Zobrazeno 1 - 10
of 144
pro vyhledávání: '"Sureka, Ashish"'
Requirements Engineering (RE) is known to be critical for the success of software projects, and hence forms an important part of any Software Engineering (SE) education curriculum offered at tertiary level. In this paper, we report the results of an
Externí odkaz:
http://arxiv.org/abs/1804.01770
Autor:
Kumar, Lov, Sureka, Ashish
Change-prone classes or modules are defined as software components in the source code which are likely to change in the future. Change-proneness prediction is useful to the maintenance team as they can optimize and focus their testing resources on th
Externí odkaz:
http://arxiv.org/abs/1712.07944
Autor:
Agrawal, Vishnu, Sureka, Ashish
We present a case study and an experience report on teaching engineering skills to young learners in the 7 to 10 years age group. Teaching engineering skills through a constructivist approach involving hands-on activities by designing and building ma
Externí odkaz:
http://arxiv.org/abs/1801.06042
Software fault prediction model are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. Several researchers' have validated the use of different classification techniques to develop predictive mo
Externí odkaz:
http://arxiv.org/abs/1704.04383
Process-Aware Information Systems (PAIS) is an IT system that support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and Acto
Externí odkaz:
http://arxiv.org/abs/1703.05481
Autor:
Agarwal, Swati, Sureka, Ashish
Publikováno v:
S. Agarwal and A. Sureka, "Using common-sense knowledge-base for detecting word obfuscation in adversarial communication," 2015 7th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, 2015, pp. 1-6
Word obfuscation or substitution means replacing one word with another word in a sentence to conceal the textual content or communication. Word obfuscation is used in adversarial communication by terrorist or criminals for conveying their messages wi
Externí odkaz:
http://arxiv.org/abs/1701.04934
Autor:
Agarwal, Swati, Sureka, Ashish
Research shows that many like-minded people use popular microblogging websites for posting hateful speech against various religions and race. Automatic identification of racist and hate promoting posts is required for building social media intelligen
Externí odkaz:
http://arxiv.org/abs/1701.04931
Autor:
Sureka, Ashish
Anti-patterns and code-smells are signs in the source code which are not defects (does not prevent the program from functioning and does not cause compile errors) and are rather indicators of deeper and bigger problems. Exception handling is a progra
Externí odkaz:
http://arxiv.org/abs/1701.00108
Autor:
Joishi, Jeevan, Sureka, Ashish
Process-Aware Information System (PAIS) are IT systems that manages, supports business processes and generate large event logs from execution of business processes. An event log is represented as a tuple of the form CaseID, TimeStamp, Activity and Ac
Externí odkaz:
http://arxiv.org/abs/1701.00072
Autor:
Kundra, Divya, Sureka, Ashish
Compiler design is a course that discusses ideas used in construction of programming language compilers. Students learn how a program written in high level programming language and designed for humans understanding is systematically converted into lo
Externí odkaz:
http://arxiv.org/abs/1611.00271