Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Software evolution (2)
- Software repository mining (2)
- Automation (1)
- Computer science (1)
- Dark patterns (1)
-
- Data mining (1)
- Data science (1)
- Degree of interest (1)
- Design (1)
- Digital harm (1)
- Empirical studies (1)
- GCP (1)
- Google BigQuery (1)
- Google Cloud Platform (1)
- Google Cloud Storage (1)
- Google Vision (1)
- Information architecture (1)
- Logging (1)
- Machine learning systems (1)
- Privacy (1)
- Product design (1)
- Python (1)
- Raspberry pi (1)
- Refactoring (1)
- Safe technology (1)
- Software transformation (1)
- Source code analysis (1)
- Technical debt (1)
- User experience (1)
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …
An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja
An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja
Publications and Research
Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap in knowledge of how ML systems evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed in real-world, open-source software, …
An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja
An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja
Publications and Research
Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed in real-world, open-source …
Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel
Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel
Publications and Research
You’ve been there before. You thought you could trust someone with a secret. You thought it would be safe, but found out later that they blabbed to everyone. Or maybe they didn’t share it, but the way they used it felt manipulative. You gave more than you got and it didn’t feel fair. But now that it’s out there, do you even have control anymore?
Ok. Now imagine that person was your supermarket. Or your bank. Or your boss.
As designers of digital spaces for consumer products and services, how often do we consider the relationship we have with our …
Automated Evolution Of Feature Logging Statement Levels Using Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi Khatchadourian, Mehdi Bagherzadeh
Automated Evolution Of Feature Logging Statement Levels Using Git Histories And Degree Of Interest, Yiming Tang, Allan Spektor, Raffi Khatchadourian, Mehdi Bagherzadeh
Publications and Research
Logging—used for system events and security breaches to more informational yet essential aspects of software features—is pervasive. Given the high transactionality of today’s software, logging effectiveness can be reduced by information overload. Log levels help alleviate this problem by correlating a priority to logs that can be later filtered. As software evolves, however, levels of logs documenting surrounding feature implementations may also require modification as features once deemed important may have decreased in urgency and vice-versa. We present an automated approach that assists developers in evolving levels of such (feature) logs. The approach, based on mining Git histories and manipulating …