Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science
Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska
The African Journal of Information Systems
Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...
Colenda @ The University Of Pennsylvania: Using A Decoupled, Pluggable Architecture For Object Processing, 2018 University of Pennsylvania
Colenda @ The University Of Pennsylvania: Using A Decoupled, Pluggable Architecture For Object Processing, Kate Lynch
Scholarship at Penn Libraries
This poster details the architecture of the repository and the deliverables of the first major release of Colenda, the open-source repository software developed at Penn Libraries. Staff in Digital Library Development & Systems created Colenda, a long-term preservation ecosystem including Samvera, an open-source software framework for repository development, at its core. Colenda is a Samvera instance that provides materials-agnostic fuThis poster details the architecture of the repository and the deliverables of the first major release of Colenda, the open-source repository software developed at Penn Libraries. Staff in Digital Library Development & Systems created Colenda, a long-term preservation ecosystem including Samvera, an open-source ...
Fusing Multi-Abstraction Vector Space Models For Concern Localization, 2018 Singapore Management University
Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun Zhang, David Lo, Xin Xia, Giuseppe Scanniello, Tien-Duy B. Le, Jianling Sun
Research Collection School Of Information Systems
Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that are relevant to the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose a multi-abstraction ...
Extension Of Cpe 454 Operating System, 2018 California Polytechnic State University, San Luis Obispo
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.
Compiler Optimization Effects On Register Collisions, 2018 California Polytechnic State University, San Luis Obispo
Compiler Optimization Effects On Register Collisions, Jonathan S. Tan
Master's Theses and Project Reports
We often want a compiler to generate executable code that runs as fast as possible. One consideration toward this goal is to keep values in fast registers to limit the number of slower memory accesses that occur. When there are not enough physical registers available for use, values are ``spilled'' to the runtime stack. The need for spills is discovered during register allocation wherein values in use are mapped to physical registers. One factor in the efficacy of register allocation is the number of values in use at one time (register collisions). Register collision is affected by compiler optimizations that ...
Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, 2018 State University of New York at Binghamton
Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda
Graduate Dissertations and Theses
As data centers continue to grow in scale, the resource management software needs to work closely with the hardware infrastructure to provide high utilization, performance, fault tolerance, and high availability. Apache Mesos has emerged as a leader in this space, providing an abstraction over the entire cluster, data center, or cloud to present a uniform view of all the resources. In addition, frameworks built on Mesos such as Apache Aurora, developed within Twitter and later contributed to the Apache Software Foundation, allow massive job submissions with heterogeneous resource requirements. The availability of such tools in the Open Source space, with ...
Usability Of Sound-Driven User Interfaces, 2018 University of Arkansas, Fayetteville
Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson
Computer Science and Computer Engineering Undergraduate Honors Theses
The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent ...
Wisdom In Sum Of Parts: Multi-Platform Activity Prediction In Social Collaborative Sites, 2018 Singapore Management University
Wisdom In Sum Of Parts: Multi-Platform Activity Prediction In Social Collaborative Sites, Roy Ka-Wei Lee, David Lo
Research Collection School Of Information Systems
In this paper, we proposed a novel framework which uses user interests inferred from activities (a.k.a., activity interests) in multiple social collaborative platforms to predict users’ platform activities. Included in the framework are two prediction approaches: (i) direct platform activity prediction, which predicts a user’s activities in a platform using his or her activity interests from the same platform (e.g., predict if a user answers a given Stack Overflow question using the user’s interests inferred from his or her prior answer and favorite activities in Stack Overflow), and (ii) cross-platform activity prediction, which predicts a ...
Blockchain In Payment Card Systems, 2018 Southern Methodist University
Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald
SMU Data Science Review
Payment cards (e.g., credit and debit cards) are the most frequent form of payment in use today. A payment card transaction entails many verification information exchanges between the cardholder, merchant, issuing bank, a merchant bank, and third-party payment card processors. Today, a record of the payment transaction often records to multiple ledgers. Merchant’s incur fees for both accepting and processing payment cards. The payment card industry is in dire need of technology which removes the need for third-party verification and records transaction details to a single tamper-resistant digital ledger. The private blockchain is that technology. Private blockchain provides ...
Making Scientific Applications Portable: Software Containers And Package Managers, 2018 College of Saint Benedict and Saint John's University
Making Scientific Applications Portable: Software Containers And Package Managers, Curtis Noecker
All College Thesis Program, 2016-present
Scientific workflows for high-performance computing (HPC) are becoming increasingly complex. Developing a way to simplify these workflows could save many hours for both HPC users and developers, potentially eliminating any time spent managing software dependencies and experiment set-up. To accomplish this, we propose using two programs together: Docker and Spack. Docker is a container platform and Spack is a package manager designed specifically for HPC. In this paper, we show how Docker and Spack can be used to containerize the extreme-scale Scientific Software Development Kit (xSDK). Doing this makes the xSDK far more accessible to non-computer scientists and lowers time ...
A Survey Of Security And Privacy In Mobile Cloud Computing, 2018 Western Michigan University
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it ...
Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, 2018 Singapore Management University
Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, Yun Zhang, David Lo, Xin Xia, Jianling Sun
Research Collection School Of Information Systems
To facilitate developers in effective allocation of their testing and debugging efforts, many software defect prediction techniques have been proposed in the literature. These techniques can be used to predict classes that are more likely to be buggy based on the past history of classes, methods, or certain other code elements. These techniques are effective provided that a sufficient amount of data is available to train a prediction model. However, sufficient training data are rarely available for new software projects. To resolve this problem, cross-project defect prediction, which transfers a prediction model trained using data from one project to another ...
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, 2018 University of Nebraska at Omaha
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips
Student Research and Creative Activity Fair
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.
Randomized Routing On Fat-Trees, 2018 Selected Works
Randomized Routing On Fat-Trees, Ronald I. Greenberg
Fat-trees are a class of routing networks for hardware-efficient parallel computation. This paper presents a randomized algorithm for routing messages on a fat-tree. The quality of the algorithm is measured in terms of the load factor of a set of messages to be routed, which is a lower bound on the time required to deliver the messages. We show that if a set of messages has load factor lambda on a fat-tree with n processors, the number of delivery cycles (routing attempts) that the algorithm requires is O(lambda+lgnlglgn) with probability 1-O(1/n). The ...
The Legacy Of Multics And Secure Operating Systems Today, 2018 CUNY Queensborough Community College
The Legacy Of Multics And Secure Operating Systems Today, John Schriner
Publications and Research
This paper looks to the legacy of Multics from 1963 and its influence on computer security. It discusses kernel-based and virtualization-based containment in projects like SELinux and Qubes, respectively. The paper notes the importance of collaborative and research-driven projects like Qubes and Tor Project.
How Do Topological Properties Of Ripple-Carry Adders Affect Time Delay?, 2018 Augsburg University
How Do Topological Properties Of Ripple-Carry Adders Affect Time Delay?, Alexander Boukal
This poster presents topological properties of N-bit ripple-carry adders and the effects of their topology, specifically their genus, on the speed of current flow. An adder is a very simple computer that takes input numbers (0 and 1) from logic gates and then adds them together. To create a ripple-carry adder, we take N number of adder circuits and arrange them in parallel. We differentiate between two kinds of adder circuits: half adders and full adders. Half adders are non-planar (has loops) circuits with genus = 1 that let us perform elementary addition operations using logic gates. Full adder circuits are ...
Modeling Data Center Co-Tenancy Performance Interference, 2018 Michigan Technological University
Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang
Dissertations, Master's Theses and Master's Reports
A multi-core machine allows executing several applications simultaneously. Those jobs are scheduled on different cores and compete for shared resources such as the last level cache and memory bandwidth. Such competitions might cause performance degradation. Data centers often utilize virtualization to provide a certain level of performance isolation. However, some of the shared resources cannot be divided, even in a virtualized system, to ensure complete isolation. If the performance degradation of co-tenancy is not known to the cloud administrator, a data center often has to dedicate a whole machine for a latency-sensitive application to guarantee its quality of service. Co-run ...
Why Are Fairness Concerns So Important? Lessons From Pricing A Shared Last-Mile Transportation System, 2018 Singapore Management University
Why Are Fairness Concerns So Important? Lessons From Pricing A Shared Last-Mile Transportation System, Yiwei Chen, Hai Wang
Research Collection School Of Information Systems
The Last-Mile Problem refers to the provision of travel service from the nearest public transportation node to the final destination. The Last-Mile Transportation System (LMTS), which has recently emerged, provides on-demand shared last-mile transportation service. While it is natural that in the last-mile supply chain, a high-value parcel should be charged a higher price and deserves service priority compared to a low-value parcel, it is not straightforward to identify an obvious pricing and service priority for an LMTS that serves passengers. In an LMTS, a special-type passenger who has a higher valuation of service usually has a lower waiting time ...
Smart-Teleprompter: An Online Teleprompter With Text Editing, 2018 The University of Akron
Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred
Honors Research Projects
Major: Computer Science
Project Sponsor: Dr. Collard
Number of Project Credits: 3
The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style ...
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, 2017 University of Nebraska-Lincoln
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Computer Science and Engineering: Theses, Dissertations, and Student Research
In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible ...