首页 > 最新文献

2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)最新文献

英文 中文
Which Library Should I Use?: A Metric-Based Comparison of Software Libraries 我应该使用哪个图书馆?基于度量的软件库比较
Fernando López de la Mora, Sarah Nadi
Software libraries ease development tasks by allowing client developers to reuse code written by third parties. To perform a specific task, there is usually a large number of libraries that offer the desired functionality. Unfortunately, selecting the appropriate library to use is not straightforward since developers are often unaware of the advantages and disadvantages of each library, and may also care about different characteristics in different situations. In this paper, we introduce the idea of using software metrics to help developers choose the libraries most suited to their needs. We propose creating library comparisons based on several metrics extracted from multiple sources such as software repositories, issue tracking systems, and Q&A websites. By consolidating all of this information in a single website, we enable developers to make informed decisions by comparing metric data belonging to libraries from several domains. Additionally, we will use this website to survey developers about which metrics are the most valuable to them, helping us answer the broader question of what determines library quality. In this short paper, we describe the metrics we propose in our work and present preliminary results, as well as faced challenges.
软件库允许客户端开发人员重用第三方编写的代码,从而简化了开发任务。为了执行特定的任务,通常有大量的库提供所需的功能。不幸的是,选择合适的库并不是一件简单的事情,因为开发人员通常不知道每个库的优缺点,而且可能还关心不同情况下的不同特性。在本文中,我们介绍了使用软件度量来帮助开发人员选择最适合他们需要的库的想法。我们建议基于从多个来源(如软件存储库、问题跟踪系统和问答网站)提取的几个指标创建库比较。通过将所有这些信息整合到一个网站中,我们使开发人员能够通过比较来自几个领域的库的度量数据来做出明智的决策。此外,我们将使用这个网站调查开发人员,了解哪些指标对他们最有价值,帮助我们回答决定库质量的更广泛的问题。在这篇短文中,我们描述了我们在工作中提出的指标,并提出了初步结果,以及面临的挑战。
{"title":"Which Library Should I Use?: A Metric-Based Comparison of Software Libraries","authors":"Fernando López de la Mora, Sarah Nadi","doi":"10.1145/3183399.3183418","DOIUrl":"https://doi.org/10.1145/3183399.3183418","url":null,"abstract":"Software libraries ease development tasks by allowing client developers to reuse code written by third parties. To perform a specific task, there is usually a large number of libraries that offer the desired functionality. Unfortunately, selecting the appropriate library to use is not straightforward since developers are often unaware of the advantages and disadvantages of each library, and may also care about different characteristics in different situations. In this paper, we introduce the idea of using software metrics to help developers choose the libraries most suited to their needs. We propose creating library comparisons based on several metrics extracted from multiple sources such as software repositories, issue tracking systems, and Q&A websites. By consolidating all of this information in a single website, we enable developers to make informed decisions by comparing metric data belonging to libraries from several domains. Additionally, we will use this website to survey developers about which metrics are the most valuable to them, helping us answer the broader question of what determines library quality. In this short paper, we describe the metrics we propose in our work and present preliminary results, as well as faced challenges.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Software Ecosystem Call Graph for Dependency Management 依赖管理的软件生态系统调用图
J. Hejderup, A. Deursen, Georgios Gousios
A popular form of software reuse is the use of open source software libraries hosted on centralized code repositories, such as Maven or npm. Developers only need to declare dependencies to external libraries, and automated tools make them available to the workspace of the project. Recent incidents, such as the Equifax data breach and the leftpad package removal, demonstrate the difficulty in assessing the severity, impact and spread of bugs in dependency networks. While dependency checkers are being adapted as a counter measure, they only provide indicative information. To remedy this situation, we propose a fine-grained dependency network that goes beyond packages and into call graphs. The result is a versioned ecosystem-level call graph. In this paper, we outline the process to construct the proposed graph and present a preliminary evaluation of a security issue from a core package to an affected client application.
软件重用的一种流行形式是使用托管在集中式代码存储库(如Maven或npm)上的开源软件库。开发人员只需要声明对外部库的依赖关系,自动化工具使它们对项目的工作空间可用。最近发生的事件,如Equifax数据泄露和left - pad软件包删除,表明了评估依赖网络中漏洞的严重性、影响和传播的难度。虽然依赖检查器被用作一种对抗措施,但它们只提供指示性信息。为了纠正这种情况,我们提出了一个细粒度的依赖网络,它超越了包,进入了调用图。结果是一个版本化的生态系统级调用图。在本文中,我们概述了构建建议图的过程,并对从核心包到受影响的客户端应用程序的安全问题进行了初步评估。
{"title":"Software Ecosystem Call Graph for Dependency Management","authors":"J. Hejderup, A. Deursen, Georgios Gousios","doi":"10.1145/3183399.3183417","DOIUrl":"https://doi.org/10.1145/3183399.3183417","url":null,"abstract":"A popular form of software reuse is the use of open source software libraries hosted on centralized code repositories, such as Maven or npm. Developers only need to declare dependencies to external libraries, and automated tools make them available to the workspace of the project. Recent incidents, such as the Equifax data breach and the leftpad package removal, demonstrate the difficulty in assessing the severity, impact and spread of bugs in dependency networks. While dependency checkers are being adapted as a counter measure, they only provide indicative information. To remedy this situation, we propose a fine-grained dependency network that goes beyond packages and into call graphs. The result is a versioned ecosystem-level call graph. In this paper, we outline the process to construct the proposed graph and present a preliminary evaluation of a security issue from a core package to an affected client application.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
From Craft to Science: The Road Ahead for Empirical Software Engineering Research 从工艺到科学:实证软件工程研究的前进道路
M. Galster, Danny Weyns, A. Tang, R. Kazman, Mehdi Mirakhorli
Empirical software engineering (SE) research is often criticized for poorly designed and reported studies, a lack of replications to build up bodies of knowledge, and little practical relevance. In this paper, we discuss issues in empirical software architecture research as an illustration of these issues in one subfield of SE and as a step towards better understanding empirical research in SE in general. Based on feedback from software architecture researchers and practitioners, we explore why, despite persistent discussions in the SE research community, there are still disagreements about why and how to conduct empirical research. Then, we explore how empirical SE research can progress beyond "one-off" studies and endless "new and exciting" results toward SE research as a mature science. This would allow us to establish foundations for evaluating existing and future empirical research and help researchers design and publish better studies.
经验软件工程(SE)研究经常被批评为设计不良和报告不良的研究,缺乏建立知识体系的复制,以及很少的实际相关性。在本文中,我们讨论了实证软件体系结构研究中的问题,作为SE的一个子领域中的这些问题的例证,并作为更好地理解SE的总体实证研究的一步。基于来自软件架构研究者和实践者的反馈,我们探索了为什么,尽管在SE研究社区中有持续的讨论,对于为什么以及如何进行实证研究仍然存在分歧。然后,我们探讨了实证SE研究如何超越“一次性”研究和无休止的“新的和令人兴奋的”结果,使SE研究成为一门成熟的科学。这将使我们能够为评估现有和未来的实证研究建立基础,并帮助研究人员设计和发表更好的研究。
{"title":"From Craft to Science: The Road Ahead for Empirical Software Engineering Research","authors":"M. Galster, Danny Weyns, A. Tang, R. Kazman, Mehdi Mirakhorli","doi":"10.1145/3183399.3183421","DOIUrl":"https://doi.org/10.1145/3183399.3183421","url":null,"abstract":"Empirical software engineering (SE) research is often criticized for poorly designed and reported studies, a lack of replications to build up bodies of knowledge, and little practical relevance. In this paper, we discuss issues in empirical software architecture research as an illustration of these issues in one subfield of SE and as a step towards better understanding empirical research in SE in general. Based on feedback from software architecture researchers and practitioners, we explore why, despite persistent discussions in the SE research community, there are still disagreements about why and how to conduct empirical research. Then, we explore how empirical SE research can progress beyond \"one-off\" studies and endless \"new and exciting\" results toward SE research as a mature science. This would allow us to establish foundations for evaluating existing and future empirical research and help researchers design and publish better studies.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132831846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Images of Code: Lossy Compression for Native Instructions 代码图像:本机指令的有损压缩
M. Rodriguez-Cancio, Jules White, B. Baudry
Developers can use lossy compression on images and many other artifacts to reduce size and improve network transfer times. Native program instructions, however, are typically not considered candi-dates for lossy compression since arbitrary losses in instructions may dramatically affect program output. In this paper we show that lossy compression of compiled native instructions is possible in certain circumstances. We demonstrate that the instructions sequence of a program can be lossily translated into a separate but equivalent program with instruction-wise differences, which still produces the same output. We contribute the novel insight that it is possible to exploit such instruction differences to design lossy compression schemes for native code. We support this idea with sound and unsound program transformations that improve performance of compression techniques such as Run-Length (RLE), Huffman and LZ77. We also show that large areas of code can endure tampered instructions with no impact on the output, a result consistent with previous works from various communities.
开发人员可以对图像和许多其他工件使用有损压缩来减小尺寸并改善网络传输时间。然而,本机程序指令通常不被认为是有损压缩的候选对象,因为指令中的任意丢失可能会极大地影响程序输出。在本文中,我们展示了在某些情况下编译的本机指令的有损压缩是可能的。我们证明了一个程序的指令序列可以被损耗地转换成一个独立的但具有指令方面差异的等效程序,它仍然产生相同的输出。我们提出了一种新的见解,即利用这种指令差异来设计本机代码的有损压缩方案是可能的。我们用健全和不健全的程序转换来支持这个想法,这些转换可以提高压缩技术的性能,如运行长度(RLE)、霍夫曼和LZ77。我们还表明,大面积的代码可以承受被篡改的指令,而不会对输出产生影响,这与各个社区以前的工作结果一致。
{"title":"Images of Code: Lossy Compression for Native Instructions","authors":"M. Rodriguez-Cancio, Jules White, B. Baudry","doi":"10.1145/3183399.3183409","DOIUrl":"https://doi.org/10.1145/3183399.3183409","url":null,"abstract":"Developers can use lossy compression on images and many other artifacts to reduce size and improve network transfer times. Native program instructions, however, are typically not considered candi-dates for lossy compression since arbitrary losses in instructions may dramatically affect program output. In this paper we show that lossy compression of compiled native instructions is possible in certain circumstances. We demonstrate that the instructions sequence of a program can be lossily translated into a separate but equivalent program with instruction-wise differences, which still produces the same output. We contribute the novel insight that it is possible to exploit such instruction differences to design lossy compression schemes for native code. We support this idea with sound and unsound program transformations that improve performance of compression techniques such as Run-Length (RLE), Huffman and LZ77. We also show that large areas of code can endure tampered instructions with no impact on the output, a result consistent with previous works from various communities.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115437188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Retrospective Based on Data-Driven Persona Significance in B-to-B Software Development b2b软件开发中基于数据驱动角色意义的回顾
Yasuhiro Watanabe, H. Washizaki, Kiyoshi Honda, Y. Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki
A Business-to-Business (B-to-B) software development company develops services to satisfy their customers' requirements. Developers should prioritize customer satisfaction because customers greatly influence on agile software development. However, it is possible that a B-to-B software development company has following issues: 1) failure to understand actual users because the requirements are not often derived from actual users and 2) failure to satisfy the future customers' requirements when only satisfying current customers. Although many previous works proposed methods to elicit the requirements based on actual quantitative data, these works had not considered customers and end-users simultaneously. Herein we proposed Retrospective based on Data-Driven Persona Significance (ReD2PS) to help developers to plan future releases. ReD2PS includes Persona Significance Index (PerSiI) to reflect the correspondence between target users, which developers assume based on requirements in releases, and end-users' personas. A case study involving a Japanese cloud application shows that PerSiI reflects the relationship between target users and end-users to discuss about the validity and effectiveness of ReD2PS.
企业对企业(b2b)软件开发公司开发服务以满足客户的需求。开发人员应该优先考虑客户满意度,因为客户对敏捷软件开发有很大的影响。然而,b2b软件开发公司可能存在以下问题:1)无法理解实际用户,因为需求通常不是来自实际用户;2)当只满足当前客户时,无法满足未来客户的需求。虽然以前的许多工作提出了基于实际定量数据的需求引出方法,但这些工作没有同时考虑客户和最终用户。在此,我们提出了基于数据驱动角色重要性(ReD2PS)的回顾,以帮助开发人员计划未来的版本。ReD2PS包括人物角色重要性指数(Persona Significance Index, PerSiI)来反映目标用户之间的对应关系,开发人员根据发布版本中的需求假设目标用户与最终用户的人物角色之间的对应关系。一个涉及日本云应用程序的案例研究表明,PerSiI反映了目标用户和最终用户之间的关系,以讨论ReD2PS的有效性和有效性。
{"title":"Retrospective Based on Data-Driven Persona Significance in B-to-B Software Development","authors":"Yasuhiro Watanabe, H. Washizaki, Kiyoshi Honda, Y. Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki","doi":"10.1145/3183399.3183410","DOIUrl":"https://doi.org/10.1145/3183399.3183410","url":null,"abstract":"A Business-to-Business (B-to-B) software development company develops services to satisfy their customers' requirements. Developers should prioritize customer satisfaction because customers greatly influence on agile software development. However, it is possible that a B-to-B software development company has following issues: 1) failure to understand actual users because the requirements are not often derived from actual users and 2) failure to satisfy the future customers' requirements when only satisfying current customers. Although many previous works proposed methods to elicit the requirements based on actual quantitative data, these works had not considered customers and end-users simultaneously. Herein we proposed Retrospective based on Data-Driven Persona Significance (ReD2PS) to help developers to plan future releases. ReD2PS includes Persona Significance Index (PerSiI) to reflect the correspondence between target users, which developers assume based on requirements in releases, and end-users' personas. A case study involving a Japanese cloud application shows that PerSiI reflects the relationship between target users and end-users to discuss about the validity and effectiveness of ReD2PS.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measure Confidence of Assurance Cases in Safety-Critical Domains 在安全关键领域测量保证案例的置信度
Chung-Ling Lin, Wuwei Shen, S. Drager, B. Cheng
Evaluation of assurance cases typically requires certifiers' domain knowledge and experience, and, as such, most software certification has been conducted manually. Given the advancement in uncertainty theories and software traceability, we envision that these technologies can synergistically be combined and leveraged to offer some degree of automation to improve the certifiers' capability to perform software certification. To this end, we present a novel confidence calculation framework that 1) applies the Dempster-Shafer theory as a mathematical model to calculate the confidence between a parent claim and its children claims; and 2) uses the vector space model to evaluate the confidence for the evidence items using traceability information. A fragment of an assurance case (expressed in the goal-structuring notation – GSN) for the coupled tank system is used to illustrate our new framework.
保证案例的评估通常需要认证人员的领域知识和经验,因此,大多数软件认证都是手动进行的。考虑到不确定性理论和软件可追溯性的进步,我们设想这些技术可以协同地结合起来,并利用它们来提供某种程度的自动化,以提高认证机构执行软件认证的能力。为此,我们提出了一个新的置信度计算框架:1)应用Dempster-Shafer理论作为数学模型来计算父索赔与其子索赔之间的置信度;2)利用向量空间模型对可追溯性信息的证据项进行置信度评估。一个保证案例的片段(用目标结构符号- GSN表示)用于耦合罐系统来说明我们的新框架。
{"title":"Measure Confidence of Assurance Cases in Safety-Critical Domains","authors":"Chung-Ling Lin, Wuwei Shen, S. Drager, B. Cheng","doi":"10.1145/3183399.3183419","DOIUrl":"https://doi.org/10.1145/3183399.3183419","url":null,"abstract":"Evaluation of assurance cases typically requires certifiers' domain knowledge and experience, and, as such, most software certification has been conducted manually. Given the advancement in uncertainty theories and software traceability, we envision that these technologies can synergistically be combined and leveraged to offer some degree of automation to improve the certifiers' capability to perform software certification. To this end, we present a novel confidence calculation framework that 1) applies the Dempster-Shafer theory as a mathematical model to calculate the confidence between a parent claim and its children claims; and 2) uses the vector space model to evaluate the confidence for the evidence items using traceability information. A fragment of an assurance case (expressed in the goal-structuring notation – GSN) for the coupled tank system is used to illustrate our new framework.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Deep Customization of Multi-tenant SaaS Using Intrusive Microservices 使用侵入式微服务的多租户SaaS深度定制
Hui Song, Franck Chauvel, Arnor Solberg
Enterprise software needs to be customizable, and the customization needs from a customer are often beyond what the software vendor can predict in advance. In the on-premises era, customers do deep customizations beyond vendor's prediction by directly modifying the vendor's source code and then build and operate it on their own premises. When enterprise software is moving to cloud-based multi-tenant SaaS (Software as a Service), it is no longer possible for customers to directly modify the vendor's source code, because the same instance of code is shared by multiple customers at runtime. Therefore, the question is whether it is still possible to do deep customization on multi-tenant SaaS. In this paper, we give an answer to this question with a novel architecture style to realize deep customization of SaaS using intrusive microservices. We evaluate the approach on an open source online commercial system, and discuss the further research questions to make deep customization applicable in practice.
企业软件需要可定制,而客户的定制需求通常超出了软件供应商可以提前预测的范围。在本地时代,客户通过直接修改供应商的源代码,然后在自己的本地构建和操作它,来进行超出供应商预测的深度定制。当企业软件迁移到基于云的多租户SaaS(软件即服务)时,客户不再可能直接修改供应商的源代码,因为相同的代码实例在运行时由多个客户共享。因此,问题是是否仍然有可能在多租户SaaS上进行深度定制。在本文中,我们用一种新颖的架构风格来解决这个问题,利用侵入式微服务实现SaaS的深度定制。我们在一个开源在线商业系统上对该方法进行了评估,并讨论了进一步研究的问题,以使深度定制在实践中得到应用。
{"title":"Deep Customization of Multi-tenant SaaS Using Intrusive Microservices","authors":"Hui Song, Franck Chauvel, Arnor Solberg","doi":"10.1145/3183399.3183407","DOIUrl":"https://doi.org/10.1145/3183399.3183407","url":null,"abstract":"Enterprise software needs to be customizable, and the customization needs from a customer are often beyond what the software vendor can predict in advance. In the on-premises era, customers do deep customizations beyond vendor's prediction by directly modifying the vendor's source code and then build and operate it on their own premises. When enterprise software is moving to cloud-based multi-tenant SaaS (Software as a Service), it is no longer possible for customers to directly modify the vendor's source code, because the same instance of code is shared by multiple customers at runtime. Therefore, the question is whether it is still possible to do deep customization on multi-tenant SaaS. In this paper, we give an answer to this question with a novel architecture style to realize deep customization of SaaS using intrusive microservices. We evaluate the approach on an open source online commercial system, and discuss the further research questions to make deep customization applicable in practice.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Generative Secure Design, Defined 生成安全设计,定义
R. Scandariato, Jennifer Horkoff, R. Feldt
In software-intensive industries, companies face the constant challenge of not having enough security experts on staff in order to validate the design of the high-complexity projects they run. Many of these companies are now realizing that increasing automation in their secure development process is the only way forward in order to cope with the ultra-large scale of modern systems. This paper embraces that viewpoint. We chart the roadmap to the development of a generative design tool that iteratively produces several design alternatives, each attempting to solve the security goals by incorporating security mechanisms. The tool explores the possible solutions by starting from well-known security techniques and by creating variations via mutations and crossovers. By incorporating user feedback, the tool generates increasingly better design alternatives.
