Understanding and detecting on-the-fly configuration bugs

T Wang, Z Jia, S Li, S Zheng, Y Yu, E Xu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Software systems introduce an increasing number of configuration options to provide
flexibility, and support updating the options on the fly to provide persistent services. This …

Automatic testing and benchmarking for configurable static analysis tools

A Mordahl - Proceedings of the 32nd ACM SIGSOFT International …, 2023 - dl.acm.org
Static analysis is an important tool for detecting bugs in real-world software. The advent of
numerous analysis algorithms with their own tradeoffs has led to the proliferation of …

Mining container image repositories for software configuration and beyond

T Xu, D Marinov - Proceedings of the 40th International Conference on …, 2018 - dl.acm.org
This paper introduces the idea of mining container image repositories for configuration and
other deployment information of software systems. Unlike traditional software repositories …

Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs

S Shan, Y Huo, Y Su, Y Li, D Li, Z Zheng - arXiv preprint arXiv:2404.00640, 2024 - arxiv.org
Configurable software systems are prone to configuration errors, resulting in significant
losses to companies. However, diagnosing these errors is challenging due to the vast and …

Dimensions of software configuration: on the configuration context in modern software development

N Siegmund, N Ruckel, J Siegmund - Proceedings of the 28th ACM Joint …, 2020 - dl.acm.org
With the rise of containerization, cloud development, and continuous integration and
delivery, configuration has become an essential aspect not only to tailor software to user …

Multimedia fusion at semantic level in vehicle cooperactive perception

Z Xiao, Z Mo, K Jiang, D Yang - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The complete perception of the environment is an important prerequisite for realizing
autonomous driving. However, due to the existence of obstructions and the limits of sensing …

Assessing the usefulness of a visual programming IDE for large-scale automation software

B Wiesmayr, A Zoitl, R Rabiser - Software and Systems Modeling, 2023 - Springer
Industrial control applications are usually designed by domain experts instead of software
engineers. These experts frequently use visual programming languages based on …

How do system administrators resolve access-denied issues in the real world?

T Xu, HM Naing, L Lu, Y Zhou - Proceedings of the 2017 CHI Conference …, 2017 - dl.acm.org
The efficacy of access control largely depends on how system administrators (sysadmins)
resolve access-denied issues. A correct resolution should only permit the expected access …

The secret to better ai and better software (is requirements engineering)

N Bencomo, JLC Guo, R Harrison, HM Heyn… - IEEE …, 2021 - ieeexplore.ieee.org
Recently, practitioners and researchers met to discuss the role of requirements, and AI and
SE. We offer here notes on that fascinating discussion. Also, have you considered writing for …

{PracExtractor}: Extracting configuration good practices from manuals to detect server misconfigurations

C Xiang, H Huang, A Yoo, Y Zhou… - 2020 USENIX Annual …, 2020 - usenix.org
Configuration has become ever so complex and error-prone in today's server software. To
mitigate this problem, software vendors provide user manuals to guide system admins on …