2023  |  22  |  21  |  20  |  19  |  18  |  17  |  16  |  15  |  14  |  13  |  12  |  11  |  10  |  09  |  08  |  07  |  06  |  05  |  04  |  03  |  02  |  01  |  00  |  99

Research Projects

Anti-social behavior such as flaming and griefing is pervasive and problematic in many online venues. This behavior breaks established norms and unsettles the well-being and development of online communities. In a popular online game, Riot Games's League of Legends, the game company received tens of thousands of complaints about others every day. To regulate what they call "toxic" behavior, Riot devised the "Tribunal" system as a way of letting the community to police itself. The Tribunal is a crowdsoucing system that empowers players to identify and judge misbehavior.

Project Dates: 
April 2012

Multi-criteria test-suite minimization aims to remove redundant test cases from a test suite based on some criteria such as code coverage, while trying to optimally maintain the capability of the reduced suite based on other criteria such as fault-detection effectiveness. Existing techniques addressing this problem with integer linear programming claim to produce optimal solutions. However, the multi-criteria test-suite minimization problem is inherently nonlinear, due to the fact that test cases are often dependent on each other in terms of test-case criteria.

Research Area(s): 
Project Dates: 
July 2017

TrimDroid is a novel combinatorial approach for generating GUI system tests for Android apps.

TrimDroid is comprised of four major components: Model Extraction, Dependency Extraction, Sequence Generation, and Test-Case Generation. Together, these components produce a significantly smaller number of test cases than exhaustive combinatorial technique, yet achieve a comparable coverage.

Research Area(s): 
Project Dates: 
March 2015

Although a wide variety of approaches identify vulnerabilities in Android apps, none attempt to determine exploitability of those vulnerabilities. Exploitability can aid in reducing false positives of vulnerability analysis, and can help engineers triage bugs. Specifically, one of the main attack vectors of Android apps is their inter-component communication (ICC) interface, where apps may receive messages called Intents.

Research Area(s): 
Project Dates: 
January 2017

Socio-emotional content is vital for building trusting, productive relationships that go beyond task-oriented communication in teams. But for distributed collaborators, it is challenging to communicate emotional status because of working over a distance. We propose to use non-work-related, non-competitive, and playful drawing online to encourage nonverbal expressions of emotions and interactions.

Project Dates: 
January 2015

The fantasy genre has captivated our attention in popular media for decades, providing us with inspiring imagery of valiant fighters and enchanting spell casters.  Guild Wars 2, a massively multiplayer online game (MMO), introduces a range of races and characters not found in the traditional fantasy genre.  When first experiencing a new fantasy world, does knowledge and information gained from previously consumed media influence players’ interpretations of new fantasy environments?

Research Area(s): 
Project Dates: 
January 2013

Research shows that sharing one’s location can help people stay connected, coordinate daily activities, and provide a sense of comfort and safety [1]. Recently, smartphones and location-based services (LBS) have become widely available in developed countries [7], but only a small percentage of smartphone users have ever tried sharing lo­cation with other people [8]. Our work aims to understand real-world factors shaping behaviors and attitudes towards social location-sharing, especially in regards to why people avoid or abandon the technology, or limit their usage.

Research Area(s): 
Project Dates: 
May 2009

Bitcoin is a digital currency and payment platform that has been the source of much media attention. The currency is not backed by a government like most conventional currencies but is part of a democratic and dencentralized movement. Bitcoin transactions are pseudo-anonymous in a similar way to cash money. Why do people use this currency? How do their political values align with their usage of bitcoin? Furthermore, how does the community regulate itself in the absence of a formal hierarchical structure? Lastly, how do anonymous users form communities?

Research Area(s): 
Project Dates: 
October 2013

Pages