Zobrazeno 1 - 10
of 90
pro vyhledávání: '"Badran, Khaled"'
Background: The adoption of chatbots into software development tasks has become increasingly popular among practitioners, driven by the advantages of cost reduction and acceleration of the software development process. Chatbots understand users' quer
Externí odkaz:
http://arxiv.org/abs/2407.11955
Autor:
Badran, Khaled, Côté, Pierre-Olivier, Kolopanis, Amanda, Bouchoucha, Rached, Collante, Antonio, Costa, Diego Elias, Shihab, Emad, Khomh, Foutse
As machine learning (ML) systems get adopted in more critical areas, it has become increasingly crucial to address the bias that could occur in these systems. Several fairness pre-processing algorithms are available to alleviate implicit biases durin
Externí odkaz:
http://arxiv.org/abs/2212.02614
Publikováno v:
In Ain Shams Engineering Journal January 2024 15(1)
Publikováno v:
IEEE Transactions on Software Engineering (TSE), 2021
Chatbots are envisioned to dramatically change the future of Software Engineering, allowing practitioners to chat and inquire about their software projects and interact with different services using natural language. At the heart of every chatbot is
Externí odkaz:
http://arxiv.org/abs/2012.02640
Software repositories contain a plethora of useful information that can be used to enhance software projects. Prior work has leveraged repository data to improve many aspects of the software development process, such as, help extract requirement deci
Externí odkaz:
http://arxiv.org/abs/1905.06991
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Tarifi, Amjed A., Al-qutiesh, Bara' H., Badran, Khaled H., Al-mallah, Heba H., Medina, Jesus E.
Publikováno v:
ENT: Ear, Nose & Throat Journal; Dec2024, Vol. 103 Issue 12, pNP700-NP704, 5p
Publikováno v:
British Journal of Neurosurgery; Oct2024, Vol. 38 Issue 5, p1074-1077, 4p
Autor:
Badran, Khaled
The widespread connectivity of computers all over the world has encouraged intruders to threaten the security of computing systems by targeting the confidentiality and integrity of information, and the availability of systems. Traditional techniques
Externí odkaz:
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505474
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.