Listar ITIS - Contribuciones a congresos científicos por título
Mostrando ítems 35-52 de 52
-
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular Expressions.
(IEEE, 2019)Regular expressions (regexes) are a powerful mechanism for solving string-matching problems. They are supported by all modern programming languages, and have been estimated to appear in more than a third of Python and ... -
Resilient Bioinspired Algorithms: A Computer System Design Perspective
(SpringerLink, 2022)Resilience can be defined as a system's capability for returning to normal operation after having suffered a disruption. This notion is of the foremost interest in many areas, in particular engineering. We argue in this ... -
SALON ontology for the formal description of Sequence Alignments.
(2023)Background. Information provided by high-throughput sequencing platforms allows the collection of content-rich data about bio- logical sequences and their context. Sequence alignment is a bioinformatics approach to identifying ... -
SOWCompact: A federated process mining method for social workflows
(SISTEDES, 2022-09)The growing informatization of the environment allows modeling people’s behavior as a social workflow, where both individual actions and interactions with other people are captured. This modelling includes actions that are ... -
Spatial evolutionary generative adversarial networks.
(ACM, 2019-07-13)Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse. These pathologies mainly arise from a lack of diversity in their adversarial interactions. Evolutionary generative ... -
Supporting Bug Investigation using History Analysis.
(Institute of Electrical and Electronics Engineers (IEEE), 2013)In my research, I propose an automated technique to support bug investigation by using a novel analysis of the history of the source code. During the bug-fixing process, developers spend a high amount of manual effort ... -
The Hidden Cost of Code Completion: Understanding the Impact of the Recommendation-list Length on its Efficiency.
(ACM, 2018)Automatic code completion is a useful and popular technique that software developers use to write code more effectively and efficiently. However, while the benefits of code completion are clear, its cost is yet not well ... -
The Impact of Regular Expression Denial of Service (ReDoS) in Practice: An Empirical Study at the Ecosystem Scale.
(Association for Computing Machinery (ACM), 2018)Regular expressions (regexes) are a popular and powerful means of automatically manipulating text. Regexes are also an understudied denial of service vector (ReDoS). If a regex has super-linear worst-case complexity, an ... -
Tile map size optimization for real world routing by using differential evolution
(IEEE, 2017-06)Finding the shortest path between two places is a well known problem in road traveling. While most of the work done up to this moment is focused on algorithmics, efficiently managing the information has received significantly ... -
TITAN: A knowledge-based platform for Big Data workflow management
(2022)Modern applications of Big Data are transcending from being scalable solutions of data processing and analysis, to now provide advanced functionalities with the ability to exploit and understand the underpinning knowledge. ... -
Towards an Extensible Architecture and Tool Support for Model-based Verification.
(2023)Model-based software engineering (MBSE) brings models to the center of software and system design. Models are powerful abstractions used to support all phases of the software development life cycle of complex software. As ... -
Towards the Integration of Digital Avatars in Urban Digital Twins on the Cloud-to-Thing Continuum
(2023-06)Urban Digital Twins (UDTs) represent a powerful tool to effectively make cities smart. Over the last few years, the interest in the social aspects of smart cities is growing fast. For this reason, citizens must be considered ... -
Understanding and Leveraging Developer Inexpertise.
(ACM, 2018)In my research, I propose an automated technique to support bug investigation by using a novel analysis of the history of the source code. During the bug-fixing process, developers spend a high amount of manual effort ... -
Unsupervised Detection of Incoming and Outgoing Traffic Flows in Video Sequences.
(Springer, 2024)As traffic cameras become prevalent, and a considerable amount of traffic videos are stored for various purposes, new possibilities and challenges open in the automatic analysis of traffic scenes. Advances in deep ... -
Using an Agent-Based Cellular Automaton for Emergency Evacuation Simulation
(Springer, 2024)We consider a simulation-based approach to address crowd evacuation problems. An agent-based cellular automaton model is used to model the environment and the collective behavior of the crowd, taking into account both ... -
What Edits Are Done on The Highly Answered Questions in Stack Overflow? An Empirical Study.
(IEEE, 2019)Stack Overflow is the most-widely-used online question-and-answer platform for software developers to solve problems and communicate experience. Stack Overflow believes in the power of community editing, which means that ... -
What helped, and what did not? An Evaluation of the Strategies to Improve Continuous Integration.
(IEEE, 2021)Continuous integration (CI) is a widely used practice in modern software engineering. Unfortunately, it is also an expensive practice — Google and Mozilla estimate their CI systems in millions of dollars. There are a number ... -
Why Aren’t Regular Expressions a Lingua Franca? An Empirical Study on the Re-use and Portability of Regular Expressions.
(ACM, 2019)This paper explores the extent to which regular expressions (regexes) are portable across programming languages. Many languages offer similar regex syntaxes, and it would be natural to assume that regexes can be ported ...