The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that...
Recently, there have been many advances in the research underlying condensed co-change graph, but most research has focused on the discovery of the graph feature. There still few works have done with consideration that the mass unchanged artifacts profoundly effect on the clustering. This paper presents a method for constructing more accurate condensed co-change graph. By using random walk, all the...
Java is one of the most popular programming architectures because of its platform-independence. Its platform-independence depends on Java virtual machine JVM. Compared to executing class file on hardware JVM, executing class file on software JVM is much slower. By studying we master the component architecture and the working principle of software JVM based on the class file to explain the implementation...
Coverage analysis defines the tracing of a program by test cases. It also helps in the testing process by finding the areas of a program not exercised by a set of test cases. Introducing new test cases to increase coverage, and determine the quantitative measure of the code, which is an indirect measure of quality. Coverage analysis provides more benefit when applied to an application that makes a...
The data mining and machine learning community is often faced with two key problems: working with imbalanced data and selecting the best features for machine learning. This paper presents a process involving a feature selection technique for selecting the important attributes and a data sampling technique for addressing class imbalance. The application domain of this study is software engineering,...
Neural networks are often selected as tool for software effort prediction because of their capability to approximate any continuous function with arbitrary accuracy. A major drawback of neural networks is the complex mapping between inputs and output, which is not easily understood by a user. This paper describes a rule extraction technique that derives a set of comprehensible IF-THEN rules from a...
Measurement methods have significant meaning for user's trust to software trustworthiness. Data mining is one of technologies through which measurement methods and tools can collect trustworthiness data to calculate software trustworthiness. In this paper, a Measurement Method based on Data Mining (MMDM) is proposed, trying to improve correctness of conclusion made by user toward provider's service...
This paper asks which of White's (2009) three disciplines and relative valuation orders does the Singapore blogosphere adhere to. Analysing not just the hyperlink connections but the textual discourse; and in doing so attempts to highlight certain limitations of using automated data mining and analysis software. Using the Singapore blogosphere, described by Lin, Sundaram, Chi, Tatemura, and Tseng,...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Classroom response systems have been envisaged to be one of the most useful e-learning technologies that have been notably employed to improve interactivity in classrooms. Students use state-of-the-art technology to convey their responses anonymously to the instructor's questions. Analysing the responses is necessary to attain higher understanding of the lecture's material by students. This paper...
The recent years have seen a flurry of research inspired by social and biological models to achieve the software autonomy. This has been prompted by the need to automate laborious administration tasks, recovery from unanticipated systems failure, and provide self-protection from security vulnerabilities, whilst guaranteeing predictable autonomic software behavior. However, runtime assured adaptation...
Wireless and pervasive applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security and safety. In contrast to the case of classic safety critical applications, the behavior of such applications is affected by the movements and location of users and resources. This paper presents some formal tools that enable designers to...
Software speculation has shown promise in parallelizing programs with coarse-grained dynamic parallelism. However, most speculation systems use offline profiling for the selection of speculative regions. The mismatch with the input-sensitivity of dynamic parallelism may result in large numbers of speculation failures in many applications. Although with certain protection, the failed speculations may...
A computer cluster is a group of loosely coupled computers that work together closely so that in many respects it can be viewed as though it were a single computer. Clusters are commonly connected through fast local area networks. Clusters are usually deployed to improve speed and/or reliability over that provided by a single computer, while typically being much more cost-effective than single computers...
Service-oriented computing advocates the development of new software or services on the basis of existing services. This paradigm shows a great potential of achieving high productivity and low cost, but it faces a challenge in efficiently and correctly using existing services in producing a new application and ensuring its reliability. Building a formal model using a formal specification language...
This paper addresses an unrelated parallel machine problem with machine and job sequence dependent setup times. The objective function considered is a linear combination of the total completion time and the total number of resources assigned. Due to the combinatorial complexity of this problem, we propose an algorithm based on the GRASP metaheuristic, in which the basic parameter that defines the...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Mutant protein hSKCa3 responsible for Schizophrenia is taken from NCBI's Entrez database; its 3D structure is determined by homology modelling. The conotoxin protein is taken from NCBI's Entrez database & its 3D structure is established. The structure of Withanolide is determined and docked with conotoxin protein; this combination is docked with hSKCa3 protein, hence establishing a remedy.
This paper proposes a simple and practical RAID reconstruction optimization scheme, called JOurnal-guided Reconstruction (JOR). JOR exploits the fact that significant portions of data blocks in typical disk arrays are unused. JOR monitors the storage space utilization status at the block level to guide the reconstruction process so that only failed data on the used stripes is recovered to the spare...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.