Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Intro to Data Science (33)
- Computer Science (24)
- Computer science (23)
- Java (17)
- Refactoring (16)
-
- Machine learning (15)
- Deep learning (14)
- Software engineering (14)
- Java 8 (11)
- Machine Learning (11)
- Python (11)
- Deep Learning (10)
- Artificial intelligence (9)
- Cloud computing (9)
- Cybersecurity (9)
- Cryptography (8)
- Cs0 (8)
- Cs04all (8)
- Cs4all (8)
- Default methods (8)
- Software evolution (8)
- Streams (8)
- Automated refactoring (7)
- Software maintenance (7)
- Software tools (7)
- Computer Networking (6)
- Data science (6)
- Natural language processing (6)
- Programming (6)
- Typestate analysis (6)
- Publication Year
- Publication
- Publication Type
Articles 571 - 600 of 752
Full-Text Articles in Physical Sciences and Mathematics
Tr-2010015: New Progress In Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng
Tr-2010015: New Progress In Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
A Multidimensional Strategy To Detect Polypharmacological Targets In The Absence Of Structural And Sequence Homology, Jacob D. Durrant, Rommie E. Amaro, Lei Xie, Michael D. Urbaniak, Michael A. J. Ferguson, Antti Haapalainen, Zhijun Chen, Anne Marie Di Guilmi, Frank Wunder, Philip E. Bourne, J. Andrew Mccammon
A Multidimensional Strategy To Detect Polypharmacological Targets In The Absence Of Structural And Sequence Homology, Jacob D. Durrant, Rommie E. Amaro, Lei Xie, Michael D. Urbaniak, Michael A. J. Ferguson, Antti Haapalainen, Zhijun Chen, Anne Marie Di Guilmi, Frank Wunder, Philip E. Bourne, J. Andrew Mccammon
Publications and Research
Conventional drug design embraces the ‘‘one gene, one drug, one disease’’ philosophy. Polypharmacology, which focuses on multi-target drugs, has emerged as a new paradigm in drug discovery. The rational design of drugs that act via polypharmacological mechanisms can produce compounds that exhibit increased therapeutic potency and against which resistance is less likely to develop. Additionally, identifying multiple protein targets is also critical for side-effect prediction. One third of potential therapeutic compounds fail in clinical trials or are later removed from the market due to unacceptable side effects often caused by off-target binding. In the current work, we introduce a multidimensional …
Nearest Neighbor Search With Strong Location Privacy, Stavros Papadopoulos, Spiridon Bakiras, Dimitris Papadias
Nearest Neighbor Search With Strong Location Privacy, Stavros Papadopoulos, Spiridon Bakiras, Dimitris Papadias
Publications and Research
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial queries pose an additional threat to privacy because the location of a query may be sufficient to reveal sensitive information about the querier. In this paper we focus on k nearest neighbor (kNN) queries and define the notion of strong location privacy, which renders a query indistinguishable from any location in the data space. We argue that previous work fails to support this property for arbitrary kNN search. Towards this end, we introduce methods that …
Tr-2010002: Reasoning About Games, Melvin Fitting
Tr-2010002: Reasoning About Games, Melvin Fitting
Computer Science Technical Reports
No abstract provided.
Tr-2010003: The Impossibility Of Definitive Solutions For Some Games, Sergei Artemov
Tr-2010003: The Impossibility Of Definitive Solutions For Some Games, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2010004: Tracking Evidence, Sergei Artemov
Tr-2010004: Tracking Evidence, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2010006: Graph-Based Clustering And Its Application In Coreference Resolution, Zheng Chen
Tr-2010006: Graph-Based Clustering And Its Application In Coreference Resolution, Zheng Chen
Computer Science Technical Reports
No abstract provided.
Tr-2010007: Robust Knowledge Of Rationality, Sergei Artemov
Tr-2010007: Robust Knowledge Of Rationality, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2010010: Robust Knowledge And Rationality, Sergei Artemov
Tr-2010010: Robust Knowledge And Rationality, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2010011: Randomized Preprocessing Versus Pivoting Ii, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng
Tr-2010011: Randomized Preprocessing Versus Pivoting Ii, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
Tr-2010012: Randomized Preconditioning Of Linear Systems Of Equations, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng
Tr-2010012: Randomized Preconditioning Of Linear Systems Of Equations, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng
Computer Science Technical Reports
No abstract provided.
