Evolutionary Trends In The Collaborative Review Process Of A Large Software System, 2019 Singapore Management University
Evolutionary Trends In The Collaborative Review Process Of A Large Software System, Subhajit Datta, Poulami Sarkar
Research Collection School Of Computing and Information Systems
In this paper, we study the evolutionary trends in the collaborative review process of a large open source software system. As expected, the number of reviews, the number of reviews commented on, as well as the number of reviewers, and the interactions between them show increasing trends over time. But unexpectedly, levels of clustering between developers in their interaction networks show a decreasing trend, even as connections between them increase. In the context of our study, clustering is an indicator of developer collaboration, whereas connection points to how intensely developers work together. Thus the trends we observe can inform how …
Dish: Democracy In State Houses, 2019 California Polytechnic State University, San Luis Obispo
Dish: Democracy In State Houses, Nicholas A. Russo
Master's Theses
In our current political climate, state level legislators have become increasingly impor- tant. Due to cuts in funding and growing focus at the national level, public oversight for these legislators has drastically decreased. This makes it difficult for citizens and activists to understand the relationships and commonalities between legislators. This thesis provides three contributions to address this issue. First, we created a data set containing over 1200 features focused on a legislator’s activity on bills. Second, we created embeddings that represented a legislator’s level of activity and engagement for a given bill using a custom model called Democracy2Vec. Third, we …
Deception In Finitely Repeated Security Games, 2019 Singapore Management University
Deception In Finitely Repeated Security Games, Thanh H. Nguyen, Yongzhao Wang, Arunesh Sinha, Michael P. Wellman
Research Collection School Of Computing and Information Systems
Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities, objectives, or other underlying characteristics. In a repeated interaction setting, the defender can collect attack data over time to reduce this uncertainty and learn an effective defense. However, a clever attacker can manipulate the attack data to mislead the defender, influencing the learning process toward its own benefit. We investigate strategic deception on the part of an attacker with private type information, who interacts repeatedly with a defender. We present a detailed computation and analysis of both players’ optimal strategies given the attacker may …
Recommending New Features From Mobile App Descriptions, 2019 Singapore Management University
Recommending New Features From Mobile App Descriptions, He Jiang, Jingxuan Zhang, Xiaochen Li, Zhilei Ren, David Lo, Xindong Wu, Zhongxuan Luo
Research Collection School Of Computing and Information Systems
The rapidly evolving mobile applications (apps) have brought great demand for developers to identify new features by inspecting the descriptions of similar apps and acquire missing features for their apps. Unfortunately, due to the huge number of apps, this manual process is time-consuming and unscalable. To help developers identify new features, we propose a new approach named SAFER. In this study, we first develop a tool to automatically extract features from app descriptions. Then, given an app, we leverage the topic model to identify its similar apps based on the extracted features and API names of apps. Finally, we design …
Preference-Aware Task Assignment In On-Demand Taxi Dispatching: An Online Stable Matching Approach, 2019 Singapore Management University
Preference-Aware Task Assignment In On-Demand Taxi Dispatching: An Online Stable Matching Approach, Boming Zhao, Pan Xu, Yexuan Shi, Yongxin Tong, Zimu Zhou, Yuxiang Zeng
Research Collection School Of Computing and Information Systems
No abstract provided.
Grand Challenges In Accessible Maps, 2019 Singapore Management University
Grand Challenges In Accessible Maps, Jon E. Froehlich, Anke M. Brock, Anat Caspi, Joao Guerreiro, Kotaro Hara, Reuben Kirkham, Johannes Schoning, Benjamin Tannert
Research Collection School Of Computing and Information Systems
In this forum we celebrate research that helps to successfully bring the benefits of computing technologies to children, older adults, people with disabilities, and other populations that are often ignored in the design of mass-marketed products.
A Survey Of Software Metric Use In Research Software Development, 2019 University of Alabama - Tuscaloosa
A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver
George K. Thiruvathukal
Background: Breakthroughs in research increasingly depend on complex software libraries, tools, and applications aimed at supporting specific science, engineering, business, or humanities disciplines. The complexity and criticality of this software motivate the need for ensuring quality and reliability. Software metrics are a key tool for assessing, measuring, and understanding software quality and reliability. Aims: The goal of this work is to better understand how research software developers use traditional software engineering concepts, like metrics, to support and evaluate both the software and the software development process. One key aspect of this goal is to identify how the set of metrics …
Successor Features Based Multi-Agent Rl For Event-Based Decentralized Mdps, 2019 Singapore Management University
Successor Features Based Multi-Agent Rl For Event-Based Decentralized Mdps, Tarun Gupta, Akshat Kumar, Praveen Paruchuri
Research Collection School Of Computing and Information Systems
Decentralized MDPs (Dec-MDPs) provide a rigorous framework for collaborative multi-agent sequential decisionmaking under uncertainty. However, their computational complexity limits the practical impact. To address this, we focus on a class of Dec-MDPs consisting of independent collaborating agents that are tied together through a global reward function that depends upon their entire histories of states and actions to accomplish joint tasks. To overcome scalability barrier, our main contributions are: (a) We propose a new actor-critic based Reinforcement Learning (RL) approach for event-based Dec-MDPs using successor features (SF) which is a value function representation that decouples the dynamics of the environment from …
Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, 2019 Embry-Riddle Aeronautical University
Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson
Publications
Aviation manufacturing is at the leading edge of technology with materials, designs and processes where automation is not only integral; but complex systems require more advanced systems to produce and verify processes. Critical Infrastructure theory is now used to protect systems and equipment from external software infections and cybersecurity techniques add an extra layer of protection. In this research, it is argued that Artificial Intelligence can reduce these risks and allow complex processes to be less exposed to the threat of external problems, internal errors or mistakes in operation.
Programming Safety Tips: Why You Should Use Immutable Objects Or How To Create Programs With Bugs That Can Never Be Found Or Fixed., 2019 Gettysburg College
Programming Safety Tips: Why You Should Use Immutable Objects Or How To Create Programs With Bugs That Can Never Be Found Or Fixed., Charles W. Kann
Programming Tips and Tricks
Program safety deals with how to make programs as error free as possible. The hardest errors in a program for a programmer to find are often errors in using memory. There are two reasons for this. The first is that errors in accessing memory almost never show problems in the proximate area of the program where the error is made. The error has no apparent impact when it is made, but often causes catastrophic results to occur much later in the program, in areas of the program unrelated to memory error that caused it.
The second reason memory errors are …
Bridging Act-R And Project Malmo, Developing Models Of Behavior In Complex Environments, 2019 Bucknell University
Bridging Act-R And Project Malmo, Developing Models Of Behavior In Complex Environments, David M. Schwartz
Honors Theses
Cognitive architectures such as ACT-R provide a system for simulating the mind and human behavior. On their own they model decision making of an isolated agent. However, applying a cognitive architecture to a complex environment yields more interesting results about how people make decisions in more realistic scenarios. Furthermore, cognitive architectures enable researchers to study human behavior in dangerous tasks which cannot be tested because they would harm participants. Nonetheless, these architectures aren’t commonly applied to such environments as they don’t come with one. It is left to the researcher to develop a task environment for their model. The difficulty …
Reducing The Large Class Code Smell By Applying Design Patterns, 2019 South Dakota State University
Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani
Electronic Theses and Dissertations
Software systems need continuous developing to cope and keep up with everchanging requirements. Source code quality affects the software development costs. In software refactoring object-oriented systems, Large Class, in particular, hinder the maintenance of a system by letting it difficult for software developers to understand and perform modifications. Also, it is making the development process labor-intensive and time-wasting. Reducing the Large Class code smell by applying design patterns can make the refactoring process more manageable, ease developing the system and decrease the effort required for the maintaining of software. To guarantee object-oriented software stays clear to read, understand and modify …
A Machine Learning Recommender Model For Ride Sharing Based On Rider Characteristics And User Threshold Time, 2019 Marshall University
A Machine Learning Recommender Model For Ride Sharing Based On Rider Characteristics And User Threshold Time, Govind Pramod Yatnalkar
Theses, Dissertations and Capstones
In the present age, human life is prospering incredibly due to the 4th Industrial Revolution or The Age of Digitization and Computing. The ubiquitous availability of the Internet and advanced computing systems have resulted in the rapid development of smart cities. From connected devices to live vehicle tracking, technology is taking the field of transportation to a new level. An essential part of the transportation domain in smart cities is Ride Sharing. It is an excellent solution to issues like pollution, traffic, and the rapid consumption of fuel. Even though Ride Sharing has several benefits, the current usage is …
