scispace - formally typeset
Search or ask a question
Institution

University of Sannio

EducationBenevento, Italy
About: University of Sannio is a education organization based out in Benevento, Italy. It is known for research contribution in the topics: Gravitational wave & LIGO. The organization has 1278 authors who have published 6125 publications receiving 167577 citations. The organization is also known as: Università degli Studi del Sannio & Universita degli Studi del Sannio.


Papers
More filters
Journal ArticleDOI
TL;DR: The findings mostly contradict common wisdom stating that smells are being introduced during evolutionary tasks, and call for the need to develop a new generation of recommendation systems aimed at properly planning smell refactoring activities.
Abstract: Technical debt is a metaphor introduced by Cunningham to indicate “not quite right code which we postpone making it right”. One noticeable symptom of technical debt is represented by code smells, defined as symptoms of poor design and implementation choices. Previous studies showed the negative impact of code smells on the comprehensibility and maintainability of code. While the repercussions of smells on code quality have been empirically assessed, there is still only anecdotal evidence on when and why bad smells are introduced, what is their survivability , and how they are removed by developers. To empirically corroborate such anecdotal evidence, we conducted a large empirical study over the change history of 200 open source projects. This study required the development of a strategy to identify smell-introducing commits, the mining of over half a million of commits, and the manual analysis and classification of over 10K of them. Our findings mostly contradict common wisdom, showing that most of the smell instances are introduced when an artifact is created and not as a result of its evolution. At the same time, 80 percent of smells survive in the system. Also, among the 20 percent of removed instances, only 9 percent are removed as a direct consequence of refactoring operations.

309 citations

Journal ArticleDOI
B. P. Abbott1, Richard J. Abbott1, T. D. Abbott2, M. R. Abernathy1  +999 moreInstitutions (109)
TL;DR: The transient noise backgrounds used to determine the significance of the event (designated GW150914) are described and the results of investigations into potential correlated or uncorrelated sources of transient noise in the detectors around the time of theevent are presented.
Abstract: On 14 September 2015, a gravitational wave signal from a coalescing black hole binary system was observed by the Advanced LIGO detectors. This paper describes the transient noise backgrounds used to determine the significance of the event (designated GW150914) and presents the results of investigations into potential correlated or uncorrelated sources of transient noise in the detectors around the time of the event. The detectors were operating nominally at the time of GW150914. We have ruled out environmental influences and non-Gaussian instrument noise at either LIGO detector as the cause of the observed gravitational wave signal.

308 citations

Journal ArticleDOI
18 Oct 2018-Cell
TL;DR: A parallel selection model of metastatic progression, where branched evolution could be traced back to immune-escaping clones is proposed, which could inform the understanding of cancer dissemination and the development of immunotherapeutics.

306 citations

Journal ArticleDOI
TL;DR: This research trains Hidden Markov Models (HMMs) on both static and dynamic feature sets and compares the resulting detection rates over a substantial number of malware families, finding a fully dynamic approach generally yields the best detection rates.
Abstract: In this research, we compare malware detection techniques based on static, dynamic, and hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and dynamic feature sets and compare the resulting detection rates over a substantial number of malware families. We also consider hybrid cases, where dynamic analysis is used in the training phase, with static techniques used in the detection phase, and vice versa. In our experiments, a fully dynamic approach generally yields the best detection rates. We discuss the implications of this research for malware detection based on hybrid techniques.

306 citations

Journal ArticleDOI
Rafael Lozano1, Nancy Fullman1, John Everett Mumford1, Megan Knight1  +902 moreInstitutions (380)
TL;DR: To assess current trajectories towards the GPW13 UHC billion target—1 billion more people benefiting from UHC by 2023—the authors estimated additional population equivalents with UHC effective coverage from 2018 to 2023, and quantified frontiers of U HC effective coverage performance on the basis of pooled health spending per capita.

304 citations


Authors

Showing all 1300 results

NameH-indexPapersCitations
Alberto Vecchio11557279416
Andrea Alù109113847717
Vijay P. Singh106169955831
Kenneth A. Strain10548570966
N. A. Robertson10538469504
G. D. Hammond10035267549
B. Sorazu9834765989
I. W. Martin9735264772
Maria Ilaria Del Principe9339862000
Innocenzo M. Pinto8937856567
Karl Henrik Johansson88108933751
Vincenzo Pierro8326342535
R. DeSalvo8322551227
Paolo Addesso7120245552
Francesco Borrelli6632717254
Network Information
Related Institutions (5)
University of Pisa
73.1K papers, 2.1M citations

88% related

University of Bologna
115.1K papers, 3.4M citations

88% related

University of Naples Federico II
68.8K papers, 1.9M citations

88% related

University of Padua
114.8K papers, 3.6M citations

88% related

Royal Institute of Technology
68.4K papers, 1.9M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202322
202254
2021404
2020401
2019389
2018376