Nome |
# |
Blockchain for the Internet of Things: a Systematic Literature Review, file e384c42f-17ea-d4b2-e053-9f05fe0a1d67
|
11.552
|
EMPIRICAL ASSESSMENT OF THE IMPACT OF USING
AUTOMATIC STATIC ANALYSIS ON CODE QUALITY, file e384c42e-2637-d4b2-e053-9f05fe0a1d67
|
2.531
|
Using the ISO/IEC 9126 product quality model to classify defects : a Controlled Experiment, file e384c42e-1955-d4b2-e053-9f05fe0a1d67
|
2.200
|
A Recommender System for Telecom Users: Experimental Evaluation of Recommendation Algorithms, file e384c42e-108c-d4b2-e053-9f05fe0a1d67
|
1.893
|
Peer to Peer for Privacy and Decentralization in the Internet of Things, file e384c42f-615a-d4b2-e053-9f05fe0a1d67
|
1.361
|
Comparing Four Approaches for Technical Debt Identification, file e384c42e-263e-d4b2-e053-9f05fe0a1d67
|
1.322
|
Open Data Quality Measurement Framework: Definition and Application to Open Government Data, file e384c42e-f9e1-d4b2-e053-9f05fe0a1d67
|
1.230
|
A Case Study on Effectively Identifying Technical Debt, file e384c42e-263d-d4b2-e053-9f05fe0a1d67
|
1.075
|
Organizing the Technical Debt Landscape, file e384c42e-1dec-d4b2-e053-9f05fe0a1d67
|
1.024
|
Profiling Power Consumption on Desktop Computer Systems, file e384c42e-1830-d4b2-e053-9f05fe0a1d67
|
857
|
Energy Efficiency in the ICT - Profiling Power Consumption in Desktop Computer Systems, file e384c42e-1bc4-d4b2-e053-9f05fe0a1d67
|
775
|
An Empirical Validation of FindBugs Issues Related to Defects, file e384c42e-0bd3-d4b2-e053-9f05fe0a1d67
|
766
|
Linked Data approach for selection process automation in Systematic Reviews, file e384c42e-0bc4-d4b2-e053-9f05fe0a1d67
|
751
|
Investigating Technical Debt Folklore - Shedding some light on technical debt opinion, file e384c42e-263f-d4b2-e053-9f05fe0a1d67
|
728
|
A Comparative Analysis of Software Reliability Growth Models using defects data of Closed and Open Source Software, file e384c42e-270b-d4b2-e053-9f05fe0a1d67
|
726
|
Definition, implementation and validation of energy code smells: an exploratory study on an embedded system, file e384c42e-26ab-d4b2-e053-9f05fe0a1d67
|
637
|
Classification of Language Interactions, file e384c42e-2da0-d4b2-e053-9f05fe0a1d67
|
630
|
Using Automatic Static Analysis to Identify Technical Debt, file e384c42e-1b45-d4b2-e053-9f05fe0a1d67
|
596
|
A model-based approach to language integration, file e384c42e-25b1-d4b2-e053-9f05fe0a1d67
|
577
|
Assessing the Precision of FindBugs bymining Java Projects developed at a University, file e384c42e-0404-d4b2-e053-9f05fe0a1d67
|
557
|
Preserving the Benefits of Open Government Data by Measuring and Improving Their Quality: An Empirical Study, file e384c42f-7169-d4b2-e053-9f05fe0a1d67
|
484
|
Monitoring IT Power Consumption in a Research Center: Seven Facts, file e384c42e-150a-d4b2-e053-9f05fe0a1d67
|
475
|
Language Interaction and Quality Issues: An Exploratory Study, file e384c42e-1913-d4b2-e053-9f05fe0a1d67
|
469
|
Investigating Automatic Static Analysis Results to Identify Quality Problems: an Inductive Study, file e384c42e-1bc1-d4b2-e053-9f05fe0a1d67
|
459
|
An Exploratory Study on Technology Transfer in Software Engineering, file e384c42e-73d6-d4b2-e053-9f05fe0a1d67
|
449
|
Introducing Energy Efficiency into SQALE, file e384c42e-2557-d4b2-e053-9f05fe0a1d67
|
440
|
An Exploratory Empirical Assessment of Italian Open
Government Data Quality
With an eye to enabling linked open data, file e384c42e-306e-d4b2-e053-9f05fe0a1d67
|
406
|
Empirical Assessment of the Impact of Automatic Static Analysis on Code Quality, file e384c42e-0bd4-d4b2-e053-9f05fe0a1d67