Tr-2010013: Matrix Computations And Polynomial Root-Finding With Preprocessing, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng, Zhao Chen
Tr-2010013: Matrix Computations And Polynomial Root-Finding With Preprocessing, Victor Y. Pan, Guoliang Qian, Ai-Long Zheng, Zhao Chen
Computer Science Technical Reports
No abstract provided.
Arabic For Designers By Mourad Boutros, Saad D. Abulhab
Arabic For Designers By Mourad Boutros, Saad D. Abulhab
Publications and Research
No abstract provided.
Automatic Readability Assessment, Lijun Feng
Automatic Readability Assessment, Lijun Feng
Dissertations, Theses, and Capstone Projects
We describe the development of an automatic tool to assess the readability of text documents. Our readability assessment tool predicts elementary school grade levels of texts with high accuracy. The tool is developed using supervised machine learning techniques on text corpora annotated with grade levels and other indicators of reading difficulty. Various independent variables or features are extracted from texts and used for automatic classification. We systematically explore different feature inventories and evaluate the grade-level prediction of the resulting classifiers. Our evaluation comprises well-known features at various linguistic levels from the existing literature, such as those based on language modeling, …
Acceleration Of Monte Carlo Value At Risk Estimation Using Graphics Processing Unit (Gpu), Wei Wu
Acceleration Of Monte Carlo Value At Risk Estimation Using Graphics Processing Unit (Gpu), Wei Wu
Dissertations and Theses
"Value at Risk (VaR) is one of the most popular tools used to estimate the exposure to market risks, and it measures the worst expected loss at a given confidence level. Monte Carlo simulation is one of the best methods to calculate VaR and it is widely used in financial industry. Unfortunately, it is time consuming especially when the simulated samples and the number of assets in a portfolio are very large. The graphics processing unit (GPU) is a specialized multiprocessor which has highly parallel structure supporting more effective than general-purpose CPUs for a range of complex algorithms. In this …
Optimal Cryptographic Hardness Of Learning Monotone Functions, Dana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio, Andrew Wan, Hoeteck Wee
Optimal Cryptographic Hardness Of Learning Monotone Functions, Dana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio, Andrew Wan, Hoeteck Wee
Publications and Research
Over the years a range of positive algorithmic results have been obtained for learning various classes of monotone Boolean functions from uniformly distributed random examples. Prior to our work, however, the only negative result for learning monotone functions in this model has been an information-theoretic lower bound showing that certain super-polynomial-size monotone circuits cannot be learned to accuracy 1/2+w(log n/ p n) (Blum, Burch, and Langford, FOCS’98). This is in contrast with the situation for nonmonotone functions, where a wide range of cryptographic hardness results establish that various “simple” classes of polynomial-size circuits are not learnable by polynomial-time algorithms.
In …
Pointcut Rejuvenation: Recovering Pointcut Expressions In Evolving Aspect-Oriented Software, Raffi T. Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Harry Xu
Pointcut Rejuvenation: Recovering Pointcut Expressions In Evolving Aspect-Oriented Software, Raffi T. Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Harry Xu
Publications and Research
Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. We present an automated approach that limits fragility problems by providing mechanical assistance in pointcut maintenance. The approach is based on harnessing arbitrarily deep structural commonalities between program elements corresponding to join points selected by a pointcut. The extracted patterns are then applied to later versions to offer suggestions of new join points that may require inclusion. We demonstrate the usefulness of our technique by rejuvenating pointcuts in multiple versions of several …
Contributing Factors To Pointcut Fragility, Phil Greenwood, Awais Rashid, Raffi T. Khatchadourian
Contributing Factors To Pointcut Fragility, Phil Greenwood, Awais Rashid, Raffi T. Khatchadourian
Publications and Research
Pointcut fragility is a well-documented problem of Aspect-Oriented Programming with changes to the base-code causing join points to incorrectly fall in or out of scope. In order to combat this problem a tool was developed that provides mechanical assistance to pointcut maintenance. This tool relied on the deep structural commonalities between program elements to detect when pointcut fragility occurs. During the assessment of this tool a number of common practices were uncovered that were employed both in the aspect and base-code that contributed to or prevented pointcut fragility. This paper documents the practices uncovered and describes how they can affect …
Quantum Computing: Selected Internet Resources For Librarians, Researchers, And The Casually Curious, Jill Cirasella
Quantum Computing: Selected Internet Resources For Librarians, Researchers, And The Casually Curious, Jill Cirasella
Publications and Research
This article is an annotated selection of the most important and informative Internet resources for learning about quantum computing, finding quantum computing literature, and tracking quantum computing news.
Tr-2009002: Cartesian Closed Categories For The Logic Of Proofs, Florian Lengyel
Tr-2009002: Cartesian Closed Categories For The Logic Of Proofs, Florian Lengyel
Computer Science Technical Reports
No abstract provided.
Tr-2009004: An Investigation Report On Auction Mechanism Design, Jinzhong Niu, Simon Parsons
Tr-2009004: An Investigation Report On Auction Mechanism Design, Jinzhong Niu, Simon Parsons
Computer Science Technical Reports
No abstract provided.
Tr-2009005: Visual Analytics: A Multi-Faceted Overview, Ilknur Icke, Elizabeth Sklar
Tr-2009005: Visual Analytics: A Multi-Faceted Overview, Ilknur Icke, Elizabeth Sklar
Computer Science Technical Reports
No abstract provided.
Tr-2009007: History Tree Descriptors Of Grayscale Images, Gabor T. Herman, T. Yung Kong, Lucas M. Oliveira
Tr-2009007: History Tree Descriptors Of Grayscale Images, Gabor T. Herman, T. Yung Kong, Lucas M. Oliveira
Computer Science Technical Reports
No abstract provided.
Tr-2009006: Intelligent Players, Sergei Artemov
Tr-2009006: Intelligent Players, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2009013: Generalized Gillespie Stochastic Simulation Algorithm And Chemical Master Equation Using Timing Machinery, Ellis D. Cooper, Florian Lengyel
Tr-2009013: Generalized Gillespie Stochastic Simulation Algorithm And Chemical Master Equation Using Timing Machinery, Ellis D. Cooper, Florian Lengyel
Computer Science Technical Reports
No abstract provided.
Tr-2009012: Rational Decisions In Non-Probabilistic Settings, Sergei Artemov
Tr-2009012: Rational Decisions In Non-Probabilistic Settings, Sergei Artemov
Computer Science Technical Reports
No abstract provided.
Tr-2009014: Randomized Preprocessing Of Homogeneous Linear Systems, Victor Y. Pan, Guoliang Qian
Tr-2009014: Randomized Preprocessing Of Homogeneous Linear Systems, Victor Y. Pan, Guoliang Qian
Computer Science Technical Reports
No abstract provided.
Tr-2009016: On The Effectiveness Of Projection Methods For Convex Feasibility Problems With Linear Inequality Constraints, Yair Censor, Wei Chen, Patrick L. Combettes, Ran Davidi, Gabor T. Herman
Tr-2009016: On The Effectiveness Of Projection Methods For Convex Feasibility Problems With Linear Inequality Constraints, Yair Censor, Wei Chen, Patrick L. Combettes, Ran Davidi, Gabor T. Herman
Computer Science Technical Reports
No abstract provided.
Tr-2009001: Bisc: A Binary Itemset Support Counting Approach Towards Efficient Frequent Itemset Mining, Jinlin Chen, Keli Xiao
Tr-2009001: Bisc: A Binary Itemset Support Counting Approach Towards Efficient Frequent Itemset Mining, Jinlin Chen, Keli Xiao
Computer Science Technical Reports
No abstract provided.
Tr-2009003: On Proof Realization On Modal Logic, Ren-June Wang
Tr-2009003: On Proof Realization On Modal Logic, Ren-June Wang
Computer Science Technical Reports
No abstract provided.