Open Access. Powered by Scholars. Published by Universities.®
Programming Languages and Compilers Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (6)
- Software Engineering (6)
- Graphics and Human Computer Interfaces (4)
- Computer Engineering (3)
- Life Sciences (3)
-
- Numerical Analysis and Scientific Computing (3)
- Statistics and Probability (3)
- Artificial Intelligence and Robotics (2)
- Bioinformatics (2)
- Databases and Information Systems (2)
- Education (2)
- Genetics and Genomics (2)
- OS and Networks (2)
- Other Computer Sciences (2)
- Probability (2)
- Social and Behavioral Sciences (2)
- Systems Architecture (2)
- Theory and Algorithms (2)
- Algebra (1)
- Algebraic Geometry (1)
- Applied Mathematics (1)
- Applied Statistics (1)
- Biochemical and Biomolecular Engineering (1)
- Biochemistry, Biophysics, and Structural Biology (1)
- Biophysics (1)
- Chemical Engineering (1)
- Climate (1)
- Institution
-
- Boise State University (2)
- City University of New York (CUNY) (2)
- Singapore Management University (2)
- Central Washington University (1)
- Chulalongkorn University (1)
-
- James Madison University (1)
- Louisiana State University (1)
- Michigan Technological University (1)
- Pepperdine University (1)
- Portland State University (1)
- The University of Akron (1)
- University of Arkansas, Fayetteville (1)
- University of Nebraska at Omaha (1)
- University of Tennessee, Knoxville (1)
- University of Texas at Tyler (1)
- West Virginia University (1)
- Keyword
-
- Deep learning (2)
- Program analysis (2)
- Static analysis (2)
- Affective framework (1)
- Alaska (1)
-
- Albedo (1)
- Algebra. (1)
- Android (1)
- Arctic (1)
- Biofuel (1)
- Bioinformatics (1)
- Biomass (1)
- CUDA (1)
- Capsule network (1)
- Career Technical Education (1)
- Case Study (1)
- Cellulose (1)
- Code (1)
- Code instrumentation (1)
- Code learning (1)
- Compilers (1)
- Computational Biology (1)
- Computational Thinking (1)
- Computer (1)
- Computer Education Curriculum (1)
- Computer programming -- Education (1)
- Contextualization (1)
- Cyber Argumentation (1)
- Dataflow (1)
- Dataflow Architecture (1)
- Publication
-
- Boise State University Theses and Dissertations (2)
- Dissertations and Theses Collection (Open Access) (2)
- Theses and Dissertations (2)
- All Graduate Projects (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
-
- Dissertations and Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Electrical Engineering Theses (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- LSU Doctoral Dissertations (1)
- Masters Theses, 2020-current (1)
- Theses/Capstones/Creative Projects (1)
- University Honors Theses (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 19 of 19
Full-Text Articles in Programming Languages and Compilers
Argumentation Stance Polarity And Intensity Prediction And Its Application For Argumentation Polarization Modeling And Diverse Social Connection Recommendation, Joseph Winstead Sirrianni
Argumentation Stance Polarity And Intensity Prediction And Its Application For Argumentation Polarization Modeling And Diverse Social Connection Recommendation, Joseph Winstead Sirrianni
Graduate Theses and Dissertations
Cyber argumentation platforms implement theoretical argumentation structures that promote higher quality argumentation and allow for informative analysis of the discussions. Dr. Liu’s research group has designed and implemented a unique platform called the Intelligent Cyber Argumentation System (ICAS). ICAS structures its discussions into a weighted cyber argumentation graph, which describes the relationships between the different users, their posts in a discussion, the discussion topic, and the various subtopics in a discussion. This platform is unique as it encodes online discussions into weighted cyber argumentation graphs based on the user’s stances toward one another’s arguments and ideas. The resulting weighted cyber …
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Theses and Dissertations
This paper investigates how the snow-albedo feedback mechanism of the arctic is changing in response to rising climate temperatures. Specifically, the interplay of vegetation and snowmelt, and how these two variables can be correlated. This has the potential to refine climate modelling of the spring transition season. Research was conducted at the ecoregion scale in northern Alaska from 2000 to 2020. Each ecoregion is defined by distinct topographic and ecological conditions, allowing for meaningful contrast between the patterns of spring albedo transition across surface conditions and vegetation types. The five most northerly ecoregions of Alaska are chosen as they encompass …
Using Applications To Guide Data Management For Emerging Memory Technologies, Timothy C. Effler
Using Applications To Guide Data Management For Emerging Memory Technologies, Timothy C. Effler
Doctoral Dissertations
A number of promising new memory technologies, such as non-volatile, storage-class memories and high-bandwidth, on-chip RAMs, are emerging. Since each of these new technologies present tradeoffs distinct from conventional DRAMs, many high performance and scientific computing systems have begun to include multiple tiers of memory storage, each with their own type of devices. To efficiently utilize the available hardware, such systems will need to alter their data management strategies to consider the performance and capabilities provided by each tier. This work aims to understand and increase the effectiveness of application data management for emerging complex memory systems. A key realization …
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Dissertations and Theses Collection (Open Access)
It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …
Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison
Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison
University Honors Theses
Programming in a baremetal environment, directly on top of hardware with very little to help manage memory or ensure safety, can be dangerous even for experienced programmers. Programming languages can ease the burden on developers and sometimes take care of entire sets of errors. This is not the case for a language like C that will do almost anything you want, for better or worse. To operate in a baremetal environment often requires direct control over memory, but it would be nice to have that capability without sacrificing safety guarantees. Rust is a new language that aims to fit this …
A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong
A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong
Dissertations and Theses Collection (Open Access)
Dynamic malware analysis schemes either run the target program as is in an isolated environment assisted by additional hardware facilities or modify it with instrumentation code statically or dynamically. The hardware-assisted schemes usually trap the target during its execution to a more privileged environment based on the available hardware events. The more privileged environment is not accessible by the untrusted kernel, thus this approach is often applied for transparent and secure kernel analysis. Nevertheless, the isolated environment induces a virtual address gap between the analyzer and the target, which hinders effective and efficient memory introspection and undermines the correctness of …
Evolution Of Computational Thinking Contextualized In A Teacher-Student Collaborative Learning Environment., John Arthur Underwood
Evolution Of Computational Thinking Contextualized In A Teacher-Student Collaborative Learning Environment., John Arthur Underwood
LSU Doctoral Dissertations
The discussion of Computational Thinking as a pedagogical concept is now essential as it has found itself integrated into the core science disciplines with its inclusion in all of the Next Generation Science Standards (NGSS, 2018). The need for a practical and functional definition for teacher practitioners is a driving point for many recent research endeavors. Across the United States school systems are currently seeking new methods for expanding their students’ ability to analytically think and to employee real-world problem-solving strategies (Hopson, Simms, and Knezek, 2001). The need for STEM trained individuals crosses both the vocational certified and college degreed …
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
Electrical Engineering Theses
An increase in the number of working parents has led to a higher demand for remotely monitoring activities of babies through baby monitors. The baby monitors vary from simple audio and video monitoring frameworks to advance applications where we can integrate sensors for tracking vital signs such as heart rate, respiratory rate monitoring. The Internet of Things (IoT) is a network of devices where each device can is recognizable in the network. The IoT node is a sensor or device, which primarily functions as a data acquisition unit. The data acquired through the IoT nodes are wirelessly transmitted to the …
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
Masters Theses, 2020-current
Code stylometry is applying analysis techniques to a collection of source code or binaries to determine variations in style. The variations extracted are often used to identify the author of the text or to differentiate one piece from another.
In this research, we were able to create a multi-input deep learning model that could accurately categorize and group code from multiple projects. The deep learning model took as input word-based tokenization for code comments, character-based tokenization for the source code text, and the metadata features described by A. Caliskan-Islam et al. Using these three inputs, we were able to achieve …
Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola
Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola
Theses/Capstones/Creative Projects
This study presents a novel methodology for analyzing metabolic pathways. Utilizing KEGG REST API through a Biopython package and file parser, data about whether or not a bacteria has an enzyme or not was extracted. The results found that differences in metabolic pathway enrichment values follow along the lines of genera and pathway type. In particular, bacteria found in food spoilage and commercial nitrogen fixing products had high values of enrichment.
Polyhedral+Dataflow Graphs, Eddie C. Davis
Polyhedral+Dataflow Graphs, Eddie C. Davis
Boise State University Theses and Dissertations
This research presents an intermediate compiler representation that is designed for optimization, and emphasizes the temporary storage requirements and execution schedule of a given computation to guide optimization decisions. The representation is expressed as a dataflow graph that describes computational statements and data mappings within the polyhedral compilation model. The targeted applications include both the regular and irregular scientific domains.
The intermediate representation can be integrated into existing compiler infrastructures. A specification language implemented as a domain specific language in C++ describes the graph components and the transformations that can be applied. The visual representation allows users to reason about …
Obtaining Real-World Benchmark Programs From Open-Source Repositories Through Abstract-Semantics Preserving Transformations, Maria Anne Rachel Paquin
Obtaining Real-World Benchmark Programs From Open-Source Repositories Through Abstract-Semantics Preserving Transformations, Maria Anne Rachel Paquin
Boise State University Theses and Dissertations
Benchmark programs are an integral part of program analysis research. Researchers use benchmark programs to evaluate existing techniques and test the feasibility of new approaches. The larger and more realistic the set of benchmarks, the more confident a researcher can be about the correctness and reproducibility of their results. However, obtaining an adequate set of benchmark programs has been a long-standing challenge in the program analysis community.
In this thesis, we present the APT tool, a framework we designed and implemented to automate the generation of realistic benchmark programs suitable for program analysis evaluations. Our tool targets intra-procedural analyses that …
Using Cuda To Enhance Data Processing Of Variant Call Format Files For Statistical Genetic Analysis, Heather Mckinnon
Using Cuda To Enhance Data Processing Of Variant Call Format Files For Statistical Genetic Analysis, Heather Mckinnon
All Graduate Projects
Utilizing the power of GPU parallel processing with CUDA can speed up the processing of Variant Call Format (VCF) files and statistical analysis of genomic data. A software package designed toward this purpose would be beneficial to genetic researchers by saving them time which they could spend on other aspects of their research. A data set containing genetics from a study of trichome production in Mimulus guttatus, or yellow monkey flower, was used to develop a package to test the effectiveness of GPU parallel processing versus serial executions. After a serial version of the code was generated and benchmarked, OpenACC …
Learning Personally Identifiable Information Transmission In Android Applications By Using Data From Fast Static Code Analysis, Nattanon Wongwiwatchai
Learning Personally Identifiable Information Transmission In Android Applications By Using Data From Fast Static Code Analysis, Nattanon Wongwiwatchai
Chulalongkorn University Theses and Dissertations (Chula ETD)
The ease of use of mobile devices has resulted in a significant increase in the everyday use of mobile applications as well as the amount of personal information stored on devices. Users are becoming more aware of applications' access to their personal information, as well as the risk that these applications may unwittingly transmit Personally Identifiable Information (PII) to third-party servers. There is no simple way to determine whether or not an application transmits PII. If this information could be made available to users before installing new applications, they could weigh the pros and cons of having the risk of …
V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha
V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha
Dissertations and Theses
In underground, underwater and indoor environments, a robot has to rely solely on its on-board sensors to sense and understand its surroundings. This is the main reason why SLAM gained the popularity it has today. In recent years, we have seen excellent improvement on accuracy of localization using cameras and combinations of different sensors, especially camera-IMU (VIO) fusion. Incorporating more sensors leads to improvement of accuracy,but also robustness of SLAM. However, while testing SLAM in our ground robots, we have seen a decrease in performance quality when using the same algorithms on flying vehicles.We have an additional sensor for ground …
Demand-Driven Execution Using Future Gated Single Assignment Form, Omkar Javeri
Demand-Driven Execution Using Future Gated Single Assignment Form, Omkar Javeri
Dissertations, Master's Theses and Master's Reports
This dissertation discusses a novel, previously unexplored execution model called Demand-Driven Execution (DDE), which executes programs starting from the outputs of the program, progressing towards the inputs of the program. This approach is significantly different from prior demand-driven reduction machines as it can execute a program written in an imperative language using the demand-driven paradigm while extracting both instruction and data level parallelism. The execution model relies on an executable Single Assignment Form which serves both as the internal representation of the compiler as well as the Instruction Set Architecture (ISA) of the machine. This work develops the instruction set …
Elucidating The Properties And Mechanism For Cellulose Dissolution In Tetrabutylphosphonium-Based Ionic Liquids Using High Concentrations Of Water, Brad Crawford
Graduate Theses, Dissertations, and Problem Reports
The structural, transport, and thermodynamic properties related to cellulose dissolution by tetrabutylphosphonium chloride (TBPCl) and tetrabutylphosphonium hydroxide (TBPH)-water mixtures have been calculated via molecular dynamics simulations. For both ionic liquid (IL)-water solutions, water veins begin to form between the TBPs interlocking arms at 80 mol % water, opening a pathway for the diffusion of the anions, cations, and water. The water veins allow for a diffusion regime shift in the concentration region from 80 to 92.5 mol % water, providing a higher probability of solvent interaction with the dissolving cellulose strand. The hydrogen bonding was compared between small and large …
Android Game, Ryan Weston
Android Game, Ryan Weston
Williams Honors College, Honors Research Projects
The purpose of this project was to create an endless runner game for Android coded in Java and XML and developed in Android Studio. In the game, the player controls a frog that jumps from lily pad to lily pad to avoid logs moving toward the player. The player must also maneuver the lily pads as they can randomly disappear. There are three difficulties in the game that vary the disappearance rate of lily pads as well as the frequency and acceleration rate of the log obstacles. The game also has a scoring system and saves the high score locally …
Interaction, Collaboration And Content Creation In Informal Online Learning Environments: Multidimensional Analyses Of Longitudinal Data From The Scratch Coding Community, Seung B. Lee
Theses and Dissertations
Despite rising levels of participation by children and adolescents in large, informal online learning communities, there has been limited research examining the role that social dynamics play on the online behavior of young users. In this context, this mixed-methods longitudinal study aimed to investigate the relationship between interaction, collaboration and content creation through the analysis of user-generated comments and log-data from the Scratch platform. The research focused on more than 45,000 comments associated with the online activity of 200 randomly selected participants over a period of three months in early 2012. A combination of methodological techniques was applied in the …