Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

Fortifying The Seams Of Software Systems, Hong Jin Kang Jan 2023

Fortifying The Seams Of Software Systems, Hong Jin Kang

Dissertations and Theses Collection (Open Access)

A seam in software is a place where two components within a software system meet. There are more seams in software now than ever before as modern software systems rely extensively on third-party software components, e.g., libraries. Due to the increasing complexity of software systems, understanding and improving the reliability of these components and their use is crucial. While the use of software components eases the development process, it also introduces challenges due to the interaction between the components.

This dissertation tackles problems associated with software reliability when using third-party software components. Developers write programs that interact with libraries through …


Deepcause: Verifying Neural Networks With Abstraction Refinement, Nguyen Hua Gia Phuc Jul 2022

Deepcause: Verifying Neural Networks With Abstraction Refinement, Nguyen Hua Gia Phuc

Dissertations and Theses Collection (Open Access)

Neural networks have been becoming essential parts in many safety-critical systems (such
as self-driving cars and medical diagnosis). Due to that, it is desirable that neural networks
not only have high accuracy (which traditionally can be validated using a test set) but also
satisfy some safety properties (such as robustness, fairness, or free of backdoor). To verify
neural networks against desired safety properties, there are many approaches developed
based on classical abstract interpretation. However, like in program verification, these
approaches suffer from false alarms, which may hinder the deployment of the networks.


One natural remedy to tackle the problem adopted …


Can We Make It Better? Assessing And Improving Quality Of Github Repositories, Gede Artha Azriadi Prana Nov 2021

Can We Make It Better? Assessing And Improving Quality Of Github Repositories, Gede Artha Azriadi Prana

Dissertations and Theses Collection (Open Access)

The code hosting platform GitHub has gained immense popularity worldwide in recent years, with over 200 million repositories hosted as of June 2021. Due to its popularity, it has great potential to facilitate widespread improvements across many software projects. Naturally, GitHub has attracted much research attention, and the source code in the various repositories it hosts also provide opportunity to apply techniques and tools developed by software engineering researchers over the years. However, much of existing body of research applicable to GitHub focuses on code quality of the software projects and ways to improve them. Fewer work focus on potential …


Learning To Interpret Knowledge From Software Q&A Sites, Bowen Xu Aug 2021

Learning To Interpret Knowledge From Software Q&A Sites, Bowen Xu

Dissertations and Theses Collection (Open Access)

Nowadays, software question and answer (SQA) data has become a treasure for software engineering as it contains a huge volume of programming knowledge. That knowledge can be interpreted in many different ways to support various software activities, such as code recommendation, program repair, and so on. In this dissertation, we interpret SQA data by addressing three novel research problems.

The first research problem is about linkable knowledge unit prediction. In this problem, a question and its answers within a post in Stack Overflow are considered as a knowledge unit (KU). KUs often contain semantically relevant knowledge, and thus linkable for …


Machine Learning Based Approaches Towards Robust Android Malware Detection, Jiayun Xu Apr 2021

Machine Learning Based Approaches Towards Robust Android Malware Detection, Jiayun Xu

Dissertations and Theses Collection (Open Access)

The Android platform is becoming increasingly popular and numerous applications (apps) have been developed by organizations to meet the ever increasing market demand over years. Naturally, security and privacy concerns on Android apps have grabbed considerable attention from both academic and industrial
communities. Many approaches have been proposed to detect Android malware in different ways so far, and most of them produce satisfactory performance under the given Android environment settings and labelled samples. However, existing approaches suffer the following robustness problems:

In many Android malware detection approaches, specific API calls are used to build the feature sets, and their feature …


How Do Monetary Incentives Influence Prosocial Fundraising? An Empirical Investigation Of Matching Subsidies On Crowdfunding, Zhiyuan Gao Dec 2020

How Do Monetary Incentives Influence Prosocial Fundraising? An Empirical Investigation Of Matching Subsidies On Crowdfunding, Zhiyuan Gao

Dissertations and Theses Collection (Open Access)

Monetary incentives, such as matching subsidies, are widely used in traditional fundraising and crowdfunding platforms to boost funding activities and improve funding outcomes. However, its effectiveness on prosocial fundraising is still unclear from both theoretical (Bénabou and Tirole, 2006; Frey, 1997; Meier, 2007a) and empirical studies (Ariely et al., 2009; Karlan and List, 2007; Rondeau and List, 2008). This dissertation aims to examine the effectiveness of matching subsidies on prosocial fundraising in the crowdfunding context. Specifically, I study how the presence of matching subsidies affects overall funding outcomes and funding dynamics in the online prosocial crowdfunding environment.

The first essay …


Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma Dec 2020

Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma

Dissertations and Theses Collection (Open Access)

Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …


Statistical And Deep Learning Models For Software Engineering Corpora, Van Duc Thong Hoang Aug 2020

Statistical And Deep Learning Models For Software Engineering Corpora, Van Duc Thong Hoang

Dissertations and Theses Collection (Open Access)

This dissertation focuses on proposing statistical and deep learning models for software engineering corpora to detect bugs in software system. The dissertation aims to solve three main software engineering problems, i.e., bug localization (locating the potential buggy source files in a software project given a bug report or failing test cases), just-in-time defect prediction (identifying the potential defective commits as they are introduced into a version control system), and bug fixing patch identification (identifying commits repairing bugs for their propagation to parallelly maintained versions) to save developers’ time and e↵ort in improving software system quality. Moreover, I also propose a …


Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui Aug 2020

Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui

Dissertations and Theses Collection (Open Access)

It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …


A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong Jun 2020

A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong

Dissertations and Theses Collection (Open Access)

Dynamic malware analysis schemes either run the target program as is in an isolated environment assisted by additional hardware facilities or modify it with instrumentation code statically or dynamically. The hardware-assisted schemes usually trap the target during its execution to a more privileged environment based on the available hardware events. The more privileged environment is not accessible by the untrusted kernel, thus this approach is often applied for transparent and secure kernel analysis. Nevertheless, the isolated environment induces a virtual address gap between the analyzer and the target, which hinders effective and efficient memory introspection and undermines the correctness of …


Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh Dec 2019

Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh

Dissertations and Theses Collection (Open Access)

Sensing systems for monitoring physiological and psychological states have been studied extensively in both academic and industry research for different applications across various domains. However, most of the studies have been done in the lab environment with controlled and complicated sensor setup, which is only suitable for serious healthcare applications in which the obtrusiveness and immobility can be compromised in a trade-off for accurate clinical screening or diagnosing. The recent substantial development of mobile devices with embedded miniaturized sensors are now allowing new opportunities to adapt and develop such sensing systems in the mobile context. The ability to sense physiological …


Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan Dec 2019

Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan

Dissertations and Theses Collection (Open Access)

The widespread availability of sensors on personal devices (e.g., smartphones, smartwatches) and other cheap, commoditized IoT devices in the environment has opened up the opportunity for developing applications that capture and enhance various lifestyle-driven daily activities of individuals. Moreover, there is a growing trend of leveraging ubiquitous computing technologies to improve physical health and wellbeing. Several of the lifestyle monitoring applications rely primarily on the capability of recognizing contextually relevant human movements, actions and gestures. As such, gesture recognition techniques, and gesture-based analytics have emerged as a fundamental component for realizing personalized lifestyle applications.

This thesis explores how such wealth …


Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran Dec 2019

Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran

Dissertations and Theses Collection (Open Access)

Wearable devices are gaining in popularity, but are presently used primarily for productivity-related functions (such as calling people or discreetly receiving notifications) or for physiological sensing. However, wearable devices are still not widely used for a wider set of sensing-based applications, even though their potential is enormous. Wearable devices can enable a variety of novel applications. For example, wrist-worn and/or finger-worn devices could be viable controllers for real-time AR/VR games and applications, and can be used for real-time gestural tracking to support rehabilitative patient therapy or training of sports personnel. There are, however, a key set of impediments towards realizing …


Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh Sep 2019

Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh

Dissertations and Theses Collection (Open Access)

Over the past few years, deep learning has emerged as state-of-the-art solutions for many challenging computer vision tasks such as face recognition, object detection, etc. Despite of its outstanding performance, deep neural networks (DNNs) are computational intensive, which prevent them to be widely adopted on billions of mobile and embedded devices with scarce resources. To address that limitation, we
focus on building systems and optimization algorithms to accelerate those models, making them more computational-efficient.
First, this thesis explores the computational capabilities of different existing processors (or co-processors) on modern mobile devices. It recognizes that by leveraging the mobile Graphics Processing …


Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang Jul 2019

Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang

Dissertations and Theses Collection (Open Access)

Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …


Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya Jul 2019

Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya

Dissertations and Theses Collection (Open Access)

The rapid advances of the Web have changed the ways information is distributed and exchanged among individuals and organizations. Various content from different domains are generated daily and contributed by users' daily activities, such as posting messages in a microblog platform, or collaborating in a question and answer site. To deal with such tremendous volume of user generated content, there is a need for approaches that are able to handle the mass amount of available data and to extract knowledge hidden in the user generated content. This dissertation attempts to make sense of the generated content to help in three …


Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria Jul 2019

Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria

Dissertations and Theses Collection (Open Access)

The rising mental health illnesses of severe stress and depression is of increasing concern worldwide. Often associated by similarities in symptoms, severe stress can take a toll on a person’s productivity and result in depression if the stress is left unmanaged. Unfortunately, depression can occur without any feelings of stress. With depression growing as a leading cause of disability in economic productivity, there has been a sharp rise in mental health initiatives to improve stress and depression management. To offer such services conveniently and discreetly, recent efforts have focused on using mobile technologies. However, these initiatives usually require users to …


Social Software Development: Insights And Solutions, Abhishek Sharma Dec 2018

Social Software Development: Insights And Solutions, Abhishek Sharma

Dissertations and Theses Collection (Open Access)

Over last few decades, the way software is developed has changed drastically. From being an activity performed by developers working individually to develop standalone programs, it has transformed into a highly collaborative and cooperative activity. Software development today can be considered as a participatory culture, where developers coordinate and engage together to develop software while continuously learning from one another and creating knowledge.

In order to support their communication and collaboration needs, software developers often use a variety of social media channels. These channels help software developers to connect with like-minded developers and explore collaborations on software projects of interest. …


Comparison Mining From Text, Maksim Tkachenko Dec 2018

Comparison Mining From Text, Maksim Tkachenko

Dissertations and Theses Collection (Open Access)

Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.

If …


Advanced Malware Detection For Android Platform, Ke Xu Jun 2018

Advanced Malware Detection For Android Platform, Ke Xu

Dissertations and Theses Collection (Open Access)

In the first quarter of 2018, 75.66% of smartphones sales were devices running An- droid. Due to its popularity, cyber-criminals have increasingly targeted this ecosys- tem. Malware running on Android severely violates end users security and privacy, allowing many attacks such as defeating two factor authentication of mobile bank- ing applications, capturing real-time voice calls and leaking sensitive information. In this dissertation, I describe the pieces of work that I have done to effectively de- tect malware on Android platform, i.e., ICC-based malware detection system (IC- CDetector), multi-layer malware detection system (DeepRefiner), and self-evolving and scalable malware detection system (DroidEvolver) …


Recommending Apis For Software Evolution, Ferdian Thung May 2018

Recommending Apis For Software Evolution, Ferdian Thung

Dissertations and Theses Collection (Open Access)

Softwares are constantly evolving. This evolution has been made easier through the use of Application Programming Interfaces (APIs). By leveraging APIs, developers reuse previously implemented functionalities and concentrate on writing new codes. These APIs may originate from either third parties or internally from other compo- nents of the software that are currently developed. In the first case, developers need to know how to find and use third party APIs. In the second case, developers need to be aware of internal APIs in their own software. In either case, there is often too much information to digest. For instance, finding the …


Enabling Real Time In-Situ Context Based Experimentation To Observe User Behaviour, Kartik Muralidaran Aug 2015

Enabling Real Time In-Situ Context Based Experimentation To Observe User Behaviour, Kartik Muralidaran

Dissertations and Theses Collection (Open Access)

Today’s mobile phones represent a rich and powerful computing platform, given their sensing, processing and communication capabilities. These devices are also part of the everyday life of millions of people, and coupled with the unprecedented access to personal context, make them the ideal tool for conducting behavioural experiments in an unobtrusive way. Transforming the mobile device from a mere observer of human context to an enabler of behavioural experiments however, requires not only providing experimenters access to the deep, near-real time human context (e.g., location, activity, group dynamics) but also exposing a disciplined scientific experimentation service that frees them from …


Multimodal Code Search, Shaowei Wang Jan 2015

Multimodal Code Search, Shaowei Wang

Dissertations and Theses Collection (Open Access)

Today’s software is large and complex, consisting of millions of lines of code. New developers of a software project always face significant challenges in finding code related to their development or maintenance tasks (e.g., implementing features, fixing bugs and adding new features). In fact, research has shown that developers typically spend more time on locating and understanding code than modifying it. Thus, we can significantly reduce the cost of software development and maintenance by reducing the time to search and understand code relevant to a software development or maintenance task. In order to reduce the time of searching and understanding …


Ranking-Based Approaches For Localizing Faults, Lucia Lucia Jun 2014

Ranking-Based Approaches For Localizing Faults, Lucia Lucia

Dissertations and Theses Collection (Open Access)

A fault is the root cause of program failures where a program behaves differently from the intended behavior. Finding or localizing faults is often laborious (especially so for complex programs), yet it is an important task in the software lifecycle. An automated technique that can accurately and quickly identify the faulty code is greatly needed to alleviate the costs of software debugging. Many fault localization techniques assume that faults are localizable, i.e., each fault manifests only in a single or a few lines of code that are close to one another. To verify this assumption, we study how faults spread …


Understanding And Rejecting Errant Touches On Multi-Touch Tablets, Ke Shu Jan 2013

Understanding And Rejecting Errant Touches On Multi-Touch Tablets, Ke Shu

Dissertations and Theses Collection (Open Access)

Given the pervasion of multi-touch tablet, pen-based applications have rapidly moved onto this new platform. Users draw both with bare fingers and using capacitive pens as they would do on paper in the past. Unlike paper, these tablets cannot distinguish legitimate finger/pen input from accidental touches by other parts of the user’s hand. In this thesis, we refer it to as errant touch rejection problem since users may unintentionally touch the screen with other parts of their hand. In this thesis, I design, implement and evaluate new approaches, bezel-focus rejection, of preventing errant touches on multi-touch tablets. I began the …