Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

1968 Full-Text Articles 2168 Authors 467021 Downloads 94 Institutions

All Articles in Software Engineering

Faceted Search

1968 full-text articles. Page 1 of 62.

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk 2017 Boise State University

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk

International Journal of Undergraduate Community Engagement

In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.


Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Wee-Seng SOH, Hwee-Pink TAN 2017 Singapore Management University

Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Wee-Seng Soh, Hwee-Pink Tan

Research Collection School Of Information Systems

We address the problem of transferring bulk data in environmentally-powered wireless sensor networks where duty cycle compliance is critical for their uninterrupted operation. We propose Pump-and-Nap, a packet train forwarding technique that maximizes throughput while simultaneously enforcing compliance to dynamic duty cycle limitations. A node using Pump-and-Nap operates by pumping a train of packets followed by a napping period where the node forgoes any transmission. Pump-and-Nap employs an adaptive controller to periodically compute the optimal capacity, that is, the maximum number of packets a node can receive and transmit in a train, given its duty cycle constraint. The controller uses ...


A Software Architecture For Reconstructability Analysis, Kenneth Willett, Martin Zwick 2016 Portland State University

A Software Architecture For Reconstructability Analysis, Kenneth Willett, Martin Zwick

Martin Zwick

Software packages for reconstructability analysis (RA), as well as for related log linear modeling, generally provide a fixed set of functions. Such packages are suitable for end‐users applying RA in various domains, but do not provide a platform for research into the RA methods themselves. A new software system, Occam3, is being developed which is intended to address three goals which often conflict with one another to provide: a general and flexible infrastructure for experimentation with RA methods and algorithms; an easily‐configured system allowing methods to be combined in novel ways, without requiring deep software expertise; and a ...


The Moral Implications Of Software Piracy, Kyle Hamrick 2016 Olivet Nazarene University

The Moral Implications Of Software Piracy, Kyle Hamrick

Student Scholarship - Computer Science

Computer software is integrated into almost every aspect of our professional and personal lives. Much of this software requires payment for use and is legally protected by the copyright system. This paper examines and analyzes the arguments pertaining to the moral use of protected software (digital piracy). The three arguments presented are the “victimless crime” argument, the “noble justification” argument, and the “willing but unable argument.” These three arguments claim that piracy is morally justified in certain cases, and claim that software providers are not harmed in such situations. The three arguments are tested against counter-arguments, and it is discovered ...


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held 2016 The University of Western Ontario

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and ...


The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard 2016 Carnegie Mellon University

The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard

Software Engineering Institute

Problems with cost estimation, ranging from estimator overconfidence to unintegrated tools, result in potentially billions of dollars of unanticipated expenses for Department of Defense programs. Quantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE), developed by the Carnegie Mellon University Software Engineering Institute, is a method for estimating potential program costs in a way that acknowledges and uses uncertainty that occurs early in the development lifecycle. This report first familiarizes the reader with the QUELCE method. QUELCE computes a distribution of program costs based on Monte Carlo analysis of program cost drivers—assessed via analyses of dependency structure matrices and Bayesian ...


Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi 2016 The University of Western Ontario

Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi

Electronic Thesis and Dissertation Repository

Large-scale contractual systems engineering projects often need to comply with a myriad of government regulations and standards as part of contractual fulfillment. A key activity in the requirements engineering (RE) process for such a project is to elicit appropriate requirements from the regulations and standards that apply to the target system. However, there are impediments in achieving compliance due to such factors as: the voluminous contract and its high-level specifications, large number of regulatory documents, and multiple domains of the system. Little empirical research has been conducted on developing a shared understanding of the compliance-oriented complexities involved in such projects ...


Win Nim, Anna Carrigan 2016 University of Wyoming

Win Nim, Anna Carrigan

Honors Theses AY 16/17

A discussion of two-person zero-sum games in combinatorial game theory along with documentation of the software development process for creating an Android application that solves the game of Nim.

Repository for the software development process is located at https://github.com/annamooseity/nim


Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell 2016 Carnegie Mellon University

Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell

Software Engineering Institute

Most introductory discussions of Agile software development have focused on team management concepts and the implications of the Agile Manifesto for a single, small team. The focus now includes scaling these concepts for a variety of applications. The context in which Agile methods are employed drives important choices for how the work is done. Published frameworks and commercial training available in the market offer a variety of solutions for scaling Agile. This report addresses what is meant by scaling, contextual drivers for implementation choices, and the frameworks available for use today.


Using Software Testing Techniques To Infer Biological Models, Mikaela Cashman 2016 University of Nebraska-Lincoln

Using Software Testing Techniques To Infer Biological Models, Mikaela Cashman

Computer Science and Engineering: Theses, Dissertations, and Student Research

Years of research in software testing has given us novel ways to reason about and test the behavior of complex software systems that contain hundreds of thousands of lines of code. Many of these techniques have been inspired by nature such as genetic algorithms, swarm intelligence, and ant colony optimization. However, they use a unidirectional analogy – taking from nature without giving back.

In this thesis we invert this view and ask if we can utilize techniques from testing and modeling of highly-configurable software systems to aid in the emerging field of systems biology which aims to model and predict the ...


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu 2016 University of Nebraska-Lincoln

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and ...


Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky 2016 Rochester Institute of Technology

Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky

Articles

Security is hard, and teaching security can be even harder. Here we describe a public educational activity to assist in the instruction of both students and developers in creating secure Android apps. Our set of activities includes example vulnerable applications, information about each vulnerability, steps on how to repair the vulnerabilities, and information about how to confirm that the vulnerability has been properly repaired. Our primary goal is to make these activities available to other instructors for use in their classrooms ranging from the K-12 to university settings. A secondary goal of this project is to foster interest in security ...


Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook 2016 University of Maine

Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook

Electronic Theses and Dissertations

This dissertation is concerned with the development of robust numerical solution procedures for the generalized micromechanical analysis of linear and nonlinear constitutive behavior in heterogeneous materials. Although the methods developed are applicable in many engineering, geological, and materials science fields, three main areas are explored in this work. First, a numerical methodology is presented for the thermomechanical analysis of heterogeneous materials with a special focus on real polycrystalline microstructures obtained using electron backscatter diffraction techniques. Asymptotic expansion homogenization and finite element analysis are employed for micromechanical analysis of polycrystalline materials. Effective thermoelastic properties of polycrystalline materials are determined and compared ...


D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, Dingyi FANG 2016 Singapore Management University

D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Information Systems

Device-free localization, which does not require any device attached to the target is playing a critical role in many applications such as intrusion detection, elderly monitoring, etc. This paper introduces D-Watch, a device-free system built on top of low cost commodity-off-the-shelf (COTS) RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the "bad" multipaths to provide a decimeter level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival (AoA) information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can ...


Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan 2016 California Polytechnic State University, San Luis Obispo

Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan

Computer Science

The goal of this senior project centered around improving the quality of student and teacher experiences when visiting the library. The task of finding a book amongst the shelves is an arduous one, which I felt could be improved upon through implementation and testing of a Book Lookup system for the Cal Poly Robert E. Kennedy Library. Development for this project was done using a Python framework. Testing and earlier designs were also created using JavaScript and PHP. Repeated tests were conducted on the accuracy of the software and its ability to decrease user search-time when compared to conventional methods.


Ios Application For Inventory In Small Retail Stores, Andrea Savage 2016 California Polytechnic State University, San Luis Obispo

Ios Application For Inventory In Small Retail Stores, Andrea Savage

Computer Science

Currently, small retail stores with low technology budgets such as those right here in San Luis Obispo are struggling to integrate new technologies into their companies. This mobile application built for iOS with a Firebase backend is seeking to remove their barriers to entry. I built this application to give small retail stores a customizable application that allows them to display products electronically to customers and maintain accurate inventory both in one place. The construction of this application hinged around three major design decisions: UI design of the color management views, organization of the database, and accessing the database with ...


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


Teaching Complex Theoretical Multi-Step Problems In Ict Networking Through 3d Printing And Augmented Reality, Michael Cowling, James Birt 2016 Central Queensland University

Teaching Complex Theoretical Multi-Step Problems In Ict Networking Through 3d Printing And Augmented Reality, Michael Cowling, James Birt

James Birt

This paper presents a pilot study rationale and research methodology using a mixed media visualisation (3D printing and Augmented Reality simulation) learning intervention to help students in an ICT degree represent theoretical complex multi-step problems without a corresponding real world physical analog model. This is important because these concepts are difficult to visualise without a corresponding mental model. The proposed intervention uses an augmented reality application programmed with free commercially available tools, tested through an action research methodology, to evaluate the effectiveness of the mixed media visualisation techniques to teach ICT students networking. Specifically, 3D models of network equipment will ...


Game Development Software Engineering Process Life Cycle: A Systematic Review, Saiqa Alemm, Luiz Fernando Capretz, Faheem Ahmed 2016 Zayed University

Game Development Software Engineering Process Life Cycle: A Systematic Review, Saiqa Alemm, Luiz Fernando Capretz, Faheem Ahmed

Electrical and Computer Engineering Publications

Software game is a kind of application that is used not only for entertainment, but also for serious purposes that can be applicable to different domains such as education, business, and health care. Multidisciplinary nature of the game development processes that combine sound, art, control systems, artificial intelligence (AI), and human factors, makes the software game development practice different from traditional software development. However, the underline software engineering techniques help game development to achieve maintainability, flexibility, lower effort and cost, and better design. The purpose of this study is to assesses the state of the art research on the game ...


Neural Network Models For Software Development Effort Estimation: A Comparative Study, Ali Bou Nassif, Mohammad Azzeh, Luiz Fernando Capretz, Danny Ho 2016 University of Sharjah, UAE

Neural Network Models For Software Development Effort Estimation: A Comparative Study, Ali Bou Nassif, Mohammad Azzeh, Luiz Fernando Capretz, Danny Ho

Electrical and Computer Engineering Publications

Software development effort estimation (SDEE) is one of the main tasks in software project management. It is crucial for a project manager to efficiently predict the effort or cost of a software project in a bidding process, since overestimation will lead to bidding loss and underestimation will cause the company to lose money. Several SDEE models exist; machine learning models, especially neural network models, are among the most prominent in the field. In this study, four different neural network models – Multilayer Perceptron, General Regression Neural Network, Radial Basis Function Neural Network, and Cascade Correlation Neural Network – are compared with each ...


Digital Commons powered by bepress