Opportunities And Challenges In Code Search Tools,
2022
Zhejiang University
Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy
Research Collection School Of Computing and Information Systems
Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique ...
Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability,
2022
Singapore Management University
Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang
Research Collection School Of Computing and Information Systems
Neural networks are getting increasingly popular thanks to their exceptional performance in solving many real-world problems. At the same time, they are shown to be vulnerable to attacks, difficult to debug and subject to fairness issues. To improve people’s trust in the technology, it is often necessary to provide some human-understandable explanation of neural networks’ decisions, e.g., why is that my loan application is rejected whereas hers is approved? That is, the stakeholder would be interested to minimize the chances of not being able to explain the decision consistently and would like to know how often and how ...
Predictive Self-Organizing Neural Networks For In-Home Detection Of Mild Cognitive Impairment,
2022
Singapore Management University
Predictive Self-Organizing Neural Networks For In-Home Detection Of Mild Cognitive Impairment, Seng Khoon Teh, Iris Rawtaer, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
In-home sensing of daily living patterns from older adults coupled with machine learning is a promisingapproach to detect Mild Cognitive Impairment (MCI), a potentially reversible condition with early detectionand appropriate intervention. However, the number of subjects involved in such real-world studies istypically limited, posing the so-called small data problem to most predictive models which rely on a sizablenumber of labeled data. In this work, a predictive self-organizing neural network known as fuzzy AdaptiveResonance Associate Map (fuzzy ARAM) is proposed to detect MCI using in-home sensor data collected from aunique Singapore cross-sectional study. Specifically, mean and standard deviation of nine in-home ...
Model Transformations Between Sequence Diagram And Activity Diagram With Qvto,
2022
Western University
Model Transformations Between Sequence Diagram And Activity Diagram With Qvto, Yutong Xia
Undergraduate Student Research Internships Conference
Complex software systems are specified by various models denoting the behavior of the system components, the exchanges of messages and data among components, the intents of the system stakeholders, the flow of system processes, and the structure of the system as a collection of modules.
When such systems are maintained and evolved (e.g. by adding new functionality, fixing bugs, or porting to a new operating environment), one or more of these models are altered. This brings the system specification to an inconsistent state since some models reflect the new behavior while other models were not appropriately evolved.
This research ...
Damage Assessment In Aging Structures Using Augmented Reality,
2022
Western University
Damage Assessment In Aging Structures Using Augmented Reality, Omar Zuhair Awadallah, Ayan Sadhu
Undergraduate Student Research Internships Conference
Structural Health Monitoring (SHM) is the assessment of bridges and observation of data regarding these bridges over time to monitor their evolution and detect the presence of any possible damages. However, existing methods to perform structural inspections in bridges are high in cost, time-consuming and risky. Inspectors use expensive equipment to reach a certain area of the bridge to inspect it, and at different heights, this can pose a risk to the inspector’s safety. This study aims to find cheaper, faster, and safer ways to perform structural inspections using augmented reality and artificial intelligence. The developed system uses a ...
Data Preprocessing For Machine Learning Modules,
2022
Western University
Data Preprocessing For Machine Learning Modules, Rawan El Moghrabi
Undergraduate Student Research Internships Conference
Data preprocessing is an essential step when building machine learning solutions. It significantly impacts the success of machine learning modules and the output of these algorithms. Typically, data preprocessing is made-up of data sanitization, feature engineering, normalization, and transformation. This paper outlines the data preprocessing methodology implemented for a data-driven predictive maintenance solution. The above-mentioned project entails acquiring historical electrical data from industrial assets and creating a health index indicating each asset's remaining useful life. This solution is built using machine learning algorithms and requires several data processing steps to increase the solution's accuracy and efficiency. In this ...
Gpgpu Microbenchmarking For Irregular Application Optimization,
2022
Mississippi State University
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Theses and Dissertations
Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory bandwidth ...
Deep Learning Edge Detection In Image Inpainting,
2022
California State University, San Bernardino
Deep Learning Edge Detection In Image Inpainting, Zheng Zheng
Electronic Theses, Projects, and Dissertations
In recent years, deep learning has grown rapidly, and it has been creatively implemented for various applications. In 2019, deep learning based EdgeConnect image inpainting algorithm came out and occupied a place in the image inpainting field. Unlike traditional image inpainting methods which mainly read and use the color information of the remaining part of the image to fill the missing regions of the image, EdgeConnect uses the innovative edge-first and color-next approach. It uses an edge detector to generate an edge map of an image with missing regions, then the missing edges are completed by an edge model, finally ...
Quertci: A Tool Integrating Github Issue Querying With Comment Classification,
2022
CUNY Hunter College
Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian
Publications and Research
Empirical Software Engineering (ESE) researchers study (open-source) project issues and the comments and threads within to discover—among others—challenges developers face when incorporating new technologies, platforms, and programming language constructs. However, such threads accumulate, becoming unwieldy and hindering any insight researchers may gain. While existing approaches alleviate this burden by classifying issue thread comments, there is a gap between searching popular open-source software repositories (e.g., those on GitHub) for issues containing particular keywords and feeding the results into a classification model. This paper demonstrates a research infrastructure tool called QuerTCI that bridges this gap by integrating the GitHub ...
Digbug: Pre/Post-Processing Operator Selection For Accurate Bug Localization,
2022
Singapore Management University
Digbug: Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon
Research Collection School Of Computing and Information Systems
Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become often overwhelming as it is mostly a manual task due to incomplete and informal information (written in natural languages) available in bug reports. The research community has then invested in automated approaches, notably using Information Retrieval techniques. Unfortunately, reported performance in the literature is still limited for practical usage. Our key observation, after empirically investigating a large dataset of bug reports ...
Proceedings Of The 13th International Workshop On Graph Computation Models (Gcm 2022),
2022
Singapore Management University
Proceedings Of The 13th International Workshop On Graph Computation Models (Gcm 2022), Reiko Heckel, Christopher M. Poskitt
Research Collection School Of Computing and Information Systems
This volume contains the proceedings of the Thirteenth International Workshop on Graph Computation Models (GCM 2022) , which was held in Nantes, France on 6th July 2022 as part of the STAF federation of conferences. Graphs are common mathematical structures that are visual and intuitive. They constitute a natural and seamless way for system modelling in science, engineering, and beyond, including computer science, biology, and business process modelling. Graph computation models constitute a class of very high-level models where graphs are first-class citizens. The aim of the International GCM Workshop series is to bring together researchers interested in all aspects of ...
Xss For The Masses: Integrating Security In A Web Programming Course Using A Security Scanner,
2022
Singapore Management University
Xss For The Masses: Integrating Security In A Web Programming Course Using A Security Scanner, Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong
Research Collection School Of Computing and Information Systems
Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practices that are expected in industry. An alternative approach is to integrate cybersecurity concepts across non-security courses, so as to expose students to the interplay between security and other sub-areas of computing. In this paper, we report on our experience of applying the security integration approach to an undergraduate web programming course. In particular, we added a practical introduction to secure coding, which highlighted the OWASP Top ...
Physical Adversarial Attack On A Robotic Arm,
2022
Singapore Management University
Physical Adversarial Attack On A Robotic Arm, Yifan Jia, Christopher M. Poskitt, Jun Sun, Sudipta Chattopadhyay
Research Collection School Of Computing and Information Systems
Collaborative Robots (cobots) are regarded as highly safety-critical cyber-physical systems (CPSs) owing to their close physical interactions with humans. In settings such as smart factories, they are frequently augmented with AI. For example, in order to move materials, cobots utilize object detectors based on deep learning models. Deep learning, however, has been demonstrated as vulnerable to adversarial attacks: a minor change (noise) to benign input can fool the underlying neural networks and lead to a different result. While existing works have explored such attacks in the context of picture/object classification, less attention has been given to attacking neural networks ...
Npc: Neuron Path Coverage Via Characterizing Decision Logic Of Deep Neural Networks,
2022
Singapore Management University
Npc: Neuron Path Coverage Via Characterizing Decision Logic Of Deep Neural Networks, Xiaofei Xie, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu, Yang Liu
Research Collection School Of Computing and Information Systems
Deep learning has recently been widely applied to many applications across different domains, e.g., image classification and audio recognition. However, the quality of Deep Neural Networks (DNNs) still raises concerns in the practical operational environment, which calls for systematic testing, especially in safety-critical scenarios. Inspired by software testing, a number of structural coverage criteria are designed and proposed to measure the test adequacy of DNNs. However, due to the blackbox nature of DNN, the existing structural coverage criteria are difficult to interpret, making it hard to understand the underlying principles of these criteria. The relationship between the structural coverage ...
Cross-Lingual Transfer Learning For Statistical Type Inference,
2022
Singapore Management University
Cross-Lingual Transfer Learning For Statistical Type Inference, Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu
Research Collection School Of Computing and Information Systems
Hitherto statistical type inference systems rely thoroughly on supervised learning approaches, which require laborious manual effort to collect and label large amounts of data. Most Turing-complete imperative languages share similar control- and data-flow structures, which make it possible to transfer knowledge learned from one language to another. In this paper, we propose a cross-lingual transfer learning framework, Plato, for statistical type inference, which allows us to leverage prior knowledge learned from the labeled dataset of one language and transfer it to the others, e.g., Python to JavaScript, Java to JavaScript, etc. Plato is powered by a novel kernelized attention ...
An Empirical Study On Data Distribution-Aware Test Selection For Deep Learning Enhancement,
2022
Singapore Management University
An Empirical Study On Data Distribution-Aware Test Selection For Deep Learning Enhancement, Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Lei Ma, Mike Papadakis, Yves Le Traon
Research Collection School Of Computing and Information Systems
Similar to traditional software that is constantly under evolution, deep neural networks need to evolve upon the rapid growth of test data for continuous enhancement (e.g., adapting to distribution shift in a new environment for deployment). However, it is labor intensive to manually label all of the collected test data. Test selection solves this problem by strategically choosing a small set to label. Via retraining with the selected set, deep neural networks will achieve competitive accuracy. Unfortunately, existing selection metrics involve three main limitations: (1) using different retraining processes, (2) ignoring data distribution shifts, and (3) being insufficiently evaluated ...
Gbgallery: A Benchmark And Framework For Game Testing,
2022
Singapore Management University
Gbgallery: A Benchmark And Framework For Game Testing, Zhuo Li, Yuechen Wu, Lei Ma, Xiaofei Xie, Yingfeng Chen, Changjie Fan
Research Collection School Of Computing and Information Systems
Software bug database and benchmark are the wheels of advancing automated software testing. In practice, real bugs often occur sparsely relative to the amount of software code, the extraction and curation of which are quite labor-intensive but can be essential to facilitate the innovation of testing techniques. Over the past decade, several milestones have been made to construct bug databases, pushing the progress of automated software testing research. However, up to the present, it still lacks a real bug database and benchmark for game software, making current game testing research mostly stagnant. The missing of bug database and framework greatly ...
Mitigating Adversarial Attacks On Data-Driven Invariant Checkers For Cyber-Physical Systems,
2022
Singapore Management University
Mitigating Adversarial Attacks On Data-Driven Invariant Checkers For Cyber-Physical Systems, Rajib Ranjan Maiti, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt
Research Collection School Of Computing and Information Systems
The use of invariants in developing security mechanisms has become an attractive research area because of their potential to both prevent attacks and detect attacks in Cyber-Physical Systems (CPS). In general, an invariant is a property that is expressed using design parameters along with Boolean operators and which always holds in normal operation of a system, in particular, a CPS. Invariants can be derived by analysing operational data of various design parameters in a running CPS, or by analysing the system's requirements/design documents, with both of the approaches demonstrating significant potential to detect and prevent cyber-attacks on a ...
Analysis Of Digital Image Segmentation Algorithms,
2022
Nurafshan branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
Analysis Of Digital Image Segmentation Algorithms, Khalilov Sirojiddin
Karakalpak Scientific Journal
Ushbu maqolada zamonaviy axborot-kommunikatsiya texnologiyalaridan foydalanishni kengaytirish maqsadida raqamli tasvirni qayta ishlash usullari va algoritmlari tahlil qilinadi. Maqolada, shuningdek, raqamli tasvirni qayta ishlash, tasvirni segmentatsiyalash usullari, WaterShed, MeanShift, FloodFill, GrabCut algoritmlarining afzalliklari va kamchiliklari o'rganiladi.
Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes,
2022
Louisiana State University
Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei
LSU Doctoral Dissertations
Nowadays, High-performance Computing (HPC) scientific applications often face per- formance challenges when running on heterogeneous supercomputers, so do scalability, portability, and efficiency issues. For years, supercomputer architectures have been rapidly changing and becoming more complex, and this challenge will become even more com- plicated as we enter the exascale era, where computers will exceed one quintillion cal- culations per second. Software adaption and optimization are needed to address these challenges. Asynchronous many-task (AMT) systems show promise against the exascale challenge as they combine advantages of multi-core architectures with light-weight threads, asynchronous executions, smart scheduling, and portability across diverse architectures.
In ...