30 results
Search Results
2. Sampling Near Neighbors in Search for Fairness.
- Author
-
Aumüller, Martin, Har-Peled, Sariel, Mahabadi, Sepideh, Pagh, Rasmus, and Silvestri, Francesco
- Subjects
- *
DATA , *FAIRNESS , *DATABASE searching , *SEARCH algorithms , *COMPUTER algorithms , *COMPUTER science , *COMPUTER programming - Abstract
Similarity search is a fundamental algorithmic primitive, widely used in many computer science disciplines. Given a set of points S and a radius parameter r > 0, the r-near neighbor (r-NN) problem asks for a data structure that, given any query point q, returns a point p within distance at most r from q. In this paper, we study the r-NN problem in the light of individual fairness and providing equal opportunities: all points that are within distance r from the query should have the same probability to be returned. The problem is of special interest in high dimensions, where Locality Sensitive Hashing (LSH), the theoretically leading approach to similarity search, does not provide any fairness guarantee. In this work, we show that LSH-based algorithms can be made fair, without a significant loss in efficiency. We propose several efficient data structures for the exact and approximate variants of the fair NN problem. Our approach works more generally for sampling uniformly from a subcollection of sets of a given collection and can be used in a few other applications. We also carried out an experimental evaluation that highlights the inherent unfairness of existing NN data structures. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Resolution of the Burrows-Wheeler Transform Conjecture.
- Author
-
Kempa, Dominik and Kociumaka, Tomasz
- Subjects
- *
COMPUTER programming , *COMPUTERS in lexicography , *ALGORITHMS , *DATA structures , *COMPUTER science - Abstract
The Burrows-Wheeler Transform (BWT) is an invertible text transformation that permutes symbols of a text according to the lexicographical order of its suffixes. BWT is the main component of popular lossless compression programs (such as bzip2) as well as recent powerful compressed indexes (such as the r-index7), central in modern bioinformatics. The compressibility of BWT is quantified by the number r of equal-letter runs in the output. Despite the practical significance of BWT, no nontrivial upper bound on r is known. By contrast, the sizes of nearly all other known compression methods have been shown to be either always within a polylog n factor (where n is the length of the text) from z, the size of Lempel--Ziv (LZ77) parsing of the text, or much larger in the worst case (by an nε factor for ε > 0). In this paper, we show that r = O (z log² n) holds for every text. This result has numerous implications for text indexing and data compression; in particular: (1) it proves that many results related to BWT automatically apply to methods based on LZ77, for example, it is possible to obtain functionality of the suffix tree in O (z polylog n) space; (2) it shows that many text processing tasks can be solved in the optimal time assuming the text is compressible using LZ77 by a sufficiently large polylog n factor; and (3) it implies the first nontrivial relation between the number of runs in the BWT of the text and of its reverse. In addition, we provide an O (z polylog n)-time algorithm converting the LZ77 parsing into the run-length compressed BWT. To achieve this, we develop several new data structures and techniques of independent interest. In particular, we define compressed string synchronizing sets (generalizing the recently introduced powerful technique of string synchronizing sets11) and show how to efficiently construct them. Next, we propose a new variant of wavelet trees for sequences of long strings, establish a nontrivial bound on their size, and describe efficient construction algorithms. Finally, we develop new indexes that can be constructed directly from the LZ77 parsing and efficiently support pattern matching queries on text substrings. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Hands on programming: Teachers' use of Metaphors in gesture and Speech make Abstract concepts tangible.
- Author
-
Larsson, Andreas and Stolpe, Karin
- Subjects
- *
COMPUTER programming , *CLASSROOMS , *COGNITIVE linguistics , *COMPUTER science , *EDUCATORS - Abstract
Metaphors in gesture and speech play a pivotal role in the way that programming concepts are presented in the classroom. However, little is known about the function of teachers' metaphors in practice. This study aims to explore teachers' use of metaphors in gesture and speech in a lecture on programming. Based on video observations of three upper secondary teachers, we employ Metaphor Identification Procedure (MIP) and Metaphor Identification for Gesture Guidelines (MIG-G) as methodological tools for identifying metaphoric speech and gestures related to programming concepts. The results of the study reveal that the gestures of the three teachers mainly function in two ways: (1) to add spatial properties to a programming concept and (2) to provide additional imagery for a programming concept. Consequently, the gestures identified in this study reduce the communicative burden of teachers' speech. Furthermore, the study reveals that teachers' gestures serve as means for making abstract concepts more tangible. For example, gestures concerning the abstract term "data" can generally be related to an object that could be received or moved. Hence, despite its metaphorical origin, data could be considered a graspable aspect of programming. Furthermore, spatial gestures enable the teachers to communicate programming processes in a tangible way, for example assigning programming processes a forward direction. Theoretical implications, potential implications for teaching and future research are discussed in the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Code the mime: A 3D programmable charades game for computational thinking in MaLT2.
