Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

None

Discipline
Keyword
Publication Year
Publication

Articles 331 - 360 of 2377

Full-Text Articles in Physical Sciences and Mathematics

Mobile Applications That Empower People To Monitor Their Personal Health, K. Connelly, A. Faber, Y. Rogers, K. Siek, Tammy Toscos Jul 2014

Mobile Applications That Empower People To Monitor Their Personal Health, K. Connelly, A. Faber, Y. Rogers, K. Siek, Tammy Toscos

Tammy R Toscos

Researchers have an opportunity to develop assistive applications that empower people to change unhealthy habits through monitoring their behavior. Mobile applications can enhance self-monitoring by providing real-time feedback and employing persuasive technology. The projects presented demonstrate the potential of persuasive, assistive applications for both chronically ill and healthy individuals.


Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey Jul 2014

Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey

Tammy R Toscos

No abstract provided.


Nuclear War: Hiroshima, Nagasaki, And A Workable Moral Strategy For Achieving And Preserving World Peace, Raymond Wilson Jul 2014

Nuclear War: Hiroshima, Nagasaki, And A Workable Moral Strategy For Achieving And Preserving World Peace, Raymond Wilson

Raymond Wilson

An examination of the horrors of nuclear war, and what happens to the victims in the aftermath. It also explores ways in which we can work to create a peaceful society.


A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu Jun 2014

A Tool For Designing Business Model Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There is a steady stream of business model innovations created to deliver value to customers using new approaches. Famous examples of business model innovations have been Amazon, Dell computers and Starbucks. Several other examples of business model innovations have been created across industries and reported in popular and academic forums. Osterwalder and Pigneur had defined a business model canvas as a framework for analysing business models. They had defined nine key subcomponents of a business model. Companies and individual entrepreneurs who wish to create business model innovations are still deploying trial and error approaches to discovering new business models. There …


Sewordsim: Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall Jun 2014

Sewordsim: Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall

David LO

Measuring the similarity of words is important in accurately representing and comparing documents, and thus improves the results of many natural language processing (NLP) tasks. The NLP community has proposed various measurements based on WordNet, a lexical database that contains relationships between many pairs of words. Recently, a number of techniques have been proposed to address software engineering issues such as code search and fault localization that require understanding natural language documents, and a measure of word similarity could improve their results. However, WordNet only contains information about words senses in general-purpose conversation, which often differ from word senses in …


Leveraging Machine Learning And Information Retrieval Techniques In Software Evolution Tasks: Summary Of The First Malir-Se Workshop, At Ase 2013, - Lucia, David Lo, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, Collin Mcmillan Jun 2014

Leveraging Machine Learning And Information Retrieval Techniques In Software Evolution Tasks: Summary Of The First Malir-Se Workshop, At Ase 2013, - Lucia, David Lo, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, Collin Mcmillan

David LO

The first International Workshop on MAchine Learning and Information Retrieval for Software Evolution (MALIR-SE) was held on the 11th of November 2013. The workshop was held in conjunction with the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) in Silicon Valley, California, USA. The workshop brought researchers and practitioners that were interested in leveraging machine learning and information retrieval techniques to automate various software evolution tasks. During the workshop, papers on the application of machine learning and information retrieval techniques to bug fix time prediction and anti-pattern detection were presented. There were also discussions on the presented papers and …


Hierarchical Parallel Algorithm For Modularity-Based Community Detection Using Gpus, Chun Yew Cheong, Huynh Phung Huynh, David Lo, Rick Siow Mong Goh Jun 2014

Hierarchical Parallel Algorithm For Modularity-Based Community Detection Using Gpus, Chun Yew Cheong, Huynh Phung Huynh, David Lo, Rick Siow Mong Goh

David LO

This paper describes the design of a hierarchical parallel algorithm for accelerating community detection which involves partitioning a network into communities of densely connected nodes. The algorithm is based on the Louvain method developed at the Université Catholique de Louvain, which uses modularity to measure community quality and has been successfully applied on many different types of networks. The proposed hierarchical parallel algorithm targets three levels of parallelism in the Louvain method and it has been implemented on single-GPU and multi-GPU architectures. Benchmarking results on several large web-based networks and popular social networks show that on top of offering speedups …


Software Internationalization And Localization: An Industrial Experience, Xin Xia, David Lo, Feng Zhu, Xinyu Wang, Bo Zhou Jun 2014

Software Internationalization And Localization: An Industrial Experience, Xin Xia, David Lo, Feng Zhu, Xinyu Wang, Bo Zhou

David LO

Software internationalization and localization are important steps in distributing and deploying software to different regions of the world. Internationalization refers to the process of reengineering a system such that it could support various languages and regions without further modification. Localization refers to the process of adapting an internationalized software for a specific language or region. Due to various reasons, many large legacy systems did not consider internationalization and localization at the early stage of development. In this paper, we present our experience on, and propose a process along with tool supports for software internationalization and localization. We reengineer a large …


Leveraging Web 2.0 For Software Evolution, Yuan Tian, David Lo Jun 2014

Leveraging Web 2.0 For Software Evolution, Yuan Tian, David Lo

David LO

In this era of Web 2.0, much information is available on the Internet. Software forums, mailing lists, and question-and-answer sites contain lots of technical information. Blogs contain developers’ opinions, ideas, and descriptions of their day-to-day activities. Microblogs contain recent and popular software news. Software forges contain records of socio-technical interactions of developers. All these resources could potentially be leveraged to help developers in performing software evolution activities. In this chapter, we first present information that is available from these Web 2.0 resources. We then introduce empirical studies that investigate how developers contribute information to and use these resources. Next, we …


An Empirical Study Of Bugs In Build Process, Xiaoqiong Zhao, Xin Xia, Pavneet Singh Kochhar, David Lo, Shanping Li Jun 2014

An Empirical Study Of Bugs In Build Process, Xiaoqiong Zhao, Xin Xia, Pavneet Singh Kochhar, David Lo, Shanping Li

David LO

Software build process translates source codes into executable programs, packages the programs, generates documents, and distributes products. In this paper, we perform an empirical study to characterize build process bugs. We analyze bugs in build process in 5 open-source systems under Apache namely CXF, Camel, Felix, Struts, and Tuscany. We compare build process bugs and other bugs across 3 different dimensions, i.e., bug severity, bug fix time, and the number of files modified to fix a bug. Our results show that the fraction of build process bugs which are above major severity level is lower than that of other bugs. …


Build System Analysis With Link Prediction, Xin Xia, David Lo, Xinyu Wang, Bo Zhou Jun 2014

Build System Analysis With Link Prediction, Xin Xia, David Lo, Xinyu Wang, Bo Zhou

David LO

Compilation is an important step in building working software system. To compile large systems, typically build systems, such as make, are used. In this paper, we investigate a new research problem for build configuration file (e.g., Makefile) analysis: how to predict missed dependencies in a build configuration file. We refer to this problem as dependency mining. Based on a Makefile, we build a dependency graph capturing various relationships defined in the Makefile. By representing a Makefile as a dependency graph, we map the dependency mining problem to a link prediction problem, and leverage 9 state-of-the-art link prediction algorithms to solve …


Collaboration Patterns In Software Developer Network, Didi Surian, David Lo, Ee Peng Lim Jun 2014

Collaboration Patterns In Software Developer Network, Didi Surian, David Lo, Ee Peng Lim

David LO

No abstract provided.


An Empirical Study Of Bug Report Field Reassignment, Xin Xia, David Lo, Ming Wen, Shihab Emad, Bo Zhou Jun 2014

An Empirical Study Of Bug Report Field Reassignment, Xin Xia, David Lo, Ming Wen, Shihab Emad, Bo Zhou

David LO

A bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), platform, etc., which provide important information for the bug triaging and fixing process. It is important to make sure that bug information is correct since previous studies showed that the wrong assignment of bug report fields could increase the bug fixing time, and even delay the delivery of the software. In this paper, we perform an empirical study on bug report field reassignments in open-source software projects. To better understand why bug report fields are reassigned, we manually collect 99 recent bug reports that …


Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo Jun 2014

Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo

David LO

Community Question Answering (CQA) sites are becoming increasingly important source of information where users can share knowledge on various topics. Although these platforms bring new opportunities for users to seek help or provide solutions, they also pose many challenges with the ever growing size of the community. The sheer number of questions posted everyday motivates the problem of routing questions to the appropriate users who can answer them. In this paper, we propose an approach to predict the best answerer for a new question on CQA site. Our approach considers both user interest and user expertise relevant to the topics …


On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo Jun 2014

On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo

David LO

Gaming expertise is usually accumulated through playing or watching many game instances, and identifying critical moments in these game instances called turning points. Turning point rules (shorten as TPRs) are game patterns that almost always lead to some irreversible outcomes. In this paper, we formulate the notion of irreversible outcome property which can be combined with pattern mining so as to automatically extract TPRs from any given game datasets. We specifically extend the well-known PrefixSpan sequence mining algorithm by incorporating the irreversible outcome property. To show the usefulness of TPRs, we apply them to Tetris, a popular game. We mine …


Automated Construction Of A Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall Jun 2014

Automated Construction Of A Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall

David LO

Many automated software engineering approaches, including code search, bug report categorization, and duplicate bug report detection, measure similarities between two documents by analyzing natural language contents. Often different words are used to express the same meaning and thus measuring similarities using exact matching of words is insufficient. To solve this problem, past studies have shown the need to measure the similarities between pairs of words. To meet this need, the natural language processing community has built WordNet which is a manually constructed lexical database that records semantic relations among words and can be used to measure how similar two words …


Towards More Accurate Multi-Label Software Behavior Learning, Xin Xia, Feng Yang, David Lo, Zhenyu Chen, Xinyu Wang Jun 2014

Towards More Accurate Multi-Label Software Behavior Learning, Xin Xia, Feng Yang, David Lo, Zhenyu Chen, Xinyu Wang

David LO

In a modern software system, when a program fails, a crash report which contains an execution trace would be sent to the software vendor for diagnosis. A crash report which corresponds to a failure could be caused by multiple types of faults simultaneously. Many large companies such as Baidu organize a team to analyze these failures, and classify them into multiple labels (i.e., multiple types of faults). However, it would be time-consuming and difficult for developers to manually analyze these failures and come out with appropriate fault labels. In this paper, we automatically classify a failure into multiple types of …


Proceedings Of The 1st International Workshop On Machine Learning And Information Retrieval For Software Evolution, - Lucia, David Lo, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, Collin Mcmillan Jun 2014

Proceedings Of The 1st International Workshop On Machine Learning And Information Retrieval For Software Evolution, - Lucia, David Lo, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, Collin Mcmillan

David LO

No abstract provided.


Proceedings Of The 2nd International Workshop On Software Mining, Ming Li, Hongyu Zhang, David Lo Jun 2014

Proceedings Of The 2nd International Workshop On Software Mining, Ming Li, Hongyu Zhang, David Lo

David LO

No abstract provided.


Boat: An Experimental Platform For Researchers To Comparatively And Reproducibly Evaluate Bug Localization Techniques, Xinyu Wang, David Lo, Xin Xia, Xingen Wang, Pavneet Singh Kochhar, Yuan Tian, Xiaohu Yang, Shanping Li, Jianling Sun, Bo Zhou Jun 2014

Boat: An Experimental Platform For Researchers To Comparatively And Reproducibly Evaluate Bug Localization Techniques, Xinyu Wang, David Lo, Xin Xia, Xingen Wang, Pavneet Singh Kochhar, Yuan Tian, Xiaohu Yang, Shanping Li, Jianling Sun, Bo Zhou

David LO

Bug localization refers to the process of identifying source code files that contain defects from descriptions of these defects which are typically contained in bug reports. There have been many bug localization techniques proposed in the literature. However, often it is hard to compare these techniques since different evaluation datasets are used. At times the datasets are not made publicly available and thus it is difficult to reproduce reported results. Furthermore, some techniques are only evaluated on small datasets and thus it is not clear whether the results are generalizable. Thus, there is a need for a platform that allows …


Public Transport Service Quality And Sustainable Development: A Community Stakeholder Perspective, Linda Too, George Earl Jun 2014

Public Transport Service Quality And Sustainable Development: A Community Stakeholder Perspective, Linda Too, George Earl

Linda Too

A key element in achieving sustainability's triple-bottom-line goals is a good public transport system. Many studies have shown the relationship between effective public transport services and sustainable development at the city level. The purpose of this study is to introduce and use a SERVQUAL framework to measure public transport services within a master-planned community in Australia. The stakeholder survey findings suggest a wide gap between community expectations of public transport services and the actual service quality provided. This was consistent across all commuter groups. In particular, the findings have been useful in shedding broad light on the areas where improvements …


Hurdle Models And Age Effects In The Major League Baseball Draft, J. Sims, Vittorio Addona May 2014

Hurdle Models And Age Effects In The Major League Baseball Draft, J. Sims, Vittorio Addona

Vittorio Addona

No abstract provided.


Introduction To Physics I: Laboratory Manual, Robert Coakley May 2014

Introduction To Physics I: Laboratory Manual, Robert Coakley

Robert Coakley

No abstract provided.


Introduction To Physics Ii: Laboratory Manual, Robert Coakley May 2014

Introduction To Physics Ii: Laboratory Manual, Robert Coakley

Robert Coakley

No abstract provided.


Quantitative Analysis Of Structure And Bandgap Changes In Graphene Oxide Nanoribbons During Thermal Annealing, Yu Zhu, Xianyu Li, Qinjia Cai, Zhengzong Sun, Gilberto Casillas, Miguel Jose-Yacaman, Rafael Verduzco, James Tour May 2014

Quantitative Analysis Of Structure And Bandgap Changes In Graphene Oxide Nanoribbons During Thermal Annealing, Yu Zhu, Xianyu Li, Qinjia Cai, Zhengzong Sun, Gilberto Casillas, Miguel Jose-Yacaman, Rafael Verduzco, James Tour

Yu Zhu

Graphene oxide nanoribbons (GONRs) are wide bandgap semiconductors that can be reduced to metallic graphene nanoribbons. The transformation of GONRs from their semiconductive to the metallic state by annealing has attracted significant interest due to its simplicity. However, the detailed process by which GONRs transform from widebandgap semiconductors to semimetals with a near zero bandgap is unclear. As a result, precise control of the bandgap between these two states is not currently achievable. Here, we quantitatively examine the removal of oxygen-containing groups and changes in the bandgap during thermal annealing of GONRs. X-ray photoelectron spectroscopy measurements show the progressive removal …


A Seemless Three-Dimensional Carbon Nanotube Graphene Hybrid Material, Yu Zhu, Lei Li, Gilberto Casillas, Zhengzong Sun, Zheng Yan, Gedeng Ruan, Zhiwei Peng, Abdul-Rahman Raji, Carter Kittrell, Robert Hauge, James Tour May 2014

A Seemless Three-Dimensional Carbon Nanotube Graphene Hybrid Material, Yu Zhu, Lei Li, Gilberto Casillas, Zhengzong Sun, Zheng Yan, Gedeng Ruan, Zhiwei Peng, Abdul-Rahman Raji, Carter Kittrell, Robert Hauge, James Tour

Yu Zhu

Graphene and single-walled carbon nanotubes are carbon materials that exhibit excellent electrical conductivities and large specific surface areas. Theoretical work suggested that a covalently bonded graphene/single-walled carbon nanotube hybrid material would extend those properties to three dimensions, and be useful in energy storage and nanoelectronic technologies. Here we disclose a method to bond graphene and single-walled carbon nanotubes seamlessly during the growth stage. The hybrid material exhibits a surface area 42,000m2 g1 with ohmic contact from the vertically aligned single-walled carbon nanotubes to the graphene. Using aberration-corrected scanning transmission electron microscopy, we observed the covalent transformation of sp2 carbon between …


Three Bosons In One Dimension With Short-Range Interactions: Zero-Range Potentials, Nirav Mehta, James Shepard May 2014

Three Bosons In One Dimension With Short-Range Interactions: Zero-Range Potentials, Nirav Mehta, James Shepard

Nirav P Mehta

We consider the three-boson problem with δ-function interactions in one spatial dimension. Three different approaches are used to calculate the phase shifts, which we interpret in the context of the effective range expansion, for the scattering of one free particle off a bound pair. We first follow a procedure outlined by McGuire in order to obtain an analytic expression for the desired S-matrix element. This result is then compared to a variational calculation in the adiabatic hyperspherical representation, and to a numerical solution to the momentum-space Faddeev equations. We find excellent agreement with the exact phase shifts, and comment on …


Session A-1: Problem Solving Through Graph Theory, Noah Prince May 2014

Session A-1: Problem Solving Through Graph Theory, Noah Prince

Noah Prince

Graph theory is an area of mathematics often not encountered before college, and not always even there. Nonetheless, it is full of problems that novices can quickly understand and begin to figure out. Often, sixty seconds of introduction to such a problem can lead to literally an hour of discussion as students engage in finding solutions. In this presentation, I will offer some sample problems and discuss how to use them with students in middle or high school.


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.