Peer-reviewed Articles

4 citations
269 downloads
1,720 views

Agent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent. ABMs are very sensitive to implementation details. Thus, it is very easy to inadvertently...

["Agents and Multi-Agent Systems","Scientific Computing and Simulation","Theory and Formal Methods"]
doi:10.7717/peerj-cs.36
182 downloads
790 views

We propose a robust method to convert triangulated surface data into polynomial volume data. Such polynomial representations are required for high-order partial differential solvers, as low-order surface representations would diminish the accuracy of their solution....

["Computer Aided Design","Scientific Computing and Simulation"]
doi:10.7717/peerj-cs.35
216 downloads
870 views

CRISPR/Cas9 is emerging as one of the most-used methods of genome modification in organisms ranging from bacteria to human cells. However, the efficiency of editing varies tremendously site-to-site. A recent report identified a novel motif, called the 3′GG motif,...

["Bioinformatics","Computational Biology","Data Science","Databases"]
doi:10.7717/peerj-cs.33
1 citation
264 downloads
1,298 views

The number of papers published in journals indexed by the Web of Science core collection is steadily increasing. In recent years, nearly two million new papers were published each year; somewhat more than one million papers when primary research papers are considered...

["Data Science","Databases","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.32
262 downloads
1,190 views

An activity fundamental to science is building mathematical models. These models are used to both predict the results of future experiments and gain insight into the structure of the system under study. We present an algorithm that automates the model building...

["Artificial Intelligence","Data Mining and Machine Learning","Scientific Computing and Simulation"]
doi:10.7717/peerj-cs.31
2,481 downloads
1,585 views

The purpose of this paper is to provide a governance structure for IT-related projects in order to assure a safeguarded and timely transition to a productive environment. This transitioning, which rarely exceeds a weekend, is colloquially called ‘cut-over’, ‘rollout’...

["Computer Architecture","Theory and Formal Methods","Software Engineering"]
doi:10.7717/peerj-cs.29
1 citation
214 downloads
1,406 views

Since Chrome’s initial release in 2008 it has grown in market share, and now controls roughly half of the desktop browsers market. In contrast with Internet Explorer, the previous dominant browser, this was not achieved by marketing practices such as bundling the...

["World Wide Web and Web Science","Software Engineering"]
doi:10.7717/peerj-cs.28
1 citation
278 downloads
811 views

In this communication a representation of the links between DNA-relatives based on Graph Theory is applied to the analysis of personal genomic data to obtain genealogical information. The method is tested on both simulated and real data and its applicability to...

["Computational Biology","Artificial Intelligence","Visual Analytics"]
doi:10.7717/peerj-cs.27
333 downloads
728 views

No order correlation or similarity metric exists in nominal data, and there will always be more redundancy in a nominal dataset, which means that an efficient mutual information-based nominal-data feature selection method is relatively difficult to find. In this...

["Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.24
552 downloads
1,385 views

Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies. A proliferation of attacks...

["Computer Networks and Communications","Data Mining and Machine Learning","Security and Privacy"]
doi:10.7717/peerj-cs.25
11 citations
790 downloads
6,624 views

Social media has become the main vehicle of information production and consumption online. Millions of users every day log on their Facebook or Twitter accounts to get updates and news, read about their topics of interest, and become exposed to new opportunities...

["Data Mining and Machine Learning","Data Science","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.26
5 citations
350 downloads
1,421 views

We propose a measure based upon the fundamental theoretical concept in algorithmic information theory that provides a natural approach to the problem of evaluating n-dimensional complexity by using an n-dimensional deterministic Turing machine. The technique is...

["Computational Biology","Artificial Intelligence","Theory and Formal Methods"]
doi:10.7717/peerj-cs.23
1 citation
130 downloads
676 views

Pawns is a programming language under development that supports algebraic data types, polymorphism, higher order functions and “pure” declarative programming. It also supports impure imperative features including destructive update of shared data structures via...

["Programming Languages"]
doi:10.7717/peerj-cs.22
3 citations
449 downloads
1,418 views

Usability is a core construct of website evaluation and inherently defined as interactive. Yet, when analysing first impressions of websites, expected usability, i.e., before use, is of interest. Here we investigate to what extend ratings of expected usability...

["Human\u2013Computer Interaction","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.19
14 citations
597 downloads
2,422 views

The analysis of next-generation sequence (NGS) data is often a fragmented step-wise process. For example, multiple pieces of software are typically needed to map NGS reads, extract variant sites, and construct a DNA sequence matrix containing only single nucleotide...

["Bioinformatics"]
doi:10.7717/peerj-cs.20

Top subject areas - Articles

Top subject areas - People

View all subject areas