Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 361 - 390 of 147239

Full-Text Articles in Entire DC Network

Render Less Unto Caesar?: Denying Communion To Catholic Judges, Dermot Lynch Dec 2012

Render Less Unto Caesar?: Denying Communion To Catholic Judges, Dermot Lynch

Dermot Lynch

A conservative group of Catholic bishops who seek to deny communion to those who support abortion rights has thus far only targeted pro-choice Catholic public officials and the Catholic voters who have supported them electorally. Yet the movement could as easily act against Catholic judges, including at least three prominent Catholics on the Supreme Court. Yet judges should not be denied communion for the same reason that the sacrament should not be denied to voters or legislators, namely because the standard that the communion denial movement uses in applying this grave sanction is deeply problematic as it invites arbitrary enforcement …


Political Embeddedness And Academic Corruption In Chinese Universities, Qian Forrest Zhang Dec 2012

Political Embeddedness And Academic Corruption In Chinese Universities, Qian Forrest Zhang

Qian Forrest ZHANG

No abstract provided.


Agricultural Modernization In China And Its Impact On Cities: From The Perspective Of Rural-Urban Linkage, Qian Forrest Zhang Dec 2012

Agricultural Modernization In China And Its Impact On Cities: From The Perspective Of Rural-Urban Linkage, Qian Forrest Zhang

Qian Forrest ZHANG

No abstract provided.


Private Exchanges Of Agricultural Land In Zhejiang, China: A Road To Agrarian Capitalism Or Path-Dependent Transformation?, Qian Forrest Zhang Dec 2012

Private Exchanges Of Agricultural Land In Zhejiang, China: A Road To Agrarian Capitalism Or Path-Dependent Transformation?, Qian Forrest Zhang

Qian Forrest ZHANG

No abstract provided.


Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang Dec 2012

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …


Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang Dec 2012

Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu Dec 2012

When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo Dec 2012

Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo

David LO

Antagonistic communities refer to groups of people with opposite tastes, opinions, and factions within a community. Given a set of interactions among people in a community, we develop a novel pattern mining approach to mine a set of antagonistic communities. In particular, based on a set of user-specified thresholds, we extract a set of pairs of communities that behave in opposite ways with one another. We focus on extracting a compact lossless representation based on the concept of closed patterns to prevent exploding the number of mined antagonistic communities. We also present a variation of the algorithm using a divide …


Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo Dec 2012

Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo

David LO

Reusing APIs of existing libraries is a common practice during software development, but searching suitable APIs and their usages can be time-consuming [6]. In this paper, we study a new and more practical approach to help users find usages of APIs given only simple text phrases, when users have limited knowledge about an API library. We model API invocations as an API graph and aim to find an optimum connected subgraph that meets users' search needs. The problem is challenging since the search space in an API graph is very huge. We start with a greedy subgraph search algorithm which …


Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro Dec 2012

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro

David LO

A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …


Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz Dec 2012

Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz

David LO

Specification mining takes execution traces as input and extracts likely program invariants, which can be used for comprehension, verification, and evolution related tasks. In this work we integrate scenario-based specification mining, which uses a data-mining algorithm to suggest ordering constraints in the form of live sequence charts, an inter-object, visual, modal, scenario-based specification language, with mining of value-based invariants, which detects likely invariants holding at specific program points. The key to the integration is a technique we call scenario-based slicing, running on top of the mining algorithms to distinguish the scenario-specific invariants from the general ones. The resulting suggested specifications …


Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim Dec 2012

Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim

David LO

Microblogging has recently become a popular means to disseminate information among millions of people. Interestingly, software developers also use microblog to communicate with one another. Different from traditional media, microblog users tend to focus on recency and informality of content. Many tweet contents are relatively more personal and Opinionated, compared to that of traditional news report. Thus, by analyzing microblogs, one could get the up-to-date information about what people are interested in or feel toward a particular topic. In this paper, we describe our microblog observatory that aggregates more than 70,000 Twitter feeds, captures software-related tweets, and computes trends from …


Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi Dec 2012

Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi

David LO

High-quality test data that is useful for effective testing is often available on users’ site. However, sharing data owned by users with software vendors may raise privacy concerns. Techniques are needed to enable data sharing among data owners and the vendors without leaking data privacy. Evolving programs bring additional challenges because data may be shared multiple times for every version of a program. When multiple versions of the data are cross-referenced, private information could be inferred. Although there are studies addressing the privacy issue of data sharing for testing and debugging, little work has explicitly addressed the challenges when programs …


