Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Computer Sciences

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan Dec 2022

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


Automated Statistical Structural Testing Techniques And Applications, Yang Shi Aug 2021

Automated Statistical Structural Testing Techniques And Applications, Yang Shi

Dissertations and Theses

Statistical structural testing(SST) is an effective testing technique that produces random test inputs from probability distributions. SST shows superiority in fault-revealing power over random testing and deterministic approaches since it heritages the merits from both of them. SST ensures testing thoroughness by setting up a probability lower-bound criterion for each structural cover element and test inputs that exercise a structural cover element sampled from the probability distribution, ensuring testing randomness. Despite the advantages, SST is not a widely used approach in practice. There are two major limitations. First, to construct probability distributions, a tester must understand the underlying software's structure, …


Exploring The Efficiency Of Self-Organizing Software Teams With Game Theory, Clay Stevens, Jared Soundy, Hau Chan Feb 2021

Exploring The Efficiency Of Self-Organizing Software Teams With Game Theory, Clay Stevens, Jared Soundy, Hau Chan

CSE Conference and Workshop Papers

Over the last two decades, software development has moved away from centralized, plan-based management toward agile methodologies such as Scrum. Agile methodologies are founded on a shared set of core principles, including self-organizing software development teams. Such teams are promoted as a way to increase both developer productivity and team morale, which is echoed by academic research. However, recent works on agile neglect to consider strategic behavior among developers, particularly during task assignment–one of the primary functions of a self-organizing team. This paper argues that self-organizing software teams could be readily modeled using game theory, providing insight into how agile …


Information Retrieval-Based Bug Localization Approach With Adaptive Attributeweighting, Mustafa Erşahi̇n, Semi̇h Utku, Deni̇z Kilinç, Buket Erşahi̇n Jan 2021

Information Retrieval-Based Bug Localization Approach With Adaptive Attributeweighting, Mustafa Erşahi̇n, Semi̇h Utku, Deni̇z Kilinç, Buket Erşahi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Software quality assurance is one of the crucial factors for the success of software projects. Bug fixing has an essential role in software quality assurance, and bug localization (BL) is the first step of this process. BL is difficult and time-consuming since the developers should understand the flow, coding structure, and the logic of the program. Information retrieval-based bug localization (IRBL) uses the information of bug reports and source code to locate the section of code in which the bug occurs. It is difficult to apply other tools because of the diversity of software development languages, design patterns, and development …


Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan Dec 2020

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …


An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson Apr 2020

An Eye Tracking Replication Study Of A Randomized Controlled Trial On The Effects Of Embedded Computer Language Switching, Cole Peterson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The use of multiple programming languages (polyglot programming) during software development is common practice in modern software development. However, not much is known about how the use of these different languages affects developer productivity. The study presented in this thesis replicates a randomized controlled trial that investigates the use of multiple languages in the context of database programming tasks. Participants in our study were given coding tasks written in Java and one of three SQL-like embedded languages: plain SQL in strings, Java methods only, a hybrid embedded language that was more similar to Java. In addition to recording the online …


A Template-Based Code Generator For Web Applications, Burak Uyanik, Veysel Harun Şahi̇n Jan 2020

A Template-Based Code Generator For Web Applications, Burak Uyanik, Veysel Harun Şahi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

The importance and usage of web applications grow every day. Today from small businesses to large-scale corporations, many institutions prefer web applications for both their internal and external services. Code size and complexity of these kinds of applications grow rapidly. This brings up the question of how to improve the development process of web applications. A solution can be to use code generators. This paper introduces a template-based code generator to improve the development process of web applications. The code generator was developed and integrated into a real-life web application. Today, the web application together with the code generator is …


Assessment Of Environmental Factors Affecting Software Reliability: A Survey Study, Alper Özcan, Çağatay Çatal, Cengi̇z Toğay, Bedi̇r Teki̇nerdoğan, Emrah Dönmez Jan 2020

Assessment Of Environmental Factors Affecting Software Reliability: A Survey Study, Alper Özcan, Çağatay Çatal, Cengi̇z Toğay, Bedi̇r Teki̇nerdoğan, Emrah Dönmez

Turkish Journal of Electrical Engineering and Computer Sciences

Currently, many systems depend on software, and software reliability as such has become one of the key challenges. Several studies have been carried out that focus on the impact of external environmental factors that impact software reliability. These studies, however, were all carried out in the same geographical context. Given the rapid developments in software engineering, this study aims to identify and reinvestigate the environmental factors that impact software reliability by also considering a different context. The environmental factors that have an impact on software reliability as reported in earlier studies have been analyzed and synthesized. Subsequently, a survey study …


Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He Jun 2019

Single Image Reflection Removal Beyond Linearity, Qiang Wen, Yinjie Tan, Jing Qin, Wenxi Liu, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Due to the lack of paired data, the training of image reflection removal relies heavily on synthesizing reflection images. However, existing methods model reflection as a linear combination model, which cannot fully simulate the real-world scenarios. In this paper, we inject non-linearity into reflection removal from two aspects. First, instead of synthesizing reflection with a fixed combination factor or kernel, we propose to synthesize reflection images by predicting a non-linear alpha blending mask. This enables a free combination of different blurry kernels, leading to a controllable and diverse reflection synthesis. Second, we design a cascaded network for reflection removal with …


Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi Mar 2019

Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi

FIU Electronic Theses and Dissertations

It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies.

Allowing several services or Virtual Machines (VMs) to commonly share the cloud's infrastructure enables cloud providers to optimize resource …


Prioritizing Interdependent Software Requirements Using Tensor And Fuzzy Graphs, Negin Misaghian, Homayun Motameni, Mohsen Rabbani Jan 2019

Prioritizing Interdependent Software Requirements Using Tensor And Fuzzy Graphs, Negin Misaghian, Homayun Motameni, Mohsen Rabbani

Turkish Journal of Electrical Engineering and Computer Sciences

Owing to the special stance of prioritizing tasks in requirements engineering processes, and as the requirements are not independent in nature, considering their dependencies is essential during the prioritizing process. Although different classifications of dependency types among requirements exist, only a few approaches in the prioritization process consider such valuable data (dependency among equirements). To achieve a practical prioritization, this study proposes a method based on the effects of the requirement dependencies (increase/decrease cost of) on the value of prioritization provided by the tensor concept. Since the strengths of dependencies are also influential factors in the act of prioritization, The …


Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig Oct 2017

Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig

William L Honig

In this talk I will introduce the importance of metrics, or measures, and the role they play in the development of high quality computer systems. I will review some key mega trends in computer science over the last three decades and then explain why I believe the trend to small networked systems, along with metrics and software engineering will define the future of high technology computer based systems. I first learned about metrics at the Bell System where everything was measured. Metrics can be understood easily if you think of them as measures, for example of calories or salt in …


Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig Jun 2016

Metrics, Software Engineering, Small Systems – The Future Of Systems Development, William L. Honig

Computer Science: Faculty Publications and Other Works

In this talk I will introduce the importance of metrics, or measures, and the role they play in the development of high quality computer systems. I will review some key mega trends in computer science over the last three decades and then explain why I believe the trend to small networked systems, along with metrics and software engineering will define the future of high technology computer based systems.

I first learned about metrics at the Bell System where everything was measured. Metrics can be understood easily if you think of them as measures, for example of calories or salt in …


A Roadmap To Safe And Reliable Engineered Biological Nano-Communication Networks, Justin W. Firestone Apr 2016

A Roadmap To Safe And Reliable Engineered Biological Nano-Communication Networks, Justin W. Firestone

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Synthetic biology has the potential to benefit society with novel applications that can improve soil quality, produce biofuels, grow customized biological tissue, and perform intelligent drug delivery, among many other possibilities. Engineers are creating techniques to program living cells, inserting new logic, and leveraging cell-to-cell communication, which result in changes to a cell's core functionality. Using these techniques, we can now create synthetic biological organisms (SBOs) with entirely new (potentially unseen) behaviors, which, similar to silicon devices, can sense, actuate, perform computation, and interconnect with other networks at the nanoscale level. SBOs are programmable evolving entities, and can be likened …


An Active Learning Module For An Introduction To Software Engineering Course, A. Frank Ackerman, Ph.D. Jan 2014

An Active Learning Module For An Introduction To Software Engineering Course, A. Frank Ackerman, Ph.D.

Computer Science & Software Engineering

Many schools do not begin to introduce college students to software engineering until they have had at least one semester of programming. Since software engineering is a large, complex, and abstract subject it is difficult to construct active learning exercises that build on the students’ elementary knowledge of programming and still teach basic software engineering principles. It is also the case that beginning students typically know how to construct small programs, but they have little experience with the techniques necessary to produce reliable and long-term maintainable modules. I have addressed these two concerns by defining a local standard (Montana Tech …


Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh Dec 2013

Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh

Jeremy Straub

The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …


Towards Software Health Management With Bayesian Networks, Johann Schumann, Ole J. Mengshoel, Ashok Srivastava, Adnan Darwiche Oct 2010

Towards Software Health Management With Bayesian Networks, Johann Schumann, Ole J. Mengshoel, Ashok Srivastava, Adnan Darwiche

Ole J Mengshoel

More and more systems (e.g., aircraft, machinery, cars) rely heavily on software, which performs safety-critical operations. Assuring software safety though traditional V&V has become a tremendous, if not impossible task, given the growing size and complexity of the software. We propose that iSWHM (Integrated SoftWare Health Management) can increase safety and reliability of high-assurance software systems. iSWHM uses advanced techniques from the area of system health management in order to continuously monitor the behavior of the software during operation, quickly detect anomalies and perform automatic and reliable root-cause analysis, while not replacing traditional V&V. Information provided by the iSWHM system …


Analysis And Transformation Of Pipe-Like Web Mashups For End User Programmers, Kathryn T. Stolee Jun 2010

Analysis And Transformation Of Pipe-Like Web Mashups For End User Programmers, Kathryn T. Stolee

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Mashups are becoming increasingly popular as end users are able to easily access, manipulate, and compose data from several web sources. To support end users, communities are forming around mashup development environments that facilitate sharing code and knowledge. We have observed, however, that end user mashups tend to suffer from several deficiencies, such as inoperable components or references to invalid data sources, and that those deficiencies are often propagated through the rampant reuse in these end user communities.

In this work, we identify and specify ten code smells indicative of deficiencies we observed in a sample of 8,051 pipe-like web …


Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University May 2010

Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger Jan 2005

Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger

Engineering Technology Faculty Publications

Using microprocessor/microcontroller in various control applications is not only one of the major topics in Engineering Technology curricula, but also of interest in industry applications. To accomplish it correctly the process of designing application programs starts from the individual module development through extensive testing, verification, and modification. Applying these developed modules in a useful manner requires the links and integrations that lead to the practical project implementation. Frequently, in students' senior project designs and faculty's research plans, the microprocessor/microcontroller resources become scarce or cause conflicts during the modules' integration stage. To accommodate the shortfall of the resources and resolve any …


Inquisitive Pattern Recognition, Amy L. Magnus Mar 2003

Inquisitive Pattern Recognition, Amy L. Magnus

Theses and Dissertations

The Department of Defense and the Department of the Air Force have funded automatic target recognition for several decades with varied success. The foundation of automatic target recognition is based upon pattern recognition. In this work, we present new pattern recognition concepts specifically in the area of classification and propose new techniques that will allow one to determine when a classifier is being arrogant. Clearly arrogance in classification is an undesirable attribute. A human is being arrogant when their expressed conviction in a decision overstates their actual experience in making similar decisions. Likewise given an input feature vector, we say …


Infosphere Project: An Overview, Calton Pu, Jonathan Walpole Mar 2001

Infosphere Project: An Overview, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

We describe the Infosphere project, which is building the systems software support for information-driven applications such as digital libraries and electronic commerce. The main technical contribution is the Infopipe abstraction to support information flow with quality of service. Using building blocks such as program specialization, software feedback, domain-specific languages, and personalized information filtering, the Infopipe software generates code and manage resources to provide the specified quality of service with support for composition and restructuring.


Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos Mar 1999

Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos

Theses and Dissertations

Modern digital communication techniques often require the generation of pseudorandom numbers or sequences. The ability to quickly and easily produce various codes such as maximal length codes, Gold codes, Jet Propulsion Laboratory ranging codes, syncopated codes, and non-linear codes in a laboratory environment is essential. This thesis addresses the issue of providing automated computer control to previously built, manually controlled hardware incorporating the Stanford Telecom STEL-1032 Pseudo-Random Number (PRN) Coder. By incorporating a microcontroller into existing hardware, the STEL-1032 can now be conveniently controlled from a MATLAB Graphical User Interface (GUI). The user can quickly create, save, and recall various …


An Advanced Visualization Method For An Operations Research Analysis, Steven C. Oimoen Mar 1998

An Advanced Visualization Method For An Operations Research Analysis, Steven C. Oimoen

Theses and Dissertations

Visualizing multidimensional data using only two dimensions and conventional visualization techniques limits the understanding of the data set. Underlying structures or patterns within the data can easily go unnoticed. In order to gain additional insight into an analysis, incorporation of visualization and multidimensional graphics into the analysis results should be accomplished. The results must ensure that the information portrayed is not misleading or misunderstood. The integrity of the data must be preserved throughout the transformation. The primary objective of this research effort is to identify techniques to visualize multidimensional data and then develop a software tool to display the multidimensional …


Analysis And Extension Of Model-Based Software Executives, Keith E. Lewis Jan 1995

Analysis And Extension Of Model-Based Software Executives, Keith E. Lewis

Theses and Dissertations

This research developed a comprehensive description of the simulation environment of Architect, a domain-oriented application composition system being developed at the Air Force Institute of Technology to explore new software engineering technologies. The description combines information from several previous research efforts and Architect's source code into a single, comprehensive document. A critical evaluation of the simulation environment was also performed, identifying improvements and modifications that enhance Architecture's application execution capabilities by reducing complexity and execution time. The analysis was then taken one step further and presented extensions to the current simulation environment. The extensions included investigating the feasibility of mixed-mode …


A Method For Populating The Knowledge Base Of Aptas, A Domain-Oriented Application Composition System, Raleigh A. Sandy Iii Dec 1993

A Method For Populating The Knowledge Base Of Aptas, A Domain-Oriented Application Composition System, Raleigh A. Sandy Iii

Theses and Dissertations

A formal process is described for populating the knowledge base of the Automatic Programming Technologies for Avionics Software APTAS system. This process was developed using a general knowledge base population process that applies to many knowledge-based software engineering systems. This general process is also described. The formal process for APTAS was demonstrated by storing new information from the radar tracking domain into the knowledge base of APTAS. Several procedures some automatic and some manual were implemented to support the formal process.