Peer-reviewed Articles

1 citation
449 downloads
2,099 views

Despite most Spatial Data Infrastructures offering service-based visualization of geospatial data, requirements are often at a very basic level leading to poor quality of maps. This is a general observation for any geospatial architecture as soon as open standards...

["Spatial and Geographic Information Systems","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.143
14 citations
652 downloads
5,380 views

Computer science offers a large set of tools for prototyping, writing, running, testing, validating, sharing and reproducing results; however, computational science lags behind. In the best case, authors may provide their source code as a compressed archive and...

["Data Science","Digital Libraries","Scientific Computing and Simulation","Social Computing"]
doi:10.7717/peerj-cs.142
3 citations
378 downloads
1,479 views

The continuous increase of unbound streaming data poses several challenges to established data stream processing engines. One of the most important challenges is the cost-efficient enactment of stream processing topologies under changing data volume. These data...

["Adaptive and Self-Organizing Systems","Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.141
329 downloads
1,673 views

Open-source lab equipment is becoming more widespread with the popularization of fabrication tools such as 3D printers, laser cutters, CNC machines, open source microcontrollers and open source software. Although many pieces of common laboratory equipment have...

["Network Science and Online Social Networks","Social Computing"]
doi:10.7717/peerj-cs.139
2 citations
530 downloads
1,267 views

Betweenness, a widely employed centrality measure in network science, is a decent proxy for investigating network loads and rankings. However, its extremely high computational cost greatly hinders its applicability in large networks. Although several parallel algorithms...

["Distributed and Parallel Computing","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.140
3 citations
783 downloads
3,146 views

With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application...

["Security and Privacy"]
doi:10.7717/peerj-cs.136
1 citation
280 downloads
1,398 views

The accurate knowledge of Heat Transfer Coefficients is essential for the design of precise heat transfer operations. The determination of these values requires Inverse Heat Transfer Calculations, which are usually based on heuristic optimisation techniques, like...

["Distributed and Parallel Computing","Graphics","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.138
3 citations
851 downloads
2,369 views

Background Artificial neural networks (ANNs) are a robust class of machine learning models and are a frequent choice for solving classification problems. However, determining the structure of the ANNs is not trivial as a large number of weights (connection links)...

["Algorithms and Analysis of Algorithms","Artificial Intelligence","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.137
271 downloads
1,791 views

Background Software maintenance is an important activity in the development process where maintenance team members leave and new members join over time. The identification of files which are changed together frequently has been proposed several times. Yet, existing...

["Data Science","Software Engineering"]
doi:10.7717/peerj-cs.135
6 citations
755 downloads
2,627 views

User eXperience (UX) is a key factor in the success of software systems. Many software companies face challenges in their work with UX. Existing research does not analyze UX practices and challenges in relation to other software quality characteristics or, in particular,...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.130
3 citations
594 downloads
1,889 views

GitHub is a widely used online collaborative software development environment. In this paper, we describe curation projects as a new category of GitHub project that collects, evaluates, and preserves resources for software developers. We investigate: (1) what motivates...

["Human-Computer Interaction","Software Engineering"]
doi:10.7717/peerj-cs.134
2 citations
257 downloads
1,261 views

Cataloging mutated driver genes that confer a selective growth advantage for tumor cells from sporadic passenger mutations is a critical problem in cancer genomic research. Previous studies have reported that some driver genes are not highly frequently mutated...

["Bioinformatics","Computational Biology"]
doi:10.7717/peerj-cs.133
3 citations
1,134 downloads
6,752 views

Purpose This paper introduces the Research Articles in Simplified HTML (or RASH), which is a Web-first format for writing HTML-based scholarly papers; it is accompanied by the RASH Framework, a set of tools for interacting with RASH-based articles. The paper also...

["Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.132
7 citations
788 downloads
2,661 views

Software engineering education is under constant pressure to provide students with industry-relevant knowledge and skills. Educators must address issues beyond exercises and theories that can be directly rehearsed in small settings. Industry training has similar...

["Computer Education","Software Engineering"]
doi:10.7717/peerj-cs.131
2 citations
401 downloads
1,948 views

Background Mass Spectrometry (MS) based chemoproteomics has recently become a main tool to identify and quantify cellular target protein interactions with ligands/drugs in drug discovery. The complexity associated with these new types of data requires scientists...

["Bioinformatics"]
doi:10.7717/peerj-cs.129

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas