162,725 Hits in 7.7 sec

RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability [article]

Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao
2021 arXiv   pre-print
The main challenges are as follows: precise compilation option inference, program configuration inference, and source-code-to-binary matching.  ...  We try to solve it by proposing a binary similarity-based method to infer the specific building configurations via the binary from crash report.  ...  In addition, when there are more than one macros in the source code range, it is challenging to directly infer the specific configurations from the generated binary.  ... 
arXiv:2110.12989v1 fatcat:tkfnmlbimbhilc4azkgupmfcbu

Do not blame users for misconfigurations

Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy
2013 Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles - SOSP '13  
Specifically, we build a tool, called SPEX, to automatically infer configuration requirements (referred to as constraints) from software source code, and then use the inferred constraints to: (1) expose  ...  Similar to software bugs, configuration errors are also one of the major causes of today's system failures.  ...  We also thank the anonymous reviewers for their insightful comments and suggestions.  ... 
doi:10.1145/2517349.2522727 dblp:conf/sosp/XuZHZSYZP13 fatcat:rhkfzn7yzjadrofgy4hdr5oy5i

White-box approaches for improved testing and analysis of configurable software systems

Marius Nita, David Notkin
2009 2009 31st International Conference on Software Engineering - Companion Volume  
There is a significant conceptual gap between the source code of a configurable system and the runtime behaviors of its individual configurations.  ...  In this paper, we sketch a research path that seeks to narrow the configuration source-runtime gap, based on the observation that most configurations share significant amounts of source-level structure  ...  Krone and Snelting applied mathematical concept analysis to infer the configuration structure of C programs [6] .  ... 
doi:10.1109/icse-companion.2009.5071008 dblp:conf/icse/NitaN09 fatcat:xcjr2oeisraefkbw2msfq2rvda

Automatic Type Inference for Proactive Misconfiguration Prevention

Xu Xiangyang, Li Shanshan, Guo Yong, Dong Wei, Li Wang, Liao Xiangke
2017 Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering  
We manually studied several popular open-source software projects to investigate the classification and naming conventions of configuration option.  ...  If we can check the configuration settings against the inferred type before the software runs, many misconfigurations can be prevented.  ...  the source code.  ... 
doi:10.18293/seke2017-072 dblp:conf/seke/XuLGDWL17 fatcat:4u2zxzeq2rd6tjslcjfuwvpapy

Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files

Bo Zhou, Xin Xia, David Lo, Xinyu Wang
2014 2014 IEEE 38th Annual Computer Software and Applications Conference  
One feature of build system such as makebased system is that it would use a build configuration file (e.g., Makefile) to record the dependencies among different target and source code files.  ...  Next, considering that a build configuration file is constructed based on the source code dependency relationship, we establish a code dependency graph (code graph).  ...  This research is sponsored in part by NSFC Program (No.61103032) and National Key Technology R&D Program of the Ministry of Science and Technology of China (2014BAH24F02).  ... 
doi:10.1109/compsac.2014.12 dblp:conf/compsac/ZhouXLW14 fatcat:7sswcmpenjasnbwd4fofaxwmie

Reifying variants in configuration management

Jean-Marc Jézéquel
1999 ACM Transactions on Software Engineering and Methodology  
for a specific configuration and optimizing the generated code accordingly.  ...  The contribution of this article is to (1) propose a method (based on the use creational design patterns) to simplify SCM by reifying the variants of an object-oriented software system into language-level  ...  ACKNOWLEDGMENTS We would like to thank Dominique Colnet, the author of the SmallEiffel compiler, for the many insights he gave us on the inner working of his compiler.  ... 
doi:10.1145/310663.310668 fatcat:wrooxjp4gjguxbtt57i45la3fe

Metadata invariants: Checking and inferring metadata coding conventions

Myoungkyu Song, Eli Tilevich
2012 2012 34th International Conference on Software Engineering (ICSE)  
To address this shortcoming, this paper presents metadata invariants, a new abstraction that codifies various naming and typing relationships between metadata and the main source code of a program.  ...  We also introduce algorithms to infer likely metadata invariants and to apply them to check metadata correctness in the presence of program evolution.  ...  AVAILABILITY All the software described in the paper is available from: invariants/.  ... 
doi:10.1109/icse.2012.6227148 dblp:conf/icse/SongT12 fatcat:p3t2yhelkvh6hl6d5vp3pni6ci

SOLIS – The MLOps journey from data acquisition to actionable insights [article]

Razvan Ciobanu, Alexandru Purdila, Laurentiu Piciu, Andrei Damian
2022 arXiv   pre-print
Automating live configuration mechanisms, on the fly adapting to live or offline data capture and consumption, serving multiple models in parallel either on edge or cloud architectures, addressing specific  ...  Machine Learning operations is unarguably a very important and also one of the hottest topics in Artificial Intelligence lately.  ...  However, to the best of our knowledge, at this moment, the platform does not provide you with an out-of-the-box integrated solution capable of real-time data acquisition from multiple sources, inference  ... 
arXiv:2112.11925v2 fatcat:bgkdomsm3rcmzn2x6bmzmppdmq

Python Environment for Bayesian Learning: Inferring the Structure of Bayesian Networks from Knowledge and Data

Abhik Shah, Peter Woolf
2009 Journal of machine learning research  
: the ability to use interventional data, flexible specification of structural priors, modeling with hidden variables and exploitation of parallel processing.  ...  In this paper, we introduce pebl, a Python library and application for learning Bayesian network structure from data and prior knowledge that provides features unmatched by alternative software packages  ...  Acknowledgments We would like to acknowledge support for this project from the NIH grant #U54 DA021519.  ... 
pmid:20161541 pmcid:PMC2804996 fatcat:rnjsps4kefflfpomw7dzkypm7m

ITMViz: Interactive Topic Modeling for Source Code Analysis

Amir M. Saeidi, Jurriaan Hage, Ravi Khadka, Slinger Jansen
2015 2015 IEEE 23rd International Conference on Program Comprehension  
Although the models inferred from the source code are a great source of knowledge, they fail to fully capture the conceptual relationships between the topics.  ...  Here we investigate the use of interactive topic modeling for source code analysis by feeding-in information from the end-users, including developers and architects, to refine the inferred topic models  ...  Furthermore, the bag-of-words approach loses all the structure of the source code, and hence the context of data items that comes with it.  ... 
doi:10.1109/icpc.2015.44 dblp:conf/iwpc/SaeidiHKJ15 fatcat:vkbe52lnz5c7jgmvnxhfmylihy

Using Interconnection Style Rules to Infer Software Architecture Relations [chapter]

Brian S. Mitchell, Spiros Mancoridis, Martin Traverso
2004 Lecture Notes in Computer Science  
In this paper we describe an automatic process to infer architectural-level abstractions from the source code.  ...  The second step takes the output of the clustering process, and infers architectural-level relations based on formal style rules that are specified visually.  ...  Ongoing research in software clustering has shown promising results for recovering useful architectural-entities directly from the source code.  ... 
doi:10.1007/978-3-540-24855-2_158 fatcat:lnxhvgt7vfdhdhujs42c6q2tka

Static extraction of program configuration options

Ariel Rabkin, Randy Katz
2011 Proceeding of the 33rd international conference on Software engineering - ICSE '11  
Many programs use a key-value model for configuration options. We examined how this model is used in seven open source Java projects totaling over a million lines of code.  ...  Our analysis finds 95% of the options read by the programs in our sample, making it more complete than existing documentation. Most configuration options we saw fall into a small number of types.  ...  We thank the anonymous reviewers for their input.  ... 
doi:10.1145/1985793.1985812 dblp:conf/icse/RabkinK11 fatcat:dqsi3pfllreh3dnzdgbxj2p5hm

The Excitement Open Platform for Textual Inferences

Bernardo Magnini, Roberto Zanoli, Ido Dagan, Kathrin Eichler, Guenter Neumann, Tae-Gil Noh, Sebastian Padó, Asher Stern, Omer Levy
2014 Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations  
The EOP is distributed as an open source software.  ...  The platform includes state-of-art algorithms, a large number of knowledge resources, and facilities for experimenting and testing innovative approaches.  ...  Acknowledgments This work was partially supported by the ECfunded project EXCITEMENT (FP7ICT-287923).  ... 
doi:10.3115/v1/p14-5008 dblp:conf/acl/MagniniZDENNP0L14 fatcat:qh4a3fauqvdjpixpo22zqbt46u

Self Learning from Large Scale Code Corpus to Infer Structure of Method Invocations [article]

Hung Phan
2019 arXiv   pre-print
One direction focuses on considering a textual description of method invocations as a separate Natural Language query and do not consider the surrounding context of the code.  ...  We conduct an expression prediction models learned from 2.86 million method invocations from the practical data of high qualities corpus on Github that used 6 popular libraries: JDK, Android, GWT, Joda-Time  ...  MethodInfoToCode relies on practical data on large scale code corpus and embeds information surrounding code of each method invocation in the training data for the inference of implementation.  ... 
arXiv:1909.03147v1 fatcat:vx57l52xavh5deyhasqwcjolu4

Search based reverse engineering

Brian S. Mitchell, Spiros Mancoridis, Martin Traverso
2002 Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE '02  
The first step involves clustering the modules from the source code into abstract structures called subsystems.  ...  In this paper we describe a two step process for reverse engineering the software architecture of a system directly from its source code.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.  ... 
doi:10.1145/568834.568835 fatcat:obsrncfrozbofcm6wrzyqe7aoq
« Previous Showing results 1 — 15 out of 162,725 results