Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (60)
- Software Engineering (24)
- Business (19)
- Databases and Information Systems (15)
- Earth Sciences (14)
-
- Physics (10)
- Social and Behavioral Sciences (10)
- Technology and Innovation (9)
- Chemistry (8)
- Mathematics (8)
- Statistics and Probability (7)
- Engineering (5)
- Management Information Systems (5)
- Numerical Analysis and Scientific Computing (5)
- Geography (4)
- Law (4)
- Oceanography and Atmospheric Sciences and Meteorology (4)
- Physical and Environmental Geography (4)
- Applied Mathematics (3)
- Applied Statistics (3)
- Artificial Intelligence and Robotics (3)
- Environmental Sciences (3)
- Geomorphology (3)
- Life Sciences (3)
- Longitudinal Data Analysis and Time Series (3)
- Management Sciences and Quantitative Methods (3)
- Natural Resources Management and Policy (3)
- Oceanography (3)
- Statistical Methodology (3)
- Keyword
-
- Haptic (8)
- Environment (5)
- Fuzzy (5)
- Modelling (5)
- Chemistry (4)
-
- Control (4)
- Intelligent (4)
- Rendered (4)
- Virtual (4)
- Automatic (3)
- Education (3)
- Geometric (3)
- Grinding (3)
- Household surveys (3)
- Human (3)
- Ict (3)
- Location-based services (3)
- Acquisition (2)
- Artifacts (2)
- Assembly (2)
- Behavioral tracking (2)
- Breadcrumb (2)
- CMMB (2)
- Carillon (2)
- Computational statistics (2)
- Computationally (2)
- Covert surveillance (2)
- Emerging Technologies (2)
- Enhanced (2)
- Environmental Law (2)
- Publication
-
- Professor Fazel Naghdy (30)
- David LO (24)
- Arcot Desai NARASIMHALU (17)
- Caroline P Lubert (6)
- Samuel A Morton (6)
-
- Associate Professor Robert Graham Clark (5)
- David E. Wilkins (4)
- Hans Conrad zur Loye (4)
- Professor Katina Michael (4)
- Shilad Sen (4)
- Barry R Holstein (3)
- Gang-Ryung Uh (3)
- Jean Taylor Ellis (3)
- Kuldeep Kumar (3)
- Lisa S. Yocco (3)
- Professor ZHU, Fu Rong (3)
- Christopher N. Roman (2)
- Elizabeth Shoop (2)
- Heath Ecroyd (2)
- John C. Dernbach (2)
- Michael Stanley Smith (2)
- Stephanie Dixon (2)
- Aileen Koh (1)
- Bernd Buldt (1)
- Chaitra H Nagaraja (1)
- Diana Wood Conroy (1)
- Eugenio Almeida (1)
- Frank Lynch (1)
- Gabriela Doria (1)
- George H Baker (1)
Articles 1 - 30 of 167
Full-Text Articles in Physical Sciences and Mathematics
Amyloid Fibril Formation By Bovine Milk Alpha(S2)-Casein Occurs Under Physiological Conditions Yet Is Prevented By Its Natural Counterpart, Alpha(S1)-Casein, David Thorn, Heath Ecroyd, M Sunde, Stephen Poon, John Carver
Amyloid Fibril Formation By Bovine Milk Alpha(S2)-Casein Occurs Under Physiological Conditions Yet Is Prevented By Its Natural Counterpart, Alpha(S1)-Casein, David Thorn, Heath Ecroyd, M Sunde, Stephen Poon, John Carver
Heath Ecroyd
The calcified proteinaceous deposits, or corpora amylacea, of bovine mammary tissue often comprise a network of amyloid fibrils, the origins of which have not been fully elucidated. Here, we demonstrate by transmission electron microscopy, dye binding assays, and X-ray fiber diffraction that bovine milk alpha(s2)-casein, a protein synthesized and secreted by mammary epithelial cells, readily forms fibrils in vitro. As a component of whole alpha(s)-casein, alpha(s2)-casein was separated from alpha(s1)-casein under nonreducing conditions via cation-exchange chromatography. Upon incubation at neutral pH and 37 degrees C, the spherical particles typical of alpha(s2)-casein rapidly converted to twisted, ribbon-like fibrils similar to 12 …
Protective Interactions Of Dairy Peptides With Fibril Structures And Relevance To Alzheimer's Disease, Louise Bennett, Williams Roderick, Heath Ecroyd, Yanqin Liu, Sunanda Sudharmarajan, John Carver
Protective Interactions Of Dairy Peptides With Fibril Structures And Relevance To Alzheimer's Disease, Louise Bennett, Williams Roderick, Heath Ecroyd, Yanqin Liu, Sunanda Sudharmarajan, John Carver
Heath Ecroyd
Selected dairy caseins have been shown to have capacity for chaperone-like regulation of folding pathways of other caseins, specifically in preventing development of fibrillar aggregates of beta sheet structure. An assay based on fibril formation by reduced and carboxymethylated-kappa casein (RCM-kCn) was thus used to screen for anti-fibril activity among a selection of dairy protein hydrolysates, in order to discover peptides with possible anti-fibril, chaperone activity. From the selection of eight dairy hydrolysates based on different dairy protein fractions, two of the hydrolysates of whey protein exhibited superior anti-fibril bioactivity against RCM-kCn and amyloid beta (Aβ), the peptide associated with …
Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop
Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop
David LO
Protecting running programs from exploits has been the focus of many host-based intrusion detection systems. To this end various formal methods have been developed that either require manual construction of attack signatures or modelling of normal program behavior to detect exploits. In terms of the ability to discover new attacks before the infection spreads, the former approach has been found to be lacking in flexibility. Consequently, in this paper, we present an anomaly monitoring system, NORT, that verifies on-the-fly whether running programs comply to their expected normal behavior. The model of normal behavior is based on a rich set of …
Search-Based Fault Localization, Shaowei Wang, David Lo, Lingxiao Jiang, - Lucia, Hoong Chuin Lau
