首页 > 最新文献

Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering最新文献

英文 中文
Towards a Reliability Prediction Model based on Internal Structure and Post-Release Defects Using Neural Networks 基于内部结构和放行后缺陷的神经网络可靠性预测模型
A. Vescan, C. Serban, Alisa-Daniela Budur
Reliability is one of the most important quality attributes of a software system, addressing the system’s ability to perform the required functionalities under stated conditions, for a stated period of time. Nowadays, a system failure could threaten the safety of human life. Thus, assessing reliability became one of the software engineering‘s holy grails. Our approach wants to establish based on what project’s characteristics we obtain the best bug-oriented reliability prediction model. The pillars on which we base our approach are the metric introduced to estimate one aspect of reliability using bugs, and the Chidamber and Kemerer (CK) metrics to assess reliability in the early stages of development. The methodology used for prediction is a feed-forward neural network with back-propagation learning. Five different projects are used to validate the proposed approach for reliability prediction. The results indicate that CK metrics are promising in predicting reliability using a neural network model. The experiments also analyze if the type of project used in the development of the prediction model influences the quality of the prediction. As a result of the operated experiments using both within-project and cross-project validation, the best prediction model was obtained using PDE (PlugIn characteristic) for MY project (Task characteristic).
可靠性是软件系统最重要的质量属性之一,指的是系统在规定的条件下、在规定的时间内执行所需功能的能力。如今,系统故障可能会威胁到人类的生命安全。因此,评估可靠性成为软件工程的圣杯之一。我们的方法是要建立基于什么项目的特点来获得最佳的面向bug的可靠性预测模型。我们的方法的支柱是使用bug来估计可靠性的一个方面的度量,以及在开发的早期阶段评估可靠性的Chidamber和Kemerer (CK)度量。用于预测的方法是具有反向传播学习的前馈神经网络。用五个不同的项目验证了提出的可靠性预测方法。结果表明,CK指标在利用神经网络模型预测可靠性方面是有希望的。实验还分析了在开发预测模型时使用的项目类型是否会影响预测的质量。通过项目内验证和跨项目验证的操作实验,得出了使用PDE(插件特性)对MY项目(任务特性)的最佳预测模型。
{"title":"Towards a Reliability Prediction Model based on Internal Structure and Post-Release Defects Using Neural Networks","authors":"A. Vescan, C. Serban, Alisa-Daniela Budur","doi":"10.1145/3463274.3463363","DOIUrl":"https://doi.org/10.1145/3463274.3463363","url":null,"abstract":"Reliability is one of the most important quality attributes of a software system, addressing the system’s ability to perform the required functionalities under stated conditions, for a stated period of time. Nowadays, a system failure could threaten the safety of human life. Thus, assessing reliability became one of the software engineering‘s holy grails. Our approach wants to establish based on what project’s characteristics we obtain the best bug-oriented reliability prediction model. The pillars on which we base our approach are the metric introduced to estimate one aspect of reliability using bugs, and the Chidamber and Kemerer (CK) metrics to assess reliability in the early stages of development. The methodology used for prediction is a feed-forward neural network with back-propagation learning. Five different projects are used to validate the proposed approach for reliability prediction. The results indicate that CK metrics are promising in predicting reliability using a neural network model. The experiments also analyze if the type of project used in the development of the prediction model influences the quality of the prediction. As a result of the operated experiments using both within-project and cross-project validation, the best prediction model was obtained using PDE (PlugIn characteristic) for MY project (Task characteristic).","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System and Software Processes in Practice: Insights from Chinese Industry 实践中的系统和软件过程:来自中国工业的见解
Peng Zhou, A. Khan, Peng Liang, Sher Badshah
Software development processes play a key role in the software and system development life cycle. Processes are becoming complex and evolve rapidly due to the modern-day continuous software engineering (CSE) concepts, which are mainly based on continuous integration, continuous delivery, infrastructure-as-code, automation and more. The fast growing Chinese software development industry adopts various processes to achieve potential benefits offered in the international market. This study is conducted with the aim to investigate the trends of processes in practice in the Chinese industry. The survey questionnaire data is collected from 34 practitioners working in software development firms across the China and the results highlight that iterative and agile processes are extensively used in industrial setting. Furthermore, agile and traditional approaches are combined to develop the hybrid processes. Most of the participants are satisfied using the current development processes, however, they show interest to continuously improve the existing process models and methods. Finally, we noticed that majority of the software development organizations used the ISO 9001 standard for process assessment and improvement activities. The given results provide preliminary overview of processes deployed in the Chinese industry.
