CH

17 records found

Satisfiability solvers have been shown to be a powerful tool for solving constraint problems. These problems often contain pseudo-boolean and cardinality constraints. These constraints can either be encoded into SAT or handled by extending the solver with special propagators. Whi ...
There has been an increasing interest in moving computation closer to storage in recent years due to significant improvements in memory technology. FPGAs were proven to be an exciting candidate for accelerating database workloads since they provide an energy-efficient, reconfigur ...
Cross Browser Inconsistencies (XBI) were created when different browser vendors implemented their products without deciding upon common protocols for interoperability. It is hard to pinpoint these inconsistencies with precision because of a lack of a good tool. Here we show how t ...
Web-based interaction logging is an important concept for understanding user behavior on web-pages. LogUI is a powerful modern framework for logging a user's interactions. Integrating such a framework in web-pages requires the construction of configuration objects to define selec ...
Methods for learning vector space representations of words have yielded spaces which contain semantic and syntactic regularities. These regularities mean that vector arithmetic operations in the latent space represent meaningful and interpretable relations between words. ...
Mistakes in binary conditions are a source of error in many software systems. They happen when developers use < or > instead of <= or >=. These boundary mistakes are hard to find for developers and pose a manual labor-intensive work. While researches have been proposi ...
Recommender Systems assist the user by suggesting items to be consumed based on the user's history. The topic of diversity in recommendation gained momentum in recent years as additional criterion besides recommendation accuracy, to improve user satisfaction. Accuracy and diversi ...

Machine Learning of Synthetic Lethality

Data Integration, Generalisation, and Selection Bias

Synthetic lethality (SL) arises between two genes when loss of function of both genes would lead cells to become inviable. This can be exploited for therapy, where a drug is used to selectively kill diseased cells by perturbing one gene of an SL pair where the other gene is inact ...
Through new digital business models, the importance of big data analytics continuously grows. Initially, data analytics clusters were mainly bounded by the throughput of network links and the performance of I/O operations. With current hardware development, this has changed, and ...
Because of the transfer from brick-and-mortar stores to the web, tourism companies have had an increasing need for good recommendation systems to help the users of their websites find what they want. When developing a recommendation system for tourism, we run into a couple of pro ...
Since the dawn of BitTorrent technology, free-riding has always been a critical
issue restricting the performance and availability of the BitTorrent network. To solve this problem, BitTorrent involves a tit-for-tat mechanism which does not function satisfactorily against free ...
Modern software is being built in a continuously integrated fashion, in order to overcome the challenges that come with developing large software systems from many contributors. The cornerstone of continuous integration is the testing step, since it is supposed to protect the sys ...
A linter is a type of static analysis tool that warns software developers about pos- sible errors in code or violations to coding standards. By using such a tool, errors can be surfaced early in the development process when they are cheaper to fix, and code can be kept more reada ...
Repository mining researchers have successfully applied machine learning in a variety of
scenarios.  However, the use of deep learning in repository mining tasks is still in its infancy.
In this thesis, we describe the advantages and disadvantages of using deep learning i ...
Nowadays, service-oriented architectures are more popular than ever, and more and more companies and organizations depend on services offered through Web APIs. The capabilities and complexity of Web APIs differ from service to service, and therefore the impact of API errors varie ...
The goal of this thesis is to explore the current possibilities for detecting breaking changes in JavaScript. For this, we propose an approach and show its accuracy by constructing a tool and evaluating it. The evaluation is carried out on 3 chosen JavaScript projects and a total ...
Kitchen is becoming a hotbed for innovation in the Internet of Things (IoT) revolution. Many kitchen appliances are being connected to the Internet to facilitate `smart-cooking'. The appliances are becoming cordless too, i.e., they are being powered by the inductive power sources ...