Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2377 Full-Text Articles 2640 Authors 558456 Downloads 106 Institutions

All Articles in Software Engineering

Faceted Search

2377 full-text articles. Page 4 of 78.

Fair Deposits Against Double-Spending For Bitcoin Transactions, Xingjie YU, Shiwen M. THANG, Yingjiu LI, Robert H. DENG 2017 Singapore Management University

Fair Deposits Against Double-Spending For Bitcoin Transactions, Xingjie Yu, Shiwen M. Thang, Yingjiu Li, Robert H. Deng

Research Collection School Of Information Systems

In Bitcoin network, the distributed storage of multiple copies of the blockchain opens up possibilities for double spending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. To detect the doublespending and penalize the malicious payer, decentralized non-equivocation contracts have been proposed. The basic idea of these contracts is that the payer locks some coins in a deposit when he initiates a transaction with the payee. If the payer double spends, a cryptographic primitive called accountable assertions can be used to reveal his Bitcoin credentials for the deposit. Thus, the malicious payer could ...


R2u2: Monitoring And Diagnosis Of Security Threats For Unmanned Aerial Systems, Patrick Moosbrugger, Kristin Yvonne Rozier, Johann Schumann 2017 Vienna University of Technology

R2u2: Monitoring And Diagnosis Of Security Threats For Unmanned Aerial Systems, Patrick Moosbrugger, Kristin Yvonne Rozier, Johann Schumann

Kristin Yvonne Rozier

We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, Realizable, Responsive, Unobtrusive Unit for runtime system analysis, now including security threat detection. R2U2 is designed to continuously monitor inputs from on-board components such as the GPS, the ground control station, other sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for Linear and Metric Temporal Logics ...


Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl 2017 California Polytechnic State University, San Luis Obispo

Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper explores the characteristics of the intuitive responses that are generated by our brain continuously in an automatic and effortless manner. However, while intuition is a very powerful mechanism, it is also subject to many biasing influences. The author discusses the role of intuition, examines representative examples of biasing influences, compares cognitive theories of intuition advanced by Simon (2002), Klein (2003 and 1999), and Kahneman (2011), and then advances a hypothetical explanation of the neurological operations underlying intuition based on Hebbian rules (Hebb 1949) of plasticity in combination with synergetic principles.


Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis 2017 Loyola University Chicago

Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis

George K. Thiruvathukal

Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language ...


Systemic Vulnerabilities In Customer-Premises Equipment (Cpe) Routers, Joel Land 2017 Carnegie Mellon University

Systemic Vulnerabilities In Customer-Premises Equipment (Cpe) Routers, Joel Land

Software Engineering Institute

Customer-premises equipment (CPE)—specifically small office/home office (SOHO) routers—has become ubiquitous. CPE routers are notorious for their web interface vulnerabilities, old versions of software components with known vulnerabilities, default and hard-coded credentials, and other security issues.

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers. It also describes the procedure the CERT/CC used in its analysis, and presents case studies and suggestions for tracking vulnerabilities in a way that encourages vendor responsiveness and increased customer awareness.


Testing And Debugging: A Reality Check, Pavneet Singh KOCHHAR 2017 Singapore Management University

Testing And Debugging: A Reality Check, Pavneet Singh Kochhar

Dissertations and Theses Collection

Testing and debugging are important activities during software development and maintenance. Testing is performed to check if the code contains errors whereas debugging is done to locate and fix these errors. Testing can be manual or automated and can be of different types such as unit, integration, system, stress etc. Debugging can also be manual or automated. These two activities have drawn attention of researchers in the recent years. Past studies have proposed many testing techniques such as automated test generation, test minimization, test case selection etc. Studies related to debugging have proposed new techniques to find bugs using various ...


Hybrid Based Approaches For Software Fault Localization And Specification Mining, Tien-Duy B. LE 2017 Singapore Management University

Hybrid Based Approaches For Software Fault Localization And Specification Mining, Tien-Duy B. Le

Dissertations and Theses Collection

Debugging programs and writing formal specifications are essential but expensive processes to maintain quality and reliability of software systems. Developers often have to debug and create specifications manually, which take a lot of their time and effort. Recently, several automated solutions have been proposed to help developers alleviate the cost of manual labor in the two processes. In particular, fault localization techniques help developer debug by accepting textual information in bug reports or program spectra (i.e., a record of which program elements are executed for each test case). Their output is a ranked list of program elements that are ...