Search-Based Fault Localization, Shaowei Wang, David Lo, Lingxiao Jiang, - Lucia, Hoong Chuin Lau
David LO
Many spectrum-based fault localization measures have been proposed in the literature. However, no single fault localization measure completely outperforms others: a measure which is more accurate in localizing some bugs in some programs is less accurate in localizing other bugs in other programs. This paper proposes to compose existing spectrum-based fault localization measures into an improved measure. We model the composition of various measures as an optimization problem and present a search-based approach to explore the space of many possible compositions and output a heuristically near optimal composite measure. We employ two search-based strategies including genetic algorithm and simulated annealing …
Towards More Accurate Retrieval Of Duplicate Bug Reports, Chengnian Sun, David Lo, Siau-Cheng Khoo, Jing Jiang
Towards More Accurate Retrieval Of Duplicate Bug Reports, Chengnian Sun, David Lo, Siau-Cheng Khoo, Jing Jiang
David LO
In a bug tracking system, different testers or users may submit multiple reports on the same bugs, referred to as duplicates, which may cost extra maintenance efforts in triaging and fixing bugs. In order to identify such duplicates accurately, in this paper we propose a retrieval function (REP) to measure the similarity between two bug reports. It fully utilizes the information available in a bug report including not only the similarity of textual content in summary and description fields, but also similarity of non-textual fields such as product, component, version, etc. For more accurate measurement of textual similarity, we extend …
Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang
Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang
David LO
Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location alone is not sufficient in helping programmers understand why the bug happens and how to fix it. Furthermore, a single location might not be powerful enough to discriminate failures from correct executions. To address the above challenges, there have been recent studies on extracting bug signatures which are composed of multiple locations appearing together in a particular order signifying an occurrence …
Mining Top-K Large Structural Patterns In A Massive Network, Feida Zhu, Qiang Qu, David Lo, Xifeng Yan, Jiawei Han, Philip S. Yu
Mining Top-K Large Structural Patterns In A Massive Network, Feida Zhu, Qiang Qu, David Lo, Xifeng Yan, Jiawei Han, Philip S. Yu
David LO
With ever-growing popularity of social networks, web and bio-networks, mining large frequent patterns from a single huge network has become increasingly important. Yet the existing pattern mining methods cannot offer the efficiency desirable for large pattern discovery. We propose Spider- Mine, a novel algorithm to efficiently mine top-K largest frequent patterns from a single massive network with any user-specified probability of 1 − ϵ. Deviating from the existing edge-by-edge (i.e., incremental) pattern-growth framework, SpiderMine achieves its efficiency by unleashing the power of small patterns of a bounded diameter, which we call “spiders”. With the spider structure, our approach adopts a …
Recommending People In Developers' Collaboration Network, Didi Surian, Nian Liu, David Lo, Hanghang Tong, Ee Peng Lim, Christos Faloutsos
Recommending People In Developers' Collaboration Network, Didi Surian, Nian Liu, David Lo, Hanghang Tong, Ee Peng Lim, Christos Faloutsos
David LO
Many software developments involve collaborations of developers across the globe. This is true for both open-source and closed-source development efforts. Developers collaborate on different projects of various types. As with any other teamwork endeavors, finding compatibility among members in a development team is helpful towards the realization of the team’s goal. Compatible members tend to share similar programming style and naming strategy, communicate well with one another, etc. However, finding the right person to work with is not an easy task. In this work, we extract information available from Sourceforge.Net, the largest database of open source software, and build developer …
Towards Succinctness In Mining Scenario-Based Specifications, David Lo, Shahar Maoz
Towards Succinctness In Mining Scenario-Based Specifications, David Lo, Shahar Maoz
David LO
Specification mining methods are used to extract candidate specifications from system execution traces. A major challenge for specification mining is succinctness. That is, in addition to the soundness, completeness, and scalable performance of the specification mining method, one is interested in producing a succinct result, which conveys a lot of information about the system under investigation but uses a short, machine and human-readable representation. In this paper we address the succinctness challenge in the context of scenario-based specification mining, whose target formalism is live sequence charts (LSC), an expressive extension of classical sequence diagrams. We do this by adapting three …
Computational Studies Of The Role Of Metal Oxides In Combustion-Generated Environmentally Persistent Free Radicals, Randall Hall
Computational Studies Of The Role Of Metal Oxides In Combustion-Generated Environmentally Persistent Free Radicals, Randall Hall
Randall W. Hall
No abstract provided.
