›› 2016, Vol. 31 ›› Issue (5): 851-860.doi: 10.1007/s11390-016-1668-9

Special Issue: Software Systems

• Special Section on Software Systems 2016 • Previous Articles     Next Articles

Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems

Xusheng Xiao1, Jian-Guang Lou2, Member, ACM, IEEE, Shan Lu3, David C. Shepherd4, Xin Peng5, and Qian-Xiang Wang6, Member, CCF, IEEE   

  1. 1 NEC Laboratories America, Princeton, NJ 08540, U.S.A.;
    2 Microsoft Research Asia, Beijing 100080, China;
    3 Department of Computer Science, University of Chicago, Chicago, IL 60637, U.S.A.;
    4 ABB Corporate Research, Raleigh, NC 27606, U.S.A.;
    5 School of Computer Science, Fudan University, Shanghai 201203, China;
    6 School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
  • Received:2016-08-22 Revised:2016-08-23 Online:2016-09-05 Published:2016-09-05
  • About author:Xusheng Xiao is a researcher at NEC Laboratories America, Princeton. He received his Ph.D. degree in computer science from North Carolina State University, and was a visiting student in computer science at the University of Illinois at Urbana-Champaign, USA. His research interests are in software engineering and computer security, with a focus on software testing, bug detection, mobile security, and system/enterprise security. His work in mobile security has been selected as one of the top ten finalists for CSAW Best Applied Security Paper Award 2015. His research has been presented at top-tier venues such as ICSE, FSE, ISSTA, ASE, USENIX Security, CCS, and VLDB.

For this special section on software systems, six research leaders in software systems, as guest editors for this special section, discuss important issues that will shape this field's future research directions. The essays included in this roundtable article cover research opportunities and challenges for large-scale software systems such as querying organizationwide software behaviors (Xusheng Xiao), logging and log analysis (Jian-Guang Lou), engineering reliable cloud distributed systems (Shan Lu), usage data (David C. Shepherd), clone detection and management (Xin Peng), and code search and beyond (Qian-Xiang Wang). — Tao Xie, Leading Editor of Software Systems.

[1] Yuan D, Park S, Zhou Y. Characterizing logging practices in open-source software. In Proc. the 34th ICSE, June 2012, pp.102-112.

[2] Zong B, Xiao X, Li Z, Wu Z, Qian Z, Yan X, Singh A K, Jiang G. Behavior query discovery in system-generated temporal graphs. PVLDB, 2015, 9(4): 240-251.

[3] Xu Z, Wu Z, Li Z, Jee K, Rhee J, Xiao X, Xu F, Wang H, Jiang G. High fidelity data reduction for big data security dependency analyses. In Proc. the 23rd ACM Conference on Computer and Communications Security (CCS), Oct. 2016.

[4] Ding R, Zhou H, Lou J G, Zhang H, Lin Q, Fu Q, Zhang D, Xie T. Log2: A cost-aware logging mechanism for performance diagnosis. In Proc. the USENIX Annual Technical Conference, July 2015, pp.139-150.

[5] Yuan D, Zheng J, Park S, Zhou Y, Savage S. Improving software diagnosability via log enhancement. In Proc. the 16th ASPLOS, March 2011, pp.3-14.

[6] Fu Q, Zhu J, Hu W, Lou J G, Ding R, Lin Q, Zhang D, Xie T. Where do developers log? An empirical study on logging practices in industry. In Proc. ICSE, May 31-June 7, 2014, pp.24-33.

[7] Yuan C, Lao N, Wen J R, Li J, Zhang Z, Wang Y M, Ma W Y. Automated known problem diagnosis with event traces. In Proc. the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys), April 2006, pp.375-388.

[8] Lo D, Cheng H, Han J, Khoo S C, Sun C. Classification of software behaviors for failure detection: A discriminative pattern mining approach. In Proc. the 15th SIGKDD, June 28-July 1, 2009, pp.557-566.

[9] Xu W, Huang L, Fox A, Patterson D, Jordan M. Detecting large-scale system problems by mining console logs. In Proc. the 22nd ACM SOSP, Oct. 2009, pp.117-132.

[10] Lou J G, Fu Q, Yang S, Xu Y, Li J. Mining invariants from console logs for system problem detection. In Proc. USENIX ATC, June 2010, p.24.

[11] Reidemeister T, Jiang M, Ward P. Mining unstructured log files for recurrent fault diagnosis. In Proc. the 12th IFIP/IEEE International Symposium on Integrated Network Management, May 2011, pp.377-384.

