Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,526 Full-Text Articles 4,930 Authors 1,158,337 Downloads 157 Institutions

All Articles in Software Engineering

Faceted Search

3,526 full-text articles. Page 1 of 138.

Opportunities And Challenges In Code Search Tools, Chao LIU, Xin XIA, David LO, Cuiying GAO, Xiaohu YANG, John GRUNDY 2022 Singapore Management University

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy

Research Collection School Of Computing and Information Systems

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique ...


Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi ZHANG, Jun SUN, Jingyi WANG 2022 Singapore Management University

Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang

Research Collection School Of Computing and Information Systems

Neural networks are getting increasingly popular thanks to their exceptional performance in solving many real-world problems. At the same time, they are shown to be vulnerable to attacks, difficult to debug and subject to fairness issues. To improve people’s trust in the technology, it is often necessary to provide some human-understandable explanation of neural networks’ decisions, e.g., why is that my loan application is rejected whereas hers is approved? That is, the stakeholder would be interested to minimize the chances of not being able to explain the decision consistently and would like to know how often and how ...


Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub KIM, Sankalp GHATPANDE, Kui LIU, Anil KOYUNCU, Dongsun KIM, Tegawendé F. BISSYANDE, Jacques KLEIN, Yves LE TRAON 2022 Singapore Management University

Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon

Research Collection School Of Computing and Information Systems

Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become often overwhelming as it is mostly a manual task due to incomplete and informal information (written in natural languages) available in bug reports. The research community has then invested in automated approaches, notably using Information Retrieval techniques. Unfortunately, reported performance in the literature is still limited for practical usage. Our key observation, after empirically investigating a large dataset of bug reports ...


Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja 2022 CUNY Graduate Center

Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja

Publications and Research

Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code that supports symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development tends to produce DL code that is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, less error-prone imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. While hybrid approaches aim for the "best of both worlds," the challenges in applying them in the real world are largely unknown. We conduct a data-driven analysis of challenges ...


A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh 2022 CUNY Graduate Center

A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh

Publications and Research

Logging is a significant programming practice. Due to the highly transactional nature of modern software applications, a massive amount of logs are generated every day, which may overwhelm developers. Logging information overload can be dangerous to software applications. Using log levels, developers can print the useful information while hiding the verbose logs during software runtime. As software evolves, the log levels of logging statements associated with the surrounding software feature implementation may also need to be altered. Maintaining log levels necessitates a significant amount of manual effort. In this paper, we demonstrate an automated approach that can rejuvenate feature log ...


Analysis Of The Effectiveness Of Different Techniques For Creating Cross-Platform Compatible Software, Michael Westberg 2022 University of Nebraska - Lincoln

Analysis Of The Effectiveness Of Different Techniques For Creating Cross-Platform Compatible Software, Michael Westberg

Honors Theses, University of Nebraska-Lincoln

Creating cross-platform compatible software is a major issue in a world where users utilize a variety of devices and platforms. To ensure that a piece of software is accessible to as many users as possible, software must be cross-platform compatible. There are four main approaches that can be done to achieve this state of being cross-platform compatible, each with both advantages and disadvantages. These methods are: creating the software as separate binaries, using a scripting language with a cross-platform interpreter, compiling to an intermediate language, and creating the software as a web application. This paper will discuss how each of ...


Canary: An Automated Approach To Security Scanning And Remediation, David Wiles 2022 Western Kentucky University

Canary: An Automated Approach To Security Scanning And Remediation, David Wiles

Masters Theses & Specialist Projects

Modern software has a smaller attack surface today than in the past. Memory-safe languages, container runtimes, virtual machines, and a mature web stack all contribute to the relative safety of the web and software in general compared to years ago. Despite this, we still see high-profile bugs, hacks, and outages which affect major companies and widely-used technologies. The extensive work that has gone into hardening virtualization, containerization, and commonly used applications such as Nginx still depends on the end-user to configure correctly to prevent a compromised machine.

In this paper, I introduce a tool, which I call Canary, which can ...


A Study Of Software Development Methodologies, Kendra Risener 2022 University of Arkansas, Fayetteville

A Study Of Software Development Methodologies, Kendra Risener

Computer Science and Computer Engineering Undergraduate Honors Theses

Software development methodologies are often overlooked by software engineers as aspects of development that are handled by project managers alone. However, if every member of the team better understood the development methodology being used, it increases the likelihood that the method is properly implemented and ultimately used to complete the project more efficiently. Thus, this paper seeks to explore six common methodologies: the Waterfall Model, the Spiral Model, Agile, Scrum, Kanban, and Extreme Programming. These are discussed in two main sections in the paper. In the first section, the frameworks are isolated and viewed by themselves. The histories, unique features ...


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan 2022 University of Arkansas, Fayetteville

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover 2022 University of Arkansas, Fayetteville

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture ...


Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch 2022 University of Arkansas, Fayetteville

Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch

Industrial Engineering Undergraduate Honors Theses

Every year, sports teams and athletes get cut from championship opportunities because of their rank. While this reality is easier to swallow if a team or athlete is distant from the cut, it is much harder when they are right on the edge. Many times, it leaves fans and athletes wondering, “Why wasn’t I ranked higher? What factors when into the ranking? Are the rankings based on opinion alone?” These are fair questions that deserve an answer. Many times, sports rankings are derived from opinion polls. Other times, they are derived from a combination of opinion polls and measured ...


Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda 2022 Rochester Institute of Technology

Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda

Frameless

We present our efforts to develop methods for rendering 3D objects on mobile devices using real-world dynamic illumination from the user’s environment. To achieve this, we use the front and back cameras on the mobile device to estimate the light distribution in the environment in real time. We then create a dynamic illumination map and render the object at interactive rates in a browser on the device using a web-based graphics API. This project achieves one of the goals of our related work on realistic visualization of virtual objects: to make virtual objects appear to be situated within the ...


Use Of Ar To Bring Medical Simulation To Life, Zhenhua Yu, Richard L. Doolittle, Caroline J. Easton 2022 3D Digital Design, Rochester Insitute of Technology

Use Of Ar To Bring Medical Simulation To Life, Zhenhua Yu, Richard L. Doolittle, Caroline J. Easton

Frameless

Use of simulation facilities and equipment in medical training has become the fabric of curricula across nearly all professions, most notably medical school, nursing, and related medical sciences programs. The gold standard for simulators is SimMan3G, Laerdal Inc., which offers a static electronic mannequin that affords the opportunity to create disease states, signs/symptoms, and real physiological/vital sign data complemented by voice interactions between faculty (within the control room) and student. All sessions are videotaped and, through a 15-30 minute debriefing, students exchange thoughts and impressions with faculty and engage in a deep reflective learning experience. The other option ...


Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink 2022 Vuzix Corporation

Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink

Frameless

Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.


Changeling Vr, Elouise Oyzon 2022 Rochester Institute of Technology

Changeling Vr, Elouise Oyzon

Frameless

Changeling VR is an interactive virtual reality narrative game. As we progress through the game, each level is seen through the Point of View of a different character whose emotional core is expressed through different aesthetics, mechanics and interactions.


Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes 2022 Rochester Institute of Technology

Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes

Frameless

A VR staging of Anonin Artaud’s 1925 surrealist play, Jet of Blood. The project experiments with virtual reality as a means to reimagine performance and frame the player, the audience, as actor. Ideas from Artaud’s philosophy such as the Theatre of Cruelty are incorporated along with spatial storytelling and game design. The project also seeks to expand accessibility to deaf and hard of hearing audiences through use of particle and text effects to visually express audio and sound.


The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç 2022 University of Rochester

The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç

Frameless

No abstract provided.


Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson 2022 Rochester Institute of Technology

Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson

Frameless

In the summer of 2018, RIT Professors Susan Lakin and Frank Deese discussed with the principal officers of the Society for the Protection and Care of Children (SPCC) in Rochester how the new technology of Virtual Reality might be used to not only impart information to viewers, but generate empathy for those receiving services from the organization as well as those performing those services. Their ultimate goal was to create an experience that could be viewed with VR headsets at fundraising events and on a website using low-cost Google Cardboard.


Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero 2022 Kennesaw State University

Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by ...


Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero 2022 Kennesaw State University

Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

The higher education sector has been heavily impacted financially by the economic downturn caused by the pandemic that has resulted a decline in student enrollments. Finding cost-effective novel technology for storing and sharing student's credentials among academic institutions and potential employers is a demand. Within the current conventional approach, ensuring authentication of a candidate’s credentials is costly and time-consuming which gives burdens to thousands of prospective students and potential employees. As a result, candidates fail to secure opportunities for either delay or non-submission of credentials all over the world. Blockchain technology has the potential for students' control over ...


Digital Commons powered by bepress