Computer Science – CACIC 2019: 25th Argentine Congress of Computer Science, CACIC 2019, Río Cuarto, Argentina, October 14–18, 2019, Revised Selected Papers

Quality flaws prediction in Wikipedia is an ongoing research trend. In particular, in this work we tackle the problem of automatically predicting five out of the ten most frequent quality flaws; namely: No footnotes, Notability, Primary Sources, Refimprove and Wikify. Different classical and deep learning state-of-the-art approaches were studied. From among the evaluated approaches, some of them always reach or improve the existing benchmarks on the test corpus from the 1 International Competition on Quality Flaw Prediction in Wikipedia; a wellknown uniform evaluation corpus from this research field. Particularly, the results showed that under-bagged decision trees with different aggregation rules perform best improving the existing benchmarks for four out

[1]  Kim Mens,et al.  Implementation of a Feature-Based Context-Oriented Programming Language , 2019, COP@ECOOP.

[2]  Silvia E. Gordillo,et al.  Location-based mobile learning applications: A conceptual framework for co-design , 2017, 2017 Twelfth Latin American Conference on Learning Technologies (LACLO).

[3]  Cha Zhang,et al.  Ensemble Machine Learning: Methods and Applications , 2012 .

[4]  Ian Horrocks,et al.  BootOX: Practical Mapping of RDBs to OWL 2 , 2015, SEMWEB.

[5]  Nadire Cavus,et al.  Learning Management Systems Use in Science Education , 2014 .

[6]  Kevin C. Almeroth,et al.  An experimental study of multimedia traffic performance in mesh networks , 2005, WiTMeMo '05.

[7]  Fernando Trinta,et al.  A Model-Based Approach for Designing Location-Based Games , 2017, 2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames).

[8]  Oliver Friedmann,et al.  Solving Parity Games in Practice , 2009, ATVA.

[9]  Luca Chittaro,et al.  Assessing Knowledge Retention of an Immersive Serious Game vs. a Traditional Education Method in Aviation Safety , 2015, IEEE Transactions on Visualization and Computer Graphics.

[10]  Patricia Pesado,et al.  Development Frameworks for Mobile Devices: A Comparative Study about Energy Consumption , 2018, 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft).

[11]  Pedro Casas,et al.  Ensemble-learning Approaches for Network Security and Anomaly Detection , 2017, Big-DAMA@SIGCOMM.

[12]  Jacob Cohen A Coefficient of Agreement for Nominal Scales , 1960 .

[13]  Michael Y. Hu,et al.  Neural network forecasting of the British pound/US dol-lar exchange rate , 1998 .

[14]  Rodrigo Paredes,et al.  Graphs for Metric Space Searching , 2008 .

[15]  Harold Abelson,et al.  Measuring the usability and capability of App inventor to create mobile Applications , 2015, PROMOTO@SPLASH.

[16]  Shuchi Grover,et al.  Computational Thinking in K–12 , 2013 .

[17]  Z. Meral Özsoyoglu,et al.  Distance-based indexing for high-dimensional metric spaces , 1997, SIGMOD '97.

[18]  Flavio D. Garcia,et al.  Wirelessly lockpicking a smart card reader , 2014, International Journal of Information Security.

[19]  Edgar Chávez,et al.  Extreme Pivots for Faster Metric Indexes , 2013, SISAP.

[20]  Thomas A. Henzinger,et al.  Antichains: A New Algorithm for Checking Universality of Finite Automata , 2006, CAV.

[21]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[22]  Detlev Marpe,et al.  Comparative assessment of H.265/MPEG-HEVC, VP9, and H.264/MPEG-AVC encoders for low-delay video applications , 2014, Optics & Photonics - Optical Engineering + Applications.

[23]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.

[24]  Juan Manuel Dodero,et al.  Block-Based Development of Mobile Learning Experiences for the Internet of Things , 2019, Sensors.

[25]  R. Zurita,et al.  Sistema de localización para robots móviles de bajo costo utilizando marcas de referencia artificiales en ambientes de interiores , 2019 .

[26]  Ahmad A. Mazhar,et al.  Comparative Study of Compression Techniques for Synthetic Videos , 2014 .

[27]  Jürg Nievergelt,et al.  The Grid File: An Adaptable, Symmetric Multikey File Structure , 1984, TODS.

[28]  Mark Rouncefield,et al.  Ontology and Model Alignment as a Means for Requirements Validation , 2010, 2010 IEEE Fourth International Conference on Semantic Computing.

[29]  Dario G. Funez,et al.  k-TVT: a flexible and effective method for early depression detection , 2019 .

[30]  Kenneth D. Bailey,et al.  A three-level measurement model , 1984 .

[31]  Václav Snásel,et al.  PM-tree: Pivoting Metric Tree for Similarity Search in Multimedia Databases , 2004, ADBIS.

[32]  Michail N. Giannakos,et al.  Enjoy and learn with educational games: Examining factors affecting learning performance , 2013, Comput. Educ..

[33]  Peter Wentworth,et al.  First year student performance in a test for computational thinking , 2013, SAICSIT '13.

[34]  Aman Yadav,et al.  Computational Thinking for All: Pedagogical Approaches to Embedding 21st Century Problem Solving in K-12 Classrooms , 2016 .

[35]  Gonzalo Navarro,et al.  Metric Spaces Library , 2008 .

[36]  José Bernardo Carrasco,et al.  Aprendo a investigar en educación , 2000 .

[37]  Jovan Dj. Golic,et al.  Cryptanalytic Attacks on MIFARE Classic Protocol , 2013, CT-RSA.

[38]  Amparo García-Carbonell,et al.  Perspectiva histórica de simulación y juego como estrategia docente: de la guerra al aula de lenguas para fines específicos , 2007 .

[39]  Higinio Alberto Facchini,et al.  Estudio experimental de tráfico de video en redes IPv6 multicast IEEE 802.11ac , 2019 .

[40]  Rebecca Green,et al.  Typologies and taxonomies: An introduction to classification techniques , 1996 .

[41]  M. Becker,et al.  A study of the DVD content scrambling system (CSS) algorithm , 2004, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004..

[42]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[43]  Gianluca Bontempi,et al.  Machine Learning Strategies for Time Series Forecasting , 2012, eBISS.

[44]  Pavel Zezula,et al.  M-tree: An Efficient Access Method for Similarity Search in Metric Spaces , 1997, VLDB.

[45]  M. Román González,et al.  COMPUTATIONAL THINKING TEST: DESIGN GUIDELINES AND CONTENT VALIDATION , 2015 .

[46]  Fernando Asteasuain,et al.  Specification Patterns: Formal and Easy , 2015, Int. J. Softw. Eng. Knowl. Eng..

[47]  Fernando Asteasuain,et al.  Aspect Oriented Behavioral Synthesis , 2019 .

[48]  Shmuel Katz Aspect Categories and Classes of Temporal Properties , 2006, LNCS Trans. Aspect Oriented Softw. Dev..

[49]  Tomasz Janowski,et al.  Universal and contextualized public services: Digital public service innovation framework , 2016, Gov. Inf. Q..

[50]  Dalal Alrajeh,et al.  Learning operational requirements from goal models , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[51]  Curtis Busby-Earle,et al.  Multi-perspective Machine Learning (MPML) — A Machine Learning Model for Multi-faceted Learning Problems , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).

[52]  Ricardo A. Baeza-Yates,et al.  Searching in metric spaces , 2001, CSUR.

[53]  Martin J. Shepperd,et al.  Comparing Software Prediction Techniques Using Simulation , 2001, IEEE Trans. Software Eng..

[54]  Pegah Abed-Esfahani,et al.  Transfer Learning for Depression: Early Detection and Severity Prediction from Social Media Postings , 2019, CLEF.

[55]  Horst Bunke,et al.  A graph distance metric based on the maximal common subgraph , 1998, Pattern Recognit. Lett..

[56]  Edwin Olson,et al.  AprilTag 2: Efficient and robust fiducial detection , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[57]  Zoltan-Csaba Marton,et al.  Evaluation and improvement of global pose estimation with multiple AprilTags for industrial manipulators , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[58]  Keith Phalp,et al.  An investigation of machine learning based prediction systems , 2000, J. Syst. Softw..

[59]  Nils J. Nilsson,et al.  Principles of Artificial Intelligence , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[60]  Martin Hell,et al.  Espresso: A stream cipher for 5G wireless communication systems , 2015, Cryptography and Communications.

[61]  Kevin Driscoll BeepBeep: Embedded Real-Time Encryption , 2002, FSE.

[62]  Flavio D. Garcia,et al.  Dismantling SecureMemory, CryptoMemory and CryptoRF , 2010, CCS '10.

[63]  Robiah Yusof,et al.  Cyber Threat Intelligence – Issue and Challenges , 2018 .

[64]  Sebastián Uchitel,et al.  Synthesizing nonanomalous event-based controllers for liveness goals , 2013, TSEM.

[65]  Allan Hoi Kau Yuen,et al.  Student continuance of learning management system use: A longitudinal exploration , 2018, Comput. Educ..

[66]  Peter J. Denning,et al.  Remaining trouble spots with computational thinking , 2017, Commun. ACM.

[67]  Erik Tews,et al.  Attacks on the DECT Authentication Mechanisms , 2009, CT-RSA.

[68]  Gonzalo Navarro,et al.  Fully dynamic metric access methods based on hyperplane partitioning , 2011, Inf. Syst..

[69]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[70]  Philippe Pasquier,et al.  Mova: Interactive Movement Analytics Platform , 2014, MOCO.

[71]  Chao Li,et al.  A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones , 2013, FSE.

[72]  Sergio Alejandro Gómez,et al.  A Framework for OBDA: Current State and Perspectives , 2019 .

[73]  César A. Collazos,et al.  CREANDO: Tool for creating pervasive games to increase the learning motivation in higher education students , 2019, Telematics Informatics.

[74]  Patricia Pesado,et al.  Multi-platform mobile application development analysis , 2015, 2015 IEEE 9th International Conference on Research Challenges in Information Science (RCIS).

[75]  Ignac Lovrek,et al.  Effort estimation model for software development projects based on use case reuse , 2018, J. Softw. Evol. Process..

[76]  Thomas R. Gruber,et al.  A Translation Approach to Portable Ontologies , 1993 .

[77]  Gonzalo Navarro,et al.  A compact space decomposition for effective metric indexing , 2005, Pattern Recognit. Lett..

[78]  Patricia Silvana Programar con Scratch en contextos educativos: ¿Asimilar directrices o co-construir Tecnologías para la Inclusión Social? , 2016 .

[79]  Nora Reyes,et al.  Faster Proximity Searching with the Distal SAT , 2014, SISAP.

[80]  Victor Carneiro,et al.  Analysis and Experiments on Early Detection of Depression , 2018, CLEF.

[81]  Willi Meier,et al.  The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption , 2005, CRYPTO.

[82]  A. Collins,et al.  Situated Cognition and the Culture of Learning , 1989 .

[83]  Karina M. Cenci,et al.  Herramientas para el desarrollo y la entrega de servicios públicos digitales de acción social para municipios bonaerenses , 2017 .

[84]  Lars R. Knudsen,et al.  Cryptanalysis of C2 , 2009, CRYPTO.

[85]  Jorge Bernardino,et al.  Progressive web apps: An alternative to the native mobile Apps , 2018, 2018 13th Iberian Conference on Information Systems and Technologies (CISTI).

[86]  SANDRO MORASCA,et al.  Software Measurement , 2015, Lecture Notes in Business Information Processing.

[87]  Alejandra Cechich,et al.  Taxonomy-Oriented Domain Analysis of GIS: A Case Study for Paleontological Software Systems , 2019, ISPRS Int. J. Geo Inf..

[88]  Hang Li,et al.  “ Tony ” DNN Embedding for “ Tony ” Selective Read for “ Tony ” ( a ) Attention-based Encoder-Decoder ( RNNSearch ) ( c ) State Update s 4 SourceVocabulary Softmax Prob , 2016 .

[89]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.

[90]  Shieu-Hong Lin Data mining for student retention management , 2012 .

[91]  Le Gruenwald,et al.  Parallel quadtree coding of large-scale raster geospatial data on GPGPUs , 2011, GIS.

[92]  Eric Horvitz,et al.  Social media as a measurement tool of depression in populations , 2013, WebSci.

[93]  Felipe de Jesús Núñez Cárdenas,et al.  Introducción a la Minería de Datos , 2011 .

[94]  Ian Horrocks,et al.  An Introduction to Description Logic , 2017 .

[95]  John G. Apostolopoulos,et al.  Video Streaming: Concepts, Algorithms, and Systems , 2002 .

[96]  Marcelo Luis Errecalde,et al.  UNSL's participation at eRisk 2018 Lab , 2018, CLEF.

[97]  Christian Bonnet,et al.  Survey, comparison and evaluation of cross platform mobile application development tools , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[98]  Jean-François Raskin,et al.  Improved Algorithms for the Automata-Based Approach to Model-Checking , 2007, TACAS.

[99]  Jon Louis Bentley,et al.  Quad trees a data structure for retrieval on composite keys , 1974, Acta Informatica.

[100]  Edgar Chávez,et al.  Solving All-k-Nearest Neighbor Problem without an Index , 2019 .

[101]  Fabio Roli,et al.  Ensemble learning for Intrusion Detection in Computer Networks , 2002 .

[102]  Peter I. Corke,et al.  Robotics, Vision and Control - Fundamental Algorithms in MATLAB® , 2011, Springer Tracts in Advanced Robotics.

[103]  Megat F. Zuhairi,et al.  Anomaly-based NIDS: A review of machine learning methods on malware detection , 2016, 2016 International Conference on Information and Communication Technology (ICICTM).

[104]  Flavio D. Garcia,et al.  Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.

[105]  Gunter Saake,et al.  Feature-Oriented Software Product Lines , 2013, Springer Berlin Heidelberg.

[106]  Nora Susana Reyes,et al.  Heuristics for Computing k-Nearest Neighbors Graphs , 2019, CACIC.

