Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers Bachelor's and Master's degrees in computer engineering.

Follow

Documents from 2023

PDF

The State of Accessibility in Blackboard: Survey and User Reviews Case Study, Mohamed Wiem Mkaouer, Wajdi Aljedaani, Stephanie Ludi, Mohammed Alkahtani, Marcelo M. Eler, Marouane Kessentini, and Ali Ouni

PDF

A Graph-Based Approach to Studying the Spread of Radical Online Sentiment, Le Nguyen

PDF

Investigating the Impact of Baselines on Integrated Gradients for Explainable AI, Ajay Shewale

Documents from 2022

PDF

An Exploratory Study on Refactoring Documentation in Issues Handling, Eman Abdullah AlOmar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, and Ali Ouni

PDF

Refactoring for Reuse: An Empirical Study, Eman Abdullah AlOmar, Tianjia Wang, Vaibhavi Raut, Mohamed Wiem Mkaouer, Christian D. Newman, and Ali Ouni

PDF

Taxonomy of Software Readability Changes, Stephen J. Cook

PDF

Alternative Participation: An exploratory study on participation in open source software beyond code contributions, Benjamin Dow

PDF

Leveraging Identifier Naming Structures in Source Code and Bug Reports to Localize Relevant Bugs, James Dugan

PDF

Why did you clone these identifiers? Using Grounded Theory to understand Identifier Clones, Luis Angel Gutierrez Galaviz

PDF

Testing of Neural Networks, Devan Lad

PDF

Code Review Practices for Refactoring Changes: An Empirical Study on OpenStack, Mohamed Wiem Mkaouer, Eman Abdullah AlOmar, Moatz Chouchen, and Ali Ouni

PDF

SATDBailiff- Mining and Tracking Self-Admitted Technical Debt, Mohamed Wiem Mkaouer, Eman Abdullah AlOmar, Ben Christians, Mihal Busho, Ahmed Hamad Alkhalid, and Christian D. Newman

Documents from 2021

PDF

Can feature requests reveal the refactoring types?, Sultan Fahad Almassari

PDF

Finding the Needle in a Haystack: On the Automatic Identification of Accessibility User Reviews, Eman Abdullah AlOmar, Wajdi Aljedaani, Murtaza Tamjeed, Mohamed Wiem Mkaouer, and Yasime Elglaly

PDF

Refactoring Practices in the Context of Modern Code Review: An Industrial Case Study at Xerox, Eman Abdullah AlOmar, Hussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni, and Marouane Kessentini

PDF

On the Documentation of Refactoring Types, Eman Abdullah AlOmar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, and Zhe Yu

PDF

On Preserving the Behavior in Software Refactoring: A Systematic Mapping Study, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Christian D. Newman, and Ali Ouni

PDF

Mining and Managing Big Data Refactoring for Design Improvement: Are We There Yet?, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, and Ali Ouni

PDF

Behind the Scenes: On the Relationship Between Developer Experience and Refactoring, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Anthony Peruma, Christian D. Newman, and Ali Ouni

PDF

API Recommendation Using Domain And Source Code Knowledge, Rana Kareem Talib Al-Rubaye

PDF

Architectural Style: Distortions for Deploying and Managing Deception Technologies in Software Systems, Elijah Cantella

PDF

Calculating Common Vulnerability Scoring System’s Environmental Metrics Using Context-Aware Network Graphs, Christopher Thomas Enoch

PDF

Pedagogical Evaluation of Cognitive Accessibility Learning Lab in the Classroom, Saad Khan

PDF

An Ensemble Approach for Annotating Source Code Identifiers with Part-of-speech Tags, Christian D. Newman,; Michael J. Decker; Reem S. Alsuhaibani; Anthony Peruma; Mohamed Wiem Mkaouer; Satyajit Mohapatra; Tejal Vishnoi; Marcos Zampieri; Timothy Sheldon; and Emily Hill

PDF

Understanding the Themes of Disability Discourse Through Reddit Comments, Brandon Palonis

PDF

Evaluation of Neuro-Evolution Algorithms for Tactic Volatility Aware Processes, Aizaz Ul Haq

