Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Series

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 2642

Full-Text Articles in Physical Sciences and Mathematics

On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic Jun 2025

On Lexicographic Proof Rules For Probabilistic Termination, Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevucký, Dorde Zikelic

Research Collection School Of Computing and Information Systems

We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in a LexRSM not existing even for simple terminating programs. Our contributions are twofold. First, we introduce a generalization of LexRSMs that allows for some …


Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He Dec 2024

Triadic Temporal-Semantic Alignment For Weakly-Supervised Video Moment Retrieval, Jin Liu, Jialong Xie, Fengyu Zhou, Shengfeng He

Research Collection School Of Computing and Information Systems

Video Moment Retrieval (VMR) aims to identify specific event moments within untrimmed videos based on natural language queries. Existing VMR methods have been criticized for relying heavily on moment annotation bias rather than true multi-modal alignment reasoning. Weakly supervised VMR approaches inherently overcome this issue by training without precise temporal location information. However, they struggle with fine-grained semantic alignment and often yield multiple speculative predictions with prolonged video spans. In this paper, we take a step forward in the context of weakly supervised VMR by proposing a triadic temporalsemantic alignment model. Our proposed approach augments weak supervision by comprehensively addressing …


Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude Oct 2024

Generative Ai In Software Engineering Must Be Human-Centered: The Copenhagen Manifesto, D. Russo, S. Van Berkel Baltes, Christoph Treude

Research Collection School Of Computing and Information Systems

The advent of Generative Artificial Intelligence—systems that can produce human-like content such as text, music, visual art, or source code—marks not only a significant leap for Artificial Intelligence (AI) but also a pivotal moment for software practitioners and researchers. The role of software engineering researchers and practitioners in adopting the technologies that shape our world is critical. Historically, the human aspects of developing software have been treated as secondary to more technical innovations. However, the emergence of Generative AI will simultaneously enhance human capabilities while surfacing complex ethical, social, legal, and technical challenges.While primarily aimed at software engineering (SE) researchers …


Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra Oct 2024

Ocapo: Fine-Grained Occupancy-Aware, Empirically-Driven Pdc Control In Open-Plan, Shared Workspaces, Ravi Anuradha, Dulaj Sanjaya Weerakoon, Archan Misra

Research Collection School Of Computing and Information Systems

Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle …


What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis Oct 2024

What Do We Know About Hugging Face? A Systematic Literature Review And Quantitative Validation Of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

Computer Science: Faculty Publications and Other Works

Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep learning supply chain.
Aims: Recent empirical research has examined PTM registries in ways such as vulnerabilities, reuse processes, and evolution. However, no existing research synthesizes them to provide a systematic understanding of the current knowledge. Some of the existing research includes qualitative …


Certified Continual Learning For Neural Network Regression, Hong Long Pham, Jun Sun Sep 2024

Certified Continual Learning For Neural Network Regression, Hong Long Pham, Jun Sun

Research Collection School Of Computing and Information Systems

On the one hand, there has been considerable progress on neural network verification in recent years, which makes certifying neural networks a possibility. On the other hand, neural network in practice are often re-trained over time to cope with new data distribution or for solving different tasks (a.k.a. continual learning). Once re-trained, the verified correctness of the neural network is likely broken, particularly in the presence of the phenomenon known as catastrophic forgetting. In this work, we propose an approach called certified continual learning which improves existing continual learning methods by preserving, as long as possible, the established correctness properties …


Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu Sep 2024

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu

Research Collection School Of Computing and Information Systems

This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …


Challenges And Practices Of Deep Learning Model Reengineering: A Case Study On Computer Vision, Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, James C. Davis Aug 2024

Challenges And Practices Of Deep Learning Model Reengineering: A Case Study On Computer Vision, Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

Computer Science: Faculty Publications and Other Works

Many engineering organizations are reimplementing and extending deep neural networks from the research community. We describe this process as deep learning model reengineering. Deep learning model reengineering — reusing, replicating, adapting, and enhancing state-of-the-art deep learning approaches — is challenging for reasons including under-documented reference models, changing requirements, and the cost of implementation and testing.


