首页 > 最新文献

2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Ensuring Dataset Quality for Machine Learning Certification 确保机器学习认证的数据集质量
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00085
Sylvaine Picard, Camille Chapdelaine, Cyril Cappi, L. Gardes, E. Jenn, Baptiste Lefèvre, Thomas Soumarmon
In this paper, we address the problem of dataset quality in the context of Machine Learning (ML)-based critical systems. We briefly analyse the applicability of some existing standards dealing with data and show that the specificities of the ML context are neither properly captured nor taken into account. As a first answer to this concerning situation, we propose a dataset specification and verification process, and apply it on a signal recognition system from the railway domain. In addition, we also give a list of recommendations for the collection and management of datasets. This work is one step towards the dataset engineering process that will be required for ML to be used on safety critical systems.
在本文中,我们解决了基于机器学习(ML)的关键系统背景下的数据集质量问题。我们简要分析了处理数据的一些现有标准的适用性,并表明ML上下文的特殊性既没有被正确捕获也没有被考虑在内。为了解决这一问题,我们提出了一个数据集规范和验证过程,并将其应用于铁路领域的信号识别系统。此外,我们还为数据集的收集和管理提供了一系列建议。这项工作是迈向数据集工程过程的一步,将ML用于安全关键系统。
{"title":"Ensuring Dataset Quality for Machine Learning Certification","authors":"Sylvaine Picard, Camille Chapdelaine, Cyril Cappi, L. Gardes, E. Jenn, Baptiste Lefèvre, Thomas Soumarmon","doi":"10.1109/ISSREW51248.2020.00085","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00085","url":null,"abstract":"In this paper, we address the problem of dataset quality in the context of Machine Learning (ML)-based critical systems. We briefly analyse the applicability of some existing standards dealing with data and show that the specificities of the ML context are neither properly captured nor taken into account. As a first answer to this concerning situation, we propose a dataset specification and verification process, and apply it on a signal recognition system from the railway domain. In addition, we also give a list of recommendations for the collection and management of datasets. This work is one step towards the dataset engineering process that will be required for ML to be used on safety critical systems.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133635802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Using Metamorphic Testing to Evaluate DNN Coverage Criteria 使用变质测试评估DNN覆盖标准
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00055
Jinyi Zhou, Kun Qiu, Zheng Zheng, T. Chen, P. Poon
Generating test cases and further evaluating their “quality” are two critical topics in the area of Deep Neural Networks (DNNs). In this domain, different studies (e.g., [1], [2]) have reported that metamorphic testing (MT) serves as an effective test case generation method, where an initial set of source test cases is augmented with identified metamorphic relations (MRs) to produce the corresponding set of follow-up test cases. As a result, the fault detection effectiveness (and, hence, the “quality”) of the resulting test suite T, containing these source and follow-up test cases, will most likely be increased.
生成测试用例并进一步评估其“质量”是深度神经网络(dnn)领域的两个关键主题。在这个领域中,不同的研究(例如,[1],[2])已经报道了变质测试(MT)作为一种有效的测试用例生成方法,其中初始的源测试用例集被确定的变质关系(MRs)扩充,以产生相应的后续测试用例集。因此,包含这些源和后续测试用例的结果测试套件T的故障检测效率(以及因此的“质量”)将很可能得到提高。
{"title":"Using Metamorphic Testing to Evaluate DNN Coverage Criteria","authors":"Jinyi Zhou, Kun Qiu, Zheng Zheng, T. Chen, P. Poon","doi":"10.1109/ISSREW51248.2020.00055","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00055","url":null,"abstract":"Generating test cases and further evaluating their “quality” are two critical topics in the area of Deep Neural Networks (DNNs). In this domain, different studies (e.g., [1], [2]) have reported that metamorphic testing (MT) serves as an effective test case generation method, where an initial set of source test cases is augmented with identified metamorphic relations (MRs) to produce the corresponding set of follow-up test cases. As a result, the fault detection effectiveness (and, hence, the “quality”) of the resulting test suite T, containing these source and follow-up test cases, will most likely be increased.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WoSoCer 2020 Workshop Committees wsocer2020车间委员会
Pub Date : 2020-10-01 DOI: 10.1109/issrew51248.2020.00023
{"title":"WoSoCer 2020 Workshop Committees","authors":"","doi":"10.1109/issrew51248.2020.00023","DOIUrl":"https://doi.org/10.1109/issrew51248.2020.00023","url":null,"abstract":"","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129905074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reconfiguration Approach for Open Adaptive Systems-of-Systems 开放自适应系统的重构方法
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00076
B. Wudka, Carsten Thomas, Lennart Siefke, V. Sommer
The drive for digitalization in industry and transport results in an increasing application of cooperative systems that form adaptive system-of-systems. With reconfiguration these systems are able to change their behavior to react on internal changes and changes in their environment. In this paper, we present a novel service-oriented approach for decentralized reconfiguration within such systems-of-systems that specifically supports open adaptive systems-of-systems. We introduce the concept of strategy blueprints that define possible combinations of services provided by individual members of the system-of-systems. During reconfiguration, individual member systems evaluate all strategies that are instantiable under the given conditions, and select the one optimally fulfilling a set of predefined goals as the most appropriate target configuration. With this novel approach, we support flexible reconfiguration across the borders of individual member systems, and the inclusion of new member system types that provide service variants not yet known at design time of the reconfiguration algorithm.
工业和交通领域的数字化推动了协作系统的应用,形成了自适应系统的系统。通过重新配置,这些系统能够改变它们的行为,对内部变化和环境变化做出反应。在本文中,我们提出了一种新的面向服务的方法,用于在这种系统的系统中进行分散重新配置,这种系统特别支持开放的自适应系统。我们引入了战略蓝图的概念,它定义了由系统的系统的各个成员提供的服务的可能组合。在重新配置期间,各个成员系统评估在给定条件下可实例化的所有策略,并选择最优地实现一组预定义目标的策略作为最合适的目标配置。通过这种新颖的方法,我们支持跨单个成员系统边界的灵活重新配置,并包含新的成员系统类型,这些类型提供了在重新配置算法设计时尚不知道的服务变体。
{"title":"A Reconfiguration Approach for Open Adaptive Systems-of-Systems","authors":"B. Wudka, Carsten Thomas, Lennart Siefke, V. Sommer","doi":"10.1109/ISSREW51248.2020.00076","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00076","url":null,"abstract":"The drive for digitalization in industry and transport results in an increasing application of cooperative systems that form adaptive system-of-systems. With reconfiguration these systems are able to change their behavior to react on internal changes and changes in their environment. In this paper, we present a novel service-oriented approach for decentralized reconfiguration within such systems-of-systems that specifically supports open adaptive systems-of-systems. We introduce the concept of strategy blueprints that define possible combinations of services provided by individual members of the system-of-systems. During reconfiguration, individual member systems evaluate all strategies that are instantiable under the given conditions, and select the one optimally fulfilling a set of predefined goals as the most appropriate target configuration. With this novel approach, we support flexible reconfiguration across the borders of individual member systems, and the inclusion of new member system types that provide service variants not yet known at design time of the reconfiguration algorithm.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection 深度学习分类在Android恶意软件家族检测中的可靠性评估
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00082
Giacomo Iadarola, F. Martinelli, F. Mercaldo, A. Santone
Artificial intelligence techniques are nowadays widespread to perform a great number of classification tasks. One of the biggest controversies regarding the adoption of these techniques is related to their use as a “black box” i.e., the security analyst must trust the prediction without the possibility to understand the reason why the classifier made a certain choice. In this paper we propose a malicious family detector based on deep learning, providing a mechanism aimed to assess the prediction reliability. The proposed method obtains an accuracy of 0.98 in Android family identification. Moreover, we show how the proposed method can assist the security analyst to interpret the output classification and verify the prediction reliability by exploiting activation maps.
如今,人工智能技术被广泛应用于执行大量的分类任务。关于采用这些技术的最大争议之一与它们作为“黑箱”的使用有关,即,安全分析师必须相信预测,而不可能理解分类器做出特定选择的原因。在本文中,我们提出了一种基于深度学习的恶意家庭检测器,提供了一种旨在评估预测可靠性的机制。该方法在Android家庭识别中准确率为0.98。此外,我们还展示了所提出的方法如何帮助安全分析人员解释输出分类并通过利用激活映射验证预测的可靠性。
{"title":"Evaluating Deep Learning Classification Reliability in Android Malware Family Detection","authors":"Giacomo Iadarola, F. Martinelli, F. Mercaldo, A. Santone","doi":"10.1109/ISSREW51248.2020.00082","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00082","url":null,"abstract":"Artificial intelligence techniques are nowadays widespread to perform a great number of classification tasks. One of the biggest controversies regarding the adoption of these techniques is related to their use as a “black box” i.e., the security analyst must trust the prediction without the possibility to understand the reason why the classifier made a certain choice. In this paper we propose a malicious family detector based on deep learning, providing a mechanism aimed to assess the prediction reliability. The proposed method obtains an accuracy of 0.98 in Android family identification. Moreover, we show how the proposed method can assist the security analyst to interpret the output classification and verify the prediction reliability by exploiting activation maps.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
How Robust is the Optimal Software Rejuvenation Timing? 软件复兴的最佳时机有多稳健?
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00098
Junjun Zheng, H. Okamura, T. Dohi
Robustness is usually relevant for characterizing the dependence between the values of model parameters and system behavior, and can be understood as stability of system behavior under changes in model parameters. In this paper, we consider a simple software rejuvenation model and its optimal rejuvenation timing, which maximizes the steady-state availability of the system. The main contribution of this work is to provide a new perspective on the optimal software rejuvenation timing, that is, the robustness of the optimal rejuvenation timing against input factors. In particular, the degree of robustness is quantified by the first derivatives of the optimal rejuvenation timing with respect to the model parameters. The robustnesses of both optimal rejuvenation timing and system availability with the optimal rejuvenation timing are considered. A numerical example with Weibull distributed failure time is devoted to clarifying how robust the optimal rejuvenation timing is, and determine the most sensitive model parameter. As a result, the optimal rejuvenation timing seems to be more robust to the parameters regarding failure time distribution, compared with the other parameters.
鲁棒性通常与描述模型参数值与系统行为之间的依赖关系有关,可以理解为模型参数变化下系统行为的稳定性。本文考虑一个简单的软件再生模型及其最优再生时间,使系统的稳态可用性最大化。这项工作的主要贡献是提供了一个新的视角来研究最优软件复兴时机,即最优复兴时机对输入因素的鲁棒性。特别是,鲁棒性的程度是量化的一阶导数的最优恢复时间相对于模型参数。同时考虑了最优回春时间和系统可用性的鲁棒性。通过Weibull分布失效时间的数值算例,阐明了最优恢复时间的鲁棒性,并确定了最敏感的模型参数。结果表明,与其他参数相比,最优恢复时间对失效时间分布参数具有更强的鲁棒性。
{"title":"How Robust is the Optimal Software Rejuvenation Timing?","authors":"Junjun Zheng, H. Okamura, T. Dohi","doi":"10.1109/ISSREW51248.2020.00098","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00098","url":null,"abstract":"Robustness is usually relevant for characterizing the dependence between the values of model parameters and system behavior, and can be understood as stability of system behavior under changes in model parameters. In this paper, we consider a simple software rejuvenation model and its optimal rejuvenation timing, which maximizes the steady-state availability of the system. The main contribution of this work is to provide a new perspective on the optimal software rejuvenation timing, that is, the robustness of the optimal rejuvenation timing against input factors. In particular, the degree of robustness is quantified by the first derivatives of the optimal rejuvenation timing with respect to the model parameters. The robustnesses of both optimal rejuvenation timing and system availability with the optimal rejuvenation timing are considered. A numerical example with Weibull distributed failure time is devoted to clarifying how robust the optimal rejuvenation timing is, and determine the most sensitive model parameter. As a result, the optimal rejuvenation timing seems to be more robust to the parameters regarding failure time distribution, compared with the other parameters.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen. 漏洞分析作为安全基准测试中的可信证据——以Xen为例
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00078
Charles F. Gonçalves, Nuno Antunes
Hypervisors govern the resources of virtualized systems and are a crucial component of many cloud solutions. As a critical component, cloud providers should assess the hypervisor’s security to mitigate risk before adoption. Ideally, a benchmark should be applied to compare the security of different systems objectively, but security benchmarking is still an open problem. Notwithstanding, the evaluation of the system’s trustworthiness has been adopted as a promising approach as part of this complex evaluation process. In this work, we present a vulnerability data analysis of the Xen hypervisor. Additionally, we address the problem of how to apply this analysis results as trustworthiness evidence that can be applied in security benchmarks. Our results present an insightful characterization of Xen’s vulnerabilities evaluating their lifespan, distribution, and modeling. We also show that vulnerability data analysis can qualitatively characterize the Xen hypervisor’s trustworthiness and possibly reflect the security development efforts into its codebase.
管理程序管理虚拟化系统的资源,是许多云解决方案的关键组件。作为一个关键组件,云提供商应该在采用管理程序之前评估其安全性以降低风险。理想情况下,应该应用基准测试来客观地比较不同系统的安全性,但是安全性基准测试仍然是一个开放的问题。尽管如此,作为这一复杂评价过程的一部分,对系统可靠性的评价已被采纳为一种有希望的方法。在这项工作中,我们提出了Xen管理程序的漏洞数据分析。此外,我们还解决了如何将此分析结果作为可用于安全基准测试的可信度证据加以应用的问题。我们的结果对Xen的漏洞进行了深刻的描述,评估了它们的生命周期、分布和建模。我们还表明,漏洞数据分析可以定性地描述Xen管理程序的可信度,并可能将安全开发工作反映到其代码库中。
{"title":"Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen.","authors":"Charles F. Gonçalves, Nuno Antunes","doi":"10.1109/ISSREW51248.2020.00078","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00078","url":null,"abstract":"Hypervisors govern the resources of virtualized systems and are a crucial component of many cloud solutions. As a critical component, cloud providers should assess the hypervisor’s security to mitigate risk before adoption. Ideally, a benchmark should be applied to compare the security of different systems objectively, but security benchmarking is still an open problem. Notwithstanding, the evaluation of the system’s trustworthiness has been adopted as a promising approach as part of this complex evaluation process. In this work, we present a vulnerability data analysis of the Xen hypervisor. Additionally, we address the problem of how to apply this analysis results as trustworthiness evidence that can be applied in security benchmarks. Our results present an insightful characterization of Xen’s vulnerabilities evaluating their lifespan, distribution, and modeling. We also show that vulnerability data analysis can qualitatively characterize the Xen hypervisor’s trustworthiness and possibly reflect the security development efforts into its codebase.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130604440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-label Classification of Commit Messages using Transfer Learning 基于迁移学习的提交消息多标签分类
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00034
Muhammad Usman Sarwar, Sarim Zafar, Mohamed Wiem Mkaouer, G. Walia, Muhammad Zubair Malik
Commit messages are used in the industry by developers to annotate changes made to the code. Accurate classification of these messages can help monitor the software evolution process and enable better tracking for various industrial stakeholders. In this paper, we present a state of the art method for commit message classification into categories as per Swanson’s maintenance activities i.e. “Corrective”, “Perfective”, and “Adaptive”. This is a challenging task because not all commit messages are well written and informative. Existing approaches rely on keyword-based techniques to solve this problem. However, these approaches are oblivious to the full language model and do not recognize the contextual relationship between words. State of the art methodology in Natural Language Processing (NLP), is to train a context-aware neural network (Transformer) on a very large data set that encompasses the entire language and then fine-tunes it for a specific task. In this way, the model can learn the language, pay attention to the context, and then transfer that knowledge for better performance at the specific task. We use an off-the-shelf neural network called DistilBERT and fine-tune it for commit message classification task. This step is non-trivial because programming languages and commit messages have unique keywords, jargon, and idioms. This paper presents our effort in training this model and constructing the data set for this task. We describe the rules used to construct the data set. We validate our approach on industrial projects from GitHub, such as Kubernetes, Linux, TensorFlow, Spark, TypeScript, and PyTorch. We were able to achieve 87% F1-score for the commit message classification task, which is an order of magnitude accurate than previous studies.
