We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 239 results
  1. Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction

    Cross-project defect prediction (CPDP) refers to predicting defects in a target project using prediction models trained from historical data of other...

    Zhiqiang Li, **ao-Yuan **g, ... Shi Ying in Automated Software Engineering
    Article 16 August 2017
  2. Automatic Requirement Dependency Extraction Based on Integrated Active Learning Strategies

    Since requirement dependency extraction is a cognitively challenging and error-prone task, this paper proposes an automatic requirement dependency...

    Hui Guan, Guorong Cai, Hang Xu in Machine Intelligence Research
    Article 22 February 2024
  3. Application of Machine Learning Algorithms for Detection of Vulnerability in Web Applications

    The Internet is a world-class network that connects systems and electronic devices. As per the report, 4.66 billion people in the world use the...

    Vijayalakshmi Mathalli Narasimha, Dharani Andhe, ... Manjuprasad Balaraju in SN Computer Science
    Article 20 December 2022
  4. FindICI: Using machine learning to detect linguistic inconsistencies between code and natural language descriptions in infrastructure-as-code

    Linguistic anti-patterns are recurring poor practices concerning inconsistencies in the naming, documentation, and implementation of an entity. They...

    Nemania Borovits, Indika Kumara, ... Willem-Jan van den Heuvel in Empirical Software Engineering
    Article Open access 20 September 2022
  5. A Critical Review of Faults in Cloud Computing: Types, Detection, and Mitigation Schemes

    The continuous rise in for demand services in large-scale distributed systems led to the development of cloud Computing (CC). Because it provides a...
    Ramandeep Kaur, V. Revathi in Intelligent Systems and Machine Learning
    Conference paper 2023
  6. Alternative Data Augmentation for Industrial Monitoring Using Adversarial Learning

    Visual inspection software has become a key factor in the manufacturing industry for quality control and process monitoring. Semantic segmentation...
    Silvan Mertes, Andreas Margraf, ... Elisabeth André in Deep Learning Theory and Applications
    Conference paper 2023
  7. Attribute-aware multi-task recommendation

    User-item rating interactions in the recommender system have a deep potential connection with the friend relationships in the social network. In...

    Suhua Wang, Lisa Zhang, ... Yu Zhao in The Journal of Supercomputing
    Article 02 October 2020
  8. Classification of jujube defects in small data sets based on transfer learning

    Although convolutional neural networks have achieved success in the field of image classification, there are still challenges in the field of...

    Jian** Ju, Hong Zheng, ... Mingyu Lin in Neural Computing and Applications
    Article Open access 30 January 2021
  9. A survey on binary metaheuristic algorithms and their engineering applications

    This article presents a comprehensively state-of-the-art investigation of the engineering applications utilized by binary metaheuristic algorithms....

    Jeng-Shyang Pan, Pei Hu, ... Shu-Chuan Chu in Artificial Intelligence Review
    Article 21 November 2022
  10. Enhanced kinship verification analysis based on color and texture handcrafted techniques

    Nowadays, kinship verification is an attractive research area within computer vision. It significantly affects applications in the real world, such...

    Nermeen Nader, Fatma EL-Zahraa A. EL-Gamal, Mohammed Elmogy in The Visual Computer
    Article Open access 13 June 2023
  11. An Empirical Study of User Story Quality and Its Impact on Open Source Project Performance

    When software development teams apply Agile Software Development practices, they commonly express their requirements as User Stories. We aim to study...
    Ezequiel Scott, Tanel Tõemets, Dietmar Pfahl in Software Quality: Future Perspectives on Software Engineering Quality
    Conference paper 2021
  12. Leveraging side information as adjusting embedding to improve user representation for recommendations

    Embedding is the cornerstone of recommendation system, and the embedding of users or items is directly related to the accuracy of recommendation....

    SuHua Wang, ZhiQiang Ma, ... Bo Tang in The Journal of Supercomputing
    Article 20 June 2022
  13. Personalized recommendation system based on knowledge embedding and historical behavior

    Collaborative filtering (CF) usually suffers from limited performance in recommendation systems due to the sparsity of user–item interactions and...

    Bei Hui, Lizong Zhang, ... Yuhui Nian in Applied Intelligence
    Article 14 May 2021
  14. Industrial few-shot fractal object detection

    In practical industrial visual inspection tasks, foreign object data are difficult to collect and accumulate, hence few-shot object detection has...

    Haoran Huang, **aochuan Luo, Chen Yang in Neural Computing and Applications
    Article 31 July 2023
  15. Foundations of Machine Learning for Software Engineering

    Data is everywhere. When we build software, we generate not only code artefacts and documentation, but also tonnes of data about the development...
    Chapter 2023
  16. A systematic review for class-imbalance in semi-supervised learning

    This review aims to examine the state of the art of semi-supervised learning (SSL) techniques for addressing class imbalanced data. Class imbalance...

    Willian Dihanster Gomes de Oliveira, Lilian Berton in Artificial Intelligence Review
    Article 04 September 2023
  17. A novel approach for software vulnerability detection based on intelligent cognitive computing

    Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new...

    Cho Do Xuan, Dao Hoang Mai, ... Bui Van Cong in The Journal of Supercomputing
    Article 05 May 2023
  18. Evaluating Probabilistic Topic Models for Bug Triaging Tasks

    During the software development process, occurring problems are collected and managed as bug reports using bug tracking systems. Usually, a bug...
    Daniel Atzberger, Jonathan Schneider, ... Jürgen Döllner in Evaluation of Novel Approaches to Software Engineering
    Conference paper 2023
  19. Network representation learning: a systematic literature review

    Omnipresent network/graph data generally have the characteristics of nonlinearity, sparseness, dynamicity and heterogeneity, which bring numerous...

    Bentian Li, Dechang Pi in Neural Computing and Applications
    Article 20 April 2020
  20. Detecting non-natural language artifacts for de-noising bug reports

    Textual documents produced in the software engineering process are a popular target for natural language processing (NLP) and information retrieval...

    Thomas Hirsch, Birgit Hofer in Automated Software Engineering
    Article Open access 24 August 2022
Did you find what you were looking for? Share feedback.