


default search action
15th Internetware 2024: Macao, SAR, China
- Hong Mei, Jian Lv, Abdelsalam Helal, Xiaoxing Ma, Shing-Chi Cheung, Jie Zhang, Tao Zhang:

Proceedings of the 15th Asia-Pacific Symposium on Internetware, Internetware 2024, Macau, SAR, China, July 24-26, 2024. ACM 2024
Session 1: AI for Software Engineering
- Senrong Xu

, Jiamei Shen
, Yunfan Li
, Yuan Yao
, Ping Yu
, Feng Xu
, Xiaoxing Ma
:
On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference. - Yuhong Feng

, Haoran Li
, Yixuan Cao
, Yufeng Wang
, Haiyue Feng
:
CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on Transformer. - Xingpeng Liu

, Hengzhu Liu
, Xiaodong Yi
, Ji Wang
:
LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repair✱. - Wenjun Liang

, Guanping Xiao
:
An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering Tasks. - Kuo Chi

, Chuanyi Li
, Jidong Ge
, Bin Luo
:
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements.
Session 2: Software Testing and Quality Assurance
- Ruihua Ji

, Zhengxuan Qian
, Zhong Li
, Xiaoqing Zhu
, Yu Pei
, Minxue Pan
, Tian Zhang
:
Repairing Obsolete GUI Test Scripts for Android Applications with Exploration and Backtracking. - Zixi Liu

, Yang Feng
, Jiali Xu
, Baowen Xu
:
ObjTest: Object-Level Mutation for Testing Object Detection Systems. - Danni Xiao

, Yimeng Guo
, Yanhui Li
, Lin Chen
:
Optimizing Search-Based Unit Test Generation with Large Language Models: An Empirical Study. - Yin Wang

, Ming Fan
, Xicheng Zhang
, Jifei Shi
, Zhaoyu Qiu
, Haijun Wang
, Ting Liu
:
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Session 3: Software Vulnerability and Security
- Yanzhong He

, Guancheng Lin
, Xiaoxue Ma
, Jacky Wai Keung
, Cheng Tan
, Wenhua Hu
, Fuyang Li
:
Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study. - Zhonghao Jiang

, Weifeng Sun
, Xiaoyan Gu
, Jiaxin Wu
, Tao Wen
, Haibo Hu
, Meng Yan
:
DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection. - Pei Liu

, Bo Lin
, Yihao Qin
, Cheng Weng
, Liqian Chen
:
T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach. - Cheng Weng

, Yihao Qin
, Bo Lin
, Pei Liu
, Liqian Chen
:
MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention. - Junwei Zhang

, Zhongxin Liu
, Lingfeng Bao
, Zhenchang Xing
, Xing Hu
, Xin Xia
:
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software.
Session 4: Code Analysis and Optimization
- Rulin Xu

, Luohui Chen
, Ruyi Zhang
, Yuanliang Zhang
, Wei Xiao
, Haifang Zhou
, Xiaoguang Mao
:
Accelerating Static Null Pointer Dereference Detection with Parallel Computing. - Junwei Zeng

, Yixuan Tang
, Jingxuan Zhang
, Weiwei Li
, Zhiqiu Huang
:
Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation. - Xun An

, Xiaoqi Jia
, Haichao Du
, Yamin Xie
:
Structure-Sensitive Pointer Analysis for Multi-structure Objects. - Lianying He

, Dalin Zhang
, Dongqing Zhu
, Junwen Zhang
, Rui Wang
, Jiqiang Liu
:
Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning.
Session 5: Software Modeling and Development
- Jie Hu

, Yaozhong Zhang
, Xiujuan Qin
, Lvlun Wei
, Fangwei Chen
, Shmuel S. Tyszberowicz
, Mingyue Zhang
, Bo Liu
:
DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSL. - Yunwei Dong

, Zeshan Li
, Ruiheng Zhang
, Rubing Huang
, Tao Wang
:
A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle Swarm. - Fanyi Meng

, Ying Wang
, Chun Yong Chong
, Hai Yu
, Zhiliang Zhu
:
CLUE: Customizing clustering techniques using machine learning for software modularization. - Dong Yang

, Hao Shi
, Wei Dong
, Yanqi Dong
, Yong Zhang
:
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels.
Session 6: Code Generation and Transformation
- Zhenghai Cai

, Yongjian Li
, Yongxin Zhao
:
Murphi2Chisel: A Protocol Compiler from Murphi to Chisel. - Wentao Zou

, Zongwen Shen
, JiDong Ge
, Chuanyi Li
, Bin Luo
:
CCAF: Learning Code Change via AdapterFusion. - Yifan Li

, Ensheng Shi
, Dewu Zheng
, Kefeng Duan
, Jiachi Chen
, Yanlin Wang
:
RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening. - Yang Zhang

, Yuan Xue
:
ExceRef: Automatically Refactoring for Exception Handling.
Session 7: Software Architecture and Microservices
- Xiaojun Xu

, Chenghao Cai
, Xiuqi Yang
, Zhuofan Xu
, Jingjing Hu
, Jing Sun
:
A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model. - Geng Chen

, Chenlin Li
, Shmuel S. Tyszberowicz
, Zhiming Liu
, Bo Liu
:
Mono2MS: Deep Fusion of Multi-Source Features for Partitioning Monolith into Microservices. - Genting Mai

, Zilong He
, Guangba Yu
, Zhiming Chen
, Pengfei Chen
:
CTuner: Automatic NoSQL Database Tuning with Causal Reinforcement Learning. - Ming Quan Fu

, Minjie Wei
, Minglang Qiao
, Peng Ji
, Zhihao Deng
, Di Cui
, Yutong Zhao
:
HGNN4Perf: Detecting Performance Optimization Opportunities via Hypergraph Neural Network.
Session 8: IoT and Edge Computing
- Dongchao Ma

, Xiaohe Zhao
, Sitian Huang
, Yu Zhang
, Ruiqi Wang
:
A Lightweight Dynamic QoS Optimization Strategy for Satellite IoT Networks. - Jiahua Huang

, Chun Cao
, Jun Ma
, Xiaoxing Ma
:
NEST: Node with Statistics Tree for IoT Data Persistence and Real-time Queries. - Yijie Chen

, Qiyang Zhang
, Ruolin Xing
, Yuanzhe Li
, Xiao Ma
, Chaoxin Yu
, Yiran Zhang
, Ao Zhou
, Shangguang Wang
:
Energy-Aware Satellite-Ground Co-Inference via Layer-Wise Processing Schedule Optimization. - Xiaodong Wang

, Long Wen
, Jijing Cai
, Kai Fang
:
Intelligent Interference Information Fusion for Security of UAV Forest Remote Sensing Image Detection.
Session 9: System Performance and Resource Management
- Jianguo Liu

, Zhibin Yu
:
Global-State Aware Automatic NUMA Balancing. - Ruoxian Su

, Hanzhi Xu
, Jieyu Jiang
, Shuai Zhao
:
Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach. - Yiyuan Dong

, Zeyu Mi
:
IOGuard: Software-Based I/O Page Fault Handling with One CPU Core. - Yifan Zhao

, Tong Xin
, Mingkai Dong
:
Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility.
Session 10: Software Reliability and Maintenance
- Daohan Qu

, Chaoyi Zhao
, Yanyan Jiang
, Chang Xu
:
Towards Life-long Software Self-validation in Production. - Di Liu

, Yanyan Yan
, Hongcheng Fan
, Yang Feng
:
Mining Fix Patterns for System Interaction Bugs. - Yi Hou, Wuxia Jin

, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang
, Lei Sang, Haijun Wang, Ting Liu
:
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java. - Sheng Han

, Qiang Han
, Yixin Qiao
, Kehan Xue
, Zhichao Shi
:
Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm.
Session 11: Anomaly Detection and Security
- Haoyang Zeng

, Ningjiang Chen
, Tao Deng
:
LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series. - Chen Wang

, Tao Huang
, Min Li
, Pengfei Chen
, Zhiwen Chen
:
A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems. - Jianwen Xiang

, Xuemin Zhang
, Qianrong Zheng
, Longmin Deng
, Dongdong Zhao
, Junwei Zhou
:
CIDF: Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP. - Xiaoyu Yi

, Gaolei Li, Wenkai Huang
, Xi Lin
, Jianhua Li
, Yuchen Liu
:
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes.
Session 12: Emerging Technologies and Applications
- Jianxin Xue

, Husheng Chen
, Yaohua Hu
, Minyu Chen
, Ling-I Wu
, Xi Chang
:
Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots. - Shijian Chen

, Jiachi Chen
, Jiangshan Yu
, Xiapu Luo
, Yanlin Wang
:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. - Kai Ma

, Zhuo Wang
, Yanjie Zhao
, Haoyu Wang
:
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain. - Jiale Hao

, Meng Wang
, Hong Zhang
:
Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching. - Yue Wang

, Wenhui Chang
, Yanzhen Zou
, Bing Xie
:
An Exploratory Study on God Header Files in Open-Source C Projects.
Session 13: Software Tools and Demonstrations
- Yihui Jian

, Yilong Yang
, Shaohong Zhu
, Zhi Li
, Li Zhang
:
RM2EIS: A Tool for Auto-Generation of EIS from Requirements Model. - Yuqi Zhao

, Shiyu He
, Qibo Li
, Yuchen Pei
, Yutao Ma
:
MobileEdgeSim: A Tool for Simulating Microservice-Oriented Mobile Edge Computing. - Yudan Long

, Yuxin Su
, Zigui Jiang
:
WACP: A Performance Profiling Tool for WebAssembly-Python Interoperability. - Xiaoqi Yue

, Chao Liu
, Neng Zhang
, Haibo Hu
, Xiaohong Zhang
:
VisRepo: A Visual Retrieval Tool for Large-Scale Open-Source Projects. - Bei Deng

, Bingkun Sun
, Liwei Shen
:
laTAPE: Location-Aware Programming and Executing Trigger-Action Rules.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