- Author
-
Grizioti, Marianthi and Kynigos, Chronis
- Subjects
- *
COMPUTER science , *EDUCATIONAL games , *GEOMETRY , *COMPUTER programming , *LEARNING theories in education - Abstract
In this paper, we discuss the need for new approaches to research regarding coding to support students in developing practices in computational thinking, such as abstraction and decomposition, in multidisciplinary contexts. We explore students' activities with a tool integrating constructionist textual programming activity with game‐based learning and specifically game modding. In this context, we designed a programmable 'design‐to‐play' game developed with the computational environment MaLT2. MaLT2 offers the affordances of textual programming, dynamic manipulation, and 3D navigation for the design of 3D animated models aiming to give children access to, otherwise, complex, computational and mathematical ideas. To develop an understanding of children's learning activity regarding computational practices, we organised an empirical study with middle‐school students, who played a game called 'Code‐the‐Mime'. It is a charades‐based game in which the players manipulate, programme, and modify a digital human model to describe a word to their teammates. The preliminary findings indicate that the affordances of MaLT2 in conjunction with the game context enabled students to express and develop key computational practices, including decomposition, pattern recognition, analysis and abstraction, in a meaningful and multidisciplinary context. Practitioner notesWhat is already known about this topic Computational Thinking is considered a key 21st‐century skill in preparing the young to become digital citizens. It involves concepts and practices that can be used to solve problems computationally across multiple fields. However, there is still limited knowledge of how students develop computational practices, such as abstraction, pattern recognition, decomposition, and how they may express and apply them in diverse contexts. Students' engagement with computational practices is unlikely to be supported either by closed, simplified coding tasks or higher‐level advanced programming exercises. There is a need to clarify the manifestation of these practices and how they can be realised and expressed and used by learners in meaningful and transdisciplinary contexts.What this paper adds It suggests the design of constructionist computational games that integrate design and programming into the gameplay, aiming to engage students with computational practices in a multidisciplinary, authentic context. It provides an example of a 'design‐to‐play' charades‐like game, developed in a 3D modelling programming environment, that embeds real‐life representations into computational design, to enable 'syntonic learning' of computational practices. Furthermore, it analyses student learning activity to elaborate on arguments and issues related to this approach.Implications for practice and/or policy There is added value in disconnecting computational thinking from positivist diagnostic approaches related to respective concepts and studying it in ways more related to realistic problem‐solving situations and multidisciplinary contexts. The study contributes to the scientific clarification of computational practices concerning how they are being realised and expressed by the students in different contexts through an original example of educational practice. The discussed approach and tools can contribute to the design and development of innovative digital media, embedding affordances for concepts and practices while maintaining relevance and interest for their users. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
6. Selected and extended papers from SBLP 2013.
- Author
-
Rauber Du Bois, André and Trinder, Phil
- Subjects
- *
COMPUTER programming , *PROGRAMMING languages , *SOFTWARE engineering , *COMPUTER science - Published
- 2016
- Full Text
- View/download PDF
7. Guest Editorial Special Issue "Recent Trends on Advanced Computing: The Converging Technologies".
- Author
-
Tchernykh, Andrei, Juárez Ramírez, Reyes, Mocskos, Esteban, and Nesmachnow, Sergio
- Subjects
- *
HIGH performance computing , *COMPUTER vision , *COMPUTER software , *COMPUTER science , *COMPUTER programming , *SOFTWARE engineering , *SOFTWARE measurement - Abstract
This document is a guest editorial for a special issue of the journal "Programming & Computer Software" titled "Recent Trends on Advanced Computing: The Converging Technologies." The issue features research and practical implementation results from researchers and industry experts in computer science, engineering, and technology. The papers cover a range of topics including microservices, software quality, user engagement on social media, non-functional requirements, medical software architecture, fallacies in political speeches, intelligent learning environments, and more. The guest editors for this special issue are Prof. Dr. Andrei Tchernykh, Prof. Reyes Juárez Ramírez, Dr. Esteban Mocskos, and Prof. Sergio Nesmachnow. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
8. TEACHING MOBILE DEVELOPMENT WITH APP INVENTOR AND PAIR PROGRAMMING.
- Author
-
Musmarra, Paolo
- Subjects
- *
COMPUTER programming , *COMPUTER software development , *COMPUTER software , *COMPUTER science , *INFORMATION technology - Abstract
The relationship of the teenagers with the new technologies is very complex and it is the center of attention today for the schools. Everyone is always connected: some searches show that the teenagers under 18 spend online about ten hours every day and are connected also for 24 hours with mobile devices and thanks to free wi-fi. Pair programming is a collaboration paradigm that has been strongly adopted in particular in the computer science education. In fact, Pair Programming has demonstrated benefits for many aspects in education, but unique concerns of mobile software design raise questions about the effectiveness of Pair Programming in this evolving field. This paper probes unique challenges for Pair Programming when used in mobile software design classes, focusing on four mobile design topics: dealing with interface and data management, recording and playing audio via mobile device and App Inventor components, using sensors and collecting GPS data from mobile device, using a TinyBD component of App Inventor for storage data. The paper highlights successes and challenges for Pair Programming and mobile applications, concluding with recommendations on building assignments. [ABSTRACT FROM AUTHOR]
- Published
- 2018
9. A framework for defining coupling metrics.
- Author
-
Tempero, Ewan and Ralph, Paul
- Subjects
- *
COMPUTER programming , *COMPUTER science , *REIFICATION , *PHILOSOPHY , *MATHEMATICAL models - Abstract
Abstract Many metrics have been proposed to measure coupling—the degree of association between modules in a system. They have often been described in different ways, hindering comparison and research. Their definitions are often incomplete regarding language features in some languages, meaning that different tool developers may implement the same metric differently. This complicates comparing results from studies that use different tools. This paper therefore aims to define coupling metrics consistently and unambiguously. The paper describes a model of coupling that uses the reification of the concept of dependency as its fundamental unit. Based on this model, it defines a framework for defining coupling metrics. It shows how to define several well-known coupling metrics in the framework, and how defining different metrics based on the same model facilitates direct comparisons. It discusses how the framework resolves issues due to incomplete metric definitions, such as different language features. This formal framework is sufficiently simple that it can be implemented in such a way as to provide multiple metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
10. Parallelization of the FICO Xpress-Optimizer.
- Author
-
Berthold, Timo, Farmer, James, Heinz, Stefan, and Perregaard, Michael
- Subjects
- *
COMPUTER programming , *INDUSTRIAL applications , *REPRODUCIBLE research , *STATISTICAL reliability , *COMPUTER science - Abstract
Computing hardware has mostly thrashed out the physical limits for speeding up individual computing cores. Consequently, the main line of progress for new hardware is growing the number of computing cores within a single CPU. This makes the study of efficient parallelization schemes for computation-intensive algorithms more and more important. A natural precondition to achieving reasonable speedups from parallelization is maintaining a high workload of the available computational resources. At the same time, reproducibility and reliability are key requirements for software that is used in industrial applications. In this paper, we present the new parallelization concept for the state-of-the-art MIP solver FICO Xpress-Optimizer. MIP solvers like Xpress are expected to be deterministic. This inevitably results in synchronization latencies which render the goal of a satisfying workload a challenge in itself. We address this challenge by following a partial information approach and separating the concepts of simultaneous tasks and independent threads from each other. Our computational results indicate that this leads to a much higher CPU workload and thereby to an improved, almost linear, scaling on modern high-performance CPUs. As an added value, the solution path that Xpress takes is not only deterministic in a fixed environment, but also, to a certain extent, thread-independent. This paper is an extended version of Berthold
et al. [Parallelization of the FICO Xpress-Optimizer , inMathematical Software - ICMS 2016: 5th International Conference , G.-M. Greuel, T. Koch, P. Paule, and A. Sommere, eds., Springer International Publishing, Berlin, 2016, pp. 251-258] containing more detailed technical descriptions, illustrative examples and updated computational results. [ABSTRACT FROM AUTHOR]- Published
- 2018
- Full Text
- View/download PDF
11. All Roads Lead to Computing: Making, Participatory Simulations, and Social Computing as Pathways to Computer Science.
- Author
-
Brady, Corey, Orton, Kai, Weintrop, David, Anton, Gabriella, Rodriguez, Sebastian, and Wilensky, Uri
- Subjects
- *
COMPUTER science , *SOCIAL computing , *COMPUTER simulation , *COMPUTER programming , *STUDENT-centered learning , *HARDWARE , *COMPUTER network resources - Abstract
Computer science (CS) is becoming an increasingly diverse domain. This paper reports on an initiative designed to introduce underrepresented populations to computing using an eclectic, multifaceted approach. As part of a yearlong computing course, students engage in Maker activities, participatory simulations, and computing projects that foreground the social and collaborative aspects of CS. Collectively, these activities are designed to introduce learners to the growing diversity of what CS looks like in the 21st century. This paper lays out the practical and theoretical motivations for the Computational Thinking for Girls (CT4G) project, specifically highlighting the use of Making through physical and social computing as ways to engage students in CS. A snapshot of one activity from the program is provided—Wearing the Web—in which students use open-hardware programmable badges to explore the underlying structure and technology that enables the Internet. Data from the first year of the CT4G program are presented to show the positive effects that this diverse introduction to CS is having on the students with respect to their attitudes toward CS. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
12. Building Capacity for Computational Thinking in Youth through Informal Education.
- Author
-
Mesiti, Leigh Ann, Parkes, Alana, Paneto, Sunewan C., and Cahill, Clara
- Subjects
- *
NONFORMAL education , *TRAVELING exhibitions , *YOUTH , *COMPUTER programming , *COMPUTER science - Abstract
Building Computational Thinkers, a three-year research study, explored how educators and designers can most effectively support the development of computational thinking capacity, and how these learning experiences could be customized to meet the needs of different learners. This research study focused on three specific exhibit design approaches that conveyed problem decomposition content in The Science Behind Pixar (Pixar), a 13,000 square foot traveling exhibition about the computer science, mathematics, and science behind Pixar's innovative films. Phase One investigated how novice learners could be supported to interact with exhibits and understand problem solving strategies that tackle complex, creative challenges in computer programming. Phase Two investigated the affordances of these exhibits to build capacity, feelings of efficacy, and interest in problem decomposition content in middle and high school youth. The findings in this paper describe the types of scaffolds that can be used to support computational thinking in novice youth, as well as how a combination of exhibit approaches were found to increase youth perceptions, understanding, and beliefs of computer programming. It will also discuss how two exhibit approaches worked particularly well for engaging girls in problem decomposition content. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
13. Discovering frequent induced subgraphs from directed networks.
- Author
-
Zhang, Sen, Du, Zhihui, Wang, Jason T. L., and Jiang, Haodi
- Subjects
- *
SUBGRAPHS , *COMPUTER science , *MEDICINE , *GENE regulatory networks , *COMPUTER programming , *ALGORITHMS - Abstract
Directed networks find many applications in computer science, social science and biomedicine, among others. In this paper we propose a new graph mining algorithm that is capable of locating all frequent induced subgraphs in a given set of directed networks. We present an incremental coding scheme for representing the canonical form of a graph, study its properties, and develop new techniques for pattern generation suitable for directed networks. We prove that our algorithm is complete, meaning that no qualified pattern is missed by the algorithm. Furthermore, our algorithm is correct in the sense that all patterns found by the algorithm are frequent induced subgraphs in the given networks. Experimental results based on synthetic data and gene regulatory networks show the good performance of our algorithm, and its application in network inference. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
14. A Computational Conundrum: “What is a Computer?” A Historical Overview.
- Author
-
Berkeley, Istvan S. N.
- Subjects
- *
COMPUTER science , *COMPUTATIONAL complexity , *TURING (Computer program language) , *COMPUTER programming , *SYSTEMS theory , *HISTORY - Abstract
This introduction begins by posing the question that this Special Issue addresses and briefly considers historical precedents and why the issue is important. The discussion then moves on to the consideration of important milestones in the history of computing, up until the present time. A brief specification of the essential components of computational systems is then offered. The final section introduces the papers that are included in this volume. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
15. Hybrid Water Flow-like Algorithm with Tabu Search for Traveling Salesman Problem.
- Author
-
Bostamam, Jasmin M. and Othman, Zulaiha
- Subjects
- *
COMPUTER algorithms , *COMPUTER programming , *COMPUTER science , *COMPUTER engineering , *METAHEURISTIC algorithms - Abstract
This paper presents a hybrid Water Flow-like Algorithm with Tabu Search for solving travelling salesman problem (WFA-TS-TSP).WFA has been proven its outstanding performances in solving TSP meanwhile TS is a conventional algorithm which has been used since decades to solve various combinatorial optimization problem including TSP. Hybridization between WFA with TS provides a better balance of exploration and exploitation criteria which are the key elements in determining the performance of one metaheuristic. TS use two different local search namely, 2opt and 3opt separately. The proposed WFA-TSTSP is tested on 23 sets on the well-known benchmarked symmetric TSP instances. The result shows that the proposed WFA-TSTSP has significant better quality solutions compared to WFA. The result also shows that the WFA-TS-TSP with 3-opt obtained the best quality solution. With the result obtained, it could be concluded that WFA has potential to be further improved by using hybrid technique or using better local search technique. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
