Limpar
320 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Capítulo de livro Revisado por pares

Dario Rossi, Claudio Testa, Silvio Valenti,

... LEDBAT protocol, corresponding to different milestones in the BitTorrent software evolution, by means of an active testbed. Focusing ...

Tópico(s): Network Traffic and Congestion Control

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Nicolás Serrano, I. Ciordia,

Bug-tracking helps the software developers in knowing what the error is, resolving it, and learning from it. Working on a software project includes managing the bugs we find. At first, we might list them on a spreadsheet. But when the number of bugs becomes too large and a lot of people must access and input data on them, we have to give up the spreadsheet and instead use a bug- or issue-tracking system. Many software projects reach this point, especially during testing and deployment when users ...

Tópico(s): Scientific Computing and Data Management

2005 - IEEE Computer Society | IEEE Software

Artigo Revisado por pares

Abram Hindle, Christian Bird, Thomas Zimmermann, Nachiappan Nagappan,

Tópico(s):

2014 - Springer Science+Business Media | Empirical Software Engineering

Artigo Acesso aberto Brasil Produção Nacional Revisado por pares

Yguaratã Cerqueira Cavalcanti, Paulo Anselmo da Mota Silveira Neto, Daniel Lucrédio, Tassio Vale, Eduardo Santana de Almeida, Sílvio Romero de Lemos Meira,

Duplicate bug report entries in bug trackers have a negative impact on software maintenance and evolution. This is due, among other factors, to the increased time spent on report analysis and validation, which in some cases takes over 20 min. Therefore, a considerable amount of time is lost in duplicate bug report analysis. In order to understand the possible factors that cause bug report duplication and its impact on software development, this paper presents an exploratory study in which bug tracking ...

Tópico(s):

2011 - Springer Science+Business Media | Software Quality Journal

Artigo Acesso aberto Revisado por pares

Rafael Kallis, Andrea Di Sorbo, Gerardo Canfora, Sebastiano Panichella,

Software maintenance and evolution involves critical activities for the success of software projects. To support such activities and keep code up-to-date and error-free, software communities make use of issue trackers, i.e., tools for signaling, handling, and addressing the issues occurring in software systems. However, in popular projects, tens or hundreds of issue reports are daily submitted. In this context, identifying the type of each submitted report (e.g., bug report, feature request, etc.) ...

Tópico(s):

2020 - Elsevier BV | Science of Computer Programming

Artigo Acesso aberto Revisado por pares

Lauren K. Slone, Drew H. Abney, Jeremy I. Borjon, Chi‐hsin Chen, John M. Franchak, Daniel Pearcy, Catalina Suárez-Rivera, Tian Xu, Yayun Zhang, Linda B. Smith, Chen Yu,

Young children's visual environments are dynamic, changing moment-by-moment as children physically and visually explore spaces and objects and interact with people around them. Head-mounted eye tracking offers a unique opportunity to capture children's dynamic egocentric views and how they allocate visual attention within those views. This protocol provides guiding principles and practical recommendations for researchers using head-mounted eye trackers in both laboratory and more naturalistic settings. ...

Tópico(s): Spatial Cognition and Navigation

2018 - MyJOVE | Journal of Visualized Experiments

Capítulo de livro

Nitish Pandey, Abir Hudait, Debarshi Kumar Sanyal, Amitava Sen,

Software issue trackers are used by software users and developers to submit bug reports and various other change requests and track them till they are finally closed. However, it is common for submitters to misclassify an improvement request as a bug and vice versa. Hence, it is extremely useful to have an automated classification mechanism for the submitted reports. In this paper we explore how different classifiers might perform this task. We use datasets from the open-source projects HttpClient ...

Tópico(s): Text and Document Classification Technologies

2017 - Springer Nature | Advances in intelligent systems and computing

Artigo Revisado por pares

Mark Bender, Yongsheng Wang,

... to allow users to trade online. More recently, BitTorrent revolutionized P2P software by establishing a means whereby transferring large quantities ...

Tópico(s): Digital Rights Management and Security

2009 - Pi Gamma Mu | International social science review

Capítulo de livro Acesso aberto Brasil Produção Nacional Revisado por pares

Igor Wiese, Rodrigo Takashi Kuroda, Reginaldo Ré, Gustavo A. Oliva, Marco Aurélio Gerosa,

Change coupling is an implicit relationship observed when artifacts change together during software evolution. The literature leverages change coupling analysis for several purposes. For example, researchers discovered that change coupling is associated with software defects and reveals relationships between software artifacts that cannot be found by scanning code or documentation. In this paper, we empirically investigate the strongest change couplings from the Apache Aries project to characterize ...

Tópico(s):

2015 - Springer Science+Business Media | IFIP advances in information and communication technology

Capítulo de livro Acesso aberto Revisado por pares

Alessandra Bagnato, Konstantinos Barmpis, Nik Bessis, Luis Adrián Cabrera-Diego, Juri Di Rocco, Davide Di Ruscio, Tamás Gergely, Scott D. Hansen, Dimitrios S. Kolovos, Philippe Krief, Ioannis Korkontzelos, Stéphane Laurière, Jose Manrique Lopez de la Fuente, Pedro Maló, Richard F. Paige, Diomidis Spinellis, Cedric Thomas, Jurgen Vinju,

Deciding if an OSS project meets the required standards for adoption is hard, and keeping up-to-date with a rapidly evolving project is even harder. Making decisions about quality and adoption involves analysing code, documentation, online discussions, and issue trackers. There is too much information to process manually and it is common that uninformed decisions have to be made with detrimental effects. CROSSMINER aims to remedy this by automatically extracting the required knowledge and injecting ...

Tópico(s):

2018 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Kamran Riaz Khan, Zaafar Ahmed, Shabbir Ahmed, Affan A. Syed, Syed Ali Khayam,

With only access billing no longer ensuring profits, an ISP's growth now relies on rolling out new and differentiated services. However, ISPs currently do not have a well-defined architecture for rapid, cost-effective, and scalable dissemination of new services. We present iSDF, a new SDN-enabled framework that can meet an ISP's service delivery constraints concerning cost, scalability, deployment flexibility, and operational ease. We show that meeting these constraints necessitates an SDN philosophy ...

Tópico(s): Cloud Computing and Resource Management

2014 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review

Artigo Revisado por pares

Abram Hindle, Curtis Onuczko,

Tópico(s): Web Data Mining and Analysis

2018 - Springer Science+Business Media | Empirical Software Engineering

Artigo Revisado por pares

Yan Jin, Fang Gao, Jun Yu, Jiabao Wang, Feng Shuang,

Multi-object tracking achieves the acquisition of target location information and identity information through two subtasks, detection and re-identification (ReID). The existing commonly used one-shot framework has speed advantages, but the two subtasks have different feature requirements, which leads to competitive learning in the training and thus weakens the feature quality. We propose a feature decoupling based multi-object tracking framework FDTrack for contradictory feature requirements. Through ...

Tópico(s): Fire Detection and Safety Systems

2023 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology

Artigo Acesso aberto Revisado por pares

Andrea Di Sorbo, Sebastiano Panichella, Corrado Aaron Visaggio, Massimiliano Di Penta, Gerardo Canfora, Harald Gall,

Communication means, such as issue trackers, mailing lists, Q&A forums, and app reviews, are premier means of collaboration among developers, and between developers and end-users. Analyzing such sources of information is crucial to build recommenders for developers, for example suggesting experts, re-documenting source code, or transforming user feedback in maintenance and evolution strategies for developers. To ease this analysis, in previous work we proposed Development Emails Content Analyzer ( ...

Tópico(s):

2019 - IEEE Computer Society | IEEE Transactions on Software Engineering

Capítulo de livro Revisado por pares

Oleksii Starov, Nick Nikiforakis,

Anti-tracking browser extensions are popular among web users since they provide them with the ability to limit the number of trackers who get to learn about their browsing habits. These extensions however are limited in that they ignore other privacy signals, such as, the presence of a privacy policy, use of HTTPS, or presence of insecure web forms that can leak PII. To effectively inform users about the privacy consequences of visiting particular websites, we design, implement, and evaluate PrivacyMeter, ...

Tópico(s): Advanced Malware Detection Techniques

2018 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Damián Vicino, Chung‐Horng Lung, Gabriel Wainer, Olivier Dalle,

... conditions because of it lack of knowledge of BitTorrent strategies. Here, we review the concepts involved in Software-Defined Networks and BitTorrent protocol, we propose a classification of scenarios where ...

Tópico(s):

2014 - Elsevier BV | Procedia Computer Science

Artigo Revisado por pares

Alex Kigerl,

... addition to the usual software piracy rate and software piracy cost measures were used. The number of BitTorrent tracking servers and the number of peerto-peer file sharing client downloads per country were measured. It was determined that these new measures tended to have predictors that were different than the standard software piracy rates. Additionally, it appeared that measuring piracy as a rate relative to legal purchases had the opposite effect than when measuring piracy in absolute terms (such as the absolute number of BitTorrent trackers and absolute dollar amount lost due to ...

Tópico(s): FinTech, Crowdfunding, Digital Finance

2013 - International Journal of Cyber Criminology | International journal of cyber criminology

Artigo Revisado por pares

Zohreh Sharafi, Zéphyrin Soh, Yann‐Gaël Guéhéneuc,

Eye-tracking is a mean to collect evidence regarding some participants' cognitive processes. Eye-trackers monitor participants' visual attention by collecting eye-movement data. These data are useful to get insights into participants' cognitive processes during reasoning tasks. The Evidence-based Software Engineering (EBSE) paradigm has been proposed in 2004 and, since then, has been used to provide detailed insights regarding different topics in software engineering research and practice. Systematic ...

Tópico(s): Open Source

2015 - Elsevier BV | Information and Software Technology

Revisão Acesso aberto Revisado por pares

Unaizah Obaidellah, Mohammed Al Haek, Peter Cheng,

Traditional quantitative research methods of data collection in programming, such as questionnaires and interviews, are the most common approaches for researchers in this field. However, in recent years, eye-tracking has been on the rise as a new method of collecting evidence of visual attention and the cognitive process of programmers. Eye-tracking has been used by researchers in the field of programming to analyze and understand a variety of tasks such as comprehension and debugging. In this article, ...

Tópico(s):

2018 - Association for Computing Machinery | ACM Computing Surveys

Artigo Acesso aberto Revisado por pares

Laura Moreno, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus, Gerardo Canfora,

Release notes document corrections, enhancements, and, in general, changes that were implemented in a new release of a software project. They are usually created manually and may include hundreds of different items, such as descriptions of new features, bug fixes, structural changes, new or deprecated APIs, and changes to software licenses. Thus, producing them can be a time-consuming and daunting task. This paper describes ARENA (Automatic RElease Notes generAtor), an approach for the automatic ...

Tópico(s):

2016 - IEEE Computer Society | IEEE Transactions on Software Engineering

Artigo Acesso aberto Revisado por pares

Daniel A. Enquobahrie, David G. Gobbi, Matthew W. Turek, Patrick Cheng, Ziv Yaniv, Frank Lindseth, Kevin Cleary,

Many image-guided surgery applications require tracking devices as part of their core functionality. The Image-Guided Surgery Toolkit (IGSTK) was designed and developed to interface tracking devices with software applications incorporating medical images. IGSTK was designed as an open source C++ library that provides the basic components needed for fast prototyping and development of image-guided surgery applications. This library follows a component-based architecture with several components designed ...

