Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,549 Full-Text Articles 4,955 Authors 1,173,415 Downloads 155 Institutions

All Articles in Software Engineering

Faceted Search

3,549 full-text articles. Page 1 of 139.

Opportunities And Challenges In Code Search Tools, Chao LIU, Xin XIA, David LO, Cuiying GAO, Xiaohu YANG, John GRUNDY 2022 Zhejiang University

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy

Research Collection School Of Computing and Information Systems

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique ...


Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi ZHANG, Jun SUN, Jingyi WANG 2022 Singapore Management University

Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang

Research Collection School Of Computing and Information Systems

Neural networks are getting increasingly popular thanks to their exceptional performance in solving many real-world problems. At the same time, they are shown to be vulnerable to attacks, difficult to debug and subject to fairness issues. To improve people’s trust in the technology, it is often necessary to provide some human-understandable explanation of neural networks’ decisions, e.g., why is that my loan application is rejected whereas hers is approved? That is, the stakeholder would be interested to minimize the chances of not being able to explain the decision consistently and would like to know how often and how ...


Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub KIM, Sankalp GHATPANDE, Kui LIU, Anil KOYUNCU, Dongsun KIM, Tegawendé F. BISSYANDE, Jacques KLEIN, Yves LE TRAON 2022 Singapore Management University

Digbug—Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon

Research Collection School Of Computing and Information Systems

Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become often overwhelming as it is mostly a manual task due to incomplete and informal information (written in natural languages) available in bug reports. The research community has then invested in automated approaches, notably using Information Retrieval techniques. Unfortunately, reported performance in the literature is still limited for practical usage. Our key observation, after empirically investigating a large dataset of bug reports ...


Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei 2022 Louisiana State University

Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei

LSU Doctoral Dissertations

Nowadays, High-performance Computing (HPC) scientific applications often face per- formance challenges when running on heterogeneous supercomputers, so do scalability, portability, and efficiency issues. For years, supercomputer architectures have been rapidly changing and becoming more complex, and this challenge will become even more com- plicated as we enter the exascale era, where computers will exceed one quintillion cal- culations per second. Software adaption and optimization are needed to address these challenges. Asynchronous many-task (AMT) systems show promise against the exascale challenge as they combine advantages of multi-core architectures with light-weight threads, asynchronous executions, smart scheduling, and portability across diverse architectures.

In ...


Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg 2022 California Polytechnic State University, San Luis Obispo

Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg

Computer Engineering

This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.


Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja 2022 CUNY Graduate Center

Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja

Publications and Research

Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code that supports symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development tends to produce DL code that is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, less error-prone imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. While hybrid approaches aim for the "best of both worlds," the challenges in applying them in the real world are largely unknown. We conduct a data-driven analysis of challenges ...


A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh 2022 CUNY Graduate Center

A Tool For Rejuvenating Feature Logging Levels Via Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi T. Khatchadourian, Mehdi Bagherzadeh

Publications and Research

Logging is a significant programming practice. Due to the highly transactional nature of modern software applications, a massive amount of logs are generated every day, which may overwhelm developers. Logging information overload can be dangerous to software applications. Using log levels, developers can print the useful information while hiding the verbose logs during software runtime. As software evolves, the log levels of logging statements associated with the surrounding software feature implementation may also need to be altered. Maintaining log levels necessitates a significant amount of manual effort. In this paper, we demonstrate an automated approach that can rejuvenate feature log ...


The Stakeholder-Profile Framework For Tacit Knowledge Acquisition In Requirements Elicitation Interviews, Rasha Eltigani 2022 Kennesaw State University

The Stakeholder-Profile Framework For Tacit Knowledge Acquisition In Requirements Elicitation Interviews, Rasha Eltigani

Master of Science in Software Engineering Theses

The stakeholder’s tacit knowledge is a key crown jewel of requirements elicitation, and in turn software development at large. This critical element holds significant leverage in determining the outcome and the quality of the requirements, and therefore the development endeavor holistically. Due to its very nature of being tacit, it is innately covert and deeply hidden within the stakeholders’ minds, so it is extremely difficult to articulate and relay, as well as even harder to elicit and utilize. Additionally, the literature reports that there is a scarcity of available theorizations and solutions for addressing this challenge, posing a key ...


Analysis Of The Effectiveness Of Different Techniques For Creating Cross-Platform Compatible Software, Michael Westberg 2022 University of Nebraska - Lincoln

Analysis Of The Effectiveness Of Different Techniques For Creating Cross-Platform Compatible Software, Michael Westberg

Honors Theses, University of Nebraska-Lincoln

Creating cross-platform compatible software is a major issue in a world where users utilize a variety of devices and platforms. To ensure that a piece of software is accessible to as many users as possible, software must be cross-platform compatible. There are four main approaches that can be done to achieve this state of being cross-platform compatible, each with both advantages and disadvantages. These methods are: creating the software as separate binaries, using a scripting language with a cross-platform interpreter, compiling to an intermediate language, and creating the software as a web application. This paper will discuss how each of ...


Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa McKee 2022 Dakota State University

Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee

Masters Theses & Doctoral Dissertations

Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be ...


A Study Of Software Development Methodologies, Kendra Risener 2022 University of Arkansas, Fayetteville

A Study Of Software Development Methodologies, Kendra Risener

Computer Science and Computer Engineering Undergraduate Honors Theses

Software development methodologies are often overlooked by software engineers as aspects of development that are handled by project managers alone. However, if every member of the team better understood the development methodology being used, it increases the likelihood that the method is properly implemented and ultimately used to complete the project more efficiently. Thus, this paper seeks to explore six common methodologies: the Waterfall Model, the Spiral Model, Agile, Scrum, Kanban, and Extreme Programming. These are discussed in two main sections in the paper. In the first section, the frameworks are isolated and viewed by themselves. The histories, unique features ...


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan 2022 University of Arkansas, Fayetteville

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover 2022 University of Arkansas, Fayetteville

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture ...


Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch 2022 University of Arkansas, Fayetteville

Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch

Industrial Engineering Undergraduate Honors Theses

Every year, sports teams and athletes get cut from championship opportunities because of their rank. While this reality is easier to swallow if a team or athlete is distant from the cut, it is much harder when they are right on the edge. Many times, it leaves fans and athletes wondering, “Why wasn’t I ranked higher? What factors when into the ranking? Are the rankings based on opinion alone?” These are fair questions that deserve an answer. Many times, sports rankings are derived from opinion polls. Other times, they are derived from a combination of opinion polls and measured ...


Canary: An Automated Approach To Security Scanning And Remediation, David Wiles 2022 Western Kentucky University

Canary: An Automated Approach To Security Scanning And Remediation, David Wiles

Masters Theses & Specialist Projects

Modern software has a smaller attack surface today than in the past. Memory-safe languages, container runtimes, virtual machines, and a mature web stack all contribute to the relative safety of the web and software in general compared to years ago. Despite this, we still see high-profile bugs, hacks, and outages which affect major companies and widely-used technologies. The extensive work that has gone into hardening virtualization, containerization, and commonly used applications such as Nginx still depends on the end-user to configure correctly to prevent a compromised machine.

In this paper, I introduce a tool, which I call Canary, which can ...


Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework, Thomas Looby 2022 University of Tennessee, Knoxville

Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework, Thomas Looby

Doctoral Dissertations

Reactor class nuclear fusion tokamaks will be inherently complex. Thousands of interconnected systems that span orders of magnitude in physical scale must operate cohesively for the machine to function. Because these reactor class tokamaks are all in an early design stage, it is difficult to quantify exactly how each subsystem will act within the context of the greater systems. Therefore, to predict the engineering parameters necessary to design the machine, simulation frameworks that can model individual systems as well as the interfaced systems are necessary. This dissertation outlines a novel framework developed to couple otherwise disparate computational domains together into ...


Detecting C++ Compiler Front-End Bugs Via Grammar Mutation And Differential Testing, Haoxin TU, He JIANG, Zhide ZHOU, Yixuan TANG, Zhilei REN, Lei QIAO, Lingxiao JIANG 2022 Singapore Management University

Detecting C++ Compiler Front-End Bugs Via Grammar Mutation And Differential Testing, Haoxin Tu, He Jiang, Zhide Zhou, Yixuan Tang, Zhilei Ren, Lei Qiao, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

C++ is a widely used programming language and the C++ front-end is a critical part of a C++ compiler. Although many techniques have been proposed to test compilers, few studies are devoted to detecting bugs in C++ compiler. In this study, we take the first step to detect bugs in C++ compiler front-ends. To do so, two main challenges need to be addressed, namely, the acquisition of test programs that are more likely to trigger bugs in compiler front-ends and the bug identification from complicated compiler outputs. In this article, we propose a novel framework named Ccoft to detect bugs ...


Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda 2022 Rochester Institute of Technology

Real-Time Illumination Capture And Rendering On Mobile Devices, Snehal Padhye, James A. Ferwerda

Frameless

We present our efforts to develop methods for rendering 3D objects on mobile devices using real-world dynamic illumination from the user’s environment. To achieve this, we use the front and back cameras on the mobile device to estimate the light distribution in the environment in real time. We then create a dynamic illumination map and render the object at interactive rates in a browser on the device using a web-based graphics API. This project achieves one of the goals of our related work on realistic visualization of virtual objects: to make virtual objects appear to be situated within the ...


Use Of Ar To Bring Medical Simulation To Life, Zhenhua Yu, Richard L. Doolittle, Caroline J. Easton 2022 3D Digital Design, Rochester Insitute of Technology

Use Of Ar To Bring Medical Simulation To Life, Zhenhua Yu, Richard L. Doolittle, Caroline J. Easton

Frameless

Use of simulation facilities and equipment in medical training has become the fabric of curricula across nearly all professions, most notably medical school, nursing, and related medical sciences programs. The gold standard for simulators is SimMan3G, Laerdal Inc., which offers a static electronic mannequin that affords the opportunity to create disease states, signs/symptoms, and real physiological/vital sign data complemented by voice interactions between faculty (within the control room) and student. All sessions are videotaped and, through a 15-30 minute debriefing, students exchange thoughts and impressions with faculty and engage in a deep reflective learning experience. The other option ...


Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink 2022 Vuzix Corporation

Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink

Frameless

Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.


Digital Commons powered by bepress