Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (1770)
- Selected Works (261)
- California Polytechnic State University, San Luis Obispo (194)
- Western University (194)
- Air Force Institute of Technology (104)
-
- SelectedWorks (103)
- California State University, San Bernardino (85)
- City University of New York (CUNY) (70)
- University of Tennessee, Knoxville (51)
- Edith Cowan University (47)
- Old Dominion University (47)
- University of Nevada, Las Vegas (46)
- Portland State University (42)
- University of Arkansas, Fayetteville (38)
- University of Nebraska - Lincoln (36)
- San Jose State University (32)
- Loyola University Chicago (30)
- Rochester Institute of Technology (29)
- Kennesaw State University (27)
- Technological University Dublin (22)
- University of Dayton (22)
- Purdue University (21)
- Embry-Riddle Aeronautical University (18)
- The University of Akron (18)
- University of Massachusetts Amherst (17)
- Institute of Business Administration (16)
- Universitas Negeri Yogyakarta (16)
- Dakota State University (15)
- United Arab Emirates University (15)
- University of Nebraska at Omaha (14)
- Keyword
-
- Software engineering (131)
- Software (83)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (72)
- Machine learning (65)
- Deep learning (59)
-
- Software Engineering (55)
- Android (54)
- Computer science (44)
- Computer Science (43)
- Empirical study (43)
- Machine Learning (39)
- Programming (38)
- Software development (38)
- Java (35)
- Software maintenance (34)
- Deep Learning (33)
- Security (33)
- Refactoring (32)
- Model Check (29)
- Software testing (29)
- Collaboration (27)
- Data mining (26)
- Ontology (25)
- Testing (25)
- Services Computing (24)
- Algorithms (23)
- Computer software -- Development (23)
- Mobile computing (23)
- Stack Overflow (23)
- Visualization (23)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (1725)
- Electrical and Computer Engineering Publications (129)
- Theses and Dissertations (115)
- Collaborative Agent Design (CAD) Research Center (103)
- Philadelphia University, Jordan (79)
-
- Theses Digitization Project (73)
- Electronic Thesis and Dissertation Repository (62)
- Publications and Research (55)
- Jia Zhang (47)
- David LO (39)
- Master's Theses (37)
- Articles (29)
- Computer Science: Faculty Publications and Other Works (29)
- Computer Science Faculty Publications (28)
- Theses : Honours (28)
- Honors Theses (27)
- Gabriel A. Moreno (26)
- Computer Science and Software Engineering (25)
- Dissertations and Theses Collection (Open Access) (25)
- The Harlan D. Mills Collection (25)
- Computer Engineering (24)
- Separations Campaign (TRP) (24)
- Computer Science Faculty Publications and Presentations (21)
- Doctoral Dissertations (21)
- Computer Science and Computer Engineering Undergraduate Honors Theses (19)
- Electronic Theses and Dissertations (19)
- Theses (19)
- Master's Projects (18)
- Williams Honors College, Honors Research Projects (18)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (17)
Articles 241 - 270 of 3925
Full-Text Articles in Physical Sciences and Mathematics
Heart: Motion-Resilient Heart Rate Monitoring With In-Ear Microphones, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Mascolo
Heart: Motion-Resilient Heart Rate Monitoring With In-Ear Microphones, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Mascolo
Research Collection School Of Computing and Information Systems
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate (HR) detection systems. HR is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable HR monitoring with wearable devices has therefore gained increasing attention in recent years. Existing HR detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient HR monitoring. …
Identification Of Students At Risk Of Low Performance By Combining Rule-Based Models, Enhanced Machine Learning, And Knowledge Graph Techniques, Balqis Mubarak Al Braiki
Identification Of Students At Risk Of Low Performance By Combining Rule-Based Models, Enhanced Machine Learning, And Knowledge Graph Techniques, Balqis Mubarak Al Braiki
Dissertations
Technologies and online learning platforms have changed the contemporary educational paradigm, giving institutions more alternatives in a complex and competitive environment. Online learning platforms, learning-based analytics, and data mining tools are increasingly complementing and replacing traditional education techniques. However, academic underachievement, graduation delays, and student dropouts remain common problems in educational institutions. One potential method of preventing these issues is by predicting student performance through the use of institution data and advanced technologies. However, to date, scholars have yet to develop a module that can accurately predict students’ academic achievement and commitment. This dissertation attempts to bridge that gap by …
Safe And Reliable Software And The Formal Verification Of Prim's Algorithm In Spark, Brian S. Wheelhouse
Safe And Reliable Software And The Formal Verification Of Prim's Algorithm In Spark, Brian S. Wheelhouse
Theses and Dissertations
Despite evidence that formal verification helps produce highly reliable and secure code, formal methods, i.e., mathematically based tools and approaches for software and hardware verification, are not commonly used in software and hardware development. The limited emphasis on formal verification in software education and training suggests that many developers have never considered the benefits of formal verification. Despite the challenging nature of their mathematical roots, software verification tools have improved; making it easier than ever to verify software. SPARK, a programming language and a formal verification toolset, is of particular interest for the AFRL, and will be a primary focus …
Large-Scale Identification And Analysis Of Factors Impacting Simple Bug Resolution Times In Open Source Software Repositories, Elia Eiroa-Lledo, Rao Hamza Ali, Gabriela Pinto, Jillian Anderson, Erik Linstead
Large-Scale Identification And Analysis Of Factors Impacting Simple Bug Resolution Times In Open Source Software Repositories, Elia Eiroa-Lledo, Rao Hamza Ali, Gabriela Pinto, Jillian Anderson, Erik Linstead
Engineering Faculty Articles and Research
One of the most prominent issues the ever-growing open-source software community faces is the abundance of buggy code. Well-established version control systems and repository hosting services such as GitHub and Maven provide a checks-and-balances structure to minimize the amount of buggy code introduced. Although these platforms are effective in mitigating the problem, it still remains. To further the efforts toward a more effective and quicker response to bugs, we must understand the factors that affect the time it takes to fix one. We apply a custom traversal algorithm to commits made for open source repositories to determine when “simple stupid …
Lightweight And Non-Invasive User Authentication On Earables, Changshuo Hu, Xiao Ma, Dong Ma, Ting Dang
Lightweight And Non-Invasive User Authentication On Earables, Changshuo Hu, Xiao Ma, Dong Ma, Ting Dang
Research Collection School Of Computing and Information Systems
The widespread adoption of wireless earbuds has advanced the developments in earable-based sensing in various domains like entertainment, human-computer interaction, and health monitoring. Recently, researchers have shown an increased interest in user authentication using earables. Despite the successes witnessed in acoustic probing and speech based authentication systems, this paper proposed a lightweight and non-invasive ambient sound based user authentication scheme. It employs the difference between the in-ear and out-ear sounds to estimate the individual-specific occluded ear canal transfer function (OECTF). Specifically, the {out-ear, in-ear} scaling factors at different frequency bands are captured via linear regression and treated as the OECTF …
Web Apis: Features, Issues, And Expectations: A Large-Scale Empirical Study Of Web Apis From Two Publicly Accessible Registries Using Stack Overflow And A User Survey, Neng Zhang, Ying Zou, Xin Xia, David Lo, David Lo, Shanping Li
Web Apis: Features, Issues, And Expectations: A Large-Scale Empirical Study Of Web Apis From Two Publicly Accessible Registries Using Stack Overflow And A User Survey, Neng Zhang, Ying Zou, Xin Xia, David Lo, David Lo, Shanping Li
Research Collection School Of Computing and Information Systems
With the increasing adoption of services-oriented computing and cloud computing technologies, web APIs have become the fundamental building blocks for constructing software applications. Web APIs are developed and published on the internet. The functionality of web APIs can be used to facilitate the development of software applications. There are numerous studies on retrieving and recommending candidate web APIs based on user requirements from a large set of web APIs. However, there are very limited studies on the features of web APIs that make them more likely to be used and the issues of using web APIs in practice. Moreover, users' …
Fa3: Fine-Grained Android Application Analysis, Yan Lin, Weng Onn Wong, Debin Gao
Fa3: Fine-Grained Android Application Analysis, Yan Lin, Weng Onn Wong, Debin Gao
Research Collection School Of Computing and Information Systems
Understanding Android applications' behavior is essential to many security applications, e.g., malware analysis. Although many systems have been proposed to perform such dynamic analysis, they are limited by their applicable analysis environment (on device vs. emulator), transparency to subject apps, applicable runtime (Dalvik vs. ART), applicable system stack, or granularity. In this paper, we propose FA3 (Fine-Grained Android Application Analysis), a novel on-device, non-invasive, and fine-grained analysis platform by leveraging existing profiling mechanisms in the Android Runtime (ART) and kernel to inspect method invocations and control-flow transfers for both Java methods and third-party native libraries. FA3 embeds its tracing capability …
The Gender Wage Gap In An Online Labor Market: The Cost Of Interruptions, Abi Adams-Prassl, Kotaro Hara, Kristy Milland, Chris Callison-Burch
The Gender Wage Gap In An Online Labor Market: The Cost Of Interruptions, Abi Adams-Prassl, Kotaro Hara, Kristy Milland, Chris Callison-Burch
Research Collection School Of Computing and Information Systems
This paper analyses gender differences in working patterns and wages on Amazon Mechanical Turk, a popular online labour platform. Using information on 2 million tasks, we find no gender differences in task selection nor experience. Nonetheless, women earn 20% less per hour on average. Gender differences in working patterns are a significant driver of this wage gap. Women are more likely to interrupt their working time on the platform with consequences for their task completion speed. A follow-up survey shows that the gender differences in working patterns and hourly wages are concentrated amongst workers with children.
Human-Centered Ai For Software Engineering: Requirements, Reflection, And Road Ahead, David Lo
Human-Centered Ai For Software Engineering: Requirements, Reflection, And Road Ahead, David Lo
Research Collection School Of Computing and Information Systems
Since its inception in the 2000s, AI for Software Engineering (AI4SE) has grown rapidly. AI in its different forms, e.g., data mining, information retrieval, machine learning, natural language processing, etc., has been demonstrated to be able to produce good results for automating many tasks, including specification mining, bug and vulnerability discovery, bug localization, duplicate bug report identification, failure detection, program repair, technical question answering, code search, and many more. AI4SE has much potential to improve software engineers’ productivity and software quality. Due to its potential, it is currently one of the most popular research areas in the software engineering field.To …
An Empirical Study Of Package Management Issues Via Stack Overflow, Syful Islam, Raula Kula, Christoph Treude, Bodin Chinthanet, Takashi Ishio, Kenichi Matsumoto
An Empirical Study Of Package Management Issues Via Stack Overflow, Syful Islam, Raula Kula, Christoph Treude, Bodin Chinthanet, Takashi Ishio, Kenichi Matsumoto
Research Collection School Of Computing and Information Systems
The package manager (PM) is crucial to most technology stacks, acting as a broker to ensure that a verified dependency package is correctly installed, configured, or removed from an application. Diversity in technology stacks has led to dozens of PMs with various features. While our recent study indicates that package management features of PM are related to end-user experiences, it is unclear what those issues are and what information is required to resolve them. In this paper, we have investigated PM issues faced by end-users through an empirical study of content on Stack Overflow (SO). We carried out a qualitative …
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
Theses and Dissertations
In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …
Snapshot Metrics Are Not Enough: Analyzing Software Repositories With Longitudinal Metrics, Nicholas Synovic, Matt Hyattt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal
Snapshot Metrics Are Not Enough: Analyzing Software Repositories With Longitudinal Metrics, Nicholas Synovic, Matt Hyattt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
Software metrics capture information about software development processes and products. These metrics support decision-making, e.g., in team management or dependency selection. However, existing metrics tools measure only a snapshot of a software project. Little attention has been given to enabling engineers to reason about metric trends over time -- longitudinal metrics that give insight about process, not just product. In this work, we present PRiME (PRocess MEtrics), a tool for computing and visualizing process metrics. The currently-supported metrics include productivity, issue density, issue spoilage, and bus factor. We illustrate the value of longitudinal data and conclude with a research agenda. …
Introduction, Raffi T. Khatchadourian
Introduction, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Reengineering And Refactoring, Raffi T. Khatchadourian
Reengineering And Refactoring, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Evaluation Of Scalable Quantum And Classical Machine Learning For Particle Tracking Classification In Nuclear Physics, Polykarpos Thomadakis, Emmanuel Billias, Nikos Chrisochoides
Evaluation Of Scalable Quantum And Classical Machine Learning For Particle Tracking Classification In Nuclear Physics, Polykarpos Thomadakis, Emmanuel Billias, Nikos Chrisochoides
The Graduate School Posters
Future particle accelerators will exceed by far the current data size (1015) per experiment, and high- luminosity program(s) will produce more than 300 times as much data. Classical Machine Learning (ML) likely will benefit from new tools based on quantum computing. Particle track reconstruction is the most computationally intensive process in nuclear physics experiments. A combinatorial approach exhaustively tests track measurements (“hits”), represented as images, to identify those that form an actual particle trajectory, which is then used to reconstruct track parameters necessary for the physics experiment. Quantum Machine Learning (QML) could improve this process in multiple ways, …
On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers
On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers
Honors Theses
Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant
Department of Electrical and Computer Engineering Faculty Publications
Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.
In this work, we present the first empirical investigation of PTM reuse. …
A Reference Framework For Variability Management Of Software Product Lines, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed
A Reference Framework For Variability Management Of Software Product Lines, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed
Electrical and Computer Engineering Publications
Variability management (VM) in software product line engineering (SPLE) is introduced as an abstraction that enables the reuse and customization of assets. VM is a complex task involving the identification, representation, and instantiation of variability for specific products, as well as the evolution of variability itself. This work presents a comparison and contrast between existing VM approaches using “qualitative meta-synthesis” to determine the underlying perspectives, metaphors, and concepts of existing methods. A common frame of reference for the VM was proposed as the result of this analysis. Putting metaphors in the context of the dimensions in which variability occurs and …
Graphsearchnet: Enhancing Gnns Via Capturing Global Dependencies For Semantic Code Search, Shangqing Liu, Xiaofei Xie, Jjingkai Siow, Lei Ma, Guozhu Meng, Yang Liu
Graphsearchnet: Enhancing Gnns Via Capturing Global Dependencies For Semantic Code Search, Shangqing Liu, Xiaofei Xie, Jjingkai Siow, Lei Ma, Guozhu Meng, Yang Liu
Research Collection School Of Computing and Information Systems
Code search aims to retrieve accurate code snippets based on a natural language query to improve software productivity and quality. With the massive amount of available programs such as (on GitHub or Stack Overflow), identifying and localizing the precise code is critical for the software developers. In addition, Deep learning has recently been widely applied to different code-related scenarios, ., vulnerability detection, source code summarization. However, automated deep code search is still challenging since it requires a high-level semantic mapping between code and natural language queries. Most existing deep learning-based approaches for code search rely on the sequential text ., …
Demonstrating Multi-Modal Human Instruction Comprehension With Ar Smart Glass, Mudiyanselage Dulanga Kaveesha Weerakoon, Vigneshwaran Subbaraju, Tuan Tran, Archan Misra
Demonstrating Multi-Modal Human Instruction Comprehension With Ar Smart Glass, Mudiyanselage Dulanga Kaveesha Weerakoon, Vigneshwaran Subbaraju, Tuan Tran, Archan Misra
Research Collection School Of Computing and Information Systems
We present a multi-modal human instruction comprehension prototype for object acquisition tasks that involve verbal, visual and pointing gesture cues. Our prototype includes an AR smart-glass for issuing the instructions and a Jetson TX2 pervasive device for executing comprehension algorithms. With this setup, we enable on-device, computationally efficient object acquisition task comprehension with an average latency in the range of 150-330msec.
Fortifying The Seams Of Software Systems, Hong Jin Kang
Fortifying The Seams Of Software Systems, Hong Jin Kang
Dissertations and Theses Collection (Open Access)
A seam in software is a place where two components within a software system meet. There are more seams in software now than ever before as modern software systems rely extensively on third-party software components, e.g., libraries. Due to the increasing complexity of software systems, understanding and improving the reliability of these components and their use is crucial. While the use of software components eases the development process, it also introduces challenges due to the interaction between the components.
This dissertation tackles problems associated with software reliability when using third-party software components. Developers write programs that interact with libraries through …
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides
Scalable Quantum Edge Detection Method For D-Nisq Imaging Simulations: Use Cases From Nuclear Physics And Medical Image Computing, Emmanuel Billias, Nikos Chrisochoides
The Graduate School Posters
Edge Detection is one of the computationally intensive modules in image analysis. It is used to find important landmarks by identifying a significant change (or “edge”) between pixels and voxels. We present a hybrid Quantum Edge Detection method by improving three aspects of an existing widely referenced implementation, which for our use cases generates incomprehensible results for the type and size of images we are required to process. Our contributions are in the pre- and post-processing (i.e., classical phase) and a quantum edge detection circuit: (1) we use space- filling curves to eliminate image artifacts introduced by the image decomposition, …
Improving Connectivity For Remote Cancer Patient Symptom Monitoring And Reporting In Rural Medically Underserved Regions, Esther Max-Onakpoya
Improving Connectivity For Remote Cancer Patient Symptom Monitoring And Reporting In Rural Medically Underserved Regions, Esther Max-Onakpoya
Theses and Dissertations--Computer Science
Rural residents are often faced with many disparities when compared to their urban counterparts. Two key areas where these disparities are apparent are access to health and Internet services. Improved access to healthcare services has the potential to increase residents' quality of life and life expectancy. Additionally, improved access to Internet services can create significant social returns in increasing job and educational opportunities, and improving access to healthcare. Therefore, this dissertation focuses on the intersection between access to Internet and healthcare services in rural areas. More specifically, it attempts to analyze systems that can be used to improve Internet access …
Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo
Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo
UNF Graduate Theses and Dissertations
The traffic and roadway safety agencies spend significant efforts each year collecting roadway data, including lane configurations and other road surface marking data, such as areas with school zone markings, sidewalks, left turns, right turns, bicycle lanes, etc., for safety analysis and planning purposes. The current manual data collection methods pose significant operational and quality control challenges as they are costly and prone to errors. In addition to that the manual data collection is labor intensive and takes too much time involving high equipment costs, questionable data accuracy guarantees, and concerns about the safety of the crew.
This study aims …
Partial Emulation Of The Nintendo Game Boy, Ian Thomas Brassard
Partial Emulation Of The Nintendo Game Boy, Ian Thomas Brassard
Senior Projects Spring 2023
“Emulation” is when one uses software to simulate the function of hardware. This project is a partial emulation of the Nintendo Game Boy. Specifically, it is an emulation of the Game Boy’s CPU, which is called the Sharp SM83 CPU. In the background, the reader is briefly introduced to both the function and history of emulators and their relationship to video games. The report moves on to detail the process of making this emulator, and discusses the similarities and differences between it and the original hardware. Technical details about the exact functions of the emulator are included. The process and …
A Symbolic Music Transformer For Real-Time Expressive Performance And Improvisation, Arnav Shirodkar
A Symbolic Music Transformer For Real-Time Expressive Performance And Improvisation, Arnav Shirodkar
Senior Projects Fall 2023
With the widespread proliferation of AI technology, deep architectures — many of which are based on neural networks — have been incredibly successful in a variety of different research areas and applications. Within the relatively new domain of Music Information Retrieval (MIR), deep neural networks have also been successful for a variety of tasks, including tempo estimation, beat detection, genre classification, and more. Drawing inspiration from projects like George E. Lewis's Voyager and Al Biles's GenJam, two pioneering endeavors in human-computer interaction, this project attempts to tackle the problem of expressive music generation and seeks to create a Symbolic Music …
Accelerating A Software Defined Satnav Receiver Using Multiple Parallel Processing Schemes, Logan Reich, Sanjeev Gunawardena, Michael Braasch
Accelerating A Software Defined Satnav Receiver Using Multiple Parallel Processing Schemes, Logan Reich, Sanjeev Gunawardena, Michael Braasch
Faculty Publications
Excerpt: Satnav SDRs present many benefits in terms of flexibility and configurability. However, due to the high bandwidth signals involved in satnav SDR processing, the software must be highly optimized for the host platform in order to achieve acceptable runtimes. Modules such as sample decoding, carrier replica generation, carrier wipeoff, and correlation are computationally intensive components that benefit from accelerations.
Reed Log: Application For Oboists, Michał Cieślik
Reed Log: Application For Oboists, Michał Cieślik
Senior Projects Spring 2023
Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.
Achieving High Map-Coverage Through Pattern Constraint Reduction, Yingquan Zhao, Zan Wang, Shuang Liu, Jun Sun, Junjie Chen, Xiang Chen
Achieving High Map-Coverage Through Pattern Constraint Reduction, Yingquan Zhao, Zan Wang, Shuang Liu, Jun Sun, Junjie Chen, Xiang Chen
Research Collection School Of Computing and Information Systems
Testing multi-threaded programs is challenging due to the enormous space of thread interleavings. Recently, a code coverage criterion for multi-threaded programs called MAP-coverage has been proposed and shown to be effective for testing concurrent programs. Existing approaches for achieving high MAP-coverage are based on random testing with simple heuristics, which is ineffective in systematically triggering rare thread interleavings. In this study, we propose a novel approach called pattern constraint reduction (PCR), which employs optimized constraint solving to generate thread interleavings for high MAP-coverage. The idea is to iteratively encode and solve path conditions to generate thread interleavings which are guaranteed …