[107]  Bruce Schneier,et al.  Cryptanalysis of the cellular message encryption algorithm , 1997 .

[108]  Jürgen Jarosch,et al.  Mobile Learning , 2014, HMD Praxis der Wirtschaftsinformatik.

[109]  F. F. Pérez Los modelos didácticos como instrumento de análisis y de intervención en la realidad educativa , 2000 .

[110]  Peter Hubwieser,et al.  Playing PISA with bebras , 2014, WiPSCE.

[111]  Stelios Xinogalos,et al.  A comparative analysis of cross-platform development approaches for mobile applications , 2013, BCI '13.

[112]  E. Ruiz An algorithm for finding nearest neighbours in (approximately) constant average time , 1986 .

[113]  Paul Ozog,et al.  Robust visual fiducials for skin-to-skin relative ship pose estimation , 2016, OCEANS 2016 MTS/IEEE Monterey.

[114]  David H. Jonassen El diseño de entornos constructivistas de aprendizaje , 2000 .

[115]  Sean Bechhofer,et al.  The OWL API: A Java API for OWL ontologies , 2011, Semantic Web.

[116]  Jeannette M. Wing Computational thinking and thinking about computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[117]  Aidan Mooney,et al.  Developing Computational Thinking Test Using Bebras Problems , 2018, CC-TEL/TACKLE@EC-TEL.

[118]  Agustina Palacios Rizzo,et al.  El modelo social de discapacidad: orígenes, caracterización y plasmación en la Convención Internacional sobre los Derechos de las Personas con Discapacidad. Serie: CERMI.es nº 36 , 2013 .

[119]  Tor-Morten Grønli,et al.  Progressive Web Apps for the Unified Development of Mobile Applications , 2017, WEBIST.

[120]  Seok-Won Lee,et al.  SQ^(2)E: An Approach to Requirements Validation with Scenario Question , 2010, 2010 Asia Pacific Software Engineering Conference.

[121]  David Ball,et al.  A global vision system for a robot soccer team , 2004 .

[122]  Steven Burns,et al.  Online Data Visualization of Multidimensional Databases Using the Hilbert Space-Filling Curve , 2006, VIEW.

[123]  Michael Bell,et al.  Service-Oriented Modeling: Service Analysis, Design, and Architecture , 2008 .

[124]  Mykola Pechenizkiy,et al.  Handbook of Educational Data Mining , 2010 .

[125]  M. R. Brito,et al.  Connectivity of the mutual k-nearest-neighbor graph in clustering and outlier detection , 1997 .

[126]  Diego Calvanese,et al.  Ontology-Based Data Access: A Survey , 2018, IJCAI.

[127]  Ken C. K. Lee,et al.  IR-Tree: An Efficient Index for Geographic Document Search , 2011, IEEE Trans. Knowl. Data Eng..

[128]  Maya Cakmak,et al.  Iterative Design of a System for Programming Socially Interactive Service Robots , 2016, ICSR.

[129]  I. Witten,et al.  CS Unplugged: An enrichment and extension programme for primary-aged students , 2015 .

[130]  Nicolas Courtois,et al.  Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards , 2008, IACR Cryptol. ePrint Arch..

[131]  Habilidades de pensamiento computacional en docentes de primaria: evaluación usando Bebras , 2019 .

[132]  M. D. Panizzi,et al.  Perfiles de tesistas de la disciplina informática y su vinculación con los proyectos de investigación de la UM , 2019 .

[133]  Peter Hubwieser,et al.  Investigating the Psychometric Structure of Bebras Contest: Towards Mesuring Computational Thinking Skills , 2015, 2015 International Conference on Learning and Teaching in Computing and Engineering.

[134]  Parul Arora,et al.  Mining Twitter Data for Depression Detection , 2019, 2019 International Conference on Signal Processing and Communication (ICSC).

[135]  Alejandra Cechich,et al.  A Framework for Managing Requirements of Software Product Lines , 2018, CLEI Selected Papers.

[136]  M. D. Panizzi,et al.  Descubrimiento de las áreas de investigación seleccionadas por los tesistas de las carreras de informática de la UM mediante árboles de decisión , 2018 .

[137]  Naciones Unidas Convención sobre los derechos de las personas con discapacidad , 2016 .

[138]  Pavel Zezula,et al.  D-Index: Distance Searching Index for Metric Data Sets , 2003, Multimedia Tools and Applications.

[139]  Jeannette M. Wing An introduction to computer science for non-majors using principles of computation , 2007, SIGCSE.

[140]  Agris Sostaks,et al.  ViziQuer: A Web-Based Tool for Visual Diagrammatic Queries Over RDF Data , 2018, ESWC.

[141]  David Barber,et al.  Bayesian reasoning and machine learning , 2012 .

[142]  Daniel Cohen-Or,et al.  Motion overview of human actions , 2008, SIGGRAPH Asia '08.

[143]  Sergio Alejandro Gómez,et al.  Towards a Framework for Ontology-Based Data Access: Materialization of OWL Ontologies From Relational Databases , 2018 .

[144]  Ana Casali,et al.  Primary Level Teachers Training in Computer Science: Experience in the Argentine Context , 2019, CACIC.

[145]  Guido Bertoni,et al.  Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..

[146]  David Eppstein,et al.  Iterated nearest neighbors and finding minimal polytopes , 1993, SODA '93.

[147]  Shmuel Katz,et al.  A closer look at aspect interference and cooperation , 2012, AOSD '12.

[148]  Gonzalo Navarro Searching in metric spaces by spatial approximation , 2002, The VLDB Journal.

[149]  Marcelo Luis Errecalde,et al.  UNSL at eRisk 2019: a Unified Approach for Anorexia, Self-harm and Depression Detection in Social Media , 2019, CLEF.

[150]  Ricardo A. Baeza-Yates,et al.  Query Clustering for Boosting Web Page Ranking , 2004, AWIC.

[151]  Jiale Zhou,et al.  An Observer-Based Technique with Trace Links for Requirements Validation in Embedded Real-Time Systems , 2014 .

[152]  Richard E. Mayer,et al.  Cognitive Theory of Multimedia Learning , 2021, The Cambridge Handbook of Multimedia Learning.

[153]  Remco M. Dijkman,et al.  Similarity of business process models: Metrics and evaluation , 2011, Inf. Syst..

[154]  Dalton Serey Guerrero,et al.  A systematic mapping study on assessing computational thinking abilities , 2016, 2016 IEEE Frontiers in Education Conference (FIE).

[155]  Carsten Binnig,et al.  RODI: Benchmarking relational-to-ontology mapping generation quality , 2017, Semantic Web.

[156]  Alejandra Cechich,et al.  Marine ecology service reuse through taxonomy-oriented SPL development , 2014, Comput. Geosci..

[157]  S. Rao Kosaraju,et al.  A decomposition of multidimensional point sets with applications to k-nearest-neighbors and n-body potential fields , 1995, JACM.

[158]  Atul Luykx,et al.  Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes , 2014, IACR Cryptol. ePrint Arch..

[159]  Curtis Busby-Earle,et al.  Multi-Perspective Machine Learning a Classifier Ensemble Method for Intrusion Detection , 2017, ICMLSC.

[160]  Hamza Onoruoiza Salami,et al.  UML Artifacts Reuse: State of the Art , 2014, ArXiv.

[161]  Véronique Bruyère,et al.  Acacia+, a Tool for LTL Synthesis , 2012, CAV.

[162]  Zhongyang Xiong,et al.  Fast text categorization using concise semantic analysis , 2011, Pattern Recognit. Lett..

[163]  Valentina Dagiene,et al.  Bebras - a Sustainable Community Building Model for the Concept Based Learning of Informatics and Computational Thinking , 2016, Informatics Educ..

[164]  Adi Shamir,et al.  A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony , 2010, Journal of Cryptology.

[165]  A. Roli Artificial Neural Networks , 2012, Lecture Notes in Computer Science.

[166]  Alejandra Beatriz Lliteras,et al.  MoLE: A web authoring tool for building mobile learning experiences , 2019 .

[167]  Daniel Cohen-Or,et al.  Action synopsis: pose selection and illustration , 2005, ACM Trans. Graph..

[168]  William Millan,et al.  Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.

[169]  Roel Wieringa,et al.  Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.

[170]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[171]  Jerome Le Ny,et al.  Autonomous Landing of a Multirotor Micro Air Vehicle on a High Velocity Ground Vehicle , 2016, ArXiv.

[173]  Christos Faloutsos,et al.  Slim-Trees: High Performance Metric Trees Minimizing Overlap Between Nodes , 2000, EDBT.

[174]  Hamza Onoruoiza Salami,et al.  A Framework for Class Diagram Retrieval Using Genetic Algorithm , 2012, SEKE.

[175]  Marcin Jurdzinski,et al.  Small Progress Measures for Solving Parity Games , 2000, STACS.

[176]  Juan Manuel Dodero,et al.  Authoring of educational mobile apps for the mathematics-learning analysis , 2018, TEEM.

[177]  Jian Su,et al.  Supervised and Traditional Term Weighting Methods for Automatic Text Categorization , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[178]  Marcelo Luis Errecalde,et al.  Temporal Variation of Terms as Concept Space for Early Risk Prediction , 2017, CLEF.

[179]  Benno Stein,et al.  A breakdown of quality flaws in Wikipedia , 2012, WebQuality '12.

[180]  Jirí Vanícek,et al.  Bebras Informatics Contest: Criteria for Good Tasks Revised , 2014, ISSEP.

[181]  Raj Kiran Addu,et al.  Effect of Codec Performance on Video QoE for videos encoded with Xvid, H.264 and WebM/VP8 , 2014 .

[182]  Christopher D. Manning,et al.  Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..

[183]  Alejandro Dantiacq,et al.  Experimental study of unicast and multicast video traffic using WAN test bed , 2016, 2016 IEEE Biennial Congress of Argentina (ARGENCON).

[184]  Walter A. Burkhard,et al.  Some approaches to best-match file searching , 1973, Commun. ACM.

[185]  Mark Pegrum,et al.  The What and Why of Mobile Learning Design , 2019, Mobile Lenses on Learning.

[186]  Tomás Cerný,et al.  Aspect-oriented challenges in system integration with microservices, SOA and IoT , 2019, Enterp. Inf. Syst..

[187]  Véronique Hoste,et al.  Emotion detection in suicide notes , 2013, Expert Syst. Appl..

[188]  Matt Bower,et al.  Relationship between computational thinking and a measure of intelligence as a general problem-solving ability , 2018, ITiCSE.

[189]  Sunghyun Choi,et al.  Empirical analysis of video multicast over WiFi , 2011, 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN).

[190]  Tomasz Janowski,et al.  Government information sharing: a framework for policy formulation , 2012 .

[191]  Gonzalo Navarro,et al.  Dynamic Spatial Approximation Trees for Massive Data , 2009, 2009 Second International Workshop on Similarity Search and Applications.

[192]  Wan Mohd Nazmee Wan Zainon,et al.  Multiview Similarity Assessment Technique of UML Diagrams , 2017 .

[193]  Jan T. van der Veen,et al.  The learning effects of computer simulations in science education , 2012, Comput. Educ..

[194]  Hartmut Noltemeier,et al.  Monotonous Bisector* Trees - A Tool for Efficient Partitioning of Complex Scenes of Geometric Objects , 1992, Data Structures and Efficient Algorithms.

[195]  Eli Biham,et al.  A Practical Attack on KeeLoq , 2008, Journal of Cryptology.

[196]  Leonardo César Corbalán,et al.  Development Approaches for Mobile Applications: Comparative Analysis of Features , 2018 .

[197]  Jon Louis Bentley,et al.  Multidimensional binary search trees used for associative searching , 1975, CACM.

[198]  Israel Spiegler,et al.  CM-tree: A dynamic clustered index for similarity search in metric databases , 2007, Data Knowl. Eng..

[199]  Xu Zhong,et al.  Design and recognition of artificial landmarks for reliable indoor self-localization of mobile robots , 2017 .

[200]  Henny van der Meijden,et al.  Effects of constructing versus playing an educational game on student motivation and deep learning strategy use , 2011, Comput. Educ..

[201]  William Riggs,et al.  How is mobile technology changing city planning? Developing a taxonomy for the future , 2017 .

[202]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[203]  Hugo Jair Escalante,et al.  Discriminative subprofile-specific representations for author profiling in social media , 2015, Knowl. Based Syst..

[204]  Jakub Lokoc,et al.  Clustered pivot tables for I/O-optimized similarity search , 2011, SISAP.

[205]  Asunción Gómez-Pérez,et al.  R2O, an extensible and semantically based database-to-ontology mapping language , 2004 .

[206]  Jovan Dj. Golic,et al.  Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.

[207]  Jurandy Almeida,et al.  BP-tree: an efficient index for similarity search in high-dimensional metric spaces , 2010, CIKM.

[208]  Marcos R. Vieira,et al.  DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data , 2010, J. Inf. Data Manag..

[209]  Flavio D. Garcia,et al.  Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer , 2013, USENIX Security Symposium.

[210]  G. V. Assche,et al.  On the security of the keyed sponge construction , 2011 .

[211]  William N. Robinson,et al.  Finding reusable UML sequence diagrams automatically , 2004, IEEE Software.

[212]  Bob Bates,et al.  Game Design , 2004 .

[213]  Peter N. Yianilos,et al.  Data structures and algorithms for nearest neighbor search in general metric spaces , 1993, SODA '93.

[214]  Bushra Anjum,et al.  A QoS evaluation of video traffic models for H.264 AVC video , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).

[215]  Norman W. Paton,et al.  Structure inference for linked data sources using clustering , 2013, EDBT '13.

[216]  Simon K. Warfield,et al.  Spectral Clustering Algorithms for Ultrasound Image Segmentation , 2005, MICCAI.

[217]  Patricia Pesado,et al.  Approaches to mobile application development: Comparative performance analysis , 2017, 2017 Computing Conference.

