Results 61 to 70 of about 36,339 (140)

Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 26-41, January 2026.
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley   +1 more source

Project Templating and Onboarding With Cookiecutter: Foundations, Uses, and Guidelines

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 42-63, January 2026.
ABSTRACT Objectives Cookiecutter is a popular, mature open‐source Python library for automating the creation of customized projects from templates. This kind of scaffolding is useful for enabling reuse, encapsulating expertise, achieve uniformity, and facilitating project creation for a range of languages and domains, including microservices, web ...
Juergen Dingel   +5 more
wiley   +1 more source

Exploring Influence Factors on LLM Suitability for No‐Code Development of End User Applications

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 96-118, January 2026.
ABSTRACT Context/Problem Statement No‐Code Development Platforms (NCDPs) empower non‐technical end users to build applications tailored to their specific demands without writing code. While NCDPs lower technical barriers, users still require some technical knowledge, for example, to structure process steps or define event‐action rules.
Minghe Wang   +4 more
wiley   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Nima's “Incomplete” Humans: Storying Adolescents’ Black Inhabitations in Accra

open access: yesAntipode, Volume 58, Issue 1, January 2026.
Abstract In this article, I story adolescents as “incomplete” human beings whose inventive modes of storytelling and inhabiting community space shape a “black sense of place” in the Nima neighbourhood of Accra, Ghana. In collaborative arts‐based research with Spread‐Out Initiative NGO, Nima adolescents share stories and narrate experiences that witness
Victoria Ogoegbunam Okoye
wiley   +1 more source

Detection of APTs by Machine Learning: A Performance Comparison

open access: yesExpert Systems, Volume 43, Issue 1, January 2026.
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela   +5 more
wiley   +1 more source

Drag it together with Groupie: making RDF data authoring easy and fun for anyone

open access: yes, 2011
One of the foremost challenges towards realizing a “Read-write Web of Data” [3] is making it possible for everyday computer users to easily find, manipulate, create, and publish data back to the Web so that it can be made available for others to use ...
Saunders, Jack   +2 more
core  

The Data Product Canvas: Designing Data Products for Sustained Value From Enterprise Data

open access: yesInformation Systems Journal, Volume 36, Issue 1, Page 144-158, January 2026.
ABSTRACT Organisations are increasingly striving to become more data‐driven by embedding data into decisions, interactions and processes and by leveraging advanced AI technologies to unlock innovative use‐cases. However, many remain unprepared to meet the rising demands for data, analytics and AI.
M. Redwan Hasan   +2 more
wiley   +1 more source

Artificial Intelligence‐Driven Development in Rechargeable Battery Materials: Progress, Challenges, and Future Perspectives

open access: yesAdvanced Functional Materials, Volume 35, Issue 52, December 23, 2025.
AI is transforming the research paradigm of battery materials and reshaping the entire landscape of battery technology. This comprehensive review summarizes the cutting‐edge applications of AI in the advancement of battery materials, underscores the critical challenges faced in harnessing the full potential of AI, and proposes strategic guidance for ...
Qingyun Hu   +5 more
wiley   +1 more source

Knowledge Graph for Methane Selective Conversion: Revisiting and Predicting Product Selectivity and Methane Conversion

open access: yesAdvanced Science, Volume 12, Issue 48, December 29, 2025.
With the help of large language models, deep neural network learning, and kinetic calculation, a knowledge graph prediction of prior research in methane conversion is conducted. This knowledge graph provides a comprehensive understanding of the relationships among catalyst materials, catalytic performance, and reaction conditions, providing guidance ...
Boyu Xu   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy