首页 > 最新文献

2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)最新文献

英文 中文
Realistic Predictors for Regression and Semantic Segmentation 回归和语义分割的现实预测
Krishna Chaitanya Gadepally, S. Dhal, Stavros Kalafatis, K. Nowka
Computer vision and image processing algorithms work well under strong assumptions. Computer vision algorithms are not expected to do well on all kinds of inputs. For instance, excessively noisy images may not fetch optimal results for most computer vision algorithms. Unexpected outputs from the computer vision module can have negative downstream consequences for other modules in the pipeline. To mitigate such consequences, we use a predictor framework that was simultaneously trained with a Hardness Predictor network. This framework guarantees improved performance over those images with lower "hardness" values. The proposed predictor framework, when applied to the input data, would result in a relatively lower variance estimator when the size of the training set is large, both in the domain of semantic segmentation as well as regression analysis.
计算机视觉和图像处理算法在强假设下工作良好。计算机视觉算法并不能很好地处理所有类型的输入。例如,对于大多数计算机视觉算法来说,过度噪声的图像可能无法获得最佳结果。计算机视觉模块的意外输出可能会对管道中的其他模块产生负面的下游后果。为了减轻这种后果,我们使用了一个与硬度预测器网络同时训练的预测器框架。这个框架保证了比那些具有较低“硬度”值的图像更好的性能。将所提出的预测器框架应用于输入数据时,无论是在语义分割领域还是在回归分析领域,当训练集的规模较大时,都会得到一个相对较小的方差估计量。
{"title":"Realistic Predictors for Regression and Semantic Segmentation","authors":"Krishna Chaitanya Gadepally, S. Dhal, Stavros Kalafatis, K. Nowka","doi":"10.1109/SERA57763.2023.10197824","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197824","url":null,"abstract":"Computer vision and image processing algorithms work well under strong assumptions. Computer vision algorithms are not expected to do well on all kinds of inputs. For instance, excessively noisy images may not fetch optimal results for most computer vision algorithms. Unexpected outputs from the computer vision module can have negative downstream consequences for other modules in the pipeline. To mitigate such consequences, we use a predictor framework that was simultaneously trained with a Hardness Predictor network. This framework guarantees improved performance over those images with lower \"hardness\" values. The proposed predictor framework, when applied to the input data, would result in a relatively lower variance estimator when the size of the training set is large, both in the domain of semantic segmentation as well as regression analysis.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128695386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Application of Content-based Image Hash Retrieval Algorithm 基于内容的图像哈希检索算法研究与应用
Xinqun Luo, Xingyu Tan
In order to store and manage a large amount of image information, we built a database retrieval system and studied and applied content-based image retrieval algorithms. We found that the difference hashing algorithm performs better than the perceptual hashing algorithm, the mean hashing algorithm and the histogram feature extraction algorithm in the scenario of handling a large number of images. Finally, we applied the difference-value hashing algorithm to a database retrieval system for a film festival to achieve in storing and retrieving a large amount of film materials.
为了存储和管理大量的图像信息,我们构建了数据库检索系统,研究并应用了基于内容的图像检索算法。我们发现,在处理大量图像的场景下,差分哈希算法的性能优于感知哈希算法、均值哈希算法和直方图特征提取算法。最后,我们将差值哈希算法应用到一个电影节数据库检索系统中,实现了对大量电影资料的存储和检索。
{"title":"Research and Application of Content-based Image Hash Retrieval Algorithm","authors":"Xinqun Luo, Xingyu Tan","doi":"10.1109/SERA57763.2023.10197838","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197838","url":null,"abstract":"In order to store and manage a large amount of image information, we built a database retrieval system and studied and applied content-based image retrieval algorithms. We found that the difference hashing algorithm performs better than the perceptual hashing algorithm, the mean hashing algorithm and the histogram feature extraction algorithm in the scenario of handling a large number of images. Finally, we applied the difference-value hashing algorithm to a database retrieval system for a film festival to achieve in storing and retrieving a large amount of film materials.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15 UNSW-NB15上超参数分类的深度学习模型比较研究
Seongsoo Kim, Lei Chen, Jongyeop Kim, Yiming Ji, Rami J. Haddad
Intrusion Detection System (IDS) is a crucial security mechanism for protecting computer networks from cyber-attacks. Deep learning models have the potential to detect attack types by leveraging their ability to learn and extract features from large volumes of data. In this study, we compare the performance of four different deep learning algorithms for IDS: Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), bidirectional LSTM, and bidirectional GRU. We evaluate the attack prediction accuracy for three types of attacks: Denial of Service (DoS), Generic, and Exploits. We vary each algorithm's range parameter and epochs and determine the best parameter combination sets for achieving the highest accuracy. Our experimental results demonstrate that increased range parameters influence the accuracy of LSTM, bi-LSTM, and Bi-GRU models. Ultimately, GRU proved to have the most outstanding performance among the four algorithms tested.
入侵检测系统(IDS)是保护计算机网络免受网络攻击的重要安全机制。深度学习模型利用其从大量数据中学习和提取特征的能力,具有检测攻击类型的潜力。在这项研究中,我们比较了四种不同的IDS深度学习算法的性能:长短期记忆(LSTM)、门控循环单元(GRU)、双向LSTM和双向GRU。我们评估了三种类型攻击的攻击预测准确性:拒绝服务(DoS),通用和漏洞利用。我们改变每个算法的范围参数和epoch,并确定实现最高精度的最佳参数组合集。实验结果表明,距离参数的增加会影响LSTM、bi-LSTM和Bi-GRU模型的精度。最终,在测试的四种算法中,GRU的性能最为突出。
{"title":"A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15","authors":"Seongsoo Kim, Lei Chen, Jongyeop Kim, Yiming Ji, Rami J. Haddad","doi":"10.1109/SERA57763.2023.10197694","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197694","url":null,"abstract":"Intrusion Detection System (IDS) is a crucial security mechanism for protecting computer networks from cyber-attacks. Deep learning models have the potential to detect attack types by leveraging their ability to learn and extract features from large volumes of data. In this study, we compare the performance of four different deep learning algorithms for IDS: Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), bidirectional LSTM, and bidirectional GRU. We evaluate the attack prediction accuracy for three types of attacks: Denial of Service (DoS), Generic, and Exploits. We vary each algorithm's range parameter and epochs and determine the best parameter combination sets for achieving the highest accuracy. Our experimental results demonstrate that increased range parameters influence the accuracy of LSTM, bi-LSTM, and Bi-GRU models. Ultimately, GRU proved to have the most outstanding performance among the four algorithms tested.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TI-former: A Time-Interval Prediction Transformer for Timestamped Sequences TI-former:时间戳序列的时间间隔预测转换器
Hye-Kyoung Ryu, Sara Yu, Ki Yong Lee
The Transformer is a widely used neural network architecture for natural language processing. Recently, it has been applied to time series prediction tasks. However, the vanilla transformer has a critical limitation in that it cannot predict the time intervals between elements. To overcome this limitation, we propose a new model architecture called TI-former (Time Interval Transformers) that predicts both the sequence elements and the time intervals between them. To incorporate the elements’ sequential order and temporal interval information, first we propose a new positional encoding method. Second, we modify the output layer to predict both the next sequence element and the time interval simultaneously. Lastly, we suggest a new loss function for timestamped sequences, namely Time soft-DTW, which measures similarity between sequences considering timestamps. We present experimental results based on synthetic sequence data. The experimental results show that our proposed model outperforms than vanilla transformer model in various sequence lengths, sequence numbers, and element occurrence time ranges.
