@inproceedings{bib_Soft_2024, AUTHOR = {V D Shanmukha Mitra, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Software Development Waste amidst COVID-19 Pandemic: An Industry Study}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2024}}
Development of software products can often result in generation of Software Development Waste (SDW). For example, developers may possibly need to rework implementations that cater to ambiguous feature stories. COVID-19 pandemic has influenced the way software development teams operate worldwide. We studied the impact of pandemic enforced work-from-home situation (PWS) on generation of SDW. As a part of a multi-year study, we surveyed 615 participants and interviewed 31 from the software industry across eight countries specializing in various domains. We observed a rise in SDWs, and were able to identify new type of SDW, and other wastes that could be reclassified into existing types of wastes.
Using Virtual Reality for Detection and Intervention of Depression -- A Systematic Literature Review
Mohammad Waqas Wani,Yendigeri Pawankumar Gururaj,V D Shanmukha Mitra,Sai Anirudh Karre,Raghu Babu Reddy Y,Azeemuddin Syed
@inproceedings{bib_Usin_2024, AUTHOR = {Mohammad Waqas Wani, Yendigeri Pawankumar Gururaj, V D Shanmukha Mitra, Sai Anirudh Karre, Raghu Babu Reddy Y, Azeemuddin Syed}, TITLE = {Using Virtual Reality for Detection and Intervention of Depression -- A Systematic Literature Review}, BOOKTITLE = {Technical Report}. YEAR = {2024}}
The use of emerging technologies like Virtual Reality (VR) in therapeutic settings has increased in the past few years. By incorporating VR, a mental health condition like depression can be assessed effectively, while also providing personalized motivation and meaningful engagement for treatment purposes. The integration of external sensors further enhances the engagement of the subjects with the VR scenes. This paper presents a comprehensive review of existing literature on the detection and treatment of depression using VR. It explores various types of VR scenes, external hardware, innovative metrics, and targeted user studies conducted by researchers and professionals in the field. The paper also discusses potential requirements for designing VR scenes specifically tailored for depression assessment and treatment, with the aim of guiding future practitioners in this area.
Requirement Engineering Methods for Virtual Reality Software Product Development - A Mapping Study
@inproceedings{bib_Requ_2024, AUTHOR = {Sai Anirudh Karre, Raghu Babu Reddy Y, Raghav Mittal}, TITLE = {Requirement Engineering Methods for Virtual Reality Software Product Development - A Mapping Study}, BOOKTITLE = {ACM Transactions on Software Engineering and Methodology}. YEAR = {2024}}
Software practitioners use various methods in Requirements Engineering (RE) to elicit, analyze and specify the requirements of a enterprise products. The methods impact the final product characteristics and influence product delivery. Ad-hoc usage of the methods by software practitioners can lead to inconsistency and ambiguity in the product. With the notable rise in enterprise products, games, etc. across various domains, Virtual Reality (VR) has become an essential technology for the future. The methods adopted for requirement engineering for developing VR products requires a detailed study. This paper presents a mapping study on requirement engineering methods prescribed and used for developing VR applications including requirements elicitation, requirements analysis, and requirements specification. Our study provides insights into the use of such methods in the VR community and suggests using specific requirement engineering methods in various fields of interest. We also discuss future directions in requirement engineering for VR products.
@inproceedings{bib_Requ_2023, AUTHOR = {Sai Anirudh Karre, Raghav Mittal, Raghu Babu Reddy Y}, TITLE = {Requirements Elicitation for Virtual Reality Products-A Mapping Study}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2023}}
Software practitioners use various requirement elicitation methods to produce a well-defined product. These methods impact the software product’s eventual traits and target a particular audience segment. Virtual Reality(VR) products are no different from this influence. With the notable rise in product offerings across various domains, VR has become an essential technology for the future. Nevertheless, the type of methods practiced for requirement elicitation still has not been thoroughly studied. This paper presents a mapping study on requirement elicitation methods practiced by VR practitioners in academia and industry. We consolidated our observations based on their popularity in the practitioner community. Further, we present our insights on the necessary and sufficient conditions to conduct VR requirement elicitation using the identified methods to benefit the VR practitioner community.
A Tool based Experiment to Teach Elicitation and Specification of Virtual Reality Product Requirements
@inproceedings{bib_A_To_2023, AUTHOR = {Sai Anirudh Karre, Karthik Vaidhyanathan, Raghu Babu Reddy Y}, TITLE = {A Tool based Experiment to Teach Elicitation and Specification of Virtual Reality Product Requirements}, BOOKTITLE = {ACM Conference on Global Computing Education}. YEAR = {2023}}
Students need to understand the assessment of requirements correctness while building software systems. It helps produce products that meet the stakeholder objectives. This poster illustrates an experiment conducted as a tool-based collaborative assignment for assessing the correctness of software products using a Virtual Reality (VR) application as part of a CS300-level course at our University.
@inproceedings{bib_Syst_2022, AUTHOR = {, Raghu Babu Reddy Y, LALIT MOHAN S, Vasudeva Varma Kalidindi}, TITLE = {System and method for retrieving and extracting security information}, BOOKTITLE = {United States Patent}. YEAR = {2022}}
A system and method for automatically extracting contract data from electronic contracts includes an administrator module configured to provide templates for inputting document patterns and a list of contract data tags for each of a plurality of contract document types. A parser is configured to convert an electronic contract document into a contract text document and reformat the contract text document to provide a pattern for the text contract document. A pattern recognition engine is configured to determine a list of contract document types in the electronic contract by comparing and matching patterns of all known contract document types with the pattern of the contract text document. A contract data extraction engine is configured to extract contract data for each contract document type on the list.
@inproceedings{bib_A_De_2022, AUTHOR = {Lalit Mohan Sanagavarapu, Vivek Iyer, Raghu Babu Reddy Y}, TITLE = {A Deep Learning Approach for Ontology Enrichment from Unstructured Text}, BOOKTITLE = {Technical Report}. YEAR = {2022}}
Information Security in the cyber world is a major cause for concern, with significant increase in the number of attack surfaces. Existing information on vulnerabilities, attacks, controls, and advisories available on web provides an opportunity to represent knowledge and perform security analytics to mitigate some of the concerns. Representing security knowledge in the form of ontology facilitates anomaly detection, threat intelligence, reasoning and relevance attribution of attacks, and many more. This necessitates dynamic and automated enrichment of information security ontologies. However, existing ontology enrichment algorithms based on natural language processing and ML models have issues with contextual extraction of concepts in words, phrases and sentences. This motivates the need for sequential Deep Learning architectures that traverse through dependency paths in text and extract embedded vulnerabilities, threats, controls, products and other security related concepts and instances from learned path representations. In the proposed approach, Bidirectional LSTMs trained on a large DBpedia dataset and Wikipedia corpus of 2.8 GB along with Universal Sentence Encoder is deployed to enrich ISO 27001 [1] based information security ontology. The model is trained and tested on an high performance computing (HPC) environment to handle Wiki text dimensionality. The approach yielded a test accuracy of over 80% when tested with knocked out concepts from ontology and web page instances to validate the robustness. Index Terms—Ontology Enrichment, Information Security, Bidirectional LSTM, Universal Sentence Encoder
@inproceedings{bib_A_fr_2022, AUTHOR = {Vivek Iyer, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {A framework for syntactic and semantic quality evaluation of ontologies}, BOOKTITLE = {International Conference On Secure Knowledge Management In Artificial Intelligence Era}. YEAR = {2022}}
The increasing focus on Web 3.0 is leading to automated creation and enrichment of ontologies and other linked datasets. Alongside automation, quality evaluation of enriched ontologies can impact software reliability and reuse. Current quality evaluation approaches oftentimes seek to evaluate ontologies in either syntactic (degree of following ontology development guidelines) or semantic (degree of semantic validity of enriched concepts/relations) aspects. This paper proposes an ontology quality evaluation framework consisting of: (a) SynEvaluator and (b) SemValidator for evaluating syntactic and semantic aspects of ontologies respectively. SynEvaluator allows dynamic task-specific creation and updation of syntactic rules at run-time without any need for programming. SemValidator uses Twitter-based expertise of validators for semantic evaluation. The efficacy and validity of the framework is shown empirically on multiple ontologies
Towards Conducting Effective Locomotion Through Hardware Transformation in Head-Mounted-Device-A Review Study
Y Pawankumar Gururaj,Raghav Mittal,Sai Anirudh Karre,Raghu Babu Reddy Y,Azeemuddin Syed
@inproceedings{bib_Towa_2022, AUTHOR = {Y Pawankumar Gururaj, Raghav Mittal, Sai Anirudh Karre, Raghu Babu Reddy Y, Azeemuddin Syed}, TITLE = {Towards Conducting Effective Locomotion Through Hardware Transformation in Head-Mounted-Device-A Review Study}, BOOKTITLE = {IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops}. YEAR = {2022}}
Locomotion in Virtual Reality (VR) acts as a motion tracking unit for simulating user movements based on the Degree-of-Freedom (DOF) of the application. For effective locomotion, VR practitioners may have to transform their hardware from 3-DOF to 6-DOF. In this context, we conducted a literature review on different motion tracking methods employed in the Head-Mounted-Devices (HMD) to understand such hardware transformation to conduct locomotion in VR. Our observations led us to formulate a taxonomy of the tracking methods for locomotion in VR based on system design. Our study also captures different metrics that VR practitioners use to evaluate the hardware based on the context, performance, and significance for conducting locomotion.
Customizable Head-mounted Device for Detection of Eye Disorders using Virtual Reality
Yendigeri Pawankumar Gururaj,Sai Anirudh Karre,Raghav Mittal,Raghu Babu Reddy Y,Azeemuddin Syed
@inproceedings{bib_Cust_2022, AUTHOR = {Yendigeri Pawankumar Gururaj, Sai Anirudh Karre, Raghav Mittal, Raghu Babu Reddy Y, Azeemuddin Syed}, TITLE = {Customizable Head-mounted Device for Detection of Eye Disorders using Virtual Reality}, BOOKTITLE = {International Conference on VLSI Design}. YEAR = {2022}}
Eye disorders like myopia, hypermetropia, and color blindness affect millions of people around the world. Early detection can help the affected persons take preventive measures against further degradation. However, early detection requires regular testing and visits to trained healthcare professionals to judge the level of disorder. The customization of the test requirements can simplify the method of diagnosis. This paper presents an approach towards developing a virtual reality based low-cost head-mounted device (HMD). The standalone HMD can detect eye disorders like visual acuity, astigmatism, color vision deficiency, and age-related macular degeneration, limiting the involvement of healthcare professionals. We did a user study to test the accuracy of our prototype against various optical test scenarios. The study revealed that the prototype achieved an overall accuracy of 93%. We further aim to deploy the device in economically vulnerable communities with limited access to healthcare infrastructure.
Enhancing Configurable Limitless Paths in Virtual Reality Environments
Raghav Mittal,Sai Anirudh Karre,Yendigeri Pawankumar Gururaj,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2022
@inproceedings{bib_Enha_2022, AUTHOR = {Raghav Mittal, Sai Anirudh Karre, Yendigeri Pawankumar Gururaj, Raghu Babu Reddy Y}, TITLE = {Enhancing Configurable Limitless Paths in Virtual Reality Environments}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2022}}
Locomotion in a virtual environment within a limited physical space is a complex activity. There exist established techniques to support limitless natural walking in virtual environments. These include Redirected walking, Dynamic path generation, and Walk-Inplace technique, etc. PragPal is one such limitless path generation technique that supports natural walking in virtual environments. It is a novel software-based non-haptic locomotion technique. In this paper, we detail the enhancements to the existing PragPal path generation technique that addresses underlying issues in the technique like (1) path collision at angular turns, (2) effective usage of the physical play area, and (3) the ability to set path-width during path turns.
System and method for generating a limitless path in virtual reality environment for continuous locomotion
Raghu Babu Reddy Y,Raghav Mittal,Sai Anirudh Karre
United States Patent, Us patent, 2022
@inproceedings{bib_Syst_2022, AUTHOR = {Raghu Babu Reddy Y, Raghav Mittal, Sai Anirudh Karre}, TITLE = {System and method for generating a limitless path in virtual reality environment for continuous locomotion}, BOOKTITLE = {United States Patent}. YEAR = {2022}}
A method for generating a limitless path in a virtual reality environment ( VR ) for a continuous locomotion within a real physical space using Head - Mounted - Display ( HMD ) device associated with a user is provided . The method includes determining a line segment between two points that corre sponds to an initial path travelled by the user . The method includes detecting a boundary of the VR environment to generate a next line segment . The method includes gener ating and adding a new line segment to end of the initial path . The method includes generating and adding the new line segment to the end of the next line segment . The method includes generating an updated path by adding the new line segment in a direction at the angle of shift angle to the direction of the next line segment .The method includes , configuring to output updated path as two - dimensional points to render updated path into VR environment .
VelGmat : Low Cost Gait Mat For Stance Phase Calculation
Mohammad Waqas Wani,Yendigeri Pawankumar Gururaj,Vivek P,Sai Anirudh Karre,Raghu Babu Reddy Y,Azeemuddin Syed
@inproceedings{bib_VelG_2022, AUTHOR = {Mohammad Waqas Wani, Yendigeri Pawankumar Gururaj, Vivek P, Sai Anirudh Karre, Raghu Babu Reddy Y, Azeemuddin Syed}, TITLE = {VelGmat : Low Cost Gait Mat For Stance Phase Calculation}, BOOKTITLE = {Sensors}. YEAR = {2022}}
Material science enables us to develop a wide array of materials capable enough to address worldly problems.Velostat is a carbon-impregnated polythene material used to address many problems including gait-related problems. This paper presents a novel approach to analyze a gait-cycle parameter called ‘Stance-phase.’ We ideated, designed, and implemented a low-cost customizable Velostat based sensing mat to calculate the stance phase. We validated our VelGmat using sensor density, sensitivity, process time, and hardware performance metrics. Our validation results helped us improve the effectiveness of gait analysis. We conducted a comparative study between our VelGmat and commercially available mat to understand the contrast in stance phase values. We observed 95% accuracy in stance phase values compared with commercially available mat. Index Terms—Piezoresistive; Pressure sensing; Scan time; Sensor density; Gait cycle; Velostat
A Role Based Model Template for Specifying Virtual Reality Software
Sai Anirudh Karre,Vivek Pareek,Raghav Mittal,Raghu Babu Reddy Y
Automated Software Engineering, ASE, 2022
@inproceedings{bib_A_Ro_2022, AUTHOR = {Sai Anirudh Karre, Vivek Pareek, Raghav Mittal, Raghu Babu Reddy Y}, TITLE = {A Role Based Model Template for Specifying Virtual Reality Software}, BOOKTITLE = {Automated Software Engineering}. YEAR = {2022}}
Research in hardware and software support for Virtual Reality (VR) has significantly increased over the last decade. Given the software platform fragmentation and hardware volatility, there is an apparent disconnect among practitioners while building applications in the VR domain. This paper proposes a role-based model template as a meta-model to specify the bare minimum VR software system. We conducted a grounded-theory-based qualitative study on prevailing and phased-out VR SDKs and standards to propose this meta-model. This model template can help VR practitioners build open-source tools to develop, design, and test VR software systems.
An approach to Open-Source Software License Management using Blockchain-based Smart-Contracts
Abhay Kumar,ABHINAV GUPTA,LALIT MOHAN S,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2022
@inproceedings{bib_An_a_2022, AUTHOR = {Abhay Kumar, ABHINAV GUPTA, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {An approach to Open-Source Software License Management using Blockchain-based Smart-Contracts}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2022}}
Open source software is increasingly being used by various organi- zations. Open source licenses such as GPL, MIT, Apache, Mozilla, BSD, etc have varying terms and conditions for usage, modification, and distribution. Given the availability of source code for open source software, it is difficult to scrutinize adherence of licenses and more often than not it is left to the good faith of organizations and individuals. Violation of licensing terms knowingly or unknow- ingly can lead to copyright, ethical, compliance and security issues. In this paper, we propose a blockchain based approach in managing open source software licenses by enforcing certain practices to improve awareness and increase transparency, thus minimizing the possibility of violations. We present a solution design that relies on the use of 4 modules: InterPlanetary File System (IPFS), Smart contracts, Transaction manager (Meta-Mask) and a Permissioned Blockchain to enforce the conformance of licenses
VelGmat: Low Cost Gait Mat For Stance Phase Calculation
Mohammad Waqas Wani,Yendigeri Pawankumar Gururaj,Vivek Pareek,Sai Anirudh Karre,Raghu Babu Reddy Y,Azeemuddin Syed
@inproceedings{bib_VelG_2022, AUTHOR = {Mohammad Waqas Wani, Yendigeri Pawankumar Gururaj, Vivek Pareek, Sai Anirudh Karre, Raghu Babu Reddy Y, Azeemuddin Syed}, TITLE = {VelGmat: Low Cost Gait Mat For Stance Phase Calculation}, BOOKTITLE = {Sensors}. YEAR = {2022}}
Material science enables us to develop a wide array of materials capable enough to address worldly problems. Velostat is a carbon-impregnated polythene material used to address many problems including gait-related problems. This paper presents a novel approach to analyze a gait-cycle parameter called ‘Stance-phase.’ We ideated, designed, and implemented a low-cost customizable Velostat based sensing mat to calculate the stance phase. We validated our VelGmat using sensor density, sensitivity, process time, and hardware performance metrics. Our validation results helped us improve the effectiveness of gait analysis. We conducted a comparative study between our VelGmat and commercially available mat to understand the contrast in stance phase values. We observed 95% accuracy in stance phase values compared with commercially available mat.
Designing Limitless Path in Virtual Reality Environment
Raghav Mittal,Sai Anirudh Karre,Raghu Babu Reddy Y
Proceedings of the ACM on Human-Computer Interaction, PACMHCI, 2021
@inproceedings{bib_Desi_2021, AUTHOR = {Raghav Mittal, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Designing Limitless Path in Virtual Reality Environment}, BOOKTITLE = {Proceedings of the ACM on Human-Computer Interaction}. YEAR = {2021}}
Walking in a Virtual Environment is a bounded task. It is challenging for a subject to navigate a large virtual environment designed in a limited physical space. External hardware support may be required to achieve such an act in a concise physical area without compromising navigation and virtual scene rendering quality. This paper proposes an algorithmic approach to let a subject navigate a limitless virtual environment within a limited physical space with no additional external hardware support apart from the the regular Head-Mounted-Device (HMD) itself. As part of our work, we developed a Virtual Art Gallery as a use-case to validate our algorithm. We conducted a simple user-study to gather feedback from the participants to evaluate the ease of locomotion of the application. The results showed that our algorithm could generate limitless paths of our use-case under predefined conditions and can be extended to other use-cases
Using project-based approach to teach design patterns: An Experience Report
Sai Anirudh Karre,LALIT MOHAN S,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2021
@inproceedings{bib_Usin_2021, AUTHOR = {Sai Anirudh Karre, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Using project-based approach to teach design patterns: An Experience Report}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2021}}
Walking in a Virtual Environment is a bounded task. It is challenging for a subject to navigate a large virtual environment designed in a limited physical space. External hardware support may be required to achieve such an act in a concise physical area without compromising navigation and virtual scene rendering quality. This paper proposes an algorithmic approach to let a subject navigate a limitless virtual environment within a limited physical space with no additional external hardware support apart from the the regular Head-Mounted-Device (HMD) itself. As part of our work, we developed a Virtual Art Gallery as a use-case to validate our algorithm. We conducted a simple user-study to gather feedback from the participants to evaluate the ease of locomotion of the application. The results showed that our algorithm could generate limitless paths of our use-case under predefined conditions and can be extended to other use-cases.
Understanding Software Quality Metrics for Virtual Reality Products-A Mapping Study
MOHIT KURI,Sai Anirudh Karre,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2021
@inproceedings{bib_Unde_2021, AUTHOR = {MOHIT KURI, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Understanding Software Quality Metrics for Virtual Reality Products-A Mapping Study}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2021}}
SQL Injection Vulnerability Identification from Text
Dhruv Parashar,Lalit Mohan Sanagavarapu,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2021
@inproceedings{bib_SQL__2021, AUTHOR = {Dhruv Parashar, Lalit Mohan Sanagavarapu, Raghu Babu Reddy Y}, TITLE = {SQL Injection Vulnerability Identification from Text}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2021}}
Increasing usage of Information Technology (IT) applications in distributed environment is leading to an increase in security exploits. Vulnerabilities related information is also available on open web in an unstructured format that developers may leverage to fix security weaknesses in their IT applications. SQL Injection (SQLi) is one of the topmost vulnerabilities impacting the security of IT applications. We propose an approach to identify information about SQLi in text using text summarization to process any length of text, and a supervised machine learning model to automate the classification of SQLi. To validate the proposed approach, we created a dataset of 100,019 entries that includes 50,010 entries of SQLi from the National Vulnerability Database, 25,010 near negatives related to other cyber security vulnerabilities, and 24,999 data entries that are unrelated to cyber security. The selected Random Forest model was also tested identify SQLi from Web and Twitter text.
System and method for evaluating and facilitating customized guidelines using usability code pattern analysis
NEERAJ MATHUR,Sai Anirudh Karre,Raghu Babu Reddy Y
United States Patent, Us patent, 2021
@inproceedings{bib_Syst_2021, AUTHOR = {NEERAJ MATHUR, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {System and method for evaluating and facilitating customized guidelines using usability code pattern analysis}, BOOKTITLE = {United States Patent}. YEAR = {2021}}
A system for evaluating and facilitating customized source code based on the usability guidelines using a usability code pattern analysis is provided . The system includes a decom pile module , a guideline loader module , an inspection mod ule , a validation module , a recommendation module , and one or more databases . The system obtains the input package from the user computing device to generate customized the usability code pattern for the input package by decompiling , inspecting and validating the input package against a vali dation case based on the usability guidelines . The input package layout files decompiled in XML and JAR file formats . The evaluation of the usability guideline is based on existing usability guidelines . The validation module vali dates the usability of the input package at each instance periodically using validation test cases .
Introducing Software System Course to Engineering Undergraduate Students - An Experience Report
Sai Anirudh Karre,ABHINAV GUPTA,LALIT MOHAN S,Raghu Babu Reddy Y
Software Engineering Education Workshop, SEED, 2021
@inproceedings{bib_Intr_2021, AUTHOR = {Sai Anirudh Karre, ABHINAV GUPTA, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Introducing Software System Course to Engineering Undergraduate Students - An Experience Report}, BOOKTITLE = {Software Engineering Education Workshop}. YEAR = {2021}}
Introducing the fundamentals of software systems to early undergraduates is a tedious journey for the instructors. It is crucial for students as it lays the foundation and establishes a perception of the upcoming computing courses. With rapid advancements in technology and considering the changes in workforce practices, it is required to upgrade the course curriculum to up-skill the students in contrast to prevailing times. This paper discusses our journey towards upgrading a decade-old introductory course on Software Systems for early undergraduate students. We present our approach towards updating the course curriculum and its delivery modes to ease learnability among early undergraduate students. We implemented mixed pedagogy methods over the years and captured student feedback to evaluate our approach.
SIREN: A Fine Grained Approach to Develop Information Security Search Engine
LALIT MOHAN S,Raghu Babu Reddy Y,SHRIYANSH AGRAWAL
Advances in Cybersecurity Management, ACIM, 2021
Abs | | bib Tex
@inproceedings{bib_SIRE_2021, AUTHOR = {LALIT MOHAN S, Raghu Babu Reddy Y, SHRIYANSH AGRAWAL}, TITLE = {SIREN: A Fine Grained Approach to Develop Information Security Search Engine}, BOOKTITLE = {Advances in Cybersecurity Management}. YEAR = {2021}}
The explosive growth of internet users and connected devices increased the threat vector surface. However, there is no single website or a search engine that provides information on vulnerabilities, threats, attacks, controls, etc. Ambiguity, bias and lack of credibility are some of the alarming issues while dealing with generic search engines on sensitive topics such as ‘Health’ and ‘Information Security’. A dedicated information security specific search engine benefits various stakeholders including security professionals, researchers, government, regulators and others. We implemented a fine grained approach that identifies sub-domains of information security, extracts related URLs and content and assesses search results credibility to enhance adoption of information security specific search engine. To identify sub-domains and extract seed and child URLs, a fine grained approach that extends an efficient Artificial Bee Colony algorithm was implemented. About 34,007 seed URLs and 400,726 child URLs of various sub-domains of the information security were extracted. The results of the proposed approach identified more URLs (seed and child) of sub-domains as compared to existing approaches while consuming less computing resources.
An SE approach for CoCo Learning of Virtual Labs
Lalit Mohan Sanagavarapu,Damaraju venkata Naga Mrudhvika,RAVI SHANKAR PILLUTLA,Venkatesh Choppella,Raghu Babu Reddy Y,PADMAPRIYA RAMAN
Conference on Software Engineering Education and Training, CSEE&T, 2020
@inproceedings{bib_An_S_2020, AUTHOR = {Lalit Mohan Sanagavarapu, Damaraju Venkata Naga Mrudhvika, RAVI SHANKAR PILLUTLA, Venkatesh Choppella, Raghu Babu Reddy Y, PADMAPRIYA RAMAN}, TITLE = {An SE approach for CoCo Learning of Virtual Labs}, BOOKTITLE = {Conference on Software Engineering Education and Training}. YEAR = {2020}}
With increasing computing power, capacity and internet connectivity, the ability to learn has crossed classroom boundaries in the form of online learning. The adoption rate and effectiveness of online learning continues to be an area of research. Collaborative and Cooperative (CoCo) learning involves a joint effort by students to understand and solve problems or tasks. Adoption of open source software has also increased with technology-aided collaboration and cooperation. Leveraging the practices of crowdsourced software development, we propose CoCo Learning approach for technical education using virtual labs. About 145 undergraduate engineering students from various institutes participated in our study for a period of one full semester. About 92% of the students conducted an average of 24 virtual experiments with this approach. Nearly 90% of the faculty from these institutes also confirmed that their students' understanding of courses has improved while delivering tangible software artifacts as outcomes.
Towards Digitalization of Requirements: Generating Context-Sensitive User Stories from Diverse Specifications
PADMALATA V NISTALA,ASHA RAJBHOJ,VINAY KULKARNI,SHIVANI SONI,Kesav Nori,Raghu Babu Reddy Y
Automated Software Engineering, ASE, 2020
@inproceedings{bib_Towa_2020, AUTHOR = {PADMALATA V NISTALA, ASHA RAJBHOJ, VINAY KULKARNI, SHIVANI SONI, Kesav Nori, Raghu Babu Reddy Y}, TITLE = {Towards Digitalization of Requirements: Generating Context-Sensitive User Stories from Diverse Specifications}, BOOKTITLE = {Automated Software Engineering}. YEAR = {2020}}
Requirements Engineering in the industry is expertise-driven, heavily manual, and centered around various types of requirement specification documents being prepared and maintained. These specification documents are in diverse formats and vary depending on whether it is a business requirement document, functional specification, interface specification, client specification, and so on. These diverse specification documents embed crucial product knowledge such as functional decomposition of the domain into features, feature hierarchy, feature types and their specific feature characteristics, dependencies, business context, etc. Moreover, in a product development scenario, thousands of pages of requirement specification documentation is created over the years. Comprehending functionality and its associated context from large volumes of specification documents is a highly complex task. To address this problem, we propose to digitalize the requirement specification documents into processable models. This paper discusses the salient aspects involved in the digitalization of requirements knowledge from diverse requirement specification documents. It proposes an AI engine for the automatic transformation of diverse text-based requirement specifications into machine-processable models using NLP techniques and the generation of context-sensitive user stories. The paper describes the key requirement abstractions and concepts essential in an industrial scenario, the conceptual meta-model, and DizReq engine (AI engine for digitalizing requirements) implementation for automatically transforming diverse requirement specifications into user stories embedding the business context. The evaluation results from digitalizing specifications of an IT product suite are discussed: mean feature extraction efficiency is 40 features/file, mean user story extraction efficiency is 71 user stories/file, feature extraction accuracy is 94%, and requirement extraction accuracy is 98%. Keywords: NLP, NLP4RE, model extraction, requirements digitalization, requireme
Software Patterns to Identify Credit Risk Patterns
SIDDHARTH BHATORE,Raghu Babu Reddy Y,Lalit Mohan Sanagavarapu,Sristi Venkata Lakshmi Sarat Chandra
India Council International Conference , INDICON, 2020
@inproceedings{bib_Soft_2020, AUTHOR = {SIDDHARTH BHATORE, Raghu Babu Reddy Y, Lalit Mohan Sanagavarapu, Sristi Venkata Lakshmi Sarat Chandra}, TITLE = {Software Patterns to Identify Credit Risk Patterns}, BOOKTITLE = {India Council International Conference }. YEAR = {2020}}
The adoption of Machine Learning (ML) in software applications has increased in domains like healthcare, banking and others. leading to coining of the term MLWare applications. However, challenges like diverse code base, complex components, lack of expertise, etc. persist in development and maintenance of these applications. Application of software engineering patterns and practices for the development of MLWare applications can improve maintainability, extensibility, scalability and other software quality parameters. In this paper, we propose an approach for developing MLWare applications using a pattern oriented approach. We demonstrate the approach on a credit risk scorecard application that can helps loan officer identify risk patterns and make loan decisions.
Towards Massively Open Online Virtual Internships in Computing Education
P RAVI SANKAR,LALIT MOHAN S,Venkatesh Choppella,Avni Jesrani,PADMAPRIYA RAMAN,Raghu Babu Reddy Y
IEEE International Conference on Technology for Education (T4E), T4E, 2019
@inproceedings{bib_Towa_2019, AUTHOR = {P RAVI SANKAR, LALIT MOHAN S, Venkatesh Choppella, Avni Jesrani, PADMAPRIYA RAMAN, Raghu Babu Reddy Y}, TITLE = {Towards Massively Open Online Virtual Internships in Computing Education}, BOOKTITLE = {IEEE International Conference on Technology for Education (T4E)}. YEAR = {2019}}
Student internships are necessary for every student to learn and apply the learning to deliver tangible and relevant outcomes. In-person internship opportunities are less in number and have major challenges in scaling such as lesser number of available projects in relevant technologies, inadequate mentorship during the internship, varying college calendars and others. This paper presents SRIP (Student Remote Internship Program) approach which focuses on the domain of programming in open source technologies and projects for the internships that are relevant to 2nd and 3rd year engineering college students. It aims to overcome the stated challenges and simultaneously make a contribution to the open source community. Virtual Labs is the open source repository that we leveraged to implement SRIP pilot study for interns to contribute and develop programming skills.
Promoting better financial inclusion through web page transformation—a systematic literature review
Venkatesh Choppella,GOLLAPUDI V.R.J. SAI PRASAD,LALIT MOHAN S,Sridhar Chimalakonda,Raghu Babu Reddy Y
Journal of Banking and Financial Technology, JBFT, 2019
@inproceedings{bib_Prom_2019, AUTHOR = {Venkatesh Choppella, GOLLAPUDI V.R.J. SAI PRASAD, LALIT MOHAN S, Sridhar Chimalakonda, Raghu Babu Reddy Y}, TITLE = {Promoting better financial inclusion through web page transformation—a systematic literature review}, BOOKTITLE = {Journal of Banking and Financial Technology}. YEAR = {2019}}
Most financial institutions, NGOs, and self help groups (SHG) are now using web technology to create outreach. However, for non-mainstream users, like those in rural India, the web application’s non vernacular language, unfamiliar terminology, complex financial models, and user’s own poor digital exposure, together creates a mistrust in the web applications, which tends to result in poor adoption. This inhibits financial literacy initiatives and slows down Financial Inclusion, which is a Millennium Goal. We treat this as a web accessibility problem, and look for prior work on transforming published web content for making it suitable for easy consumption by non-mainstream users. To this end we present a systematic literature review, which forages through 1068 records related to page transformation, to RQ1) uncover existing motivators for transforming an existing web page, RQ2) surface the approaches taken, and …
Model driven approach for virtual lab authoring-chemical sciences labs
LALIT MOHAN S,Shovan Swain,Venkatesh Choppella,Raghu Babu Reddy Y
International Conference on Advanced Learning Technologies, ICALT, 2019
@inproceedings{bib_Mode_2019, AUTHOR = {LALIT MOHAN S, Shovan Swain, Venkatesh Choppella, Raghu Babu Reddy Y}, TITLE = {Model driven approach for virtual lab authoring-chemical sciences labs}, BOOKTITLE = {International Conference on Advanced Learning Technologies}. YEAR = {2019}}
Virtual Labs allow performance of experiments without real world instrumentation needs. Most of these virtual experiments are simulation based and developed using proprietary or Open Source simulation, Adobe Flash, and other client side software. The procedural steps involved in conducting these experiments are hardwired and require software modification for enhancements or alignment to the course structure. We propose a model based approach that eases development of virtual experiments without dependency on software programmers for any changes. We demonstrate our model driven based approach on Chemical Sciences labs of Virtual Labs, a Government of India initiative. With our model driven based approach, the effort for new experiment development or FOSS conversion of existing experiments that were using outdated technologies is less than a person day as compared to more than a person …
Understanding Usability Evaluation Setup for VR Products in Industry - A Review Study
Sai Anirudh Karre,NEERAJ MATHUR,Raghu Babu Reddy Y
ACM SIGAPP Applied Computing Review, ACM Sigapp, 2019
@inproceedings{bib_Unde_2019, AUTHOR = {Sai Anirudh Karre, NEERAJ MATHUR, Raghu Babu Reddy Y}, TITLE = {Understanding Usability Evaluation Setup for VR Products in Industry - A Review Study}, BOOKTITLE = {ACM SIGAPP Applied Computing Review}. YEAR = {2019}}
VR development practices have a diverse set of practices compared to traditional software development. Tasks like scene design, acoustic design, vergence manipulation, image depth, etc. are specific to VR apps and hence require evaluation processes that may be different from the traditional means. Usability Evaluation is one such process which is being executed in an unconventional way by Industrial Practitioners today. In this paper, the researchers detail a Systematic Literature Review of the Usability Evaluation Methods practised by Industrial researchers while building VR Products. The researchers found that VR Product teams follow unique methods to improve usability in their products. Further, the researchers consolidate these methods and provide insights into choosing the best to build a real-world VR Product based on the defined product constraints
Text Cohesion in CQA-Does it Impact Rating?
