The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
In this work, we report an ongoing study that aims to apply cluster validation measures for analyzing email communications at an organizational level of a company. This analysis can be used to evaluate the company structure and to produce further recommendations for structural improvements. Our initial evaluations, based on data in the forms of emails logs and organizational structure for a large...
Recommender systems take inputs from user history, use an internal ranking algorithm to generate results and possibly optimize this ranking based on feedback. However, often the recommender system is unaware of the actual intent of the user and simply provides recommendations dynamically without properly understanding the thought process of the user. An intelligent recommender system is not only useful...
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
Estimating the difficulty of tasks is imperative for project planning, task assignment, and cost calculation. However, little is known about how and for what purpose software practitioners estimate task difficulty in their day-to-day work. In this paper, we interviewed 15 professionals to understand their needs and perceptions when estimating task difficulty. We find that practitioners do estimate...
This work deals with modern trends in the design and development of monitoring and data acquisition systems for potentially explosive gases in underground sites, as well as implementing this kind of a system, with dedicated software, in mine openings made by Hidroconstructia Company in Buzau County.
Recommender systems (RS) performance largely depends on diverse types of input that characterize users' preference in the form of both explicit and implicit feedbacks. An explicit feedback is stated directly by an explicit input from users regarding their interest in some options of services or products. Such feedback, however, is not always available. On the other hand, an implicit feedback, which...
Defect prediction has been the subject of a great deal of research over the last two decades. Despite this research it is increasingly clear that defect prediction has not transferred into industrial practice. One of the reasons defect prediction remains a largely academic activity is that there are no defect prediction tools that developers can use during their day-to-day development activities....
Code review is a key tool for quality assurance in software development. It is intended to find coding mistakes overlooked during development phase and lower risk of bugs in final product. In large and complex projects accurate code review is a challenging task. As code review depends on individual reviewer predisposition there is certain margin of source code changes that is not checked as it should...
Web cookies are ubiquitously used to track and profile the behavior of users. Although there is a solid empirical foundation for understanding the use of cookies in the global world wide web, thus far, limited attention has been devoted for country-specific and company-level analysis of cookies. To patch this limitation in the literature, this paper investigates persistent third-party cookies used...
Online controlled experiments (for example A/B tests) are increasingly being performed to guide product development and accelerate innovation in online software product companies. The benefits of controlled experiments have been shown in many cases with incremental product improvement as the objective. In this paper, we demonstrate that the value of controlled experimentation at scale extends beyond...
Keeping the build fast is often stated as an important prerequisite for continuous integration, and is also widely discussed in literature. But which importance does the capacity of the build system actually have in relation to developer behavior? Based on metrics and interview results from a large-scale industry project, we present the factors that according to the developers themselves affect how...
We study the problem of updating a social network snapshot when the social system provides a limited public API to access the graph. We propose novel link prediction and hybrid strategies that beat a state-of-the-art competing graph strategy [1]. Our strategies make educated guesses for edge removals and creations based on graph “fingerprints”. We also propose an improved baseline strategy and more...
Personal data has great potential for building an efficient and sustainable society; thus several privacy preserving techniques have been proposed to solve the essential issue of maintaining privacy in the use of personal data. Anonymization techniques are promising techniques applicable to huge-size personal data in order to reduce its re-identification risk. However, there is a trade-off between...
Accompanied by the sharp economic evolution, the amounts of products that are circulating more and more outstanding. Depend on the fact that in the process of delivering goods, businesses need to have professional Logistics to help them promote transferring goods to necessary places many logistics companies have established. Third party Logistics (3PL) companies specialize in integrated operation,...
In any sufficiently complex software system there are experts, having a deeper understanding of parts of the system than others. However, it is not always clear who these experts are and which particular parts of the system they can provide help with. We propose a framework to elicit the expertise of developers and recommend experts by analyzing complexity measures over time. Furthermore, teams can...
This paper reviews relevant literature that is about causes and results of auditor changes. The paper contains main four parts of the literature: (1) Category of auditor changes, (2) Causes of auditor changes, (3) Results of auditor changes, (4) Remarks and suggestions for future research.
Location data collection at a societal scale is increasingly becoming common - examples of this are call and data detail records in telecommunication companies, GPS samples collected by car companies, and GPS samples from mobile devices in mapping companies (e.g., Google, Microsoft). Such large scale mobility datasets have applications in urban planning, network planning, surveillance, and real-time...
The development of data services (internet) in Indonesia is increasing for each year. The research firm emarketer said that the population netter in Indonesia reached 83.7 million people in 2014, and in 2017 is estimated to reach 112 million people. pt. xyz is a company with business in telecommunications by providing data services as one of its business processes. But in that business process, often...
Many companies work with suppliers to increase flexibility, focus on their own core competencies and improve efficiency and cost along the supply chain. Working with suppliers and effectively integrating them to complex software supply chains is far from easy. Savings are much smaller and problems are more difficult to cure than with internal development. Obviously suppliers need to optimize both...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.