[218]  Tor-Morten Grønli,et al.  A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development , 2018, ACM Comput. Surv..

[219]  Shaoxiong Ji Suicidal ideation detection in online social content , 2020 .

[220]  Michael Zakharyaschev,et al.  Ontology-Based Data Access with Databases: A Short Course , 2013, Reasoning Web.

[221]  Iraj Kalantari,et al.  A Data Structure and an Algorithm for the Nearest Point Problem , 1983, IEEE Transactions on Software Engineering.

[222]  Ricardo A. Baeza-Yates,et al.  Proximity Matching Using Fixed-Queries Trees , 1994, CPM.

[223]  Fernando Asteasuain,et al.  Declaratively building behavior by means of scenario clauses , 2015, Requirements Engineering.

[224]  Serge Vaudenay,et al.  Faster Correlation Attack on Bluetooth Keystream Generator E0 , 2004, CRYPTO.

[225]  Alejandra Cechich,et al.  Towards systematic software reuse of GIS: Insights from a case study , 2013, Comput. Geosci..

[226]  Dong Kun Noh,et al.  Cluster Ensemble with Link-Based Approach for Botnet Detection , 2017, Journal of Network and Systems Management.

[227]  Mihaela Cocea,et al.  Detection of Suicidal Twitter Posts , 2019, UKCI.

[228]  Nuria Cortada de Kohan Los sesgos cognitivos en la toma de decisiones , 2006 .

[229]  Fernando Trinta,et al.  LAGARTO: A LocAtion based Games AuthoRing TOol enhanced with augmented reality features , 2017, Entertain. Comput..

[230]  Richard A. Harshman,et al.  Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..

[231]  Diego Calvanese,et al.  The MASTRO system for ontology-based data access , 2011, Semantic Web.

[232]  Rosana Satorre Cuerda,et al.  Panorámica: serious games, gamification y mucho más , 2014 .

[233]  Thomas Ledoux,et al.  Aspect-Oriented Software Development , 2003 .

[234]  Mehmet Aksit,et al.  Software Architectures and Component Technology , 2001 .

[235]  George S. Avrunin,et al.  Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[236]  Diego Garbervetsky,et al.  Speeding Up Model Checking of Timed-Models by Combining Scenario Specialization and Live Component Analysis , 2009, FORMATS.

[237]  Francisco Javier Rondan-Cataluña,et al.  Moderating effect of learning styles on a learning management system's success , 2017, Telematics Informatics.

[238]  Gonzalo Navarro,et al.  An empirical evaluation of intrinsic dimension estimators , 2015, Inf. Syst..

[239]  Benno Stein,et al.  Overview of the 1th International Competition on Quality Flaw Prediction in Wikipedia , 2012, CLEF.

[240]  Edwin Olson,et al.  Flexible Layouts for Fiducial Tags , 2019, 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[241]  Cecilia Verónica Sanz,et al.  Los objetos de aprendizaje, un debate abierto y necesario , 2015 .

[242]  Benno Stein,et al.  Predicting quality flaws in user-generated content: the case of wikipedia , 2012, SIGIR '12.

[243]  Aviad Rubinstein,et al.  Hardness of approximate nearest neighbor search , 2018, STOC.

[244]  Ming-Xing Wang,et al.  Related Key Chosen IV Attack on Stream Cipher Espresso Variant , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[245]  Belén Suárez Lantarón,et al.  Descripción de una experiencia educativa inclusiva con alumnado universitario: Trabajando habilidades para el empleo , 2019, Tendencias Pedagógicas.

[246]  Christof Paar,et al.  Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards , 2012, 2012 IEEE Symposium on Security and Privacy.

[247]  Jeffrey K. Uhlmann,et al.  Satisfying General Proximity/Similarity Queries with Metric Trees , 1991, Inf. Process. Lett..

[248]  Francisco Luis Gutiérrez Vela,et al.  Geolympus - Cloud Platform for Supporting Location-Based Applications: A Pervasive Game Experience , 2019, WorldCIST.

[249]  Experiencias en el uso de TIC y rampas digitales en la enseñanza de informática a alumnos de educación terciaria con discapacidad visual o auditiva , 2019 .

[250]  Christos Faloutsos,et al.  The Omni-family of all-purpose access methods: a simple and effective way to make similarity search more efficient , 2007, The VLDB Journal.

[251]  Antonin Guttman,et al.  R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.

[252]  Sze Yee Lye,et al.  Review on teaching and learning of computational thinking through programming: What is next for K-12? , 2014, Comput. Hum. Behav..

[253]  Ralf-Philipp Weinmann,et al.  Analysis of the DVB Common Scrambling Algorithm , 2004, Communications and Multimedia Security.

[254]  Freddy Priyatna,et al.  MIRROR: Automatic R2RML Mapping Generation from Relational Databases , 2015, ICWE.

[255]  Huajun Chen,et al.  The Semantic Web , 2011, Lecture Notes in Computer Science.

[256]  Rob J Hyndman,et al.  25 years of time series forecasting , 2006 .

[257]  Lior Rokach,et al.  Ensemble-based classifiers , 2010, Artificial Intelligence Review.

[258]  Roderick Bloem,et al.  Debugging formal specifications using simple counterstrategies , 2009, 2009 Formal Methods in Computer-Aided Design.

[259]  Robert J. Houghton,et al.  Task Workflow Design and its impact on performance and volunteers' subjective preference in Virtual Citizen Science , 2017, Int. J. Hum. Comput. Stud..

[260]  Jing Luan,et al.  Data Mining and Its Applications in Higher Education , 2002 .

[261]  Pietro Sabatino,et al.  Ensemble based collaborative and distributed intrusion detection systems: A survey , 2016, J. Netw. Comput. Appl..

[262]  Sergey Brin,et al.  Near Neighbor Search in Large Metric Spaces , 1995, VLDB.

[263]  Juan Fernández Sosa,et al.  A Study of Non-functional Requirements in Apps for Mobile Devices , 2019, JCC&BD.

[264]  Delfina Soares,et al.  Mobile Applications in Central Government of Brazil and Portugal , 2019, ICEGOV.

[265]  Alex Biryukov,et al.  Cryptanalysis of the "Kindle" Cipher , 2012, Selected Areas in Cryptography.

[267]  Valentina Dagiene,et al.  Promoting Inclusive Informatics Education Through the Bebras Challenge to All K-12 Students , 2016, CompSysTech.

[268]  Silvia E. Gordillo,et al.  A Customizable Location-Based Mobile Learning Prototype: A Case of Study , 2018, 2018 XIII Latin American Conference on Learning Technologies (LACLO).

[269]  Fabio Crestani,et al.  A Test Collection for Research on Depression and Language Use , 2016, CLEF.

[270]  Necati Demir,et al.  Modified stacking ensemble approach to detect network intrusion , 2018, Turkish J. Electr. Eng. Comput. Sci..

[271]  Achiya Bar-On,et al.  A 2^70 Attack on the Full MISTY1 , 2016, CRYPTO.

[272]  Daniel King,et al.  Fetch & Freight : Standard Platforms for Service Robot Applications , 2016 .

[273]  Bin Zhang,et al.  Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF , 2011, ACNS.

[274]  Aurora Vizcaíno,et al.  Requirements Engineering Tools , 2011, IEEE Software.

[275]  Santiago Cristobal Perez,et al.  Experimental Study of Multicast and Unicast Video Traffic in WAN Links , 2017, IEEE Latin America Transactions.

[276]  Gonzalo Navarro,et al.  Practical Construction of k-Nearest Neighbor Graphs in Metric Spaces , 2006, WEA.

[277]  Carsten S. Østerlund,et al.  Coordinating Advanced Crowd Work: Extending Citizen Science , 2018, HICSS.

[278]  Roland Mittermeir,et al.  Perspectives and Visions of Computer Science Education in Primary and Secondary (K-12) Schools , 2014, TOCE.

[279]  Lodewijk Bergmans Towards Detection of Semantic Conflicts between Crosscutting Concerns , 2003 .

[280]  Patricia Mabel Pesado,et al.  PWA para unificar el desarrollo Desktop, Web y Mobile , 2019 .

[281]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[282]  Jacob Krüger Separation of concerns: experiences of the crowd , 2018, SAC.

[283]  J. Martín La discapacidad hoy , 2005 .

[284]  Nora Reyes,et al.  DSACL+-tree: A Dynamic Data Structure for Similarity Search in Secondary Memory , 2012, SISAP.

[285]  David Novak,et al.  Metric Index: An efficient and scalable solution for precise and approximate similarity search , 2011, Inf. Syst..

[286]  Gregor Kiczales,et al.  Aspect-oriented programming , 2001, ESEC/FSE-9.

[287]  Luisa Micó,et al.  A fast branch & bound nearest neighbour classifier in metric spaces , 1996, Pattern Recognit. Lett..

[288]  Erik Tews,et al.  Cryptanalysis of the DECT Standard Cipher , 2010, FSE.

[289]  Evgeniy Gabrilovich,et al.  Wikipedia-based Semantic Interpretation for Natural Language Processing , 2014, J. Artif. Intell. Res..

[290]  Alfred V. Aho,et al.  Computation and Computational Thinking , 2012, Comput. J..

[291]  Silvia E. Gordillo,et al.  Challenges in the Design of a Customized Location-Based Mobile Learning Application , 2018, 2018 XIII Latin American Conference on Learning Technologies (LACLO).