64 research outputs found
Recommended from our members
Leveraging the Power of Crowds: Automated Test Report Processing for The Maintenance of Mobile Applications
Crowdsourcing is an emerging distributed problem-solving model combining human and machine computation. It collects intelligence and knowledge from a large and diverse workforce to complete complex tasks. In the software engineering domain, crowdsourced techniques have been adopted to facilitate various tasks, such as design, testing, debugging, development, and so on. Specifically, in crowdsourced testing, crowdsourced workers are given testing tasks to perform and submit their feedback in the form of test reports. One of the key advantages of crowdsourced testing is that it is capable of providing engineers software engineers with domain knowledge and feedback from a large number of real users. Based on diverse software and hardware settings of these users, engineers can bugs that are not caught by traditional quality assurance techniques. Such benefits are particularly ideal for mobile application testing, which needs rapid development-and-deployment iterations and support diverse execution environments. However, crowdsourced testing naturally generates an overwhelming number of crowdsourced test reports, and inspecting such a large number of reports becomes a time-consuming yet inevitable task. This dissertation presents a series of techniques, tools and experiments to assist in crowdsourced report processing. These techniques are designed for improving this task in multiple aspects: 1. prioritizing crowdsourced report to assist engineers in finding as many unique bugs as possible, and as quickly as possible; 2. grouping crowdsourced report to assist engineers in identifying the representative ones in a short time; 3. summarizing the duplicate reports to provide engineers with a concise and accurate understanding of a group of reports; In the first step, I present a text-analysis-based technique to prioritize test reports for manual inspection. This technique leverages two key strategies: (1) a diversity strategy to help developers inspect a wide variety of test reports and to avoid duplicates and wasted effort on falsely classified faulty behavior, and (2) a risk-assessment strategy to help developers identify test reports that may be more likely to be fault-revealing based on past observations.Together, these two strategies form our technique to prioritize test reports in crowdsourced testing. Moreover, in the mobile testing domain, test reports often consist of more screenshots and shorter descriptive text, and thus text-analysis-based techniques may be ineffective or inapplicable. The shortage and ambiguity of natural-language text information and the well-defined screenshots of activity views within mobile applications motivate me to propose a novel technique based on using image understanding for multi-objective test-report prioritization. This technique employs the Spatial Pyramid Matching (SPM) technique to measure the similarity of the screenshots, and apply the natural-language processing technique to measure the distance between the text of test reports. Next, I design and implement CTRAS: a novel approach to leveraging duplicates to enrich the content of bug descriptions and improve the efficiency of inspecting these reports. CTRAS is capable of automatically aggregating duplicates based on both textual information and screenshots, and further summarizes the duplicate test reports into a comprehensive and comprehensible report.I validate all of these techniques on industrial data by collaborating with several companies. The results show my techniques can improve both the efficiency and effectiveness of crowdsourced test report processing. Also, I suggest settings for different usage scenarios and discuss future research directions
Reliability training
Discussed here is failure physics, the study of how products, hardware, software, and systems fail and what can be done about it. The intent is to impart useful information, to extend the limits of production capability, and to assist in achieving low cost reliable products. A review of reliability for the years 1940 to 2000 is given. Next, a review of mathematics is given as well as a description of what elements contribute to product failures. Basic reliability theory and the disciplines that allow us to control and eliminate failures are elucidated
The Translocal Event and the Polyrhythmic Diagram
This thesis identifies and analyses the key creative protocols in translocal performance practice, and ends with suggestions for new forms of transversal live and mediated
performance practice, informed by theory. It argues that ontologies of emergence in dynamic systems nourish contemporary practice in the digital arts. Feedback
in self-organised, recursive systems and organisms elicit change, and change transforms. The arguments trace concepts from chaos and complexity theory to virtual multiplicity, relationality, intuition and individuation (in the work of Bergson, Deleuze, Guattari, Simondon, Massumi, and other process theorists). It then examines the intersection of methodologies in philosophy, science and art and the
radical contingencies implicit in the technicity of real-time, collaborative composition. Simultaneous forces or tendencies such as perception/memory, content/
expression and instinct/intellect produce composites (experience, meaning, and intuition- respectively) that affect the sensation of interplay. The translocal
event is itself a diagram - an interstice between the forces of the local and the global, between the tendencies of the individual and the collective. The translocal is
