首页 > 最新文献

Proceedings of the 16th Innovations in Software Engineering Conference最新文献

英文 中文
A Report on Tutorials and Tech-Briefings co-located with ISEC 2023
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3581751
Diptikalyan Saha, S. Nejati
The tutorial and technical briefing track at ISEC 2023 was aimed to provide an opportunity for conference participants to learn, explore and have hands-on experience on interesting topics in the broad area of software engineering. In this report we present a brief description of the track followed by the accepted entries.
ISEC 2023的教程和技术简报旨在为会议参与者提供学习、探索和实践软件工程广泛领域有趣主题的机会。在本报告中,我们简要介绍了接受的条目之后的轨道。
{"title":"A Report on Tutorials and Tech-Briefings co-located with ISEC 2023","authors":"Diptikalyan Saha, S. Nejati","doi":"10.1145/3578527.3581751","DOIUrl":"https://doi.org/10.1145/3578527.3581751","url":null,"abstract":"The tutorial and technical briefing track at ISEC 2023 was aimed to provide an opportunity for conference participants to learn, explore and have hands-on experience on interesting topics in the broad area of software engineering. In this report we present a brief description of the track followed by the accepted entries.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Faults in Microservices using Petri Nets 基于Petri网的微服务故障检测
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578541
Sulochan Naik, Meenakshi D'Souza
Despite higher adoption of Microservices worldwide, there is a lack of work on possible fault detection during early phases such as at requirements and design phase. We propose a novel way to detect faults using model checking CTL specifications and a SMT solver. Requirements of a system involving microservices are mapped to Netflix’s Conductor specification which is later converted into Petri nets for further analysis. Traversal analysis on the converted Petri nets not only allows us to detect a faulty specification but to correct it and adopt a better design. We tried our methodology on the TrainTicket benchmark system and we are able to detect seven faults from the benchmark application using our approach.
尽管微服务在全球范围内得到了更高的采用,但在早期阶段(如需求和设计阶段)缺乏对可能的故障检测的工作。我们提出了一种使用模型检查CTL规范和SMT求解器来检测故障的新方法。涉及微服务的系统需求被映射到Netflix的Conductor规范,该规范随后被转换为Petri网以进行进一步分析。对转换后的Petri网进行遍历分析不仅使我们能够检测到错误的规范,而且可以纠正它并采用更好的设计。我们在TrainTicket基准测试系统上尝试了我们的方法,使用我们的方法,我们能够从基准测试应用程序中检测到7个故障。
{"title":"Detection of Faults in Microservices using Petri Nets","authors":"Sulochan Naik, Meenakshi D'Souza","doi":"10.1145/3578527.3578541","DOIUrl":"https://doi.org/10.1145/3578527.3578541","url":null,"abstract":"Despite higher adoption of Microservices worldwide, there is a lack of work on possible fault detection during early phases such as at requirements and design phase. We propose a novel way to detect faults using model checking CTL specifications and a SMT solver. Requirements of a system involving microservices are mapped to Netflix’s Conductor specification which is later converted into Petri nets for further analysis. Traversal analysis on the converted Petri nets not only allows us to detect a faulty specification but to correct it and adopt a better design. We tried our methodology on the TrainTicket benchmark system and we are able to detect seven faults from the benchmark application using our approach.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134246052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
gMutant: A gCov based Mutation Testing Analyser gMutant:基于gCov的突变检测分析仪
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578546
Monika Rani Golla, Sangharatna Godboley
gMutant is a novel mutation analyser to measure the quality of test cases. It is based on gCov. The existing gCov outputs code coverage (line and branch). Here, we scale it up in order to produce an effective metric i.e., Mutation Score (%) which is useful to report the quality of test cases. The key idea is to generate one Mutant Meta Program that has all the mutants instrumented in it. Hence, for each test input, only the generated Mutant Meta Program gets executed, instead of executing all the mutants separately. This mitigates the computational cost challenge of Mutation Testing in producing Mutation score. The gMutant that has been proposed is a generic tool which can be plugged in with any tester. It needs test cases as well as a program to generate a score (%) and a descriptive report. In our experimentation, we used Bounded Model Checker and Fuzzer to generate test cases. The run time of the gMutant is very advantageous in contrast to the traditional method of computing mutation score. It gives scores, in 4.03 (s) for CBMC and 4.01 (s) for AFL, which proves its efficiency.
gMutant是一种新的突变分析器,用于测量测试用例的质量。它基于gCov。现有的gCov输出代码覆盖率(行和分支)。在这里,我们将其扩大,以便产生一个有效的度量,例如,突变分数(%),它对报告测试用例的质量很有用。关键思想是生成一个包含所有突变体的突变体元程序。因此,对于每个测试输入,只执行生成的突变元程序,而不是单独执行所有的突变。这减轻了突变测试在产生突变分数时的计算成本挑战。已经提出的gMutant是一个可以插入任何测试器的通用工具。它需要测试用例以及生成分数(%)和描述性报告的程序。在我们的实验中,我们使用Bounded Model Checker和Fuzzer来生成测试用例。与传统的计算突变分数的方法相比,gMutant的运行时间非常有利。计算结果表明,CBMC和AFL分别为4.03分和4.01分,证明了算法的有效性。
{"title":"gMutant: A gCov based Mutation Testing Analyser","authors":"Monika Rani Golla, Sangharatna Godboley","doi":"10.1145/3578527.3578546","DOIUrl":"https://doi.org/10.1145/3578527.3578546","url":null,"abstract":"gMutant is a novel mutation analyser to measure the quality of test cases. It is based on gCov. The existing gCov outputs code coverage (line and branch). Here, we scale it up in order to produce an effective metric i.e., Mutation Score (%) which is useful to report the quality of test cases. The key idea is to generate one Mutant Meta Program that has all the mutants instrumented in it. Hence, for each test input, only the generated Mutant Meta Program gets executed, instead of executing all the mutants separately. This mitigates the computational cost challenge of Mutation Testing in producing Mutation score. The gMutant that has been proposed is a generic tool which can be plugged in with any tester. It needs test cases as well as a program to generate a score (%) and a descriptive report. In our experimentation, we used Bounded Model Checker and Fuzzer to generate test cases. The run time of the gMutant is very advantageous in contrast to the traditional method of computing mutation score. It gives scores, in 4.03 (s) for CBMC and 4.01 (s) for AFL, which proves its efficiency.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assertion Based Verification using Yosys: A Case Study from Nuclear Domain 使用Yosys进行基于断言的验证:来自核领域的案例研究
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578540
Shubam Gupta, Ajith K. John, M. Kalra
Assertion Based Verification is a design methodology that integrates Formal Methods as part of the design process. As each module is designed, the designer expresses the functional, structural and interface requirements of the module as logical formulas called assertions. These assertions are then verified using simulation and/or formal verification. This paper aims at studying the effectiveness of applying formal verification during Assertion Based Verification in the development of VHDL design for a VME-bus for safety applications in nuclear reactors. Assertions for the VHDL modules developed were expressed in PSL, and were proved using three industrially successful and popular formal verification algorithms – Bounded Model Checking, K-Induction, and Property Driven Reachability, implemented in an open-source verification tool, Yosys. Our experiments revealed that Property Driven Reachability completely outperforms K-Induction in all the cases. Bounded Model Checking for a few hundred clock cycles helped us in finding a number of important, but subtle bugs, which were missed by traditional simulation, at the cost of a justifiable increase in design effort towards writing assertions.
