Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (140)
- City University of New York (CUNY) (15)
- Western University (10)
- Rochester Institute of Technology (7)
- University of Arkansas, Fayetteville (6)
-
- Dakota State University (4)
- Montclair State University (4)
- San Jose State University (4)
- Air Force Institute of Technology (3)
- Chapman University (3)
- Louisiana State University (3)
- Southern Methodist University (3)
- Brigham Young University (2)
- Liberty University (2)
- Minnesota State University Moorhead (2)
- Seton Hall University (2)
- Technological University Dublin (2)
- The College of Wooster (2)
- The University of Akron (2)
- University of Central Florida (2)
- University of Denver (2)
- University of Nebraska at Omaha (2)
- University of Tennessee, Knoxville (2)
- Washington University in St. Louis (2)
- West Virginia University (2)
- Arcadia University (1)
- Ateneo de Manila University (1)
- Bard College (1)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
- Keyword
-
- Machine learning (18)
- Deep learning (11)
- Software (10)
- Android (9)
- Computer Science (8)
-
- Software engineering (8)
- Fuzzing (6)
- Machine Learning (6)
- Empirical studies (5)
- Empirical study (5)
- Refactoring (5)
- Testing (5)
- Computer science (4)
- Cyber-physical systems (4)
- Feature extraction (4)
- GitHub (4)
- HCI (4)
- Human Computer Interaction (4)
- IoT (4)
- Natural Language Processing (4)
- Programming (4)
- Artificial intelligence (3)
- Code search (3)
- Computer bugs (3)
- Computer vision (3)
- Concurrency (3)
- Deep Learning (3)
- Java 8 (3)
- Malware (3)
- Self-admitted technical debt (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (135)
- Open Educational Resources (9)
- Articles (8)
- Electronic Thesis and Dissertation Repository (7)
- Dissertations and Theses Collection (Open Access) (5)
-
- Publications and Research (5)
- Computer Science and Computer Engineering Undergraduate Honors Theses (4)
- Masters Theses & Doctoral Dissertations (4)
- Computer Science and Engineering Theses and Dissertations (3)
- Electrical and Computer Engineering Publications (3)
- LSU Doctoral Dissertations (3)
- Theses and Dissertations (3)
- Department of Computer Science Faculty Scholarship and Creative Works (2)
- Doctoral Dissertations (2)
- Electronic Theses and Dissertations (2)
- Engineering Faculty Articles and Research (2)
- Faculty Publications (2)
- Faculty Publications, Computer Science (2)
- Faculty Research, Scholarly, and Creative Activity (2)
- Graduate Theses and Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Honors Theses (2)
- McKelvey School of Engineering Theses & Dissertations (2)
- Petersheim Academic Exposition (2)
- Senior Honors Theses (2)
- Senior Independent Study Theses (2)
- Student Academic Conference (2)
- Theses, Dissertations and Culminating Projects (2)
- Williams Honors College, Honors Research Projects (2)
- All Undergraduate Theses and Capstone Projects (1)
- Publication Type
- File Type
Articles 1 - 30 of 260
Full-Text Articles in Physical Sciences and Mathematics
Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott
Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott
LSU Doctoral Dissertations
Modern human-machine systems such as microservices rely upon agile engineering practices which require changes to be tested and released more frequently than classically engineered systems. A critical step in the testing of such systems is the generation of realistic workloads or load testing. Generated workload emulates the expected behaviors of users and machines within a system under test in order to find potentially unknown failure states. Typical testing tools rely on static testing artifacts to generate realistic workload conditions. Such artifacts can be cumbersome and costly to maintain; however, even model-based alternatives can prevent adaptation to changes in a system …
Analysis Of Github Pull Requests, Canon Ellis
Analysis Of Github Pull Requests, Canon Ellis
Computer Science and Engineering Theses and Dissertations
The popularity of the software repository site GitHub has created a rise in the Pull Based Development Models' use. An essential portion of pull-based development is the creation of Pull Requests. Pull Requests often have to be reviewed by an individual to be approved and accepted into the Master branch of a software repository. The reviewing process can often be time-consuming and introduce a relatively high level of lost development time. This paper examines thousands of pull requests to understand the most valuable metadata of pull requests. We then introduce metrics in comparing the metadata of pull requests to understand …
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Computer Science and Engineering Theses and Dissertations
Mobile applications have become a high priority for software developers. Researchers and practitioners are working toward improving and optimizing the energy efficiency and performance of mobile applications due to the capacity limitation of mobile device processors and batteries. In addition, mobile applications have become popular among end-users, developers have introduced a wide range of features that increase the complexity of application code.
To improve and enhance the maintainability, extensibility, and understandability of application code, refactoring techniques were introduced. However, implementing such techniques to mobile applications affects energy efficiency and performance. To evaluate and categorize software implementation and optimization efficiency, several …
Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami
Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami
Electronic Thesis and Dissertation Repository
Abstract. Context and Motivation: Non-functional requirements (NFRs) of a system need to be classified into different types such as usability, performance, etc. This would enable stakeholders to ensure the completeness of their work by extracting specific NFRs related to their expertise. Question/Problem: Because of the size and complexity of requirement specification documents, the manual classification of NFRs is time-consuming, labour-intensive, and error-prone. We thus need an automated solution that can provide a highly accurate and efficient categorization of NFRs. Principal ideas/results: In this investigation, using natural language processing and supervised machine learning (SML) techniques, we investigate with feature extraction techniques …
Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena
Methodological Aspects Of Distance Learning For Developing The Professional Competence Of Students Of The Direction "Computer Engineering, B Kuznetsova, Gulnora Muxtarova, Umida Azimova, Kim Yelena
Bulletin of TUIT: Management and Communication Technologies
This work is based on the use of distance learning technologies in education, which will make it possible to individualize training, and in turn contributes to the formation of professionally important qualities for students of the direction of "Computer Engineering". The experimental work was aimed at developing a technology for the formation of students' professional competence.
The article shows that the mastery by students of knowledge, skills and abilities in the field of computer engineering was aimed at their conscious application in solving problems of the educational and cognitive process, and subsequently in professional activity.
The article presents the results …
A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford
A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford
Master of Science in Software Engineering Theses
Intellectual property, commonly known as IP, is complex. The four main types of software IP, which is what this thesis will focus on, are patents, trade secrets, trademarks, and copyright. Patents, trade secrets, and copyrights were all studied by this thesis. Software IP is unique in that it can by copyrighted. Different IP owners, which can be businesses of different types, individuals, and universities, often have different strategies as to how to use their IP portfolio. This thesis studies differences in IP usage between these entities specifically in the field of software. Large and small software companies were analyzed specifically. …
School District Boundaries Map, Nick Huffman
School District Boundaries Map, Nick Huffman
Honors Theses
The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
Articles
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …
Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan
Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Nocturia, or the need to void (or urinate) one or more times in the middle of night time sleeping, represents a significant economic burden for individuals and healthcare systems. Although it can be diagnosed in the hospital, most people tend to regard nocturia as a usual event, resulting in underreported diagnosis and treatment. Data from self-reporting via a voiding diary may be irregular and subjective especially among the elderly due to memory problems. This study aims to detect the presence of nocturia through passive in-home monitoring to inform intervention (e.g., seeking diagnosis and treatment) to improve the physical and mental …
Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen
Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen
Research Collection School Of Computing and Information Systems
Deep learning (DL) has been applied widely, and the quality of DL system becomes crucial, especially for safety-critical applications. Existing work mainly focuses on the quality analysis of DL models, but lacks attention to the underlying frameworks on which all DL models depend. In this work, we propose Audee, a novel approach for testing DL frameworks and localizing bugs. Audee adopts a search-based approach and implements three different mutation strategies to generate diverse test cases by exploring combinations of model structures, parameters, weights and inputs. Audee is able to detect three types of bugs: logical bugs, crashes and Not-a-Number (NaN) …
Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra
Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra
Research Collection School Of Computing and Information Systems
While Deep Neural Network (DNN) models have provided remarkable advances in machine vision capabilities, their high computational complexity and model sizes present a formidable roadblock to deployment in AIoT-based sensing applications. In this paper, we propose a novel paradigm by which peer nodes in a network can collaborate to improve their accuracy on person detection, an exemplar machine vision task. The proposed methodology requires no re-training of the DNNs and incurs minimal processing latency as it extracts scene summaries from the collaborators and injects back into DNNs of the reference cameras, on-the-fly. Early results show promise with improvements in recall …
Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra
Robust, Fine-Grained Occupancy Estimation Via Combined Camera & Wifi Indoor Localization, Anuradha Ravi, Archan Misra
Research Collection School Of Computing and Information Systems
We describe the development of a robust, accurate and practically-validated technique for estimating the occupancy count in indoor spaces, based on a combination of WiFi & video sensing. While fusing these two sensing-based inputs is conceptually straightforward, the paper demonstrates and tackles the complexity that arises from several practical artefacts, such as (i) over-counting when a single individual uses multiple WiFi devices and under-counting when the individual has no such device; (ii) corresponding errors in image analysis due to real-world artefacts, such as occlusion, and (iii) the variable errors in mapping image bounding boxes (which can include multiple possible types …
How Do Monetary Incentives Influence Prosocial Fundraising? An Empirical Investigation Of Matching Subsidies On Crowdfunding, Zhiyuan Gao
Dissertations and Theses Collection (Open Access)
Monetary incentives, such as matching subsidies, are widely used in traditional fundraising and crowdfunding platforms to boost funding activities and improve funding outcomes. However, its effectiveness on prosocial fundraising is still unclear from both theoretical (Bénabou and Tirole, 2006; Frey, 1997; Meier, 2007a) and empirical studies (Ariely et al., 2009; Karlan and List, 2007; Rondeau and List, 2008). This dissertation aims to examine the effectiveness of matching subsidies on prosocial fundraising in the crowdfunding context. Specifically, I study how the presence of matching subsidies affects overall funding outcomes and funding dynamics in the online prosocial crowdfunding environment.
The first essay …
Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma
Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma
Dissertations and Theses Collection (Open Access)
Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …
Modeling User-Affected Software Properties For Open Source Software Supply Chains, Tapajit Dey
Modeling User-Affected Software Properties For Open Source Software Supply Chains, Tapajit Dey
Doctoral Dissertations
Background: Open Source Software development community relies heavily on users of the software and contributors outside of the core developers to produce top-quality software and provide long-term support. However, the relationship between a software and its contributors in terms of exactly how they are related through dependencies and how the users of a software affect many of its properties are not very well understood.
