Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1801 - 1830 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Riding Through The Silver Tsunami: A Data Driven Approach To Improve Senior Citizens’ Engagement With Community Senior Activity Centres, Joshua Jie Feng Lam, Hwee-Pink Tan Jun 2021

Riding Through The Silver Tsunami: A Data Driven Approach To Improve Senior Citizens’ Engagement With Community Senior Activity Centres, Joshua Jie Feng Lam, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In Singapore, 1 in 4 persons will be elderly by 2030 In preparation for the Silver Tsunami, the Singapore government and community care providers have collaborations to promote active, independent living amongst elders Current implementation of data driven population health is focused on well being indices using data collected from the general population There is no literature on the use of data analytics in assessing elder


How-To Present News On Social Media: A Causal Analysis Of Editing News Headlines For Boosting User Engagement, Kunwoo Park, Haewoon Kwak, Jisun An, Sanjay Chawla Jun 2021

How-To Present News On Social Media: A Causal Analysis Of Editing News Headlines For Boosting User Engagement, Kunwoo Park, Haewoon Kwak, Jisun An, Sanjay Chawla

Research Collection School Of Computing and Information Systems

To reach a broader audience and optimize traffic toward news articles, media outlets commonly run social media accounts and share their content with a short text summary. Despite its importance of writing a compelling message in sharing articles, the research community does not own a sufficient understanding of what kinds of editing strategies effectively promote audience engagement. In this study, we aim to fill the gap by analyzing media outlets' current practices using a data-driven approach. We first build a parallel corpus of original news articles and their corresponding tweets that eight media outlets shared. Then, we explore how those …


Ganmut: Learning Interpretable Conditional Space For A Gamut Of Emotions, S. D'Apolito, D.P. Paundel, Zhiwu Huang, A.R. Vergara, Gool L. Van Jun 2021

Ganmut: Learning Interpretable Conditional Space For A Gamut Of Emotions, S. D'Apolito, D.P. Paundel, Zhiwu Huang, A.R. Vergara, Gool L. Van

Research Collection School Of Computing and Information Systems

Humans can communicate emotions through a plethora of facial expressions, each with its own intensity, nuances and ambiguities. The generation of such variety by means of conditional GANs is limited to the expressions encoded in the used label system. These limitations are caused either due to burdensome labeling demand or the confounded label space. On the other hand, learning from inexpensive and intuitive basic categorical emotion labels leads to limited emotion variability. In this paper, we propose a novel GAN-based framework which learns an expressive and interpretable conditional space (usable as a label space) of emotions, instead of conditioning on …


Incorrectness Logic For Graph Programs, Christopher M. Poskitt Jun 2021

Incorrectness Logic For Graph Programs, Christopher M. Poskitt

Research Collection School Of Computing and Information Systems

Program logics typically reason about an over-approximation of program behaviour to prove the absence of bugs. Recently, program logics have been proposed that instead prove the presence of bugs by means of under-approximate reasoning, which has the promise of better scalability. In this paper, we present an under-approximate program logic for a nondeterministic graph programming language, and show how it can be used to reason deductively about program incorrectness, whether defined by the presence of forbidden graph structure or by finitely failing executions. We prove this 'incorrectness logic' to be sound and complete, and speculate on some possible future applications …


Lattice-Based Remote User Authentication From Reusable Fuzzy Signature, Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang Jun 2021

Lattice-Based Remote User Authentication From Reusable Fuzzy Signature, Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang

Research Collection School Of Computing and Information Systems

In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the …


A Large Scale Study Of Long-Time Contributor Prediction For Github Projects, Lingfeng Bao, Xin Xia, David Lo, Gail C. Murphy Jun 2021

A Large Scale Study Of Long-Time Contributor Prediction For Github Projects, Lingfeng Bao, Xin Xia, David Lo, Gail C. Murphy

Research Collection School Of Computing and Information Systems

The continuous contributions made by long time contributors (LTCs) are a key factor enabling open source software (OSS) projects to be successful and survival. We study Github as it has a large number of OSS projects and millions of contributors, which enables the study of the transition from newcomers to LTCs. In this paper, we investigate whether we can effectively predict newcomers in OSS projects to be LTCs based on their activity data that is collected from Github. We collect Github data from GHTorrent, a mirror of Github data. We select the most popular 917 projects, which contain 75,046 contributors. …


Do Animated Line Graphs Increase Risk Inferences?, Junghan Kim, Arun Lakshmanan Jun 2021

Do Animated Line Graphs Increase Risk Inferences?, Junghan Kim, Arun Lakshmanan

Research Collection Lee Kong Chian School Of Business

This article shows that animated display of time-varying data (e.g., stock or commodity prices) enhances risk judgments. We outline a process whereby animated display enhances the visual salience of transitions in a trajectory (i.e., successive changes in data values), which leads to transitions being utilized more to form cognitive inferences about risk. In turn, this leads to inflated risk judgments. The studies reported in this article provide converging evidence via eye tracking (Study 1), serial mediation analyses (Studies 2 and 3), and experimental manipulations of transition salience (graph type; Study 3) and utilization of transitions (global trend; Study 4 and …


Projecting Your View Attentively: Monocular Road Scene Layout Estimation Via Cross-View Transformation, Weixiang Yang, Qi Li, Wenxi Liu, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan Jun 2021

Projecting Your View Attentively: Monocular Road Scene Layout Estimation Via Cross-View Transformation, Weixiang Yang, Qi Li, Wenxi Liu, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan

Research Collection School Of Computing and Information Systems

HD map reconstruction is crucial for autonomous driving. LiDAR-based methods are limited due to the deployed expensive sensors and time-consuming computation. Camera-based methods usually need to separately perform road segmentation and view transformation, which often causes distortion and the absence of content. To push the limits of the technology, we present a novel framework that enables reconstructing a local map formed by road layout and vehicle occupancy in the bird's-eye view given a front-view monocular image only. In particular, we propose a cross-view transformation module, which takes the constraint of cycle consistency between views into account and makes full use …


Why Do Robots Have Smiley Faces?, Mark Findlay Jun 2021

Why Do Robots Have Smiley Faces?, Mark Findlay

Research Collection Yong Pung How School Of Law

The author discussed why engineers and designers provide machines with the semblance of friendliness, and why it takes more than that for humans to trust AI. The ground-breaking AI in community research and policy initiative by CAIDG, supported by the National Research Foundation Singapore under its Emerging Areas Research Projects Funding Initiative, seeks to understand how and why trust can be established when humans and machines come together.


Research On Climate Change In Social Psychology Publications: A Systematic Review, Kim-Pong Kam, Angela K. Y. Leung, Susan Clayton Jun 2021

Research On Climate Change In Social Psychology Publications: A Systematic Review, Kim-Pong Kam, Angela K. Y. Leung, Susan Clayton

Research Collection School of Social Sciences

There is a strong scientific consensus that anthropogenic climate change is happening and that its impacts can put both ecological and human systems in jeopardy. Social psychology, the scientific study of human behaviours in their social and cultural settings, is an important tool for understanding how humans interpret and respond to climate change. In this article, we offered a systematic review of the social psychological literature of climate change. We sampled 130 studies on climate change or global warming from 80 articles published in journals indexed under the “Psychology, social” category of Journal Citation Reports. Based on this sample, …


Digital Transformation: What? How? Why?, Chee Hau Tan, Darren Thayre, Ewen Plougastel, Mark Shmulevich May 2021

Digital Transformation: What? How? Why?, Chee Hau Tan, Darren Thayre, Ewen Plougastel, Mark Shmulevich

Perspectives@SMU

Leadership and prep work ahead of transformation are key


Learning From The Bats: Cooperation A Fundamental Sustainability Principle, Juan Humberto Young May 2021

Learning From The Bats: Cooperation A Fundamental Sustainability Principle, Juan Humberto Young

Perspectives@SMU

Most scientists agree that COVID-19 was transmitted to humans from bats. In an ironic twist, their social behaviour could help us solve many of our collective problems


Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism;, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Achananuparp Palakorn, Ee Peng Lim, Steven Hoi May 2021

Cross-Modal Food Retrieval: Learning A Joint Embedding Of Food Images And Recipes With Semantic Consistency And Attention Mechanism;, Hao Wang, Doyen Sahoo, Chenghao Liu, Ke Shu, Achananuparp Palakorn, Ee Peng Lim, Steven Hoi

Research Collection School Of Computing and Information Systems

Food retrieval is an important task to perform analysis of food-related information, where we are interested in retrieving relevant information about the queried food item such as ingredients, cooking instructions, etc. In this paper, we investigate cross-modal retrieval between food images and cooking recipes. The goal is to learn an embedding of images and recipes in a common feature space, such that the corresponding image-recipe embeddings lie close to one another. Two major challenges in addressing this problem are 1) large intra-variance and small inter-variance across cross-modal food data; and 2) difficulties in obtaining discriminative recipe representations. To address these …


Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao May 2021

Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao

Research Collection School Of Computing and Information Systems

Notoriously, immutability is one of the most striking properties of blockchains. As the data contained in blockchains may be compelled to redact for personal and legal reasons, immutability needs to be skillfully broken. In most existing redactable blockchains, fine-grained redaction and effective deletion of harmful data are mutually exclusive. To close the gap, we propose a fine-grained and controllably redactable blockchain with harmful data forced removal. In the scheme, the originator of the transaction has fine-grained control over who can perform the redaction and which portions of the transaction can be redacted. The redaction transaction is performed after collecting enough …


Immigrant Families' Health-Related Information Behavior On Instant Messaging Platforms: Health-Related Information Exchange In Immigrant Family Groups On Instant Messaging Platforms, Lev Poretski, Taamannae Taabassum, Anthony Tang May 2021

Immigrant Families' Health-Related Information Behavior On Instant Messaging Platforms: Health-Related Information Exchange In Immigrant Family Groups On Instant Messaging Platforms, Lev Poretski, Taamannae Taabassum, Anthony Tang

Research Collection School Of Computing and Information Systems

For immigrant families, instant messaging family groups are a common platform forsharing and discussing health-related information. Immigrants often maintain contact with their family abroad and trust information in shared IM family groups more than the information from local authorities and sources. In this study, we aimed to understand health-related information behaviors of immigrant families in their IM family groups. Based on the interviews with 6 participants from immigrant families to Canada, we found that immigrant families’ discourse on IM platforms is motivated by love and care for other family members. The families used local and international sources of information, judged …


Visuo-Haptic Illusions For Linear Translation And Stretching Using Physical Proxies In Virtual Reality, Martin Feick, Niko Kleer, André Zenner, Anthony Tang, Antonio Kruger May 2021

Visuo-Haptic Illusions For Linear Translation And Stretching Using Physical Proxies In Virtual Reality, Martin Feick, Niko Kleer, André Zenner, Anthony Tang, Antonio Kruger

Research Collection School Of Computing and Information Systems

Providing haptic feedback when manipulating virtual objects is an essential part of immersive virtual reality experiences; however, it is challenging to replicate all of an object’s properties and characteristics. We propose the use of visuo-haptic illusions alongside physical proxies to enhance the scope of proxy-based interactions with virtual objects. In this work, we focus on two manipulation techniques, linear translation and stretching across different distances, and investigate how much discrepancy between the physical proxy and the virtual object may be introduced without participants noticing. In a study with 24 participants, we found that manipulation technique and travel distance significantly affect …


Automatic Solution Summarization For Crash Bugs, Haoye Wang, Xin Xia, David Lo, John C. Grundy, Xinyu Wang May 2021

Automatic Solution Summarization For Crash Bugs, Haoye Wang, Xin Xia, David Lo, John C. Grundy, Xinyu Wang

Research Collection School Of Computing and Information Systems

The causes of software crashes can be hidden anywhere in the source code and development environment. When encountering software crashes, recurring bugs that are discussed on Q&A sites could provide developers with solutions to their crashing problems. However, it is difficult for developers to accurately search for relevant content on search engines, and developers have to spend a lot of manual effort to find the right solution from the returned results. In this paper, we present CRASOLVER, an approach that takes into account both the structural information of crash traces and the knowledge of crash-causing bugs to automatically summarize solutions …


Infercode: Self-Supervised Learning Of Code Representations By Predicting Subtrees, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang May 2021

Infercode: Self-Supervised Learning Of Code Representations By Predicting Subtrees, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Learning code representations has found many uses in software engineering, such as code classification, code search, code comment generation, and bug prediction. Although representations of code in tokens, syntax trees, dependency graphs, paths in trees, or the combinations of their variants have been proposed, existing learning techniques have a major limitation that these models are often trained on datasets labeled for specific downstream tasks, and the code representations may not be suitable for other tasks. Even though some techniques generate representations from unlabeled code, they are far from satisfactory when applied to downstream tasks. To overcome the limitation, this paper …


On The Root Of Trust Identification Problem, Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik May 2021

On The Root Of Trust Identification Problem, Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik

Research Collection School Of Computing and Information Systems

Trusted Execution Environments (TEEs) are becoming ubiquitous and are currently used in many security applications: from personal IoT gadgets to banking and databases. Prominent examples of such architectures are Intel SGX, ARM TrustZone, and Trusted Platform Modules (TPMs). A typical TEE relies on a dynamic Root of Trust (RoT) to provide security services such as code/data confidentiality and integrity, isolated secure software execution, remote attestation, and sensor auditing. Despite their usefulness, there is currently no secure means to determine whether a given security service or task is being performed by the particular RoT within a specific physical device. We refer …


Edgeduet: Tiling Small Object Detection For Edge Assisted Autonomous Mobile Vision, Xu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou May 2021

Edgeduet: Tiling Small Object Detection For Edge Assisted Autonomous Mobile Vision, Xu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou

Research Collection School Of Computing and Information Systems

Accurate, real-time object detection on resource-constrained devices enables autonomous mobile vision applications such as traffic surveillance, situational awareness, and safety inspection, where it is crucial to detect both small and large objects in crowded scenes. Prior studies either perform object detection locally on-board or offload the task to the edge/cloud. Local object detection yields low accuracy on small objects since it operates on low-resolution videos to fit in mobile memory. Offloaded object detection incurs high latency due to uploading high-resolution videos to the edge/cloud. Rather than either pure local processing or offloading, we propose to detect large objects locally while …


Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar May 2021

Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar

Research Collection School Of Computing and Information Systems

Modeling vessel movement in a maritime environment is an extremely challenging task given the complex nature of vessel behavior. Several existing multiagent maritime decision making frameworks require access to an accurate traffic simulator. We develop a system using electronic navigation charts to generate realistic and high fidelity vessel traffic data using Generative Adversarial Networks (GANs). Our proposed Ship-GAN uses a conditional Wasserstein GAN to model a vessel’s behavior. The generator can simulate the travel time of vessels across different maritime zones conditioned on vessels’ speeds and traffic intensity. Furthermore, it can be used as an accurate simulator for prior decision …


Unveiling The Mystery Of Api Evolution In Deep Learning Frameworks: A Case Study Of Tensorflow 2, Zejun Zhang, Yanming Yang, Xin Xia, David Lo, Xiaoxue Ren, John C. Grundy May 2021

Unveiling The Mystery Of Api Evolution In Deep Learning Frameworks: A Case Study Of Tensorflow 2, Zejun Zhang, Yanming Yang, Xin Xia, David Lo, Xiaoxue Ren, John C. Grundy

Research Collection School Of Computing and Information Systems

API developers have been working hard to evolve APIs to provide more simple, powerful, and robust API libraries. Although API evolution has been studied for multiple domains, such as Web and Android development, API evolution for deep learning frameworks has not yet been studied. It is not very clear how and why APIs evolve in deep learning frameworks, and yet these are being more and more heavily used in industry. To fill this gap, we conduct a large-scale and in-depth study on the API evolution of Tensorflow 2, which is currently the most popular deep learning framework. We first extract …


Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Paruchuri, Akshat Kumar May 2021

Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Paruchuri, Akshat Kumar

Research Collection School Of Computing and Information Systems

In modular reinforcement learning (MRL), a complex decision making problem is decomposed into multiple simpler subproblems each solved by a separate module. Often, these subproblems have conflicting goals, and incomparable reward scales. A composable decision making architecture requires that even the modules authored separately with possibly misaligned reward scales can be combined coherently. An arbitrator should consider different module's action preferences to learn effective global action selection. We present a novel framework called GRACIAS that assigns fine-grained importance to the different modules based on their relevance in a given state, and enables composable decision making based on modern deep RL …


Leveraging Multiple Relations For Fashion Trend Forecasting Based On Social Media, Yujuan Ding, Yunshan Ma, Lizi Liao, Wai Keung Wong, Tat-Seng Chua May 2021

Leveraging Multiple Relations For Fashion Trend Forecasting Based On Social Media, Yujuan Ding, Yunshan Ma, Lizi Liao, Wai Keung Wong, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

—Fashion trend forecasting is of great research significance in providing useful suggestions for both fashion companies and fashion lovers. Although various studies have been devoted to tackling this challenging task, they only studied limited fashion elements with highly seasonal or simple patterns, which could hardly reveal the real complex fashion trends. Moreover, the mainstream solutions for this task are still statistical-based and solely focus on time-series data modeling, which limit the forecast accuracy. Towards insightful fashion trend forecasting, previous work [1] proposed to analyze more fine-grained fashion elements which can informatively reveal fashion trends. Specifically, it focused on detailed fashion …


Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes Blobel, Vu Huy Tran, Archan Misra, Falko Dressler May 2021

Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes Blobel, Vu Huy Tran, Archan Misra, Falko Dressler

Research Collection School Of Computing and Information Systems

Ultra-low power communication is critical for supporting the next generation of battery-operated or energy harvesting battery-less Internet of Things (IoT) devices. Duty cycling protocols and wake-up receiver (WuRx) technologies, and their combinations, have been investigated as energy-efficient mechanisms to support selective, event-driven activation of devices. In this paper, we go one step further and show how WuRx can be used for an efficient and multi-purpose low power downlink (LPD) communication channel. We demonstrate how to (a) extend the wake-up signal to support low-power flexible and extensible unicast, multicast, and broadcast downlink communication and (b) utilize the WuRx-based LPD to also …


Robot: Robustness-Oriented Testing For Deep Learning Systems, Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng May 2021

Robot: Robustness-Oriented Testing For Deep Learning Systems, Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng

Research Collection School Of Computing and Information Systems

Recently, there has been a significant growth of interest in applying software engineering techniques for the quality assurance of deep learning (DL) systems. One popular direction is deep learning testing, where adversarial examples (a.k.a. bugs) of DL systems are found either by fuzzing or guided search with the help of certain testing metrics. However, recent studies have revealed that the commonly used neuron coverage metrics by existing DL testing approaches are not correlated to model robustness. It is also not an effective measurement on the confidence of the model robustness after testing. In this work, we address this gap by …


Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Parachuri, Akshat Kumar May 2021

Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Parachuri, Akshat Kumar

Research Collection School Of Computing and Information Systems

In modular reinforcement learning (MRL), a complex decision making problem is decomposed into multiple simpler subproblems each solved by a separate module. Often, these subproblems have conflicting goals, and incomparable reward scales. A composable decision making architecture requires that even the modules authored separately with possibly misaligned reward scales can be combined coherently. An arbitrator should consider different module’s action preferences to learn effective global action selection. We present a novel framework called GRACIAS that assigns fine-grained importance to the different modules based on their relevance in a given state, and enables composable decision making based on modern deep RL …


A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi Hong, Xuhua Ding May 2021

A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi Hong, Xuhua Ding

Research Collection School Of Computing and Information Systems

Code instrumentation and hardware based event trapping are two primary approaches used in dynamic malware analysis systems. In this paper, we propose a new approach called Execution Flow Instrumentation (EFI) where the analyzer execution flow is interleaved with the target flow in user- and kernel-mode, at junctures flexibly chosen by the analyzer at runtime. We also propose OASIS as the system infrastructure to realize EFI with virtues of the current two approaches, however without their drawbacks. Despite being securely and transparently isolated from the target, the analyzer introspects and controls it in the same native way as instrumentation code. We …


Characterising The Knowledge About Primitive Variables In Java Code Comments, Mahfouth Alghamdi, Shinpei Hayashi, Takashi Kobayashi, Christoph Treude May 2021

Characterising The Knowledge About Primitive Variables In Java Code Comments, Mahfouth Alghamdi, Shinpei Hayashi, Takashi Kobayashi, Christoph Treude

Research Collection School Of Computing and Information Systems

Primitive types are fundamental components available in any programming language, which serve as the building blocks of data manipulation. Understanding the role of these types in source code is essential to write software. Little work has been conducted on how often these variables are documented in code comments and what types of knowledge the comments provide about variables of primitive types. In this paper, we present an approach for detecting primitive variables and their description in comments using lexical matching and advanced matching. We evaluate our approaches by comparing the lexical and advanced matching performance in terms of recall, precision, …


How Do Software Developers Use Github Actions To Automate Their Workflows?, Timothy Kinsman, Mairieli Wessel, Marco Gerosa, Christoph Treude May 2021

How Do Software Developers Use Github Actions To Automate Their Workflows?, Timothy Kinsman, Mairieli Wessel, Marco Gerosa, Christoph Treude

Research Collection School Of Computing and Information Systems

Automated tools are frequently used in social coding repositories to perform repetitive activities that are part of the distributed software development process. Recently, GitHub introduced GitHub Actions, a feature providing automated work-flows for repository maintainers. Although several Actions have been built and used by practitioners, relatively little has been done to evaluate them. Understanding and anticipating the effects of adopting such kind of technology is important for planning and management. Our research is the first to investigate how developers use Actions and how several activity indicators change after their adoption. Our results indicate that, although only a small subset of …