Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (280)
- Programming Languages and Compilers (272)
- Databases and Information Systems (263)
- Computer Engineering (205)
- Information Security (128)
-
- Artificial Intelligence and Robotics (109)
- OS and Networks (107)
- Graphics and Human Computer Interfaces (102)
- Numerical Analysis and Scientific Computing (94)
- Social and Behavioral Sciences (94)
- Theory and Algorithms (89)
- Systems Architecture (83)
- Business (65)
- Other Computer Sciences (59)
- Computer and Systems Architecture (54)
- Electrical and Computer Engineering (51)
- Environmental Sciences (42)
- Digital Communications and Networking (41)
- Education (41)
- Medicine and Health Sciences (39)
- Operations Research, Systems Engineering and Industrial Engineering (39)
- Systems Engineering (29)
- Communication (28)
- Oil, Gas, and Energy (28)
- Technology and Innovation (27)
- Nuclear Engineering (24)
- Public Affairs, Public Policy and Public Administration (22)
- Institution
-
- Singapore Management University (1610)
- Western University (127)
- California Polytechnic State University, San Luis Obispo (108)
- City University of New York (CUNY) (77)
- University of Nebraska - Lincoln (36)
-
- University of Nevada, Las Vegas (31)
- Loyola University Chicago (30)
- Old Dominion University (28)
- University of Tennessee, Knoxville (28)
- Portland State University (25)
- University of Dayton (22)
- Rochester Institute of Technology (21)
- Technological University Dublin (17)
- Florida International University (13)
- Sheridan College (13)
- University of Texas at El Paso (13)
- Western Kentucky University (13)
- San Jose State University (12)
- Chapman University (11)
- Embry-Riddle Aeronautical University (10)
- Air Force Institute of Technology (9)
- Purdue University (9)
- The University of San Francisco (9)
- Syracuse University (8)
- Edith Cowan University (7)
- Fordham University (5)
- Liberty University (5)
- Dakota State University (4)
- Kennesaw State University (4)
- Aga Khan University (3)
- Keyword
-
- Software engineering (72)
- Deep learning (44)
- Machine learning (43)
- Software (42)
- Empirical study (35)
-
- Android (31)
- Refactoring (31)
- Model Check (29)
- Software Engineering (29)
- Java (23)
- Deep Learning (22)
- Programming (22)
- Security (21)
- Software maintenance (21)
- Software testing (20)
- Testing (20)
- Data mining (18)
- Computer bugs (17)
- GitHub (17)
- Code search (16)
- Collaboration (16)
- Computer science (16)
- Software development (16)
- Software quality (16)
- Agents (15)
- Empirical Study (15)
- Ontology (15)
- Stack Overflow (15)
- Design (14)
- Empirical software engineering (14)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (1598)
- Electrical and Computer Engineering Publications (127)
- Collaborative Agent Design (CAD) Research Center (103)
- Publications and Research (56)
- Articles (29)
-
- Computer Science: Faculty Publications and Other Works (29)
- Computer Science Faculty Publications (28)
- The Harlan D. Mills Collection (25)
- Separations Campaign (TRP) (24)
- Computer Science Faculty Publications and Presentations (21)
- Open Educational Resources (21)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (17)
- Faculty Publications (15)
- Departmental Technical Reports (CS) (13)
- FIU Electronic Theses and Dissertations (13)
- Publications (13)
- Publications and Scholarship (13)
- Masters Theses & Specialist Projects (10)
- Business Analytics and Information Systems (9)
- Department of Electrical and Computer Engineering Faculty Publications (8)
- Honors Theses (8)
- Computational Modeling & Simulation Engineering Faculty Publications (7)
- Engineering Faculty Articles and Research (6)
- Mathematics & Statistics Faculty Publications (6)
- Research outputs 2014 to 2021 (6)
- Engineering Management & Systems Engineering Faculty Publications (5)
- MITB Thought Leadership Series (5)
- Senior Honors Theses (5)
- Faculty Publications, Computer Science (4)
- Faculty Research & Publications (4)
- File Type
Articles 1 - 30 of 2377
Full-Text Articles in Software Engineering
Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He
Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He
Research Collection School Of Computing and Information Systems
Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
Research Collection School Of Computing and Information Systems
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate detection systems. Heart rate is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable heart rate monitoring with wearable devices has therefore gained increasing attention in recent years. Existing heart rate detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik
Ocean Engineering and Marine Sciences Faculty Publications
Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …
Redriver: Runtime Enforcement For Autonomous Vehicles, Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun
Redriver: Runtime Enforcement For Autonomous Vehicles, Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun
Research Collection School Of Computing and Information Systems
Autonomous driving systems (ADSs) integrate sensing, perception, drive control, and several other critical tasks in autonomous vehicles, motivating research into techniques for assessing their safety. While there are several approaches for testing and analysing them in high-fidelity simulators, ADSs may still encounter additional critical scenarios beyond those covered once they are deployed on real roads. An additional level of confidence can be established by monitoring and enforcing critical properties when the ADS is running. Existing work, however, is only able to monitor simple safety properties (e.g., avoidance of collisions) and is limited to blunt enforcement mechanisms such as hitting the …
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen
Research Collection School Of Computing and Information Systems
Code review is an essential activity for ensuring the quality and maintainability of software projects. However, it is a time-consuming and often error-prone task that can significantly impact the development process. Recently, ChatGPT, a cutting-edge language model, has demonstrated impressive performance in various natural language processing tasks, suggesting its potential to automate code review processes. However, it is still unclear how well ChatGPT performs in code review tasks. To fill this gap, in this paper, we conduct the first empirical study to understand the capabilities of ChatGPT in code review tasks, specifically focusing on automated code refinement based on given …
Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin
Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin
Research Collection School Of Computing and Information Systems
Concolic execution is a powerful program analysis technique for code path exploration. Despite recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the …
Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen
Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen
Research Collection School Of Computing and Information Systems
The rapid progress of autonomous vehicles (AVs) has brought the prospect of a driverless future closer than ever. Recent fatalities, however, have emphasized the importance of safety validation through large-scale testing. Multiple approaches achieve this fully automatically using high-fidelity simulators, i.e., by generating diverse driving scenarios and evaluating autonomous driving systems (ADSs) against different test oracles. While effective at finding violations, these approaches do not identify the decisions and actions that caused them -- information that is critical for improving the safety of ADSs. To address this challenge, we propose ACAV, an automated framework designed to conduct causality analysis for …
The Social Pot: A Social Media Application, Reid Long
The Social Pot: A Social Media Application, Reid Long
ASPIRE 2024
The Social Pot is a web application that allows a user to post to Instagram and X simultaneously from one place. The user creates a Social Pot Account and from there can set their Instagram username and password within the home page. Once the user attempts to post, it will redirect them to login to X which once successful will make the tweet. Used the API 'instagram-private-api'. User needed to give access to my X Project which in turn gave an Auth token (via X redirect URL). The auth token was then sent to my endpoint in order to get …
Terry Riley's "In C" For Mobile Ensemble, David B. Wetzel, Griffin Moe, George K. Thiruvathukal
Terry Riley's "In C" For Mobile Ensemble, David B. Wetzel, Griffin Moe, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
This workshop presents a mobile-friendly Web Audio application for a “technology ensemble play-along” of Terry Riley’s 1964 composition In C. Attendees will join in a reading of In C using available web-enabled devices as musical instruments. We hope to demonstrate an accessible music-technology experience that relies on face-to-face interaction within a shared space. In this all-electronic implementation, no special musical or technical expertise is required.
Accepted for presentation and publication at WAC 2024.
Fixing Your Own Smells: Adding A Mistake-Based Familiarization Step When Teaching Code Refactoring, Ivan Wei Han Tan, Christopher M. Poskitt
Fixing Your Own Smells: Adding A Mistake-Based Familiarization Step When Teaching Code Refactoring, Ivan Wei Han Tan, Christopher M. Poskitt
Research Collection School Of Computing and Information Systems
Programming problems can be solved in a multitude of functionally correct ways, but the quality of these solutions (e.g. readability, maintainability) can vary immensely. When code quality is poor, symptoms emerge in the form of 'code smells', which are specific negative characteristics (e.g. duplicate code) that can be resolved by applying refactoring patterns. Many undergraduate computing curricula train students on this software engineering practice, often doing so via exercises on unfamiliar instructor-provided code. Our observation, however, is that this makes it harder for novices to internalise refactoring as part of their own development practices. In this paper, we propose a …
Ditmos: Delving Into Diverse Tiny-Model Selection On Microcontrollers, Xiao Ma, Shengfeng He, Hezhe Qiao, Dong Ma
Ditmos: Delving Into Diverse Tiny-Model Selection On Microcontrollers, Xiao Ma, Shengfeng He, Hezhe Qiao, Dong Ma
Research Collection School Of Computing and Information Systems
Enabling efficient and accurate deep neural network (DNN) inference on microcontrollers is non-trivial due to the constrained on-chip resources. Current methodologies primarily focus on compressing larger models yet at the expense of model accuracy. In this paper, we rethink the problem from the inverse perspective by constructing small/weak models directly and improving their accuracy. Thus, we introduce DiTMoS, a novel DNN training and inference framework with a selectorclassifiers architecture, where the selector routes each input sample to the appropriate classifier for classification. DiTMoS is grounded on a key insight: a composition of weak models can exhibit high diversity and the …
Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games, Daniel L. Gardner, Louanne Boyd, Reginald T. Gardner
Piecing Together Performance: Collaborative, Participatory Research-Through-Design For Better Diversity In Games, Daniel L. Gardner, Louanne Boyd, Reginald T. Gardner
Engineering Faculty Articles and Research
Digital games are a multi-billion-dollar industry whose production and consumption extend globally. Representation in games is an increasingly important topic. As those who create and consume the medium grow ever more diverse, it is essential that player or user-experience research, usability, and any consideration of how people interface with their technology is exercised through inclusive and intersectional lenses. Previous research has identified how character configuration interfaces preface white-male defaults [39, 40, 67]. This study relies on 1-on-1 play-interviews where diverse participants attempt to create “themselves” in a series of games and on group design activities to explore how participants may …
Remote Multi-Person Heart Rate Monitoring With Smart Speakers: Overcoming Separation Constraint, Ngoc Doan Thu Tran, Dong Ma, Rajesh Krishna Balan
Remote Multi-Person Heart Rate Monitoring With Smart Speakers: Overcoming Separation Constraint, Ngoc Doan Thu Tran, Dong Ma, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
Heart rate is a key vital sign that can be used to understand an individual’s health condition. Recently, remote sensing techniques, especially acoustic-based sensing, have received increasing attention for their ability to non-invasively detect heart rate via commercial mobile devices such as smartphones and smart speakers. However, due to signal interference, existing methods have primarily focused on monitoring a single user and required a large separation between them when monitoring multiple people. These limitations hinder many common use cases such as couples sharing the same bed or two or more people located in close proximity. In this paper, we present …
Provably Secure Decisions Based On Potentially Malicious Information, Dongxia Wang, Tim Muller, Jun Sun
Provably Secure Decisions Based On Potentially Malicious Information, Dongxia Wang, Tim Muller, Jun Sun
Research Collection School Of Computing and Information Systems
There are various security-critical decisions routinely made, on the basis of information provided by peers: routing messages, user reports, sensor data, navigational information, blockchain updates, etc. Jury theorems were proposed in sociology to make decisions based on information from peers, which assume peers may be mistaken with some probability. We focus on attackers in a system, which manifest as peers that strategically report fake information to manipulate decision making. We define the property of robustness: a lower bound probability of deciding correctly, regardless of what information attackers provide. When peers are independently selected, we propose an optimal, robust decision mechanism …
Active Code Learning: Benchmarking Sample-Efficient Training Of Code Models, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Active Code Learning: Benchmarking Sample-Efficient Training Of Code Models, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Research Collection School Of Computing and Information Systems
The costly human effort required to prepare the training data of machine learning (ML) models hinders their practical development and usage in software engineering (ML4Code), especially for those with limited budgets. Therefore, efficiently training models of code with less human effort has become an emergent problem. Active learning is such a technique to address this issue that allows developers to train a model with reduced data while producing models with desired performance, which has been well studied in computer vision and natural language processing domains. Unfortunately, there is no such work that explores the effectiveness of active learning for code …
Learning An Interpretable Stylized Subspace For 3d-Aware Animatable Artforms, Chenxi Zheng, Bangzhen Liu, Xuemiao Xu, Huaidong Zhang, Shengfeng He
Learning An Interpretable Stylized Subspace For 3d-Aware Animatable Artforms, Chenxi Zheng, Bangzhen Liu, Xuemiao Xu, Huaidong Zhang, Shengfeng He
Research Collection School Of Computing and Information Systems
Throughout history, static paintings have captivated viewers within display frames, yet the possibility of making these masterpieces vividly interactive remains intriguing. This research paper introduces 3DArtmator, a novel approach that aims to represent artforms in a highly interpretable stylized space, enabling 3D-aware animatable reconstruction and editing. Our rationale is to transfer the interpretability and 3D controllability of the latent space in a 3D-aware GAN to a stylized sub-space of a customized GAN, revitalizing the original artforms. To this end, the proposed two-stage optimization framework of 3DArtmator begins with discovering an anchor in the original latent space that accurately mimics the …
Big Code Search: A Bibliography, Kisub Kim, Sankalp Ghatpande, Dongsun Kim, Xin Zhou, Kui Liu, Tegawende F. Bissyande, Jacques Klein, Traon Yves Le
Big Code Search: A Bibliography, Kisub Kim, Sankalp Ghatpande, Dongsun Kim, Xin Zhou, Kui Liu, Tegawende F. Bissyande, Jacques Klein, Traon Yves Le
Research Collection School Of Computing and Information Systems
Code search is an essential task in software development. Developers often search the internet and other code databases for necessary source code snippets to ease the development efforts. Code search techniques also help learn programming as novice programmers or students can quickly retrieve (hopefully good) examples already used in actual software projects. Given the recurrence of the code search activity in software development, there is an increasing interest in the research community. To improve the code search experience, the research community suggests many code search tools and techniques. These tools and techniques leverage several different ideas and claim a better …
Clearspeech: Improving Voice Quality Of Earbuds Using Both In-Ear And Out-Ear Microphones, Dong Ma, Ting Dang, Ming Ding, Rajesh Krishna Balan
Clearspeech: Improving Voice Quality Of Earbuds Using Both In-Ear And Out-Ear Microphones, Dong Ma, Ting Dang, Ming Ding, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
Wireless earbuds have been gaining increasing popularity and using them to make phone calls or issue voice commands requires the earbud microphones to pick up human speech. When the speaker is in a noisy environment, speech quality degrades significantly and requires speech enhancement (SE). In this paper, we present ClearSpeech, a novel deep-learningbased SE system designed for wireless earbuds. Specifically, by jointly using the earbud’s in-ear and out-ear microphones, we devised a suite of techniques to effectively fuse the two signals and enhance the magnitude and phase of the speech spectrogram. We built an earbud prototype to evaluate ClearSpeech under …
Conversational Localization: Indoor Human Localization Through Intelligent Conversation, Sheshadri Smitha, Kotaro Hara
Conversational Localization: Indoor Human Localization Through Intelligent Conversation, Sheshadri Smitha, Kotaro Hara
Research Collection School Of Computing and Information Systems
We propose a novel sensorless approach to indoor localization by leveraging natural language conversations with users, which we call conversational localization. To show the feasibility of conversational localization, we develop a proof-of-concept system that guides users to describe their surroundings in a chat and estimates their position based on the information they provide. We devised a modular architecture for our system with four modules. First, we construct an entity database with available image-based floor maps. Second, we enable the dynamic identification and scoring of information provided by users through our utterance processing module. Then, we implement a conversational agent that …
Stealthy Backdoor Attack For Code Models, Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo
Stealthy Backdoor Attack For Code Models, Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo
Research Collection School Of Computing and Information Systems
Code models, such as CodeBERT and CodeT5, offer general-purpose representations of code and play a vital role in supporting downstream automated software engineering tasks. Most recently, code models were revealed to be vulnerable to backdoor attacks. A code model that is backdoor-attacked can behave normally on clean examples but will produce pre-defined malicious outputs on examples injected with that activate the backdoors. Existing backdoor attacks on code models use unstealthy and easy-to-detect triggers. This paper aims to investigate the vulnerability of code models with backdoor attacks. To this end, we propose A (dversarial eature as daptive Back). A achieves stealthiness …
Conceptthread: Visualizing Threaded Concepts In Mooc Videos, Zhiguang Zhou, Li Ye, Lihong Cai, Lei Wang, Yigang Wang, Yongheng Wang, Wei Chen, Yong Wang
Conceptthread: Visualizing Threaded Concepts In Mooc Videos, Zhiguang Zhou, Li Ye, Lihong Cai, Lei Wang, Yigang Wang, Yongheng Wang, Wei Chen, Yong Wang
Research Collection School Of Computing and Information Systems
Massive Open Online Courses (MOOCs) platforms are becoming increasingly popular in recent years. Online learners need to watch the whole course video on MOOC platforms to learn the underlying new knowledge, which is often tedious and time-consuming due to the lack of a quick overview of the covered knowledge and their structures. In this paper, we propose ConceptThread , a visual analytics approach to effectively show the concepts and the relations among them to facilitate effective online learning. Specifically, given that the majority of MOOC videos contain slides, we first leverage video processing and speech analysis techniques, including shot recognition, …
Μakka: Mutation Testing For Actor Concurrency In Akka Using Real-World Bugs, Mohsen Moradi Moghadam, Mehdi Bagherzadeh, Raffi Takvor Khatchadourian Ph,D,, Hamid Bagheri
Μakka: Mutation Testing For Actor Concurrency In Akka Using Real-World Bugs, Mohsen Moradi Moghadam, Mehdi Bagherzadeh, Raffi Takvor Khatchadourian Ph,D,, Hamid Bagheri
Publications and Research
Actor concurrency is becoming increasingly important in the real-world and mission-critical software. This requires these applications to be free from actor bugs, that occur in the real world, and have tests that are effective in finding these bugs. Mutation testing is a well-established technique that transforms an application to induce its likely bugs and evaluate the effectiveness of its tests in finding these bugs. Mutation testing is available for a broad spectrum of applications and their bugs, ranging from web to mobile to machine learning, and is used at scale in companies like Google and Facebook. However, there still is …
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce
Electrical and Computer Engineering Publications
To enable lower-cost building materials, a free-swinging bifacial vertical solar photovoltaic (PV) rack has been proposed, which complies with Canadian building codes and is the lowest capital-cost agrivoltaics rack. The wind force applied to the free-swinging PV, however, causes it to have varying tilt angles depending on the wind speed and direction. No energy performance model accurately describes such a system. To provide a simulation model for the free-swinging PV, where wind speed and direction govern the array tilt angle, this study builds upon the open-source System Advisor Model (SAM) using Python. After the SAM python model is validated, a …
C³: Code Clone-Based Identification Of Duplicated Components, Yanming Yang, Ying Zou, Xing Hu, David Lo, Chao Ni, John C. Grundy, Xin: Xia
C³: Code Clone-Based Identification Of Duplicated Components, Yanming Yang, Ying Zou, Xing Hu, David Lo, Chao Ni, John C. Grundy, Xin: Xia
Research Collection School Of Computing and Information Systems
Reinventing the wheel is a detrimental programming practice in software development that frequently results in the introduction of duplicated components. This practice not only leads to increased maintenance and labor costs but also poses a higher risk of propagating bugs throughout the system. Despite numerous issues introduced by duplicated components in software, the identification of component-level clones remains a significant challenge that existing studies struggle to effectively tackle. Specifically, existing methods face two primary limitations that are challenging to overcome: 1) Measuring the similarity between different components presents a challenge due to the significant size differences among them; 2) Identifying …
How Helpful Do Novice Programmers Find The Feedback Of An Automated Repair Tool?, Oka Kurniawan, Christopher M. Poskitt, Ismam Al Hoque, Norman Tiong Seng Lee, Cyrille Jégourel, Nachamma Sockalingam
How Helpful Do Novice Programmers Find The Feedback Of An Automated Repair Tool?, Oka Kurniawan, Christopher M. Poskitt, Ismam Al Hoque, Norman Tiong Seng Lee, Cyrille Jégourel, Nachamma Sockalingam
Research Collection School Of Computing and Information Systems
Immediate feedback has been shown to improve student learning. In programming courses, immediate, automated feedback is typically provided in the form of pre-defined test cases run by a submission platform. While these are excellent for highlighting the presence of logical errors, they do not provide novice programmers enough scaffolding to help them identify where an error is or how to fix it. To address this, several tools have been developed that provide richer feedback in the form of program repairs. Studies of such tools, however, tend to focus more on whether correct repairs can be generated, rather than how novices …
Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh
Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
Class participation can be considered as contribution to discussion, attendance, presentations, unsolicited responses, questions, comments, etc. What counts may vary across individual teachers. The more students participate, the less memorization they do, and the more they engage in higher levels of thinking, including interpretation, analysis, and synthesis. However, only a handful of students in many classrooms participate regularly, a phenomenon dubbed as "consolidation of responsibility". This study provides a literature review of inclass participation, as well as pedagogies and technologies that enhance participation. Pedagogies such as active learning, group learning, project-based learning and flipped classroom. Technologies to automate attendance taking, …
Sustainability Projects With A Community Partner: A Social Norm Nudging Effort, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh
Sustainability Projects With A Community Partner: A Social Norm Nudging Effort, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
Singapore students from two inter-disciplinary courses worked with stakeholders of a local business association community partner on a series of sustainability topics to learn about climate change, its effects, and actions to mitigate them. They empathized with the association stakeholders, proposed a digital technology solution, tested their prototypes, and presented the final action plans. After the projects were completed, we found climate proficient (83%), motivated (83%), engaged (97%), and satisfied (70%) students; and two influencing predictors: interest/enjoyment and emotional engagement. The study results suggest that getting students interested and emotionally engaged in sustainability projects is an important first step towards …
Software Architecture In Practice: Challenges And Opportunities, Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo
Software Architecture In Practice: Challenges And Opportunities, Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo
Research Collection School Of Computing and Information Systems
Software architecture has been an active research field for nearly four decades, in which previous studies make significant progress such as creating methods and techniques and building tools to support software architecture practice. Despite past efforts, we have little understanding of how practitioners perform software architecture related activities, and what challenges they face. Through interviews with 32 practitioners from 21 organizations across three continents, we identified challenges that practitioners face in software architecture practice during software development and maintenance. We reported on common software architecture activities at software requirements, design, construction and testing, and maintenance stages, as well as corresponding …
Adaptable Object And Animation System For Game Development, Isaiah Turner
Adaptable Object And Animation System For Game Development, Isaiah Turner
Masters Theses & Specialist Projects
In contemporary times, video games have swiftly evolved into a prominent medium, excelling in both entertainment and narrative delivery, positioning themselves as significant rivals to traditional forms such as film and theater. The burgeoning popularity of gaming has led to a surge in aspiring game developers seeking to craft their own creations, driven by both commercial aspirations and personal passion. However, a common challenge faced by these individuals involves the considerable time investment required to acquire essential skills and establish a foundational framework for their projects. Accessible game development engines that offer a diverse range of fundamental features play a …