Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Rochester Institute of Technology

Series

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 75

Full-Text Articles in Physical Sciences and Mathematics

A Primer On The Legendre Transformation, Steven J. Kilner, David L. Farnsworth Nov 2023

A Primer On The Legendre Transformation, Steven J. Kilner, David L. Farnsworth

Articles

Guidance is offered for understanding and using the Legendre transformation and its associated duality among functions and curves. The genesis of this paper was encounters with colleagues and students asking about the transformation. A main feature is simplicity of exposition, while keeping in mind the purpose or application for using the transformation.


Probability Distributions Arising In Connection With The Inspection Paradox For Bernoulli Trials., James E. Marengo, Anne Marino Himes, W. Cade Reinberger, David L. Farnsworth Nov 2023

Probability Distributions Arising In Connection With The Inspection Paradox For Bernoulli Trials., James E. Marengo, Anne Marino Himes, W. Cade Reinberger, David L. Farnsworth

Articles

In renewal theory, the Inspection Paradox refers to the fact that an interarrival period in a renewal process which contains a fixed inspection time tends to be longer than one for the corresponding uninspected process. We focus on the paradox for Bernoulli trials. Probability distributions and moments for the lengths of the interarrival periods are derived for the inspected process, and we compare them to those for the uninspected case.


The Fast And The Curious: Accelerating Literature Reviews With Ai, Jennifer Freer, Natalia Tingle Dolan, Gabrielle Wiersma Nov 2023

The Fast And The Curious: Accelerating Literature Reviews With Ai, Jennifer Freer, Natalia Tingle Dolan, Gabrielle Wiersma

Presentations and other scholarship

As the world of academic research shifts gears into the digital age, AI-powered tools are beginning to shape the scholarly landscape. Just as high-performance vehicles transformed the world of car racing, AI-powered tools like scite, Elicit, and Research Rabbit have the potential to revolutionize the traditional literature review process. This presentation will accelerate your understanding of AI literature review tools and how these technologies can turbocharge the research process. Navigating between traditional library tools and AI-powered systems can be like choosing the right vehicle for the race. AI tools can enhance the speed, depth, and breadth of literature reviews, allowing …


The State Of Accessibility In Blackboard: Survey And User Reviews Case Study, Mohamed Wiem Mkaouer, Wajdi Aljedaani, Stephanie Ludi, Mohammed Alkahtani, Marcelo M. Eler, Marouane Kessentini, Ali Ouni Apr 2023

The State Of Accessibility In Blackboard: Survey And User Reviews Case Study, Mohamed Wiem Mkaouer, Wajdi Aljedaani, Stephanie Ludi, Mohammed Alkahtani, Marcelo M. Eler, Marouane Kessentini, Ali Ouni

Articles

Context: Nowadays, mobile applications (or apps) have become vital in our daily life, particularly within education. Many institutions increasingly rely on mobile apps to provide access to all their students. However, many education mobile apps remain inaccessible to users with disabilities who need to utilize accessibility features like talkback or screen reader features. Accessibility features have to be considered in mobile apps to foster equity and inclusion in the educational environment allowing to use of such apps without limitations. Gaps in the accessibility to educational systems persist.

Objective: In this paper, we focus on the accessibility of the Blackboard mobile …


Modeling And Fitting Two-Way Tables Containing Outliers, David L. Farnsworth Feb 2023

Modeling And Fitting Two-Way Tables Containing Outliers, David L. Farnsworth

Articles

A model is proposed for two-way tables of measurement data containing outliers. The two independent variables are categorical and error free. Neither missing values nor replication are present. The model consists of the sum of a customary additive part that can be fit using least squares and a part that is composed of outliers. Recommendations are made for methods for identifying cells containing outliers and for fitting the model. A graph of the observations is used to determine the outliers’ locations. For all cells containing an outlier, replacement values are determined simultaneously using a classical missing-data tool. The result is …


A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim Jan 2023

A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim

Articles

This report presents a mathematical model of juvenile delinquency in the New York State. In particular, we develop a juvenile delinquency system of non-linear differential equations using the mathematical epidemiology framework. In constructing this model, we assume that juvenile delinquency can be studied as a socially infectious disease. The stability of the juvenile delinquency-free equilibrium of the model is examined using the standard non-linear dynamical systems theory technique. We carried out a data fitting based on real-life data from the New York State Criminal Justice Services. The research result reveals that the formulated model conforms with the available data and …


An Exploratory Study On Refactoring Documentation In Issues Handling, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni May 2022

An Exploratory Study On Refactoring Documentation In Issues Handling, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni

Articles

Understanding the practice of refactoring documentation is of paramount importance in academia and industry. Issue tracking systems are used by most software projects enabling developers, quality assurance, managers, and users to submit feature requests and other tasks such as bug fixing and code review. Although recent studies explored how to document refactoring in commit messages, little is known about how developers describe their refactoring needs in issues. In this study, we aim at exploring developer-reported refactoring changes in issues to better understand what developers consider to be problematic in their code and how they handle it. Our approach relies on …


Code Review Practices For Refactoring Changes: An Empirical Study On Openstack, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Moatz Chouchen, Ali Ouni May 2022

Code Review Practices For Refactoring Changes: An Empirical Study On Openstack, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Moatz Chouchen, Ali Ouni

Articles

Modern code review is a widely used technique employed in both industrial and open-source projects to improve software quality, share knowledge, and ensure adherence to coding standards and guidelines. During code review, developers may discuss refactoring activities before merging code changes in the code base. To date, code review has been extensively studied to explore its general challenges, best practices and outcomes, and socio-technical aspects. However, little is known about how refactoring is being reviewed and what developers care about when they review refactored code. Hence, in this work, we present a quantitative and qualitative study to understand what are …


Controlling Unequal Surface Energy Results Caused By Test Liquids: The Case Of Uv/O3 Treated Pet, Bilge N. Altay, Paul D. Fleming, Md Arifur Rahman, Alexandra Pekarovicova, Bruce Myers, Cem Aydemir, Arif Karademir Apr 2022

Controlling Unequal Surface Energy Results Caused By Test Liquids: The Case Of Uv/O3 Treated Pet, Bilge N. Altay, Paul D. Fleming, Md Arifur Rahman, Alexandra Pekarovicova, Bruce Myers, Cem Aydemir, Arif Karademir

Articles

Ultraviolet/ozone (UV/O3) treatment has been reported to be an effective method to modify properties such as wettability, adhesion or adsorption of plastic surfaces. The change in the surface is measured by contact angle analysis, which employs liquids and their surface tensions (ST) to estimate the surface energy (SE). We found two different practices in the scientific community: (1) the majority of researchers adopted the ST value of liquids from the literature, while (2) other researchers conducted real-time measurements in the lab under ambient conditions prior to SE estimation. To the best of our knowledge, there is no study that compares …


Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D Feb 2022

Advancing Ubiquitous Collaboration For Telehealth - A Framework To Evaluate Technology-Mediated Collaborative Workflow For Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover Md, Pengcheng Shi Ph.D

Articles

Healthcare systems are under siege globally regarding technology adoption; the recent pandemic has only magnified the issues. Providers and patients alike look to new enabling technologies to establish real-time connectivity and capability for a growing range of remote telehealth solutions. The migration to new technology is not as seamless as clinicians and patients would like since the new workflows pose new responsibilities and barriers to adoption across the telehealth ecosystem. Technology-mediated workflows (integrated software and personal medical devices) are increasingly important in patient-centered healthcare; software-intense systems will become integral in prescribed treatment plans [1]. My research explored the path to …


Probability Models With Discrete And Continuous Parts, James E. Marengo, David L. Farnsworth Feb 2022

Probability Models With Discrete And Continuous Parts, James E. Marengo, David L. Farnsworth

Articles

In mathematical statistics courses, students learn that the quadratic function E ((X – x )-squared) is minimized when x is the mean of the random variable X, and that the graphs of this function for any two distributions of X are simply translates of each other. We focus on the problem of minimizing the function defined by y ( x) = E ( IX – xI-squared ) in the context of mixtures of probability distributions of the discrete, absolutely continuous, and singular continuous types. This problem is important, for example, in Bayesian statistics, when one attempts to compute the decision …


Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman Jan 2022

Satdbailiff- Mining And Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah Alomar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, Christian D. Newman

Articles

Self-Admitted Technical Debt (SATD) is a metaphorical concept to describe the self-documented addition of technical debt to a software project in the form of source code comments. SATD can linger in projects and degrade source-code quality, but it can also be more visible than unintentionally added or undocumented technical debt. Understanding the implications of adding SATD to a software project is important because developers can benefit from a better understanding of the quality trade-offs they are making. However, empirical studies, analyzing the survivability and removal of SATD comments, are challenged by potential code changes or SATD comment updates that may …


Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li Dec 2021

Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li

Articles

Goals: This paper discusses the need for a predictable method to evaluate gains and gaps of collaborative technology-mediated workflows and introduces an evaluation framework to address this need. Methods: The Collaborative Space Analysis Framework (CS-AF), introduced in this research, is a cross-disciplinary evaluation method designed to evaluate technology-mediated collaborative workflows. The 5-step CS-AF approach includes: (1) current-state workflow definition, (2) current-state (baseline) workflow assessment, (3) technology-mediated workflow development and deployment, (4) technology-mediated workflow assessment, (5) analysis, and conclusions. For this research, a comprehensive, empirical study of hypertension exam workflow for telehealth was conducted using the CS-AF approach. Results: The CS-AF …


On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu Dec 2021

On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu

Articles

Commit messages are the atomic level of software documentation. They provide a natural language description of the code change and its purpose. Messages are critical for software maintenance and program comprehension. Unlike documenting feature updates and bug fixes, little is known about how developers document their refactoring activities. Specifically, developers can perform multiple refactoring operations, including moving methods, extracting classes, renaming attributes, for various reasons, such as improving software quality, managing technical debt, and removing defects. Yet, there is no systematic study that analyzes the extent to which the documentation of refactoring accurately describes the refactoring operations performed at the …


On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni Dec 2021

On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni

Articles

Context: Refactoring is the art of modifying the design of a system without altering its behavior. The idea is to reorganize variables, classes and methods to facilitate their future adaptations and comprehension. As the concept of behavior preservation is fundamental for refactoring, several studies, using formal verification, language transformation and dynamic analysis, have been proposed to monitor the execution of refactoring operations and their impact on the program semantics. However, there is no existing study that examines the available behavior preservation strategies for each refactoring operation.

Objective: This paper identifies behavior preservation approaches in the research literature. Method: We conduct, …


Behind The Scenes: On The Relationship Between Developer Experience And Refactoring, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Anthony Peruma, Christian D. Newman, Ali Ouni Oct 2021

Behind The Scenes: On The Relationship Between Developer Experience And Refactoring, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Anthony Peruma, Christian D. Newman, Ali Ouni

Articles

Refactoring is widely recognized as one of the efficient techniques to manage technical debt and maintain a healthy software project through enforcing best design practices, or coping with design defects. Previous refactoring surveys have shown that code refactoring activities are mainly executed by developers who have sufficient knowledge of the system’s design, and disposing of leadership roles in their development teams. However, these surveys were mainly limited to specific projects and companies. In this paper, we explore the generalizability of the previous results by analyzing 800 open-source projects. We mine their refactoring activities, and we identify their corresponding contributors. Then, …


Insights And Lessons Learned From The Design, Development And Deployment Of Pervasive Location-Based Mobile Systems “In The Wild”, Konstantinos Papangelis, Alan Chamberlain, Nicolas Lalone, Ting Cao Jul 2021

Insights And Lessons Learned From The Design, Development And Deployment Of Pervasive Location-Based Mobile Systems “In The Wild”, Konstantinos Papangelis, Alan Chamberlain, Nicolas Lalone, Ting Cao

Presentations and other scholarship

This paper, based on a reflective approach, presents several insights and lessons learned from the design, development, and deployment of a location-based social network and a location-based game. These are analyzed and discussed against the life-cycle of our studies and range from engaging with the participants to dealing with technical issues while on the field. Overall, the insights and lessons learned illustrate that one should be prepared and flexible enough to accommodate any issues as they arise in a professional manner considering not only the results of the study but also the participants and the researchers involved.The aim of this …


Locating Identities In Time: An Examination Of The Impact Of Temporality On Presentations Of The Self Through Location-Based Social Networks, Konstantinos Papangelis, Ioanna Lykourentzou, Vassilis-Javed Khan, Alan Chamberlain, Ting Cao, Micahel Saker, Nicolas Lalone Jul 2021

Locating Identities In Time: An Examination Of The Impact Of Temporality On Presentations Of The Self Through Location-Based Social Networks, Konstantinos Papangelis, Ioanna Lykourentzou, Vassilis-Javed Khan, Alan Chamberlain, Ting Cao, Micahel Saker, Nicolas Lalone

