Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,932 Full-Text Articles 5,346 Authors 1,338,883 Downloads 167 Institutions

All Articles in Software Engineering

Faceted Search

3,932 full-text articles. Page 77 of 155.

Automated Android Application Permission Recommendation, Lingfeng BAO, David LO, Xin XIA, Shanping LI 2017 Zhejiang University

Automated Android Application Permission Recommendation, Lingfeng Bao, David Lo, Xin Xia, Shanping Li

Research Collection School Of Computing and Information Systems

The number of Android applications has increased rapidly as Android is becoming the dominant platform in the smartphone market. Security and privacy are key factors for an Android application to be successful. Android provides a permission mechanism to ensure security and privacy. This permission mechanism requires that developers declare the sensitive resources required by their applications. On installation or during runtime, users are required to agree with the permission request. However, in practice, there are numerous popular permission misuses, despite Android introducing official documents stating how to use these permissions properly. Some data mining techniques (e.g., association rule mining) have …


Unobtrusive Monitoring To Detect Depression For Elderly With Chronic Illnesses, Jung-Yoon KIM, Na LIU, Hwee Xian TAN, Chao-Hsien CHU 2017 University of Michigan

Unobtrusive Monitoring To Detect Depression For Elderly With Chronic Illnesses, Jung-Yoon Kim, Na Liu, Hwee Xian Tan, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Mental health related disorders are common diseases, especially among the elder. Among the various mental health diseases, one potential threat to ageing-in-place is the risk of depression. In this paper, we propose a simple unobtrusive sensing system using passive infra-red motion sensors to monitor the activities of daily living of elderly, who are living alone. A feature extraction module comprising of three layers-states, events, and activities, and the corresponding algorithms are proposed to extract features. Four popular classification models-neural network, C4.5 decision tree, Bayesian network, and support vector machine are then applied to detect the severity of depression. We implement …


Audiosense: Sound-Based Shopper Behavior Analysis System, Amit SHARMA, Youngki LEE 2017 Singapore Management University

Audiosense: Sound-Based Shopper Behavior Analysis System, Amit Sharma, Youngki Lee

Research Collection School Of Computing and Information Systems

This paper presents AudioSense, the system to monitor user-item interactions inside a store hence enabling precisely customized promotions. A shopper's smartwatch emits sound every time the shopper picks up or touches an item inside a store. This sound is then localized, in 2D space, by calculating the angles of arrival captured by multiple microphones deployed on the racks. Lastly, the 2D location is mapped to specific items on the rack based on the rack layout information. In our initial experiments conducted with a single rack with 16 compartments, we could localize the shopper's smartwatch with a median estimation error of …


Clsters: A General System For Reducing Errors Of Trajectories Under Challenging Localization Situations, Hao WU, Weiwei SUN, Baihua ZHENG, Li YANG, Wei ZHOU 2017 Fudan University

Clsters: A General System For Reducing Errors Of Trajectories Under Challenging Localization Situations, Hao Wu, Weiwei Sun, Baihua Zheng, Li Yang, Wei Zhou

Research Collection School Of Computing and Information Systems

Trajectory data generated by outdoor activities have great potential for location based services. However, depending on the localization technique used, certain trajectory data could contain large errors. For example, the error of trajectories generated by cellular-based localization techniques is around 100m which is ten times larger than that of GPS-based trajectories. Hence, enhancing the utility of those large-error trajectories becomes a challenge. In this paper we show how to improve the quality of trajectory data having large errors. Some existing works reduce the error through hardware which requires information such as the time of arrival (TOA), received signal strength indication …


Xsearch: A Domain-Specific Cross-Language Relevant Question Retrieval Tool, Bowen XU, Zhenchang XING, Xin XIA, David LO, Xuan-Bach D. LE 2017 Singapore Management University

Xsearch: A Domain-Specific Cross-Language Relevant Question Retrieval Tool, Bowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le

