Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Southern Methodist University

Theses/Dissertations

Publication Year

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen May 2023

Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen

Computer Science and Engineering Theses and Dissertations

Concepts of graph theory are frequently used by computer scientists as abstractions when modeling a problem. Partitioning a graph (or a network) into smaller parts is one of the fundamental algorithmic operations that plays a key role in classifying and clustering. Since the early 1970s, graph partitioning rapidly expanded for applications in wide areas. It applies in both engineering applications, as well as research. Current technology generates massive data (“Big Data”) from business interactions and social exchanges, so high-performance algorithms of partitioning graphs are a critical need.

This dissertation presents engineering models for two graph partitioning problems arising from completely …


Analysis Of Github Pull Requests, Canon Ellis Dec 2020

Analysis Of Github Pull Requests, Canon Ellis

Computer Science and Engineering Theses and Dissertations

The popularity of the software repository site GitHub has created a rise in the Pull Based Development Models' use. An essential portion of pull-based development is the creation of Pull Requests. Pull Requests often have to be reviewed by an individual to be approved and accepted into the Master branch of a software repository. The reviewing process can often be time-consuming and introduce a relatively high level of lost development time. This paper examines thousands of pull requests to understand the most valuable metadata of pull requests. We then introduce metrics in comparing the metadata of pull requests to understand …


Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack Dec 2020

Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack

Computer Science and Engineering Theses and Dissertations

Mobile applications have become a high priority for software developers. Researchers and practitioners are working toward improving and optimizing the energy efficiency and performance of mobile applications due to the capacity limitation of mobile device processors and batteries. In addition, mobile applications have become popular among end-users, developers have introduced a wide range of features that increase the complexity of application code.

To improve and enhance the maintainability, extensibility, and understandability of application code, refactoring techniques were introduced. However, implementing such techniques to mobile applications affects energy efficiency and performance. To evaluate and categorize software implementation and optimization efficiency, several …


The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne May 2020

The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne

Computer Science and Engineering Theses and Dissertations

In the Prom Problem (TPP), Alice wishes to attend a school dance with Bob and needs a risk-free, privacy preserving way to find out whether Bob shares that same wish. If not, no one should know that she inquired about it, not even Bob. TPP represents a special class of matchmaking challenges, augmenting the properties of privacy-enhanced matchmaking, further requiring fairness and support for identity linked wishes (ILW) – wishes involving specific identities that are only valid if all involved parties have those same wishes.

The Horne-Nair (HN) protocol was proposed as a solution to TPP along with a …


Automating Software Changes Via Recommendation Systems, Xiaoyu Liu Dec 2019

Automating Software Changes Via Recommendation Systems, Xiaoyu Liu

Computer Science and Engineering Theses and Dissertations

As the complexity of software systems is growing tremendously, it came with increasingly sophisticated data provided during development. The systematic and large-scale accumulation of software engineering data opened up new opportunities that infer information appropriately can be helpful to software development in a given context. This type of intelligent software development tools came to be known as recommendation systems.

Recommendation Systems in Software Change (RSSCs) share commonalities with conventional recommendation systems: mainly in their usage model, the usual reliance on data mining, and in the predictive nature of their functionality. So a major challenge for designing RSSCs is to automatically …


Cloud Service Reliability And Usability Measurement, Abdullah Bokhary Aug 2018

Cloud Service Reliability And Usability Measurement, Abdullah Bokhary

Computer Science and Engineering Theses and Dissertations

Cloud computing has become a major resource for fulfilling people's computational and storage needs. Investing in these services requires measuring and assuring its quality in general, and reliability and usability are primary concerns. However, using traditional reliability models can be challenging because of the environmental constraints and limited data availability due to the heterogeneous environment and diverse stakeholders. Also, the quality of cloud service Application Programming Interfaces (APIs) has a direct impact on the usability and reliability of the service.

We developed a framework to measure reliability with alternative available information that most cloud providers offer in three stages: 1) …


Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems Apr 2018

Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems

Computer Science and Engineering Theses and Dissertations

Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security …