Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,096 Full-Text Articles 2,509 Authors 558,456 Downloads 117 Institutions

All Articles in Software Engineering

Faceted Search

2,096 full-text articles. Page 1 of 72.

Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin 2018 Syracuse University

Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin

Electrical Engineering and Computer Science - Technical Reports

Infrastructure as a service (IaaS) is an enormously beneficial model for centralized data computation and storage. Yet, existing network-layer and hardware-layer security protections do not address a broad category of vulnerabilities known as side-channel attacks. Over the past several years, numerous techniques have been proposed at all layers of the software/hardware stack to prevent the inadvertent leakage of sensitive data. This report discusses a new technique which integrates seamlessly with C++ programs. We introduce a library, libOblivious, which provides thin wrappers around existing C++ standard template library classes, endowing them with the property of memory-trace obliviousness.


Issues In Reproducible Simulation Research, Ben G. Fitzpatrick 2018 Loyola Marymount University

Issues In Reproducible Simulation Research, Ben G. Fitzpatrick

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli 2018 Kennesaw State University

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices ...


Disruptive Technology: Can The Banking Industry Harness Disruption For Competitive Edge?, Edgar LOW 2018 Singapore Management University

Disruptive Technology: Can The Banking Industry Harness Disruption For Competitive Edge?, Edgar Low

MITB Thought Leadership Series

Disruptive innovation was identified as a phenomenon more than two decades ago by prominent Harvard scholar Clayton Christensen. So you may wonder why established industries are only now waking up to the prospect of digital transformation - the banking industry in particular.


March Of The Silent Bots, Paul Robert GRIFFIN 2018 Singapore Management University

March Of The Silent Bots, Paul Robert Griffin

MITB Thought Leadership Series

Self-intelligent software robots, or ‘bots’ are everywhere. These small pieces of code run automated tasks when you order a taxi, search for a restaurant or check the weather. Quietly beavering away, it is unknown how many bots exist, but undoubtedly this number is set to surge over time. Already, bots comprise roughly half of all internet traffic.


A Tool For Optimizing Java 8 Stream Software Via Automated Refactoring, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed 2018 CUNY Hunter College

A Tool For Optimizing Java 8 Stream Software Via Automated Refactoring, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

Streaming APIs are pervasive in mainstream Object-Oriented languages. For example, the Java 8 Stream API allows for functional-like, MapReduce-style operations in processing both finite and infinite data structures. However, using this API efficiently involves subtle considerations like determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. In this paper, we describe the engineering aspects of an open source automated refactoring tool called Optimize Streams that assists developers in writing optimal stream software in ...


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...


Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo 2018 The Graduate Center, City University of New York

Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo

All Dissertations, Theses, and Capstone Projects

We explore low-cost solutions for efficiently improving the 3D pose estimation problem of a single camera moving in an unfamiliar environment. The visual odometry (VO) task -- as it is called when using computer vision to estimate egomotion -- is of particular interest to mobile robots as well as humans with visual impairments. The payload capacity of small robots like micro-aerial vehicles (drones) requires the use of portable perception equipment, which is constrained by size, weight, energy consumption, and processing power. Using a single camera as the passive sensor for the VO task satisfies these requirements, and it motivates the proposed solutions ...


Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin 2018 Purdue University

Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin

The Summer Undergraduate Research Fellowship (SURF) Symposium

The rise of Bitcoin and cryptocurrencies over the last decade have made its underlying technology (blockchain) come into the spotlight. Blockchain is a secure ledger of linked records called blocks. These records are cryptographically immutable and any tampering with the block is evident through a change in the cryptographic signature of the block. Among the blockchains deployed in practice today, Hyperledger Fabric is a platform that allows businesses to make use of blockchains in their applications. However, confidentiality issues arise with respects to the blocks in this blockchain network due to the fact that blocks might contain sensitive information accessible ...


Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp 2018 University of Colorado, Boulder

Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp

Keyboard Graduate Theses & Dissertations

Modern music tutoring software and mobile instructional applications have great potential to help students practice at home effectively. They can offer extensive feedback on what the student is getting right and wrong and have adopted a gamified design with levels, badges, and other game-like elements to help gain wider appeal among students. Despite their advantages for motivating students and creating a safe practice environment, no current music instruction software demonstrates any knowledge about a student’s level of mastery. This can lead to awkward pedagogy and user frustration. Applying Bayesian Knowledge Tracing to tutoring systems provides an ideal way to ...


Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton 2018 Boise State University

Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton

Boise State University Theses and Dissertations

As storage needs continually increase, and network file systems become more common, the need arises for tools that efficiently copy to and from these types of file systems. Traditional copy tools like the Linux cp utility were originally created for traditional storage systems, where storage is managed by a single host machine. cp uses a single-threaded approach to copying files. Using a multi-threaded approach would likely not provide an advantage in this system since the disk accesses are the bottleneck for this type of operation. In a distributed file system the disk accesses are spread across multiple hosts, and many ...


Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa 2018 Boise State University

Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa

Boise State University Theses and Dissertations

Describing scenes such as rooms, city streets, or routes, is a very common human task that requires the ability to identify and describe the scene sufficiently for a hearer to develop a mental model of the scene. When people talk about such scenes, they mention some objects of the scene at the exclusion of others. We call the mentioned objects salient objects as people consider them noticeable or important in comparison to other non-mentioned objects. In this thesis, we look at saliency of visual scenes and how visual saliency informs what can and should be said about a scene when ...


Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin 2018 Syracuse University

Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin

Electrical Engineering and Computer Science - Technical Reports

We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trusted boot loader performs a cryptographic measurement (hash) of program code and executes it unconditionally, allowing later-stage software to verify the integrity of the system through local or remote attestation. A secure loader differs from a trusted loader in that it executes subsequent code only if measurements of that code match known-good values. We have applied a rigorous formal verification technique recently demonstrated in practice by NICTA in their verification of the seL4 microkernel. We summarize our design philosophy from a high level and present our ...


Lightweight Call-Graph Construction For Multilingual Software Analysis, Anne-Marie Bogar, Damian Lyons, David Baird 2018 Fordham University

Lightweight Call-Graph Construction For Multilingual Software Analysis, Anne-Marie Bogar, Damian Lyons, David Baird

Faculty Publications

Analysis of multilingual codebases is a topic of increasing importance. In prior work, we have proposed the MLSA (MultiLingual Software Analysis) architecture, an approach to the lightweight analysis of multilingual codebases, and have shown how it can be used to address the challenge of constructing a single call graph from multilingual software with mutual calls. This paper addresses the challenge of constructing monolingual call graphs in a lightweight manner (consistent with the objective of MLSA) which nonetheless yields sufficient information for resolving language interoperability calls. A novel approach is proposed which leverages information from a ...


Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird 2018 Fordham University

Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird

Faculty Publications

Large software systems can often be multilingual – that is, software systems are written in more than one language. However, many popular software engineering tools are monolingual by nature. Nonetheless, companies are faced with the need to manage their large, multilingual codebases to address issues with security, efficiency, and quality metrics. This paper presents a novel lightweight approach to multilingual software analysis – MLSA. The approach is modular and focused on efficient static analysis computation for large codebases. One topic is addressed in detail – the generation of multilingual call graphs to identify language boundary problems in multilingual code. The algorithm for extracting ...


Data Scientist’S Analysis Toolbox: Comparison Of Python, R, And Sas Performance, Jim Brittain, Mariana Cendon, Jennifer Nizzi, John Pleis 2018 Southern Methodist University

Data Scientist’S Analysis Toolbox: Comparison Of Python, R, And Sas Performance, Jim Brittain, Mariana Cendon, Jennifer Nizzi, John Pleis

SMU Data Science Review

A quantitative analysis will be performed on experiments utilizing three different tools used for Data Science. The analysis will include replication of analysis along with comparisons of code length, output, and results. Qualitative data will supplement the quantitative findings. The conclusion will provide data support guidance on the correct tool to use for common situations in the field of Data Science.


Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird 2018 Fordham University

Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird

Faculty Publications

Developer preferences, language capabilities and the persistence of older languages contribute to the trend that large software codebases are often multilingual – that is, written in more than one computer language. While developers can leverage monolingual software development tools to build software components, companies are faced with the problem of managing the resultant large, multilingual codebases to address issues with security, efficiency, and quality metrics. The key challenge is to address the opaque nature of the language interoperability interface: one language calling procedures in a second (which may call a third, or even back to the first), resulting in a potentially ...


Unobtrusive Detection Of Frailty In Older Adults, Lee Buay TAN, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Hwee-Pink TAN 2018 Singapore Management University

Unobtrusive Detection Of Frailty In Older Adults, Lee Buay Tan, W K P Neranjana Nadee Rodrigo Goonawardene, Hwee-Pink Tan

Research Collection School Of Information Systems

Sensor technologies have gained attention as an effective means to monitor physical and mental wellbeing of elderly. In this study, we examined the possibility of using passive in-home sensors to detect frailty in older adults based on their day-to-day in-home living pattern. The sensor-based elderly monitoring system consists of PIR motion sensors and a door contact sensor attached to the main door. A set of pre-defined features associated with elderly’s day-to-day living patterns were derived based on sensor data of 46 elderly gathered over two different time periods. A series of feature vectors depicting different behavioral aspects were derived ...


Technology-Enabled Medication Adherence For Seniors Living In The Community: Experiences, Lessons, And The Road Ahead, Hwee Xian TAN, Hwee-Pink TAN, Huiguang LIANG 2018 Singapore Management University

Technology-Enabled Medication Adherence For Seniors Living In The Community: Experiences, Lessons, And The Road Ahead, Hwee Xian Tan, Hwee-Pink Tan, Huiguang Liang

Research Collection School Of Information Systems

Medication non-adherence in seniors can lead to severe health complications, including morbidity, mortality and decreased quality of life. In view of ageing populations worldwide, there is significant interest among the healthcare sector and researchers to improve medication adherence rates for seniors. However, existing studies in the literature focus primarily on identifying the predictors of medication non-adherence. In this paper, we present our work on technology-enabled medication adherence for 24 community-dwelling seniors over a period of more than 2 years. We leverage Internet of Things (IoT) devices to track inferred medication consumption in the seniors’ homes, and provide quasi real-time alerts ...


Digital Commons powered by bepress