Model and TPB With ITM

Xin Lin, Run-Ze Wu
2021 Frontiers in Psychology  
The purpose of this study is to empirically study the influencing factors of Chinese consumers on the food traceability system in the food safety field (hereinafter referred to as FTS).  ...  The important value of this study is to conduct a comprehensive empirical analysis of the key factors influencing consumer choice of traceable safe food through an integrated multi-model framework to help  ...  system, and to empirically analyze the influencing relations among the three types of factors.  ... 
doi:10.3389/fpsyg.2020.612889 pmid:33519633 pmcid:PMC7843444 fatcat:j43qbk5mqvc7hlt3jk7tonysh4

60 Years of March and Simon's Organizations: An empirical examination of its impact and influence on subsequent research

Ralf Wilden, Jan Hohberger, Timothy M. Devinney, Fabrice Lumineau
2019 Journal of Management Studies  
We provide an analytic and systematic review of the impact of March and Simon's seminal Organizations on management research and discuss the book's value for current research and propose future applications  ...  Building on bibliometric and text-mining approaches, our empirical analysis reveals that although Organizations was contextually based in the industrial milieu of the 1950's, its concepts have found ongoing  ...  , such as communities of practice and open source software development (Puranam et al., 2014) and the greater importance of systems integration (Hobday et al., 2005) Moving forward Based on our  ... 
doi:10.1111/joms.12531 fatcat:qcnwodfmczaixkmaj36gcq6mj4

An Empirical Study: Training, Education and other Determinants Related to the Development of a Growth and Innovative Mindset - Essential in a Sustainable Business Context [chapter]

2020 Proceedings of the International Conference on Economics and Social Sciences  
The research considered the theoretical empirical developments as well as the practical dimension in which it had emerged.  ...  , psychology, management, economics, business administration, strategy, finance, marketing, followed by an analysis of the importance of learning in contemporary business context.  ...  and the evolution of the markets.  ... 
doi:10.2478/9788395815072-034 fatcat:rnb3yhzsarhjxiqepxmd7hp7iy

Machine Learning for Energy Systems

Denis Sidorov, Fang Liu, Yonghui Sun
2020 Energies  
In addition, review of the blockchain technology for information security of the energy internet is given.  ...  The editor of this special issue has made an attempt to publish a book containing original contributions addressing theory and various applications of machine learning in energy systems' operation, monitoring  ...  Conflicts of Interest: The authors declare that there is no conflict of interest.  ... 
doi:10.3390/en13184708 fatcat:bsxku5a43nftpkr3p7gvtxroti

Patterns of Self-Organising in the Bitcoin Online Community: Code Forking as Organising in Digital Infrastructure

Jonas Valbjørn Andersen, Claire Ingram Bogusz
2017 International Conference on Information Systems  
However, with the rise of new digital infrastructures supporting open source projects and blockchain communities such as Bitcoin, development of the technological infrastructure also gives rise to a new  ...  Our study examines how the community emerges, and how changes in the source code lead to different patterns of self-organising.  ...  , known as an Open Source (OS) community.  ... 
dblp:conf/icis/AndersenB17 fatcat:2nf3uk3rhveazbzzonllehfilq

A Blockchain Research Framework

Marten Risius, Kai Spohrer
2017 Business & Information Systems Engineering  
Given the breadth of open questions, it shows where research can benefit from multidisciplinary collaborations and presents data sources as starting points for empirical investigations.  ...  Against this backdrop, this study adapts an established research framework to structure the insights of the current body of research on blockchain technology, outline the present research scope as well  ...  Lastly, we provided an overview of potential data sources for investigations on different levels of analysis to help scholars get started with more empirical research.  ... 
doi:10.1007/s12599-017-0506-0 fatcat:tswi4blhknayxfsvfhwveqbj3m

Artificial Intelligence in Collaborative Information System

Monika Arora, Apeejay School of Management, Dwarka, New Delhi, India, Indira Bhardwaj
2022 International Journal of Modern Education and Computer Science  
The accuracy of logistic regression has been analyzed and implemented to secure the collaborative system. This study will help the researcher to implement the AI in the system.  ...  Securing information systems through the latest technologies like Artificial Intelligence, Deep Learning and Blockchain is one of the latest trends in information sciences.  ...  This study was limited to AI used in the transactions of user log and was not applied to Deep Learning & Blockchain. The data collected was collected from open source for testing purposes.  ... 
doi:10.5815/ijmecs.2022.01.04 fatcat:2y4kh7detfdavnizilj2iwr3dm
« Previous Showing results 1 — 15 out of 2,696 results