Tópico(s): Anatomy and Medical Technology

2008 - Springer Science+Business Media | International Journal of Computer Assisted Radiology and Surgery

Artigo Acesso aberto Revisado por pares

John Brand, Solomon Diamond, Natalie Thomas, Diane Gilbert‐Diamond,

The portability of low-cost eye trackers makes them attractive for research outside of the laboratory. Such research may require independent eye-tracker use. The present work compared the data quality of the Gazepoint GP3 when used independently by research participants with expert eye-tracking users. Twenty participants completed a training and a testing session 1 week apart. At training visits, participants were taught how to set up and use eye-tracking hardware and software and how to complete ...

Tópico(s): EEG and Brain-Computer Interfaces

2020 - Springer Science+Business Media | Behavior Research Methods

Revisão Acesso aberto Revisado por pares

Chia-Chien Wu, Jeremy M. Wolfe,

The eye movements of experts, reading medical images, have been studied for many years. Unlike topics such as face perception, medical image perception research needs to cope with substantial, qualitative changes in the stimuli under study due to dramatic advances in medical imaging technology. For example, little is known about how radiologists search through 3D volumes of image data because they simply did not exist when earlier eye tracking studies were performed. Moreover, improvements in the ...

Tópico(s): Digital Imaging in Medicine

2019 - Multidisciplinary Digital Publishing Institute | Vision

Artigo Revisado por pares

F. Noferini,

... stations and the INFN-CNAF infrastructure we used BitTorrent Sync, a free peer-to-peer software designed to optimize data syncronization between distributed nodes. ...

Tópico(s): Interconnection Networks and Systems

2015 - Elsevier BV | Nuclear Instruments and Methods in Physics Research Section A Accelerators Spectrometers Detectors and Associated Equipment

Artigo Acesso aberto Revisado por pares

Ivano Cerrato, Alex Palesandro, Fulvio Risso, Marc Suñé, Vinicio Vercellone, Hagen Woesner,

NFV and SDN are nowadays seen as a solid opportunity by telecom operators to reduce costs while at the same time providing new and better services. Recently, the Unify project proposed a multi-layered architecture that, leveraging different levels of abstraction, can orchestrate and deploy generic network services on the physical infrastructure of the telecom operator. In this paper, we exploit such an architecture to deliver end-to-end generic services in presence of multiple concurring players ( ...

Tópico(s): Network Traffic and Congestion Control

2015 - Elsevier BV | Computer Networks

Artigo Acesso aberto Revisado por pares

Michele Amoretti, Francesco Zanichelli,

... of users. From success histories of applications like BitTorrent, Skype, MyP2P we have learnt a number of useful design patterns. Thus, in this article we present a P2P pattern language (shortly, P2P-PL) which encompasses all the aspects that a fully effective and efficient P2P software system should provide, namely consistency of stored data, ...

Tópico(s): Data Mining Algorithms and Applications

2017 - Springer Nature | Peer-to-Peer Networking and Applications

Capítulo de livro Acesso aberto Revisado por pares

Bonita Sharif, Tim Shaffer,

Eye trackers have been routinely used in psychology reading experiments and in website usability studies for many years. However, it is only recently that they have been used by more researchers in the software engineering community. In this paper, we categorize two broad areas in which eye tracking technology can benefit software development in a practical way. The first area includes using the eye tracker as an assessment tool for software artifacts, tools, and techniques. The second area deals ...

Tópico(s):

2015 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Matthew Sag,

... that alleges copyright violation through the file sharing software known as BitTorrent. Generally, these suits take the form of Copyright ...

Tópico(s): Copyright and Intellectual Property

2015 - University of Iowa College of Law | Iowa law review

Artigo Acesso aberto Revisado por pares

Bailey Vandehei, Daniel Alencar da Costa, Davide Falessi,

Two recent studies explicitly recommend labeling defective classes in releases using the affected versions (AV) available in issue trackers (e.g., Jira). This practice is coined as the realistic approach . However, no study has investigated whether it is feasible to rely on AVs. For example, how available and consistent is the AV information on existing issue trackers? Additionally, no study has attempted to retrieve AVs when they are unavailable. The aim of our study is threefold: (1) to measure the ...

Tópico(s): Open Source

2021 - Association for Computing Machinery | ACM Transactions on Software Engineering and Methodology