M.A. Zuñiga Zamalloa
46 records found
1
Continuous Integration (CI) has become a fundamental practice in modern software development. Organizations increasingly adopt complex pipeline configurations to automate their build, test, and deployment processes. Well-optimized CI/CD pipelines offer significant benefits in dep
...
Property-Based Testing in Practice using Hypothesis
In-depth study on how developers use Property-Based Testing in Python using Hypothesis
Property-based testing (PBT) allows developers to specify high-level properties that should hold for a range of inputs, which are then automatically generated by the testing framework. Despite its theoretical appeal, PBT is not widely used in the real world. To better understand
...
Exploring Property-Based Testing in Java
An Analysis of jqwik Usage in Open-Source Repositories
Property-based testing (PBT) verifies software correctness by checking that specific properties hold across a wide variety of randomly generated inputs. Despite its apparent usefulness, we lack an overview of how PBT is utilized in the Java ecosystem. In this study, we investigat
...
Property Based Testing in Rust, How is it Used?
A case study of the ‘quickcheck‘ crate used in open source repositories
Property-based testing (PBT) is a method of verifying software correctness in which a property, a statement about the behavior of the program which should always hold true, is verified with a large number of arbitrary inputs. While it is a powerful method, properties can be compl
...
Property-Based Testing in Haskell
An Analysis of QuickCheck usage in Open-Source Haskell Projects
Property-Based Testing (PBT) with QuickCheck has become a cornerstone of reliable software development in Haskell, yet there is little systematic understanding of how developers employ it in production quality libraries. In this study, we perform an empirical analysis of QuickChe
...
Continuous Integration (CI) practices have become central to open-source software (OSS) development, yet the relationship between branching strategies, merge habits, and CI performance remains underexplored. Understanding their role is crucial for explaining the variation in CI o
...
Continuous Integration (CI) has become a standard practice for speeding up software development. However, the effect of comparatively slower artifacts, like documentation, on its performance is still unclear. Although documentation is often regarded as important, there is little
...
The growing complexity of modern software systems, driven by larger codebases and evolving technologies, has amplified the need for effective collaboration in developer teams. Specifically, in open-source software (OSS) projects, where contributors often vary in background and en
...
Continuous Integration is a used extensively in modern software engineering for both proprietary and open-source projects. Many studies have studied its benefits and drawbacks, finding how it increases development productivity and stability. However, CI is a set of practices from
...
The proliferation of video recording devices and facial recognition technology has led to significant privacy concerns, as surveillance systems can capture and identify individuals without their consent. Traditional facial obfuscation systems, which introduce pixel-level perturba
...
This research investigates the impact of multipath signals in UWB communications and explores their potential to improve localization accuracy of tags using the additional information captured in the Channel Impulse Response (CIR). While traditional localization typically relies
...
Indoor localisation is a well-researched topic and it is a challenge to improve the accuracy of existing techniques. In recent years, edge computing and federated learning have opened up new possibilities and challenges for indoor localisation. This thesis presents a federated im
...
Exploring the Impact of Single-Character Attacks in Federated Learning Language Classification
Introducing the Novel Single-Character Strike
Federated learning (FL) is a privacy preserving machine learning approach which allows a machine learning model to be trained in a distributed fashion without ever sharing user data. Due to the large amount of valuable text and voice data stored on end-user devices, this approach
...
Federated learning provides a lot of opportunities, especially with the built-in privacy considerations. There is however one attack that might compromise the utility of federated learning: backdoor attacks [14]. There are already some existing defenses, like flame [13] but they
...
Abstract— Federated Learning (FL) makes it possible for a network of clients to jointly train a machine learning model, while also keeping the training data private. There are several approaches when designing a FL network and while most existing research is focused on a single-s
...
This thesis presents Screen Antenna - A Visible Light Communication (VLC) system that integrates data transmission and reception, with the conventional pixel display capability of RGB LEDs. The system is constructed with off-the-shelf components and runs on the Arduino Due microc
...
End-to-end Automatic Speech Recognition (ASR) systems improved drastically in recent years and they work extremely well on many large datasets. However, research shows that these models failed to capture the variability in speech production and have biases against the variant cau
...
Due to recent developments in DNA sequencing technology, there is a growing abundance of available genomic data. To process this information for use in fields such as healthcare and forensics, raw sequencing data have to be processed using computationally intensive algorithms. Cu
...
The considerable increase in the number of devices needing connectivity, such as mobile phones and Internet of Things (IoT) devices, has led to an exponential rise in data volumes during the last years, that will surely continue over the next decade. Therefore, it will be increas
...