78 results on '"Bajec, Marko"'
Search Results
2. Target-level sentiment analysis for news articles
- Author
-
Žitnik, Slavko, Blagus, Neli, and Bajec, Marko
- Published
- 2022
- Full Text
- View/download PDF
3. Trust management in a blockchain based fog computing platform with trustless smart oracles
- Author
-
Kochovski, Petar, Gec, Sandi, Stankovski, Vlado, Bajec, Marko, and Drobintsev, Pavel D.
- Published
- 2019
- Full Text
- View/download PDF
4. Process models of interrelated speech intentions from online health-related conversations
- Author
-
Epure, Elena V., Compagno, Dario, Salinesi, Camille, Deneckere, Rébecca, Bajec, Marko, and Žitnik, Slavko
- Published
- 2018
- Full Text
- View/download PDF
5. Do PageRank-based author rankings outperform simple citation counts?
- Author
-
Fiala, Dalibor, Šubelj, Lovro, Žitnik, Slavko, and Bajec, Marko
- Published
- 2015
- Full Text
- View/download PDF
6. Management Systems in the Classroom : Prospects for theFuture
- Author
-
Newton, Leonard, Visscher, Adrie, Bajec, Marko, Kennedy, Alison, Kereteletswe, Coach, Lambert, Maureen, Nolan, Pat, Tatnall, Arthur, Thorn, Chris, Selwood, Ian D., editor, Fung, Alex C. W., editor, and O’Mahony, Christopher D., editor
- Published
- 2003
- Full Text
- View/download PDF
7. ANGLEr: A Next-Generation Natural Language Exploratory Framework
- Author
-
Knez, Timotej, Bajec, Marko, and Žitnik, Slavko
- Subjects
FOS: Computer and information sciences ,Artificial Intelligence (cs.AI) ,Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computation and Language (cs.CL) - Abstract
Natural language processing is used for solving a wide variety of problems. Some scholars and interest groups working with language resources are not well versed in programming, so there is a need for a good graphical framework that allows users to quickly design and test natural language processing pipelines without the need for programming. The existing frameworks do not satisfy all the requirements for such a tool. We, therefore, propose a new framework that provides a simple way for its users to build language processing pipelines. It also allows a simple programming language agnostic way for adding new modules, which will help the adoption by natural language processing developers and researchers. The main parts of the proposed framework consist of (a) a pluggable Docker-based architecture, (b) a general data model, and (c) APIs description along with the graphical user interface. The proposed design is being used for implementation of a new natural language processing framework, called ANGLEr.
- Published
- 2022
8. The CHEMDNER corpus of chemicals and drugs and its annotation principles
- Author
-
Krallinger, Martin, Rabal, Obdulia, Leitner, Florian, Vazquez, Miguel, Salgado, David, Lu, Zhiyong, Leaman, Robert, Lu, Yanan, Ji, Donghong, Lowe, Daniel M, Sayle, Roger A, Batista-Navarro, Riza Theresa, Rak, Rafal, Huber, Torsten, Rocktäschel, Tim, Matos, Sérgio, Campos, David, Tang, Buzhou, Xu, Hua, Munkhdalai, Tsendsuren, Ryu, Keun Ho, Ramanan, SV, Nathan, Senthil, Žitnik, Slavko, Bajec, Marko, Weber, Lutz, Irmer, Matthias, Akhondi, Saber A, Kors, Jan A, Xu, Shuo, An, Xin, Sikdar, Utpal Kumar, Ekbal, Asif, Yoshioka, Masaharu, Dieb, Thaer M, Choi, Miji, Verspoor, Karin, Khabsa, Madian, Giles, C Lee, Liu, Hongfang, Ravikumar, Komandur Elayavilli, Lamurias, Andre, Couto, Francisco M, Dai, Hong-Jie, Tsai, Richard Tzong-Han, Ata, Caglar, Can, Tolga, Usié, Anabel, Alves, Rui, Segura-Bedmar, Isabel, Martínez, Paloma, Oyarzabal, Julen, and Valencia, Alfonso