Transformer是一种广泛应用于自然语言处理的神经网络架构。最近,它已被应用于时间序列预测任务。然而,普通转换器有一个关键的限制,它不能预测元素之间的时间间隔。为了克服这一限制,我们提出了一种新的模型架构,称为TI-former(时间间隔变压器),它可以预测序列元素和它们之间的时间间隔。为了融合元素的顺序和时间间隔信息,我们首先提出了一种新的位置编码方法。其次,我们修改输出层来同时预测下一个序列元素和时间间隔。最后,我们提出了一个新的时间戳序列损失函数,即时间软dtw,它衡量考虑时间戳的序列之间的相似性。本文给出了基于合成序列数据的实验结果。实验结果表明,该模型在不同的序列长度、序列号和元素出现时间范围上都优于普通变压器模型。
{"title":"TI-former: A Time-Interval Prediction Transformer for Timestamped Sequences","authors":"Hye-Kyoung Ryu, Sara Yu, Ki Yong Lee","doi":"10.1109/SERA57763.2023.10197830","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197830","url":null,"abstract":"The Transformer is a widely used neural network architecture for natural language processing. Recently, it has been applied to time series prediction tasks. However, the vanilla transformer has a critical limitation in that it cannot predict the time intervals between elements. To overcome this limitation, we propose a new model architecture called TI-former (Time Interval Transformers) that predicts both the sequence elements and the time intervals between them. To incorporate the elements’ sequential order and temporal interval information, first we propose a new positional encoding method. Second, we modify the output layer to predict both the next sequence element and the time interval simultaneously. Lastly, we suggest a new loss function for timestamped sequences, namely Time soft-DTW, which measures similarity between sequences considering timestamps. We present experimental results based on synthetic sequence data. The experimental results show that our proposed model outperforms than vanilla transformer model in various sequence lengths, sequence numbers, and element occurrence time ranges.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129453788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems 基于数字孪生的物联网系统数据采集的命名数据网络(NDN)
Hengshuo Liang, Cheng Qian, Chao Lu, Lauren Burgess, John Mulo, Wei Yu
With the rise and growing attention on Digital Twins (DT) as a way to provide integration between the Internet of Things (IoT) and data analytics, so does the need to consider how to address its challenges. To deal with these challenges, Named Data Networking (NDN) can be a possible solution. NDN has been rising in popularity due to its advancements over the traditional TCP/IP Internet architecture. In this paper, our approach begins with the framework that leverages an NDN-based DT architecture for data management. We then design two scenarios that focus on the performance of data querying in a small and large-scale simulated NDN-based DT architecture. Based on the designed scenarios, we conduct the performance evaluation of data query and DT performance to investigate the performance gap and determine whether an action needs to be taken.
随着数字孪生(DT)作为一种提供物联网(IoT)和数据分析之间集成的方式的兴起和越来越多的关注,也需要考虑如何应对其挑战。为了应对这些挑战,命名数据网络(NDN)可能是一种解决方案。NDN由于其在传统TCP/IP互联网架构上的进步而越来越受欢迎。在本文中,我们的方法从利用基于ndn的DT架构进行数据管理的框架开始。然后,我们设计了两个场景,重点关注小型和大规模模拟基于ndn的DT架构中的数据查询性能。根据设计的场景,我们对数据查询和DT性能进行性能评估,以调查性能差距,并确定是否需要采取行动。
{"title":"Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT Systems","authors":"Hengshuo Liang, Cheng Qian, Chao Lu, Lauren Burgess, John Mulo, Wei Yu","doi":"10.1109/SERA57763.2023.10197693","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197693","url":null,"abstract":"With the rise and growing attention on Digital Twins (DT) as a way to provide integration between the Internet of Things (IoT) and data analytics, so does the need to consider how to address its challenges. To deal with these challenges, Named Data Networking (NDN) can be a possible solution. NDN has been rising in popularity due to its advancements over the traditional TCP/IP Internet architecture. In this paper, our approach begins with the framework that leverages an NDN-based DT architecture for data management. We then design two scenarios that focus on the performance of data querying in a small and large-scale simulated NDN-based DT architecture. Based on the designed scenarios, we conduct the performance evaluation of data query and DT performance to investigate the performance gap and determine whether an action needs to be taken.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programming Model for Information Sharing among IoT Devices: Software Engineering Perspective 物联网设备间信息共享的编程模型:软件工程视角
Samuel Sungmin Cho, Myoungkyu Song
