Why and how is Scrum being adapted in practice: A systematic review

M Hron, N Obwegeser - Journal of Systems and Software, 2022 - Elsevier
Scrum, recognized today as the most popular agile development methodology, has been
used in a wide range of settings and for varying purposes, in-and outside of the traditional …

Identifying, categorizing and mitigating threats to validity in software engineering secondary studies

A Ampatzoglou, S Bibi, P Avgeriou, M Verbeek… - Information and software …, 2019 - Elsevier
Context Secondary studies are vulnerable to threats to validity. Although, mitigating these
threats is crucial for the credibility of these studies, we currently lack a systematic approach …

Towards ai-assisted synthesis of verified dafny methods

MRH Misu, CV Lopes, I Ma, J Noble - Proceedings of the ACM on …, 2024 - dl.acm.org
Large language models show great promise in many domains, including programming. A
promise is easy to make but hard to keep, and language models often fail to keep their …

Anomaly detection dataset for industrial control systems

A Dehlaghi-Ghadim, MH Moghadam, A Balador… - IEEE …, 2023 - ieeexplore.ieee.org
Over the past few decades, Industrial Control Systems (ICS) have been targeted by
cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the …

Smart contract and defi security tools: Do they meet the needs of practitioners?

S Chaliasos, MA Charalambous, L Zhou… - Proceedings of the 46th …, 2024 - dl.acm.org
The growth of the decentralized finance (DeFi) ecosystem built on blockchain technology
and smart contracts has led to an increased demand for secure and reliable smart contract …

Removal of emerging pharmaceutical pollutants: a systematic map** study review

N Taoufik, W Boumya, FZ Janani, A Elhalil… - Journal of …, 2020 - Elsevier
The presence of certain pharmaceutical compounds in ground and surface waters may
constitute a serious environmental problem, even at low concentrations. The removal of …

Threats to validity in software engineering research: A critical reflection

R Verdecchia, E Engström, P Lago, P Runeson… - Information and …, 2023 - Elsevier
Context: In the contemporary body of software engineering literature, some recurrent
shortcomings characterize how threats to validity (TTV) are considered in studies. Objective …

Computer science education in chatgpt era: Experiences from an experiment in a programming course for novice programmers

T Kosar, D Ostojić, YD Liu, M Mernik - Mathematics, 2024 - mdpi.com
The use of large language models with chatbots like ChatGPT has become increasingly
popular among students, especially in Computer Science education. However, significant …

[HTML][HTML] Educational challenges for computational thinking in k–12 education: A systematic literature review of “scratch” as an innovative programming tool

H Montiel, MG Gomez-Zermeño - Computers, 2021 - mdpi.com
The use of information and communications technologies (ICTs) has emerged as an
educational response amidst the COVID-19 pandemic, providing students the technological …

Data cleaning and machine learning: a systematic literature review

PO Côté, A Nikanjam, N Ahmed, D Humeniuk… - Automated Software …, 2024 - Springer
Abstract Machine Learning (ML) is integrated into a growing number of systems for various
applications. Because the performance of an ML model is highly dependent on the quality of …