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
Christopher N. Roman
In the summer of 2011, the Exploration Vessel NAUTILUS is undertaking a four-month expedition to the Black, Aegean and Mediterranean Seas, and North Atlantic Ocean. The primary goal of the NAUTILUS is to create a focus of international leadership for the development and integration of leading-edge technologies, educational programs, field operations, and public outreach programs for ocean exploration, in partnership with NOAA, National Geographic Society, Office of Naval Research, and other sponsors. To do so, the program uses a complement of deep submergence vehicle systems and “telepresence” technologies to engage scientists, educators and the public, both at sea and ashore, …
Investigating The Impact Of Restricted Irrigation Practices On Soil Moisture Variability And Distribution In A Dry Farmed Vineyard Site, Boise, Idaho, J. Duffin, David Wilkins, J. Guenther
Investigating The Impact Of Restricted Irrigation Practices On Soil Moisture Variability And Distribution In A Dry Farmed Vineyard Site, Boise, Idaho, J. Duffin, David Wilkins, J. Guenther
David E. Wilkins
Changing climate in semiarid regions may result in increased water stresses for agricultural production as timing and form of precipitation may result in diminished surface water for irrigation. To prepare for these changing conditions, studies are being conducted on the possibility of dry farmed agriculture as an alternative to irrigated production. This study specifically investigates the ability to grow productive wine grapes with limited or zero irrigation in the Boise Front Foothills, West Foothills TIC Vineyard, located in a climate zone receiving less than 300 mm of annual precipitation. Traditional vineyard performance factors such as planting densities, soil type, rootstock, …
Sophomore Field Experiences As An Introduction To The Nature Of Geosciences: Data Collection And Analysis Using Dendrochronology, David Wilkins, M. Kunkel
Sophomore Field Experiences As An Introduction To The Nature Of Geosciences: Data Collection And Analysis Using Dendrochronology, David Wilkins, M. Kunkel
David E. Wilkins
Opportunities for field experiences are often presented as a primary reason that undergraduate students gravitate towards geosciences as a major field of study. What those students may not understand is that, for professional geoscientists, field experiences go beyond the freshman-level field trip, and students may overlook the processes of observation, data collection and analysis that are inherent to the science. The Department of Geosciences at Boise State has developed a set of sophomore field experience courses designed to "set the hook" into new majors and prepare them for field experiences in upper division coursework. These sophomore courses have been shown …
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
Christopher N. Roman
Detailed bathymetric maps of the sea floor with centimeter level resolution can be produced by underwater vehicles using multibeam sonars and structured light laser imaging. Over spatial scales up to tens of thousands of square meters it is possible to produce maps gridded to sub centimeter levels. This level of accuracy demands detailed treatments of the sensor relative data, the vehicle navigation data and the vehicle to sensor position and rotational offsets. The presented results will show comparisons between these two sensor modalities. Data have a been collected during recent field programs to the Kolumbo volcanic crater and the Southern …
Shock-Associated Noise Generation In Curved Turbulent Coanda Wall Jets, Caroline Lubert, R. Shafer
Shock-Associated Noise Generation In Curved Turbulent Coanda Wall Jets, Caroline Lubert, R. Shafer
Caroline P Lubert
No abstract provided.
