Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As part of an ongoing research into extracting mission-critical information from Search and Rescue speech communications, a corpus of unscripted, goal-oriented, two-party spoken conversations has been designed and collected. The Sheffield Search and Rescue (SSAR) corpus comprises about 12 hours of data from 96 conversations by 24 native speakers of British English with a southern accent. Each conversation...
Behavior-based analysis of dynamically executed binaries has become a widely used technique for the identification of suspected malware. Most solutions rely on function call patterns to determine whether a sample is exhibiting malicious behavior. These system and API calls are usually regarded individually and do not consider contextual information or process inter-dependencies. In addition, the patterns...
In post disaster situation, the existing network infrastructure might be partly or fully damaged. In that case, a very popular online social network like twitter can be an effective tool, where people can share their views and knowledge about what is actually happening in the affected areas. It is a very challenging task to analyze the situation during the golden hours of any large scale disaster...
Previous research demonstrated how code smells (i.e., symptoms of the presence of poor design or implementation choices) threat software maintainability. Moreover, some studies showed that their interaction has a stronger negative impact on the ability of developers to comprehend and enhance the source code when compared to cases when a single code smell instance affects a code element (i.e., a class...
The use of Application Programming Interfaces (APIs) is pervasive in software systems; it makes the development of new software much easier, but remembering large APIs with sophisticated usage protocol is arduous for software developers. Code recommendation systems alleviate this burden by providing developers with a ranked list of API usages that are estimated to be most useful to their development...
In this paper, we propose a novel method for sentiment trend analysis using Ant Colony Optimization (ACO) algorithm and SentiWordNet. We first collect social data in the form of Resource Description Framework (RDF) triples, and then use ACO algorithm to digitize the amassed RDF triples. Using ACO algorithm, we then compute pheromone values to extract the trends of the user's sentiments with the modified...
Software Product Line Engineering is a key approach to construct applications with systematical reuse of architecture, documents and other relevant components. To migrate legacy software into a product line system, it is essential to identify the code segments that should be constructed as features from the source base. However, this could be an error-prone and complicated task, as it involves exploring...
Paper presents the Shape Movement Pattern (ShaMP) algorithm, an algorithm for extracting Movement Patterns (MPs) from network data, and a prediction mechanism whereby the identified MPs can be used to predict the nature of movement in a previously unseen network. The principal advantage offered by ShaMP is that it lends itself to parallelisation. The reported evaluation was conducted using both Massage...
A large corpora of software-related documents is available on the Web, and these documents offer the unique opportunity to learn from what developers are saying or asking about the code snippets that they are discussing. For example, the natural language in a bug report provides information about what is not functioning properly in a particular code snippet. Previous research has mined information...
The study of the evolution of highly configurable systems requires a thorough understanding of thee core ingredients of such systems: (1) the underlying variability model; (2) the assets that together implement the configurable features; and (3) the mapping from variable features to actual assets. Unfortunately, to date no systematic way to obtain such information at a sufficiently fine grained level...
Open Source Software Development (OSSD) often suffers from conflicting views and actions due to the perceived flat and open ecology of an open source community. This often manifests itself as a lack of codified knowledge that is easily accessible for community members. How decisions are made and expectations of a software system are often described in detail through the many forms of social communications...
Infrastructure as Code (IaC) is the practice of specifying computing system configurations through code, and managing them through traditional software engineering methods. The wide adoption of configuration management and increasing size and complexity of the associated code, prompt for assessing, maintaining, and improving the configuration code's quality. In this context, traditional software engineering...
Past research has proposed association rule mining as a means to uncover the evolutionary coupling from a system’s change history. These couplings have various applications, such as improving system decomposition and recommending related changes during development. The strength of the coupling can be characterized using a variety of interestingness measures. Existing recommendation engines typically...
The Android platform is designed to support mutually un-trusted third-party apps, which run as isolated processes but may interact via platform-controlled mechanisms, called Intents. Interactions among third-party apps are intended and can contribute to a rich user experience, for example, the ability to share pictures from one app with another. The Android platform presents an interesting point in...
The question-answering systems were being investigated for several decades, but the majority of researches were carried out in English. The subject of this paper is the knowledge-based question-answering system. The unique mathematical model describes the process of answering when the question is presented in Russian as a natural language. The model is executed by mapping the question to the existing...
Fish poisoning can be life threatening and it is important to detect the causes of fish poisoning, and the type of fish poisoning, reliably and accurately. However, the existing research on fish poisoning has generally focused on statistical methods and specific areas within the fish poisoning field. This review based research also highlights the possibilities of data mining in this area, especially...
Nowadays Information Retrieval (IR) is difficult because of huge amount of information published on the Internet. So it is very relevant to organize documents based on its content. The proposed work address this issue by generating concepts from the documents and these documents are grouped based on a data mining approach. To generate the concept, keywords are extracted from the documents but the...
Data sets are the backbone for data mining and knowledge engineering field. The class imbalance problem exists in many real-time data sets. In this paper we investigate the existing approaches for class imbalance problem in the context of classification and ordinal classification. In particular, this investigation extends the study of issues in ordinal classification with respect to the data set and...
Bayesian nonparametric (BNP) models have recently become popular due to their flexibility in identifying the unknown number of clusters. However, they have difficulties handling heterogeneous data from multiple sources. Existing BNP methods either treat each of these sources independently - hence do not get benefits from the correlating information between them, or require to explicitly specify data...
In this paper, we motivate the utility of framing very common data analysis and business intelligence problems as a problem in understanding the differences between two datasets. We call this framework the Difference-of-Datasets (DoD) framework. We propose a simple and effective method to help find the root causes of changes, i.e. “Why did the observed change happen?” or “What drove the observed change?”...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.