An empirical study of refactorings and technical debt in machine learning systems

Y Tang, R Khatchadourian… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Machine Learning (ML), including Deep Learning (DL), systems, ie, those with ML
capabilities, are pervasive in today's data-driven society. Such systems are complex; they …

[HTML][HTML] Safe automated refactoring for intelligent parallelization of Java 8 streams

R Khatchadourian, Y Tang, M Bagherzadeh - Science of Computer …, 2020 - Elsevier
Streaming APIs are becoming more pervasive in mainstream Object-Oriented programming
languages and platforms. For example, the Stream API introduced in Java 8 allows for …

Eliminating abstraction overhead of Java stream pipelines using ahead-of-time program optimization

A Møller, OH Veileborg - Proceedings of the ACM on Programming …, 2020 - dl.acm.org
Java 8 introduced streams that allow developers to work with collections of data using
functional-style operations. Streams are often used in pipelines of operations for processing …

Actor concurrency bugs: a comprehensive study on symptoms, root causes, API usages, and differences

M Bagherzadeh, N Fireman, A Shawesh… - Proceedings of the …, 2020 - dl.acm.org
Actor concurrency is becoming increasingly important in the development of real-world
software systems. Although actor concurrency may be less susceptible to some …

Challenges in migrating imperative deep learning programs to graph execution: an empirical study

TC Vélez, R Khatchadourian, M Bagherzadeh… - Proceedings of the 19th …, 2022 - dl.acm.org
Efficiency is essential to support responsiveness wrt ever-growing datasets, especially for
Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred …

A clean and efficient implementation of choreography synthesis for behavioural contracts

D Basile, MH ter Beek - Coordination Models and Languages: 23rd IFIP …, 2021 - Springer
Abstract The Contract Automata Tool is an open-source tool for the specification,
composition and synthesis of coordination of service contracts, including functionalities to …

Automated evolution of feature logging statement levels using git histories and degree of interest

Y Tang, A Spektor, R Khatchadourian… - Science of Computer …, 2022 - Elsevier
Logging—used for system events and security breaches to describe more informational yet
essential aspects of software features—is pervasive. Given the high transactionality of …

Fum-a framework for api usage constraint and misuse classification

M Schlichtig, S Sassalla, K Narasimhan… - … on Software Analysis …, 2022 - ieeexplore.ieee.org
Application Programming Interfaces (APIs) are the primary mechanism that developers use
to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused …

Developing Behavioral Concepts of Higher-Order Functions

S Krishnamurthi, K Fisler - Proceedings of the 17th ACM Conference on …, 2021 - dl.acm.org
Motivation. Higher-order functions are a standard and increasingly central component in
many kinds of modern programming, including data science and Web development. Yet little …

On the evolution of inheritance and delegation mechanisms and their impact on code quality

G Giordano, A Fasulo, G Catolino… - … on Software Analysis …, 2022 - ieeexplore.ieee.org
Source code reuse is considered one of the holy grails of modern software development.
Indeed, it has been widely demonstrated that this activity decreases software development …