Buscar
Mostrando ítems 1-10 de 57
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Perses: A framework for the continuous evaluation of the QoS of distributed mobile applications
(ScienceDirect, 2022-08)
The increasing capabilities of mobile devices have led to the emergence of new paradigms exploiting them. These paradigms foster the onload and distribution of functionalities on mobile devices, allowing the development ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
TOMATE: A heuristic-based approach to extract data from HTML tables
(Elsevier, 2021)
Extracting data from user-friendly HTML tables is difficult because of their different lay outs, formats, and encoding problems. In this article, we present a new proposal that first applies several pre-processing heuristics ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Early Evaluation of Mobile Applications’ Resource Consumption and Operating Costs
(IEEE Computer Society, 2020)
The explosive growth of the mobile application market in recent years has led to a large concomitant mobile software industry whose components are, in many cases, startups and small-size software providers. The success ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
ARIEX: Automated ranking of information extractors
(Elsevier, 2016)
Information extractors are used to transform the user-friendly information in a web document into structured information that can be used to feed a knowledge-based system. Researchers are interested in ranking them to ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Discovering and Analysing Ontological Models from Big RDF Data
(IGI Global, 2015)
The Web of Data, which comprises web sources that provide their data in RDF, is gaining popularity day after day. Ontological models over RDF data are shared and developed with the consensus of one or more communities. ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Domain-Specific Language to Design Enterprise Application Integration Solutions
(World Scientific, 2011)
Enterprise Application Integration (EAI) solutions cope with two kinds of problems within software ecosystems, namely: keeping a number of application’s data in synchrony or creating new functionality on top of them. ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
NDT-Suite: A Methodological Tool Solution in the Model-Driven Engineering Paradigm
(SCIRP: Scientific Research Publishing, 2014)
Although the Model-Driven paradigm is being accepted in the research environment as a very useful and powerful option for effective software development, its real application in the enter prise context is still a challenge ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Survey on Region Extractors from Web Documents
(IEEE, 2013-09)
Extracting information from web documents has become a research area in which new proposals sprout out year after year. This has motivated several researchers to work on surveys that attempt to provide an overall picture ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
On the design of a maintainable software development kit to implement integration solutions
(ScienceDirect, 2016-01)
Companies typically rely on applications purchased from third parties or developed at home to support their business activities. It is not uncommon that these applications were not designed taking integration into account. ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Feature models to boost the vulnerability management process
(Elsevier, 2022)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to identify potential vulnerabilities, assess the level of risk, and define remediation mechanisms to ...