Skip to main content

Showing 1–24 of 24 results for author: Sureka, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1804.01770  [pdf, other

    cs.CY

    Teaching Requirements Engineering Concepts using Case-Based Learning

    Authors: Saurabh Tiwari, Deepti Ameta, Paramvir Singh, Ashish Sureka

    Abstract: Requirements Engineering (RE) is known to be critical for the success of software projects, and hence forms an important part of any Software Engineering (SE) education curriculum offered at tertiary level. In this paper, we report the results of an exploratory pilot study conducted to assess the effectiveness of Case-Based Learning (CBL) methodology in facilitating the learning of several RE conc… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

    Comments: The paper is a pre-print version of the paper accepted at Second International Workshop on Software Engineering Education for Millennials (SEEM 2018) co-located to 40th International Conference on SoftwareEngineering (ICSE 2018)

  2. arXiv:1712.07944  [pdf, ps, other

    cs.SE

    A Comparative Study of Different Source Code Metrics and Machine Learning Algorithms for Predicting Change Proneness of Object Oriented Systems

    Authors: Lov Kumar, Ashish Sureka

    Abstract: Change-prone classes or modules are defined as software components in the source code which are likely to change in the future. Change-proneness prediction is useful to the maintenance team as they can optimize and focus their testing resources on the modules which have a higher likelihood of change. Change-proneness prediction model can be built by using source code metrics as predictors or featu… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: Extended version of our previous papers on Predicting Change Proneness of Object Oriented Systems

  3. arXiv:1704.04383  [pdf, ps, other

    cs.SE

    Using Source Code Metrics and Ensemble Methods for Fault Proneness Prediction

    Authors: Lov Kumar, Santanu Rath, Ashish Sureka

    Abstract: Software fault prediction model are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. Several researchers' have validated the use of different classification techniques to develop predictive models for fault prediction. The performance of the statistical models are proven to be influenced by the training and testing dataset. Ensemble method… ▽ More

    Submitted 14 April, 2017; originally announced April 2017.

    Comments: Extended version of the COMPSAC 2017 Paper by same authors

    ACM Class: K.6.3

  4. arXiv:1703.05481  [pdf, other

    cs.DB

    Empirical Analysis on Comparing the Performance of Alpha Miner Algorithm in SQL Query Language and NoSQL Column-Oriented Databases Using Apache Phoenix

    Authors: Kunal Gupta, Astha Sachdev, Ashish Sureka

    Abstract: Process-Aware Information Systems (PAIS) is an IT system that support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and Actor. Process Mining is a new and emerging field that aims at analyzing the event logs to discover, enhance and improve business processes and check conf… ▽ More

    Submitted 16 March, 2017; originally announced March 2017.

    Comments: The work presented in this paper is extension of the work presented in (1) Kunal Gupta et al. in C3S2E 2015 (2) Astha Sachdev et al in Big Data Analytics (BDA 2015) . The study presented in this paper has several more results which are not present in these papers due to limited space in the conference paper

    ACM Class: H.2

  5. arXiv:1701.04934  [pdf, other

    cs.IR

    Investigating the Application of Common-Sense Knowledge-Base for Identifying Term Obfuscation in Adversarial Communication

    Authors: Swati Agarwal, Ashish Sureka

    Abstract: Word obfuscation or substitution means replacing one word with another word in a sentence to conceal the textual content or communication. Word obfuscation is used in adversarial communication by terrorist or criminals for conveying their messages without getting red-flagged by security and intelligence agencies intercepting or scanning messages (such as emails and telephone conversations). Concep… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

    Comments: This paper is an extended and detailed version of our (same authors) previous paper (regular paper) published at COMSNETS2015

    Journal ref: S. Agarwal and A. Sureka, "Using common-sense knowledge-base for detecting word obfuscation in adversarial communication," 2015 7th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, 2015, pp. 1-6

  6. arXiv:1701.04931  [pdf, other

    cs.IR

    Characterizing Linguistic Attributes for Automatic Classification of Intent Based Racist/Radicalized Posts on Tumblr Micro-Blogging Website

    Authors: Swati Agarwal, Ashish Sureka

    Abstract: Research shows that many like-minded people use popular microblogging websites for posting hateful speech against various religions and race. Automatic identification of racist and hate promoting posts is required for building social media intelligence and security informatics based solutions. However, just keyword spotting based techniques cannot be used to accurately identify the intent of a pos… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

    Comments: This paper is an extended and detailed version of our (same authors') short paper published in EISIC 2016

  7. arXiv:1701.00108  [pdf

    cs.SE

    Parichayana: An Eclipse Plugin for Detecting Exception Handling Anti-Patterns and Code Smells in Java Programs

    Authors: Ashish Sureka

    Abstract: Anti-patterns and code-smells are signs in the source code which are not defects (does not prevent the program from functioning and does not cause compile errors) and are rather indicators of deeper and bigger problems. Exception handling is a programming construct de- signed to handle the occurrence of anomalous or exceptional conditions (that changes the normal flow of program execution). In thi… ▽ More

    Submitted 31 December, 2016; originally announced January 2017.

    Comments: Tools Demo Paper (paper provides links to the video demo and source code)

    ACM Class: K.6.3

  8. arXiv:1701.00072  [pdf, other

    cs.DB

    Graph or Relational Databases: A Speed Comparison for Process Mining Algorithm

    Authors: Jeevan Joishi, Ashish Sureka

    Abstract: Process-Aware Information System (PAIS) are IT systems that manages, supports business processes and generate large event logs from execution of business processes. An event log is represented as a tuple of the form CaseID, TimeStamp, Activity and Actor. Process Mining is an emerging area of research that deals with the study and analysis of business processes based on event logs. Process Mining a… ▽ More

    Submitted 31 December, 2016; originally announced January 2017.

    Comments: Extended and Detailed Version of the IDEAS '15 paper by Jeevan Joishi and Ashish Sureka

    ACM Class: H.2.3

  9. arXiv:1611.00271  [pdf, other

    cs.PL cs.CY

    Application of Case-Based Teaching and Learning in Compiler Design Course

    Authors: Divya Kundra, Ashish Sureka

    Abstract: Compiler design is a course that discusses ideas used in construction of programming language compilers. Students learn how a program written in high level programming language and designed for humans understanding is systematically converted into low level assembly language understood by machines. We propose and implement a Case-based and Project-based Learning environment for teaching important… ▽ More

    Submitted 1 November, 2016; originally announced November 2016.

    Comments: Extended version of our short paper accepted in T4E 2016 (The Eighth IEEE International Conference on Technology for Education)

    ACM Class: D.3.4; B.1.4

  10. arXiv:1610.09635  [pdf, other

    cs.SE cs.DL

    A Bibliometric Study of Asia Pacific Software Engineering Conference from 2010 to 2015

    Authors: Lov Kumar, Saikrishna Sripada, Ashish Sureka

    Abstract: The Asia-Pacific Software Engineering Conference (APSEC) is a reputed and a long-running conference which has successfully completed more than two decades as of year 2015. We conduct a bibliometric and scientific publication mining based study to how the conference has evolved over the recent past six years (year 2010 to 2015). Our objective is to perform in-depth examination of the state of APSEC… ▽ More

    Submitted 30 October, 2016; originally announced October 2016.

    Comments: Extended and detailed version of the short paper accepted in APSEC 2016 by the same authors

    ACM Class: D.2.0

  11. arXiv:1610.09610  [pdf, other

    cs.CY

    An Experimental Study on the Learning Outcome of Teaching Elementary Level Children using Lego Mindstorms EV3 Robotics Education Kit

    Authors: Vidushi Chaudhary, Vishnu Agrawal, Ashish Sureka

    Abstract: Skills like computational thinking, problem solving, handling complexity, team-work and project management are essential for future careers and needs to be taught to students at the elementary level itself. Computer programming knowledge and skills, experiencing technology and conducting science and engineering experiments are also important for students at elementary level. However, teaching such… ▽ More

    Submitted 30 October, 2016; originally announced October 2016.

    Comments: Extended version of the accepted and to be published paper in T4E 2016 The 8th IEEE International Conference on Technology for Education

    ACM Class: I.2.9; K.3.2

  12. arXiv:1609.06266  [pdf, other

    cs.SE

    Thirteen Years of Mining Software Repositories (MSR) Conference - What is the Bibliography Data Telling Us?

    Authors: Lov Kumar, Ashish Sureka

    Abstract: The Mining Software Repositories (MSR) conference is a reputed, long-running and flagship conference in the area of Software Analytics which has successfully completed more than one decade as of year 2016. We conduct a bibliometric and scientific publication mining based study to study how the conference has evolved over the recent past 13 years (from 2004 to 2007 as a workshop and then from 2008… ▽ More

    Submitted 20 September, 2016; originally announced September 2016.

    Comments: Bibliometric and Scientometric Analysis of Mining Software Repositories (MSR) Conferenence

  13. arXiv:1603.09164  [pdf, other

    cs.SI

    Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities

    Authors: Swati Agarwal, Ashish Sureka

    Abstract: Tumblr is one of the largest and most popular microblogging website on the Internet. Studies shows that due to high reachability among viewers, low publication barriers and social networking connectivity, microblogging websites are being misused as a platform to post hateful speech and recruiting new members by existing extremist groups. Manual identification of such posts and communities is overw… ▽ More

    Submitted 30 March, 2016; originally announced March 2016.

    Comments: 8 Pages, 7 Figures including 9 images, 2 Tables, 3 Algorithms, Extended version of our work Agarwal et. al., Micropost 2015

  14. arXiv:1511.07023  [pdf, other

    cs.SE cs.LG

    Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models generated by Mining Event-Log Data in Issue Tracking System

    Authors: Prerna Juneja, Divya Kundra, Ashish Sureka

    Abstract: Issue Tracking Systems (ITS) such as Bugzilla can be viewed as Process Aware Information Systems (PAIS) generating event-logs during the life-cycle of a bug report. Process Mining consists of mining event logs generated from PAIS for process model discovery, conformance and enhancement. We apply process map discovery techniques to mine event trace data generated from ITS of open source Firefox bro… ▽ More

    Submitted 22 November, 2015; originally announced November 2015.

  15. arXiv:1511.06858  [pdf, other

    cs.CY cs.SI

    Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats

    Authors: Swati Agarwal, Ashish Sureka

    Abstract: Research shows that various social media platforms on Internet such as Twitter, Tumblr (micro-blogging websites), Facebook (a popular social networking website), YouTube (largest video sharing and hosting website), Blogs and discussion forums are being misused by extremist groups for spreading their beliefs and ideologies, promoting radicalization, recruiting members and creating online virtual co… ▽ More

    Submitted 21 November, 2015; originally announced November 2015.

    Comments: 18 pages, 16 figures, 4 tables. This paper is a comprehensive and detailed literature survey to understand current state-of-the-art of Online Social Media Intelligence to counter and combat ISI related threats

  16. arXiv:1507.01168  [pdf, other

    cs.SE cs.IR

    Kernel Based Sequential Data Anomaly Detection in Business Process Event Logs

    Authors: Ashish Sureka

    Abstract: Business Process Management Systems (BPMS) log events and traces of activities during the execution of a process. Anomalies are defined as deviation or departure from the normal or common order. Anomaly detection in business process logs has several applications such as fraud detection and understanding the causes of process errors. In this paper, we present a novel approach for anomaly detection… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

  17. arXiv:1507.01062  [pdf, other

    cs.SE

    Intention-Oriented Process Model Discovery from Incident Management Event Logs

    Authors: Ashish Sureka

    Abstract: Intention-oriented process mining is based on the belief that the fundamental nature of processes is mostly intentional (unlike activity-oriented process) and aims at discovering strategy and intentional process models from event-logs recorded during the process enactment. In this paper, we present an application of intention-oriented process mining for the domain of incident management of an Info… ▽ More

    Submitted 4 July, 2015; originally announced July 2015.

  18. arXiv:1506.01499  [pdf, other

    cs.SE

    Survey Results on Threats To External Validity, Generalizability Concerns, Data Sharing and University-Industry Collaboration in Mining Software Repository (MSR) Research

    Authors: Ashish Sureka, Ambika Tripathi, Savita Dabral

    Abstract: Mining Software Repositories (MSR) is an applied and practise-oriented field aimed at solving real problems encountered by practitioners and bringing value to Industry. Replication of results and findings, generalizability and external validity, University-Industry collaboration, data sharing and creation dataset repositories are important issues in MSR research. Research consisting of bibliometri… ▽ More

    Submitted 4 June, 2015; originally announced June 2015.