- Published
- 2015
- Full Text
- View/download PDF
9. An expert system for detecting automobile insurance fraud using social network analysis
- Author
-
Šubelj, Lovro, Furlan, Štefan, and Bajec, Marko
- Published
- 2011
- Full Text
- View/download PDF
10. A tool for IT process construction
- Author
-
Žvanut, Boštjan and Bajec, Marko
- Published
- 2010
- Full Text
- View/download PDF
11. An approach for concurrent evaluation of technical and social aspects of software development methodologies
- Author
-
Vavpotic, Damjan and Bajec, Marko
- Published
- 2009
- Full Text
- View/download PDF
12. Practice-driven approach for creating project-specific software development methods
- Author
-
Bajec, Marko, Vavpotič, Damjan, and Krisper, Marjan
- Published
- 2007
- Full Text
- View/download PDF
13. Blockchain-Based Transaction Manager for Ontology Databases.
- Author
-
Knez, Timotej, Gašperlin, Domen, Bajec, Marko, and Žitnik, Slavko
- Subjects
BLOCKCHAINS ,SEMANTIC Web ,CRYPTOCURRENCIES ,KNOWLEDGE graphs ,ONTOLOGY ,DATABASES - Abstract
Knowledge graphs are commonly represented by ontology-based databases. Tracking the provenance of ontological changes and ensuring ontology consistency is important. In this work, we propose a transaction manager for ontology-based database manipulation that combines blockchain and Semantic Web technologies. The latter is used for the efficient querying and modification of data, whereas the blockchain is used for the secure storage and tracking of changes. The blockchain enables a decentralized setup and data restoration. We evaluate our solution by measuring cost and time. Our solution introduces some overhead for updates whereas querying works at the same speed as the underlying ontology database. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. A methodology and tool support for managing business rules in organisations
- Author
-
Bajec, Marko and Krisper, Marjan
- Published
- 2005
- Full Text
- View/download PDF
15. Mutation Operators for UML Class Diagrams
- Author
-
Granda, M.F. (Maria Fernanda), Condori Fernandez, N. (Nelly), Vos, T.E.J., Pastor, O. (Oscar), Nurcan, Selmin, Soffer, Pnina, Bajec, Marko, Eder, Johann, Nurcan, Selmin, Soffer, Pnina, Bajec, Marko, Eder, Johann, Department Computer Science, RS-Research Line Resilience (part of LIRS program), and RS-Research Line Innovation (part of LIRS program)
- Subjects
Mutation operator ,Class diagram mutation ,Computer science ,Mutation testing ,02 engineering and technology ,Mutation operators ,computer.software_genre ,Set (abstract data type) ,Software ,Unified Modeling Language ,Test cases quality ,0202 electrical engineering, electronic engineering, information engineering ,computer.programming_language ,Measure (data warehouse) ,Programming language ,business.industry ,020207 software engineering ,Test case ,020201 artificial intelligence & image processing ,Class diagram ,business ,Algorithm ,computer ,LENGUAJES Y SISTEMAS INFORMATICOS ,Conceptual schemas - Abstract
[EN] Mutation Testing is a well-established technique for assessing the quality of test cases by checking how well they detect faults injected into a software artefact (mutant). Using this technique, the most critical activity is the adequate design of mutation operators so that they reflect typical defects of the artefact under test. This paper presents the design of a set of mutation operators for Conceptual Schemas (CS) based on UML Class Diagrams (CD). In this paper, the operators are defined in accordance with an existing defects classification for UML CS and relevant elements identified from the UML-CD meta-model. The operators are subsequently used to generate first order mutants for a CS under test. Finally, in order to analyse the usefulness of the mutation operators, we measure some basic characteristics of mutation operators with three different CSs under test., This work has been developed with the financial support by SENESCYT of the Republic of Ecuador, European Commission (CaaS project) and Generalitat Valenciana (PROMETEOII/2014/039)
- Published
- 2016
- Full Text
- View/download PDF
16. A new application model for mobile technologies
- Author
-
Rupnik, Rok, Krisper, Marjan, and Bajec, Marko
- Subjects
Computers -- Services ,Computers -- Analysis ,Wireless communication systems -- Services ,Wireless communication systems -- Analysis ,Information management ,Information accessibility ,Wireless voice/data service ,Computers and office automation industries - Abstract
Byline: Rok Rupnik, Marjan Krisper, Marko Bajec The information society demands higher and higher productivity from people, which they indeed can achieve by using services and access information in the state of mobility. Mobile applications represent new application models that enable information support in the state of mobility. First, we discuss mobile applications in the context of information society, define their scope and limitations. Then we introduce a classical mobile application model, context, context-awareness, and context-aware mobile application model. In order to show the potential of information support in the state of mobility, we then discuss types of mobile applications and emphasise the significance of workflow concept for mobile applications.
- Published
- 2004
17. Reconstructing De Facto Software Development Methods.
- Author
-
Janković, Marko, Žitnik, Slavko, and Bajec, Marko
- Abstract
Software development is a complex process that requires disciplined engineering approaches. Empirical studies show that companies still don't document their development practice, or if they do, these are not up-to-date and do not reflect how they really develop software. The main objective of this paper is to propose an approach that can help companies in documenting their real development practice. Comparing to existing approaches that require substantial effort on the side of project members, our approach extracts information on development practice directly from software repositories. Five companies have been studied to identify information that can be retrieved from software repositories. Based on this, an approach to reconstruct development practice has been developed. The approach has been evaluated on a real software repository shared by an additional company. The results confirm that software repository information suffice for the reconstruction of various aspects of development process, i.e. disciplines, activities, roles, and artifacts. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. Cots Products To Trace Method Enactment: Review And Selection
- Author
-
Khodabandelou, Ghazaleh, Hug, Charlotte, Deneckere, Rebecca, Salinesi, Camille, Bajec, Marko, Kornyshova, Elena, Janković, Marko, Centre de Recherche en Informatique de Paris 1 (CRI), Université Paris 1 Panthéon-Sorbonne (UP1), Laboratory for Data Technologies (LPT), and University of Ljubljana
- Subjects
trace based tool ,method engineering ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,tool review ,decision-making - Abstract
International audience; Observing information systems projects shows that information systems engineering (ISE) methods are underused. The iAMF project aims at (a) tracing stakeholders' activities to identify whether this statement is true and (b) proposing more efficient ISE methods. To trace stakeholders' activities, we need a tool able to record any computerized actions - as opening applications, modifying documents, compiling programs, etc. This paper presents a review of trace-based tools that was undertaken to address the issue of recording information systems engineering methods enactment. We followed the MADISE decision making approach to select the most appropriate trace-based tool for the iAMF project.