The Internet of Things (IoT) has become an essential part of our daily lives and society as a whole, but it is still hard to develop and deliver IoT applications because of the complexity of the inherent heterogeneity nature of IoT devices. In this paper, we present a programming model for IoT, especially focusing on effective sharing of information based on software engineering ideas such as conceptual integrity and managing complexity. We analyze four programming models, Lisp, Fortran, Smalltalk, and Haskell, to understand what factors or ideas made them successful in managing complexity to solve problems in various domains. Then, based on the analysis, we propose an IoT programming model with the conceptual integrity that ‘every information is represented as a map.’ When we share information only in the form of a map data structure—a set of (key, value) pairs, we can simplify the process that manages the lifetime of the information shared. Even more, when we share information only in the form of a map, we can use both probabilistic data structures to reduce the footprint of the information when we need size efficiency and a JSON (JavaScript Object Notation) type information when we need to share high-quality information. We propose an architecture to accomplish this goal and implement a virtual machine to explain how information is generated, processed, and stored in the form of a map data structure.
物联网(IoT)已经成为我们日常生活和整个社会的重要组成部分,但由于物联网设备固有的异构性的复杂性,开发和交付物联网应用仍然很困难。在本文中,我们提出了一个物联网的编程模型,特别关注基于软件工程思想(如概念完整性和管理复杂性)的信息有效共享。我们分析了四种编程模型,Lisp, Fortran, Smalltalk和Haskell,以了解是什么因素或思想使它们成功地管理复杂性以解决各种领域的问题。然后,在分析的基础上,我们提出了一个物联网编程模型,其概念完整性是“每个信息都表示为地图”。当我们仅以map数据结构(一组(键、值)对)的形式共享信息时,我们可以简化管理共享信息生命周期的过程。更重要的是,当我们只以映射的形式共享信息时,当我们需要大小效率时,我们可以使用概率数据结构来减少信息的占用,当我们需要共享高质量的信息时,我们可以使用JSON (JavaScript Object Notation)类型信息。我们提出了一个架构来实现这一目标,并实现了一个虚拟机来解释信息是如何以地图数据结构的形式生成、处理和存储的。
{"title":"Programming Model for Information Sharing among IoT Devices: Software Engineering Perspective","authors":"Samuel Sungmin Cho, Myoungkyu Song","doi":"10.1109/SERA57763.2023.10197720","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197720","url":null,"abstract":"The Internet of Things (IoT) has become an essential part of our daily lives and society as a whole, but it is still hard to develop and deliver IoT applications because of the complexity of the inherent heterogeneity nature of IoT devices. In this paper, we present a programming model for IoT, especially focusing on effective sharing of information based on software engineering ideas such as conceptual integrity and managing complexity. We analyze four programming models, Lisp, Fortran, Smalltalk, and Haskell, to understand what factors or ideas made them successful in managing complexity to solve problems in various domains. Then, based on the analysis, we propose an IoT programming model with the conceptual integrity that ‘every information is represented as a map.’ When we share information only in the form of a map data structure—a set of (key, value) pairs, we can simplify the process that manages the lifetime of the information shared. Even more, when we share information only in the form of a map, we can use both probabilistic data structures to reduce the footprint of the information when we need size efficiency and a JSON (JavaScript Object Notation) type information when we need to share high-quality information. We propose an architecture to accomplish this goal and implement a virtual machine to explain how information is generated, processed, and stored in the form of a map data structure.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127422507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case Study 自动驾驶汽车的保障案例驱动开发范式:第110届赛车案例研究
Ioannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, S. Drager
Autonomous driving has drawn great interest from both industry and academia. Due to some serious consequences such as loss of life caused by autonomous vehicles, assurance certification has been proposed in the automotive industry to ensure safe self-adaptive behaviors at run-time in autonomous cars. Central to assurance certification are assurance cases that provide compelling, comprehensive, and valid argument structures showing a system is safe in a given environment. However, many existing approaches generate assurance cases as a by-product of a system. In this paper, we will present a novel development paradigm that employs assurance cases to guide an autonomous vehicle to operate correctly and safely at run-time. Specifically, we consider an F1TENTH racing car as an example to illustrate how the assurance case driven paradigm can guide the vehicle to achieve safe and reliable self-adaptive behavior at run-time.
