Sciweavers

AIM
2015
8 years 6 months ago
Entity Type Recognition for Heterogeneous Semantic Graphs
We describe an approach for identifying fine-grained entity types in heterogeneous data graphs that is effective for unstructured data or when the underlying ontologies or semant...
Jennifer Sleeman, Tim Finin, Anupam Joshi
AIM
2015
8 years 6 months ago
Deploying CommunityCommands: A Software Command Recommender System Case Study
In 2009 we presented the idea of using collaborative filtering within a complex software application to help users learn new and relevant commands (Matejka et al. 2009). This proj...
Wei Li 0002, Justin Matejka, Tovi Grossman, George...
AIM
2015
8 years 6 months ago
THink: Inferring Cognitive Status from Subtle Behaviors
The Digital Clock Drawing Test is a fielded application that provides a major advance over existing neuropsychological testing technology. It captures and analyzes high precision ...
Randall Davis, David J. Libon, Rhoda Au, David Pit...
AIM
2015
8 years 6 months ago
Semantics-Empowered Big Data Processing with Applications
We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. We organize o...
Krishnaprasad Thirunarayan, Amit P. Sheth
AIM
2015
8 years 6 months ago
A Summary of the Twenty-Ninth AAAI Conference on Artificial Intelligence
Robert Morris, Blai Bonet, Marc Cavazza, Marie des...
AGILEDC
2015
IEEE
8 years 6 months ago
Synthesizing Continuous Deployment Practices Used in Software Development
– Continuous deployment speeds up the process of existing agile methods, such as Scrum, and Extreme Programming (XP) through the automatic deployment of software changes to end-u...
Akond Ashfaque Ur Rahman, Eric Helms, Laurie A. Wi...
AGILEDC
2015
IEEE
8 years 6 months ago
Predicting Release Time for Open Source Software Based on the Generalized Software Reliability Model
—There is a significant challenge that how to predict the possible release date of the target software having enough reliability in agile development where incremental developme...
Hironori Washizaki, Kiyoshi Honda, Yoshiaki Fukaza...
AGILEDC
2015
IEEE
8 years 6 months ago
Understanding Digital Cardwall Usage
—In Agile software development, key artefacts used to support the process are the User Story (usually recorded on a Storycard) and Story Cardwall (usually a dedicated portion of ...
Stevenson Gossage, Judith M. Brown, Robert Biddle
ADAEUROPE
2015
Springer
8 years 6 months ago
Static Backward Program Slicing for Safety-Critical Systems
Static program slicing is a technique to detect the program parts (i.e. the “slice”) of the given program possibly affecting a given property. The technique is of interest for...
Husni Khanfar, Björn Lisper, Abu Naser Masud
ADAEUROPE
2015
Springer
8 years 6 months ago
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases
Abstract. A safety case contains safety arguments together with supporting evidence that together should demonstrate that a system is acceptably safe. System changes pose a challen...
Omar Jaradat, Iain Bate, Sasikumar Punnekkat