Materials Data Science Ontology (Mds-Onto): Unifying Domain Knowledge In Materials And Applied Data Science, Van D. Tran, Jonathan E. Gordon, Alexander Harding Bradley, Balashanmuga Priyan Rajamohan, Quynh D. Tran, Gabriel Ponón, Yinghui Wu, Laura S. Bruckman, Erika I. Barcelos, Roger H. French Aug 2024

Materials Data Science Ontology (Mds-Onto): Unifying Domain Knowledge In Materials And Applied Data Science, Van D. Tran, Jonathan E. Gordon, Alexander Harding Bradley, Balashanmuga Priyan Rajamohan, Quynh D. Tran, Gabriel Ponón, Yinghui Wu, Laura S. Bruckman, Erika I. Barcelos, Roger H. French

Student Scholarship

Ontologies have gained popularity in the scientific community as a means of standardizing concepts and terminology used in metadata across different institutions to facilitate data comprehension, sharing, and reuse. Despite the existence of frameworks and guidelines for building ontologies, the processes and standards used to develop ontologies still differ significantly, particularly in Materials Science. Our goal with the MDS-Onto Framework is to provide a unified and automated system for ontology development in the Materials and Data Sciences. This framework offers recommendations on where to publish ontologies online, how to best integrate them within the semantic web, and which formats to …


A New Hope: Contextual Privacy Policies For Mobile Applications And An Approach Toward Automated Generation, Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Xiwei Xu, Mark Staples, Thierry Rakotoarivelo, David Lo Aug 2024

A New Hope: Contextual Privacy Policies For Mobile Applications And An Approach Toward Automated Generation, Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Xiwei Xu, Mark Staples, Thierry Rakotoarivelo, David Lo

Research Collection School Of Computing and Information Systems

Privacy policies have emerged as the predominant approach to conveying privacy notices to mobile application users. In an effort to enhance both readability and user engagement, the concept of contextual privacy policies (CPPs) has been proposed by researchers. The aim of CPPs is to fragment privacy policies into concise snippets, displaying them only within the corresponding contexts within the application’s graphical user interfaces (GUIs). In this paper, we first formulate CPP in mobile application scenario, and then present a novel multimodal framework, named SEEPRIVACY, specifically designed to automatically generate CPPs for mobile applications. This method uniquely integrates vision-based GUI understanding …


Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis Aug 2024

Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis

Research Collection School Of Computing and Information Systems

We extend the qubit-efficient encoding presented in (Tan et al. in Quantum 5:454, 2021) and apply it to instances of the financial transaction settlement problem constructed from data provided by a regulated financial exchange. Our methods are directly applicable to any QUBO problem with linear inequality constraints. Our extension of previously proposed methods consists of a simplification in varying the number of qubits used to encode correlations as well as a new class of variational circuits which incorporate symmetries thereby reducing sampling overhead, improving numerical stability and recovering the expression of the cost objective as a Hermitian observable. We also …


Neural Network Semantic Backdoor Detection And Mitigation: A Causality-Based Approach, Bing Sun, Jun Sun, Wayne Koh, Jie Shi Aug 2024

Neural Network Semantic Backdoor Detection And Mitigation: A Causality-Based Approach, Bing Sun, Jun Sun, Wayne Koh, Jie Shi

Research Collection School Of Computing and Information Systems

Different from ordinary backdoors in neural networks which are introduced with artificial triggers (e.g., certain specific patch) and/or by tampering the samples, semantic backdoors are introduced by simply manipulating the semantic, e.g., by labeling green cars as frogs in the training set. By focusing on samples with rare semantic features (such as green cars), the accuracy of the model is often minimally affected. Since the attacker is not required to modify the input sample during training nor inference time, semantic backdoors are challenging to detect and remove. Existing backdoor detection and mitigation techniques are shown to be ineffective with respect …


Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He Jul 2024

Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …


Generative Ai For Pull Request Descriptions: Adoption, Impact, And Developer Interventions, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto Jul 2024

Generative Ai For Pull Request Descriptions: Adoption, Impact, And Developer Interventions, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

GitHub's Copilot for Pull Requests (PRs) is a promising service aiming to automate various developer tasks related to PRs, such as generating summaries of changes or providing complete walkthroughs with links to the relevant code. As this innovative technology gains traction in the Open Source Software (OSS) community, it is crucial to examine its early adoption and its impact on the development process. Additionally, it offers a unique opportunity to observe how developers respond when they disagree with the generated content. In our study, we employ a mixed-methods approach, blending quantitative analysis with qualitative insights, to examine 18,256 PRs in …


Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun Jul 2024

Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Adversarial examples pose a security threat to many critical systems built on neural networks. While certified training improves robustness, it also decreases accuracy noticeably. Despite various proposals for addressing this issue, the significant accuracy drop remains. More importantly, it is not clear whether there is a certain fundamental limit on achieving robustness whilst maintaining accuracy. In this work, we offer a novel perspective based on Bayes errors. By adopting Bayes error to robustness analysis, we investigate the limit of certified robust accuracy, taking into account data distribution uncertainties. We first show that the accuracy inevitably decreases in the pursuit of …


Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner Jul 2024

Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Conceptualising and debugging a microservice architecture can be a challenge for developers due to the complex topology of inter-service communication, which may only apparent when viewing the architecture as a whole. In this paper, we present MicroKarta, a dashboard containing three types of network diagram that visualise complex microservice architectures, and that are designed to address problems faced by developers of these architectures. Initial feedback from industry developers has been positive. This dashboard can be used by developers to explore and debug microservice architectures, and can be used to compare the effectiveness of different types of network visualisation for assisting …


Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude Jul 2024

Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude

Research Collection School Of Computing and Information Systems

Identifying security issues early is encouraged to reduce the latent negative impacts on software systems. Code review is a widely-used method that allows developers to manually inspect modified code, catching security issues during a software development cycle. However, existing code review studies often focus on known vulnerabilities, neglecting coding weaknesses, which can introduce real-world security issues that are more visible through code review. The practices of code reviews in identifying such coding weaknesses are not yet fully investigated. To better understand this, we conducted an empirical case study in two large open-source projects, OpenSSL and PHP. Based on 135,560 code …


Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang Jul 2024

Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang

Research Collection School Of Computing and Information Systems

Constraint solving is one of the main challenges for symbolic execution. Caching is an effective mechanism to reduce the number of the solver invocations in symbolic execution and is adopted by many mainstream symbolic execution engines. However, caching can not perform well on all programs. How to improve caching’s effectiveness is challenging in general. In this work, we propose a partial solution-based caching method for improving caching’s effectiveness. Our key idea is to utilize the partial solutions inside the constraint solving to generate more cache entries. A partial solution may satisfy other constraints of symbolic execution. Hence, our partial solution-based …


Refining Chatgpt-Generated Code: Characterizing And Mitigating Code Quality Issues, Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, David Lo Jun 2024

Refining Chatgpt-Generated Code: Characterizing And Mitigating Code Quality Issues, Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, David Lo

Research Collection School Of Computing and Information Systems

Since its introduction in November 2022, ChatGPT has rapidly gained popularity due to its remarkable ability in language understanding and human-like responses. ChatGPT, based on GPT-3.5 architecture, has shown great promise for revolutionizing various research fields, including code generation. However, the reliability and quality of code generated by ChatGPT remain unexplored, raising concerns about potential risks associated with the widespread use of ChatGPT-driven code generation.In this article, we systematically study the quality of 4,066 ChatGPT-generated programs of code implemented in two popular programming languages, i.e., Java and Python, for 2,033 programming tasks. The goal of this work is threefold. First, …


Smart Hpa: A Resource-Efficient Horizontal Pod Auto-Scaler For Microservice Architectures, Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo Jun 2024

Smart Hpa: A Resource-Efficient Horizontal Pod Auto-Scaler For Microservice Architectures, Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo

Research Collection School Of Computing and Information Systems

Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, container orchestration platforms such as Kubernetes feature Horizontal Pod Auto-scalers (HPAs) designed to adjust the resources of microservices to accommodate fluctuating workloads. However, existing HPAs are not suitable for resourceconstrained environments, as they make scaling decisions based on the individual resource capacities of microservices, leading to service unavailability and performance degradation. Furthermore, HPA architectures exhibit several issues, including inefficient data processing and a lack of coordinated scaling operations. To address these concerns, we propose Smart HPA, a …


Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye Jun 2024

Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye

Research Collection School Of Computing and Information Systems

The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC Registry not being updated with new entries since 2020, the sustained development of smart contract analysis tools for detecting SWC-listed weaknesses highlights their ongoing significance in the field. However, evaluating these tools has proven challenging due to the absence of a large, unbiased, real-world dataset. To address this problem, we aim to build a large-scale SWC weakness dataset from real-world DApp projects. We recruited 22 participants and spent 44 person-months analyzing 1,199 open-source audit reports …


Applicability And Challenges Of Indoor Localization Using One-Sided Round Trip Time Measurements, Quang Hai Truong, Xi Kai Justin Lam, Guru Anand Anish, Rajesh Krishna Balan Jun 2024

Applicability And Challenges Of Indoor Localization Using One-Sided Round Trip Time Measurements, Quang Hai Truong, Xi Kai Justin Lam, Guru Anand Anish, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

Radio Frequency fingerprinting, based on WiFi or cellular signals, has been a popular approach for localization. However, adoptions in real-world applications have confronted with challenges due to low accuracy, especially in crowded environments. The received signal strength (RSS) could be easily interfered by a large number of other devices or strictly depends on physical surrounding environments, which may cause localization errors of a few meters. On the other hand, the fine time measurement (FTM) round-trip time (RTT) has shown compelling improvement in indoor localization with ~1-2 meter accuracy in both 2D and 3D environments [13]. This method relies on the …


Neuron Sensitivity Guided Test Case Selection, Dong Huang, Qingwen Bu, Yichao Fu, Yuhao Qing, Xiaofei Xie, Junjie Chen, Heming Cui Jun 2024

Neuron Sensitivity Guided Test Case Selection, Dong Huang, Qingwen Bu, Yichao Fu, Yuhao Qing, Xiaofei Xie, Junjie Chen, Heming Cui

Research Collection School Of Computing and Information Systems

Deep Neural Networks (DNNs) have been widely deployed in software to address various tasks (e.g., autonomous driving, medical diagnosis). However, they can also produce incorrect behaviors that result in financial losses and even threaten human safety. To reveal and repair incorrect behaviors in DNNs, developers often collect rich, unlabeled datasets from the natural world and label them to test DNN models. However, properly labeling a large number of datasets is a highly expensive and time-consuming task. To address the above-mentioned problem, we propose NSS, Neuron Sensitivity Guided Test Case Selection, which can reduce the labeling time by selecting valuable test …


Criticality Aware Canvas-Based Visual Perception At The Edge, Ila Gokarn Jun 2024

Criticality Aware Canvas-Based Visual Perception At The Edge, Ila Gokarn

Research Collection School Of Computing and Information Systems

Efficient and effective machine perception remains a formidable challenge in sustaining high fidelity and high throughput of perception tasks on affordable edge devices. This is especially due to the continuing increase in resolution of sensor streams (e.g., video input streams generated by 4K/8K cameras and neuromorphic event cameras that produce ≥ 10 MEvents/second) and computational complexity of Deep Neural Network (DNN) models, which overwhelms edge platforms, adversely impacting machine perception efficiency. Given the insufficiency of the available computation resources, a question then arises on whether selected regions/components of the perception task can be prioritized (and executed preferentially) to achieve highest …


Enhancing Government Service Delivery: A Case Study Of Acqar Implementation And Lessons Learned From Chatgpt Integration In A Singapore Government Agency, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh Jun 2024

