›› 2016,Vol. 31 ›› Issue (5): 851-860.doi: 10.1007/s11390-016-1668-9

所属专题: Software Systems

• Special Section on Selected Paper from NPC 2011 • 上一篇    下一篇

大规模软件系统的研究机遇与挑战

Xusheng Xiao1, Jian-Guang Lou2, Member, ACM, IEEE, Shan Lu3, David C. Shepherd4, Xin Peng5, and Qian-Xiang Wang6, Member, CCF, IEEE   

  1. 1 NEC Laboratories America, Princeton, NJ 08540, U.S.A.;
    2 Microsoft Research Asia, Beijing 100080, China;
    3 Department of Computer Science, University of Chicago, Chicago, IL 60637, U.S.A.;
    4 ABB Corporate Research, Raleigh, NC 27606, U.S.A.;
    5 School of Computer Science, Fudan University, Shanghai 201203, China;
    6 School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
  • 收稿日期:2016-08-22 修回日期:2016-08-23 出版日期:2016-09-05 发布日期:2016-09-05
  • 作者简介:Xusheng Xiao is a researcher at NEC Laboratories America, Princeton. He received his Ph.D. degree in computer science from North Carolina State University, and was a visiting student in computer science at the University of Illinois at Urbana-Champaign, USA. His research interests are in software engineering and computer security, with a focus on software testing, bug detection, mobile security, and system/enterprise security. His work in mobile security has been selected as one of the top ten finalists for CSAW Best Applied Security Paper Award 2015. His research has been presented at top-tier venues such as ICSE, FSE, ISSTA, ASE, USENIX Security, CCS, and VLDB.

Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems

Xusheng Xiao1, Jian-Guang Lou2, Member, ACM, IEEE, Shan Lu3, David C. Shepherd4, Xin Peng5, and Qian-Xiang Wang6, Member, CCF, IEEE   

  1. 1 NEC Laboratories America, Princeton, NJ 08540, U.S.A.;
    2 Microsoft Research Asia, Beijing 100080, China;
    3 Department of Computer Science, University of Chicago, Chicago, IL 60637, U.S.A.;
    4 ABB Corporate Research, Raleigh, NC 27606, U.S.A.;
    5 School of Computer Science, Fudan University, Shanghai 201203, China;
    6 School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
  • Received:2016-08-22 Revised:2016-08-23 Online:2016-09-05 Published:2016-09-05
  • About author:Xusheng Xiao is a researcher at NEC Laboratories America, Princeton. He received his Ph.D. degree in computer science from North Carolina State University, and was a visiting student in computer science at the University of Illinois at Urbana-Champaign, USA. His research interests are in software engineering and computer security, with a focus on software testing, bug detection, mobile security, and system/enterprise security. His work in mobile security has been selected as one of the top ten finalists for CSAW Best Applied Security Paper Award 2015. His research has been presented at top-tier venues such as ICSE, FSE, ISSTA, ASE, USENIX Security, CCS, and VLDB.

软件系统领域代表性的研究者,作为本专辑的客座编辑,讨论了本领域将来研究方向的重要研究点。本文中所包括的议题覆盖了大规模软件系统的研究机遇和挑战,包括:组织级别软件行为的查询(肖旭生),日志和日志分析(楼建光),可靠的云分布系统的工程化(卢山),使用数据(David C. Shepherd),代码克隆的检测和管理(彭鑫),代码搜索(王千祥)——谢涛,软件系统领域领袖编委

Abstract: For this special section on software systems, six research leaders in software systems, as guest editors for this special section, discuss important issues that will shape this field's future research directions. The essays included in this roundtable article cover research opportunities and challenges for large-scale software systems such as querying organizationwide software behaviors (Xusheng Xiao), logging and log analysis (Jian-Guang Lou), engineering reliable cloud distributed systems (Shan Lu), usage data (David C. Shepherd), clone detection and management (Xin Peng), and code search and beyond (Qian-Xiang Wang). — Tao Xie, Leading Editor of Software Systems.

[1] Yuan D, Park S, Zhou Y. Characterizing logging practices in open-source software. In Proc. the 34th ICSE, June 2012, pp.102-112.

[2] Zong B, Xiao X, Li Z, Wu Z, Qian Z, Yan X, Singh A K, Jiang G. Behavior query discovery in system-generated temporal graphs. PVLDB, 2015, 9(4): 240-251.

[3] Xu Z, Wu Z, Li Z, Jee K, Rhee J, Xiao X, Xu F, Wang H, Jiang G. High fidelity data reduction for big data security dependency analyses. In Proc. the 23rd ACM Conference on Computer and Communications Security (CCS), Oct. 2016.

[4] Ding R, Zhou H, Lou J G, Zhang H, Lin Q, Fu Q, Zhang D, Xie T. Log2: A cost-aware logging mechanism for performance diagnosis. In Proc. the USENIX Annual Technical Conference, July 2015, pp.139-150.

[5] Yuan D, Zheng J, Park S, Zhou Y, Savage S. Improving software diagnosability via log enhancement. In Proc. the 16th ASPLOS, March 2011, pp.3-14.

[6] Fu Q, Zhu J, Hu W, Lou J G, Ding R, Lin Q, Zhang D, Xie T. Where do developers log? An empirical study on logging practices in industry. In Proc. ICSE, May 31-June 7, 2014, pp.24-33.

[7] Yuan C, Lao N, Wen J R, Li J, Zhang Z, Wang Y M, Ma W Y. Automated known problem diagnosis with event traces. In Proc. the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys), April 2006, pp.375-388.

[8] Lo D, Cheng H, Han J, Khoo S C, Sun C. Classification of software behaviors for failure detection: A discriminative pattern mining approach. In Proc. the 15th SIGKDD, June 28-July 1, 2009, pp.557-566.

[9] Xu W, Huang L, Fox A, Patterson D, Jordan M. Detecting large-scale system problems by mining console logs. In Proc. the 22nd ACM SOSP, Oct. 2009, pp.117-132.

[10] Lou J G, Fu Q, Yang S, Xu Y, Li J. Mining invariants from console logs for system problem detection. In Proc. USENIX ATC, June 2010, p.24.

[11] Reidemeister T, Jiang M, Ward P. Mining unstructured log files for recurrent fault diagnosis. In Proc. the 12th IFIP/IEEE International Symposium on Integrated Network Management, May 2011, pp.377-384.

[12] Menzies T, Butcher A, Cok D et al. Local versus global lessons for defect prediction and effort estimation. IEEE Transactions on Software Engineering, 2013, 39(6): 822-834.

[13] Lou J G, Lin Q, Ding R, Fu Q, Zhang D, Xie T. Software analytics for incident management of online services: An experience report. In Proc. the 28th ASE, Nov. 2013, pp.475-485.

[14] Leesatapornwongsa T, Lukman J F, Lu S, Gunawi H S. TaxDC: A taxonomy of nondeterministic concurrency bugs in datacenter distributed systems. In Proc. the 21st International Conference on Architectural Support for Programming Languages and Operating Systems, April 2016, pp.517-530.

[15] Leesatapornwongsa T, Hao M, Joshi P, Lukman J F, Gunawi H S. SAMC: Semantic-aware model checking for fast discovery of deep bugs in cloud systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.399-414.

[16] Yuan D, Luo Y, Zhuang X, Rodrigues G R, Zhao X, Zhang Y, Jain P U, Stumm M. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.249-265.

[17] Fang L, Nguyen K, Xu G, Demsky B, Lu S. Interruptible tasks: Treating memory pressure as interrupts for highly scalable data-parallel programs. In Proc. the 25th Symposium on Operating Systems Principles, Oct. 2015, pp.394-409.

[18] Nguyen K, Fang L, Xu G H, Demsky B, Lu S, Alamian S, Mutlu O. Yak: A high-performance big-data-friendly garbage collector. In Proc. the 12th USENIX Conference on Operating Systems Design and Implementation, Nov. 2016.

[19] Murphy G C, Kersten M, Findlater L. How are Java software developers using the Eclipse IDE? IEEE Software, 2006, 23(4): 76-83.

[20] Roy C K, Cordy J R. A survey on software clone detection research. Technical Report, TR 2007-541, School of Computing, Queen's University at Kingston, 2007. http://research.cs.queensu.ca/TechReports/Reports/2007-541.pdf, Aug. 2016.

[21] Kapser C J, Godfrey M W. “Cloning considered harmful” considered harmful: Patterns of cloning in software. Empirical Software Engineering, 2008, 13(6): 645-692.

[22] Zhang G, Peng X, Xing Z, Zhao W. Cloning practices: Why developers clone and what can be changed. In Proc. the 28th IEEE International Conference on Software Maintenance, Sept. 2012, pp.285-294.

[23] Roy C K, Zibran M F, Koschke R. The vision of software clone management: Past, present, and future (keynote paper). In Proc. the 2014 Software Evolution Week — IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, Feb. 2014, pp.18-33.

[24] Kim M, Sazawal V, Notkin D, Murphy G C. An empirical study of code clone genealogies. In Proc. the 10th ESEC/FSE, Sept. 2005, pp.187-196.

[25] Zhang G, Peng X, Xing Z, Jiang S, Wang H, Zhao W. Towards contextual and ondemand code clone management by continuous monitoring. In Proc. the 28th IEEE/ACM International Conference on Automated Software Engineering, Nov. 2013, pp.497-507.

[26] Lin Y, Peng X, Xing Z, Zheng D, Zhao W. Clone-based and interactive recommendation for modifying pasted code. In Proc. the 10th Joint Meeting on Foundations of Software Engineering, Aug. 30-Sept. 4, 2015, pp.520-531.

[27] Zhong H, Xie T, Zhang L, Pei J, Mei H. MAPO: Mining and recommending API usage patterns. In Proc. the 23rd European Conference on Object-Oriented Programming, July 2009, pp.318-343.

[28] Keivanloo I, Rilling J, Zou Y. Spotting working code examples. In Proc. the 36th International Conference on Software Engineering, May 31-June 7, 2014, pp.664-675.

[29] Li X, Wang Z, Wang Q, Yan S, Xie T, Mei H. Relationshipaware code search for JavaScript frameworks. In Proc. the 24th International Symposium on the Foundations of Software Engineering, Nov. 2016.

[30] Raghothaman M, Wei Y, Hamadi Y. SWIM: Synthesizing what I mean: Code search and idiomatic snippet synthesis. In Proc. the 38th International Conference on Software Engineering, Sept. 2016, pp.357-367.

[31] Wang Q, Li X. Bug localization via searching crowdcontributed code. In Proc. the 6th Asia-Pacific Symposium on Internetware, Nov. 2014, pp.1-10.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 陈世华;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[2] 刘明业; 洪恩宇;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[3] 陈世华;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[4] 高庆狮; 张祥; 杨树范; 陈树清;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[5] 陈肇雄; 高庆狮;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[6] 黄河燕;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[7] 闵应骅; 韩智德;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[8] 唐同诰; 招兆铿;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[9] 闵应骅;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[10] 朱鸿;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
版权所有 © 《计算机科学技术学报》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
总访问量: