Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
The role of surprisal in issue trackers
Empirical Software Engineering (KLU-EMSE), Volume 30, Issue 1https://doi.org/10.1007/s10664-024-10587-wAbstractContextSoftware development creates and relies on a large volume of information, yet the volume of this information can make it challenging for developers to maintain an overview of all goings-on that a team and external actors contribute to a ...
- research-articleSeptember 2024
Sensor Allocation and Online-Learning-Based Path Planning for Maritime Situational Awareness Enhancement: A Multi-Agent Approach
- Bach Long Nguyen,
- Anh-Dzung Doan,
- Tat-Jun Chin,
- Christophe Guettier,
- Surabhi Gupta,
- Estelle Parra,
- Ian Reid,
- Markus Wagner
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 9Pages 11635–11647https://doi.org/10.1109/TITS.2024.3363716Countries with access to large bodies of water often aim to protect their maritime transport by employing maritime surveillance systems. However, the number of available sensors (e.g., cameras) is typically small compared to the to-be-monitored targets, ...
- research-articleJuly 2024
Socialz: Multi-Feature Social Fuzz Testing
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferencePages 1445–1453https://doi.org/10.1145/3638529.3654033Online social networks have become an integral aspect of our daily lives and play a crucial role in shaping our relationships with others. However, bugs and glitches, even minor ones, can cause anything from frustrating problems to serious data leaks ...
- research-articleJuly 2024
MicroKarta: Visualising Microservice Architectures
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 607–611https://doi.org/10.1145/3663529.3663808Conceptualising and debugging a microservice architecture can be a challenge for developers due to the complex topology of inter-service communication, which may only apparent when viewing the architecture as a whole. In this paper, we present MicroKarta,...
-
- short-paperJune 2024
Creative and Correct: Requesting Diverse Code Solutions from AI Foundation Models
FORGE '24: Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software EngineeringPages 119–123https://doi.org/10.1145/3650105.3652302AI foundation models have the capability to produce a wide array of responses to a single prompt, a feature that is highly beneficial in software engineering to generate diverse code solutions. However, this advantage introduces a significant trade-off ...
- research-articleJanuary 2024
Assessing domain gap for continual domain adaptation in object detection
Computer Vision and Image Understanding (CVIU), Volume 238, Issue Chttps://doi.org/10.1016/j.cviu.2023.103885AbstractTo ensure reliable object detection in autonomous systems, the detector must be able to adapt to changes in appearance caused by environmental factors such as time of day, weather, and seasons. Continually adapting the detector to incorporate ...
Highlights- Address the question “when to adapt” which is ignored by prior works.
- Show a correlation between domain gap and detection accuracy.
- Assessing domain gap helps save energy usage for continual adaption without sacrificing detection ...
- research-articleNovember 2023
Detecting outdated code element references in software repository documentation
Empirical Software Engineering (KLU-EMSE), Volume 29, Issue 1https://doi.org/10.1007/s10664-023-10397-6AbstractOutdated documentation is a pervasive problem in software development, preventing effective use of software, and misleading users and developers alike. We posit that one possible reason why documentation becomes out of sync so easily is that ...
- articleOctober 2023
Genetic Improvement @ ICSE 2023
- William B. Langdon,
- Vesna Nowack,
- Justyna Petke,
- Markus Wagner,
- Hyeonseok Lee,
- Erik M. Fredericks,
- Gabin An,
- Aymeric Blot
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 48, Issue 4Pages 51–59https://doi.org/10.1145/3617946.3617956Following the formal presentations, which included keynotes by Prof. Myra B. Cohen of Iowa State University and Dr. Sebastian Baltes of SAP as well as six papers (which are recorded in the pro- ceedings) there was a wide ranging discussion at the twelfth ...
- posterJuly 2023
ELEA - Build your own Evolutionary Algorithm in your Browser
GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary ComputationPages 519–522https://doi.org/10.1145/3583133.3590723We provide an open source framework to experiment with evolutionary algorithms which we call Experimenting and Learning toolkit for Evolutionary Algorithms (ELEA). ELEA is browser-based and allows to assemble evolutionary algorithms using drag-and-...
