<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
	<channel>
		<title>ACM Transactions on Software Engineering and Methodology (TOSEM)</title>
		<link>http://dl.acm.org/citation.cfm?id=3461694</link>
		<description />
		<item>
			<title>ACM Transactions on Software Engineering and Methodology (TOSEM) - Continuous Special Section: AI and SE</title>
			<link>http://dl.acm.org/citation.cfm?id=3461694</link>
			<description />
			<pubDate>Sun, 31 Oct 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3461694</guid>
		</item>
		<item>
			<title>Evaluation of Software Architectures under Uncertainty: A Systematic Literature Review</title>
			<link>http://dl.acm.org/citation.cfm?id=3464305</link>
			<description><![CDATA[Dalia Sobhy, Rami Bahsoon, Leandro Minku, Rick Kazman<br /><br />Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly performed throughout the lifetime of the software system. Numerous approaches have been developed for continuous evaluation; to handle dynamics and uncertainties at run-time, over the past years, these approaches are still very few, limited, and lack maturity. Objective: This review surveys efforts on architecture evaluation and provides a unified terminology and perspective on the subject. Method: We conducted a systematic literature review to identify and analyse architecture evaluation approaches for uncertainty including continuous and non-continuous, covering work published between 1990&#x02013;2020.]]></description>
			<pubDate>Tue, 03 Aug 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3464305</guid>
		</item>
		<item>
			<title>Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search</title>
			<link>http://dl.acm.org/citation.cfm?id=3464939</link>
			<description><![CDATA[Safdar Aqeel Safdar, Tao Yue, Shaukat Ali<br /><br />Modern systems, such as cyber-physical systems, often consist of multiple products within&#x002F;across product lines communicating with each other through information networks. Consequently, their runtime behaviors are influenced by product configurations and networks. Such systems play a vital role in our daily life; thus, ensuring their correctness by thorough testing becomes essential. However, testing these systems is particularly challenging due to a large number of possible configurations and limited available resources. Therefore, it is important and practically useful to test these systems with specific configurations under which products will most likely fail to communicate with each other. Motivated by this, we present a search-based configuration recommendation (SBCR) approach to recommend faulty configurations for the system under test (SUT) based on cross-product line (CPL) rules.]]></description>
			<pubDate>Tue, 03 Aug 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3464939</guid>
		</item>
		<item>
			<title>When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems</title>
			<link>http://dl.acm.org/citation.cfm?id=3447245</link>
			<description><![CDATA[Chris Bogart, Christian K&#x00E4;stner, James Herbsleb, Ferdian Thung<br /><br />Open source software projects often rely on package management systems that help projects discover, incorporate, and maintain dependencies on other packages, maintained by other people. Such systems save a great deal of effort over ad hoc ways of advertising, packaging, and transmitting useful libraries, but coordination among project teams is still needed when one package makes a breaking change affecting other packages. Ecosystems differ in their approaches to breaking changes, and there is no general theory to explain the relationships between features, behavioral norms, ecosystem outcomes, and motivating values. We address this through two empirical studies. In an interview case study, we contrast Eclipse, NPM, and CRAN, demonstrating that these different norms for coordination of breaking changes shift the costs of using and maintaining the software among stakeholders, appropriate to each ecosystem&#x02019;s mission.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3447245</guid>
		</item>
		<item>
			<title>How Far Have We Progressed in Identifying Self-admitted Technical Debts&#x003F; A Comprehensive Empirical Study</title>
			<link>http://dl.acm.org/citation.cfm?id=3447247</link>
			<description><![CDATA[Zhaoqiang Guo, Shiran Liu, Jinping Liu, Yanhui Li, Lin Chen, Hongmin Lu, Yuming Zhou<br /><br />Background. Self-admitted technical debt (SATD) is a special kind of technical debt that is intentionally introduced and remarked by code comments. Those technical debts reduce the quality of software and increase the cost of subsequent software maintenance. Therefore, it is necessary to find out and resolve these debts in time. Recently, many automatic approaches have been proposed to identify SATD. Problem. Popular IDEs support a number of predefined task annotation tags for indicating SATD in comments, which have been used in many projects. However, such clear prior knowledge is neglected by existing SATD identification approaches when identifying SATD. Objective. We aim to investigate how far we have really progressed in the field of SATD identification by comparing existing approaches with a simple approach that leverages the predefined task tags to identify SATD.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3447247</guid>
		</item>
		<item>
			<title>Eagle: CFL-Reachability-Based Precision-Preserving Acceleration of Object-Sensitive Pointer Analysis with Partial Context Sensitivity</title>
			<link>http://dl.acm.org/citation.cfm?id=3450492</link>
			<description><![CDATA[Jingbo Lu, Dongjie He, Jingling Xue<br /><br />Object sensitivity is widely used as a context abstraction for computing the points-to information context-sensitively for object-oriented programming languages such as Java. Due to the combinatorial explosion of contexts in large object-oriented programs, k-object-sensitive pointer analysis (under k-limiting), denoted k-obj, is often inefficient even when it is scalable for small values of k, where k &#x2A7D; 2 holds typically. A recent popular approach for accelerating k-obj trades precision for efficiency by instructing k-obj to analyze only some methods in a program context-sensitively, determined heuristically by a pre-analysis. In this article, we investigate how to develop a fundamentally different approach, Eagle, for designing a pre-analysis that can make k-obj run significantly faster while maintaining its precision.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3450492</guid>
		</item>
		<item>
			<title>Specifying with Interface and Trait Abstractions in Abstract State Machines: A Controlled Experiment</title>
			<link>http://dl.acm.org/citation.cfm?id=3450968</link>
			<description><![CDATA[Philipp Paulweber, Georg Simhandl, Uwe Zdun<br /><br />Abstract State Machine (ASM) theory is a well-known state-based formal method. As in other state-based formal methods, the proposed specification languages for ASMs still lack easy-to-comprehend abstractions to express structural and behavioral aspects of specifications. Our goal is to investigate object-oriented abstractions such as interfaces and traits for ASM-based specification languages. We report on a controlled experiment with 98 participants to study the specification efficiency and effectiveness in which participants needed to comprehend an informal specification as problem (stimulus) in form of a textual description and express a corresponding solution in form of a textual ASM specification using either interface or trait syntax extensions.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3450968</guid>
		</item>
		<item>
			<title>Automatically Identifying the Quality of Developer Chats for Post Hoc Use</title>
			<link>http://dl.acm.org/citation.cfm?id=3450503</link>
			<description><![CDATA[Preetha Chatterjee, Kostadin Damevski, Nicholas A. Kraft, Lori Pollock<br /><br />Software engineers are crowdsourcing answers to their everyday challenges on Q&#x0026;A forums (e.g., Stack Overflow) and more recently in public chat communities such as Slack, IRC, and Gitter. Many software-related chat conversations contain valuable expert knowledge that is useful for both mining to improve programming support tools and for readers who did not participate in the original chat conversations. However, most chat platforms and communities do not contain built-in quality indicators (e.g., accepted answers, vote counts). Therefore, it is difficult to identify conversations that contain useful information for mining or reading, i.e., conversations of post hoc quality. In this article, we investigate automatically detecting developer conversations of post hoc quality from public chat channels.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3450503</guid>
		</item>
		<item>
			<title>Speeding Up Data Manipulation Tasks with Alternative Implementations: An Exploratory Study</title>
			<link>http://dl.acm.org/citation.cfm?id=3456873</link>
			<description><![CDATA[Yida Tao, Shan Tang, Yepang Liu, Zhiwu Xu, Shengchao Qin<br /><br />As data volume and complexity grow at an unprecedented rate, the performance of data manipulation programs is becoming a major concern for developers. In this article, we study how alternative API choices could improve data manipulation performance while preserving task-specific input/output equivalence. We propose a lightweight approach that leverages the comparative structures in Q&#x0026;A sites to extracting alternative implementations. On a large dataset of Stack Overflow posts, our approach extracts 5,080&#x000A0;pairs of alternative implementations that invoke different data manipulation APIs to solve the same tasks, with an accuracy of 86&#x0025;. Experiments show that for 15&#x0025; of the extracted pairs, the faster implementation achieved &#x003E;10x speedup over its slower alternative.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3456873</guid>
		</item>
		<item>
			<title>Software Architectural Migration: An Automated Planning Approach</title>
			<link>http://dl.acm.org/citation.cfm?id=3461011</link>
			<description><![CDATA[Nacha Chondamrongkul, Jing Sun, Ian Warren<br /><br />Software architectural designs are usually changed over time to support emerging technologies and to adhere to new principles. Architectural migration is an important activity that helps to transform the architectural styles applied during a system&#x02019;s design with the result of modernising the system. If not performed correctly, this process could lead to potential system failures. This article presents an automated approach to refactoring architectural design and to planning the evolution process. With our solution, the architectural design can be refactored, ensuring that system functionality is preserved. Furthermore, the architectural migration process allows the system to be safely and incrementally transformed. We have evaluated our approach with five real-world software applications.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3461011</guid>
		</item>
		<item>
			<title>The Agile Success Model: A Mixed-methods Study of a Large-scale Agile Transformation</title>
			<link>http://dl.acm.org/citation.cfm?id=3464938</link>
			<description><![CDATA[Daniel Russo<br /><br />Organizations are increasingly adopting Agile frameworks for their internal software development. Cost reduction, rapid deployment, requirements and mental model alignment are typical reasons for an Agile transformation. This article presents an in-depth field study of a large-scale Agile transformation in a mission-critical environment, where stakeholders&#x02019; commitment was a critical success factor. The goal of such a transformation was to implement mission-oriented features, reducing costs and time to operate in critical scenarios. The project lasted several years and involved over 40 professionals. We report how a hierarchical and plan-driven organization exploited Agile methods to develop a Command &#38; Control (C2) system. Accordingly, we first abstract our experience, inducing a success model of general use for other comparable organizations by performing a post-mortem study.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3464938</guid>
		</item>
		<item>
			<title>An Empirical Study of the Impact of Data Splitting Decisions on the Performance of AIOps Solutions</title>
			<link>http://dl.acm.org/citation.cfm?id=3447876</link>
			<description><![CDATA[Yingzhe Lyu, Heng Li, Mohammed Sayagh, Zhen Ming (Jack) Jiang, Ahmed E. Hassan<br /><br />AIOps (Artificial Intelligence for IT Operations) leverages machine learning models to help practitioners handle the massive data produced during the operations of large-scale systems. However, due to the nature of the operation data, AIOps modeling faces several data splitting-related challenges, such as imbalanced data, data leakage, and concept drift. In this work, we study the data leakage and concept drift challenges in the context of AIOps and evaluate the impact of different modeling decisions on such challenges. Specifically, we perform a case study on two commonly studied AIOps applications: (1) predicting job failures based on trace data from a large-scale cluster environment and (2) predicting disk failures based on disk monitoring data from a large-scale cloud storage environment.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3447876</guid>
		</item>
		<item>
			<title>Understanding Software-2.0: A Study of Machine Learning Library Usage and Evolution</title>
			<link>http://dl.acm.org/citation.cfm?id=3453478</link>
			<description><![CDATA[Malinda Dilhara, Ameya Ketkar, Danny Dig<br /><br />Enabled by a rich ecosystem of Machine Learning (ML) libraries, programming using learned models, i.e., Software-2.0, has gained substantial adoption. However, we do not know what challenges developers encounter when they use ML libraries. With this knowledge gap, researchers miss opportunities to contribute to new research directions, tool builders do not invest resources where automation is most needed, library designers cannot make informed decisions when releasing ML library versions, and developers fail to use common practices when using ML libraries. We present the first large-scale quantitative and qualitative empirical study to shed light on how developers in Software-2.0 use ML libraries, and how this evolution affects their code.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3453478</guid>
