首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
LLCF: A Load- and Location-Aware Collaborative Filtering Algorithm to Predict QoS of Web Service 基于负载和位置感知的Web服务QoS预测协同过滤算法
Chen Li, Xiaochun Zhang, Chengyuan Yu, Xin Shu, Xiaopeng Xu
The prediction of Quality of Service (QoS) significantly facilitates the web services selection for QoS based web service recommender systems. One effective method for predicting web services' QoS values is the collaborative filtering (CF) algorithm. However, the existing CF algorithms experience potential scalability issues, as well as the accuracy issues. We present a load- and location-aware collaborative filtering algorithm (LLCF) to improve the prediction accuracy and the scalability. To assess the proposed LLCF, we leverage Amazon Cloud platform where hosts various web services. The experiments are conducted based on selected web services where QoS values are collected. The results show the prediction accuracy is significantly improved by the proposed LLCF. Furthermore, complexity analysis results show that our LLCF can remarkably improve the scalability.
基于QoS的web服务推荐系统的服务质量预测为web服务的选择提供了极大的便利。协同过滤(CF)算法是预测web服务QoS值的一种有效方法。然而,现有的CF算法存在潜在的可伸缩性问题,以及准确性问题。为了提高预测精度和可扩展性,提出了一种负载和位置感知协同过滤算法(LLCF)。为了评估提议的LLCF,我们利用了托管各种网络服务的亚马逊云平台。实验是基于选定的web服务进行的,这些服务收集了QoS值。结果表明,该算法显著提高了预测精度。此外,复杂性分析结果表明,我们的LLCF可以显著提高可扩展性。
{"title":"LLCF: A Load- and Location-Aware Collaborative Filtering Algorithm to Predict QoS of Web Service","authors":"Chen Li, Xiaochun Zhang, Chengyuan Yu, Xin Shu, Xiaopeng Xu","doi":"10.1109/QRS-C57518.2022.00111","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00111","url":null,"abstract":"The prediction of Quality of Service (QoS) significantly facilitates the web services selection for QoS based web service recommender systems. One effective method for predicting web services' QoS values is the collaborative filtering (CF) algorithm. However, the existing CF algorithms experience potential scalability issues, as well as the accuracy issues. We present a load- and location-aware collaborative filtering algorithm (LLCF) to improve the prediction accuracy and the scalability. To assess the proposed LLCF, we leverage Amazon Cloud platform where hosts various web services. The experiments are conducted based on selected web services where QoS values are collected. The results show the prediction accuracy is significantly improved by the proposed LLCF. Furthermore, complexity analysis results show that our LLCF can remarkably improve the scalability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Metadata in PDF Files Published by Police Agencies in Japan 分析日本警察机构出版的PDF文件中的元数据
Taichi Hasegawa, Taiichi Saito, R. Sasaki
In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.
近年来,人们观察到一种被称为目标攻击的新型网络攻击。它针对特定的组织或个人,而通常的大规模攻击并不关注特定的目标。组织在其网站上发布了许多Word或PDF文件。如果这些文件包含在编写过程中无意中生成的隐藏数据,则可能为有针对性的攻击提供起点。Adhatarao和Lauradoux分析了在许多国家安全机构发布的PDF文件中发现的隐藏数据,发现许多PDF文件可能会泄露作者姓名、信息系统细节和计算机架构等信息。在本研究中,我们分析了日本警察机构网站上公布的PDF文件的隐藏数据,并与Adhatarao和Lauradoux的结果进行了比较。我们收集了110989个PDF文件。收集到的PDF文件中有56%包含个人姓名、组织名称、用户名或看似是组织内id的数字。96%的PDF文件包含软件名称。
{"title":"Analyzing Metadata in PDF Files Published by Police Agencies in Japan","authors":"Taichi Hasegawa, Taiichi Saito, R. Sasaki","doi":"10.1109/QRS-C57518.2022.00029","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00029","url":null,"abstract":"In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for Video Summarization with Semantic Reward 基于语义奖励的视频摘要深度强化学习
Haoran Sun, Xiaolong Zhu, Conghua Zhou
Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.
视频摘要旨在通过生成简洁的摘要来提高大规模视频浏览的效率。在视频监控、视频点评、数据标注等场景中得到广泛应用。传统的视频摘要技术侧重于图像特征维度或图像语义维度的过滤。但是,这种技术会使大量可能有用的信息丢失,特别是对于许多具有丰富文本语义的视频,如访谈、教学视频,只保留与图像维度相关的信息。为了解决上述问题,本文将视频摘要视为一个连续的多维决策过程。具体来说,摘要模型预测了每一帧及其对应文本的概率,然后为每一帧及其对应文本设计奖励方法。最后,生成图像和语义两个维度的综合总结。这种方法不仅是无监督的,不依赖于标签和用户交互,而且还解耦了语义和图像摘要模型,为后续工程使用提供了更多可用的接口。
{"title":"Deep Reinforcement Learning for Video Summarization with Semantic Reward","authors":"Haoran Sun, Xiaolong Zhu, Conghua Zhou","doi":"10.1109/QRS-C57518.2022.00119","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00119","url":null,"abstract":"Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks 基于mini - exception神经网络的面部表情识别轻量级卷积神经网络
Changjian Li, Dongcheng Li, Man Zhao, Hui Li
This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.
本文建立了一个基于exception的卷积神经网络模型;我们删除了传统卷积神经网络模型中的全连通层,用四个深度可分离的卷积来代替卷积神经网络中的卷积层;我们在每次卷积操作后使用批处理归一化处理输出数据,并使用ReLU激活函数对输出数据添加非线性因子,最后使用SoftMax函数对最终结果进行分类。我们的模型在FER2013数据集上实现了73%的准确率,与原始模型exception相比,这是一个特别的改进。我们设计并实现了一种可以用于静态图像和实时识别的面部识别系统,可以快速准确地识别真实的面部表情。
{"title":"A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks","authors":"Changjian Li, Dongcheng Li, Man Zhao, Hui Li","doi":"10.1109/QRS-C57518.2022.00104","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00104","url":null,"abstract":"This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study towards Characterizing Neural Machine Translation Testing Methods 神经网络机器翻译测试方法表征的实证研究
Chenxi He, Wenhong Liu, Shuang Zhao, Jiawei Liu, Yang Yang
Due to the rapid development of deep neural networks, in recent years, machine translation software has been widely adopted in people's daily lives, such as communicating with foreigners or understanding political news from the neighbouring countries, and it is embedded in daily applications such as Twitter and WeChat. The neural machine translation (NMT) model is the core of machine translation software, and it is very challenging to test it as a deep neural network model due to the Inexplicability of neural networks and the complexity of model output. In this paper, we introduce three latest machine translation testing methods and provide a preliminary analysis of their effects.
由于深度神经网络的快速发展,近年来,机器翻译软件被广泛应用于人们的日常生活中,例如与外国人交流或了解邻国的政治新闻,并且嵌入在Twitter和微信等日常应用程序中。神经机器翻译(NMT)模型是机器翻译软件的核心,由于神经网络的不可解释性和模型输出的复杂性,将其作为深度神经网络模型进行测试是非常具有挑战性的。本文介绍了三种最新的机器翻译测试方法,并对其效果进行了初步分析。
{"title":"An Empirical Study towards Characterizing Neural Machine Translation Testing Methods","authors":"Chenxi He, Wenhong Liu, Shuang Zhao, Jiawei Liu, Yang Yang","doi":"10.1109/QRS-C57518.2022.00034","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00034","url":null,"abstract":"Due to the rapid development of deep neural networks, in recent years, machine translation software has been widely adopted in people's daily lives, such as communicating with foreigners or understanding political news from the neighbouring countries, and it is embedded in daily applications such as Twitter and WeChat. The neural machine translation (NMT) model is the core of machine translation software, and it is very challenging to test it as a deep neural network model due to the Inexplicability of neural networks and the complexity of model output. In this paper, we introduce three latest machine translation testing methods and provide a preliminary analysis of their effects.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on Software Requirements Classification Method based on Mobile App User Comments 基于移动App用户评论的软件需求分类方法实证研究
Huan Jin, Hongyan Wan, Ziruo Li, Wenxuan Wang
User comments are one of the main ways for IT companies to obtain software evolution requirements. There are two major methods used to classify the software requirements: the traditional user requirements mining method and the user comments requirements mining. The advantage of traditional user requirements mining is that it can communicate with users face to face, but it is time consuming and the results may not be accurate. Therefore, in this paper, we use the user comments requirements mining method to compare the labeling effect of classification methods on the data set of 19,673 comments. The experimental results show that the combination of TF-IDF and logistic regression (LR) works best on the labeled dataset. This experiment combined with word cloud map has excellent effect on obtaining user requirements.
