Computing, School of
The School of Computing has developed its program through research and scholarship and has become one of the leading establishments in its field. The School is in the process of expanding, particularly in the areas of software design and engineering, and biomedical computing.
This community includes research outputs produced by faculty and students. Submitting works to QSpace may enable compliance with the Tri-Agency Open Access Policy on Publications.
When you submit your work to QSpace, you retain copyright and grant the Library a non-exclusive license to distribute and preserve. Works are open access unless restricted by the creator.
Collections in this community
Recent Submissions
-
Modelling Stock Market Manipulation in Online Forums
Over the past several decades, advances in technology have significantly impacted all aspects of the financial system. While it has led to numerous benefits, it has also increased the methods for manipulating the market. ... -
INTELLIGENT FRAMEWORK FOR MONITORING CROPS IN GREENHOUSES
Wireless Sensor Networks (WSNs) and Wireless Visual Sensor Networks (WVSNs) are two monitoring technologies that have the potential for use in many application domains, and both are poised for growth in many markets from ... -
STUDYING THE USE OF EXTRINSIC INCENTIVES TO SUPPORT CROWDSOURCED SOFTWARE ENGINEERING ACTIVITIES
Extrinsic incentives help attract participants to Crowdsourced Software Engineering (SE) activities (e.g., open source development and Stack Overflow contributions). There are two types of extrinsic incentives: 1) monetary ... -
UNDERSTANDING THE IMPACT OF EXPERIMENTAL DESIGN CHOICES ON MACHINE LEARNING CLASSIFIERS IN SOFTWARE ANALYTICS
Software analytics is the process of systematically analyzing software engineering related data to generate actionable insights that help software practitioners make data-driven decisions. Machine learning classifiers lie ... -
A Bootstrapped Approach for Abusive Intent Detection in Social Media Content
The proliferation of Internet connected devices continues to result in the creation of massive collections of human generated content from websites such as social media. Unfortunately, some of these sites are used by ... -
On the Maintenance of Crowdsourced Knowledge on Stack Overflow
The enormous quantity of software artifacts (e.g., code, documentations, and online discussions) created by developers are in great need for maintenance. Among software artifacts built by developers, Stack Overflow, a ... -
Towards Reliability Evaluation and Integration in Cloud Resource Management
The adoption of cloud computing technology is increasing day by day due to its enormous services and low cost. Customers transfer their businesses to cloud because of the beneficial cloud features such as scalability, high ... -
Studying Dependency Maintenance Practices Through the Mining of Data from npm Packages
Open source software ecosystems have gained significant importance in the last decade. In a software ecosystem, client packages can enable a dependency to reuse the functionalities of a provider package. On the one hand, ... -
Entry-based Planning of Neurosurgical Trajectories
Purpose In cases of brain trauma or hydrocephalus an external ventricular drain (EVD) is often inserted through the skull and brain to drain excess cerebrospinal fluid from the ventricles to relieve pressure. Most often, ... -
Composition of Transformations in Feature-Based Registration
Accurate registration of medical images is crucial to the successful deployment of computer assisted interventions or surgical navigation systems. Nonrigid registration techniques are important when considering soft tissues ... -
Machine Learning QoE Prediction for Video Streaming over HTTP
Streaming video services have been growing rapidly in the past decade due to the wide adoption of more capable mobile devices such as smartphones and tablets, together with the deployment of higher capacity mobile networks ... -
An Analysis of Motion Smoothness in Video Object Detection
Machine learning in computer vision has become an invaluable aspect of research on object detection and object tracking. While advancements in current research aim to improve the matching of predictions with ground truth ... -
Lightweight Authenticated Encryption for Vehicle Controller Area Network
Vehicle manufacturers are installing a large number of Electronic Control Units (ECU) inside vehicles. ECUs communicate among themselves via a Controller Area Network (CAN) to ensure better user experience and safety. CAN ... -
Deep Learning for Legal and Medical Text Analytics
Applications of deep learning using text have shown wide success in detecting human emotions, analyzing social media feeds, classifying text and creating compressed representations. While deep learning has been widely ... -
Aiming with Assistance: Player Balancing for Differences in Fine Motor Ability
A significant barrier to players’ enjoyment of video games is the competitive nature of many multiplayer games. It can be difficult for people with different abilities to enjoy playing together. Player balancing (such as ... -
Theoretical and Practical Considerations of Learning Algorithms in Image-guided Interventions
Image-guided Interventions (IGI) have revolutionized medical practice and improved the quality of life for patients by enabling less invasive surgeries and treatments. Recent advancements in computing power and learning ... -
Software Security Flaw Prediction Using Rich Contextualized Language Use Vectors: A Case Study on the Linux Kernel
One of the major threats to the security of software systems is the occurrence of security vulnerabilities, which can potentially cause a variety of problems including, but not limited to, information loss, privilege ... -
Interpreting Mass Spectrometry Images Using Stacked Learning
Desorption electrospray ionization mass spectrometry (DESI-MS) allows for hyperspectral analysis of tissue samples non-destructively under ambient conditions. A downside of such a bountiful source of data is that the high ... -
Migrating web Applications from SQL to NoSQL Databases
In the Big Data era, data is emerging dramatically and the structure of data is becoming increasingly flexible. Non-Relational databases, such as the NoSQL class of Databases, are playing a major role as an enabler technology ... -
Synthesis and Verification of Models using Satisfiability Modulo Theories
Model-driven development (MDD) advocates using models as the primary software development artifacts in place of source code. Automatic synthesis and verification of models are essential to simplify the process of creation ...