Articles

Studies of identity and location-based social networks (LBSN) have tended to focus on the performative aspects associated with marking one’s location. Yet, these studies often present this practice as being an a priori aspect of locative media. What is missing from this research is a more granular understanding of how this process develops over time. Accordingly, we focus on the first six weeks of 42 users beginning to use an LBSN we designed and named GeoMoments. Through our analysis of our users' activities, we contribute to understanding identity and LBSN in two distinct ways. First, we show how LBSN users …


1d Conditional Generative Adversarial Network For Spectrum-To-Spectrum Translation Of Simulated Chemical Reflectance Signatures, Cara Murphy, John Kerekes Jun 2021

1d Conditional Generative Adversarial Network For Spectrum-To-Spectrum Translation Of Simulated Chemical Reflectance Signatures, Cara Murphy, John Kerekes

Articles

The classification of trace chemical residues through active spectroscopic sensing is challenging due to the lack of physics-based models that can accurately predict spectra. To overcome this challenge, we leveraged the field of domain adaptation to translate data from the simulated to the measured domain for training a classifier. We developed the first 1D conditional generative adversarial network (GAN) to perform spectrum-to-spectrum translation of reflectance signatures. We applied the 1D conditional GAN to a library of simulated spectra and quantified the improvement in classification accuracy on real data using the translated spectra for training the classifier. Using the GAN-translated library, …


Pivot Points In Bivariate Linear Regression, David L. Farnsworth, Carl V. Lutzer Jun 2021

Pivot Points In Bivariate Linear Regression, David L. Farnsworth, Carl V. Lutzer

Articles

There are little-noticed points in the plane, which are artifacts of linear regression. The points, which are called pivot points, are the intersections of sets of regression lines. We derive the coordinates of the pivot point and explain its sources. We show how a pivot point arises in a certain notable data set, which has been analyzed often for points of high leverage. We obtain the application of pivot points that shortens calculations when updating a set of bivariate observations by adding a new point.


A Geometric Approach To Conditioning And The Search For Minimum Variance Unbiased Estimators, David L. Farnsworth, James E. Marengo Jun 2021

A Geometric Approach To Conditioning And The Search For Minimum Variance Unbiased Estimators, David L. Farnsworth, James E. Marengo

Articles

Our purpose is twofold: to present a prototypical example of the conditioning technique to obtain the best estimator of a parameter and to show that this technique resides in the structure of an inner product space. The technique uses conditioning of an unbiased estimator on a sufficient statistic. This procedure is founded upon the conditional variance formula, which leads to an inner product space and a geometric interpretation. The example clearly illustrates the dependence on the sampling methodology. These advantages show the power and centrality of this process.


2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio May 2021

2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio

Presentations and other scholarship

Spatial experience is an important subject in various fields, and in HCI it has been mostly investigated in the urban scale. Research on human scale spaces has focused mostly on the personal meaning or aesthetic and embodied experiences in the space. Further, spatial experience is increasingly topical in envisioning how to build and interact with technologies in our everyday lived environments, particularly in so-called smart cities. This workshop brings researchers and practitioners from diverse fields to collaboratively discover new ways to understand and capture human scale spatial experience and envision its implications to future technological and creative developments in our …


Mining And Managing Big Data Refactoring For Design Improvement: Are We There Yet?, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni May 2021

Mining And Managing Big Data Refactoring For Design Improvement: Are We There Yet?, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Ali Ouni

Articles

Refactoring is a set of code changes applied to improve the internal structure of a program, without altering its external behavior. With the rise of continuous integration and the awareness of the necessity of managing technical debt, refactoring has become even more popular in recent software builds. Recent studies indicate that developers often perform refactorings. If we consider all refactorings performed across all projects, this consists of the refactoring knowledge that represents a rich source of information that can be useful for both developers and practitioners to better understand how refactoring is being applied in practice. However, mining, processing, and …


Refactoring Practices In The Context Of Modern Code Review: An Industrial Case Study At Xerox, Eman Abdullah Alomar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini May 2021

Refactoring Practices In The Context Of Modern Code Review: An Industrial Case Study At Xerox, Eman Abdullah Alomar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini

Articles

Modern code review is a common and essential 2 practice employed in both industrial and open-source projects 3 to improve software quality, share knowledge, and ensure con4 formance with coding standards. During code review, developers 5 may inspect and discuss various changes including refactoring 6 activities before merging code changes in the code base. To date, 7 code review has been extensively studied to explore its general 8 challenges, best practices and outcomes, and socio-technical 9 aspects. However, little is known about how refactoring activities 10 are being reviewed, perceived, and practiced. 11 This study aims to reveal insights into …


Finding The Needle In A Haystack: On The Automatic Identification Of Accessibility User Reviews, Eman Abdullah Alomar, Wajdi Aljedaani, Murtaza Tamjeed, Mohamed Wiem Mkaouer, Yasime Elglaly May 2021

Finding The Needle In A Haystack: On The Automatic Identification Of Accessibility User Reviews, Eman Abdullah Alomar, Wajdi Aljedaani, Murtaza Tamjeed, Mohamed Wiem Mkaouer, Yasime Elglaly

Articles

In recent years, mobile accessibility has become an important trend with the goal of allowing all users the possibility of using any app without many limitations. User reviews include insights that are useful for app evolution. However, with the increase in the amount of received reviews, manually analyzing them is tedious and time-consuming, especially when searching for accessibility reviews. The goal of this paper is to support the automated identification of accessibility in user reviews, to help technology professionals in prioritizing their handling, and thus, creating more inclusive apps. Particularly, we design a model that takes as input accessibility user …


Physics-Guided Neural Network For Predicting Chemical Signatures, Cara Murphy, John Kerekes Apr 2021

Physics-Guided Neural Network For Predicting Chemical Signatures, Cara Murphy, John Kerekes

Articles

Achieving high classification accuracy on trace chemical residues in active spectroscopic sensing is challenging due to the limited amount of training data available to the classifier. Such classifiers often rely on physics-based models for generating training data though these models are not always accurate when compared to measured data. To overcome this challenge, we developed a physics-guided neural network (PGNN) for predicting chemical reflectance for a set of parameterized inputs that is more accurate than the state-of-the-art physics-based signature model for chemical residues. After training the PGNN, we use it to generate a library of predicted spectra for training a …


Landlords Of The Digital World: How Territoriality And Social Identity Predict Playing Intensity In Location-Based Games, Samuli Laato, Bastian Kordyaka, A.K.M. Najmul Islam, Konstantinos Papangelis Jan 2021

Landlords Of The Digital World: How Territoriality And Social Identity Predict Playing Intensity In Location-Based Games, Samuli Laato, Bastian Kordyaka, A.K.M. Najmul Islam, Konstantinos Papangelis

Presentations and other scholarship

Popular location-based games (LBGs) such as Pokemon GO have been downloaded hundreds of millions of times and have been shown to have a positive impact on mild exercise and social well-being of their players. Several currently popular LBGs introduce a gamified implementation of territorial conflict, where players are divided into teams that battle for the ownership of geographically distributed points of interest. We investigate how social factors and territoriality influence playing intensity in the context of Pok´emon GO. Using reasoning from social identity theory, we propose a structural model connecting territoriality, sociality and playing intensity. To test the model, we …


Collaborative Behavior, Performance And Engagement With Visual Analytics Tasks Using Mobile Devices, Lei Chen, Hai-Ning Liang, Feiyu Lu, Konstantinos Papangelis, Ka Lok Man, Yong Yue Jan 2021

Collaborative Behavior, Performance And Engagement With Visual Analytics Tasks Using Mobile Devices, Lei Chen, Hai-Ning Liang, Feiyu Lu, Konstantinos Papangelis, Ka Lok Man, Yong Yue

Articles

Interactive visualizations are external tools that can support users’ exploratory activities. Collaboration can bring benefits to the exploration of visual representations or visu‐ alizations. This research investigates the use of co‐located collaborative visualizations in mobile devices, how users working with two different modes of interaction and view (Shared or Non‐Shared) and how being placed at various position arrangements (Corner‐to‐Corner, Face‐to‐Face, and Side‐by‐Side) affect their knowledge acquisition, engagement level, and learning efficiency. A user study is conducted with 60 partici‐ pants divided into 6 groups (2 modes×3 positions) using a tool that we developed to support the exploration of 3D visual …


An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill Jan 2021

An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill

Articles

This paper presents an ensemble part-of-speech tagging approach for source code identifiers. Ensemble tagging is a technique that uses machine-learning and the output from multiple part-of-speech taggers to annotate natural language text at a higher quality than the part-of-speech taggers are able to obtain independently. Our ensemble uses three state-of-the-art part-of-speech taggers: SWUM, POSSE, and Stanford. We study the quality of the ensemble's annotations on five different types of identifier names: function, class, attribute, parameter, and declaration statement at the level of both individual words and full identifier names. We also study and discuss the weaknesses of our tagger to …


On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill Dec 2020

On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill

Articles

Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …