One of the most crucial aspects of software development is software cost estimation. It entails calculating the amount of time and money needed to finish the software development. software cost estimation is crucial w...
详细信息
System logs are vital for diagnosing system failures, with log parsing converting unstructured logs into structured data. Existing methods fall into two categories: non-deep-learning approaches cluster logs based on s...
详细信息
Sustainable software development is a major challenge in the softwareengineering industry. software practitioners lack practical guidance or tools for integrating social sustainability in software development process...
详细信息
ISBN:
(纸本)9798350322637
Sustainable software development is a major challenge in the softwareengineering industry. software practitioners lack practical guidance or tools for integrating social sustainability in software development processes. This study proposes stakeholder mapping and the use of sustainability personas as a framework to guide software practitioners in making decisions that support socially sustainable software development. We will evaluate the effectiveness in a randomized controlled experiment with 104 final-year undergraduate computerscience students who would select features to be included in the development of a software application. We aim to show how these interventions helps to improve software practitioners' perspective of social sustainability in software development.
Drones are emerging technologies in agriculture, replacing manual pesticide spraying due to harmful side effects on personnel. It is designed to reduce time and labor costs for farmers. This paper aims to develop a so...
详细信息
As the importance of sustainability increases in various sectors due to the effects of climate change, environmental responsibility is expected to be prioritized in the software development sector. This study examines...
详细信息
Microservices architecture has advantages such as independent development, independent deployment, scalability, and reusability. However, faults are inevitable during the operation of microservices systems. This paper...
详细信息
software vulnerability detection aims to identify latent weaknesses in source code to protect software systems from attacks. Most of the current neural network-based approaches rely on preprocessing source codes using...
详细信息
ISBN:
(纸本)9798350395693;9798350395686
software vulnerability detection aims to identify latent weaknesses in source code to protect software systems from attacks. Most of the current neural network-based approaches rely on preprocessing source codes using code parsers to obtain program dependency graphs for downstream vulnerability detection tasks. However, as source codes may contain incorrect format and special functions, this paradigm may cause parsing errors due to their failure to satisfy the parser's presets or requirements. In addition, modern software development often involves the integration of multiple programming languages, presenting challenges for conventional code parsers that are designed for specific programming languages. To address these issues, we present a novel detection framework that can identify software vulnerabilities in a programming language-agnostic manner without relying on code parsers. We conduct extensive experiments on the CodeXGLUE, Reveal, and FUNDED public datasets and evaluate them against leading vulnerability detection benchmarks. Experimental results show that BABEL sets new performance standards, demonstrating superior accuracy and F1 scores across various tasks, including those in language-independent settings, demonstrating the applicability of BABEL in real-world application scenarios. Our code is available at https://***/gdufsnlp/BABEL
With the advancement of quantum computing technology, a pressing need arises to assess its potential implications on existing systems and infrastructures. In this paper, we delve into the interplay between quantum com...
详细信息
ISBN:
(纸本)9783031492686;9783031492693
With the advancement of quantum computing technology, a pressing need arises to assess its potential implications on existing systems and infrastructures. In this paper, we delve into the interplay between quantum computing and 5G technology, with a specific focus on its profound impact on cryptography and the emergence of post-quantum techniques. We analyse the potential vulnerabilities quantum computers pose to conventional cryptographic algorithms employed in 5G networks. Our research investigates the challenges and opportunities that arise at the intersection of quantum computing and 5G, ultimately aiming to contribute to the development of secure and future-proof communication systems.
This research proposal aims to employ machine learning techniques to analyze employee retention factors in software Companies, recognizing its crucial role in organizational success and the potential costs of high tur...
详细信息
We propose a method for automatically discovering likely program invariants for persistent memory (PM), which is a type of fast and byte-addressable storage device that can retain data after power loss. The invariants...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
We propose a method for automatically discovering likely program invariants for persistent memory (PM), which is a type of fast and byte-addressable storage device that can retain data after power loss. The invariants, also called PM properties or PM requirements, specify which objects of the program should be made persistent and in what order. Our method relies on a combination of static and dynamic analysis techniques. Specifically, it relies on static analysis to compute dependence relations between LOAD/STORE instructions and instruments the information into the executable program. Then, it relies on dynamic analysis of the execution traces and counterfactual reasoning to infer PM properties. With precisely computed dependence relations, the inferred properties are necessary conditions for the program to behave correctly through power loss and recovery;with imprecise dependence relations, these are likely program invariants. We have evaluated our method on benchmark programs including eight persistent data structures and two distributed storage applications, Redis and Memcached. The results show that our method can infer PM properties quickly and these properties are of higher quality than those inferred by a state-of-the-art technique. We also demonstrate the usefulness of the inferred properties by leveraging them for PM bug detection, which significantly improves the performance of a state-of-the-art PM bug detection technique.
暂无评论