- Published
- 2013
19. Sense classification of shallow discourse relations with focused RNNs.
- Author
-
Weiss, Gregor and Bajec, Marko
- Subjects
- *
RECURRENT neural networks , *COGNITIVE psychology , *NATURAL language processing , *NEUROSCIENCES , *INFORMATION technology - Abstract
Understanding the sense of discourse relations between segments of text is essential to truly comprehend any natural language text. Several automated approaches have been suggested, but all rely on external resources, linguistic feature engineering, and their processing pipelines are built from substantially different models. In this paper, we introduce a novel system for sense classification of shallow discourse relations (FR system) based on focused recurrent neural networks (RNNs). In contrast to existing systems, FR system consists of a single end-to-end trainable model for handling all types and senses of discourse relations, requires no feature engineering or external resources, is language-independent, and can be applied at the word and even character levels. At its core, we present our novel generalization of the focused RNNs layer, the first multi-dimensional RNN-attention mechanism for constructing text/argument embeddings. The filtering/gating RNN enables downstream RNNs to focus on different aspects of the input sequence and project it into several embedding subspaces. These argument embeddings are then used to perform sense classification. FR system has been evaluated using the official datasets and methodology of CoNLL 2016 Shared Task. It does not fall a lot behind state-of-the-art performance on English, the most researched and supported language, but it outperforms existing best systems by 2.5% overall results on the Chinese blind dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
20. The Role of Semantic Similarity for Intelligent Question Routing
- Author
-
Furlan, Bojan, Zitnik, Slavko, and Bajec, Marko
- Published
- 2013
- Full Text
- View/download PDF
21. Understanding Maturity of Collaborative Network Organizations by Using B-ITa Processes
- Author
-
Bukhsh, Faiza Allah, Daneva, Maia, Weigand, Hans, Bajec, Marko, Eder, Johann, and Research Group: Information Management
- Subjects
Knowledge management ,Business-IT alignment ,Inter-organizational collaboration ,Case Study ,Computer science ,business.industry ,Collaborative network ,media_common.quotation_subject ,EWI-23179 ,Cost accounting ,People Capability Maturity Model ,Maturity (finance) ,Capability Maturity Model ,METIS-296359 ,Maturity Models ,Quality (business) ,Service Integration Maturity Model ,business ,SCS-Services ,media_common ,IR-83316 - Abstract
Organization’s concerns as controlling costs, improving quality, increasing effectiveness, and managing risk increasingly impose strong requirements on Business-IT alignment (B-ITa). Several Maturity Models came into being for considering improvement actions in B-ITa. The IT-Enabled Collaborative Network organizations (ICoNOs) maturity model specifically addresses the processes needed for achieving B-ITa in networked organizations. We have evaluated ICoNOs maturity model on a case study in an Asian organization. On the basis of this study, we propose to introduce a new domain named as “Cost Management‿.
- Published
- 2012
22. Generalized network community detection
- Author
-
��ubelj, Lovro and Bajec, Marko
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Physics - Physics and Society ,Physics - Data Analysis, Statistics and Probability ,FOS: Physical sciences ,Computer Science - Social and Information Networks ,Physics and Society (physics.soc-ph) ,Data Analysis, Statistics and Probability (physics.data-an) - Abstract
Community structure is largely regarded as an intrinsic property of complex real-world networks. However, recent studies reveal that networks comprise even more sophisticated modules than classical cohesive communities. More precisely, real-world networks can also be naturally partitioned according to common patterns of connections between the nodes. Recently, a propagation based algorithm has been proposed for the detection of arbitrary network modules. We here advance the latter with a more adequate community modeling based on network clustering. The resulting algorithm is evaluated on various synthetic benchmark networks and random graphs. It is shown to be comparable to current state-of-the-art algorithms, however, in contrast to other approaches, it does not require some prior knowledge of the true community structure. To demonstrate its generality, we further employ the proposed algorithm for community detection in different unipartite and bipartite real-world networks, for generalized community detection and also predictive data clustering.
- Published
- 2011
23. Method for selection of motor insurance fraud management system components based on business performance
- Author
-
Furlan, Štefan, Vasilecas, Olegas, and Bajec, Marko
- Subjects
fraud management system ,fraud management system development ,key performance indicators ,motor insurance ,fraud management ,business performance - Abstract
Fraud in motor insurance is assessed to incur annual losses in the range of 100 billion dollars. While much research exists in the fraud management field, majority only deals with partial problems and presupposes the independence of specific fraud management activities. Researches on components of fraud management system are rarely explicitly related to business performance improvements. These results in a common problem, which can be observed on the practitioners’ side: only small amount of companies can objectively assess which of the many fraud management system components proposed by researchers and vendors will help to solve their problems in fraud management. The method proposed in this paper can be used as a strategic tool for improvement of fraud management process in motor insurance companies. The method is designed to be used for a selection of fraud management system components, and is based on business performance. The input for the method is a set of key performance indicators that an insurance companies wish to improve. The result is a set of activities, which should be improved, and a set of fraud management system components that should be used to improve these activities. The paper presents and explains the method and its components. The method components have been developed based on the data received from Slovenian motor insurance companies and method is evaluated in three case studies. Article in English. Transporto priemonių draudimo apgavysčių valdymo sistemos komponentų pasirinkimo metodas, grindžiamas verslo veiklos efektyvumu Santrauka.Apgavystės transporto priemonių draudimo srityje lemia draudimo kompanijų nuostolius, kurie vertinami 100 milijardų dolerių per metus. Dėl to apgavysčių valdymo srityje atliekama nemažai tyrimų, tačiau daugumoje iš jų nagrinėjamos tik dalinės problemos ir daromos prielaidos, kad apgavysčių valdymo veiklos rūšys nepriklauso viena nuo kitos. Apgavysčių valdymo sistemų komponentų tyrimai retai tiesiogiai siejami su jų įtaka verslo veiklos efektyvumui. Tai lemia dažną problemą, kuri būdinga praktiniam apgavysčių valdymo sistemų naudojimui: tik nedaug draudimo kompanijų gali objektyviai įvertinti, kuris iš daugelio apgavysčiu valdymo sistemų