用户评论是IT公司获取软件演进需求的主要途径之一。软件需求分类主要有两种方法:传统的用户需求挖掘方法和用户评论需求挖掘方法。传统的用户需求挖掘的优点是可以与用户进行面对面的交流,但费时且结果可能不准确。因此,在本文中,我们使用用户评论需求挖掘方法来比较分类方法对19673条评论数据集的标注效果。实验结果表明,TF-IDF和逻辑回归(LR)相结合在标记数据集上效果最好。该实验结合词云图对获取用户需求有很好的效果。
{"title":"An Empirical Study on Software Requirements Classification Method based on Mobile App User Comments","authors":"Huan Jin, Hongyan Wan, Ziruo Li, Wenxuan Wang","doi":"10.1109/QRS-C57518.2022.00085","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00085","url":null,"abstract":"User comments are one of the main ways for IT companies to obtain software evolution requirements. There are two major methods used to classify the software requirements: the traditional user requirements mining method and the user comments requirements mining. The advantage of traditional user requirements mining is that it can communicate with users face to face, but it is time consuming and the results may not be accurate. Therefore, in this paper, we use the user comments requirements mining method to compare the labeling effect of classification methods on the data set of 19,673 comments. The experimental results show that the combination of TF-IDF and logistic regression (LR) works best on the labeled dataset. This experiment combined with word cloud map has excellent effect on obtaining user requirements.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing 基于自组织地图计算的目的港物流风险评价
Chuan Zhao, Huilei Cao
We consider a destination port logistics service provider (DPLSP), which wants to improve its service quality by reducing risk of delivery time delay. This paper diagnoses potential risk factors that estimate the performances of the DPLSP who provides services only after the arrival of freight, with the intention of reducing supply chain risk and improve supply chain performance through creative computing approach. Self-organizing feature map (SOFM) computing is a type of artificial neural network based on an unsupervised learning algorithm. We propose the approach of SOFM computing for the purpose of clustering risk data of DPLSPs from a less subjective perspective and then rank the cluster results into different levels based on the total risk value of each cluster. Numerical studies to test the effectiveness of this model would be carried out using air import logistics lead-time reports from a large DPLSP. The results illustrate that the proposed approach could successfully cluster and rank the risk data according to their values.
我们考虑一个目的港物流服务提供商(DPLSP),它希望通过减少交货时间延迟的风险来提高服务质量。本文通过诊断潜在风险因素,对只在货物到达后才提供服务的DPLSP进行绩效评估,旨在通过创造性的计算方法降低供应链风险,提高供应链绩效。SOFM计算是一种基于无监督学习算法的人工神经网络。我们提出了SOFM计算方法,从较少主观的角度对dplsp的风险数据进行聚类,然后根据每个聚类的总风险值对聚类结果进行不同级别的排序。数值研究将使用大型DPLSP的空运进口物流交货期报告来测试该模型的有效性。结果表明,该方法能够成功地对风险数据进行聚类和排序。
{"title":"Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing","authors":"Chuan Zhao, Huilei Cao","doi":"10.1109/QRS-C57518.2022.00117","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00117","url":null,"abstract":"We consider a destination port logistics service provider (DPLSP), which wants to improve its service quality by reducing risk of delivery time delay. This paper diagnoses potential risk factors that estimate the performances of the DPLSP who provides services only after the arrival of freight, with the intention of reducing supply chain risk and improve supply chain performance through creative computing approach. Self-organizing feature map (SOFM) computing is a type of artificial neural network based on an unsupervised learning algorithm. We propose the approach of SOFM computing for the purpose of clustering risk data of DPLSPs from a less subjective perspective and then rank the cluster results into different levels based on the total risk value of each cluster. Numerical studies to test the effectiveness of this model would be carried out using air import logistics lead-time reports from a large DPLSP. The results illustrate that the proposed approach could successfully cluster and rank the risk data according to their values.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of the Impact of COVID-19 on OSS Development 新冠肺炎疫情对开源软件开发影响的实证研究
Lingfei Ma, Liming Nie, Chenxi Mao, Yaowen Zheng, Y. Liu
In this paper, we propose an analytical model that can analyze the impact of emergencies on open source software (OSS) development. As the core of this model, a metric system is used to comprehensively describe the OSS development process, which includes three dimensions: team activity, development activity, and development risk, with a total of 30 metrics. To demonstrate the effectiveness of the model, we construct an empirical study analyzing the impact of COVID-19 on OSS development. This study is based on the development process events between January 2019 and April 2022 belonging to 50 selected open source projects on GitHub. The results show that more than 72.4% of projects were negatively impacted following the COVID-19 outbreak. Interestingly, we observe that variants of covide-19 did not exacerbate its impact on software development. On the contrary, some project development activities have obviously resumed, indicating that the development team has adapted and gradually got rid of the impact of the epidemic.
本文提出了一个分析突发事件对开源软件(OSS)开发影响的分析模型。作为该模型的核心,度量系统被用于全面描述OSS开发过程,它包括三个维度:团队活动、开发活动和开发风险,总共有30个度量。为了验证模型的有效性,我们构建了一项实证研究,分析COVID-19对OSS发展的影响。本研究基于GitHub上50个选定的开源项目在2019年1月至2022年4月之间的开发过程事件。结果显示,超过72.4%的项目受到新冠肺炎疫情的负面影响。有趣的是,我们观察到covid -19的变种并没有加剧其对软件开发的影响。相反,一些项目开发活动明显恢复,表明开发团队已经适应并逐渐摆脱疫情的影响。
{"title":"An Empirical Study of the Impact of COVID-19 on OSS Development","authors":"Lingfei Ma, Liming Nie, Chenxi Mao, Yaowen Zheng, Y. Liu","doi":"10.1109/QRS-C57518.2022.00112","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00112","url":null,"abstract":"In this paper, we propose an analytical model that can analyze the impact of emergencies on open source software (OSS) development. As the core of this model, a metric system is used to comprehensively describe the OSS development process, which includes three dimensions: team activity, development activity, and development risk, with a total of 30 metrics. To demonstrate the effectiveness of the model, we construct an empirical study analyzing the impact of COVID-19 on OSS development. This study is based on the development process events between January 2019 and April 2022 belonging to 50 selected open source projects on GitHub. The results show that more than 72.4% of projects were negatively impacted following the COVID-19 outbreak. Interestingly, we observe that variants of covide-19 did not exacerbate its impact on software development. On the contrary, some project development activities have obviously resumed, indicating that the development team has adapted and gradually got rid of the impact of the epidemic.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Real-Time Verification for CPS based on Time Automata 基于时间自动机的CPS建模与实时验证
M. Tuo, Xiaoqiang Zhao, Bo Shen, Wen-Ling Wu
In this paper, a formal method for real-time verification of Cyber-Physical Systems(CPS) is proposed. Firstly, the CPS behavior model is established by using temporal automata, and then the real-time verification of the system is performed. Based on this method, the real-time task scheduling of the control software of an intelligent car is analyzed. The experimental results show the effectiveness of this method.
本文提出了一种网络物理系统(CPS)实时验证的形式化方法。首先利用时间自动机建立CPS行为模型,然后对系统进行实时验证。在此基础上,对智能汽车控制软件的实时任务调度进行了分析。实验结果表明了该方法的有效性。
{"title":"Modeling and Real-Time Verification for CPS based on Time Automata","authors":"M. Tuo, Xiaoqiang Zhao, Bo Shen, Wen-Ling Wu","doi":"10.1109/QRS-C57518.2022.00092","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00092","url":null,"abstract":"In this paper, a formal method for real-time verification of Cyber-Physical Systems(CPS) is proposed. Firstly, the CPS behavior model is established by using temporal automata, and then the real-time verification of the system is performed. Based on this method, the real-time task scheduling of the control software of an intelligent car is analyzed. The experimental results show the effectiveness of this method.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Search Method Based on Multimodal Representation 基于多模态表示的代码搜索方法
Xiao Chen, Junhua Wu
Developers tend to search and reuse code snippets from large-scale corpora while implementing some of the features that existed in development. This will improve the efficiency of development. Code search is to search for semantically relevant code snippets based on a given natural language query. In existing methods, the semantic similarity between code and query is quantified as their distance in the shared vector space. To improve the vector space and map the code vector and query vector into a shared vector space so that the semantically similar code-query pairs are close to each other, we propose a code search method with multimodal representations. It can better enhance the semantic relationship between code snippets and queries. Experiments on Java datasets show that the multimodal representation model MulCS improves the quality of code search. MulCS outperforms several existing advanced models in several performance metrics.
开发人员倾向于在实现开发中存在的一些特性时,从大规模语料库中搜索和重用代码片段。这将提高发展效率。代码搜索是基于给定的自然语言查询,搜索语义相关的代码片段。在现有的方法中,代码和查询之间的语义相似度被量化为它们在共享向量空间中的距离。为了改进向量空间,将代码向量和查询向量映射到一个共享的向量空间中,使语义相似的代码查询对彼此接近,我们提出了一种多模态表示的代码搜索方法。它可以更好地增强代码片段和查询之间的语义关系。在Java数据集上的实验表明,多模态表示模型MulCS提高了代码搜索的质量。MulCS在几个性能指标上优于现有的几种先进模型。
{"title":"Code Search Method Based on Multimodal Representation","authors":"Xiao Chen, Junhua Wu","doi":"10.1109/QRS-C57518.2022.00078","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00078","url":null,"abstract":"Developers tend to search and reuse code snippets from large-scale corpora while implementing some of the features that existed in development. This will improve the efficiency of development. Code search is to search for semantically relevant code snippets based on a given natural language query. In existing methods, the semantic similarity between code and query is quantified as their distance in the shared vector space. To improve the vector space and map the code vector and query vector into a shared vector space so that the semantically similar code-query pairs are close to each other, we propose a code search method with multimodal representations. It can better enhance the semantic relationship between code snippets and queries. Experiments on Java datasets show that the multimodal representation model MulCS improves the quality of code search. MulCS outperforms several existing advanced models in several performance metrics.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1