2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)最新文献

筛选
英文 中文
An Exploratory Study on Judicial Image Quality Assessment Based on Deep Learning 基于深度学习的司法图像质量评价探索性研究
Qiqi Gu, Weiling Cai, Shengcheng Yu, Zhenyu Chen
{"title":"An Exploratory Study on Judicial Image Quality Assessment Based on Deep Learning","authors":"Qiqi Gu, Weiling Cai, Shengcheng Yu, Zhenyu Chen","doi":"10.1109/QRS.2019.00046","DOIUrl":"https://doi.org/10.1109/QRS.2019.00046","url":null,"abstract":"Images are important judicial materials. With the deepening of intelligent systems in the judicial area, image quality plays a vital role in the result of many judicial applications. This paper firstly introduces deep learning into judicial image quality assessment. Pre-trained convolutional neural network (CNN) models are fine-tuned and then used to extract image features. Based on the features extracted from CNN models, we convert them into specific numbers representing the quality. A preliminary experiment has been designed and conducted on three types of judicial images. The experimental results show that our approach can outperform the existing image processing technique. Images used as investigation materials are more distinctive than the other two types, and they need an independent model for analyzing.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BugIdentifier: An Approach to Identifying Bugs via Log Mining for Accelerating Bug Reporting Stage BugIdentifier:一种通过日志挖掘来识别Bug的方法,以加速Bug报告阶段
Wensheng Xia, Ying Li, Tong Jia, Zhonghai Wu
{"title":"BugIdentifier: An Approach to Identifying Bugs via Log Mining for Accelerating Bug Reporting Stage","authors":"Wensheng Xia, Ying Li, Tong Jia, Zhonghai Wu","doi":"10.1109/QRS.2019.00033","DOIUrl":"https://doi.org/10.1109/QRS.2019.00033","url":null,"abstract":"Bugs severely damage the reliability of open source software. In order to improve the reliability of open source software, bug tracking system is built to collect and manage bugs reported from users all over the world. When system failures occur, users investigate whether failures are induced by software bugs and then report bugs. However, it is usually difficult and time consuming to identify bugs from system failures. To accelerate bug reporting and reduce the time users spend on identifying bugs, we present BugIdentifier, an automatic bug identifying approach based on log mining. BugIdentifier combines Doc2Vec with Deep Neural Network (DNN) and treats bug identifying as a binary classification problem. Doc2Vec is adopted to train a log sequence embedding model that transforms log sequences into feature vectors, and then DNN is used to identify whether the log sequence is bug-induced or not. The results of our empirical evaluation show that our approach can automatically identify real-world bugs of Hadoop and OpenStack with the F1-score higher than 75%, specifically, old-version bugs of OpenStack can be identified with 97% F1-score, as a result, bug reporting can be accelerated correspondingly.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Reliability Assessment Method Based on the Effects of Components 一种基于构件影响的可靠性评估方法
Yue Chen, Xuefeng Yan, A. Khan
{"title":"A Novel Reliability Assessment Method Based on the Effects of Components","authors":"Yue Chen, Xuefeng Yan, A. Khan","doi":"10.1109/QRS.2019.00022","DOIUrl":"https://doi.org/10.1109/QRS.2019.00022","url":null,"abstract":"Component-based software systems play an important role in various critical areas and reliability of those systems considered significant attention. Some software reliability assessment approaches consider the impacts of different components on the system reliability but lack the analysis of fault propagation between components. In this paper, a novel reliability evaluation method is proposed, focusing on analyzing the impacts of different components based on three parameters i.e. self-influence, failure influence and fault propagation influence. First, we use the graph theory to model the component-based software system and later identify the significance of each component based on the above three parameters. Finally, the importance of each component is used for the system reliability assessment and optimization. Three existing examples are evaluated to demonstrate the effectiveness of the proposed approach and results show that the proposed method is able to get reasonable results that could be used for reliability optimization.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Branch Use in Practice: A Large-Scale Empirical Study of 2,923 Projects on GitHub 分支在实践中的使用:对GitHub上2923个项目的大规模实证研究
W. Zou, Weiqiang Zhang, Xin Xia, Reid Holmes, Zhenyu Chen
{"title":"Branch Use in Practice: A Large-Scale Empirical Study of 2,923 Projects on GitHub","authors":"W. Zou, Weiqiang Zhang, Xin Xia, Reid Holmes, Zhenyu Chen","doi":"10.1109/QRS.2019.00047","DOIUrl":"https://doi.org/10.1109/QRS.2019.00047","url":null,"abstract":"Branching is often used to help developers work in parallel during distributed software development. Previous studies have examined branch usage in practice. However, most studies perform branch analysis on industrial projects or only a small number of open source software (OSS) systems. There are no broad examinations of how branches are used across OSS communities. Due to the rapidly increasing popularity of collaboration in OSS projects, it is important to gain insights into the practice of branch usage in these communities. In this paper, we performed an empirical study on branch usage for 2,923 projects developed on GitHub. Our work mainly studies the way developers use branches and the effects of branching on the overall productivity of these projects. Our results show that: 1) Most projects use a few branches (<5) during development; 2) Large scale projects tend to use more branches than small scale projects. 3) Branches are mainly used to implement new features, conduct version iteration, and fix bugs. 4) Almost all master branches have been requested by contributors to merge their contributions; 5) There always exists a branch playing a more important role in merging contributions than other branches; 6) Almost all commits of more than 75% branches are included in the master branches; 7) The number of branches used in a project has a positive effect on a project's productivity but the effect size is small, and there is no statistically significantly difference between personal projects and organizational projects.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experimental Analysis and Comparison of Load Prediction Algorithms in Cloud Data Center 云数据中心负荷预测算法的实验分析与比较
Yanxin Liu, Jian Dong, Decheng Zuo, Hongwei Liu
{"title":"Experimental Analysis and Comparison of Load Prediction Algorithms in Cloud Data Center","authors":"Yanxin Liu, Jian Dong, Decheng Zuo, Hongwei Liu","doi":"10.1109/QRS.2019.00036","DOIUrl":"https://doi.org/10.1109/QRS.2019.00036","url":null,"abstract":"Due to the increasing scale of cloud data center, the issue of energy consumption is becoming pretty significant. To tackle this problem, an extremely effective approach is increasing the utilization of resource in data center. Researchers have found that accurate load prediction can help allocator distribute resource reasonably, so as to increase the utilization. There are a lot of traditional prediction algorithms which have been applied to cloud data center, such as linear regression. However, with the development of technologies, a number of novel prediction algorithms are brought out, for example, neural network. This paper assesses and analyzes the performance of several different prediction algorithms applying on data sets from real world. We get some meaningful and interesting conclusions from comparison among these algorithms, which may offer references for system designers of cloud data center.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"63 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are All Duplicates Value-Neutral? An Empirical Analysis of Duplicate Issue Reports 所有的副本都是价值中立的吗?重复问题报告的实证分析
Mingyang Li, Lin Shi, Qing Wang
{"title":"Are All Duplicates Value-Neutral? An Empirical Analysis of Duplicate Issue Reports","authors":"Mingyang Li, Lin Shi, Qing Wang","doi":"10.1109/QRS.2019.00043","DOIUrl":"https://doi.org/10.1109/QRS.2019.00043","url":null,"abstract":"In open source communities, there are numerous duplicate issue reports, considered as useless and negligible by developers. Conversely, some researches argued that duplicates deliver complementary information that could benefit issueresolving. Considering all duplicates as value-neutral will result in either overestimation or underestimation of valuable information. It is necessary to be aware of whether all duplicates are redundant or beneficial. In this paper, we investigate whether duplicates have the same impacts on issue resolving and identification cost. We divide duplicates into three categories according to the statuses of master reports when duplicates are submitted. The results show duplicates in different categories play different roles in issue-resolving, and identification cost is also significantly different. Our study reveals duplicates are different, but almost are paid equal attentions. It is promising to propose new approaches and tools to resolve the problem.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Method-Level Test Selection for Continuous Integration with Static Dependencies and Dynamic Execution Rules 使用静态依赖项和动态执行规则进行持续集成的方法级测试选择
Yingling Li, Junjie Wang, Yun Yang, Qing Wang
{"title":"Method-Level Test Selection for Continuous Integration with Static Dependencies and Dynamic Execution Rules","authors":"Yingling Li, Junjie Wang, Yun Yang, Qing Wang","doi":"10.1109/QRS.2019.00052","DOIUrl":"https://doi.org/10.1109/QRS.2019.00052","url":null,"abstract":"In Continuous Integration (CI) development environment, integration testing (i.e., CI testing) is an important practice to verify the quality of submitted code. With the growth of integration system, running all tests leads to high test cost with slow feedback. Many test case selection techniques have been proposed to tackle this problem. We analyze existing static test selection approaches on method-level, and find there are two main drawbacks, i.e., omission of dependencies and imprecise dependencies, which influence the effectiveness of test selection. Both of them are due to the fact that some dependencies are dynamically determined at runtime, which could not be resolved solely by current static analysis techniques. We propose a Method-level tEst SelecTion approach (i.e., MEST), which utilizes static dependencies and dynamic execution rules (i.e., dynamic invocation in reflection and dynamic binding in inheritance). Evaluation is conducted on 18 open source projects with 261 continuous integration versions from Eclipse and Apache communities. We assess the effectiveness of MEST from reduced test size, fault detection efficiency and test cost, and compare it with the state-of-the-art approach ClassSRTS (as baseline); and further analyze the contribution of dynamic execution rules. Results show that (1) on average, MEST can reduce test size by 92% and 43% compared with actual CI testing and baseline respectively; (2) MEST can fully cover all faults detected by actual CI testing (in 97% versions) and baseline (in 98% versions), and find new faults in 26% and 27% versions respectively; (3) on average, the endto-end time of MEST is 24% and 48% of actual CI testing and baseline respectively; (4) both dynamic execution rules contribute to fault detection through capturing necessary dependencies. This approach can further speed up the feedback of CI testing and improve the fault detection efficiency of CI testing.