No abstract available.
Proceeding Downloads
An Empirical Study of Multi-discussing Pattern in Open-Source Software Development
GitHub enables developers to expediently contribute their comments on multiple issues and switch their discussion between issues, i.e., multi-discussing. Discussing multiple issues simultaneously is able to enhance work efficiency. However, multi-...
An Empirical Study of Architectural Changes in Code Commits
The maintenance of software architecture is challenged by fast-delivery code changes since developers are rarely aware of the architectural impacts of their code changes. To ease the burdens of architects, in this work, we proposed a light-weight ...
A Feature Table approach to decomposing monolithic applications into microservices
Microservice architecture refers to the use of numerous small-scale and independently deployed services, instead of encapsulating all functions into one monolith. It has been a challenge in software engineering to decompose a monolithic system into ...
Enhancing FSCS-ART through Test Input Quantization and Inverted Lists
Fixed-size-candidate-set adaptive random testing (FSCS-ART) is an ART technique well-known for its best failure-detection effectiveness and usages in testing many real-life applications. However, it faces substantial computational overhead in terms of ...
Testing for Dynamic Software Update: An Object-State-Oriented Approach
Dynamic software update (DSU) can patch programs without stopping them. The updating process includes replacing changed code, transforming stale objects with object transformers, and resuming the execution of the updated program. However, flawed object ...
GUI testing for mobile applications: objectives, approaches and challenges
Graphical User Interface (GUI) is unavoidable in modern software apps. It facilitates the interactions between the users and the apps. As shown on the Google play store, some apps with higher downloads often have higher-quality, well-designed and ...
Automatically Detecting Exception Handling Defects in Android Applications
Developers often neglect to handle exceptions, which leads to exception handling defects that affect the robustness of applications or even cause crashes. To improve the robustness of android applications while reducing the development burden of ...
Blockchain-based Bidirectional Transformations for Access Control and Data Sharing in EMRs
Electronic medical records (EMRs) are scattered in different hospitals, which hinders the process of data sharing. On the other hand, people with different roles should access different parts of data, thus we need a way to control the accessibility. To ...
Group Activity Matching with Blockchain Backed Credible Commitment
Humans are social creatures which enjoy participating in group activities. Existing platforms such as event-based social networks and social-matching applications empower people to organize and participate in different kinds of interest-based ...
Power Trading Model for Distributed Power Generation Systems Based on Consortium Blockchains
Distributed power generation systems based on clean energy experience a large development worldwide. However, existing centralized power trading models cannot support direct transactions between distributed power generation systems and power consumers. ...
EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection
EOSIO is one typical public blockchain platform. It is scalable in terms of transaction speeds and has a growing ecosystem supporting smart contracts and decentralized applications. However, the vulnerabilities within the EOSIO smart contracts have led ...
Firmware Fuzzing: The State of the Art
Background: Firmware is the enable software of Internet of Things (IoT) devices, and its software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to the limited resources of IoT devices, it is impractical to deploy ...
Adaptive Code Completion with Meta-learning
Since human-written programs have useful local regularities, the ability to adapt to unseen, local context is an important challenge that successful models of source code must overcome. However, the current source code models mostly learn a common code ...
What Makes Open Source Software Projects Impactful: A Data-Driven Approach
With the wide adoption and acceptance of open source version control and hosting systems, more and more companies, including Google, Microsoft, Apple and Facebook, are putting their projects on such platforms, e.g., GitHub. It is very important for ...
Hermes: Efficient Cache Management for Container-based Serverless Computing
Serverless computing systems are shifting towards shorter function durations and larger degrees of parallelism to eliminate intolerable latency. For container-based serverless computing, the state-of-the-art efforts fail to ensure low latency because ...
Simulated or Physical? An Empirical Study on Input Validation for Context-aware Systems in Different Environments
Context-Aware Systems (a.k.a. CASs) integrate cyber and physical space to provide context-aware adaptive functionalities. Building context-aware systems is challenging due to the uncertainty of the real physical environment. Therefore, input validation ...
Best Answerers Prediction With Topic Based GAT In Q&A Sites
Q&A communities are playing an important role in online knowledge sharing, where a large number of users with various knowledge background make tremendous contributions to solving many technical problems based on crowd intelligence. However, as new ...
Lightweight Map-Enhanced 3D Object Detection and Tracking for Autonomous Driving
3D object detection and tracking are crucial to the real-time and accurate perception of the surrounding environment for autonomous driving. Recent approaches on 3D object detection and tracking have made great progress, thanks to the rapid development ...
SEDL: A Symmetric Encryption Method Based on Deep Learning
Recent years have seen an increasing emphasis on information security, and various encryption methods have been proposed. However, for symmetric encryption methods, the well-known encryption techniques still rely on the key space to guarantee security ...
Training Deep Code Comment Generation Models via Data Augmentation
With the development of deep neural networks (DNNs) and the publicly available source code repositories, deep code comment generation models have demonstrated reasonable performance on test datasets. However, it has been confirmed in computer vision (...
Dynamic Time Window based Reward for Reinforcement Learning in Continuous Integration Testing
Continuous Integration (CI) testing is an expensive, time-consuming, and resource-intensive process. Test case prioritization (TCP) can effectively reduce the workload of regression testing in the CI environment, where Reinforcement Learning (RL) is ...
Exploring the Dependency Network of Docker Containers: Structure, Diversity, and Relationship
Container technologies are being widely used in large scale production cloud environments, of which Docker has become the de-facto industry standard. As a key step, containers need to define their dependent base image, which makes complex dependencies ...
Checking Causal Consistency of MongoDB
MongoDB is one of the first commercial distributed databases that support causal consistency. Its implementation of causal consistency combines several research ideas for achieving scalability, fault tolerance, and security. Given its inherent ...
Scheduling Distributed Deep Learning Jobs in Heterogeneous Cluster with Placement Awareness
Deep Neural Network models are integrated as parts of many real-world software applications. Due to the huge model size and complex computation, distributed deep learning (DDL) framework aims to provide a high-quality cluster scheduler to manage DDL ...
SAT and LP Collaborative Bounded Timing Analysis of Scenario-Based Specifications
Timing analysis of scenario-based specifications (SBS) such as message sequence charts and UML interaction models plays an essential role in the design phase of real-time system development. However, it is time-consuming and labor-intensive to conduct ...
Accelerating Accuracy Improvement for Floating Point Programs via Memory Based Pruning
Floating point programs are widely used in science and engineering. These programs approximate real arithmetic with floating point arithmetic, which introduces rounding errors and leads to inaccurate results. In life-critical software systems, ...
Overwhelming Uncertainty in Self-adaptation: An Empirical Study on PLA and CobRA
Self-adaptation is a promising approach to enable software systems to address the challenge of uncertainty. Different from traditional reactive adaptation mechanisms that focus on the system’s current environment state only, proactive adaptation ...
ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code
Duplicate code is an example of bad smells, which are usually been refactored after the detection to improve the quality of programs. Locate the duplicate code at the programming phase may reduce the cost of maintenance, but the challenge is it need to ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Internetware '19 | 35 | 20 | 57% |
Internetware '18 | 26 | 20 | 77% |
Internetware '13 | 50 | 15 | 30% |
Overall | 111 | 55 | 50% |