软件开发过程在软件和系统开发生命周期中起着关键作用。由于现代的持续软件工程(CSE)概念,过程变得越来越复杂,并且发展迅速,这些概念主要基于持续集成、持续交付、基础设施即代码、自动化等等。快速发展的中国软件开发行业采用各种流程来实现在国际市场上提供的潜在利益。本研究旨在探讨中国工业实践中流程的发展趋势。调查问卷数据收集自34名在中国软件开发公司工作的从业者,结果强调迭代和敏捷过程在工业环境中被广泛使用。此外,将敏捷方法与传统方法相结合,开发出混合流程。大多数参与者对使用当前的开发过程感到满意,然而,他们对持续改进现有的过程模型和方法表现出兴趣。最后,我们注意到大多数软件开发组织使用ISO 9001标准进行过程评估和改进活动。给出的结果提供了在中国工业中部署的过程的初步概述。
{"title":"System and Software Processes in Practice: Insights from Chinese Industry","authors":"Peng Zhou, A. Khan, Peng Liang, Sher Badshah","doi":"10.1145/3463274.3463786","DOIUrl":"https://doi.org/10.1145/3463274.3463786","url":null,"abstract":"Software development processes play a key role in the software and system development life cycle. Processes are becoming complex and evolve rapidly due to the modern-day continuous software engineering (CSE) concepts, which are mainly based on continuous integration, continuous delivery, infrastructure-as-code, automation and more. The fast growing Chinese software development industry adopts various processes to achieve potential benefits offered in the international market. This study is conducted with the aim to investigate the trends of processes in practice in the Chinese industry. The survey questionnaire data is collected from 34 practitioners working in software development firms across the China and the results highlight that iterative and agile processes are extensively used in industrial setting. Furthermore, agile and traditional approaches are combined to develop the hybrid processes. Most of the participants are satisfied using the current development processes, however, they show interest to continuously improve the existing process models and methods. Finally, we noticed that majority of the software development organizations used the ISO 9001 standard for process assessment and improvement activities. The given results provide preliminary overview of processes deployed in the Chinese industry.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Supporting sustainability design through agile software development 通过敏捷软件开发支持可持续性设计
Hatef Shamshiri
Context: Sustainability has become an important topic for researchers and is gaining popularity among software development companies, but integrating it into their development processes is still lacking. Objectives: This paper aimed to discuss the purpose of doctoral research, the research questions, the steps to answer the research questions, and the research's current progress concerning sustainability in the software development life cycle. Results: I have presented the high-level plans for the doctoral research and outlined the first part of the results of phase 1. As part of this phase 1, I have conducted an extensive literature review to collect data about sustainability in companies' agile methods. I found only a few studies reporting sustainability in agile software development, and this finding proposes that either this field was not studied, or the results have not been widely published, indicating a gap in research.
背景:可持续性已经成为研究人员的一个重要话题,并且在软件开发公司中越来越受欢迎,但是将其集成到他们的开发过程中仍然缺乏。目的:本文旨在讨论博士研究的目的,研究问题,回答研究问题的步骤,以及目前关于软件开发生命周期可持续性的研究进展。成果:提出了博士研究的高层次计划,概述了第一阶段的第一部分成果。作为第一阶段的一部分,我进行了广泛的文献综述,以收集有关公司敏捷方法可持续性的数据。我发现只有少数研究报告了敏捷软件开发中的可持续性,这一发现表明,要么这个领域没有被研究,要么结果没有被广泛发表,这表明研究存在差距。
{"title":"Supporting sustainability design through agile software development","authors":"Hatef Shamshiri","doi":"10.1145/3463274.3463347","DOIUrl":"https://doi.org/10.1145/3463274.3463347","url":null,"abstract":"Context: Sustainability has become an important topic for researchers and is gaining popularity among software development companies, but integrating it into their development processes is still lacking. Objectives: This paper aimed to discuss the purpose of doctoral research, the research questions, the steps to answer the research questions, and the research's current progress concerning sustainability in the software development life cycle. Results: I have presented the high-level plans for the doctoral research and outlined the first part of the results of phase 1. As part of this phase 1, I have conducted an extensive literature review to collect data about sustainability in companies' agile methods. I found only a few studies reporting sustainability in agile software development, and this finding proposes that either this field was not studied, or the results have not been widely published, indicating a gap in research.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CCMC: Code Completion with a Memory Mechanism and a Copy Mechanism 使用内存机制和复制机制的代码完成
Hao Yang, Li Kuang
Code completion tools are increasingly important when developing modern software. Recently, statistical language modeling techniques have achieved great success in the code completion task. However, two major issues with these techniques severely affect the performance of neural language models (NLMs) of code completion. a) Long-range dependences are common in program source code. b) New and rare vocabulary in code is much higher than natural language. To address the challenges above, in this paper, we propose code completion with a memory mechanism and a copy mechanism (CCMC). To capture the long-range dependencies in the program source code, we employ Transformer-XL as our base model. To utilize the locally repeated terms in program source code, we apply the pointer network into our base model and design CopyMask to improve the training efficiency, which is inspired by masked multihead attention in the transformer decoder. To combine the long-range dependency modeling ability from Transformer-XL and the ability to copy the input token to output from the pointer network, we design a memory mechanism and a copy mechanism. Through our memory mechanism, our model can uniformly manage the context used by Transformer-XL and pointer network. Through our copy mechanism, our model can either generate a within-vocabulary token or copy an out-of-vocabulary (OOV) token from inputs. Experiments on a real-world dataset demonstrate the effectiveness of our CCMC on the code completion task.
在开发现代软件时,代码完成工具变得越来越重要。近年来,统计语言建模技术在代码完成任务中取得了巨大的成功。然而,这些技术的两个主要问题严重影响了神经语言模型(nlm)的代码补全性能。a)远程依赖关系在程序源代码中很常见。b)代码中的新词汇和稀有词汇远高于自然语言。为了解决上述挑战,在本文中,我们提出了使用内存机制和复制机制(CCMC)的代码完成。为了捕获程序源代码中的远程依赖关系,我们使用Transformer-XL作为基本模型。为了利用程序源代码中的局部重复项,我们将指针网络应用到基本模型中,并设计了CopyMask来提高训练效率,这是受变压器解码器中掩蔽多头注意的启发。为了结合Transformer-XL的远程依赖关系建模能力和从指针网络将输入令牌复制到输出的能力,我们设计了一个内存机制和一个复制机制。通过我们的内存机制,我们的模型可以统一管理Transformer-XL和指针网络使用的上下文。通过我们的复制机制,我们的模型可以生成词汇表内的令牌,也可以从输入中复制词汇表外(OOV)的令牌。在真实数据集上的实验证明了我们的CCMC在代码完成任务上的有效性。
{"title":"CCMC: Code Completion with a Memory Mechanism and a Copy Mechanism","authors":"Hao Yang, Li Kuang","doi":"10.1145/3463274.3463332","DOIUrl":"https://doi.org/10.1145/3463274.3463332","url":null,"abstract":"Code completion tools are increasingly important when developing modern software. Recently, statistical language modeling techniques have achieved great success in the code completion task. However, two major issues with these techniques severely affect the performance of neural language models (NLMs) of code completion. a) Long-range dependences are common in program source code. b) New and rare vocabulary in code is much higher than natural language. To address the challenges above, in this paper, we propose code completion with a memory mechanism and a copy mechanism (CCMC). To capture the long-range dependencies in the program source code, we employ Transformer-XL as our base model. To utilize the locally repeated terms in program source code, we apply the pointer network into our base model and design CopyMask to improve the training efficiency, which is inspired by masked multihead attention in the transformer decoder. To combine the long-range dependency modeling ability from Transformer-XL and the ability to copy the input token to output from the pointer network, we design a memory mechanism and a copy mechanism. Through our memory mechanism, our model can uniformly manage the context used by Transformer-XL and pointer network. Through our copy mechanism, our model can either generate a within-vocabulary token or copy an out-of-vocabulary (OOV) token from inputs. Experiments on a real-world dataset demonstrate the effectiveness of our CCMC on the code completion task.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124828335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Reference Architecture for Validating Security Across Multi-Cloud Computing Systems 验证跨多云计算系统安全性的参考体系结构
Henry Edet
Correlative studies carried out by different experts have cited a number of impediments to the growth of cloud computing technology; at the top of the list is security and data privacy issues. More so, a systematic mapping study which was conducted at the start of this research, revealed that the most prevalent cloud security issues are a consequence of poor architecture. 73 percent of literature surveyed also revealed that frameworks and reference architectures are one of the most effective ways of preventing security and data privacy breaches within a cloud computing environment as these issues are addressed during the requirements phase, prior to deployment. [1], [14] This research seeks to explore a preventative approach to cloud security breaches through the use of reference architectures. Firstly, we investigate the main causes of cloud security breaches and then, we analyse existing reference architectures with the aim of designing a universal security framework usable across multi-cloud computing platforms.
不同专家进行的相关研究列举了云计算技术发展的一些障碍;首当其冲的是安全和数据隐私问题。更重要的是,在本研究开始时进行的一项系统映射研究显示,最普遍的云安全问题是糟糕架构的结果。73%的调查文献还显示,框架和参考架构是在云计算环境中防止安全和数据隐私泄露的最有效方法之一,因为这些问题在部署之前的需求阶段就得到了解决。[1],[14]本研究旨在通过使用参考架构探索一种预防云安全漏洞的方法。首先,我们调查了云安全漏洞的主要原因,然后,我们分析了现有的参考架构,目的是设计一个跨多云计算平台可用的通用安全框架。
{"title":"A Reference Architecture for Validating Security Across Multi-Cloud Computing Systems","authors":"Henry Edet","doi":"10.1145/3463274.3463345","DOIUrl":"https://doi.org/10.1145/3463274.3463345","url":null,"abstract":"Correlative studies carried out by different experts have cited a number of impediments to the growth of cloud computing technology; at the top of the list is security and data privacy issues. More so, a systematic mapping study which was conducted at the start of this research, revealed that the most prevalent cloud security issues are a consequence of poor architecture. 73 percent of literature surveyed also revealed that frameworks and reference architectures are one of the most effective ways of preventing security and data privacy breaches within a cloud computing environment as these issues are addressed during the requirements phase, prior to deployment. [1], [14] This research seeks to explore a preventative approach to cloud security breaches through the use of reference architectures. Firstly, we investigate the main causes of cloud security breaches and then, we analyse existing reference architectures with the aim of designing a universal security framework usable across multi-cloud computing platforms.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Blackboard to the Office: A Look Into How Practitioners Perceive Software Testing Education 从黑板到办公室:从业者如何看待软件测试教育
L. Martins, V. Brito, Daniel Feitosa, Larissa Rocha, H. Costa, I. Machado
The teaching-learning process may require specific pedagogical approaches to establish a relationship with industry practices. Recently, some studies investigated the educators’ perspectives and the undergraduate courses curriculum to identify potential weaknesses and solutions for the software testing teaching process. However, it is still unclear how the practitioners evaluate the acquisition of knowledge about software testing in undergraduate courses. This study carried out an expert survey with 68 newly graduated practitioners to determine what the industry expects from them and what they learned in academia. The yielded results indicated that those practitioners learned at a similar rate as others with a long industry experience. Also, they studied less than half of the 35 software testing topics collected in the survey and took industry-backed extracurricular courses to complement their learning. Additionally, our findings point out a set of implications for future research, as the respondents’ learning difficulties (e.g., lack of learning sources) and the gap between academic education and industry expectations (e.g., certifications).