a point of reference for exploring the distribution of affect, parameters of control and emergent aesthetics. Translocal interplay, enabled by digital technologies and network protocols, is ontogenetic and autopoietic; diagrammatic and synaesthetic; intuitive and transductive. KeyWorx is a software application developed for realtime, distributed, multimodal media processing. As a technological tool created by artists, KeyWorx supports this intuitive type of creative experience: a real-time, translocal “jamming” that transduces the lived experience of a “biogram,” a synaesthetic hinge-dimension. The emerging aesthetics are processual – intuitive, diagrammatic and transversal
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide we
Archaeology of Digital Environments: Tools, Methods, and Approaches
Digital archaeologists use digital tools for conducting archaeological work, but their potential also lies in applying archaeological thinking and methods to understanding digital built environments (i.e., software) as contemporary examples of human settlement, use, and abandonment. This thesis argues for digital spaces as archaeological artifacts, sites, and landscapes that can be investigated in both traditional and non-traditional ways. At the core of my research is the fundamental argument that human-occupied digital spaces can be studied archaeologically with existing and modified theory, tools, and methods to reveal that human occupation and use of synthetic worlds is similar to how people behave in the natural world. Working digitally adds new avenues of investigation into human behavior in relation to the things people make, modify, and inhabit. In order to investigate this argument, the thesis focuses on three video game case studies, each using different kinds of archaeology specifically chosen to help understand the software environments being researched: 1) epigraphy, stylometry, and text analysis for the code-artifact of Colossal Cave Adventure; 2) photogrammetry, 3D printing, GIS mapping, phenomenology, and landscape archaeology within the designed, digital heritage virtual reality game-site of Skyrim VR; 3) actual survey and excavation of 30 heritage sites for a community of displaced human players in the synthetic landscape of No Man’s Sky. My conclusions include a blended approach to conducting future archaeological fieldwork in digital built environments, one that modifies traditional approaches to archaeological sites and material in a post/transhuman landscape. As humanity continues trending towards constant digital engagement, archaeologists need to be prepared to study how digital places are settled, used, and abandoned. This thesis takes a step in that direction using the vernacular of games as a starting point
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
Users are burdened with the task of configuring access control policies on many dif- ferent application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application per- missions before the application is first used and provide an all or nothing decision for the user. When application platforms provide fine grained control over decision making, many users exhibit behavior that indicates they desire more control over their application permissions. However, users who desire control over application permissions still struggle to properly configure them because they lack the context in which to make better decisions. In this dissertation, I attempt to address these problems by exploring decision making during the context of using mobile and social network applications. I hypothesize that users are able to better configure access control permissions as they interact with applications by supplying more contextual information than is available when the application is being installed. I also explore how logged access data generated by the application platform can provide users with more understanding of when their data is accessed. Finally, I examine the effects that this contextually improved application platform has on user decision making
Critical point of view: a Wikipedia reader
For millions of internet users around the globe, the search for new knowledge begins with Wikipedia. The encyclopedia’s rapid rise, novel organization, and freely offered content have been marveled at and denounced by a host of commentators. Critical Point of View moves beyond unflagging praise, well-worn facts, and questions about its reliability and accuracy, to unveil the complex, messy, and controversial realities of a distributed knowledge platform.
The essays, interviews and artworks brought together in this reader form part of the overarching Critical Point of View research initiative, which began with a conference in Bangalore (January 2010), followed by events in Amsterdam (March 2010) and Leipzig (September 2010). With an emphasis on theoretical reflection, cultural difference and indeed, critique, contributions to this collection ask: What values are embedded in Wikipedia’s software? On what basis are Wikipedia’s claims to neutrality made? How can Wikipedia give voice to those outside the Western tradition of Enlightenment, or even its own administrative hierarchies? Critical Point of View collects original insights on the next generation of wiki-related research, from radical artistic interventions and the significant role of bots to hidden trajectories of encyclopedic knowledge and the politics of agency and exclusion
Computer Aided Verification
This open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency
- …