The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the first steps towards the effective Technical Debt (TD) management is the quantification and continuous monitoring of the TD principal. In the current state-ofresearch and practice the most common ways to assess TD principal are the use of: (a) structural proxies—i.e., most commonly through quality metrics; and (b) monetized proxies—i.e., most commonly through the use of the SQALE (Software...
High dropout rate of MOOC is criticized while a dramatically increasing number of learners are appealed to these online learning platforms. Various works have been done on analysis and prediction of dropout. Machine learning techniques are widely applied to this field. However, a single classifier may not always perform reliable for predictions. In this work, we study dropout prediction for MOOC....
NAND flash is rapidly becoming the media of choice for data storage, due in part to its speed and low power consumption. However, flash wears out through repeated program-erase (P-E) cycling, causing the raw bit error rate (RBER) to increase. Error correction codes (ECCs) are used to detect and correct errors in a sector of data called a codeword. An uncorrectable error occurs when the number of bit...
Software fault prediction models are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. We apply three different ensemble methods to develop a model for predicting fault proneness. We propose a framework to validate the source code metrics and select the right set of metrics with the objective to improve the performance of the fault prediction...
Recently it has been shown that policy-gradient methods for reinforcement learning can be utilized to train deep end-to-end systems directly on non-differentiable metrics for the task at hand. In this paper we consider the problem of optimizing image captioning systems using reinforcement learning, and show that by carefully optimizing our systems using the test metrics of the MSCOCO task, significant...
Precipitation nowcasting is an important component for accurate weather modeling and Doppler radar data acts as an important input for nowcasting models. In this work, we propose a deep learning based approach for radar echo states prediction. Our approach uses a hybrid structure of convolutions within Long Short Term Memory recurrent network structure and a discriminator network is added in the loss...
Software build integrates modules developed and maintained by different developers in parallel, tests the result of integration, and serves as a crucial step in cooperatiive software development. Predicting the result of build has drawn the interest of academia and industry. In spite of many previous researches, the generalizability of build failure prediction over a wide range of open-source projects...
Many fault-proneness prediction models have been proposed in literature to identify fault-prone code in software systems. Most of the approaches use fault data history and supervised learning algorithms to build these models. However, since fault data history is not always available, some approaches also suggest using semi-supervised or unsupervised fault-proneness prediction models. The HySOM model,...
Over the years social network data has been mined to predict individuals' traits such as intelligence and sexual orientation. While mining social network data can provide many beneficial services to the user such as personalized experiences, it can also harm the user when used in making critical decisions such as employment. In this work, we investigate the reliability of applying data mining techniques...
Mobile video service becomes more and more popular with commercial deployment of Long Term Evolution (LTE) networks and other wireless access mechanisms. However, perfect LTE coverage with ubiquitous signal quality is not available in reality. Recently, adaptive HTTP video streaming over LTE has been gaining popularity. The quality of video service faces challenges. In this paper, we study the Quality...
Web services evolve over time to fix bugs or update and add new features. However, the design of the Web service's interface may become more complex when aggregating many unrelated operations in terms of context and functionalities. A possible solution is to refactor the Web services interface into different modules that help the user quickly identifying relevant operations. The most challenging issue...
The degree of homogeneity of statistical distributions among data sources is a critical issue when reusing data of Integrated Data Repositories (IDR). Evaluating this data source stability is of utmost importance in order to ensure a confident data reuse. This work tackles the task of discovering and classifying patterns among the statistical distributions of multiple sources in IDRs, by means of...
Because of the popularity of cloud computing, Cloud Service Providers (CSPs) can rent virtual machines (VMs) from Cloud Providers (CPs) conveniently. In our previous work, we proposed an autonomic and elastic resource scheduling framework, named AERS, which made full use of both proactive and reactive controllers in the field of dynamic resource provision and was integrated with an availability-aware...
The growing adoption of automated data collection systems in the transit industry, such as automated fare-collection (AFC) and automated vehicle location (AVL), is providing operators with extensive data about the state of the system and its usage by passengers. The paper proposes a framework for using automated data to support the various functions, both planning and real time, and demonstrates its...
Today's advanced driver assistance systems (ADAS) are increasingly becoming more complex. The next step in this direction is the development of automated driving systems. However, along with the complexity, the effort required for development and validation of these systems is increasing as well. In order to be able to master this complexity in terms of cost and time, simulations are being used more...
In this paper, a new method with visual saliency detection for image quality assessment (IQA) is proposed. Through the experiments in this paper, we have verified the proposed method can be effective than most others.
Due to the constant evolution of technology, each day brings new programming languages, development paradigms, and ways of evaluating processes. This is no different with source code metrics, where there is always new metric classes. To use a software metric to support decisions, it is necessary to understand how to perform the metric collection, calculation, interpretation, and analysis. The tasks...
Many service desk managers are struggling with the high turnover of service desk employees. Keeping the service desk job interesting and maintaining motivation is considered as a difficult task. In this study, we aim at exploring factors that affect the motivation and demotivation among IT service provider organizations' service desk employees. We shall explore how service desk staff see the concepts...
In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare LBSN with accurate and refined measurements. Experimental...
Predicting resource requirements for cloud services is critical for dimensioning, anomaly detection and service assurance. We demonstrate a system for real-time estimation of the needed amount of infrastructure resources, such as CPU and memory, for a given service. Statistical learning methods on server statistics and load parameters of the service are used for learning a resource prediction model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.