To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman Dec 2012

To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman

David LO

Software defects can cause much loss. Static bug-finding tools are believed to help detect and remove defects. These tools are designed to find programming errors; but, do they in fact help prevent actual defects that occur in the field and reported by users? If these tools had been used, would they have detected these field defects, and generated warnings that would direct programmers to fix them? To answer these questions, we perform an empirical study that investigates the effectiveness of state-of-the-art static bug finding tools on hundreds of reported and fixed defects extracted from three open source programs: Lucene, Rhino, …


Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun Dec 2012

Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun

David LO

Bugs are prevalent in software systems. Some bugs are critical and need to be fixed right away, whereas others are minor and their fixes could be postponed until resources are available. In this work, we propose a new approach leveraging information retrieval, in particular BM25-based document similarity function, to automatically predict the severity of bug reports. Our approach automatically analyzes bug reports reported in the past along with their assigned severity labels, and recommends severity labels to newly reported bug reports. Duplicate bug reports are utilized to determine what bug report features, be it textual, ordinal, or categorical, are important. …


Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo Dec 2012

Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo

David LO

We propose a tool for inferring transformation specifications from a few examples of original and updated code. These transformation specifications may contain multiple code fragments from within a single function, all of which must be present for the transformation to apply. This makes the inferred transformations context sensitive. Our algorithm is based on depth-first search, with pruning. Because it is applied locally to a collection of functions that contain related changes, it is efficient in practice. We illustrate the approach on an example drawn from recent changes to the Linux kernel.


An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang Dec 2012

An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang

David LO

Many machine learning systems that include various data mining, information retrieval, and natural language processing code and libraries have being used in real world applications. Search engines, internet advertising systems, product recommendation systems are sample users of these algorithm intensive code and libraries. Machine learning code and toolkits have also been used in many recent studies on software mining and analytics that aim to automate various software engineering tasks. With the increasing number of important applications of machine learning systems, the reliability of such systems is also becoming increasingly important. A necessary step for ensuring reliability of such systems is …


Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun Dec 2012

Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun

David LO

Detecting duplicate bug reports helps reduce triaging efforts and save time for developers in fixing the same issues. Among several automated detection approaches, text-based information retrieval (IR) approaches have been shown to outperform others in term of both accuracy and time efficiency. However, those IR-based approaches do not detect well the duplicate reports on the same technical issues written in different descriptive terms. This paper introduces DBTM, a duplicate bug report detection approach that takes advantage of both IR-based features and topic-based features. DBTM models a bug report as a textual document describing certain technical issue(s), and models duplicate bug …


Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim Dec 2012

Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang Dec 2012

Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang Dec 2012

Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang

David LO

Fault localization is useful for reducing debugging effort. However, many fault localization techniques require non-trivial number of test cases with oracles, which can determine whether a program behaves correctly for every test input. Test oracle creation is expensive because it can take much manual labeling effort. Given a number of test cases to be executed, it is challenging to minimize the number of test cases requiring manual labeling and in the meantime achieve good fault localization accuracy. To address this challenge, this paper presents a novel test case selection strategy based on Diversity Maximization Speedup (DMS). DMS orders a set …


International Terrorism And Television Channels:Operation And Regulation Of Tv News Channel During Coverage Of Terrorism, Ratnesh Dwivedi Mr Dec 2012

International Terrorism And Television Channels:Operation And Regulation Of Tv News Channel During Coverage Of Terrorism, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

The concept of globalization or internationalization of certain wars, which were result of terrorist activities worldwide , as well as the high attention of terrorism coverage broadcast worldwide might open up better opportunities to journalists – particularly to those who work in democratic countries like U.S.A and India – to improve their coverage. The context is the key: the context of the operation methodology, follow of guidelines of regulatory bodies,and of the journalistic culture and of the global environment. It is very important how media presents consequences of terrorist acts, how information is transmitted to public. Television and press have …


Successfully Climbing The "Stairs": Surmounting Failed Translation Of Experimental Ischemic Stroke Treatments, Michael Kahle, Gregory J. Bix Dec 2012

Successfully Climbing The "Stairs": Surmounting Failed Translation Of Experimental Ischemic Stroke Treatments, Michael Kahle, Gregory J. Bix

Sanders-Brown Center on Aging Faculty Publications

The Stroke Therapy Academic Industry Roundtable (STAIR) provided initial (in 1999) and updated (in 2009) recommendations with the goal of improving preclinical stroke therapy assessment and to increase the translational potential of experimental stroke treatments. It is important for preclinical stroke researchers to frequently consider and revisit these concepts, especially since promising experimental stroke treatments continue to fail in human clinical trials. Therefore, this paper will focus on considerations for several key aspects of preclinical stroke studies including the selection and execution of the animal stroke model, drug/experimental treatment administration, and outcome measures to improve experimental validity and translation potential. …


Participatory Budgeting: Diffusion And Outcomes Across The World, Brian Wampler, Janette Hartz-Karp Dec 2012

Participatory Budgeting: Diffusion And Outcomes Across The World, Brian Wampler, Janette Hartz-Karp

Political Science Faculty Publications and Presentations

In this special issue of the Journal of Public Deliberation, multiple faces of Participatory Budgeting programs are revealed. The articles demonstrate that there is no standardized set of “best practices” that governments are adopting, but there are a broader set of principles that are adapted by local governments to meet local circumstances. Adopt and adapt appears to be the logic behind many PB programs.


