Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,445 Full-Text Articles 2,989 Authors 705,104 Downloads 134 Institutions

All Articles in Software Engineering

Faceted Search

2,445 full-text articles. Page 1 of 85.

Ml4iot: A Framework To Orchestrate Machine Learning Workflows On Internet Of Things Data, Jose Miguel Alves, Leonardo Honorio, Miriam A M Capretz 2019 Western University

Ml4iot: A Framework To Orchestrate Machine Learning Workflows On Internet Of Things Data, Jose Miguel Alves, Leonardo Honorio, Miriam A M Capretz

Electrical and Computer Engineering Publications

Internet of Things (IoT) applications generate vast amounts of real-time data. Temporal analysis of these data series to discover behavioural patterns may lead to qualified knowledge affecting a broad range of industries. Hence, the use of machine learning (ML) algorithms over IoT data has the potential to improve safety, economy, and performance in critical processes. However, creating ML workflows at scale is a challenging task that depends upon both production and specialized skills. Such tasks require investigation, understanding, selection, and implementation of specific ML workflows, which often lead to bottlenecks, production issues, and code management complexity and even then may ...


On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo 2019 University of the Witwatersrand

On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo

The African Journal of Information Systems

This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source ...


Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger 2019 Western University

Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger

Electrical and Computer Engineering Publications

Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building or a single aggregated load to predict future consumption for that same building or aggregated load. With hundreds of thousands of meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Similarity-Based Chained Transfer Learning (SBCTL), an approach for building neural network-based models for many meters by ...


Metnet: Systems Biology Tools For Arabidopsis, Eve Syrkin Wurtele, Ling Li, Dan Berleant, Dianne Cook, Julie A. Dickerson, Jing Ding, Heike Hofmann, Michael Lawrence, Eun-kyung Lee, Jie Li, Wieslawa Mentzen, Leslie Miller, Basil J. Nikolau, NIck Ransom, Yingjun Wang 2019 Iowa State University

Metnet: Systems Biology Tools For Arabidopsis, Eve Syrkin Wurtele, Ling Li, Dan Berleant, Dianne Cook, Julie A. Dickerson, Jing Ding, Heike Hofmann, Michael Lawrence, Eun-Kyung Lee, Jie Li, Wieslawa Mentzen, Leslie Miller, Basil J. Nikolau, Nick Ransom, Yingjun Wang

Eve Wurtele

MetNet (http://metnetdb.org) is an emerging open-source software platform for exploration of disparate experimental data types and regulatory and metabolic networks in the context of Arabidopsis systems biology. The MetNet platform features graph visualization, interactive displays, graph theoretic computations for determining biological distances, a unique multivariate display and statistical analysis tool, graph modeling using the open source statistical analysis language, R, and versatile text mining. The use of these tools is illustrated with data from the bio1 mutant of Arabidopsis.


Examining Augmented Virtuality Impairment Simulation For Mobile App Accessibility Design, Tsu Wei, Kenny (ZHU Shuwei, Kenny) CHOO, Rajesh Krishna BALAN, Rajesh Krishna BALAN 2019 Singapore Management University

Examining Augmented Virtuality Impairment Simulation For Mobile App Accessibility Design, Tsu Wei, Kenny (Zhu Shuwei, Kenny) Choo, Rajesh Krishna Balan, Rajesh Krishna Balan

Research Collection School Of Information Systems

With mobile apps rapidly permeating all aspects of daily living with use by all segments of the population, it is crucial to support the evaluation of app usability for specific impaired users to improve app accessibility. In this work, we examine the effects of using our augmented virtuality impairment simulation system–Empath-D–to support experienced designer-developers to redesign a mockup of commonly used mobile application for cataract-impaired users, comparing this with existing tools that aid designing for accessibility. We show that the use of augmented virtuality for assessing usability supports enhanced usability challenge identification, finding more defects and doing so ...


Metnet: Systems Biology Tools For Arabidopsis, Eve Syrkin Wurtele, Ling Li, Dan Berleant, Dianne Cook, Julie A. Dickerson, Jing Ding, Heike Hofmann, Michael Lawrence, Eun-kyung Lee, Jie Li, Wieslawa Mentzen, Leslie Miller, Basil J. Nikolau, NIck Ransom, Yingjun Wang 2019 Iowa State University

Metnet: Systems Biology Tools For Arabidopsis, Eve Syrkin Wurtele, Ling Li, Dan Berleant, Dianne Cook, Julie A. Dickerson, Jing Ding, Heike Hofmann, Michael Lawrence, Eun-Kyung Lee, Jie Li, Wieslawa Mentzen, Leslie Miller, Basil J. Nikolau, Nick Ransom, Yingjun Wang

Ling Li

MetNet (http://metnetdb.org) is an emerging open-source software platform for exploration of disparate experimental data types and regulatory and metabolic networks in the context of Arabidopsis systems biology. The MetNet platform features graph visualization, interactive displays, graph theoretic computations for determining biological distances, a unique multivariate display and statistical analysis tool, graph modeling using the open source statistical analysis language, R, and versatile text mining. The use of these tools is illustrated with data from the bio1 mutant of Arabidopsis.


Creating, Modeling, And Visualizing Metabolic Networks, Julie A. Dickerson, Daniel Berleant, Pan Du, Jing Ding, Carol M. Foster, Ling Li, Eve Syrkin Wurtele 2019 Iowa State University

Creating, Modeling, And Visualizing Metabolic Networks, Julie A. Dickerson, Daniel Berleant, Pan Du, Jing Ding, Carol M. Foster, Ling Li, Eve Syrkin Wurtele

Ling Li

Metabolic networks combine metabolism and regulation. These complex networks are difficult to understand and create due to the diverse types of information that need to be represented. This chapter describes a suite of interlinked tools for developing, displaying, and modeling metabolic networks. The metabolic network interactions database, MetNetDB, contains information on regulatory and metabolic interactions derived from a combination of web databases and input from biologists in their area of expertise. PathBinderA mines the biological “literaturome” by searching for new interactions or supporting evidence for existing interactions in metabolic networks. Sentences from abstracts are ranked in terms of the likelihood ...


Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian 2019 Oakland University

Going Big: A Large-Scale Study On What Big Data Developers Ask, Mehdi Bagherzadeh, Raffi T. Khatchadourian

Publications and Research

Software developers are increasingly required to write big data code. However, they find big data software development challenging. To help these developers it is necessary to understand big data topics that they are interested in and the difficulty of finding answers for questions in these topics. In this work, we conduct a large-scale study on Stackoverflow to understand the interest and difficulties of big data developers. To conduct the study, we develop a set of big data tags to extract big data posts from Stackoverflow; use topic modeling to group these posts into big data topics; group similar topics into ...


Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento de Aguiar 2019 The University of Western Ontario

Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento De Aguiar

Electronic Thesis and Dissertation Repository

Spatiotemporal forecasting can be described as predicting the future value of a variable given when and where it will happen. This type of forecasting task has the potential to aid many institutions and businesses in asking questions, such as how many people will visit a given hospital in the next hour. Answers to these questions have the potential to spur significant socioeconomic impact, providing privacy-friendly short-term forecasts about geolocated events, which in turn can help entities to plan and operate more efficiently. These seemingly simple questions, however, present complex challenges to forecasting systems. With more GPS-enabled devices connected every year ...


Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman 2019 Boise State University

Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman

Boise State University Theses and Dissertations

Blockchain in recent years has exploded in popularity with Ethereum being one of the leading blockchain platforms. Solidity is a widely used scripting language for creating smart contracts in Ethereum applications. Quality assurance in Solidity contracts is of critical importance because bugs or vulnerabilities can lead to a considerable loss of financial assets. However, it is unclear what level of quality assurance is provided in many of these applications.

Mutation testing is the process of intentionally injecting faults into a target program and then running the provided test suite against the various injected faults. Mutation testing is used to evaluate ...


Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris 2019 Boise State University

Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris

Boise State University Theses and Dissertations

Probabilistic Symbolic Execution (PSE) extends Symbolic Execution (SE), a path-sensitive static program analysis technique, by calculating the probabilities with which program paths are executed. PSE relies on the ability of the underlying symbolic models to accurately represent the execution paths of the program as the collection of input values following these paths. While researchers established PSE for numerical data types, PSE for complex data types such as strings is a novel area of research.

For string data types SE tools commonly utilize finite state automata to represent a symbolic string model. Thus, PSE inherits from SE automata-based symbolic string models ...


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif 2019 Embry-Riddle Aeronautical University

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Dissertations and Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately ...


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui 2019 University of Louisville

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be ...


Creating Top Ranking Options In The Continuous Option And Preference Space, Bo TANG, Kyriakos MOURATIDIS, Man Lung YIU, Zhenyu CHEN 2019 Southern University of Science and Technology

Creating Top Ranking Options In The Continuous Option And Preference Space, Bo Tang, Kyriakos Mouratidis, Man Lung Yiu, Zhenyu Chen

Research Collection School Of Information Systems

Top-k queries are extensively used to retrieve the k most relevantoptions (e.g., products, services, accommodation alternatives, etc)based on a weighted scoring function that captures user preferences. In this paper, we take the viewpoint of a business owner whoplans to introduce a new option to the market, with a certain type ofclientele in mind. Given a target region in the consumer spectrum,we determine what attribute values the new option should have,so that it ranks among the top-k for any user in that region. Ourmethodology can also be used to improve an existing option, at theminimum modification cost ...


Who Should Make Decision On This Pull Request? Analyzing Time-Decaying Relationships And File Similarities For Integrator Prediction, Jing JIANG, David LO, Jiateng ZHENG, Xin XIA, Yun YANG, Li ZHANG 2019 Beijing University of Aeronautics and Astronautics (Beihang University)

Who Should Make Decision On This Pull Request? Analyzing Time-Decaying Relationships And File Similarities For Integrator Prediction, Jing Jiang, David Lo, Jiateng Zheng, Xin Xia, Yun Yang, Li Zhang

Research Collection School Of Information Systems

In pull-based development model, integrators are responsible for making decisions about whether to accept pull requests andintegrate code contributions. Ideally, pull requests are assigned to integrators and evaluated within a short time after their submissions. However, the volume of incoming pull requests is large in popular projects, and integrators often encounter difficulties inprocessing pull requests in a timely fashion. Therefore, an automatic integrator prediction approach is required to assign appropriate pull requests to integrators. In this paper, we propose an approach TRFPre which analyzes Time-decaying Relationships andFile similarities to predict integrators. We evaluate the effectiveness of TRFPre on 24 projects ...


Automated Knowledge Extraction From Archival Documents, Khalil Malki 2019 Atlanta University Center

Automated Knowledge Extraction From Archival Documents, Khalil Malki

Electronic Theses & Dissertations Collection for Atlanta University & Clark Atlanta University

Traditional archival media such as paper, film, photographs, etc. contain a vast storage of knowledge. Much of this knowledge is applicable to current business and scientific problems, and offers solutions; consequently, there is value in extracting this information. While it is possible to manually extract the content, this technique is not feasible for large knowledge repositories due to cost and time. In this thesis, we develop a system that can extract such knowledge automatically from large repositories. A Graphical User Interface that permits users to indicate the location of the knowledge components (indexes) is developed, and software features that permit ...


Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed 2019 CUNY Hunter College

Safe Automated Refactoring For Intelligent Parallelization Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming languages and platforms. For example, the Stream API introduced in Java 8 allows for functional-like, MapReduce-style operations in processing both finite, e.g., collections, and infinite data structures. However, using this API efficiently involves subtle considerations such as determining when it is best for stream operations to run in parallel, when running operations in parallel can be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. Also, streams may not run all operations in parallel depending on particular collectors used in reductions ...


On Ordering Problems In Message Passing Software, Yuheng Long, Mehdi Bagherzadeh, Eric Lin, Ganesha Upadhyaya, Hridesh Rajan 2019 Iowa State University

On Ordering Problems In Message Passing Software, Yuheng Long, Mehdi Bagherzadeh, Eric Lin, Ganesha Upadhyaya, Hridesh Rajan

Hridesh Rajan

The need for concurrency in modern software is increasingly fulfilled by utilizing the message passing paradigm because of its modularity and scalability. In the message passing paradigm, concurrently running processes communicate by sending and receiving messages. Asynchronous messaging introduces the possibility of message ordering problems: two messages with a specific order in the program text could take effect in the opposite order in the program execution and lead to bugs that are hard to find and debug. We believe that the engineering of message passing software could be easier if more is known about the characteristics of message ordering problems ...


On Accelerating Ultra-Large-Scale Mining, Ganesha Upadhyaya, Hridesh Rajan 2019 Iowa State University

On Accelerating Ultra-Large-Scale Mining, Ganesha Upadhyaya, Hridesh Rajan

Hridesh Rajan

Ultra-large-scale mining has been shown to be useful for a number of software engineering tasks e.g. mining specifications, defect prediction. We propose a new research direction for accelerating ultra-large-scale mining that goes beyond parallelization. Our key idea is to analyze the interaction pattern between the mining task and the artifact to cluster artifacts such that running the mining task on one candidate artifact from each cluster is sufficient to produce results for other artifacts in the same cluster. Our artifact clustering criteria go beyond syntactic, semantic, and functional similarities to mining-task-specific similarity, where the interaction pattern between the mining ...


Modular Software Design With Crosscutting Interfaces, W. G. Griswold, M. Shonle, K. Sullivan, Y. Song, N. Tewari, Y. Cai, Hridesh Rajan 2019 University of California, San Diego

Modular Software Design With Crosscutting Interfaces, W. G. Griswold, M. Shonle, K. Sullivan, Y. Song, N. Tewari, Y. Cai, Hridesh Rajan

Hridesh Rajan

Aspect-oriented programming (AOP) languages such as AspectJ offer new mechanisms and possibilities for decomposing systems into modules and composing modules into systems. The key mechanism in AspectJ is the advising of crosscutting sets of join points. An aspect module uses a pointcut descriptor (PCD) to declaratively specify sets of points in program executions. Our approach employs crosscut programming interfaces, or XPIs. XPIs are explicit, abstract interfaces that decouple aspects from details of advised code


Digital Commons powered by bepress