Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
A Comprehensive Evaluation of Standard Data Warehousing and Data Mining Techniques in the Field of Business
MSIE '24: Proceedings of the 2024 6th International Conference on Management Science and Industrial EngineeringPages 208–219https://doi.org/10.1145/3664968.3664997In many industries, including business, healthcare, finance, and more, decision-making no longer occurs separately from data warehousing and data mining. This meta-analysis analyzes the standard data warehousing and mining techniques to determine how ...
- research-articleJanuary 2024
Guidelines for developing and managing digital business incubators: a stakeholders’ perspective
Procedia Computer Science (PROCS), Volume 239, Issue CPages 74–82https://doi.org/10.1016/j.procs.2024.06.148AbstractResearch on business incubators has been advocating their impacts in promoting industry innovation, economic growth, fostering entrepreneurship, and social development. However, the literature gap concerning business incubator models remains, ...
- research-articleOctober 2021
Understanding Screen-Reader Users’ Experiences with Online Data Visualizations
ASSETS '21: Proceedings of the 23rd International ACM SIGACCESS Conference on Computers and AccessibilityArticle No.: 14, Pages 1–16https://doi.org/10.1145/3441852.3471202Online data visualizations are widely used to communicate information from simple statistics to complex phenomena, supporting people in gaining important insights from data. However, due to the defining visual nature of data visualizations, extracting ...
- research-articleJanuary 2021
Method for improvement of transparency: use of text mining techniques for reclassification of governmental expenditures records in Brazil
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 18, Issue 2Pages 155–196https://doi.org/10.1504/ijbidm.2021.112989Many countries have transparency laws requiring availability of data. However, often data is available but not transparent. We present the Transparency Portal of Brazilian Federal Government case and discuss limitations of public acquisitions data stored ...
- research-articleNovember 2020
A Review of Open Source Software Maintenance Effort Estimation
SITA'20: Proceedings of the 13th International Conference on Intelligent Systems: Theories and ApplicationsArticle No.: 41, Pages 1–7https://doi.org/10.1145/3419604.3419809Open Source Software (OSS) is gaining interests of software engineering community as well as practitioners from industry with the growth of the internet. Studies in estimating maintenance effort (MEE) of such software product have been published in the ...
-
- research-articleMay 2020
Big Data security and privacy techniques
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityArticle No.: 22, Pages 1–9https://doi.org/10.1145/3386723.3387841Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' ...
- research-articleJanuary 2020
Discovering of gapped motifs using particle swarm optimisation
International Journal of Computational Intelligence in Bioinformatics and Systems Biology (IJCIBSB), Volume 2, Issue 1Pages 1–21https://doi.org/10.1504/ijcibsb.2020.106858In bioinformatics, motif discovery is one of the fundamental and important computational problems. Identifying these recurring patterns in biological sequences helps us to better understand the mechanisms that regulate gene expression. Recently several ...
- research-articleNovember 2019
WebHound: a data-driven intrusion detection from real-world web access logs
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 23, Issue 22Pages 11947–11965https://doi.org/10.1007/s00500-018-03750-1AbstractHackers usually discover and exploit vulnerabilities existing in the entry point before invading a corporate environment. The web server exploration and spams are two popular means used by hackers to gain access to the enterprise computer systems. ...
- abstractOctober 2019
Toward a benchmark repository for software maintenance tool evaluations with humans
SPLASH Companion 2019: Proceedings Companion of the 2019 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for HumanityPages 7–8https://doi.org/10.1145/3359061.3362776To evaluate software maintenance techniques and tools in controlled experiments with human participants, researchers currently use projects and tasks selected on an ad-hoc basis. This can unrealistically favor their tool, and it makes the comparison of ...
- research-articleJune 2019
Project-based learning as an effective method in education
ICMET 2019: Proceedings of the 2019 International Conference on Modern Educational TechnologyPages 54–57https://doi.org/10.1145/3341042.3341046Some trends and vectors of a changing educational process are considered herein. An analysis of the learning process at universities by the example of several techniques is given in the paper. Some issues of the integration of new educational methods ...
- abstractFebruary 2019
Boxes, Bumps & Breakfast: Object Lessons for Teaching Undergraduates the Importance of Human-Centered Research & Analysis
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationPage 1255https://doi.org/10.1145/3287324.3293817The interdisciplinary fields of Computer Science & Engineering and Human Computer Interaction are increasingly faced with developing human-centered solutions faster, with fewer project members. As a result, while learning the process of human-centered ...
- abstractFebruary 2019
Teaching Human-Centered Design in CSE Programs
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationPages 1246–1247https://doi.org/10.1145/3287324.3293731Many CSE programs have begun to mandate a human-centered design (HCD) course as part of degree requirements. Rather than abstracting out messy humans to a single generic 'user', HCD requires solution designers to use their innate creativity and empathy ...
- research-articleSeptember 2018
Participatory design method: Co-Creating user interfaces for an educational interactive system
Interacción '18: Proceedings of the XIX International Conference on Human Computer InteractionArticle No.: 14, Pages 1–8https://doi.org/10.1145/3233824.3233834In this paper we present a participatory design method for the conceptual design of the user interface, which uses different techniques for capturing the mental models of experts and users. Each technique is carefully specified, and it is implemented in ...
- posterMay 2018
A systematic literature review to support the selection of user acceptance testing techniques
ICSE '18: Proceedings of the 40th International Conference on Software Engineering: Companion ProceeedingsPages 418–419https://doi.org/10.1145/3183440.3195036User Acceptance Testing (UAT) aims to determine whether or not a software satisfies users acceptance criteria. Although some studies have used acceptance tests as software requirements, no previous study has collected information about available UAT ...
- research-articleDecember 2017
AppTechMiner: Mining Applications and Techniques from Scientific Articles
WOSP 2017: Proceedings of the 6th International Workshop on Mining Scientific PublicationsPages 1–8https://doi.org/10.1145/3127526.3127527This paper presents AppTechMiner, a rule-based information extraction framework that automatically constructs a knowledge base of all application areas and problem solving techniques. Techniques include tools, methods, datasets or evaluation metrics. We ...
- research-articleAugust 2017
Folk Pedagogy: Nobody Doesn't Like Active Learning
ICER '17: Proceedings of the 2017 ACM Conference on International Computing Education ResearchPages 145–154https://doi.org/10.1145/3105726.3106192In a survey of the computing education community, many respondents suggested "active learning" as a teaching approach that would increase the likelihood of student success. In light of these responses, we analyze the way in which active learning is ...
- ArticleMay 2015
An Analysis of Techniques and Methods for Technical Debt Management: A Reflection from the Architecture Perspective
SAM '15: Proceedings of the 2015 IEEE/ACM 2nd International Workshop on Software Architecture and MetricsPages 22–28https://doi.org/10.1109/SAM.2015.11Technical debt is a metaphor referring to the consequences of weak software development. Managing technical debt is necessary in order to keep it under control, and several techniques have been developed with the goal of accomplishing this. However, ...
- ArticleSeptember 2013
The 'Relay Ideation' Technique: Moving from Problem Understanding to Problem Solving in the Design Process
14th IFIP TC 13 International Conference on Human-Computer Interaction --- INTERACT 2013 - Volume 8120Pages 651–658https://doi.org/10.1007/978-3-642-40498-6_57When describing the design process in product innovation, many authors identify phases that can be described as 'problem analysis' and 'generating ideas'. Several techniques are available to support design teams in each of these phases, but it remains a ...
- articleJanuary 2013
The Importance of Being Declarative
IEEE Software (ISFT), Volume 30, Issue 1Pages 90–91A declarative programming style focuses on what you want your program to do rather than how to perform the task. By avoiding implementation details, well-written declarative code is easier to understand, modify, and maintain. The code you write in a ...
- research-articleJune 2012
Investigating intuitiveness and effectiveness of gestures for free spatial interaction with large displays
PerDis '12: Proceedings of the 2012 International Symposium on Pervasive DisplaysArticle No.: 6, Pages 1–6https://doi.org/10.1145/2307798.2307804A key challenge for creating large interactive displays in public spaces is in the definition of ways for the user to interact that are effective and easy to learn. This paper presents the outcomes of user evaluation sessions designed to test a series ...