The maintenance of build systems imposes a considerable overhead on software development. Since automated quality assurance methods are rarely applied to build specifications, the importance of the role peer code revi...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
The maintenance of build systems imposes a considerable overhead on software development. Since automated quality assurance methods are rarely applied to build specifications, the importance of the role peer code review plays in the maintenance of build systems is amplified. Yet prior work shows that the review process for build systems suffers from a lack of build experts and effective tooling. To support the understanding of changes to build specifications (a key stage in the review process), we propose BCIA-an approach to summarize the impact of changes to build specifications across the build configuration space. BCIA traverses the paths through which data and control flow in the prior and updated versions of the build system to generate an Impact knowledge Graph (IKG), which describes the impact of the change across the build configuration space. We develop BuiScout-a prototype implementation of BCIA for CMake-based build systems. We use BuiScout to evaluate our approach through an empirical study of 10,000 change sets that we mine from ten large open-source projects that span a total of 28 development years. Our findings indicate that BuiScout can detect an impact that propagates to unmodified parts of the build system in 77.37% of the studied change sets. These changes impact a median of 14 unmodified commands, with a median of 95.55% of the impacted commands per change set appearing in unmodified files. Our study suggests that dedicated approaches, such as BCIA, have the potential to alleviate the challenges developers face when assessing the impact of changes to build systems.
In modern softwareengineering, requirements analysis and modeling are key steps in requirements engineering, influencing the subsequent system design and implementation. Traditional requirements analysis and modeling...
详细信息
The rapid evolution of complex software systems claims for novel approaches, such as self-adaptive systems that can autonomously adjust their behavior to meet changing requirements and dynamic contexts. This paper pro...
详细信息
ISBN:
(纸本)9783031663253;9783031663260
The rapid evolution of complex software systems claims for novel approaches, such as self-adaptive systems that can autonomously adjust their behavior to meet changing requirements and dynamic contexts. This paper proposes guidelines for the development of reactive and proactive approaches to self-adaptive systems. The guidelines concern architectural based approaches using explicitly the MAPE-K (Monitor, Analyze, Plan, Execute using knowledge) control feedback loop. The proposed guidelines are organized into five parts, one for each step of the MAPE-K loop including the knowledge with the goal to provide guidance when designing and implementing self-adaptive systems from a softwareengineering point of view. Three self-adaptive artifacts (i.e., OCCI Monitoring, DingNet, and SWIM) from different application domains (i.e., cloud computing, Internet of Things, Web application) have been analyzed by considering the proposed guidelines. Their reactive and proactive characteristics are compared.
Recent advancements in large language models (I.I.N4s) have exhibited promising capabilities in addressing various tasks such as defect detection and program repair. Despite their prevalence, LLMs still face limitatio...
详细信息
ISBN:
(纸本)9798400706127
Recent advancements in large language models (I.I.N4s) have exhibited promising capabilities in addressing various tasks such as defect detection and program repair. Despite their prevalence, LLMs still face limitations in effectively handling these tasks. Common strategies to adapt them and improve their performance for specific tasks involve fine-tuning models based on user data or employing in-context learning with examples of desired inputs and outputs. However, they pose challenges for practical adoption due to the need for extensive computational resources, high-quality data, and continuous maintenance. Furthermore, neither strategy can explain or reason about the deficiencies of LLMs in the given tasks. We propose CALICO to address the high cost of fine-tuning, eliminate the necessity for task-specific examples, and provide explanations of LLM deficiency. At the heart of CALICO is an evolutionary approach that interleaves knowledge calibration and Al deficiency diagnosis. The key essence of CALICO is as follows. First, it focuses on identifying knowledge gaps in LLiVls' program comprehension. Second, it conducts automated code refactoring to integrate the overlooked knowledge into the source code for mitigating those gaps. Third, it employs what-ifanalysis and counterfactual reasoning to determine a minimum set of overlooked knowledge necessary to improve the performance of LLMs in code tasks. We have extensively evaluated CALICO over 8,938 programs on three most commonly seen code tasks. Our experimental results Show that vanilla ChatGPT cannot fully understand code structures. With knowledge calibration, Latico improves it by 20% and exhibits comparable proficiency compared to fine-tuned LLIVIs. Deficiency diagnosis contributes to 8% reduction in program sizes while ensuring performance. These impressive results demonstrate the feasibility of utilizing a vanilla for automated softwareengineering (SE) tasks, thereby avoiding the high computational costs ass
softwareengineering, in general, and Global softwareengineering (GSE), in particular, face challenges such as handling communication and collaboration issues and inappropriate knowledge management. It is difficult t...
详细信息
The proceedings contain 40 papers. The topics discussed include: development of a web-based intervention application for high school teachers’ intervention efforts;ADOMATH: an android mobile game application for pres...
