Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,224 Full-Text Articles 2,686 Authors 558,456 Downloads 120 Institutions

All Articles in Software Engineering

Faceted Search

2,224 full-text articles. Page 3 of 76.

Neural-Machine-Translation-Based Commit Message Generation: How Far Are We?, Zhongxin LIU, Xin XIA, Ahmed E. HASSAN, David LO, Zhenchang XING, Xinyu WANG 2018 Singapore Management University

Neural-Machine-Translation-Based Commit Message Generation: How Far Are We?, Zhongxin Liu, Xin Xia, Ahmed E. Hassan, David Lo, Zhenchang Xing, Xinyu Wang

Research Collection School Of Information Systems

Commit messages can be regarded as the documentation of software changes. These messages describe the content and purposes of changes, hence are useful for program comprehension and software maintenance. However, due to the lack of time and direct motivation, commit messages sometimes are neglected by developers. To address this problem, Jiang et al. proposed an approach (we refer to it as NMT), which leverages a neural machine translation algorithm to automatically generate short commit messages from code. The reported performance of their approach is promising, however, they did not explore why their approach performs well. Thus, in this paper, we ...


Api Method Recommendation Without Worrying About The Task-Api Knowledge Gap, Qiao HUANG, Xin XIA, Zhenchang XING, David LO, Xinyu WANG 2018 Singapore Management University

Api Method Recommendation Without Worrying About The Task-Api Knowledge Gap, Qiao Huang, Xin Xia, Zhenchang Xing, David Lo, Xinyu Wang

Research Collection School Of Information Systems

Developers often need to search for appropriate APIs for theirprogramming tasks. Although most libraries have API referencedocumentation, it is not easy to find appropriate APIs due to thelexical gap and knowledge gap between the natural language description of the programming task and the API description in APIdocumentation. Here, the lexical gap refers to the fact that the samesemantic meaning can be expressed by different words, and theknowledge gap refers to the fact that API documentation mainlydescribes API functionality and structure but lacks other types ofinformation like concepts and purposes, which are usually the keyinformation in the task description. In this ...


Cloud Service Reliability And Usability Measurement, Abdullah Bokhary 2018 Southern Methodist University

Cloud Service Reliability And Usability Measurement, Abdullah Bokhary

Computer Science and Engineering Theses and Dissertations

Cloud computing has become a major resource for fulfilling people's computational and storage needs. Investing in these services requires measuring and assuring its quality in general, and reliability and usability are primary concerns. However, using traditional reliability models can be challenging because of the environmental constraints and limited data availability due to the heterogeneous environment and diverse stakeholders. Also, the quality of cloud service Application Programming Interfaces (APIs) has a direct impact on the usability and reliability of the service.

We developed a framework to measure reliability with alternative available information that most cloud providers offer in three stages ...


Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin 2018 Purdue University

Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin

The Summer Undergraduate Research Fellowship (SURF) Symposium

The rise of Bitcoin and cryptocurrencies over the last decade have made its underlying technology (blockchain) come into the spotlight. Blockchain is a secure ledger of linked records called blocks. These records are cryptographically immutable and any tampering with the block is evident through a change in the cryptographic signature of the block. Among the blockchains deployed in practice today, Hyperledger Fabric is a platform that allows businesses to make use of blockchains in their applications. However, confidentiality issues arise with respects to the blocks in this blockchain network due to the fact that blocks might contain sensitive information accessible ...


Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp 2018 University of Colorado, Boulder

Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp

Keyboard Graduate Theses & Dissertations

Modern music tutoring software and mobile instructional applications have great potential to help students practice at home effectively. They can offer extensive feedback on what the student is getting right and wrong and have adopted a gamified design with levels, badges, and other game-like elements to help gain wider appeal among students. Despite their advantages for motivating students and creating a safe practice environment, no current music instruction software demonstrates any knowledge about a student’s level of mastery. This can lead to awkward pedagogy and user frustration. Applying Bayesian Knowledge Tracing to tutoring systems provides an ideal way to ...


Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin 2018 Syracuse University

Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin

Electrical Engineering and Computer Science - Technical Reports

We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trusted boot loader performs a cryptographic measurement (hash) of program code and executes it unconditionally, allowing later-stage software to verify the integrity of the system through local or remote attestation. A secure loader differs from a trusted loader in that it executes subsequent code only if measurements of that code match known-good values. We have applied a rigorous formal verification technique recently demonstrated in practice by NICTA in their verification of the seL4 microkernel. We summarize our design philosophy from a high level and present our ...


Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu 2018 STAR Program

Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu

STAR (STEM Teacher and Researcher) Presentations

World Wind is an open-source API developed for Java, Android, and browsers that is designed to visualize and interact with geospatial data. The Web World Wind client is composed of four major components: the HTML template, the globe, geospatial features, and application features. The template was implemented using Bootstrap and hosts the globe provided by World Wind. This globe draws its data from multiple imagery sources, including the Open Geospatial Consortium (OGC) Web Map Service and Web Map Tile Service. This enables the application to perform and visualize complex calculations with multiple types of data such as weather and terrain ...


Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton 2018 Boise State University

Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton

Boise State University Theses and Dissertations

As storage needs continually increase, and network file systems become more common, the need arises for tools that efficiently copy to and from these types of file systems. Traditional copy tools like the Linux cp utility were originally created for traditional storage systems, where storage is managed by a single host machine. cp uses a single-threaded approach to copying files. Using a multi-threaded approach would likely not provide an advantage in this system since the disk accesses are the bottleneck for this type of operation. In a distributed file system the disk accesses are spread across multiple hosts, and many ...


Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa 2018 Boise State University

Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa

Boise State University Theses and Dissertations

Describing scenes such as rooms, city streets, or routes, is a very common human task that requires the ability to identify and describe the scene sufficiently for a hearer to develop a mental model of the scene. When people talk about such scenes, they mention some objects of the scene at the exclusion of others. We call the mentioned objects salient objects as people consider them noticeable or important in comparison to other non-mentioned objects. In this thesis, we look at saliency of visual scenes and how visual saliency informs what can and should be said about a scene when ...


Chaff From The Wheat: Characterizing And Determining Valid Bug Reports, Yuanrui FAN, Xin XIA, David LO, Ahmed E. HASSAN 2018 Zhejiang University

Chaff From The Wheat: Characterizing And Determining Valid Bug Reports, Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan

Research Collection School Of Information Systems

Developers use bug reports to triage and fix bugs. When triaging a bug report, developers must decide whether the bug report is valid (i.e., a real bug). A large amount of bug reports are submitted every day, with many of them end up being invalid reports. Manually determining valid bug report is a difficult and tedious task. Thus, an approach that can automatically analyze the validity of a bug report and determine whether a report is valid can help developers prioritize their triaging tasks and avoid wasting time and effort on invalid bug reports.


Lightweight Call-Graph Construction For Multilingual Software Analysis, Anne-Marie Bogar, Damian Lyons, David Baird 2018 Fordham University

Lightweight Call-Graph Construction For Multilingual Software Analysis, Anne-Marie Bogar, Damian Lyons, David Baird

Faculty Publications

Analysis of multilingual codebases is a topic of increasing importance. In prior work, we have proposed the MLSA (MultiLingual Software Analysis) architecture, an approach to the lightweight analysis of multilingual codebases, and have shown how it can be used to address the challenge of constructing a single call graph from multilingual software with mutual calls. This paper addresses the challenge of constructing monolingual call graphs in a lightweight manner (consistent with the objective of MLSA) which nonetheless yields sufficient information for resolving language interoperability calls. A novel approach is proposed which leverages information from a ...


Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird 2018 Fordham University

Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird

Faculty Publications

Large software systems can often be multilingual – that is, software systems are written in more than one language. However, many popular software engineering tools are monolingual by nature. Nonetheless, companies are faced with the need to manage their large, multilingual codebases to address issues with security, efficiency, and quality metrics. This paper presents a novel lightweight approach to multilingual software analysis – MLSA. The approach is modular and focused on efficient static analysis computation for large codebases. One topic is addressed in detail – the generation of multilingual call graphs to identify language boundary problems in multilingual code. The algorithm for extracting ...


Data Scientist’S Analysis Toolbox: Comparison Of Python, R, And Sas Performance, Jim Brittain, Mariana Cendon, Jennifer Nizzi, John Pleis 2018 Southern Methodist University

Data Scientist’S Analysis Toolbox: Comparison Of Python, R, And Sas Performance, Jim Brittain, Mariana Cendon, Jennifer Nizzi, John Pleis

SMU Data Science Review

A quantitative analysis will be performed on experiments utilizing three different tools used for Data Science. The analysis will include replication of analysis along with comparisons of code length, output, and results. Qualitative data will supplement the quantitative findings. The conclusion will provide data support guidance on the correct tool to use for common situations in the field of Data Science.


Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird 2018 Fordham University

Lightweight Multilingual Software Analysis, Damian Lyons, Anne Marie Bogar, David Baird

Faculty Publications

Developer preferences, language capabilities and the persistence of older languages contribute to the trend that large software codebases are often multilingual – that is, written in more than one computer language. While developers can leverage monolingual software development tools to build software components, companies are faced with the problem of managing the resultant large, multilingual codebases to address issues with security, efficiency, and quality metrics. The key challenge is to address the opaque nature of the language interoperability interface: one language calling procedures in a second (which may call a third, or even back to the first), resulting in a potentially ...


