Results 61 to 70 of about 80,827 (151)

Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 26-41, January 2026.
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley   +1 more source

Project Templating and Onboarding With Cookiecutter: Foundations, Uses, and Guidelines

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 42-63, January 2026.
ABSTRACT Objectives Cookiecutter is a popular, mature open‐source Python library for automating the creation of customized projects from templates. This kind of scaffolding is useful for enabling reuse, encapsulating expertise, achieve uniformity, and facilitating project creation for a range of languages and domains, including microservices, web ...
Juergen Dingel   +5 more
wiley   +1 more source

Exploring Influence Factors on LLM Suitability for No‐Code Development of End User Applications

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 96-118, January 2026.
ABSTRACT Context/Problem Statement No‐Code Development Platforms (NCDPs) empower non‐technical end users to build applications tailored to their specific demands without writing code. While NCDPs lower technical barriers, users still require some technical knowledge, for example, to structure process steps or define event‐action rules.
Minghe Wang   +4 more
wiley   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

AMRerank: A Framework for Library Migration Recommendations Using Multi‐Agent Analysis and Data‐Driven Reranking

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo   +3 more
wiley   +1 more source

Core Concepts for Early Childhood Microbiology Education

open access: yesMicrobial Biotechnology, Volume 19, Issue 1, January 2026.
Early childhood microbiology education is both feasible and practical. Ciencia Maravilla promotes the learning of core concepts by implementing hands‐on activities and narrative‐based strategies. ABSTRACT This article explores how microbiology can be meaningfully integrated into science education for preschoolers, children under 6 years old.
Cecilia B. Di Capua   +3 more
wiley   +1 more source

Nima's “Incomplete” Humans: Storying Adolescents’ Black Inhabitations in Accra

open access: yesAntipode, Volume 58, Issue 1, January 2026.
Abstract In this article, I story adolescents as “incomplete” human beings whose inventive modes of storytelling and inhabiting community space shape a “black sense of place” in the Nima neighbourhood of Accra, Ghana. In collaborative arts‐based research with Spread‐Out Initiative NGO, Nima adolescents share stories and narrate experiences that witness
Victoria Ogoegbunam Okoye
wiley   +1 more source

Detection of APTs by Machine Learning: A Performance Comparison

open access: yesExpert Systems, Volume 43, Issue 1, January 2026.
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela   +5 more
wiley   +1 more source

Integrating E‐Servicescapes and Web Atmospherics: A Systematic Literature Review Applying the TCCM Framework

open access: yesInternational Journal of Consumer Studies, Volume 50, Issue 1, January 2026.
ABSTRACT The rapid expansion of digital transformation has intensified scholarly interest in how online environments shape customer experience and behavior. A thorough investigation of the literature in the area showcases its fragmented nature, dominated by two parallel streams, web atmospherics and e‐servicescapes, that exhibit overlapping definitions,
Kalipso Karantinou   +1 more
wiley   +1 more source

The Data Product Canvas: Designing Data Products for Sustained Value From Enterprise Data

open access: yesInformation Systems Journal, Volume 36, Issue 1, Page 144-158, January 2026.
ABSTRACT Organisations are increasingly striving to become more data‐driven by embedding data into decisions, interactions and processes and by leveraging advanced AI technologies to unlock innovative use‐cases. However, many remain unprepared to meet the rising demands for data, analytics and AI.
M. Redwan Hasan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy