Listar Computación e informática por título
Mostrando ítems 223-242 de 249
-
Technical and Nontechnical Prioritization Schema for Technical Debt: Voice of TD-Experienced Practitioners
(2021-08-09)Technical debt (TD) can be injected at any stage of software development, spreading across other phases and causing various problems. This article presents a model for conceptualizing TD causes, effects, payment practices, ... -
Technical Debt is not Only about Code and We Need to be Aware about It
(2021-12-14)Context: It is common for a software project to incur technical debt (TD) during its development. It can impact several artifacts produced throughout the software development process. Therefore, it is necessary to carry ... -
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ... -
The relationship between acoustic habitat, hearing and tonal vocalizations in the Antillean manatee (Trichechus manatus manatus, Linnaeus, 1758)
(2015-09)The Antillean manatee (Trichechus manatus manatus) is an endangered marine mammal that inhabits the Caribbean Sea and riverine systems in Central America. Their acoustic behavior is relevant for individual identification, ... -
Tool UTAUT Applied to Measure Interaction Experience with NAO Robot
(2019-06-27)This research described the utilization of the Unified Theory of Acceptance and Use of Technology (UTAUT) to evaluate a high-level interactive scenario of using Nao Robot in the role of co-presenting in an educative context. ... -
Towards smart notifications - An adaptive approach using smart devices
(2016)The use of smart devices is increasing rapidly; this trend is changing the paradigm in which notifications are delivered to users. Smart devices are important to provide user awareness. However, their use must be controlled ... -
Towards the automation of a defect detection protocol for functional size measurements
(2018-04-23)There is a need to develop formal protocols to verify the accuracy of software functional size measurements and to calibrate the measurement processes. These protocols offer a mechanism for accomplishing such verification ... -
Trending Topic Extraction using Topic Models and Biterm Discrimination
(2017)Mining and exploitation of data in social networks has been the focus of many efforts, but despite the resources and energy invested, still remains a lot for doing given its complexity, which requires the adoption of a ... -
Trends in empirical research: the report on the 2014 Doctoral Symposium on Empirical Software Engineering
(2015-09)The 12th Doctoral Symposium on Empirical Software Engineering (IDOESE), was organized as a full day event prior to the ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) program. ... -
Troyoculus: An Augmented Reality System to Improve Reading Capabilities of Night-Blind People
(2015-11)Our goal in this project was to develop an augmented reality system, called Troyoculus, to help night-blind people improve their reading capabilities. We developed two prototypes, one based on Oculus Rift and other based ... -
Typifying mechanisms for gender digital equity in Latin America
(2016)Gender digital equity in Latin America and the Caribbean is our goal. We analyze gender specific structural inequalities that constitute barriers for women’s access to ICT: such as education, traditional cultural beliefs ... -
Ubiquitous Notification Mechanism to Provide User Awareness
(2016)Awareness could be defined as the knowledge that the user has of a particular activity, either individual or collaborative. Good awareness mechanisms provide information to the user at the right time so that s/he can know ... -
Understanding notional machines through traditional teaching with conceptual contraposition and program memory tracing
(2016-08)A correct understanding about how computers run code is mandatory in order to effectively learn to program. Lectures have historically been used in programming courses to teach how computers execute code, and students are ... -
Use of Emerging 3D Printing and Modeling Technologies in the Health Domain
(2016)Three-Dimensional (3D) technologies emerged from the technological advances in manufacturing required to produce physical versions of digital models. The most attractive feature of 3D technologies is that virtual models ... -
User - Smart Building Interactions: An Analysis of Privacy and Productivity Human Factors
(2022-11-21)Smart buildings are increasingly becoming more common and changing the way we interact with our home, workplace, and cities. Consequently, it is important to study how human factors play a role in smart building-based ... -
User Experience in Communication and Collaboration Platforms: A Comparative Study Including Discord, Microsoft Teams, and Zoom
(2022-03)Due to the measures imposed to prevent the spread of the virus during the COVID-19 pandemic, how education and work communications are carried have changed. An increase in video conferencing and meeting applications is ... -
Using Non-Traditional Interfaces to Support Physical Therapy for Knee Strengthening
(2016)Physical therapy consists mainly in the execution of rehabilitation processes that aim to help overcome injuries, as well as develop, maintain, or restore maximum body movement. Knee rehabilitation is one kind of physical ... -
Uso de word embeddings para la detección automática de titulares clickbait en idioma español
(2021)Objetivo General: Evaluar a través de un modelo de aprendizaje máquina supervisado, el uso de word embeddings para la detección automática de titulares clickbait en idioma español. Objetivos Específicos: - Construir ...