1,449 Hits in 7.0 sec

Sidestepping the IT Artifact, Scrapping the IS Silo, and Laying Claim to "Systems in Organizations"

Steven Alter
2003 Communications of the Association for Information Systems  
This paper starts by examining the meaning of "IT artifact" and concluding that this term is too unclear to serve as a basic concept for delineating the field.  ...  The "IT artifact" and debates about the core of the IS field received a lot of attention in the last several years.  ...  IT artifact example: The inconsistency was an artifact of the coding scheme used in the previous information system.  ... 
doi:10.17705/1cais.01230 fatcat:jnvmjhzjenc3vihg2nevcf37va

Towards the clinical implementation of iterative low-dose cone-beam CT reconstruction in image-guided radiation therapy: Cone/ring artifact correction and multiple GPU implementation

Hao Yan, Xiaoyu Wang, Feng Shi, Ti Bai, Michael Folkerts, Laura Cervino, Steve B. Jiang, Xun Jia
2014 Medical Physics (Lancaster)  
As for the cone artifact, without applying a correction method, it contaminated 13 out of 80 slices in a head-neck case (full-fan).  ...  Methods: Image quality improvement methods are proposed to mitigate the cone and ring image artifacts in IR.  ...  It is thus not worthwhile to parallelize it. 2.D.  ... 
doi:10.1118/1.4898324 pmid:25370645 pmcid:PMC4241832 fatcat:ce4dflwi55ca5oz4s3nqlafswq

Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms

Annibale Panichella, Bogdan Dit, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk, Andrea De Lucia
2016 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)  
The approach (named GA-IR) determines the (near) optimal solution to be used for each stage of the IR process, i.e., term extraction, stop word removal, stemming, indexing and an IR algebraic method calibration  ...  This paper proposes the use of Genetic Algorithms (GAs) to automatically configure and assemble an IR process for software engineering tasks.  ...  Task 1: Traceability Link Recovery For this task, we use the IR methods to recover traceability links between high level artifacts (e.g., use cases) and source code classes.  ... 
doi:10.1109/saner.2016.97 dblp:conf/wcre/PanichellaDOPPL16 fatcat:7dkd7klm5vhqdfqirrsv42ypye

Labeling Source Code with Metadata: A Survey and Taxonomy

Matúš Sulír, Jaroslav Porubän
2017 Proceedings of the 2017 Federated Conference on Computer Science and Information Systems  
Source code is a primary artifact where programmers are looking when they try to comprehend a program.  ...  In this article, we present a systematic mapping study of approaches and tools labeling source code elements with metadata and presenting them to developers in various forms.  ...  In the mentioned tools, the linking is performed based on the textual similarity, using IR (information retrieval) methods. C.  ... 
doi:10.15439/2017f229 dblp:conf/fedcsis/SulirP17 fatcat:pfzl3pmsizgs7fpw6dx7tclgc4

Configuring and Assembling Information Retrieval Based Solutions for Software Engineering Tasks

Bogdan Dit
2016 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
In addition, for the chosen IR technique it will automatically determine its (near) optimal parameter values.  ...  The approach named IR-GA determines the (near) optimal solution to be used for each step of the IR process.  ...  Scenario III: Software Artifact Labeling In this scenario, we used LDA to automatically "label" source code classes using representative words.  ... 
doi:10.1109/icsme.2016.85 dblp:conf/icsm/Dit16 fatcat:bre7b5b4dvfpnjktes5zau7iqm

Toward an effective automated tracing process

Anas Mahmoud
2012 2012 20th IEEE International Conference on Program Comprehension (ICPC)  
However, despite these major advances, traceability implementation and use is still not pervasive in industry.  ...  Title of Study: Toward an effective automated tracing process Pages of Study: 217 Candidate for Degree of Doctor of Philosophy Traceability is defined as the ability to establish, record, and maintain  ...  While it can be applied to various types of artifacts, such as design and requirements, refactoring is mostly known for affecting source code [184] .  ... 
doi:10.1109/icpc.2012.6240502 dblp:conf/iwpc/Mahmoud12 fatcat:2vz2rn5rinezbhywiwpl3hj4oy

A survey on the use of topic models when mining software repositories

Tse-Hsun Chen, Stephen W. Thomas, Ahmed E. Hassan
2015 Empirical Software Engineering  
Since the majority of the software engineering data is unstructured, researchers have applied Information Retrieval (IR) techniques to help software development.  ...  Moreover, since the performance of these topic models is directly related to the model parameters and usage, knowing how researchers use the topic models may also help future studies make optimal use of  ...  Using ir methods for labeling source code artifacts: Is it worthwhile? In Proceedings of the 2012 20th International Conference on Program Comprehension, pages 193-202.  ... 
doi:10.1007/s10664-015-9402-8 fatcat:dwuxhrdbsvdznorfwfcow3prn4

Evaluation of the Ontological Knowledge Model/ Ontoloģiskā zināšanu modeļa novērtēšana/ Оценка качества онтологической модели знаний

Darya Plinere, Arkady Borisov
2014 Information Technology and Management Science  
The common ontology is used for agent cooperation; the quality of ontology is measured with ontology evaluation techniques.  ...  An ontology is an explicit formal conceptualization of some domain of interest. Ontology application is widely used in multi-agent systems.  ...  The overlap between the domain-specific terms and the terms appearing in ontology used to measure lexical keyword coverage by ontology labels. We used the precision and recall method.  ... 
doi:10.1515/itms-2014-0012 fatcat:juml67ohvfaddgwcuy3l6sme54

Which Variables Should I Log?

