Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Empirical software engineering (5)
- Computer Vision (2)
- Cybersecurity (2)
- Machine learning (2)
- Software reuse (2)
-
- 2D and 3D simulation (1)
- Algorithmic complexity attacks (1)
- Aviation UI (1)
- Biological neural networks (1)
- Cafe Wall illusion (1)
- Cellular automata (1)
- Classical Receptive Field model (1)
- Cloud enabled attack vector (1)
- Cockpit design (1)
- Collaborative Software Engineering (1)
- Corrosion inhibitor (1)
- Curvature-driven (1)
- Cyber-Physical Systems (1)
- Dataset bias (1)
- Dead reckoning (1)
- Deep Learning (1)
- Deep learning (1)
- Denial of service (1)
- Density functional theory (1)
- Difference of Gaussians (1)
- Embedded Systems (1)
- Energy efficiency (1)
- Engineering decision making (1)
- Eye Tracking (1)
- Eye movement analysis (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 29 of 29
Full-Text Articles in Computer Engineering
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Department of Electrical and Computer Engineering Faculty Publications
Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.
In this work, we present the first empirical investigation of PTM reuse. …
Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas
Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas
Journal of Aviation Technology and Engineering
Eye-gaze-controlled interfaces allow the direct manipulation of a graphical user interface by looking at it. This technology has great potential in military aviation, in particular, operating different displays in situations where pilots’ hands are occupied with flying the aircraft. This paper reports studies on analyzing the accuracy of eye-gaze-controlled interfaces inside aircraft undertaking representative flying missions. We report that using eye-gaze-controlled interfaces, pilots can undertake representative pointing and selection tasks at less than two seconds on average in a transport aircraft. Further, we analyzed the accuracy of eye-gaze-tracking glasses under various G load factors and analyzed the failure modes. We …
Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis
Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of supply chains in practice. It discusses the strengths and weaknesses of current approaches relative to known attacks and details the various security frameworks put out to ensure the security of the software supply chain. Finally, the paper highlights potential gaps in actor and operation-centered …
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …
Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis
Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Web services use server-side input sanitization to guard against harmful input. Some web services publish their sanitization logic to make their client interface more usable, e.g., allowing clients to debug invalid requests locally. However, this usability practice poses a security risk. Specifically, services may share the regexes they use to sanitize input strings — and regex-based denial of service (ReDoS) is an emerging threat. Although prominent service outages caused by ReDoS have spurred interest in this topic, we know little about the degree to which live web services are vulnerable to ReDoS.
In this paper, we conduct the first black-box …
Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis
Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Training deep neural networks (DNNs) takes significant time and resources. A practice for expedited deployment is to use pre-trained deep neural networks (PTNNs), often from model zoos.collections of PTNNs; yet, the reliability of model zoos remains unexamined. In the absence of an industry standard for the implementation and performance of PTNNs, engineers cannot confidently incorporate them into production systems. As a first step, discovering potential discrepancies between PTNNs across model zoos would reveal a threat to model zoo reliability. Prior works indicated existing variances in deep learning systems in terms of accuracy. However, broader measures of reliability for PTNNs from …
An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal
An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal
Department of Electrical and Computer Engineering Faculty Publications
Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …
Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis
Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially in the area of software evolution, defect detection, and program repair.
In this paper, we reflect on the conduct of failure studies in software engineering. We reviewed a sample of 52 failure study papers. We identified several recurring problems in these studies, …
Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.
Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.
MODVIS Workshop
This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts …
Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick
Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick
The Summer Undergraduate Research Fellowship (SURF) Symposium
Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – …
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro
Journal of Human Performance in Extreme Environments
In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …
Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva
Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva
MODVIS Workshop
E-Learning is emerging as a convenient and effective learning tool. However, the challenge with eLearning is the lack of effective tools to assess levels of learning. Ability to predict difficult content in real time enables eLearning systems to dynamically provide supplementary content to meet learners’ needs. Recent developments have made possible low-cost eye trackers, which enables a new class of applications based on eye response. In comparison to past attempts using bio-metrics in learning assessments, with eye tracking, we can have access to the exact stimulus that is causing the response. A key aspect of the proposed approach is the …
A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang
A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang
The 8th International Conference on Physical and Numerical Simulation of Materials Processing
No abstract provided.
Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu
Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu
The 8th International Conference on Physical and Numerical Simulation of Materials Processing
No abstract provided.
Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher
Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher
The Summer Undergraduate Research Fellowship (SURF) Symposium
Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a …
Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout
Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout
MODVIS Workshop
Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group of …
Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo
Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo
MODVIS Workshop
Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …
Cloud Enabled Attack Vectors, Ryan Jasper
Cloud Enabled Attack Vectors, Ryan Jasper
Purdue Polytechnic Directed Projects
The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.
The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …
Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello
Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello
The Summer Undergraduate Research Fellowship (SURF) Symposium
There has been success in recent years for neural networks in applications requiring high level intelligence such as categorization and assessment. In this work, we present a neural network model to learn control policies using reinforcement learning. It takes a raw pixel representation of the current state and outputs an approximation of a Q value function made with a neural network that represents the expected reward for each possible state-action pair. The action is chosen an \epsilon-greedy policy, choosing the highest expected reward with a small chance of random action. We used gradient descent to update the weights and biases …
Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert
Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert
The Summer Undergraduate Research Fellowship (SURF) Symposium
With the fast growth of social media services, vast amount of user-generated content with time-space stamps are produced everyday. Considerable amount of these data are publicly available online, some of which collectively convey information that are of interest to data analysts. Social media data are dynamic and unstructured by nature, which makes it very hard for analysts to efficiently and effectively retrieve useful information. Social Media Analytics Reporting Toolkit (SMART), a system developed at Purdue VACCINE lab, aims to support such analyzing. The current framework collects real-time Twitter messages and visualizes volume densities on a map. It uses Latent Dirichilet …
Cis Map Drawer Visualization System, Hanye Xu, David Ebert
Cis Map Drawer Visualization System, Hanye Xu, David Ebert
The Summer Undergraduate Research Fellowship (SURF) Symposium
U.S. Citizenship and Immigration Services (USCIS) is the government agency that manages immigration to the United States. They are not only working on filing documents, but also analyzing those data they have. They require help from a visualization system to know the trend of immigration among offices across the country over time. We developed a project called CIS Map Drawer that is used to help build a visualization system for USCIS in order to analyze immigration data easily. This system makes use of a map view, a calendar visual representation, line charts, pixel drawing and other analysis tools to improve …
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu
Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …
Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu
Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu
The Summer Undergraduate Research Fellowship (SURF) Symposium
Researchers working on air conditioning systems currently use a software called ABSIM ( Absorption Simulation ) to evaluate current absorption systems or simulate new system designs. ABSIM was developed at Oak Ridge National Labs in the 1980s and the latest platform it is compatible with is Windows XP. ABSIM is not compatible on newer platforms and is not very user friendly. A lot of the actions involved in using ABSIM aren’t very intuitive. The goal is to develop a more user friendly simulation program that is based off of ABSIM and see to it that the program can be deployed …
A Comparative Study Of User Preferences Of A Personalized Academic Website, Dipti U. Desai
A Comparative Study Of User Preferences Of A Personalized Academic Website, Dipti U. Desai
Purdue Polytechnic Masters Theses
ABSTRACT
There has been a growing concern over the enrollment by American students into Science, Technology, Engineering and Mathematic (STEM) fields of study. Following globalization there is a direct competition for jobs in the United States with lower-wage workers around the globe and the US, thereby, is on the verge of losing its global technological competitiveness (Committee on Prospering in the Global Economy of the 21st Century: An Agenda for American Science and Technology, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 2007). Governmental as well as non-profit organizations are constantly searching for ideas, programs and initiatives …
Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels
Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels
Purdue Polytechnic Masters Theses
The process of virtualizing computing resources allows an organization to make more efficient use of it's resources. In addtion, this process enables flexibility that deployment on raw hardware does not. Virtualization, however, comes with a performance penalty. This study examines the performance of utilizing virtualization technology for use in high performance computing to determine the suitibility of using this technology. It makes use of a small (4 node) virtual cluster as well as a 4 node physical cluster. The impacts on input/output operation are examined as well as performance of each cluster using two widely utilized tools, NAS Parallel Benchmarks …
Sketching 3d Animation, Innfarn Yoo
Sketching 3d Animation, Innfarn Yoo
Department of Computer Graphics Technology Degree Theses
This thesis presents a method for creating natural 3D animation based on sketches. Our method provides novice and professional sketchers an easy, fast, and intuitive way to create three dimensional animations by drawing sketches, enhanced by strokes, and joint trajectory or rotation curves. It also allows searching massive databases of 3D animation as an application for motion capture system and major animation software. We extract 2D skeletons from strokes and find similar motion sequences by comparing all the important pre-generated key poses in database. To give the system more hints, users can draw joint trajectory and rotations curves that are …
Gpu-Based Global Illumination Using Lightcuts, Tong Zhang
Gpu-Based Global Illumination Using Lightcuts, Tong Zhang
Department of Computer Graphics Technology Degree Theses
Global Illumination aims to generate high quality images. But due to its high
requirements, it is usually quite slow. Research documented in this thesis was
intended to offer a hardware and software combined acceleration solution to
global illumination. The GPU (using CUDA) was the hardware part of the whole
method that applied parallelism to increase performance; the “Lightcuts”
algorithm proposed by Walter (2005) at SIGGRAPH 2005 acted as the software
method. As the results demonstrated in this thesis, this combined method offers
a satisfactory performance boost effect for relatively complex scenes.
Using Smartphones For Indoor Navigation, Benjamin Thomas Loulier
Using Smartphones For Indoor Navigation, Benjamin Thomas Loulier
Purdue Polytechnic Masters Theses
This directed projet is about the use of smartphones for indoor navigation.
Nowadays, indoor navigation is a real challenge, we are all familiar with the multiple applications of GPS based navigation but all these applications cannot be transfered in an indoor environment as we cannot receive a GPS signal inside.
The document is composed of three different parts related to indoor navigation using smartphones. The first part presents an inertial positioning system for pedestrians walking in an indoor environment, this system is implemented on an iPhone 4. In the second part we introduce a positioning system using RFID tags scattered …