Uji Aktivitas Penghambatan Enzim Alfaglukosidase Pada Beberapa Tanaman Suku Euphorbiaceae, Berna Elya, Katrin Katrin, Anastasia Bangun Dec 2012

Uji Aktivitas Penghambatan Enzim Alfaglukosidase Pada Beberapa Tanaman Suku Euphorbiaceae, Berna Elya, Katrin Katrin, Anastasia Bangun

Majalah Ilmu Kefarmasian

Diabetes mellitus (types 1 and 2) is recognized as a serious global health problem that characterized by hyperglycemia. Type 2 diabetes is more common in diabetic populations. In type 2 diabetes mellitus, inhibition of α-glucosidase is a useful treatment to delay the absorption of glucose after meals. Avoiding the adverse effects of current agents, it is still necessary to search alternative for better options. Plants have been a rich source of α-glucosidase inhibitors. In this research, screenings based on chemotaxonomic approach to determine the class of chemical constituents and to know α-glucosidase inhibiting activity of some plants from Euphorbiaceae. The …


Preparasi, Karakterisasi Dan Evaluasi Pelepasan Obat Dari Beads Kalsium Alginat Deksametason Dengan Metode Gelasi Ionik, Christye Aulia, Joshita Djajadisastra Dec 2012

Preparasi, Karakterisasi Dan Evaluasi Pelepasan Obat Dari Beads Kalsium Alginat Deksametason Dengan Metode Gelasi Ionik, Christye Aulia, Joshita Djajadisastra

Majalah Ilmu Kefarmasian

Inflammatory Bowel Disease (IBD) is a disease of inflammation in the colon. Targeted delivery systems for the treatment of IBD is designed to increase the drug concentration in the local tissue. Dexamethasone is a drug having anti-inflammatory and antifibrosis effects which is used to repair scar tissue arising from postoperative IBD. This research purpose to create calciumalginate beads dexamethasone to be released only in the colon. Beads were made by using sodium-alginate and Ca2+ as crosslinker by ionic gelation method, with ratio between sodium alginate-dexamethasone (3:1). A concentration of solution sodium alginate 3 % b/v with variation concentration of crosslinker …


Participatory Budgeting: Core Principles And Key Impacts, Brian Wampler Dec 2012

Participatory Budgeting: Core Principles And Key Impacts, Brian Wampler

Political Science Faculty Publications and Presentations

This essay is a reflection piece. I identify key principles at the core of how PB functions and to discuss the scope of change we might expect to see generated by these institutions. I move beyond the idea that there is a specific model or set of “best practices” that define PB. Rather, it is most fruitful to conceptualize PB as a set of principles that can generate social change. The weaker the adherence to these principles, the less social change generated. The second purpose of the essay is to reflect on the impacts generated by PB. How do these …


February 18, 2010 - Healing Academy - Nurturing Transformation - Re-Visioning Christian Soul Care - Part 1b By David Benner, David Benner Dec 2012

February 18, 2010 - Healing Academy - Nurturing Transformation - Re-Visioning Christian Soul Care - Part 1b By David Benner, David Benner

ATS Conferences

No abstract provided.


Nbr2 Errata And Comments, Joseph Hilbe Dec 2012

Nbr2 Errata And Comments, Joseph Hilbe

Joseph M Hilbe

Errata and Comments for Negative Binomial Regression, 2nd edition


23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer Dec 2012

23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer

Matthew Rimmer

The venture, 23andMe Inc., raises a host of issues in respect of patent law, policy, and practice in respect of lifestyle genetics and personalised medicine. The company observes: ‘We recognize that the availability of personal genetic information raises important issues at the nexus of ethics, law, and public policy’. 23andMe Inc. has tested the boundaries of patent law, with its patent applications, which cut across information technology, medicine, and biotechnology. The company’s research raises fundamental issues about patentability, especially in light of the litigation in Bilski v. Kappos, Mayo Collaborative Services v. Prometheus Laboratories Inc. and Association for Molecular Pathology …