Open Access. Powered by Scholars. Published by Universities.®

Programming Languages and Compilers Commons

Open Access. Powered by Scholars. Published by Universities.®

959 Full-Text Articles 1,220 Authors 329,509 Downloads 116 Institutions

All Articles in Programming Languages and Compilers

Faceted Search

959 full-text articles. Page 1 of 31.

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng XIA, Reshika P. VELUMANI, Yong WANG, Huamin QU, Xiaojuan MA 2021 Singapore Management University

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng Xia, Reshika P. Velumani, Yong Wang, Huamin Qu, Xiaojuan Ma

Research Collection School Of Computing and Information Systems

With the rapid development of online education in recent years, there has been an increasing number of learning platforms that provide students with multi-step questions to cultivate their problem-solving skills. To guarantee the high quality of such learning materials, question designers need to inspect how students’ problem-solving processes unfold step by step to infer whether students’ problem-solving logic matches their design intent. They also need to compare the behaviors of different groups (e.g., students from different grades) to distribute questions to students with the right level of knowledge. The availability of fine-grained interaction data, such as mouse movement trajectories ...


Did George Orwell’S Newspeak Have A Point?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo 2021 University of Pennsylvania Carey Law School

Did George Orwell’S Newspeak Have A Point?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo

Faculty Scholarship at Penn Law

To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated ...


Sciviewer Enables Interactive Visual Interrogation Of Single-Cell Rna-Seq Data From The Python Programming Environment [Preprint], Dylan Kotliar, Andres Colubri 2021 Massachusetts Institute of Technology

Sciviewer Enables Interactive Visual Interrogation Of Single-Cell Rna-Seq Data From The Python Programming Environment [Preprint], Dylan Kotliar, Andres Colubri

University of Massachusetts Medical School Faculty Publications

Visualizing two-dimensional (2D) embeddings (e.g. UMAP or tSNE) is a key step in interrogating single-cell RNA sequencing (scRNA-Seq) data. Subsequently, users typically iterate between programmatic analyses (e.g. clustering and differential expression) and visual exploration (e.g. coloring cells by interesting features) to uncover biological signals in the data. Interactive tools exist to facilitate visual exploration of embeddings such as performing differential expression on user-selected cells. However, the practical utility of these tools is limited because they don’t support rapid movement of data and results to and from the programming environments where the bulk of data analysis takes ...


Teaching Students How To Code Qualitative Data: An Experiential Activity Sequence For Training Novice Educational Researchers, Jennifer E. Lineback 2021 Point Loma Nazarene University

Teaching Students How To Code Qualitative Data: An Experiential Activity Sequence For Training Novice Educational Researchers, Jennifer E. Lineback

University of South Florida M3 Center Publishing

Coursework on qualitative research methods is common in many collegiate departments, including psychology, nursing, sociology, and education. Instructors for these courses must identify meaningful activities to support their students’ learning of the domain. This paper presents the components of an experiential activity sequence centered on coding and coding scheme development. Each of the three component activities of this sequence is elaborated, as are the students’ experiences during their participation in the activities. Additionally, the issues concerning coding and coding scheme development that typically emerge from students’ participation in these activities are discussed. Results from implementations of both in-person (face-to-face) and ...


Teaching Coding In A Virtual Environment: Overcoming Challenges, Marion S. Smith 2021 Texas Southern University

Teaching Coding In A Virtual Environment: Overcoming Challenges, Marion S. Smith

Southwestern Business Administration Journal

Educational research suggests that teaching techniques are subject matter specific. Teaching techniques in introductory programming classes are centered around two approaches used by students in learning. One approach is where students develop a thorough understanding of what they are learning. This is referred to as “deep learning”. Other students use a “surface approach” where they perform the tasks required from them. The persona of the instructor and the choice of instructional materials used within a class determines which approach the student will adopt. Active teaching techniques fosters “deep learning”. With the need to adapt active teaching techniques to a virtual ...


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja 2021 CUNY Graduate Center

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed ...


Asynchronous Validations Using Programming Contracts In Java, Rahul Shukla 2021 San Jose State University

Asynchronous Validations Using Programming Contracts In Java, Rahul Shukla

Master's Projects

Design by Contract is a software development methodology based on the idea of having contracts between two software components. Programming contracts are invariants specified as pre-conditions and post-conditions. The client component must ensure that all the pre-conditions are satisfied before calling the server component. The server component must guarantee the post-conditions are met before the call returns to the client component. Current work in Design by Contract in Java focuses on writing shorthand contracts using annotations that are processed serially.

Modern software systems require a lot of business rules validations on complicated domain objects. Often, such validations are in the ...


City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke 2021 University of Arkansas, Fayetteville

City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke

Computer Science and Computer Engineering Undergraduate Honors Theses

Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to ...


Visual Analysis Of Historical Lessons Learned During Exercises For The United States Air Force Europe (Usafe), Samantha O'Rourke 2021 University of Nebraska at Omaha

Visual Analysis Of Historical Lessons Learned During Exercises For The United States Air Force Europe (Usafe), Samantha O'Rourke

Theses/Capstones/Creative Projects

Within the United States Air Force, there are repeated patterns of differences observed during exercises. After an exercise is completed, forms are filled out detailing observations, successes, and recommendations seen throughout the exercise. At the most, no two reports are identical and must be analyzed by personnel and then categorized based on common themes observed. Developing a computer application will greatly reduce the time and resources used to analyze each After Action Report. This application can visually represent these observations and optimize the effectiveness of these exercises. The visualization is done through graphs displaying the frequency of observations and recommendations ...


Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph 2021 UA Little Rock Center for Arkansas History and Culture

Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph

Digital Initiatives Symposium

Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and ...


Student Academic Conference, Caitlin Brooks 2021 Minnesota State University Moorhead

Student Academic Conference, Caitlin Brooks

Student Academic Conference

No abstract provided.


Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra 2021 University of Tennessee

Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra

Mathematical Sciences Spring Lecture Series

In this talk, we will look at the current state of high performance computing and look at the next stage of extreme computing. With extreme computing, there will be fundamental changes in the character of floating point arithmetic and data movement. In this talk, we will look at how extreme-scale computing has caused algorithm and software developers to change their way of thinking on implementing and program-specific applications.


Lecture 00: Opening Remarks: 46th Spring Lecture Series, Tulin Kaman 2021 University of Arkansas, Fayetteville

Lecture 00: Opening Remarks: 46th Spring Lecture Series, Tulin Kaman

Mathematical Sciences Spring Lecture Series

Opening remarks for the 46th Annual Mathematical Sciences Spring Lecture Series at the University of Arkansas, Fayetteville.


Lecture 06: The Impact Of Computer Architectures On The Design Of Algebraic Multigrid Methods, Ulrike Yang 2021 Lawrence Livermore National Laboratory

Lecture 06: The Impact Of Computer Architectures On The Design Of Algebraic Multigrid Methods, Ulrike Yang

Mathematical Sciences Spring Lecture Series

Algebraic multigrid (AMG) is a popular iterative solver and preconditioner for large sparse linear systems. When designed well, it is algorithmically scalable, enabling it to solve increasingly larger systems efficiently. While it consists of various highly parallel building blocks, the original method also consisted of various highly sequential components. A large amount of research has been performed over several decades to design new components that perform well on high performance computers. As a matter of fact, AMG has shown to scale well to more than a million processes. However, with single-core speeds plateauing, future increases in computing performance need to ...


Art 175 Website V1.0 Using Html5 And Css3, Gary Craig Hobbs 2021 San Jose State University

Art 175 Website V1.0 Using Html5 And Css3, Gary Craig Hobbs

All Assignment Prompts

No abstract provided.


A Dynamic Programming Approach To Determine Optimum Modularity Level In Industrial Packaging, Marshal Louie, Kumar B 2021 Anna University

A Dynamic Programming Approach To Determine Optimum Modularity Level In Industrial Packaging, Marshal Louie, Kumar B

Journal of Applied Packaging Research

Modular packaging facilitate customization for accommodating variable product sizes in a product family. When determining package sizes for product variability, packaging engineers does not find difficulty to determine package dimension for less product variety whereas if the product variety is more, then determining the dimension of modular package involves complex decision-making and time-consuming process to find the optimal solution. This in turn directly impacts the overall lead time of the supply chain. Thus, in this paper a dynamic programming is developed to determine the quantity and dimension of modular packages for every demand of assorted products sizes. The program helps ...


Towards A Complete Formal Semantics Of Rust, Alexa White 2021 California Polytechnic State University, San Luis Obispo

Towards A Complete Formal Semantics Of Rust, Alexa White

Master's Theses

Rust is a relatively new programming language with a unique memory model designed to provide the ease of use of a high-level language as well as the power and control of a low-level language while preserving memory safety. In order to prove the safety and correctness of Rust and to provide analysis tools for its use cases, it is necessary to construct a formal semantics of the language. Existing efforts to construct such a semantic model are limited in their scope and none to date have successfully captured the complete functionality of the language. This thesis focuses on the K-Rust ...


Source Code Comment Classification Artificial Intelligence, Cole Sutyak 2021 The University of Akron

Source Code Comment Classification Artificial Intelligence, Cole Sutyak

Williams Honors College, Honors Research Projects

Source code comment classification is an important problem for future machine learning solutions. In particular, supervised machine learning solutions that have largely subjective data labels but are difficult to obtain the labels for. Machine learning problems are problems largely because of a lack of data. In machine learning solutions, it is better to have a large amount of mediocre data than it is to have a small amount of good data. While the mediocre data might not produce the best accuracy, it produces the best results because there is much more to learn from the problem.

In this project, data ...


Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz 2021 Universidad Interamericana de Puerto Rico - Barranquitas

Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz

Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

Adversarial training has proven to be one of the most successful ways to defend models against adversarial examples. This process consists of training a model with an adversarial example to improve the robustness of the model. In this experiment, Torchattacks, a Pytorch library made for importing adversarial examples more easily, was used to determine which attack was the strongest. Later on, the strongest attack was used to train the model and make it more robust against adversarial examples. The datasets used to perform the experiments were MNIST and CIFAR-10. Both datasets were put to the test using PGD, FGSM, and ...


News Based Prediction Of Stock Price, Vishnu Kalyan Mylavarapu 2021 Iowa State University

News Based Prediction Of Stock Price, Vishnu Kalyan Mylavarapu

Creative Components

We live in an age where machine learning and data science, in general, are influencing our decision-making capabilities in all aspects of life. We now depend heavily on historical data to make crucial decisions about our health, whether we want to go ahead with surgery or choose alternate paths. One field where the influence of such high-end cutting-edge technologies plays a crucial part in the financial sector, whether it is the use of Reddit pages to create a significant shift away from large financial corporations or algorithmic trading to enhance the profitability of our investment portfolio, the stock market is ...


Digital Commons powered by bepress