ISBN:
(纸本)9798350391411
The proceedings contain 40 papers. The topics discussed include: development of a web-based intervention application for high school teachers’ intervention efforts;ADOMATH: an android mobile game application for preschoolers;calculation method of winning percentage in handball games and its application to player evaluation;strategic prioritization of industry 4.0 adoption in Indonesian manufacturing SMEs: a best-worst method analysis;predicting motorcycle tire failure with deep learning;GoCart: an IoT-based cart system with promotional feature in mobile application;process mining techniques utilizing ChatGPT: a comparative analysis with disco software on call center log data;and siltation modeling in Laguna Lake: a case study of Brgy. Palingon, Calamba City.
The Unmanned Aerial Vehicles (UAV) Avionics Analytics Ontology (U-AAO) framework prototype experimental results demonstrate verification for UAV traffic management (UTM). The U-AAO prototype is a proof-of-concept fram...
详细信息
ISBN:
(纸本)9798350393101;9798350393095
The Unmanned Aerial Vehicles (UAV) Avionics Analytics Ontology (U-AAO) framework prototype experimental results demonstrate verification for UAV traffic management (UTM). The U-AAO prototype is a proof-of-concept framework that consists of a software application and a hardware platform. The software application entails a digital support system (AAO), its managing mechanisms to access query and retrieve query results information from the AAO, and the user interface to display the AAO querying results to the system stakeholders, and an Automatic Dependence Surveillance-Broadcast (ADS-B) collection application. The hardware platform consists of two rotary-wing drones and two fixed-wing drones equipped with ADS-B, and a computer that runs the decision support system and ADS-B collection software application. The computer plays the role of a ground operation station to monitor ADS-B communications for aircraft detection.
Cloud security encompasses the deployment of advanced technologies, methodologies, and programming to safeguard cloud-based applications, ensuring their protection against potential threats and vulnerabilities. Cloud ...
详细信息
Nowadays, the construction industry's digital transformation processes are challenging civil engineering education. In general, students and society underestimate the civil engineering field as an outdated and arc...
详细信息
Nowadays, the construction industry's digital transformation processes are challenging civil engineering education. In general, students and society underestimate the civil engineering field as an outdated and archaic knowledge area. Despite the defragmentation and heterogeneity of the sector, advances have been made on the path for Construction 4.0 and 5.0 scenarios. From this perspective, the CONSTRUCT-Gequaltec group of the Faculty of engineering of the University of Porto have been sponsoring research and technological development using hardware and software targeting construction management solutions. This paper presents the work in progress mainly connected to the curricular units regarding project management in the Construction Section of the Civil engineering Department. It also targets assumptions of some expected results across the research and innovation priorities from ECTP Innovative Built Environment and United Nations Sustainable Development Goals (SDGs). Two fundamental elements of the teaching practices are presented as the Construction Sites of the Future (Laboratory -based Education initiative) and Digital products catalogue targeting Digital Twins in Construction (Project based Learning initiative). The learning outcomes address increasing knowledge of innovative solutions, delivering skills to deploy 5.0 actions, and targeting humancentred and sustainable attitudes and values.
Free and Open Source software (FOSS) has become the fundamental infrastructure of mainstream software projects. FOSS is subject to various legal terms and restrictions, depending on the type of open source license in ...
详细信息
ISBN:
(纸本)9798350300376
Free and Open Source software (FOSS) has become the fundamental infrastructure of mainstream software projects. FOSS is subject to various legal terms and restrictions, depending on the type of open source license in force. Hence it is important to remain compliant with the FOSS license terms. Identifying the licenses that provide FOSS and understanding the terms of those licenses is not easy, especially when dealing with a large amount of reuse that is common in modern software development. Since reused software is often large, automated license analysis is needed to address these issues and support users in license compliant reuse of FOSS. However, existing license assessment tools can only identify the name and quantity of licenses embedded in software and thus cannot identify whether the licenses are being used safely and correctly. Moreover, they cannot provide a comprehensive analysis of the compatibility and potential risk that come with the term conflicts. In this paper, we propose DIKE, an automated tool that can perform license detection and conflict analysis for FOSS. First, DIKE extracts 12 terms under 3,256 unique open source licenses by manual analysis and Natural Language Processing (NLP) and constructs a license knowledge base containing the responsibilities of the terms. Second, DIKE scans all licenses from the code snippet for the input software and outputs the scan results in a tree structure. Third, the scan results match the license knowledge base to detect license conflicts from terms and conditions. DIKE designs two solutions for software with license conflicts: license replacement and code replacement. To demonstrate the effectiveness of DIKE, we first evaluate with the term extraction and responsibility classification, and the results show that their F1-scores reach 0.816 and 0.948, respectively. In addition, we conduct a measurement study of 16,341 popular projects from GitHub based on our proposed DIKE to explore the conflict of license us
暂无评论