教学过程可能需要特定的教学方法来建立与行业实践的关系。最近,一些研究从教育工作者的角度和本科课程的课程设置出发,找出软件测试教学过程中潜在的弱点和解决方案。然而,从业者如何评估本科课程中软件测试知识的获取仍然是不清楚的。本研究对68名刚毕业的从业人员进行了专家调查,以确定行业对他们的期望以及他们在学术界学到的东西。结果表明,这些从业人员的学习速度与其他具有长期行业经验的人相似。此外,他们学习了调查中收集的35个软件测试主题中的不到一半,并参加了行业支持的课外课程来补充他们的学习。此外,我们的研究结果指出了未来研究的一系列含义,如受访者的学习困难(例如,缺乏学习资源)和学术教育与行业期望之间的差距(例如,认证)。
{"title":"From Blackboard to the Office: A Look Into How Practitioners Perceive Software Testing Education","authors":"L. Martins, V. Brito, Daniel Feitosa, Larissa Rocha, H. Costa, I. Machado","doi":"10.1145/3463274.3463338","DOIUrl":"https://doi.org/10.1145/3463274.3463338","url":null,"abstract":"The teaching-learning process may require specific pedagogical approaches to establish a relationship with industry practices. Recently, some studies investigated the educators’ perspectives and the undergraduate courses curriculum to identify potential weaknesses and solutions for the software testing teaching process. However, it is still unclear how the practitioners evaluate the acquisition of knowledge about software testing in undergraduate courses. This study carried out an expert survey with 68 newly graduated practitioners to determine what the industry expects from them and what they learned in academia. The yielded results indicated that those practitioners learned at a similar rate as others with a long industry experience. Also, they studied less than half of the 35 software testing topics collected in the survey and took industry-backed extracurricular courses to complement their learning. Additionally, our findings point out a set of implications for future research, as the respondents’ learning difficulties (e.g., lack of learning sources) and the gap between academic education and industry expectations (e.g., certifications).","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards offensive language detection and reduction in four Software Engineering communities 四个软件工程社区对攻击性语言的检测和减少
Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield
Software Engineering (SE) communities such as Stack Overflow have become unwelcoming, particularly through members’ use of offensive language. Research has shown that offensive language drives users away from active engagement within these platforms. This work aims to explore this issue more broadly by investigating the nature of offensive language in comments posted by users in four prominent SE platforms – GitHub, Gitter, Slack and Stack Overflow (SO). It proposes an approach to detect and classify offensive language in SE communities by adopting natural language processing and deep learning techniques. Further, a Conflict Reduction System (CRS), which identifies offence and then suggests what changes could be made to minimize offence has been proposed. Beyond showing the prevalence of offensive language in over 1 million comments from four different communities which ranges from 0.07% to 0.43%, our results show promise in successful detection and classification of such language. The CRS system has the potential to drastically reduce manual moderation efforts to detect and reduce offence in SE communities.
像Stack Overflow这样的软件工程(SE)社区已经变得不受欢迎,特别是因为成员使用了攻击性语言。研究表明,攻击性语言会让用户远离这些平台。这项工作旨在通过调查四个著名SE平台(GitHub、Gitter、Slack和Stack Overflow (SO))上用户发布的评论中攻击性语言的性质,更广泛地探讨这个问题。提出了一种采用自然语言处理和深度学习技术对SE社区中的攻击性语言进行检测和分类的方法。此外,还提出了一个减少冲突制度(CRS),该制度查明罪行,然后提出可以作出哪些改变以尽量减少罪行。除了显示来自四个不同社区的100多万条评论中攻击性语言的流行程度(范围从0.07%到0.43%)之外,我们的结果显示了成功检测和分类此类语言的希望。CRS系统有可能大幅减少人工审核工作,以发现和减少SE社区的犯罪行为。
{"title":"Towards offensive language detection and reduction in four Software Engineering communities","authors":"Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield","doi":"10.1145/3463274.3463805","DOIUrl":"https://doi.org/10.1145/3463274.3463805","url":null,"abstract":"Software Engineering (SE) communities such as Stack Overflow have become unwelcoming, particularly through members’ use of offensive language. Research has shown that offensive language drives users away from active engagement within these platforms. This work aims to explore this issue more broadly by investigating the nature of offensive language in comments posted by users in four prominent SE platforms – GitHub, Gitter, Slack and Stack Overflow (SO). It proposes an approach to detect and classify offensive language in SE communities by adopting natural language processing and deep learning techniques. Further, a Conflict Reduction System (CRS), which identifies offence and then suggests what changes could be made to minimize offence has been proposed. Beyond showing the prevalence of offensive language in over 1 million comments from four different communities which ranges from 0.07% to 0.43%, our results show promise in successful detection and classification of such language. The CRS system has the potential to drastically reduce manual moderation efforts to detect and reduce offence in SE communities.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134159583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Influence of Roles in Decision-Making during OSS Development — A Study of Python 在OSS开发过程中决策角色的影响——Python的研究
P. Sharma, Bastin Tony Roy Savarimuthu, N. Stanger
Governance has been highlighted as a key factor in the success of an Open Source Software (OSS) project. It is generally seen that in a mixed meritocracy and autocracy governance model, the decision-making (DM) responsibility regarding what features are included in the OSS is shared among members from select roles; prominently the project leader. However, less examination has been made whether members from these roles are also prominent in DM discussions and how decisions are made, to show they play an integral role in the success of the project. We believe that to establish their influence, it is necessary to examine not only discussions of proposals in which the project leader makes the decisions, but also those where others make the decisions. Therefore, in this study, we examine the prominence of members performing different roles in: (i) making decisions, (ii) performing certain social roles in DM discussions (e.g., discussion starters), (iii) contributing to the OSS development social network through DM discussions, and (iv) how decisions are made under both scenarios. We examine these aspects in the evolution of the well-known Python project. We carried out a data-driven longitudinal study of their email communication spanning 20 years, comprising about 1.5 million emails. These emails contain decisions for 466 Python Enhancement Proposals (PEPs) that document the language’s evolution. Our findings make the influence of different roles transparent to future (new) members, other stakeholders, and more broadly, to the OSS research community.
