Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,390 Full-Text Articles 4,676 Authors 966,361 Downloads 156 Institutions

All Articles in Software Engineering

Faceted Search

3,390 full-text articles. Page 1 of 129.

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng XIA, Reshika P. VELUMANI, Yong WANG, Huamin QU, Xiaojuan MA 2021 Singapore Management University

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng Xia, Reshika P. Velumani, Yong Wang, Huamin Qu, Xiaojuan Ma

Research Collection School Of Computing and Information Systems

With the rapid development of online education in recent years, there has been an increasing number of learning platforms that provide students with multi-step questions to cultivate their problem-solving skills. To guarantee the high quality of such learning materials, question designers need to inspect how students’ problem-solving processes unfold step by step to infer whether students’ problem-solving logic matches their design intent. They also need to compare the behaviors of different groups (e.g., students from different grades) to distribute questions to students with the right level of knowledge. The availability of fine-grained interaction data, such as mouse movement trajectories ...


Taxthemis: Interactive Mining And Exploration Of Suspicious Tax Evasion Group, Yating LIN, Kamkwai WONG, Yong WANG, Rong ZHANG, Bo DONG, Huamin QU, Qinghua ZHENG 2021 Singapore Management University

Taxthemis: Interactive Mining And Exploration Of Suspicious Tax Evasion Group, Yating Lin, Kamkwai Wong, Yong Wang, Rong Zhang, Bo Dong, Huamin Qu, Qinghua Zheng

Research Collection School Of Computing and Information Systems

Tax evasion is a serious economic problem for many countries, as it can undermine the government’s tax system and lead to an unfair business competition environment. Recent research has applied data analytics techniques to analyze and detect tax evasion behaviors of individual taxpayers. However, they have failed to support the analysis and exploration of the related party transaction tax evasion (RPTTE) behaviors (e.g., transfer pricing), where a group of taxpayers is involved. In this paper, we present TaxThemis, an interactive visual analytics system to help tax officers mine and explore suspicious tax evasion groups through analyzing heterogeneous tax-related ...


Visual Analysis Of Discrimination In Machine Learning, Qianwen WANG, Zhenghua XU, Zhutian CHEN, Yong WANG, Yong WANG, Huamin Qu 2021 Singapore Management University

Visual Analysis Of Discrimination In Machine Learning, Qianwen Wang, Zhenghua Xu, Zhutian Chen, Yong Wang, Yong Wang, Huamin Qu

Research Collection School Of Computing and Information Systems

The growing use of automated decision-making in critical applications, such as crime prediction and college admission, has raised questions about fairness in machine learning. How can we decide whether different treatments are reasonable or discriminatory? In this paper, we investigate discrimination in machine learning from a visual analytics perspective and propose an interactive visualization tool, DiscriLens, to support a more comprehensive analysis. To reveal detailed information on algorithmic discrimination, DiscriLens identifies a collection of potentially discriminatory itemsets based on causal modeling and classification rules mining. By combining an extended Euler diagram with a matrix-based visualization, we develop a novel set ...


Tradao: A Visual Analytics System For Trading Algorithm Optimization, Ka Wing TSANG, Haotian LI, Fuk Ming LAM, Yifan MU, Yong WANG, Huamin QU 2021 Singapore Management University

Tradao: A Visual Analytics System For Trading Algorithm Optimization, Ka Wing Tsang, Haotian Li, Fuk Ming Lam, Yifan Mu, Yong Wang, Huamin Qu

Research Collection School Of Computing and Information Systems

With the wide applications of algorithmic trading, it has become critical for traders to build a winning trading algorithm to beat the market. However, due to the lack of efficient tools, traders mainly rely on their memory to manually compare the algorithm instances of a trading algorithm and further select the best trading algorithm instance for the real trading deployment. We work closely with industry practitioners to discover and consolidate user requirements and develop an interactive visual analytics system for trading algorithm optimization. Structured expert interviews are conducted to evaluateTradAOand a representative case study is documented for illustrating the system ...


Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton 2021 Portland State University

Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton

University Honors Theses

Scrum is widely used in the software industry to manage all kinds of projects. This case study examines the way in which a capstone team used the methodology and models the specific project management processes they used over the course of their project. These models and the process modifications therein are then compared to the team’s velocity at different points in the project. The results of this analysis suggest a correlation between asynchronous daily meetings and sprint reviews and improved velocity.


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin 2021 Independent Researcher

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying ...


A Configurable Social Network For Running Irb-Approved Experiments, Mihovil Mandic 2021 Dartmouth College

A Configurable Social Network For Running Irb-Approved Experiments, Mihovil Mandic

Dartmouth College Undergraduate Theses

Our world has never been more connected, and the size of the social media landscape draws a great deal of attention from academia. However, social networks are also a growing challenge for the Institutional Review Boards concerned with the subjects’ privacy. These networks contain a monumental variety of personal information of almost 4 billion people, allow for precise social profiling, and serve as a primary news source for many users. They are perfect environments for influence operations that are becoming difficult to defend against. Motivated to study online social influence via IRB-approved experiments, we designed and implemented a flexible, scalable ...


M^3, Catherine Mingmin Wei, Syrsha Anne Harvey 2021 California Polytechnic State University, San Luis Obispo

M^3, Catherine Mingmin Wei, Syrsha Anne Harvey

Computer Science and Software Engineering

M^3 aims to raise students' interest in physics through an interactive and fun video game. Originally planned as a segment in the Cal Poly SLO Seeds in STEM workshop, M^3 is designed with middle and high school students as the intended audience.


Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick 2021 University of Johannesburg

Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick

The African Journal of Information Systems

Agile methods and Agile scaling frameworks have become a solution for software-developing organizations striving to improve the success of software projects. Agile methods were developed for small projects, but due to their benefits, even large software-developing organizations have adopted them to scale their software projects. This quantitative study was undertaken to deepen the researchers’ understanding of the critical success factors and challenges of Scaled Agile from the South African perspective. A simple random sampling method was used. Data was collected with the use of an online structured questionnaire and the response rate was 70%. The results reveal that customer satisfaction ...


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja 2021 CUNY Graduate Center

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed ...


Asynchronous Validations Using Programming Contracts In Java, Rahul Shukla 2021 San Jose State University

Asynchronous Validations Using Programming Contracts In Java, Rahul Shukla

Master's Projects

Design by Contract is a software development methodology based on the idea of having contracts between two software components. Programming contracts are invariants specified as pre-conditions and post-conditions. The client component must ensure that all the pre-conditions are satisfied before calling the server component. The server component must guarantee the post-conditions are met before the call returns to the client component. Current work in Design by Contract in Java focuses on writing shorthand contracts using annotations that are processed serially.

Modern software systems require a lot of business rules validations on complicated domain objects. Often, such validations are in the ...


Analysis Of Students’ Multi-Representation Ability In Augmented Reality-Assisted Learning, Sri Jumini, Edy Cahyono, Muhamad Miftakhul Falah 2021 Universitas Sains Al-Qur'an of Central Java in Wonosobo

Analysis Of Students’ Multi-Representation Ability In Augmented Reality-Assisted Learning, Sri Jumini, Edy Cahyono, Muhamad Miftakhul Falah

Library Philosophy and Practice (e-journal)

Not all learning sources can directly and cheaply be presented, so augmented reality media is needed to be applied to students with various talents and intelligence. This study aims to analyze students’ multi-representation ability through the use of augmented reality media. The research method was carried out through pre-experiment with one group posttest only design. Test question items were given to see the students’ multi-representation ability. Data analysis was carried out through the percentage of the number of students achieving test scores of more than or equal to 80 on a scale of 100. The results showed that 88% (28 ...


Modernizing Legacy Business Practices And Maintaining Backwards Compatibility When Replacing Legacy Software, Thomas Hillebrandt 2021 University of Nebraska - Lincoln

Modernizing Legacy Business Practices And Maintaining Backwards Compatibility When Replacing Legacy Software, Thomas Hillebrandt

Honors Theses, University of Nebraska-Lincoln

As technology advances and hardware as well as user expectations becomes more advanced, software systems must change alongside or go obsolete. When software is no longer developed, decisions must be made regarding its future. Through various methods, legacy software may continue to see usage far past its obsolescence, however legacy software will sooner or later face replacement by new applications, built for state-of-the-art machines, to comply with modern requirements. When writing new software to replace older programs, the added challenge for developers is to help the client also modernize their workflow. When a program has been in long time use ...


Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron 2021 Dakota State University

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized ...


Applying Emotional Analysis For Automated Content Moderation, John Shelnutt 2021 University of Arkansas, Fayetteville

Applying Emotional Analysis For Automated Content Moderation, John Shelnutt

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this project is to explore the effectiveness of emotional analysis as a means to automatically moderate content or flag content for manual moderation in order to reduce the workload of human moderators in moderating toxic content online. In this context, toxic content is defined as content that features excessive negativity, rudeness, or malice. This often features offensive language or slurs. The work involved in this project included creating a simple website that imitates a social media or forum with a feed of user submitted text posts, implementing an emotional analysis algorithm from a word emotions dataset, designing ...


City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke 2021 University of Arkansas, Fayetteville

City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke

Computer Science and Computer Engineering Undergraduate Honors Theses

Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to ...


Simplifying The Creation Of Virtual Topologies Using Mpi Sessions, Tom Herschberg 2021 University of Tennessee at Chattanooga

Simplifying The Creation Of Virtual Topologies Using Mpi Sessions, Tom Herschberg

Honors Theses

As supercomputers have approached exascale performance, several scalability issues have emerged within MPI. These issues arise because MPI includes all processes in the World model, which consumes unacceptable amounts of time and resources at large scale. The Sessions model was developed to combat these issues by removing the requirement of MPI_COMM_WORLD, which provides a more scalable method of creating communication groups in large jobs. Additionally, the Sessions model enables the creation of virtual topologies directly from sets of processes allocated to the execution of a parallel application rather than building virtual topologies from an existing communication group such as MPI_COMM_WORLD ...


Attendio: Attendance Tracking Made Simple, Benjamin L. Greenberg, Spencer L. Howell, Tucker R. Miles, Vicki Tang, Daniel N. Troutman 2021 University of Tennessee, Knoxville

Attendio: Attendance Tracking Made Simple, Benjamin L. Greenberg, Spencer L. Howell, Tucker R. Miles, Vicki Tang, Daniel N. Troutman

Chancellor’s Honors Program Projects

No abstract provided.


Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes BLOBEL, Vu Huy TRAN, Archan MISRA, Falko DRESSLER 2021 Technische Universitaet Berlin

Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes Blobel, Vu Huy Tran, Archan Misra, Falko Dressler

Research Collection School Of Computing and Information Systems

Ultra-low power communication is critical for supporting the next generation of battery-operated or energy harvesting battery-less Internet of Things (IoT) devices. Duty cycling protocols and wake-up receiver (WuRx) technologies, and their combinations, have been investigated as energy-efficient mechanisms to support selective, event-driven activation of devices. In this paper, we go one step further and show how WuRx can be used for an efficient and multi-purpose low power downlink (LPD) communication channel. We demonstrate how to (a) extend the wake-up signal to support low-power flexible and extensible unicast, multicast, and broadcast downlink communication and (b) utilize the WuRx-based LPD to also ...


Deeplight: Robust And Unobtrusive Real-Time Screen-Camera Communication For Real-World Displays, Vu Huy TRAN, Gihan JAYATILAKA, Ashwin ASHOK, Archan MISRA 2021 Singapore Management University

Deeplight: Robust And Unobtrusive Real-Time Screen-Camera Communication For Real-World Displays, Vu Huy Tran, Gihan Jayatilaka, Ashwin Ashok, Archan Misra

Research Collection School Of Computing and Information Systems

The paper introduces a novel, holistic approach for robust Screen-Camera Communication (SCC), where video content on a screen is visually encoded in a human-imperceptible fashion and decoded by a camera capturing images of such screen content. We first show that state-of-the-art SCC techniques have two key limitations for in-the-wild deployment: (a) the decoding accuracy drops rapidly under even modest screen extraction errors from the captured images, and (b) they generate perceptible flickers on common refresh rate screens even with minimal modulation of pixel intensity. To overcome these challenges, we introduce DeepLight, a system that incorporates machine learning (ML) models in ...


Digital Commons powered by bepress