The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The application of Information Retrieval (IR) techniquesto software traceability link recovery has been the focusof many studies. These studies have formulated the task ofestablishing valid trace links between two types of softwareartifacts as a retrieval problem, where one type of artifacts isselected as the set of queries and the other as the corpus. Previouswork selected the sets of queries and...
LSI and LDA are widely used techniques to uncover the underlying topical structure of text. They traditionally rely on bag-of-words representation of documents and term frequency-based (TF) weighting schemes. In this paper, we represent documents as graph-of-words to capture the relationships between close words and propose the number of contexts of co-occurrences as alternative term weights (TW)...
This paper presents a method named SoSVMRank, which integrates the social information of a Web document to generate a high-quality summarization. In order to do that, the summarization was formulated as a learning to rank task, in which the order of a sentence or comment was determined by its informative information. The informative information was measured by a set of local and social features in...
In this paper, we present a new framework for the fusion, representation, and analysis of multitemporal synthetic aperture radar (SAR) data. It leads to the definition of a new class of products representing an intermediate level between the classic Level-1 and Level-2 products. The proposed Level-1 $\beta$ products are particularly oriented toward nonexpert users. In fact, their principal characteristics...
Similar bugs are bugs that require handling of many common code files. Developers can often fix similar bugs with a shorter time and a higher quality since they can focus on fewer code files. Therefore, similar bug recommendation is a meaningful task which can improve development efficiency. Rocha et al. propose the first similar bug recommendation system named NextBug. Although NextBug performs better...
Although the volume of online educational resources has dramatically increased in recent years, many of these resources are isolated and distributed in diverse websites and databases. This hinders the discovery and overall usage of online educational resources. By using linking between related subsections of online textbooks as a testbed, this paper explores multiple knowledge-based content linking...
Software bug localization aiming to determine the locations needed to be fixed for a bug report is one of the most tedious and effort consuming activities in software debugging. Learning-to-rank (LR) is the state-of-the-art approach proposed by Ye et al. to recommending relevant files for bug localization. Ye et al.'s experimental results show that the LR approach significantly outperforms previous...
Word sense disambiguation (WSD) is an essential task in computational linguistics for language understanding applications such as information retrieval, question answering, machine translation, text summarization etc. In this paper we propose an unsupervised WSD method for a Hindi sentence based on network agglomeration. First we create the sentence graph G for the given sentence. This sentence graph...
As part of information retrieval processes, words are often stemmed to a common root. The Porter Stemming Algorithm operates as a rule-based suffix-removal process. Stemming can be viewed as a way to cluster related words together according to one common stem. Sometimes Porter includes words in a cluster that are un-related. This experiment attempts to correct this using Formal Concept Analysis (FCA)...
SemioTag is an approach towards tagging that utilizes the semiotic sign categories icon, index, and symbol as classification structures to be used by users during the annotation and search of images within social media-oriented repositories. We compared the influence of this approach on the tagging and querying behaviour of users, with respect to usability, efficiency, and user experience, between...
In this paper we describes our approach for automatic generation of learning objects' semantic metadata. The extraction process is based on the OBIE (Ontology Based Information Extraction) systems' principles. The input of our approach is a set of IEEE LOM metadata elements in conformance with two requirements. First, each data element must describe the educational content of the learning object....
In this paper we describes our approach for automatic generation of learning objects' semantic metadata. The extraction process is based on the OBIE (Ontology Based Information Extraction) systems' principles. The input of our approach is a set of IEEE LOM metadata elements in conformance with two requirements. First, each data element must describe the educational content of the learning object....
A new Virtual Museum Exhibition Designer using an Enhanced ARCO Standard (ViMEDEAS) framework has been developed to support curators and visitors. It unifies features of a recently presented curator tool that allows exhibition planning and includes a functionality for editing existing exhibition layouts and visitors' museum tours and theReplicave2 framework that generates a Web-based virtual 3Dmuseum...
In this paper we introduce a new framework for the development of context-aware knowledge by integrating the user's digital and physical environment. The developed knowledge can contribute to solve problems and challenges of wireless sensor networks within a context that is described by additional cyber-content. Sensor networks are exposed, intentionally or not, to dynamically changing network structures...
If software engineering tools are not "properly integrated", they can reduce engineers' productivity. Associating and retrieving information scattered across the tools become unsystematic and inefficient. Our work provides empirical evidence on what is a "poor" and a "proper" tool integration, focusing on practitioners' perspectives. We interviewed 62 engineers and analyzed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.