Cor‐Paul Bezemer

ORCID: 0000-0002-0474-5718
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software System Performance and Reliability
  • Digital Games and Media
  • Software Testing and Debugging Techniques
  • Cloud Computing and Resource Management
  • Advanced Malware Detection Techniques
  • Artificial Intelligence in Games
  • Scientific Computing and Data Management
  • Software Engineering Techniques and Practices
  • Open Source Software Innovations
  • Mobile and Web Applications
  • Advanced Software Engineering Methodologies
  • Web Data Mining and Analysis
  • Topic Modeling
  • Educational Games and Gamification
  • Anomaly Detection Techniques and Applications
  • Expert finding and Q&A systems
  • Multimedia Communication and Technology
  • Network Security and Intrusion Detection
  • Mobile Crowdsensing and Crowdsourcing
  • Software Reliability and Analysis Research
  • Service-Oriented Architecture and Web Services
  • Security and Verification in Computing
  • Video Analysis and Summarization
  • Mobile Agent-Based Network Management

University of Alberta
2018-2025

Huawei Technologies (Canada)
2024

Queen's University
2016-2018

Software (Spain)
2016

Delft University of Technology
2009-2015

Exact Dynamics (Netherlands)
2009

In software engineering, deep learning models are increasingly deployed for critical tasks such as bug detection and code review. However, overfitting remains a challenge that affects the quality, reliability, trustworthiness of systems utilize models. Overfitting can be (1) prevented (e.g., using dropout or early stopping) (2) detected in trained model correlation-based approaches). Both prevention approaches currently used have constraints requiring modification structure, high computing...

10.1109/access.2024.3402543 article EN cc-by IEEE Access 2024-01-01

Multi-tenancy is a relatively new software architecture principle in the realm of Software as Service (SaaS) business model. It allows to make full use economy scale, multiple customers - "tenants" share same application and database instance. All while, tenants enjoy highly configurable application, making it appear that deployed on dedicated server. The major benefits multi-tenancy are increased utilization hardware resources improved ease maintenance, particular deployment side. These...

10.1145/1862372.1862393 article EN 2010-09-20

Technical question and answer Q&A platforms, such as Stack Overflow, provide a platform for users to ask questions about wide variety of programming topics. These platforms accumulate large amount knowledge, including hundreds thousands lines source code. Developers can benefit from the code that is attached answers on by copying or learning (parts of) it. By understanding how developers utilize we insights researchers which be used improve next-generation help reuse fast easily. In this...

10.1007/s10664-018-9634-5 article EN cc-by-sa Empirical Software Engineering 2018-07-04

Anomaly detection has become an indispensable tool for modern society, applied in a wide range of applications, from detecting fraudulent transactions to malignant brain tumors. Over time, many anomaly techniques have been introduced. However, general, they all suffer the same problem: lack data that represents anomalous behaviour. As behaviour is usually costly (or dangerous) system, it difficult gather enough such This, turn, makes develop and evaluate techniques. Recently, generative...

10.1109/access.2021.3131949 article EN cc-by IEEE Access 2021-01-01

Multi-tenancy is a relatively new software architecture principle in the realm of Software as Service (SaaS) business model. It allows to make full use economy scale, multiple customers - "tenants" share same application and database instance. All while, tenants enjoy highly configurable application, making it appear that deployed on dedicated server. The major benefits multi-tenancy are increased utilization hardware resources improved ease maintenance, resulting lower overall costs,...

10.1109/icsm.2010.5609735 article EN 2010-09-01

DevOps is a modern software engineering paradigm that gaining widespread adoption in industry. The goal of to bring changes into production with high frequency and fast feedback cycles. This conflicts quality assurance activities, particularly respect performance. For instance, performance evaluation activities --- such as load testing require considerable amount time get statistically significant results.

10.1145/3297663.3309672 article EN 2019-04-04

Developers leverage logs for debugging, performance monitoring and load testing. The increased dependence on has lead to the development of numerous logging libraries which help developers in their code. As new emerge current ones evolve, projects often migrate from an older library another one.

10.1145/2901739.2901769 article EN 2016-05-14

Performance regressions, such as a higher CPU utilization than in the previous version of an application, are caused by software application updates that negatively affect performance application. Although plethora mining repository research has been done to detect tools generally not readily available practitioners. Application Management (APM) commonly used practice for detecting issues field operational data.

10.1145/2901739.2901774 article EN 2016-05-14

The usage of open source (OS) software is wide-spread across many industries. While the functional quality OS projects considered to be similar closed-source software, much unknown about in terms performance. One challenge for developers that, unlike testing, there a lack accepted best practices performance testing. To reveal state practice testing projects, we conduct an exploratory study on 111 Java-based from GitHub. We tests these five perspectives: (1) developers, (2) size, (3) test...

10.1145/3030207.3030213 article EN 2017-04-17

The HyperText Markup Language 5 (HTML5) <canvas> is useful for creating visual-centric web applications. However, unlike traditional applications, HTML5 applications render objects onto the bitmap without representing them in Document Object Model (DOM). Mismatches between expected and actual visual output of are termed bugs. Due to nature bugs important detect because such can a application useless. As we showed prior work, Asset-Based graphics provide ground truth test oracle. many...

10.48550/arxiv.2501.09236 preprint EN arXiv (Cornell University) 2025-01-15

10.1109/wacv61041.2025.00144 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

Issue tracking systems (ITSs), such as Bugzilla, are commonly used to track reported bugs, improvements and change requests for a software project. To avoid wasting developer resources on previously-reported (i.e., duplicate) issues, it is necessary identify duplicates soon they reported. Several automated approaches have been proposed retrieving duplicate reports, i.e., identifying the of new issue report in list <inline-formula><tex-math notation="LaTeX">$n$</tex-math></inline-formula>...

10.1109/tse.2017.2755005 article EN IEEE Transactions on Software Engineering 2017-09-21

Microbenchmarking frameworks, such as Java's Microbenchmark Harness (JMH), allow developers to write fine-grained performance test suites at the method or statement level. However, due complexities of Java Virtual Machine, often struggle with writing expressive JMH benchmarks which accurately represent methods statements. In this paper, we empirically study bad practices benchmarks. We present a tool that leverages static analysis identify 5 practices. Our empirical 123 open source...

10.1109/tse.2019.2925345 article EN IEEE Transactions on Software Engineering 2019-06-27

We present a technique for automatically detecting security vulnerabilities in client-side self-contained components, called web widgets, that can co-exist independently on single page. In this paper we focus two scenarios, namely the case which (1) malicious widget changes content (DOM) of another widget, and (2) steals data from sends it to server via an HTTP request. propose dynamic analysis approach executing application analyzing runtime user interface, as well outgoing calls, detect...

10.1145/1595696.1595711 article EN 2009-08-24
Coming Soon ...