Tackling Software Architecture Erosion Joint Architecture and Implementation Repairing by a Knowledge based Approach

Architecture erosion is a big challenge in modern architectures leading to adeterioration of the quality properties of these systems . We propose a novel approach enabling a joint architecture and implementation repairing fortackling software architecture erosion . By using a holistic view on violationcauses and suitable repair actions in combination with learning mechanisms webuild up a project specific knowledge-base improving accuracy and efficiency inconsolidation of architecture, implementation over time .…

A Linked Data Application Framework to Enable Rapid Prototyping

Application developers tend to hesitate when dealing with linked data technologies . We propose in this paper a framework for building linked dataapplications . Web developers are supported with bidirectional RDF to JSON conversions and suitable CRUD endpoints . Non-technical users can browse web sites generated from JSON data by means of a template language .…

Reachability in Vector Addition Systems is Ackermann complete

The central algorithmic problem for Vector AdditionSystems with a long research history is the reachability problem . We settle itscomplexity to be Ackermann-complete thus closing the problem open for 45 years . In particular we prove that the problem is $k$-hard for VectorAddition Systems with States in dimension $6k$ The problem is $\mathcal{F}_k$ hard for $k# .…

Interactive Visualization for Exploring Information Fragments in Software Repositories

Software developers explore and inspect software repository data to obtain detailed information archived in the development history . ExIF is an interactive visualization for exploring information fragments in softwarerepositories . Users discover new information fragments within clusters or topological neighbors and identify revisions incorporating revisions incorporating user-collected fragments .…

Towards Decentralized Complex Queries over Distributed Ledgers a Data Marketplace Use case

Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS) are becoming increasingly used to create common, decentralized and trustlessinfrastructures . A prominent use case is represented by decentralized datamarketplaces, where users are consumers and providers at the same time . However, data in DLTs and DFS are usuallyunstructured and there are no efficient mechanisms to query a certain type of data for the search in the market .…

The EMPATHIC Project Building an Expressive Advanced Virtual Coach to Improve Independent Healthy Life Years of the Elderly

EMPATHIC Research & Innovation project aims to help dependent aging persons and their carers . It will uses remote,non-intrusive technologies to extract physiological markers of emotional states . It aims to develop causalmodels for emotionally believable coach-user interactions, which shall engageelders and thus keep off loneliness, sustain health, enhance quality of life,and simplify access to future telecare services .…

Kernelization Proof Complexity and Social Choice

We display an application of the notions of kernelization and data reductionfrom parameterized complexity to proof complexity . We show that the existence of data reduction rules for a parameterized problem having (a). asmall-length reduction chain, and (b) small-size (extended) Frege proofscertifying the soundness of reduction steps .…

Meta evaluation of Conversational Search Evaluation Metrics

Conversational search systems, such as Google Assistant and MicrosoftCortana, enable users to interact with search systems in multiple roundsthrough natural language dialogues . Metrics only achieve a weak correlation with ultimate user preference, authors say . METEOR is the best existingsingle-turn metric considering all three perspectives on those perspectives .…

A Non Nested Multilevel Method for Meshless Solution of the Poisson Equation in Heat Transfer and Fluid Flow

We present a non-nested multilevel algorithm for solving the Poisson equationdiscretized at scattered points . We append polynomials to the radial basis functionsto achieve exponential convergence of discretization errors . The performance of the algorithm for Dirichlet and all-Neumann boundary conditions is evaluated in three model geometries using a manufactured solution .…

Societal Biases in Retrieved Contents Measurement Framework and Adversarial Mitigation for BERT Rankers

Societal biases resonate in the retrieved contents of information retrieval systems, resulting in reinforcing existing stereotypes . Approaching this issue requires established measures of fairness regarding the representation of various social groups in retrieved contents . We propose an adversarialbias mitigation approach applied to the state-of-the-art Bert rankers, which jointly learns to predict relevance and remove protected attributes .…

Individual Differences Limit Predicting Well being and Productivity Using Software Repositories A Longitudinal Industrial Study

Reports of poor work well-being and fluctuating productivity in software engineering have been reported in both academic and popular sources . Understanding and predicting these issues through repository analysis mighthelp manage software developers’ well-Being . We find that individualvariance accounts for most of the $R^2$ values in models predicting developers’experienced productivity and productivity .…

The Space of Interaction long version

Girard’s geometry of interaction underlies analternative approach based on the interaction abstract machine (IAM) It has also been conjectured to provide areasonable notion of space for the lambda-calculus . In this paper we introduce a new intersection type system precisely measuring the space consumption of the IAM on the typed term .…

Unikraft Fast Specialized Unikernels the Easy Way

Unikraft is a novel micro-library OS that modularizes OS primitives so that it is easy to customize the unikernel . Running off-the-shelf applications such as nginx, SQLite, and Redis results in a 1.7x performance improvement compared to Linux guests . Images for these apps are around 1MB, require less than 10MB of RAM to run, and boot in around 1ms on top of the VMM time (total boot time 3ms-40ms) Unikrafted is a LinuxFoundation open source project and can be found at www.unikraft.org.com/Linux-Free-Libyan…

Faster 3 coloring of small diameter graphs

In 2013, Mertzios and Spirakis showed that for $n$-vertex diameter-2 graphs this problem can be solved in subexponential time . In this paper we present an algorithm that solves 3-\textsc{Coloring} in .$n$ in $n$. in . time $2^{\mathcal{O}(n^{1/3} \log^{2} n)$ in time .…

Mesoscale simulation of woven composite design decisions

We present a global sensitivity analysis of woven compositethermophysical properties, including density, volume fraction, thermalconductivity, specific heat, moduli, permeability, and tortuosity . Characterizing the connection between material design decisions/parameters and their effective properties allows for accelerated materials development andoptimization . We demonstrate that both constituent physical properties and the mesoscalegeometry strongly influence the composite material properties .…

Grey Literature in Software Engineering A Critical Review

Grey Literature (GL) recently has grown in Software Engineering (SE) research since the increased use of online communication channels by softwareengineers . Few studies employed specific search mechanisms and used additional criteria for assessing GL . By the time we conducted this research, 49% of the GL URLs are not working anymore .…

MOVO a dApp for DLT based Smart Mobility

MOVO is a decentralized application (dApp) for smart mobility . The dApp consists of an Android application intended for use inside a vehicle . It helps theuser/driver collect contextually generated data (e.g. a driver’s stress level, an electric vehicle’s battery level), which can then be shared through the use of Distributed Ledger Technologies (DLT) and DFS (i.e.…

Trend Alert How a Cross Platform Organization Manipulated Twitter Trends in the Indian General Election

Political organizations worldwide keep innovating their use of social mediatechnologies . Here, we document a novel configuration of technologies andorganizational forms used to manipulate Twitter trends in the 2019 Indiangeneral election . Organizers rely on an extensive network of WhatsApp groups to coordinate mass-postings by loosely affiliated political supporters .…

Metamorphic Detection of Repackaged Malware

A special case of evasive malware hides by repackaging a bonafide benign mobile app to contain malware in addition to the original functionality of the app . We apply metamorphic testing to the feature representation of the mobileapp rather than to the app itself .…

A Composable Glitch Aware Delay Model

We introduce the Composable Involution Delay Model (CIDM) for fast and accurate digital simulation . It is based on the Involved Delay Model, which has shortcomings that limit its practical applicability and utility . We show that, despite theseimprovements, the CIDM still retains the IDM’s faithfulness, which is aconsequence of the mathematical properties of involution delay functions .…

A data driven and model based accelerated Hamiltonian Monte Carlo method for Bayesian elliptic inverse problems

In this paper, we consider a Bayesian inverse problem modeled by ellipticpartial differential equations (PDEs) Specifically, we propose a data-drivenand model-based approach to accelerate the Hamiltonian Monte Carlo (HMC) method . The key idea is to exploit(model-based) and construct the intrinsic approximatelow-dimensional structure of the underlying problem which consists of twocomponents .…

A Chromium based Memento aware Web Browser

Current browsers do not differentiate between the live web and the past web . The browser should give users the ability to archive live webpages, essentially creating mementos of webpages they foundimportant as they surf the web . A prototype for a Memento-aware Browser is created by adding on to the implementation of the open source web browser byGoogle, Chromium .…

Reconstruction of Convex Polytope Compositions from 3D Point clouds

Reconstructing a composition of convex polytopes that perfectly fit the corresponding input point-cloud is a hard optimization problem with applications in reverse engineering and rigid body dynamicssimulations . We propose a pipeline that first extracts a set of planes, then partitioned the input point cloud into weakly convex clusters and finally generates a set .…

Pronto Federated Task Scheduling

We present a federated, asynchronous, memory-limited algorithm for onlinetask scheduling across large-scale networks of hundreds of workers . This isachieved through recent advancements in federated edge computing that unlocksthe ability to incrementally compute local model updates within each nodeseparately . This local model is then used along with incoming data to generate a rejection signal which reflects the overall node responsiveness and if it isable to accept an incoming task without resulting in degraded performance .…

Recommending Burgers based on Pizza Preferences Addressing Data Sparsity with a Product of Experts

In this paper we describe a method to tackle data sparsity and createrecommendations in domains with limited knowledge about user preferences . We create aProduct-of-Experts (POE) architecture for recommendations that jointly models user-item interactions across multiple domains . The method is resilient to missing data for one or more of the domains, which is often found in real life .…

A Survey on Neural Recommendation From Collaborative Filtering to Content and Context Enriched Recommendation

Research in recommendation has shifted to inventing newrecommender models based on neural networks . In recent years, we have witnessedsignificant progress in developing neural recommender models, which generalizeand surpass traditional recommender systems . We discuss some promising directions in this field, including benchmarking recommenders systems, graph reasoning basedrecommendation models, and explainable and fair recommendations for socialgood.…

An optimal control approach to determine resistance type boundary conditions from in vivo data for cardiovascular simulations

The choice of appropriate boundary conditions is a fundamental step incomputational fluid dynamics (CFD) simulations of the cardiovascular system . The values of resistive boundaryconditions are set as control variables and optimized to match available patient-specific data . Experimental results on four aortic arches demonstratethat the proposed framework can assimilate 4D-Flow MRI data more accurately than two other common techniques based on Murray’s law and Ohm’s law .…

Shellcode_IA32 A Dataset for Automatic Shellcode Generation

We take the first step to address the task of automatically generatingshellcodes, i.e. small pieces of code used as a payload in the exploitation of a software vulnerability . We assembleand release a novel dataset (Shellcode_IA32), consisting of challenging butcommon assembly instructions with their natural language descriptions .…

Contrasting social and non social sources of predictability in human mobility

Social structures influence a variety of human behaviors including mobility patterns . But the extent to which one individual’s movements can predict another’s remains an open question . Here wedevelop a “colocation” network to distinguish the mobility patterns of an ego’ssocial ties from those of non-social colocators, individuals not sociallyconnected to the ego but who nevertheless arrive at a location at the same time as the ego .…

Identifying Hubs in Undergraduate Course Networks Based on Scaled Co Enrollments Extended Version

This study uses undergraduate student enrollment data to form networks of courses where connections are based on student co-enrollments . Academic departments and academic categories, such as Humanities vs STEM, are studied for their influence over course groupings . The identification of hub courses haspractical applications, since it can help better predict the impact of changes in course offerings and in course popularity, and in the case ofinterdisciplinary hub courses, can be used to increase or decrease interest and enrollments in specific academic departments and areas .…

Finding discrete logarithm in F_p

Pohlig-Hellman method is a popular choice to calculate discrete logarithm infinite field $F_p^*$ . In proposed method, as there is no requirement of combining theresult using Chinese Remainder Theorem and do the other associated work ,runtimes are much faster. In worst case scenario, p=2q+1 , q being another prime, order of run time remains thesame.…