{"title":"Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files","authors":"Bo Zhou, Xin Xia, D. Lo, Xinyu Wang","doi":"10.1109/COMPSAC.2014.12","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.12","url":null,"abstract":"Software build system (e.g., Make) plays an important role in compiling human-readable source code into an executable program. One feature of build system such as make-based system is that it would use a build configuration file (e.g., Make file) to record the dependencies among different target and source code files. However, sometimes important dependencies would be missed in a build configuration file, which would cause additional debugging effort to fix it. In this paper, we propose a novel algorithm named Build Predictor to mine the missed dependncies. We first analyze dependencies in a build configuration file (e.g., Make file), and establish a dependency graph which captures various dependencies in the build configuration file. Next, considering that a build configuration file is constructed based on the source code dependency relationship, we establish a code dependency graph (code graph). Build Predictor is a composite model, which combines both dependency graph and code graph, to achieve a high prediction performance. We collected 7 build configuration files from various open source projects, which are Zlib, putty, vim, Apache Portable Runtime (APR), memcached, nginx, and Tengine, to evaluate the effectiveness of our algorithm. The experiment results show that compared with the state-of-the-art link prediction algorithms used by Xia et al., our Build Predictor achieves the best performance in predicting the missed dependencies.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, A. Krishna
{"title":"Software-as-a-Service Solution Implementation -- Data Migration Perspective","authors":"Luba Shabnam, Farzana Haque, Moshiur Bhuiyan, A. Krishna","doi":"10.1109/COMPSAC.2014.90","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.90","url":null,"abstract":"This paper presents a short case study on the implementation of SAP's cloud based solution SAP Business By Design (ByD) in one of the largest state department within Australia. Software as a Service (SaaS) has its own implementation challenges from data migration perspective. This paper provides brief detail of the data migration process followed including lessons learned during the migration activities.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Representation of Platform Feature-to-Requirement Traceability for Software Product Line Development","authors":"Sungwon Kang, Jingyu Kim, Sungju Kang, S. Eom","doi":"10.1109/COMPSAC.2014.29","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.29","url":null,"abstract":"Traceability enables the developer to keep track of changes in software development artifacts. Compared to that of single product development, traceability management in software product line development is much more complicated as it has to deal with traceability of individual products through the commonality and variability of the families of products. However, the existing traceability research treated traceability for families of products in an ad-hoc way and did not adequately address the relationship between traceability of domain engineering artifacts and that of application engineering artifacts. In this paper, we develop a formal representation that represents traceability between features and requirements at platform level. Also we present a procedure for constructing platform traceability from the trace abilities of a family of products. The proposed traceability representation and construction can be used as a basis for automated management of software product line trace abilities and for traceability representation and construction between artifacts of other stages of software product line.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kolokolov, S. Ruehl, Paul Baumann, Shaozhen Zhang, S. Verclas
{"title":"Modelling Variability in Activity Diagrams for Mobile Business Applications","authors":"V. Kolokolov, S. Ruehl, Paul Baumann, Shaozhen Zhang, S. Verclas","doi":"10.1109/COMPSAC.2014.23","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.23","url":null,"abstract":"Advances in development and deployment of mobile business applications (MBAs) based on the hybrid Web approach (hybrid MBAs) create new possibilities for enterprises to mobilize their business processes (BPs). Despite the fact that variability has a natural appearance in complex environments among different enterprises, current development tools for hybrid MBAs are lacking systematic support for variable features. We analyse in this paper the formation of hybrid MBAs' variable workflows on the BP-level by conducting an exploratory study within the context of a real-world, widespread BP instance. We also discuss quality assurance of domain activity diagrams (DADs), which document variability in BPs' workflows. Novel verification techniques for a structural analysis of DADs are highlighted.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware","authors":"Makoto Kato, Saeko Matsuura","doi":"10.1109/COMPSAC.2014.92","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.92","url":null,"abstract":"Recent years, Android malware which execute malicious attacks within the scope of permissions which was approved by user is increasing. Generally it is installed by user. Therefore user can avoid being infected with obvious malware by checking permissions which application requires. However many users install applications without checking permissions and get infected. Such Android malware have various kinds of threats, so user need to protect his assets by himself. In this paper we propose an educational method to improve user's security literacy by having experience of pseudo malware's behavior and recognize threats, risks, assets and relations between permissions and adverse actions.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the Theoretical Fault Localization Effectiveness Hierarchy with Empirical Results at Different Code Abstraction Levels","authors":"C. M. Tang, W. Chan, Yuen-Tak Yu","doi":"10.1109/COMPSAC.2014.24","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.24","url":null,"abstract":"Spectrum-based fault localization techniques are semi-automated program debugging techniques that address the bottleneck of finding suspicious program locations for diagnosis. They assess the fault suspiciousness of individual program locations based on the code coverage data achieved by executing the program under debugging over a test suite. A program location can be viewed at different abstraction levels, such as a statement in the source code or an instruction compiled from the source code. In general, a program location at one code abstraction level can be transformed into zero to more program locations at another abstraction level. Although programmers usually debug at the source code level, the code is actually executed at a lower level. It is unclear whether the same techniques applied at different code abstraction levels may achieve consistent results. In this paper, we study a suite of spectrum-based fault localization techniques at both the source and instruction code levels in the context of an existing theoretical hierarchy to assess whether their effectiveness is consistent across the two levels. Our study extends the theoretical hierarchy with empirically validated relationships across two code abstraction levels toward an integration of the theory and practice of fault localization.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network","authors":"Yuta Morisawa, Y. Kawahara, T. Asami","doi":"10.1109/COMPSAC.2014.39","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.39","url":null,"abstract":"Wireless LAN multicast is a suitable mechanism for multimedia streaming because of its bandwidth efficiency. However, wireless multicast has several problems in terms of power efficiency. In this study, we analyze the power efficiency of multicast in IEEE 802.11 networks and show that multicast increases the power consumption of clients significantly irrespective of whether the clients join multicast groups or not. The main reason is that IP multicast packets are transferred as broadcast frames in IEEE 802.11 networks. To improve power efficiency, we propose a new multicast streaming mechanism. Our work is strongly motivated by Flexible Multicast Service (FMS), which is a new IEEE 802.11 standard. FMS permits access points (APs) to transmit multicast frames in more than one delivery traffic indication message (DTIM) interval, which allows clients to wake up at alternate DTIM intervals, rather than every DTIM. However, our analysis proved that FMS is not an optimal mechanism in terms of power efficiency. We propose a new mechanism that provides more power-efficient multicast multimedia streaming, without delay or throughput penalty. Our method focuses on how to reduce the number of unnecessary frames received by clients. The key idea is to stagger the transmission timing to let clients avoid receiving unnecessary frames. We evaluate the mechanism by comprehensive analysis and simulations. The results show that the mechanism achieves significant power savings in wireless LAN multicast networks.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture","authors":"A. Taivalsaari, T. Mikkonen, Kari Systä","doi":"10.1109/COMPSAC.2014.56","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.56","url":null,"abstract":"Today, the digital life of people in developed markets is dominated by PCs and smart phones. Yet, as successful as PCs and smart phones are, the dominant era of PCs and smart phones is about to come to an end. Device shipment trends indicate that the number of web-enabled devices other than PCs and smart phones will grow rapidly. In the near future, people will commonly use various types of internet-connected devices in their daily lives. Unlike today, no single device will dominate the user's digital life. The transition to a world of multiple device ownership is still rife with problems. Since devices are mostly standalone and only stay in sync in limited ways, the users will have to spend a lot of time managing them. These device management chores become much more tedious as the number of devices in a person's life increases. In this paper we look at the ongoing paradigm shift towards multiple device ownership and its implications for software architecture. We argue that the transition to multiple device ownership will eventually lead us to liquid software - an approach that will allow data and applications to seamlessly move between multiple devices and screens. The new era will imply significant changes in the development, deployment and use of software, opening up new opportunities in software engineering research as well.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, L. Sha
{"title":"Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems","authors":"Jung-Eun Kim, Man-Ki Yoon, Richard M. Bradford, L. Sha","doi":"10.1109/COMPSAC.2014.54","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.54","url":null,"abstract":"The trend in the semiconductor industry toward multicore processors poses a significant challenge to many suppliers of safety-critical real-time embedded software. Having certified their systems for use on single-core processors, these companies may be forced to migrate their installed base of software onto multicore processors as single-core processors become harder to obtain. These companies naturally want to minimize the potentially high costs of recertifying their software for multicore processors. In support of this goal, we propose an approach to solving a fundamental problem in migrating legacy software applications to multicore systems, namely that of preventing conflicts among I/O transactions from applications residing on different cores. We formalize the problem as a partition scheduling problem that serializes I/O partitions. Although this problem is strongly NP-complete, we formulate it as a Constraint Programming (CP) problem. Since the CP approach scales poorly, we propose a heuristic algorithm that outperforms the CP approach in scalability.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction","authors":"S. Dawoud, A. Uzun, Sebastian Göndör, Axel Küpper","doi":"10.1109/COMPSAC.2014.38","DOIUrl":"https://doi.org/10.1109/COMPSAC.2014.38","url":null,"abstract":"Nowadays, mobile networks approach a steady growth in traffic demand. As a result, mobile network providers continuously expand their network infrastructure mainly by installing more base stations. Currently, there is a huge number of base stations serving mobile users all over the world, and this number is expected to double in the coming few years, which leads to a larger wastage of energy during low demand times. Exploiting the possibility of turning off base stations at low demand times is one of the promising approaches for saving energy and reducing CO2 emissions. Here, an early and accurate estimation of the traffic is crucial for managing resources proactively. Therefore, in this paper, we introduce a Power Management System that applies a global provisioning policy to base stations for enabling network reconfigurations in terms of power efficiency. This system is based on a Hybrid Traffic Prediction Model that forecasts the workload of base stations by utilizing historic traffic traces. A simulator is implemented to evaluate the proposed management system, which is fed with real data provided by the Open Mobile Network project. The experimental results show the possibility of turning off 49% of the base stations at some times of the day without degrading the QoS.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}