Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,089 Full-Text Articles 2,493 Authors 558,456 Downloads 116 Institutions

All Articles in Software Engineering

Faceted Search

2,089 full-text articles. Page 4 of 71.

Rule-Based Specification Mining Leveraging Learning To Rank, Zherui CAO, Yuan TIAN, Bui Tien Duy LE, David LO 2018 Singapore Management University

Rule-Based Specification Mining Leveraging Learning To Rank, Zherui Cao, Yuan Tian, Bui Tien Duy Le, David Lo

Research Collection School Of Information Systems

Software systems are often released without formal specifications. To deal with the problem of lack of and outdated specifications, rule-based specification mining approaches have been proposed. These approaches analyze execution traces of a system to infer the rules that characterize the protocols, typically of a library, that its clients must obey. Rule-based specification mining approaches work by exploring the search space of all possible rules and use interestingness measures to differentiate specifications from false positives. Previous rule-based specification mining approaches often rely on one or two interestingness measures, while the potential benefit of combining multiple available interestingness measures is not ...


The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid 2018 Dartmouth College

The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid

Open Dartmouth: Faculty Open Access Articles

Algorithms for predicting recidivism are commonly used to assess a criminal defendant’s likelihood of committing a crime. These predictions are used in pretrial, parole, and sentencing decisions. Proponents of these systems argue that big data and advanced machine learning make these analyses more accurate and less biased than humans. We show, however, that the widely used commercial risk assessment software COMPAS is no more accurate or fair than predictions made by people with little or no criminal justice expertise. We further show that a simple linear predictor provided with only two features is nearly equivalent to COMPAS with its ...


Software Engineering Lecture Notes (Student Version), Kyle Burke 2018 Plymouth State University

Software Engineering Lecture Notes (Student Version), Kyle Burke

Open Educational Resources

Lecture notes for an upper-level undergraduate software engineering course, with a strong focus on software design. Students taking this course should have already completed a data structures course. These notes are designed to be used with Dale Skrien’s text Object Oriented Design using Java.


Reproducible Research For Computing In Science & Engineering, Lorena A. Barba, George K. Thiruvathukal 2018 George Washington University

Reproducible Research For Computing In Science & Engineering, Lorena A. Barba, George K. Thiruvathukal

George K. Thiruvathukal

The editors of the new track for reproducible research outline the parameters for future peer review, submission, and access, highlighting the magazine’s previous work in this field and some of the challenges still to come.


Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz 2018 Michigan University

Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Software organizations have relied on process and technology initiatives to compete in a highly globalized world. Unfortunately, that has led to little or no success. We propose that the organizations start working on people initiatives, such as inspiring egoless behavior among software developers. This paper proposes a multi-stage approach to develop egoless behavior and discusses the universality of the egoless behavior by studying cohorts from three different countries, i.e., Japan, India, and Canada. The three stages in the approach are self-assessment, peer validation, and action plan development. The paper covers the first stage of self-assssment using an instrument based ...


Energy Slices: Benchmarking With Time Slicing, Katarina Grolinger, Hany F. ElYamany, Wilson Higashino, Miriam AM Capretz, Luke Seewald 2018 Western University

Energy Slices: Benchmarking With Time Slicing, Katarina Grolinger, Hany F. Elyamany, Wilson Higashino, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

Benchmarking makes it possible to identify low-performing buildings, establishes a baseline for measuring performance improvements, enables setting of energy conservation targets, and encourages energy savings by creating a competitive environment. Statistical approaches evaluate building energy efficiency by comparing measured energy consumption to other similar buildings typically using annual measurements. However, it is important to consider different time periods in benchmarking because of differences in their consumption patterns. For example, an office can be efficient during the night, but inefficient during operating hours due to occupants’ wasteful behavior. Moreover, benchmarking studies often use a single regression model for different building categories ...


Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner 2018 University of North Florida

Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner

UNF Graduate Theses and Dissertations

This thesis involves parsing document-based reports from the United States Human Rights Reports and rating the human practices for various countries based on the CIRI (Cingranelli-Richards) Human Rights Data Project dataset. The United States Human Rights Reports are annual reports that cover internationally recognized human rights practices regarding individual, civil, political, and worker rights. Students, scholars, policymakers, and analysts used the CIRI data for practical and research purposes. CIRI analyzed the annual reports from 1981 to 2011 and then stopped releasing the dataset for any further years, but a possible reason is due to the manual process of scouring the ...


An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala 2018 Georgia Southern University

An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala

University Honors Program Theses

For many students entering college, meeting new people and studying are a common struggle. Study groups are generally recommended, especially if the groups are comprised of members with complementary personality traits. But the challenge still remains, how do freshmen or transfer students find and form these heterogeneous study groups. In order to help alleviate this issue, an Android application was developed to automatically create study groups for students. Using basic information provided by students upon registration, the algorithm is able to automatically find matching group members. The application was designed using an agile life cycle model over the course of ...


Hybrid Traversal: Efficient Source Code Analysis At Scale, Ramanathan Ramu, Ganesha Upadhyaya, Hoan A. Nguyen, Hridesh Rajan 2018 Iowa State University

Hybrid Traversal: Efficient Source Code Analysis At Scale, Ramanathan Ramu, Ganesha Upadhyaya, Hoan A. Nguyen, Hridesh Rajan

Computer Science Conference Presentations, Posters and Proceedings

Source code analysis at a large scale is useful for solving many software engineering problems, however, could be very expensive, thus, making its use difficult. This work proposes hybrid traversal, a technique for performing source code analysis over control flow graphs more efficiently. Analysis over a control flow graph requires traversing the graph and it can be done using several traversal strategies. Our observation is that no single traversal strategy is suitable for different analyses and different graphs.

Our key insight is that using the characteristics of the analysis and the properties of the graph it is possible to select ...


Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe 2018 Iowa State University

Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe

Veterinary Diagnostic and Production Animal Medicine Conference Proceedings and Presentations

The second meeting of the International Collaboration for Automation of Systematic Reviews (ICASR) was held 3–4 October 2016 in Philadelphia, Pennsylvania, USA. ICASR is an interdisciplinary group whose aim is to maximize the use of technology for conducting rapid, accurate, and efficient systematic reviews of scientific evidence. Having automated tools for systematic review should enable more transparent and timely review, maximizing the potential for identifying and translating research findings to practical application. The meeting brought together multiple stakeholder groups including users of summarized research, methodologists who explore production processes and systematic review quality, and technologists such as software developers ...


Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen 2018 Bard College

Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen

Senior Projects Spring 2018

Immersion, the state of being fully engaged in one's current operation, is a descriptor commonly used to appraise user experience in computer games and software applications. As the use of brain-computer interfaces (BCIs) begins to expand into the consumer sphere, questions arise concerning the ability of BCIs to modulate user immersion. This study employed a computer game to examine the effect of a consumer-grade BCI (the Emotiv EPOC) on immersion. In doing so, this study also explored the relationship between BCI usability and immersion levels. An experiment with twenty-seven participants showed that users were significantly more immersed when controlling ...


Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi SenthilarumugamVeilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette 2018 Iowa State University

Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi Senthilarumugamveilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette

Mechanical Engineering Conference Presentations, Papers, and Proceedings

In healthcare, a tremendous amount of clinical and laboratory tests, imaging, prescription and medication data are being collected. Big data analytics on these data aim at early detection of disease which will help in developing preventive measures and in improving patient care. Parkinson disease is the second-most common neurodegenerative disorder in the United States. To find a cure for Parkinson's disease biological, clinical and behavioral data of different cohorts are collected, managed and propagated through Parkinson’s Progression Markers Initiative (PPMI). Applying big data technology to this data will lead to the identification of the potential biomarkers of Parkinson ...


Consuming Digital Debris In The Plasticene, Stephen R. Parks 2018 Virginia Commonwealth University

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D ...


Traffic Congestion Alert System In Work Zone, Vamsi Krishna Jagarlamudi 2018 Iowa State University

Traffic Congestion Alert System In Work Zone, Vamsi Krishna Jagarlamudi

Creative Components

Road work zones cause more than ten percent of congestion and are the main reason for nonrecurring congestion on freeways. The existing notification system at Iowa work zones was less efficient with handling the fluctuating and short duration messages. In this report, we explain the software developed to send reliable congestion alerts using the real-time traffic data.

The system is implemented to consume the Wavetronix sensor data for every twenty seconds and identifies the traffic congestion state in three predefined formats, such as ”Stop traffic ahead, ”Slow traffic ahead” and ”No congestion.” Whenever severe traffic congestion persists more than the ...


Lightning Draft, Benjamin Sweedler 2018 California Polytechnic State University, San Luis Obispo

Lightning Draft, Benjamin Sweedler

Computer Science

Lightning Draft is a web application for drafting Magic: the Gathering cards. Users can visit www.lightningdraft.online to build a deck from randomly generated booster packs. This app was inspired by digital card games such as Hearthstone. Lightning Draft is a quick, fun, and simple alternative to drafting with physical cards.