    ACM Class: D.2

  19. arXiv:1401.0480  [pdf, other

    cs.IR cs.SI

    Chaff from the Wheat : Characterization and Modeling of Deleted Questions on Stack Overflow

    Authors: Denzil Correa, Ashish Sureka

    Abstract: Stack Overflow is the most popular CQA for programmers on the web with 2.05M users, 5.1M questions and 9.4M answers. Stack Overflow has explicit, detailed guidelines on how to post questions and an ebullient moderation community. Despite these precise communications and safeguards, questions posted on Stack Overflow can be extremely off topic or very poor in quality. Such questions can be deleted… ▽ More

    Submitted 2 January, 2014; originally announced January 2014.

    Comments: 11 pages, Pre-print

  20. arXiv:1309.0714  [pdf, other

    cs.CY cs.SE

    A Case-Study on Teaching Undergraduate-Level Software Engineering Course Using Inverted-Classroom, Large-Group, Real-Client and Studio-Based Instruction Model

    Authors: Ashish Sureka, Monika Gupta, Dipto Sarkar, Vidushi Chaudhary

    Abstract: We present a case-study on teaching an undergraduate level course on Software Engineering (second year and fifth semester of bachelors program in Computer Science) at a State University (New Delhi, India) using a novel teaching instruction model. Our approach has four main elements: inverted or flipped classroom, studio-based learning, real-client projects and deployment, large team and peer evalu… ▽ More

    Submitted 2 September, 2013; originally announced September 2013.

  21. arXiv:1307.7291  [pdf, ps, other

    cs.SI cs.IR cs.SE

    Fit or Unfit : Analysis and Prediction of 'Closed Questions' on Stack Overflow

    Authors: Denzil Correa, Ashish Sureka

    Abstract: Stack Overflow is widely regarded as the most popular Community driven Question Answering (CQA) website for programmers. Questions posted on Stack Overflow which are not related to programming topics, are marked as 'closed' by experienced users and community moderators. A question can be 'closed' for five reasons - duplicate, off-topic, subjective, not a real question and too localized. In this wo… ▽ More

    Submitted 27 July, 2013; originally announced July 2013.

    Comments: 13 pages, 14 figures, 10 tables, version 1.0

    ACM Class: H.3.3; H.3.4; H.3.5

  22. arXiv:1301.4916  [pdf, other

    cs.IR cs.SI physics.soc-ph

    Solutions to Detect and Analyze Online Radicalization : A Survey

    Authors: Denzil Correa, Ashish Sureka

    Abstract: Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing concern to the society, governments and law enforcement agencies around the world. Research shows that various platforms on the Internet (low barrier to publish content, allows anonymity, provides exposure to millions of users and a potential of a very qu… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

    ACM Class: A.1

  23. arXiv:1208.4324  [pdf, other

    cs.CY

    Characterizing Pedophile Conversations on the Internet using Online Grooming

    Authors: Aditi Gupta, Ponnurangam Kumaraguru, Ashish Sureka

    Abstract: Cyber-crime targeting children such as online pedophile activity are a major and a growing concern to society. A deep understanding of predatory chat conversations on the Internet has implications in designing effective solutions to automatically identify malicious conversations from regular conversations. We believe that a deeper understanding of the pedophile conversation can result in more soph… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

  24. arXiv:1103.5044  [pdf, ps, other

    cs.IR cs.AI cs.HC

    Mining User Comment Activity for Detecting Forum Spammers in YouTube

    Authors: Ashish Sureka

    Abstract: Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common phenomenon in Web 2.0 applications and there is a strong need to counter or combat comment spamming. We present a method to automatically detect comment spammer in YouTube (largest and a popular video sharing website) foru… ▽ More

    Submitted 25 March, 2011; originally announced March 2011.

    Comments: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, March 28th, 2011

    Report number: WWW2011USEWOD/2011/sur ACM Class: H.3.3