The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Expert finding would be useful for a recommendation system which people want to find experts in a specific area. This paper proposes a model to identify focus research areas of computer science researchers thru their publications. We collect title, abstract and keywords of academic papers published in IEEE Xplore digital library of selected researchers from computer science departments of four universities...
Using research-based teaching-learning methodologies in Computer Science programs is a challenge. Achieving the balance between the required technical knowledge and scientific rigor in young professionals is difficult in the University. The goal of this paper is to help baccalaureate level teachers and students employ a research-based teaching-learning methodology through the introduction of research...
The Costa Rican Ministry of Science, Technology and Telecommunications (MICITT) promotes The Science and Technology Month. This is a yearly celebration aimed at bringing young students closer to science and technology. In 2016, the activity included events in six rural areas around the country. Laboratorio Experimental is a group for research and outreach in computer science education hosted by Instituto...
Much attention has been paid to the diagonal flips in maximal planar graphs. In this paper, we firstly focus on the properties of the unflippable edges in maximal planar graphs, and propose the concept of K4-embedding. Also, we prove that for a maximal planar graph G with order n(⋝ 5), an edge e ∊ E(G) is unflippable if and only if e is either incident to a 3-degree vertex or a supporting edge of...
In [1], we present a lightweight online failure prediction approach, called Seer, to predict the manifestation of failures at runtime, i.e., while the system is running and before the failures occur, so that preventive and/or protective measures can proactively be taken to improve software reliability. One way Seer differs from the other related approaches is that it collects information from inside...
When a group of like-minded individuals set out on an ambitious quest, they need a clear vision, well-defined goals, skills to overcome unforeseen problems, commitment, perseverance, momentum, and a sense of joint adventure to propel them through the challenges ahead. This was certainly the case for interstellar travelers in the novel ‘Aurora’ written by Kim Stanley Robinson. The story starts 160...
Recent research in software engineering supports the "happy-productive" thesis, and the desire of flourishing happiness among programmers is often expressed by industry practitioners. Recent literature has suggested that a cost-effective way to foster happiness and productivity among workers could be to limit unhappiness of developers due to its negative impact. However, possible negative...
With the goal of helping software engineering researchers understand how to improve their papers, Mary Shaw presented "Writing Good Software Engineering Research Papers" in 2003. Shaw analyzed the abstracts of the papers submitted to the 2002 International Conference of Software Engineering (ICSE) to determine trends in research question type, contribution type, and validation approach....
Abstract test case prioritization (ATCP) aims at ordering abstract test case in order to increase the speed at which faults are detected, potentially increasing the fault detection rate. This paper empirically examines possible ATCP techniques, according to the following four categories: non-information-guided prioritization (NIGP), interaction coverage based prioritization (ICBP), input-model mutation...
Using topic modeling, we analyse the titles and abstracts of nearly 10,000 papers from 20 years published in 11 top-ranked Software Engineering(SE) conferences between 1993 to 2013. Seven topics are identified as the dominant themes in modern software engineering. We show that these topics are not static, rather, some of them are becoming decidedly less prominent over time (modeling) while others...
Many books and papers describe how to do data science. While those texts are useful, it can also be important to reflect on anti-patterns; i.e. common classes of errors seen when large communities of researchers and commercial software engineers use, and misuse data mining tools. This technical briefing will present those errors and show how to avoid them.
Integer overflow vulnerability is very difficult to locate and patch. From experience speaking the more complicate the integer operation the more error-prone the program. So in this paper, we come up with a new method to leverage static integer operation attributes to predict integer overflows based on machine learning technique. The static integer operation attributes consist of sink, integer operation...
Against the problems existing in the collective running projects, such as not-reasonable-enough monitoring means, not-scientific-enough assessment tools, and so on, an overseeing and evaluating system of running training was designed and implemented based on the radio frequency identification(RFID), which has the advantages of high precision, comprehensive and real-time positioning. The system provides...
seL4 is formally verified for its functional correctness and its kernel modules provide strong support to achieve interprocess communication mechanism. In recent years, some scholars designed Interprocess Communication Systems with library-based architecture. This design abandons Message-Passing technique that most of microkernels adhere to. The present research still insists on the Message-Passing...
Education and technology have a very close relationship and it cannot be denied. Education is now very depending with technology and always keeps evolving to support each other. Teaching methods are now drastically change because the present of rapid development of technology. The way of teaching is now shifting due to the available technology and the students, parents and the society no longer accept...
Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.