|
386
|
On The Impact of Passive Voice Requirements on Domain Modelling, file e384c42e-340a-d4b2-e053-9f05fe0a1d67
|
385
|
Semantic Enrichment for Recommendation of Primary Studies in a Systematic Literature Review, file e384c42d-c65b-d4b2-e053-9f05fe0a1d67
|
370
|
On the Benefits and Barriers when adopting Software Modelling and Model Driven Techniques - An external, differentiated replication, file e384c42f-4c02-d4b2-e053-9f05fe0a1d67
|
336
|
The Green Lab: Experimentation in Software Energy Efficiency, file e384c42e-376a-d4b2-e053-9f05fe0a1d67
|
327
|
In Quest for Proper Mediums for Technology Transfer in Software Engineering, file e384c42e-73d5-d4b2-e053-9f05fe0a1d67
|
289
|
Quantitative Assessment of the Impact of Automatic Static Analysis Issues on Time Efficiency, file e384c42e-1827-d4b2-e053-9f05fe0a1d67
|
276
|
Fast Feedback Cycles in Empirical Software Engineering Research, file e384c42e-d6ce-d4b2-e053-9f05fe0a1d67
|
236
|
In Quest for Requirements Engineering Oracles: Dependent Variables and Measurements for (good) RE, file e384c42e-306d-d4b2-e053-9f05fe0a1d67
|
234
|
OpenCoesione and Monithon - a Transparency Effort, file e384c42e-30b7-d4b2-e053-9f05fe0a1d67
|
211
|
Understanding Green Software Development: A Conceptual Framework, file e384c42e-2f6c-d4b2-e053-9f05fe0a1d67
|
181
|
Energy Profiler Framework, file e384c42e-0bd6-d4b2-e053-9f05fe0a1d67
|
179
|
Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software, file e384c42e-33b6-d4b2-e053-9f05fe0a1d67
|
113
|
JORUM: Repository for discovering and sharing OER for HE, Further Educations and Skills, file e384c42f-8194-d4b2-e053-9f05fe0a1d67
|
79
|
Combining Data Analytics with Team Feedback to Improve the Estimation Process in Agile Software Development, file e384c430-94d4-d4b2-e053-9f05fe0a1d67
|
66
|
AI: from rational agents to socially responsible agents, file e384c430-6fde-d4b2-e053-9f05fe0a1d67
|
61
|
On the Integration of Knowledge Graphs into Deep Learning Models for a More Comprehensible AI—Three Challenges for Future Research, file e384c431-81df-d4b2-e053-9f05fe0a1d67
|
51
|
Hubs, Rebalancing and Service Providers in the Lightning Network, file e384c431-6ee1-d4b2-e053-9f05fe0a1d67
|
48
|
Training Neural Language Models with SPARQL queries forSemi-Automatic Semantic Mapping, file e384c430-39b2-d4b2-e053-9f05fe0a1d67
|
45
|
Naming the Pain in Requirements Engineering: Contemporary Problems, Causes, and effects in Practice, file e384c42e-ff80-d4b2-e053-9f05fe0a1d67
|
43
|
The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results, file e384c430-3d84-d4b2-e053-9f05fe0a1d67
|
38
|
Detecting discriminatory risk through data annotation based on Bayesian inferences, file e384c432-b670-d4b2-e053-9f05fe0a1d67
|
37
|
Modeling the semantics of data sources with graph neural networks, file e384c432-8c41-d4b2-e053-9f05fe0a1d67
|
34
|
Identifying Risks in Datasets for Automated Decision–Making, file e384c432-68b9-d4b2-e053-9f05fe0a1d67
|
30
|
The Invisible Power of Fairness. How Machine Learning Shapes Democracy, file e384c430-da81-d4b2-e053-9f05fe0a1d67
|
25
|
SeMi: A SEmantic Modeling machIne to build Knowledge Graphs with graph neural networks, file e384c432-22ef-d4b2-e053-9f05fe0a1d67
|
21
|
Status quo in requirements engineering: A theory and a global family of surveys, file e384c430-932d-d4b2-e053-9f05fe0a1d67
|
20
|
Understanding automated and human-based technical debt identification approaches-a two-phase study, file e384c430-fd18-d4b2-e053-9f05fe0a1d67
|
20
|
CLoTH: A Lightning Network Simulator, file e384c433-c27a-d4b2-e053-9f05fe0a1d67
