Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2133 Full-Text Articles 2389 Authors 523022 Downloads 99 Institutions

All Articles in Software Engineering

Faceted Search

2133 full-text articles. Page 7 of 69.

Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook 2016 University of Maine

Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook

Electronic Theses and Dissertations

This dissertation is concerned with the development of robust numerical solution procedures for the generalized micromechanical analysis of linear and nonlinear constitutive behavior in heterogeneous materials. Although the methods developed are applicable in many engineering, geological, and materials science fields, three main areas are explored in this work. First, a numerical methodology is presented for the thermomechanical analysis of heterogeneous materials with a special focus on real polycrystalline microstructures obtained using electron backscatter diffraction techniques. Asymptotic expansion homogenization and finite element analysis are employed for micromechanical analysis of polycrystalline materials. Effective thermoelastic properties of polycrystalline materials are determined and compared ...


Nonlocal Automated Comparative Static Analysis, Leigh Tesfatsion 2016 Iowa State University

Nonlocal Automated Comparative Static Analysis, Leigh Tesfatsion

Leigh Tesfatsion

This paper reviews work on the^ development of a program Nasa for the automated comparative static analysis of parametrized nonlinear systems over parameter intervals. Nasa incorporates a fast and efficient algorithm Feed for the automatic evaluation of higher-order partial derivatives, as well as an adaptive homotopy continuation algorithm for obtaining all required iiutial conditions. Applications are envisioned for fields such as economics where models tend to be complex and closed-form solutions are difficult to obtain...


Game Development Software Engineering Process Life Cycle: A Systematic Review, Saiqa Alemm, Luiz Fernando Capretz, Faheem Ahmed 2016 Zayed University

Game Development Software Engineering Process Life Cycle: A Systematic Review, Saiqa Alemm, Luiz Fernando Capretz, Faheem Ahmed

Electrical and Computer Engineering Publications

Software game is a kind of application that is used not only for entertainment, but also for serious purposes that can be applicable to different domains such as education, business, and health care. Multidisciplinary nature of the game development processes that combine sound, art, control systems, artificial intelligence (AI), and human factors, makes the software game development practice different from traditional software development. However, the underline software engineering techniques help game development to achieve maintainability, flexibility, lower effort and cost, and better design. The purpose of this study is to assesses the state of the art research on the game ...


Neural Network Models For Software Development Effort Estimation: A Comparative Study, Ali Bou Nassif, Mohammad Azzeh, Luiz Fernando Capretz, Danny Ho 2016 University of Sharjah, UAE

Neural Network Models For Software Development Effort Estimation: A Comparative Study, Ali Bou Nassif, Mohammad Azzeh, Luiz Fernando Capretz, Danny Ho

Electrical and Computer Engineering Publications

Software development effort estimation (SDEE) is one of the main tasks in software project management. It is crucial for a project manager to efficiently predict the effort or cost of a software project in a bidding process, since overestimation will lead to bidding loss and underestimation will cause the company to lose money. Several SDEE models exist; machine learning models, especially neural network models, are among the most prominent in the field. In this study, four different neural network models – Multilayer Perceptron, General Regression Neural Network, Radial Basis Function Neural Network, and Cascade Correlation Neural Network – are compared with each ...


How To Break An Api: Cost Negotiation And Community Values In Three Software Ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, FERDIAN THUNG 2016 Singapore Management University

How To Break An Api: Cost Negotiation And Community Values In Three Software Ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, Ferdian Thung

Research Collection School Of Information Systems

Change introduces conict into software ecosystems: breaking changes may ripple through the ecosystem and trigger rework for users of a package, but often developers can invest additional effort or accept opportunity costs to alleviate or delay downstream costs. We performed a multiple case study of three software ecosystems with different tooling and philosophies toward change, Eclipse, R/CRAN, and Node.js/npm, to understand how developers make decisions about change and change-related costs and what practices, tooling, and policies are used. We found that all three ecosystems differ substantially in their practices and expectations toward change and that those differences ...


Integration Of Lightweight & Energy Efficient Cipher In Wireless Body Area Network Fore-Health Monitoring, Azza Zayed Sultan AI Shamsi 2016 United Arab Emirates University

Integration Of Lightweight & Energy Efficient Cipher In Wireless Body Area Network Fore-Health Monitoring, Azza Zayed Sultan Ai Shamsi

Theses

There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. This led to a high demand for a continuous care that can be achieved by adopting an emerging technology of e- Health monitoring system using Wireless Body Area Network (WBAN) that can collect patient’s data. Since patient’s data is private, securing the communication within WBAN becomes highly essential. In this research thesis, we propose an architecture to secure the data transmission within the Wireless Body Area Network (WBAN) in e-Health monitoring. More specifically, our ...


Learning Sentence Embeddings With Auxiliary Tasks For Cross-Domain Sentiment Classification, Jianfei YU, Jing JIANG 2016 Singapore Management University

Learning Sentence Embeddings With Auxiliary Tasks For Cross-Domain Sentiment Classification, Jianfei Yu, Jing Jiang

Research Collection School Of Information Systems

In this paper, we study cross-domain sentimentclassification with neural network architectures.We borrow the idea from StructuralCorrespondence Learning and use two auxiliarytasks to help induce a sentence embeddingthat supposedly works well across domains forsentiment classification. We also propose tojointly learn this sentence embedding togetherwith the sentiment classifier itself. Experimentresults demonstrate that our proposedjoint model outperforms several state-of-the artmethods on five benchmark datasets.


Automatic Fracture Orientation Extraction From Sfm Point Clouds, Jon Kissi 2016 The University of Western Ontario

Automatic Fracture Orientation Extraction From Sfm Point Clouds, Jon Kissi

Electronic Thesis and Dissertation Repository

Geology seeks to understand the history of the Earth and its surface processes through charac- terisation of surface formations and rock units. Chief among the geologists’ tools are rock unit orientation measurements, such as Strike, Dip and Dip Direction. These allow an understanding of both surface and sub-structure on both the local and macro scale.

Although the way these techniques can be used to characterise geology are well understood, the need to collect these measurements by hand adds time and expense to the work of the geologist, precludes spontaneity in field work, and coverage is limited to where the geologist ...


Software Engineering For Science, Jeffrey C. Carver, Neil P. Chue Hong, George K. Thiruvathukal 2016 University of Alabama - Tuscaloosa

Software Engineering For Science, Jeffrey C. Carver, Neil P. Chue Hong, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Software Engineering for Science provides an in-depth collection of peer-reviewed chapters that describe experiences with applying software engineering practices to the development of scientific software. It provides a better understanding of how software engineering is and should be practiced, and which software engineering practices are effective for scientific software.

The book starts with a detailed overview of the Scientific Software Lifecycle, and a general overview of the scientific software development process. It highlights key issues commonly arising during scientific software development, as well as solutions to these problems.

The second part of the book provides examples of the use of ...


Connecting Program Synthesis And Reachability: Automatic Program Repair Using Test-Input Generation, ThanhVu Nguyen, Westley Weimer, Deepak Kapur, Stephanie Forrest 2016 University of Nebraska - Lincoln

Connecting Program Synthesis And Reachability: Automatic Program Repair Using Test-Input Generation, Thanhvu Nguyen, Westley Weimer, Deepak Kapur, Stephanie Forrest

CSE Technical reports

We prove that certain formulations of program synthesis and reachability are equivalent. Specifically, our constructive proof shows the reductions between the template-based synthesis problem, which generates a program in a pre-specified form, and the reachability problem, which decides the reachability of a program location. This establishes a link between the two research fields and allows for the transfer of techniques and results between them.

To demonstrate the equivalence, we develop a program repair prototype using reachability tools. We transform a buggy program and its required specification into a specific program containing a location reachable only when the original program can ...


