Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (22)
- Systems Architecture (20)
- Graphics and Human Computer Interfaces (19)
- Accounting (17)
- Architecture (17)
-
- Art and Design (17)
- Arts and Humanities (17)
- Business Administration, Management, and Operations (17)
- Chemistry (17)
- Communication (17)
- Communication Technology and New Media (17)
- Corporate Finance (17)
- Economics (17)
- English Language and Literature (17)
- Graphic Design (17)
- Library and Information Science (17)
- Modern Languages (17)
- Public Economics (17)
- Social and Behavioral Sciences (17)
- Programming Languages and Compilers (14)
- Databases and Information Systems (7)
- Engineering (5)
- Technology and Innovation (5)
- Computer Engineering (4)
- OS and Networks (4)
- Applied Mathematics (2)
- Computer and Systems Architecture (2)
- Institution
-
- Singapore Management University (37)
- SelectedWorks (18)
- Selected Works (14)
- California Polytechnic State University, San Luis Obispo (10)
- Institute of Business Administration (5)
-
- City University of New York (CUNY) (3)
- University of Dayton (2)
- California State University, San Bernardino (1)
- DePaul University (1)
- Kennesaw State University (1)
- Old Dominion University (1)
- Sacred Heart University (1)
- San Jose State University (1)
- Technological University Dublin (1)
- The University of San Francisco (1)
- University of Nebraska - Lincoln (1)
- Western University (1)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (16)
- Services Computing (7)
- Model Check (5)
- Label Transition System (4)
- Linear Temporal Logic (4)
-
- Software engineering (4)
- Context (3)
- Net-Centric Collaboration (3)
- Ontology (3)
- Application software (2)
- Information Retrieval (2)
- Information-centric (2)
- Mobile computing (2)
- Model Check Algorithm (2)
- OWL (2)
- Performance (2)
- Software architecture (2)
- Statistical analysis (2)
- Strongly Connect Component (2)
- UML (2)
- Protégé (1)
- A SOLAR STILL AUGMENTED WITH A FLAT-PLATE COLLECTOR AND A REFLECTOR (1)
- APEX (1)
- Ad hoc network (1)
- Adaptive (1)
- Adaptive wireless scheduling QoS Heterogenous channel Buffer requirements Fairness (1)
- Adoption (1)
- Agents (1)
- Agile (1)
- An Ontology for the Quality Attributes of web services (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (37)
- Philadelphia University, Jordan (17)
- Jia Zhang (10)
- Collaborative Agent Design (CAD) Research Center (7)
- International Conference on Information and Communication Technologies (5)
-
- Master's Theses (3)
- Publications and Research (3)
- Computer Science Faculty Publications (2)
- Dr Shah Jahan Miah (2)
- Gabriel A. Moreno (2)
- Articles (1)
- Business Analytics and Information Systems (1)
- CSE Technical Reports (1)
- College of Computing and Digital Media Dissertations (1)
- Computer Engineering (1)
- Electrical and Computer Engineering Publications (1)
- Faculty and Research Publications (1)
- John Mark Ockerbloom (1)
- Mathematics & Statistics Faculty Publications (1)
- School of Computer Science & Engineering Faculty Publications (1)
- Theses Digitization Project (1)
- Publication Type
- File Type
Articles 1 - 30 of 99
Full-Text Articles in Software Engineering
Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong
Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong
Research Collection School Of Computing and Information Systems
Rapid development in hardware industry has brought the prevalence of multi-core systems with shared-memory, which enabled the speedup of various tasks by using parallel algorithms. The Linear Temporal Logic (LTL) model checking problem is one of the difficult problems to be parallelized or scaled up to multi-core. In this work, we propose an on-the-fly parallel model checking algorithm based on the Tarjan’s strongly connected components (SCC) detection algorithm. The approach can be applied to general LTL model checking or with different fairness assumptions. Further, it is orthogonal to state space reduction techniques like partial order reduction. We enhance our PAT …
Exercise Power Grid Display And Web Interface, Alexander (Alex) Chernetz
Exercise Power Grid Display And Web Interface, Alexander (Alex) Chernetz
Computer Engineering
The 2008-2009 expansion of the Recreation Center at Cal Poly includes three new rooms with cardiovascular fitness equipment. As part of its ongoing commitment to sustainable development, the new machines connect to the main power grid and generate power during a workout. This document explains the process of quantifying and expressing the power generated using two interfaces: an autonomous display designed for a television with a text size and amount of detail adaptable to multiple television sizes and viewing distances, and an interactive, more detailed Web interface accessible with any Java-capable computer system or browser.
Object Oriented Program Correctness With Oosiml, José M. Garrido
Object Oriented Program Correctness With Oosiml, José M. Garrido
Faculty and Research Publications
Software reliability depends on program correctness and robustness and these are extremely important in developing high-quality software. Correctness is also essential when considering aspects of software security. However, experience applying these concepts, associated methods, and supporting software with Eiffel and Java have shown that students find some diffculty learning program correctness and in learning the software tools provided. We have developed an experimental language, OOSimL, that includes an assertion notation similar to that of Eiffel but which has much more flexibility, and that provides the same semantics as Java.
The first part of this paper provides an overview of concepts …
Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan
Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
This paper presents an efficient and effective solution for retrieving image near-duplicate (IND) from image database. We introduce the coherent phrase model which incorporates the coherency of local regions to reduce the quantization error of the bag-of-words (BoW) model. In this model, local regions are characterized by visual phrase of multiple descriptors instead of visual word of single descriptor. We propose two types of visual phrase to encode the coherency in feature and spatial domain, respectively. The proposed model reduces the number of false matches by using this coherency and generates sparse representations of images. Compared to other method, the …
النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University
النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Pointcut Rejuvenation: Recovering Pointcut Expressions In Evolving Aspect-Oriented Software, Raffi T. Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Harry Xu
Pointcut Rejuvenation: Recovering Pointcut Expressions In Evolving Aspect-Oriented Software, Raffi T. Khatchadourian, Phil Greenwood, Awais Rashid, Guoqing Harry Xu
Publications and Research
Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. We present an automated approach that limits fragility problems by providing mechanical assistance in pointcut maintenance. The approach is based on harnessing arbitrarily deep structural commonalities between program elements corresponding to join points selected by a pointcut. The extracted patterns are then applied to later versions to offer suggestions of new join points that may require inclusion. We demonstrate the usefulness of our technique by rejuvenating pointcuts in multiple versions of several …
Mining Hierarchical Scenario-Based Specifications, David Lo, Shahar Maoz
Mining Hierarchical Scenario-Based Specifications, David Lo, Shahar Maoz
Research Collection School Of Computing and Information Systems
Scalability over long traces, as well as comprehensibility and expressivity of results, are major challenges for dynamic analysis approaches to specification mining. In this work we present a novel use of object hierarchies over traces of inter-object method calls, as an abstraction/refinement mechanism that enables user-guided, top-down or bottom-up mining of layered scenario-based specifications, broken down by hierarchies embedded in the system under investigation. We do this using data mining methods that provide statistically significant sound and complete results modulo user-defined thresholds, in the context of Damm and Harel’s live sequence charts (LSC); a visual, modal, scenario-based, inter-object language. Thus, …
Static Validation Of C Preprocessor Macros, Andreas Saebjornsen, Lingxiao Jiang, Daniel Quinlan, Zhendong Su
Static Validation Of C Preprocessor Macros, Andreas Saebjornsen, Lingxiao Jiang, Daniel Quinlan, Zhendong Su
Research Collection School Of Computing and Information Systems
The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CPP’s purely lexical semantics, i.e., its treatment of both input and output as token streams. This can easily lead to errors that are difficult to diagnose, and it has been estimated that up to 20% of all macros are erroneous. To reduce such errors, more restrictive, replacement languages for CPP have been proposed to limit expanded macros to be valid C syntactic units. However, there is no practical tool that can effectively validate CPP …
Minimum Latency Broadcasting In Multiradio, Multichannel, Multirate Wireless Meshes, Junaid Qadir, Chuntung Chou, Archan Misra, Joo Ghee Lim
Minimum Latency Broadcasting In Multiradio, Multichannel, Multirate Wireless Meshes, Junaid Qadir, Chuntung Chou, Archan Misra, Joo Ghee Lim
Research Collection School Of Computing and Information Systems
We address the problem of minimizing the worst-case broadcast delay in multi-radio multi-channel multi-rate (MR2-MC) wireless mesh networks (WMN). The problem of 'efficient' broadcast in such networks is especially challenging due to the numerous interrelated decisions that have to be made. The multi-rate transmission capability of WMN nodes, interference between wireless transmissions, and the hardness of optimal channel assignment adds complexity to our considered problem. We present four heuristic algorithms to solve the minimum latency broadcast problem for such settings and show that the 'best' performing algorithms usually adapt themselves to the available radio interfaces and channels. We also study …
Contributing Factors To Pointcut Fragility, Phil Greenwood, Awais Rashid, Raffi T. Khatchadourian
Contributing Factors To Pointcut Fragility, Phil Greenwood, Awais Rashid, Raffi T. Khatchadourian
Publications and Research
Pointcut fragility is a well-documented problem of Aspect-Oriented Programming with changes to the base-code causing join points to incorrectly fall in or out of scope. In order to combat this problem a tool was developed that provides mechanical assistance to pointcut maintenance. This tool relied on the deep structural commonalities between program elements to detect when pointcut fragility occurs. During the assessment of this tool a number of common practices were uncovered that were employed both in the aspect and base-code that contributed to or prevented pointcut fragility. This paper documents the practices uncovered and describes how they can affect …
Mining Quantified Temporal Rules: Formalism, Algorithms, And Evaluation, David Lo, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, Kapil Vaswani
Mining Quantified Temporal Rules: Formalism, Algorithms, And Evaluation, David Lo, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, Kapil Vaswani
Research Collection School Of Computing and Information Systems
Libraries usually impose constraints on how clients should use them. Often these constraints are not well-documented. In this paper, we address the problem of recovering such constraints automatically, a problem referred to as specification mining. Given some client programs that use a given library, we identify constraints on the library usage that are (almost) satisfied by the given set of clients.The class of rules we target for mining combines simple binary temporal operators with state predicates (involving equality constraints) and quantification. This is a simple yet expressive subclass of temporal properties that allows us to capture many common API usage …
Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan
Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In this paper, we consider the scheduling problem where data packets from K input-flows need to be delivered to K corresponding wireless receivers over a heterogeneous wireless channel. Our objective is to design a wireless scheduler that achieves good throughput and fairness performance while minimizing the buffer requirement at each wireless receiver. This is a challenging problem due to the unique characteristics of the wireless channel. We propose a novel idea of exploiting both the long-term and short-term error behavior of the wireless channel in the scheduler design. In addition to typical first-order Quality of Service (QoS) metrics such as …
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Verifying Stateful Timed Csp Using Implicit Clocks And Zone Abstraction, Jun Sun, Yang Liu, Jin Song Dong, Xian Zhang
Verifying Stateful Timed Csp Using Implicit Clocks And Zone Abstraction, Jun Sun, Yang Liu, Jin Song Dong, Xian Zhang
Research Collection School Of Computing and Information Systems
In this work, we study model checking of compositional real-time systems. A system is modeled using mutable data variables as well as a compositional timed process. Instead of explicitly manipulating clock variables, a number of compositional timed behavioral patterns are used to capture quantitative timing requirements, e.g. delay, timeout, deadline, timed interrupt, etc. A fully automated abstraction technique is developed to build an abstract finite state machine from the model. The idea is to dynamically create/delete clocks, and maintain/solve a constraint on the clocks. The abstract machine weakly bi-simulates the model and, therefore, LTL model checking or trace-refinement checking are …
Refactoring Pipe-Like Mashups For End-User Programmers, Kathryn T. Stolee, Sebastian Elbaum
Refactoring Pipe-Like Mashups For End-User Programmers, Kathryn T. Stolee, Sebastian Elbaum
CSE Technical Reports
Mashups are becoming increasingly popular as end users are able to easily access, manipulate, and compose data from many web sources. We have observed, however, that mashups tend to suffer from deficiencies that propagate as mashups are reused. To address these deficiencies, we would like to bring some of the benefits of software engineering techniques to the end users creating these programs. In this work, we focus on identifying code smells indicative of the deficiencies we observed in web mashups programmed in the popular Yahoo! Pipes environment. Through an empirical study, we explore the impact of those smells on end-user …
Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov
Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov
Computer Science Faculty Publications
Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary arrivals, which are often present in real systems, residual-based sampling does not correctly reconstruct user lifetimes and suffers a varying degree of bias, which in some cases makes estimation completely impossible. We overcome this problem using two contributions: a …
Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma
Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma
Research Collection School Of Computing and Information Systems
Future Generation CDMA wireless systems, e.g., 3G, can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As radio resources are limited, we propose an admission control rule that protects users with stringent transmission bit-rate requirements (“streaming traffic”) while offering sufficient capacity over longer time intervals to delay-tolerant users (“elastic traffic”). While our strategy may not satisfy classical notions of fairness, we aim to reduce congestion and increase overall throughput of elastic users. Using time-scale decomposition, we develop approximations to evaluate the performance of our differentiated admission control strategy to support integrated services with transmission bit-rate requirements in a …
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Jia Zhang
Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …
Using Bpm As An Interoperability Platform, Dennis Taylor, Hisham Assal, Jens G. Pohl
Using Bpm As An Interoperability Platform, Dennis Taylor, Hisham Assal, Jens G. Pohl
Collaborative Agent Design (CAD) Research Center
Data mediation is an essential component in the Modeling and Simulation field (M&S). Managing multiple data sources and exchanging data among multiple systems requires sophisticated tools and a powerful process management system. Business Process Management (BPM) provides a framework for modeling and managing business activities, both manual and automated, in a consistent manner. Managing automated processes offers an opportunity to integrate external applications into the platform. By integrating automated data transformation tools into the business processes using graphical programming, we provide an approach to achieve operational interoperability among diverse applications without the need for any application to be aware of …
Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani
Software Engineering: Security Characterization For Evaluation Of Software Architectures Using Atam, Asad Raza, Haider Abbas, Louise Yngstrom, Ahmed Hemani
International Conference on Information and Communication Technologies
Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a Web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural …
Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
Software Engineering: An Open Source Service Oriented Mobile Business Intelligence Tool (Mbit), Bushra Sajjad, A. Mir, A. Khawar, F. Bashir, A. Tariq
International Conference on Information and Communication Technologies
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to …
Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum
Software Engineering: A Pattern For The Effective Use Of Object Oriented Databases, Muhammad Ubaid, Nauman Atique, Saira Begum
International Conference on Information and Communication Technologies
In object oriented scenario, inheritance is a process to make new classes by using classes that have already been defined. Inheritance helps to reuse existing code, by adding together of properties will enhance all new child objects without interfering with their existing ties. In object-oriented programming, an object is instance of class that consists of data and the methods, allows binding for them and operate on that data, stored in the memory of a running application. This paper presents a methodology of class hierarchy with the normalization in object oriented databases. CHNF (class hierarchy normal form) is good concept for …
Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang
Application Of Ict Ii: Considerations On The Validity Constraints For The Bistatic Sar Processing, Qurat Ul-Ann, Otmar Loffeld, Holger Nies, Robert Wang
International Conference on Information and Communication Technologies
This paper gives some considerations on the validity constraints for spaceborne/airborne configurations, based on Loffeld's bistatic formula (LBF) for unequal azimuth contribution of transmitter and receiver phase terms.
Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan
Software Engineering: Application Of 80/20 Rule In Software Engineering Waterfall Model, Muzaffar Iqbal, Muhammad Rizwan
International Conference on Information and Communication Technologies
Software process is the most important part of software project management, and software process models are important means of implementing the software process in any software organization. When there is need to improve the software process, then the need to improve the work-task part (software process models) of the software process must arise. As, there is need of increasing the commitment of software project managers through out the software development life cycle (SDLC), so we need to give them the list of activities in Waterfall Model, which should be made efficient by the software development team, to get the 80% …
Decision Making, Philadelphia University
Decision Making, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
End User As Application Developer For Decision Support, Shah Jahan Miah
End User As Application Developer For Decision Support, Shah Jahan Miah
Dr Shah Jahan Miah
This paper discusses a new generation end-user centred information service view, for developing decision support applications. The tailorable solution allows specific applications to be designed by end-users, where integrity is assured by the architecture’s control in knowledge-based systems. In the development approach, the end-users at different level engage in interaction for secondary application creation. This initiative reinforces a shift from the traditional IS development process to a new provision where end-users can actively participate for a secondary application design. A secondary application design can be seen as a secondary activity for tailoring applications by the end users so that it …
Conveyance Estimator Ontology: Conceptual Models And Object Models, Xiaoshan Pan, Jens G. Pohl
Conveyance Estimator Ontology: Conceptual Models And Object Models, Xiaoshan Pan, Jens G. Pohl
Collaborative Agent Design (CAD) Research Center
This paper proposes the construction of a Conceptual Model as a logical step prior to the preparation of the Object Model of an ontology to facilitate the design and development of software systems in which a high-level internal representation of context supports some intelligent capabilities. The intent of the Conceptual Model is to be expressive for human interpretation utilizing descriptions that are readily understood by laypersons, subject matter experts, and software developers who may be concerned with only a particular portion of the software system. The intent of the Object Model (as a subset of an ontology) is to be …
Increasing The Expressiveness Of Owl Through Procedural Attachments, Dennis Taylor, Jens G. Pohl
Increasing The Expressiveness Of Owl Through Procedural Attachments, Dennis Taylor, Jens G. Pohl
Collaborative Agent Design (CAD) Research Center
The purpose of this paper is to provide an introduction to the OWL Web ontology language, a survey focused on the current state of the art in OWL inferencing capabilities, and a historical perspective on procedural attachments. The perspective is aligned with current OWL research. Several limitations of the OWL language and proposed extensions to overcome these limitations are discussed. A framework that provides empirical testing support for evaluating the effects of procedural attachments to the OWL inferencing capabilities is outlined. The examples presented suggest that it is possible to provide rule-based extensibility support for OWL that does not limit …
Pre-Conference Proceedings Of The Focus Symposium On Knowledge Management Systems, Jens G. Pohl
Pre-Conference Proceedings Of The Focus Symposium On Knowledge Management Systems, Jens G. Pohl
Collaborative Agent Design (CAD) Research Center
No abstract provided.