Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,932 Full-Text Articles 5,346 Authors 1,338,883 Downloads 167 Institutions

All Articles in Software Engineering

Faceted Search

3,932 full-text articles. Page 58 of 155.

Evolutionary Trends In The Collaborative Review Process Of A Large Software System, Subhajit DATTA, Poulami SARKAR 2019 Singapore Management University

Evolutionary Trends In The Collaborative Review Process Of A Large Software System, Subhajit Datta, Poulami Sarkar

Research Collection School Of Computing and Information Systems

In this paper, we study the evolutionary trends in the collaborative review process of a large open source software system. As expected, the number of reviews, the number of reviews commented on, as well as the number of reviewers, and the interactions between them show increasing trends over time. But unexpectedly, levels of clustering between developers in their interaction networks show a decreasing trend, even as connections between them increase. In the context of our study, clustering is an indicator of developer collaboration, whereas connection points to how intensely developers work together. Thus the trends we observe can inform how …


Dish: Democracy In State Houses, Nicholas A. Russo 2019 California Polytechnic State University, San Luis Obispo

Dish: Democracy In State Houses, Nicholas A. Russo

Master's Theses

In our current political climate, state level legislators have become increasingly impor- tant. Due to cuts in funding and growing focus at the national level, public oversight for these legislators has drastically decreased. This makes it difficult for citizens and activists to understand the relationships and commonalities between legislators. This thesis provides three contributions to address this issue. First, we created a data set containing over 1200 features focused on a legislator’s activity on bills. Second, we created embeddings that represented a legislator’s level of activity and engagement for a given bill using a custom model called Democracy2Vec. Third, we …


Deception In Finitely Repeated Security Games, Thanh H. NGUYEN, Yongzhao WANG, Arunesh SINHA, Michael P. WELLMAN 2019 Singapore Management University

Deception In Finitely Repeated Security Games, Thanh H. Nguyen, Yongzhao Wang, Arunesh Sinha, Michael P. Wellman

Research Collection School Of Computing and Information Systems

Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities, objectives, or other underlying characteristics. In a repeated interaction setting, the defender can collect attack data over time to reduce this uncertainty and learn an effective defense. However, a clever attacker can manipulate the attack data to mislead the defender, influencing the learning process toward its own benefit. We investigate strategic deception on the part of an attacker with private type information, who interacts repeatedly with a defender. We present a detailed computation and analysis of both players’ optimal strategies given the attacker may …


Recommending New Features From Mobile App Descriptions, He JIANG, Jingxuan ZHANG, Xiaochen LI, Zhilei REN, David LO, Xindong WU, Zhongxuan LUO 2019 Singapore Management University

Recommending New Features From Mobile App Descriptions, He Jiang, Jingxuan Zhang, Xiaochen Li, Zhilei Ren, David Lo, Xindong Wu, Zhongxuan Luo

Research Collection School Of Computing and Information Systems

The rapidly evolving mobile applications (apps) have brought great demand for developers to identify new features by inspecting the descriptions of similar apps and acquire missing features for their apps. Unfortunately, due to the huge number of apps, this manual process is time-consuming and unscalable. To help developers identify new features, we propose a new approach named SAFER. In this study, we first develop a tool to automatically extract features from app descriptions. Then, given an app, we leverage the topic model to identify its similar apps based on the extracted features and API names of apps. Finally, we design …


Preference-Aware Task Assignment In On-Demand Taxi Dispatching: An Online Stable Matching Approach, Boming ZHAO, Pan XU, Yexuan SHI, Yongxin TONG, Zimu ZHOU, Yuxiang ZENG 2019 Singapore Management University

Preference-Aware Task Assignment In On-Demand Taxi Dispatching: An Online Stable Matching Approach, Boming Zhao, Pan Xu, Yexuan Shi, Yongxin Tong, Zimu Zhou, Yuxiang Zeng

Research Collection School Of Computing and Information Systems

No abstract provided.


Grand Challenges In Accessible Maps, Jon E. FROEHLICH, Anke M. BROCK, Anat CASPI, Joao GUERREIRO, Kotaro HARA, Reuben KIRKHAM, Johannes SCHONING, Benjamin TANNERT 2019 Singapore Management University

Grand Challenges In Accessible Maps, Jon E. Froehlich, Anke M. Brock, Anat Caspi, Joao Guerreiro, Kotaro Hara, Reuben Kirkham, Johannes Schoning, Benjamin Tannert

Research Collection School Of Computing and Information Systems

In this forum we celebrate research that helps to successfully bring the benefits of computing technologies to children, older adults, people with disabilities, and other populations that are often ignored in the design of mass-marketed products.


