Trends in quantum reinforcement learning: State‐of‐the‐arts and the road ahead

S Park, J Kim - ETRI Journal, 2024 - Wiley Online Library
This paper presents the basic quantum reinforcement learning theory and its applications to
various engineering problems. With the advances in quantum computing and deep learning …

Knowledge Extraction and Discovery about Web System Based on the Benchmark Application of Online Stock Trading System

M Borowiec, R Piszko, T Rak - Sensors, 2023 - mdpi.com
Predicting workload characteristics could help web systems achieve elastic scaling and
reliability by optimizing servers' configuration and ensuring Quality of Service, such as …

Advanced Examination of User Behavior Recognition via Log Dataset Analysis of Web Applications Using Data Mining Techniques

M Borowiec, T Rak - Electronics, 2023 - mdpi.com
As web systems based on containerization increasingly attract research interest, the need
for effective analytical methods has heightened, with an emphasis on efficiency and cost …

On-the-Fly Repairing of Atomicity Violations in ARINC 653 Software

E Choi, T Kim, YK Jun, S Lee, M Han - Applied Sciences, 2022 - mdpi.com
Airborne health management systems prevent functional failure caused by errors or faults in
airborne software. The on-the-fly repairing of atomicity violations in ARINC 653 concurrent …

Application of Wireless Network Data Collection Based on Optical Topology Sensors in Sports Technology Evaluation

Y Li, K Zhao - Mobile Networks and Applications, 2024 - Springer
With the rapid development of the Internet of Things technology, wireless network and
mobile network are increasingly widely used in various fields, especially in the evaluation of …

Performance analysis of extracting object structure from source code

R Wojszczyk, A Hapka, T Królikowski - Procedia Computer Science, 2023 - Elsevier
Tools for programmers are constantly evolving, and with that evolution comes tools that
support their work, such as those that enable testing and analysis of program code. It is …

The usage of cybernetic in complex software systems and its application to the deterministic multithreading

EM Bozkurt - Concurrency and Computation: Practice and …, 2022 - Wiley Online Library
In this paper, a new cybernetic control technology that can be used in complex software
systems will be introduced. In this approach, the software systems are governed by …

[PDF][PDF] Source Code Features and their Dependencies: An Aggregative Statistical Analysis on Open-Source Java Software Systems

FG Toosi - Applied Computer Systems, 2023 - intapi.sciendo.com
Source code constitutes the static and human-readable component of a software system. It
comprises an array of artifacts and features that collectively execute a specific set of tasks …

Detect atomicity violations in concurrent programs through user assistance and identification of suspicious variable access patterns

J Zhao, Y Wu, Y Feng, J Dong, C Shi - Journal of Software: Evolution … - Wiley Online Library
Atomicity violation bugs are a frequent problem in concurrency. Because of the
unpredictable nature of thread interleaving, most current methods are unable to differentiate …

Race Condition Error Detection in a Program Executed on a Device with Limited Memory Resources

R Wojszczyk, D Giebas, G Bocewicz - International Symposium on …, 2022 - Springer
Wearable devices are a prime example of how electronics are invading people's everyday
lives. This is forcing electronics manufacturers to use hardware that is cheap to manufacture …