Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,592 Full-Text Articles 5,014 Authors 1,201,212 Downloads 157 Institutions

All Articles in Software Engineering

Faceted Search

3,592 full-text articles. Page 1 of 141.

Opportunities And Challenges In Code Search Tools, Chao LIU, Xin XIA, David LO, Cuiying GAO, Xiaohu YANG, John GRUNDY 2022 Zhejiang University

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy

Research Collection School Of Computing and Information Systems

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique ...


Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi ZHANG, Jun SUN, Jingyi WANG 2022 Singapore Management University

Which Neural Network Makes More Explainable Decisions? An Approach Towards Measuring Explainability, Mengdi Zhang, Jun Sun, Jingyi Wang

Research Collection School Of Computing and Information Systems

Neural networks are getting increasingly popular thanks to their exceptional performance in solving many real-world problems. At the same time, they are shown to be vulnerable to attacks, difficult to debug and subject to fairness issues. To improve people’s trust in the technology, it is often necessary to provide some human-understandable explanation of neural networks’ decisions, e.g., why is that my loan application is rejected whereas hers is approved? That is, the stakeholder would be interested to minimize the chances of not being able to explain the decision consistently and would like to know how often and how ...


Predictive Self-Organizing Neural Networks For In-Home Detection Of Mild Cognitive Impairment, Seng Khoon TEH, Iris RAWTAER, Ah-hwee TAN 2022 Singapore Management University

Predictive Self-Organizing Neural Networks For In-Home Detection Of Mild Cognitive Impairment, Seng Khoon Teh, Iris Rawtaer, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

In-home sensing of daily living patterns from older adults coupled with machine learning is a promisingapproach to detect Mild Cognitive Impairment (MCI), a potentially reversible condition with early detectionand appropriate intervention. However, the number of subjects involved in such real-world studies istypically limited, posing the so-called small data problem to most predictive models which rely on a sizablenumber of labeled data. In this work, a predictive self-organizing neural network known as fuzzy AdaptiveResonance Associate Map (fuzzy ARAM) is proposed to detect MCI using in-home sensor data collected from aunique Singapore cross-sectional study. Specifically, mean and standard deviation of nine in-home ...


Model Transformations Between Sequence Diagram And Activity Diagram With Qvto, Yutong Xia 2022 Western University

Model Transformations Between Sequence Diagram And Activity Diagram With Qvto, Yutong Xia

Undergraduate Student Research Internships Conference

Complex software systems are specified by various models denoting the behavior of the system components, the exchanges of messages and data among components, the intents of the system stakeholders, the flow of system processes, and the structure of the system as a collection of modules.

When such systems are maintained and evolved (e.g. by adding new functionality, fixing bugs, or porting to a new operating environment), one or more of these models are altered. This brings the system specification to an inconsistent state since some models reflect the new behavior while other models were not appropriately evolved.

This research ...


Damage Assessment In Aging Structures Using Augmented Reality, Omar Zuhair Awadallah, Ayan Sadhu 2022 Western University

Damage Assessment In Aging Structures Using Augmented Reality, Omar Zuhair Awadallah, Ayan Sadhu

Undergraduate Student Research Internships Conference

Structural Health Monitoring (SHM) is the assessment of bridges and observation of data regarding these bridges over time to monitor their evolution and detect the presence of any possible damages. However, existing methods to perform structural inspections in bridges are high in cost, time-consuming and risky. Inspectors use expensive equipment to reach a certain area of the bridge to inspect it, and at different heights, this can pose a risk to the inspector’s safety. This study aims to find cheaper, faster, and safer ways to perform structural inspections using augmented reality and artificial intelligence. The developed system uses a ...


Data Preprocessing For Machine Learning Modules, Rawan El Moghrabi 2022 Western University

Data Preprocessing For Machine Learning Modules, Rawan El Moghrabi

Undergraduate Student Research Internships Conference

Data preprocessing is an essential step when building machine learning solutions. It significantly impacts the success of machine learning modules and the output of these algorithms. Typically, data preprocessing is made-up of data sanitization, feature engineering, normalization, and transformation. This paper outlines the data preprocessing methodology implemented for a data-driven predictive maintenance solution. The above-mentioned project entails acquiring historical electrical data from industrial assets and creating a health index indicating each asset's remaining useful life. This solution is built using machine learning algorithms and requires several data processing steps to increase the solution's accuracy and efficiency. In this ...


Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt 2022 Mississippi State University

Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt

Theses and Dissertations

Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory bandwidth ...


Deep Learning Edge Detection In Image Inpainting, Zheng Zheng 2022 California State University, San Bernardino

Deep Learning Edge Detection In Image Inpainting, Zheng Zheng

Electronic Theses, Projects, and Dissertations

In recent years, deep learning has grown rapidly, and it has been creatively implemented for various applications. In 2019, deep learning based EdgeConnect image inpainting algorithm came out and occupied a place in the image inpainting field. Unlike traditional image inpainting methods which mainly read and use the color information of the remaining part of the image to fill the missing regions of the image, EdgeConnect uses the innovative edge-first and color-next approach. It uses an edge detector to generate an edge map of an image with missing regions, then the missing edges are completed by an edge model, finally ...


Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian 2022 CUNY Hunter College

Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian

Publications and Research

Empirical Software Engineering (ESE) researchers study (open-source) project issues and the comments and threads within to discover—among others—challenges developers face when incorporating new technologies, platforms, and programming language constructs. However, such threads accumulate, becoming unwieldy and hindering any insight researchers may gain. While existing approaches alleviate this burden by classifying issue thread comments, there is a gap between searching popular open-source software repositories (e.g., those on GitHub) for issues containing particular keywords and feeding the results into a classification model. This paper demonstrates a research infrastructure tool called QuerTCI that bridges this gap by integrating the GitHub ...


Digbug: Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub KIM, Sankalp GHATPANDE, Kui LIU, Anil KOYUNCU, Dongsun KIM, Tegawendé F. BISSYANDE, Jacques KLEIN, Yves LE TRAON 2022 Singapore Management University

Digbug: Pre/Post-Processing Operator Selection For Accurate Bug Localization, Kisub Kim, Sankalp Ghatpande, Kui Liu, Anil Koyuncu, Dongsun Kim, Tegawendé F. Bissyande, Jacques Klein, Yves Le Traon

Research Collection School Of Computing and Information Systems

Bug localization is a recurrent maintenance task in software development. It aims at identifying relevant code locations (e.g., code files) that must be inspected to fix bugs. When such bugs are reported by users, the localization process become often overwhelming as it is mostly a manual task due to incomplete and informal information (written in natural languages) available in bug reports. The research community has then invested in automated approaches, notably using Information Retrieval techniques. Unfortunately, reported performance in the literature is still limited for practical usage. Our key observation, after empirically investigating a large dataset of bug reports ...


Proceedings Of The 13th International Workshop On Graph Computation Models (Gcm 2022), Reiko HECKEL, Christopher M. POSKITT 2022 Singapore Management University

Proceedings Of The 13th International Workshop On Graph Computation Models (Gcm 2022), Reiko Heckel, Christopher M. Poskitt

Research Collection School Of Computing and Information Systems

This volume contains the proceedings of the Thirteenth International Workshop on Graph Computation Models (GCM 2022) , which was held in Nantes, France on 6th July 2022 as part of the STAF federation of conferences. Graphs are common mathematical structures that are visual and intuitive. They constitute a natural and seamless way for system modelling in science, engineering, and beyond, including computer science, biology, and business process modelling. Graph computation models constitute a class of very high-level models where graphs are first-class citizens. The aim of the International GCM Workshop series is to bring together researchers interested in all aspects of ...


Xss For The Masses: Integrating Security In A Web Programming Course Using A Security Scanner, Lwin Khin SHAR, Christopher M. POSKITT, Kyong Jin SHIM, Li Ying Leonard WONG 2022 Singapore Management University

Xss For The Masses: Integrating Security In A Web Programming Course Using A Security Scanner, Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong

Research Collection School Of Computing and Information Systems

Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practices that are expected in industry. An alternative approach is to integrate cybersecurity concepts across non-security courses, so as to expose students to the interplay between security and other sub-areas of computing. In this paper, we report on our experience of applying the security integration approach to an undergraduate web programming course. In particular, we added a practical introduction to secure coding, which highlighted the OWASP Top ...


Physical Adversarial Attack On A Robotic Arm, Yifan JIA, Christopher M. POSKITT, Jun SUN, Sudipta CHATTOPADHYAY 2022 Singapore Management University

Physical Adversarial Attack On A Robotic Arm, Yifan Jia, Christopher M. Poskitt, Jun Sun, Sudipta Chattopadhyay

Research Collection School Of Computing and Information Systems

Collaborative Robots (cobots) are regarded as highly safety-critical cyber-physical systems (CPSs) owing to their close physical interactions with humans. In settings such as smart factories, they are frequently augmented with AI. For example, in order to move materials, cobots utilize object detectors based on deep learning models. Deep learning, however, has been demonstrated as vulnerable to adversarial attacks: a minor change (noise) to benign input can fool the underlying neural networks and lead to a different result. While existing works have explored such attacks in the context of picture/object classification, less attention has been given to attacking neural networks ...


Npc: Neuron Path Coverage Via Characterizing Decision Logic Of Deep Neural Networks, Xiaofei XIE, Tianlin LI, Jian WANG, Lei MA, Qing GUO, Felix JUEFEI-XU, Yang LIU 2022 Singapore Management University

Npc: Neuron Path Coverage Via Characterizing Decision Logic Of Deep Neural Networks, Xiaofei Xie, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu, Yang Liu

Research Collection School Of Computing and Information Systems

Deep learning has recently been widely applied to many applications across different domains, e.g., image classification and audio recognition. However, the quality of Deep Neural Networks (DNNs) still raises concerns in the practical operational environment, which calls for systematic testing, especially in safety-critical scenarios. Inspired by software testing, a number of structural coverage criteria are designed and proposed to measure the test adequacy of DNNs. However, due to the blackbox nature of DNN, the existing structural coverage criteria are difficult to interpret, making it hard to understand the underlying principles of these criteria. The relationship between the structural coverage ...


Cross-Lingual Transfer Learning For Statistical Type Inference, Zhiming LI, Xiaofei XIE, Haoliang LI, Zhengzi XU, Yi LI, Yang LIU 2022 Singapore Management University

Cross-Lingual Transfer Learning For Statistical Type Inference, Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu

Research Collection School Of Computing and Information Systems

Hitherto statistical type inference systems rely thoroughly on supervised learning approaches, which require laborious manual effort to collect and label large amounts of data. Most Turing-complete imperative languages share similar control- and data-flow structures, which make it possible to transfer knowledge learned from one language to another. In this paper, we propose a cross-lingual transfer learning framework, Plato, for statistical type inference, which allows us to leverage prior knowledge learned from the labeled dataset of one language and transfer it to the others, e.g., Python to JavaScript, Java to JavaScript, etc. Plato is powered by a novel kernelized attention ...


An Empirical Study On Data Distribution-Aware Test Selection For Deep Learning Enhancement, Qiang HU, Yuejun GUO, Maxime CORDY, Xiaofei XIE, Lei MA, Mike PAPADAKIS, Yves LE TRAON 2022 Singapore Management University

An Empirical Study On Data Distribution-Aware Test Selection For Deep Learning Enhancement, Qiang Hu, Yuejun Guo, Maxime Cordy, Xiaofei Xie, Lei Ma, Mike Papadakis, Yves Le Traon

Research Collection School Of Computing and Information Systems

Similar to traditional software that is constantly under evolution, deep neural networks need to evolve upon the rapid growth of test data for continuous enhancement (e.g., adapting to distribution shift in a new environment for deployment). However, it is labor intensive to manually label all of the collected test data. Test selection solves this problem by strategically choosing a small set to label. Via retraining with the selected set, deep neural networks will achieve competitive accuracy. Unfortunately, existing selection metrics involve three main limitations: (1) using different retraining processes, (2) ignoring data distribution shifts, and (3) being insufficiently evaluated ...


Gbgallery: A Benchmark And Framework For Game Testing, Zhuo LI, Yuechen WU, Lei MA, Xiaofei XIE, Yingfeng CHEN, Changjie FAN 2022 Singapore Management University

Gbgallery: A Benchmark And Framework For Game Testing, Zhuo Li, Yuechen Wu, Lei Ma, Xiaofei Xie, Yingfeng Chen, Changjie Fan

Research Collection School Of Computing and Information Systems

Software bug database and benchmark are the wheels of advancing automated software testing. In practice, real bugs often occur sparsely relative to the amount of software code, the extraction and curation of which are quite labor-intensive but can be essential to facilitate the innovation of testing techniques. Over the past decade, several milestones have been made to construct bug databases, pushing the progress of automated software testing research. However, up to the present, it still lacks a real bug database and benchmark for game software, making current game testing research mostly stagnant. The missing of bug database and framework greatly ...


Mitigating Adversarial Attacks On Data-Driven Invariant Checkers For Cyber-Physical Systems, Rajib Ranjan MAITI, Cheah Huei YOONG, Venkata Reddy PALLETI, Arlindo SILVA, Christopher M. POSKITT 2022 Singapore Management University

Mitigating Adversarial Attacks On Data-Driven Invariant Checkers For Cyber-Physical Systems, Rajib Ranjan Maiti, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt

Research Collection School Of Computing and Information Systems

The use of invariants in developing security mechanisms has become an attractive research area because of their potential to both prevent attacks and detect attacks in Cyber-Physical Systems (CPS). In general, an invariant is a property that is expressed using design parameters along with Boolean operators and which always holds in normal operation of a system, in particular, a CPS. Invariants can be derived by analysing operational data of various design parameters in a running CPS, or by analysing the system's requirements/design documents, with both of the approaches demonstrating significant potential to detect and prevent cyber-attacks on a ...


Analysis Of Digital Image Segmentation Algorithms, Khalilov Sirojiddin 2022 Nurafshan branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi

Analysis Of Digital Image Segmentation Algorithms, Khalilov Sirojiddin

Karakalpak Scientific Journal

Ushbu maqolada zamonaviy axborot-kommunikatsiya texnologiyalaridan foydalanishni kengaytirish maqsadida raqamli tasvirni qayta ishlash usullari va algoritmlari tahlil qilinadi. Maqolada, shuningdek, raqamli tasvirni qayta ishlash, tasvirni segmentatsiyalash usullari, WaterShed, MeanShift, FloodFill, GrabCut algoritmlarining afzalliklari va kamchiliklari o'rganiladi.


Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei 2022 Louisiana State University

Optimizing The Performance Of Parallel And Concurrent Applications Based On Asynchronous Many-Task Runtimes, Weile Wei

LSU Doctoral Dissertations

Nowadays, High-performance Computing (HPC) scientific applications often face per- formance challenges when running on heterogeneous supercomputers, so do scalability, portability, and efficiency issues. For years, supercomputer architectures have been rapidly changing and becoming more complex, and this challenge will become even more com- plicated as we enter the exascale era, where computers will exceed one quintillion cal- culations per second. Software adaption and optimization are needed to address these challenges. Asynchronous many-task (AMT) systems show promise against the exascale challenge as they combine advantages of multi-core architectures with light-weight threads, asynchronous executions, smart scheduling, and portability across diverse architectures.

In ...


Digital Commons powered by bepress