A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
We present the first report of automatic sentiment summarization in the legal domain. This work is based on processing a set of legal questions with a system consisting of a semi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder,...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...