治理已经被强调为开放源代码软件(OSS)项目成功的关键因素。通常可以看到,在一个混合的精英管理和专制管理模型中,决策(DM)的责任是关于哪些特性包含在OSS中,是由来自选定角色的成员共享的;突出的是项目负责人。然而,对于来自这些角色的成员是否在决策管理讨论中也很突出,以及如何做出决策,以表明他们在项目的成功中发挥了不可或缺的作用,却很少进行检查。我们认为,要确立他们的影响力,不仅需要审查由项目负责人做决定的提案讨论,还需要审查由其他人做决定的提案讨论。因此,在本研究中,我们考察了在以下方面扮演不同角色的成员的重要性:(i)做出决策,(ii)在DM讨论中扮演某些社会角色(例如,讨论发起者),(iii)通过DM讨论为OSS开发社交网络做出贡献,以及(iv)在这两种情况下如何做出决策。我们将在著名的Python项目的发展过程中研究这些方面。我们对他们20年来的电子邮件交流进行了一项数据驱动的纵向研究,其中包括大约150万封电子邮件。这些邮件包含466个Python增强提案(pep)的决策,这些提案记录了该语言的演变。我们的发现使得不同角色的影响对未来的(新)成员、其他涉众,以及更广泛地说,对OSS研究社区来说是透明的。
{"title":"Influence of Roles in Decision-Making during OSS Development — A Study of Python","authors":"P. Sharma, Bastin Tony Roy Savarimuthu, N. Stanger","doi":"10.1145/3463274.3463326","DOIUrl":"https://doi.org/10.1145/3463274.3463326","url":null,"abstract":"Governance has been highlighted as a key factor in the success of an Open Source Software (OSS) project. It is generally seen that in a mixed meritocracy and autocracy governance model, the decision-making (DM) responsibility regarding what features are included in the OSS is shared among members from select roles; prominently the project leader. However, less examination has been made whether members from these roles are also prominent in DM discussions and how decisions are made, to show they play an integral role in the success of the project. We believe that to establish their influence, it is necessary to examine not only discussions of proposals in which the project leader makes the decisions, but also those where others make the decisions. Therefore, in this study, we examine the prominence of members performing different roles in: (i) making decisions, (ii) performing certain social roles in DM discussions (e.g., discussion starters), (iii) contributing to the OSS development social network through DM discussions, and (iv) how decisions are made under both scenarios. We examine these aspects in the evolution of the well-known Python project. We carried out a data-driven longitudinal study of their email communication spanning 20 years, comprising about 1.5 million emails. These emails contain decisions for 466 Python Enhancement Proposals (PEPs) that document the language’s evolution. Our findings make the influence of different roles transparent to future (new) members, other stakeholders, and more broadly, to the OSS research community.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132768396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities DID-eFed:促进联邦学习作为具有分散身份的服务
Jiahui Geng, Neel Kanwal, M. Jaatun, Chunming Rong
We have entered the era of big data, and it is considered to be the ”fuel” for the flourishing of artificial intelligence applications. The enactment of the EU General Data Protection Regulation (GDPR) raises concerns about individuals’ privacy in big data. Federated learning (FL) emerges as a functional solution that can help build high-performance models shared among multiple parties while still complying with user privacy and data confidentiality requirements. Although FL has been intensively studied and used in real applications, there is still limited research related to its prospects and applications as a FLaaS (Federated Learning as a Service) to interested 3rd parties. In this paper, we present a FLaaS system: DID-eFed, where FL is facilitated by decentralized identities (DID) and a smart contract. DID enables a more flexible and credible decentralized access management in our system, while the smart contract offers a frictionless and less error-prone process. We describe particularly the scenario where our DID-eFed enables the FLaaS among hospitals and research institutions.