A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver 2019 University of Alabama - Tuscaloosa

A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver

George K. Thiruvathukal

Background: Breakthroughs in research increasingly depend on complex software libraries, tools, and applications aimed at supporting specific science, engineering, business, or humanities disciplines. The complexity and criticality of this software motivate the need for ensuring quality and reliability. Software metrics are a key tool for assessing, measuring, and understanding software quality and reliability. Aims: The goal of this work is to better understand how research software developers use traditional software engineering concepts, like metrics, to support and evaluate both the software and the software development process. One key aspect of this goal is to identify how the set of metrics …


Successor Features Based Multi-Agent Rl For Event-Based Decentralized Mdps, Tarun GUPTA, Akshat KUMAR, Praveen PARUCHURI 2019 Singapore Management University

Successor Features Based Multi-Agent Rl For Event-Based Decentralized Mdps, Tarun Gupta, Akshat Kumar, Praveen Paruchuri

Research Collection School Of Computing and Information Systems

Decentralized MDPs (Dec-MDPs) provide a rigorous framework for collaborative multi-agent sequential decisionmaking under uncertainty. However, their computational complexity limits the practical impact. To address this, we focus on a class of Dec-MDPs consisting of independent collaborating agents that are tied together through a global reward function that depends upon their entire histories of states and actions to accomplish joint tasks. To overcome scalability barrier, our main contributions are: (a) We propose a new actor-critic based Reinforcement Learning (RL) approach for event-based Dec-MDPs using successor features (SF) which is a value function representation that decouples the dynamics of the environment from …


Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian McAndrew, Michael Johnson 2019 Embry-Riddle Aeronautical University

Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson

Publications

Aviation manufacturing is at the leading edge of technology with materials, designs and processes where automation is not only integral; but complex systems require more advanced systems to produce and verify processes. Critical Infrastructure theory is now used to protect systems and equipment from external software infections and cybersecurity techniques add an extra layer of protection. In this research, it is argued that Artificial Intelligence can reduce these risks and allow complex processes to be less exposed to the threat of external problems, internal errors or mistakes in operation.


Programming Safety Tips: Why You Should Use Immutable Objects Or How To Create Programs With Bugs That Can Never Be Found Or Fixed., Charles W. Kann 2019 Gettysburg College

Programming Safety Tips: Why You Should Use Immutable Objects Or How To Create Programs With Bugs That Can Never Be Found Or Fixed., Charles W. Kann

Programming Tips and Tricks

Program safety deals with how to make programs as error free as possible. The hardest errors in a program for a programmer to find are often errors in using memory. There are two reasons for this. The first is that errors in accessing memory almost never show problems in the proximate area of the program where the error is made. The error has no apparent impact when it is made, but often causes catastrophic results to occur much later in the program, in areas of the program unrelated to memory error that caused it.

The second reason memory errors are …


Bridging Act-R And Project Malmo, Developing Models Of Behavior In Complex Environments, David M. Schwartz 2019 Bucknell University

Bridging Act-R And Project Malmo, Developing Models Of Behavior In Complex Environments, David M. Schwartz

Honors Theses

Cognitive architectures such as ACT-R provide a system for simulating the mind and human behavior. On their own they model decision making of an isolated agent. However, applying a cognitive architecture to a complex environment yields more interesting results about how people make decisions in more realistic scenarios. Furthermore, cognitive architectures enable researchers to study human behavior in dangerous tasks which cannot be tested because they would harm participants. Nonetheless, these architectures aren’t commonly applied to such environments as they don’t come with one. It is left to the researcher to develop a task environment for their model. The difficulty …


Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani 2019 South Dakota State University

Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani

Electronic Theses and Dissertations

Software systems need continuous developing to cope and keep up with everchanging requirements. Source code quality affects the software development costs. In software refactoring object-oriented systems, Large Class, in particular, hinder the maintenance of a system by letting it difficult for software developers to understand and perform modifications. Also, it is making the development process labor-intensive and time-wasting. Reducing the Large Class code smell by applying design patterns can make the refactoring process more manageable, ease developing the system and decrease the effort required for the maintaining of software. To guarantee object-oriented software stays clear to read, understand and modify …


A Machine Learning Recommender Model For Ride Sharing Based On Rider Characteristics And User Threshold Time, Govind Pramod Yatnalkar 2019 Marshall University

A Machine Learning Recommender Model For Ride Sharing Based On Rider Characteristics And User Threshold Time, Govind Pramod Yatnalkar

