Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Software Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 266

Full-Text Articles in Physical Sciences and Mathematics

Rancang Bangun Aplikasi E-Report Pengaduan Masyarakat Design Public Complaint E-Report Application, Roviana H. Dai Dec 2017

Rancang Bangun Aplikasi E-Report Pengaduan Masyarakat Design Public Complaint E-Report Application, Roviana H. Dai

Elinvo (Electronics, Informatics, and Vocational Education)

Ombudsman RI merupakan lembaga negara yang bertugas menerima laporan dugaan maladministrasi. Ombudsman RI perwakilan provinsi Gorontalo menerima jumlah laporan yang cukup signifikan setiap tahunnya yaitu 122 laporan ditahun 2014, 138 laporan ditahun 2015 dan 146 laporan sepanjang tahun 2016. Tingginya beban penyelesaian laporan setiap Asisten mengakibatkan laporan-laporan jadi tidak tertanggulangi. Adapun tujuan dari penelitian ini yaitu mengusulkan sebuah sistem yang dapat menjadi early warning system, reminder/pengingat sekaligus membantu dalam monitoring laporan baik oleh internal Ombudsman maupun masyarakat sebagai Pelapor. Sistem yang akan dibuat menggunakan fitur sms gateway dan sistem berbasiskan web. Hasil dari penelitian ini yaitu dibuatkannya …


Analisis Aplikasi Jadwal Perkuliahan Berbasis Android, Daniswara Galuh Sukmandari Dec 2017

Analisis Aplikasi Jadwal Perkuliahan Berbasis Android, Daniswara Galuh Sukmandari

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menganalisis kualitas perangkat lunak pada aplikasi mobile jadwal perkuliahan berdasarkan standar kualitas ISO 25010 ysng mencakup aspek funtional suitability, compatibility, usability, dan performance efficiency. Metode yang digunakan dalam penelitian adalah Research and Development (R&D) dengan model waterfall. Hasil dari penelitian adalah aplikasi jadwal perkuliahan telah memenuhi standar kualitas perangkat lunak berdasarkan standar ISO 25010. Pengujian functional suitabilitymendapatkan hasil sebesar 100% yang berarti fungsi aplikasi telah berjalan dengan benar.Pengujian compatibilitymendapatkan hasil sebesar 100%. Pengujian usabilitymendapatkan hasil sebesar 79,63% dengan kategori Layak. Pengujian performance efficiencymendapatkan rata-rata waktu launchingsebesar 2,048 detik dan 0,095 detik untuk rata-rata waktu rendering


Sistem Pendukung Keputusan Klinis Untuk Memprediksi Kejadian Asfiksia Neonatorum, Efi Laila Latifah Dec 2017

Sistem Pendukung Keputusan Klinis Untuk Memprediksi Kejadian Asfiksia Neonatorum, Efi Laila Latifah

Elinvo (Electronics, Informatics, and Vocational Education)

Asfiksia neonatorum merupakan kegawatdaruratan bayi baru lahir berupa depresi pernafasan yang berlanjut sehingga menimbulkan berbagai komplikasi bahkan mengakibatkan kematian. Menurut RISKESDAS Indonesia 2007, 78,5% kematian bayi merupakan kematian neonatal dini dengan penyebab terbesar karena asfiksia neonatorum. Oleh karena itu diperlukan suatu alat untuk mendeteksi dini potensi atau resiko kejadian asfiksia neonatorum pada setiap kehamilan. Identifikasi dini tersebut dapat dilakukan dengan mengaplikasikan Rule Based Reasoning dengan metode Forward Chaining yang dilanjutkan dengan Case Based Reasoning dalam sebuah sistem. Sistem yang dikembangkan dalam penelitian ini menghasilkan output berupa prediksi skor APGAR neonatus. Hasil pengujian sistem dalam penelitian ini menunjukkan bahwa penerimaan sistem …


Pengujian Kualitas Kelayakan Perangkat Lunak Dengan Penerapanperancangan Model Rapid Application Development, Hari Toha Hidayat Dec 2017

Pengujian Kualitas Kelayakan Perangkat Lunak Dengan Penerapanperancangan Model Rapid Application Development, Hari Toha Hidayat

Elinvo (Electronics, Informatics, and Vocational Education)

Membangun suatu perangkat lunak yang berkualitas tidaklah mudah. Banyak hal yang harus diperhatikan dalam membuat suatu perangkat lunak yang berkualitas. Semakin berkualitas suatu perangkat lunak atau aplikasi maka akan semakin mahal harga yang dijual. Perangkat lunak yang berkualitas tidak hanya sekedar mencari keuntungan belaka akan tetapi mutu dari kualitas dan kuantitasnya yang sudah menjadi jaminan dari aplikasi yang ditawarkan. Pembuatan suatu perangkat lunak yang berkualitas selalu memperhatikan kebutuhan akan penggunanya, sehingga mampu memberikan solusi dari permasalahan yang dihadapi oleh para penggunanya. Selain itu, suatu aplikasi yang berkualitas selalu melalui tahapan - tahapan pengujian yang tidak singkat sehingga benar - benar …


Evaluasi Kualitas Aplikasi Mobile Kamus Istilah Jaringan Pada Platform Android Dengan Standar Iso/Iec 25010, Rohmad Dwi Jayanto Dec 2017

Evaluasi Kualitas Aplikasi Mobile Kamus Istilah Jaringan Pada Platform Android Dengan Standar Iso/Iec 25010, Rohmad Dwi Jayanto

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menguji aplikasi mobile kamus istilah jaringan komputer pada platform android menggunakan standar kualitas perangkat lunak ISO/IEC 25010 pada aspek functional suitability, compatibility, performance efficiency, danusability. Metode yang digunakan adalah research and development. Hasil dari penelitian ini menunjukkan bahwa aplikasi telah memenuhi standar ISO/IEC 25010 pada aspek (1) functional suitability seluruh fungsi dari aplikasi berjalan 100% yang artinya tidak ada fungsi yang gagal saat dilakukan pengujian, (2) compatibility aplikasi kompatibel 100% darisisico-existence, berbagai sistem operasi dan tipe perangkat yang digunakan untuk pengujian, (3) performance efficiency aplikasi berhasil dijalankan di 436 dari 452 perangkatuji AWS Device …


Pengujian Functionality Dan Performance Sistem Inforamasi Berbasis Web Menggunakan Framework Codeigniter Di Smk Negeri 1 Jogonalan Klaten, Patan Pindoyono Dec 2017

Pengujian Functionality Dan Performance Sistem Inforamasi Berbasis Web Menggunakan Framework Codeigniter Di Smk Negeri 1 Jogonalan Klaten, Patan Pindoyono

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menganalisis kualitas sistem informasi alumni berbasis web menggunakan framework CodeIgniter sehingga mampu: (1) mengurangi kesalahan pengelolaan data alumni SMK N 1 Jogonalan. (2) menyingkat waktu pencarian data alumni SMK N 1 Jogonalan. Pengujian yang digunakan pada penelitian ini adalah aspek functionality suitability dan aspek performance efficiency. Aspek functionality menggunakan test case yang mengacu pada analisis kebutuhan perangkat lunak. Sedangkan aspek performance efficiency dilakukan dengan menghitung waktu rata-rata respon dari sistem sebanyak lima kali percobaan. Hasil penelitian yang telah dilakukan menunjukan bahwa: (1) Sistem informasi yang dikembangkan dapat mengurangi kesalahan pegelolaan data, hal ini dibuktikan pada pada …


Uji Kelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website Di Smk Muhammadiyah 1 Bantul Dengan Faktor Kualitas Mccall, Daya Prisandi Mandala Dec 2017

Uji Kelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website Di Smk Muhammadiyah 1 Bantul Dengan Faktor Kualitas Mccall, Daya Prisandi Mandala

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untukmengetahuitingkatkelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul. Metode yang digunakan dalam penelitian ini adalahkuantitatif. Prosedur pengujiandalam penelitian ini adalah White-Box Testing, Black-Box Testing, Alpha Testing dan Beta Testing. Objek penelitian ini adalah perangkat lunak Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul. Teknik pengumpulan data dilakukan dengan kuesioner. Analisis data menggunakan analisis data kuantitatif. Hasil penelitian yang diperolehdariujikelayakan terhadap Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul dengan menggunakan faktor kualitas McCall, diperoleh hasil kelayakan oleh ahli menyatakan Layak dan pengguna menyatakan …


Pengembangan Sistem Informasi Manajemen Praktik Industri Di Jurusan Pendidikan Teknik Elktronika Uny Berbasis Website Menggunakan Yii Framework, Agung Rizki Subhan Dec 2017

Pengembangan Sistem Informasi Manajemen Praktik Industri Di Jurusan Pendidikan Teknik Elktronika Uny Berbasis Website Menggunakan Yii Framework, Agung Rizki Subhan

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk mengembangkan Sistem Informasi Manajemen Praktik Industri di Jurusan Pendidikan Teknik Elektronika Universitas Negeri Yogyakarta. Pengembangan dilakukan pada Juli 2016 sampai Desember 2016 di Jurusan Pendidikan Teknik Elektronika UNY. Pengembangan dilakukan dengan menggunakan model waterfall. Model waterfall terdiri dari analisis kebutuhan sistem, desain sistem, implementasi sistem dan pengujian sistem. Hasil dari penelitian ini adalah software Sistem Informasi Manajemen Praktik Industri di Jurusan Pendidikan Teknik Elektronika UNY berbasis web menggunakan Yii Framework. Fungsionalitas sistem diuji oleh 3 orang penguji yang masing masing menguji 52 fungsi. Dari pengujian tersebut, semua fungsi yang telah diuji dapat berjalan dengan baik. Sehingga, …


Underwater Acoustic Signal Analysis Toolkit, Kirk Bienvenu Jr Dec 2017

Underwater Acoustic Signal Analysis Toolkit, Kirk Bienvenu Jr

University of New Orleans Theses and Dissertations

This project started early in the summer of 2016 when it became evident there was a need for an effective and efficient signal analysis toolkit for the Littoral Acoustic Demonstration Center Gulf Ecological Monitoring and Modeling (LADC-GEMM) Research Consortium. LADC-GEMM collected underwater acoustic data in the northern Gulf of Mexico during the summer of 2015 using Environmental Acoustic Recording Systems (EARS) buoys. Much of the visualization of data was handled through short scripts and executed through terminal commands, each time requiring the data to be loaded into memory and parameters to be fed through arguments. The vision was to develop …


Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, Naresh Eeda Dec 2017

Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, Naresh Eeda

Electronic Thesis and Dissertation Repository

With the increase in the complexity of the systems being built and demand in the quality of service by the customers, developing and providing highly efficient real-time systems is one of the biggest challenges today for software enterprises. BluemixTM ─ IBM’s cloud offering implemented on Cloud Foundry, an open source “Platform as a Service” (PaaS), is an example of such a system. Currently, there are approx. 26 infrastructural services running in the background from where the data is fetched and is rendered on different dashboards of the system. However, the system suffers from performance issues.

This thesis explores the …


A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban Dec 2017

A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban

MS in Computer Science Project Reports

In academia, students and professors want a well-structured and implemented framework for writing and running code in both testing and learning environments. The current limitations of the paper and pencil medium have led to the creation of many different online grading systems. However, no known system provides all of the essential features our client is interested in. Our system, developed in conjunction with Doctor Halterman, offers the ability to build modules from flat files, allow code to be compiled and run in the browser, provide users with immediate feedback, support multiple languages, and offer a module designed specifically for an …


High Volume Test Automation With Yeager, Casey Doran Dec 2017

High Volume Test Automation With Yeager, Casey Doran

Theses and Dissertations

High Volume Automated Testing is a powerful family of software testing techniques which enable a variety of testing goals, including the discovery of hard-to-reproduce bugs, which can enable new levels of quality assurance when applied correctly. This thesis presents a software tool, Yeager, which may be used in conjunction with existing test code to execute tests similar to Long Sequence Regression Tests based on an inferred state-model of the system under test as provided by tester annotations of state transitions caused by individual test code snippets. The usefulness of the package is evaluated through the development and deployment of a …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad Dec 2017

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible for simulation …


Web Application For Graduate Course Recommendation System, Sayali Dhumal Dec 2017

Web Application For Graduate Course Recommendation System, Sayali Dhumal

Electronic Theses, Projects, and Dissertations

The main aim of the course advising system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The recommendation path displays the list of courses a student can take in each quarter from the first quarter after admission until the graduation quarter. The courses are filtered as per the student’s interest obtained from a questionnaire asked to the student.

