Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,934 Full-Text Articles 5,355 Authors 1,475,542 Downloads 167 Institutions

All Articles in Software Engineering

Faceted Search

3,934 full-text articles. Page 78 of 155.

Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl 2017 California Polytechnic State University, San Luis Obispo

Intuition: Role, Biases, Cognitive Basis, And A Hypothetical Synergistic Explanation Of Intuitive Brain Operations, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper explores the characteristics of the intuitive responses that are generated by our brain continuously in an automatic and effortless manner. However, while intuition is a very powerful mechanism, it is also subject to many biasing influences. The author discusses the role of intuition, examines representative examples of biasing influences, compares cognitive theories of intuition advanced by Simon (2002), Klein (2003 and 1999), and Kahneman (2011), and then advances a hypothetical explanation of the neurological operations underlying intuition based on Hebbian rules (Hebb 1949) of plasticity in combination with synergetic principles.


Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis 2017 Loyola University Chicago

Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis

George K. Thiruvathukal

Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language mechanisms and …


Automatic Derivation Of Requirements For Components Used In Human-Intensive Systems, Heather Conboy 2017 University of Massachusetts Amherst

Automatic Derivation Of Requirements For Components Used In Human-Intensive Systems, Heather Conboy

Doctoral Dissertations

Human-intensive systems (HISs), where humans must coordinate with each other along with software and/or hardware components to achieve system missions, are increasingly prevalent in safety-critical domains (e.g., healthcare). Such systems are often complex, involving aspects such as concurrency and exceptional situations. For these systems, it is often difficult but important to determine requirements for the individual components that are necessary to ensure the system requirements are satisfied. In this thesis, we investigated an approach that employs interface synthesis methods developed for software systems to automatically derive such requirements for components used in HISs. In previous work, we investigated a requirement …


Soft Sides Of Software, Luiz Fernando Capretz, Faheem Ahmed, Fabio Queda Silva 2017 University of Western Ontario

Soft Sides Of Software, Luiz Fernando Capretz, Faheem Ahmed, Fabio Queda Silva

Electrical and Computer Engineering Publications

Software is a field of rapid changes: the best technology today becomes obsolete in the near future. If we review the graduate attributes of any of the software engineering programs across the world, life-long learning is one of them. The social and psychological aspects of professional development is linked with rewards. In organizations, where people are provided with learning opportunities and there is a culture that rewards learning, people embrace changes easily. However, the software industry tends to be short-sighted and its primary focus is more on current project success; it usually ignores the capacity building of the individual or …


A Software Development Process For Freshman Undergraduate Students, Catherine Higgins, Fredrick Mtenzi, Ciaran O’leary, Orla Hanratty, Claire McAvinia 2017 Dublin Institute of Technology, Ireland

A Software Development Process For Freshman Undergraduate Students, Catherine Higgins, Fredrick Mtenzi, Ciaran O’Leary, Orla Hanratty, Claire Mcavinia

Book Chapters / Conference Papers

This conceptual paper presents work which is part of an ongoing research project into the design of a software development process aimed at freshman, undergraduate computing students. The process of how to plan and develop a solution is a topic that is addressed very lightly in many freshman, undergraduate courses which can leave novices open to developing habit-forming, maladaptive cognitive practices. The conceptual software development process described in this paper has a learning process at its core which centres on declarative knowledge (in the form of threshold concepts) and procedural knowledge (in the form of computational thinking skills) scaffolding freshman …


A Compact, Flexible Fiber-Optic Surface Plasmon Resonance Sensor With Changeable Sensor Chips, David Michel, Feng Xiao, Kamal Alameh 2017 Edith Cowan University

A Compact, Flexible Fiber-Optic Surface Plasmon Resonance Sensor With Changeable Sensor Chips, David Michel, Feng Xiao, Kamal Alameh

Research outputs 2014 to 2021

We propose and demonstrate the concept of a novel compact, flexible fiber optic Surface Plasmon Resonance (SPR) sensor based on a double-pass Kretschmann-type configuration, where the SPR sensor chip can be replaced for various sensing applications. Simulation and experimental results demonstrate that the proposed fiber-optic SPR structure has a sensitivity to salt concentration of around 4.8 μW/ppt.


Ehealthportal: A Social Support Hub For The Active Living Of The Elderly, Di WANG, Ah-hwee TAN 2017 Singapore Management University

Ehealthportal: A Social Support Hub For The Active Living Of The Elderly, Di Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

The absolute and relative increases in the number of elderly are evident worldwide, from the most developed countries to the lowest-income regions. The fast demographic transition poses great challenges to the healthcare system and introduces a significant burden to the elderly and their family. To meet the unprecedented challenges of global aging, various aging-in-place (AIP) solutions have been proposed to enable the elderly to live in their own home and community safely, independently and comfortably. Elderly need support in various aspects, such as physical, cognitive, emotional, and social, in their daily life. However, most existing AIP solutions provide support in …


Auditing Anti-Malware Tools By Evolving Android Malware And Dynamic Loading Technique, Yinxing XUE, Guozhu MENG, Yang LIU, Tian Huat TAN, Hongxu CHEN, Jun SUN, Jie ZHANG 2017 Singapore Management University

Auditing Anti-Malware Tools By Evolving Android Malware And Dynamic Loading Technique, Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, Jie Zhang

Research Collection School Of Computing and Information Systems

Although a previous paper shows that existing antimalware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does not imply that AMTs can effectively deal with future malware. It is desirable to have an alternative way of auditing AMTs. In our previous paper, we use malware samples from android malware collection GENOME to summarize a malware meta-model for modularizing the common attack behaviors and evasion techniques in reusable features. We then combine different features with an evolutionary algorithm, in which way we evolve malware for variants. Previous results have shown that the …


Adviser+: Toward A Usable Web-Based Algorithm Portfolio Deviser, Hoong Chuin LAU, Mustafa MISIR, Xiang LI LI, Lingxiao JIANG 2017 Singapore Management University

Adviser+: Toward A Usable Web-Based Algorithm Portfolio Deviser, Hoong Chuin Lau, Mustafa Misir, Xiang Li Li, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

The present study offers a more user-friendly and parallelized version of a web-based algorithm portfolio generator, called ADVISER. ADVISER is a portfolio generation tool to deliver a group of configurations for a given set of algorithms targeting a particular problem. The resulting configurations are expected to be diverse such that each can perform well on a certain type of problem instances. One issue with ADVISER is that it performs portfolio generation on a single-core which results in long waiting times for the users. Besides that, it lacks of a reporting system with visualizations to tell more about the generated portfolios. …


Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, Dong In KIM 2017 Nanyang Technological University

Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

Research Collection School Of Computing and Information Systems

With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technology to understand and create an engaging user experience. This paper proposes a fast adaptation and learning scheme of activity tracking policies when user statistics are unknown a priori, varying with time, and inconsistent for different users. In our stochastic optimization, user activities are required to be synchronized with a backend under a cellular data limit to avoid overcharges from cellular operators. The mobile device is charged intermittently using wireless or wired charging for receiving the required energy for transmission and sensing …


Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli MO, Lipyeow LIM, Sougata SEN, Archan MISRA, Rajesh Krishna BALAN, Youngki LEE 2017 Singapore Management University

Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli Mo, Lipyeow Lim, Sougata Sen, Archan Misra, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

In this paper, we reduce the energy overheads of continuous mobile sensing, specifically for the case of context-aware applications that are interested in collective context or events, i.e., events expressed as a set of complex predicates over sensor data from multiple smartphones. We propose a cloud-based query management and optimization framework, called CloQue, that can support thousands of such concurrent queries, executing over a large number of individual smartphones. Our central insight is that the context of different individuals & groups often have significant correlation, and that this correlation can be learned through standard association rule mining on historical data. …


Testing And Debugging: A Reality Check, Pavneet Singh KOCHHAR 2017 Singapore Management University

Testing And Debugging: A Reality Check, Pavneet Singh Kochhar

Dissertations and Theses Collection

Testing and debugging are important activities during software development and maintenance. Testing is performed to check if the code contains errors whereas debugging is done to locate and fix these errors. Testing can be manual or automated and can be of different types such as unit, integration, system, stress etc. Debugging can also be manual or automated. These two activities have drawn attention of researchers in the recent years. Past studies have proposed many testing techniques such as automated test generation, test minimization, test case selection etc. Studies related to debugging have proposed new techniques to find bugs using various …


Hybrid Based Approaches For Software Fault Localization And Specification Mining, Bui Tien Duy LE 2017 Singapore Management University

Hybrid Based Approaches For Software Fault Localization And Specification Mining, Bui Tien Duy Le

Dissertations and Theses Collection

Debugging programs and writing formal specifications are essential but expensive processes to maintain quality and reliability of software systems. Developers often have to debug and create specifications manually, which take a lot of their time and effort. Recently, several automated solutions have been proposed to help developers alleviate the cost of manual labor in the two processes. In particular, fault localization techniques help developer debug by accepting textual information in bug reports or program spectra (i.e., a record of which program elements are executed for each test case). Their output is a ranked list of program elements that are likely …


Real-Time Bursty Topic Detection And Virality Forecasting In Microblogs, Wei XIE 2017 Singapore Management University

Real-Time Bursty Topic Detection And Virality Forecasting In Microblogs, Wei Xie

Dissertations and Theses Collection

Microblogs such as Twitter have become the largest social platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in microblogs is one that triggers a surge of relevant tweets within a short period of time, which often reflects important events of mass interest. How to leverage microblogs for early detection and further impact analysis of bursty topics has, therefore, become an important research problem with immense practical value.


A Decidable Fragment In Separation Logic With Inductive Predicates And Arithmetic, Quang Loc LE, Makoto TATSUTA, Jun SUN, Wei-Ngan CHIN 2017 Singapore Management University

A Decidable Fragment In Separation Logic With Inductive Predicates And Arithmetic, Quang Loc Le, Makoto Tatsuta, Jun Sun, Wei-Ngan Chin

Research Collection School Of Computing and Information Systems

We consider the satisfiability problem for a fragment of separation logic including inductive predicates with shape and arithmetic properties. We show that the fragment is decidable if the arithmetic properties can be represented as semilinear sets. Our decision procedure is based on a novel algorithm to infer a finite representation for each inductive predicate which precisely characterises its satisfiability. Our analysis shows that the proposed algorithm runs in exponential time in the worst case. We have implemented our decision procedure and integrated it into an existing verification system. Our experiment on benchmarks shows that our procedure helps to verify the …


Jfix: Semantics-Based Repair Of Java Programs Via Symbolic Pathfinder, Xuan Bach D. LE, Duc-Hiep CHU, David LO, GOUES LE, Willem VISSER 2017 Singapore Management University

Jfix: Semantics-Based Repair Of Java Programs Via Symbolic Pathfinder, Xuan Bach D. Le, Duc-Hiep Chu, David Lo, Goues Le, Willem Visser

Research Collection School Of Computing and Information Systems

Recently there has been a proliferation of automated program repair (APR) techniques, targeting various programming languages. Such techniques can be generally classified into two families: syntactic- and semantics-based. Semantics-based APR, on which we focus, typically uses symbolic execution to infer semantic constraints and then program synthesis to construct repairs conforming to them. While syntactic-based APR techniques have been shown success- ful on bugs in real-world programs written in both C and Java, semantics-based APR techniques mostly target C programs. This leaves empirical comparisons of the APR families not fully explored, and developers without a Java-based semantics APR technique. We present …


Automatically Locating Malicious Packages In Piggybacked Android Apps, Li LI, Daoyuan LI, Tegawende BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, Yves LE TRAON 2017 Singapore Management University

Automatically Locating Malicious Packages In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon

Research Collection School Of Computing and Information Systems

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to …


Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, Dingyi FANG 2017 Northwest University

Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang

Research Collection School Of Computing and Information Systems

While most existing indoor localization techniques are device-based, many emerging applications such as intruder detection and elderly monitoring drive the needs of device-free localization, in which the target can be localized without any device attached. Among the diverse techniques, received signal strength (RSS) fingerprint-based methods are popular because of the wide availability of RSS readings in most commodity hardware. However, current fingerprint-based systems suffer from high human labor cost to update the fingerprint database and low accuracy due to the large degree of RSS variations. In this paper, we propose a fingerprint-based device-free localization system named iUpdater to significantly reduce …


Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, Dong In KIM 2017 Singapore Management University

Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

Research Collection School Of Computing and Information Systems

With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technologyto understand and create an engaging user experience. This paper proposes afast adaptation and learning scheme of activity tracking policies when userstatistics are unknown a priori, varying with time, and inconsistent for differentusers. In our stochastic optimization, user activities are required to besynchronized with a backend under a cellular data limit to avoid overchargesfrom cellular operators. The mobile device is charged intermittently usingwireless or wired charging for receiving the required energy for transmission andsensing operations. Firstly, we propose an activity tracking policy …


Cyber Foraging: Fifteen Years Later, Rajesh Krishna BALAN, Jason FLINN 2017 Singapore Management University

Cyber Foraging: Fifteen Years Later, Rajesh Krishna Balan, Jason Flinn

Research Collection School Of Computing and Information Systems

Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special issue on pervasive computing revisited.


Digital Commons powered by bepress