Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2024
Implementing and Evaluating Ioam Integrity Protection
ANRW '24: Proceedings of the 2024 Applied Networking Research WorkshopJuly 2024, Pages 60–66https://doi.org/10.1145/3673422.3674886In-Situ Operations, Administration, and Maintenance (Ioam) gathers telemetry and operational information along a path, within packets. Up to now, Ioam header and data are carried in plain text without any protection against data-altering nodes or ...
- research-articleJune 2024JUST ACCEPTED
Identifying Difficult Questions and Student Difficulties in a Spanish Version of a Programming Assessment Instrument (SCS1)
Currently, there is little evidence about how non-English speaking students learn computer programming. For example, there are few validated assessment instruments to measure the development of programming skills, especially for the Spanish-speaking ...
- extended-abstractJune 2024
Validating Digital Traces with Survey Data: The Use Case of Religiosity
- Mehmet Fuat Kına,
- Şükrü Atsızelti,
- Zübeyir Nişancı,
- Erdem Yörük,
- Ali Hürriyetoğlu,
- Melih Can Yardı,
- Oğuz Gürerk,
- Tolga Etgü,
- Yusuf Akbulut,
- Fırat Duruşan,
- Gizem Bacaksızlar Turbic
Websci Companion '24: Companion Publication of the 16th ACM Web Science ConferenceMay 2024, Pages 56–59https://doi.org/10.1145/3630744.3660242This paper tests the validity of a digital trace database (Politus) obtained from Twitter, with a recently conducted representative social survey, focusing on the use case of religiosity in Turkey. Religiosity scores in the research are extracted using ...
- research-articleMay 2024Honorable Mention
The Cadaver in the Machine: The Social Practices of Measurement and Validation in Motion Capture Technology
CHI '24: Proceedings of the CHI Conference on Human Factors in Computing SystemsMay 2024, Article No.: 768, Pages 1–23https://doi.org/10.1145/3613904.3642004Motion capture systems, used across various domains, make body representations concrete through technical processes. We argue that the measurement of bodies and the validation of measurements for motion capture systems can be understood as social ...
- posterJune 2024
Trustworthy AI: Industry-Guided Tooling of the Methods
CAIN '24: Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AIApril 2024, Pages 245–246https://doi.org/10.1145/3644815.3644970The need to assess and validate the trustworthiness of AI (robustness, transparency, safety, security, etc.,) has been the subject of considerable academic work for some time now. A natural evolution of such research efforts is to have a tangible impact ...
-
- surveyMarch 2024
Early Validation and Verification of System Behaviour in Model-based Systems Engineering: A Systematic Literature Review
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 3Article No.: 81, Pages 1–67https://doi.org/10.1145/3631976In the Systems Engineering (SE) domain there has been a paradigm shift from document-based to model-based system development artefacts; in fact, new methodologies are emerging to meet the increasing complexity of current systems and the corresponding ...
- posterMarch 2024
Validation of a Bebras-Based Test to Assess Computational Thinking Abilities in First-Year College Students
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 2March 2024, Pages 1750–1751https://doi.org/10.1145/3626253.3635523The lack of clarity about the definition of Computational Thinking (CT) undermines its assessment and the formulation of effective learning strategies for its development. We propose an assessment tool in Spanish, designed by carefully selecting Bebras ...
- research-articleFebruary 2024
Application-level Validation of Accelerator Designs Using a Formal Software/Hardware Interface
- Bo-Yuan Huang,
- Steven Lyubomirsky,
- Yi Li,
- Mike He,
- Gus Henry Smith,
- Thierry Tambe,
- Akash Gaonkar,
- Vishal Canumalla,
- Andrew Cheung,
- Gu-Yeon Wei,
- Aarti Gupta,
- Zachary Tatlock,
- Sharad Malik
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 2Article No.: 35, Pages 1–25https://doi.org/10.1145/3639051Ideally, accelerator development should be as easy as software development. Several recent design languages/tools are working toward this goal, but actually testing early designs on real applications end-to-end remains prohibitively difficult due to the ...
- research-articleMay 2024
Validating CESU-8 Encoded Text Utilising SIMD Instructions
ICSCA '24: Proceedings of the 2024 13th International Conference on Software and Computer ApplicationsFebruary 2024, Pages 102–111https://doi.org/10.1145/3651781.3651797Software ingesting textual data, such as database systems, frequently validates the encoding of this data. The Unicode extension “Compatibility Encoding Scheme for UTF-16: 8-bit” (CESU-8) is an encoding scheme that combines the ASCII compatibility of ...
- research-articleJanuary 2024
Translation and Validation of the Brief Inventory of Technology Self-Efficacy (BITS): Simplified and Traditional Chinese Versions
Social Science Computer Review (SSCR), Volume 42, Issue 1Feb 2024, Pages 249–269https://doi.org/10.1177/08944393231176596Computer self-efficacy (CSE) continues to be an important construct in research and application. Two measures of CSE, the Brief Inventory of Technology Self-Efficacy (BITS) and the Brief Inventory of Technology Self-Efficacy – Short Form (BITS-SF) were ...
- research-articleDecember 2023
Validating a Language-Independent CS1 Learning Outcomes Assessment
CompEd 2023: Proceedings of the ACM Conference on Global Computing Education Vol 1December 2023, Pages 78–83https://doi.org/10.1145/3576882.3617910Assessing learning outcomes in computer science education is essential as it is an indicator of student progress, the effectiveness of teaching methods, and areas for improvement. Aptitude tests have been widely used to measure these learning outcomes; ...
- research-articleNovember 2023
Deeper Notions of Correctness in Image-Based DNNs: Lifting Properties from Pixel to Entities
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringNovember 2023, Pages 2122–2126https://doi.org/10.1145/3611643.3613079Deep Neural Networks (DNNs) that process images are being widely used for many safety-critical tasks, from autonomous vehicles to medical diagnosis. Currently, DNN correctness properties are defined at the pixel level over the entire input. Such ...
- ArticleNovember 2023
CHC Model Validation with Proof Guarantees
AbstractFormal verification tooling increasingly relies on logic solvers as automated reasoning engines. A point of commonality among these solvers is the high complexity of their codebases, which makes bug occurrence disturbingly frequent. Tool ...
- ArticleDecember 2023
Large Language Model Assisted Software Engineering: Prospects, Challenges, and a Case Study
Bridging the Gap Between AI and RealityOct 2023, Pages 355–374https://doi.org/10.1007/978-3-031-46002-9_23AbstractLarge language models such as OpenAI’s GPT and Google’s Bard offer new opportunities for supporting software engineering processes. Large language model assisted software engineering promises to support developers in a conversational way with ...
- ArticleSeptember 2023
Computer-Aided Generation of Assurance Cases
- Timothy E. Wang,
- Chanwook Oh,
- Matthew Low,
- Isaac Amundson,
- Zamira Daw,
- Alessandro Pinto,
- Massimiliano L. Chiodo,
- Guoqiang Wang,
- Saqib Hasan,
- Ryan Melville,
- Pierluigi Nuzzo
Computer Safety, Reliability, and Security. SAFECOMP 2023 WorkshopsSep 2023, Pages 135–148https://doi.org/10.1007/978-3-031-40953-0_12AbstractAssurance cases (ACs) have gained attention in the aerospace, medical, and other heavily-regulated industries as a means for providing structured arguments on why a product is dependable (i.e., safe, secure, etc.) for its intended application. ...
- research-articleSeptember 2023Best Paper
Development of a Perceived Security Scale for Shared Automated Vehicles (PSSAV) and its Validation in Colombia and Germany
AutomotiveUI '23: Proceedings of the 15th International Conference on Automotive User Interfaces and Interactive Vehicular ApplicationsSeptember 2023, Pages 52–62https://doi.org/10.1145/3580585.3607177Perceived security is crucial for the widespread adoption of shared automated vehicles (SAVs) and shuttle buses. However, there is currently no validated instrument to measure perceived security in this context, and little research has been done to ...
- research-articleSeptember 2023
Generating and Scaling a Multi-Language Test-Suite for MPI
- Julien Adam,
- Jean-Baptiste Besnard,
- Paul Canat,
- Hugo Taboada,
- Adrien Roussel,
- Marc Pérache,
- Julien Jaeger,
- Sameer Shende
EuroMPI '23: Proceedings of the 30th European MPI Users' Group MeetingSeptember 2023, Article No.: 11, Pages 1–10https://doi.org/10.1145/3615318.3615329High-Performance Computing (HPC) is currently facing significant challenges. The hardware pressure has become increasingly difficult to manage due to the lack of parallel abstractions in applications. As a result, parallel programs must undergo drastic ...
- research-articleOctober 2023
A Free Verbalization Method of Evaluating Sound Design: The Effectiveness of Artificially Intelligent Natural Language Processing Methods and Tools: The Effectiveness of Artificially Intelligent Natural Language Processing Methods and Tools
AM '23: Proceedings of the 18th International Audio Mostly ConferenceAugust 2023, Pages 124–129https://doi.org/10.1145/3616195.3616201Research on sound design evaluation methodologies relating to connotation, or the evocation of mental imagery is limited. Prior tools for data analysis have fallen short, making the process time-consuming and difficult: We explore here a variety of new ...
- research-articleAugust 2023
A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityAugust 2023, Article No.: 110, Pages 1–10https://doi.org/10.1145/3600160.3605025When it comes to securing critical infrastructures, it is evident to not only provide a toolbox which allows to detect when vulnerabilities are exploited but also to support the operations in performing mitigation procedures. This paper explains how a ...
- ArticleJuly 2024
On Using the Task Models for Refinement and Validation of Requirements Generated Through Co-creation
AbstractAmong the several other approaches for gathering software requirements, co-creation is often used. The co-creation approach based on elements of participatory research is aimed at involving the end users during the requirements elicitation ...