Peer-reviewed Articles

5 downloads
76 views

The relationship between a driver’s glance orientation and corresponding head rotation is highly complex due to its nonlinear dependence on the individual, task, and driving context. This paper presents expanded analytic detail and findings from an effort that...

["Human-Computer Interaction","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.146
134 downloads
1,344 views

This article describes the motivation, design, and progress of the Journal of Open Source Software (JOSS). JOSS is a free and open-access journal that publishes articles describing research software. It has the dual goals of improving the quality of the software...

["Data Science","Digital Libraries","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.147
75 downloads
354 views

Finding useful patterns in datasets has attracted considerable interest in the field of visual analytics. One of the most common tasks is the identification and representation of clusters. However, this is non-trivial in heterogeneous datasets since the data needs...

["Data Science","Visual Analytics"]
doi:10.7717/peerj-cs.145
210 downloads
1,502 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.144
72 downloads
697 views

Despite most Spatial Data Infrastructures offering service-based visualization of geospatial data, requirements are often at a very basic level leading to poor quality of maps. This is a general observation for any geospatial architecture as soon as open standards...

["Spatial and Geographic Information Systems","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.143
1 citation
211 downloads
2,203 views

Computer science offers a large set of tools for prototyping, writing, running, testing, validating, sharing and reproducing results; however, computational science lags behind. In the best case, authors may provide their source code as a compressed archive and...

["Data Science","Digital Libraries","Scientific Computing and Simulation","Social Computing"]
doi:10.7717/peerj-cs.142
77 downloads
535 views

The continuous increase of unbound streaming data poses several challenges to established data stream processing engines. One of the most important challenges is the cost-efficient enactment of stream processing topologies under changing data volume. These data...

["Adaptive and Self-Organizing Systems","Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.141
58 downloads
525 views

Open-source lab equipment is becoming more widespread with the popularization of fabrication tools such as 3D printers, laser cutters, CNC machines, open source microcontrollers and open source software. Although many pieces of common laboratory equipment have...

["Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.139
77 downloads
509 views

Betweenness, a widely employed centrality measure in network science, is a decent proxy for investigating network loads and rankings. However, its extremely high computational cost greatly hinders its applicability in large networks. Although several parallel algorithms...

["Distributed and Parallel Computing","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.140
161 downloads
1,110 views

With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application...

["Security and Privacy"]
doi:10.7717/peerj-cs.136
45 downloads
645 views

The accurate knowledge of Heat Transfer Coefficients is essential for the design of precise heat transfer operations. The determination of these values requires Inverse Heat Transfer Calculations, which are usually based on heuristic optimisation techniques, like...

["Distributed and Parallel Computing","Graphics","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.138
1 citation
154 downloads
907 views

Background Artificial neural networks (ANNs) are a robust class of machine learning models and are a frequent choice for solving classification problems. However, determining the structure of the ANNs is not trivial as a large number of weights (connection links)...

["Algorithms and Analysis of Algorithms","Artificial Intelligence","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.137
70 downloads
763 views

Background Software maintenance is an important activity in the development process where maintenance team members leave and new members join over time. The identification of files which are changed together frequently has been proposed several times. Yet, existing...

["Data Science","Software Engineering"]
doi:10.7717/peerj-cs.135
155 downloads
953 views

User eXperience (UX) is a key factor in the success of software systems. Many software companies face challenges in their work with UX. Existing research does not analyze UX practices and challenges in relation to other software quality characteristics or, in particular,...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.130
240 downloads
831 views

GitHub is a widely used online collaborative software development environment. In this paper, we describe curation projects as a new category of GitHub project that collects, evaluates, and preserves resources for software developers. We investigate: (1) what motivates...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.134

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas