Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Net-Centric Collaboration (5)
- Computer science (3)
- Semantic Service Discovery (3)
- Pedagogy (2)
- AOSD (1)
-
- And groupware (1)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (1)
- Architecture analysis (1)
- Association measures (1)
- Automated detection (1)
- Behavior preservation (1)
- Bug signature (1)
- Closed unique patterns (1)
- Clustering Algorithm Identification System Using Wavelet Transform - Philadelphia University (1)
- Code search (1)
- Concern localization (1)
- Context-Aware (1)
- Context-aware computing (1)
- Curriculum (1)
- Data mining (1)
- Debugging (1)
- Dependence graphs (1)
- Discriminative subgraph mining (1)
- Dynamic analysis (1)
- Extremal optimisation (1)
- Failure detection (1)
- Fault location (1)
- Information retrieval (1)
- Intensification strategies (1)
- Interdisciplinary (1)
Articles 1 - 30 of 33
Full-Text Articles in Physical Sciences and Mathematics
Kb-Anonymity: A Model For Anonymized Behavior-Preserving Test And Debugging Data, Aditya Budi, David Lo, Lingxiao Jiang, Lucia Lucia
Kb-Anonymity: A Model For Anonymized Behavior-Preserving Test And Debugging Data, Aditya Budi, David Lo, Lingxiao Jiang, Lucia Lucia
David LO
It is often very expensive and practically infeasible to generate test cases that can exercise all possible program states in a program. This is especially true for a medium or large industrial system. In practice, industrial clients of the system often have a set of input data collected either before the system is built or after the deployment of a previous version of the system. Such data are highly valuable as they represent the operations that matter in a client's daily business and may be used to extensively test the system. However, such data often carries sensitive information and cannot …
Code Search Via Topic-Enriched Dependence Graph Matching, Shaowei Wang, David Lo, Lingxiao Jiang
Code Search Via Topic-Enriched Dependence Graph Matching, Shaowei Wang, David Lo, Lingxiao Jiang
David LO
Source code contains textual, structural, and semantic information, which can all be leveraged for effective search. Some studies have proposed semantic code search where users can specify query topics in a natural language. Other studies can search through system dependence graphs. In this paper, we propose a semantic dependence search engine that integrates both kinds of techniques and can retrieve code snippets based on expressive user queries describing both topics and dependencies. Users can specify their search targets in a free form format describing desired topics (i.e., high-level semantic or functionality of the target code); a specialized graph query language …
Finding Relevant Answers In Software Forums, Swapna Gottopati, David Lo, Jing Jiang
Finding Relevant Answers In Software Forums, Swapna Gottopati, David Lo, Jing Jiang
David LO
Online software forums provide a huge amount of valuable content. Developers and users often ask questions and receive answers from such forums. The availability of a vast amount of thread discussions in forums provides ample opportunities for knowledge acquisition and summarization. For a given search query, current search engines use traditional information retrieval approach to extract webpages containing relevant keywords. However, in software forums, often there are many threads containing similar keywords where each thread could contain a lot of posts as many as 1,000 or more. Manually finding relevant answers from these long threads is a painstaking task to …
Concern Localization Using Information Retrieval: An Empirical Study On Linux Kernel, Shaowei Wang, David Lo, Zhenchang Xing, Lingxiao Jiang
Concern Localization Using Information Retrieval: An Empirical Study On Linux Kernel, Shaowei Wang, David Lo, Zhenchang Xing, Lingxiao Jiang
David LO
Many software maintenance activities need to find code units (functions, files, etc.) that implement a certain concern (features, bugs, etc.). To facilitate such activities, many approaches have been proposed to automatically link code units with concerns described in natural languages, which are termed as concern localization and often employ Information Retrieval (IR) techniques. There has not been a study that evaluates and compares the effectiveness of latest IR techniques on a large dataset. This study fills this gap by investigating ten IR techniques, some of which are new and have not been used for concern localization, on a Linux kernel …
Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang
Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang
David LO
Layered architecture prescribes a good principle for separating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereotypes in UML. Classes of different stereotypes are interacting with one another, when properly designed, the overall interaction would be maintainable, flexible, and robust. On the other hand, poor design would result in less maintainable system that is prone to errors. In many software projects, the stereotypes of classes are often missing, thus detection of design flaws becomes non-trivial. …
A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal
A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal
George K. Thiruvathukal
This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …
Enhancing The Cs Curriculum With With Aspect-Oriented Software Development (Aosd) And Early Experience, Konstantin Läufer, George K. Thiruvathukal, Tzilla Elrad
Enhancing The Cs Curriculum With With Aspect-Oriented Software Development (Aosd) And Early Experience, Konstantin Läufer, George K. Thiruvathukal, Tzilla Elrad
George K. Thiruvathukal
Aspect-oriented software development (AOSD) is evolving as an important step beyond existing software development approaches such as object-oriented development. An aspect is a module that captures a crosscutting concern, behavior that cuts across different units of abstraction in a software application; expressed as a module, such behavior can be enabled and disabled transparently and non-invasively, without changing the application code itself. Increasing industry demand for expertise in AOSD gives rise to the pedagogical challenge of covering this methodology and its foundations in the computer science curriculum. We present our curricular initiative to incorporate a novel course in AOSD in the …
The Extreme Software Development Series: An Open Curricular Framework For Applied Capstone Courses, Konstantin Läufer, George K. Thiruvathukal
The Extreme Software Development Series: An Open Curricular Framework For Applied Capstone Courses, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
We describe an open, flexible curricular framework for offering a collection of advanced undergraduate and graduate courses in software development. The courses offered within this framework are further unified by combining solid foundations with current technology and play the role of capstone courses in a modern software development track. Our initiative has been very successful with all stakeholders involved.
Identifying Bug Signatures Using Discriminative Graph Mining, Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan
Identifying Bug Signatures Using Discriminative Graph Mining, Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan
David LO
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Although such methods could be very accurate, it is usually very hard for developers to understand the context of the bug, given each bug location in isolation. In this study, we propose to model software executions with graphs at two levels of granularity: methods and basic blocks. An individual node represents a method or basic block and an edge represents a method call, method return or transition (at the method or basic …
Mining Antagonistic Communities From Social Networks, Kuan Zhang, David Lo, Ee Peng Lim
Mining Antagonistic Communities From Social Networks, Kuan Zhang, David Lo, Ee Peng Lim
David LO
During social interactions in a community, there are often sub-communities that behave in opposite manner. These antagonistic sub-communities could represent groups of people with opposite tastes, factions within a community distrusting one another, etc. Taking as input a set of interactions within a community, we develop a novel pattern mining approach that extracts for a set of antagonistic sub-communities. In particular, based on a set of user specified thresholds, we extract a set of pairs of sub-communities that behave in opposite ways with one another. To prevent a blow up in these set of pairs, we focus on extracting a …
Automatic Steering Of Behavioral Model Inference, David Lo, Leonardo Mariani, Mauro Pezze
Automatic Steering Of Behavioral Model Inference, David Lo, Leonardo Mariani, Mauro Pezze
David LO
Many testing and analysis techniques use finite state models to validate and verify the quality of software systems. Since the specification of such models is complex and time-consuming, researchers defined several techniques to extract finite state models from code and traces. Automatically generating models requires much less effort than designing them, and thus eases the verification and validation of large software systems. However, when models are inferred automatically, the precision of the mining process is critical. Behavioral models mined with imprecise processes can include many spurious behaviors, and can thus compromise the results of testing and analysis techniques that use …
Comprehensive Evaluation Of Association Measures For Fault Localization, Lucia Lucia, David Lo, Lingxiao Jiang, Aditya Budi
Comprehensive Evaluation Of Association Measures For Fault Localization, Lucia Lucia, David Lo, Lingxiao Jiang, Aditya Budi
David LO
In statistics and data mining communities, there have been many measures proposed to gauge the strength of association between two variables of interest, such as odds ratio, confidence, Yule-Y, Yule-Q, Kappa, and gini index. These association measures have been used in various domains, for example, to evaluate whether a particular medical practice is associated positively to a cure of a disease or whether a particular marketing strategy is associated positively to an increase in revenue, etc. This paper models the problem of locating faults as association between the execution or non-execution of particular program elements with failures. There have been …
Efficient Mining Of Closed Repetitive Gapped Subsequences From A Sequence Database, Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo
Efficient Mining Of Closed Repetitive Gapped Subsequences From A Sequence Database, Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo
David LO
There is a huge wealth of sequence data available, for example, customer purchase histories, program execution traces, DNA, and protein sequences. Analyzing this wealth of data to mine important knowledge is certainly a worthwhile goal. In this paper, as a step forward to analyzing patterns in sequences, we introduce the problem of mining closed repetitive gapped subsequences and propose efficient solutions. Given a database of sequences where each sequence is an ordered list of events, the pattern we would like to mine is called repetitive gapped subsequence, which is a subsequence (possibly with gaps between two successive events within it) …
Mining Hierarchical Scenario-Based Specifications, David Lo, Shahar Maoz
Mining Hierarchical Scenario-Based Specifications, David Lo, Shahar Maoz
David LO
Scalability over long traces, as well as comprehensibility and expressivity of results, are major challenges for dynamic analysis approaches to specification mining. In this work we present a novel use of object hierarchies over traces of inter-object method calls, as an abstraction/refinement mechanism that enables user-guided, top-down or bottom-up mining of layered scenario-based specifications, broken down by hierarchies embedded in the system under investigation. We do this using data mining methods that provide statistically significant sound and complete results modulo user-defined thresholds, in the context of Damm and Harel’s live sequence charts (LSC); a visual, modal, scenario-based, inter-object language. Thus, …
Mining Quantified Temporal Rules: Formalism, Algorithms, And Evaluation, David Lo, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, Kapil Vaswani
Mining Quantified Temporal Rules: Formalism, Algorithms, And Evaluation, David Lo, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, Kapil Vaswani
David LO
Libraries usually impose constraints on how clients should use them. Often these constraints are not well-documented. In this paper, we address the problem of recovering such constraints automatically, a problem referred to as specification mining. Given some client programs that use a given library, we identify constraints on the library usage that are (almost) satisfied by the given set of clients.The class of rules we target for mining combines simple binary temporal operators with state predicates (involving equality constraints) and quantification. This is a simple yet expressive subclass of temporal properties that allows us to capture many common API usage …
Hierarchical Inter-Object Traces For Specification Mining, David Lo, Shahar Maoz
Hierarchical Inter-Object Traces For Specification Mining, David Lo, Shahar Maoz
David LO
Major challenges of dynamic analysis approaches to specification mining include scalability over long traces as well as comprehensibility and expressivity of results. We present a novel use of object hierarchies over inter-object traces as an abstraction/refinement mechanism enabling scalable, incremental, top-down mining of scenario-based specifications.
Classification Of Software Behaviors For Failure Detection: A Discriminative Pattern Mining Approach, David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo, Chengnian Sun
Classification Of Software Behaviors For Failure Detection: A Discriminative Pattern Mining Approach, David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo, Chengnian Sun
David LO
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs and anomalies are prevalent. Bugs have caused billions of dollars loss, in addition to privacy and security threats. In this work, we address software reliability issues by proposing a novel method to classify software behaviors based on past history or runs. With the technique, it is possible to generalize past known errors and mistakes to capture failures and anomalies. Our technique first mines a set of discriminative features capturing repetitive series …
Mining Past-Time Temporal Rules From Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu
Mining Past-Time Temporal Rules From Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu
David LO
Specification mining is a process of extracting specifications, often from program execution traces. These specifications can in turn be used to aid program understanding, monitoring and verification. There are a number of dynamic-analysis-based specification mining tools in the literature, however none so far extract past time temporal expressions in the form of rules stating: whenever a series of events occurs, previously another series of events has happened. Rules of this format are commonly found in practice and useful for various purposes. Most rule-based specification mining tools only mine future-time temporal expression. Many past-time temporal rules like whenever a resource is …
Intensification Strategies For Extremal Optimisation, Marcus Randall, Andrew Lewis
Intensification Strategies For Extremal Optimisation, Marcus Randall, Andrew Lewis
Marcus Randall
It is only relatively recently that extremal optimisation (EO) has been applied to combinatorial optimisation problems. As such, there have been only a few attempts to extend the paradigm to include standard search mechanisms that are routinely used by other techniques such as genetic algorithms, tabu search and ant colony optimisation. The key way to begin this process is to augment EO with attributes that it naturally lacks. While EO does not get confounded by local optima and is able to move through search space unencumbered, one of the major issues is to provide it with better search intensification strategies. …
A Granular Concurrency Control For Collaborative Scientific Workflow Composition, Xubo Fei, Shiyong Lu, Jia Zhang
A Granular Concurrency Control For Collaborative Scientific Workflow Composition, Xubo Fei, Shiyong Lu, Jia Zhang
Jia Zhang
No abstract provided.
Recommend-As-You-Go: A Novel Approach Supporting Services-Oriented Scientific Workflow Reuse, Jia Zhang, Wei Tan, John Alexander, Ian Foster, Ravi Madduri
Recommend-As-You-Go: A Novel Approach Supporting Services-Oriented Scientific Workflow Reuse, Jia Zhang, Wei Tan, John Alexander, Ian Foster, Ravi Madduri
Jia Zhang
No abstract provided.
Toward Semantics Empowered Biomedical Web Services, Jia Zhang, Ravi Madduri, Wei Tan, Kevin Deichl, John Alexander, Ian Foster
Toward Semantics Empowered Biomedical Web Services, Jia Zhang, Ravi Madduri, Wei Tan, Kevin Deichl, John Alexander, Ian Foster
Jia Zhang
No abstract provided.
Architecture Evaluation Without An Architecture: Experience With The Smart Grid, Rick Kazman, Len Bass, James Ivers, Gabriel A. Moreno
Architecture Evaluation Without An Architecture: Experience With The Smart Grid, Rick Kazman, Len Bass, James Ivers, Gabriel A. Moreno
Gabriel A. Moreno
This paper describes an analysis of some of the challenges facing one portion of the Electrical Smart Grid in the United States - residential Demand Response (DR) systems. The purposes of this paper are twofold: 1) to discover risks to residential DR systems and 2) to illustrate an architecture-based analysis approach to uncovering risks that span a collection of technical and social concerns. The results presented here are specific to residential DR but the approach is general and it could be applied to other systems within the Smart Grid and to other critical infrastructure domains. Our architecture-based analysis is different …
Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa
Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa
Martin L Griss
Many context-aware mobile applications require a reasonably accurate and stable estimate of a user’s location. While the Global Positioning System (GPS) works quite well world-wide outside of buildings and urban canyons, locating an indoor user in a real-world environment is much more problematic. Several different approaches and technologies have been explored, some involving specialized sensors and appliances, and others using increasingly ubiquitous Wi- Fi and Bluetooth radios. In this project, we want to leverage existing Wi-Fi access points (AP) and seek efficient approaches to gain usefully high room-level accuracy of the indoor location prediction of a mobile user. The Redpin …
Servicemap: Providing Map And Gps Assistance To Service Composition In Bioinformatics, Wei Tan, Jia Zhang, Ravi Madduri, Ian Foster, David De Roure, Carole Goble
Servicemap: Providing Map And Gps Assistance To Service Composition In Bioinformatics, Wei Tan, Jia Zhang, Ravi Madduri, Ian Foster, David De Roure, Carole Goble
Jia Zhang
No abstract provided.
A University-Oriented Web 2.0 Services Portal, Jia Zhang, Karthik Akula, Momtazul Momtazul Karim, Raghu Kumar Reddy Raghu Kumar Reddy Ariga
A University-Oriented Web 2.0 Services Portal, Jia Zhang, Karthik Akula, Momtazul Momtazul Karim, Raghu Kumar Reddy Raghu Kumar Reddy Ariga
Jia Zhang
No abstract provided.
Applying Semantic Segment Detection To Enhance Web Page Presentation On The Mobile Internet, Stephen Yang, Jia Zhang, Stella Tsai, Jeff Huang
Applying Semantic Segment Detection To Enhance Web Page Presentation On The Mobile Internet, Stephen Yang, Jia Zhang, Stella Tsai, Jeff Huang
Jia Zhang
No abstract provided.
Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim
Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
Win-Win is one of the most common models which help systems stakeholders resolve conflicts during system Requirements Negotiation (RN). Solving conflicts, however, is barely dependent on visualizing the negotiation itself The Zest algorithm was invented to visualize a standard e-mail discussion and demonstrate a concise overview of the discussion to facilitate a more productive one. This research sought to use this algorithm in visualizing the RN process in groupware. We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. Our implementation of the algorithm has later been …
A Collaborative Multimedia Annotation Tool For Enhancing Knowledge Sharing In Cscl, Stephen J.H. Yang, Jia Zhang, Addison Su, Jeffrey J.P. Tsai
A Collaborative Multimedia Annotation Tool For Enhancing Knowledge Sharing In Cscl, Stephen J.H. Yang, Jia Zhang, Addison Su, Jeffrey J.P. Tsai
Jia Zhang
No abstract provided.
Collaborative Scientific Workflows Supporting Collaborative Science, Shiyong Lu, Jia Zhang
Collaborative Scientific Workflows Supporting Collaborative Science, Shiyong Lu, Jia Zhang
Jia Zhang
No abstract provided.