16. Enhancing context knowledge repositories with justifiable exceptions.
- Author
-
Bozzato, Loris, Eiter, Thomas, and Serafini, Luciano
- Subjects
- *
SEMANTIC computing , *COMPUTER science , *DESCRIPTION logics , *INFORMATION theory , *COMPUTER programming - Abstract
Dealing with context dependent knowledge is a well-known area of study that roots in John McCarthy's seminal work. More recently, the Contextualized Knowledge Repository (CKR) framework has been conceived as a logic-based approach in which knowledge bases have a two layered structure, modeled by a global context and a set of local contexts. The global context not only contains the meta-knowledge defining the properties of local contexts, but also holds the global (context independent) object knowledge that is shared by all of the local contexts. In many practical cases, however, it is desirable to leave the possibility to “override” the global object knowledge at the local level: in other words, it is interesting to recognize the pieces of knowledge that can admit exceptional instances in the local contexts that do not need to satisfy the general axiom. To address this need, we present in this paper an extension of CKR in which defeasible axioms can be included in the global context. The latter are verified in the local contexts only for the instances for which no exception to overriding exists, where exceptions require a justification in terms of facts that are provable from the knowledge base. We formally define this semantics and study some semantic and computational properties, where we characterize the complexity of the major reasoning tasks, among them satisfiability testing, instance checking, and conjunctive query answering. Furthermore, we present a translation of extended CKRs with knowledge bases in the Description Logic SROIQ -RL under the novel semantics to datalog programs under the stable model (answer set) semantics. We also present an implementation prototype and examine its scalability with respect to the size of the input CKR and the amount (level) of defeasibility in experiments. Finally, we compare our representation approach with some major formalisms for expressing defeasible knowledge in Description Logics and contextual knowledge representation. Our work adds to the body of results on using deductive database technology such as SQL and datalog in these areas, and provides an expressive formalism (in terms of intrinsic complexity) for exception handling by overriding. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. Using IOIOAI in introductory courses to embedded systems for engineering students: a case study.
- Author
-
Chtourou, Slim, Kharrat, Mohamed, Amor, Nader Ben, Jallouli, Mohamed, and Abid, Mohamed
- Subjects
- *
EMBEDDED computer systems , *CURRICULUM , *ENGINEERING students , *CLOUD computing , *COMPUTER science , *COMPUTER programming - Abstract
The technological world has witnessed many revolutions since the beginning of the 21st century, such as mobile development, cloud computing, big data, artificial intelligence and also the Internet of Things. The internet of things revolution is driven by a broader access to internet and versatility of programmable hardware devices that can communicate between each other. In order to make internet of things devices, a technical background is required in many fields, especially electronics and Computer Science. Therefore, many efforts are put in place to develop educational kits that simplify the basics of these two fields so that everyone can make his internet of things prototype without technical knowledge. The authors present their own initiative: IOIOAI that simplifies the programming process for the input output input output electrical board. The service has been tested successfully on children and young students. In this paper, the authors present a wider adoption for their initiative. The IOIOAI service is imple- mented in introductory course to embedded systems for electrical and computer science students during the 2016-2017 academic year in the National Engineering School of Sfax, Tunisia. The efficiency of the solution is analyzed based on the students' marks and feedback. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
18. Present Status And Tendencies In Docking Systems' Development.
- Author
-
Felski, Andrzej, Naus, Krzysztof, Świerczyński, Sławomir, Wąż, Mariusz, and Zwolan, Piotr
- Subjects
- *
SYSTEMS development , *COMPUTER science , *COMPUTER programming , *DOCKING stations (Electronics) , *COMPUTER architecture - Abstract
The process of the ships docking, especially very large ships, is an very risky operation in confined and busy port waters. The similar difficult is the task to pass along any channel, river, strait or similar water road. The basic difficulty causes maneuvering with the great mass of the ship in situation of small space to maneuvers, the large inertia of the object and poor maneuvering properties at small speeds occurring in such circumstances. An additional factor, which make this task more difficult is the influence of the wind and the sea current on the hull of the inert ship as well as consequences of the limited visibility. The bad weather can cause the necessity to delay the maneuver. However this joins with heavy costs. An alternative is usage of systems supporting this process. In this paper nowadays accessible systems for augmentation the docking and harbor navigation are analysed. There are: shore based (active or passive) and ship based (active). This paper is prepared in the frame of Bonus project call 2012 'The Captain Assistant system for Navigation and Routing during Operations in Harbor'. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
19. Gamifying Computer Science Education for Z Generation.
- Author
-
Jawad, Hadeel Mohammed and Tout, Samir
- Subjects
- *
COMPUTER science education , *GENERATION Z , *COMPUTER programming , *COMPUTER science , *TEACHING methods , *SMART devices - Abstract
Generation Z members use their smart devices as part of their everyday routine. Teaching methods may need to be updated to make learning materials more interesting for this generation. This paper suggests gamifying computer science subjects to enhance the learning experience for this generation. Additionally, many students face difficulty in understanding computer science materials and algorithms. Gamifying computer science education is one of the suggested teaching methods to simplify topics and increase students' engagement. Moreover, the field of computer science is dominated by males. The use of gamification could increase women's interest in this field. This paper demonstrates different techniques that were developed by the researchers to employ gamification in teaching computer science topics. The data was collected at the end of the two different courses. Results show that students enjoyed the suggested teaching method and found it useful. This paper also demonstrates two tools and their gamification elements. These tools were developed by the researchers to help people learn computer programming and information security. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
20. Exploring software security approaches in software development lifecycle: A systematic mapping study.
- Author
-
Mohammed, Nabil M., Niazi, Mahmood, Alshayeb, Mohammad, and Mahmood, Sajjad
- Subjects
- *
COMPUTER software security , *COMPUTER software development , *UNIFIED modeling language , *COMPUTER programming , *COMPUTER science - Abstract
There is an increase use of security driven approaches to support software development activities, such as requirements, design and implementation. The objective of this paper is to identify the existing software security approaches used in the software development lifecycle (SDLC). In order to meet our goal, we conducted a systematic mapping study to identify the primary studies on the use of software security techniques in SDLC. In total, we selected and categorized 118 primary studies. After analyzing the selected studies, we identified 52 security approaches and we categorized them in to five main categories, namely, ‘secure requirements modeling’, ‘vulnerability identification, adaption and mitigation’, ‘software security focused process’, ‘extended UML-based secure modeling profiles’, ‘non UML-based secure modeling notations’. The results show that the most frequently used approaches are static analysis and dynamic analysis that provide security checks in the coding phase. In addition, our results show that many studies in this review considered security checks around the coding stage of software development. This work will assist software development organizations in better understanding the existing software security approaches used in the software development lifecycle. It can also provide researchers with a firm basis on which to develop new software security approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
21. An IoT and Wearable Technology Hackathon for Promoting Careers in Computer Science.
- Author
-
Byrne, Jake Rowan, O'Sullivan, Katriona, and Sullivan, Kevin
- Subjects
- *
STOCHASTIC learning models , *CONSTRUCTIVISM (Education) , *COMPUTER science , *COMPUTER programming , *INTERNET of things - Abstract
This paper explores the use of a constructivist 21st-century learning model to implement a week-long workshop, delivered as a “hackathon,” to encourage preuniversity teenagers to pursue careers in STEM, with a particular emphasis on computer science. For Irish preuniversity students, their experience of computing can vary from word processing to foundational programming, and while many schools are looking to introduce more ICT into the classroom, many students are left with a narrow view of what computer science is all about. Twenty-one students participated in the workshop and completed pre- and post-surveys, and a free word association exercise in the areas of computing and careers in computing. Analysis revealed that students’ motivation to learn about the design process, programming, inputs and outputs, and wearable technology (wearables)/Internet of Things (IoT) increased following participation. There were also increases in confidence in inputs and outputs and wearables/IoT following participation, as well as changes in the computing word associations, with students associating computing more with computer programming terms rather than general terms such as the Internet. The findings suggest that the combination of a hackathon event and a model for 21st century learning can be effective in motivating and increasing the self-efficacy of preuniversity teenagers in a number of emerging technological contexts such as IoT and wearables. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
