Peer-reviewed Articles

238 downloads
909 views

Vehicular data collection applications are emerging as an appealing technology to monitor urban areas, where a high concentration of connected vehicles with onboard sensors is a near future scenario. In this context, smartphones are, on one side, effective enablers...

["Computer Networks and Communications","Distributed and Parallel Computing","Mobile and Ubiquitous Computing"]
doi:10.7717/peerj-cs.15
3 citations
257 downloads
1,426 views

This study investigated peoples’ opinion on auditory interfaces in contemporary cars and their willingness to be exposed to auditory feedback in automated driving. We used an Internet-based survey to collect 1,205 responses from 91 countries. The respondents stated...

["Human-Computer Interaction","Autonomous Systems","Multimedia"]
doi:10.7717/peerj-cs.13
1 citation
265 downloads
1,003 views

Pupillometry is a promising method for assessing mental workload and could be helpful in the optimization of systems that involve human–computer interaction. The present study focuses on replicating the studies by Ahern (1978) and Klingner (2010), which found that...

["Human\u2013Computer Interaction"]
doi:10.7717/peerj-cs.16
1 citation
93 downloads
854 views

This paper describes how scholars in Chinese Interpreting Studies (CIS) interact with each other and form discrete circles of influence. It also discusses what it means to be an influential scholar in the community, and the relationship between an author’s choice...

["Data Mining and Machine Learning","Data Science","Digital Libraries","Social Computing"]
doi:10.7717/peerj-cs.14
324 downloads
5,851 views

API methods are not used alone, but in groups and following patterns. However, despite being a key information for API users, most usage patterns are not described in official API documents. In this article, we report a study that evaluates the feasibility of automatically...

["Software Engineering"]
doi:10.7717/peerj-cs.12
1 citation
371 downloads
3,281 views

With few exceptions, the field of Machine Learning (ML) research has largely ignored the browser as a computational engine. Beyond an educational resource for ML, the browser has vast potential to not only improve the state-of-the-art in ML research, but also,...

["Data Mining and Machine Learning","Emerging Technologies","Mobile and Ubiquitous Computing","World Wide Web and Web Science","Software Engineering"]
doi:10.7717/peerj-cs.11
3 citations
400 downloads
2,966 views

In this work, we developed an automated system to detect potentially illegal elephant ivory items for sale on eBay. Two law enforcement experts, with specific knowledge of elephant ivory identification, manually classified items on sale in the Antiques section...

["Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.10
450 downloads
1,775 views

Summary. Pylogeny is a cross-platform library for the Python programming language that provides an object-oriented application programming interface for phylogenetic heuristic searches. Its primary function is to permit both heuristic search and analysis of the...

["Bioinformatics","Computational Biology"]
doi:10.7717/peerj-cs.9
112 downloads
1,092 views

This paper is aimed at identifying the required knowledge for information robots. We addressed two aspects of this knowledge, ‘what should it know’ and ‘what should it do.’ The first part of this study was devoted to the former aspect. We investigated what information...

["Robotics"]
doi:10.7717/peerj-cs.8
1 citation
731 downloads
4,572 views

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files,...

["Security and Privacy"]
doi:10.7717/peerj-cs.7
185 downloads
1,085 views

Tandem repeat sequences have been found in great numbers in proteins that are conserved in a wide range of living species. In order to reconstruct the evolutionary history of such sequences, it is necessary to develop algorithms and methods that can work with highly...

["Bioinformatics","Computational Biology"]
doi:10.7717/peerj-cs.6
1 citation
195 downloads
1,231 views

This paper describes an interactive audio-visual musical installation, namely MOTUS, that aims at being deployed using low-cost hardware and software. This was achieved by writing the software as a web application and using only hardware pieces that are built-in...

["Human\u2013Computer Interaction","Multimedia"]
doi:10.7717/peerj-cs.5
2 citations
1,004 downloads
41,995 views

In the massive online worlds of social media, users frequently rely on organizing themselves around specific topics of interest to find and engage with like-minded people. However, navigating these massive worlds and finding topics of specific interest often proves...

["Network Science and Online Social Networks","Visual Analytics"]
doi:10.7717/peerj-cs.4
1 citation
451 downloads
3,525 views

The growing number of genotyped populations, the advent of high-throughput phenotyping techniques and the development of GWAS analysis software has rapidly accelerated the number of GWAS experimental results. Candidate gene discovery from these results files is...

["Bioinformatics","Computational Biology","Visual Analytics"]
doi:10.7717/peerj-cs.3
1,050 downloads
13,350 views

We extend the existing enumeration of neck tie-knots to include tie-knots with a textured front, tied with the narrow end of a tie. These tie-knots have gained popularity in recent years, based on reconstructions of a costume detail from The Matrix Reloaded, and...

["Algorithms and Analysis of Algorithms","Computational Linguistics","Theory and Formal Methods"]
doi:10.7717/peerj-cs.2

Top subject areas - Articles

Top subject areas - People

View all subject areas