LCC - Contribuciones a congresos científicos: Envíos recientes
Mostrando ítems 1-20 de 367
-
Evaluating the Performance of Copula-Based Item Response Theory Models for Interpretable Assessment
(2024)This paper describes a study evaluating the performance of copula-based Item Response Theory in real-world settings. To achieve this, we used a dataset containing information about 152 students who took a test on first-degree ... -
A Cost-efficient Approach to Building in Continuous Integration.
(Association for Computing Machinery (ACM), 2020)Continuous integration (CI) is a widely used practice in modern software engineering. Unfortunately, it is also an expensive practice — Google and Mozilla estimate their CI systems in millions of dollars. In this paper, ... -
Decomposing the Rationale of Code Commits: The Software Developer’s Perspective.
(Association for Computing Machinery (ACM), 2019)Communicating the rationale behind decisions is essential for the success of software engineering projects. In particular, understanding the rationale of code commits is an important and often difficult task. We posit that ... -
History Slicing: Assisting Code-Evolution Tasks.
(Association for Computing Machinery (ACM), 2012)Many software-engineering tasks require developers to understand the history and evolution of source code. However, today’s software-development techniques and tools are not well suited for the easy and efficient procurement ... -
WHOSEFAULT: Automatic Developer-to-Fault Assignment through Fault Localization.
(2012)This paper describes a new technique, which automatically selects the most appropriate developers for fixing the fault represented by a failing test case, and provides a diagnosis of where to look for the fault. This ... -
Fuzzy Fine-grained Code-history Analysis
(2017)Existing software-history techniques represent source-code evolution as an absolute and unambiguous mapping of lines of code in prior revisions to lines of code in subsequent revisions. However, the true evolutionary lineage ... -
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).
(2021)Regular expressions (regexes) are a denial of service vector in most mainstream programming languages. Recent empirical work has demonstrated that up to 10% of regexes have super-linear worst-case behavior in typical regex ... -
An Empirical Study of Activity, Popularity, Size, Testing, and Stability in Continuous Integration.
(2017)A good understanding of the practices followed by software development projects can positively impact their success — particularly for attracting talent and on-boarding new members. In this paper, we perform a cluster ... -
History Slicing.
(2011)To perform a number of tasks such as inferring design rationale from past code changes or assessing developer expertise for a software feature or bug, the evolution of a set of lines of code can be assessed by mining ... -
From SMOG to Fog: A security perspective.
(IEEE, 2017)Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low latency. ... -
Clasificación de historias clínicas reales según CIE-10-ES para localización de neoplasias mediante modelos transformers.
(2024-06-19)La mayoría de la información clínica almacenada en los sistemas sanitarios españoles se encuentra como texto no estructurado en las historias clínicas electrónicas. La extracción automática de información valiosa contenida ... -
A segregated architecture for a trust-based network of internet of things
(IEEE, 2019-02-28)With the ever-increasing number of smart home devices, the issues related to these environments are also growing. With an ever-growing attack surface, there is no standard way to protect homes and their inhabitants from ... -
A trust-by-design framework for the internet of things
(IEEE, 2018-02-26)The Internet of Things (IoT) is an environment of interconnected entities, that are identifiable, usable and controllable via the Internet. Trust is necessary in a system such as IoT as the entities involved should know ... -
λ-CoAP: An Internet of Things and Cloud Computing Integration based on the Lambda Architecture and CoAP
(Springer Nature, 2016-01-26)The Internet of Things (IoT) is an emerging technology that is growing continuously thanks to the number of devices deployed and data generated. Nevertheless, an upper layer to abstract the limitations of storing, processing, ... -
An edge computing architecture in the Internet of Things
(IEEE, 2018)In the last few years, the Internet of Things (IoT) has emerged as the new disruptive technology to change the world. Cloud computing has accompanied this field to overcome its processing and storage limitations. However, ... -
Structural health and intelligent monitoring of wind turbine blades with a motorized telescope
(IEEE, 2023)Currently, wind energy plays a fundamental role in the process of generating energy in a sustainable and environmentally friendly manner. However, their infrastructures require ongoing maintenance tasks that involve ... -
Distributed federated and incremental learning for electric vehicles model development in Kafka-ML
(IEEE, 2024)With the increasing development and deployment of new systems for efficient and clean mobility, Electric Vehicles (EVs) are becoming more and more common among people. Those produce large amounts of data streams that need ... -
Runtime enforcement of dynamic security policies.
(Springer Nature, 2014-08)The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ... -
Enhanced Cellular Detection Using Convolutional Neural Networks and Sliding Window Super-Resolution Inference.
(Springer, 2024)Histopathology currently serves as the standard for breast cancer diagnosis, but its manual execution demands time and expertise from pathologists. Artificial intelligence, particularly in digital pathology, has made ... -
Prediction of Optimal Locations for 5G Base Stations in Urban Environments Using Neural Networks and Satellite Image Analysis.
(Springer, 2024)Deploying 5G networks in urban areas is crucial for meeting the increasing demand for high-speed, low-latency wireless communications. However, the complex topography and diverse building structures in urban environments ...