No abstract available.
Proceeding Downloads
Structural-semantics Guided Program Simplification for Understanding Neural Code Intelligence Models
Neural code intelligence models are cutting-edge automated code understanding technologies that have achieved remarkable performance in various software engineering tasks. However, the lack of deep learning models’ interpretability hinders the ...
Hybrid API Migration: A Marriage of Small API Mapping Models and Large Language Models
API migration is an essential step for code migration between libraries or programming languages, and it is a challenging task as it requires detailed comprehension of both source and target APIs. The existing work either recommends mapped API names ...
Towards Better Multilingual Code Search through Cross-Lingual Contrastive Learning
Recent advances in deep learning have significantly improved the understanding of source code by leveraging large amounts of open-source software data. Thanks to the larger amount of data, code representation models trained with multilingual datasets ...
PyBartRec: Python API Recommendation with Semantic Information
API recommendation has been widely used to enhance developers’ efficiency in software development. However, existing API recommendation methods for dynamic languages such as Python usually suffer from the limitations of incorrect type inference and lack ...
SupConFL: Fault Localization with Supervised Contrastive Learning
Recent years have seen a growing interest in deep learning-based approaches to localize faults in software. However, existing methods have not reached a satisfying level of accuracy. The main reason is that the feature extraction of faulty code ...
Effective Recommendation of Cross-Project Correlated Issues based on Issue Metrics
The calling relationship between projects becomes complicated as the number of open-source projects increases. Different issues across projects can also be related, referred to as cross-project correlated issues (CPCIs), and bring new challenges for ...
The Impact of the bug number on Effort-Aware Defect Prediction: An Empirical Study
Previous research have utilized public software defect datasets such as NASA, RELINK, and SOFTLAB, which only contain class label information. Almost all Effort-Aware Defect Prediction (EADP) studies are carried out around these datasets. However, EADP ...
Can Neural Networks Help Smart Contract Testing? An Empirical Study
Smart contracts are one of the most successful applications of blockchain technology. In order to guarantee the security of smart contracts, researchers have successively introduced various testing methodologies, including static analysis, symbolic ...
Towards Better Dependency Scope Settings in Maven Projects
The emergence of build automation tools with dependency management features has significantly impacted software development. However, in the configuration process, improper settings of some configuration items, such as the dependency scope setting, may ...
An Empirical Study of the Apache Voting Process on Open Source Community Governance
Open-source software (OSS) projects have become a cornerstone of the software ecosystem, offering numerous benefits to developers and end-users alike. However, ensuring the long-term sustainability and success of OSS projects is challenging, requiring ...
A Deep Dive into the Featured iOS Apps
Millions of apps in markets have made it difficult for mobile users to find fancy and high quality apps. Mobile app markets have deployed mechanisms to recommend apps to users. Apple usually features apps in the iOS App Store, and mobile users could ...
A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach
The widespread adoption of deep learning (DL) has made it critical to ensure its reliability. Mutation testing has been employed in DL testing to assess test data quality, but it can be costly of a large number of generated mutants. Cost reduction can ...
UbiCap: A Capability-based Run-time Model for Heterogeneous Sensors Management in Ubiquitous Operating System
The Ubiquitous Operating System(UOS) is a new type of operating system in response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing. Compared with traditional operating systems, one of the fundamental ...
Fine-Grained Flow Control Agent on Path MTU for IoT Software
Internet of Things (IoT) software is used to control the distributed hardware of the underlying network and provide a reliable operating platform for various services. In production system, diversity IoT software provides multiple services, flows of ...
Prompt Learning for Developing Software Exploits
A software exploit is a sequence of commands that exploits software vulnerabilities or security flaws, written either by security researchers as a Proof-Of-Concept (POC) threat or by malicious attackers for use in their operations. Writing exploits is ...
FAEG: Feature-Driven Automatic Exploit Generation
Buffer overflow vulnerabilities are prevalent in software applications, and their automatic detection and exploitation are of great significance. Modern operating systems implement security mitigation to prevent the exploitation of these ...
Comparing the Performance of Different Code Representations for Learning-based Vulnerability Detection
Software vulnerabilities can cause severe security threats to cyberspace, and it is of significant importance to conduct automated vulnerability detection research. Considering that the source code contains rich syntax and semantic information, plenty ...
VulD-Transformer: Source Code Vulnerability Detection via Transformer
The detection of software vulnerability is an important and challenging problem. Existing studies have shown that deep learning-based approaches can significantly improve the performance of vulnerability detection due to their powerful capabilities of ...
Prioritizing Testing Instances to Enhance the Robustness of Object Detection Systems
Object detection models have been widely deployed in military and life-related intelligent software systems. However, along with the outstanding success of object detection, it may exhibit abnormal behavior and lead to severe accidents and losses. ...
Practical Accuracy Evaluation for Deep Learning Systems via Latent Representation Discrepancy
As deep learning systems have been widely deployed in many safety-critical scenarios, their quality and reliability have raised growing concerns. Assuring the quality and evaluating the accuracy of deep learning models could be challenging because, ...
An Empirical Study on AST-level mutation-based fuzzing techniques for JavaScript Engines
With the widespread adoption of the JavaScript language, JavaScript engines have become a primary target for attackers, leading to numerous security threats. To expose potential security vulnerabilities and bugs in JavaScript engines, various fuzzing ...
Drift: Fine-Grained Prediction of the Co-Evolution of Production and Test Code via Machine Learning
As production code evolves, test code can quickly become outdated. When test code is outdated, it may fail to capture errors in the programs under test and can lead to serious software bugs that result in significant losses for both developers and ...
Seq2Seq or Seq2Tree: Generating Code Using Both Paradigms via Mutual Learning
Code generation aims to automatically generate the source code based on given natural language (NL) descriptions, which is of great significance for automated software development. Some code generation models follow a language model-based paradigm (...
Measuring Efficient Code Generation with GEC
Although efficiency is one of the core metrics in programming, recent large-scale language models often face the issue of “inefficient code” generation, which struggles to meet the real-time requirements of algorithms. However, there is relatively ...
APICom: Automatic API Completion via Prompt Learning and Adversarial Training-based Data Augmentation
Based on developer needs and usage scenarios, API (Application Programming Interface) recommendation is the process of assisting developers in finding the required API among numerous candidate APIs. Previous studies mainly modeled API recommendation as ...
MCodeSearcher: Multi-View Contrastive Learning for Code Search
Code search has been a critical software development activity in facilitating developers to retrieve a proper code snippet from open-source repositories given a user intent. In recent years, large-scale pre-trained models have shown impressive ...
MiTFM: A multi-view information fusion method based on transformer for Next Activity Prediction of Business Processes
Recent research introduces deep learning algorithms such as recurrent neural networks (RNNs) to predict the next activity, one of the most challenging tasks in predictive business process monitoring. However, the RNN-based models use only the last ...
EFTuner: A Bi-Objective Configuration Parameter Auto-Tuning Method Towards Energy-Efficient Big Data Processing
Energy-efficiency now severely restricts the sustainable operation and development of big data services. In this paper, we propose a bi-objective configuration parameters auto-tuning method EFTuner towards energy-efficient big data processing. ...
Conflict-free Replicated Priority Queue: Design, Verification and Evaluation
Internet-scale distributed systems often rely on replication to achieve fault-tolerance and load distribution. To provide low latency and high availability, the systems are often required to accept updates on one replica immediately and then propagate ...
Isabelle/Cloud: Delivering Isabelle/HOL as a Cloud IDE for Theorem Proving
As online coding technology advances, various related products are emerging, but we observe that there are not many examples of introducing online coding into the field of theorem proving. We introduce Isabelle/Cloud, an online coding platform and user ...
Index Terms
- Proceedings of the 14th Asia-Pacific Symposium on Internetware
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Internetware '19 | 35 | 20 | 57% |
Internetware '18 | 26 | 20 | 77% |
Internetware '13 | 50 | 15 | 30% |
Overall | 111 | 55 | 50% |