Peer-reviewed Articles

513 downloads
1,286 views

Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies. A proliferation of attacks...

["Computer Networks and Communications","Data Mining and Machine Learning","Security and Privacy"]
doi:10.7717/peerj-cs.25
8 citations
735 downloads
6,426 views

Social media has become the main vehicle of information production and consumption online. Millions of users every day log on their Facebook or Twitter accounts to get updates and news, read about their topics of interest, and become exposed to new opportunities...

["Data Mining and Machine Learning","Data Science","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.26
4 citations
334 downloads
1,342 views

We propose a measure based upon the fundamental theoretical concept in algorithmic information theory that provides a natural approach to the problem of evaluating n-dimensional complexity by using an n-dimensional deterministic Turing machine. The technique is...

["Computational Biology","Artificial Intelligence","Theory and Formal Methods"]
doi:10.7717/peerj-cs.23
1 citation
127 downloads
658 views

Pawns is a programming language under development that supports algebraic data types, polymorphism, higher order functions and “pure” declarative programming. It also supports impure imperative features including destructive update of shared data structures via...

["Programming Languages"]
doi:10.7717/peerj-cs.22
3 citations
428 downloads
1,389 views

Usability is a core construct of website evaluation and inherently defined as interactive. Yet, when analysing first impressions of websites, expected usability, i.e., before use, is of interest. Here we investigate to what extend ratings of expected usability...

["Human\u2013Computer Interaction","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.19
10 citations
571 downloads
2,252 views

The analysis of next-generation sequence (NGS) data is often a fragmented step-wise process. For example, multiple pieces of software are typically needed to map NGS reads, extract variant sites, and construct a DNA sequence matrix containing only single nucleotide...

["Bioinformatics"]
doi:10.7717/peerj-cs.20
247 downloads
653 views

Triple Modular Redundancy (TMR) is a common technique to protect memory elements for digital processing systems subject to radiation effects (such as in space, high-altitude, or near nuclear sources). This paper presents an approach to verify the correct implementation...

["Computer Aided Design","Computer Architecture","Embedded Computing"]
doi:10.7717/peerj-cs.21
419 downloads
1,324 views

Plasmonic assays are an important class of optical sensors that measure biomolecular interactions in real-time without the need for labeling agents, making them especially well-suited for clinical applications. Through the incorporation of nanoparticles and fiberoptics,...

["Computational Biology","Scientific Computing and Simulation","Software Engineering"]
doi:10.7717/peerj-cs.17
3 citations
252 downloads
2,516 views

Affects—emotions and moods—have an impact on cognitive activities and the working performance of individuals. Development tasks are undertaken through cognitive processes, yet software engineering research lacks theory on affects and their impact on software development...

["Human\u2013Computer Interaction","Social Computing","Software Engineering"]
doi:10.7717/peerj-cs.18
264 downloads
1,043 views

Vehicular data collection applications are emerging as an appealing technology to monitor urban areas, where a high concentration of connected vehicles with onboard sensors is a near future scenario. In this context, smartphones are, on one side, effective enablers...

["Computer Networks and Communications","Distributed and Parallel Computing","Mobile and Ubiquitous Computing"]
doi:10.7717/peerj-cs.15
5 citations
307 downloads
1,694 views

This study investigated peoples’ opinion on auditory interfaces in contemporary cars and their willingness to be exposed to auditory feedback in automated driving. We used an Internet-based survey to collect 1,205 responses from 91 countries. The respondents stated...

["Human-Computer Interaction","Autonomous Systems","Multimedia"]
doi:10.7717/peerj-cs.13
1 citation
296 downloads
1,189 views

Pupillometry is a promising method for assessing mental workload and could be helpful in the optimization of systems that involve human–computer interaction. The present study focuses on replicating the studies by Ahern (1978) and Klingner (2010), which found that...

["Human\u2013Computer Interaction"]
doi:10.7717/peerj-cs.16
1 citation
113 downloads
1,093 views

This paper describes how scholars in Chinese Interpreting Studies (CIS) interact with each other and form discrete circles of influence. It also discusses what it means to be an influential scholar in the community, and the relationship between an author’s choice...

["Data Mining and Machine Learning","Data Science","Digital Libraries","Social Computing"]
doi:10.7717/peerj-cs.14
1 citation
352 downloads
6,023 views

API methods are not used alone, but in groups and following patterns. However, despite being a key information for API users, most usage patterns are not described in official API documents. In this article, we report a study that evaluates the feasibility of automatically...

["Software Engineering"]
doi:10.7717/peerj-cs.12
2 citations
400 downloads
3,488 views

With few exceptions, the field of Machine Learning (ML) research has largely ignored the browser as a computational engine. Beyond an educational resource for ML, the browser has vast potential to not only improve the state-of-the-art in ML research, but also,...

["Data Mining and Machine Learning","Emerging Technologies","Mobile and Ubiquitous Computing","World Wide Web and Web Science","Software Engineering"]
doi:10.7717/peerj-cs.11

Top subject areas - Articles

Top subject areas - People

View all subject areas