Computer-Aided Design Of Algorithms Of Pulsed Control Of Arc Welding Process Based On Numerical Simulation, Oksana I. Shpigunova, Anatoliy A. Glazunov 2016 Tomsk State University

Computer-Aided Design Of Algorithms Of Pulsed Control Of Arc Welding Process Based On Numerical Simulation, Oksana I. Shpigunova, Anatoliy A. Glazunov

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Code Metrics For Predicting Risk Levels Of Android Applications, Akond A. Rahman 2016 North Carolina State University

Code Metrics For Predicting Risk Levels Of Android Applications, Akond A. Rahman

KSU Proceedings on Cybersecurity Education, Research and Practice

Android applications pose security and privacy risks for end-users. Early prediction of risk levels that are associated with Android applications can help Android developers is releasing less risky applications to end-users. Researchers have showed how code metrics can be used as early predictors of failure prone software components. Whether or not code metrics can be used to predict risk levels of Android applications requires systematic exploration. The goal of this paper is to aid Android application developers in assessing the risk associated with developed Android applications by identifying code metrics that can be used as predictors to predict two levels ...


Integrated Software Fingerprinting Via Neural-Network-Based Control Flow Obfuscation, Haoyu MA, Ruiqi LI, Xiaoxu YU, Chunfu JIA, Debin GAO 2016 Nankai University

Integrated Software Fingerprinting Via Neural-Network-Based Control Flow Obfuscation, Haoyu Ma, Ruiqi Li, Xiaoxu Yu, Chunfu Jia, Debin Gao

Research Collection School Of Information Systems

Dynamic software fingerprinting has been an important tool in fighting against software theft and pirating by embedding unique fingerprints into software copies. However, existing work uses methods from dynamic software watermarking as direct solutions in which secret marks are inside rather independent code modules attached to the software. This results in an intrinsic weakness against targeted collusive attacks since differences among software copies correspond directly to the fingerprint-related components. In this paper, we suggest a novel mode of dynamic fingerprinting called integrated fingerprinting, of which the goal is to ensure all fingerprinted software copies possess identical behaviors at semantic level ...


Definition And Measurement Of Complexity In The Context Of Safety, Sarah Sheard, Michael D. Konrad, Charles B. Weinstock, William R. Nichols 2016 Carnegie Mellon University

Definition And Measurement Of Complexity In The Context Of Safety, Sarah Sheard, Michael D. Konrad, Charles B. Weinstock, William R. Nichols

Software Engineering Institute

This report describes research to define complexity measures for avionics systems to help the FAA identify when systems are too complex to assure their safety.

The project selected a measure of complexity related to the number of ways that an avionics system error (fault) could propagate from element to element. Since each potential propagation requires another sub-argument in the safety case, the number of arguments should be linear with certification effort. Thus, the ability to show system safety through the certification process depends on this kind of system complexity.

Our results include a formula for calculating the “error-propagation complexity” from ...


Techniques For Identifying Mobile Platform Vulnerabilities And Detecting Policy-Violating Applications, Mon Kywe SU 2016 Singapore Management University

Techniques For Identifying Mobile Platform Vulnerabilities And Detecting Policy-Violating Applications, Mon Kywe Su

Dissertations and Theses Collection

Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we focus on security and vulnerability analysis of framework and application layers. Security mechanisms, such as Android’s sandbox and permission systems, exist in framework layer, while malware scanners protects application layer. However, there are rooms for improvement in both mechanisms. For instance, Android’s permission system is known to be implemented in ad-hoc manner and not well-tested for vulnerabilities. Application layer ...


Inferring Links Between Concerns And Methods With Multi-Abstraction Vector Space Model, Yun ZHANG, David LO, Xin XIA, Tien-Duy B. LE, Giuseppe SCANNIELLO, Jianling SUN 2016 Singapore Management University

Inferring Links Between Concerns And Methods With Multi-Abstraction Vector Space Model, Yun Zhang, David Lo, Xin Xia, Tien-Duy B. Le, Giuseppe Scanniello, Jianling Sun

Research Collection School Of Information Systems

Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that are relevant to the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose a multi-abstraction ...


Amalgam+: Composing Rich Information Sources For Accurate Bug Localization, Shaowei WANG, David LO 2016 Singapore Management University

Amalgam+: Composing Rich Information Sources For Accurate Bug Localization, Shaowei Wang, David Lo

Research Collection School Of Information Systems

During the evolution of a software system, a large number of bug reports are submitted. Locating the source code files that need to be fixed to resolve the bugs is a challenging problem. Thus, there is a need for a technique that can automatically figure out these buggy files. A number of bug localization solutions that take in a bug report and output a ranked list of files sorted based on their likelihood to be buggy have been proposed in the literature. However, the accuracy of these tools still needs to be improved. In this paper, to address this need ...


A Novel Csi Pre-Processing Scheme For Device-Free Localization Indoors, Ju WANG, Lichao ZHANG, Xuan WANG, Jie XIONG, Xiaojiang CHEN, Dingyi FANG 2016 Northwest University

A Novel Csi Pre-Processing Scheme For Device-Free Localization Indoors, Ju Wang, Lichao Zhang, Xuan Wang, Jie Xiong, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Information Systems

Device-free localization of people and objects indoors not equipped with radios is playing a critical role in many emerging applications. This paper presents a novel channel state information (CSI) pre-processing scheme that enables accurate device-free localization indoors. The basic idea is simple: CSI is sensitive to a target's location and by modelling the CSI measurements of multiple wireless links as a set of power fading based equations, the target location can be determined. However, due to rich multipaths in indoor environment, the received signal strength (RSS) or even the fine-grained CSI can not be easily modelled. We observe that ...


Xd-Track: Leveraging Multi-Dimensional Information For Passive Wi-Fi Tracking, Yaxiong XIE, Jie XIONG, Mo LI, Kyle JAMIESON 2016 Singapore Management University

Xd-Track: Leveraging Multi-Dimensional Information For Passive Wi-Fi Tracking, Yaxiong Xie, Jie Xiong, Mo Li, Kyle Jamieson

Research Collection School Of Information Systems

We describe the design and implementation of xD-Track, the first practical Wi-Fi based device-free localization system that employs a simultaneous and joint estimation of time-of-flight, angle-of-arrival, angle-of-departure, and Doppler shift to fully characterize the wireless channel between a sender and receiver. Using this full characterization, xD-Track introduces novel methods to measure and isolate the signal path that reflects off a person of interest, allowing it to localize a human with just a single pair of access points, or a single client-access point pair. Searching the multiple dimensions to accomplish the above is highly computationally burdensome, so xD-Track introduces novel methods ...


Lifs: Low Human-Effort, Device-Free Localization With Fine-Grained Subcarrier Information, Ju WANG, Hongbo JIANG, Jie XIONG, Kyle JAMIESON, Xiaojiang CHEN, Dingyi FANG, Binbin XIE 2016 Northwest University

Lifs: Low Human-Effort, Device-Free Localization With Fine-Grained Subcarrier Information, Ju Wang, Hongbo Jiang, Jie Xiong, Kyle Jamieson, Xiaojiang Chen, Dingyi Fang, Binbin Xie

Research Collection School Of Information Systems

Device-free localization of people and objects indoors not equipped with radios is playing a critical role in many emerging applications. This paper presents an accurate model-based device-free localization system LiFS, implemented on cheap commercial off-the-shelf (COTS) Wi-Fi devices. Unlike previous COTS device-based work, LiFS is able to localize a target accurately without offline training. The basic idea is simple: channel state information (CSI) is sensitive to a target's location and by modelling the CSI measurements of multiple wireless links as a set of power fading based equations, the target location can be determined. However, due to rich multipath propagation ...


Digital Commons powered by bepress