Results 31 to 40 of about 6,721,355 (335)
A MODULAR MOBILE MAPPING PLATFORM FOR COMPLEX INDOOR AND OUTDOOR ENVIRONMENTS [PDF]
In this work we present the development of a prototype, mobile mapping platform with modular design and architecture that can be suitably modified to address effectively both outdoors and indoors environments.
I. Kalisperakis+6 more
doaj +1 more source
A survey of software development practices in the New Zealand software industry [PDF]
We report on the software development techniques used in the New Zealand software industry, paying particular attention to requirements gathering. We surveyed a selection of software companies with a general questionnaire and then conducted in-depth ...
Groves, Lindsay+4 more
core +2 more sources
Hot question prediction in Stack Overflow
Stack Overflow is a very popular programming question and answer community. Some questions become hot, and receive high views, which are of widespread concern to developers.
Li Xian Zhao, Li Zhang, Jing Jiang
doaj +1 more source
Augmenting Dialogue Response Generation With Unstructured Textual Knowledge
The dialogue response generation is a challenging task in chatbot applications. Recently neural-network-based dialogue models, including the sequence-to-sequence model and the RNN language models, are able to generate fluent and grammatically compliant ...
Yanmeng Wang+3 more
doaj +1 more source
Development of a Software Engineering Ontology for Multisite Software Development [PDF]
This paper aims to present an ontology model of software engineering to represent its knowledge. The fundamental knowledge relating to software engineering is well described in the textbook entitled Software Engineering by Sommerville that is now in its eighth edition (2004) and the white paper, Software Engineering Body of Knowledge (SWEBOK), by the ...
Wongthongtham, Pornpit+3 more
openaire +2 more sources
Mixture-Model-Based Graph for Privacy-Preserving Semi-Supervised Learning
Privacy has become a major concern in data mining as it is utilized in many important applications. Distributed privacy-preserving data mining (DPPDM) is one of the techniques to address this concern, which focuses on protecting private information of ...
Zhi Li, Liqun Yang, Zhoujun Li
doaj +1 more source
Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions
The wide use of browser extensions brings the privacy leakage problem. The previous works detected private data transmission to find privacy leakage in Chrome or Firefox, but the real challenge is to determine whether the transmission is reasonable ...
Yufei Zhao+4 more
doaj +1 more source
Duplicate Question Detection With Deep Learning in Stack Overflow
Stack Overflow is a popular Community-based Question Answer (CQA) website focused on software programming and has attracted more and more users in recent years. However, duplicate questions frequently appear in Stack Overflow and they are manually marked
Liting Wang, Li Zhang, Jing Jiang
doaj +1 more source
GPU Acceleration of Melody Accurate Matching in Query-by-Humming
With the increasing scale of the melody database, the query-by-humming system faces the trade-offs between response speed and retrieval accuracy. Melody accurate matching is the key factor to restrict the response speed.
Limin Xiao+4 more
doaj +1 more source
Trustworthy Software Development [PDF]
This paper presents an overview on how existing development methodologies and practices support the creation of trustworthy software. Trustworthy software is key for a successful and trusted usage of software, specifically in the Cloud. To better understand what trustworthy software applications actually mean, the concepts of trustworthiness and trust ...
Paulus, Sachar+2 more
openaire +2 more sources