Vahid AlizadehDePaul University · College of Computing and Digital Media
Vahid Alizadeh
Doctor of Philosophy
Looking for PhD and MSc students
About
28
Publications
4,730
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
339
Citations
Introduction
Vahid Alizadeh is an Assistant Professor at DePaul University College of Computing and Digital Media. Vahid does research in Search-based software engineering, Data Mining, and Artificial Intelligence.
Publications
Publications (28)
Refactoring is nowadays widely adopted in the industry because bad design decisions can be very costly and extremely risky. On the one hand, automated refactoring does not always lead to the desired design. On the other hand, manual refactoring is error-prone, time-consuming and not practical for radical changes. Thus, recent research trends in the...
Due to the growing complexity of software systems, there has been a dramatic increase and industry demand for tools and techniques on software refactoring in the last ten years, defined traditionally as a set of program transformations intended to improve the system design while preserving the behavior. Refactoring studies are expanded beyond code-...
While state of the art of software refactoring research uses various quality attributes to identify refactoring opportunities and evaluate refactoring recommendations, the impact of refactoring on the security of software systems when improving other quality objectives is under-explored. It is critical to understand how a system is resistant to sec...
Metamodels evolve even more frequently than programming languages. This evolution process may result in a large number of instance models that are no longer conforming to the revised metamodel. On the one hand, the manual adaptation of models after the metamodels’ evolution can be tedious, error-prone, and time-consuming. On the other hand, the aut...
Due to the growing complexity of software systems, there has been a dramatic increase in research and industry demand on refactoring. Refactoring research nowadays addresses challenges beyond code transformation to include, but not limited to, scheduling the opportune time to carry refactoring, recommending specific refactoring activities, detectin...
It is vitally important to fix quality issues in security-critical code as they may be sources of vulnerabilities in the future. These quality issues may increase the attack surface if they are not quickly refactored. In this paper, we use the history of vulnerabilities and security bug reports along with a set of keywords to automatically identify...
http://deepblue.lib.umich.edu/bitstream/2027.42/170142/1/ICSE2020_Decision_Objective_Spaces__Copy_.pdf
Due to the conflicting nature of quality measures, there are always multiple refactoring options to fix quality issues. Thus, interaction with developers is critical to inject their preferences. While several interactive techniques have been proposed, developers still need to examine large numbers of possible refactorings, which makes the interacti...
The simultaneous evolution of metamodels and models is called the meta-models/models co-evolution problem. While some Interactive/automated metamodel/model co-evolution techniques have been proposed using multi-objective search, designers still need to explore a large number of possible revised models. In this paper, we propose an approach to conve...
Successful software products evolve through a process of continual change. However, this process may weaken the design of the software and make it unnecessarily complex, leading to significantly reduced productivity and increased fault-proneness. Refactoring improves the software design while preserving overall functionality and behavior, and is an...
https://deepblue.lib.umich.edu/bitstream/2027.42/155872/4/30YRefactoring.pdf
Context
The purpose of software restructuring, or refactoring, is to improve software quality and developer productivity.
Objective
Prior studies have relied mainly on static and dynamic analysis of code to detect and recommend refactoring opportunities, such as code smells. Once identified, these smells are fixed by applying refactorings which th...
https://deepblue.lib.umich.edu/bitstream/2027.42/155331/1/Commit_Messages_Analysis_for_Refactoring__Copy_ (16).pdf
Currently, refactoring and regression testing
are treated independently by existing studies. However,
software developers frequently switch between these two
activities, using regression testing to identify unwanted
behavior changes introduced while refactoring and applying
refactoring on identified buggy code fragments. Our
hypothesis is that the...
Today, maintenance and evolution are critical software development activities that might comprise up to 80% of the overall cost and effort throughout a software’s lifetime [13]. Maintenance costs often can be inflated through poor software design called code smells and defined as design situations that adversely affect the software maintenance [12]...
Motion ability is one of the most important human properties, including gait as a basis of human transitional movement. Gait, as a biometric for recognizing human identities, can be non-intrusively captured signals using wearable or portable smart devices. In this study gait patterns is collected using a wireless platform of two sensors located at...
Driver distraction is a significant cause of accidents leading to injuries and fatalities on the roadway. Driving is a complex task and demands continuous visual and cognitive attention on the primary task of driving. Drivers are at risk of responding more slowly or less suitable to intricate and dynamically changing situations that entail their co...
New Approach to Detection of Driver Facial Artifacts in EEG Signals Using Joint Spectral and Geometric Features
Wearable Inertial Sensor-based Driver Authentication using Gait Analysis
The Impact of Secondary Tasks on Drivers During Naturalistic Driving: Analysis of EEG Dynamics
Currently, refactoring and regression testing
are treated independently by existing studies. However,
software developers frequently switch between these two
activities, using regression testing to identify unwanted
behavior changes introduced while refactoring and applying
refactoring on identified buggy code fragments. Our
hypothesis is that the...
Face recognition using thermal images has received high attention by researchers in recent years. Since skin temperature can be visualized using thermographic cameras, a unique imprint can be achieved for thermal image of a person's face. In this study, we have investigated the effect of using different partitioning strategies of face imprint on th...