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UML-SR: A Novel Security Requirements Specification Language UML-SR:一种新的安全需求规范语言
M. Mohsin, Muhammad Umair Ahmed Khan
{"title":"UML-SR: A Novel Security Requirements Specification Language","authors":"M. Mohsin, Muhammad Umair Ahmed Khan","doi":"10.1109/QRS.2019.00051","DOIUrl":"https://doi.org/10.1109/QRS.2019.00051","url":null,"abstract":"Existing security specification languages are not fully equipped to express low-level security requirements and design decisions such as input validation (a security requirement for a number of highly severe vulnerabilities). This inability of current specification languages compels developers to make security-related decisions on their own. We propose, a new security specification language named UML-SR using the extension mechanism of UML. UML-SR is based upon security requirements that need to be used to avoid the some of the most severe vulnerabilities according to the Common Vulnerability Scoring System of the National Vulnerability Database. UML-SR enhances UML use case, activity, class, and sequence diagrams with security requirements such as input validation, multi-factor authentication, closing port after an interval of inactivity, checking privileges, allowing only whitelisted commands, checking parameters passed when calling a function, session expiration check on the server side, and password aging. In this paper, we use stereotypes, constraints, and tags to represent these security requirements as a case study.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126857506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Invariant Generation for Industrial Software Model Checking of Time Properties 工业软件模型时间属性检验的改进不变量生成
Vassil Todorov, Safouan Taha, Frédéric Boulanger, Armando Hernandez
{"title":"Improved Invariant Generation for Industrial Software Model Checking of Time Properties","authors":"Vassil Todorov, Safouan Taha, Frédéric Boulanger, Armando Hernandez","doi":"10.1109/QRS.2019.00050","DOIUrl":"https://doi.org/10.1109/QRS.2019.00050","url":null,"abstract":"Modern automotive embedded software is mostly designed using model-based design tools such as Simulink or SCADE, and source code is generated automatically from the models. Formal proof using symbolic model checking has been integrated in these tools and can provide a higher assurance by proving safety-critical properties. Our experience shows that proving properties involving time is rather challenging when they involve long durations and timers. These properties are generally not inductive and even advanced techniques such as PDR/IC3 are unable to handle them on production models in reasonable time. In this paper, we first present our industrial use case and comment on the results obtained with the existing model checkers. Then we present our invariant generator and methodology for selecting invariants according to physical dimensions. They enable the proof of properties with long-running timers. Finally, we discuss their implementation and benchmarks.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WARDER: Refining Cell Clustering for Effective Spreadsheet Defect Detection via Validity Properties 通过有效性属性改进单元聚类,实现有效的电子表格缺陷检测
Da Li, Huiyan Wang, Chang Xu, Fengmin Shi, Xiaoxing Ma, Jian Lu
{"title":"WARDER: Refining Cell Clustering for Effective Spreadsheet Defect Detection via Validity Properties","authors":"Da Li, Huiyan Wang, Chang Xu, Fengmin Shi, Xiaoxing Ma, Jian Lu","doi":"10.1109/QRS.2019.00030","DOIUrl":"https://doi.org/10.1109/QRS.2019.00030","url":null,"abstract":"Spreadsheets are widely used, but subject to various defects and severe consequences due to poor maintenance by end users. Existing spreadsheet defect detection techniques fall short of effectiveness, either due to limited scopes or relying on rigid patterns. In this paper, we discuss and improve one state-of-the-art technique, CUSTODES, which uses cell clustering and anomaly detection to extend its scope and make its patterns adaptive to varying spreadsheet styles, but is prone to fragile clustering when involving irrelevant cells, leading to a largely reduced detection precision. We present WARDER to refine CUSTODES's cell clustering based on validity properties, and experimental results show that WARDER improves the precision by 20.7% on average or reach 100% for 79.8% worksheets on cell clustering, which contributes to a precision improvement of 23.1% for defect detection. WARDER also exhibits satisfactory results, against other spreadsheet defect detection techniques, and on another large-scale spreadsheet corpus VEnron2.","PeriodicalId":122665,"journal":{"name":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信