22. A Direct Product Theorem for Two-Party Bounded-Round Public-Coin Communication Complexity.
- Author
-
Jain, Rahul, Pereszlényi, Attila, and Yao, Penghui
- Subjects
- *
COMMUNICATION complexity (Information theory) , *ELECTRONIC data processing , *COMPUTER science , *COMPUTER programming , *COMPUTATIONAL complexity - Abstract
A strong direct product theorem for a problem in a given model of computation states that, in order to compute k instances of the problem, if we provide resource which is less than k times the resource required for computing one instance of the problem with constant success probability, then the probability of correctly computing all the k instances together, is exponentially small in k. In this paper, we consider the model of two-party bounded-round public-coin randomized communication complexity. We show a direct product theorem for the communication complexity of any complete relation in this model. In particular, our result implies a strong direct product theorem for the two-party constant-round public-coin randomized communication complexity of all complete relations. As an immediate application of our result, we get a strong direct product theorem for the pointer chasing problem. This problem has been well studied for understanding round v/s communication trade-offs in both classical and quantum communication protocols. Our result generalizes the result of Jain which can be regarded as the special case when the number of messages is one. Our result can be considered as an important progress towards settling the strong direct product conjecture for two-party public-coin communication complexity, a major open question in this area. We show our result using information theoretic arguments. Our arguments and techniques build on the ones used by Jain. One key tool used in our work and also by Jain is a message compression technique due to Braverman and Rao, who used it to show a direct sum theorem in the same model of communication complexity as considered by us. Another important tool that we use is a correlated sampling protocol which, for example, has been used by Holenstein for proving a parallel repetition theorem for two-prover games. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
23. Closed world specialisation inside the induction process.
- Author
-
Drole, Miha and Kononenko, Igor
- Subjects
- *
LOGIC programming , *COMPUTER programming , *INDUCTIVE logic programming , *COMPUTER science , *BIG data - Abstract
This paper explores the idea of closed world specialisation (CWS). While traditional CWS is performed as a postprocessing step, we propose two different approaches to incorporating it into the induction process of a bottom-up inductive logic programming system. The motivation comes from the fact that using CWS as a postprocessing step is incapable of solving problems in which the negated part of the hypothesis is crucial. We apply the proposed approaches to the ProGolem bottom-up ILP system. We give examples of problems, where classical CWS fails to find a complete and consistent solution, whereas the proposed approaches succeed. Tests on real-world datasets show that the proposed approaches perform at least as well as regular CWS, while being better in terms of predictive accuracy in some cases. We also point out some weaknesses of different CWS approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
24. Assessing collaborative computing: development of the Collaborative-Computing Observation Instrument (C-COI).
- Author
-
Israel, Maya, Wherfel, Quentin M., Shehab, Saadeddine, Ramos, Evan A., Metzger, Adam, and Reese, George C.
- Subjects
- *
STUDY skills , *PROBLEM solving , *COLLABORATIVE learning , *EDUCATIONAL cooperation , *COMPUTER science - Abstract
This paper describes the development, validation, and uses of the Collaborative Computing Observation Instrument (C-COI), a web-based analysis instrument that classifies individual and/or collaborative behaviors of students during computing problem-solving (e.g. coding, programming). The C-COI analyzes data gathered through video and audio screen recording software that captures students’ computer screens as they program, and their conversations with their peers or adults. The instrument allows researchers to organize and quantify these data to track behavioral patterns that could be further analyzed for deeper understanding of persistence and/or collaborative interactions. The article provides a rationale for the C-COI including the development of a theoretical framework for measuring collaborative interactions in computer-mediated environments. This theoretical framework relied on the computer-supported collaborative learning literature related to adaptive help seeking, the joint problem-solving space in which collaborative computing occurs, and conversations related to outcomes and products of computational activities. Instrument development and validation also included ongoing advisory board feedback from experts in computer science, collaborative learning, and K-12 computing as well as classroom observations to test out the constructs in the C-COI. These processes resulted in an instrument with rigorous validation procedures and a high inter-rater reliability. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
25. SUPERGLUE: A SHARED MEMORY FRAMEWORK USING DATA VERSIONING FOR DEPENDENCY-AWARE TASK-BASED PARALLELIZATION.
- Author
-
TILLENIUS, MARTIN
- Subjects
- *
PARALLEL programming , *COMPUTER programming , *C++ , *COMPUTER systems , *COMPUTER architecture , *COMPUTER science - Abstract
In computational science, it is necessary to make efficient use of multicore architectures for dealing with complex real-life application problems. However, with increased hardware complexity, the cost in man hours of writing and rewriting software to adapt to evolving computer systems is becoming prohibitive. Task-based parallel programming models aim to allow the application programmers tofocus on the algorithms and applications, while the performance is handled by a runtime system that schedules the tasks onto nodes, cores, and accelerators. In this paper we describe a task parallel programming model where dependencies are represented through data versioning. Our model allows expressing the program control flow without artificial dependencies, has low complexity for resolving dependencies, and enables scheduling decisions to be made locally. We implement this as a freely available C++ header-only template library, and show experimental results indicating that our implementation both scales and performs well in comparison to similar runtime systems. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