Aim: My research covers a number of aspects related to answering the overarching question of modeling the software properties affected by users and the supply chain structure of software ecosystems, viz. 1) Understanding how software usage …
Graphmp: I/O-Efficient Big Graph Analytics On A Single Commodity Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao
Graphmp: I/O-Efficient Big Graph Analytics On A Single Commodity Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao
Research Collection School Of Computing and Information Systems
Recent studies showed that single-machine graph processing systems can be as highly competitive as cluster-based approaches on large-scale problems. While several out-of-core graph processing systems and computation models have been proposed, the high disk I/O overhead could significantly reduce performance in many practical cases. In this paper, we propose GraphMP to tackle big graph analytics on a single machine. GraphMP achieves low disk I/O overhead with three techniques. First, we design a vertex-centric sliding window (VSW) computation model to avoid reading and writing vertices on disk. Second, we propose a selective scheduling method to skip loading and processing unnecessary edge …
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Graduate Theses and Dissertations
In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …
Mcst : An App For Patron Awareness Of Covid-19 Safety Measures Instituted By Small Businesses, Jorge Torres
Mcst : An App For Patron Awareness Of Covid-19 Safety Measures Instituted By Small Businesses, Jorge Torres
Theses, Dissertations and Culminating Projects
Small businesses across America are having restrictions placed upon them due to the COVID-19 pandemic. Those fortunate enough to remain open now face the challenge of trying to generate enough revenue to stay afloat. Small businesses, with their lack of funds, have resorted to listing their safety precautions on their front door to inform patrons. However, viewing these rules would require patrons to leave their homes. Additionally, there is no consistent set of rules being enforced by the government which is dangerous as some patrons may feel that stricter procedures be in place. These inconsistencies and lack of information can …
Implementation Of An Electronic Alert For Improving Adherence To Diabetic Foot Exam Screenings In Type 2 Diabetic Patients In Primary Care Clinics, Ruby Denson
Student Scholarly Projects
Practice Problem: Patients with type 2 diabetes mellitus (T2DM) are at an increased risk of complications including foot ulcerations (Harris-Hayes et al., 2020). Preventive care is essential for the early detection of foot ulcers but despite the advantages of preventive screening, a limited number of primary care providers perform annual foot exams (Williams et al., 2018).
PICOT: The clinical question that guided this project was, “In adult patients with T2DM receiving care in a primary care setting, will the implementation of an electronic clinical reminder alert (ECR) increase provider adherence to performing an annual diabetic foot exam and risk …
Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry
Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry
Theses and Dissertations
In light of the tremendous development of technology in the modern world in which we live, privacy concerns are increasing, especially after the massive spread of distributed computing systems and the technologies that depend on it, whether in personal devices or public services. Hence, this research proposes refinements on the concept of privacy for enhancing the development of privacy-related strategies in distributed computing systems to address the elements of privacy. In particular, the study introduces the new concept of Privacy Appetite to describe and model the nature of the relationship between the intended disclosure of private information and gained value …
Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu
Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu
Research Collection School Of Computing and Information Systems
The security assurance of SSL/TLS critically depends on the correct validation of X.509 certificates. Therefore, it is important to check whether a certificate is correctly validated by the SSL/TLS implementations. Although differential testing has been proven to be effective in finding semantic bugs, it still suffers from the following limitations: (1) The syntax of test cases cannot be correctly guaranteed. (2) Current test cases are not diverse enough to cover more implementation behaviours. This paper tackles these problems by introducing SADT, a novel syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations. We first propose a …
Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim
Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim
Research Collection School Of Computing and Information Systems
As IoT ecosystem has been fast-growing recently, there have been various security concerns of this new computing paradigm. Malicious IoT apps gaining access to IoT devices and capabilities to execute sensitive operations (sinks), e.g., controlling door locks and switches, may cause serious security and safety issues. Unlike traditional mobile/web apps, IoT apps highly interact with a wide variety of physical IoT devices and respond to environmental events, in addition to user inputs. It is therefore important to conduct comprehensive testing of IoT apps to identify possible anomalous behaviours. On the other hand, it is also important to optimize the number …
Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera
Jointly Optimizing Sensing Pipelines For Multimodal Mixed Reality Interaction, Darshana Rathnayake, Ashen De Silva, Dasun Puwakdandawa, Lakmal Meegahapola, Archan Misra, Indika Perera
Research Collection School Of Computing and Information Systems