komponentų, siūlomų tyrėjų ir pardavėjų, padėtu jiems išspręsti problemas, susijusias su apgavysčių valdymu. Darbe siūlomas metodas, kuris gali būti panaudotas kaip strateginė priemonė, skirta apgavysčių valdymo procesui patobulinti transporto priemonių draudimo kompanijose. Metodas sukurtas taip, kad galėtų būti naudojamas apgavysčių valdymo sistemu komponentams pasirinkti remiantis verslo veiklos efektyvumu. Pradiniai metodo naudojami duomenys yra svarbiausių veiklos efektyvumo rodiklių, kuriuos kompanijos nori patobulinti, rinkinys. Rezultatas yra veiklos rūšių, kurios turėtų būti patobulintos, rinkinys ir apgavysčių valdymo sistemos komponentų rinkinys, kuris turėtų būti panaudotas sprendžiant suformuluotą apgavysčių valdymo uždavinį. Straipsnyje aprašytas pasiūlytas metodas ir siūlomi naudoti sistemos komponentai. Metodą realizuojantys komponentai buvo sukurti remiantis duomenimis, kurie gauti iš Slovėnijos transporto priemonių draudimo kompanijų. Pasiūlytas metodas ir jį įgyvendinanti sistema buvo išbandyti atliekant tris praktinius eksperimentus, kurių rezultatai pateikti straipsnyje. Reikšminiai žodžiai: apgavysčių valdymas,apgavysčių valdymo sistemos,apgavysčių valdymo sistemų kūrimas,verslo veiklos efektyvumas,svarbiausi veiklos efektyvumo rodykliai,transporto priemonių draudimas.
- Published
- 2011
24. Unfolding network communities by combining defensive and offensive label propagation
- Author
-
��ubelj, Lovro and Bajec, Marko
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Physics - Physics and Society ,Physics - Data Analysis, Statistics and Probability ,FOS: Physical sciences ,Computer Science - Social and Information Networks ,Physics and Society (physics.soc-ph) ,Data Analysis, Statistics and Probability (physics.data-an) - Abstract
Label propagation has proven to be a fast method for detecting communities in complex networks. Recent work has also improved the accuracy and stability of the basic algorithm, however, a general approach is still an open issue. We propose different label propagation algorithms that convey two unique strategies of community formation, namely, defensive preservation and offensive expansion of communities. Furthermore, the strategies are combined in an advanced label propagation algorithm that retains the advantages of both approaches; and are enhanced with hierarchical community extraction, prominent for the use on larger networks. The proposed algorithms were empirically evaluated on different benchmarks networks with planted partition and on over 30 real-world networks of various types and sizes. The results confirm the adequacy of the propositions and give promising grounds for future analysis of (large) complex networks. Nevertheless, the main contribution of this work is in showing that different types of networks (with different topological properties) favor different strategies of community formation.
- Published
- 2011
25. On the Application of the ISD Method Engineering Approach in Non-ISD Domains
- Author
-
Bucher, Tobias, Bajec, Marko, Furlan, Štefan, Kornyshova, Elena, Saidani, Oumaima, Vavpotič, Damjan, and Žvanut, Boštjan
- Subjects
information management - Abstract
Situational method engineering (SME) is concerned with the design, construction, and evaluation of methods that are aimed at the development of particular software products in well-defined development situations. The SME approach features characteristics such as flexibility, adaptability, modularity, reusability, and reference to situational aspects. These aspects may not only be useful for the engineering of software but also for the engineering of work systems, organizational structures, or enterprises. This paper therefore presents exemplary applications of the SME approach in domains that are different from software engineering. It furthermore discusses potentials and limitations of the transfer and application of SME principles, concepts, and techniques to those subject areas.
- Published
- 2008
26. Iterative joint extraction of entities, relationships and coreferences from text sources.
- Author
-
Zitnik, Slavko and Bajec, Marko
- Published
- 2015
- Full Text
- View/download PDF
27. Comparison of software repositories for their usability in software process reconstruction.
- Author
-
Jankovic, Marko and Bajec, Marko
- Published
- 2015
- Full Text
- View/download PDF
28. Automatization of the Stream Mining Process.
- Author
-
Šubelj, Lovro, Bosnić, Zoran, Kukar, Matjaž, and Bajec, Marko
- Published
- 2014
- Full Text
- View/download PDF
29. Sieve-based relation extraction of gene regulatory networks from biological literature.
- Author
-
Žitnik, Slavko, Žitnik, Marinka, Zupan, Blaž, and Bajec, Marko
- Abstract
Background: Relation extraction is an essential procedure in literature mining. It focuses on extracting semantic relations between parts of text, called mentions. Biomedical literature includes an enormous amount of textual descriptions of biological entities, their interactions and results of related experiments. To extract them in an explicit, computer readable format, these relations were at first extracted manually from databases. Manual curation was later replaced with automatic or semi-automatic tools with natural language processing capabilities. The current challenge is the development of information extraction procedures that can directly infer more complex relational structures, such as gene regulatory networks. Results: We develop a computational approach for extraction of gene regulatory networks from textual data. Our method is designed as a sieve-based system and uses linear-chain conditional random fields and rules for relation extraction. With this method we successfully extracted the sporulation gene regulation network in the bacterium Bacillus subtilis for the information extraction challenge at the BioNLP 2013 conference. To enable extraction of distant relations using first-order models, we transform the data into skip-mention sequences. We infer multiple models, each of which is able to extract different relationship types. Following the shared task, we conducted additional analysis using different system settings that resulted in reducing the reconstruction error of bacterial sporulation network from 0.73 to 0.68, measured as the slot error rate between the predicted and the reference network. We observe that all relation extraction sieves contribute to the predictive performance of the proposed approach. Also, features constructed by considering mention words and their prefixes and suffixes are the most important features for higher accuracy of extraction. Analysis of distances between different mention types in the text shows that our choice of transforming data into skip-mention sequences is appropriate for detecting relations between distant mentions. Conclusions: Linear-chain conditional random fields, along with appropriate data transformations, can be efficiently used to extract relations. The sieve-based architecture simplifies the system as new sieves can be easily added or removed and each sieve can utilize the results of previous ones. Furthermore, sieves with conditional random fields can be trained on arbitrary text data and hence are applicable to broad range of relation extraction tasks and data domains. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
30. Quantifying the Consistency of Scientific Databases.
- Author
-
Šubelj, Lovro, Bajec, Marko, Mileva Boshkoska, Biljana, Kastrin, Andrej, and Levnajić, Zoran
- Subjects
- *
MEDICAL databases , *SOCIAL processes , *DATA analysis , *INFORMATION theory , *BIBLIOMETRICS - Abstract
Science is a social process with far-reaching impact on our modern society. In recent years, for the first time we are able to scientifically study the science itself. This is enabled by massive amounts of data on scientific publications that is increasingly becoming available. The data is contained in several databases such as Web of Science or PubMed, maintained by various public and private entities. Unfortunately, these databases are not always consistent, which considerably hinders this study. Relying on the powerful framework of complex networks, we conduct a systematic analysis of the consistency among six major scientific databases. We found that identifying a single "best" database is far from easy. Nevertheless, our results indicate appreciable differences in mutual consistency of different databases, which we interpret as recipes for future bibliometric studies. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
31. Text Mining in Medicine.
- Author
-
Žitnik, Slavko and Bajec, Marko
- Published
- 2013
- Full Text
- View/download PDF
32. Network monitoring applications based on IoT system.
- Author
-
Kos, Andrej, Sedlar, Urban, Sterle, Janez, Volk, Mojca, Bester, Janez, and Bajec, Marko
- Published
- 2013
- Full Text
- View/download PDF
33. Software Process Improvement Based on the Method Engineering Principles.
- Author
-
Ralyté, Jolita, Brinkkemper, Sjaak, Henderson-Sellers, Brian, Bajec, Marko, Vavpotič, Damjan, Furlan, Štefan, and Krisper, Marjan
- Abstract
While it used to be a common belief that the use of rigorous methods in software development is beneficial if not compulsory to assure success of software development projects, the investigations in practice reveal developers often avoid to follow prescribed methods and that there is a wide gap between the organizations' official methods and the work actually performed by their developers in IT projects. According to the literature, there are many reasons contributing to this rather undesirable situation. The two of them are rigidity of methods and their social inappropriateness. In the MasterProc project we have addressed these issues by developing a framework and tool-support for the reengineering of software development methods. Using the framework an organisation can reengineer its existing ways of working into a method that is organisation-specific and auto-adjustable to specifics of its projects. The evaluation that was performed in five partner companies is motivating, as it shows the framework can be very useful in improving software development practice. This paper describes the framework philosophy and its main components. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
34. Scenarios for Improvement of Software Development Methodologies.
- Author
-
Vavpotič, Damjan, Bajec, Marko, and Krisper, Marjan
- Abstract
In recent years many initiatives to improve a use of formal software development methodologies (SDM) in organisations have been commenced, nevertheless not many successful. Different studies show that many software development organisations do not own a formal SDM, and only a fraction of organisations that own a formal SDM actually follow it [2, 5, 13, 14]. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
35. NODE MIXING AND GROUP STRUCTURE OF COMPLEX SOFTWARE NETWORKS.
- Author
-
ŠUBELJ, LOVRO, ŽITNIK, SLAVKO, BLAGUS, NELI, and BAJEC, MARKO
- Subjects
GRAPH theory ,COMPUTER software ,HUMAN-machine systems ,WIRELESS sensor nodes ,ONLINE social networks - Abstract
Large software projects are among most sophisticated human-made systems consisting of a network of interdependent parts. Past studies of software systems from the perspective of complex networks have already led to notable discoveries with different applications. Nevertheless, our comprehension of the structure of software networks remains to be only partial. Here we investigate correlations or mixing between linked nodes and show that software networks reveal dichotomous node degree mixing similar to that recently observed in biological networks. We further show that software networks also reveal characteristic clustering profiles and mixing. Hence, node mixing in software networks significantly differs from that in, e.g., the Internet or social networks. We explain the observed mixing through the presence of groups of nodes with common linking pattern. More precisely, besides densely linked groups known as communities, software networks also consist of disconnected groups denoted modules, core/periphery structures and other. Moreover, groups coincide with the intrinsic properties of the underlying software projects, which promotes practical applications in software engineering. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
36. Network-based statistical comparison of citation topology of bibliographic databases.
- Author
-
Šubelj, Lovro, Fiala, Dalibor, and Bajec, Marko
- Subjects
BIBLIOGRAPHIC databases ,COMPUTER science ,CITATION networks ,BIBLIOMETRICS ,SCIENTOMETRICS ,TOPOLOGY - Abstract
Modern bibliographic databases provide the basis for scientific research and its evaluation. While their content and structure differ substantially, there exist only informal notions on their reliability. Here we compare the topological consistency of citation networks extracted from six popular bibliographic databases including Web of Science, CiteSeer and arXiv.org. The networks are assessed through a rich set of local and global graph statistics. We first reveal statistically significant inconsistencies between some of the databases with respect to individual statistics. For example, the introduced field bow-tie decomposition of DBLP Computer Science Bibliography substantially differs from the rest due to the coverage of the database, while the citation information within arXiv.org is the most exhaustive. Finally, we compare the databases over multiple graph statistics using the critical difference diagram. The citation topology of DBLP Computer Science Bibliography is the least consistent with the rest, while, not surprisingly, Web of Science is significantly more reliable from the perspective of consistency. This work can serve either as a reference for scholars in bibliometrics and scientometrics or a scientific evaluation guideline for governments and research agencies. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
37. SkipCor: Skip-Mention Coreference Resolution Using Linear-Chain Conditional Random Fields.
- Author
-
Žitnik, Slavko, Šubelj, Lovro, and Bajec, Marko
- Subjects
GENE expression ,CONDITIONAL random fields ,COMPARATIVE studies ,DATA mining ,INFORMATION technology - Abstract
Coreference resolution tries to identify all expressions (called mentions) in observed text that refer to the same entity. Beside entity extraction and relation extraction, it represents one of the three complementary tasks in Information Extraction. In this paper we describe a novel coreference resolution system SkipCor that reformulates the problem as a sequence labeling task. None of the existing supervised, unsupervised, pairwise or sequence-based models are similar to our approach, which only uses linear-chain conditional random fields and supports high scalability with fast model training and inference, and a straightforward parallelization. We evaluate the proposed system against the ACE 2004, CoNLL 2012 and SemEval 2010 benchmark datasets. SkipCor clearly outperforms two baseline systems that detect coreferentiality using the same features as SkipCor. The obtained results are at least comparable to the current state-of-the-art in coreference resolution. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
38. Group detection in complex networks: An algorithm and comparison of the state of the art.
- Author
-
Šubelj, Lovro and Bajec, Marko
- Subjects
- *
ALGORITHMS , *COMPARATIVE studies , *SOCIAL networks , *SOCIAL impact , *SOCIAL interaction , *INFORMATION theory - Abstract
Abstract: Complex real-world networks commonly reveal characteristic groups of nodes like communities and modules. These are of value in various applications, especially in the case of large social and information networks. However, while numerous community detection techniques have been presented in the literature, approaches for other groups of nodes are relatively rare and often limited in some way. We present a simple propagation-based algorithm for general group detection that requires no a priori knowledge and has near ideal complexity. The main novelty here is that different types of groups are revealed through an adequate hierarchical group refinement procedure. The proposed algorithm is validated on various synthetic and real-world networks, and rigorously compared against twelve other state-of-the-art approaches on group detection, hierarchy discovery and link prediction tasks. The algorithm is comparable to the state of the art in community detection, while superior in general group detection and link prediction. Based on the comparison, we also discuss some prominent directions for future work on group detection in complex networks. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
39. Framework for the Delivery of Information System Due Diligence.
- Author
-
Delak, Boštjan and Bajec, Marko
- Subjects
INFORMATION storage & retrieval systems ,DUE diligence ,FINANCE ,CAPITAL investments ,CONFIDENTIAL communications ,INFORMATION technology ,SOCIETIES - Abstract
The IS field lacks a scientifically based analytical tool for delivering IS due diligence. Due Diligence is the activity of identifying and measuring the risks and increasing the likelihood of productive investment. In this article, we propose a framework for IS due diligence development based on our generalized experiences conducting IS due diligence in more than 60 banks and financial organizations in Europe. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
40. General Context-Aware Data Matching and Merging Framework.
- Author
-
Žitnik, Slavko, Šubelj, Lovro, Lavbič, Dejan, Vasilecas, Olegas, and Bajec, Marko
- Subjects
INFORMATION resources ,INFORMATION services ,STATISTICAL matching ,SEMANTICS ,REDUNDANCY (Linguistics) ,ONTOLOGIES (Information retrieval) ,LITERATURE - Abstract
Due to numerous public information sources and services, many methods to combine heterogeneous data were proposed recently. However, general end-to-end solutions are still rare, especially systems taking into account different context dimensions. Therefore, the techniques often prove insufficient or are limited to a certain domain. In this paper we briefly review and rigorously evaluate a general framework for data matching and merging. The framework employs collective entity resolution and redundancy elimination using three dimensions of context types. In order to achieve domain independent results, data is enriched with semantics and trust. However, the main contribution of the paper is evaluation on five public domain-incompatible datasets. Furthermore, we introduce additional attribute, relationship, semantic and trust metrics, which allow complete framework management. Besides overall results improvement within the framework, metrics could be of independent interest. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
41. Community structure of complex software systems: Analysis and applications
- Author
-
Šubelj, Lovro and Bajec, Marko
- Subjects
- *
SOFTWARE engineering , *JAVA programming language , *SYSTEM analysis , *COMPUTER software , *COMPLEXITY (Philosophy) , *COMPUTER networks - Abstract
Abstract: Due to notable discoveries in the fast evolving field of complex networks, recent research in software engineering has also focused on representing software systems with networks. Previous work has observed that these networks follow scale-free degree distributions and reveal small-world phenomena, while we here explore another property commonly found in different complex networks, i.e. community structure. We adopt class dependency networks, where nodes represent software classes and edges represent dependencies among them, and show that these networks reveal a significant community structure, characterized by similar properties as observed in other complex networks. However, although intuitive and anticipated by different phenomena, identified communities do not exactly correspond to software packages. We empirically confirm our observations on several networks constructed from Java and various third party libraries, and propose different applications of community detection to software engineering. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
42. Unfolding communities in large complex networks: Combining defensive and offensive label propagation for core extraction.