What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, 2019 Marshall University
What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan
Theses, Dissertations and Capstones
Within the past few years, there has been a tremendous increase in the number of UAVs (Unmanned Aerial Vehicle) or drones manufacture and purchase. It is expected to proliferate further, penetrating into every stream of life, thus making its usage inevitable. The UAV’s major components are its physical hardware and programming software, which controls its navigation or performs various tasks based on the field of concern. The drone manufacturers launch the controlling app for the drones in mobile app stores. A few drone manufacturers also release development kits to aid drone enthusiasts in developing customized or more creative apps. Thus, …
A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, 2019 Bridgewater State University
A Semester Long Classroom Course Mimicking A Software Company And A New Hire Experience For Computer Science Students Preparing To Enter The Software Industry, David A. Chamberlain
Master’s Theses and Projects
Students in a Computer Science degree programs must learn to code before they can be taught Software Engineering skills. This core skill set is how to program and consists of the constructs of various languages, how to create short programs or applications, independent assignments, and arrive at solutions that utilize the skills being covered in the language for that course (Chatley & Field, 2017). As an upperclassman, students will often be allowed to apply these skills in newer ways and have the opportunity to work on longer, more involved assignments although frequently still independent or in small groups of two …
Programming Proletarian Literature: Kobayashi Takiji’S "Kani Kôsen" And Gaming As Reading, 2019 Bard College
Programming Proletarian Literature: Kobayashi Takiji’S "Kani Kôsen" And Gaming As Reading, Jacob Philip Fisher
Senior Projects Spring 2019
Abstract
This project translates a novel, Kobayashi Takiji’s, Kani Kôsen (The Crab Cannery Ship, 1929) into a video game. As a joint project between Computer Science and Japanese, its focus is to develop a game for the original Game Boy (1989) narratively based on a work of Japanese proletarian literature. Specific tools used in development were the Game Boy emulator: bgb, the Game Boy Developers Kit (gbdk), the Game Boy CPU manual, as well as a foundation in the C programming language, and some lower level systems experience. Being based on a novel, the play style utilizes text …
Augustana Stories, 2019 Augustana College
Augustana Stories, Maegan Patterson
Honors Program: Student Scholarship & Creative Works
This is an Android app that describes the history and urban legends of Augustana’s campus. There are several stories that can be accessed from a list or from a map feature that shows where the buildings are on campus. The map is also capable of giving an order in which to visit the buildings if the user decides to take a tour of the campus. The app is written in Java and the stories are housed in webpages.
Confprofitt: A Configuration-Aware Performance Profiling, Testing, And Tuning Framework, 2019 University of Kentucky
Confprofitt: A Configuration-Aware Performance Profiling, Testing, And Tuning Framework, Xue Han
Theses and Dissertations--Computer Science
Modern computer software systems are complicated. Developers can change the behavior of the software system through software configurations. The large number of configuration option and their interactions make the task of software tuning, testing, and debugging very challenging. Performance is one of the key aspects of non-functional qualities, where performance bugs can cause significant performance degradation and lead to poor user experience. However, performance bugs are difficult to expose, primarily because detecting them requires specific inputs, as well as specific configurations. While researchers have developed techniques to analyze, quantify, detect, and fix performance bugs, many of these techniques are not …
Learning To Map The Visual And Auditory World, 2019 University of Kentucky
Learning To Map The Visual And Auditory World, Tawfiq Salem
Theses and Dissertations--Computer Science
The appearance of the world varies dramatically not only from place to place but also from hour to hour and month to month. Billions of images that capture this complex relationship are uploaded to social-media websites every day and often are associated with precise time and location metadata. This rich source of data can be beneficial to improve our understanding of the globe. In this work, we propose a general framework that uses these publicly available images for constructing dense maps of different ground-level attributes from overhead imagery. In particular, we use well-defined probabilistic models and a weakly-supervised, multi-task training …
Deep Learning: Edge-Cloud Data Analytics For Iot, 2019 Western University
Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh
Electrical and Computer Engineering Publications
Sensors, wearables, mobile and other Internet of Thing (IoT) devices are becoming increasingly integrated in all aspects of our lives. They are capable of collecting massive quantities of data that are typically transmitted to the cloud for processing. However, this results in increased network traffic and latencies. Edge computing has a potential to remedy these challenges by moving computation physically closer to the network edge where data are generated. However, edge computing does not have sufficient resources for complex data analytics tasks. Consequently, this paper investigates merging cloud and edge computing for IoT data analytics and presents a deep learning-based …