R Krishna, C Tang, K Sullivan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Configuration space complexity makes the big-data software systems hard to configure well. Consider Hadoop, with over nine hundred parameters, developers often just use the default …
This paper introduces Data-Driven Search-based Software Engineering (DSE), which combines insights from Mining Software Repositories (MSR) and Search-based Software …
Embodied self-aware computing systems are embedded in a physical environment with a rich set of sensors and actuators to interact both with their environment and with their own …
A learned system uses machine learning (ML) internally to improve performance. We can expect such systems to be vulnerable to some adversarial-ML attacks. Often, the learned …
J Wang - United States, 2015 - galligroup.uchicago.edu
The determination of the atomistic structure of surfaces and interfaces is a central problem in materials physics and in nanoscience [175, 176]. Among surface sensitive probes, non …
Dealing with a large configuration space is a complex task for developers, especially when configurations must comply with both functional constraints and non-functional goals. In this …
Configuration tuning of software is often a good option to improve application performance without any application code modifications. Although we can casually change …
P Stöckle, B Grobauer, A Pretschner - Proceedings of the 35th IEEE/ACM …, 2020 - dl.acm.org
Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. The complexity of contemporary IT …
Cloud-based software has many advantages. When services are divided into many independent components, they are easier to update. Also, during peak demand, it is easier …