Search Results - "Hou, Daqing"
-
1
Channel Reduction for an EEG-Based Authentication System While Performing Motor Movements
Published in Sensors (Basel, Switzerland) (25-11-2022)“…Commercial use of biometric authentication is becoming increasingly popular, which has sparked the development of EEG-based authentication. To stimulate the…”
Get full text
Journal Article -
2
Extracting problematic API features from forum discussions
Published in 2013 21st International Conference on Program Comprehension (ICPC) (01-05-2013)“…Software engineering activities often produce large amounts of unstructured data. Useful information can be extracted from such data to facilitate software…”
Get full text
Conference Proceeding -
3
Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers' Newsgroup Discussions
Published in 2011 IEEE 19th International Conference on Program Comprehension (01-06-2011)“…Large software frameworks and APIs can be hard to learn and use, impeding software productivity. But what are the specific challenges that programmers actually…”
Get full text
Conference Proceeding -
4
Physics-driven proper orthogonal decomposition: A simulation methodology for partial differential equations
Published in MethodsX (01-01-2023)“…A simulation methodology derived from a learning algorithm based on Proper Orthogonal Decomposition (POD) is presented to solve partial differential equations…”
Get full text
Journal Article -
5
Exploring the Intent behind API Evolution: A Case Study
Published in 2011 18th Working Conference on Reverse Engineering (01-10-2011)“…Reuse has significantly improved software productivity and quality. An application interacts with a reused system through its Application Programming…”
Get full text
Conference Proceeding -
6
Datasets for occupancy profiles in apartment-style student housing for occupant behavior studies and application in building energy simulation
Published in Data in brief (01-08-2021)“…Building energy simulation (BES) tools fail to capture diversity among occupants’ consumption behaviors by using simple and generic occupancy and load…”
Get full text
Journal Article -
7
Evaluation of Sustained and Momentary Interruption Impacts in Reliability-Based Distribution System Design
Published in IEEE transactions on power delivery (01-10-2010)“…The reliability and power-quality (PQ) expectations of the power distribution system are steadily increasing. Performance-based rates and/or incentives are…”
Get full text
Journal Article -
8
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Published in 29th International Conference on Software Engineering (ICSE'07 Companion) (20-05-2007)“…Software developers spend a large fraction of their time dealing with intent, seeking to answer questions like Does this code really do what it is expected to…”
Get full text
Conference Proceeding -
9
Satisfying Programmers' Information Needs in API-Based Programming
Published in 2011 IEEE 19th International Conference on Program Comprehension (01-06-2011)“…Programmers encounter many difficulties in using an API to solve a programming task. To cope with these difficulties, they browse the Internet for code…”
Get full text
Conference Proceeding -
10
Shared dataset on natural human-computer interaction to support continuous authentication research
Published in 2017 IEEE International Joint Conference on Biometrics (IJCB) (01-10-2017)“…Conventional one-stop authentication of a computer terminal takes place at a user's initial sign-on. In contrast, continuous authentication protects against…”
Get full text
Conference Proceeding -
11
An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java
Published in 2010 17th Working Conference on Reverse Engineering (01-10-2010)“…The standard collection data structures in Object-Oriented languages require their element classes provide a predicate to compare two objects for equality…”
Get full text
Conference Proceeding -
12
Shared research dataset to support development of keystroke authentication
Published in IEEE International Joint Conference on Biometrics (01-09-2014)“…Keystroke authentication can help significantly improve computer security by hardening passwords or offering active, continuous authentication. Over the years,…”
Get full text
Conference Proceeding -
13
CSCC: Simple, Efficient, Context Sensitive Code Completion
Published in 2014 IEEE International Conference on Software Maintenance and Evolution (01-09-2014)“…Code Completion helps developers learn APIs and frees them from remembering every detail. In this paper, we describe a novel technique called CSCC (Context…”
Get full text
Conference Proceeding -
14
A practical evaluation of free-text keystroke dynamics
Published in 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) (01-02-2017)“…Free text keystroke dynamics is a behavioral biometric that has the strong potential to offer unobtrusive and continuous user authentication. Unfortunately,…”
Get full text
Conference Proceeding -
15
Fast Continuous User Authentication Using Distance Metric Fusion of Free-Text Keystroke Data
Published in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (01-06-2019)“…Keystroke dynamics are a powerful behavioral biometric capable of determining user identity and for continuous authentication. It is an unobtrusive method that…”
Get full text
Conference Proceeding -
16
Documenting and Evaluating Scattered Concerns for Framework Usability: A Case Study
Published in 2008 15th Asia-Pacific Software Engineering Conference (01-01-2008)“…Scattered concerns, design features whose implementations span multiple program units, can pose extra difficulty for developers to locate, understand, modify,…”
Get full text
Conference Proceeding -
17
Stationary mobile behavioral biometrics: A survey
Published in Computers & security (01-05-2023)“…•Surveys the studies in stationary (sitting, standing) mobile behavioral biometrics.•Categorizes user behaviors across studies into natural and…”
Get full text
Journal Article -
18
Evaluating multi-modal mobile behavioral biometrics using public datasets
Published in Computers & security (01-10-2022)“…highlights•Testing authentication performance of fusing three modalities with two public datasets.•Comparing performance of three different feature sets on…”
Get full text
Journal Article -
19
Fast Free-Text Authentication via Instance-Based Keystroke Dynamics
Published in IEEE transactions on biometrics, behavior, and identity science (01-10-2020)“…Keystroke dynamics study the way in which users input text via their keyboards. Having the ability to differentiate users, typing behaviors can unobtrusively…”
Get full text
Journal Article -
20
LDA Analyzer: A Tool for Exploring Topic Models
Published in 2014 IEEE International Conference on Software Maintenance and Evolution (01-09-2014)“…Online technical forums are valuable sources for mining useful software engineering information. LDA (Latent Dirichlet Allocation) is an unsupervised machine…”
Get full text
Conference Proceeding