Filters








4,242 Hits in 10.1 sec

Guest Editors' Introduction: Mining Software Archives

Nachiappan Nagappan, Andreas Zeller, Thomas Zimmermann
2009 IEEE Software  
The article "Mining Task-Based Social Networks to Explore Collaboration in Software Teams," by Timo Wolf, Adrian Schröter, Daniela Damian, Lucas D. Panjer, and Thanh H.D.  ...  If the data is collected from humans (for example, in surveys), there's a risk of bias, which we must estimate and deal with.  ...  His work involves the evolution of large, complex software systems, conducting empirical studies and building tools that use data mining to support programmers.  ... 
doi:10.1109/ms.2009.14 fatcat:chbpvbvcd5a7ln6jmfnl4teqse

Medical Healthcare Network Platform and Big Data Analysis Based on Integrated ICT and Data Science with Regulatory Science

Ryuji KOHNO, Takumi KOBAYASHI, Chika SUGIMOTO, Yukihiro KINJO, Matti HÄMÄLÄINEN, Jari IINATTI
2019 IEICE transactions on communications  
First, we propose a universal medical healthcare platform that consists of wireless body area network (BAN), cloud network and edge computer, big data mining server and repository with machine learning  ...  This paper provides perspectives for future medical healthcare social services and businesses that integrate advanced information and communication technology (ICT) and data science.  ...  Security in Data Science Layer for AI Data Mining Server and Repository Big data analysis for automatic vulnerability detection and correction The use of machine learning techniques for security applications  ... 
doi:10.1587/transcom.2018hmi0001 fatcat:4cmvy42ljjb5pc42aphjenprmi

Developer social networks in software engineering: construction, analysis, and applications

WeiQiang Zhang, LiMing Nie, He Jiang, ZhenYu Chen, Jia Liu
2014 Science China Information Sciences  
The recorded information can be employed to construct Developer Social Networks (DSNs) for facilitating tasks in software engineering.  ...  During the collaboration, a lot of new information related to software development, including developers' communication and coordination, can be recorded in software repositories.  ...  [77] use a collaboration network derived from bug report repositories of Mozilla Firefox, to predict the risk and vulnerability in organization structures. Amrit et al.  ... 
doi:10.1007/s11432-014-5221-6 fatcat:ulahmalivrbcnhkrrlspogejdq

Lista de artículos publicados en los últimos 10 números

Omar Antonio Vega
2016 Ventana Informatica  
industriales [Fieldbus and Protocols in Industrial networks de imágenes satelitales [Data Mining with Rough Sets for Classification of Satellite Images] / Juan Olegario MONROY Propuesta metodológica para  ...  Editorial Sistema de administración y supervisión de equipos en una red de datos [Management System and Monitoring Workstations in a Data Network Simulación de Técnicas de Encolado con Prioridad  ... 
doi:10.30554/ventanainform.33.1400.2015 fatcat:zigwfxqfmncingwxagfl64ouma

Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example [chapter]

Haibo Huang, Yuxi Gao, Min Yan, Xiaofan Zhang
2020 Communications in Computer and Information Science  
ISEMS, including threat report, risk analysis, warning release and emergency response.  ...  AbstractBuilding a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense.  ...  In the future, we can further study the balance between the realization of enterprise data privacy and the enhancement of data's social utility based on blockchain technology, so that it could expand the  ... 
doi:10.1007/978-981-33-4922-3_6 fatcat:li6zsepeejaatg6hhpg666edzi

A Security Practices Evaluation Framework

Patrick Morrison
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
security in the software development process including instructions for data collection, and • Empirical evaluation of the proposed model and metrics using two open source datasets.  ...  Avoiding or resolving vulnerabilities during software development has become a consideration for many organizations that build and ship software. Research Problem.  ...  Data collection steps: • We record and report source code and development team size for each month using version control data. • We record and report vulnerability and defect counts for each month using  ... 
doi:10.1109/icse.2015.296 dblp:conf/icse/Morrison15 fatcat:oghtjdeecbednhf5bzrwy22f5i

Railway Defender Kill Chain to Predict and Detect Cyber-Attacks

Ravdeep Kour, Adithya Thaduri, Ramin Karim
2020 Journal of Cyber Security and Mobility  
It uses an extended cyber kill chain (CKC) model and an industrial control system (ICS) cyber kill chain for detection and proposes predictive technologies that will help railway organizations predict  ...  The railway cybersecurity OSACBM architecture consists of eight layers; cybersecurity information moves from the initial level of data acquisition to data processing, data analysis, incident detection,  ...  Phillip Tretten and Robert Beney for their valuable expertise.  ... 
doi:10.13052/jcsm2245-1439.912 fatcat:ew4twrtxafcghjrq7n4zuusmzu

IEEE Access Special Section Editorial: Artificial Intelligence (AI)-Empowered Intelligent Transportation Systems