我们已经进入了大数据时代,它被认为是人工智能应用蓬勃发展的“燃料”。欧盟通用数据保护条例(GDPR)的颁布引发了人们对大数据中个人隐私的担忧。联邦学习(FL)作为一种功能性解决方案出现,它可以帮助构建多方共享的高性能模型,同时仍然符合用户隐私和数据机密性要求。尽管FL已经在实际应用中得到了深入的研究和使用,但与它的前景和作为flas(联邦学习即服务)的应用相关的研究仍然有限。在本文中,我们提出了一个flas系统:DID- efed,其中FL由分散身份(DID)和智能合约促进。DID在我们的系统中实现了更灵活、更可信的去中心化访问管理,而智能合约提供了一个无摩擦、更少出错的过程。我们特别描述了我们的DID-eFed在医院和研究机构之间实现FLaaS的场景。
{"title":"DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities","authors":"Jiahui Geng, Neel Kanwal, M. Jaatun, Chunming Rong","doi":"10.1145/3463274.3463352","DOIUrl":"https://doi.org/10.1145/3463274.3463352","url":null,"abstract":"We have entered the era of big data, and it is considered to be the ”fuel” for the flourishing of artificial intelligence applications. The enactment of the EU General Data Protection Regulation (GDPR) raises concerns about individuals’ privacy in big data. Federated learning (FL) emerges as a functional solution that can help build high-performance models shared among multiple parties while still complying with user privacy and data confidentiality requirements. Although FL has been intensively studied and used in real applications, there is still limited research related to its prospects and applications as a FLaaS (Federated Learning as a Service) to interested 3rd parties. In this paper, we present a FLaaS system: DID-eFed, where FL is facilitated by decentralized identities (DID) and a smart contract. DID enables a more flexible and credible decentralized access management in our system, while the smart contract offers a frictionless and less error-prone process. We describe particularly the scenario where our DID-eFed enables the FLaaS among hospitals and research institutions.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
SLGPT: Using Transfer Learning to Directly Generate Simulink Model Files and Find Bugs in the Simulink Toolchain 使用迁移学习直接生成Simulink模型文件和查找Simulink工具链中的错误
S. L. Shrestha, Christoph Csallner
Finding bugs in a commercial cyber-physical system (CPS) development tool such as Simulink is hard as its codebase contains millions of lines of code and complete formal language specifications are not available. While deep learning techniques promise to learn such language specifications from sample models, deep learning needs a large number of training data to work well. SLGPT addresses this problem by using transfer learning to leverage the powerful Generative Pre-trained Transformer 2 (GPT-2) model, which has been pre-trained on a large set of training data. SLGPT adapts GPT-2 to Simulink with both randomly generated models and models mined from open-source repositories. SLGPT produced Simulink models that are both more similar to open-source models than its closest competitor, DeepFuzzSL, and found a super-set of the Simulink development toolchain bugs found by DeepFuzzSL.
在商业网络物理系统(CPS)开发工具(如Simulink)中发现bug是很困难的,因为它的代码库包含数百万行代码,并且没有完整的正式语言规范。虽然深度学习技术承诺从样本模型中学习语言规范,但深度学习需要大量的训练数据才能很好地工作。SLGPT通过使用迁移学习来利用强大的生成预训练变压器2 (GPT-2)模型来解决这个问题,该模型已经在大量训练数据上进行了预训练。SLGPT使用随机生成的模型和从开源存储库中挖掘的模型将GPT-2适应于Simulink。SLGPT生产的Simulink模型比其最接近的竞争对手DeepFuzzSL更接近开源模型,并且发现了DeepFuzzSL发现的Simulink开发工具链漏洞的超集。
{"title":"SLGPT: Using Transfer Learning to Directly Generate Simulink Model Files and Find Bugs in the Simulink Toolchain","authors":"S. L. Shrestha, Christoph Csallner","doi":"10.1145/3463274.3463806","DOIUrl":"https://doi.org/10.1145/3463274.3463806","url":null,"abstract":"Finding bugs in a commercial cyber-physical system (CPS) development tool such as Simulink is hard as its codebase contains millions of lines of code and complete formal language specifications are not available. While deep learning techniques promise to learn such language specifications from sample models, deep learning needs a large number of training data to work well. SLGPT addresses this problem by using transfer learning to leverage the powerful Generative Pre-trained Transformer 2 (GPT-2) model, which has been pre-trained on a large set of training data. SLGPT adapts GPT-2 to Simulink with both randomly generated models and models mined from open-source repositories. SLGPT produced Simulink models that are both more similar to open-source models than its closest competitor, DeepFuzzSL, and found a super-set of the Simulink development toolchain bugs found by DeepFuzzSL.","PeriodicalId":328024,"journal":{"name":"Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1