Searching For Relevant Lessons Learned Using Hybrid Information Retrieval Classifiers: A Case Study In Software Engineering, Tamer Mohamed Abdellatif Mohamed, Luiz Fernando Capretz, Danny Ho 2018 The University of Western Ontario

Searching For Relevant Lessons Learned Using Hybrid Information Retrieval Classifiers: A Case Study In Software Engineering, Tamer Mohamed Abdellatif Mohamed, Luiz Fernando Capretz, Danny Ho

Electrical and Computer Engineering Publications

The lessons learned (LL) repository is one of the most valuable sources of knowledge for a software organization. It can provide distinctive guidance regarding previous working solutions for historical software management problems, or former success stories to be followed. However, the unstructured format of the LL repository makes it difficult to search using general queries, which are manually inputted by project managers (PMs). For this reason, this repository may often be overlooked despite the valuable information it provides. Since the LL repository targets PMs, the search method should be domain specific rather than generic as in the case of general ...


Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue OU, Huiguang LIANG, Hwee Xian TAN 2018 Institute of High Performance Computing

Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue Ou, Huiguang Liang, Hwee Xian Tan

Research Collection School Of Information Systems

Depression in the elderly is common and dangerous. Current methods to monitor elderly depression, however, are costly, time-consuming and inefficient. In this paper, we present a novel depression-monitoring system that infers an elderly’s changes in depression level based on his/her activity patterns, extracted from wireless sensor data. To do so, we build predictive models to learn the relationship between depression level changes and behaviors using historical data. We also deploy the system for a group of elderly, in their homes, and run the experiments for more than one year. Our experimental study gives encouraging results, suggesting that our ...


Unobtrusive Detection Of Frailty In Older Adults, Nadee GOONAWARDENE, Hwee-Pink TAN, Lee Buay TAN 2018 Singapore Management University

Unobtrusive Detection Of Frailty In Older Adults, Nadee Goonawardene, Hwee-Pink Tan, Lee Buay Tan

Research Collection School Of Information Systems

Sensor technologies have gained attention as an effective means to monitor physical and mental wellbeing of elderly. In this study, we examined the possibility of using passive in-home sensors to detect frailty in older adults based on their day-to-day in-home living pattern. The sensor-based elderly monitoring system consists of PIR motion sensors and a door contact sensor attached to the main door. A set of pre-defined features associated with elderly’s day-to-day living patterns were derived based on sensor data of 46 elderly gathered over two different time periods. A series of feature vectors depicting different behavioral aspects were derived ...


Technology-Enabled Medication Adherence For Seniors Living In The Community: Experiences, Lessons, And The Road Ahead, Hwee Xian TAN, Hwee-Pink TAN, Huiguang LIANG 2018 Singapore Management University

Technology-Enabled Medication Adherence For Seniors Living In The Community: Experiences, Lessons, And The Road Ahead, Hwee Xian Tan, Hwee-Pink Tan, Huiguang Liang

Research Collection School Of Information Systems

Medication non-adherence in seniors can lead to severe health complications, including morbidity, mortality and decreased quality of life. In view of ageing populations worldwide, there is significant interest among the healthcare sector and researchers to improve medication adherence rates for seniors. However, existing studies in the literature focus primarily on identifying the predictors of medication non-adherence. In this paper, we present our work on technology-enabled medication adherence for 24 community-dwelling seniors over a period of more than 2 years. We leverage Internet of Things (IoT) devices to track inferred medication consumption in the seniors’ homes, and provide quasi real-time alerts ...


Summarizing Source Code With Transferred Api Knowledge, Xing HU, Ge LI, Xin XIA, David LO, Shuai LU, Zhi JIN 2018 Singapore Management University

Summarizing Source Code With Transferred Api Knowledge, Xing Hu, Ge Li, Xin Xia, David Lo, Shuai Lu, Zhi Jin

Research Collection School Of Information Systems

Code summarization, aiming to generate succinctnatural language description of source code, is extremely useful for code search and code comprehension. It has played an important role in softwaremaintenance and evolution. Previous approachesgenerate summaries by retrieving summaries fromsimilar code snippets. However, these approachesheavily rely on whether similar code snippets canbe retrieved, how similar the snippets are, and failto capture the API knowledge in the source code,which carries vital information about the functionality of the source code. In this paper, we propose anovel approach, named TL-CodeSum, which successfully uses API knowledge learned in a different but related task to code summarization ...


Deep Specification Mining, Bui Tien Duy LE, David LO 2018 Singapore Management University

Deep Specification Mining, Bui Tien Duy Le, David Lo

Research Collection School Of Information Systems

Formal specifications are essential but usually unavailable in software systems. Furthermore, writing these specifications is costlyand requires skills from developers. Recently, many automatedtechniques have been proposed to mine specifications in variousformats including finite-state automaton (FSA). However, moreworks in specification mining are needed to further improve theaccuracy of the inferred specifications.In this work, we propose Deep Specification Miner (DSM), anew approach that performs deep learning for mining FSA-basedspecifications. Our proposed approach uses test case generation togenerate a richer set of execution traces for training a RecurrentNeural Network Based Language Model (RNNLM). From theseexecution traces, we construct a Prefix Tree Acceptor ...


Digital Commons powered by bepress