Systematic Evaluation of Deep Learning Models for Log-based Failure Prediction

A Systematic Literature Review on the Influence of Enhanced Developer Experience on Developers’ Productivity: Factors, Practices, and Recommendations

TEASMA: A Practical Methodology for Test Adequacy Assessment of Deep Neural Networks

Is there evidence that playing games promotes social skills training for autistic children and youth?

Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT

Training Developers to Code Securely: Theory and Practice

Software security is essential. Flaws in software design and coding produce vulnerabilities that can be exploited by hostile actors, resulting in ransomware, espionage and the hacking of critical infrastructure. Meanwhile, DevOps and continuous integration introduce speed imperatives, often bypassing traditional security gates. Software security responsibility is increasingly shifting to software developers. Industry insiders advise that...

True discernment or blind scepticism? Comparing the effectiveness of four conspiracy belief interventions

Understanding the experiences of receiving and providing maternity care for autistic adults: A Multi-perspectival Interpretative Phenomenological Analysis study

Smart Agriculture Software Platform for Telematics Monitoring in Farm Machinery

Socially Engaged Art Approaches to CSCW with Young People in Rurban Communities