Edith Ngai, Chao Chen, Amr M. Tolba, Mohammad S. Obaidat, Fanzhao Wang
2021 IEEE Access  
In the article "A distributed network intrusion detection system for distributed denial of service attacks in vehicular 69492 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  Systems (ITS) has drawn more attention recently, with the rapid development of ubiquitous networks and smart vehicles.  ...  His work on taxi trajectory data mining was featured in IEEE SPECTRUM in 2011 , 2016 , and 2020.  ... 
doi:10.1109/access.2021.3074996 fatcat:dfyrghfswff6vmdlpa55jxtkjm

Supply Chain Disruption Risk Management with Blockchain: A Dynamic Literature Review

Niloofar Etemadi, Yari Borbon-Galvez, Fernanda Strozzi, Tahereh Etemadi
2021 Information  
in times of increased risk and uncertainty.  ...  The procedure consists of two methods: a systematic literature review (SLR) and bibliometric network analysis (BNA).  ...  Acknowledgments: We would like to thank the anonymous reviewers for their comments that allow us to further enhance the outcome of this research.  ... 
doi:10.3390/info12020070 fatcat:kof7t7bb5vaa5evwnmsenlg7du

Blending Big Data Analytics: Review on Challenges and a Recent Study

Fairuz Amalina, Ibrahim Abaker Targio Hashem, Zati Hakim Azizul, Ang Tan Fong, Ahmad Firdaus, Muhammad Imran, Nor Badrul Anuar
2019 IEEE Access  
[43] proposed a framework called social media analytics using text, which detects a product defect from social media posting in the vehicle and consumer electrics domain.  ...  Customer satisfaction analysis is then performed using visual and audio analytics system for a contact center.  ... 
doi:10.1109/access.2019.2923270 fatcat:dmtpplybtncdho5cvaiwb6mgy4

Towards Identifying the Challenges Associated with Emerging Large Scale Social Networks

Haroon Malik, Ahsan Samad Malik
2011 Procedia Computer Science  
Users of these sites form a social network (SN), which provides a powerful mean of sharing, organizing, and finding contents and contacts.  ...  Social networking sites like Facebook, YouTube, Orkut and twitter are among the most popular sites on the internet.  ...  The expertise from researcher have been dedicated in establishing frameworks for mining the social network data as seen in Fig 1 for the prospective of third party user that can be useful for various  ... 
doi:10.1016/j.procs.2011.07.059 fatcat:lemaasz32rbslmyg63wgtl6fha

Lista de artículos publicados en los últimos 10 números

Omar Antonio Vega
2016 Ventana Informatica  
en una red de datos Management System and Monitoring Workstations in a Data Network GOMEZ CASTAÑO Simulación de Técnicas de Encolado con Prioridad Simulation of Techniques for Priority Queues PÉREZ  ...  of steel welding defects / MayerlyJhojanaAnálisis de presencia de islas de calor en Santiago de Cali empleando técnicas de teledetección Analysis of presence of heat islands in Santiago de Cali using  ... 
doi:10.30554/ventanainform.35.1854.2016 fatcat:djjndqcid5csrg7iksv2c2ygsm

Data Integration for Urban Health [chapter]

Yuan Lai, David J. Stone
2020 Leveraging Data Science for Global Health  
A more general discussion of sociotechnical challenges in integrated data analytics for urban health follows. The paper concludes with a summary of key takeaways, current limitations, and future work.  ...  This article explores this novel domain and introduces a broader context of urban data landscape and health indications.  ...  Fitbit is a wearable device for tracking personal physical activities (walking and sleeping) and health (heart rate), providing an API for accessing the data (FitBit 2019).  ... 
doi:10.1007/978-3-030-47994-7_21 fatcat:g5iyrgwclzdvvfrv4a7cx3pr4e

An Exploration of Bitcoin Mining Practices

Irni Eliana Khairuddin, Corina Sas
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
in collaborative mining, tools tracking data centers' authorization and reputation, and tools supporting the development of decentralized pools.  ...  We discuss the risks of collaborative mining due to centralization and dishonest administrators, and conclude with design implications highlighting the need for tools monitoring the distribution of rewards  ...  Data analysis followed a hybrid approach with existing concepts being used for the deductive coding while new ones grounded on the empirical data, is used for inductive coding [26] .  ... 
doi:10.1145/3290605.3300859 dblp:conf/chi/KhairuddinS19 fatcat:b2opgimrlbaqhpxkcuyh6ocg2y

Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce

Yuan Yao, Sini Ruohomaa, Feng Xu
2012 Journal of Theoretical and Applied Electronic Commerce Research  
Reputation systems provide a form of social control and reveal behaviour patterns in the uncertain and riskladen environment of the open Internet.  ...  This paper aims to improve the security and robustness of reputation systems through 1) identifying the basic requirements in that area, 2) analyzing existing reputation systems for e-Commerce and a handful  ...  Securing systems against the uncertainty and risk in these open collaboration environments requires software-based support for social control, and reputation systems have been proposed to cater for this  ... 
doi:10.4067/s0718-18762012000100002 fatcat:xigghwf7ofaifmiv5ayddijesy
« Previous Showing results 1 — 15 out of 4,242 results