Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2020
How to mitigate the incident? an effective troubleshooting guide recommendation technique for online service systems
- Jiajun Jiang,
- Weihai Lu,
- Junjie Chen,
- Qingwei Lin,
- Pu Zhao,
- Yu Kang,
- Hongyu Zhang,
- Yingfei Xiong,
- Feng Gao,
- Zhangwei Xu,
- Yingnong Dang,
- Dongmei Zhang
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1410–1420https://doi.org/10.1145/3368089.3417054In recent years, more and more traditional shrink-wrapped software is provided as 7x24 online services. Incidents (events that lead to service disruptions or outages) could affect service availability and cause great financial loss. Therefore, ...
- research-articleNovember 2020
Efficient incident identification from multi-dimensional issue reports via meta-heuristic search
- Jiazhen Gu,
- Chuan Luo,
- Si Qin,
- Bo Qiao,
- Qingwei Lin,
- Hongyu Zhang,
- Ze Li,
- Yingnong Dang,
- Shaowei Cai,
- Wei Wu,
- Yangfan Zhou,
- Murali Chintalapati,
- Dongmei Zhang
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 292–303https://doi.org/10.1145/3368089.3409741In large-scale cloud systems, unplanned service interruptions and outages may cause severe degradation of service availability. Such incidents can occur in a bursty manner, which will deteriorate user satisfaction. Identifying incidents rapidly and ...
- research-articleNovember 2020
Mining assumptions for software components using machine learning
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 159–171https://doi.org/10.1145/3368089.3409737Software verification approaches aim to check a software component under analysis for all possible environments. In reality, however, components are expected to operate within a larger system and are required to satisfy their requirements only when ...
- research-articleNovember 2020
Efficiently finding higher-order mutants
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1165–1177https://doi.org/10.1145/3368089.3409713Higher-order mutation has the potential for improving major drawbacks of traditional first-order mutation, such as by simulating more realistic faults or improving test-optimization techniques. Despite interest in studying promising higher-order mutants,...
- short-paperNovember 2020
Next generation automated software evolution refactoring at scale
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1521–1524https://doi.org/10.1145/3368089.3417042Despite progress in providing software engineers with tools that automate an increasing number of development tasks, complex activities like redesigning and reengineering existing software remain resource intensive or are supported by tools that are ...
- research-articleNovember 2020
AMS: generating AutoML search spaces from weak specifications
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 763–774https://doi.org/10.1145/3368089.3409700We consider a usage model for automated machine learning (AutoML) in which users can influence the generated pipeline by providing a weak pipeline specification: an unordered set of API components from which the AutoML system draws the components it ...