Theses, Dissertations and Capstones

In the present age, human life is prospering incredibly due to the 4th Industrial Revolution or The Age of Digitization and Computing. The ubiquitous availability of the Internet and advanced computing systems have resulted in the rapid development of smart cities. From connected devices to live vehicle tracking, technology is taking the field of transportation to a new level. An essential part of the transportation domain in smart cities is Ride Sharing. It is an excellent solution to issues like pollution, traffic, and the rapid consumption of fuel. Even though Ride Sharing has several benefits, the current usage is …


What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan 2019 Marshall University

What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan

Theses, Dissertations and Capstones

Within the past few years, there has been a tremendous increase in the number of UAVs (Unmanned Aerial Vehicle) or drones manufacture and purchase. It is expected to proliferate further, penetrating into every stream of life, thus making its usage inevitable. The UAV’s major components are its physical hardware and programming software, which controls its navigation or performs various tasks based on the field of concern. The drone manufacturers launch the controlling app for the drones in mobile app stores. A few drone manufacturers also release development kits to aid drone enthusiasts in developing customized or more creative apps. Thus, …


A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain 2019 Bridgewater State University

A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain

Master’s Theses and Projects

Students in a Computer Science degree programs must learn to code before they can be taught Software Engineering skills. This core skill set is how to program and consists of the constructs of various languages, how to create short programs or applications, independent assignments, and arrive at solutions that utilize the skills being covered in the language for that course (Chatley & Field, 2017). As an upperclassman, students will often be allowed to apply these skills in newer ways and have the opportunity to work on longer, more involved assignments although frequently still independent or in small groups of two …


Programming Proletarian Literature: Kobayashi Takiji’S "Kani Kôsen" And Gaming As Reading, Jacob Philip Fisher 2019 Bard College

Programming Proletarian Literature: Kobayashi Takiji’S "Kani Kôsen" And Gaming As Reading, Jacob Philip Fisher

Senior Projects Spring 2019

Abstract

This project translates a novel, Kobayashi Takiji’s, Kani Kôsen (The Crab Cannery Ship, 1929) into a video game. As a joint project between Computer Science and Japanese, its focus is to develop a game for the original Game Boy (1989) narratively based on a work of Japanese proletarian literature. Specific tools used in development were the Game Boy emulator: bgb, the Game Boy Developers Kit (gbdk), the Game Boy CPU manual, as well as a foundation in the C programming language, and some lower level systems experience. Being based on a novel, the play style utilizes text …


Augustana Stories, Maegan Patterson 2019 Augustana College

Augustana Stories, Maegan Patterson

Honors Program: Student Scholarship & Creative Works

This is an Android app that describes the history and urban legends of Augustana’s campus. There are several stories that can be accessed from a list or from a map feature that shows where the buildings are on campus. The map is also capable of giving an order in which to visit the buildings if the user decides to take a tour of the campus. The app is written in Java and the stories are housed in webpages.


Confprofitt: A Configuration-Aware Performance Profiling, Testing, And Tuning Framework, Xue Han 2019 University of Kentucky

Confprofitt: A Configuration-Aware Performance Profiling, Testing, And Tuning Framework, Xue Han

Theses and Dissertations--Computer Science

Modern computer software systems are complicated. Developers can change the behavior of the software system through software configurations. The large number of configuration option and their interactions make the task of software tuning, testing, and debugging very challenging. Performance is one of the key aspects of non-functional qualities, where performance bugs can cause significant performance degradation and lead to poor user experience. However, performance bugs are difficult to expose, primarily because detecting them requires specific inputs, as well as specific configurations. While researchers have developed techniques to analyze, quantify, detect, and fix performance bugs, many of these techniques are not …


Learning To Map The Visual And Auditory World, Tawfiq Salem 2019 University of Kentucky

Learning To Map The Visual And Auditory World, Tawfiq Salem

Theses and Dissertations--Computer Science

The appearance of the world varies dramatically not only from place to place but also from hour to hour and month to month. Billions of images that capture this complex relationship are uploaded to social-media websites every day and often are associated with precise time and location metadata. This rich source of data can be beneficial to improve our understanding of the globe. In this work, we propose a general framework that uses these publicly available images for constructing dense maps of different ground-level attributes from overhead imagery. In particular, we use well-defined probabilistic models and a weakly-supervised, multi-task training …


Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh 2019 Western University

Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh

Electrical and Computer Engineering Publications

Sensors, wearables, mobile and other Internet of Thing (IoT) devices are becoming increasingly integrated in all aspects of our lives. They are capable of collecting massive quantities of data that are typically transmitted to the cloud for processing. However, this results in increased network traffic and latencies. Edge computing has a potential to remedy these challenges by moving computation physically closer to the network edge where data are generated. However, edge computing does not have sufficient resources for complex data analytics tasks. Consequently, this paper investigates merging cloud and edge computing for IoT data analytics and presents a deep learning-based …


Digital Commons powered by bepress