|
›› 2016,Vol. 31 ›› Issue (5): 851-860.doi: 10.1007/s11390-016-1668-9
所属专题: Software Systems
• Special Section on Selected Paper from NPC 2011 • 上一篇 下一篇
Xusheng Xiao1, Jian-Guang Lou2, Member, ACM, IEEE, Shan Lu3, David C. Shepherd4, Xin Peng5, and Qian-Xiang Wang6, Member, CCF, IEEE
Xusheng Xiao1, Jian-Guang Lou2, Member, ACM, IEEE, Shan Lu3, David C. Shepherd4, Xin Peng5, and Qian-Xiang Wang6, Member, CCF, IEEE
软件系统领域代表性的研究者,作为本专辑的客座编辑,讨论了本领域将来研究方向的重要研究点。本文中所包括的议题覆盖了大规模软件系统的研究机遇和挑战,包括:组织级别软件行为的查询(肖旭生),日志和日志分析(楼建光),可靠的云分布系统的工程化(卢山),使用数据(David C. Shepherd),代码克隆的检测和管理(彭鑫),代码搜索(王千祥)——谢涛,软件系统领域领袖编委
[1] Yuan D, Park S, Zhou Y. Characterizing logging practices in open-source software. In Proc. the 34th ICSE, June 2012, pp.102-112.[2] Zong B, Xiao X, Li Z, Wu Z, Qian Z, Yan X, Singh A K, Jiang G. Behavior query discovery in system-generated temporal graphs. PVLDB, 2015, 9(4): 240-251.[3] Xu Z, Wu Z, Li Z, Jee K, Rhee J, Xiao X, Xu F, Wang H, Jiang G. High fidelity data reduction for big data security dependency analyses. In Proc. the 23rd ACM Conference on Computer and Communications Security (CCS), Oct. 2016.[4] Ding R, Zhou H, Lou J G, Zhang H, Lin Q, Fu Q, Zhang D, Xie T. Log2: A cost-aware logging mechanism for performance diagnosis. In Proc. the USENIX Annual Technical Conference, July 2015, pp.139-150.[5] Yuan D, Zheng J, Park S, Zhou Y, Savage S. Improving software diagnosability via log enhancement. In Proc. the 16th ASPLOS, March 2011, pp.3-14.[6] Fu Q, Zhu J, Hu W, Lou J G, Ding R, Lin Q, Zhang D, Xie T. Where do developers log? An empirical study on logging practices in industry. In Proc. ICSE, May 31-June 7, 2014, pp.24-33.[7] Yuan C, Lao N, Wen J R, Li J, Zhang Z, Wang Y M, Ma W Y. Automated known problem diagnosis with event traces. In Proc. the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys), April 2006, pp.375-388.[8] Lo D, Cheng H, Han J, Khoo S C, Sun C. Classification of software behaviors for failure detection: A discriminative pattern mining approach. In Proc. the 15th SIGKDD, June 28-July 1, 2009, pp.557-566.[9] Xu W, Huang L, Fox A, Patterson D, Jordan M. Detecting large-scale system problems by mining console logs. In Proc. the 22nd ACM SOSP, Oct. 2009, pp.117-132.[10] Lou J G, Fu Q, Yang S, Xu Y, Li J. Mining invariants from console logs for system problem detection. In Proc. USENIX ATC, June 2010, p.24.[11] Reidemeister T, Jiang M, Ward P. Mining unstructured log files for recurrent fault diagnosis. In Proc. the 12th IFIP/IEEE International Symposium on Integrated Network Management, May 2011, pp.377-384.[12] Menzies T, Butcher A, Cok D et al. Local versus global lessons for defect prediction and effort estimation. IEEE Transactions on Software Engineering, 2013, 39(6): 822-834.[13] Lou J G, Lin Q, Ding R, Fu Q, Zhang D, Xie T. Software analytics for incident management of online services: An experience report. In Proc. the 28th ASE, Nov. 2013, pp.475-485.[14] Leesatapornwongsa T, Lukman J F, Lu S, Gunawi H S. TaxDC: A taxonomy of nondeterministic concurrency bugs in datacenter distributed systems. In Proc. the 21st International Conference on Architectural Support for Programming Languages and Operating Systems, April 2016, pp.517-530.[15] Leesatapornwongsa T, Hao M, Joshi P, Lukman J F, Gunawi H S. SAMC: Semantic-aware model checking for fast discovery of deep bugs in cloud systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.399-414.[16] Yuan D, Luo Y, Zhuang X, Rodrigues G R, Zhao X, Zhang Y, Jain P U, Stumm M. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.249-265.[17] Fang L, Nguyen K, Xu G, Demsky B, Lu S. Interruptible tasks: Treating memory pressure as interrupts for highly scalable data-parallel programs. In Proc. the 25th Symposium on Operating Systems Principles, Oct. 2015, pp.394-409.[18] Nguyen K, Fang L, Xu G H, Demsky B, Lu S, Alamian S, Mutlu O. Yak: A high-performance big-data-friendly garbage collector. In Proc. the 12th USENIX Conference on Operating Systems Design and Implementation, Nov. 2016.[19] Murphy G C, Kersten M, Findlater L. How are Java software developers using the Eclipse IDE? IEEE Software, 2006, 23(4): 76-83.[20] Roy C K, Cordy J R. A survey on software clone detection research. Technical Report, TR 2007-541, School of Computing, Queen's University at Kingston, 2007. http://research.cs.queensu.ca/TechReports/Reports/2007-541.pdf, Aug. 2016.[21] Kapser C J, Godfrey M W. “Cloning considered harmful” considered harmful: Patterns of cloning in software. Empirical Software Engineering, 2008, 13(6): 645-692.[22] Zhang G, Peng X, Xing Z, Zhao W. Cloning practices: Why developers clone and what can be changed. In Proc. the 28th IEEE International Conference on Software Maintenance, Sept. 2012, pp.285-294.[23] Roy C K, Zibran M F, Koschke R. The vision of software clone management: Past, present, and future (keynote paper). In Proc. the 2014 Software Evolution Week — IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, Feb. 2014, pp.18-33.[24] Kim M, Sazawal V, Notkin D, Murphy G C. An empirical study of code clone genealogies. In Proc. the 10th ESEC/FSE, Sept. 2005, pp.187-196.[25] Zhang G, Peng X, Xing Z, Jiang S, Wang H, Zhao W. Towards contextual and ondemand code clone management by continuous monitoring. In Proc. the 28th IEEE/ACM International Conference on Automated Software Engineering, Nov. 2013, pp.497-507.[26] Lin Y, Peng X, Xing Z, Zheng D, Zhao W. Clone-based and interactive recommendation for modifying pasted code. In Proc. the 10th Joint Meeting on Foundations of Software Engineering, Aug. 30-Sept. 4, 2015, pp.520-531.[27] Zhong H, Xie T, Zhang L, Pei J, Mei H. MAPO: Mining and recommending API usage patterns. In Proc. the 23rd European Conference on Object-Oriented Programming, July 2009, pp.318-343.[28] Keivanloo I, Rilling J, Zou Y. Spotting working code examples. In Proc. the 36th International Conference on Software Engineering, May 31-June 7, 2014, pp.664-675.[29] Li X, Wang Z, Wang Q, Yan S, Xie T, Mei H. Relationshipaware code search for JavaScript frameworks. In Proc. the 24th International Symposium on the Foundations of Software Engineering, Nov. 2016.[30] Raghothaman M, Wei Y, Hamadi Y. SWIM: Synthesizing what I mean: Code search and idiomatic snippet synthesis. In Proc. the 38th International Conference on Software Engineering, Sept. 2016, pp.357-367.[31] Wang Q, Li X. Bug localization via searching crowdcontributed code. In Proc. the 6th Asia-Pacific Symposium on Internetware, Nov. 2014, pp.1-10. |
No related articles found! |
|
版权所有 © 《计算机科学技术学报》编辑部 本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn 总访问量: |