Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Table Of Content Section
article
The use of mathematics in software quality assurance
Pages 3–16

The use of mathematics for documenting, inspecting, and testing software is explained and illustrated. Three measures of software quality are described and discussed. Then three distinct complementary approaches to software quality assurance are ...

article
rCOS: a formal model-driven engineering method for component-based software
Pages 17–39

Model-driven architecture (MDA) has become a main stream technology for software-intensive system design. The main engineering principle behind it is that the inherent complexity of software development can only be mastered by building, analyzing and ...

article
An institution theory of formal meta-modelling in graphically extended BNF
Pages 40–56

Meta-modelling plays an important role in model driven software development. In this paper, a graphic extension of BNF (GEBNF) is proposed to define the abstract syntax of graphic modelling languages. From a GEBNF syntax definition, a formal predicate ...

article
SeVe: automatic tool for verification of security protocols
Pages 57–75

Security protocols play more and more important roles with wide use in many applications nowadays. Currently, there are many tools for specifying and verifying security protocols such as Casper/FDR, ProVerif, or AVISPA. In these tools, the intruder's ...

article
Mining the interests of Chinese microbloggers via keyword extraction
Pages 76–87

Microblogging provides a new platform for communicating and sharing information among Web users. Users can express opinions and record daily life using microblogs. Microblogs that are posted by users indicate their interests to some extent. We aim to ...

article
Enriching short text representation in microblog for clustering
Pages 88–101

Social media websites allow users to exchange short texts such as tweets via microblogs and user status in friendship networks. Their limited length, pervasive abbreviations, and coined acronyms and words exacerbate the problems of synonymy and polysemy,...

article
Forecasting complex group behavior via multiple plan recognition
Pages 102–110

Group behavior forecasting is an emergent research and application field in social computing. Most of the existing group behavior forecasting methods have heavily relied on structured data which is usually hard to obtain. To ease the heavy reliance on ...

article
Prediction of urban human mobility using large-scale taxi traces and its applications
Pages 111–121

This paper investigates human mobility patterns in an urban taxi transportation system. This work focuses on predicting humanmobility fromdiscovering patterns of in the number of passenger pick-ups quantity (PUQ) from urban hotspots. This paper proposes ...

article
On social computing research collaboration patterns: a social network perspective
Pages 122–130

The field of social computing emerged more than ten years ago. During the last decade, researchers from a variety of disciplines have been closely collaborating to boost the growth of social computing research. This paper aims at identifying key ...

Comments