Peer-reviewed Articles

502 downloads
2,273 views

With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application...

["Security and Privacy"]
doi:10.7717/peerj-cs.136
147 downloads
1,151 views

The accurate knowledge of Heat Transfer Coefficients is essential for the design of precise heat transfer operations. The determination of these values requires Inverse Heat Transfer Calculations, which are usually based on heuristic optimisation techniques, like...

["Distributed and Parallel Computing","Graphics","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.138
3 citations
516 downloads
1,874 views

Background Artificial neural networks (ANNs) are a robust class of machine learning models and are a frequent choice for solving classification problems. However, determining the structure of the ANNs is not trivial as a large number of weights (connection links)...

["Algorithms and Analysis of Algorithms","Artificial Intelligence","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.137
155 downloads
1,536 views

Background Software maintenance is an important activity in the development process where maintenance team members leave and new members join over time. The identification of files which are changed together frequently has been proposed several times. Yet, existing...

["Data Science","Software Engineering"]
doi:10.7717/peerj-cs.135
1 citation
531 downloads
1,890 views

User eXperience (UX) is a key factor in the success of software systems. Many software companies face challenges in their work with UX. Existing research does not analyze UX practices and challenges in relation to other software quality characteristics or, in particular,...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.130
2 citations
444 downloads
1,447 views

GitHub is a widely used online collaborative software development environment. In this paper, we describe curation projects as a new category of GitHub project that collects, evaluates, and preserves resources for software developers. We investigate: (1) what motivates...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.134
1 citation
179 downloads
1,065 views

Cataloging mutated driver genes that confer a selective growth advantage for tumor cells from sporadic passenger mutations is a critical problem in cancer genomic research. Previous studies have reported that some driver genes are not highly frequently mutated...

["Bioinformatics","Computational Biology"]
doi:10.7717/peerj-cs.133
3 citations
580 downloads
3,940 views

Purpose This paper introduces the Research Articles in Simplified HTML (or RASH), which is a Web-first format for writing HTML-based scholarly papers; it is accompanied by the RASH Framework, a set of tools for interacting with RASH-based articles. The paper also...

["Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.132
4 citations
459 downloads
2,058 views

Software engineering education is under constant pressure to provide students with industry-relevant knowledge and skills. Educators must address issues beyond exercises and theories that can be directly rehearsed in small settings. Industry training has similar...

["Computer Education","Software Engineering"]
doi:10.7717/peerj-cs.131
1 citation
311 downloads
1,573 views

Background Mass Spectrometry (MS) based chemoproteomics has recently become a main tool to identify and quantify cellular target protein interactions with ligands/drugs in drug discovery. The complexity associated with these new types of data requires scientists...

["Bioinformatics"]
doi:10.7717/peerj-cs.129
2 citations
526 downloads
2,315 views

Gathering up-to-date information on food prices is critical in developing regions, as it allows policymakers and development practitioners to rely on accurate data on food security. This study explores the feasibility of utilizing social media as a new data source...

["Data Science","Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.126
351 downloads
1,769 views

Virtual reality (VR) applications have disseminated throughout several fields, with a special quest for immersion. The avatar is one of the key constituents of immersive applications, and avatar resemblance can provoke diverse emotional responses from the user....

["Human-Computer Interaction","Emerging Technologies"]
doi:10.7717/peerj-cs.128
8 citations
1,247 downloads
6,630 views

We present a CUDA-based implementation of a decision tree construction algorithm within the gradient boosting library XGBoost. The tree construction algorithm is executed entirely on the graphics processing unit (GPU) and shows high performance with a variety of...

["Artificial Intelligence","Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.127
2 citations
1,054 downloads
2,576 views

Background The availability of large databases containing high resolution three-dimensional (3D) models of proteins in conjunction with functional annotation allows the exploitation of advanced supervised machine learning techniques for automatic protein function...

["Bioinformatics","Computational Biology","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.124
2 citations
137 downloads
1,423 views

CodonGenie, freely available from http://codon.synbiochem.co.uk, is a simple web application for designing ambiguous codons to support protein mutagenesis applications. Ambiguous codons are derived from specific heterogeneous nucleotide mixtures, which create sequence...

["Bioengineering","Bioinformatics","Biotechnology","Computational Biology","Synthetic Biology"]
doi:10.7717/peerj-cs.120

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas