187 Hits in 6.1 sec

Identifying Semantic Outliers of Source Code Artifacts and Their Application to Software Architecture Recovery

Ki-Seong Lee, Chan-Gun Lee
2020 IEEE Access  
We also expect it to contribute to the prediction of the defect proneness of software. ⸫ Q1 = (0.3, 0.3, 0.1, 0.17, 0.13), Q1 = Q2 = Q3 FIGURE 1 . 19 FIGURE 2 . 1192 CC distribution in Hadoop-core 0.  ...  [8] proposed Architecture Recovery using Concerns (ARC). They recovered software entity concerns using the Latent Dirichlet Allocation (LDA) statistical language model [22] .  ... 
doi:10.1109/access.2020.3040024 fatcat:cat3c27mfrbnbpsu6lhf4pwue4

Can You Explain That, Better? Comprehensible Text Analytics for SE Applications [article]

Amritanshu Agrawal, Huy Tu, Tim Menzies
2018 arXiv   pre-print
Text mining methods are used for a wide range of Software Engineering (SE) tasks.  ...  To answer these questions, we explore a combination of LDA (Latent Dirichlet Allocation) and FFTs (Fast and Frugal Trees) to classify NASA software bug reports from six different projects.  ...  [16] used LDA to identify whether defect prone module stays defect prone even in future versions. They showed top topics with top words related to defect.  ... 
arXiv:1804.10657v1 fatcat:zecdkdtxrncr7ksf76lbd6osl4

Balanced Knowledge Distribution among Software Development Teams – Observations from Open-Source and Closed-Source Software Development [article]

Saad Shafiq, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed
2022 arXiv   pre-print
Unfortunately, no established methods exist to measure how knowledge is distributed among development teams.  ...  We find out that the ConceptRealm can represent the high-level domain knowledge within a team and can be utilized to predict the alignment of developers with issues.  ...  We would also like to acknowledge the support from Philipp Lengauer at Dynatrace for providing us with the data and helping us with the evaluation.  ... 
arXiv:2207.12851v1 fatcat:gkiv2i46gjevzf34ebxkxwh4jy

Review of the AC Loss Computation for HTS using the H-formulation [article]

Boyang Shen, Francesco Grilli, Tim Coombs
2020 arXiv   pre-print
Modeling strategies to tackle large number of HTS tapes, such as multi-scale and homogenization methods, are also introduced.  ...  This model, which uses the components of the magnetic field as state variables, has been gaining a great popularity and has been in use in tens of research groups around the world.  ...  They found that when the external magnetic field is perpendicular to the tape surface, the total AC loss show a modulation in regard to the phase shift between the applied current and external magnetic  ... 
arXiv:1908.02176v3 fatcat:mkwmfakjizazrjvl3zr7i4cdhy

Development of wastewater pipe performance index and performance prediction model

Thiti Angkasuwansiri, Sunil K. Sinha
2014 International Journal of Sustainable Materials and Structural Systems  
Developing a performance index led to the development of a probabilistic performance prediction model for wastewater pipes.  ...  A framework would enable effective and systematic wastewater pipe performance evaluation and prediction in asset management programs. iv  ...  The Dirichlet distribution was used to express subjective prior knowledge that was updated using inspection data.  ... 
doi:10.1504/ijsmss.2014.062767 fatcat:zl2brykysnbvxchetac5xzhlae

Cooperation among an anonymous group protected Bitcoin during failures of decentralization [article]

Alyssa Blackburn, Christoph Huber, Yossi Eliaz, Muhammad S. Shamim, David Weisz, Goutham Seshadri, Kevin Kim, Shengqi Hang, Erez Lieberman Aiden
2022 arXiv   pre-print
This was due to the rapid emergence of Pareto distributions in bitcoin income, producing such extensive resource centralization that almost all contemporary bitcoin addresses can be connected to these  ...  We model this dilemma using an N-player Centipede game in which anonymous players can choose to exploit, and thereby undermine, an appreciating good.  ...  (10) uses econophysics models to analyze the degree distribution and wealth distribution of the transaction network and finds the network to be scale-free (38) and driven by preferential attachment  ... 
arXiv:2206.02871v1 fatcat:dscropohsja2bghaperysvakeq

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches [article]

Triet H. M. Le
2022 arXiv   pre-print
The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment using data-driven approaches.  ...  Software vulnerability assessment provides important and multifaceted information to prevent and mitigate dangerous cyber-attacks in the wild.  ...  generic software defects.  ... 
arXiv:2207.11708v1 fatcat:q5nhlhboyfc2tipexhnqzmz77a

Process monitoring for material extrusion additive manufacturing: a state-of-the-art review

Alexander Oleff, Benjamin Küster, Malte Stonis, Ludger Overmeyer
2021 Progress in Additive Manufacturing  
This literature review is the first to address process monitoring for material extrusion using a systematic and comprehensive approach.  ...  After removing the duplicates with the aid of the literature management software Citavi (Swiss Academic Software GmbH), the dataset contained 9176 entries.  ...  Using a similar hardware setup, the tensile strength of samples was predicted in a work by Bartolai et al. [173, 174] .  ... 
doi:10.1007/s40964-021-00192-4 fatcat:pk2qrtw5bneglox2gfjntbnzdy

Software Development Process Mining: Discovery, Conformance Checking and Enhancement

Joao Caldeira, Fernando Brito e Abreu
2016 2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC)  
Specific metrics are defined for procedure complexity, software modules complexity, and module coupling [87] .  ...  is scale-free (i.e., stable), in spite of the ad-hoc and opportunistic nature of URL sharing activities, while the outdegree distribution of the knowledge network is not scale-free. iv) The indegree distributions  ...  This Appendix presents the tools used to perform current research and in writing this dissertation. A.1 Companion Tools  ... 
doi:10.1109/quatic.2016.061 dblp:conf/quatic/CaldeiraA16 fatcat:acb3seoe7vh6hamsvwor2qzcou

Risk Analysis [chapter]

2012 Wiley Series in Probability and Statistics  
distribution of a Dirichlet process, multiplied by g(t i ) − g(t i−1 ) and shifted above by g( ••• Prediction intervals of the number of failures for train 19 using 730 days (2 years) of observations  ...  coefficient u jk : local mean of signal at different scales and shiftsScaling and wavelet coefficients by recursion . . .  ...  The random measure M = βµ, s.t. βµ(A) = A β(x)µ(dx), ∀A ∈ S, follows a Generalised Gamma distribution, with shape α and scale β (denoted by M ∼ GG(α, β)).  ... 
doi:10.1002/9780470975916.ch10 fatcat:dwnwelyqojd53hcqxhzanmbuoe

Patient-Specific Inverse Modeling of In Vivo Cardiovascular Mechanics with Medical Image-Derived Kinematics as Input Data: Concepts, Methods, and Applications

Johane H. Bracamonte, Sarah K. Saunders, John S. Wilson, Uyen T. Truong, Joao S. Soares
2022 Applied Sciences  
in cardiovascular medicine are a collection of methodologies that can provide non-invasive patient-specific estimations of tissue properties, mechanical loads, and other mechanics-based risk factors using  ...  the latter seemed more prone to solution multiplicity and buckling [242, 243] .  ...  The method requires a set of measured data along with its probability distribution (which can be often assumed normal due to random experimental error), a predictive model, and a prior probability distribution  ... 
doi:10.3390/app12083954 fatcat:so7cwudvyfgprigztufgw7we2e


Michał Mikołajczyk
2017 Figshare  
All the modulations were provided for 277GHz frequency.  ...  The recently proposed [2] and demonstrated quantum fingerprinting [3] , exploiting phase-modulated weak coherent pulses, provides (log 2 ) scaling in the number of used qubits, but needs phase stability  ...  The focussing efficiency of the hologram encoded meta-surface is analysed using electromagnetic simulation software.  ... 
doi:10.6084/m9.figshare.5146993 fatcat:di5yptwolfa2hjypnxqmyemqby

Challenges and opportunities for multi-functional oxide thin films for voltage tunable radio frequency/microwave components

Guru Subramanyam, M. W. Cole, Nian X. Sun, Thottam S. Kalkur, Nick M. Sbrockey, Gary S. Tompa, Xiaomei Guo, Chonglin Chen, S. P. Alpay, G. A. Rossetti, Kaushik Dayal, Long-Qing Chen (+1 others)
2013 Journal of Applied Physics  
Predicting the behavior of ferroic and multi-ferroic materials, however, also involves phenomena that are relevant at length scales other than that of monodomain single crystals: the macro scale behavior  ...  Thus, development of consistent and predictable tunable device performance requires the development of "wafer scale" BST film property control and uniformity.  ... 
doi:10.1063/1.4827019 fatcat:n4p6pcfkhbdjhge5qqdgb5bruy

Generating Block-Structured Kernels for Low Order Finite Element Methods

Marcel Koch, Christian Engwer, Harald Köstler
2021 Zenodo  
The core concept is to use a two level grid, composed of coarse macro elements which are uniformly refined during their handling. This opens up new optimization possibilities.  ...  A useful quantity for most iterative methods is the residual, or defect, = − = * − = ( * − ) = .  ...  Widely used modules are DUNEPDELAB, DUNE FEM, DUNEFUFEM, and DUNEGDT.  ... 
doi:10.5281/zenodo.4704642 fatcat:ynsfwpzd4rhrzp5fvzbiisfxcy


Michał Mikołajczyk
2017 Figshare  
All the modulations were provided for 277GHz frequency.  ...  The recently proposed [2] and demonstrated quantum fingerprinting [3] , exploiting phase-modulated weak coherent pulses, provides (log 2 ) scaling in the number of used qubits, but needs phase stability  ...  The focussing efficiency of the hologram encoded meta-surface is analysed using electromagnetic simulation software.  ... 
doi:10.6084/m9.figshare.5146993.v1 fatcat:oaoupvmmgzbpboo32bs5775ypq
« Previous Showing results 1 — 15 out of 187 results