自动驾驶已经引起了业界和学术界的极大兴趣。由于自动驾驶汽车会造成生命损失等严重后果,汽车行业提出了保证认证,以确保自动驾驶汽车在运行时的安全自适应行为。保证认证的核心是保证用例,它提供了引人注目的、全面的和有效的论证结构,表明系统在给定环境中是安全的。然而,许多现有的方法作为系统的副产品生成保证案例。在本文中,我们将提出一种新的开发范例,该范例采用保证案例来指导自动驾驶车辆在运行时正确安全地运行。具体来说,我们以f110赛车为例,说明保证案例驱动范式如何指导车辆在运行时实现安全可靠的自适应行为。
{"title":"An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case Study","authors":"Ioannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, S. Drager","doi":"10.1109/SERA57763.2023.10197746","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197746","url":null,"abstract":"Autonomous driving has drawn great interest from both industry and academia. Due to some serious consequences such as loss of life caused by autonomous vehicles, assurance certification has been proposed in the automotive industry to ensure safe self-adaptive behaviors at run-time in autonomous cars. Central to assurance certification are assurance cases that provide compelling, comprehensive, and valid argument structures showing a system is safe in a given environment. However, many existing approaches generate assurance cases as a by-product of a system. In this paper, we will present a novel development paradigm that employs assurance cases to guide an autonomous vehicle to operate correctly and safely at run-time. Specifically, we consider an F1TENTH racing car as an example to illustrate how the assurance case driven paradigm can guide the vehicle to achieve safe and reliable self-adaptive behavior at run-time.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116362323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote: Support of Assurance-based Software Development for Cyber-Physical Systems 主题演讲:支持基于保证的网络物理系统软件开发
{"title":"Keynote: Support of Assurance-based Software Development for Cyber-Physical Systems","authors":"","doi":"10.1109/sera57763.2023.10197675","DOIUrl":"https://doi.org/10.1109/sera57763.2023.10197675","url":null,"abstract":"","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124510061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review on Test Case Prioritization and Regression Test Selection 测试用例优先级和回归测试选择的系统文献综述
Zhengxinchao Xiao, Lei Xiao
Regression testing is a crucial component of software testing and a crucial tool for ensuring the quality of software. An appropriate optimization method is essential for maximizing productivity and reducing expenses in regression testing. Test case prioritization (TCP) and regression test selection (RTS) are two popular methods in regression testing. This paper provides a qualitative analysis of 18 TCP and 17 RTS publications from the last five years. This paper presents four main issues. The first covers the most popular TCP techniques, the second covers the most popular RTS methods, the third covers the most popular metrics for measuring TCP and RTS, and the fourth covers data sources. Based on this study, we draw the following conclusions: (1) Defect prediction and machine learning-based TCP methods, machine learning, multi-objective, and model-based RTS methods will receive additional attention in future. (2) Defects4J is the most commonly used data set in TCP in the past five years. SIR and GitHub are the most commonly used datasets in RTS. (3) The most widely used measurement methods in TCP and RTS are APFD and cost, respectively. In future, researchers will use these two indicators to conduct a more comprehensive evaluation together with cost, fault detection capability, and test coverage.
