Information and Software Technology最新文献

筛选
英文 中文
A multivocal literature review on the benefits and limitations of industry-leading AutoML tools 关于业界领先的 AutoML 工具的优势和局限性的多语种文献综述
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-29 DOI: 10.1016/j.infsof.2024.107608
Luigi Quaranta , Kelly Azevedo , Fabio Calefato , Marcos Kalinowski
{"title":"A multivocal literature review on the benefits and limitations of industry-leading AutoML tools","authors":"Luigi Quaranta ,&nbsp;Kelly Azevedo ,&nbsp;Fabio Calefato ,&nbsp;Marcos Kalinowski","doi":"10.1016/j.infsof.2024.107608","DOIUrl":"10.1016/j.infsof.2024.107608","url":null,"abstract":"<div><h3>Context:</h3><div>Rapid advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing software engineering in every application domain, driving unprecedented transformations and fostering innovation. However, despite these advances, several organizations are experiencing friction in the adoption of ML-based technologies, mainly due to the current shortage of ML professionals. In this context, Automated Machine Learning (AutoML) techniques have been presented as a promising solution to democratize ML adoption, even in the absence of specialized people.</div></div><div><h3>Objective:</h3><div>Our research aims to provide an overview of the evidence on the benefits and limitations of AutoML tools being adopted in industry.</div></div><div><h3>Methods:</h3><div>We conducted a Multivocal Literature Review, which allowed us to identify 54 sources from the academic literature and 108 sources from the grey literature reporting on AutoML benefits and limitations. We extracted explicitly reported benefits and limitations from the papers and applied the thematic analysis method for synthesis.</div></div><div><h3>Results:</h3><div>In general, we identified 18 reported benefits and 25 limitations. Concerning the benefits, we highlight that AutoML tools can help streamline the core steps of ML workflows, namely data preparation, feature engineering, model construction, and hyperparameter tuning—with concrete benefits on model performance, efficiency, and scalability. In addition, AutoML empowers both novice and experienced data scientists, promoting ML accessibility. However, we highlight several limitations that may represent obstacles to the widespread adoption of AutoML. For instance, AutoML tools may introduce barriers to transparency and interoperability, exhibit limited flexibility for complex scenarios, and offer inconsistent coverage of the ML workflow.</div></div><div><h3>Conclusion:</h3><div>The effectiveness of AutoML in facilitating the adoption of machine learning by users may vary depending on the specific tool and the context in which it is used. Today, AutoML tools are used to increase human expertise rather than replace it and, as such, require skilled users.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107608"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using AI-based coding assistants in practice: State of affairs, perceptions, and ways forward 在实践中使用基于人工智能的编码助手:现状、看法和前进方向
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-29 DOI: 10.1016/j.infsof.2024.107610
Agnia Sergeyuk , Yaroslav Golubev , Timofey Bryksin , Iftekhar Ahmed
{"title":"Using AI-based coding assistants in practice: State of affairs, perceptions, and ways forward","authors":"Agnia Sergeyuk ,&nbsp;Yaroslav Golubev ,&nbsp;Timofey Bryksin ,&nbsp;Iftekhar Ahmed","doi":"10.1016/j.infsof.2024.107610","DOIUrl":"10.1016/j.infsof.2024.107610","url":null,"abstract":"<div><h3>Context:</h3><div>The last several years saw the emergence of <em>AI assistants</em> for code — multi-purpose AI-based helpers in software engineering. As they become omnipresent in all aspects of software development, it becomes critical to understand their usage patterns.</div></div><div><h3>Objective:</h3><div>We aim to better understand <em>how specifically</em> developers are using AI assistants, why they are <em>not</em> using them in certain parts of their development workflow, and what needs to be improved in the future.</div></div><div><h3>Methods:</h3><div>In this work, we carried out a large-scale survey aimed at how AI assistants are used, focusing on specific software development activities and stages. We collected opinions of 481 programmers on five broad activities: (a) implementing new features, (b) writing tests, (c) bug triaging, (d) refactoring, and (e) writing natural-language artifacts, as well as their individual stages.</div></div><div><h3>Results:</h3><div>Our results provide a novel comparison of different stages where AI assistants are used that is both comprehensive and detailed. It highlights specific activities that developers find less enjoyable and want to delegate to an AI assistant, <em>e.g.</em>, writing tests and natural-language artifacts. We also determine more granular stages where AI assistants are used, such as generating tests and generating docstrings, as well as less studied parts of the workflow, such as generating test data. Among the reasons for not using assistants, there are general aspects like trust and company policies, as well as more concrete issues like the lack of project-size context, which can be the focus of the future research.</div></div><div><h3>Conclusion:</h3><div>The provided analysis highlights stages of software development that developers want to delegate and that are already popular for using AI assistants, which can be a good focus for features aimed to help developers right now. The main reasons for not using AI assistants can serve as a guideline for future work.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107610"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software aging oriented trustworthiness measurement based on weighted Boltzmann entropy 基于加权玻尔兹曼熵的面向软件老化的可信度测量
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-28 DOI: 10.1016/j.infsof.2024.107606
Hongwei Tao , Han Liu , Xiaoxu Niu , Licheng Ding , Yixiang Chen , Qiaoling Cao
{"title":"Software aging oriented trustworthiness measurement based on weighted Boltzmann entropy","authors":"Hongwei Tao ,&nbsp;Han Liu ,&nbsp;Xiaoxu Niu ,&nbsp;Licheng Ding ,&nbsp;Yixiang Chen ,&nbsp;Qiaoling Cao","doi":"10.1016/j.infsof.2024.107606","DOIUrl":"10.1016/j.infsof.2024.107606","url":null,"abstract":"<div><h3>Context:</h3><div>With the rapid development of software, various software accidents emerge one after another. The catastrophic consequences caused by these accidents make people realize the importance of software trustworthiness. As an indispensable means to ensure software quality, traditional trustworthiness measurement evaluates the software trustworthiness by studying the trustworthy attributes in a static way. However, most of the factors considered in trustworthy attributes tend to be dynamic with time. The current research often ignores the changes in software after running for some time, and cannot reflect the changes in software trustworthiness at different running times.</div></div><div><h3>Objective:</h3><div>Our objective in this paper is to study the relationship between running time and software trustworthiness, and design a running time-related software trustworthiness measurement model from the untrustworthy evidence related to software aging.</div></div><div><h3>Method:</h3><div>We first extract the untrustworthy evidence from the bugs related to software aging in 5 subsystems of 4 public defect databases and 18 well-known software accidents, establish a risk level model, and design metric elements of untrustworthy evidence based on software aging. Then we construct a software aging cause category trustworthiness measurement model based on Boltzmann entropy. Finally, we build a software trustworthiness measurement model based on weighted Boltzmann entropy. For the weight values used in the model, the Brassard Priority Synthesis Analysis method was used to determine them.</div></div><div><h3>Result:</h3><div>Different from the common resource consumption parameter and performance parameter, a model based on weighted Boltzmann entropy can describe the influence of various parameters on the software’s trustworthiness through risk state. It can reflect the change of system state and describe the system state completely.</div></div><div><h3>Conclusion:</h3><div>The empirical study shows the effectiveness and practicality of our method for evaluating software dynamic trustworthiness. Meanwhile, it also indicates a promising avenue for future research and application in the field of software trustworthiness measurement.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107606"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of minimum viable product on software ecosystem failure 最小可行产品对软件生态系统失败的影响
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-28 DOI: 10.1016/j.infsof.2024.107612
Kati Saarni , Marjo Kauppinen , Tomi Männistö
{"title":"Impact of minimum viable product on software ecosystem failure","authors":"Kati Saarni ,&nbsp;Marjo Kauppinen ,&nbsp;Tomi Männistö","doi":"10.1016/j.infsof.2024.107612","DOIUrl":"10.1016/j.infsof.2024.107612","url":null,"abstract":"<div><h3>Context</h3><div>Companies are interested in building successful value-producing ecosystems together to offer end users a broader digital service offering and better meet customer needs. However, most ecosystems fail in the early years.</div></div><div><h3>Objective</h3><div>We investigated one small software ecosystem from the planning phase to the operative phase, where the participating companies left one by one because the software ecosystem was unsuccessful, and the software ecosystem ended after four operative years. The software ecosystem provided a digital service offering based on the defined MVP (Minimum Viable Product). That is why we were interested in understanding the MVP's impact on the ecosystem's failure.</div></div><div><h3>Method</h3><div>We conducted a case study, the results of which are based on the semi-structured interviews of eight representatives of the software ecosystem.</div></div><div><h3>Results</h3><div>This study showed that the actors prioritized out functionalities from the MVP, and the MVP was no longer based on the defined value proposition, target customer groups, and customer paths. It was then difficult for the actors to achieve their objectives. The companies’ commitment depended on the set objectives, and when the objectives were not achieved, the actors left the ecosystem, and the software ecosystem failed.</div></div><div><h3>Conclusion</h3><div>The results show that the MVP can significantly affect the failure of the small software ecosystem, where all actors have a keystone role. The MVP largely defines what kind of digital service offering the software ecosystem provides and whether the actors can achieve the objectives, especially their sales goals. Thus, prioritizing the functionalities of the MVP is a critical activity.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107612"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142572785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems 为可持续发展注入活力:EnSAF 用于可持续发展意识、软件密集型能源管理系统
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-26 DOI: 10.1016/j.infsof.2024.107607
Anjana M.S. , Patricia Lago , Aryadevi Remanidevi Devidas , Maneesha Vinodini Ramesh
{"title":"Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems","authors":"Anjana M.S. ,&nbsp;Patricia Lago ,&nbsp;Aryadevi Remanidevi Devidas ,&nbsp;Maneesha Vinodini Ramesh","doi":"10.1016/j.infsof.2024.107607","DOIUrl":"10.1016/j.infsof.2024.107607","url":null,"abstract":"<div><h3>Context:</h3><div>India’s coal use for electricity jumped 13% in 2021–22. Energy management systems (EnMS) are seen as a solution, but only sustainable EnMS can have a discernable impact on the carbon footprint and the Return On Investment (ROI).</div></div><div><h3>Objective:</h3><div>Designing a software-intensive sustainable energy management system requires considering technical, environmental, social, and economic factors. This helps evaluate an EnMS’s overall impact and improve its design. We proposed EnSAF for efficient utilization of the energy incurred for the design of sustainability-aware EnMSs.</div></div><div><h3>Method:</h3><div>In this work, EnMSs in diverse use cases were selected and analyzed in terms of technical, social, environmental, and economic dimensions of sustainability in collaboration with various stakeholders. The set of application-specific design concerns and Quality Attributes (QAs) were addressed by the Sustainability Assessment Framework (SAF) toolkit. The resultant SAF instances of each EnMS, derived through the analysis and discussion with the stakeholders, were then analyzed to advocate the DMs and SQ model for generic EnMSs.</div></div><div><h3>Results:</h3><div>This study demonstrated the following outcomes (i) technical concerns dominate the existing EnMSs (ii) integration of renewable energy resources reduces dependency to the main power grid and nurtures a sustainable environment by diminishing carbon footprint, and minimizing payback time, in the economic dimension; (iii) extant definitions of quality attributes need significant scrutiny and updates apropos of objectives of EnMSs</div></div><div><h3>Conclusion:</h3><div>The SAF toolkit was found to be deficient in the representation of relevant design concerns and quality attributes concomitant with sustainable EnMS. Prevailing DMs are inept to factor in stakeholder’s concerns, as the model is ill-equipped to account for spatio-temporal representation of QAs. Pursuant to the insights from the 4 SAF instances, a generic framework, EnSAF, is proposed to tackle the relevant concerns apropos of EnMS sustainability. This work proposed a representation of DMs in the SAF toolkit specifically for sustainability-aware EnMS.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107607"},"PeriodicalIF":3.8,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FOBICS: Assessing project security level through a metrics framework that evaluates DevSecOps performance FOBICS:通过评估 DevSecOps 性能的度量框架来评估项目安全级别
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-21 DOI: 10.1016/j.infsof.2024.107605
Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo
{"title":"FOBICS: Assessing project security level through a metrics framework that evaluates DevSecOps performance","authors":"Alessandro Caniglia,&nbsp;Vincenzo Dentamaro,&nbsp;Stefano Galantucci,&nbsp;Donato Impedovo","doi":"10.1016/j.infsof.2024.107605","DOIUrl":"10.1016/j.infsof.2024.107605","url":null,"abstract":"<div><h3>Context:</h3><div>In today’s software development landscape, the DevSecOps approach has gained traction due to its focus on the software development process and bolstering security measures in projects, a task in light of the ever-evolving cybersecurity threats.</div></div><div><h3>Objective:</h3><div>This study aims to address the lack of metrics for quantitatively assessing its efficacy from both security and business logic perspectives.</div></div><div><h3>Methods:</h3><div>To tackle this issue, the research introduces the Framework of Business Index Concerning Security (FOBICS), a set of metrics designed to enable transparent evaluations of project security. FOBICS considers various perspectives relevant to DevSecOps practices. It includes factors such as project duration and financial outcomes, making it appealing for implementation in business settings.</div></div><div><h3>Results:</h3><div>The effectiveness of FOBICS is validated theoretically and empirically via its application in two real-world projects: the results from these implementations show a correlation between FOBICS metrics and the security strategies employed as the development methodologies adopted by diverse teams throughout the projects.</div></div><div><h3>Conclusion:</h3><div>Hence, FOBICS emerges as a tool for assessing and continuously monitoring project security, offering insights into areas of strength and areas that may require enhancement. FOBICS is shown to be effective in assessing the level of DevSecOps implementation. The ease of calculating FOBICS metrics makes them easily interpretable and continuously verifiable. Moreover, FOBICS summarizes most of the other quantitative and qualitative metrics in the literature.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107605"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic robustness evaluation for automated model selection in operation 运行中自动模型选择的动态稳健性评估
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-21 DOI: 10.1016/j.infsof.2024.107603
Jin Zhang , Jingyue Li , Zhirong Yang
{"title":"Dynamic robustness evaluation for automated model selection in operation","authors":"Jin Zhang ,&nbsp;Jingyue Li ,&nbsp;Zhirong Yang","doi":"10.1016/j.infsof.2024.107603","DOIUrl":"10.1016/j.infsof.2024.107603","url":null,"abstract":"<div><h3>Context:</h3><div>The increasing use of artificial neural network (ANN) classifiers in systems, especially safety-critical systems (SCSs), requires ensuring their robustness against out-of-distribution (OOD) shifts in operation, which are changes in the underlying data distribution from the data training the classifier. However, measuring the robustness of classifiers in operation with only unlabeled data is challenging. Additionally, machine learning engineers may need to compare different models or versions of the same model and switch to an optimal version based on their robustness.</div></div><div><h3>Objective:</h3><div>This paper explores the problem of dynamic robustness evaluation for automated model selection. We aim to find efficient and effective metrics for evaluating and comparing the robustness of multiple ANN classifiers using unlabeled operational data.</div></div><div><h3>Methods:</h3><div>To quantitatively measure the differences between the model outputs and assess robustness under OOD shifts using unlabeled data, we choose distance-based metrics. An empirical comparison of five such metrics, suitable for higher-dimensional data like images, is performed. The selected metrics include Wasserstein distance (WD), maximum mean discrepancy (MMD), Hellinger distance (HL), Kolmogorov–Smirnov statistic (KS), and Kullback–Leibler divergence (KL), known for their efficacy in quantifying distribution differences. We evaluate these metrics on 20 state-of-the-art models (ten CIFAR10-based models, five CIFAR100-based models, and five ImageNet-based models) from a widely used robustness benchmark (<strong>RobustBench</strong>) using data perturbed with various types and magnitudes of corruptions to mimic real-world OOD shifts.</div></div><div><h3>Results:</h3><div>Our findings reveal that the WD metric outperforms others when ranking multiple ANN models for CIFAR10- and CIFAR100-based models, while the KS metric demonstrates superior performance for ImageNet-based models. MMD can be used as a reliable second option for both datasets.</div></div><div><h3>Conclusion:</h3><div>This study highlights the effectiveness of distance-based metrics in ranking models’ robustness for automated model selection. It also emphasizes the significance of advancing research in dynamic robustness evaluation.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107603"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142539048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on Cryptoagility and Agile Practices in the light of quantum resistance 从量子阻力看加密敏捷性和敏捷实践调查
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-21 DOI: 10.1016/j.infsof.2024.107604
Lodovica Marchesi , Michele Marchesi , Roberto Tonelli
{"title":"A survey on Cryptoagility and Agile Practices in the light of quantum resistance","authors":"Lodovica Marchesi ,&nbsp;Michele Marchesi ,&nbsp;Roberto Tonelli","doi":"10.1016/j.infsof.2024.107604","DOIUrl":"10.1016/j.infsof.2024.107604","url":null,"abstract":"<div><h3>Context:</h3><div>Crypto-agility, a name that stems from agile methodologies for software development, means the ability to modify quickly and securely cryptographic algorithms in the event of a compromise. The advent of quantum computing poses existential threats to current cryptography, having the power to breach current cryptography systems.</div></div><div><h3>Objective:</h3><div>We investigated whether and to what extent agile practices for software development are suited to support crypto-agility, or not. In particular, we discuss their usefulness in the context of substituting current algorithms with quantum-resistant ones.</div></div><div><h3>Method:</h3><div>First, we analyzed the literature to define a subset of 15 agile practices potentially relevant to cryptographic software development. Then, we developed a questionnaire to assess the suitability of agile practices for obtaining crypto-agility. We performed a Web search of relevant documents about crypto-agility and quantum resistance and sent their authors the questionnaire. We also sent the questionnaire to cybersecurity officers of four Italian firms. We analyzed and discussed the responses to 32 valid questionnaires.</div></div><div><h3>Results:</h3><div>The respondents’ affiliations are evenly distributed between researchers and developers. Most of them are active, or somehow active, in quantum-resistant cryptography and use agile methods. Most of the agile practices are deemed to be quite useful, or very useful to get crypto-agility, the most effective being Continuous Integration and Coding Standards; the least appreciated is Self-organizing Team.</div></div><div><h3>Conclusion:</h3><div>According to researchers and developers working in the field, the safe transition of cryptographic algorithms to quantum-resistant ones can benefit from the adoption of many agile practices. Further software engineering research is needed to integrate agile practices in more formal cryptographic software development processes.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107604"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-code: Mastering efficient code generation through pretrained models and expert encoder group 电子编码:通过预训练模型和专家编码器小组掌握高效代码生成
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-20 DOI: 10.1016/j.infsof.2024.107602
Yue Pan , Chen Lyu , Zhenyu Yang , Lantian Li , Qi Liu , Xiuting Shao
{"title":"E-code: Mastering efficient code generation through pretrained models and expert encoder group","authors":"Yue Pan ,&nbsp;Chen Lyu ,&nbsp;Zhenyu Yang ,&nbsp;Lantian Li ,&nbsp;Qi Liu ,&nbsp;Xiuting Shao","doi":"10.1016/j.infsof.2024.107602","DOIUrl":"10.1016/j.infsof.2024.107602","url":null,"abstract":"<div><h3>Context:</h3><div>With the waning of Moore’s Law, the software industry is placing increasing importance on finding alternative solutions for continuous performance enhancement. The significance and research results of software performance optimization have been on the rise in recent years, especially with the advancement propelled by <strong>L</strong>arge <strong>L</strong>anguage <strong>M</strong>odel<strong>s</strong> (LLMs). However, traditional strategies for rectifying performance flaws have shown significant limitations at the competitive code efficiency optimization level, and research on this topic is surprisingly scarce.</div></div><div><h3>Objective:</h3><div>This study aims to address the research gap in this domain, offering practical solutions to the various challenges encountered. Specifically, we have overcome the constraints of traditional performance error rectification strategies and developed a <strong>L</strong>anguage <strong>M</strong>odel (LM) tailored for the competitive code efficiency optimization realm.</div></div><div><h3>Methods:</h3><div>We introduced E-code, an advanced program synthesis LM. Inspired by the recent success of expert LMs, we designed an innovative structure called the Expert Encoder Group. This structure employs multiple expert encoders to extract features tailored for different input types. We assessed the performance of E-code against other leading models on a competitive dataset and conducted in-depth ablation experiments.</div></div><div><h3>Results:</h3><div>Upon systematic evaluation, E-code achieved a 54.98% improvement in code efficiency, significantly outperforming other advanced models. In the ablation experiments, we further validated the significance of the expert encoder group and other components within E-code.</div></div><div><h3>Conclusion:</h3><div>The research findings indicate that the expert encoder group can effectively handle various inputs in efficiency optimization tasks, significantly enhancing the model’s performance. In summary, this study paves new avenues for developing systems and methods to assist programmers in writing efficient code.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107602"},"PeriodicalIF":3.8,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic review on the current state of computer-supported argumentation learning systems 关于计算机支持的论证学习系统现状的系统回顾
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-10-18 DOI: 10.1016/j.infsof.2024.107598
Laura Sinikallio , Lili Aunimo , Tomi Männistö
{"title":"Systematic review on the current state of computer-supported argumentation learning systems","authors":"Laura Sinikallio ,&nbsp;Lili Aunimo ,&nbsp;Tomi Männistö","doi":"10.1016/j.infsof.2024.107598","DOIUrl":"10.1016/j.infsof.2024.107598","url":null,"abstract":"<div><h3>Context:</h3><div>Argumentation is a fundamental part of learning, communication and problem-solving not only in software engineering but all education. Teaching argumentation is a long-standing practice, and with the advance of digital learning, it, too, has been transitioning to an online format.</div></div><div><h3>Objective:</h3><div>As computer-supported argumentation learning progresses, other learning domains have much to learn from it on how to enable argumentation and reasoning in automated and scalable online learning solutions.</div></div><div><h3>Methods:</h3><div>To review the current state of the field, we conducted a systematic literature review on the last decade of academic research and design on computer-supported argumentation learning systems. We reviewed and summarised the central aspects and approaches of reported systems.</div></div><div><h3>Results:</h3><div>We reviewed 34 different argumentation learning tools. The review showed that approaches to computer-supported argumentation vary significantly in many aspects, e.g., argumentation theory, learning task types and collaboration status. However, the use of argumentation graphs is quite common. Most modern tools seem to embrace the role of feedback in learning.</div></div><div><h3>Conclusions:</h3><div>The role of individual learning has risen in computer-supported argumentation learning. This is in opposition to previous predictions and statements on the role of collaborative learning of argumentation. Automated feedback has, on the other hand, become commonplace in collaborative and individual-use argumentation learning tools. The modern generation of argumentation teaching tools is Web-based but recently we have also seen the emergence of mobile-based solutions.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107598"},"PeriodicalIF":3.8,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信