基于断言的验证是一种设计方法,它将形式化方法集成为设计过程的一部分。在设计每个模块时,设计人员将模块的功能、结构和接口需求表示为称为断言的逻辑公式。然后使用模拟和/或正式验证来验证这些断言。本文旨在研究在核反应堆安全应用vme总线的VHDL设计开发中,在基于断言的验证过程中应用形式化验证的有效性。开发的VHDL模块的断言用PSL表示,并使用三种工业上成功且流行的形式验证算法进行了证明——有界模型检查、k -归纳和属性驱动可达性,这些算法在开源验证工具Yosys中实现。我们的实验表明,属性驱动的可达性在所有情况下都完全优于k -归纳。对几百个时钟周期的有限模型检查帮助我们发现了许多重要但微妙的错误,这些错误被传统的模拟忽略了,其代价是合理地增加了编写断言的设计工作。
{"title":"Assertion Based Verification using Yosys: A Case Study from Nuclear Domain","authors":"Shubam Gupta, Ajith K. John, M. Kalra","doi":"10.1145/3578527.3578540","DOIUrl":"https://doi.org/10.1145/3578527.3578540","url":null,"abstract":"Assertion Based Verification is a design methodology that integrates Formal Methods as part of the design process. As each module is designed, the designer expresses the functional, structural and interface requirements of the module as logical formulas called assertions. These assertions are then verified using simulation and/or formal verification. This paper aims at studying the effectiveness of applying formal verification during Assertion Based Verification in the development of VHDL design for a VME-bus for safety applications in nuclear reactors. Assertions for the VHDL modules developed were expressed in PSL, and were proved using three industrially successful and popular formal verification algorithms – Bounded Model Checking, K-Induction, and Property Driven Reachability, implemented in an open-source verification tool, Yosys. Our experiments revealed that Property Driven Reachability completely outperforms K-Induction in all the cases. Bounded Model Checking for a few hundred clock cycles helped us in finding a number of important, but subtle bugs, which were missed by traditional simulation, at the cost of a justifiable increase in design effort towards writing assertions.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartFuzzDriverGen: Smart Contract Fuzzing Automation for Golang SmartFuzzDriverGen: Golang智能合约模糊测试自动化
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578538
Siddhasagar Pani, Harshita Vani Nallagonda, Vigneswaran, Raveendra Kumar Medicherla, Rajan M
Greybox fuzzers require intermediate programs called fuzz drivers to test smart contract APIs. These fuzz drivers use the semi-random inputs (bytes) generated by fuzzers to prepare suitable inputs required to test APIs. Further, fuzz driver also uses this input to decide sequence in which APIs to be invoked and enables the fuzzer to execute the APIs in that sequence to find the vulnerabilities, if any. Manually writing such complex and intelligent fuzz drivers is laborious, requires deep technical skills, hence can be cumbersome and error prone. In this paper, we propose SmartFuzzDriverGen framework to automatically generate fuzz drivers which invoke smart contract APIs using different strategies: unit-level, sequence-based (random, user-defined), and heuristics based. We evaluate the proposed framework by testing a prototype implementation of it with Golang smart contracts (targeted for Hyperledger Fabric platform) and study the effectiveness of the generated fuzz drivers in terms of code coverage as well as bug finding abilities. We observed that fuzzing of APIs in random sequences performed better than the other methods.
灰盒fuzzers需要称为fuzzdrivers的中间程序来测试智能合约api。这些模糊驱动程序使用由模糊器生成的半随机输入(字节)来准备测试api所需的适当输入。此外,fuzz驱动程序还使用此输入来决定调用api的顺序,并使fuzzer能够按照该顺序执行api以查找漏洞(如果有的话)。手动编写如此复杂和智能的模糊驱动程序是费力的,需要深厚的技术技能,因此可能很麻烦且容易出错。在本文中,我们提出了SmartFuzzDriverGen框架来自动生成模糊驱动程序,这些驱动程序使用不同的策略调用智能合约api:单元级,基于序列(随机,用户定义)和基于启发式。我们通过使用Golang智能合约(针对Hyperledger Fabric平台)测试其原型实现来评估所提议的框架,并研究生成的模糊驱动程序在代码覆盖率和bug发现能力方面的有效性。我们观察到随机序列中api的模糊化比其他方法表现得更好。
{"title":"SmartFuzzDriverGen: Smart Contract Fuzzing Automation for Golang","authors":"Siddhasagar Pani, Harshita Vani Nallagonda, Vigneswaran, Raveendra Kumar Medicherla, Rajan M","doi":"10.1145/3578527.3578538","DOIUrl":"https://doi.org/10.1145/3578527.3578538","url":null,"abstract":"Greybox fuzzers require intermediate programs called fuzz drivers to test smart contract APIs. These fuzz drivers use the semi-random inputs (bytes) generated by fuzzers to prepare suitable inputs required to test APIs. Further, fuzz driver also uses this input to decide sequence in which APIs to be invoked and enables the fuzzer to execute the APIs in that sequence to find the vulnerabilities, if any. Manually writing such complex and intelligent fuzz drivers is laborious, requires deep technical skills, hence can be cumbersome and error prone. In this paper, we propose SmartFuzzDriverGen framework to automatically generate fuzz drivers which invoke smart contract APIs using different strategies: unit-level, sequence-based (random, user-defined), and heuristics based. We evaluate the proposed framework by testing a prototype implementation of it with Golang smart contracts (targeted for Hyperledger Fabric platform) and study the effectiveness of the generated fuzz drivers in terms of code coverage as well as bug finding abilities. We observed that fuzzing of APIs in random sequences performed better than the other methods.