Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2378 Full-Text Articles 2642 Authors 558456 Downloads 106 Institutions

All Articles in Software Engineering

Faceted Search

2378 full-text articles. Page 1 of 78.

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2018 CUNY Hunter College

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole McElroy, Ryan Ernst 2018 University of Nebraska at Omaha

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...


Software Engineering Lecture Notes (Student Version), Kyle Burke 2018 Plymouth State University

Software Engineering Lecture Notes (Student Version), Kyle Burke

Open Educational Resources

Lecture notes for an upper-level undergraduate software engineering course, with a strong focus on software design. Students taking this course should have already completed a data structures course. These notes are designed to be used with Dale Skrien’s text Object Oriented Design using Java.


Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz 2018 Michigan University

Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Software organizations have relied on process and technology initiatives to compete in a highly globalized world. Unfortunately, that has led to little or no success. We propose that the organizations start working on people initiatives, such as inspiring egoless behavior among software developers. This paper proposes a multi-stage approach to develop egoless behavior and discusses the universality of the egoless behavior by studying cohorts from three different countries, i.e., Japan, India, and Canada. The three stages in the approach are self-assessment, peer validation, and action plan development. The paper covers the first stage of self-assssment using an instrument based ...


Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe 2018 Iowa State University

Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe

Veterinary Diagnostic and Production Animal Medicine Conference Proceedings and Presentations

The second meeting of the International Collaboration for Automation of Systematic Reviews (ICASR) was held 3–4 October 2016 in Philadelphia, Pennsylvania, USA. ICASR is an interdisciplinary group whose aim is to maximize the use of technology for conducting rapid, accurate, and efficient systematic reviews of scientific evidence. Having automated tools for systematic review should enable more transparent and timely review, maximizing the potential for identifying and translating research findings to practical application. The meeting brought together multiple stakeholder groups including users of summarized research, methodologists who explore production processes and systematic review quality, and technologists such as software developers ...


Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi SenthilarumugamVeilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette 2018 Iowa State University

Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi Senthilarumugamveilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette

Mechanical Engineering Conference Presentations, Papers, and Proceedings

In healthcare, a tremendous amount of clinical and laboratory tests, imaging, prescription and medication data are being collected. Big data analytics on these data aim at early detection of disease which will help in developing preventive measures and in improving patient care. Parkinson disease is the second-most common neurodegenerative disorder in the United States. To find a cure for Parkinson's disease biological, clinical and behavioral data of different cohorts are collected, managed and propagated through Parkinson’s Progression Markers Initiative (PPMI). Applying big data technology to this data will lead to the identification of the potential biomarkers of Parkinson ...


The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo 2017 Universidade Nova de Lisboa

The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo

Tony Wasserman

We use Grounded Theory to study the evolution of requirements practices of 16 so ware startups as they grow and introduce new products and services. These startups operate in a dynamic environment, with significant time and market pressure, and rarely have time for systematic requirements analysis. Our theory describes the evolution of practice along six dimensions that emerged as relevant to their requirements activities: requirements artefacts, knowledge management, requirements-related roles, planning, technical debt and product quality. Beyond the relationships among the dimensions, our theory also explains the turning points that drove the evolution along these dimensions. These changes are reactive ...


Characterizing Data Dependence Constraints For Dynamic Reliability Using N-Queens Attack Domains, Eric W. D. Rozier, Kristin Yvonne Rozier, Ulya Bayram 2017 Iowa State University

Characterizing Data Dependence Constraints For Dynamic Reliability Using N-Queens Attack Domains, Eric W. D. Rozier, Kristin Yvonne Rozier, Ulya Bayram

Kristin Yvonne Rozier

As data centers attempt to cope with the exponential growth of data, new techniques for intelligent, software-defined data centers (SDDC) are being developed to confront the scale and pace of changing resources and requirements. For cost-constrained environments, like those increasingly present in scientific research labs, SDDCs also may provide better reliability and performability with no additional hardware through the use of dynamic syndrome allocation. To do so, the middleware layers of SDDCs must be able to calculate and account for complex dependence relationships to determine an optimal data layout. This challenge is exacerbated by the growth of constraints on the ...


Underwater Acoustic Signal Analysis Toolkit, Kirk Bienvenu Jr 2017 University of New Orleans, New Orleans

Underwater Acoustic Signal Analysis Toolkit, Kirk Bienvenu Jr

University of New Orleans Theses and Dissertations

This project started early in the summer of 2016 when it became evident there was a need for an effective and efficient signal analysis toolkit for the Littoral Acoustic Demonstration Center Gulf Ecological Monitoring and Modeling (LADC-GEMM) Research Consortium. LADC-GEMM collected underwater acoustic data in the northern Gulf of Mexico during the summer of 2015 using Environmental Acoustic Recording Systems (EARS) buoys. Much of the visualization of data was handled through short scripts and executed through terminal commands, each time requiring the data to be loaded into memory and parameters to be fed through arguments. The vision was to develop ...


A Study Of Repetitiveness Of Code Changes In Software Evolution, Hoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan 2017 Iowa State University

A Study Of Repetitiveness Of Code Changes In Software Evolution, Hoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan

Hridesh Rajan

In this paper, we present a large-scale study of repetitiveness of code changes in software evolution. We collected a large data set of 2,841 Java projects, with 1.7 billion source lines of code (SLOC) at the latest revisions, 1.8 million code change revisions (0.4 million fixes), 6.2 million changed files, and 2.5 billion changed SLOCs. A change is considered repeated within or cross-project if it matches another change having occurred in the history of the project or another project, respectively. We report the following important findings. First, repetitiveness of changes could be as high ...


Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, Naresh Eeda 2017 The University of Western Ontario

Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, Naresh Eeda

Electronic Thesis and Dissertation Repository

With the increase in the complexity of the systems being built and demand in the quality of service by the customers, developing and providing highly efficient real-time systems is one of the biggest challenges today for software enterprises. BluemixTM ─ IBM’s cloud offering implemented on Cloud Foundry, an open source “Platform as a Service” (PaaS), is an example of such a system. Currently, there are approx. 26 infrastructural services running in the background from where the data is fetched and is rendered on different dashboards of the system. However, the system suffers from performance issues.

This thesis explores the ...


Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad 2017 University of Nebraska-Lincoln

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Computer Science and Engineering: Theses, Dissertations, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible ...


Web Application For Graduate Course Recommendation System, Sayali Dhumal 2017 California State University, San Bernardino

Web Application For Graduate Course Recommendation System, Sayali Dhumal

Electronic Theses, Projects, and Dissertations

The main aim of the course advising system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The recommendation path displays the list of courses a student can take in each quarter from the first quarter after admission until the graduation quarter. The courses are filtered as per the student’s interest obtained from a questionnaire asked to the student.

The business logic involves building the recommendation algorithm. Also, the application is functionality-tested end-to-end by using nightwatch.js which is built on top of node.js. Test cases are written ...


Web Application For Graduate Course Advising System, Sanjay Karrolla 2017 California State University, San Bernardino

Web Application For Graduate Course Advising System, Sanjay Karrolla

Electronic Theses, Projects, and Dissertations

The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, Zhiquan LIU 2017 Xidian University

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...


Secure Server-Aided Top-K Monitoring, Yujue WANG, Hwee Hwa PANG, Yanjiang YANG, Xuhua DING 2017 Guilin University of Electronic Technology

Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding

Research Collection School Of Information Systems

In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to ...


Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani 2017 Kennesaw State University

Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani

Master of Science in Software Engineering Theses

Contemporary Virtual Reality (VR) technologies offer an increasing number of functionalities including head-mounted displays (HMD), haptic and sound feedback, as well as motion tracking. This gives us the opportunity to leverage the immersive power offered by these technologies in the context of requirements elicitation, especially to surface those requirements that cannot be expressed via traditional techniques such as interviews and focus groups. The goal of this thesis is to survey uses of VR in requirements engineering, and to describe a method of elicitation using VR as a tool.

To validate the methodology, a research plan is developed with a strong ...


Building The Ascend Siu Web Application, Lee Cooper, Cody Lingle, Ren Jing, Hallie Martin, Matt Gross, Nancy Martin 2017 Southern Illinois University Carbondale

Building The Ascend Siu Web Application, Lee Cooper, Cody Lingle, Ren Jing, Hallie Martin, Matt Gross, Nancy Martin

ASA Multidisciplinary Research Symposium

This poster represents a year-long web application development project completed by undergraduate students in the Information Systems Technologies department at Southern Illinois University. The web application was developed for the Ascend registered student organization using Agile Scrum software engineering methods.


Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung 2017 Southern Illinois University Carbondale

Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung

ASA Multidisciplinary Research Symposium

The purpose of this research is to demonstrate how to reengineer a legacy Database Application using to a target system with MVC and 3-layered architecture. A Coffee Inventory Management database application is used for legacy application. The benefits of the reengineering are discussed.


Software Reengineering: Reverse Engineering With Using 4+1 Architectural Views And Forward Engineering With Mvc Architecture, Shane Mueller 2017 Southern Illinois University Carbondale

Software Reengineering: Reverse Engineering With Using 4+1 Architectural Views And Forward Engineering With Mvc Architecture, Shane Mueller

ASA Multidisciplinary Research Symposium

As software complexity is increasing exponentially in our modern era, software architecture becomes increasingly important. The separation of concerns through architecture allows each programmer the opportunity to limit their need of understanding to only the portion of code for which they are responsible for, thus saving large amounts of time.


Digital Commons powered by bepress