		</item>
		<item>
			<title>Context-aware Retrieval-based Deep Commit Message Generation</title>
			<link>http://dl.acm.org/citation.cfm?id=3464689</link>
			<description><![CDATA[Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy<br /><br />Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunately, developers often commit code with empty or poor quality commit messages. To address this issue, several studies have proposed approaches to generate commit messages from commit diffs. Recent studies make use of neural machine translation algorithms to try and translate git diffs into commit messages and have achieved some promising results. However, these learning-based methods tend to generate high-frequency words but ignore low-frequency ones. In addition, they suffer from exposure bias issues, which leads to a gap between training phase and testing phase. In this article, we propose CoRec to address the above two limitations.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3464689</guid>
		</item>
		<item>
			<title>Leveraging Control Flow Knowledge in SMT Solving of Program Verification</title>
			<link>http://dl.acm.org/citation.cfm?id=3446211</link>
			<description><![CDATA[Jianhui Chen, Fei He<br /><br />Satisfiability modulo theories (SMT) solvers have been widely applied as the reasoning engine for diverse software analysis and verification technologies. The efficiency of the SMT solver has significant effects on the performance of these technologies. However, current SMT solvers are designed for the general purpose of constraint solving. Lots of useful knowledge of programs cannot be utilized during SMT solving. As a result, the SMT solver may spend much effort to explore redundant search space. In this article, we propose a novel approach to utilizing control-flow knowledge in SMT solving. With this technique, the search space can be considerably reduced, and the efficiency of SMT solving is observably improved.]]></description>
			<pubDate>Mon, 10 May 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3446211</guid>
		</item>
		<item>
			<title>Toward a Holistic Approach to Verification and Validation of Autonomous Cognitive Systems</title>
			<link>http://dl.acm.org/citation.cfm?id=3447246</link>
			<description><![CDATA[Angelo Ferrando, Louise A. Dennis, Rafael C. Cardoso, Michael Fisher, Davide Ancona, Viviana Mascardi<br /><br />When applying formal verification to a system that interacts with the real world, we must use a model of the environment. This model represents an abstraction of the actual environment, so it is necessarily incomplete and hence presents an issue for system verification. If the actual environment matches the model, then the verification is correct; however, if the environment falls outside the abstraction captured by the model, then we cannot guarantee that the system is well behaved. A solution to this problem consists in exploiting the model of the environment used for statically verifying the system&#x02019;s behaviour and, if the verification succeeds, using it also for validating the model against the real environment via runtime verification.]]></description>
			<pubDate>Mon, 10 May 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3447246</guid>
		</item>
		<item>
			<title>Diversifying Focused Testing for Unit Testing</title>
			<link>http://dl.acm.org/citation.cfm?id=3447265</link>
			<description><![CDATA[H&#233;ctor D. Men&#233;ndez, Gunel Jahangirova, Federica Sarro, Paolo Tonella, David Clark<br /><br />Software changes constantly, because developers add new features or modifications. This directly affects the effectiveness of the test suite associated with that software, especially when these new modifications are in a specific area that no test case covers. This article tackles the problem of generating a high-quality test suite to cover repeatedly a given point in a program, with the ultimate goal of exposing faults possibly affecting the given program point. Both search-based software testing and constraint solving offer ready, but low-quality, solutions to this: Ideally, a maximally diverse covering test set is required, whereas search and constraint solving tend to generate test sets with biased distributions.]]></description>
			<pubDate>Mon, 19 Apr 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3447265</guid>
		</item>
	</channel>
</rss>