在软件密集型行业中,公司经常面临员工中没有足够的安全专家来验证他们运行的高复杂性项目的设计的挑战。这些公司中的许多现在都意识到,为了应对超大规模的现代系统,在其安全开发过程中增加自动化是唯一的前进道路。本文采纳了这一观点。我们绘制了生成式设计工具的开发路线图,该工具迭代地产生几个设计替代方案,每个设计方案都试图通过合并安全机制来解决安全目标。该工具通过从众所周知的安全技术开始,并通过突变和交叉创建变化,探索可能的解决方案。通过结合用户反馈,该工具可以生成越来越好的设计方案。
{"title":"Generative Secure Design, Defined","authors":"R. Scandariato, Jennifer Horkoff, R. Feldt","doi":"10.1145/3183399.3183400","DOIUrl":"https://doi.org/10.1145/3183399.3183400","url":null,"abstract":"In software-intensive industries, companies face the constant challenge of not having enough security experts on staff in order to validate the design of the high-complexity projects they run. Many of these companies are now realizing that increasing automation in their secure development process is the only way forward in order to cope with the ultra-large scale of modern systems. This paper embraces that viewpoint. We chart the roadmap to the development of a generative design tool that iteratively produces several design alternatives, each attempting to solve the security goals by incorporating security mechanisms. The tool explores the possible solutions by starting from well-known security techniques and by creating variations via mutations and crossovers. By incorporating user feedback, the tool generates increasingly better design alternatives.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning UI Design Patterns of Mobile Apps 移动应用的深度学习UI设计模式
Tam The Nguyen, P. Vu, H. Pham, T. Nguyen
User interface (UI) is one of the most important components of a mobile app and strongly influences users' perception of the app. However, UI design tasks are typically manual and time-consuming. This paper proposes a novel approach to (semi)-automate those tasks. Our key idea is to develop and deploy advanced deep learning models based on recurrent neural networks (RNN) and generative adversarial networks (GAN) to learn UI design patterns from millions of currently available mobile apps. Once trained, those models can be used to search for UI design samples given user-provided descriptions written in natural language and generate professional-looking UI designs from simpler, less elegant design drafts.
用户界面(UI)是移动应用最重要的组成部分之一,它强烈地影响着用户对应用的看法。然而,UI设计任务通常是手动且耗时的。本文提出了一种(半)自动化这些任务的新方法。我们的主要想法是开发和部署基于循环神经网络(RNN)和生成对抗网络(GAN)的高级深度学习模型,从数百万当前可用的移动应用程序中学习UI设计模式。经过训练后,这些模型可以用来搜索用户提供的自然语言描述的UI设计样本,并从更简单、不那么优雅的设计草稿中生成专业的UI设计。
{"title":"Deep Learning UI Design Patterns of Mobile Apps","authors":"Tam The Nguyen, P. Vu, H. Pham, T. Nguyen","doi":"10.1145/3183399.3183422","DOIUrl":"https://doi.org/10.1145/3183399.3183422","url":null,"abstract":"User interface (UI) is one of the most important components of a mobile app and strongly influences users' perception of the app. However, UI design tasks are typically manual and time-consuming. This paper proposes a novel approach to (semi)-automate those tasks. Our key idea is to develop and deploy advanced deep learning models based on recurrent neural networks (RNN) and generative adversarial networks (GAN) to learn UI design patterns from millions of currently available mobile apps. Once trained, those models can be used to search for UI design samples given user-provided descriptions written in natural language and generate professional-looking UI designs from simpler, less elegant design drafts.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Efficient Parametric Model Checking Using Domain-Specific Modelling Patterns 使用领域特定建模模式的有效参数模型检查
R. Calinescu, Kenneth Johnson, Colin Paterson
We propose a parametric model checking (PMC) method that enables the efficient analysis of quality-of-service (QoS) properties of component-based systems. Our method builds on recent advances in PMC techniques and tools, and can handle large models by exploiting domain-specific modelling patterns for the software components. We precompute closed-form expressions for key QoS properties of such patterns, and handle system-level PMC by combining these expressions into easy-to-evaluate systems of equations.
我们提出了一种参数模型检查(PMC)方法,能够有效地分析基于组件的系统的服务质量(QoS)属性。我们的方法建立在PMC技术和工具的最新进展之上,并且可以通过为软件组件开发特定于领域的建模模式来处理大型模型。我们预先计算了这些模式的关键QoS属性的封闭形式表达式,并通过将这些表达式组合成易于评估的方程组来处理系统级PMC。
{"title":"Efficient Parametric Model Checking Using Domain-Specific Modelling Patterns","authors":"R. Calinescu, Kenneth Johnson, Colin Paterson","doi":"10.1145/3183399.3183404","DOIUrl":"https://doi.org/10.1145/3183399.3183404","url":null,"abstract":"We propose a parametric model checking (PMC) method that enables the efficient analysis of quality-of-service (QoS) properties of component-based systems. Our method builds on recent advances in PMC techniques and tools, and can handle large models by exploiting domain-specific modelling patterns for the software components. We precompute closed-form expressions for key QoS properties of such patterns, and handle system-level PMC by combining these expressions into easy-to-evaluate systems of equations.","PeriodicalId":212579,"journal":{"name":"2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122517888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1