Peer-reviewed Articles

199 downloads
534 views

Emerging from the information-theoretic characterization of secrecy, physical-layer security exploits the physical properties of the wireless channel for security purpose. In recent years, a great deal of attention has been paid to investigating the physical-layer...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7717/peerj-cs.186
467 downloads
3,167 views

The analysis of literary works has experienced a surge in computer-assisted processing. To obtain insights into the community structures and social interactions portrayed in novels, the creation of social networks from novels has gained popularity. Many methods...

["Computational Linguistics","Digital Libraries","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.189
482 downloads
599 views

Packet classification is a computationally intensive, highly parallelizable task in many advanced network systems like high-speed routers and firewalls that enable different functionalities through discriminating incoming traffic. Recently, graphics processing...

["Computer Networks and Communications","Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.185
249 downloads
631 views

Background Test resources are usually limited and therefore it is often not possible to completely test an application before a release. To cope with the problem of scarce resources, development teams can apply defect prediction to identify fault-prone code regions....

["Data Mining and Machine Learning","Software Engineering"]
doi:10.7717/peerj-cs.187
206 downloads
667 views

With an increasing demand for stringent security systems, automated identification of individuals based on biometric methods has been a major focus of research and development over the last decade. Biometric recognition analyses unique physiological traits or behavioral...

["Human\u2013Computer Interaction","Computer Vision","Security and Privacy"]
doi:10.7717/peerj-cs.184
206 downloads
579 views

Task-based programming models have demonstrated their efficiency in the development of scientific applications on modern high-performance platforms. They allow delegation of the management of parallelization to the runtime system (RS), which is in charge of the...

["Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.183
289 downloads
514 views

With the development of science and technology, network scales of various fields have experienced an amazing growth. Networks in the fields of biology, economics and society contain rich hidden information of human beings in the form of connectivity structures....

["Algorithms and Analysis of Algorithms","Graphics","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.180
184 downloads
780 views

Scientific collaboration has become a common behaviour in academia. Various recommendation strategies have been designed to provide relevant collaborators for the target scholars. However, scholars are no longer satisfied with the acquainted collaborator recommendations,...

["Data Mining and Machine Learning","Data Science","Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.178
235 downloads
738 views

The individual electronic identification (EID) of cattle based on RFID technology (134.2 kHz ISO standard 11784) will definitely enter into force in European countries as an official means of animal identification from July 2019. Integrating EID with 3D digital...

["Bioinformatics","Computer Vision","Data Science","Spatial and Geographic Information Systems"]
doi:10.7717/peerj-cs.179
1 citation
334 downloads
815 views

Three-dimensional (3D) medical image classification is useful in applications such as disease diagnosis and content-based medical image retrieval. It is a challenging task due to several reasons. First, image intensity values are vastly different depending on the...

["Artificial Intelligence","Computer Vision","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.181
167 downloads
515 views

Researchers use various skills in their works, such as writing, data analysis and experiments design. These research skills have greatly influenced the quality of their research outputs, as well as their scientific impact. Although many indicators have been proposed...

["Algorithms and Analysis of Algorithms","Computer Architecture","Social Computing"]
doi:10.7717/peerj-cs.182
5 citations
252 downloads
1,143 views

Deep learning has been increasingly and widely used to solve numerous problems in various fields with state-of-the-art performance. It can also be applied in bioinformatics to reduce the requirement for feature extraction and reach high performance. This study...

["Bioinformatics","Computational Biology","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.177
1 citation
334 downloads
727 views

Many data processing systems are naturally modeled as pipelines, where data flows though a network of computational procedures. This representation is particularly suitable for computer vision algorithms, which in most cases possess complex logic and a big number...

["Computer Vision","Data Science","Robotics","Software Engineering"]
doi:10.7717/peerj-cs.176
349 downloads
1,472 views

Background Assessing a software engineer’s ability to solve algorithmic programming tasks has been an essential part of technical interviews at some of the most successful technology companies for several years now. We do not know to what extent individual characteristics,...

["Software Engineering"]
doi:10.7717/peerj-cs.173
230 downloads
686 views

The CodeMeta Project recently proposed a vocabulary for software metadata. ISO Technical Committee 211 has published a set of metadata standards for geographic data and many kinds of related resources, including software. In order for ISO metadata creators and...

["Digital Libraries","Software Engineering"]
doi:10.7717/peerj-cs.174

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas