Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,206 Full-Text Articles 2,662 Authors 558,456 Downloads 120 Institutions

All Articles in Software Engineering

Faceted Search

2,206 full-text articles. Page 1 of 75.

Requirements Practices In Software Startups, John D. Hoff 2019 University of Minnesota - Morris

Requirements Practices In Software Startups, John D. Hoff

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

In a dynamic environment full of uncertainties in software startups, software development practices must be carefully approached. It is vital that startups determine the right time to make advancements and evolve their company to the next level. We will discuss the importance of requirements practices in startups and their impact on company culture, work environments, and product quality.


Evaluating Motivational Interviewing And Habit Formation To Enhance The Effect Of Activity Trackers On Healthy Adults’ Activity Levels: Randomized Intervention, Laura D. Ellingson, Jeni E. Lansing, Kathryn J. DeShaw, Karissa L. Peyer, Yang Bai, Maria Perez, L. Alison Phillips, Gregory Welk 2019 Iowa State University

Evaluating Motivational Interviewing And Habit Formation To Enhance The Effect Of Activity Trackers On Healthy Adults’ Activity Levels: Randomized Intervention, Laura D. Ellingson, Jeni E. Lansing, Kathryn J. Deshaw, Karissa L. Peyer, Yang Bai, Maria Perez, L. Alison Phillips, Gregory Welk

Psychology Publications

Background: While widely used and endorsed, there is limited evidence supporting the benefits of activity trackers for increasing physical activity; these devices may be more effective when combined with additional strategies that promote sustained behavior change like motivational interviewing (MI) and habit development. Objective: This study aims to determine the utility of wearable activity trackers alone or in combination with these behavior change strategies for promoting improvements in active and sedentary behaviors. Methods: A sample of 91 adults (48/91 female, 53%) was randomized to receive a Fitbit Charge alone or in combination with MI and habit education for 12 ...


Stratified Random Sampling From Streaming And Stored Data, Trong Duc Nguyen, Ming-Hung Shih, Divesh Srivastava, Srikanta Tirthapura, Bojian Xu 2019 Iowa State University

Stratified Random Sampling From Streaming And Stored Data, Trong Duc Nguyen, Ming-Hung Shih, Divesh Srivastava, Srikanta Tirthapura, Bojian Xu

Electrical and Computer Engineering Conference Papers, Posters and Presentations

Stratified random sampling (SRS) is a widely used sampling technique for approximate query processing. We consider SRS on continuously arriving data streams, and make the following contributions. We present a lower bound that shows that any streaming algorithm for SRS must have (in the worst case) a variance that is Ω(r ) factor away from the optimal, where r is the number of strata. We present S-VOILA, a streaming algorithm for SRS that is locally variance-optimal. Results from experiments on real and synthetic data show that S-VOILA results in a variance that is typically close to an optimal offline algorithm ...


Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. McCulloch 2018 University of New Orleans

Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch

University of New Orleans Theses and Dissertations

This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It ...


Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey 2018 The University of Western Ontario

Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey

Electronic Thesis and Dissertation Repository

Context: Continuous Integration (CI) is a DevOps technique which is widely used in practice. Studies show that its adoption rates will increase even further. At the same time, it is argued that maintaining product quality requires extensive and time consuming, testing and code reviews. In this context, if not done properly, shorter sprint cycles and agile practices entail higher risk for the quality of the product. It has been reported in literature [68], that lack of proper test strategies, poor test quality and team dependencies are some of the major challenges encountered in continuous integration and deployment.

Objective: The objective ...


Pantry: A Macro Library For Python, Derek Pang 2018 San Jose State University

Pantry: A Macro Library For Python, Derek Pang

Master's Projects

Python lacks a simple way to create custom syntax and constructs that goes outside of its own syntax rules. A paradigm that allows for these possibilities to exist within languages is macros. Macros allow for a shorter set of syntax to expand into a longer set of instructions at compile-time. This gives the capability to evolve the language to fit personal needs.

Pantry, implements a hygienic text-substitution macro system for Python. Pantry achieves this through the introduction of an additional preparsing step that utilizes parsing and lexing of the source code. Pantry proposes a way to simply declare a pattern ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali 2018 The University of Western Ontario

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen 2018 San Jose State University

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain ...


Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Eye Pressure Monitior, Andrea Nella Levy 2018 California Polytechnic State University, San Luis Obispo

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB ...


Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui FAN, Xin XIA, David LO, Shanping LI 2018 Zhejiang University

Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui Fan, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Modern Code Review (MCR) has been widely used by open source and proprietary software projects. Inspecting code changes consumes reviewers much time and effort since they need to comprehend patches, and many reviewers are often assigned to review many code changes. Note that a code change might be eventually abandoned, which causes waste of time and effort. Thus, a tool that predicts early on whether a code change will be merged can help developers prioritize changes to inspect, accomplish more things given tight schedule, and not waste reviewing effort on low quality changes. In this paper, motivated by the above ...


Predicting Episodes Of Non-Conformant Mobility In Indoor Environments, Kasthuri JAYARAJAH, Archan MISRA 2018 Singapore Management University

Predicting Episodes Of Non-Conformant Mobility In Indoor Environments, Kasthuri Jayarajah, Archan Misra

Research Collection School Of Information Systems

Traditional mobility prediction literature focuses primarily on improved methods to extract latent patterns from individual-specific movement data. When such predictions are incorrect, we ascribe it to 'random' or 'unpredictable' changes in a user's movement behavior. Our hypothesis, however, is that such apparently-random deviations from daily movement patterns can, in fact, of ten be anticipated. In particular, we develop a methodology for predicting Likelihood of Future Non-Conformance (LFNC), based on two central hypotheses: (a) the likelihood of future deviations in movement behavior is positively correlated to the intensity of such trajectory deviations observed in the user's recent past, and ...


