Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2197 Full-Text Articles 2479 Authors 544962 Downloads 104 Institutions

All Articles in Software Engineering

Faceted Search

2197 full-text articles. Page 7 of 71.

Collective Entity Linking In Tweets Over Space And Time, Wen Haw CHONG, Ee-peng LIM 2017 Singapore Management University

Collective Entity Linking In Tweets Over Space And Time, Wen Haw Chong, Ee-Peng Lim

Research Collection School Of Information Systems

We propose collective entity linking over tweets that are close in space and time. This exploits the fact that events or geographical points of interest often result in related entities being mentioned in spatio-temporal proximity. Our approach directly applies to geocoded tweets. Where geocoded tweets are overly sparse among all tweets, we use a relaxed version of spatial proximity which utilizes both geocoded and non-geocoded tweets linked by common mentions. Entity linking is affected by noisy mentions extracted and incomplete knowledge bases. Moreover, to perform evaluation on the entity linking results, much manual annotation of mentions is often required. To ...


Sensor-Driven Detection Of Social Isolation In Community-Dwelling Elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, Hwee-Pink TAN 2017 Singapore Management University

Sensor-Driven Detection Of Social Isolation In Community-Dwelling Elderly, W K P Neranjana Nadee Rodrigo Goonawardene, Xiaoping Toh, Hwee-Pink Tan

Research Collection School Of Information Systems

Ageing-in-place, the ability to age holistically in the community, is increasingly gaining recognition as a solution to address resource limitations in the elderly care sector. Effective elderly care models require a personalised and all-encompassing approach to caregiving. In this regard, sensor technologies have gained attention as an effective means to monitor the wellbeing of elderly living alone. In this study, we seek to investigate the potential of non-intrusive sensor systems to detect socially isolated community dwelling elderly. Using a mixed method approach, our results showed that sensor-derived features such as going-out behavior, daytime napping and time spent in the living ...


Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan 2017 University of Massachusetts Amherst

Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan

Masters Theses

Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.

State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to ...


Mri-Based Susceptibility Mapping For In-Vivo Iron And Blood Oximetry Measurements, Hannah Erdevig 2017 University of Colorado, Boulder

Mri-Based Susceptibility Mapping For In-Vivo Iron And Blood Oximetry Measurements, Hannah Erdevig

Undergraduate Honors Theses

MRI is increasingly used in mapping tissue susceptibility to identify cerebral microbleeds associated with traumatic brain injury and pathological iron deposits associated with neurodegenerative diseases such as Parkinson's and Alzheimer's disease [1,2]. Accurate measurement is important for determining oxygen and iron content in blood vessels and tissue in the brain, which are in turn used for noninvasive clinical diagnosis and treatment assessments. Magnetic field distortions with a resolution of a few parts per billion can be measured using MRI phase maps. The field distortion map can then be inverted to obtain a quantitative susceptibility map. The primary ...


K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler 2017 University of Montana

K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler

Graduate Student Theses, Dissertations, & Professional Papers

Biological sequence datasets are increasing at a prodigious rate. The volume of data in these datasets surpasses what is observed in many other fields of science. New developments wherein metagenomic DNA from complex bacterial communities is recovered and sequenced are producing a new kind of data known as metagenomic data, which is comprised of DNA fragments from many genomes. Developing a utility to analyze such metagenomic data and predict the sample class from which it originated has many possible implications for ecological and medical applications. Within this document is a description of a series of analytical techniques used to process ...


Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2017 CUNY Hunter College

Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive ...


Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe 2017 CUNY Hunter College

Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe

Publications and Research

Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. Deciding which pointcuts have broken due to base-code changes is a daunting venture, especially in large and complex systems. We present an automated approach that recommends pointcuts that are likely to require modification due to a particular base-code change, as well as ones that do not. Our hypothesis is that join points selected by a pointcut exhibit common structural characteristics. Patterns describing such commonality are used to recommend pointcuts that have potentially ...


Automatic Derivation Of Requirements For Components Used In Human-Intensive Systems, Heather Conboy 2017 University of Massachusetts Amherst

Automatic Derivation Of Requirements For Components Used In Human-Intensive Systems, Heather Conboy

Doctoral Dissertations

Human-intensive systems (HISs), where humans must coordinate with each other along with software and/or hardware components to achieve system missions, are increasingly prevalent in safety-critical domains (e.g., healthcare). Such systems are often complex, involving aspects such as concurrency and exceptional situations. For these systems, it is often difficult but important to determine requirements for the individual components that are necessary to ensure the system requirements are satisfied. In this thesis, we investigated an approach that employs interface synthesis methods developed for software systems to automatically derive such requirements for components used in HISs.

In previous work, we investigated ...


A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook 2017 Edith Cowan University

A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook

Theses: Doctorates and Masters

A widely accepted, and incorrect, assumption towards hearing accessibility in video games is that deaf and hard of hearing (DHH) users are those who encounter the least barriers and are generally well catered for. Rapid advancement in video game technology has seen video game sound evolve from simple blips generated by internal circuitry to fully realised digital audio used to convey critical information. To accommodate the DHH, this information needs to be conveyed in an alternative manner. However, evidence suggests existing accessible design solutions for the DHH lack specificity and are insufficient. Thus, the inability to hear, or hear well ...


The Moral Implications Of Software Piracy, Kyle Hamrick 2016 Olivet Nazarene University

The Moral Implications Of Software Piracy, Kyle Hamrick

Student Scholarship - Computer Science

Computer software is integrated into almost every aspect of our professional and personal lives. Much of this software requires payment for use and is legally protected by the copyright system. This paper examines and analyzes the arguments pertaining to the moral use of protected software (digital piracy). The three arguments presented are the “victimless crime” argument, the “noble justification” argument, and the “willing but unable argument.” These three arguments claim that piracy is morally justified in certain cases, and claim that software providers are not harmed in such situations. The three arguments are tested against counter-arguments, and it is discovered ...


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held 2016 The University of Western Ontario

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and ...


The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard 2016 Carnegie Mellon University

The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard

Software Engineering Institute

Problems with cost estimation, ranging from estimator overconfidence to unintegrated tools, result in potentially billions of dollars of unanticipated expenses for Department of Defense programs. Quantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE), developed by the Carnegie Mellon University Software Engineering Institute, is a method for estimating potential program costs in a way that acknowledges and uses uncertainty that occurs early in the development lifecycle. This report first familiarizes the reader with the QUELCE method. QUELCE computes a distribution of program costs based on Monte Carlo analysis of program cost drivers—assessed via analyses of dependency structure matrices and Bayesian ...


Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi 2016 The University of Western Ontario

Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi

Electronic Thesis and Dissertation Repository

Large-scale contractual systems engineering projects often need to comply with a myriad of government regulations and standards as part of contractual fulfillment. A key activity in the requirements engineering (RE) process for such a project is to elicit appropriate requirements from the regulations and standards that apply to the target system. However, there are impediments in achieving compliance due to such factors as: the voluminous contract and its high-level specifications, large number of regulatory documents, and multiple domains of the system. Little empirical research has been conducted on developing a shared understanding of the compliance-oriented complexities involved in such projects ...


Win Nim, Anna Carrigan 2016 University of Wyoming

Win Nim, Anna Carrigan

Honors Theses AY 16/17

A discussion of two-person zero-sum games in combinatorial game theory along with documentation of the software development process for creating an Android application that solves the game of Nim.

Repository for the software development process is located at https://github.com/annamooseity/nim


Update 2016: Considerations For Using Agile In Dod Acquisition Has Been Cleared For Open Publication By The Office Of Security Review, Suzanne Garcia-Miller, Dan Ward, Mary Ann Lapham, Ray Williams, Charles (Bud) Hammons, Daniel Burton, Alfred R. Schenker 2016 Carnegie Mellon University

Update 2016: Considerations For Using Agile In Dod Acquisition Has Been Cleared For Open Publication By The Office Of Security Review, Suzanne Garcia-Miller, Dan Ward, Mary Ann Lapham, Ray Williams, Charles (Bud) Hammons, Daniel Burton, Alfred R. Schenker

Software Engineering Institute

This report, an update to a 2010 report, Considerations For Using Agile In DoD Acquisitions, addresses developments in commercial Agile practices as well as the Department of Defense (DoD) acquisition environment. It covers some previously unanswered questions and asks some new ones. It includes new research, examples of Agile in practice, and policy updates.

Continuing with the 2010 report’s theme, this report updates the exploration of these questions: Can Agile be used in the DoD environment? If so, how? It includes lessons learned from DoD programs that have employed Agile and information gleaned from myriad articles and books on ...


The Critical Role Of Positive Incentives For Reducing Insider Threats, Andrew P. Moore, Jeff Savinda, Elizabeth Monaco, Jamie Moyes, Denise Rousseau, Sam Perl, Jennifer Cowley, Matthew Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall 2016 Carnegie Mellon University

The Critical Role Of Positive Incentives For Reducing Insider Threats, Andrew P. Moore, Jeff Savinda, Elizabeth Monaco, Jamie Moyes, Denise Rousseau, Sam Perl, Jennifer Cowley, Matthew Collins, Tracy Cassidy, Nathan Vanhoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

Software Engineering Institute

Traditional insider threat practices involve negative incentives that attempt to force employees to act in the interests of the organization and, when relied on excessively, can result in negative unintended consequences that exacerbate insider threats. Positive incentives that attempt to encourage employees to act in the interests of the organization can complement negative incentives. In our research, we identified and analyzed three avenues for aligning the interests of the employee and the organization: job engagement, perceived organizational support, and connectedness with co-workers. Based on an analysis of three insider threat incidents and an exploratory survey of organizations, we developed a ...


Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell 2016 Carnegie Mellon University

Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell

Software Engineering Institute

Most introductory discussions of Agile software development have focused on team management concepts and the implications of the Agile Manifesto for a single, small team. The focus now includes scaling these concepts for a variety of applications. The context in which Agile methods are employed drives important choices for how the work is done. Published frameworks and commercial training available in the market offer a variety of solutions for scaling Agile. This report addresses what is meant by scaling, contextual drivers for implementation choices, and the frameworks available for use today.


Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky 2016 Rochester Institute of Technology

Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky

Articles

Security is hard, and teaching security can be even harder. Here we describe a public educational activity to assist in the instruction of both students and developers in creating secure Android apps. Our set of activities includes example vulnerable applications, information about each vulnerability, steps on how to repair the vulnerabilities, and information about how to confirm that the vulnerability has been properly repaired. Our primary goal is to make these activities available to other instructors for use in their classrooms ranging from the K-12 to university settings. A secondary goal of this project is to foster interest in security ...


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, Dingyi FANG 2016 Singapore Management University

D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Information Systems

Device-free localization, which does not require any device attached to the target is playing a critical role in many applications such as intrusion detection, elderly monitoring, etc. This paper introduces D-Watch, a device-free system built on top of low cost commodity-off-the-shelf (COTS) RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the "bad" multipaths to provide a decimeter level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival (AoA) information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can ...


Digital Commons powered by bepress