Zhongxin Liu, Xin Xia, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li
2019 IEEE Transactions on Software Engineering  
Developers usually depend on inserting logging statements into the source code to collect system runtime information. Such logged information is valuable for software maintenance.  ...  However, due to the lack of rigorous logging guidance and the requirement of domain-specific knowledge, it is not easy for developers to make proper decisions about which variables to log.  ...  For each project, first, we download its source code from its official website or git repository and extract all the Java methods from the source code using the Eclipse Java development tools (JDT) [39  ... 
doi:10.1109/tse.2019.2941943 fatcat:p4ax4zbglbf6blakjed6znanwu

Integrating conceptual and logical couplings for change impact analysis in software

Huzefa Kagdi, Malcom Gethers, Denys Poshyvanyk
2012 Empirical Software Engineering  
of source code).  ...  of source code).  ...  Acknowledgements: We are grateful to the EMSE and WCRE 2010 reviewers, and WCRE 2010 conference participants for their pertinent comments that helped us in improving the quality of this extended paper.  ... 
doi:10.1007/s10664-012-9233-9 fatcat:526cysn5l5f2pnriupkzdtfjvy

Are My Invariants Valid? A Learning Approach [article]

Vincent J. Hellendoorn and Premkumar T. Devanbu and Oleksandr Polozov and Mark Marron
2019 arXiv   pre-print
We propose a machine-learning approach to judging the validity of invariants, specifically of method pre- and post-conditions, based directly on a method's source code.  ...  This process induces a large set of labels that provide a form of noisy supervision, which is then used to train a deep neural model, based on gated graph neural networks.  ...  typically used in modeling source code [16, 17] .  ... 
arXiv:1903.06089v2 fatcat:vs2xprg6sjhudpbod7uasnhaca

Ambient aerosol composition by infrared spectroscopy and partial least squares in the chemical speciation network: Multilevel modeling for elemental carbon

Andrew T. Weakley, Satoshi Takahama, Anthony S. Wexler, Ann M. Dillner
2018 Aerosol Science and Technology  
This study provides preliminary confirmation that FT-IR EC may be accurately determined from source-oriented calibrations under a combined classification and calibration methodology.  ...  functional groups for prediction, very low average OC/EC, and minimal charring during TOR speciation.  ...  Determining FT-IR EC using two independent models (atypical and typical) is only considered worthwhile if the figures of merit for single-model predictions are considerably worse than previously reported  ... 
doi:10.1080/02786826.2018.1439571 fatcat:6sbqh3txqfhzlgkyusg6kcnoca

Restate the reference for EEG microstate analysis [article]

Shiang Hu, Esin Karahan, Pedro A. Valdes-Sosa
2018 arXiv   pre-print
Furthermore, the real EEG data by the parametric bootstrap method is used to validate the performance of the references.  ...  A method, termed microstates, identifying spatiotemporal EEG features as the quasi-stable topography states in milliseconds, suggests its potential as biomarkers of neurophysiological disease.  ...  We would like to thank Anna Custo and Frédéric Grouiller for providing the clustering algorithm.  ... 
arXiv:1802.02701v1 fatcat:6cajhboo2bf2bbkci5qivqfaqi

Designing claims for reuse in interactive systems design

1999 International Journal of Human-Computer Studies  
To address this problem a schema and method for classifying claims is introduced.  ...  A factoring method for evolving child claims from parent claims and their usage scenarios is described.  ...  The authors wish to thank Sean Arthur, Mary-Beth Rosson and John Dowell for comment on drafts of this paper. This work was carried out while AGS was on sabbatical at Virginia Tech.  ... 
doi:10.1006/ijhc.1999.0245 fatcat:b32pipz62jg3ldzt3kvwzcvtry

Improving trace accuracy through data-driven configuration and composition of tracing features

Sugandha Lohar, Sorawit Amornborvornwong, Andrea Zisman, Jane Cleland-Huang
2013 Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2013  
We evaluate our approach through a series of experiments using project data from the transportation, healthcare, and space exploration domains, and discuss its implementation in an industrial environment  ...  However, there is no simple onesize-fits all solution to trace retrieval.  ...  It is used to capture relationships between requirements, design, code, test-cases, and other software engineering artifacts, and support critical activities such as impact analysis, compliance verification  ... 
doi:10.1145/2491411.2491432 dblp:conf/sigsoft/LoharAZC13 fatcat:2fzbavlnrfcrfb2vgznwjsyqnm
« Previous Showing results 1 — 15 out of 1,449 results