skip to main content
10.1145/3609437acmotherconferencesBook PagePublication PagesinternetwareConference Proceedingsconference-collections
Internetware '23: Proceedings of the 14th Asia-Pacific Symposium on Internetware
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Internetware 2023: 14th Asia-Pacific Symposium on Internetware Hangzhou China August 4 - 6, 2023
ISBN:
979-8-4007-0894-7
Published:
05 October 2023
Next Conference
Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session: Code Intelligence
research-article
Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models

Neural code intelligence models are cutting-edge automated code understanding technologies that have achieved remarkable performance in various software engineering tasks. However, the lack of deep learning models’ interpretability hinders the ...

research-article
Hybrid API Migration: A Marriage of Small API Mapping Models and Large Language Models

API migration is an essential step for code migration between libraries or programming languages, and it is a challenging task as it requires detailed comprehension of both source and target APIs. The existing work either recommends mapped API names ...

research-article
Towards Better Multilingual Code Search through Cross-Lingual Contrastive Learning

Recent advances in deep learning have significantly improved the understanding of source code by leveraging large amounts of open-source software data. Thanks to the larger amount of data, code representation models trained with multilingual datasets ...

research-article
PyBartRec: Python API Recommendation with Semantic Information

API recommendation has been widely used to enhance developers’ efficiency in software development. However, existing API recommendation methods for dynamic languages such as Python usually suffer from the limitations of incorrect type inference and lack ...

SESSION: Session: Debugging & Bug Management
research-article
SupConFL: Fault Localization with Supervised Contrastive Learning

Recent years have seen a growing interest in deep learning-based approaches to localize faults in software. However, existing methods have not reached a satisfying level of accuracy. The main reason is that the feature extraction of faulty code ...

research-article
Effective Recommendation of Cross-Project Correlated Issues based on Issue Metrics

The calling relationship between projects becomes complicated as the number of open-source projects increases. Different issues across projects can also be related, referred to as cross-project correlated issues (CPCIs), and bring new challenges for ...

research-article
The Impact of the bug number on Effort-Aware Defect Prediction: An Empirical Study

Previous research have utilized public software defect datasets such as NASA, RELINK, and SOFTLAB, which only contain class label information. Almost all Effort-Aware Defect Prediction (EADP) studies are carried out around these datasets. However, EADP ...

research-article
Can Neural Networks Help Smart Contract Testing? An Empirical Study

Smart contracts are one of the most successful applications of blockchain technology. In order to guarantee the security of smart contracts, researchers have successively introduced various testing methodologies, including static analysis, symbolic ...

SESSION: Session: Software Ecosystem
research-article
Towards Better Dependency Scope Settings in Maven Projects

The emergence of build automation tools with dependency management features has significantly impacted software development. However, in the configuration process, improper settings of some configuration items, such as the dependency scope setting, may ...

research-article
An Empirical Study of the Apache Voting Process on Open Source Community Governance

Open-source software (OSS) projects have become a cornerstone of the software ecosystem, offering numerous benefits to developers and end-users alike. However, ensuring the long-term sustainability and success of OSS projects is challenging, requiring ...

research-article
A Deep Dive into the Featured iOS Apps

Millions of apps in markets have made it difficult for mobile users to find fancy and high quality apps. Mobile app markets have deployed mechanisms to recommend apps to users. Apple usually features apps in the iOS App Store, and mobile users could ...

research-article
A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach

The widespread adoption of deep learning (DL) has made it critical to ensure its reliability. Mutation testing has been employed in DL testing to assess test data quality, but it can be costly of a large number of generated mutants. Cost reduction can ...

SESSION: Session: Ubiquitous Operating System
research-article
UbiCap: A Capability-based Run-time Model for Heterogeneous Sensors Management in Ubiquitous Operating System

The Ubiquitous Operating System(UOS) is a new type of operating system in response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing. Compared with traditional operating systems, one of the fundamental ...

research-article
Fine-Grained Flow Control Agent on Path MTU for IoT Software

Internet of Things (IoT) software is used to control the distributed hardware of the underlying network and provide a reliable operating platform for various services. In production system, diversity IoT software provides multiple services, flows of ...

SESSION: Session: Vulnerability Detection & Management
research-article
Prompt Learning for Developing Software Exploits

A software exploit is a sequence of commands that exploits software vulnerabilities or security flaws, written either by security researchers as a Proof-Of-Concept (POC) threat or by malicious attackers for use in their operations. Writing exploits is ...

research-article
FAEG: Feature-Driven Automatic Exploit Generation

Buffer overflow vulnerabilities are prevalent in software applications, and their automatic detection and exploitation are of great significance. Modern operating systems implement security mitigation to prevent the exploitation of these ...

research-article
Comparing the Performance of Different Code Representations for Learning-based Vulnerability Detection

Software vulnerabilities can cause severe security threats to cyberspace, and it is of significant importance to conduct automated vulnerability detection research. Considering that the source code contains rich syntax and semantic information, plenty ...

research-article
VulD-Transformer: Source Code Vulnerability Detection via Transformer

The detection of software vulnerability is an important and challenging problem. Existing studies have shown that deep learning-based approaches can significantly improve the performance of vulnerability detection due to their powerful capabilities of ...

SESSION: Session: Testing
research-article
Prioritizing Testing Instances to Enhance the Robustness of Object Detection Systems

Object detection models have been widely deployed in military and life-related intelligent software systems. However, along with the outstanding success of object detection, it may exhibit abnormal behavior and lead to severe accidents and losses. ...

research-article
Practical Accuracy Evaluation for Deep Learning Systems via Latent Representation Discrepancy

As deep learning systems have been widely deployed in many safety-critical scenarios, their quality and reliability have raised growing concerns. Assuring the quality and evaluating the accuracy of deep learning models could be challenging because, ...

research-article
An Empirical Study on AST-level mutation-based fuzzing techniques for JavaScript Engines

With the widespread adoption of the JavaScript language, JavaScript engines have become a primary target for attackers, leading to numerous security threats. To expose potential security vulnerabilities and bugs in JavaScript engines, various fuzzing ...

research-article
Drift: Fine-Grained Prediction of the Co-Evolution of Production and Test Code via Machine Learning

As production code evolves, test code can quickly become outdated. When test code is outdated, it may fail to capture errors in the programs under test and can lead to serious software bugs that result in significant losses for both developers and ...

SESSION: Session: Code Search & Generation
research-article
Seq2Seq or Seq2Tree: Generating Code Using Both Paradigms via Mutual Learning

Code generation aims to automatically generate the source code based on given natural language (NL) descriptions, which is of great significance for automated software development. Some code generation models follow a language model-based paradigm (...

research-article
Measuring Efficient Code Generation with GEC

Although efficiency is one of the core metrics in programming, recent large-scale language models often face the issue of “inefficient code” generation, which struggles to meet the real-time requirements of algorithms. However, there is relatively ...

research-article
APICom: Automatic API Completion via Prompt Learning and Adversarial Training-based Data Augmentation

Based on developer needs and usage scenarios, API (Application Programming Interface) recommendation is the process of assisting developers in finding the required API among numerous candidate APIs. Previous studies mainly modeled API recommendation as ...

research-article
MCodeSearcher: Multi-View Contrastive Learning for Code Search

Code search has been a critical software development activity in facilitating developers to retrieve a proper code snippet from open-source repositories given a user intent. In recent years, large-scale pre-trained models have shown impressive ...

SESSION: Session: Software Systems
research-article
MiTFM: A multi-view information fusion method based on transformer for Next Activity Prediction of Business Processes

Recent research introduces deep learning algorithms such as recurrent neural networks (RNNs) to predict the next activity, one of the most challenging tasks in predictive business process monitoring. However, the RNN-based models use only the last ...

research-article
EFTuner: A Bi-Objective Configuration Parameter Auto-Tuning Method Towards Energy-Efficient Big Data Processing

Energy-efficiency now severely restricts the sustainable operation and development of big data services. In this paper, we propose a bi-objective configuration parameters auto-tuning method EFTuner towards energy-efficient big data processing. ...

research-article
Conflict-free Replicated Priority Queue: Design, Verification and Evaluation

Internet-scale distributed systems often rely on replication to achieve fault-tolerance and load distribution. To provide low latency and high availability, the systems are often required to accept updates on one replica immediately and then propagate ...

research-article
Isabelle/Cloud: Delivering Isabelle/HOL as a Cloud IDE for Theorem Proving

As online coding technology advances, various related products are emerging, but we observe that there are not many examples of introducing online coding into the field of theorem proving. We introduce Isabelle/Cloud, an online coding platform and user ...

Contributors
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate55of111submissions,50%
YearSubmittedAcceptedRate
Internetware '19352057%
Internetware '18262077%
Internetware '13501530%
Overall1115550%