skip to main content
10.1145/3457913acmotherconferencesBook PagePublication PagesinternetwareConference Proceedingsconference-collections
Internetware '20: Proceedings of the 12th Asia-Pacific Symposium on Internetware
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Internetware'20: 12th Asia-Pacific Symposium on Internetware Singapore Singapore November 1 - 3, 2020
ISBN:
978-1-4503-8819-1
Published:
21 July 2021
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 20 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Software Design and Development
research-article
An Empirical Study of Multi-discussing Pattern in Open-Source Software Development

GitHub enables developers to expediently contribute their comments on multiple issues and switch their discussion between issues, i.e., multi-discussing. Discussing multiple issues simultaneously is able to enhance work efficiency. However, multi-...

research-article
An Empirical Study of Architectural Changes in Code Commits

The maintenance of software architecture is challenged by fast-delivery code changes since developers are rarely aware of the architectural impacts of their code changes. To ease the burdens of architects, in this work, we proposed a light-weight ...

research-article
A Feature Table approach to decomposing monolithic applications into microservices

Microservice architecture refers to the use of numerous small-scale and independently deployed services, instead of encapsulating all functions into one monolith. It has been a challenge in software engineering to decompose a monolithic system into ...

SESSION: Software Testing
research-article
Enhancing FSCS-ART through Test Input Quantization and Inverted Lists

Fixed-size-candidate-set adaptive random testing (FSCS-ART) is an ART technique well-known for its best failure-detection effectiveness and usages in testing many real-life applications. However, it faces substantial computational overhead in terms of ...

research-article
Open Access
Testing for Dynamic Software Update: An Object-State-Oriented Approach

Dynamic software update (DSU) can patch programs without stopping them. The updating process includes replacing changed code, transforming stale objects with object transformers, and resuming the execution of the updated program. However, flawed object ...

research-article
GUI testing for mobile applications: objectives, approaches and challenges

Graphical User Interface (GUI) is unavoidable in modern software apps. It facilitates the interactions between the users and the apps. As shown on the Google play store, some apps with higher downloads often have higher-quality, well-designed and ...

research-article
Automatically Detecting Exception Handling Defects in Android Applications

Developers often neglect to handle exceptions, which leads to exception handling defects that affect the robustness of applications or even cause crashes. To improve the robustness of android applications while reducing the development burden of ...

SESSION: Blockchain
research-article
Blockchain-based Bidirectional Transformations for Access Control and Data Sharing in EMRs

Electronic medical records (EMRs) are scattered in different hospitals, which hinders the process of data sharing. On the other hand, people with different roles should access different parts of data, thus we need a way to control the accessibility. To ...

research-article
Group Activity Matching with Blockchain Backed Credible Commitment

Humans are social creatures which enjoy participating in group activities. Existing platforms such as event-based social networks and social-matching applications empower people to organize and participate in different kinds of interest-based ...

research-article
Power Trading Model for Distributed Power Generation Systems Based on Consortium Blockchains

Distributed power generation systems based on clean energy experience a large development worldwide. However, existing centralized power trading models cannot support direct transactions between distributed power generation systems and power consumers. ...

SESSION: Fuzzing and Security
research-article
EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection

EOSIO is one typical public blockchain platform. It is scalable in terms of transaction speeds and has a growing ecosystem supporting smart contracts and decentralized applications. However, the vulnerabilities within the EOSIO smart contracts have led ...

short-paper
Firmware Fuzzing: The State of the Art

Background: Firmware is the enable software of Internet of Things (IoT) devices, and its software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to the limited resources of IoT devices, it is impractical to deploy ...

SESSION: Software Mining
research-article
Adaptive Code Completion with Meta-learning

Since human-written programs have useful local regularities, the ability to adapt to unseen, local context is an important challenge that successful models of source code must overcome. However, the current source code models mostly learn a common code ...

research-article
What Makes Open Source Software Projects Impactful: A Data-Driven Approach

With the wide adoption and acceptance of open source version control and hosting systems, more and more companies, including Google, Microsoft, Apple and Facebook, are putting their projects on such platforms, e.g., GitHub. It is very important for ...

SESSION: System
research-article
Open Access
Hermes: Efficient Cache Management for Container-based Serverless Computing

Serverless computing systems are shifting towards shorter function durations and larger degrees of parallelism to eliminate intolerable latency. For container-based serverless computing, the state-of-the-art efforts fail to ensure low latency because ...

research-article
Simulated or Physical? An Empirical Study on Input Validation for Context-aware Systems in Different Environments

Context-Aware Systems (a.k.a. CASs) integrate cyber and physical space to provide context-aware adaptive functionalities. Building context-aware systems is challenging due to the uncertainty of the real physical environment. Therefore, input validation ...

research-article
Best Answerers Prediction With Topic Based GAT In Q&A Sites

Q&A communities are playing an important role in online knowledge sharing, where a large number of users with various knowledge background make tremendous contributions to solving many technical problems based on crowd intelligence. However, as new ...

research-article
Lightweight Map-Enhanced 3D Object Detection and Tracking for Autonomous Driving

3D object detection and tracking are crucial to the real-time and accurate perception of the surrounding environment for autonomous driving. Recent approaches on 3D object detection and tracking have made great progress, thanks to the rapid development ...

SESSION: Machine Learning
research-article
SEDL: A Symmetric Encryption Method Based on Deep Learning

Recent years have seen an increasing emphasis on information security, and various encryption methods have been proposed. However, for symmetric encryption methods, the well-known encryption techniques still rely on the key space to guarantee security ...

research-article
Training Deep Code Comment Generation Models via Data Augmentation

With the development of deep neural networks (DNNs) and the publicly available source code repositories, deep code comment generation models have demonstrated reasonable performance on test datasets. However, it has been confirmed in computer vision (...

research-article
Dynamic Time Window based Reward for Reinforcement Learning in Continuous Integration Testing

Continuous Integration (CI) testing is an expensive, time-consuming, and resource-intensive process. Test case prioritization (TCP) can effectively reduce the workload of regression testing in the CI environment, where Reinforcement Learning (RL) is ...

SESSION: Infrastructures
research-article
Exploring the Dependency Network of Docker Containers: Structure, Diversity, and Relationship

Container technologies are being widely used in large scale production cloud environments, of which Docker has become the de-facto industry standard. As a key step, containers need to define their dependent base image, which makes complex dependencies ...

research-article
Checking Causal Consistency of MongoDB

MongoDB is one of the first commercial distributed databases that support causal consistency. Its implementation of causal consistency combines several research ideas for achieving scalability, fault tolerance, and security. Given its inherent ...

research-article
Scheduling Distributed Deep Learning Jobs in Heterogeneous Cluster with Placement Awareness

Deep Neural Network models are integrated as parts of many real-world software applications. Due to the huge model size and complex computation, distributed deep learning (DDL) framework aims to provide a high-quality cluster scheduler to manage DDL ...

SESSION: Programming and Analysis
research-article
SAT and LP Collaborative Bounded Timing Analysis of Scenario-Based Specifications

Timing analysis of scenario-based specifications (SBS) such as message sequence charts and UML interaction models plays an essential role in the design phase of real-time system development. However, it is time-consuming and labor-intensive to conduct ...

research-article
Accelerating Accuracy Improvement for Floating Point Programs via Memory Based Pruning

Floating point programs are widely used in science and engineering. These programs approximate real arithmetic with floating point arithmetic, which introduces rounding errors and leads to inaccurate results. In life-critical software systems, ...

research-article
Overwhelming Uncertainty in Self-adaptation: An Empirical Study on PLA and CobRA

Self-adaptation is a promising approach to enable software systems to address the challenge of uncertainty. Different from traditional reactive adaptation mechanisms that focus on the system’s current environment state only, proactive adaptation ...

short-paper
ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code

Duplicate code is an example of bad smells, which are usually been refactored after the detection to improve the quality of programs. Locate the duplicate code at the programming phase may reduce the cost of maintenance, but the challenge is it need to ...

Recommendations

Acceptance Rates

Overall Acceptance Rate 55 of 111 submissions, 50%
YearSubmittedAcceptedRate
Internetware '19352057%
Internetware '18262077%
Internetware '13501530%
Overall1115550%