LALIT MOHAN S,JAHFAR ALI P,Syed Mohd Ali Rizwi,Raghu Babu Reddy Y,Dipti Mishra Sharma
International Conference on Mining Intelligence and Knowledge Exploration, MIKE, 2019
@inproceedings{bib_Text_2019, AUTHOR = {LALIT MOHAN S, JAHFAR ALI P, Syed Mohd Ali Rizwi, Raghu Babu Reddy Y, Dipti Mishra Sharma}, TITLE = {Text Cohesion in CQA-Does it Impact Rating?}, BOOKTITLE = {International Conference on Mining Intelligence and Knowledge Exploration}. YEAR = {2019}}
Community Question and Answer (CQA) platforms are expected to provide relevant content that is not readily available through search engines. With an increase in the number of users and growth of internet, CQA platforms have transitioned from generic to domain specific systems. Expert rating, machine learning and statistical methods are being used for assessing the quality of answers. However, the research on importance of consistency as a quality parameter in the form of text cohesion in CQAs is limited. We extracted 109,113 CQAs from StackExchange related to Information Security of the last 8 years to evaluate text cohesion in answers. An empirical study conducted with 246 participants (Information Security Experts, Software Engineers and Computational Linguists) on the extracted answers stated that lack of text cohesion impacts the rating of answers in CQA. Software Engineers are seekers and viewers of answers, they responded to a survey that lack of text cohesion leads to difficulty in reading and remembering. Information Security Experts providing answers to CQA stated that they need text cohesion for understandability.
A report on 1st Software Engineering Research in India Update Meeting (SERI 2019)
Sai Anirudh Karre,LALIT MOHAN S,Raghu Babu Reddy Y,K.V. Raghavan,R.D. Naik,Rahul Purandare,Amey Karkare
ACM SIGSOFT Software Engineering Notes, ACMSSEN, 2019
@inproceedings{bib_A_re_2019, AUTHOR = {Sai Anirudh Karre, LALIT MOHAN S, Raghu Babu Reddy Y, K.V. Raghavan, R.D. Naik, Rahul Purandare, Amey Karkare}, TITLE = {A report on 1st Software Engineering Research in India Update Meeting (SERI 2019)}, BOOKTITLE = {ACM SIGSOFT Software Engineering Notes}. YEAR = {2019}}
Software Engineering Researchers in India from both academia and industry are widely contributing to various research problems. In this report, we briefly summarize the key insights from 1st Software Engineering Research in India Update Meeting (SERI 2019), which provides a platform for all the researchers to present and discuss their research work. The essence of this research meeting is to examine the current\ research areas within the software engineering research community and discover the scope of collaboration. Specifically, the first SERI update meeting had a series of invited research talks presented by researchers from academia and industry representing various software engineering labs across India. These talks unveiled notable views through presentations and group discussions, and cogitation of topics that can lead to fruitful collaborations between software engineering researchers and industry practitioners. The main objective of this update meeting is the exchange of research areas that promotes successful short-term and long-term collaborations.
FACT - Fine grained Assessment of web page CredibiliTy
SHRIYANSH AGRAWAL,LALIT MOHAN S,Raghu Babu Reddy Y
IEEE Region 10 Conference, TENCON, 2019
@inproceedings{bib_FACT_2019, AUTHOR = {SHRIYANSH AGRAWAL, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {FACT - Fine grained Assessment of web page CredibiliTy}, BOOKTITLE = {IEEE Region 10 Conference}. YEAR = {2019}}
With more than a trillion web pages, there is a plethora of content available for consumption. Search Engine queries invariably lead to overwhelming information, parts of it relevant and some others irrelevant. Often the information provided can be conflicting, ambiguous, and inconsistent contributing to the loss of credibility of the content. In the past, researchers have proposed approaches for credibility assessment and enumerated factors influencing the credibility of web pages. In this work, we detailed a W EBCred framework for automated genre-aware credibility assessment of web pages. We developed a tool based on the proposed framework to extract web page features instances and identify genre a web page belongs to while assessing it’s Genre Credibility Score (GCS). We validated our approach on ‘Information Security’ dataset of 8,550 URLs with 171 features across 7 genres. The supervised learning algorithm, Gradient Boosted Decision Tree classified genres with 88.75% testing accuracy over 10 fold cross-validation, an improvement over the current benchmark. We also examined our approach on ‘Health’ domain web pages and had comparable results. The calculated GCS correlated 69% with crowdsourced Web Of Trust (W OT) score and 13% with algorithm based Alexa ranking across 5 Information security groups. This variance in correlation states that our GCS approach aligns with human way (W OT) as compared to algorithmic way (Alexa) of web assessment in both the experiments.
Grouping Semantically Related Change-Sets to Enhance Identification of Logical Coupling
NEERAJ MATHUR,Sai Anirudh Karre,Raghu Babu Reddy Y
International Conference on Software Engineering and Knowledge Engineering, SEKE, 2019
@inproceedings{bib_Grou_2019, AUTHOR = {NEERAJ MATHUR, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Grouping Semantically Related Change-Sets to Enhance Identification of Logical Coupling}, BOOKTITLE = {International Conference on Software Engineering and Knowledge Engineering}. YEAR = {2019}}
Identifying dependency between various artifacts in a large scale software system is a non-trivial task. As the software evolves, multiple artifacts like files, docs, classes, database scripts, etc., are likely to undergo change concurrently. Such artifacts tend to have a dependency between them, otherwise referred to as logical coupling. Researchers have used Support and Confidence as an association rule based measurement to predict the levels of logical coupling among the software artifacts. However, employing a single change on a software artifact can span across various closely related changes when many code contributors are working on the same change. Thus it is important to preprocess and group these semantically related change-sets before identifying logical coupling. In this paper, we propose a method to identify logical coupling and group semantically related change sets. We evaluate our method on real-world git repositories and document our observations
Usability Evaluation of VR products in Industry - A Systematic Literature Review
Sai Anirudh Karre,NEERAJ MATHUR,Raghu Babu Reddy Y
ACM Symposium on Applied Computing, SAC, 2019
@inproceedings{bib_Usab_2019, AUTHOR = {Sai Anirudh Karre, NEERAJ MATHUR, Raghu Babu Reddy Y}, TITLE = {Usability Evaluation of VR products in Industry - A Systematic Literature Review}, BOOKTITLE = {ACM Symposium on Applied Computing}. YEAR = {2019}}
VR development practices have a diverse set of practices compared to traditional software development. Tasks like scene design, acoustic design, vergence manipulation, image depth, etc. are specific to VR apps and hence require evaluation processes that may be different from the traditional means. Usability Evaluation is one such process which is being executed in an unconventional way by Industrial Practitioners today. In this paper, the researchers detail a Systematic Literature Review of the Usability Evaluation Methods practised by Industrial researchers while building VR Products. The researchers found that VR Product teams follow unique methods to improve usability in their products. Further, the researchers consolidate these methods and provide insights into choosing the best to build a real-world VR Product based on the defined product constraints.
Is Virtual Reality Product Development different? An Empirical Study on VR Product Development Practices
Sai Anirudh Karre,NEERAJ MATHUR,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2019
@inproceedings{bib_Is_V_2019, AUTHOR = {Sai Anirudh Karre, NEERAJ MATHUR, Raghu Babu Reddy Y}, TITLE = {Is Virtual Reality Product Development different? An Empirical Study on VR Product Development Practices}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2019}}
With the rise of Virtual Reality (VR) footprint in many organizations, it was unclear if traditional software engineering practices are still exercised during VR product development. As part of our research, we conducted a year-long multi-level exploratory study to understand the various software development practices within VR product development teams. An empirical study on VR practitioners from 6 different countries was done to examine their development strategies, methods, and models adopted along with the various challenges faced during the course of VR product release. We found that VR practitioners adopted hybrid Software engineering approaches in VR product development. In this paper, we present our insights from the empirical study and stress on the need for a diverse software development model for VR products.
Software Quality Models: A Systematic Mapping Study
Padmalata Nistala,Kesav Nori,Raghu Babu Reddy Y
International Conference on Software and Systems Process, ICSSP, 2019
@inproceedings{bib_Soft_2019, AUTHOR = {Padmalata Nistala, Kesav Nori, Raghu Babu Reddy Y}, TITLE = {Software Quality Models: A Systematic Mapping Study}, BOOKTITLE = {International Conference on Software and Systems Process}. YEAR = {2019}}
Quality Models play a critical role in assuring quality and have evolved over 40+ years. They provide support for defining quality attributes, building and measuring the quality of the resulting product. Each quality model adopts a critical view on quality in terms of a set of model elements and relationships between them. This study aims to provide an overview of the state-of-the-art research on quality models with a focus on encompassing model elements and their support to architecting quality. The study was conducted using systematic mapping as the research methodology. A total of 238 primary papers were classified based on the type of research, standards usage, and publication trends. We identified that 17% (40) of papers belong to quality models. These 40 models were analyzed for the underlying meta-model elements and their support for a quality architecture using rence architecture framework. The architecture phase mapping analysis shows that quality planning phase is 100% supported, quality assessment is 75% supported, quality documentation is included in 40% models and quality realization aspect is barely considered in 13% models. Quality realization happens through software processes and patterns, and it is necessary to evolve quality models and software process architectures that correlate quality definitions and quality realization mechanisms. Future research is expected in this direction
Fine Grained Approach for Domain Specific Seed URL Extraction
LALIT MOHAN S,SOURAV SARANGI,Raghu Babu Reddy Y,Vasudeva Varma Kalidindi
Hawaii International Conference on System Sciences, HICSS, 2018
@inproceedings{bib_Fine_2018, AUTHOR = {LALIT MOHAN S, SOURAV SARANGI, Raghu Babu Reddy Y, Vasudeva Varma Kalidindi}, TITLE = {Fine Grained Approach for Domain Specific Seed URL Extraction}, BOOKTITLE = {Hawaii International Conference on System Sciences}. YEAR = {2018}}
Domain Specific Search Engines are expected to provide relevant search results. Availability of enormous number of URLs across subdomains improves relevance of domain specific search engines. The current methods for seed URLs can be systematic ensuring representation of subdomains. We propose a fine grained approach for automatic extraction of seed URLs at subdomain level using Wikipedia and Twitter as repositories. A SeedRel metric and a Diversity Index for seed URL relevance are proposed to measure subdomain coverage. We implemented our approach for 'Security - Information and Cyber' domain and identified 34,007 Seed URLs and 400,726 URLs across subdomains. The measured Diversity index value of 2.10 conforms that all subdomains are represented, hence, a relevant 'Security Search Engine' can be built. Our approach also extracted more URLs (seed and child) as compared to existing approaches for URL extraction.
Towards word embeddings for improved duplicate bug report retrieval in software repositories
AMAR BUDHIRAJA,KARTIK DUTTA,Manish Srivastava,Raghu Babu Reddy Y
International Conference on Theory of Information Retrieval, ICTIR, 2018
@inproceedings{bib_Towa_2018, AUTHOR = {AMAR BUDHIRAJA, KARTIK DUTTA, Manish Srivastava, Raghu Babu Reddy Y}, TITLE = {Towards word embeddings for improved duplicate bug report retrieval in software repositories}, BOOKTITLE = {International Conference on Theory of Information Retrieval}. YEAR = {2018}}
A key part of software maintenance is bug reporting and rectifica-tion. Bug reporting is a major issue and due to its asynchronous nature, duplicate bug reporting is common. Detecting duplicate bug reports is an important task in software maintenance in order to avoid the assignment of the same bug to different developers.In this paper, we explore the notion of using word embeddings for retrieving duplicate bug report in large software repositories. We discuss an approach to model each bug report as a dense vector and retrieve its top-k most similar reports for duplicate bug report de-tection. Through experiments on two real world datasets, we show that word embeddings perform better than baselines and related approaches and have the potential to improve duplicate bug report retrieval.
Lwe: Lda refined word embeddings for duplicate bug report detection
AMAR BUDHIRAJA,Raghu Babu Reddy Y,Manish Srivastava
International Conference on Software Engineering, ICSE, 2018
@inproceedings{bib_Lwe:_2018, AUTHOR = {AMAR BUDHIRAJA, Raghu Babu Reddy Y, Manish Srivastava}, TITLE = {Lwe: Lda refined word embeddings for duplicate bug report detection}, BOOKTITLE = {International Conference on Software Engineering}. YEAR = {2018}}
Bug reporting is a major part of software maintenance and due to its inherently asynchronous nature, duplicate bug reporting has become fairly common. Detecting duplicate bug reports is an important task in order to avoid the assignment of a same bug to different developers. Earlier approaches have improved duplicate bug report detection by using the notions of word embeddings, topic models and other machine learning approaches. In this poster, we attempt to combine Latent Dirichlet Allocation (LDA) and word embeddings to leverage the strengths of both approaches for this task. As a first step towards this idea, we present initial analysis and an approach which is able to outperform both word embeddings and LDA for this task. We validate our hypothesis on a real world dataset of Firefox project and show that there is potential in combining both LDA and word embeddings for duplicate bug report detection.
DWEN: deep word embedding network for duplicate bug report detection in software repositories
AMAR BUDHIRAJA,KARTIK DUTTA,Raghu Babu Reddy Y,Manish Srivastava
International Conference on Software Engineering, ICSE, 2018
@inproceedings{bib_DWEN_2018, AUTHOR = {AMAR BUDHIRAJA, KARTIK DUTTA, Raghu Babu Reddy Y, Manish Srivastava}, TITLE = {DWEN: deep word embedding network for duplicate bug report detection in software repositories}, BOOKTITLE = {International Conference on Software Engineering}. YEAR = {2018}}
Bug report filing is a major part of software maintenance. Due to extensive number of bugs filed everyday in large software projects and the asynchronous nature of bug report filing ecosystem, duplicate bug reports are filed. Capturing and tagging duplicate bug reports is crucial in order to avoid assignment of the same bug to different developers. Efforts have been made in the past to detect duplicate bug reports by using topic modelling [2], discriminative methods [5], meta-attributes [6], etc. Recently, Yang et al.[8] proposed an approach to combine word embeddings, TF-IDF and meta-attributes to compute bug similarity between two bug reports.
A Survey on Ontology Enrichment from Text
Vivek Iyer,LALIT MOHAN S,Raghu Babu Reddy Y,Mehar Bhatia
International Conference on Natural Language Processing., ICON, 2018
@inproceedings{bib_A_Su_2018, AUTHOR = {Vivek Iyer, LALIT MOHAN S, Raghu Babu Reddy Y, Mehar Bhatia}, TITLE = {A Survey on Ontology Enrichment from Text}, BOOKTITLE = {International Conference on Natural Language Processing.}. YEAR = {2018}}
Increased internet bandwidth at low cost is leading to the creation of large volumes of unstructured data. This data explosion opens up opportunities for the creation of a variety of data-driven intelligent systems, such as the Semantic Web. Ontologies form one of the most crucial layers of semantic web, and the extraction and enrichment of ontologies given this data explosion becomes an inevitable research problem. In this paper, we survey the literature on semi-automatic and automatic ontology extraction and enrichment and classify them into four broad categories based on the approach. Then, we proceed to narrow down four algorithms from each of these categories, implement and analytically compare them based on parameters like context relevance, efficiency and precision. Lastly, we propose a Long Short Term Memory Networks (LSTM) based deep learning approach to try and overcome the gaps identified in these approaches.
Automated Credibility Assessment of Web Page Based on Genre
SHRIYANSH AGRAWAL,LALIT MOHAN S,Raghu Babu Reddy Y
International Conference on Big Data Analytics, BDA, 2018
@inproceedings{bib_Auto_2018, AUTHOR = {SHRIYANSH AGRAWAL, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Automated Credibility Assessment of Web Page Based on Genre}, BOOKTITLE = {International Conference on Big Data Analytics}. YEAR = {2018}}
With more than a billion web sites, volume and variety of content available for consumption is huge. However, credibility, an important quality characteristic of web pages is questionable in many cases and tends to be non-uniform. Credibility can increase or reduce the importance of web page leading to potential gain or loss of user base. Credibility without factoring genre of content (for example, Help, Article, Discussion, etc.) can lead to incorrect assessment. Depending on the genre, the importance of features such as web page date time modified, grammar, image to text ratio, in and out links, and other web page features differ. We propose a genre credibility assessment based on web page surface features and their importance in a genre. Further, we built a W EBCred framework to assess GCS (Genre based Credibility Score) with flexibility to add/modify genres, its features and their importance. We validated our approach on 10,429 ’Information Security’ related web pages; the assessed score correlated 35% with crowdsourced Web Of Trust (WOT) score and 39% with Alexa ranking.
Usability Evaluation Framework for Mobile Apps using Code Analysis
NEERAJ MATHUR,Sai Anirudh Karre,Raghu Babu Reddy Y
Evaluation and Assessment in Software Engineering, EASE, 2018
@inproceedings{bib_Usab_2018, AUTHOR = {NEERAJ MATHUR, Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Usability Evaluation Framework for Mobile Apps using Code Analysis}, BOOKTITLE = {Evaluation and Assessment in Software Engineering}. YEAR = {2018}}
The increasing usage of smart-phones has resulted in mobile applications replacing or supplementing traditional web-based applications. Given the limitations of the form factor in smartphones, usability can be considered as one of the important attributes that determine the success of a mobile application. The measures available for assessing the usability of mobile applications tend to focus more on human aspects and less on the functional aspects of usability. As part of this paper, we propose a usability evaluation framework to identify functional usability issues specific to mobile applications. This framework use usability guidelines and code analysis to improve the usability of a mobile application. As a proof of concept, we have built an end-to-end system using the framework to validate and verify usability issues in Android mobile applications. We also generate code recommendations to implement failed usability guidelines.
SIREN - Security Information Retrieval and Extraction eNgine
LALIT MOHAN S,NEERAJ MATHUR,SHRIYANSH AGRAWAL,Raghu Babu Reddy Y
European Conference on Information Retrieval, ECIR, 2018
@inproceedings{bib_SIRE_2018, AUTHOR = {LALIT MOHAN S, NEERAJ MATHUR, SHRIYANSH AGRAWAL, Raghu Babu Reddy Y}, TITLE = {SIREN - Security Information Retrieval and Extraction eNgine}, BOOKTITLE = {European Conference on Information Retrieval}. YEAR = {2018}}
Domain specific search engines (DSSE) are gaining popularity because of better search relevance and domain specificity. The growth of IT and internet led to increase of cyber attacks, however, lack of DSSE for Security is making users refer multiple sites for security information. We demonstrate SIREN, a search engine for ’Information and Cyber Security’ with subdomain coverage, classification and site credibility for ranking search results. As part of our demonstration, we also automated identification of seed URLs (34,007) and related child URLs (400,726) of the security domain using Artificial Bee Colony algorithm. We also evaluated functional and non-functional parameters of available open source software stack that can be used for building other DSSEs.
Analysis of FinTech Mobile App Usability for Geriatric Users in India
NEERAJ MATHUR,Sai Anirudh Karre,LALIT MOHAN S,Raghu Babu Reddy Y
International Human-Computer Interaction (HCI) and User Experience (UX) Conference, CHIuXiD, 2018
@inproceedings{bib_Anal_2018, AUTHOR = {NEERAJ MATHUR, Sai Anirudh Karre, LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Analysis of FinTech Mobile App Usability for Geriatric Users in India}, BOOKTITLE = {International Human-Computer Interaction (HCI) and User Experience (UX) Conference}. YEAR = {2018}}
There has been a significant rise in FinTech mobile app offerings in India for the past 3-4 years. These mobile apps have become disruptive means of managing daily financial transactions. Given the variety of offerings, the usability of these FinTech applications across different age groups is still unclear. In this paper, we explore the usability of FinTech mobile apps across different age groups through a quantitative survey and a more focused study on factors impacting the geriatric population on adopting FinTech mobile apps in India. In addition, we propose a framework called UMETRIX to evaluate the usability of mobile apps to determine the adoption rate among geriatric population.
Rank Aggregation Approach for Identifying Critical Information Infrastructure
Shadab Ahmad,Lalit Mohan Sanagavarapu,Rajarshi Pal,Raghu Babu Reddy Y
International Conference on Advances in Computing, Communications and Informatics, ICACCI, 2018
@inproceedings{bib_Rank_2018, AUTHOR = {Shadab Ahmad, Lalit Mohan Sanagavarapu, Rajarshi Pal, Raghu Babu Reddy Y}, TITLE = {Rank Aggregation Approach for Identifying Critical Information Infrastructure}, BOOKTITLE = {International Conference on Advances in Computing, Communications and Informatics}. YEAR = {2018}}
Nations have set-up Critical Information Infrastruc-ture (CII) protection centers to provide safety of organizations which are deemed to be critical for the nation. In this context,this paper proposes a framework to identify Critical Information Infrastructures (CIIs). This framework has been adopted to identify the banks which are critical for Indian economy. Previously,Reserve Bank of India, the central bank of the country, has announced three banks as systemically important banks. The proposed approach, in this paper, considers a publicly available data set publishing the number (volume) and the amount (value)of financial transactions in the Indian domestic market involving all the banks. The proposed approach finds the individual ranks of each participating bank based on these two parameters.Finally, rank aggregation method combines these two rank lists(based on the value and the volume) to generate a final rank of the banks. Several rank aggregation methods have been compared in this context.
Crowdsourcing Security - Opportunities and Challenges
LALIT MOHAN S,Raghu Babu Reddy Y
ICSE Workshop on Cooperative and Human Aspects on Software Engineering, CHASE, 2018
@inproceedings{bib_Crow_2018, AUTHOR = {LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Crowdsourcing Security - Opportunities and Challenges}, BOOKTITLE = {ICSE Workshop on Cooperative and Human Aspects on Software Engineering}. YEAR = {2018}}
With improved digital literacy and cheaper data connections, crowdsourcing has become more prevalent. Crowdsourcing tasks such as image tagging, language translation, etc. have contributors with varied skill level. Question and answers, software development/testing and product design are more serious tasks and require expert contributions. With increasing security threats, crowdsourcing in 'security' domain is seen as an upcoming trend. In the survey, opportunities and challenges in crowdsourcing security are analyzed based on a survey conducted with 229 participants. The results provide insights on motivation, quality mechanisms and improvement areas for increased participation. 'Question and Answers' that includes information sharing and 'software development and testing' that includes Bug Bounty are identified as top crowdsourcing tasks by security specialists although they are concerned about security and privacy of information. Among quality attributes analyzed, contributor 'credibility' is identified as a key area of improvement for increased participation in crowdsourcing.
Poster: DWEN: Deep Word Embedding Network for Duplicate Bug Report Detection in Software Repositories
Amar Budhiraja,KARTIK DUTTA,Raghu Babu Reddy Y,Manish Shrivastava
International Conference on Software Engineering - Companion, ICSE - Companion, 2018
@inproceedings{bib_Post_2018, AUTHOR = {Amar Budhiraja, KARTIK DUTTA, Raghu Babu Reddy Y, Manish Shrivastava}, TITLE = {Poster: DWEN: Deep Word Embedding Network for Duplicate Bug Report Detection in Software Repositories}, BOOKTITLE = {International Conference on Software Engineering - Companion}. YEAR = {2018}}
Bug report filing is a major part of software maintenance. Due to the asynchronous nature of the bug filing process, duplicate bug reports are filed. Detecting duplicate bug reports is an important aspect of software maintenance since the same bug should not be assigned to different developers. In this poster, we present Deep Word Embedding Network for computing similarity between two bug reports for the task of duplicate bug report detection. We propose to learn a two step model to calculate similarity between two bug reports by means of word embeddings and a deep neural network. We run experiments on two large datasets of Mozilla Project and Open Office Project and compare the proposed approach with baselines and related approaches. Through this initial work, we show that a combination of word embeddings and deep neural networks can be used to improve duplicate bug report detection.
Crowdsourcing security: opportunities and challenges
LALIT MOHAN S,Raghu Babu Reddy Y
International Workshop on Inclusive Web Programming - Programming on the Web with Open Data for Soci, ICSE, 2018
@inproceedings{bib_Crow_2018, AUTHOR = {LALIT MOHAN S, Raghu Babu Reddy Y}, TITLE = {Crowdsourcing security: opportunities and challenges}, BOOKTITLE = {International Workshop on Inclusive Web Programming - Programming on the Web with Open Data for Soci}. YEAR = {2018}}
With improved digital literacy and cheaper data connections, crowdsourcing has become more prevalent. Crowdsourcing tasks such as image tagging, language translation, etc. have contributors with varied skill level. Question and answers, software development/testing and product design are more serious tasks and require expert contributions. With increasing security threats, crowdsourcing in ’security’ domain is seen as an upcoming trend. In the survey, opportunities and challenges in crowdsourcing security are analyzed based on a survey conducted with 229 participants. The results provide insights on motivation, quality mechanisms and improvement areas for increased participation. ’Question and Answers’ that includes information sharing and ’software development and testing’ that includes Bug Bounty are identified as top crowdsourcing tasks by security specialists although they are concerned about security and privacy of information. Among quality attributes analyzed, contributor ’credibility’ is identified as a key are
A Lightweight Approach for Evaluating Sufficiency of Ontologies
Venkatesh Choppella,LALIT MOHAN S,GOLLAPUDI V.R.J. SAI PRASAD,Sridhar Chimalakonda,Raghu Babu Reddy Y
International Conference on Software Engineering and Knowledge Engineering, SEKE, 2017
@inproceedings{bib_A_Li_2017, AUTHOR = {Venkatesh Choppella, LALIT MOHAN S, GOLLAPUDI V.R.J. SAI PRASAD, Sridhar Chimalakonda, Raghu Babu Reddy Y}, TITLE = {A Lightweight Approach for Evaluating Sufficiency of Ontologies}, BOOKTITLE = {International Conference on Software Engineering and Knowledge Engineering}. YEAR = {2017}}
1Ontologies have emerged as a common way of representing knowledge. Recently, people with minimal domain background or ontology engineering are developing ontologies, leading to a corpus of informal and under-evaluated ontologies. Existing ontology evaluation approaches require rigorous application of formal methods and knowledge of domain experts that can be cumbersome or tedious. We propose a lightweight approach for evaluating sufficiency of ontologies based on Natural Language Processing techniques. The approach consists of verifying the extent of coverage of concepts and relationships of ontologies against words in domain corpus. As a case study, we applied our approach to evaluate sufficiency of ontology in two example domains - Education (Curriculum) and Security (Phishing). We show that our approach yields promising results, is less effort intensive and is comparable with existing evaluation methods.
Does your bug tracking tool suit your needs? a study on open source bug tracking tools
Sai Anirudh Karre,ANVESHI SHUKLA,Raghu Babu Reddy Y
Technical Report, arXiv, 2017
@inproceedings{bib_Does_2017, AUTHOR = {Sai Anirudh Karre, ANVESHI SHUKLA, Raghu Babu Reddy Y}, TITLE = {Does your bug tracking tool suit your needs? a study on open source bug tracking tools}, BOOKTITLE = {Technical Report}. YEAR = {2017}}
Bug tracking tools are vital for managing bugs in any open source as well as proprietary commercial projects. Considering the significance of using an appropriate bug tracking tool, we assess the features offered by 31 open source bug tracking tools and their significance of usage in open source projects. We have categorized these tools into different classes based on their features. We have also conducted a developer survey by working with open source software practitioners to understand the effectiveness of these tools in their day-to-day software development. We also explored StackOverFlow-a developer Q & A forum to understand the developer experiences and challenges while using open source bug tracking tools. Our observations generated encouraging results that can used as a recommendation guide for open source software community to choose the best bug tracking tool based on their functional needs. Additionally, we have identified few features that are needed but not offered by most of these bug tracking tools.
Model based approach to study Defect Dependency in Large Scale Integrated Software Products
Sai Anirudh Karre,Raghu Babu Reddy Y
Technical Report, arXiv, 2017
@inproceedings{bib_Mode_2017, AUTHOR = {Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Model based approach to study Defect Dependency in Large Scale Integrated Software Products}, BOOKTITLE = {Technical Report}. YEAR = {2017}}
Large organizations have diverse product offerings to meet various business needs. To increase revenue, its common these days to offer software products as integrated product suite (s) rather than individual products. Creating and maintaining high quality software products within the integrated product suite requires rigorous product engineering methods. The sheer size of products and dependencies involved tend to raise unidentified defects that may become critical post product upgrades or after every release cycle. It is difficult to track such defects and its widespread across underlying sub-products. In this paper, we present a model based approach to study the defect dependency in large scale integrated software products to avoid surprise defects after product release. To validate the approach, we have applied it on some pilot projects in industry.
A crowdsourcing approach for quality enhancement of elearning systems
Lalit Mohan Sanagavarapu,PADMAPRIYA RAMAN,Venkatesh Choppella,Raghu Babu Reddy Y
Proceedings of the 10th Innovations in Software Engineering Conference, ISEC, 2017
@inproceedings{bib_A_cr_2017, AUTHOR = {Lalit Mohan Sanagavarapu, PADMAPRIYA RAMAN, Venkatesh Choppella, Raghu Babu Reddy Y}, TITLE = {A crowdsourcing approach for quality enhancement of elearning systems}, BOOKTITLE = {Proceedings of the 10th Innovations in Software Engineering Conference}. YEAR = {2017}}
In India, a large number of engineering undergraduates are adopting eLearning as it provides access to best faculty and reduces concerns on inadequate physical infrastructure at colleges. Virtual Labs is a Government of India eLearning initiative containing simulation and remote triggered labs for engineering students. Virtual Labs developed over a period of 6 years is used by more than a million undergraduate students across nine engineering disciplines. The software used for developing these experiments requires substantial effort for maintenance due to deprecation, compatibility, etc. We propose a targeted crowdsourcing approach for maintenance of Virtual Labs with sustainable quality. The targeted crowdsourcing involves the large number of engineering students who are also the major stakeholders of these labs. Our quality enhancement using crowdsourcing approach was validated for 14 labs and …
Impact of gamification on code review process: An experimental study
SHIVAM KHANDELWAL,SRIPADA VENKATA SAI KRISHNA,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2017
@inproceedings{bib_Impa_2017, AUTHOR = {SHIVAM KHANDELWAL, SRIPADA VENKATA SAI KRISHNA, Raghu Babu Reddy Y}, TITLE = {Impact of gamification on code review process: An experimental study}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2017}}
Researchers have supported the idea of gamification to enhance students' interest in activities like code reviews, change management, knowledge management, issue tracking, etc. which might otherwise be repetitive and monotonous. We performed an experimental study consisting of nearly 180+ participants to measure the impact of gamification on code review process using 5 different code review tools, including one gamified code review instance from our extensible architectural framework. We assess the impact of gamification based on the code smells and bugs identified in a gamified and non-gamified environment as per code inspection report. Further, measurement and comparison of the quantity and usefulness of code review comments was done using machine learning techniques.
An aspect oriented approach for renarrating web content
GOLLAPUDI V.R.J. SAI PRASAD,Sridhar Chimalakonda,Venkatesh Choppella,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2017
@inproceedings{bib_An_a_2017, AUTHOR = {GOLLAPUDI V.R.J. SAI PRASAD, Sridhar Chimalakonda, Venkatesh Choppella, Raghu Babu Reddy Y}, TITLE = {An aspect oriented approach for renarrating web content}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2017}}
The ability to modify the existing published web pages is what we are calling Renarration of the web. Such a mechanism is useful for improving accessibility and personalization of the content currently on the web. There are many techniques in place for enabling both Web Accessibility and Web Personalization. In this paper we propose a novel approach: an Aspects inspired design of renarration. Aspects have traditionally been applied to programming. Here we reinterpret concepts like Join Points, Point-cuts and Advices and apply them to web documents. To validate our approach, we designed a framework called Rennaration Studio that is built using microservices based architecture pattern and implemented using Python's flask platform. We demonstrate the feasibility of our proposal by renarrating different Aspects (text, language, phonetics) of two specific web documents.
A study on Migrating Flash files to HTML5/JavaScript
YOGESH MAHESHWARI,Raghu Babu Reddy Y
Innovations in Software Engineering Conference, ISEC, 2017
@inproceedings{bib_A_st_2017, AUTHOR = {YOGESH MAHESHWARI, Raghu Babu Reddy Y}, TITLE = {A study on Migrating Flash files to HTML5/JavaScript}, BOOKTITLE = {Innovations in Software Engineering Conference}. YEAR = {2017}}
Over the past few years, there is a significant shift from web to mobile devices. In addition, the success of HTML5 has negatively impacted the usage and support for Adobe Flash. This has resulted in unmaintained Flash assets and code bases. In this paper, we discuss the feasibility of a semi-automated technique to transform Flash based animations to HTML5 and JavaScript against re-writing the same animations from scratch. Writing animations from scratch in JavaScript is a time taking effort due to adherence to aesthetic details of the animation, domain knowledge and enumeration of all states. Our approach addresses these challenges by providing techniques to transform the Small Web Format (SWF) files to JavaScript. We validate our approach by conducting an experimental study to measure the efforts for a set of animations with respect to transformation from scratch, and transformation using our proposed
Muse: A Musically Inspired Game To Teach Arrays and Linked Lists
Sridhar CHIMALAKONDA,Vaishali SHARMA,Raghib MUSARRAT,Raghu Babu Reddy Y
International Conference on Computers in Education, ICCE, 2017
@inproceedings{bib_Muse_2017, AUTHOR = {Sridhar CHIMALAKONDA, Vaishali SHARMA, Raghib MUSARRAT, Raghu Babu Reddy Y}, TITLE = {Muse: A Musically Inspired Game To Teach Arrays and Linked Lists}, BOOKTITLE = {International Conference on Computers in Education}. YEAR = {2017}}
Data structures is an important area of knowledge in computer science that is often difficult to understand for high school students. There has been a lot of research in computer science education around the subject of programming. Hence, it becomes imperative to explore the domain of data structures as well. With this work, we have looked into an active pedagogical approach for facilitating learning of data structures in school. This approach has been implemented by means of an interactive game. The game aims to teach arrays and linked lists through activities based on the principle of compare and contrast. The innovation in the game is the use of musical notes to teach operations in arrays and linked lists. The game was evaluated with 27 students across 8th, 9th and 10th grades using a questionnaire. The results of the evaluation showed that the group of students who learnt about arrays and linked lists through the game scored an average of 81.5% of the total marks while the other group scored an average of 72% of the total marks.
Architecting an extensible framework for Gamifying Software Engineering concepts
SRIPADA VENKATA SAI KRISHNA,Raghu Babu Reddy Y,SHIVAM KHANDELWAL
India Software Engineering Conference, ISECo, 2016
@inproceedings{bib_Arch_2016, AUTHOR = {SRIPADA VENKATA SAI KRISHNA, Raghu Babu Reddy Y, SHIVAM KHANDELWAL}, TITLE = {Architecting an extensible framework for Gamifying Software Engineering concepts}, BOOKTITLE = {India Software Engineering Conference}. YEAR = {2016}}
Software engineering activities like code reviews, change management, knowledge management, issue tracking, etc. tend to be heavily process oriented. Gamification of such activities by composing the core activities with game design elements like badges and points can increase developers' interest in performing such activities. While there are various frameworks/applications that assist in gamification, extending the frameworks to add any/all desired game design elements has not been adequately addressed. In this paper, we propose an extensible architectural framework for gamification of software engineering activities where in the game design elements are modeled as services. We create an example instance of our framework by building a prototype for code review activity and note the challenges of designing such an extensible architectural framework. The example instance uses python's Flask micro …
Heuristic Approaches to Improve Product Quality in Large Scale Integrated Software Products
Sai Anirudh Karre,Raghu Babu Reddy Y
Evaluation of Novel Approaches to Software Engineering - Communications in Computer and Information, ENASE-CCIS, 2016
@inproceedings{bib_Heur_2016, AUTHOR = {Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {Heuristic Approaches to Improve Product Quality in Large Scale Integrated Software Products}, BOOKTITLE = {Evaluation of Novel Approaches to Software Engineering - Communications in Computer and Information}. YEAR = {2016}}
Software quality has always been an important criterion for assessing stability of a product. It is quite challenging for large-scale complex products, especially integrated products, to endure and withstand the competition after a new version release in its market domain. Unlike regular software, integrated software products require detailed exploration on the spread and impact of a defect to improve overall product quality. In this paper, we use heuristic approaches like generalized defect dependency approach, control flow graph based approach, and feature correlation based approach to study the widespread of defects in large software and suggest a metric called defect dependency metric to study the dependency of defects. We implemented the generalized defect dependency approach on an industry dataset and gathered noteworthy results. We provide a comparative a study of the heuristic approaches …
An Industrial Case Study on Improving Quality in Integrated Software Product using defect dependency
Sai Anirudh Karre,Raghu Babu Reddy Y
International Workshop on Quantitative Approaches to Software Quality (, QuASoQ, 2015
@inproceedings{bib_An_I_2015, AUTHOR = {Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {An Industrial Case Study on Improving Quality in Integrated Software Product using defect dependency}, BOOKTITLE = {International Workshop on Quantitative Approaches to Software Quality (}. YEAR = {2015}}
Product based organizations have diverse product offerings that meet various business needs. The products are in turn integrated to create integrated product suites. Rigorous product engineering is a must for creation of high quality integrated software products. Adequate measures must be taken to improve quality of the integrated product before every release of its module or sub-product. It is hard to imagine upgrading an integrated software product with unidentified defects prior to its release. In this paper, we share our observations on implementing a defect dependency metric to identify the dependency of a defect over a real-time industry defect dataset of an integrated software product. This defect dependency metric was captured and analyzed during release cycle (s) to avoid surprise issues post product launch.
Correctness of Semantic Code Smell Detection Tools
NEERAJ MATHUR,Raghu Babu Reddy Y
International Workshop on Quantitative Approaches to Software Quality (, QuASoQ, 2015
@inproceedings{bib_Corr_2015, AUTHOR = {NEERAJ MATHUR, Raghu Babu Reddy Y}, TITLE = {Correctness of Semantic Code Smell Detection Tools}, BOOKTITLE = {International Workshop on Quantitative Approaches to Software Quality (}. YEAR = {2015}}
Refactoring is a set of techniques used to enhance the quality of code by restructuring existing code/design without changing its behavior. Refactoring tools can be used to detect specific code smells, propose relevant refactorings, and in some cases automate the refactoring process. However, usage of refactoring tools in industry is still relatively low. One of the major reasons being the veracity of the detected code smells, especially smells that aren’t purely syntactic in nature. We conduct an empirical study on some refactoring tools and evaluate the correctness of the code smells they identify. We analyze the level of confidence users have on the code smells detected by the tools and discuss some issues with such tools.
Incremental Aspect Weaving – An approach to faster AOP learning
Raghu Babu Reddy Y,ANISH SHANKAR,CHETLUR MADHAVAN MALOLAN
ACM Symposium on Applied Computing, SAC, 2015
@inproceedings{bib_Incr_2015, AUTHOR = {Raghu Babu Reddy Y, ANISH SHANKAR, CHETLUR MADHAVAN MALOLAN}, TITLE = {Incremental Aspect Weaving – An approach to faster AOP learning}, BOOKTITLE = {ACM Symposium on Applied Computing}. YEAR = {2015}}
Aspect oriented programming (AOP) is a programming paradigm that provides mechanisms for encapsulating cross-cutting concerns. Developers who want to learn AOP often experiment with aspects and different Pointcuts on their existing code bases to try and incorporate aspects into their software project. This typically involves an iterative process of testing multiple Pointcuts, partially due to the new syntax the developer has to learn, as well as to try and find the aspectual implementation that best fits their needs. Incremental weaving time is a huge factor in making this process smooth and faster for developers to more readily learn and adopt AOP. We propose an optimization approach that focuses on reducing redundant re-compilations and weaving. We propose that the approach can reduce the time being spent for weaving and thereby facilitating faster iterative project build time. We have done some initial
Mobile Application Usability Index (MAUI) for improving Mobile Banking Adoption
Lalit Mohan Sanagavarapu,NEERAJ MATHUR,Raghu Babu Reddy Y
International Conference on Evaluation of Novel Approaches to Software Engineerin, ENASE, 2015
@inproceedings{bib_Mobi_2015, AUTHOR = {Lalit Mohan Sanagavarapu, NEERAJ MATHUR, Raghu Babu Reddy Y}, TITLE = {Mobile Application Usability Index (MAUI) for improving Mobile Banking Adoption}, BOOKTITLE = {International Conference on Evaluation of Novel Approaches to Software Engineerin}. YEAR = {2015}}
India has 790+ million active mobile connections and 80.57 million smartphone users. However, as per Reserve Bank of India, the number of transactions performed using smartphone based mobile banking applicationsis less than 12% of the overall banking transactions. One of the major reasons for such low numbers is the usability of the mobile banking app. In this paper, we focus on usability issues related tomobile banking apps and propose a Mobile App Usability Index (MAUI) for enhancing the usability of a mobile banking app. The proposed Index has been validatedwith mobile banking channel managers, chief information security officers, etc.
A Defect Dependency Based Approach to Improve Software Quality In Integrated Software Products
Sai Anirudh Karre,Raghu Babu Reddy Y
International Conference on Evaluation of Novel Approaches to Software Engineerin, ENASE, 2015
@inproceedings{bib_A_De_2015, AUTHOR = {Sai Anirudh Karre, Raghu Babu Reddy Y}, TITLE = {A Defect Dependency Based Approach to Improve Software Quality In Integrated Software Products}, BOOKTITLE = {International Conference on Evaluation of Novel Approaches to Software Engineerin}. YEAR = {2015}}
Integrated software products are complex in design. They are prone to defects caused by integrated and non-integrated modules of the entire integrated software suite. In such software products, a small proportion of defects are fixed as soon as they are reported. Rest of the defects are targeted for fixes in future product release cycles. Among such targeted defects, most of them seem to be insignificant and innocuous in the current version but have the potential to become acute in future versions. In this paper, we propose an approach to study defect dependency of the reported defect using a dependency metric. Identifying the dependency of a defect in an integrated product suite can help the product stake-owners to prioritize them and help improve software quality.
Moving Beyond: Insights from 1st International Workshop on Software Engineering Research and Industrial Practices (SER&IPs 2014)
Sridhar Chimalakonda,Raghu Babu Reddy Y,Rakesh Shukla
ACM SIGSOFT Software Engineering Notes, ACMSSEN, 2015
@inproceedings{bib_Movi_2015, AUTHOR = {Sridhar Chimalakonda, Raghu Babu Reddy Y, Rakesh Shukla}, TITLE = {Moving Beyond: Insights from 1st International Workshop on Software Engineering Research and Industrial Practices (SER&IPs 2014)}, BOOKTITLE = {ACM SIGSOFT Software Engineering Notes}. YEAR = {2015}}
Software engineering researchers and their industrial counterparts have emphasized that research is essential for innovation. In practice, rather than ending up in a win-win situation, most of the times both the parties lose because of differences in expectations between the two sides. In this report, we briefly summarize the key insights from 1st International Workshop on Software Engineering Research and Industrial Practices (SER&IPs 2014) co-located with 36th International Conference on Software Engineering (ICSE 2014). The core lesson that stems out of this workshop is a definite need to have multiple approaches to deal with software engineering research-industrial practices partnership. Specifically, the workshop presented two keynotes: one from an industrial researcher explaining the need for academic expertise and an academic researcher on how their research added value to industry. An invited …
A Report on Modelling Symposium (ModSym)
Raghu Babu Reddy Y,Vinay Kulkarni
India Software Engineering Conference, ISECo, 2015
@inproceedings{bib_A_Re_2015, AUTHOR = {Raghu Babu Reddy Y, Vinay Kulkarni}, TITLE = {A Report on Modelling Symposium (ModSym)}, BOOKTITLE = {India Software Engineering Conference}. YEAR = {2015}}
The principal objective of modelling symposium is to help form an active community working on various aspects of modelling and its applications. The focus is on problems that would be critical 3-5 years out in future. For example, problem spaces such as enterprises, systems, cyber-physical systems, etc. will be given more importance. The event has keynote and 6 invited talks delivered by personnel from Academia and Industry around the world. ModSym invited students and researchers to submit posters and extended abstracts.
