Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hemant Joshi is active.

Publication


Featured researches published by Hemant Joshi.


mining software repositories | 2007

Local and Global Recency Weighting Approach to Bug Prediction

Hemant Joshi; Chuanlei Zhang; Srini Ramaswamy; Coskun Bayrak

Finding and fixing software bugs is a challenging maintenance task, and a significant amount of effort is invested by software development companies on this issue. In this paper, we use the Eclipse projects recorded software bug history to predict occurrence of future bugs. The history contains information on when bugs have been reported and subsequently fixed.


computer, information, and systems sciences, and engineering | 2008

A Dynamic Approach to Software Bug Estimation

Chuanlei Zhang; Hemant Joshi; Srini Ramaswamy; Coskun Bayrak

There is an increase in the number of software projects developed in a globally distributed environment. As a consequence of such dispersion, it becomes much harder for project managers to make resource estimations with limited information. In order to assist in the process of project resource estimations as well as support management planning for such distributed software projects, we present a methodology using software bug history data to model and predict future bug occurrences. The algorithm works in a two-step analysis mode: Local and Global Analysis. Local analysis leverages the past history of bug counts for a specific month. On the other hand, global analysis considers the bug counts over time for each individual component. The bug prediction achieved by the algorithm is close to actual bug counts for individual components of Eclipse software.


Archive | 2007

Automatic Dissemination of Text Information using the EBOTS system

Hemant Joshi; Coskun Bayrak

World Wide Web contains 170 Terabytes of information [1] and storage estimates show that the new information is growing at a rate of over 30% a year. With the quanta of information growing exponentially, it is important to understand the information semantically to know what concepts are relevant and what are irrelevant. The Evolutionary Behavior Of Textual Semantics (EBOTS) system being developed at University of Arkansas at Little Rock [2] aims at the quantitative reasoning aspect of textual information. In the automatic decision-making mode, the EBOTS system can distinguish between relevant and irrelevant information, discarding irrelevant documents and accepting only relevant information to develop expertise in a particular field. This paper discusses the usefulness of Information Theory in the development of relevance criteria and the results obtained in the context of textual information.


systems, man and cybernetics | 2006

Who Stole the Bat? Deception Detection on the Basis of Actions

James D. Jones; Hemant Joshi; Umit Topaloglu; Eric D. Nelson

In work very relevant to national defense and homeland security, this paper describes software that performs symbolic reasoning (in particular., logical inference) to detect deception on the basis of actions. This is in sharp contrast with present approaches that detect deception based on physiological factors, as well as on verbal and non-verbal cues. Our approach attempts to model agents and their actions. This is achieved in a logic programming framework using a theory of agents, a theory of actions, and a theory of reasoning with respect to time. As a test case, a childrens mystery is analyzed and implemented. The software correctly reasons about who the potential suspects are, and ultimately, correctly identifies the chief culprit. Further, it can correctly introspect with regard to previously held beliefs. Our approach is novel in that it attempts to identify deception on the basis of actions, and it does so in a high level, symbolic reasoning framework


intelligence and security informatics | 2006

A child’s story to illustrate automated reasoning systems using opportunity and history

James D. Jones; Hemant Joshi; Umit Topaloglu; Eric D. Nelson

The primary author has performed previous work to create generalized, high-level reasoning software to identify deception on the basis of actions. The work here is to apply that software architecture to an entirely different domain. The original domain was an espionage scenario, and detected deception when communications were in conflict. This present domain is reasoning about a child’s story to determine who is lying about the theft of some objects. Applying the previous work to a different domain is an attempt to demonstrate the generality of the architecture. It is also an attempt to further generalize the software, and to formalize additional “common sense” strategies in the detection of deception. This software detects deception on the basis of actions. This is in sharp contrast with present approaches that detect deception based on physiological factors, as well as on verbal and non-verbal cues. Our approach models agents and their actions in a logic programming framework using a theory of agents, a theory of actions, and a theory of reasoning with respect to time. As a test case, a children’s mystery is analyzed and implemented. The goal of the story is to identify who stole some items. The software correctly reasons about who the potential suspects are, and ultimately, correctly identifies the chief culprit. Further, it can correctly introspect with regard to previously held beliefs. The program we have developed is able to mimic the thought processes and conclusions of a police investigation.


text retrieval conference | 2007

Topic Categorization for Relevancy and Opinion Detection.

GuangXu Zhou; Hemant Joshi; Coskun Bayrak


summer computer simulation conference | 2007

Ontology for disaster mitigation and planning

Hemant Joshi; Remzi Seker; Coskun Bayrak; Srini Ramaswamy; Jeffrey B. Connelly


text retrieval conference | 2006

UALR at TREC: Blog Track.

Hemant Joshi; Coskun Bayrak; Xiaowei Xu


text retrieval conference | 2007

UALR at TREC-ENT 2007

Hemant Joshi; Sithu D. Sudarsan; Subhashish Duttachowdhury; Chuanlei Zhang; Srini Ramaswamy


acm southeast regional conference | 2007

Concept set extraction with user session context

Hemant Joshi; Shinya Ito; Santhosh Kanala; Sangeetha Hebbar; Coskun Bayrak

Collaboration


Dive into the Hemant Joshi's collaboration.

Top Co-Authors

Avatar

Coskun Bayrak

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Chuanlei Zhang

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Eric D. Nelson

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Umit Topaloglu

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Xiaowei Xu

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

GuangXu Zhou

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Halil Bisgin

University of Arkansas at Little Rock

View shared research outputs
Top Co-Authors

Avatar

Nitin Agarwal

University of Arkansas at Little Rock

View shared research outputs
Researchain Logo
Decentralizing Knowledge