Tag Index

 accelerometer (1) acoustical-engineering (1) ai (1) ai-generated-code (1) android (1) assistive-hearing (1) benchmark (1) biacoustics (1) cibersecurity-software (2) computer-systems (1) continuous-improvement (1) cwe (1) decision-making (1) dsp (2) evidence-based-development (1) formal-methods (1) hearing-aids (1) performance (1) prompt-injection (1) software-development (1) software-engineering (3) software-security (3) software-verification (1) swot (1) vibration-control (1) vibration-therapy (1)

 accelerometer (1)

The engineering of Android's earthquake alert system

 acoustical-engineering (1)

The engineering behind adaptive hand utensils

 ai (1)

Taking a look at AI generated code

 ai-generated-code (1)

Taking a look at AI generated code

 android (1)

The engineering of Android's earthquake alert system

 assistive-hearing (1)

Airpods Pro2 include assistive hearing tools

 benchmark (1)

7 common mistakes on computer performance evaluation

 biacoustics (1)

The bioacoustics of dinosaurs

 cibersecurity-software (2)

How prompt injection exploits LLMs
5 most common software security vulnerabilities

 computer-systems (1)

7 common mistakes on computer performance evaluation

 continuous-improvement (1)

A SWOT analysis for your code base

 cwe (1)

5 most common software security vulnerabilities

 decision-making (1)

A software engineer's guide to evidence-based decisions

 dsp (2)

Airpods Pro2 include assistive hearing tools
Leveraging formal methods for DSP verification

 evidence-based-development (1)

A software engineer's guide to evidence-based decisions

 formal-methods (1)

Leveraging formal methods for DSP verification

 hearing-aids (1)

Airpods Pro2 include assistive hearing tools

 performance (1)

7 common mistakes on computer performance evaluation

 prompt-injection (1)

How prompt injection exploits LLMs

 software-development (1)

A SWOT analysis for your code base

 software-engineering (3)

How prompt injection exploits LLMs
5 most common software security vulnerabilities
A software engineer's guide to evidence-based decisions

 software-security (3)

How prompt injection exploits LLMs
Taking a look at AI generated code
5 most common software security vulnerabilities

 software-verification (1)

Leveraging formal methods for DSP verification

 swot (1)

A SWOT analysis for your code base

 vibration-control (1)

The engineering behind adaptive hand utensils

 vibration-therapy (1)

The engineering behind adaptive hand utensils