Reengineering Enterprise Wide Legacy BFSI Systems – Industrial case study
CHERUKUPALLI PRABHAKAR,Raghu Babu Reddy Y
India Software Engineering Conference, ISECo, 2015
@inproceedings{bib_Reen_2015, AUTHOR = {CHERUKUPALLI PRABHAKAR, Raghu Babu Reddy Y}, TITLE = {Reengineering Enterprise Wide Legacy BFSI Systems – Industrial case study}, BOOKTITLE = {India Software Engineering Conference}. YEAR = {2015}}
Financial services sector typically known as BFSI (Banking Financial Services and Insurance) invest substantial amount of their developmental and maintenance budget in Information Technology (IT). Client servicing, regulatory/compliance requirements, effective risk monitoring among others necessitate such expenditure. A large amount of time and IT expenditure in BFSI sector is spent in reengineering the legacy systems. Successful execution of these reengineering programs is critical to the firm as well as the financial markets and regulators. In this paper, we present a report of the study done on reengineering three legacy systems in BFSI sector. The focus of the paper is on challenges and issues faced, practices followed, actual data collected by Mercury Quality Center during reengineering of these systems. Our study uses key metrics, client feedback, usage of these systems, document, process repository
Transformation of Flash files to HTML5 and JavaScript
YOGESH MAHESHWARI,Raghu Babu Reddy Y
Australasian Software Engineering Conference, ASWEC, 2015
@inproceedings{bib_Tran_2015, AUTHOR = {YOGESH MAHESHWARI, Raghu Babu Reddy Y}, TITLE = {Transformation of Flash files to HTML5 and JavaScript}, BOOKTITLE = {Australasian Software Engineering Conference}. YEAR = {2015}}
Adobe Flash is a popular platform frequently used for creation of advertisements, videos and interactive contents on web pages. However its utility is lost with the decreasing support of Flash players on some platforms, where open standards like HTML5 and JavaScript are widely supported. This paper describes a transformation process for converting Flash files into HTML5 and Javascript to give a human readable output. This will lend users the same resourcefulness of Flash in open standards without relying on the former.
Large Scale Web Page Optimization of Virtual Labs
JATIN AGARWAL,Utkarsh Rastogi,NURENDRA CHOUDHARY,Prateek Pandey,Venkatesh Choppella,Raghu Babu Reddy Y
IEEE International Conference on Technology for Education, T4E, 2014
@inproceedings{bib_Larg_2014, AUTHOR = {JATIN AGARWAL, Utkarsh Rastogi, NURENDRA CHOUDHARY, Prateek Pandey, Venkatesh Choppella, Raghu Babu Reddy Y}, TITLE = {Large Scale Web Page Optimization of Virtual Labs}, BOOKTITLE = {IEEE International Conference on Technology for Education}. YEAR = {2014}}
e propose set of guidelines for virtual labs to improve end user experience based on analysis of experimental results. Virtual labs were designed and developed by people with different technical backgrounds based on their familiarity with the technologies and the complexity of virtual lab. As a result each lab developer decided to use his or her own set of tools and technologies leading to performance issues during execution of the virtual labs. Performance of a web application depends upon the content of the web page. Therefore, we did analysis on web pages of virtual lab and listed guidelines to enhance user experience.
Any Time Virtual Labs: On Portable Media and as Debian Packages
NURENDRA CHOUDHARY,Venkatesh Choppella,Raghu Babu Reddy Y,THIRUMAL RAVULA
IEEE International Conference on Technology for Education, T4E, 2014
@inproceedings{bib_Any__2014, AUTHOR = {NURENDRA CHOUDHARY, Venkatesh Choppella, Raghu Babu Reddy Y, THIRUMAL RAVULA}, TITLE = {Any Time Virtual Labs: On Portable Media and as Debian Packages}, BOOKTITLE = {IEEE International Conference on Technology for Education}. YEAR = {2014}}
As education and technology merge, the diversity of teaching and learning methods expand even more. Virtual labs are a set of web applications containing learning materials that compliment the various courses in an Engineering curriculum. The primary intent of the virtual labs is to provide in-lab experience to their users even when the physical lab infrastructure is not available. In this paper, we propose a method for providing access to virtual labs for all those lack internet access. Our aim is to facilitate availability and usage of Virtual Labs without network connectivity. We preinstall the virtual labs with full environment on an Operating System and also use Debian packages for easy installation of the labs on existing Operating System.
Challenges for software engineering in educational technologies
Kesav Nori,Raghu Babu Reddy Y,SRIDHAR CHIMALAKONDA
International Conference on Contemporary Computing and Informatics, IC3I, 2014
@inproceedings{bib_Chal_2014, AUTHOR = {Kesav Nori, Raghu Babu Reddy Y, SRIDHAR CHIMALAKONDA}, TITLE = {Challenges for software engineering in educational technologies}, BOOKTITLE = {International Conference on Contemporary Computing and Informatics}. YEAR = {2014}}
This paper is an attempt at a vision, driven by experiences in India, of a set of research and technical challenges for software engineering researchers that stem from critical concerns of scale and variety when designing educational technologies. Educational concerns are the same everywhere. To be holistic, we have to consider points of view of all concerned stake holder groups of educational systems: they are grouped as: {students, teachers, employers, society}, {administrators}, and {managers}. The first group is concerned with the technical content to be transacted through education and its quality and value to them. It is concerned with integrity with the body of knowledge of the subject, constrained by the level at which the subject is to be taught or learnt, further constrained by the time available for a course on that subject - this is a source of variety, as do the different languages of instruction that may be used, whilst the subjects themselves and the level at which they are dealt with present a concern for scale. Further sources of variety are: the student as a novice, a beginner, an advanced student, or one revising the subject matter for the purposes of a test or an examination - the kind of student presents a source of variety, and the number of students presents a matter of scale; the teacher as an expositor, a tutor, a coach, or a mentor - the kind of teachers presents variety, whereas the number of teachers needed in the system are a matter of scale; as an employer, as the next level of an educational system, or the society as the beneficiary of education, and the student is both a product of the Educational System, as well as a consumer, the immediate beneficiary. There is lastly, the quality of the Educational System as a whole, as seen from each stakeholders point of view. This is all about technical content to be transacted in the process of educational services. In addition, we will need to look for support to administrative and managerial aspects of educational systems.
Providing web credibility assessment support
SONAL AGGARWAL,Herre Van Oostendorp,Raghu Babu Reddy Y,Bipin Indurkhya
European Conference on Cognitive Ergonomics, ECCE, 2014
@inproceedings{bib_Prov_2014, AUTHOR = {SONAL AGGARWAL, Herre Van Oostendorp, Raghu Babu Reddy Y, Bipin Indurkhya}, TITLE = {Providing web credibility assessment support}, BOOKTITLE = {European Conference on Cognitive Ergonomics}. YEAR = {2014}}
Presence of information from multiple sources on the internet requires evaluating the credibility of the information, before its utilization. Researchers have suggested that internet users experience difficulty in accessing necessary information and do not pay enough attention to its credibility. We present here the design and implementation of an automated Web Credibility Assessment Support Tool (WebCAST) that considers multiple factors (type of website, popularity, sentiment, date of last update, reputation and review based on users' ratings reflecting personal experience) for assessing the credibility of information and returns a summary indication of the credibility of a website. We use Potentially All Pairwise RanKings of all possible Alternatives (PAPRIKA) method of Multi-Criteria Decision Analysis (MCDA) to give weights to the scale values on each factor, representing the relative importance of the attributes. An empirical evaluation of the tool was conducted by computing the correlation between the tool-generated credibility scores and that of human judges. The correlation was found to be 0.89, thus verifying the validity of the tool. In the future the proposed tool can be made useful to students in their learning process of credibility assessment.
Automated refactorings in Java using IntelliJ IDEA to extract and propogate constants Usability of Refactoring tools for Java Development
Jeffrey Mahmood,Raghu Babu Reddy Y
International Conference on Advanced Computing, ICoAC, 2014
@inproceedings{bib_Auto_2014, AUTHOR = {Jeffrey Mahmood, Raghu Babu Reddy Y}, TITLE = {Automated refactorings in Java using IntelliJ IDEA to extract and propogate constants Usability of Refactoring tools for Java Development}, BOOKTITLE = {International Conference on Advanced Computing}. YEAR = {2014}}
Refactoring tools suffer from usability in the areas of automating mundane tasks, providing user customization, and providing strategies for error recovery. The automation of refactoring tools can be a risky undertaking since user intervention is required in many scenarios to maintain the internal quality of the system. Any type of design level refactoring requires complex changes to the code, the validation of preconditions, and could potentially harm the system. Smaller refactorings that handle code-smells can be carried out automatically with considerably lower risk. This paper discusses the current state of automated refactoring tools, and the development of an automated refactoring tool to extract and propagate Java literal expressions in IntelliJ IDEA.
Teaching Software Product Engineering in Undergraduate Computing Curriculum
Raghu Babu Reddy Y,Kesav Nori
Conference on Software Engineering Education and Training, CSEE&T, 2014
@inproceedings{bib_Teac_2014, AUTHOR = {Raghu Babu Reddy Y, Kesav Nori}, TITLE = {Teaching Software Product Engineering in Undergraduate Computing Curriculum}, BOOKTITLE = {Conference on Software Engineering Education and Training}. YEAR = {2014}}
Traditional engineering disciplines like electrical engineering, mechanical engineering, metallurgical engineering have focused on the design of artifacts. However most the modern day software engineering course with in the undergraduate-computing curriculum focuses on teaching software processes rather than design of software artifacts. This paper argues the need for introducing software product engineering, i.e., a course that extensively deals with design of software artifacts in undergraduate computing curriculum. At a broader level, we also argue the need for more undergraduate software engineering programs in India.
JIFFY: A framework for encompassing aspects in testing and debugging software
MOHAMMAD ASIF,Raghu Babu Reddy Y
International Workshop on Automation of Software Test, AST, 2013
@inproceedings{bib_JIFF_2013, AUTHOR = {MOHAMMAD ASIF, Raghu Babu Reddy Y}, TITLE = {JIFFY: A framework for encompassing aspects in testing and debugging software}, BOOKTITLE = {International Workshop on Automation of Software Test}. YEAR = {2013}}
Aspect Oriented Programming (AOP) advocates the notion of aspects to encapsulate crosscutting concerns. A concern is a behavior in a computer program and is said to be crosscutting if the module(s) that address the behavior are scattered and tangled with other modules of the system. In this paper, we investigate the possibility of using AOP for software testing and non-invasive debugging. We have identified some crosscutting concerns like access control, logging, performance, tracing, etc., and developed a framework based on java bytecode instrumentation technique to inject these crosscutting concerns into the compiled code. The framework is available as a service, i.e., the service takes the required code as input and produces the changed code as output that contains the appropriate aspects. Thus, it is argued that the framework can be the basis for implementing the notion of “Enabling testing as a Service”.