- research-articleJuly 2023
Program transformation landscapes for automated program modification using Gin
Empirical Software Engineering (KLU-EMSE), Volume 28, Issue 4https://doi.org/10.1007/s10664-023-10344-5AbstractAutomated program modification underlies two successful research areas — genetic improvement and program repair. Under the generate-and-validate strategy, automated program modification transforms a program, then validates the result against a ...
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
- Joel Kuepper,
- Andres Erbsen,
- Jason Gross,
- Owen Conoly,
- Chuyue Sun,
- Samuel Tian,
- David Wu,
- Adam Chlipala,
- Chitchanok Chuengsatiansup,
- Daniel Genkin,
- Markus Wagner,
- Yuval Yarom
Proceedings of the ACM on Programming Languages (PACMPL), Volume 7, Issue PLDIArticle No.: 158, Pages 1268–1292https://doi.org/10.1145/3591272Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language. However, ...
- research-articleMay 2023
A regression analysis of the impact of routing and packing dependencies on the expected runtime
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 27, Issue 17Pages 12099–12115https://doi.org/10.1007/s00500-023-08402-7AbstractProblems with multiple interdependent components offer a better representation of the real-world situations where globally optimal solutions are preferred over optimal solutions for the individual components. One such model is the Travelling Thief ...
- research-articleJuly 2023
CryptOpt: Automatic Optimization of Straightline Code
- Joel Kuepper,
- David Wu,
- Andres Erbsen,
- Jason Gross,
- Owen Conoly,
- Chuyue Sun,
- Samuel Tian,
- Adam Chlipala,
- Chitchanok Chuengsatiansup,
- Daniel Genkin,
- Markus Wagner,
- Yuval Yarom
ICSE '23: Proceedings of the 45th International Conference on Software Engineering: Companion ProceedingsPages 141–145https://doi.org/10.1109/ICSE-Companion58688.2023.00042Manual engineering of high-performance implementations typically consumes many resources and requires in-depth knowledge of the hardware. Compilers try to address these problems; however, they are limited by design in what they can do. To address this,...
- research-articleMay 2023
NCQ: Code Reuse Support for Node.js Developers
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 5Pages 3205–3225https://doi.org/10.1109/TSE.2023.3248113Code reuse is an important part of software development. The adoption of code reuse practices is especially common among Node.js developers. The Node.js package manager, NPM, indexes over 1 Million packages and developers often seek out packages to solve ...
- research-articleFebruary 2023
GECCO 2022: Summary and Statistics
ACM SIGEVOlution (SIGEVO), Volume 15, Issue 4Article No.: 1, Pages 1–5https://doi.org/10.1145/3584367.3584368The 2022 Genetic and Evolutionary Computation Conference (GECCO 2022) took place in Boston, on July 9th--13th, 2022, as the first-ever "hybrid" GECCO. Hybrid here meant that about half of the attendees were physically present in Boston, while the others ...
- research-articleJuly 2022
Opportunities for genetic improvement of cryptographic code
GECCO '22: Proceedings of the Genetic and Evolutionary Computation Conference CompanionPages 1928–1929https://doi.org/10.1145/3520304.3534049Cryptography is one of the main tools underlying the security of our connected world. Cryptographic code must achieve both high security requirements and high performance. Automatic generation and genetic improvement of such code are underexplored, ...
- research-articleJuly 2022
Dissecting copy/delete/replace/swap mutations: insights from a GIN case study
GECCO '22: Proceedings of the Genetic and Evolutionary Computation Conference CompanionPages 1940–1945https://doi.org/10.1145/3520304.3533970Research studies are increasingly critical of publicly available code due to evidence of faults. This has led researchers to explore ways to improve such code, with static analysis and genetic code improvement previously singled out. Previous work has ...