回归测试是软件测试的重要组成部分,也是保证软件质量的重要工具。在回归测试中,适当的优化方法对于最大化生产力和减少费用是必不可少的。测试用例优先排序(TCP)和回归测试选择(RTS)是回归测试中常用的两种方法。本文对近五年来的18篇TCP和17篇RTS出版物进行了定性分析。本文提出了四个主要问题。第一部分介绍了最流行的TCP技术,第二部分介绍了最流行的RTS方法,第三部分介绍了衡量TCP和RTS的最流行指标,第四部分介绍了数据源。基于本研究,我们得出以下结论:(1)基于缺陷预测和机器学习的TCP方法、机器学习、多目标和基于模型的RTS方法将在未来得到更多的关注。(2)缺陷4j是TCP在过去五年中最常用的数据集。SIR和GitHub是RTS中最常用的数据集。(3) TCP和RTS中使用最广泛的测量方法分别是APFD和cost。未来,研究人员将使用这两个指标与成本、故障检测能力和测试覆盖率一起进行更全面的评估。
{"title":"A Systematic Literature Review on Test Case Prioritization and Regression Test Selection","authors":"Zhengxinchao Xiao, Lei Xiao","doi":"10.1109/SERA57763.2023.10197719","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197719","url":null,"abstract":"Regression testing is a crucial component of software testing and a crucial tool for ensuring the quality of software. An appropriate optimization method is essential for maximizing productivity and reducing expenses in regression testing. Test case prioritization (TCP) and regression test selection (RTS) are two popular methods in regression testing. This paper provides a qualitative analysis of 18 TCP and 17 RTS publications from the last five years. This paper presents four main issues. The first covers the most popular TCP techniques, the second covers the most popular RTS methods, the third covers the most popular metrics for measuring TCP and RTS, and the fourth covers data sources. Based on this study, we draw the following conclusions: (1) Defect prediction and machine learning-based TCP methods, machine learning, multi-objective, and model-based RTS methods will receive additional attention in future. (2) Defects4J is the most commonly used data set in TCP in the past five years. SIR and GitHub are the most commonly used datasets in RTS. (3) The most widely used measurement methods in TCP and RTS are APFD and cost, respectively. In future, researchers will use these two indicators to conduct a more comprehensive evaluation together with cost, fault detection capability, and test coverage.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations 基于2g按键和鼠标操作的编程性能分析
Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden
Individual differences in programming performance are very large. For objectivity in programming performance, there is a strong need to quantitatively evaluate programming performance of individual developer. In this study, we conduct an experiment to measure programmers’ behaviors including keystrokes and mouse operations of fourteen subjects, and analyze correlations between them and programming performance. The experimental results show that those who check a lot of program operation and those who use shortcut keys frequently had higher programming performance. In addition, subjects who spent a lot of time searching on the web, compiled a lot, and rewrote a lot of code had lower programming performance.
编程性能的个体差异非常大。为了实现编程性能的客观性,有必要对单个开发人员的编程性能进行定量评价。在本研究中,我们通过实验测量了14名被试的程序员的键盘和鼠标操作行为,并分析了这些行为与编程性能之间的相关性。实验结果表明,检查大量程序操作和频繁使用快捷键的人具有较高的编程性能。此外,花费大量时间在网络上搜索、编译和重写大量代码的受试者的编程性能较低。
{"title":"Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations","authors":"Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden","doi":"10.1109/SERA57763.2023.10197645","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197645","url":null,"abstract":"Individual differences in programming performance are very large. For objectivity in programming performance, there is a strong need to quantitatively evaluate programming performance of individual developer. In this study, we conduct an experiment to measure programmers’ behaviors including keystrokes and mouse operations of fourteen subjects, and analyze correlations between them and programming performance. The experimental results show that those who check a lot of program operation and those who use shortcut keys frequently had higher programming performance. In addition, subjects who spent a lot of time searching on the web, compiled a lot, and rewrote a lot of code had lower programming performance.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1