26. Aplicación web basada en programación por restricciones para ingeniería de asignación de espectro.
- Author
-
Guerrero, Fabio G., Díaz, Juan Francisco, and Delgado, Carlos Andrés
- Subjects
- *
CONSTRAINT programming , *COMPUTER programming , *SPECTRUM allocation , *COMPUTER engineering , *COMPUTER science , *COMBINATORIAL optimization - Abstract
The flexibility of spectrum usage required by emerging paradigms, radio spectrum demand driven by new wireless technologies, new applications and government policies oriented to massive use of Internet require spectrum management authorities to have smarter tools to do their work in an efficient way. This paper presents the design and implementation of a web application to support spectrum management activities using constraints programming. The design includes a mathematical model for allocation constraints, a mathematical model for interference constraints, a relational database of the National Allocation Table considering bands, channels and services associated with geopolitical division of Colombia, and an operator allocation database. These tools allow creating and to parameterize different levels of restrictions establishing different costs and weights. The interference analysis module takes into account the geographical location and technical characteristics of transmitting stations. The tool developed in this work can be used, among others, in allocation optimization studies, assessing policies of spectrum reallocation, allocation analysis to maximize specific criteria, reducing technology costs of implementing specific technologies and help identifying objective variables for spectrum price estimation. To facilitate the understanding and exploitation of the application several didactic examples are included. [ABSTRACT FROM AUTHOR]
- Published
- 2015
27. Layered modeling and generation of Pollock's drip style.
- Author
-
Zheng, Yan, Nie, Xuecheng, Meng, Zhaopeng, Feng, Wei, and Zhang, Kang
- Subjects
- *
PAINTING , *COMPUTER algorithms , *COMPUTER programming , *COMPUTER science - Abstract
In this paper, we propose a layered approach to model Jackson Pollock's dripping style of paintings. Having analyzed fractal-based algorithms and observed the details of Pollock's paintings, we designed a layered modeling approach that divides Pollock's artwork into four layers: from bottom up are background layer, irregular shape layer, line layer and water drop layer. The layers are drawn sequentially and independent, forming the desired Pollock style. We have developed a program using Processing to generate artworks of the dripping style. The parameters of our program can be randomly generated or tuned by the user, supporting high flexibility and effectiveness. Experimental results show that our layered modeling approach can systematically generate images resembling Pollock's dripping style. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
28. Current State of the Multisets Theory from the Essential Viewpoint.
- Author
-
Red'ko, V., Bui, D., and Grishko, Y.
- Subjects
- *
SET theory , *ANALYTIC sets , *COMPUTER science , *COMPUTER programming , *CYBERNETICS - Abstract
This paper reviews the state of the art in the theory of multisets, i.e., mathematical models of sets with repetitions (duplicates or copies of their elements). The corresponding bibliography is categorized as follows: the general theory of multisets, reviews, and application of multisets, in particular, in computer science. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
29. SPARK 2014 Rationale: Data dependencies and Information Flow.
- Author
-
Efstathopoulos, Pavlos
- Subjects
- *
MATHEMATICAL variables , *COMPUTER programming , *SUBROUTINES (Computer programs) , *DEPENDENCY ratio , *COMPUTER science - Abstract
This paper continues the publication of the "SPARK 2014 Rationale", which started in the December 2013 issue of the Ada User Journal. In this instalment, we present two contributions regarding data dependencies and information flow in SPARK. [ABSTRACT FROM AUTHOR]
- Published
- 2014
30. Evolutionary membrane computing: A comprehensive survey and new results.
- Author
-
Zhang, Gexiang, Gheorghe, Marian, Pan, Linqiang, and Pérez-Jiménez, Mario J.
- Subjects
- *
EVOLUTIONARY computation , *COMPUTER programming , *EVOLUTIONARY algorithms , *COMPUTER science , *INFORMATION theory , *INFORMATION science - Abstract
Abstract: Evolutionary membrane computing is an important research direction of membrane computing that aims to explore the complex interactions between membrane computing and evolutionary computation. These disciplines are receiving increasing attention. In this paper, an overview of the evolutionary membrane computing state-of-the-art and new results on two established topics in well defined scopes (membrane-inspired evolutionary algorithms and automated design of membrane computing models) are presented. We survey their theoretical developments and applications, sketch the differences between them, and compare the advantages and limitations. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.