- Author
-
Šubelj, Lovro and Bajec, Marko
- Subjects
- *
ALGORITHMS , *BENCHMARK testing (Engineering) , *LINEAR complexes , *LINEAR complementarity problem , *COMPUTATIONAL complexity - Abstract
Label propagation has proven to be a fast method for detecting communities in large complex networks. Recent developments have also improved the accuracy of the approach; however, a general algorithm is still an open issue. We present an advanced label propagation algorithm that combines two unique strategies of community formation, namely, defensive preservation and offensive expansion of communities. The two strategies are combined in a hierarchical manner to recursively extract the core of the network and to identify whisker communities. The algorithm was evaluated on two classes of benchmark networks with planted partition and on 23 real-world networks ranging from networks with tens of nodes to networks with several tens of millions of edges. It is shown to be comparable to the current state-of-the-art community detection algorithms and superior to all previous label propagation algorithms, with comparable time complexity. In particular, analysis on real-world networks has proven that the algorithm has almost linear complexity, O(m1.9), and scales even better than the basic label propagation algorithm (m is the number of edges in the network). [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
43. A Framework and Tool-Support for Reengineering Software Development Methods.
- Author
-
Bajec, Marko and Vavpotič, Damjan
- Subjects
- *
SOFTWARE reengineering , *COMPUTER software industry , *INFORMATION science , *COMPUTER science , *COMPUTER software development - Abstract
The purpose of the research described in this paper is to propose a framework and supporting tools that will help software companies to establish formalised methods that will be technically and socially sound with their needs. Following the framework the companies can asses and improve their existing ways of working, capture them into formalised methods and continuously enrich them based on the past development experiences. Furthermore, the formalised methods that are designed based on the suggested framework are flexible and can be automatically adjusted by the supporting tools to suite circumstances of a particular project or team. This paper describes the framework philosophy and its tool support. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
44. Application of Method Engineering Principles in Practice: Lessons Learned and Prospects for the Future.
- Author
-
Bajec, Marko
- Published
- 2011
- Full Text
- View/download PDF
45. Empirical comparison of network sampling: How to choose the most appropriate method?
- Author
-
Blagus, Neli, Šubelj, Lovro, and Bajec, Marko
- Subjects
- *
GRAPH theory , *STATISTICAL sampling , *PATHS & cycles in graph theory , *APPROXIMATION theory , *SUBGRAPHS - Abstract
In the past few years, the storage and the analysis of large-scale and fast evolving networks presents a great challenge. Therefore, a number of different techniques have been proposed for sampling large networks. Studies on network sampling primarily analyze the changes of network properties under the sampling. In general, network exploration techniques approximate the original networks more accurate than random node and link selection. Yet, link selection with additional subgraph induction step outperforms most other techniques. In this paper, we apply subgraph induction also to random walk and forest-fire sampling and evaluate the effects of subgraph induction on the sampling accuracy. We analyze different real-world networks and the changes of their properties introduced by sampling. The results reveal that the techniques with subgraph induction improve the performance of techniques without induction and create denser sample networks with larger average degree. Furthermore, the accuracy of sampling decrease consistently across various sampling techniques, when the sampled networks are smaller. Based on the results of the comparison, we introduce the scheme for selecting the most appropriate technique for network sampling. Overall, the breadth-first exploration sampling proves as the best performing technique. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
46. Assessing the effectiveness of real-world network simplification.
- Author
-
Blagus, Neli, Šubelj, Lovro, and Bajec, Marko
- Subjects
- *
RANDOM noise theory , *STATISTICAL sampling , *INDUSTRIAL engineering , *DISTRIBUTION (Probability theory) , *COEFFICIENTS (Statistics) , *CLUSTER analysis (Statistics) - Abstract
Many real-world networks are large, complex and thus hard to understand, analyze or visualize. Data about networks are not always complete, their structure may be hidden, or they may change quickly over time. Therefore, understanding how an incomplete system differs from a complete one is crucial. In this paper, we study the changes in networks submitted to simplification processes (i.e., reduction in size). We simplify 30 real-world networks using six simplification methods and analyze the similarity between the original and simplified networks based on the preservation of several properties, for example, degree distribution, clustering coefficient, betweenness centrality, density and degree mixing. We propose an approach for assessing the effectiveness of the simplification process to define the most appropriate size of simplified networks and to determine the method that preserves the most properties of original networks. The results reveal that the type and size of original networks do not affect the changes in the networks when submitted to simplification, whereas the size of simplified networks does. Moreover, we investigate the performance of simplification methods when the size of simplified networks is 10% that of the original networks. The findings show that sampling methods outperform merging ones, particularly random node selection based on degree and breadth-first sampling. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
47. Self-similar scaling of density in complex real-world networks
- Author
-
Blagus, Neli, Šubelj, Lovro, and Bajec, Marko
- Subjects
- *
SELF-similar processes , *COMPUTER networks , *DISTRIBUTION (Probability theory) , *MODULAR design , *PHYSICS literature , *EXISTENCE theorems - Abstract
Abstract: Despite their diverse origin, networks of large real-world systems reveal a number of common properties including small-world phenomena, scale-free degree distributions and modularity. Recently, network self-similarity as a natural outcome of the evolution of real-world systems has also attracted much attention within the physics literature. Here we investigate the scaling of density in complex networks under two classical box-covering renormalizations–network coarse-graining–and also different community-based renormalizations. The analysis on over 50 real-world networks reveals a power-law scaling of network density and size under adequate renormalization technique, yet irrespective of network type and origin. The results thus advance a recent discovery of a universal scaling of density among different real-world networks [P.J. Laurienti, K.E. Joyce, Q.K. Telesford, J.H. Burdette, S. Hayasaka, Universal fractal scaling of self-organized networks, Physica A 390 (20) (2011) 3608–3613] and imply an existence of a scale-free density also within–among different self-similar scales of–complex real-world networks. The latter further improves the comprehension of self-similar structure in large real-world networks with several possible applications. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
48. Anonymization of Slovenian texts
- Author
-
Petreski, Viktor and Bajec, Marko
- Subjects
Slovenian ,transformer models ,globoko učenje ,de-identification ,transformer model ,slovenščina ,deidentifikacija ,deep learning ,text anonymization ,anonimizacija besedila - Abstract
Law and court documents may contain sensitive information that should not be accessible to everyone. Most of the publicly available documents are only partially anonymized or use a general anonymization system that makes the once anonymized data unsuitable for further research. We focus on developing several types of anonymization systems, with implementing NER, POS tagging, coreference resolution as well as specific anonymization rules that target Slovene entities. The anonymization models are integrated into a publicly available web tool, which allows convenient and fast anonymization in four different modes, depending on the sensitivity of the documents. The obtained results prove that the developed models can successfully anonymize Slovene documents. The anonymized documents can be distributed without violating someone's privacy and can be used in various research in the future. Pravni in sodni dokumenti lahko vsebujejo občutljive podatke, ki ne bi smeli biti dostopni vsem. Večina javno dostopnih dokumentov je le delno anonimiziranih ali pa uporablja splošni sistem anonimizacije, zaradi česar so enkrat anonimizirani podatki neprimerni za nadaljnje raziskovanje. Osredotočeni smo na razvoj več tipov anonimizacijskih sistemov, z implementacijo NER, POS označevanja, koreferenčne ločljivosti ter specifičnih anonimizacijskih pravil, ki ciljajo na slovenske subjekte. Modeli anonimizacije so integrirani v javno dostopno spletno orodje, ki omogoča priročno in hitro anonimizacijo v štirih različnih načinih, odvisno od občutljivosti dokumentov. Dobljeni rezultati dokazujejo, da lahko razviti modeli uspešno anonimizirajo slovenske dokumente. Anonimizirane dokumente je mogoče distribuirati brez poseganja v zasebnost nekoga in jih je mogoče uporabiti v različnih raziskavah v prihodnosti.
- Published
- 2022
49. Sampling promotes community structure in social and information networks.
- Author
-
Blagus, Neli, Šubelj, Lovro, Weiss, Gregor, and Bajec, Marko
- Subjects
- *
INFORMATION networks , *SOCIAL networks , *DATA structures , *COMMUNITY organization , *SOCIAL structure - Abstract
Any network studied in the literature is inevitably just a sampled representative of its real-world analogue. Additionally, network sampling is lately often applied to large networks to allow for their faster and more efficient analysis. Nevertheless, the changes in network structure introduced by sampling are still far from understood. In this paper, we study the presence of characteristic groups of nodes in sampled social and information networks. We consider different network sampling techniques including random node and link selection, network exploration and expansion. We first observe that the structure of social networks reveals densely linked groups like communities, while the structure of information networks is better described by modules of structurally equivalent nodes. However, despite these notable differences, the structure of sampled networks exhibits stronger characterization by community-like groups than the original networks, irrespective of their type and consistently across various sampling techniques. Hence, rich community structure commonly observed in social and information networks is to some extent merely an artifact of sampling. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
50. Analyzing Correlations of Corporation Earning Announcements, Dividend Declarations and Public Sentiment against the Stock Market
- Author
-
Smrkolj Koželj, Nejc and Bajec, Marko
- Subjects
social networks ,google trends ,borza ,sentiment ,event correlations ,earning announcements ,finance ,data mining ,stock markets ,market events ,dividend declarations ,event detection ,analiza dogodkov ,sentiment analysis ,twitter ,analiza prihodkov ,event analysis ,data scraping ,podatkovno rudarjenje ,delnice - Abstract
In our research, we focused on analysing the stock market events and the price movements on market events. We researched the quarterly corporate earning announcement events as well as dividend declaration events and investigated any correlations they might have to the publicly available stock data and stock prices. Furthermore, we analysed how the public sentiment, notably Twitter and Google Trends, can be utilised to help estimate the correlation between event and the stock price movement. To process the data, we utilised the machine learning algorithm logistic regression due to its simplicity and robustness. Our findings were that the earning announcement event outcome could, to some extent, be predicted but the actual movement is not as important as the size of the movement. We also successfully utilised public sentiment to improve our results further. V naši raziskavi smo se osredotočili na analizo delniških trgov in njihova gibanja cen ob dogodkih na trgih. Raziskali smo tako dogodke povezane s četrtletnimi poročili o zaslužku kot napovedi o dividendah ter poglobljeno preučili njihovo korelacijo med javno dostopnimi delniškimi podatki in samo ceno delnic. Analizirali smo tudi kako bi lahko javni sentiment z osredotočenjem na Twitter in Google Trends pomagal izboljšati ocene korelacij med samim dogodkom ter gibanjem cene. Za procesiranje podatkov smo uporabili algoritme strojnega učenja logistična regresija, saj je algoritem zelo preprost ter robusten. V raziskavi smo ugotovili, da je možno delno napovedati gibanje cene delnic po dogodku, vendar je velikost gibanja pomembnejša od same smeri gibanja. Uspešno smo tudi uporabili javni sentiment za nadaljnje izboljšanje rezultatov.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.