|
18
|
Detecting Discrimination Risk in Automated Decision-Making Systems with Balance Measures on Input Data, file e384c434-1820-d4b2-e053-9f05fe0a1d67
|
17
|
Appendix for "Identifying Imbalance Thresholds in Input Data to Achieve Desired Levels of Algorithmic Fairness", file 3aa6cc17-a172-47c4-b2b4-b33fec2991d0
|
14
|
The Geranium Platform: A KG-Based System for Academic Publications, file e384c433-e1dc-d4b2-e053-9f05fe0a1d67
|
14
|
Combining data analytics and developers feedback for identifying reasons of inaccurate estimations in agile software development, file e384c430-c4c3-d4b2-e053-9f05fe0a1d67
|
12
|
Integrating SQuARE data quality model with ISO 31000 risk management to measure and mitigate software bias, file e384c434-9ed8-d4b2-e053-9f05fe0a1d67
|
10
|
Technology Transfer Concepts, file e384c42f-752c-d4b2-e053-9f05fe0a1d67
|
9
|
Ethical and Socially-Aware Data Labels, file e384c430-4e90-d4b2-e053-9f05fe0a1d67
|
9
|
Metrics for Identifying Bias in Datasets, file e384c434-82b5-d4b2-e053-9f05fe0a1d67
|
9
|
Detecting Risk of Biased Output with Balance Measures, file f177e33f-4a95-4c72-8616-1d1d26304a2e
|
9
|
Equality of Opportunity in Ranking: a Fair-Distributive Model, file e384c433-8880-d4b2-e053-9f05fe0a1d67
|
7
|
Blockchain for the Internet of Things: a Systematic Literature Review, file e384c432-6437-d4b2-e053-9f05fe0a1d67
|
6
|
Measuring Imbalance on Intersectional Protected Attributes and on Target Variable to Forecast Unfair Classifications, file 567d246e-3551-4113-a2b7-c3ca31df1754
|
5
|
Imbalanced data as risk factor of discriminating automated decisions: a measurement-based approach, file e384c434-8447-d4b2-e053-9f05fe0a1d67
|
5
|
Identifying Imbalance Thresholds in Input Data to Achieve Desired Levels of Algorithmic Fairness, file 3875b2c4-4542-4a38-a3f2-ef3f31d6a16b
|
4
|
Identifying Imbalance Thresholds in Input Data to Achieve Desired Levels of Algorithmic Fairness, file c089335c-f57d-4cf2-a0f7-698223a023e1
|
4
|
Completeness of Datasets Documentation on ML/AI Repositories: An Empirical Investigation, file c532c6c5-d274-4a32-b122-3a0bd65dfe28
|
3
|
Identifying Risks in Datasets for Automated Decision–Making, file e384c432-8487-d4b2-e053-9f05fe0a1d67
|
3
|
Understanding Green Software Development: A Conceptual Framework, file e384c432-fe14-d4b2-e053-9f05fe0a1d67
|
3
|
A data quality approach to the identification of discrimination risk in automated decision making systems, file e384c434-5c39-d4b2-e053-9f05fe0a1d67
|
3
|
Completeness of Datasets Documentation on ML/AI Repositories: An Empirical Investigation, file 675c4f35-5dc3-470f-9452-2211521d26f0
|
2
|
Exploratory testing as a source of testing technical debt, file e384c42e-2757-d4b2-e053-9f05fe0a1d67
|
2
|
Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software, file e384c431-748b-d4b2-e053-9f05fe0a1d67
|
2
|
Detecting Discrimination Risk in Automated Decision-Making Systems with Balance Measures on Input Data, file e384c434-067a-d4b2-e053-9f05fe0a1d67
|
2
|
Peer to Peer for Privacy and Decentralization in the Internet of Things, file e384c432-643d-d4b2-e053-9f05fe0a1d67
|
1
|
Naming the Pain in Requirements Engineering: Contemporary Problems, Causes, and effects in Practice, file e384c433-1b69-d4b2-e053-9f05fe0a1d67
|
1
|
Equality of Opportunity in Ranking: a Fair-Distributive Model, file e384c433-c0c6-d4b2-e053-9f05fe0a1d67
|
1
|
A data quality approach to the identification of discrimination risk in automated decision making systems, file e384c433-e480-d4b2-e053-9f05fe0a1d67
|
1
|
Totale |
39.287 |