Results 71 to 80 of about 1,372,389 (378)

Social loafing prevention in agile software development teams using team expectations agreements

open access: yesIET Software, 2021
Social loafing is a common issue encountered by many software development teams. In practice, agile software development teams often use team expectations agreements (TEAs), which contain rules to prevent social loafing behaviour. However, few studies in
Ilenia Fronza, Xiaofeng Wang
doaj   +1 more source

A Visual Data Storytelling Framework

open access: yesInformatics, 2022
While the consumption of visual information becomes a daily commodity integrated into our lives, data visualisation is dominated by dashboards and charts. The main contribution of this article is an advanced way to visualise data as a data story.
Yangjinbo Zhang   +4 more
doaj   +1 more source

Sustainable Software Engineering: Concepts, Challenges, and Vision

open access: yesACM Transactions on Software Engineering and Methodology
Information and communication technology (ICT) offers promising opportunities to address global sustainability challenges such as climate change and social inequality by enabling energy savings and social innovations.
C. König, Daniel J. Lang, Ina Schaefer
semanticscholar   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Recognition method for microgrid switching misoperations based on multi-source heterogeneous data fusion

open access: yesScientific Reports
To enhance the safety of microgrid switching and the identification of misoperations, we propose Time-Synchronized Misoperation Recognition (TS-MR), a method tailored to switching operations.
Hongzhao Yang   +3 more
doaj   +1 more source

A Large-Scale Investigation Into the Loss of Pull Request Data on GitHub

open access: yesIEEE Access
Analyzing pull requests (PRs) on GitHub provides valuable insights that can improve software development and maintenance. Therefore, researchers must collect PRs for empirical studies when testing hypotheses and creating practical tools based on these ...
Bowen Tang, Katsuhisa Maruyama
doaj   +1 more source

Microservices and Machine Learning Algorithms for Adaptive Green Buildings [PDF]

open access: yes, 2019
In recent years, the use of services for Open Systems development has consolidated and strengthened. Advances in the Service Science and Engineering (SSE) community, promoted by the reinforcement of Web Services and Semantic Web technologies and the ...
Alonso Montesinos, Joaquín Blas   +6 more
core   +1 more source

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Integrated VPN Solution [PDF]

open access: yesJisuanji kexue
Aimed at the problems that the traditional VPN does not support the carrying of multiple data types,lack of security of data,and overweight label edge devices,an integrated VPN solution is proposed..The design includes the establishment of GRE VPN,the ...
TAO Zhiyong, YANG Wangdong
doaj   +1 more source

Home - About - Disclaimer - Privacy