Sparse Passive-Aggressive Learning For Bounded Online Kernel Methods, Jing LU, Doyen SAHOO, Steven C. H. HOI, Steven C. H. HOI 2018 Singapore Management University

Sparse Passive-Aggressive Learning For Bounded Online Kernel Methods, Jing Lu, Doyen Sahoo, Steven C. H. Hoi, Steven C. H. Hoi

Research Collection School Of Information Systems

One critical deficiency of traditional online kernel learning methods is their unbounded and growing number of support vectors in the online learning process, making them inefficient and non-scalable for large-scale applications. Recent studies on scalable online kernel learning have attempted to overcome this shortcoming, e.g., by imposing a constant budget on the number of support vectors. Although they attempt to bound the number of support vectors at each online learning iteration, most of them fail to bound the number of support vectors for the final output hypothesis, which is often obtained by averaging the series of hypotheses over all ...


Early Detection Of Mild Cognitive Impairment In Elderly Through Iot: Preliminary Findings, Hwee Xian TAN, Hwee-Pink TAN 2018 Singapore Management University

Early Detection Of Mild Cognitive Impairment In Elderly Through Iot: Preliminary Findings, Hwee Xian Tan, Hwee-Pink Tan

Research Collection School Of Information Systems

Mild Cognitive Impairment (MCI) results in thegradual decline in a person’s cognitive abilities, and subsequentlyan increased risk of developing dementia. Although there is nocure for dementia, timely medical and clinical interventions canbe administered to elderly who have been diagnosed with MCI, todecelerate the process of further cognitive decline and prolong theduration that they enjoy quality of life. In this paper, we presentour preliminary findings of early detection of MCI in elderlywho are living in the community, through the use of Internet ofThings (IoT) devices for continuous, unobtrusive sensing. Multimodalsensors are placed in the residences of elderly, to monitortheir Activities ...


Exact And Heuristic Approaches For The Multi-Agent Orienteering Problem With Capacity Constraints, Wenjie WANG, Hoong Chuin LAU, Shih-Fen CHENG 2018 Singapore Management University

Exact And Heuristic Approaches For The Multi-Agent Orienteering Problem With Capacity Constraints, Wenjie Wang, Hoong Chuin Lau, Shih-Fen Cheng

Research Collection School Of Information Systems

This paper introduces and addresses a new multiagent variant of the orienteering problem (OP), namely the multi-agent orienteering problem with capacity constraints (MAOPCC). Different from the existing variants of OP, MAOPCC allows a group of visitors to concurrently visit a node but limits the number of visitors simultaneously being served at each node. In this work, we solve MAOPCC in a centralized manner and optimize the total collected rewards of all agents. A branch and bound algorithm is first proposed to find an optimal MAOPCC solution. Since finding an optimal solution for MAOPCC can become intractable as the number of ...


Competency Analytics Tool: Analyzing Curriculum Using Course Competencies, Swapna GOTTIPATI, Venky SHANKARARAMAN 2018 Singapore Management University

Competency Analytics Tool: Analyzing Curriculum Using Course Competencies, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Information Systems

The applications of learning outcomes and competency frameworks have brought better clarity to engineering programs in many universities. Several frameworks have been proposed to integrate outcomes and competencies into course design, delivery and assessment. However, in many cases, competencies are course-specific and their overall impact on the curriculum design is unknown. Such impact analysis is important for analyzing, discovering gaps and improving the curriculum design. Unfortunately, manual analysis is a painstaking process due to large amounts of competencies across the curriculum. In this paper, we propose an automated method to analyze the competencies and discover their impact on the overall ...


Comparing The Usage Of React Native And Ionic, Sam Borick 2018 The University of Akron

Comparing The Usage Of React Native And Ionic, Sam Borick

Honors Research Projects

This project will compare two popular programming frameworks for building mobile applications. These frameworks are called ‘cross-platform frameworks’ as they can develop applications on multiple platforms. The scope of this project is to understand the structural reasons for the differences in these frameworks. While this project does speculate on reasons for choosing either framework, this project does not attempt to make a hard recommendation.

In this project, I built two applications, as similar as possible, in React Native and Ionic. I found that there were differences in the goals of these frameworks, lending each of the two better to different ...


Digital Commons powered by bepress