Peer-reviewed Articles

9 downloads
52 views

The use of end-to-end data mining methodologies such as CRISP-DM, KDD process, and SEMMA has grown substantially over the past decade. However, little is known as to how these methodologies are used in practice. In particular, the question of whether data mining...

["Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.267
60 downloads
169 views

In recent years, a large body of literature has accumulated around the topic of research paper recommender systems. However, since most studies have focused on the variable of accuracy, they have overlooked the serendipity of recommendations, which is an important...

["Data Mining and Machine Learning","Digital Libraries"]
doi:10.7717/peerj-cs.273
38 downloads
169 views

Adversarial Optimization provides a reliable, practical way to match two implicitly defined distributions, one of which is typically represented by a sample of real data, and the other is represented by a parameterized generator. Matching of the distributions is...

["Data Mining and Machine Learning","Optimization Theory and Computation","Scientific Computing and Simulation"]
doi:10.7717/peerj-cs.274
43 downloads
228 views

We introduce SANgo (Storage Area Network in the Go language)—a Go-based package for simulating the behavior of modern storage infrastructure. The software is based on the discrete-event modeling paradigm and captures the structure and dynamics of high-level storage...

["Data Mining and Machine Learning","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.271
95 downloads
231 views

When real-time systems are modeled as timed automata, different time scales may lead to substantial fragmentation of the symbolic state space. Exact acceleration solves the fragmentation problem without changing system reachability. The relatively mature technology...

["Real-Time and Embedded Systems","Theory and Formal Methods"]
doi:10.7717/peerj-cs.272
205 downloads
678 views

Cancer classification is a topic of major interest in medicine since it allows accurate and efficient diagnosis and facilitates a successful outcome in medical treatments. Previous studies have classified human tumors using a large-scale RNA profiling and supervised...

["Bioinformatics","Artificial Intelligence","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.270
135 downloads
497 views

The uncertainty underlying real-world phenomena has attracted attention toward statistical analysis approaches. In this regard, many problems can be modeled as networks. Thus, the statistical analysis of networked problems has received special attention from many...

["Artificial Intelligence","Computer Networks and Communications","Data Mining and Machine Learning","Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.269
94 downloads
411 views

This paper presents a new simplex-type algorithm for Linear Programming with the following two main characteristics: (i) the algorithm computes basic solutions which are neither primal or dual feasible, nor monotonically improving and (ii) the sequence of these...

["Algorithms and Analysis of Algorithms","Optimization Theory and Computation"]
doi:10.7717/peerj-cs.265
278 downloads
490 views

Anti-forgery information, transaction verification, and smart contract are functionalities of blockchain technology that can change the traditional business processes of IT applications. These functionalities increase the data transparency, and trust of users in...

["Databases","Emerging Technologies"]
doi:10.7717/peerj-cs.266
150 downloads
410 views

The vast volume of documents available in legal databases demands effective information retrieval approaches which take into consideration the intricacies of the legal domain. Relevant document retrieval is the backbone of the legal domain. The concept of relevance...

["Artificial Intelligence","Computational Linguistics","Data Science","Digital Libraries"]
doi:10.7717/peerj-cs.262
79 downloads
436 views

Estimating free energy differences by computer simulation is useful for a wide variety of applications such as virtual screening for drug design and for understanding how amino acid mutations modify protein interactions. However, calculating free energy differences...

["Computational Biology","Scientific Computing and Simulation"]
doi:10.7717/peerj-cs.264
197 downloads
359 views

Integrated circuits may be vulnerable to hardware Trojan attacks during its design or fabrication phases. This article is a case study of the design of a Viterbi decoder and the effect of hardware Trojans on a coded communication system employing the Viterbi decoder....

["Computer Architecture","Mobile and Ubiquitous Computing","Security and Privacy"]
doi:10.7717/peerj-cs.250
166 downloads
831 views

Integrating data from multiple heterogeneous data sources entails dealing with data distributed among heterogeneous information sources, which can be structured, semi-structured or unstructured, and providing the user with a unified view of these data. Thus, in...

["Data Science","Databases","Emerging Technologies"]
doi:10.7717/peerj-cs.254
114 downloads
588 views

Reconstructing a “forma mentis”, a mindset, and its changes, means capturing how individuals perceive topics, trends and experiences over time. To this aim we use forma mentis networks (FMNs), which enable direct, microscopic access to how individuals conceptually...

["Computational Linguistics","Data Science","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.255
211 downloads
442 views

The theory of the continuous two-dimensional (2D) Fourier Transform in polar coordinates has been recently developed but no discrete counterpart exists to date. In the first part of this two-paper series, we proposed and evaluated the theory of the 2D Discrete...

["Algorithms and Analysis of Algorithms","Scientific Computing and Simulation","Theory and Formal Methods"]
doi:10.7717/peerj-cs.257

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas