Proceedings of the 12th Asia-Pacific Symposium on Internetware最新文献

筛选
英文 中文
Power Trading Model for Distributed Power Generation Systems Based on Consortium Blockchains 基于联盟区块链的分布式发电系统电力交易模型
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457929
Ran Chen, Jiabei Zhang, Fuquan Yuan, Bo Zhou, Wei Shi, Haiming Zhou
{"title":"Power Trading Model for Distributed Power Generation Systems Based on Consortium Blockchains","authors":"Ran Chen, Jiabei Zhang, Fuquan Yuan, Bo Zhou, Wei Shi, Haiming Zhou","doi":"10.1145/3457913.3457929","DOIUrl":"https://doi.org/10.1145/3457913.3457929","url":null,"abstract":"Distributed power generation systems based on clean energy experience a large development worldwide. However, existing centralized power trading models cannot support direct transactions between distributed power generation systems and power consumers. Existing centralized power trading models suffer from multi-agent untrustworthiness and risk of data tampering. In addition, the direct transactions involve a large number of producers and consumers, thus requiring high efficiency of transaction processing in power trading models. To tackle with the problems, we propose a weakly centralized power trading model based on consortium blockchains in this paper. The trading model facilitate the power trading process by using smart contracts on consortium blockchains. In addition, we propose an approach based on the Hotelling theory to determine the pricing for transaction in our power trading model. The experimental results show that our power trading model provides a stable throughput as the request rate of transactions increases. The power trading model proposed in this paper is more practical than those based on public blockchains.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAT and LP Collaborative Bounded Timing Analysis of Scenario-Based Specifications 基于场景规范的SAT和LP协同有界时序分析
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457917
Longlong Lu, Wenhua Yang, Minxue Pan, Tian Zhang
{"title":"SAT and LP Collaborative Bounded Timing Analysis of Scenario-Based Specifications","authors":"Longlong Lu, Wenhua Yang, Minxue Pan, Tian Zhang","doi":"10.1145/3457913.3457917","DOIUrl":"https://doi.org/10.1145/3457913.3457917","url":null,"abstract":"Timing analysis of scenario-based specifications (SBS) such as message sequence charts and UML interaction models plays an essential role in the design phase of real-time system development. However, it is time-consuming and labor-intensive to conduct analysis on the satisfiability of the timing constraints. In this article, we propose a novel SAT and linear programming (LP) collaborative timing analysis approach named TASSAT for SBS. Instead of using depth-first traversal algorithms, TASSAT encodes the structures of the SBS into propositional formulas and use the SAT solver to find candidate paths. The timing analysis of candidate paths is then reduced to LP problems, where irreducible infeasible set of the infeasible path can be used to prune unnecessary search space of the SAT solver. The experimental results show that TASSAT is effective and offers better performance than existing tools in terms of both time consumption and memory footprint.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code ASPDup:基于ast序列的现场编程代码渐进式重复代码检测工具
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457938
Yaoshen Yu, Zhiqiu Huang, Yu Zhou, Weiwei Li, Yichao Shao
{"title":"ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code","authors":"Yaoshen Yu, Zhiqiu Huang, Yu Zhou, Weiwei Li, Yichao Shao","doi":"10.1145/3457913.3457938","DOIUrl":"https://doi.org/10.1145/3457913.3457938","url":null,"abstract":"Duplicate code is an example of bad smells, which are usually been refactored after the detection to improve the quality of programs. Locate the duplicate code at the programming phase may reduce the cost of maintenance, but the challenge is it need to detect duplicate code between an incomplete code fragment with complete files, which the existing tools are hard to be applied to this scenario. In this paper, we propose an AST-sequence-based duplicate code detection approach for onsite programming code. The abstract syntax tree (AST) is extracted from source code and then is transformed into an encoded sequence. A local sequence alignment algorithm is used to find highly similar subsequences. After the post-processing, similar regions will be found between two code fragments according to the subsequences. We have developed a prototype tool as a plugin for Visual Studio Code. Experimental results indicate that our approach is effective in finding highly similar regions between cross-granularity code fragments, which can facilitate duplicate code detection for incomplete onsite programming code.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128534879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Study of Architectural Changes in Code Commits 代码提交中架构变化的实证研究
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457924
Di Cui, Jiaqi Guo, Ting Liu, Q. Zheng
{"title":"An Empirical Study of Architectural Changes in Code Commits","authors":"Di Cui, Jiaqi Guo, Ting Liu, Q. Zheng","doi":"10.1145/3457913.3457924","DOIUrl":"https://doi.org/10.1145/3457913.3457924","url":null,"abstract":"The maintenance of software architecture is challenged by fast-delivery code changes since developers are rarely aware of the architectural impacts of their code changes. To ease the burdens of architects, in this work, we proposed a light-weight framework to identify changes in architectures from code commits automatically. The framework identifies architectural changes without heavy architecture recovery techniques. Instead, it only takes a code commit as input. The framework, on the one hand, can be integrated into prevalent continuous integration systems to monitor architectural changes. On the other hand, it can be plugged into code review systems to help developers realize the architectural changes they introduce. Based on the framework, we further conducted a large-scale empirical study on 368,847 commits of 16 Apache open projects to study architectural changes. Our study reveals several new findings regarding the frequency of architectural change commits, the common and risky intents under which developers introduce architectural changes, and the correlations of architectural changes with lines of code and number of modified source files in commits. Our findings provide practical implications for software contributors and shed light on potential research directions on architecture maintenance.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulated or Physical? An Empirical Study on Input Validation for Context-aware Systems in Different Environments 模拟的还是实际的?不同环境下上下文感知系统输入验证的实证研究
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457919
Jinchi Chen, Yi Qin, Huiyan Wang, Chang Xu
{"title":"Simulated or Physical? An Empirical Study on Input Validation for Context-aware Systems in Different Environments","authors":"Jinchi Chen, Yi Qin, Huiyan Wang, Chang Xu","doi":"10.1145/3457913.3457919","DOIUrl":"https://doi.org/10.1145/3457913.3457919","url":null,"abstract":"Context-Aware Systems (a.k.a. CASs) integrate cyber and physical space to provide context-aware adaptive functionalities. Building context-aware systems is challenging due to the uncertainty of the real physical environment. Therefore, input validation for context-aware systems plays a significant role in keeping the systems executing safely. Input validation approaches have been proposed to monitor and guard the executions of context-aware systems. However, few of these works (17%, 2 out of 12) evaluated their approaches with a real context-aware system in a real physical environment. In this paper, we study and compare the effectiveness of input validation approaches for context-aware system in both a simulated and a physical environment. We built a testing platform, RM-Testing, based on DJI RoboMaster S1 robot car. We implemented three up-to-date input validation approaches, and evaluated their effectiveness in improving the success rate of the robot car’s executions. The results show that the selected input validation approaches are effective in guarantee the safe execution of context-aware systems, which improve the success rate by 82% in the simulated environment, and 50% in the physical environment. However, the effectiveness of these approaches does vary in different environment. Thus, we believe that such CASs-based input validation works should be evaluated in the physical environment to better validate their effectiveness and usefulness.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Firmware Fuzzing: The State of the Art 固件模糊测试:最新技术
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457934
Chi Zhang, Yu Wang, Linzhang Wang
{"title":"Firmware Fuzzing: The State of the Art","authors":"Chi Zhang, Yu Wang, Linzhang Wang","doi":"10.1145/3457913.3457934","DOIUrl":"https://doi.org/10.1145/3457913.3457934","url":null,"abstract":"Background: Firmware is the enable software of Internet of Things (IoT) devices, and its software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to the limited resources of IoT devices, it is impractical to deploy sophisticated run-time protection techniques. Under an insecure network environment, when a firmware is exploited, it may lead to denial of service, information disclosure, elevation of privilege, or even life-threatening. Therefore, firmware vulnerability detection by fuzzing has become the key to ensure the security of IoT devices, and has also become a hot topic in academic and industrial research. With the rapid growth of the existing IoT devices, the size and complexity of firmware, the variety of firmware types, and the firmware defects, existing IoT firmware fuzzing methods face challenges. Objective: This paper summarizes the typical types of IoT firmware fuzzing methods, analyzes the contribution of these works, and summarizes the shortcomings of existing fuzzing methods. Method: We design several research questions, extract keywords from the research questions, then use the keywords to search for related literature. Result: We divide the existing firmware fuzzing work into real-device-based fuzzing and simulation-based fuzzing according to the firmware execution environment, and simulation-based fuzzing is the mainstream in the future; we found that the main types of vulnerabilities targeted by existing fuzzing methods are memory corruption vulnerabilities; firmware fuzzing faces more difficulties than ordinary software fuzzing. Conclusion: Through the analysis of the advantages and disadvantages of different methods, this review provides guidance for further improving the performance of fuzzing techniques, and proposes several recommendations from the findings of this review.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Time Window based Reward for Reinforcement Learning in Continuous Integration Testing 基于动态时间窗的持续集成测试中强化学习奖励
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457930
Chaoyue Pan, Yang Yang, Zheng Li, Junxia Guo
{"title":"Dynamic Time Window based Reward for Reinforcement Learning in Continuous Integration Testing","authors":"Chaoyue Pan, Yang Yang, Zheng Li, Junxia Guo","doi":"10.1145/3457913.3457930","DOIUrl":"https://doi.org/10.1145/3457913.3457930","url":null,"abstract":"Continuous Integration (CI) testing is an expensive, time-consuming, and resource-intensive process. Test case prioritization (TCP) can effectively reduce the workload of regression testing in the CI environment, where Reinforcement Learning (RL) is adopted to prioritize test cases, since the TCP in CI testing can be formulated as a sequential decision-making problem, which can be solved by RL effectively. A useful reward function is a crucial component in the construction of the CI system and a critical factor in determining RL’s learning performance in CI testing. This paper focused on the validity of the execution history information of the test cases on the TCP performance in the existing CI testing optimization methods based on RL, and a Dynamic Time Window based reward function are proposed by using partial information dynamically for fast feedback and cost reduction. Experimental studies are carried out on six industrial datasets. The experimental results showed that using dynamic time window based reward function can significantly improve the learning efficiency of RL and the fault detection ability when comparing with the reward function based on fixed time window.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"63 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Empirical Study of Multi-discussing Pattern in Open-Source Software Development 开源软件开发中多方讨论模式的实证研究
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457914
Cheng Yang, Dongyang Hu, Yang Zhang, Tao Wang, Yue Yu
{"title":"An Empirical Study of Multi-discussing Pattern in Open-Source Software Development","authors":"Cheng Yang, Dongyang Hu, Yang Zhang, Tao Wang, Yue Yu","doi":"10.1145/3457913.3457914","DOIUrl":"https://doi.org/10.1145/3457913.3457914","url":null,"abstract":"GitHub enables developers to expediently contribute their comments on multiple issues and switch their discussion between issues, i.e., multi-discussing. Discussing multiple issues simultaneously is able to enhance work efficiency. However, multi-discussing also relies on developers’ rationally allocating their focus, which may result in the different influence on the resolution of issues. Therefore, investigating how multi-discussing affects the issue resolution is a meaningful research question that can help developers understand the benefits and limitations of multi-discussing. Using quantitative and qualitative methods, this paper proposes a groundbreaking study of the impact of multi-discussing on issue resolution in GitHub. First, we collect and analyze data from 624 GitHub projects to explore how multi-discussing affects the overall issue resolution of the project. Further, we investigate how multi-discussing affects the resolution of a single issue. We find that multi-discussing is a common behavior in GitHub. Also, multi-discussing is connected to a shorter average issue resolution latency of the project. However, during a single issue resolution, more multi-discussing behaviors tend to bring longer issue resolution latency. We also conduct the qualitative analysis to explore the developers’ experiences and expectations of multi-discussing.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Bidirectional Transformations for Access Control and Data Sharing in EMRs 基于区块链的电子病历访问控制和数据共享的双向转换
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457915
Tao Zan, Zhenjiang Hu
{"title":"Blockchain-based Bidirectional Transformations for Access Control and Data Sharing in EMRs","authors":"Tao Zan, Zhenjiang Hu","doi":"10.1145/3457913.3457915","DOIUrl":"https://doi.org/10.1145/3457913.3457915","url":null,"abstract":"Electronic medical records (EMRs) are scattered in different hospitals, which hinders the process of data sharing. On the other hand, people with different roles should access different parts of data, thus we need a way to control the accessibility. To address these issues, we propose a blockchain-based data sharing system that gathers EMRs into blockchain and controls data sharing through bidirectional transformation. In our system, EMRs are encoded with a carefully designed data structure that stores not only data, but also data’s read/write permission for different roles. We redesigned a bidirectional transformation language based on our previous work BiGUL by taking access control into consideration, and the accessibility are checked during program execution in both direction to avoid un-authorized data access. Further more, each bidirectional transformation program and updates on the shared data are stored in the blockchain in a transaction-like form. The immutability of blockchain guarantees EMR’s data integrity.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training Deep Code Comment Generation Models via Data Augmentation 通过数据增强训练深度代码注释生成模型
Proceedings of the 12th Asia-Pacific Symposium on Internetware Pub Date : 2020-11-01 DOI: 10.1145/3457913.3457937
Xiaoqing Zhang, Yu Zhou, Tingting Han, Taolue Chen
{"title":"Training Deep Code Comment Generation Models via Data Augmentation","authors":"Xiaoqing Zhang, Yu Zhou, Tingting Han, Taolue Chen","doi":"10.1145/3457913.3457937","DOIUrl":"https://doi.org/10.1145/3457913.3457937","url":null,"abstract":"With the development of deep neural networks (DNNs) and the publicly available source code repositories, deep code comment generation models have demonstrated reasonable performance on test datasets. However, it has been confirmed in computer vision (CV) and natural language processing (NLP) that DNNs are vulnerable to adversarial examples. In this paper, we investigate how to maintain the performance of the models against these perturbed samples. We propose a simple, but effective, method to improve the robustness by training the model via data augmentation. We conduct experiments to evaluate our approach on two mainstream sequence-sequence (seq2seq) architectures which are based on the LSTM and the Transformer with a large-scale publicly available dataset. The experimental results demonstrate that our method can efficiently improve the capability of different models to defend the perturbed samples.","PeriodicalId":194449,"journal":{"name":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信