The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
API documentation is useful for developers to better understand how tocorrectly use the libraries. However, not all libraries provide gooddocumentation on API usages. To provide better documentation, existingtechniques have been proposed including program analysis-based anddata mining-based approaches. In this work, instead of mining, we aimto generate behavioral exception documentation for any given...
The paper reviews the approach for integrated rating extraction. This approach is based on using search engine API and web scraping mechanisms. The computational formula for integrated rating calculation is proposed.
Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships...
Forensic investigations are usually conducted to solve crimes committed using IT systems as pertetrator and/or victim. However, depending on the size of IT system, also nonmalicious incidents can be investigated using the same, methodological and proven techniques. Based upon the principles contained in the well known computer incident taxonomy, this paper proposes the establishment a common language...
This paper demonstrates the ability to build small world network models with linked documents in form of web pages and generated via software engineering processes. It shows that searchable paths are achievable between two entities in the models by using the algorithms of searching the related web pages. Visualization of the models is presented and the results confirm that the small world network...
Provenance is essential in scientific experiments. It contains information that is key to preserving the data, to determining their quality and authorship, and to reproduce as well as validate the results. In complex experiments and analyses, where multiple tools are used to derive data products, provenance captured by these tools must be combined in order to determine the complete lineage of the...
This paper proposes a methodology to improve the reusability of finite element analysis (FEA) software using a program family approach. The usability and the maintainability are significant problems for a developer trying to properly reuse FEA software. Usability is promoted via systematically defined goals, assumptions, theoretical and computational models, definitions, common requirements and variabilities...
This paper describes a new method to extract most of the noise points by combining the ellipsoid criterion with the Fuzzy C-Means clustering algorithm. The point cloud data are unorganized and without any normal or orientation information. Firstly, we determine if one point is the noise or not by the ellipsoid criterion. After acquiring new point sets being less noisy, we delete large-scale noise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.