Soft Sides Of Software, Luiz Fernando Capretz, Faheem Ahmed, Fabio Queda Silva 2017 University of Western Ontario

Soft Sides Of Software, Luiz Fernando Capretz, Faheem Ahmed, Fabio Queda Silva

Electrical and Computer Engineering Publications

Software is a field of rapid changes: the best technology today becomes obsolete in the near future. If we review the graduate attributes of any of the software engineering programs across the world, life-long learning is one of them. The social and psychological aspects of professional development is linked with rewards. In organizations, where people are provided with learning opportunities and there is a culture that rewards learning, people embrace changes easily. However, the software industry tends to be short-sighted and its primary focus is more on current project success; it usually ignores the capacity building of the individual or ...


Entagrec: An Enhanced Tag Recommendation System For Software Information Sites, Shaowei Wang, David LO, Bogdan Vasilescu, Alexander Serebrenik 2017 Singapore Management University

Entagrec: An Enhanced Tag Recommendation System For Software Information Sites, Shaowei Wang, David Lo, Bogdan Vasilescu, Alexander Serebrenik

Research Collection School Of Information Systems

Software engineers share experiences with modern technologies by means of software information sites, such as Stack Overflow. These sites allow developers to label posted content, referred to as software objects, with short descriptions, known as tags. However, tags assigned to objects tend to be noisy and some objects are not well tagged. To improve the quality of tags in software information sites, we propose EnTagRec, an automatic tag recommender based on historical tag assignments to software objects and we evaluate its performance on four software information sites, Stack Overflow, Ask Ubuntu, Ask Different, and Free code. We observe that that ...


Jfix: Semantics-Based Repair Of Java Programs Via Symbolic Pathfinder, Xuan Bach D. LE, Duc-Hiep CHU, David LO, GOUES LE, Willem VISSER 2017 Singapore Management University

Jfix: Semantics-Based Repair Of Java Programs Via Symbolic Pathfinder, Xuan Bach D. Le, Duc-Hiep Chu, David Lo, Goues Le, Willem Visser

Research Collection School Of Information Systems

Recently there has been a proliferation of automated program repair (APR) techniques, targeting various programming languages. Such techniques can be generally classified into two families: syntactic- and semantics-based. Semantics-based APR, on which we focus, typically uses symbolic execution to infer semantic constraints and then program synthesis to construct repairs conforming to them. While syntactic-based APR techniques have been shown success- ful on bugs in real-world programs written in both C and Java, semantics-based APR techniques mostly target C programs. This leaves empirical comparisons of the APR families not fully explored, and developers without a Java-based semantics APR technique. We present ...


Automatically Locating Malicious Packages In Piggybacked Android Apps, Li LI, Daoyuan LI, Tegawende BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, Yves LE TRAON 2017 Singapore Management University

Automatically Locating Malicious Packages In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon

Research Collection School Of Information Systems

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to ...


Lightweight Sharable And Traceable Secure Mobile Health System, Yang YANG, Robert H. DENG, Yingjiu LI 2017 Singapore Management University

Lightweight Sharable And Traceable Secure Mobile Health System, Yang Yang, Robert H. Deng, Yingjiu Li

Research Collection School Of Information Systems

Mobile health (mHealth) has emerged as a new patient centric model which allows real-time collection of patient data via wearable sensors, aggregation and encryption of these data at mobile devices, and then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers. However, efficient and scalable sharing of encrypted data has been a very challenging problem. In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient’s mobile device to data users. LiST enables efficient keyword search and finegrained ...


Measuring Program Comprehension: A Large-Scale Field Study With Professionals, Xin XIA, Lingfeng BAO, David LO, Zhengchang XING, Ahmed E. HASSAN, Shanping LI 2017 Singapore Management University

Measuring Program Comprehension: A Large-Scale Field Study With Professionals, Xin Xia, Lingfeng Bao, David Lo, Zhengchang Xing, Ahmed E. Hassan, Shanping Li

Research Collection School Of Information Systems

During software development and maintenance, developers spend a considerable amount of time on program comprehension activities. Previous studies show that program comprehension takes up as much as half of a developer's time. However, most of these studies are performed in a controlled setting, or with a small number of participants, and investigate the program comprehension activities only within the IDEs. However, developers' program comprehension activities go well beyond their IDE interactions. In this paper, we extend our ActivitySpace framework to collect and analyze Human-Computer Interaction (HCI) data across many applications (not just the IDEs). We follow Minelli et al ...


Adviser+: Toward A Usable Web-Based Algorithm Portfolio Deviser, Hoong Chuin LAU, Mustafa MISIR, Xiang LI LI, Lingxiao JIANG 2017 Singapore Management University

Adviser+: Toward A Usable Web-Based Algorithm Portfolio Deviser, Hoong Chuin Lau, Mustafa Misir, Xiang Li Li, Lingxiao Jiang

Research Collection School Of Information Systems

The present study offers a more user-friendly and parallelized version of a web-based algorithm portfolio generator, called ADVISER. ADVISER is a portfolio generation tool to deliver a group of configurations for a given set of algorithms targeting a particular problem. The resulting configurations are expected to be diverse such that each can perform well on a certain type of problem instances. One issue with ADVISER is that it performs portfolio generation on a single-core which results in long waiting times for the users. Besides that, it lacks of a reporting system with visualizations to tell more about the generated portfolios ...


Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, Dong In KIM 2017 Singapore Management University

Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

Research Collection School Of Information Systems

With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technologyto understand and create an engaging user experience. This paper proposes afast adaptation and learning scheme of activity tracking policies when userstatistics are unknown a priori, varying with time, and inconsistent for differentusers. In our stochastic optimization, user activities are required to besynchronized with a backend under a cellular data limit to avoid overchargesfrom cellular operators. The mobile device is charged intermittently usingwireless or wired charging for receiving the required energy for transmission andsensing operations. Firstly, we propose an activity tracking ...


Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, Dong In KIM 2017 Singapore Management University

Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

Research Collection School Of Information Systems

With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technologyto understand and create an engaging user experience. This paper proposes afast adaptation and learning scheme of activity tracking policies when userstatistics are unknown a priori, varying with time, and inconsistent for differentusers. In our stochastic optimization, user activities are required to besynchronized with a backend under a cellular data limit to avoid overchargesfrom cellular operators. The mobile device is charged intermittently usingwireless or wired charging for receiving the required energy for transmission andsensing operations. Firstly, we propose an activity tracking ...


Cyber Foraging: Fifteen Years Later, Rajesh Krishna BALAN, Jason FLINN 2017 Singapore Management University

Cyber Foraging: Fifteen Years Later, Rajesh Krishna Balan, Jason Flinn

Research Collection School Of Information Systems

Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special issue on pervasive computing revisited.


Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli MO, Lipyeow LIM, Sougata SEN, Archan MISRA, Rajesh Krishna BALAN, Youngki LEE 2017 Singapore Management University

Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli Mo, Lipyeow Lim, Sougata Sen, Archan Misra, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Information Systems

In this paper, we reduce the energy overheads of continuous mobile sensing, specifically for the case of context-aware applications that are interested in collective context or events, i.e., events expressed as a set of complex predicates over sensor data from multiple smartphones. We propose a cloud-based query management and optimization framework, called CloQue, that can support thousands of such concurrent queries, executing over a large number of individual smartphones. Our central insight is that the context of different individuals & groups often have significant correlation, and that this correlation can be learned through standard association rule mining on historical data. CloQue’s exploits such correlation to reduce energy overheads via two key innovations: (i) dynamically reordering the order of predicate processing to preferentially select predicates with not just lower sensing cost and higher selectivity, but that maximally reduce the uncertainty about other context predicates; and (ii) intelligently propagating the query evaluation results to dynamically update the confidence values of other correlated context predicates. We ...


Hot Topics In Cloud Computing, Liang-Jie Zhang, Jia Zhang, Jinan Fiaidhi, J. Morris Chang 2017 Carnegie Mellon University, Silicon Valley

Hot Topics In Cloud Computing, Liang-Jie Zhang, Jia Zhang, Jinan Fiaidhi, J. Morris Chang

Morris Chang

No abstract provided.


A Quantitative Cost/Benefit Analysis For Dynamic Updating, Bashar Gharaibeh, Hridesh Rajan, J. Morris Chang 2017 Iowa State University

A Quantitative Cost/Benefit Analysis For Dynamic Updating, Bashar Gharaibeh, Hridesh Rajan, J. Morris Chang

Morris Chang

Dynamic software updating provides many benefits, e.g. in runtime monitoring, runtime adaptation to fix bugs in long running applications, etc. Although it has several advantages, no quantitative analysis of its costs and revenue are available to show its benefits or limitations especially in comparison with other software updating schemes. To address this limitation in evaluating software updating schemes, we contribute a quantitative cost/benefit analysis based on net option-value model, which stems from the analysis of financial options. Our model expresses the relation between added value and paid cost in mathematical forms. We have used this model to evaluate ...


Digital Commons powered by bepress