Anthony Peruma is a Computing and Information Sciences Ph.D. student at Rochester Institute of Technology (RIT). Anthony also holds a Master’s in Software Engineering from RIT and Bachelor’s in Computer Application from Bangalore University, India.
As a member of the Source Code Analysis and Natural Language Lab, Anthony’s research is around program comprehension. More specifically, Anthony studies identifier names in the source code by investigating how and why identifier names change (or evolve) in the source code. The overall goal of Anthony’s research is to improve developer productivity by constructing a linguistic model to assist developers, in realtime, to identify poor quality identifier names and recommend appropriate replacements.
Additionally, Anthony also possesses hands-on experience in the software development industry, working on software projects for clients in multiple industries. Anthony’s industry experience includes consulting, designing, implementation, project management, and sales.
Ph.D. in Computing and Information Sciences
Rochester Institute of Technology, New York, USA
Advisor: Christian D. Newman, PhD
M.Sc. in Software Engineering
Rochester Institute of Technology, New York, USA
Advisor: Mohamed W. Mkaouer, PhD
Bachelor of Computer Applications
Bangalore University, Bangalore, India
Responsibilities include:
Responsibilities include:
Responsibilities include:
In this project, through a series of studies, we aim to model the relationship between the name of an identifier and the behavior of the source code entity it represents.
This project seeks to extend the existing test smell catalog by adding new types of test smells. Additionally, we make available an open-source tool to detect the different smell types in the source code.
‘MILK’ modules are classroom ready educational components which teach students and developers how to create accessible mobile applications, and demonstrate the importance of creating these apps.
This project focuses on Android’s permission model. More specifically, we examine how developers apply Android permission privileges in their apps.