Search Results - "Laval, Jannik"
-
1
Information Extraction of Cybersecurity Concepts: An LSTM Approach
Published in Applied sciences (01-10-2019)“…Extracting cybersecurity entities and the relationships between them from online textual resources such as articles, bulletins, and blogs and converting these…”
Get full text
Journal Article -
2
Building a ROS-Based Testbed for Realistic Multi-Robot Simulation: Taking the Exploration as an Example
Published in Robotics (Basel) (12-09-2017)“…While the robotics community agrees that the benchmarking is of high importance to objectively compare different solutions, there are only few and limited…”
Get full text
Journal Article -
3
Requirements engineering and enterprise architecture-based software discovery and reuse
Published in Innovations in systems and software engineering (01-03-2022)“…Organizations’ business processes need to be adapted in response to changing internal and external environments, which are becoming increasingly complex. We…”
Get full text
Journal Article -
4
Toward an Innovative Educational Method to Train Students to Agile Approaches in Higher Education: The A.L.P.E.S
Published in Education sciences (01-06-2021)“…Introduced in 2013, the A.L.P.E.S. approach (AgiLe aPproaches in higher Education Studies) aims to apply agile practices to teaching. Agile approaches are…”
Get full text
Journal Article -
5
Legacy Software Restructuring: Analyzing a Concrete Case
Published in 2011 15th European Conference on Software Maintenance and Reengineering (01-03-2011)“…Software re-modularization is an old preoccupation of reverse engineering research. The advantages of a well structured or modularized system are well known…”
Get full text
Conference Proceeding -
6
Advances in Dynamic Languages
Published in Science of computer programming (01-02-2015)Get full text
Journal Article -
7
Towards software reuse through an enterprise architecture-based software capability profile
Published in Enterprise information systems (02-01-2022)“…Most of today's software development projects depend on the usage of existing solutions to save time and development costs. We target in this research work the…”
Get full text
Journal Article -
8
Data interoperability assessment, case of messaging‐based data exchanges
Published in Journal of software : evolution and process (01-12-2023)“…Data interoperability implies data exchanges among intra and inter enterprises collaborating with information systems (IS). The multiplicity of these exchanges…”
Get full text
Journal Article -
9
PhaDOP: A Pharo framework for implementing software product lines using Delta-Oriented Programming and model-based engineering
Published in Journal of computer languages (Online) (01-08-2024)“…Delta-Oriented Programming is a modular, and flexible paradigm for implementing a Software Product Line. Delta-Oriented Programming involves implementing a…”
Get full text
Journal Article -
10
PhaDOP: A Pharo Framework for Implementing Software Product Lines using Delta-Oriented Programming and Model-Based Engineering: PhaDOP Smalltalk-based Framework for MDE SPL DOP
Published in Journal of computer languages (Online) (04-06-2024)“…Delta-Oriented Programming is a modular, and flexible paradigm for implementing a Software Product Line. Delta-Oriented Programming involves implementing a…”
Get full text
Journal Article -
11
Resolving cyclic dependencies between packages with enriched dependency structural matrix
Published in Software, practice & experience (01-02-2014)“…SUMMARYDependency structural matrix (DSM) is an approach originally developed for process optimization. It has been successfully applied to identify software…”
Get full text
Journal Article -
12
Software quality metrics aggregation in industry
Published in Journal of software : evolution and process (01-10-2013)“…SUMMARY With the growing need for quality assessment of entire software systems in the industry, new issues are emerging. First, because most software quality…”
Get full text
Journal Article -
13
Metrics for performance benchmarking of multi-robot exploration
Published in 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (01-09-2015)“…Performance benchmarking has become an important topic within robotics. It is indeed, a critical way to compare different solutions under different conditions…”
Get full text
Conference Proceeding -
14
Resolving cyclic dependencies between packages with enricheddependency structural matrix
Published in Software, practice & experience (01-02-2014)“…SUMMARY Dependency structural matrix (DSM) is an approach originally developed for process optimization. It has been successfully applied to identify software…”
Get full text
Journal Article -
15
A methodology for testing mobile autonomous robots
Published in 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (01-11-2013)“…Mobile autonomous robots are progressively entering the mass market. Thus, manufacturers have to perform quality assurance tests on series of robots…”
Get full text
Conference Proceeding -
16
oZone: Layer identification in the presence of cyclic dependencies
Published in Science of computer programming (01-08-2013)“…A layered software architecture helps in understanding the role of software entities (e.g. packages or classes) in a system and, hence, the impact of changes…”
Get full text
Journal Article -
17
LSTM Recurrent Neural Networks for Cybersecurity Named Entity Recognition
Published 30-08-2024“…ICSEA 2018, Luigi Lavazza; Roy Oberhauser; Radek Koci, Oct 2018, Nice, France The automated and timely conversion of cybersecurity information from…”
Get full text
Journal Article -
18
Supporting simultaneous versions for software evolution assessment
Published in Science of computer programming (01-12-2011)“…When reengineering software systems, maintainers should be able to assess and compare multiple change scenarios for a given goal, so as to choose the most…”
Get full text
Journal Article -
19
Cold-start cybersecurity ontology population using information extraction with LSTM
Published in 2019 International Conference on Cyber Security for Emerging Technologies (CSET) (01-10-2019)“…In this paper, we discuss how Long Short Time Memory (LSTM) neural networks can be applied to cyber security knowledge base population. Assuming we have an…”
Get full text
Conference Proceeding -
20
Identifying Cycle Causes with Enriched Dependency Structural Matrix
Published in 2009 16th Working Conference on Reverse Engineering (01-10-2009)“…Dependency structure matrix (DSM) has been successfully applied to identify software dependencies among packages and subsystems. A number of algorithms were…”
Get full text
Conference Proceeding