Research Collection School Of Computing and Information Systems

During software development process, Chinese developers often seek solutions to the technical problems they encounter by searching relevant questions on Q&A sites. When developers fail to find solutions on Q&A sites in Chinese, they could translate their query and search on the English Q&A sites. However, Chinese developers who are non-native English speakers often are not comfortable to ask or search questions in English, as they do not know the proper translation of the Chinese technical words into the English technical words. Furthermore, the process of manually formulating cross-language queries and determining the importance of query words is a tedious …


S3: Syntax- And Semantic-Guided Repair Synthesis Via Programming By Examples, Xuan-Bach D. LE, Duc-Hiep CHU, David LO, Claire LE GOUES, Willem VISSER 2017 Singapore Management University

S3: Syntax- And Semantic-Guided Repair Synthesis Via Programming By Examples, Xuan-Bach D. Le, Duc-Hiep Chu, David Lo, Claire Le Goues, Willem Visser

Research Collection School Of Computing and Information Systems

A notable class of techniques for automatic program repair is known as semantics-based. Such techniques, e.g., Angelix, infer semantic specifications via symbolic execution, and then use program synthesis to construct new code that satisfies those inferred specifications. However, the obtained specifications are naturally incomplete, leaving the synthesis engine with a difficult task of synthesizing a general solution from a sparse space of many possible solutions that are consistent with the provided specifications but that do not necessarily generalize. We present S3, a new repair synthesis engine that leverages programming-by-examples methodology to synthesize high-quality bug repairs. The novelty in S3 that …


Personality And Project Success: Insights From A Large-Scale Study With Professionals, Xin XIA, David LO, Lingfeng BAO, Abhishek SHARMA, Shanping LI 2017 Singapore Management University

Personality And Project Success: Insights From A Large-Scale Study With Professionals, Xin Xia, David Lo, Lingfeng Bao, Abhishek Sharma, Shanping Li

Research Collection School Of Computing and Information Systems

A software project is typically completed as a result of a collective effort done by individuals of different personalities. Personality reflects differences among people in behaviour patterns, communication, cognition and emotion. It often impacts relationships and collaborative work, and software engineering teamwork is no exception. Some personalities are more likely to click while others to clash. A number of studies have investigated the relationship between personality and collaborative work success. However, most of them are done in a laboratory setting, do not involve professionals, or consider non software engineering tasks. Additionally, they only answer a limited set of questions, and …


Inferring Spread Of Readers’ Emotion Affected By Online News, Agus SULISTYA, Ferdian THUNG, David LO 2017 Singapore Management University

Inferring Spread Of Readers’ Emotion Affected By Online News, Agus Sulistya, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Depending on the reader, A news article may be viewed from many different perspectives, thus triggering different (and possibly contradicting) emotions. In this paper, we formulate a problem of predicting readers’ emotion distribution affected by a news article. Our approach analyzes affective annotations provided by readers of news articles taken from a non-English online news site. We create a new corpus from the annotated articles, and build a domain-specific emotion lexicon and word embedding features. We finally construct a multi-target regression model from a set of features extracted from online news articles. Our experiments show that by combining lexicon and …


Secure Integer Comparisons Using The Homomorphic Properties Of Prime Power Subgroups, Rhys A. Carlton 2017 The University of Western Ontario

Secure Integer Comparisons Using The Homomorphic Properties Of Prime Power Subgroups, Rhys A. Carlton

Electronic Thesis and Dissertation Repository

Secure multi party computation allows two or more parties to jointly compute a function under encryption without leaking information about their private inputs. These secure computations are vital in many fields including law enforcement, secure voting and bioinformatics because the privacy of the information is of paramount importance.

One common reference problem for secure multi party computation is the Millionaires' problem which was first introduced by Turing Award winner Yao in his paper "Protocols for secure computation". The Millionaires' problem considers two millionaires who want to know who is richer without disclosing their actual worth.

There are public-key cryptosystems that …


Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang 2017 Northwest University

Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang

Department of Computer Science Faculty Scholarship and Creative Works

As the underlying infrastructure of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many applications. Network coding is a technique in WSNs to combine multiple channels of data in one transmission, wherever possible, to save node’s energy as well as increase the network throughput. So far most works on network coding are based on two assumptions to determine coding opportunities: (1) All the links in the network have the same transmission success rate; (2) Each link is bidirectional, and has the same transmission success rate on both ways. However, these assumptions may not be …


Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra PhD 2017 Purdue University

Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra Phd

The Summer Undergraduate Research Fellowship (SURF) Symposium

Traditional drug discovery methodology uses a multitude of software packages to design and evaluate new drug-like compounds. While software packages implement a wide variety of methods, the serial (i.e. single core) implementation for many of these algorithms, prohibit large scale docking, such as proteome-wide docking (i.e. thousands of compounds with thousands of proteins). Several docking algorithms can be parallelized, significantly reducing the runtime of the calculations, thus enabling large-scale docking. Implementing algorithms that take advantage of the distributed nature of graphical processing units (GPUs) via the Compute Unified Device Architecture (CUDA) enables us to efficiently implement massively parallel algorithms. Two …


Managing Sensor Systems For Early Detection Of Mild Cognitive Impairment In Community Elderly: Lessons Learned And Future Work, Boon Thai NG, Hwee-Pink TAN, Hwee Xian TAN 2017 Singapore Management University

Managing Sensor Systems For Early Detection Of Mild Cognitive Impairment In Community Elderly: Lessons Learned And Future Work, Boon Thai Ng, Hwee-Pink Tan, Hwee Xian Tan

Research Collection School Of Computing and Information Systems

The aging population is a pertinent issue faced by governments globally. One of the most common and costly health issues associated with the aging population is cognitive decline, leading up to dementia. In this paper, we describe a non-intrusive, continuous and scalable system for early detection of Mild Cognitive Impairment (MCI) in the elderly, which enables early medical interventions to be provided. We focus on the system design and feature extraction of the sensor system, to validate our hypothesis of the use of sensor systems for early detection of MCI. Lessons learned from deploying the sensor system is presented, together …


A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner 2017 University of Tennessee, Knoxville

A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner

Masters Theses

Computed tomography (CT) is used to produce cross-sectional images of an object via noninvasive X-ray scanning of the object. These images have a wide range of uses including threat detection in checked baggage at airports. The projection data collected by the CT scanner must be reconstructed before the image may be viewed. In comparison to filtered backprojection methods of reconstruction, iterative reconstruction algorithms have been shown to increase overall image quality by incorporating a more complete model of the underlying physics. Unfortunately, iterative algorithms are generally too slow to meet the high throughput demands of this application. It is therefore …


Toward Accurate Network Delay Measurement On Android Phones, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, Ricky K. P. MOK 2017 Huawei Future Network Theory Lab, Hong Kong

Toward Accurate Network Delay Measurement On Android Phones, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok

Research Collection School Of Computing and Information Systems

Measuring and understanding the performance of mobile networks is becoming very important for end users and operators. Despite the availability of many measurement apps, their measurement accuracy has not received sufficient scrutiny. In this paper, we appraise the accuracy of smartphone-based network performance measurement using the Android platform and the network round-trip time (RTT) as the metric. We show that two of the most popular measurement apps-Ookla Speedtest and MobiPerf-have their RTT measurements inflated. We build three test apps that cover three common measurement methods and evaluate them in a testbed. We overcome the main challenge of obtaining a complete …


Flexible Online Task Assignment In Real-Time Spatial Data, Yongxin TONG, Libin WANG, Zimu ZHOU, Bolin DING, Lei CHEN, Jieping YE, Ke XU 2017 Singapore Management University

Flexible Online Task Assignment In Real-Time Spatial Data, Yongxin Tong, Libin Wang, Zimu Zhou, Bolin Ding, Lei Chen, Jieping Ye, Ke Xu

Research Collection School Of Computing and Information Systems

The popularity of Online To Offline (O2O) service platforms has spurred the need for online task assignment in real-time spatial data, where streams of spatially distributed tasks and workers are matched in real time such that the total number of assigned pairs is maximized. Existing online task assignment models assume that each worker is either assigned a task immediately or waits for a subsequent task at a fixed location once she/he appears on the platform. Yet in practice a worker may actively move around rather than passively wait in place if no task is assigned. In this paper, we define …


The Simpler The Better: A Unified Approach To Predicting Original Taxi Demands On Large-Scale Online Platforms, Yongxin TONG, Yuqiang CHEN, Zimu ZHOU, Lei CHEN, Jie WANG, Qiang YANG, Jieping YE, Weifeng LV 2017 Singapore Management University

The Simpler The Better: A Unified Approach To Predicting Original Taxi Demands On Large-Scale Online Platforms, Yongxin Tong, Yuqiang Chen, Zimu Zhou, Lei Chen, Jie Wang, Qiang Yang, Jieping Ye, Weifeng Lv

Research Collection School Of Computing and Information Systems

No abstract provided.


Measuring Fine-Grained Metro Interchange Time Via Smartphones, Weixi GU, Kai ZHANG, Zimu ZHOU, Ming JIN, Yuxun ZHOU, Xi LIU, Costas J. SPANOS, Zuo-Jun (Max) SHEN, Wei-Hua LIN, Lin ZHANG 2017 Singapore Management University

Measuring Fine-Grained Metro Interchange Time Via Smartphones, Weixi Gu, Kai Zhang, Zimu Zhou, Ming Jin, Yuxun Zhou, Xi Liu, Costas J. Spanos, Zuo-Jun (Max) Shen, Wei-Hua Lin, Lin Zhang

Research Collection School Of Computing and Information Systems

High variability interchange times often significantly affect the reliability of metro travels. Fine-grained measurements of interchange times during metro transfers can provide valuable insights on the crowdedness of stations, usage of station facilities and efficiency of metro lines. Measuring interchange times in metro systems is challenging since agentoperated systems like automatic fare collection systems only provide coarse-grained trip information and popular localization services like GPS are often inaccessible underground. In this paper, we propose a smartphone-based interchange time measuring method from the passengers’ perspective. It leverages low-power sensors embedded in modern smartphones to record ambient contextual features, and utilizes a …


Will This Localization Tool Be Effective For This Bug? Mitigating The Impact Of Unreliability Of Information Retrieval Based Bug Localization Tools, Tien-Duy B. LE, Ferdian THUNG, David LO 2017 Singapore Management University

Will This Localization Tool Be Effective For This Bug? Mitigating The Impact Of Unreliability Of Information Retrieval Based Bug Localization Tools, Tien-Duy B. Le, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Information retrieval (IR) based bug localization approaches process a textual bug report and a collection of source code files to find buggy files. They output a ranked list of files sorted by their likelihood to contain the bug. Recently, several IR-based bug localization tools have been proposed. However, there are no perfect tools that can successfully localize faults within a few number of most suspicious program elements for every single input bug report. Therefore, it is difficult for developers to decide which tool would be effective for a given bug report. Furthermore, for some bug reports, no bug localization tools …


Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl 2017 California Polytechnic State University, San Luis Obispo

Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper explores the characteristics of the intuitive responses that are generated by our brain continuously in an automatic and effortless manner. However, while intuition is a very powerful mechanism, it is also subject to many biasing influences. The author discusses the role of intuition, examines representative examples of biasing influences, compares cognitive theories of intuition advanced by Simon (2002), Klein (2003 and 1999), and Kahneman (2011), and then advances a hypothetical explanation of the neurological operations underlying intuition based on Hebbian rules (Hebb 1949) of plasticity in combination with synergetic principles.


Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis 2017 Loyola University Chicago

Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis

George K. Thiruvathukal

Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language mechanisms and …


Digital Commons powered by bepress