Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 32, Issue 6November 2023
Editor:
  • Mauro Pezzè
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1049-331X
EISSN:1557-7392
Reflects downloads up to 02 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Fair Enough: Searching for Sufficient Measures of Fairness
Article No.: 134, Pages 1–22https://doi.org/10.1145/3585006

Testing machine learning software for ethical bias has become a pressing current concern. In response, recent research has proposed a plethora of new fairness metrics, for example, the dozens of fairness metrics in the IBM AIF360 toolkit. This raises the ...

research-article
Toward Understanding Deep Learning Framework Bugs
Article No.: 135, Pages 1–31https://doi.org/10.1145/3587155

DL frameworks are the basis of constructing all DL programs and models, and thus their bugs could lead to the unexpected behaviors of any DL program or model relying on them. Such a wide effect demonstrates the necessity and importance of guaranteeing DL ...

research-article
UniLoc: Unified Fault Localization of Continuous Integration Failures
Article No.: 136, Pages 1–31https://doi.org/10.1145/3593799

Continuous integration (CI) practices encourage developers to frequently integrate code into a shared repository. Each integration is validated by automatic build and testing such that errors are revealed as early as possible. When CI failures or ...

research-article
Open Access
TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination
Article No.: 137, Pages 1–24https://doi.org/10.1145/3591869

Discrimination has been shown in many machine learning applications, which calls for sufficient fairness testing before their deployment in ethic-relevant domains. One widely concerning type of discrimination, testing against group discrimination, mostly ...

research-article
Open Access
Automatic Core-Developer Identification on GitHub: A Validation Study
Article No.: 138, Pages 1–29https://doi.org/10.1145/3593803

Many open-source software projects are self-organized and do not maintain official lists with information on developer roles. So, knowing which developers take core and maintainer roles is, despite being relevant, often tacit knowledge. We propose a ...

research-article
Open Access
JavaScript SBST Heuristics to Enable Effective Fuzzing of NodeJS Web APIs
Article No.: 139, Pages 1–29https://doi.org/10.1145/3593801

JavaScript is one of the most popular programming languages. However, its dynamic nature poses several challenges to automated testing techniques. In this paper, we propose an approach and open-source tool support to enable white-box testing of JavaScript ...

research-article
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph
Article No.: 140, Pages 1–28https://doi.org/10.1145/3593800

When searching code, developers may express additional constraints (e.g., functional constraints and nonfunctional constraints) on the implementations of desired functionalities in the queries. Existing code search tools treat the queries as a whole and ...

research-article
Predicting the Change Impact of Resolving Defects by Leveraging the Topics of Issue Reports in Open Source Software Systems
Article No.: 141, Pages 1–34https://doi.org/10.1145/3593802

Upon receiving a new issue report, practitioners start by investigating the defect type, the potential fixing effort needed to resolve the defect and the change impact. Moreover, issue reports contain valuable information, such as, the title, description ...

research-article
What Quality Aspects Influence the Adoption of Docker Images?
Article No.: 142, Pages 1–30https://doi.org/10.1145/3603111

Docker is a containerization technology that allows developers to ship software applications along with their dependencies in Docker images. Developers can extend existing images using them as base images when writing Dockerfiles. However, a lot of ...

research-article
CodeEditor: Learning to Edit Source Code with Pre-trained Models
Article No.: 143, Pages 1–22https://doi.org/10.1145/3597207

Developers often perform repetitive code editing activities (up to 70%) for various reasons (e.g., code refactoring) during software development. Many deep learning (DL) models have been proposed to automate code editing by learning from the code editing ...

research-article
Open Access
Open Problems in Fuzzing RESTful APIs: A Comparison of Tools
Article No.: 144, Pages 1–45https://doi.org/10.1145/3597205

RESTful APIs are a type of web service that are widely used in industry. In the past few years, a lot of effort in the research community has been spent in designing novel techniques to automatically fuzz those APIs to find faults in them. Many real ...

research-article
Open Access
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection
Article No.: 145, Pages 1–40https://doi.org/10.1145/3597202

AI models of code have made significant progress over the past few years. However, many models are actually not learning task-relevant source code features. Instead, they often fit non-relevant but correlated data, leading to a lack of robustness and ...

research-article
An Empirical Study on GitHub Pull Requests’ Reactions
Article No.: 146, Pages 1–35https://doi.org/10.1145/3597208

The pull request mechanism is commonly used to propose source code modifications and get feedback from the community before merging them into a software repository. On GitHub, practitioners can provide feedback on a pull request by either commenting on ...

research-article
Semantic-Enriched Code Knowledge Graph to Reveal Unknowns in Smart Contract Code Reuse
Article No.: 147, Pages 1–37https://doi.org/10.1145/3597206

Programmers who work with smart contract development often encounter challenges in reusing code from repositories. This is due to the presence of two unknowns that can lead to non-functional and functional failures. These unknowns are implicit ...

research-article
An Accurate Identifier Renaming Prediction and Suggestion Approach
Article No.: 148, Pages 1–51https://doi.org/10.1145/3603109

Identifiers play an important role in helping developers analyze and comprehend source code. However, many identifiers exist that are inconsistent with the corresponding code conventions or semantic functions, leading to flawed identifiers. Hence, ...

research-article
Dependency Update Strategies and Package Characteristics
Article No.: 149, Pages 1–29https://doi.org/10.1145/3603110

Managing project dependencies is a key maintenance issue in software development. Developers need to choose an update strategy that allows them to receive important updates and fixes while protecting them from breaking changes. Semantic Versioning was ...

research-article
DeepPatch: Maintaining Deep Learning Model Programs to Retain Standard Accuracy with Substantial Robustness Improvement
Article No.: 150, Pages 1–49https://doi.org/10.1145/3604609

Maintaining a deep learning (DL) model by making the model substantially more robust through retraining with plenty of adversarial examples of non-trivial perturbation strength often reduces the model’s standard accuracy. Many existing model repair or ...

research-article
Open Access
Optimization Techniques for Model Checking Leads-to Properties in a Stratified Way
Article No.: 151, Pages 1–38https://doi.org/10.1145/3604610

We devised the L+1-layer divide & conquer approach to leads-to model checking (L+1-DCA2L2MC) and its parallel version, and developed sequential and parallel tools for L+1-DCA2L2MC. In a temporal logic called UNITY, designed by Chandy and Misra, the leads-...

research-article
Revisiting the Identification of the Co-evolution of Production and Test Code
Article No.: 152, Pages 1–37https://doi.org/10.1145/3607183

Many software processes advocate that the test code should co-evolve with the production code. Prior work usually studies such co-evolution based on production-test co-evolution samples mined from software repositories. A production-test co-evolution ...

research-article
Exploring the Impact of Code Clones on Deep Learning Software
Article No.: 153, Pages 1–34https://doi.org/10.1145/3607181

Deep learning (DL) is a really active topic in recent years. Code cloning is a common code implementation that could negatively impact software maintenance. For DL software, developers rely heavily on frameworks to implement DL features. Meanwhile, to ...

SECTION: Continuous Special Section: AI and SE
research-article
Public Access
PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing
Article No.: 154, Pages 1–34https://doi.org/10.1145/3591870

In the past few years, Transformer has been widely adopted in many domains and applications because of its impressive performance. Vision Transformer (ViT), a successful and well-known variant, attracts considerable attention from both industry and ...

research-article
Open Access
Tiny, Always-on, and Fragile: Bias Propagation through Design Choices in On-device Machine Learning Workflows
Article No.: 155, Pages 1–37https://doi.org/10.1145/3591867

Billions of distributed, heterogeneous, and resource constrained IoT devices deploy on-device machine learning (ML) for private, fast, and offline inference on personal data. On-device ML is highly context dependent and sensitive to user, usage, hardware, ...

research-article
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective
Article No.: 156, Pages 1–26https://doi.org/10.1145/3597204

Deep learning (DL) has become a key component of modern software. In the “big model” era, the rich features of DL-based software (i.e., DL software) substantially rely on powerful DL models, e.g., BERT, GPT-3, and the recently emerging GPT-4, which are ...

research-article
Pre-implementation Method Name Prediction for Object-oriented Programming
Article No.: 157, Pages 1–35https://doi.org/10.1145/3597203

Method naming is a challenging development task in object-oriented programming. In recent years, several research efforts have been undertaken to provide automated tool support for assisting developers in this task. In general, literature approaches ...

SECTION: Continuous Special Section: Security and SE
research-article
Open Access
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis
Article No.: 158, Pages 1–29https://doi.org/10.1145/3604608

Vulnerability is a major threat to software security. It has been proven that binary code similarity detection approaches are efficient to search for recurring vulnerabilities introduced by code sharing in binary software. However, these approaches suffer ...

SECTION: Survey
survey
A Systematic Review of Automated Query Reformulations in Source Code Search
Article No.: 159, Pages 1–79https://doi.org/10.1145/3607179

Fixing software bugs and adding new features are two of the major maintenance tasks. Software bugs and features are reported as change requests. Developers consult these requests and often choose a few keywords from them as an ad hoc query. Then they ...

SECTION: Registered Papers
research-article
Open Access
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing
Article No.: 160, Pages 1–26https://doi.org/10.1145/3580598

As an essential component responsible for communication, network services are security critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular software vulnerability discovery techniques, widely adopted due ...

SECTION: RCR Reports
NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing - RCR Report
Article No.: 161, Pages 1–8https://doi.org/10.1145/3580599

We provide artifacts to reproduce the evaluation results of our article: “NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing”. The provided artifacts can be downloaded from . It includes 14 docker containers,...

Subjects

Comments