Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 84

Full-Text Articles in Physical Sciences and Mathematics

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo Dec 2015

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo

Research Collection School Of Computing and Information Systems

Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …


Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin Dec 2015

Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin

Research Collection School Of Computing and Information Systems

Model checking suffers from the infamous state space explosion problem. In this paper, we propose an approach, named GPURC, to utilize the Graphics Processing Units (GPUs) to speed up the reachability verification. The key idea is to achieve a dynamic load balancing so that the many cores in GPUs are fully utilized during the state space exploration.To this end, we firstly construct a compact data encoding of the input transition systems to reduce the memory cost and fit the calculation in GPUs. To support a large number of concurrent components, we propose a multi-integer encoding with conflict-release accessing approach. We …


On The Unreliability Of Bug Severity Data, Yuan Tian, Nasir Ali, David Lo, Ahmed E. Hassan Dec 2015

On The Unreliability Of Bug Severity Data, Yuan Tian, Nasir Ali, David Lo, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

Severity levels, e.g., critical and minor, of bugs are often used to prioritize development efforts. Prior research efforts have proposed approaches to automatically assign the severity label to a bug report. All prior efforts verify the accuracy of their approaches using human-assigned bug reports data that is stored in software repositories. However, all prior efforts assume that such human-assigned data is reliable. Hence a perfect automated approach should be able to assign the same severity label as in the repository – achieving a 100% accuracy. Looking at duplicate bug reports (i.e., reports referring to the same problem) from three open-source …


Mopeye: Monitoring Per-App Network Performance With Zero Measurement Traffic, Daoyuan Wu, Weichao Li, Rocky K. C. Chang, Debin Gao Dec 2015

Mopeye: Monitoring Per-App Network Performance With Zero Measurement Traffic, Daoyuan Wu, Weichao Li, Rocky K. C. Chang, Debin Gao

Research Collection School Of Computing and Information Systems

Mobile network performance measurement is important for understanding mobile user experience, problem diagnosis, and service comparison. A number of crowdsourcing measurement apps (e.g., MobiPerf and Netalyzr) have been embarked for the last few years. Unlike existing apps that use active measurement methods, we employ a novel passive-active approach to continuously monitor per-app network performance on unrooted smartphones without injecting additional network traffic. By leveraging the VpnService API on Android, MopEye, our measurement app, intercepts all network traffic and then relays them to their destinations using socket APIs. Therefore, not only MopEye can measure the round-trip time accurately, it can do …


Progressive Sequence Matching For Adl Plan Recommendation, Shan Gao, Di Wang, Ah-Hwee Tan, Chunyan Miao Dec 2015

Progressive Sequence Matching For Adl Plan Recommendation, Shan Gao, Di Wang, Ah-Hwee Tan, Chunyan Miao

Research Collection School Of Computing and Information Systems

Activities of Daily Living (ADLs) are indicatives of a person’s lifestyle. In particular, daily ADL routines closely relate to a person’s well-being. With the objective of promoting active lifestyles, this paper presents an agent system that provides recommendations of suitable ADL plans (i.e., selected ADL sequences) to individual users based on the more active lifestyles of the others. Specifically, we develop a set of quantitative measures, named wellness scores, spanning the evaluation across the physical, cognitive, emotion, and social aspects based on his or her ADL routines. Then we propose an ADL sequence learning model, named Recommendation ADL ART, or …


An Adaptive Markov Strategy For Effective Network Intrusion Detection, Jianye Hao, Yinxing Xue, Mahinthan Chandramohan, Yang Liu, Jun Sun Nov 2015

An Adaptive Markov Strategy For Effective Network Intrusion Detection, Jianye Hao, Yinxing Xue, Mahinthan Chandramohan, Yang Liu, Jun Sun

Research Collection School Of Computing and Information Systems

Network monitoring is an important way to ensure the security of hosts from being attacked by malicious attackers. One challenging problem for network operators is how to distribute the limited monitoring resources (e.g., intrusion detectors) among the network to detect attacks effectively, especially when the attacking strategies can be changing dynamically and unpredictable. To this end, we adopt Markov game to model the interactions between the network operator and the attacker and propose an adaptive Markov strategy (AMS) to determine how the detectors should be placed on the network against possible attacks to minimize the network’s accumulated cost over time. …


A Passive Testing Approach For Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee Xian Tan, Hwee-Pink Tan, Zhangbing Zhou Nov 2015

A Passive Testing Approach For Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee Xian Tan, Hwee-Pink Tan, Zhangbing Zhou

Research Collection School Of Computing and Information Systems

Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a cruicial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works …


Should Fixing These Failures Be Delegated To Automated Program Repair?, Le Dinh Xuan Bach, Le Bui Tien Duy, David Lo Nov 2015

Should Fixing These Failures Be Delegated To Automated Program Repair?, Le Dinh Xuan Bach, Le Bui Tien Duy, David Lo

Research Collection School Of Computing and Information Systems

Program repair constitutes one of the major components of software maintenance that usually incurs a significant cost in software production. Automated program repair is supposed to help in reducing the software maintenance cost by automatically fixing software defects. Despite the recent advances in automated software repair, it is still very costly to wait for repair tools to produce valid repairs of defects. This paper addresses the following question: "Will an automated program repair technique find a repair for a defect within a reasonable time?". To answer this question, we build an oracle that can predict whether fixing a failure should …


Codehow: Effective Code Search Based On Api Understanding And Extended Boolean Model (E), Fei Lv, Jian-Guang Lou, Shaowei Wang, Dongmei Zhang, Jainjun Zhao Nov 2015

Codehow: Effective Code Search Based On Api Understanding And Extended Boolean Model (E), Fei Lv, Jian-Guang Lou, Shaowei Wang, Dongmei Zhang, Jainjun Zhao

Research Collection School Of Computing and Information Systems

Over the years of software development, a vast amount of source code has been accumulated. Many code search tools were proposed to help programmers reuse previously-written code by performing free-text queries over a large-scale codebase. Our experience shows that the accuracy of these code search tools are often unsatisfactory. One major reason is that existing tools lack of query understanding ability. In this paper, we propose CodeHow, a code search technique that can recognize potential APIs a user query refers to. Having understood the potentially relevant APIs, CodeHow expands the query with the APIs and performs code retrieval by applying …


Event Detection In Wireless Sensor Networks In Random Spatial Sensors Deployments, Pengfei Zhang, Ido Nevat, Gareth W. Peters, Gaoxi Xiao, Hwee-Pink Tan Nov 2015

Event Detection In Wireless Sensor Networks In Random Spatial Sensors Deployments, Pengfei Zhang, Ido Nevat, Gareth W. Peters, Gaoxi Xiao, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

We develop a new class of event detection algorithms in Wireless Sensor Networks where the sensors are randomly deployed spatially. We formulate the detection problem as a binary hypothesis testing problem and design the optimal decision rules for two scenarios, namely the Poisson Point Process and Binomial Point Process random deployments. To calculate the intractable marginal likelihood density, we develop three types of series expansion methods which are based on an Askey-orthogonal polynomials. In addition, we develop a novel framework to provide guidance on which series expansion is most suitable (i.e., most accurate) to use for different system parameters. Extensive …


Experience Report: An Industrial Experience Report On Test Outsourcing Practices, Xin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li Nov 2015

Experience Report: An Industrial Experience Report On Test Outsourcing Practices, Xin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li

Research Collection School Of Computing and Information Systems

Nowadays, many companies contract their testing functionalities out to third-party IT outsourcing companies. This process referred to as test outsourcing is common in the industry, yet it is rarely studied in the research community. In this paper, to bridge the gap, we performed an empirical study on test outsourcing with 10 interviewees and 140 survey respondents. We investigated various research questions such as the types, the process, and the challenges of test outsourcing, and the differences between test outsourcing and in-house testing. We found customer satisfaction, tight project schedule, and domain unfamiliarity are the top-3 challenges faced by the testers. …


Real-Time Detection Of Seat Occupancy And Hogging, Huy Hoang Nguyen, Nakul Gulati, Youngki Lee, Rajesh Krishna Balan Nov 2015

Real-Time Detection Of Seat Occupancy And Hogging, Huy Hoang Nguyen, Nakul Gulati, Youngki Lee, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

In this paper, we propose a cheap and effective solution to detect if specific seats at a shared public table are occupied -- either by humans or by objects (i.e., the seats are being "hogged"). The hogging of seats, in particular, is a big problem for our campus library and required a large amount of manpower to correct (to find and clear hogged seats). We propose using two different cheap sensors, a capacitance sensor and an infrared (IR) sensor, to solve this problem. In the rest of this paper, we show how using these sensors can accurately determine if a …


Powerforecaster: Predicting Smartphone Power Impact Of Continuous Sensing Applications At Pre-Installation Time, Chulhong Min, Youngki Lee, Chungkuk Yoo, Seungwoo Kang, Sangwon Choi, Pillsoon Park, Inseok Hwang, Younghyun Ju, Seungpyo Choi, Junehwa Song Nov 2015