Natural human interactions for Mixed Reality Applications are overwhelmingly multimodal: humans communicate intent and instructions via a combination of visual, aural and gestural cues. However, supporting low-latency and accurate comprehension of such multimodal instructions (MMI), on resource-constrained wearable devices, remains an open challenge, especially as the state-of-the-art comprehension techniques for each individual modality increasingly utilize complex Deep Neural Network models. We demonstrate the possibility of overcoming the core limitation of latency--vs.--accuracy tradeoff by exploiting cross-modal dependencies -- i.e., by compensating for the inferior performance of one model with an increased accuracy of more complex model of a different modality. We …
Watch Out! Motion Is Blurring The Vision Of Your Deep Neural Networks, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Jian Wang, Bing Yu, Wei Feng, Yang Liu
Watch Out! Motion Is Blurring The Vision Of Your Deep Neural Networks, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Jian Wang, Bing Yu, Wei Feng, Yang Liu
Research Collection School Of Computing and Information Systems
The state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples with additive random noise-like perturbations. While such examples are hardly found in the physical world, the image blurring effect caused by object motion, on the other hand, commonly occurs in practice, making the study of which greatly important especially for the widely adopted real-time image processing tasks (e.g., object detection, tracking). In this paper, we initiate the first step to comprehensively investigate the potential hazards of blur effect for DNN, caused by object motion. We propose a novel adversarial attack method that can generate visually natural motion-blurred adversarial examples, …
Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham
Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham
Theses/Capstones/Creative Projects
This Honors Thesis project involves programming additional features for a Java application developed as a team for the UNO Computer Science Capstone Project. The purpose of this Capstone project was to develop an updated Pull File system for Dragon’s Lair Comics & Games, which has been running an outdated system in need of improvement. The pull file is an organizational system used by customers to reserve new issues of specific on-going comic book series as they are released. The comic book store can use a pull file system to maintain records of customers, store inventory, and order requests, gaining important …
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
Theses
Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Publications and Research
Actor concurrency is becoming increasingly important in the development of real-world software systems. Although actor concurrency may be less susceptible to some multithreaded concurrency bugs, such as low-level data races and deadlocks, it comes with its own bugs that may be different. However, the fundamental characteristics of actor concurrency bugs, including their symptoms, root causes, API usages, examples, and differences when they come from different sources are still largely unknown. Actor software development can significantly benefit from a comprehensive qualitative and quantitative understanding of these characteristics, which is the focus of this work, to foster better API documentations, development practices, …
Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang
Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang
Research Collection School Of Computing and Information Systems
Defect prediction has been an active research area for over four decades. Despite numerous studies on defect prediction, the potential value of defect prediction in practice remains unclear. To address this issue, we performed a mixed qualitative and quantitative study to investigate what practitioners think, behave and expect in contrast to research findings when it comes to defect prediction. We collected hypotheses from open-ended interviews and a literature review, followed by a validation survey. We received 395 responses from practitioners. Some of our key findings include: 1) Over 90% of respondents are willing to adopt defect prediction techniques. 2) There …
Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra
Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra
Research Collection School Of Computing and Information Systems
We present ERICA, a digital personal trainer for users performing free weights exercises, with two key differentiators: (a) First, unlike prior approaches that either require multiple on-body wearables or specialized infrastructural sensing, ERICA uses a single in-ear "earable" device (piggybacking on a form factor routinely used by millions of gym-goers) and a simple inertial sensor mounted on each weight equipment; (b) Second, unlike prior work that focuses primarily on quantifying a workout, ERICA additionally identifies a variety of fine-grained exercising mistakes and delivers real-time, in-situ corrective instructions. To achieve this, we (a) design a robust approach for user-equipment association that …
Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi
Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
The overestimation caused by function approximation is a well-known property in Q-learning algorithms, especially in single-critic models, which leads to poor performance in practical tasks. However, the opposite property, underestimation, which often occurs in Q-learning methods with double critics, has been largely left untouched. In this article, we investigate the underestimation phenomenon in the recent twin delay deep deterministic actor-critic algorithm and theoretically demonstrate its existence. We also observe that this underestimation bias does indeed hurt performance in various experiments. Considering the opposite properties of single-critic and double-critic methods, we propose a novel triplet-average deep deterministic policy gradient algorithm that …