: Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on ...
Maurizio Leotta, Andrea Stocco, Filippo Ricca, Pao...
Game theoretic algorithms have been used to optimize the allocation of security resources to improve the protection of critical infrastructure against threats when limits on secur...
In this paper we have applied the stacking technique on images from a medical device. There is an urgent need in ophthalmology for more cost effective instrumentation for the ear...
Danilo Motta, Luciana de Matos, Amanda Caniatto de...
This paper presents a purely declarative approach to artifactcentric case management systems. Each case is presented as a tree-like structure; nodes bear information that combines...
In the last couple of decades we have witnessed a steady growth in the complexity and widespread of real-time systems. In order to master the rising complexity in the timing behav...
Marco Ziccardi, Martin Schoeberl, Tullio Vardanega
To evaluate the performance of a within-project defect prediction approach, people normally use precision, recall, and F-measure scores. However, in machine learning literature, t...
Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed ...
Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-...
Model tree induction is a popular method for tackling regression problems requiring interpretable models. Model trees are decision trees with multiple linear regression models at ...
Correlated pattern mining has become increasingly an important task in data mining and knowledge discovery. In practice, the exploitation of correlated patterns is hampered by the...
Of the considerable research on data streams, relatively little deals with classification where only some of the instances in the stream are labeled. Most state-of-the-art data-s...