Powerforecaster: Predicting Smartphone Power Impact Of Continuous Sensing Applications At Pre-Installation Time, Chulhong Min, Youngki Lee, Chungkuk Yoo, Seungwoo Kang, Sangwon Choi, Pillsoon Park, Inseok Hwang, Younghyun Ju, Seungpyo Choi, Junehwa Song

Research Collection School Of Computing and Information Systems

Today's smartphone application (hereinafter 'app') markets miss a key piece of information, power consumption of apps. This causes a severe problem for continuous sensing apps as they consume significant power without users' awareness. Users have no choice but to repeatedly install one app after another and experience their power use. To break such an exhaustive cycle, we propose PowerForecaster, a system that provides users with power use of sensing apps at pre-installation time. Such advanced power estimation is extremely challenging since the power cost of a sensing app largely varies with users' physical activities and phone use patterns. We observe …


Interpolation Guided Compositional Verification, Shang-Wei Lin, Jun Sun, Truong Khanh Nguyen, Yang Liu, Jin Song Dong Nov 2015

Interpolation Guided Compositional Verification, Shang-Wei Lin, Jun Sun, Truong Khanh Nguyen, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Model checking suffers from the state space explosion problem. Compositional verification techniques such as assume-guarantee reasoning (AGR) have been proposed to alleviate the problem. However, there are at least three challenges in applying AGR. Firstly, given a system M1 M2, how do we automatically construct and refine (in the presence of spurious counterexamples) an assumption A2, which must be an abstraction of M2? Previous approaches suggest to incrementally learn and modify the assumption through multiple invocations of a model checker, which could be often time consuming. Secondly, how do we keep the state space small when checking M1 A2 |= …


Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li Oct 2015

Constrained Feature Selection For Localizing Faults, Tien-Duy B. Le, David Lo, Ming Li

Research Collection School Of Computing and Information Systems

Developers often take much time and effort to find buggy program elements. To help developers debug, many past studies have proposed spectrum-based fault localization techniques. These techniques compare and contrast correct and faulty execution traces and highlight suspicious program elements. In this work, we propose constrained feature selection algorithms that we use to localize faults. Feature selection algorithms are commonly used to identify important features that are helpful for a classification task. By mapping an execution trace to a classification instance and a program element to a feature, we can transform fault localization to the feature selection problem. Unfortunately, existing …


The Importance Of Being Isolated: An Empirical Study On Chromium Reviews, Subhajit Datta, Devarshi Bhatt, Manish Jain, Proshanta Sarkar, Santonu Sarkar Oct 2015

The Importance Of Being Isolated: An Empirical Study On Chromium Reviews, Subhajit Datta, Devarshi Bhatt, Manish Jain, Proshanta Sarkar, Santonu Sarkar

Research Collection School Of Computing and Information Systems

As large scale software development has become more collaborative, and software teams more globally distributed, several studies have explored how developer interaction influences software development outcomes. The emphasis so far has been largely on outcomes like defect count, the time to close modification requests etc. In the paper, we examine data from the Chromium project to understand how different aspects of developer discussion relate to the closure time of reviews. On the basis of analyzing reviews discussed by 2000+ developers, our results indicate that quicker closure of reviews owned by a developer relates to higher reception of information and insights …


What's Hot In Software Engineering Twitter Space?, Abhishek Sharma, Tian Yuan, David Lo Oct 2015

What's Hot In Software Engineering Twitter Space?, Abhishek Sharma, Tian Yuan, David Lo

Research Collection School Of Computing and Information Systems

Twitter is a popular means to disseminate information and currently more than 300 million people are using it actively. Software engineers are no exception; Singer et al. have shown that many developers use Twitter to stay current with recent technological trends. At various time points, many users are posting microblogs (i.e., tweets) about the same topic in Twitter. We refer to this reasonably large set of topically-coherent microblogs in the Twitter space made at a particular point in time as an event. In this work, we perform an exploratory study on software engineering related events in Twitter. We collect a …


Mood Self-Assessment On Smartphones, Le Minh Khue, Eng Lieh Ouh, Stan Jarzabek Oct 2015

Mood Self-Assessment On Smartphones, Le Minh Khue, Eng Lieh Ouh, Stan Jarzabek

Research Collection School Of Computing and Information Systems

Mood has been systematically studied by psychologists for over 100 years. As mood is a subjective feeling, any study of mood must take into account and accurately capture user’s perception of an experienced feeling. In last 40 years, a number of pen-andpaper mood self-assessment scales have been proposed. Typically, a person is asked to separately rate various dimensions of the experienced feeling (e.g., pleasure and arousal) or mood items (interested, agitated, excited, etc.) on numeric scales (e.g., between 0 and 10). These partial ratings are then combined into an overall mood rating (or into its positive and negative affect). Penand-paper …


Should I Follow This Fault Localization Tool's Output? Automated Prediction Of Fault Localization Effectiveness, Tien-Duy B. Le, David Lo, Ferdian Thung Oct 2015

Should I Follow This Fault Localization Tool's Output? Automated Prediction Of Fault Localization Effectiveness, Tien-Duy B. Le, David Lo, Ferdian Thung

Research Collection School Of Computing and Information Systems

Debugging is a crucial yet expensive activity to improve the reliability of software systems. To reduce debugging cost, various fault localization tools have been proposed. A spectrum-based fault localization tool often outputs an ordered list of program elements sorted based on their likelihood to be the root cause of a set of failures (i.e., their suspiciousness scores). Despite the many studies on fault localization, unfortunately, however, for many bugs, the root causes are often low in the ordered list. This potentially causes developers to distrust fault localization tools. Recently, Parnin and Orso highlight in their user study that many debuggers …


What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan Oct 2015

What Are The Characteristics Of High-Rated Apps? A Case Study On Free Android Applications, Tian Yuan, Meiyappan Nagappan, David Lo, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

The tremendous rate of growth in the mobile app market over the past few years has attracted many developers to build mobile apps. However, while there is no shortage of stories of how lone developers have made great fortunes from their apps, the majority of developers are struggling to break even. For those struggling developers, knowing the “DNA” (i.e., characteristics) of high-rated apps is the first step towards successful development and evolution of their apps. In this paper, we investigate 28 factors along eight dimensions to understand how high-rated apps are different from low-rated apps. We also investigate what are …


Smartphones And Ble Services: Empirical Insights, Meera Radhakrishnan, Archan Misra, Rajesh Krishna Balan, Youngki Lee Oct 2015

Smartphones And Ble Services: Empirical Insights, Meera Radhakrishnan, Archan Misra, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

Driven by the rapid market growth of sensors and beacons that offer Bluetooth Low Energy (BLE) based connectivity, this paper empirically investigates the performance characteristics of the BLE interface on multiple Android smartphones, and the consequent impact on a proposed BLE-based service: continuous indoor location. We first use extensive measurement studies with multiple Android devices to establish that the BLE interface on current smartphones is not as "low-energy" as nominally expected, and establish that continuous use of such a BLE interface is not feasible unless we choose a moderately large scan interval and a low duty cycle. We then explore …


Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny Oct 2015

Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny

Research Collection School Of Computing and Information Systems

The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …


Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik Oct 2015

Choosing Your Weapons: On Sentiment Analysis Tools For Software Engineering Research, Robbert Jongeling, Subhajit Datta, Alexander Serebrenik

Research Collection School Of Computing and Information Systems

Recent years have seen an increasing attention to social aspects of software engineering, including studies of emotions and sentiments experienced and expressed by the software developers. Most of these studies reuse existing sentiment analysis tools such as SentiStrength and NLTK. However, these tools have been trained on product reviews and movie reviews and, therefore, their results might not be applicable in the software engineering domain. In this paper we study whether the sentiment analysis tools agree with the sentiment recognized by human evaluators (as reported in an earlier study) as well as with each other. Furthermore, we evaluate the impact …


Contract-Based General-Purpose Gpu Programming, Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer Oct 2015

Contract-Based General-Purpose Gpu Programming, Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer

Research Collection School Of Computing and Information Systems

Using GPUs as general-purpose processors has revolutionized parallel computing by offering, for a large and growing set of algorithms, massive data-parallelization on desktop machines. An obstacle to widespread adoption, however, is the difficulty of programming them and the low-level control of the hardware required to achieve good performance. This paper suggests a programming library, SafeGPU, that aims at striking a balance between programmer productivity and performance, by making GPU data-parallel operations accessible from within a classical object-oriented programming language. The solution is integrated with the design-by-contract approach, which increases confidence in functional program correctness by embedding executable program specifications into …


Privacy In Crowdsourced Platforms, Thivya Kandappu, Arik Friedman, Vijay Sivaraman, Roksana Boreli Oct 2015

Privacy In Crowdsourced Platforms, Thivya Kandappu, Arik Friedman, Vijay Sivaraman, Roksana Boreli

Research Collection School Of Computing and Information Systems

Emerging platforms, such as Amazon Mechanical Turk and Google Consumer Surveys, are increasingly being used by researchers and market analysts to crowdsource large-scale survey data from online populations at extremely low cost. However, by participating in successive surveys, workers risk being profiled and targeted, both by surveyors and by the platform itself. In this chapter we provide an overview of privacy in crowdsourcing platforms. We consider the state-of-the-art crowdsourcing platforms and the risks to worker privacy in such platforms, we survey the existing solutions, and later describe and evaluate the design of a privacy conscious crowdsourcing platform prototype, called Loki. …


Automated Prediction Of Bug Report Priority Using Multi-Factor Analysis, Yuan Tian, David Lo, Chengnian Sun, Xin Xia Oct 2015

Automated Prediction Of Bug Report Priority Using Multi-Factor Analysis, Yuan Tian, David Lo, Chengnian Sun, Xin Xia

Research Collection School Of Computing and Information Systems

Bugs are prevalent. To improve software quality, developers often allow users to report bugs that they found using a bug tracking system such as Bugzilla. Users would specify among other things, a description of the bug, the component that is affected by the bug, and the severity of the bug. Based on this information, bug triagers would then assign a priority level to the reported bug. As resources are limited, bug reports would be investigated based on their priority levels. This priority assignment process however is a manual one. Could we do better? In this paper, we propose an automated …


Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi Sep 2015

Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi

Research Collection School Of Computing and Information Systems

Emerging continuous sensing apps introduce new major factors governing phones’ overall battery consumption behaviors: (1) added nontrivial persistent battery drain, and more importantly (2) different battery drain rate depending on the user’s different mobility condition. In this paper, we address the new battery impacting factors significant enough to outdate users’ existing battery model in real life. We explore an initial approach to help users understand the cause and effect between their physical activity and phones’ battery life. To this end, we present Sandra, a novel mobility-aware smartphone battery information advisor, and study its potential to help users redevelop their battery …


Need Accurate User Behaviour?: Pay Attention To Groups!, Kasthuri Jayarajah, Youngki Lee, Archan Misra, Rajesh Krishna Balan Sep 2015

Need Accurate User Behaviour?: Pay Attention To Groups!, Kasthuri Jayarajah, Youngki Lee, Archan Misra, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

In this paper, we show that characterizing user behaviour from location or smartphone usage traces, without accounting for the interaction of individuals in physical-world groups, can lead to erroneous results. We conducted one of the largest studies in the UbiComp domain thus far, involving indoor location traces of more than 6,000 users, collected over a 4-month period at our university campus, and further studied fine-grained App usage of a subset of 156 Android users. We apply a state-of-the-art group detection algorithm to annotate such location traces with group vs. individual context, and then show that individuals vs. groups exhibit significant …


How Practitioners Perceive The Relevance Of Software Engineering Research, David Lo, Nachiappan Nagappan, Thomas Zimmermann Sep 2015

How Practitioners Perceive The Relevance Of Software Engineering Research, David Lo, Nachiappan Nagappan, Thomas Zimmermann

Research Collection School Of Computing and Information Systems

The number of software engineering research papers over the last few years has grown significantly. An important question here is: how relevant is software engineering research to practitioners in the field? To address this question, we conducted a survey at Microsoft where we invited 3,000 industry practitioners to rate the relevance of research ideas contained in 571 ICSE, ESEC/FSE and FSE papers that were published over a five year period. We received 17,913 ratings by 512 practitioners who labelled ideas as essential, worthwhile, unimportant, or unwise. The results from the survey suggest that practitioners are positive towards studies done by …


Tonetrack: Leveraging Frequency-Agile Radios For Time-Based Indoor Wireless, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson Sep 2015

Tonetrack: Leveraging Frequency-Agile Radios For Time-Based Indoor Wireless, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson

Research Collection School Of Computing and Information Systems

Indoor localization of mobile devices and tags has received much attention recently, with encouraging fine-grained localization results available with enough line-of-sight coverage and hardware infrastructure. Some of the most promising techniques analyze the time-of-arrival of incoming signals, but the limited bandwidth available to most wireless transmissions fundamentally constrains their resolution. Frequency-agile wireless networks utilize bandwidths of varying sizes and locations in a wireless band to effi- ciently share the wireless medium between users. ToneTrack is an indoor location system that achieves sub-meter accuracy with minimal hardware and antennas, by leveraging frequency-agile wireless networks to increase the effective bandwidth. Our novel …