The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human factors have been increasingly recognized as one of the major driving forces of requirement changes. We believe that the requirements elicitation (RE) process should largely embrace human-centered perspectives, and this paper focuses on changing human intentions and desires over time. To support software evolution due to requirement changes, Situ framework has been proposed to model and detect...
Meta-heuristics have emerged as an efficient way to solve NP-hard problems even without the guaranteed of optimal values. The main issue of meta-heuristics is that they are built using domain-specific knowledge. Therefore, they require a great effort to be adapted to a new domain. The concept of Hyper-heuristic was proposed to solve this problem. Hyper-heuristics are search methods that aim to solve...
There are several known methods for detecting overlapping communities in graphs, each one having their advantages and limitations. The Clique Percolation Method (CPM) is one such method. CPM works by joining highly connected subgraphs (cliques) and using it to find the graph communities. However, the clique enumeration problem is NP-Hard, taking exponential time to be solved. This makes its use impractical...
Semi-supervised clustering has been widely explored in the last years. In this paper, we present HCAC-ML (Hierarchical Confidence-based Active Clustering with Metric Learning), an innovative approach for this task which employs distance metric learning through cluster-level constraints. HCAC-ML is based on the HCAC algorithm, an state-of-the-art algorithm for hierarchical semi-supervised clustering...
Teachers today spend a lot of time grading students' work. Yet many times students feel under-appreciated and they lack understanding of the grading criteria, which leads to no improvement of their learning through time. This paper presents a perspective on automatic evaluations of students' work with the use of gamified peer assessment. Using peer assessment, students not only learn what was correct...
We develop T2API, a context-sensitive, graph-based statisticaltranslation approach that takes as input an English description of aprogramming task and synthesizes the corresponding API code templatefor the task. We train T2API to statistically learn the alignmentsbetween English and APIs and determine the relevant API elements. Thetraining is done on StackOverflow, which is a bilingual corpus onwhich...
Traditional music recommendation techniques suffer from limited performance due to the sparsity of user-music interaction data, which is addressed by incorporating auxiliary information. In this paper, we study the problem of personalized music recommendation that takes different kinds of auxiliary information into consideration. To achieve this goal, a Heterogeneous Information Graph (HIG) is first...
We introduce a Gentzen-type sequent calculus PL for a modified extension of Arieli, Avron and Zamansky's ideal paraconsistent four-valued logic 4CC. The calculus PL, which is also regarded as a paradefinite four-valued logic, is formalized based on the idea of connexive logic. Theorems for syntactically and semantically embedding PL into a Gentzen-type sequent calculus LK for classical logic and vice...
Mutation testing is a technique to evaluate the quality of test cases by assessing their ability to detect faults. Mutants are modified versions of the original program that are generated automatically and should contain faults similar to those caused by developers' mistakes. For configurable systems, existing approaches propose mutation operators to produce faults that may only exist in some configurations...
When interacting with user interfaces, do users always get what they expect? For each user interface element in thousands of Android apps, we extracted the Android APIs they invoke as well as the text shown on their screen. This association allows us to detect outliers: User interface elements whose text, context or icon suggests one action, but which actually are tied to other actions. In our evaluation...
This paper is a contribution to the study of the universal Horn fragment of predicate fuzzy logics, focusing on the proof of the existence of free models of theories of Horn clauses over Rational Pavelka predicate logic. We define the notion of a term structure associated to every consistent theory T over Rational Pavelka predicate logic and we prove that the term models of T are free on the class...
A Massive Open Online Course (MOOC) is a popular way for universities to deliver quality course content to a global audience. Furthermore, a MOOC specialization offers a series of related such courses with a capstone component. Typical software engineering capstone projects in campus courses involve teamwork and creating software. Within such a context, students experience the software development...
Student engagement is crucial for successful self-paced learning. Feeling isolated during self-paced learning with neither adequate supervision nor intervention by teachers may cause negative emotions such as anxiety. Such emotions may in turn significantly weaken students' motivation to engage in learning activities. In this paper, we develop a self-pacedlearning environment (FishBuddy) that aims...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
The aim of our research is to study how to increase Public Value through the collective participation, involving Public Administrations, stakeholders and citizens together. The Public Value for citizens is in the available and gained Knowledge. The paper models this concept by introducing a variant of the classic Data-Information-Knowledge pyramid, considering everything published as open and public...
This research explores the effects of providing on-time automated assessment in a co-located collaborative system for Entity-Relationship design. In addition, students' perceptions about the validity and usefulness of this automated assessment, and its potential for reflection were analyzed. Thirty undergraduate students from computer science participated in the study, a quasi-experimental pre-post...
In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close...
The problem of node classification has been widely studied in a variety of network-based scenarios. In this paper, we will study the more challenging scenario in which some of the edges in a content-based network are labeled, and it is desirable to use this information in order to determine the labels of other arbitrary edges. Furthermore, each edge is associated with text content, which may correspond...
In programming languages that use multiple dispatch, a single function can have multiple implementations, each of which may specialise the function's operation. Which one of these implementations to execute is determined by the data types of all the arguments to the function. Effective testing of functions that use multiple dispatch therefore requires diverse test inputs in terms of the data types...
Many embedded processors do not support floating-point arithmetic in order to comply with strict cost and power consumption constraints. But, they generally provide support for SIMD as a mean to improve performance for little cost overhead. Achieving good performance when targeting such processors requires the use of fixed-point arithmetic and efficient exploitation of SIMD data-path. To reduce time-to-market,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.