PDF

Test Naming Failures. An Exploratory Study of Bad Naming Practices in Test Code, Zachariah Wigent

Documents from 2020

PDF

How we refactor and how we document it? On the use of supervised machine learning algorithms to classify refactoring documentation, Eman Abdullah AlOmar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Marouane Kessentini, and Ali Ouni

PDF

On the Relationship Between Developer Experience and Refactoring: An Exploratory Study and Preliminary Results, Eman Abdullah AlOmar, Anthony Peruma, Christian D. Newman, Mohamed Wiem Mkaouer, and Ali Ouni

PDF

How Do Developers Refactor Code to Improve Code Reusability?, Eman Abdullah AlOmar, Philip T. Rodriguez, Jordan Bowman, Tianjia Wang, Benjamin Adepoju, Kevin Lopez, Christian D. Newman, Ali Ouni, and Mohamed Wiem Mkaouer

PDF

Increasing the Trust In Refactoring Through Visualization, Alex Bogart, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, and Ali Ouni

PDF

Self-Admitted Technical Debt - An Investigation from Farm to Table to Refactoring, Ben Christians

PDF

Long Term Predictions of Coal Fired Power Plant Data Using Evolved Recurrent Neural Networks, Travis Desell, AbdElRahman ElSaid, Zimeng Lyu, David Stadem, Shuchita Patwardhan, and Steve Benson

PDF

Detecting Performance Regression Inducing Code Changes Using Static and Dynamic Metrics, Hiten Gupta

PDF

Identifying Performance Regression From The Commit Phase Utilizing Machine Learning Techniques, Max Mendelson

PDF

An Exploratory Study on How Software Reuse is Discussed in Stack Overflow, Mohamed Wiem Mkaouer, Eman Abdullah AlOmar, Jiaqian Liu, Ali Ouni, Christian D. Newman, and Diego Barinas

PDF

Toward the Automatic Classification of Self-Affirmed Refactoring, Mohamed Wiem Mkaouer, Eman Abdullah AlOmar, and Ali Ouni

PDF

On the Generation, Structure, and Semantics of Grammar Patterns in Source Code Identifiers, Christian D. Newman,; Reem S. Alsuhaibani; Michael J. Decker; Anthony Peruma; Dishant Kaushik; Mohamed Wiem Mkaouer; and Emily Hill

PDF

Conceptions of Refactoring: An Investigation of Stack Overflow Posts, Steven David Simmons

PDF

Accessibility in User Reviews for Mobile Apps: An Automated Detection Approach, Murtaza Tamjeed

Documents from 2019

PDF

An empirical study on discovering a new self-admitted technical debt type - API-debt, Ahmed Aljohani

PDF

Can Refactoring be Self-Affirmed? An Exploratory Study on How Developers Document their Refactoring Activities in Commit Messages, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, and Ali Ouni

PDF

Understanding gaps between established Software Engineering Process knowledge and its actual implementation, Sayantika Bhattacharya

PDF

An Analysis of Altitude, Citizen Science and a Convolutional Neural Network Feedback Loop on Object Detection in Unmanned Aerial Systems, Connor Bowley, Marshall Mattingly, Andrew Barnas, Susan Ellis-Felege, and Travis Desell

PDF

Improving Developer Profiling and Ranking to Enhance Bug Report Assignment, Andrew DiStasi

PDF

Accessibility Lab #1: Audio Cues, Jan-Michael Guillermo

PDF

Assessing the Quality of Mobile Graphical User Interfaces Using Multi-Objective Optimization, Soui, Makram; Mabrouka Chouchane; Mohamed Wiem Mkaouer; Marouane Kessentini; and Khaled Ghedira

PDF

Task Scheduling Balancing User Experience and Resource Utilization on Cloud, Sultan Mira

PDF

On the Impact of Refactoring on the Relationship between Quality Attributes and Design Metrics, Mohamed Wiem Mkaouer, Eman Abdullah AlOmar, Ali Ouni, and Marouane Kessentini

PDF

TVA: A Requirements Driven, Machine-Learning Approach for Addressing Tactic Volatility in Self-Adaptive Systems, Jeffrey Palmerino

PDF

App Review Analysis via Active Learning: Reducing Supervision Effort Without Compromising Classification Accuracy, Venkatesh Thimma Dhinakaran

PDF

Examining the Conflict Between User Experience and Software Development in Industry, Marissa K. Wilson

Documents from 2018

PDF

An Interactive and Dynamic Search-Based Approach to Software Refactoring Recommendations, Vahid Alizadeh, Marouane Kessentini, Mohamed Wiem Mkaouer, Mel Ocinneide, Ali Ouni, and Yuanfang Cai

PDF

Bad Droid! An in-depth empirical study on the occurrence and impact of Android specific code smells, Khalid Saeed Almalki

PDF

How We Refactor and How We Mine it ? A Large Scale Study on Refactoring Activities in Open Source Systems, Eman Abdullah AlOmar

PDF

Advances and Challenges in Software Refactoring: A Tertiary Systematic Literature Review, Mazen Alotaibi

PDF

Architectural Vulnerabilities in Plug-and-Play Systems, Taylor Corrello

PDF

An Empirical Evaluation of the Indicators for Performance Regression Test Selection, Kevin Hannigan

PDF

Towards Prioritizing Documentation Effort, Paul W. McBurney, Siyuan Jiang, Marouane Kessentini, Nicholas A. Kraft, Ameer Armaly, Mohamed Wiem Mkaouer, and Collin McMillan

PDF

What the Smell? An Empirical Investigation on the Distribution and Severity of Test Smells in Open Source Android Applications, Anthony Shehan Ayam Peruma

PDF

Learning to Rank Relevant Files for Bug Reports Using Domain knowledge, Replication and Extension of a Learning-to-Rank Approach, Nasir Safdari

PDF

Tracing Vulnerabilities Across Product Releases, Adriana Sejfia

Documents from 2017

PDF

Comparison of visual programming and hybrid programming environments in transferring programming skills, Hussein Alrubaye

PDF

On Increasing Trust Between Developers and Automated Refactoring Tools Through Visualization, Alexander Bogart

PDF

A Machine Learning Approach on Providing Recommendations for the Vacant Lot Problem, Md Towhidul Absar Chowdhury

PDF

Preserving the Spatial Information of Accessible UML Class Diagrams for the Visually Impaired, Silva Hekmat Matti

PDF

How Should You plan Your App’s Features? Selecting and Prioritizing A Mobile App’s Initial Features Based on User Reviews, Rebaz Saber Saleh

PDF

Datasets Used in Fifteen Years of Automated Requirements Traceability Research, Palak Sharma

Documents from 2016

PDF

The Quality Attribute Design Strategy for a Social Network Data Analysis System, Ziyi Bai

PDF

Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project, Craig Cabrey

PDF

LibDetector: Version Identification of Libraries in Android Applications, Zhihao Mike Chi

PDF

Toward Establishing a Catalog of Security Architecture Weaknesses, Joanna Cecilia da Silva Santos

PDF

Teaching Android Security Through Examples: A Publicly Available Database of Vulnerable Apps, Daniel E. Krutz and Samuel A. Malachowsky

PDF

A Search Engine for Finding and Reusing Architecturally Significant Code, Ibrahim Jameel Mujhid

PDF

Are Intrusion Detection Studies Evaluated Consistently? A Systematic Literature Review, Nuthan Munaiah, Andrew Meneely, Ryan Wilson, and Benjamin Short

PDF

An empirical study on code comprehension: DCI compared to OO, Hector A. Valdecantos

Documents from 2015

PDF

Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project, Felivel Camilo

PDF

Hydrogen: A Framework for Analyzing Software Revision Histories, Shannon D. Pattison

PDF

Empirical Study of Training-Set Creation for Software Architecture Traceability Methods, Waleed Abdu Zogaan

Documents from 2007

PDF

Development of an intermodal network for freight transportation analysis, Aaron Falzarano, Sai Ketha, and J. Scott Hawker

PDF

Intermodal transportation network custom evaluators for environmental policy analysis, J. Scott Hawker, Aaron Falzarano, and Sai Ketha