skip to main content
review-article

Report on the international symposium on high confidence software (ISHCS 2011/2012)

Published: 12 July 2013 Publication History

Abstract

To provide a forum for researchers in related research areas to address the challenges in high confidence software, exchange ideas, and foster collaborations, the Institute of Software and Key Laboratory of High Confidence Software Technologies (Ministry of Education) at Peking University hosted and sponsored the International Symposium on High Confidence Software in 2011 and 2012. The symposium consisted of a series of invited talks from internationally known researchers on the symposium topic, discussion/panel sessions, and poster sessions to enable substantial interactions among attendees.

References

[1]
H. Mei, G. Huang, T. Xie. Internetware: Software paradigm for Internet computing. IEEE Computer, Special Issue on Computing in Asia, Volume 45, Issue 6, pages 26--31, June 2012.
[2]
H. Mei, X. Liu. Internetware: An emerging software paradigm for Internet computing. Journal of Computer Science and Technology, Volume 26, Issue 4, pages 588--599, 2011.
[3]
H. Mei. Internetware: Challenges and future direction of software paradigm for Internet as a computer. In Proc. COMPSAC, pages 14--16, 2010.
[4]
M. R. Lyu. Software reliability engineering: A roadmap. In Proc. ICSE, Future of Software Engineering, pages 153--170, 2007.
[5]
Z. Zheng, M.R. Lyu. A QoS-aware fault tolerant middleware for dependable service composition. In Proc. DSN, pages 239--248, 2009.
[6]
Z. Zheng, H. Ma, M.R. Lyu, I. King. WSRec: A collaborative filtering based web service recommender system. In Proc. ICWS, pages 437--444, 2009.
[7]
T. Xie. Cooperative testing and analysis: Human-tool, tool-tool, and human-human cooperations to get work done. In Proc. SCAM, keynote paper, pages 1--3, 2012.
[8]
X. Xiao, T. Xie, N. Tillmann, J. de Halleux. Precise identification of problems for structural test generation. In Proc. ICSE, pp. 611--620, 2011.
[9]
N. Tillmann, J. de Halleux, T. Xie, S. Gulwani, J. Bishop. Teaching and learning programming and software engineering via interactive gaming. In Proc. ICSE, Software Engineering Education (SEE), pages 1117--1126, 2013.
[10]
S. Thummalapenta, S. Sinha, N. Singhania, S. Chandra. Automating test automation. In Proc. ICSE, pages 881--891, 2012.
[11]
W. N. Sumner, X. Zhang. Memory indexing: Canonicalizing addresses across executions. In Proc. FSE, pages 217--226, 2010.
[12]
Z. Shao. Certified software. Communications of the ACM, Volume 53, Issue 12, pages 56--66, December 2010.
[13]
Z. Yin, X. Ma, J. Zheng, Y. Zhou, L. N. Bairavasundaram, S. Pasupathy. An empirical study on configuration errors in commercial and open source systems. In Proc. SOSP, pages 159--172, 2011.
[14]
C. Xu, S.C. Cheung, X. Ma, C. Cao, J. Lu. ADAM: Identifying defects in context-aware adaptation. Journal of Systems and Software, Volume 85, Issue 12, pages 2812--2828, December 2012.
[15]
M. Sama, D.S. Rosenblum, Z. Wang, S. Elbaum, Multi-layer faults in the architectures of mobile, context-aware adaptive applications, Journal of Systems and Software, Invited paper for special issue on software architecture and mobility, Volume 83, Issue 6, pages 906--914, June 2010.
[16]
M. Sama, S. Elbaum, F. Raimondi, D.S. Rosenblum. Contextaware adaptive applications: fault patterns and their automated identification. IEEE Transactions on Software Engineering, Invited paper for Special Issue on the Best Papers of FSE 2008, Volume 36, Issue 5, pages 644--661, September/October 2010.
[17]
X. Liu, Y. Yang, Y. Jiang, J. Chen. Preventing temporal violations in scientific workflows: Where and how. IEEE Transactions on Software Engineering, Volume 37, Issue 6, pages 805--825, November/December 2011.
[18]
J. Chen, Y. Yang. Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems. ACM Transactions on Software Engineering and Methodology, Volume 20, Issue 3, Article 9, August 2011.
[19]
J. Chen, Y. Yang. Adaptive selection of necessary and sufficient checkpoints for dynamic verification of temporal constraints in grid workflow systems. ACM Transactions on Autonomous and Adaptive Systems, Volume 2, Issue 2, Article 6, June 2007.
[20]
D. Zhang, Y. Dang, J.-G. Lou, S. Han, H. Zhang, T. Xie. Software analytics as a learning case in practice: Approaches and experiences. In Proc. MALETS, 2011.
[21]
D. Zhang, T. Xie. Software analytics in practice: Mini tutorial. In Proc. ICSE, Software Engineering in Practice, Mini Tutorial, pages 997, 2012.
[22]
Y. Dang, D. Zhang, S. Ge, C. Chu, Y. Qiu, T. Xie. XIAO: Tuning code clones at hands of engineers in practice. In Proc. ACSAC, pages 369--378, 2012.
[23]
S. Han, Y. Dang, S. Ge, D. Zhang, T. Xie. Performance debugging in the large via mining millions of stack traces. In Proc. ICSE, pages 145--155, 2012.
[24]
S. Hidaka, Z. Hu, K. Inaba, H. Kato, K. Nakano, K. Matsuda, Bidirectionalizing graph transformations. In Proc. ICFP, pages 205--216, 2010.
[25]
Y. Yu, Y. Lin, Z. Hu, S. Hidaka, H. Kato, L. Montrieux. Maintaining invariant traceability through bidirectional transformations. In Proc. ICSE, pages 540--550, 2012.
[26]
F. Sun, L. Xu, Z. Su. Static detection of access control vulnerabilities in web applications. In Proc. USENIX Security, 2011.
[27]
X. Wang, L. Zhang, T. Xie, Y. Xiong, H. Mei. Automating presentation changes in dynamic web applications via collaborative hybrid analysis. In Proc. FSE, Article No. 16, 2012.
[28]
D. Yuan, S. Park, Y. Zhou. Characterizing logging practices in open-source software. In Proc. ICSE, pages 102--112, 2012.
[29]
D. Yuan, S. Park, P. Huang, Y. Liu, M. M. Lee, X. Tang, Y. Zhou, S. Savage. Be conservative: Enhancing failure diagnosis with proactive logging. In Proc. OSDI, pages 293--306, 2012.
[30]
D. Yuan, J. Zheng, S. Park, Y. Zhou, S. Savage. Improving software diagnosability via log enhancement. ACM Transactions on Computer Systems, Volume 30, Issue 1, Article 4, February 2012.
[31]
D. Yuan, H. Mai, W. Xiong, L. Tan, Y. Zhou, S. Pasupathy. SherLog: Error diagnosis by connecting clues from run-time logs. In Proc. ASPLOS, pages 143--154, 2010.
[32]
Q. Fu, J.-G. Lou, Q. Lin, R. Ding, D. Zhang, Z. Ye, T. Xie. Performance issue diagnosis for online service systems. In Proc. SRDS, pages 273--278, 2012.
[33]
R. Ding, Q. Fu, J.-G. Lou, Q. Lin, D. Zhang, J. Shen, T. Xie, Healing online service systems via mining historical issue repositories. In Proc. ASE, pages 318--321, 2012.
[34]
Q. Fu, J.-G. Lou, Q. Lin, R. Ding, D. Zhang, T. Xie. Contextual analysis of program logs for understanding system behaviors. In Proc. MSR, pages 397--400, 2013.
[35]
D. Zhang, T. Xie. Pathways to technology transfer and adoption: Achievements and challenges. In Proc. ICSE, Software Engineering in Practice, Mini-Tutorial, pages 951--952, 2013.
[36]
T. Xie, N. Tillmann, P. de Halleux, W. Schulte. Fitness-guided path exploration in dynamic symbolic execution. In Proc. DSN, pages 359--368, 2009.
[37]
T. Xie, D. Marinov, D. Notkin. Rostra: A framework for detecting redundant object-oriented unit tests. In Proc. ASE, pages 196--205, 2004.
[38]
Z. Hu, A. Schurr, P. Stevens, J. Terwilliger. Dagstuhl seminar on bidirectional transformations, SIGMOD Record, Volume 40, Issue 1, pages 35--39, 2011.
[39]
K. Czarnecki, J. N. Foster, Z. Hu, R. Lammel, A. Schurr, J. F. Terwilliger. Bidirectional transformations: A cross-discipline perspective. In Proc. ICMT, pages 260--283, 2009.
[40]
Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, S. Yang. Refactoring Android Java codes for on-demand computation offloading. In Proc. OOPSLA, pages 233--248, 2012.
[41]
H. Liang, X. Feng. Modular verification of linearizability with non-fixed linearization points. In Proc. PLDI, 2013.
[42]
S. Huang, P. Liu, C. Zhang. LEAP: Lightweight deterministic multiprocessor replay for concurrent Java programs. In Proc. FSE, pages 207--216, 2010.
[43]
J. Zhou, X. Xiao, C. Zhang. Stride: Search-based deterministic replay in polynomial time via bounded linkage. In Proc. ICSE, pages 890--900, 2012.
[44]
J. Huang, C. Zhang, J. Dolby. CLAP: Recording local executions to reproduce concurrency failures. In Proc. PLDI, 2013.
[45]
X. Liu, Y. Yang, D. Yuan and J. Chen, Do we need to handle every temporal violation in scientific workflow systems? ACM Transactions on Software Engineering and Methodology. To appear.
[46]
X. Wang, Y. Dang, L. Zhang, D. Zhang, E. Lan, H. Mei. Can I clone this piece of code here? In Proc. ASE, pages 170--179, 2012.
[47]
Y. Xiong, A. Hubaux, S. She, K. Czarnecki. Generating range fixes for software configuration. In Proc. ICSE, pages 89--99, 2012.
[48]
A. Hubaux, Y. Xiong, K. Czarnecki. A user survey of configuration challenges in Linux and eCos. In Proc. VaMoS, pages 149--155, 2012.

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 38, Issue 4
July 2013
185 pages
ISSN:0163-5948
DOI:10.1145/2492248
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 July 2013
Published in SIGSOFT Volume 38, Issue 4

Check for updates

Author Tag

  1. high confidence software

Qualifiers

  • Review-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 132
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)3
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media