Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2298

Full-Text Articles in Physical Sciences and Mathematics

Front Matter Dec 2012

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2012

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2012

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado Dec 2012

Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado

Publications

Data Comm—a text-based controller-pilot communication system—is critical to many NextGen improvements. With Data Comm, communication becomes a visual task. Interacting with a visual Data Comm display may yield an unsafe increase in head-down time, particularly for single-pilot operations. This study examined the feasibility of supplementing Data Comm with synthetic speech. To this end, thirty-two pilots flew two experimental scenarios in a Cessna 172 Flight Training Device. In one scenario, ATC communication was with a text-only Data Comm display, in the other, communication was with a text Data Comm display with synthetic speech that read aloud each message (i.e., text+speech). Pilots …


Software Requirements As Executable Code, Karen Eileen Wasielewski Morand Dec 2012

Software Requirements As Executable Code, Karen Eileen Wasielewski Morand

Regis University Student Publications (comprehensive collection)

This project analyzed the effectiveness of using Story Testing frameworks to create an application directly from user specifications. It did this by taking an example business application with "traditional" specifications and rewriting those specifications in three different Story Testing Frameworks - Cucumber, FitNesse, and JBehave. Analysis of results drew the following conclusions: 1) Story Testing can help prove a project's completeness, 2) Specifications are still too technical, 3) Implementation is not overly complex, and 4) Story Testing is worth it. It proposed future research around evaluating natural languages and seeking more user-friendly ways of writing specifications in a natural language.


Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang Dec 2012

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …


Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang Dec 2012

Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu Dec 2012

When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo Dec 2012

Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo

David LO

Antagonistic communities refer to groups of people with opposite tastes, opinions, and factions within a community. Given a set of interactions among people in a community, we develop a novel pattern mining approach to mine a set of antagonistic communities. In particular, based on a set of user-specified thresholds, we extract a set of pairs of communities that behave in opposite ways with one another. We focus on extracting a compact lossless representation based on the concept of closed patterns to prevent exploding the number of mined antagonistic communities. We also present a variation of the algorithm using a divide …


Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo Dec 2012

Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo

David LO

Reusing APIs of existing libraries is a common practice during software development, but searching suitable APIs and their usages can be time-consuming [6]. In this paper, we study a new and more practical approach to help users find usages of APIs given only simple text phrases, when users have limited knowledge about an API library. We model API invocations as an API graph and aim to find an optimum connected subgraph that meets users' search needs. The problem is challenging since the search space in an API graph is very huge. We start with a greedy subgraph search algorithm which …


Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro Dec 2012

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro

David LO

A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …


Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz Dec 2012

Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz

David LO

Specification mining takes execution traces as input and extracts likely program invariants, which can be used for comprehension, verification, and evolution related tasks. In this work we integrate scenario-based specification mining, which uses a data-mining algorithm to suggest ordering constraints in the form of live sequence charts, an inter-object, visual, modal, scenario-based specification language, with mining of value-based invariants, which detects likely invariants holding at specific program points. The key to the integration is a technique we call scenario-based slicing, running on top of the mining algorithms to distinguish the scenario-specific invariants from the general ones. The resulting suggested specifications …


Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim Dec 2012

Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim

David LO

Microblogging has recently become a popular means to disseminate information among millions of people. Interestingly, software developers also use microblog to communicate with one another. Different from traditional media, microblog users tend to focus on recency and informality of content. Many tweet contents are relatively more personal and Opinionated, compared to that of traditional news report. Thus, by analyzing microblogs, one could get the up-to-date information about what people are interested in or feel toward a particular topic. In this paper, we describe our microblog observatory that aggregates more than 70,000 Twitter feeds, captures software-related tweets, and computes trends from …


Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi Dec 2012

Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi

David LO

High-quality test data that is useful for effective testing is often available on users’ site. However, sharing data owned by users with software vendors may raise privacy concerns. Techniques are needed to enable data sharing among data owners and the vendors without leaking data privacy. Evolving programs bring additional challenges because data may be shared multiple times for every version of a program. When multiple versions of the data are cross-referenced, private information could be inferred. Although there are studies addressing the privacy issue of data sharing for testing and debugging, little work has explicitly addressed the challenges when programs …


To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman Dec 2012

To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman

David LO

Software defects can cause much loss. Static bug-finding tools are believed to help detect and remove defects. These tools are designed to find programming errors; but, do they in fact help prevent actual defects that occur in the field and reported by users? If these tools had been used, would they have detected these field defects, and generated warnings that would direct programmers to fix them? To answer these questions, we perform an empirical study that investigates the effectiveness of state-of-the-art static bug finding tools on hundreds of reported and fixed defects extracted from three open source programs: Lucene, Rhino, …


Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun Dec 2012

Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun

David LO

Bugs are prevalent in software systems. Some bugs are critical and need to be fixed right away, whereas others are minor and their fixes could be postponed until resources are available. In this work, we propose a new approach leveraging information retrieval, in particular BM25-based document similarity function, to automatically predict the severity of bug reports. Our approach automatically analyzes bug reports reported in the past along with their assigned severity labels, and recommends severity labels to newly reported bug reports. Duplicate bug reports are utilized to determine what bug report features, be it textual, ordinal, or categorical, are important. …


Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo Dec 2012

Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo

David LO

We propose a tool for inferring transformation specifications from a few examples of original and updated code. These transformation specifications may contain multiple code fragments from within a single function, all of which must be present for the transformation to apply. This makes the inferred transformations context sensitive. Our algorithm is based on depth-first search, with pruning. Because it is applied locally to a collection of functions that contain related changes, it is efficient in practice. We illustrate the approach on an example drawn from recent changes to the Linux kernel.


An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang Dec 2012

An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang

David LO

Many machine learning systems that include various data mining, information retrieval, and natural language processing code and libraries have being used in real world applications. Search engines, internet advertising systems, product recommendation systems are sample users of these algorithm intensive code and libraries. Machine learning code and toolkits have also been used in many recent studies on software mining and analytics that aim to automate various software engineering tasks. With the increasing number of important applications of machine learning systems, the reliability of such systems is also becoming increasingly important. A necessary step for ensuring reliability of such systems is …


Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun Dec 2012

Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun

David LO

Detecting duplicate bug reports helps reduce triaging efforts and save time for developers in fixing the same issues. Among several automated detection approaches, text-based information retrieval (IR) approaches have been shown to outperform others in term of both accuracy and time efficiency. However, those IR-based approaches do not detect well the duplicate reports on the same technical issues written in different descriptive terms. This paper introduces DBTM, a duplicate bug report detection approach that takes advantage of both IR-based features and topic-based features. DBTM models a bug report as a textual document describing certain technical issue(s), and models duplicate bug …


Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim Dec 2012

Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang Dec 2012

Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang Dec 2012

Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang

David LO

Fault localization is useful for reducing debugging effort. However, many fault localization techniques require non-trivial number of test cases with oracles, which can determine whether a program behaves correctly for every test input. Test oracle creation is expensive because it can take much manual labeling effort. Given a number of test cases to be executed, it is challenging to minimize the number of test cases requiring manual labeling and in the meantime achieve good fault localization accuracy. To address this challenge, this paper presents a novel test case selection strategy based on Diversity Maximization Speedup (DMS). DMS orders a set …


Piscine Myocarditis Virus (Pmcv) In Wild Atlantic Salmon Salmo Salar, Torstein Tengs Dr. Dec 2012

Piscine Myocarditis Virus (Pmcv) In Wild Atlantic Salmon Salmo Salar, Torstein Tengs Dr.

Dr. Torstein Tengs

Cardiomyopathy syndrome (CMS) is a severe cardiac disease of sea-farmed Atlantic salmon Salmo salar L., but CMS-like lesions have also been found in wild Atlantic salmon. In 2010 a double-stranded RNA virus of the Totiviridae family, provisionally named piscine myocarditis virus (PMCV), was described as the causative agent of CMS. In the present paper we report the first detection of PMCV in wild Atlantic salmon. The study is based on screening of 797 wild Atlantic salmon by real-time RT-PCR. The samples were collected from 35 different rivers along the coast of Norway, and all individuals included in the study were …


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win Dec 2012

Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win

Dr Khin Win

The ultimate objectives of this study are to describe teleconsultation activities and explore the benefits of teleconsultation technology in the context of public health care environment in Malaysia. The materials of this study were based on an exploratory mixed method studies involving semi-structured interviews with key informants and questionnaires survey of health care providers to obtain information about existing teleconsultation activities as well as to uncover the benefits of teleconsultation technology. The notable benefits from teleconsultation implementation were further discussed. The findings confirmed that teleconsultation service has improved health care delivery in the underserved areas to consult with specialist. One …


Tutorial Report: Understanding Spatial Thought Through Language Use, Thora Tenbrink, Tommaso D'Odorico, Christoph Hertzberg, Güzin Mazman, Chiara Meneghetti, Nina Reshöft, Jinlong Yang Dec 2012

Tutorial Report: Understanding Spatial Thought Through Language Use, Thora Tenbrink, Tommaso D'Odorico, Christoph Hertzberg, Güzin Mazman, Chiara Meneghetti, Nina Reshöft, Jinlong Yang

Journal of Spatial Information Science

The tutorial "Understanding spatial thought through language use" took place at the International Spatial Cognition Conference on August 31, 2012 at Kloster Seeon in Germany. This report outlines the main rationale for the tutorial along with central contributions by its participants, who considerably enhanced the success of the tutorial by sharing and discussing their own research experiences with respect to the analysis of language in spatial cognition contexts. The tutorial's website is http://knirb.net/TutorialSC2012.html.


Geospatial Images In The Acquisition Of Spatial Knowledge For Wayfinding, Pyry Kettunen, Katja Irvankoski, Christina M. Krause, Tapani Sarjakoski, L. Tiina Sarjakoski Dec 2012

Geospatial Images In The Acquisition Of Spatial Knowledge For Wayfinding, Pyry Kettunen, Katja Irvankoski, Christina M. Krause, Tapani Sarjakoski, L. Tiina Sarjakoski

Journal of Spatial Information Science

Geospatial images such as maps and aerial photographs are important sources of spatial knowledge that people use for wayfinding. The rapid development of geodata acquisition and digital graphics has recently led to rather complete geographic coverage of both traditional and novel types of geospatial images. Divergent types of geospatial images vary in their support of human acquisition of spatial knowledge. However evaluative studies about the acquisition of spatial knowledge from the diversity of geospatial images have been rare. In this article we review a variety of literature about the acquisition of spatial knowledge while paying particular attention to the role …


The Influence Of Landscape Variation On Landform Categorization, Maia Williams, Werner Kuhn, Marco Painho Dec 2012

The Influence Of Landscape Variation On Landform Categorization, Maia Williams, Werner Kuhn, Marco Painho

Journal of Spatial Information Science

This paper compares the landform vocabularies of residents from two regions in Portugal. Participants described both their own and the other less familiar landscapes in response to video footage of the regions. The results indicate that participants used more detailed vocabularies to describe the known landscape compared to the less familiar study site with detail triggered by individual place recognition. A relationship between landform lexica content and landscape type was observed in the relative placement of detail within each vocabulary. The observed drivers of categorization were the salient features of the landscape (elevation and land cover) and utilitarian motivations (land …


Approaching The Notion Of Place By Contrast, Stephan Winter, Christian Freksa Dec 2012

Approaching The Notion Of Place By Contrast, Stephan Winter, Christian Freksa

Journal of Spatial Information Science

Place is an elusive notion in geographic information science. This paper presents an approach to capture the notion of place by contrast. This approach is developed from cognitive concepts and the language that is used to describe places. It is complementary to those of coordinate-based systems that dominate contemporary geographic information systems. Accordingly the approach is aimed at explaining structures in verbal place descriptions and at localizing objects without committing to geometrically specified positions in space. We will demonstrate how locations can be identified by place names that are not crisply defined in terms of geometric regions. Capturing the human …


Spatial Reasoning With Augmented Points: Extending Cardinal Directions With Local Distances, Reinhard Moratz, Jan Oliver Wallgrün Dec 2012

Spatial Reasoning With Augmented Points: Extending Cardinal Directions With Local Distances, Reinhard Moratz, Jan Oliver Wallgrün

Journal of Spatial Information Science

We present an approach for supplying existing qualitative direction calculi with a distance component to support fully fledged positional reasoning. The general underlying idea of augmenting points with local reference properties has already been applied in the OPRAm calculus. In this existing calculus point objects are attached with a local reference direction to obtain oriented points and able to express relative direction using binary relations. We show how this approach can be extended to attach a granular distance concept to direction calculi such as the cardinal direction calculus or adjustable granularity calculi such as OPRAm or the Star calculus. We …