在业界,开发人员使用提交消息来注释对代码所做的更改。对这些消息进行准确的分类可以帮助监视软件发展过程,并对各种行业涉众进行更好的跟踪。在本文中,我们提出了一种最先进的提交消息分类方法,根据Swanson的维护活动,即“纠正”、“完善”和“自适应”,将消息分类。这是一项具有挑战性的任务,因为并不是所有提交消息都写得很好,而且信息丰富。现有的方法依赖于基于关键字的技术来解决这个问题。然而,这些方法忽略了完整的语言模型,并且不能识别单词之间的上下文关系。自然语言处理(NLP)中最先进的方法是在包含整个语言的非常大的数据集上训练上下文感知神经网络(Transformer),然后针对特定任务对其进行微调。通过这种方式,模型可以学习语言,关注上下文,然后将这些知识转移到特定任务中以获得更好的表现。我们使用一个现成的神经网络蒸馏器,并对其进行微调以完成提交消息分类任务。这一步很重要,因为编程语言和提交消息都有独特的关键字、术语和习惯用法。本文介绍了我们在训练该模型和构建该任务的数据集方面所做的努力。我们描述用于构造数据集的规则。我们在来自GitHub的工业项目上验证了我们的方法,比如Kubernetes、Linux、TensorFlow、Spark、TypeScript和PyTorch。我们能够在提交消息分类任务中获得87%的f1分数,这比以前的研究准确了一个数量级。
{"title":"Multi-label Classification of Commit Messages using Transfer Learning","authors":"Muhammad Usman Sarwar, Sarim Zafar, Mohamed Wiem Mkaouer, G. Walia, Muhammad Zubair Malik","doi":"10.1109/ISSREW51248.2020.00034","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00034","url":null,"abstract":"Commit messages are used in the industry by developers to annotate changes made to the code. Accurate classification of these messages can help monitor the software evolution process and enable better tracking for various industrial stakeholders. In this paper, we present a state of the art method for commit message classification into categories as per Swanson’s maintenance activities i.e. “Corrective”, “Perfective”, and “Adaptive”. This is a challenging task because not all commit messages are well written and informative. Existing approaches rely on keyword-based techniques to solve this problem. However, these approaches are oblivious to the full language model and do not recognize the contextual relationship between words. State of the art methodology in Natural Language Processing (NLP), is to train a context-aware neural network (Transformer) on a very large data set that encompasses the entire language and then fine-tunes it for a specific task. In this way, the model can learn the language, pay attention to the context, and then transfer that knowledge for better performance at the specific task. We use an off-the-shelf neural network called DistilBERT and fine-tune it for commit message classification task. This step is non-trivial because programming languages and commit messages have unique keywords, jargon, and idioms. This paper presents our effort in training this model and constructing the data set for this task. We describe the rules used to construct the data set. We validate our approach on industrial projects from GitHub, such as Kubernetes, Linux, TensorFlow, Spark, TypeScript, and PyTorch. We were able to achieve 87% F1-score for the commit message classification task, which is an order of magnitude accurate than previous studies.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133961935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Message from the GAUSS 2020 Workshop Chairs GAUSS 2020研讨会主席致辞
Pub Date : 2020-10-01 DOI: 10.1109/issrew51248.2020.00013
Pietro Braione, D. Briola, G. Angelis, F. Gallo, F. Poggi, G. Quattrocchi
This year too, GAUSS has been co-located with the IEEE “International Symposium on Software Reliability Engineering (ISSRE)”. We would thank the organizers of ISSRE 2020 for having hosted our Workshop, and the ISSRE workshop chairs for their support during the organization of this 2 edition. A very special thank goes to all the members of the program committee, eighteen specialists, for their effort and professional reviews.
今年,GAUSS与IEEE“软件可靠性工程国际研讨会(ISSRE)”在同一地点举行。我们感谢ISSRE 2020的组织者主办了我们的研讨会,并感谢ISSRE研讨会主席在本次会议的组织过程中给予的支持。特别感谢项目委员会的所有成员,18位专家,感谢他们的努力和专业评审。
{"title":"Message from the GAUSS 2020 Workshop Chairs","authors":"Pietro Braione, D. Briola, G. Angelis, F. Gallo, F. Poggi, G. Quattrocchi","doi":"10.1109/issrew51248.2020.00013","DOIUrl":"https://doi.org/10.1109/issrew51248.2020.00013","url":null,"abstract":"This year too, GAUSS has been co-located with the IEEE “International Symposium on Software Reliability Engineering (ISSRE)”. We would thank the organizers of ISSRE 2020 for having hosted our Workshop, and the ISSRE workshop chairs for their support during the organization of this 2 edition. A very special thank goes to all the members of the program committee, eighteen specialists, for their effort and professional reviews.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain Metric Driven Decomposition of Data-Intensive Applications 数据密集型应用的域度量驱动分解
Pub Date : 2020-10-01 DOI: 10.1109/ISSREW51248.2020.00071
Matteo Camilli, Carmine Colarusso, B. Russo, E. Zimeo
The microservices architectural style is picking up more and more momentum in IT industry for the development of systems as loosely coupled, collaborating services. Companies that undergo the migration of their own applications have aspirations such as increasing maintainability and the scale of operation. Such a process is worthwhile but not easy, since it should ensure atomic improvements to the overall architecture for each migration step. Furthermore, the systematic evaluation of migration steps becomes cumbersome without sensible optimization metrics that take into account performance and scalability under expected operational conditions. Recent lines of research recognize this task as challenging, especially in data-intensive applications where known approaches based, for instance, on Domain Driven Design may not be adequate. In this paper, we introduce an approach to evaluate a migration in an iterative way and recognize whether it represents an improvement in terms of performance and scalability. The approach leverages a Domain Metric-based analysis to quantitatively evaluate alternative architectures. We exemplified the envisioned approach on a data-intensive application case study in the domain of smart mobility. Preliminary results from our controlled experiments show the effectiveness of our approach to support systematic and automated evaluation of migration processes.
微服务架构风格在IT行业中越来越流行,用于将系统开发为松散耦合的协作服务。经历自己的应用程序迁移的公司都希望提高可维护性和操作规模。这样的过程是值得的,但并不容易,因为它应该确保对每个迁移步骤的整体体系结构进行原子性改进。此外,如果没有考虑到预期操作条件下的性能和可伸缩性的合理优化度量,对迁移步骤的系统评估就会变得很麻烦。最近的研究认识到这项任务是具有挑战性的,特别是在数据密集型应用程序中,例如,基于领域驱动设计的已知方法可能并不足够。在本文中,我们介绍了一种以迭代的方式评估迁移的方法,并识别它是否代表了性能和可伸缩性方面的改进。该方法利用基于域度量的分析来定量地评估可选的体系结构。我们在智能移动领域的一个数据密集型应用案例研究中举例说明了所设想的方法。我们的控制实验的初步结果显示了我们的方法在支持迁移过程的系统化和自动化评估方面的有效性。
{"title":"Domain Metric Driven Decomposition of Data-Intensive Applications","authors":"Matteo Camilli, Carmine Colarusso, B. Russo, E. Zimeo","doi":"10.1109/ISSREW51248.2020.00071","DOIUrl":"https://doi.org/10.1109/ISSREW51248.2020.00071","url":null,"abstract":"The microservices architectural style is picking up more and more momentum in IT industry for the development of systems as loosely coupled, collaborating services. Companies that undergo the migration of their own applications have aspirations such as increasing maintainability and the scale of operation. Such a process is worthwhile but not easy, since it should ensure atomic improvements to the overall architecture for each migration step. Furthermore, the systematic evaluation of migration steps becomes cumbersome without sensible optimization metrics that take into account performance and scalability under expected operational conditions. Recent lines of research recognize this task as challenging, especially in data-intensive applications where known approaches based, for instance, on Domain Driven Design may not be adequate. In this paper, we introduce an approach to evaluate a migration in an iterative way and recognize whether it represents an improvement in terms of performance and scalability. The approach leverages a Domain Metric-based analysis to quantitatively evaluate alternative architectures. We exemplified the envisioned approach on a data-intensive application case study in the domain of smart mobility. Preliminary results from our controlled experiments show the effectiveness of our approach to support systematic and automated evaluation of migration processes.","PeriodicalId":202247,"journal":{"name":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1