A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identifying Semantic Outliers of Source Code Artifacts and Their Application to Software Architecture Recovery
2020
IEEE Access
We also expect it to contribute to the prediction of the defect proneness of software. ⸫ Q1 = (0.3, 0.3, 0.1, 0.17, 0.13), Q1 = Q2 = Q3
FIGURE 1 . 19 FIGURE 2 . 1192 CC distribution in Hadoop-core 0. ...
[8] proposed Architecture Recovery using Concerns (ARC). They recovered software entity concerns using the Latent Dirichlet Allocation (LDA) statistical language model [22] . ...
doi:10.1109/access.2020.3040024
fatcat:cat3c27mfrbnbpsu6lhf4pwue4
Can You Explain That, Better? Comprehensible Text Analytics for SE Applications
[article]
2018
arXiv
pre-print
Text mining methods are used for a wide range of Software Engineering (SE) tasks. ...
To answer these questions, we explore a combination of LDA (Latent Dirichlet Allocation) and FFTs (Fast and Frugal Trees) to classify NASA software bug reports from six different projects. ...
[16] used LDA to identify whether defect prone module stays defect prone even in future versions. They showed top topics with top words related to defect. ...
arXiv:1804.10657v1
fatcat:zecdkdtxrncr7ksf76lbd6osl4
Balanced Knowledge Distribution among Software Development Teams – Observations from Open-Source and Closed-Source Software Development
[article]
2022
arXiv
pre-print
Unfortunately, no established methods exist to measure how knowledge is distributed among development teams. ...
We find out that the ConceptRealm can represent the high-level domain knowledge within a team and can be utilized to predict the alignment of developers with issues. ...
We would also like to acknowledge the support from Philipp Lengauer at Dynatrace for providing us with the data and helping us with the evaluation. ...
arXiv:2207.12851v1
fatcat:gkiv2i46gjevzf34ebxkxwh4jy
Review of the AC Loss Computation for HTS using the H-formulation
[article]
2020
arXiv
pre-print
Modeling strategies to tackle large number of HTS tapes, such as multi-scale and homogenization methods, are also introduced. ...
This model, which uses the components of the magnetic field as state variables, has been gaining a great popularity and has been in use in tens of research groups around the world. ...
They found that when the external magnetic field is perpendicular to the tape surface, the total AC loss show a modulation in regard to the phase shift between the applied current and external magnetic ...
arXiv:1908.02176v3
fatcat:mkwmfakjizazrjvl3zr7i4cdhy
Development of wastewater pipe performance index and performance prediction model
2014
International Journal of Sustainable Materials and Structural Systems
Developing a performance index led to the development of a probabilistic performance prediction model for wastewater pipes. ...
A framework would enable effective and systematic wastewater pipe performance evaluation and prediction in asset management programs. iv ...
The Dirichlet distribution was used to express subjective prior knowledge that was updated using inspection data. ...
doi:10.1504/ijsmss.2014.062767
fatcat:zl2brykysnbvxchetac5xzhlae
Cooperation among an anonymous group protected Bitcoin during failures of decentralization
[article]
2022
arXiv
pre-print
This was due to the rapid emergence of Pareto distributions in bitcoin income, producing such extensive resource centralization that almost all contemporary bitcoin addresses can be connected to these ...
We model this dilemma using an N-player Centipede game in which anonymous players can choose to exploit, and thereby undermine, an appreciating good. ...
(10) uses econophysics models to analyze the degree distribution and wealth distribution of the transaction network and finds the network to be scale-free (38) and driven by preferential attachment ...
arXiv:2206.02871v1
fatcat:dscropohsja2bghaperysvakeq
Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
[article]
2022
arXiv
pre-print
The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment using data-driven approaches. ...
Software vulnerability assessment provides important and multifaceted information to prevent and mitigate dangerous cyber-attacks in the wild. ...
generic software defects. ...
arXiv:2207.11708v1
fatcat:q5nhlhboyfc2tipexhnqzmz77a
Process monitoring for material extrusion additive manufacturing: a state-of-the-art review
2021
Progress in Additive Manufacturing
This literature review is the first to address process monitoring for material extrusion using a systematic and comprehensive approach. ...
After removing the duplicates with the aid of the literature management software Citavi (Swiss Academic Software GmbH), the dataset contained 9176 entries. ...
Using a similar hardware setup, the tensile strength of samples was predicted in a work by Bartolai et al. [173, 174] . ...
doi:10.1007/s40964-021-00192-4
fatcat:pk2qrtw5bneglox2gfjntbnzdy
Software Development Process Mining: Discovery, Conformance Checking and Enhancement
2016
2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC)
Specific metrics are defined for procedure complexity, software modules complexity, and module coupling [87] . ...
is scale-free (i.e., stable), in spite of the ad-hoc and opportunistic nature of URL sharing activities, while the outdegree distribution of the knowledge network is not scale-free. iv) The indegree distributions ...
This Appendix presents the tools used to perform current research and in writing this dissertation.
A.1 Companion Tools ...
doi:10.1109/quatic.2016.061
dblp:conf/quatic/CaldeiraA16
fatcat:acb3seoe7vh6hamsvwor2qzcou
Risk Analysis
[chapter]
2012
Wiley Series in Probability and Statistics
distribution of a Dirichlet process, multiplied by g(t i ) − g(t i−1 ) and shifted above by g(
••• Prediction intervals of the number of failures for train 19 using 730 days (2 years) of observations ...
coefficient u jk : local mean of signal at different scales and shifts • Scaling and wavelet coefficients by recursion . . . ...
The random measure M = βµ, s.t. βµ(A) = A β(x)µ(dx), ∀A ∈ S, follows a Generalised Gamma distribution, with shape α and scale β (denoted by M ∼ GG(α, β)). ...
doi:10.1002/9780470975916.ch10
fatcat:dwnwelyqojd53hcqxhzanmbuoe
Patient-Specific Inverse Modeling of In Vivo Cardiovascular Mechanics with Medical Image-Derived Kinematics as Input Data: Concepts, Methods, and Applications
2022
Applied Sciences
in cardiovascular medicine are a collection of methodologies that can provide non-invasive patient-specific estimations of tissue properties, mechanical loads, and other mechanics-based risk factors using ...
the latter seemed more prone to solution multiplicity and buckling [242, 243] . ...
The method requires a set of measured data along with its probability distribution (which can be often assumed normal due to random experimental error), a predictive model, and a prior probability distribution ...
doi:10.3390/app12083954
fatcat:so7cwudvyfgprigztufgw7we2e
AbstractBook_OPTO2017.pdf
2017
Figshare
All the modulations were provided for 277GHz frequency. ...
The recently proposed [2] and demonstrated quantum fingerprinting [3] , exploiting phase-modulated weak coherent pulses, provides (log 2 ) scaling in the number of used qubits, but needs phase stability ...
The focussing efficiency of the hologram encoded meta-surface is analysed using electromagnetic simulation software. ...
doi:10.6084/m9.figshare.5146993
fatcat:di5yptwolfa2hjypnxqmyemqby
Challenges and opportunities for multi-functional oxide thin films for voltage tunable radio frequency/microwave components
2013
Journal of Applied Physics
Predicting the behavior of ferroic and multi-ferroic materials, however, also involves phenomena that are relevant at length scales other than that of monodomain single crystals: the macro scale behavior ...
Thus, development of consistent and predictable tunable device performance requires the development of "wafer scale" BST film property control and uniformity. ...
doi:10.1063/1.4827019
fatcat:n4p6pcfkhbdjhge5qqdgb5bruy
Generating Block-Structured Kernels for Low Order Finite Element Methods
2021
Zenodo
The core concept is to use a two level grid, composed of coarse macro elements which are uniformly refined during their handling. This opens up new optimization possibilities. ...
A useful quantity for most iterative methods is the residual, or defect, = − = * − = ( * − ) = . ...
Widely used modules are DUNEPDELAB, DUNE FEM, DUNEFUFEM, and DUNEGDT. ...
doi:10.5281/zenodo.4704642
fatcat:ynsfwpzd4rhrzp5fvzbiisfxcy
AbstractBook_OPTO2017.pdf
2017
Figshare
All the modulations were provided for 277GHz frequency. ...
The recently proposed [2] and demonstrated quantum fingerprinting [3] , exploiting phase-modulated weak coherent pulses, provides (log 2 ) scaling in the number of used qubits, but needs phase stability ...
The focussing efficiency of the hologram encoded meta-surface is analysed using electromagnetic simulation software. ...
doi:10.6084/m9.figshare.5146993.v1
fatcat:oaoupvmmgzbpboo32bs5775ypq
« Previous
Showing results 1 — 15 out of 187 results