02642nam 2200613 a 450 991048089320332120170821192435.01-322-41211-11-4129-9005-X1-4522-1228-7(CKB)2550000000112068(EBL)996274(OCoLC)809771616(SSID)ssj0000675587(PQKBManifestationID)12347138(PQKBTitleCode)TC0000675587(PQKBWorkID)10670069(PQKB)10486114(MiAaPQ)EBC996274(OCoLC)914615253(StDuBDS)EDZ0000018515(PPN)227907183(EXLCZ)99255000000011206820110110d2002 fy| 0engur|n|---|||||txtccrEvaluating sex offenders[electronic resource] a manual for civil commitments and beyond /Dennis M. DorenThousand Oaks, Calif. ;London SAGEc20021 online resource (257 p.)Description based upon print version of record.0-7619-2114-1 0-7619-2113-3 Includes bibliographical references (p. 229-236) and index.Cover; Contents; Introduction; 1 - Relevant Components of Sex Offender Civil Commitment Laws: The Evaluation "Referral Questions"; 2 - Procedures for Conducting the Assessment; 3 - Diagnostic Issues Within Sex Offender Civil Commitment Assessments: Defining Relevant Paraphilias; 4 - Diagnostic Issues Within Sex Offender Civil Commitment Assessments: Diagnostic Issues Beyond the Paraphilias; 5 - Using Risk Assessment Instrumentation; 6 - Recidivism Base Rates; 7 - Clinical Adjustments; 8 - The Evaluation Report and Court Testimony; 9 - Ethical Issues; Appendix A; Appendix B; Appendix CAppendix DReferences; Index; About the AuthorIn this text, the author collects, compares and contrasts all risk assessment instruments currently available including the pros and cons of each as well as the reliability and ease of use.Sex offendersUnited StatesMentally illCommitment and detentionUnited StatesElectronic books.Sex offendersMentally illCommitment and detention364.15/3364.153616.8583075Doren Dennis M1036990StDuBDSStDuBDSBOOK9910480893203321Evaluating sex offenders2457649UNINA10874nam 2200517 450 99646449010331620231110225845.03-030-86044-2(CKB)4100000012009076(MiAaPQ)EBC6712996(Au-PeEL)EBL6712996(OCoLC)1265463178(PPN)257350888(EXLCZ)99410000001200907620220605d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSoftware architecture 15th European Conference, ECSA 2021, virtual event, Sweden, September 13-17, 2021, proceedings /Stefan Biffl [and five others]Cham, Switzerland :Springer International Publishing,[2021]©20211 online resource (339 pages)Lecture Notes in Computer Science ;v.128573-030-86043-4 Intro -- Preface -- Organization -- Abstracts of Keynotes -- Determinism -- Software Architecture for a Digital Age -- Enterprise Architecture in an Agile World -- Contents -- Architectures for Reconfigurable and Self-Adaptive Systems -- Dynamic Updates of Virtual PLCs Deployed as Kubernetes Microservices -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 State-Transfer Approach -- 4.1 Example -- 4.2 Static View -- 4.3 Dynamic View -- 4.4 Decision Points -- 5 Prototypical Implementation -- 6 Experimental Evaluation -- 6.1 Test Application Sizing -- 6.2 Jitter Characterization -- 6.3 State Transfer Time -- 7 Assumptions and Limitations -- 8 Conclusions -- References -- A Runtime Safety Enforcement Approach by Monitoring and Adaptation -- 1 Introduction -- 2 Related Work -- 3 Running Example: The MRM System -- 4 Safety Enforcement by Monitoring and Adaptation -- 4.1 Abstract State Machines for Specifying Enforcement Models -- 4.2 ASMs Operating as Enforcement Models -- 5 Safety Enforcement Framework -- 6 Runtime Safety Enforcement at Work -- 6.1 Instantiation of the Enforcement Framework -- 6.2 Validation of Enforcement Strategies -- 7 Conclusion and Future Work -- References -- Towards a Taxonomy of Autonomous Systems -- 1 Introduction -- 2 Background -- 2.1 Existing Efforts to Formalise Autonomy -- 2.2 Formal Modelling Approach -- 3 A Taxonomy for Defining Autonomy -- 3.1 Autonomy as a Property of Individual Functions -- 3.2 Main Ideas Behind the Taxonomy for Autonomy -- 3.3 Taxonomy Levels -- 3.4 Formalisation of Taxonomy Levels -- 4 Discussion and Conclusion -- References -- Machine Learning For Software Architecture -- Explaining Architectural Design Tradeoff Spaces: A Machine Learning Approach -- 1 Introduction -- 2 Motivating Scenario: Tele-Assistance System (TAS) -- 3 Approach -- 3.1 Preliminaries -- 3.2 Configuration Data Extraction.3.3 Data Aggregation and Normalization -- 3.4 Principal Component Analysis -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Scenario: Network Architecture -- 4.3 Discussion -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Machine Learning Approach to Service Discovery for Microservice Architectures -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 ML Based Service Discovery -- 4.1 Data Extraction -- 4.2 Feature Extraction -- 4.3 Training -- 4.4 Prediction -- 4.5 Selection -- 5 Evaluation -- 5.1 Proof-of-Concept: The Coin Collection Application -- 5.2 Controlled Experiments -- 5.3 Approach Effectiveness -- 5.4 Approach Efficiency -- 5.5 Threats to Validity -- 6 Conclusion -- References -- FLRA: A Reference Architecture for Federated Learning Systems -- 1 Introduction -- 2 Methodology -- 2.1 Generation of Theory -- 2.2 Confirmation of Theory -- 3 FLRA Reference Architecture -- 3.1 Job Creation -- 3.2 Data Collection and Preprocessing -- 3.3 Model Training -- 3.4 Model Deployment -- 3.5 Model Monitoring -- 4 Related Work -- 5 Discussion and Conclusion -- References -- Architectural Knowledge, Decisions, and Rationale -- Trace Link Recovery for Software Architecture Documentation -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 4 Evaluation -- 4.1 Gold Standards -- 4.2 Metrics -- 4.3 Results of SWATTR -- 4.4 Comparison to Other Approaches -- 5 Discussion and Threats to Validity -- 6 Conclusion and Future Work -- References -- An Exploratory Study on Architectural Knowledge in Issue Tracking Systems -- 1 Introduction -- 2 Background - Architectural Knowledge Concepts -- 3 Study Design -- 3.1 Research Questions -- 3.2 Research Process -- 4 RQ1: Representation of AK Concepts in Issues -- 5 RQ2: Prominent AK Concepts in Issues -- 6 RQ3: Significant Co-occurrences Between AK Concepts -- 7 Discussion.7.1 RQ1: Representation of AK Concepts in Issues -- 7.2 RQ2: AK Concepts in Issues -- 7.3 RQ3: Significant Co-Occurrences Between AK Concepts -- 8 Threats to Validity -- 8.1 External Validity -- 8.2 Construct Validity -- 8.3 Reliability -- 9 Related Work -- 10 Conclusions -- References -- Human Behavior-Oriented Architectural Design -- 1 Introduction -- 2 Background and Case Study -- 2.1 Agent-Based Modeling and Simulation -- 2.2 Architectural Modeling and Simulation -- 2.3 Case Study: The Uffizi Galleries -- 3 Methodology -- 4 Application -- 4.1 Agent-Based Modeling Scenarios and Simulations -- 4.2 IoT Architectures Modeling and Simulations -- 4.3 Results -- 5 Conclusion -- References -- Architecting for Quality Attributes -- Updating Service-Based Software Systems in Air-Gapped Environments -- 1 Introduction -- 2 Updating Service-Based Air-Gapped Systems -- 3 Architecture for Instrumenting Air-Gapped Updates -- 3.1 Design Requirements -- 3.2 Functional Components -- 3.3 Update Workflow -- 4 Service Dependency Resolution -- 4.1 Problem Formulation -- 4.2 Dependency Resolution Strategies -- 5 Evaluation -- 5.1 Applicability -- 5.2 Dependency Resolution Performance -- 5.3 Discussion -- 6 Related Work -- 7 Conclusion and Future Work -- References -- Architectural Tactics for Energy-Aware Robotics Software: A Preliminary Study -- 1 Introduction -- 2 ROS-Based Robotics Software -- 3 Mining the Architectural Tactics -- 4 Results -- 4.1 Energy Savings Mode (AT1) -- 4.2 Stop Current Task & -- Recharge (AT2) -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxonomy of Edge Blockchain Network Designs -- 1 Introduction -- 2 Background and Related Work -- 2.1 Blockchain Network Design -- 2.2 Related Work -- 3 Taxonomy of Edge Blockchain Network Designs -- 3.1 Methodology -- 3.2 Taxonomy of Edge Blockchain Network Designs.4 Availability Evaluation -- 5 