The business logic involves building the recommendation algorithm. Also, the application is functionality-tested end-to-end by using nightwatch.js which is built on top of node.js. Test cases are written for every module …


Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding Dec 2017

Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding

Research Collection School Of Computing and Information Systems

In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to …


Robust Human Activity Recognition Using Lesser Number Of Wearable Sensors, Di Wang, Edwin Candinegara, Junhui Hou, Ah-Hwee Tan, Chunyan Miao Dec 2017

Robust Human Activity Recognition Using Lesser Number Of Wearable Sensors, Di Wang, Edwin Candinegara, Junhui Hou, Ah-Hwee Tan, Chunyan Miao

Research Collection School Of Computing and Information Systems

In recent years, research on the recognition of human physical activities solely using wearable sensors has received more and more attention. Compared to other types of sensory devices such as surveillance cameras, wearable sensors are preferred in most activity recognition applications mainly due to their non-intrusiveness and pervasiveness. However, many existing activity recognition applications or experiments using wearable sensors were conducted in the confined laboratory settings using specifically developed gadgets. These gadgets may be useful for a small group of people in certain specific scenarios, but probably will not gain their popularity because they introduce additional costs and they are …


Graphmp: An Efficient Semi-External-Memory Big Graph Processing System On A Single Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao Dec 2017

Graphmp: An Efficient Semi-External-Memory Big Graph Processing System On A Single Machine, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

Recent studies showed that single-machine graph processing systems can be as highly competitive as clusterbased approaches on large-scale problems. While several outof-core graph processing systems and computation models have been proposed, the high disk I/O overhead could significantly reduce performance in many practical cases. In this paper, we propose GraphMP to tackle big graph analytics on a single machine. GraphMP achieves low disk I/O overhead with three techniques. First, we design a vertex-centric sliding window (VSW) computation model to avoid reading and writing vertices on disk. Second, we propose a selective scheduling method to skip loading and processing unnecessary edge …


Web Application For Graduate Course Advising System, Sanjay Karrolla Dec 2017

Web Application For Graduate Course Advising System, Sanjay Karrolla

Electronic Theses, Projects, and Dissertations

The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.


What Do Developers Search For On The Web?, Xin Xia, Lingfeng Bao, David Lo, Pavneet Singh Kochhar, Ahmed E. Hassan, Zhenchang Xing Dec 2017

What Do Developers Search For On The Web?, Xin Xia, Lingfeng Bao, David Lo, Pavneet Singh Kochhar, Ahmed E. Hassan, Zhenchang Xing

Research Collection School Of Computing and Information Systems

Developers commonly make use of a web search engine such as Google to locate online resources to improve their productivity. A better understanding of what developers search for could help us understand their behaviors and the problems that they meet during the software development process. Unfortunately, we have a limited understanding of what developers frequently search for and of the search tasks that they often find challenging. To address this gap, we collected search queries from 60 developers, surveyed 235 software engineers from more than 21 countries across five continents. In particular, we asked our survey participants to rate the …


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu Dec 2017

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Computing and Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have …


D-Watch: Embracing “Bad” Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang Dec 2017

D-Watch: Embracing “Bad” Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Computing and Information Systems

Device-free localization, which does not require any device attached to the target, is playing a critical role in many applications, such as intrusion detection, elderly monitoring and so on. This paper introduces D-Watch, a device-free system built on the top of low cost commodity-off-the-shelf RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the ''bad'' multipaths to provide a decimeter-level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can be …


Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani Nov 2017

Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani

Master of Science in Software Engineering Theses

Contemporary Virtual Reality (VR) technologies offer an increasing number of functionalities including head-mounted displays (HMD), haptic and sound feedback, as well as motion tracking. This gives us the opportunity to leverage the immersive power offered by these technologies in the context of requirements elicitation, especially to surface those requirements that cannot be expressed via traditional techniques such as interviews and focus groups. The goal of this thesis is to survey uses of VR in requirements engineering, and to describe a method of elicitation using VR as a tool.

To validate the methodology, a research plan is developed with a strong …


Building The Ascend Siu Web Application, Lee Cooper, Cody Lingle, Ren Jing, Hallie Martin, Matt Gross, Nancy Martin Nov 2017

Building The Ascend Siu Web Application, Lee Cooper, Cody Lingle, Ren Jing, Hallie Martin, Matt Gross, Nancy Martin

ASA Multidisciplinary Research Symposium

This poster represents a year-long web application development project completed by undergraduate students in the Information Systems Technologies department at Southern Illinois University. The web application was developed for the Ascend registered student organization using Agile Scrum software engineering methods.


Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung Nov 2017

Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung

ASA Multidisciplinary Research Symposium

The purpose of this research is to demonstrate how to reengineer a legacy Database Application using to a target system with MVC and 3-layered architecture. A Coffee Inventory Management database application is used for legacy application. The benefits of the reengineering are discussed.


Software Reengineering: Reverse Engineering With Using 4+1 Architectural Views And Forward Engineering With Mvc Architecture, Shane Mueller Nov 2017

Software Reengineering: Reverse Engineering With Using 4+1 Architectural Views And Forward Engineering With Mvc Architecture, Shane Mueller

ASA Multidisciplinary Research Symposium

As software complexity is increasing exponentially in our modern era, software architecture becomes increasingly important. The separation of concerns through architecture allows each programmer the opportunity to limit their need of understanding to only the portion of code for which they are responsible for, thus saving large amounts of time.


Would You Like To Motivate Software Testers? Ask Them How, Ronnie Santos, Cleyton Magalhaes, Jorge Correia-Neto, Fabio Queda Silva, Luiz Fernando Capretz, Rodrigo Souza Nov 2017

Would You Like To Motivate Software Testers? Ask Them How, Ronnie Santos, Cleyton Magalhaes, Jorge Correia-Neto, Fabio Queda Silva, Luiz Fernando Capretz, Rodrigo Souza

Electrical and Computer Engineering Publications

Considering the importance of software testing to the development of high quality and reliable software systems, this paper aims to investigate how can work-related factors influence the motivation of software testers. Method. We applied a questionnaire that was developed using a previous theory of motivation and satisfaction of software engineers to conduct a survey-based study to explore and understand how professional software testers perceive and value work-related factors that could influence their motivation at work. Results. With a sample of 80 software testers we observed that software testers are strongly motivated by variety of work, creative tasks, recognition for their …


Learning Likely Invariants To Explain Why A Program Fails, Long H. Pham, Jun Sun, Lyly Tran Thi, Jingyi Wang, Xin Peng Nov 2017

Learning Likely Invariants To Explain Why A Program Fails, Long H. Pham, Jun Sun, Lyly Tran Thi, Jingyi Wang, Xin Peng

Research Collection School Of Computing and Information Systems

Debugging is difficult. Recent studies show that automatic bug localization techniques have limited usefulness. One of the reasons is that programmers typically have to understand why the program fails before fixing it. In this work, we aim to help programmers understand a bug by automatically generating likely invariants which are violated in the failed tests. Given a program with an initial assertion and at least one test case failing the assertion, we first generate random test cases, identify potential bug locations through bug localization, and then generate program state mutation based on active learning techniques to identify a predicate 'explaining' …


Evidence-Based Devops For Continuous Collaboration, Process, And Delivery, Weon S. Chung Nov 2017

Evidence-Based Devops For Continuous Collaboration, Process, And Delivery, Weon S. Chung

ASA Multidisciplinary Research Symposium

The purpose of this research is to propose Evidence-Based DevOps and to demonstrate its application to software reengineering. For this purpose, we borrow an approach from Medicine, Evidence-Based Medicine (EBM), and apply it to DevOps. Evidence-Based DevOps supports continuous collaboration, process, and deployment within or across diverse teams.


Fib: Squeezing Loop Invariants By Interpolation Between Forward/Backward Predicate Transformers, Shang-Wei Lin, Jun Sun, Hao Xiao, Yang Liu, David Sana, Henri Hansen Nov 2017

Fib: Squeezing Loop Invariants By Interpolation Between Forward/Backward Predicate Transformers, Shang-Wei Lin, Jun Sun, Hao Xiao, Yang Liu, David Sana, Henri Hansen

Research Collection School Of Computing and Information Systems

Loop invariant generation is a fundamental problem in program analysis and verification. In this work, we propose a new approach to automatically constructing inductive loop invariants. The key idea is to aggressively squeeze an inductive invariant based on Craig interpolants between forward and backward reachability analysis. We have evaluated our approach by a set of loop benchmarks, and experimental results show that our approach is promising.