|
|
|
Tiago P. Pagano, Rafael B. Loureiro, Fernanda V. N. Lisboa, Gustavo O. R. Cruz, Rodrigo M. Peixoto, Guilherme A. de Sousa Guimarães, Ewerton L. S. Oliveira, Ingrid Winkler and Erick G. Sperandio Nascimento
The majority of current approaches for bias and fairness identification or mitigation in machine learning models are applications for a particular issue that fails to account for the connection between the application context and its associated sensitive...
ver más
|
|
|
|
|
|
|
Ilaria Cavallina, Rossella D?Alessandro, Chiara Brusa, Elisa Panero, Enrica Rolle, Francesca Rossi, Tiziana Mongini and Federica Silvia Ricci
Congenital muscular dystrophies (CMDs) are a heterogeneous group of genetic neuromuscular disorders. They usually occur at birth or in early childhood, with delayed acquisition of motor milestones, and diffuse muscle weakness. A dystrophic pattern is evi...
ver más
|
|
|
|
|
|
|
Ting Wang, Yan Shen, Tieming Chen, Baiyang Ji, Tiantian Zhu and Mingqi Lv
The language inclusion checking of timed automata is described as the following: given two timed automata M and N, where M is a system model and N is a specification model (which represents the properties that the system needs to satisfy), check whether ...
ver más
|
|
|
|
|
|
|
Daniela Pacella and Davide Marocco
Negotiation constitutes a fundamental skill that applies to several daily life contexts; however, providing a reliable assessment and definition of it is still an open challenge. The aim of this research is to present an in-depth analysis of the negotiat...
ver más
|
|
|
|
|
|
|
S.V. Kozlov,A. V. Svetlakov
Pág. 82 - 89
This article describes the use of regular expressions in solving syntactic and lexical analysis problems. The concept of a regular expression is given, its essence is briefly described. The authors set three main tasks of using regular expressions in sof...
ver más
|
|
|
|
|
|
|
Octavian Grigorescu, Andreea Nica, Mihai Dascalu and Razvan Rughinis
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime. Attempts already exist in this regard. The Commo...
ver más
|
|
|
|
|
|
|
Christopher Aaron Barney
Existing implementations of game design patterns have largely been confined to theoretical or research settings. Weaknesses in these implementations have prevented game design patterns from being properly evaluated as an educational and practical develop...
ver más
|
|
|
|
|
|
|
Sharifah Saffinas Syed Soffian, Azmawati Mohammed Nawi, Rozita Hod, Huan-Keat Chan and Muhammad Radzi Abu Hassan
The increasing pattern of colorectal cancer (CRC) in specific geographic region, compounded by interaction of multifactorial determinants, showed the tendency to cluster. The review aimed to identify and synthesize available evidence on clustering patter...
ver más
|
|
|
|
|
|
|
Nicola Prezza
Text indexing is a classical algorithmic problem that has been studied for over four decades: given a text T, pre-process it off-line so that, later, we can quickly count and locate the occurrences of any string (the query pattern) in T in time proportio...
ver más
|
|
|
|
|
|
|
Jian Liu, Bin Meng, Juan Wang, Siyu Chen, Bin Tian and Guoqing Zhi
The use of social media data provided powerful data support to reveal the spatiotemporal characteristics and mechanisms of human activity, as it integrated rich spatiotemporal and textual semantic information. However, previous research has not fully uti...
ver más
|
|
|
|