Concluding Remarks -- References -- An Analysis of Software Parallelism in Big Data Technologies for Data-Intensive Architectures -- 1 Introduction -- 2 Software Parallelism in Big Data Tools -- 3 Experiment Design -- 4 Results -- 5 Conclusions -- References -- Architecture-Centric Source Code Analysis -- State of the Practice in Application Programming Interfaces (APIs): A Case Study -- 1 Introduction -- 2 Background and Previous Work -- 3 Research Method: Case Study -- 4 Case Study Findings -- 4.1 API Usage Scenarios -- 4.2 Technologies and Adoption of New Technologies -- 4.3 Deployment -- 4.4 API Versioning -- 4.5 API Documentation -- 4.6 API Quality Attributes -- 4.7 API Management -- 5 Discussion -- 6 Study Validity -- 7 Conclusions -- References -- Identifying Domain-Based Cyclic Dependencies in Microservice APIs Using Source Code Detectors -- 1 Introduction -- 2 Related Work -- 3 Static Analysis -- 3.1 Microservice API Communication Model -- 3.2 Model Reconstruction -- 4 Metrics -- 5 Case Studies -- 5.1 Case Study 1: Lakeside Mutual -- 5.2 Case Study 2: eShopOnContainers -- 6 Discussion -- 7 Threats to Validity -- 8 Conclusions and Future Work -- References -- Optimized Dependency Weights in Source Code Clustering -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Method -- 4.1 Data Analysis -- 4.2 Genetic Algorithm -- 4.3 Subject Systems -- 5 Results -- 6 Discussion and Threats to Validity -- 7 Conclusion and Future Work -- References -- Experiences and Learnings from Industrial Case Studies -- Reliable Event Routing in the Cloud and on the Edge -- 1 Introduction -- 2 Business Context: AgeTech Startup with IoT Device -- 2.1 Software Architecture Overview -- 2.2 Vision: Unified Event Plane -- 3 Design and Implementation of the CloudEvents Router -- 3.1 Technical Constraints and Requirements.3.2 CloudEvents Router Architecture -- 3.3 Implementation: Rust SDK for CloudEvents -- 4 Delivery Guarantees and Their Implementations -- 4.1 Reliable Event Routing with the CloudEvents Router -- 4.2 Different Approaches to Reliable Event Routing (Options) -- 4.3 How Common Protocols Implement Delivery Guarantees -- 4.4 Selection of At Least Once for the CloudEvents Router -- 4.5 Implementation and Validation of At Least Once Channels -- 5 Lessons Learned -- 6 Related Work -- 7 Summary and Outlook -- References -- An Experience Report on Modernizing I/O Configuration Software -- 1 Introduction -- 2 Background -- 2.1 IBM Z -- 2.2 Firmware -- 2.3 Spiral Model -- 3 Applied Process for Modernizing a System -- 3.1 Change Trigger Analysis -- 3.2 Identifying Affected System Parts -- 3.3 Multi-criteria Design Decisions -- 3.4 Requirements Prioritization -- 3.5 Designing a First Architecture Draft -- 3.6 Implementation -- 4 Application in a Real-World Project -- 4.1 Change Trigger Analysis -- 4.2 Identifying Affected System Parts -- 4.3 Multi-criteria Design Decisions -- 4.4 Requirements Prioritization -- 4.5 Designing a First Architecture Draft -- 4.6 Implementation -- 5 Lessons Learned and Discussion -- 6 Related Work -- 7 Conclusion -- References -- Enabling SMEs to Industry 4.0 Using the BaSyx Middleware: A Case Study -- 1 Introduction -- 2 State of the Art and State of the Practice -- 2.1 Industry 4.0 and the Automation Pyramid -- 2.2 Asset Administration Shells as Digital Twins -- 2.3 BaSyx Middleware -- 3 Industry Use Cases -- 3.1 Use Case 1 - Continuous Optimization of Quotations -- 3.2 Use Case 2 - Improving the Product Quality Through Continuous Monitoring -- 4 Experiences and Lessons Learned -- 5 Conclusion -- References -- Software Architectures for Edge Analytics: A Survey -- 1 Introduction -- 2 Edge Analytics -- 2.1 Edge Analytics Foundations.2.2 Example Use Case.Lecture Notes in Computer Science Software architectureCongressesSoftware engineeringCongressesSoftware architectureSoftware engineering005.1Biffl StefanMiAaPQMiAaPQMiAaPQBOOK996464490103316Software Architecture772205UNISA