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Variational Study of the Impact of Call Graphs on Precision of Android Taint Analysis 调用图对Android污点分析精度影响的变分研究
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578545
Prakash Neupane, Manas Thakur
With the growing advent and usage of Android applications, security of sensitive user information remains to be of paramount concern. A popular way to identify security leaks in Android applications is by performing taint analysis that tries to enlist possible paths in the program through which sources of critical information may get connected to potential sinks that may propagate leaks. Notably, the precision of such “taint information” is heavily dependent on the elements that are responsible for constructing an interprocedural path in a program – primarily, the call graph. This paper is a step towards a larger study to identify the common patterns through which information gets tainted in Android applications, aiming to suggest points in the program analysis space that could lead to their detection in a precise yet efficient manner. To begin with, we invoke FlowDroid (a popular taint-analysis tool) to analyze Android apps from a variety of domains, and measure the impact of varying the underlying call graph on the computed taint information. We observe that taint information depends significantly on the used call graph, and that certain spurious leaks can be mapped to particular causes of removable imprecision. We further classify the identified leaks into various kinds, and hope to extend this study to identify exact parts of the program that popularly leak out particular kinds of information. Our final goal is to help security analysts select the right interprocedural analysis toolset for identifying bugs in Android apps, as well as to frame app-design guidelines for helping developers first-hand avoid common sources of information leaks from their future artifacts.
随着Android应用程序的出现和使用,敏感用户信息的安全性仍然是最重要的问题。识别Android应用程序中安全漏洞的一种流行方法是执行污染分析,试图在程序中列出可能的路径,通过这些路径,关键信息源可能连接到可能传播泄漏的潜在接收器。值得注意的是,这种“污染信息”的准确性在很大程度上依赖于负责在程序中构建过程间路径的元素——主要是调用图。这篇论文是朝着一个更大的研究迈出的一步,该研究旨在识别Android应用程序中信息被污染的常见模式,旨在建议程序分析领域中的一些点,这些点可能导致以一种精确而有效的方式检测它们。首先,我们调用FlowDroid(一个流行的污染分析工具)来分析来自各种领域的Android应用程序,并测量改变底层调用图对计算的污染信息的影响。我们观察到,污染信息在很大程度上取决于使用的调用图,并且某些虚假泄漏可以映射到可移动不精确的特定原因。我们进一步将已识别的泄漏分类为各种类型,并希望扩展这项研究,以确定程序中普遍泄漏特定类型信息的确切部分。我们的最终目标是帮助安全分析师选择正确的程序间分析工具集来识别Android应用程序中的漏洞,并构建应用程序设计指南,以帮助开发人员第一手地避免其未来工件的常见信息泄露来源。
{"title":"Variational Study of the Impact of Call Graphs on Precision of Android Taint Analysis","authors":"Prakash Neupane, Manas Thakur","doi":"10.1145/3578527.3578545","DOIUrl":"https://doi.org/10.1145/3578527.3578545","url":null,"abstract":"With the growing advent and usage of Android applications, security of sensitive user information remains to be of paramount concern. A popular way to identify security leaks in Android applications is by performing taint analysis that tries to enlist possible paths in the program through which sources of critical information may get connected to potential sinks that may propagate leaks. Notably, the precision of such “taint information” is heavily dependent on the elements that are responsible for constructing an interprocedural path in a program – primarily, the call graph. This paper is a step towards a larger study to identify the common patterns through which information gets tainted in Android applications, aiming to suggest points in the program analysis space that could lead to their detection in a precise yet efficient manner. To begin with, we invoke FlowDroid (a popular taint-analysis tool) to analyze Android apps from a variety of domains, and measure the impact of varying the underlying call graph on the computed taint information. We observe that taint information depends significantly on the used call graph, and that certain spurious leaks can be mapped to particular causes of removable imprecision. We further classify the identified leaks into various kinds, and hope to extend this study to identify exact parts of the program that popularly leak out particular kinds of information. Our final goal is to help security analysts select the right interprocedural analysis toolset for identifying bugs in Android apps, as well as to frame app-design guidelines for helping developers first-hand avoid common sources of information leaks from their future artifacts.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements Elicitation for Virtual Reality Products - A Mapping Study 虚拟现实产品的需求引出——一项测绘研究
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3578536
Sai Anirudh Karre, Raghav Mittal, R. Reddy
Software practitioners use various requirement elicitation methods to produce a well-defined product. These methods impact the software product’s eventual traits and target a particular audience segment. Virtual Reality(VR) products are no different from this influence. With the notable rise in product offerings across various domains, VR has become an essential technology for the future. Nevertheless, the type of methods practiced for requirement elicitation still has not been thoroughly studied. This paper presents a mapping study on requirement elicitation methods practiced by VR practitioners in academia and industry. We consolidated our observations based on their popularity in the practitioner community. Further, we present our insights on the necessary and sufficient conditions to conduct VR requirement elicitation using the identified methods to benefit the VR practitioner community.
软件从业者使用各种需求引出方法来生成定义良好的产品。这些方法会影响软件产品的最终特征,并针对特定的受众群体。虚拟现实(VR)产品也不例外。随着各个领域产品的显著增加,虚拟现实已经成为未来的一项重要技术。然而,需求引出的实践方法类型仍然没有得到彻底的研究。本文对学术界和工业界的虚拟现实从业者实践的需求激发方法进行了映射研究。我们根据它们在从业者群体中的受欢迎程度巩固了我们的观察结果。此外,我们提出了我们对使用确定的方法进行虚拟现实需求启发的必要和充分条件的见解,以使虚拟现实从业者社区受益。
{"title":"Requirements Elicitation for Virtual Reality Products - A Mapping Study","authors":"Sai Anirudh Karre, Raghav Mittal, R. Reddy","doi":"10.1145/3578527.3578536","DOIUrl":"https://doi.org/10.1145/3578527.3578536","url":null,"abstract":"Software practitioners use various requirement elicitation methods to produce a well-defined product. These methods impact the software product’s eventual traits and target a particular audience segment. Virtual Reality(VR) products are no different from this influence. With the notable rise in product offerings across various domains, VR has become an essential technology for the future. Nevertheless, the type of methods practiced for requirement elicitation still has not been thoroughly studied. This paper presents a mapping study on requirement elicitation methods practiced by VR practitioners in academia and industry. We consolidated our observations based on their popularity in the practitioner community. Further, we present our insights on the necessary and sufficient conditions to conduct VR requirement elicitation using the identified methods to benefit the VR practitioner community.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123479616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Report on First Workshop on Learning-Aided Adaptive Systems 第一届学习辅助自适应系统研讨会报告
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3581750
Deepali Kholkar, Suman Roychoudhury
Enterprises today have transformed from standalone entities into interconnected systems of systems while having to function in a dynamic and uncertain environment. Uncertainty originates from several factors such as changing needs and behaviours of diverse stakeholders, occurrence of external events and advent of new technologies. This creates a need for software systems to adapt dynamically in response to change, posing a series of technological challenges. Software systems of the future need to be specifically architected to learn from interactions with their environment, recommend and evaluate adaptations as well as automatically realize the adaptations in code so as to enable enterprises to continue meeting their objectives and stay relevant. This workshop aims to bring together eminent researchers and practitioners to deliberate upon learning-based approaches to solve critical problems in industry and society.
今天的企业已经从独立的实体转变为相互关联的系统系统,同时必须在动态和不确定的环境中运行。不确定性源于几个因素,如不同利益相关者不断变化的需求和行为、外部事件的发生和新技术的出现。这就需要软件系统动态地适应变化,提出了一系列的技术挑战。未来的软件系统需要特别的架构,以便从与环境的交互中学习,推荐和评估适应性,以及自动实现代码中的适应性,从而使企业能够继续满足其目标并保持相关性。本次研讨会旨在汇集杰出的研究人员和实践者,共同探讨以学习为基础的方法来解决工业和社会中的关键问题。
{"title":"A Report on First Workshop on Learning-Aided Adaptive Systems","authors":"Deepali Kholkar, Suman Roychoudhury","doi":"10.1145/3578527.3581750","DOIUrl":"https://doi.org/10.1145/3578527.3581750","url":null,"abstract":"Enterprises today have transformed from standalone entities into interconnected systems of systems while having to function in a dynamic and uncertain environment. Uncertainty originates from several factors such as changing needs and behaviours of diverse stakeholders, occurrence of external events and advent of new technologies. This creates a need for software systems to adapt dynamically in response to change, posing a series of technological challenges. Software systems of the future need to be specifically architected to learn from interactions with their environment, recommend and evaluate adaptations as well as automatically realize the adaptations in code so as to enable enterprises to continue meeting their objectives and stay relevant. This workshop aims to bring together eminent researchers and practitioners to deliberate upon learning-based approaches to solve critical problems in industry and society.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2nd Recent Advances in Program Analysis and Software Testing (RAPAST-2023) 第2届程序分析与软件测试新进展(RAPAST-2023)
Pub Date : 2023-02-23 DOI: 10.1145/3578527.3581748
Sangharatna Godboley, D. Mohapatra
The conference on Program Analysis and Software Testing is a special session under the workshop category which will be held in conjunction with ISEC-2023, Indian Institute of Information Technology, Allahabad Prayagraj, UP, India. It is in line with the scope of ISEC-2023 which will be specially focused on the theme of the event. The theme is based on the research work specific to the areas mentioned in the scope of this conference. RAPAST-2023 is expected to be a good avenue where the researchers from Academia and Industries will participate by presenting their most recent research findings and experimental results in the domain of the scope.
程序分析和软件测试会议是研讨会类别下的一个特别会议,将与ISEC-2023联合举行,印度信息技术学院,阿拉哈巴德Prayagraj,北方邦。这与ISEC-2023的范围是一致的,ISEC-2023将特别关注活动的主题。主题是基于在本次会议范围内提到的具体领域的研究工作。RAPAST-2023有望成为学术界和工业界的研究人员通过展示他们在该领域的最新研究成果和实验结果的良好途径。
{"title":"2nd Recent Advances in Program Analysis and Software Testing (RAPAST-2023)","authors":"Sangharatna Godboley, D. Mohapatra","doi":"10.1145/3578527.3581748","DOIUrl":"https://doi.org/10.1145/3578527.3581748","url":null,"abstract":"The conference on Program Analysis and Software Testing is a special session under the workshop category which will be held in conjunction with ISEC-2023, Indian Institute of Information Technology, Allahabad Prayagraj, UP, India. It is in line with the scope of ISEC-2023 which will be specially focused on the theme of the event. The theme is based on the research work specific to the areas mentioned in the scope of this conference. RAPAST-2023 is expected to be a good avenue where the researchers from Academia and Industries will participate by presenting their most recent research findings and experimental results in the domain of the scope.","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129843154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 16th Innovations in Software Engineering Conference 第16届软件工程创新会议论文集
{"title":"Proceedings of the 16th Innovations in Software Engineering Conference","authors":"","doi":"10.1145/3578527","DOIUrl":"https://doi.org/10.1145/3578527","url":null,"abstract":"","PeriodicalId":326318,"journal":{"name":"Proceedings of the 16th Innovations in Software Engineering Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 16th Innovations in Software Engineering Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1