[12] Menzies T, Butcher A, Cok D et al. Local versus global lessons for defect prediction and effort estimation. IEEE Transactions on Software Engineering, 2013, 39(6): 822-834.

[13] Lou J G, Lin Q, Ding R, Fu Q, Zhang D, Xie T. Software analytics for incident management of online services: An experience report. In Proc. the 28th ASE, Nov. 2013, pp.475-485.

[14] Leesatapornwongsa T, Lukman J F, Lu S, Gunawi H S. TaxDC: A taxonomy of nondeterministic concurrency bugs in datacenter distributed systems. In Proc. the 21st International Conference on Architectural Support for Programming Languages and Operating Systems, April 2016, pp.517-530.

[15] Leesatapornwongsa T, Hao M, Joshi P, Lukman J F, Gunawi H S. SAMC: Semantic-aware model checking for fast discovery of deep bugs in cloud systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.399-414.

[16] Yuan D, Luo Y, Zhuang X, Rodrigues G R, Zhao X, Zhang Y, Jain P U, Stumm M. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proc. the 11th USENIX Conference on Operating Systems Design and Implementation, Oct. 2014, pp.249-265.

[17] Fang L, Nguyen K, Xu G, Demsky B, Lu S. Interruptible tasks: Treating memory pressure as interrupts for highly scalable data-parallel programs. In Proc. the 25th Symposium on Operating Systems Principles, Oct. 2015, pp.394-409.

[18] Nguyen K, Fang L, Xu G H, Demsky B, Lu S, Alamian S, Mutlu O. Yak: A high-performance big-data-friendly garbage collector. In Proc. the 12th USENIX Conference on Operating Systems Design and Implementation, Nov. 2016.

[19] Murphy G C, Kersten M, Findlater L. How are Java software developers using the Eclipse IDE? IEEE Software, 2006, 23(4): 76-83.

[20] Roy C K, Cordy J R. A survey on software clone detection research. Technical Report, TR 2007-541, School of Computing, Queen's University at Kingston, 2007. http://research.cs.queensu.ca/TechReports/Reports/2007-541.pdf, Aug. 2016.

[21] Kapser C J, Godfrey M W. “Cloning considered harmful” considered harmful: Patterns of cloning in software. Empirical Software Engineering, 2008, 13(6): 645-692.

[22] Zhang G, Peng X, Xing Z, Zhao W. Cloning practices: Why developers clone and what can be changed. In Proc. the 28th IEEE International Conference on Software Maintenance, Sept. 2012, pp.285-294.

[23] Roy C K, Zibran M F, Koschke R. The vision of software clone management: Past, present, and future (keynote paper). In Proc. the 2014 Software Evolution Week — IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, Feb. 2014, pp.18-33.

[24] Kim M, Sazawal V, Notkin D, Murphy G C. An empirical study of code clone genealogies. In Proc. the 10th ESEC/FSE, Sept. 2005, pp.187-196.

[25] Zhang G, Peng X, Xing Z, Jiang S, Wang H, Zhao W. Towards contextual and ondemand code clone management by continuous monitoring. In Proc. the 28th IEEE/ACM International Conference on Automated Software Engineering, Nov. 2013, pp.497-507.

[26] Lin Y, Peng X, Xing Z, Zheng D, Zhao W. Clone-based and interactive recommendation for modifying pasted code. In Proc. the 10th Joint Meeting on Foundations of Software Engineering, Aug. 30-Sept. 4, 2015, pp.520-531.

[27] Zhong H, Xie T, Zhang L, Pei J, Mei H. MAPO: Mining and recommending API usage patterns. In Proc. the 23rd European Conference on Object-Oriented Programming, July 2009, pp.318-343.

[28] Keivanloo I, Rilling J, Zou Y. Spotting working code examples. In Proc. the 36th International Conference on Software Engineering, May 31-June 7, 2014, pp.664-675.

[29] Li X, Wang Z, Wang Q, Yan S, Xie T, Mei H. Relationshipaware code search for JavaScript frameworks. In Proc. the 24th International Symposium on the Foundations of Software Engineering, Nov. 2016.

[30] Raghothaman M, Wei Y, Hamadi Y. SWIM: Synthesizing what I mean: Code search and idiomatic snippet synthesis. In Proc. the 38th International Conference on Software Engineering, Sept. 2016, pp.357-367.

[31] Wang Q, Li X. Bug localization via searching crowdcontributed code. In Proc. the 6th Asia-Pacific Symposium on Internetware, Nov. 2014, pp.1-10.
No related articles found!
Full text



[1] Chen Shihua;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[2] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[3] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[4] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[5] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[6] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[7] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[8] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[9] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[10] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved