Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2350 Full-Text Articles 2601 Authors 558456 Downloads 105 Institutions

All Articles in Software Engineering

Faceted Search

2350 full-text articles. Page 7 of 77.

Practical Attacks On Cryptographically End-To-End Verifiable Internet Voting Systems, Nicholas Chang-Fong 2017 The University of Western Ontario

Practical Attacks On Cryptographically End-To-End Verifiable Internet Voting Systems, Nicholas Chang-Fong

Electronic Thesis and Dissertation Repository

Cryptographic end-to-end verifiable voting technologies concern themselves with the provision of a more trustworthy, transparent, and robust elections. To provide voting systems with more transparency and accountability throughout the process while preserving privacy which allows voters to express their true intent.

Helios Voting is one of these systems---an online platform where anyone can easily host their own cryptographically end-to-end verifiable election, aiming to bring verifiable voting to the masses. Helios does this by providing explicit cryptographic checks that an election was counted correctly, checks that any member of the public can independently verify. All of this while still protecting one ...


Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis 2017 Loyola University Chicago

Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis

Emerging Technologies Laboratory Publications

Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces.

As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language ...


The Creation Of A Building Map Application For A University Setting, William T. Whitesell 2017 Liberty University

The Creation Of A Building Map Application For A University Setting, William T. Whitesell

Senior Honors Theses

The use of navigational technology in mobile and web devices has sharply increased in recent years. With the capability to create interactive maps now available, navigating in real time between locations has become possible. This is especially essential in areas and organizations experiencing rapid expansion like Liberty University (LU). Therefore, the author proposes a project to create an interactive map application (IMA) for LU’s academic buildings that is scalable and usable through both the university’s website and with a mobile application. There are several considerations that must be taken into account when creating the LU map application, such ...


Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff 2017 Cedarville University

Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff

The Research and Scholarship Symposium

CedarLogic is the Cedarville University’s student-developed, digital logic simulator. Engineering and Computer Science students use this software for several of their classes. Our primary goal for this update is adding black boxes, buses, and cross-platform compatibility. Our additional improvements in user-friendliness and functionality will give students an improved CedarLogic experience.


The Bible Story Producer App, Michael D. Baxter, Noah W. Bragg, Grant W. Dennison, Robert J. Jacubec, Andrew D. Lockridge, Abigail M. Riffle 2017 Cedarville University

The Bible Story Producer App, Michael D. Baxter, Noah W. Bragg, Grant W. Dennison, Robert J. Jacubec, Andrew D. Lockridge, Abigail M. Riffle

The Research and Scholarship Symposium

The Bible Story Producer team at Cedarville University has been spending the past year on the Bible Story Producer app for Android. This app is a tool whose purpose is to facilitate the translation of Bible stories by bilingual laypersons in places where the Bible is unavailable in the vernacular. The aim of the app is to facilitate the oral translation of Bible stories transmitted as templates consisting of voice narration in a Language of Wider Communication (LWC). The narration is accompanied by a series of high-quality illustrations animated by the Ken Burns (pan and zoom) effect. An instance of ...


Cusigns: A Dynamic Solution For Digital Signage, Jonathan Easterday, Wesley Kelly, Todd Landis, Nicole D. Perez 2017 Cedarville University

Cusigns: A Dynamic Solution For Digital Signage, Jonathan Easterday, Wesley Kelly, Todd Landis, Nicole D. Perez

The Research and Scholarship Symposium

Cedarville University has computer monitors located throughout campus in order to show advertisements and important information to students, faculty, and staff. The slides shown on these displays are scheduled using Concerto: web-based software which manages digital signage. Though the Concerto software is currently used to manage digital signage, Cedarville University’s IT department desires features which Concerto does not provide, including the ability to play videos, a better slide randomization algorithm, emergency broadcasting features, and an intuitive user interface. We have created a new solution for digital signage called CUSigns with the goal of providing the existing functionality of Concerto ...


The Chess Puzzle Lock Screen, Ryan J. Hayes 2017 Lynchburg College

The Chess Puzzle Lock Screen, Ryan J. Hayes

Student Scholar Showcase

The Chess Puzzle Lock Screen

Many times each day, owners of cellphones use their phone’s lock screen in order to access their device. The goal of this project has been to take advantage of the action of unlocking one’s device by incorporating an element of self-help into the process. Every time a user who is interested in learning a new field attempts to access their device, that user is faced with a problem pertaining to a subject they are interested in learning more about. After many repetitions of this scenario, the user will have increased their understanding of ...


Virtual Reality: Google Cardboard And Unity, Emma Elliott 2017 Lynchburg College

Virtual Reality: Google Cardboard And Unity, Emma Elliott

Student Scholar Showcase

Virtual Reality is currently the hottest way for people to play video games because it provides an immersive and interactive world to explore. It uses computer software to create sounds, realistic images, and other effects to simulate a virtual setting. The current craze started on the Oculus Rift headset and has incited other companies to make their own, but most are expensive or require another system to play. Instead of buying an expensive headset, anyone with a smartphone can play in Virtual Reality with Google’s cheap alternative, the Google Cardboard. The goal of this project is to complete a ...


Prototype Software Assurance Framework (Saf): Introduction And Overview, Christopher J. Alberts, Carol Woody 2017 Carnegie Mellon University

Prototype Software Assurance Framework (Saf): Introduction And Overview, Christopher J. Alberts, Carol Woody

Software Engineering Institute

Software is a growing component of modern business- and mission-critical systems. As organizations become more dependent on software, security-related risks to their organizational missions also increase. Traditional security-engineering approaches rely on addressing security risks during the operation and maintenance of software-reliant systems. The costs required to control security risks increase significantly when organizations wait until systems are deployed to address those risks. Field experiences of technical staff at the Software Engineering Institute (SEI) indicate that few programs currently implement effective cybersecurity practices early in the acquisition lifecycle. Recent DoD directives are beginning to shift programs’ priorities regarding cybersecurity. As a ...


Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge 2017 Marquette University

Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge

Master's Theses (2009 -)

This thesis develops the first fully network-on-chip (NoC) based h.264 video decoder implemented in real hardware on a field programmable gate array (FPGA). This thesis starts with an overview of the h.264 video coding standard and an introduction to the NoC communication paradigm. Following this, a series of processing elements (PEs) are developed which implement the component algorithms making up the h.264 video decoder. These PEs, described primarily in VHDL with some Verilog and C, are then mapped to an NoC which is generated using the CONNECT NoC generation tool. To demonstrate the scalability of the proposed ...


Role Of Requirements Engineering In Software Project’S Success, Sujatha Alla 2017 Old Dominion University

Role Of Requirements Engineering In Software Project’S Success, Sujatha Alla

Engineering Management & Systems Engineering Theses & Dissertations

Despite considerable time and resources spent on the initiation phase of software projects, discrepancies often exist between formal project documentation, customer requirements, and final project specifications. Such discrepancies in the requirements management process can have a very negative impact on final project outcomes. A Business Requirements Document (BRD) constitutes the formal software requirements documentation, which typically includes stakeholders’ needs and expectations and project scope while providing a clear project roadmap and project plan. According to IEEE standards, a BRD should be a structured document that includes specific elements such as functional and technical requirements while incorporating certain traits such as ...


. Direct And Mediating Influences Of User-Developer Perception Gaps In Requirements Understanding On User Participation, Luiz Fernando Capretz, Jingdong Jia 2017 University of Western Ontario

. Direct And Mediating Influences Of User-Developer Perception Gaps In Requirements Understanding On User Participation, Luiz Fernando Capretz, Jingdong Jia

Electrical and Computer Engineering Publications

User participation is considered an effective way to conduct requirements engineering, but user-developer perception gaps in requirements understanding occur frequently. Since user participation in practice is not as active as we expect and the requirements perception gap has been recognized as a risk that negatively affects projects, exploring whether user-developer perception gaps in requirements understanding will hinder user participation is worthwhile. This will help develop a greater comprehension of the intertwined relationship between user participation and perception gap, a topic that has not yet been extensively examined. This study investigates the direct and mediating influences of user-developer requirements perception gaps ...


Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, XInli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, Jacques KLEIN 2017 Singapore Management University

Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyande, Jacques Klein

Research Collection School Of Information Systems

Context: State-of-the-art works on automated detection of Android malware have leveraged app descriptionsto spot anomalies w.r.t the functionality implemented, or have used data flow information as afeature to discriminate malicious from benign apps. Although these works have yielded promising performance,we hypothesize that these performances can be improved by a better understanding of maliciousbehavior.Objective: To characterize malicious apps, we take into account both information on app descriptions,which are indicative of apps’ topics, and information on sensitive data flow, which can be relevant todiscriminate malware from benign apps.Method: In this paper, we propose a topic-specific approach ...


Modeling Topics And Behavior Of Microbloggers: An Integrated Approach, Tuan Anh HOANG, Ee-peng LIM 2017 Singapore Management University

Modeling Topics And Behavior Of Microbloggers: An Integrated Approach, Tuan Anh Hoang, Ee-Peng Lim

Research Collection School Of Information Systems

Microblogging encompasses both user-generated content and behavior. When modeling microblogging data, one has to consider personal and background topics, as well as how these topics generate the observed content and behavior. In this article, we propose the Generalized Behavior-Topic (GBT) model for simultaneously modeling background topics and users' topical interest in microblogging data. GBT considersmultiple topical communities (or realms) with different background topical interests while learning the personal topics of each user and the user's dependence on realms to generate both content and behavior. This differentiates GBT from other previous works that consider either one realm only or content ...


Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, Dawu GU 2017 Singapore Management University

Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu

Research Collection School Of Information Systems

As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key attacks are already practical enough to be implemented on cryptographic devices. To avoid cryptographic devices suffering from related-key attacks, it is necessary to design a cryptographic scheme that resists against such attacks. This paper proposes an efficient RKA-secure Key Encapsulation Mechanism (KEM), in which the adversary can modify the secret key sk to any value f(sk), as long as, f is a ...


What Do Developers Search For On The Web?, Xin XIA, Lingfeng BAO, David LO, Pavneet Singh KOCHHAR, Ahmed E. HASSAN, Zhenchang XING 2017 Singapore Management University

What Do Developers Search For On The Web?, Xin Xia, Lingfeng Bao, David Lo, Pavneet Singh Kochhar, Ahmed E. Hassan, Zhenchang Xing

Research Collection School Of Information Systems

Developers commonly make use of a web search engine such as Google to locate online resources to improve their productivity. A better understanding of what developers search for could help us understand their behaviors and the problems that they meet during the software development process. Unfortunately, we have a limited understanding of what developers frequently search for and of the search tasks that they often find challenging. To address this gap, we collected search queries from 60 developers, surveyed 235 software engineers from more than 21 countries across five continents. In particular, we asked our survey participants to rate the ...


Discovering Anomalous Events From Urban Informatics Data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, Noel ATHAIDE 2017 Singapore Management University

Discovering Anomalous Events From Urban Informatics Data, Kasthuri Jayarajah, Vigneshwaran Subbaraju, Dulanga Kaveesha Weerakoon Mudiyanselage, Archan Misra, La Thanh Tam, Noel Athaide

Research Collection School Of Information Systems

Singapore's "smart city" agenda is driving the government to provide public access to a broader variety of urban informatics sources, such as images from traffic cameras and information about buses servicing different bus stops. Such informatics data serves as probes of evolving conditions at different spatiotemporal scales. This paper explores how such multi-modal informatics data can be used to establish the normal operating conditions at different city locations, and then apply appropriate outlier-based analysis techniques to identify anomalous events at these selected locations. We will introduce the overall architecture of sociophysical analytics, where such infrastructural data sources can be ...


Clustering Classes In Packages For Program Comprehension, Xiaobing SUN, Xiangyue LIU, Bin LI, Bixin LI, David LO, Lingzhi LIAO 2017 Yangzhou University

Clustering Classes In Packages For Program Comprehension, Xiaobing Sun, Xiangyue Liu, Bin Li, Bixin Li, David Lo, Lingzhi Liao

Research Collection School Of Information Systems

During software maintenance and evolution, one of the important tasks faced by developers is to understand a system quickly and accurately. With the increasing size and complexity of an evolving system, program comprehension becomes an increasingly difficult activity. Given a target system for comprehension, developers may first focus on the package comprehension. The packages in the system are of different sizes. For small-sized packages in the system, developers can easily comprehend them. However, for large-sized packages, they are difficult to understand. In this article, we focus on understanding these large-sized packages and propose a novel program comprehension approach for large-sized ...


Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini 2017 Utah State University

Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini

All Graduate Theses and Dissertations

Rapid progress is being made towards the realization of autonomous cars. Since the technology is in its early stages, human intervention is still necessary in order to ensure hazard-free operation of autonomous driving systems. Substantial research efforts are underway to enhance driver and passenger safety in autonomous cars. Toward that end GreedyHaarSpiker, a real-time vision-based lane detection algorithm is proposed for road lane detection in different weather conditions. The algorithm has been implemented in Python 2.7 with OpenCV 3.0 and tested on a Raspberry Pi 3 Model B ARMv8 1GB RAM coupled to a Raspberry Pi camera board ...


Metafork: A Compilation Framework For Concurrency Models Targeting Hardware Accelerators, Xiaohui Chen 2017 The University of Western Ontario

Metafork: A Compilation Framework For Concurrency Models Targeting Hardware Accelerators, Xiaohui Chen

Electronic Thesis and Dissertation Repository

Parallel programming is gaining ground in various domains due to the tremendous computational power that it brings; however, it also requires a substantial code crafting effort to achieve performance improvement. Unfortunately, in most cases, performance tuning has to be accomplished manually by programmers. We argue that automated tuning is necessary due to the combination of the following factors. First, code optimization is machine-dependent. That is, optimization preferred on one machine may be not suitable for another machine. Second, as the possible optimization search space increases, manually finding an optimized configuration is hard. Therefore, developing new compiler techniques for optimizing applications ...


Digital Commons powered by bepress