Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 12052

Full-Text Articles in Physical Sciences and Mathematics

Analysis Of Salvinorin A In Plants, Water, And Urine Using Solid-Phase Microextraction-Comprehensive Two-Dimensional Gas Chromatography–Time Of Flight Mass Spectrometry, Brian Barnes, Nicholas Snow Jun 2015

Analysis Of Salvinorin A In Plants, Water, And Urine Using Solid-Phase Microextraction-Comprehensive Two-Dimensional Gas Chromatography–Time Of Flight Mass Spectrometry, Brian Barnes, Nicholas Snow

Nicholas A Snow

No abstract provided.


Assessing Content Validity Through Correlation And Relevance Tools A Bayesian Randomized Equivalence Experiment, Byron Gajewski, Diane Boyle, Marjorie Bott, Larry Price, Jamie Leopold, Nancy Dunton Apr 2015

Assessing Content Validity Through Correlation And Relevance Tools A Bayesian Randomized Equivalence Experiment, Byron Gajewski, Diane Boyle, Marjorie Bott, Larry Price, Jamie Leopold, Nancy Dunton

Diane Kay Boyle PhD, RN, FAAN

Content validity elicits expert opinion regarding items of a psychometric instrument. Expert opinion can be elicited in many forms: for example, how essential an item is or its relevancy to a domain. This study developed an alternative tool that elicits expert opinion regarding correlations between each item and its respective domain. With 109 Registered Nurse (RN) site coordinators from National Database of Nursing Quality Indicators, we implemented a randomized Bayesian equivalence trial with coordinators completing ‘‘relevance’’ or ‘‘correlation’’ content tools regarding the RN Job Enjoyment Scale. We confirmed our hypothesis that the two tools would result in equivalent content information. …


A Comparative Analysis Of Decision Trees Vis-À-Vis Other Computational Data Mining Techniques In Automotive Insurance Fraud Detection, Adrian Gepp, Kuldeep Kumar, J Holton Wilson, Sukanto Bhattacharya Jul 2014

A Comparative Analysis Of Decision Trees Vis-À-Vis Other Computational Data Mining Techniques In Automotive Insurance Fraud Detection, Adrian Gepp, Kuldeep Kumar, J Holton Wilson, Sukanto Bhattacharya

Kuldeep Kumar

No abstract provided.


Meteor-Radar Observed Mesospheric Semi-Annual Oscillation (Sao) And Quasi-Biennial Oscillation (Qbo) Over Maui, Hawaii, Tao Li, Alan Liu, Xian Lu, Zhenhua Li, Steven Franke, Gary Swenson, Xiankang Dou Aug 2013

Meteor-Radar Observed Mesospheric Semi-Annual Oscillation (Sao) And Quasi-Biennial Oscillation (Qbo) Over Maui, Hawaii, Tao Li, Alan Liu, Xian Lu, Zhenhua Li, Steven Franke, Gary Swenson, Xiankang Dou

Zhenhua Li

No abstract provided.


Front Matter Dec 2012

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Nevada Interagency Volunteer Program: Helping Hands Across Public Lands—Phase Ii: Final Project Report, December 31, 2012, Margaret N. Rees Dec 2012

Nevada Interagency Volunteer Program: Helping Hands Across Public Lands—Phase Ii: Final Project Report, December 31, 2012, Margaret N. Rees

Get Outdoors Nevada

  • Maintained a central clearinghouse created for Southern Nevada public lands volunteers, including: ─ an online volunteer data-management application (Volgistics) adopted and customized for the program and populated with 8,500 active and 961 mailing list volunteer records ─ a community outreach Web site that currently averages 8,230 pages viewed per month since July 2007 and has aided in the recruitment of 11,943 volunteers ─ updated website to word press for sustainability ─ branding development and marketing and outreach tool creation
  • Updated Standard Operating Procedures (SOPs) for all areas of Interagency Volunteer Program Management—recruitment, training, recognition, retention of volunteers, event planning, and …


Sndo Hector's Helpers Youth Engaging The Community Through Social Media: Annual Progress Report, Period Covering June 1, 2012 - December 31, 2012, Margaret N. Rees Dec 2012

Sndo Hector's Helpers Youth Engaging The Community Through Social Media: Annual Progress Report, Period Covering June 1, 2012 - December 31, 2012, Margaret N. Rees

Anti-littering Programs

The Hector’s Helpers Youth Engaging the Community through Social Media project was designed to develop civic and environmental stewardship skills as students receive training in administering social media accounts (e.g., Facebook, twitter, Youtube). The project is an extension of the Hector’s Helpers program developed through a cooperative agreement and run under the branding of Don’t Trash Nevada. Participants in the project are known as the Social Media Squad (SMS). The following activities were completed:

  • Supervision of youth completing the pilot program initiated in an earlier cooperative agreement
  • Recruitment of youth to apply for the Social Media Squad
  • Training of Social …


Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo Dec 2012

Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC'07, Abdalla et al. proposed the first IBTT construction with short private key. In CCS'08, Boneh and Naor proposed a public-key traitor tracing, which can be extended to IBTT with short ciphertext. With a further exploration, in this paper, we propose the first IBTT with short private key and short ciphertext. Private key and ciphertext are both order of O(l 1+l 2), where l 1 is the bit length of codeword of …


Software Requirements As Executable Code, Karen Eileen Wasielewski Morand Dec 2012

Software Requirements As Executable Code, Karen Eileen Wasielewski Morand

Regis University Student Publications (comprehensive collection)

This project analyzed the effectiveness of using Story Testing frameworks to create an application directly from user specifications. It did this by taking an example business application with "traditional" specifications and rewriting those specifications in three different Story Testing Frameworks - Cucumber, FitNesse, and JBehave. Analysis of results drew the following conclusions: 1) Story Testing can help prove a project's completeness, 2) Specifications are still too technical, 3) Implementation is not overly complex, and 4) Story Testing is worth it. It proposed future research around evaluating natural languages and seeking more user-friendly ways of writing specifications in a natural language.


Kestabilan Global Bebas Penyakitflu Singapura (Hand, Foot And Mouth Disease)Berdasarkan Model Seirs, Eminugroho Ratna Sari Dec 2012

Kestabilan Global Bebas Penyakitflu Singapura (Hand, Foot And Mouth Disease)Berdasarkan Model Seirs, Eminugroho Ratna Sari

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

AbstrakPenelitian mengenai penyebaran HFMD pertama dilakukan menggunakan model SIR. Pada model ini,populasi individu yang sebenarnya telah terinfeksi tetapi belum menunjukkan gejala-gejala penyakit tidakdijelaskan. Dalam paper ini akan dibahas mengenai pembentukan model matematika dari penyebaranpenyakit HFMD menggunakan model SEIRS. Adanya penambahan kelas populasi E (Exposed) untukmelengkapi kekurangan pada model sebelumnya. Berdasarkan model, diperoleh titik ekuilibrium bebaspenyakit dan endemik. HFMD tidak akan mewabah jika R0 ï"¼1. Selanjutnya dilakukan simulasimenggunakan MAPLE 13.


Masthead Dec 2012

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2012

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Evaluasi Distribusi Gabungan Menggunakanalgoritma Konvolusi Dan Rekursi Panjer, Rosita Kusumawati Dec 2012

Evaluasi Distribusi Gabungan Menggunakanalgoritma Konvolusi Dan Rekursi Panjer, Rosita Kusumawati

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Evaluasi distribusi gabungan merupakan bagian penting dalam matematika asuransi dan manajemenresiko. Perbandingan evaluasi distribusi gabungan menggunakan algoritma Konvolusi dan rekursi Panjerakan dikaji dalam tulisan ini.Keywords: distribusi gabungan, konvolusi, rekursi panjer


Vertex Antimagic Total Labeling Pada Graphmulticycle, Dominikus Arif Budi Prasetyo Pythagors Dec 2012

Vertex Antimagic Total Labeling Pada Graphmulticycle, Dominikus Arif Budi Prasetyo Pythagors

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Pelabelan graf merupakan bagian dari graf yang berkembang saat ini. Jenis pelabelan pada graf bergantungpada domainnya, yakni pelabelan sisi ajaib, pelabelan titik ajaib, dan pelabelan total ajaib. Pelabelan totalajaib pada graf dibedakan lagi berdasarkan komponen graf yang dievaluasi, yakni pelabelan total sisi ajaibdan pelabelan total titik ajaib. Pada pelabelan ajaib, bobot dari komponen graf yang dievaluasi adalah sama,jika bobotnya tidak sama maka dinamakan pelabelan tak-ajaib (antimagic). Misalkan G adalah graf denganbanyak titik p dan sisi q. Suatu pemetaan bijektif dari komponen-komponen graf ke bilangan bulat positif {1,2, "¦, (p+q)} disebut called (a, d) vertex antimagic total labelling (pelabelan total titik …


Construction A Coring From Tensor Product Of Bialgebra, Nikken Prima Puspita, Siti Khabibah Dec 2012

Construction A Coring From Tensor Product Of Bialgebra, Nikken Prima Puspita, Siti Khabibah

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

In this Paper introduced a coring from tensor product of bialgebra. An algebra with compatible coalgebrastructure are known as bialgebra. For any bialgebra B we can obtained tensor product between B anditself. Defined a right and left B -action on the tensor product of bialgebra B such that we have tensorproduct of B and itself is a bimodule over B. In this note we expect that the tensor product B anditself becomes a B -coring with comultiplication and counit.Keywords : action, algebra, coalgebra, coring.


Penerapan Teori Graf Pada Analisis Jejaring Sosialdengan Menggunakan Microsoft Microsoft Node Xl, Nur Insani, Nur Hadi Waryanto Dec 2012

Penerapan Teori Graf Pada Analisis Jejaring Sosialdengan Menggunakan Microsoft Microsoft Node Xl, Nur Insani, Nur Hadi Waryanto

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Pentingnya posisi seseorang di dalam jaringan ataupun suatu organisasi tidak hanya ditentukanoleh seberapa banyak ia terhubung oleh banyak orang tetapi apakah seseorang menjadi jembatan dariorang-orang yang memiliki banyak jaringan. Jadi bukanlah faktor centraliti yang merupakan faktor utamaseseorang dianggap penting, tetapi information broker, yaitu seseorang yang bukan pusat dariketerhubungan banyak orang namun memiliki hubungan dengan orang-orang yang memiliki banyakpengikut, memegang peranan yang lebih penting. Analisa Jejaring Sosial (AJS) memberikan peranpenting dalam menggambarkan interaksi informal dimana ia menggambarkan keadaan interaksi manusiasebagai mana keadaan nyata. Salah satu bentuk jejaring sosial yang dapat dianalisa adalah kepengurusanDekanat FMIPA Universitas Negeri Yogyakarta (UNY) sampai dengan kepengurusan …


Aplikasi Model Generalized Space Time Autoregressive Pada Data Pencemaran Udara Di Kota Surabaya, Dhoriva Urwatul Wutsqa, Suhartono Suhartono, Brodjol Sutijo Dec 2012

Aplikasi Model Generalized Space Time Autoregressive Pada Data Pencemaran Udara Di Kota Surabaya, Dhoriva Urwatul Wutsqa, Suhartono Suhartono, Brodjol Sutijo

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Penelitian ini secara bertujuan mengaplikasan model Generalized Space Time Autoregressive (GSTAR) untuk mendapatkan model peramalan data pencemaran udara di Kota Surabaya. Data yang digunakan dalam penelitian ini adalah zat polutan PM 10 ang berasal dari tiga stasiun pemantau di kota Surabaya mulai Januari hingga Desember 2009. Tahap-tahap pembentukan model peramalan data pencemaran udara meliputi identifikasi order autoregresif dengan criteria AIC (Akaike Information Criterion), estimasi parameter yang terdiri atas estimasi bobot antar lokasi dengan normalisasi korelasi silang dan estimasi parameter autoregresif dengan metode kuadrat terkecil, uji signifikansi parameter melalui statistik uji Wald, serta uji kesesuaian model. Model yang dihasilkan merupakan model …


Estimasi Parameter Model Hybridizing Exponential Smoothing Dan Neural Network Pada Hasil Pengukuran Mean Sea Level Satelit Altimetri Jason 2, Novi Mara Dec 2012

Estimasi Parameter Model Hybridizing Exponential Smoothing Dan Neural Network Pada Hasil Pengukuran Mean Sea Level Satelit Altimetri Jason 2, Novi Mara

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Nilai parameter dari suatu model peramalan dapat diestimasi dengan meminumkan ukuran evaluasi keakuratan peramalan seperti MSE, MAE, MAPE dan AIC. Pada penelitian ini telah dilakukan estimasi parameter hybridizing neural network dengan exponential smoothing dengan meminimumkan MSE, MAE, MPE dan MAPE. Estimasi parameter dibatasi untuk nilai mulai dari 0.01 sampai dengan 0.99. Estimator merupakan nilai yang memberikan model dengan ukuran keakuratan peramalan MAE dan MSE minimum. Dari algoritma program R yang telah dibuat, diperoleh estimator parameter yang meminimalkan MSE adalah 0.13. Estimtor parameter yang meminimumkan MAE adalah 0.01. Estimator parameter yang meminimumkan nilai MPE dan MAPE bernilai sama yakni 0.27. Ketiga …


Sifat Kendala Pemrograman Kerucut Order Dua Dengan Norma ˆŽ, Caturiyati Caturiyati Dec 2012

Sifat Kendala Pemrograman Kerucut Order Dua Dengan Norma ˆŽ, Caturiyati Caturiyati

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Masalah pemrograman kerucut order dua (Second Order Cone Programming/SOCP) dengan norma merupakan suatu masalah yang merupakan bentuk khusus dari masalah pemrograman kerucut order dua dengan norma 2. Pada makalah ini dikembangkan pengertian kerucut order dua (Second Order Cone/SOC) dengan norma dan sifat sifat kendala pemrograman kerucut order dua dengan Norma berdasarkan pada pengertian kerucut order dua dengan norma 2 dan pemrograman kerucut order dua dengan norma 2. Paper ini ditulis dengan menguraikan pengertian kerucut order dua dengan norma 2 dan pemrograman kerucut order dua dengan norma 2, dilanjutkan dengan mengembangkan pengertian kerucut order dua dengan norma …


Permanen Dan Dominan Suatu Matriks Atas Aljabar Max-Plus Interval, Siswanto Siswanto Dec 2012

Permanen Dan Dominan Suatu Matriks Atas Aljabar Max-Plus Interval, Siswanto Siswanto

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Misalkan himpunan bilangan real. Aljabar Max-Plus adalah himpunan dilengkapi dengan operasi maksimum dan penjumlahan ( . Setiap matriks persegi atas aljabar Max-Plus dapat dikaitkan dengan perrmanen dan dominan. Dari aljabar Max-Plus dapat dibentuk aljabar Max-Plus interval yaitu himpunan yang anggotanya merupakan interval-interval tertutup dalam atau dilengkapi dengan operasi maksimum dan penjumlahan . Dapat dibentuk himpunan matriks persegi atas aljabar Max-Plus interval. Dalam penelitian ini, akan dikaji tentang permanen dan dominan matriks atas aljabar Max-Plus interval, hubungan antara permanen dan dominan, serta bideterminan matriks atas aljabar Max-Plus interval. Dari hasil penelitian diperoleh formula permanen dan dominan, dominan selalu lebih kecil atau …


Software Requirements Specification Sinapra Berbasis Sistem Informasi, Nur Hadi Waryanto Dec 2012

Software Requirements Specification Sinapra Berbasis Sistem Informasi, Nur Hadi Waryanto

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Sistem Informasi Sarana dan Prasarana (SINAPRA) merupakan bagian dari beberapa sistem informasi yang dipakai oleh Univeristas Negeri Yogyakarta. SINAPRA merupakan salah satu sistem yang akan dikembangkan dalam Sistem Informasi Terpadu (SIPADU).

Software Requirements Specification SINAPRA merupakan acuan teknis developer dalam mengembangkan sistem untuk tahap selanjutnya. Software Requirements Specification SINAPRA dikembangkan menggunakan model WSU-TC CptS 322 dengan berbasis sistem informasi terpadu UNY Kata Kunci : Software Requirements Specification, WSU-TC CptS 322, SINAPRA


Multi Traveling Salesman Problem (Mtsp) Dengan Algoritma Genetika Untuk Menentukan Rute Loper Koran Di Agen Surat Kabar, Fitriana Yuli Saptaningtyas Dec 2012

Multi Traveling Salesman Problem (Mtsp) Dengan Algoritma Genetika Untuk Menentukan Rute Loper Koran Di Agen Surat Kabar, Fitriana Yuli Saptaningtyas

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Permasalahan pendistribusian oleh beberapa loper koran di suatu agen surat kabar pada pelanggan sering mengalami keterlambatan. Bagaimana menentukan rute optimum bagi beberapa loper koran di sebuah agen surat kabar akan dimodelkan secara matematis dan akan diselesaikan menggunakan algoritma genetika. Permasalahan ini masuk dalam kategori Multi Travelling Salesman Problem (MTSP). Algoritma genetika yang mengadopsi proses evolusi makhluk hidup, pada penerapannya mengikuti langkah pembentukan populasi, menentukan nilai fitness, melakukan proses seleksi, melakukan pindah silang dan mutasi, dan membentuk individu baru. Algoritma genetika dapat digunakan untuk menentukan rute optimum perjalanan beberapa loper koran di suatu agen surat kabar. Penentuan rute perjalanan beberapa …


Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado Dec 2012

Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado

Publications

Data Comm—a text-based controller-pilot communication system—is critical to many NextGen improvements. With Data Comm, communication becomes a visual task. Interacting with a visual Data Comm display may yield an unsafe increase in head-down time, particularly for single-pilot operations. This study examined the feasibility of supplementing Data Comm with synthetic speech. To this end, thirty-two pilots flew two experimental scenarios in a Cessna 172 Flight Training Device. In one scenario, ATC communication was with a text-only Data Comm display, in the other, communication was with a text Data Comm display with synthetic speech that read aloud each message (i.e., text+speech). Pilots …


Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang Dec 2012

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …


Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang Dec 2012

Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu Dec 2012

When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo Dec 2012

Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo

David LO

Antagonistic communities refer to groups of people with opposite tastes, opinions, and factions within a community. Given a set of interactions among people in a community, we develop a novel pattern mining approach to mine a set of antagonistic communities. In particular, based on a set of user-specified thresholds, we extract a set of pairs of communities that behave in opposite ways with one another. We focus on extracting a compact lossless representation based on the concept of closed patterns to prevent exploding the number of mined antagonistic communities. We also present a variation of the algorithm using a divide …


Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo Dec 2012

Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo

David LO

Reusing APIs of existing libraries is a common practice during software development, but searching suitable APIs and their usages can be time-consuming [6]. In this paper, we study a new and more practical approach to help users find usages of APIs given only simple text phrases, when users have limited knowledge about an API library. We model API invocations as an API graph and aim to find an optimum connected subgraph that meets users' search needs. The problem is challenging since the search space in an API graph is very huge. We start with a greedy subgraph search algorithm which …


Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro Dec 2012

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro

David LO

A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …


Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz Dec 2012

Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz

David LO

Specification mining takes execution traces as input and extracts likely program invariants, which can be used for comprehension, verification, and evolution related tasks. In this work we integrate scenario-based specification mining, which uses a data-mining algorithm to suggest ordering constraints in the form of live sequence charts, an inter-object, visual, modal, scenario-based specification language, with mining of value-based invariants, which detects likely invariants holding at specific program points. The key to the integration is a technique we call scenario-based slicing, running on top of the mining algorithms to distinguish the scenario-specific invariants from the general ones. The resulting suggested specifications …