Performance Characterization Of Deep Learning Models For Breathing-Based Authentication On Resource-Constrained Devices, Jagmohan CHAUHAN, Jathusan RAJASEGARAN, Surang SENEVIRATNE, Archan MISRA, Aruan SENEVIRATNE, Youngki LEE 2018 Aalto University

Performance Characterization Of Deep Learning Models For Breathing-Based Authentication On Resource-Constrained Devices, Jagmohan Chauhan, Jathusan Rajasegaran, Surang Seneviratne, Archan Misra, Aruan Seneviratne, Youngki Lee

Research Collection School Of Information Systems

Providing secure access to smart devices such as mobiles, wearables and various other IoT devices is becoming increasinglyimportant, especially as these devices store a range of sensitive personal information. Breathing acoustics-based authentication offers a highly usable and possibly a secondary authentication mechanism for such authorized access, especially as it canbe readily applied to small form-factor devices. Executing sophisticated machine learning pipelines for such authenticationon such devices remains an open problem, given their resource limitations in terms of storage, memory and computational power. To investigate this possibility, we compare the performance of an end-to-end system for both user identification anduser verification ...


Leveling The Playing Field: Supporting Neurodiversity Via Virtual Realities, LouAnne E. Boyd, Kendra Day, Natalia Stewart, Kaitlyn Abdo, Kathleen Lamkin, Erik J. Linstead 2018 University of California, Irvine

Leveling The Playing Field: Supporting Neurodiversity Via Virtual Realities, Louanne E. Boyd, Kendra Day, Natalia Stewart, Kaitlyn Abdo, Kathleen Lamkin, Erik J. Linstead

Mathematics, Physics, and Computer Science Faculty Articles and Research

Neurodiversity is a term that encapsulates the diverse expression of human neurology. By thinking in broad terms about neurological development, we can become focused on delivering a diverse set of design features to meet the needs of the human condition. In this work, we move toward developing virtual environments that support variations in sensory processing. If we understand that people have differences in sensory perception that result in their own unique sensory traits, many of which are clustered by diagnostic labels such as Autism Spectrum Disorder (ASD), Sensory Processing Disorder, Attention-Deficit/Hyperactivity Disorder, Rett syndrome, dyslexia, and so on, then ...


Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta JAISINGHANI, Rajesh Krishna BALAN, Vinayak NAIK, Archan MISRA, Youngki LEE 2018 Singapore Management University

Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta Jaisinghani, Rajesh Krishna Balan, Vinayak Naik, Archan Misra, Youngki Lee

Research Collection School Of Information Systems

Real-world deployments of WiFi-based indoor localization in large public venues are few and far between as most state-of-the-art solutions require either client or infrastructure-side changes. Hence, even though high location accuracy is possible with these solutions, they are not practical due to cost and/or client adoption reasons. Majority of the public venues use commercial controller-managed WLAN solutions, that neither allow client changes nor infrastructure changes. In fact, for such venues we have observed highly heterogeneous devices with very low adoption rates for client-side apps. In this paper, we present our experiences in deploying a scalable location system for such ...


A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver 2018 University of Alabama - Tuscaloosa

A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver

Computer Science: Faculty Publications and Other Works

Background: Breakthroughs in research increasingly depend on complex software libraries, tools, and applications aimed at supporting specific science, engineering, business, or humanities disciplines. The complexity and criticality of this software motivate the need for ensuring quality and reliability. Software metrics are a key tool for assessing, measuring, and understanding software quality and reliability. Aims: The goal of this work is to better understand how research software developers use traditional software engineering concepts, like metrics, to support and evaluate both the software and the software development process. One key aspect of this goal is to identify how the set of metrics ...


Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin 2018 Syracuse University

Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin

Electrical Engineering and Computer Science - Technical Reports

Infrastructure as a service (IaaS) is an enormously beneficial model for centralized data computation and storage. Yet, existing network-layer and hardware-layer security protections do not address a broad category of vulnerabilities known as side-channel attacks. Over the past several years, numerous techniques have been proposed at all layers of the software/hardware stack to prevent the inadvertent leakage of sensitive data. This report discusses a new technique which integrates seamlessly with C++ programs. We introduce a library, libOblivious, which provides thin wrappers around existing C++ standard template library classes, endowing them with the property of memory-trace obliviousness.


Issues In Reproducible Simulation Research, Ben G. Fitzpatrick 2018 Loyola Marymount University

Issues In Reproducible Simulation Research, Ben G. Fitzpatrick

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Disruptive Technology: Can The Banking Industry Harness Disruption For Competitive Edge?, Edgar LOW 2018 Singapore Management University

Disruptive Technology: Can The Banking Industry Harness Disruption For Competitive Edge?, Edgar Low

MITB Thought Leadership Series

Disruptive innovation was identified as a phenomenon more than two decades ago by prominent Harvard scholar Clayton Christensen. So you may wonder why established industries are only now waking up to the prospect of digital transformation - the banking industry in particular.


March Of The Silent Bots, Paul Robert GRIFFIN 2018 Singapore Management University

March Of The Silent Bots, Paul Robert Griffin

MITB Thought Leadership Series

Self-intelligent software robots, or ‘bots’ are everywhere. These small pieces of code run automated tasks when you order a taxi, search for a restaurant or check the weather. Quietly beavering away, it is unknown how many bots exist, but undoubtedly this number is set to surge over time. Already, bots comprise roughly half of all internet traffic.


Digital Commons powered by bepress