Mining Temporal Rules From Program Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu
Mining Temporal Rules From Program Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu
David LO
Specification mining is a process of extracting specifications, often from program execution traces. These specifications can in turn be used to aid program understanding, monitoring and verification. There are a number of dynamic-analysis-based specification mining tools in the literature, however none so far extract past time temporal expressions in the form of rules stating: "whenever a series of events occurs, previously another series of events has happened". Rules of this format are commonly found in practice and useful for various purposes. Most rule-based specification mining tools only mine future-time temporal expression. Many past-time temporal rules like "whenever a resource is …
Efficient Mining Of Iterative Patterns For Software Specification Discovery, David Lo, Siau-Cheng Khoo, Chao Liu
Efficient Mining Of Iterative Patterns For Software Specification Discovery, David Lo, Siau-Cheng Khoo, Chao Liu
David LO
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggravated by the phenomenon of software evolution. There is a need for automated tools to extract specifications to aid program comprehension. In this paper, a novel technique to efficiently mine common software temporal patterns from traces is proposed. These patterns shed light on program behaviors, and are termed iterative patterns. They capture unique characteristic of software traces, typically not found in arbitrary sequences. Specifically, due to loops, interesting iterative patterns can occur multiple times …
Smartic: Specification Mining Architecture With Trace Filtering And Clustering, David Lo, Siau-Cheng Khoo
Smartic: Specification Mining Architecture With Trace Filtering And Clustering, David Lo, Siau-Cheng Khoo
David LO
Improper management of software evolution, compounded by imprecise, and changing requirements, along with the "short time to market" requirement, commonly leads to a lack of up-to-date specifications. This can result in software that is characterized by bugs, anomalies and even security threats. Software specification mining is a new technique to address this concern by inferring specifications automatically. In this paper, we propose a novel API specification mining architecture called SMArTIC Specification Mining Architecture with Trace fIltering and Clustering) to improve the accuracy, robustness and scalability of specification miners. This architecture is constructed based on two hypotheses: (1) Erroneous traces should …
Mining Software Specifications, David Lo, Siau-Cheng Khoo
Mining Software Specifications, David Lo, Siau-Cheng Khoo
David LO
No abstract provided.
Model Checking In The Absence Of Code, Model And Properties, David Lo, Siau-Cheng Khoo
Model Checking In The Absence Of Code, Model And Properties, David Lo, Siau-Cheng Khoo
David LO
Model checking is a major approach in ensuring software correctness. It verifies a model converted from code against some formal properties. However, difficulties and programmers ’ reluctance to formalize formal properties have been some hurdles to its widespread industrial adoption. Also, with the advent of commercial off-the-shelf (COTS) components provided by third party vendors, model checking is further challenged as often only a binary version of the code is provided by vendors. Interestingly, latest instrumentation tools like PIN and Valgrind have enable execution traces to be collected dynamically from a running program. In this preliminary study, we investigate what can …
Mining Past-Time Temporal Rules: A Dynamic Analysis Approach, David Lo, Siau-Cheng Khoo, Chao Liu
Mining Past-Time Temporal Rules: A Dynamic Analysis Approach, David Lo, Siau-Cheng Khoo, Chao Liu
David LO
No abstract provided.
Efficient Mining Of Recurrent Rules From A Sequence Database, David Lo, Siau-Cheng Khoo, Chao Liu
Efficient Mining Of Recurrent Rules From A Sequence Database, David Lo, Siau-Cheng Khoo, Chao Liu
David LO
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventually a series of consequent events occurs". Recurrent rules are intuitive and characterize behaviors in many domains. An example is in the domain of software specifications, in which the rules capture a family of program properties beneficial to program verification and bug detection. Recurrent rules generalize existing work on sequential and episode rules by considering repeated occurrences of premise and consequent events within a sequence and across multiple sequences, and by removing the "window" …
Mining Modal Scenarios From Execution Traces, David Lo, Shahar Maoz, Siau-Cheng Khoo
Mining Modal Scenarios From Execution Traces, David Lo, Shahar Maoz, Siau-Cheng Khoo
David LO
Specification mining is a dynamic analysis process aimed at automatically inferring suggested specifications of a program from its execution traces. We describe a method, a framework, and a tool, for mining inter-object scenario-based specifications in the form of a UML2-compliant variant of Damm and Harel's Live Sequence Charts (LSC), which extends the classical partial order semantics of sequence diagrams with temporal liveness and symbolic class level lifelines, in order to generate compact and expressive specifications. Moreover, we use previous research work and tools developed for LSC to visualize, analyze, manipulate, test, and thus evaluate the scenario-based specifications we mine. Our …
Towards Better Quality Specification Miners, David Lo, Siau-Cheng Khoo
Towards Better Quality Specification Miners, David Lo, Siau-Cheng Khoo
David LO
Softwares are often built without specification. Tools to automatically extract specification from software are needed and many techniques have been proposed. One type of these specifications – temporal API specification – is often specified in the form of automaton (i.e., FSA/PFSA). There have been many work on mining software temporal specification using dynamic analysis techniques; i.e., analysis of software program traces. Unfortunately, the issues of scalability, robustness and accuracy of these techniques have not been comprehensively addressed. In this paper, we describe a framework that enables assessments of the performance of a specification miner in generating temporal specification of software …
Mining Modal Scenarios-Based Specifications From Execution Trace Of Reactive Systems, David Lo, Shahar Maoz, Siau-Cheng Khoo
Mining Modal Scenarios-Based Specifications From Execution Trace Of Reactive Systems, David Lo, Shahar Maoz, Siau-Cheng Khoo
David LO
Specification mining is a dynamic analysis process aimed at automatically inferring suggested specifications of a program from its execution traces. We describe a novel method, framework, and tool, for mining inter-object scenario-based specifications in the form of a UML2-compliant variant of Damm and Harels Live Sequence Charts (LSC). LSC extends the classical partial order semantics of sequence diagrams with temporal liveness and symbolic class level lifelines, in order to generate compact and expressive specifications. The output of our algorithm is a sound and complete set of statistically significant LSCs (i.e., satisfying given thresholds of support and confidence), mined from an …
Mining Patterns And Rules For Software Specification Discovery, David Lo, Siau-Cheng Khoo
Mining Patterns And Rules For Software Specification Discovery, David Lo, Siau-Cheng Khoo
David LO
Software specifications are often lacking, incomplete and outdated in the industry. Lack and incomplete specifications cause various software engineering problems. Studies have shown that program comprehension takes up to 45% of software development costs. One of the root causes of the high cost is the lack-of documented specification. Also, outdated and incomplete specification might potentially cause bugs and compatibility issues. In this paper, we describe novel data mining techniques to mine or reverse engineer these specifications from the pool of software engineering data. A large amount of software data is available for analysis. One form of software data is program …
Mining Specifications In Diversified Formats From Execution Traces, David Lo
Mining Specifications In Diversified Formats From Execution Traces, David Lo
David LO
Software evolves; this phenomenon causes increase in maintenance efforts, problem in comprehending the ever-changing code base and difficulty in verifying software correctness. As software changes, often the documented specification is not updated. Outdated specification adds challenge to the understanding of the code base during maintenance tasks. Also, software changes might induce bugs, anomalies and even security threats. To address the above issues, we propose an array of specification mining techniques to mine software specifications in diversified formats from program execution traces. Case studies on various systems show that the extracted specifications shed light on the behaviors of systems under analysis. …
Data Mining For Software Engineering, Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu
Data Mining For Software Engineering, Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu
David LO
To improve software productivity and quality, software engineers are increasingly applying data mining algorithms to various software engineering tasks. However, mining SE data poses several challenges. The authors present various algorithms to effectively mine sequences, graphs, and text from such data.
Smartic: Towards Building An Accurate, Robust And Scalable Specification Miner, David Lo, Siau-Cheng Khoo
Smartic: Towards Building An Accurate, Robust And Scalable Specification Miner, David Lo, Siau-Cheng Khoo
David LO
Improper management of software evolution, compounded by imprecise, and changing requirements, along with the “short time to market ” requirement, commonly leads to a lack of up-to-date specifications. This can result in software that is characterized by bugs, anomalies and even security threats. Software specification mining is a new technique to address this concern by inferring specifications automatically. In this paper, we propose a novel API specification mining architecture called SMArTIC (Specification Mining Architecture with Trace fIltering and Clustering) to improve the accuracy, robustness and scalability of specification miners. This architecture is constructed based on two hypotheses: (1) Erroneous traces …
Mining Scenario-Based Specifications With Value-Based Invariants, David Lo, Shahar Maoz
Mining Scenario-Based Specifications With Value-Based Invariants, David Lo, Shahar Maoz
David LO
There have been a number of studies on mining candidate specifications from execution traces. Some extract specifications corresponding to value-based invariants, while others work on inferring ordering constraints. In this work, we merge our previous work on mining scenario-based specifications, extracting ordering constraints in the form of live sequence charts (LSC), a visual specification language, with Daikon, a tool for mining value-based invariants. The resulting approach strengthens the expressive power of the mined scenarios by enriching them with scenario-specific value-based invariants. The concept is illustrated using a preliminary case study on a real application.