Enhancing Government Service Delivery: A Case Study Of Acqar Implementation And Lessons Learned From Chatgpt Integration In A Singapore Government Agency, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh

Research Collection Lee Kong Chian School Of Business

This paper presents the pilot implementation of AI Based Citizen Question-Answer Recommender (ACQAR) as an attempt to enhance citizen service delivery within a Singaporean government agency. Drawing insights from previous studies on the Empath library's use in Service Level Agreement (SLA) prediction and the implementation of the Citizen Question-Answer system (CQAS), we redesigned the pilot system, ACQAR. ACQAR integrates the outputs from Empath X SLA predictor and CQAS as essential inputs to the ChatGPT engine, creating contextually aware responses for customer service officers to use as responses to the citizens.Empath X SLA predictor anticipates the expected service response time based …


Detecting Foot Strikes During Running With Earbuds, Changshuo Hu, Thivya Kandappu, Jake Stuchbury-Wass, Yang Liu, Anthony Tang, Cecelia Mascolo, Dong Ma Jun 2024

Detecting Foot Strikes During Running With Earbuds, Changshuo Hu, Thivya Kandappu, Jake Stuchbury-Wass, Yang Liu, Anthony Tang, Cecelia Mascolo, Dong Ma

Research Collection School Of Computing and Information Systems

Running is a widely embraced form of aerobic exercise, offering various physical and mental benefits. However, improper running gaits (i.e., the way of foot landing) can pose safety risks and impact running efficiency. As many runners lack the knowledge or continuous attention to manage their foot strikes during running, in this work, we present a portable and non-invasive running gait monitoring system. Specifically, we leverage the in-ear microphone on wireless earbuds to capture the vibrations generated by foot strikes. Landing with different parts of the foot (e.g., forefoot and heel) generates distinct vibration patterns, and thus we utilize machine learning …


Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude Jun 2024

Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude

Research Collection School Of Computing and Information Systems

This article looks into possible scenarios where developers might consider turning their free and open source software into protestware. Using different frameworks commonly used in artificial intelligence (AI) ethics, we extend the applications of AI ethics to the study of protestware.


Program Analysis Of C For Conversion To Memory-Safe Rust, Dylan Cassidy May 2024

Program Analysis Of C For Conversion To Memory-Safe Rust, Dylan Cassidy

Honors Scholar Theses

C is a memory-unsafe language, which can cause software security issues. Rust is a more recent high-performance language that has memory-safe features, which motivates developers to move software to Rust. However, given the large existing C codebase, this is a tedious task, and current approaches result in memory-unsafe blocks of code remaining unsafe after conversion. We seek to use program analysis techniques to create software that identifies blocks of C code that could be safely converted to memory-safe Rust, despite using seemingly memory- unsafe access patterns. We performed manual translation of functions within the libGeoIP C library to Rust, ensuring …


Machine Learning: Face Recognition, Mohammed E. Amin May 2024

Machine Learning: Face Recognition, Mohammed E. Amin

Publications and Research

This project explores the cutting-edge intersection of machine learning (ML) and face recognition (FR) technology, utilizing the OpenCV library to pioneer innovative applications in real-time security and user interface enhancement. By processing live video feeds, our system encodes visual inputs and employs advanced face recognition algorithms to accurately identify individuals from a database of photos. This integration of machine learning with OpenCV not only showcases the potential for bolstering security systems but also enriches user experiences across various technological platforms. Through a meticulous examination of unique facial features and the application of sophisticated ML algorithms and neural networks, our project …


Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz May 2024

Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Formal software testing education is important for building efficient QA professionals. Various aspects of quality assurance approaches are usually covered in courses for training software testing students. Automated Test Tools is one of the core courses in the software testing post-graduate curriculum due to the high demand for automated testers in the workforce. It is important to understand which factors are affecting student performance in the automated testing course to be able to assist the students early on based on their needs. Various metrics that are considered for predicting student performance in this testing course are student engagement, grades on …