首页 > 最新文献

2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)最新文献

英文 中文
Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments 面向不确定环境的自适应软件多层事件分析法
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00015
Xinyue Li, Wu Chen
Adaptive software can autonomously adjust system parameters, structure, and behavior in response to possible anomalies. Event analysis, which is responsible for data perception and predictive analysis of the entire system, is the foundation of the entire adaptive process. However, as the size of software systems increases dramatically, the systems interact more closely with each other. This makes it difficult to guarantee the system in terms of recognition accuracy. And in a more dynamic and uncertain environment, event analysis has a lag, which is difficult to meet the tasks with high real-time requirements. Most of the existing event analysis methods are based on rule-based reasoning and ontology reasoning methods, which cannot well meet the requirements of event recognition accuracy and timeliness. To solve the above problems, this paper proposes an adaptive software multi-level event analysis method for uncertain environments. First, we use fuzzing to eliminate noise interference and other problems in the data collection process. Second, an event recognition method based on “anomaly detection and hybrid inference” is established to solve the inaccurate event mapping relationship and reduce the system overhead. Finally, an event prediction method based on dynamic multi-fault trees and multi-valued decision diagrams is established to meet the system's real-time requirements. The experimental results show that the proposed method can effectively ensure the effective detection of system anomalies and the accurate identification of abnormal events, and realize the reliable analysis of anomalies under uncertain environments.
自适应软件可以自主调整系统参数、结构和行为,以应对可能出现的异常。事件分析负责整个系统的数据感知和预测分析,是整个自适应过程的基础。然而,随着软件系统的规模急剧增加,系统之间的相互作用更加密切。这使得系统在识别精度上难以保证。而在更加动态和不确定的环境中,事件分析存在滞后性,难以满足实时性要求高的任务。现有的事件分析方法大多是基于规则推理和本体推理的方法,不能很好地满足事件识别准确性和时效性的要求。针对上述问题,本文提出了一种不确定环境下的自适应软件多层次事件分析方法。首先,我们使用模糊技术消除数据采集过程中的噪声干扰等问题。其次,建立了一种基于“异常检测和混合推理”的事件识别方法,解决了事件映射关系不准确的问题,降低了系统开销;最后,提出了一种基于动态多故障树和多值决策图的事件预测方法,以满足系统的实时性要求。实验结果表明,该方法能有效地保证系统异常的有效检测和异常事件的准确识别,实现不确定环境下异常的可靠分析。
{"title":"Multi-layer Event Analytic Method of Adaptive Software Orienting at Uncertain Environments","authors":"Xinyue Li, Wu Chen","doi":"10.1109/ICECCS54210.2022.00015","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00015","url":null,"abstract":"Adaptive software can autonomously adjust system parameters, structure, and behavior in response to possible anomalies. Event analysis, which is responsible for data perception and predictive analysis of the entire system, is the foundation of the entire adaptive process. However, as the size of software systems increases dramatically, the systems interact more closely with each other. This makes it difficult to guarantee the system in terms of recognition accuracy. And in a more dynamic and uncertain environment, event analysis has a lag, which is difficult to meet the tasks with high real-time requirements. Most of the existing event analysis methods are based on rule-based reasoning and ontology reasoning methods, which cannot well meet the requirements of event recognition accuracy and timeliness. To solve the above problems, this paper proposes an adaptive software multi-level event analysis method for uncertain environments. First, we use fuzzing to eliminate noise interference and other problems in the data collection process. Second, an event recognition method based on “anomaly detection and hybrid inference” is established to solve the inaccurate event mapping relationship and reduce the system overhead. Finally, an event prediction method based on dynamic multi-fault trees and multi-valued decision diagrams is established to meet the system's real-time requirements. The experimental results show that the proposed method can effectively ensure the effective detection of system anomalies and the accurate identification of abnormal events, and realize the reliable analysis of anomalies under uncertain environments.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameter Sensitive Pointer Analysis for Java Java的参数敏感指针分析
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00027
Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang
Pointer analysis is an important tool for program analysis and program optimization procedures used in modern compilers and bug checkers. This paper introduces parameter-sensitivity, a new methodology that improves pointer analysis for object-oriented programming languages such as Java. In this approach, we construct a method context for a callee method by a list of objects including both the receiver object and the objects that are passed as parameters at a call site. We believe that such a context is able to represent a significant portion of the current abstract state before the method invocation. The algorithm has been implemented in the Soot framework, and it is evaluated on the benchmarks from DaCapo, compared with the standard object-sensitive pointer analysis algorithms. The preliminary result demonstrates that our parameter-sensitive pointer analysis can achieve better precision with less time consumption than the standard k-object-sensitive algorithms.
指针分析是现代编译器和错误检查器中用于程序分析和程序优化过程的重要工具。本文介绍了参数敏感性方法,这是一种改进面向对象编程语言(如Java)指针分析的新方法。在这种方法中,我们通过一个对象列表为被调用方方法构造方法上下文,该对象列表既包括接收方对象,也包括在调用站点作为参数传递的对象。我们相信这样的上下文能够在方法调用之前表示当前抽象状态的很大一部分。该算法已在Soot框架中实现,并在DaCapo的基准测试中与标准的对象敏感指针分析算法进行了比较。初步结果表明,与标准的k-对象敏感算法相比,我们的参数敏感指针分析可以在更短的时间内获得更高的精度。
{"title":"Parameter Sensitive Pointer Analysis for Java","authors":"Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang","doi":"10.1109/ICECCS54210.2022.00027","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00027","url":null,"abstract":"Pointer analysis is an important tool for program analysis and program optimization procedures used in modern compilers and bug checkers. This paper introduces parameter-sensitivity, a new methodology that improves pointer analysis for object-oriented programming languages such as Java. In this approach, we construct a method context for a callee method by a list of objects including both the receiver object and the objects that are passed as parameters at a call site. We believe that such a context is able to represent a significant portion of the current abstract state before the method invocation. The algorithm has been implemented in the Soot framework, and it is evaluated on the benchmarks from DaCapo, compared with the standard object-sensitive pointer analysis algorithms. The preliminary result demonstrates that our parameter-sensitive pointer analysis can achieve better precision with less time consumption than the standard k-object-sensitive algorithms.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Model for Fault Tolerant Parallel Matrix Factorization 容错并行矩阵分解的形式化模型
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00016
Camille Coti, L. Petrucci, Daniel Alberto Torres González
As exascale platforms are in sight, high-performance computing needs to take failures into account and provide fault-tolerant applications and environments. Checkpoint-restart approaches do not require modifying the application, but are expensive at large scale. Application-based fault tolerance is more specific to the application and is expected to achieve better performance. In this paper, we address fault-tolerant matrix factorization with algorithms that present good performance, both during failure-free executions and when failures happen. A challenge when designing fault-tolerant algorithms is to make sure they are resilient to any failure scenario. Therefore, we design a model for these algorithms and prove they can tolerate failures at any moment, as long as enough processes are still alive.
随着百亿亿级平台的出现,高性能计算需要考虑故障并提供容错应用程序和环境。检查点重新启动方法不需要修改应用程序,但是在大规模情况下成本很高。基于应用程序的容错更具体于应用程序,期望实现更好的性能。在本文中,我们用在无故障执行和发生故障时都表现出良好性能的算法来解决容错矩阵分解问题。设计容错算法时的一个挑战是确保它们对任何故障场景都具有弹性。因此,我们为这些算法设计了一个模型,并证明只要有足够的进程仍然活着,它们就可以容忍任何时刻的故障。
{"title":"A Formal Model for Fault Tolerant Parallel Matrix Factorization","authors":"Camille Coti, L. Petrucci, Daniel Alberto Torres González","doi":"10.1109/ICECCS54210.2022.00016","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00016","url":null,"abstract":"As exascale platforms are in sight, high-performance computing needs to take failures into account and provide fault-tolerant applications and environments. Checkpoint-restart approaches do not require modifying the application, but are expensive at large scale. Application-based fault tolerance is more specific to the application and is expected to achieve better performance. In this paper, we address fault-tolerant matrix factorization with algorithms that present good performance, both during failure-free executions and when failures happen. A challenge when designing fault-tolerant algorithms is to make sure they are resilient to any failure scenario. Therefore, we design a model for these algorithms and prove they can tolerate failures at any moment, as long as enough processes are still alive.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134600148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iceccs54210.2022.00003","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00003","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page iii] 2022年第26届复杂计算机系统工程国际会议论文集[Title page iii]
Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00002
{"title":"Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page iii]","authors":"","doi":"10.1109/iceccs54210.2022.00002","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00002","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"583 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page i] 第26届复杂计算机系统工程国际会议论文集[Title page i]
Pub Date : 2022-03-01 DOI: 10.1109/iceccs54210.2022.00001
{"title":"Proceedings 2022 26th International Conference on Engineering of Complex Computer Systems [Title page i]","authors":"","doi":"10.1109/iceccs54210.2022.00001","DOIUrl":"https://doi.org/10.1109/iceccs54210.2022.00001","url":null,"abstract":"","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denotational and Algebraic Semantics for Cyber-physical Systems 网络物理系统的指称语义和代数语义
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00023
Ran Li, Huibiao Zhu, R. Banach
The cyber-physical system (CPS) is a dynamic system that contains both continuous and discrete behaviors. It has a wide range of applications in fields such as health care equipment, intelligent traffic control and environmental monitoring. However, the combination of continuous physical behavior and discrete control behavior may complicate the design of systems further. It is of great necessity to give an explicit formal language and its semantics for CPS. In this paper, we elaborate the modeling language for CPS based on our previous work. This language supports shared variables to model the interaction between the physical and the cyber. Additionally, we give it denotational semantics and algebraic semantics, especially focus on the continuous behavior and its composition with the discrete behavior. Throughout this paper, we also present some examples to illustrate the feasibility of the language and its semantics.
信息物理系统是一个包含连续和离散行为的动态系统。它在医疗保健设备、智能交通控制、环境监测等领域有着广泛的应用。然而,连续物理行为和离散控制行为的结合可能会使系统的设计进一步复杂化。为CPS提供一种明确的形式语言及其语义是十分必要的。本文在前人工作的基础上,详细阐述了CPS的建模语言。这种语言支持共享变量来模拟物理和网络之间的交互。此外,我们还给出了它的指称语义和代数语义,特别关注了连续行为及其与离散行为的组合。在整篇文章中,我们还举了一些例子来说明该语言及其语义的可行性。
{"title":"Denotational and Algebraic Semantics for Cyber-physical Systems","authors":"Ran Li, Huibiao Zhu, R. Banach","doi":"10.1109/ICECCS54210.2022.00023","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00023","url":null,"abstract":"The cyber-physical system (CPS) is a dynamic system that contains both continuous and discrete behaviors. It has a wide range of applications in fields such as health care equipment, intelligent traffic control and environmental monitoring. However, the combination of continuous physical behavior and discrete control behavior may complicate the design of systems further. It is of great necessity to give an explicit formal language and its semantics for CPS. In this paper, we elaborate the modeling language for CPS based on our previous work. This language supports shared variables to model the interaction between the physical and the cyber. Additionally, we give it denotational semantics and algebraic semantics, especially focus on the continuous behavior and its composition with the discrete behavior. Throughout this paper, we also present some examples to illustrate the feasibility of the language and its semantics.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification HoS-ML:致力于人类脆弱性识别的社会技术系统ADL
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00010
Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, A. Beugnard
Due to the increasing complexity of modern systems, the level of responsibility dedicated to the human operator has grown, particularly in Socio-Technical Systems (STS) where humans are considered as subsystems. Like every system, the human operator can fail by behaving in undesired ways, and consequently have a negative impact on the system. Thus, to improve the resilience of the overall system, it is necessary to manage the vulnerability of humans. In this paper we present an approach to assess human vulnerabilities in an STS through its architecture. We propose a model that describes the STS, based on human characteristics having a significant impact on human vulnerabilities. We define an assessment metric for each characteristic. We propose an approach allowing not only to assess the vulnerability of a specific human in the system, but also to understand how a vulnerability propagates through the system. We implemented this approach with a dedicated architecture description language, called Hos-ML, allowing the architect to deal with STS vulnerabilities.
由于现代系统的复杂性日益增加,人类操作员的责任水平已经增长,特别是在社会技术系统(STS)中,人类被视为子系统。像每个系统一样,人类操作员可能会因不希望的方式而失败,从而对系统产生负面影响。因此,为了提高整个系统的复原力,有必要管理人类的脆弱性。在本文中,我们提出了一种方法,通过其架构来评估STS中的人类脆弱性。我们提出了一个描述STS的模型,该模型基于对人类脆弱性有重大影响的人类特征。我们为每个特征定义一个评估指标。我们提出了一种方法,不仅可以评估系统中特定人员的脆弱性,还可以了解脆弱性如何在系统中传播。我们使用专用的架构描述语言(称为Hos-ML)实现了这种方法,允许架构师处理STS漏洞。
{"title":"HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification","authors":"Paul Perrotin, Nicolas Belloir, Salah Sadou, David Hairion, A. Beugnard","doi":"10.1109/ICECCS54210.2022.00010","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00010","url":null,"abstract":"Due to the increasing complexity of modern systems, the level of responsibility dedicated to the human operator has grown, particularly in Socio-Technical Systems (STS) where humans are considered as subsystems. Like every system, the human operator can fail by behaving in undesired ways, and consequently have a negative impact on the system. Thus, to improve the resilience of the overall system, it is necessary to manage the vulnerability of humans. In this paper we present an approach to assess human vulnerabilities in an STS through its architecture. We propose a model that describes the STS, based on human characteristics having a significant impact on human vulnerabilities. We define an assessment metric for each characteristic. We propose an approach allowing not only to assess the vulnerability of a specific human in the system, but also to understand how a vulnerability propagates through the system. We implemented this approach with a dedicated architecture description language, called Hos-ML, allowing the architect to deal with STS vulnerabilities.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks 基于状态重构的RDMA网络分布式显式状态空间探索
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00021
Sami Evangelista, L. Petrucci, L. Kristensen
The inherent computational complexity of validating and verifying concurrent systems implies a need to be able to exploit parallel and distributed computing architectures. We present a new distributed algorithm for state space exploration of concurrent systems on computing clusters. Our algorithm relies on Remote Direct Memory Access (RDMA) for low-latency transfer of states between computing elements, and on state reconstruction trees for compact representation of states on the computing elements themselves. For the distribution of states between computing elements, we propose a concept of state stealing. We have implemented our proposed algorithm using the OpenSHMEM API for RDMA and experimentally evaluated it on the Grid'500 testbed with a set of benchmark models. The experimental results show that our algorithm scales well with the number of available computing elements, and that our state stealing mechanism generally provides a balanced workload distribution.
验证并发系统固有的计算复杂性意味着需要能够利用并行和分布式计算架构。提出了一种用于计算集群上并发系统状态空间探索的分布式算法。我们的算法依赖于远程直接内存访问(RDMA)来实现计算元素之间的低延迟状态传输,并依赖于状态重建树来紧凑地表示计算元素本身的状态。对于计算元素之间的状态分布,我们提出了状态窃取的概念。我们使用OpenSHMEM RDMA API实现了我们提出的算法,并在Grid'500测试平台上使用一组基准模型对其进行了实验评估。实验结果表明,我们的算法可以很好地随可用计算元素的数量而扩展,并且我们的状态窃取机制总体上提供了均衡的工作负载分配。
{"title":"Distributed Explicit State Space Exploration with State Reconstruction for RDMA Networks","authors":"Sami Evangelista, L. Petrucci, L. Kristensen","doi":"10.1109/ICECCS54210.2022.00021","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00021","url":null,"abstract":"The inherent computational complexity of validating and verifying concurrent systems implies a need to be able to exploit parallel and distributed computing architectures. We present a new distributed algorithm for state space exploration of concurrent systems on computing clusters. Our algorithm relies on Remote Direct Memory Access (RDMA) for low-latency transfer of states between computing elements, and on state reconstruction trees for compact representation of states on the computing elements themselves. For the distribution of states between computing elements, we propose a concept of state stealing. We have implemented our proposed algorithm using the OpenSHMEM API for RDMA and experimentally evaluated it on the Grid'500 testbed with a set of benchmark models. The experimental results show that our algorithm scales well with the number of available computing elements, and that our state stealing mechanism generally provides a balanced workload distribution.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension-Compression Learning: A deep learning code search method that simulates reading habits 扩展压缩学习:一种模拟阅读习惯的深度学习代码搜索方法
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00032
Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong
To speed up the efficiency of software development, the ability to retrieve codes through natural language is fundamental. At present, the approach of code search based on deep learning has been extensively researched and achieved a lot of results. However, these models are much complex and the training relies on artificially extracted features. Different from other deep learning models, we simulate people's reading habit of expanding content first and then refining content when learning new knowledge and propose the concept of Extension-Compression Learning. The model can effectively express the features of code and natural language through Extension Learning and Compression Learning. We evaluate the effect of the approach on the code search task with a small dataset and a large dataset, and the results show that all indicators are better than those of other approaches that embed code and text into a joint vector space.
为了提高软件开发的效率,通过自然语言检索代码的能力是至关重要的。目前,基于深度学习的代码搜索方法已经得到了广泛的研究,并取得了许多成果。然而,这些模型非常复杂,训练依赖于人工提取的特征。与其他深度学习模型不同的是,我们模拟了人们在学习新知识时先扩展内容再细化内容的阅读习惯,提出了扩展压缩学习的概念。该模型通过扩展学习和压缩学习,可以有效地表达代码和自然语言的特征。我们用一个小数据集和一个大数据集评估了该方法在代码搜索任务上的效果,结果表明,所有指标都优于其他将代码和文本嵌入到联合向量空间的方法。
{"title":"Extension-Compression Learning: A deep learning code search method that simulates reading habits","authors":"Lian Gu, Zihui Wang, Jiaxin Liu, Yating Zhang, Dong Yang, Wei Dong","doi":"10.1109/ICECCS54210.2022.00032","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00032","url":null,"abstract":"To speed up the efficiency of software development, the ability to retrieve codes through natural language is fundamental. At present, the approach of code search based on deep learning has been extensively researched and achieved a lot of results. However, these models are much complex and the training relies on artificially extracted features. Different from other deep learning models, we simulate people's reading habit of expanding content first and then refining content when learning new knowledge and propose the concept of Extension-Compression Learning. The model can effectively express the features of code and natural language through Extension Learning and Compression Learning. We evaluate the effect of the approach on the code search task with a small dataset and a large dataset, and the results show that all indicators are better than those of other approaches that embed code and text into a joint vector space.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1