scispace - formally typeset
Search or ask a question
Author

Cheng-Zen Yang

Other affiliations: National Taiwan University
Bio: Cheng-Zen Yang is an academic researcher from Yuan Ze University. The author has contributed to research in topics: Software bug & Android (operating system). The author has an hindex of 12, co-authored 63 publications receiving 559 citations. Previous affiliations of Cheng-Zen Yang include National Taiwan University.


Papers
More filters
Journal ArticleDOI
01 May 2015
TL;DR: This survey introduces necessary background and fundamentals to understand current efforts in IoT, WoT and SWoT by reviewing key enabling technologies and addresses associated challenges and highlight potential research to be perused in future.
Abstract: Currently, a large number of smart objects and different types of devices are interconnected and communicate via Internet Protocol that creates a worldwide ubiquitous and pervasive network called the Internet of Things (IoT). With an increase in the deployment of smart objects, IoT is expected to have a significant impact on human life in the near future. A majorbreakthrough in bridging the gap between virtual and physical worlds came from the vision of the Web of Things (WoT), which employs open Web standards in achieving information sharing and objects interoperability. Social Web of Things (SWoT) further extends WoT to integrate smart objects with social networks and is observed to not only bridge between physical and virtual worlds but also facilitate continued interaction between physical devices and human. This makes SWoT the most promising approach and has now become an active research area.This survey introduces necessary background and fundamentals to understand current efforts in IoT, WoT and SWoT by reviewing key enabling technologies. These efforts are investigated in detail from several different perspectives such as architecture design, middleware, platform, systems implementation, and application in hand. Moreover, a large number of platforms and applications are analyzed and evaluated from various alternatives have become popular during the past decade. Finally, we address associated challenges and highlight potential research to be perused in future.

243 citations

Proceedings ArticleDOI
04 Dec 2012
TL;DR: Whether feature selection can benefit the severity prediction task with three commonly used feature selection schemes, Information Gain, Chi-Square, and Correlation Coefficient, based on the Multinomial Naive Bayes classification approach is discussed.
Abstract: In software maintenance, severity prediction on defect reports is an emerging issue obtaining research attention due to the considerable triaging cost. In the past research work, several text mining approaches have been proposed to predict the severity using advanced learning models. Although these approaches demonstrate the effectiveness of predicting the severity, they do not discuss the problem of how to find the indicators in good quality. In this paper, we discuss whether feature selection can benefit the severity prediction task with three commonly used feature selection schemes, Information Gain, Chi-Square, and Correlation Coefficient, based on the Multinomial Naive Bayes classification approach. We have conducted empirical experiments with four open-source components from Eclipse and Mozilla. The experimental results show that these three feature selection schemes can further improve the predication performance in over half the cases.

51 citations

Journal ArticleDOI
TL;DR: Simulation results show that the proposed P2P application-aware architecture at the OLT and optical network unit (ONU) can improve the overall QoS in terms of mean packet delay, system throughputs, and jitter, and it can also alleviate inter-ISP traffic bandwidth.
Abstract: Managing a single state-of-the-art ethernet passive optical network optical line terminal (EPON OLT) that can support many customers with different multimedia services and quality of service (QoS) is a challenge. Peer-to-peer (P2P) live streaming is one of the most popular multimedia applications in access networks, especially in the Asia-Pacific region, which requires higher QoS, but such streaming is difficult to manage. Therefore, a new approach is required that can provide flexible control to Internet service providers (ISPs) over their networks. In this paper, we propose a P2P application-aware architecture at the OLT and optical network unit (ONU) that aims to improve overall QoS and, at the same time, preserve user-perceived quality and provide ISPs with flexible control over P2P live-streaming traffic. Finally, a new application-aware dynamic bandwidth allocation (ADBA) is presented. Simulation results show that the proposed architecture can improve the overall QoS in terms of mean packet delay, system throughputs, and jitter, and it can also alleviate inter-ISP traffic bandwidth.

33 citations

Journal ArticleDOI
TL;DR: An enhanced approach SVM-SBCTC is proposed for detecting duplicate bug reports by considering the manifold textual and semantic correlation features based on a previous S VM-based discriminative scheme (SVM-54).

33 citations

Proceedings ArticleDOI
16 Nov 2012
TL;DR: A novel detection scheme based on a BM25 term weighting scheme is proposed and empirical results show that the BM25-based scheme can effectively improve the detection performance in nearly all cases.
Abstract: Handling bug reports is an important issue in software maintenance Recently, detection on duplicate bug reports has received much attention There are two main reasons First, duplicate bug reports may waste human resource to process these redundant reports Second, duplicate bug reports may provide abundant information for further software maintenance In the past studies, many schemes have been proposed using the information retrieval and natural language processing techniques In this thesis, we propose a novel detection scheme based on a BM25 term weighting scheme We have conducted empirical experiments on three open source projects, Apache, ArgoUML, and SVN The experimental results show that the BM25-based scheme can effectively improve the detection performance in nearly all cases

24 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.
Abstract: The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

1,025 citations

Journal ArticleDOI
TL;DR: A comprehensive overview of a broad spectrum of fault localization techniques, each of which aims to streamline the fault localization process and make it more effective by attacking the problem in a unique way is provided.
Abstract: Software fault localization, the act of identifying the locations of faults in a program, is widely recognized to be one of the most tedious, time consuming, and expensive – yet equally critical – activities in program debugging. Due to the increasing scale and complexity of software today, manually locating faults when failures occur is rapidly becoming infeasible, and consequently, there is a strong demand for techniques that can guide software developers to the locations of faults in a program with minimal human intervention. This demand in turn has fueled the proposal and development of a broad spectrum of fault localization techniques, each of which aims to streamline the fault localization process and make it more effective by attacking the problem in a unique way. In this article, we catalog and provide a comprehensive overview of such techniques and discuss key issues and concerns that are pertinent to software fault localization as a whole.

822 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented.
Abstract: The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.

518 citations

01 Jan 2008

443 citations

Journal ArticleDOI
TL;DR: This work provides a review of the current status of virtualization and cloud-based services for manufacturing systems and of the use of Big Data analytics for planning and control of manufacturing operations and proposes a framework for the development of predictive manufacturing cyber-physical systems that include capabilities for attaching to the Internet of Things, and capabilities for complex event processing and Big Data algorithmic analytics.

380 citations