Peer-reviewed Articles

130 downloads
1,044 views

Open-source lab equipment is becoming more widespread with the popularization of fabrication tools such as 3D printers, laser cutters, CNC machines, open source microcontrollers and open source software. Although many pieces of common laboratory equipment have...

["Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.139
163 downloads
931 views

Betweenness, a widely employed centrality measure in network science, is a decent proxy for investigating network loads and rankings. However, its extremely high computational cost greatly hinders its applicability in large networks. Although several parallel algorithms...

["Distributed and Parallel Computing","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.140
315 downloads
1,786 views

With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application...

["Security and Privacy"]
doi:10.7717/peerj-cs.136
100 downloads
1,017 views

The accurate knowledge of Heat Transfer Coefficients is essential for the design of precise heat transfer operations. The determination of these values requires Inverse Heat Transfer Calculations, which are usually based on heuristic optimisation techniques, like...

["Distributed and Parallel Computing","Graphics","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.138
3 citations
401 downloads
1,551 views

Background Artificial neural networks (ANNs) are a robust class of machine learning models and are a frequent choice for solving classification problems. However, determining the structure of the ANNs is not trivial as a large number of weights (connection links)...

["Algorithms and Analysis of Algorithms","Artificial Intelligence","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.137
113 downloads
1,271 views

Background Software maintenance is an important activity in the development process where maintenance team members leave and new members join over time. The identification of files which are changed together frequently has been proposed several times. Yet, existing...

["Data Science","Software Engineering"]
doi:10.7717/peerj-cs.135
327 downloads
1,514 views

User eXperience (UX) is a key factor in the success of software systems. Many software companies face challenges in their work with UX. Existing research does not analyze UX practices and challenges in relation to other software quality characteristics or, in particular,...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.130
1 citation
335 downloads
1,235 views

GitHub is a widely used online collaborative software development environment. In this paper, we describe curation projects as a new category of GitHub project that collects, evaluates, and preserves resources for software developers. We investigate: (1) what motivates...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.134
1 citation
140 downloads
918 views

Cataloging mutated driver genes that confer a selective growth advantage for tumor cells from sporadic passenger mutations is a critical problem in cancer genomic research. Previous studies have reported that some driver genes are not highly frequently mutated...

["Bioinformatics","Computational Biology"]
doi:10.7717/peerj-cs.133
2 citations
506 downloads
2,682 views

Purpose This paper introduces the Research Articles in Simplified HTML (or RASH), which is a Web-first format for writing HTML-based scholarly papers; it is accompanied by the RASH Framework, a set of tools for interacting with RASH-based articles. The paper also...

["Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.132
1 citation
337 downloads
1,758 views

Software engineering education is under constant pressure to provide students with industry-relevant knowledge and skills. Educators must address issues beyond exercises and theories that can be directly rehearsed in small settings. Industry training has similar...

["Computer Education","Software Engineering"]
doi:10.7717/peerj-cs.131
228 downloads
1,332 views

Background Mass Spectrometry (MS) based chemoproteomics has recently become a main tool to identify and quantify cellular target protein interactions with ligands/drugs in drug discovery. The complexity associated with these new types of data requires scientists...

["Bioinformatics"]
doi:10.7717/peerj-cs.129
2 citations
372 downloads
1,953 views

Gathering up-to-date information on food prices is critical in developing regions, as it allows policymakers and development practitioners to rely on accurate data on food security. This study explores the feasibility of utilizing social media as a new data source...

["Data Science","Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.126
241 downloads
1,504 views

Virtual reality (VR) applications have disseminated throughout several fields, with a special quest for immersion. The avatar is one of the key constituents of immersive applications, and avatar resemblance can provoke diverse emotional responses from the user....

["Human-Computer Interaction","Emerging Technologies"]
doi:10.7717/peerj-cs.128
4 citations
963 downloads
5,460 views

We present a CUDA-based implementation of a decision tree construction algorithm within the gradient boosting library XGBoost. The tree construction algorithm is executed entirely on the graphics processing unit (GPU) and shows high performance with a variety of...

["Artificial Intelligence","Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.127

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas