Printed Program

Total Page:16

File Type:pdf, Size:1020Kb

Printed Program rd International Conference 43 on Software Engineering goes Virtual PROGRAM May 25th –28th 2021 Co-located events: May 17th –May 24th Workshops: May 24th , May 29th –June 4th https://conf.researchr.org/home/icse-2021 @ICSEconf Table of Contents Conference overviews ............................................................... 3 Sponsors and Supporters ......................................................... 11 Welcome letter ........................................................................ 13 Keynotes ................................................................................. 18 Technical Briefings ................................................................. 28 Co-located events .................................................................... 35 Workshops .............................................................................. 36 New Faculty Symposium ........................................................ 37 Doctoral Symposium .............................................................. 39 Detailed Program - Tuesday, May 25th .................................................... 42 - Wednesday, May 26th ............................................... 53 - Thursday, May 27th .................................................. 66 - Friday, May 28th ....................................................... 80 Awards .................................................................................... 91 Social and Networking events ................................................. 94 Organizing Committee ......................................................... 105 General overview May May May May May June th th th th th th 17 24 25 28 24 4 Pre-conference Main conference Workshops events AST Opening / Closing APR CHASE Keynotes BoKSS Doctoral Symposium Awards BotSE FormaliSE Town Hall Cloud Intelligence ICGSE/ICSSP Technical Track DeepTest ICPC Journal First EnCyCriS MobileSoft SEIP GI MSR NIER MET New Faculty Symposium SEIS Q-SE SEAMS JSEET RoSE TechDebt Networking SEENG Networking with Sponsors SBST Posters SEH Demos SEmotion Technical Briefings SER&IP SRC SERP4IoT SCORE SESoS/WDES SEthics SoHeal WAIN WETSEB 3 Co-located events overview May May May May May 17th 18th 19th 20th 21st Monday Tuesday Wednesday Thursday Friday FormaliSE EVENT WEBPAGE JOIN SESSION MSR AST EVENT WEBPAGE EVENT WEBPAGE JOIN SESSION (ROOM 1) JOIN SESSION JOIN SESSION (ROOM 2) CHASE MobileSoft EVENT WEBPAGE JOIN SESSION (CHASE ROOM) EVENT WEBPAGE JOIN SESSION JOIN SESSION (CHASE COMMUNITY ROOM) ICGSE/ICSSP EVENT WEBPAGE JOIN SESSION ICPC EVENT WEBPAGE JOIN SESSION (MAIN ROOM) JOIN SESSION (SOCIAL ROOM) SEAMS EVENT WEBPAGE JOIN SESSION TechDebt EVENT WEBPAGE JOIN SESSION 4 Main conference overview May May May May 25th 26th 27th 28th Tuesday Wednesday Thursday Friday Opening ceremony Closing ceremony OPENING CLOSING Keynote Keynote Keynote DARÍO GIL MICHAEL LYU JEANNETTE WING Meet with Meet with Meet with DARÍO GIL MICHAEL LYU JEANNETTE WING Keynote Keynote JSEET Keynote PREM DEVANBU ELAINE WEYUKER DAVID GARLAN Meet with Meet with PREM DEVANBU ELAINE WEYUKER Technical Track Awards Other ACM SIGSOFT ICSE 2011 Most IEEE TCSE and ACM Europe Council Awards Influential Paper Award Harlan Mills Award Best Paper Award AWARDS AWARDS ANDREA ARCURI, LIONEL BRIAND DIETER ROMBACH ACM SIGSOFT Meet with Meet with Outstanding Research ANDREA ARCURI, LIONEL BRIAND DIETER ROMBACH Award Other ICSE Awards Other IEEE TCSE Awards PREM DEVANBU AWARDS AWARDS Town Hall TOWN HALL Technical Track Journal First SEIP NIER SEIS JSEET Networking Posters Demos Technical Briefing Technical Briefing Technical Briefing Technical Briefing NLP FOR REQUIREMENTS ENGINEERING: TASKS, REACTIVE SYNTHESIS WITH DECODING GROUNDED THEORY ADVANCES IN CODE TECHNIQUES, TOOLS, AND SPECTRA: A TUTORIAL FOR SOFTWARE ENGINEERING SUMMARIZATION TECHNOLOGIES Technical Briefing Technical Briefing Technical Briefing HANDS-ON SESSION ON THE BAYESIAN DATA ANALYSIS FOR THE SOFTWARE CHALLENGES OF DEVELOPMENT OF SOFTWARE ENGINEERING BUILDING SMARTCHATBOTS TRUSTWORTHY AI SOFTWARE SRC and SCORE Awards 5 May 25th overview TIME CEST th LIVE MIRROR Tuesday, May 25 Opening Ceremony (10:00 – 10:30) 10:00 22:00 OPENING CEREMONY – – 11:00 23:00 Blended sessions (10:30 – 11:30) CODE REVIEW: AUTOMATION DEVELOPERS: BEHAVIOR DEEP NEURAL NETWORKS: VALIDATION 1 11:00 23:00 OBTAINING INFORMATION FROM APP USER REVIEWS 1 – – 12:00 00:00 Networking (11:30 – 12:00) MEET YOUR PEERS ACM Students Research Competition 12:00 00:00 Blended sessions (12:05 – 13:15) (11:30 – 13:30) – – (12:05 – 13:05) JSEET 13:00 01:00 DEEP NEURAL NETWORKS: VALIDATION 2 SEARCH-BASED SE & GENETIC OPERATIONS TEACHING SOFTWARE QUALITY I DEVELOPERS: GENERAL ISSUES SRC: POSTER SESSION 1 SOFTWARE REQUIREMENTS (LIVE SCHEDULE ONLY) 13:00 01:00 (13:15 – 13:45) – – Break 30’ 14:00 02:00 Technical Track Awards and ACM Europe Council Best Paper Award (13:45 – 14:00) AWARDS CEREMONY Keynote (14:00 – 14:45) 14:00 02:00 – – 15:00 03:00 DARÍO GIL Networking (14:45 – 15:15) INTRODUCTION TO GATHER.TOWN Posters (14:45 – 15:15) COST ACTION NETWORK ON GENDER BALANCE (14:45 – 15:15) Meet with (MIRROR IN MAY 26 AT 22:45 – 23:15) YOGA AND BREATHWORKS (LIVE SCHEDULE ONLY) 15:00 03:00 Technical Briefing – – SE RESEARCH @ HUAWEI (MIRROR SCHEDULE ONLY) (15:00 – 16:15) DARÍO GIL POSTERS 1 16:00 04:00 Blended sessions (15:20 – 16:15) QUALITY ASSURANCE DEEP NEURAL NETWORKS: SUPPORTING SE TASKS 1 NLP FOR REQUIREMENTS ENGINEERING: TASKS, OPEN SCIENCE TECHNIQUES, TOOLS, AND OBTAINING INFORMATION FROM APP USER REVIEWS 2 16:00 04:00 TECHNOLOGIES – – (16:15 – 16:35) 17:00 05:00 Social GUITAR CONCERT Blended sessions (16:40 – 17:35) VARIABILITY AND PRODUCT LINES CONTINUOUS INTEGRATION IDENTIFYING INFORMATION LEAKS 17:00 05:00 DEVELOPERS: ONBOARDING – – 18:00 06:00 Break 15’ (17:35 – 17:50) ACM SIGSOFT Outstanding Research Award (17:50 – 18:00) AWARDS CEREMONY 18:00 06:00 – – Keynote (18:00 – 19:00) 19:00 07:00 PREM DEVANBU Networking (19:00 – 19:30) COMMUNITY SPEED NETWORKING (19:00 – 19:30) (LIVE SCHEDULE ONLY) Meet with Posters (19:00 – 19:30) 19:00 07:00 COFFEE CHAT – – PREM DEVANBU ICSE IS RUNNING 20:00 08:00 ACM Students POSTERS 2 OPPORTUNITIES AT INVENIA LABS (LIVE SCHEDULE ONLY) Research Competition (19:00 – 21:00) SCORE Blended sessions (19:35 – 20:55) (19:00 – 21:15) Technical Briefing (19:35 – 21:50) DEEP NEURAL NETWORKS: GENERAL ISSUES 20:00 08:00 DEVELOPERS: OBSERVATIONAL STUDIES – – API: USAGE AND REFACTORING 21:00 09:00 OPEN SOURCE: PARTICIPANTS' MOTIVATIONS SRC: POSTER SESSION 2 SCORE DEVELOPERS: NAMING METHODS AND VARIABLES (LIVE SCHEDULE ONLY) FINALISTS (LIVE SCHEDULE ONLY) HANDS ON SESSION ON THE Panel (20:55 – 21:40) 21:00 09:00 DEVELOPMENT OF TRUSTWORTHY AI – – ARE ACADEMICS WORKING ON THE RIGHT PROBLEMS? SOFTWARE 22:00 10:00 (LIVE SCHEDULE: 20:55 – 21:40, MIRROR: THURSDAY 27TH 11:00 – 11:45) PASS THE MIC: SUSTAINABILITY FROM AROUND THE GLOBE (MIRROR SCHEDULE ONLY: 08:55 – 09:40) 6 May 26th overview TIME CEST LIVE MIRROR Wednesday, May 26th (10:00 – 10:45) Keynote 10:00 22:00 – – MICHAEL LYU 11:00 23:00 Networking (10:45 – 11:15) COFFEE CHAT MENTORING CIRCLE (LIVE SCHEDULE ONLY) YOGA AND BREATHWORKS (LIVE SCHEDULE ONLY) Meet with (10:45 – 11:15) OPPORTUNITIES AT INVENIA LABS (LIVE SCHEDULE ONLY) (10:45 – 11:15) 11:00 23:00 Demos MEET FACEBOOK RECRUITING & RESEARCH (MIRROR SCHEDULE ONLY) – – MICHAEL LYU EVOLUTION 1 12:00 00:00 Blended sessions (11:20 – 12:20) VULNERABILITIES IN ANDROID 1 DEEP NEURAL NETWORKS: QUALITY ASSURANCE MODEL CHECKING TOOLS FOR THE PYTHON LANGUAGE CODE REVIEW: OBSERVATIONAL STUDIES 12:00 00:00 – – Social (12:20 – 12:50) 13:00 01:00 FLAMENCO LESSON & PARTY 1 (LIVE SCHEDULE ONLY) Blended sessions (12:55 – 13:55) MODULARIZATION AND REUSABILITY CONFIGURATION OF SOFTWARE SYSTEMS: TESTING JSEET (12:55 – 13:55) 13:00 01:00 GUI DESIGN – – PROGRAMMING: GENERAL ISSUES 14:00 02:00 DEEP NEURAL NETWORKS: HACKING TEACHING SE IN REAL CONTEXTS Break 35’ (13:55 – 14:30) 14:00 02:00 Blended sessions (14:30 – 15:30) – – DEFECT PREDICTION: AUTOMATION 1 15:00 03:00 SELF-ADMITTED TECHNICAL DEBT SOFTWARE LOG ANALYSIS SMART CONTRACTS HANDLING ECOSYSTEMS OF FORKED PROJECTS 15:00 03:00 Networking (15:30 – 16:00) Technical Briefing – – MEET YOUR PEERS (14:30 – 16:45) 16:00 04:00 MENTORING CIRCLE AST INDUSTRIAL COMPETITION (LIVE SCHEDULE ONLY) SE RESEARCH @ HUAWEI (MIRROR SCHEDULE ONLY) (16:05 – 17:05) Blended sessions REACTIVE SYNTHESIS WITH 16:00 04:00 FUZZING SPECTRA: A TUTORIAL – – API: EVOLUTION AND MAINTENANCE 1 17:00 05:00 OBSERVATIONAL STUDIES: DIFFERENT DOMAINS MODELS AND DSLS Break 15’ (17:05 – 17:20) 17:00 05:00 – – Other ACM SIGSOFT Awards (17:20 – 17:30) 18:00 06:00 AWARDS CEREMONY Keynote (17:30 – 18:15) ELAINE WEYUKER Networking (18:15 – 18:45) Industry COFFEE CHAT Demos 18:00 06:00 MENTORING CIRCLE (MIRROR SCHEDULE ONLY) Case – – (18:15 – 18:45) WAIN'21 (LIVE SCHEDULE ONLY) 19:00 07:00 Studies YOU MIGHT BE STUDYING TECHNICAL DEBT AND NOT KNOW IT (LIVE SCHEDULE ONLY) (18:00 – 21:10) (18:15 – 18:45) Meet with FACEBOOK LAUNCHES NEW RESEARCH AWARD OPPORTUNITY (LIVE SCHEDULE ONLY) ELAINE WEYUKER VERIFICATION Blended sessions (18:50 – 19:50) TESTING: AUTOMATIC TEST GENERATION DEVELOPERS: EXPERIMENTS 19:00 07:00 CODE COMPLETION – – 20:00 08:00 SOME BIG COMPANIES' PRACTICES: CASES AT FACEBOOK, GOOGLE & IBM Panel (19:50 – 20:35) WHAT IS A NIER PAPER IN SOFTWARE ENGINEERING? SPANISH 20:00 08:00 – – INDUSTRY
Recommended publications
  • Katalog Elektronskih Knjiga
    KATALOG ELEKTRONSKIH KNJIGA Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 1 Peter Kent Pay Per Click Search 2006 0-471-74594-3 130 Kupovina Engine Marketing for Dummies 2 Terry Large Access 1 2007 Internet Freeware 3 Kevin Smith Excel Lassons & Tutorials 2004 Internet Freeware 4 Terry Michael Photografy Tutorials 2006 Internet Freeware Janine Peterson Phil Pivnick 5 Jake Ludington Converting Vinyl LPs 2003 Internet Freeware to CD 6 Allen Wyatt Cleaning Windows XP 2004 0-7645-7311-X Poklon for Dummies 7 Peter Kent Sarch Engine Optimization 2006 0-4717-5441-2 Kupovina for Dummies 8 Terry Large Access 2 2007 Internet Freeware 9 Dirk Dupon How to write, create, 2005 Internet Freeware promote and sell E-books on the Internet 10 Chayden Bates eBook Marketing 2000 Internet Freeware Explained 11 Kevin Sinclair How To Choose A 1999 Internet Freeware Homebased Bussines 12 Bob McElwain 101 Newbie-Frendly Tips 2001 Internet Freeware 13 Windows Basics 2004 Poklon 14 Michael Abrash Zen of Graphic 2005 Poklon Programming, 2. izdanje 15 13 Hot Internet 2000 Internet Freeware Moneymaking Methods 16 K. Williams The Complete HTML 1998 Poklon Teacher 17 C. Darwin On the Origin of Species Internet Freeware 2/175 Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 18 C. Darwin The Variation of Animals Internet Freeware 19 Bruce Eckel Thinking in C++, Vol 1 2000 Internet Freeware 20 Bruce Eckel Thinking in C++, Vol 2 2000 Internet Freeware 21 James Parton Captains of Industry 1890 399 Internet Freeware 22 Bruno R. Preiss Data Structures and 1998 Internet
    [Show full text]
  • Structured Programming - Retrospect and Prospect Harlan D
    University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange The aH rlan D. Mills Collection Science Alliance 11-1986 Structured Programming - Retrospect and Prospect Harlan D. Mills Follow this and additional works at: http://trace.tennessee.edu/utk_harlan Part of the Software Engineering Commons Recommended Citation Mills, Harlan D., "Structured Programming - Retrospect and Prospect" (1986). The Harlan D. Mills Collection. http://trace.tennessee.edu/utk_harlan/20 This Article is brought to you for free and open access by the Science Alliance at Trace: Tennessee Research and Creative Exchange. It has been accepted for inclusion in The aH rlan D. Mills Collection by an authorized administrator of Trace: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. mJNDAMNTL9JNNEPTS IN SOFTWARE ENGINEERING Structured Programming. Retrospect and Prospect Harlan D. Mills, IBM Corp. Stnuctured program- 2 ' dsger W. Dijkstra's 1969 "Struc- mon wisdom that no sizable program Ste red .tured Programming" articlel could be error-free. After, many sizable ming haxs changed ho w precipitated a decade of intense programs have run a year or more with no programs are written focus on programming techniques that has errors detected. since its introduction fundamentally alteredhumanexpectations and achievements in software devel- Impact of structured programming. two decades ago. opment. These expectations and achievements are However, it still has a Before this decade of intense focus, pro- not universal because of the inertia of lot of potentialfor gramming was regarded as a private, industrial practices. But they are well- lot of fo puzzle-solving activity ofwriting computer enough established to herald fundamental more change.
    [Show full text]
  • A Dataset of Open-Source Safety-Critical Software⋆
    A Dataset of Open-Source Safety-Critical Software? Rafaila Galanopoulou[0000−0002−5318−9017] and Diomidis Spinellis[0000−0003−4231−1897] Department of Management Science and Technology Athens University of Economics and Business Patission 76, Athens, 10434, Greece ft8160018,[email protected] https://www.aueb.gr Abstract. We describe the method used to create a dataset of open- source safety-critical software, such as that used for autonomous cars, healthcare, and autonomous aviation, through a systematic and rigorous selection process. The dataset can be used for empirical studies regard- ing the quality assessment of safety-critical software, its dependencies, and its development process, as well as comparative studies considering software from other domains. Keywords: open-source · safety-critical · dataset 1 Introduction Safety-critical systems (SCS) are those whose failure could result in loss of life, significant property damage, or damage to the environment [5]. Over the past decades ever more software is developed and released as open-source software (OSS) | with licenses that allow its free use, study, change, and distribution [1]. The increasing adoption of open-source software in safety-critical systems [10], such as those used in the medical, aerospace, and automotive industries, poses an interesting challenge. On the one hand, it shortens time to delivery and lowers development costs [6]. On the other hand, it introduces questions regarding the system's quality. For a piece of software to be part of a safety-critical application it requires quality assurance, because quality is a crucial factor of an SCS's software [3]. This assurance demands that evidence regarding OSS quality is supplied, and an analysis is needed to assess if the certification cost is worthwhile.
    [Show full text]
  • Curriculum Vitae
    CURRICULUM VITAE Diomidis Spinellis Professor of Software Engineering Department of Management Science and Technology Athens University of Economics and Business September 17, 2021 CV — Diomidis Spinellis CONTENTS Contents 1 Personal and Contact Details 5 2 Education 5 3 Research Interests 5 4 Honours and Awards 5 5 Teaching Experience 7 6 Scientific, Professional, and Technical Activities 7 6.1 Memberships of Professional and Learned Societies .................... 7 6.2 Journal and Magazine Editorial Board Member ...................... 7 6.3 Service in Conference Committees ............................. 7 6.4 Other Professional Society Service ............................. 11 6.5 Selected Open Source Software Development ....................... 12 7 Publications 12 7.1 Books: Monographs and Edited Volumes .......................... 12 7.2 Theses ............................................ 13 7.3 Peer‐reviewed Journal Articles ............................... 13 7.4 Editor‐in‐Chief and Guest Editor Introductions ....................... 17 7.5 Magazine Columns ..................................... 18 7.6 Book Chapters ........................................ 20 7.7 Conference Publications .................................. 20 7.8 Letters Published in Scholarly Journals and Newspapers .................. 29 7.9 Technical Reports and Working Papers ........................... 29 7.10 Book Reviews ........................................ 30 7.11 Articles in the Technical Press and SIG Publications .................... 32 7.12 Invited Talks
    [Show full text]
  • Design Principles and Patterns for Computer Systems That Are
    Bibliography [AB04] Tom Anderson and David Brady. Principle of least astonishment. Ore- gon Pattern Repository, November 15 2004. http://c2.com/cgi/wiki? PrincipleOfLeastAstonishment. [Acc05] Access Data. Forensic toolkit—overview, 2005. http://www.accessdata. com/Product04_Overview.htm?ProductNum=04. [Adv87] Display ad 57, February 8 1987. [Age05] US Environmental Protection Agency. Wastes: The hazardous waste mani- fest system, 2005. http://www.epa.gov/epaoswer/hazwaste/gener/ manifest/. [AHR05a] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Fighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed Emails (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AHR05b] Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Separable Identity- Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks (to appear), 2005. Available at http://theory.lcs.mit.edu/⇠rivest/ publications.html. [AIS77] Christopher Alexander, Sara Ishikawa, and Murray Silverstein. A Pattern Lan- guage: towns, buildings, construction. Oxford University Press, 1977. (with Max Jacobson, Ingrid Fiksdahl-King and Shlomo Angel). [AKM+93] H. Alvestrand, S. Kille, R. Miles, M. Rose, and S. Thompson. RFC 1495: Map- ping between X.400 and RFC-822 message bodies, August 1993. Obsoleted by RFC2156 [Kil98]. Obsoletes RFC987, RFC1026, RFC1138, RFC1148, RFC1327 [Kil86, Kil87, Kil89, Kil90, HK92]. Status: PROPOSED STANDARD. [Ale79] Christopher Alexander. The Timeless Way of Building. Oxford University Press, 1979. 429 430 BIBLIOGRAPHY [Ale96] Christopher Alexander. Patterns in architecture [videorecording], October 8 1996. Recorded at OOPSLA 1996, San Jose, California. [Alt00] Steven Alter. Same words, different meanings: are basic IS/IT concepts our self-imposed Tower of Babel? Commun. AIS, 3(3es):2, 2000.
    [Show full text]
  • Digium Analog Gateway EULA
    END-USER LICENSE AGREEMENT FOR ANALOG DIGIUM GATEWAY AND GATEWAY SOFTWARE November 2017 IMPORTANT – PLEASE READ CAREFULLY 1.1 Definitions “Affiliate” means an entity which is (a) directly or indirectly controlling Digium; or (b) which is directly or indirectly owned or controlled by Digium. “Digium” means both Digium, Inc. and Digium's Affiliates. "Analog Digium Gateways" means Digium manufactured and branded gateways which are hardware devices (inclusive of the Analog Digium Gateway Software). “Digium Analog Gateway Software” collectively means both the Original Analog Digium Gateway Software and any Analog Digium Gateway Software Updates. “Digium Analog Gateway Software Updates” means updates or replacements provided by Digium for the Original Analog Digium Gateway Software in the form of feature enhancements, software updates, bug fixes, upgrades, otherwise modified versions of the Original Analog Digium Gateway Software, or system restore software provided by Digium, whether in read only memory or on any other media or in any other form. “Original Digium Analog Gateway Software” means the software, sounds (for example, ringtones), interfaces, content, fonts, documentation, and any data that are delivered with Analog Digium Gateways. "You", "you" or "your" means collectively the licensee, purchaser, and end user. 1.2 This End-User License Agreement (the "Agreement" or "EULA") is a legal agreement between Digium and You regarding the license terms of the Original Analog Digium Gateway Software, the Digium Analog Gateway Software Updates and the terms of use for Analog Digium Gateways. By using a Digium Analog Gateway or downloading a Analog Digium Gateway Software Update, as applicable, you are agreeing to be bound by the terms of this Agreement.
    [Show full text]
  • Engineering Software Under Statistical Quality-Control
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange The Harlan D. Mills Collection Science Alliance 11-1990 Engineering Software Under Statistical Quality-Control R. H. Cobb Harlan D. Mills Follow this and additional works at: https://trace.tennessee.edu/utk_harlan Part of the Software Engineering Commons Recommended Citation Cobb, R. H. and Mills, Harlan D., "Engineering Software Under Statistical Quality-Control" (1990). The Harlan D. Mills Collection. https://trace.tennessee.edu/utk_harlan/14 This Article is brought to you for free and open access by the Science Alliance at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in The Harlan D. Mills Collection by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. Engineering Software under Statistical Quality Control Richard H. Cobb and Harlan D. Mills, Software Engineering Technology Thecosbof ociety has been developing soft- culty producing reliable software there is continuing to develop ware for less than one human gen- a demand for even more complex, larger Seration. We have accomplished a software systems. failure-lden 8offws1ye great deal in this first generation when These problems are symptoms of a pre with its associated compared to the accomplishments of cess that is not yet under intellectual con- other disciplines:During the first genera- trol. An activity is under intellectual con- low prductivity are tion of civil engineering, the right triangle trol when the people performing it use a unaamptable. hadn't been invented; accountants did theoretically sound process that gives C1-r- not discover doubleentry concepts in the each of them a high probability of obtain- early generations of their field.
    [Show full text]
  • Redundancy and Access Permissions in Decentralized File Systems
    Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Redundancy and Access Permissions in Decentralized File Systems Johanna Amann Vollständiger Abdruck der von der Fakultät für Informatik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. Johann Schlichter Prüfer der Dissertation: 1. Univ.-Prof. Dr. Georg Carle 2. Univ.-Prof. Dr. Kurt Tutschku, Universität Wien 3. TUM Junior Fellow Dr. Thomas Fuhrmann Die Dissertation wurde am 20.06.2011 bei der Technischen Universität München eingereicht und durch die Fakultät für Informatik am 05.09.2011 angenommen. Zusammenfassung Verteilte Dateisysteme sind ein Thema mit dem sich die Informatik immer wieder aufs Neue auseinandersetzt. Die ersten verteilten Dateisysteme sind schon sehr kurz nach dem Aufkommen von Computernetzen entstanden. Traditionell sind solche Systeme serverbasiert, d. h. es gibt eine strikte Unterscheidung zwischen den Systemen welche die Daten speichern und den Systemen welche die Daten abrufen. Diese Architektur hat Vorteile; es wird zum Beispiel angenommen, dass die Server vertrauenswürdig sind. Außerdem gibt es eine inhärente lineare Ordnung der Dateioperationen. Auf der anderen Seite sind solche zentralisierten Systeme schlecht skalierbar, haben einen hohen Administrationsaufwand, eine geringe Fehlertoleranz oder sind teuer im Betrieb. Im Verlauf des letzten Jahrzehnts wurde eine neue Art von
    [Show full text]
  • Truenas X10 Was Released and Steve Wong Wrote About It
    FREENAS MINI FREENAS STORAGE APPLIANCE CERTIFIED IT SAVES YOUR LIFE. STORAGE How important is your data? with over six million downloads, As one of the leaders in the storage industry, you Freenas is undisputedly the most know that you’re getting the best combination of hardware designed for optimal performance Years of family photos. Your entire music popular storage operating system and movie collection. Ofce documents with FreeNAS. Contact us today for a FREE Risk in the world. you’ve put hours of work into. Backups for Elimination Consultation with one of our FreeNAS experts. Remember, every purchase directly supports every computer you own. We ask again, how Sure, you could build your own FreeNAS system: the FreeNAS project so we can continue adding important is your data? research every hardware option, order all the features and improvements to the software for years parts, wait for everything to ship and arrive, vent at to come. And really - why would you buy a FreeNAS customer service because it hasn’t, and fnally build it server from anyone else? now imaGinE LosinG it aLL yourself while hoping everything fts - only to install the software and discover that the system you spent Losing one bit - that’s all it takes. One single bit, and days agonizing over isn’t even compatible. Or... your fle is gone. The worst part? You won’t know until you makE it Easy on yoursELF absolutely need that fle again. Example of one-bit corruption As the sponsors and lead developers of the FreeNAS project, iXsystems has combined over 20 years of tHE soLution hardware experience with our FreeNAS expertise to The FreeNAS Mini has emerged as the clear choice to the mini boasts these state-of-the- bring you FreeNAS Certifed Storage.
    [Show full text]
  • Structured Programming - Retrospect and Prospect
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange The Harlan D. Mills Collection Science Alliance 11-1986 Structured Programming - Retrospect and Prospect Harlan D. Mills Follow this and additional works at: https://trace.tennessee.edu/utk_harlan Part of the Software Engineering Commons Recommended Citation Mills, Harlan D., "Structured Programming - Retrospect and Prospect" (1986). The Harlan D. Mills Collection. https://trace.tennessee.edu/utk_harlan/20 This Article is brought to you for free and open access by the Science Alliance at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in The Harlan D. Mills Collection by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. mJNDAMNTL9JNNEPTS IN SOFTWARE ENGINEERING Structured Programming. Retrospect and Prospect Harlan D. Mills, IBM Corp. Stnuctured program- 2 ' dsger W. Dijkstra's 1969 "Struc- mon wisdom that no sizable program Ste red .tured Programming" articlel could be error-free. After, many sizable ming haxs changed ho w precipitated a decade of intense programs have run a year or more with no programs are written focus on programming techniques that has errors detected. since its introduction fundamentally alteredhumanexpectations and achievements in software devel- Impact of structured programming. two decades ago. opment. These expectations and achievements are However, it still has a Before this decade of intense focus, pro- not universal because of the inertia of lot of potentialfor gramming was regarded as a private, industrial practices. But they are well- lot of fo puzzle-solving activity ofwriting computer enough established to herald fundamental more change.
    [Show full text]
  • Complexity & Verification: the History of Programming As Problem Solving
    COMPLEXITY & VERIFICATION: THE HISTORY OF PROGRAMMING AS PROBLEM SOLVING A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Joline Zepcevski IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Arthur L. Norberg February 2012 © Copyright by Joline Zepcevski 2012 All Rights Reserved Acknowledgments It takes the work of so many people to help a student finish a dissertation. I wish to thank Professor Arthur L. Norberg for postponing his retirement to be my advisor and my friend over the course of this project. Thank you to my committee, Professor Jennifer Alexander, Professor Susan Jones, Dr. Jeffery Yost, and Professor Michel Janssen, all of whom individually guided this dissertation at different times and in specific ways. Thank you also to Professor Thomas Misa for his guidance and assistance over many years. I had a great faculty and a great cohort of graduate students without whom this dissertation would never have been completed. I particularly want to thank Sara Cammeresi, whose unending support and friendship were invaluable to the completion of this project. I wish to thank my family, Jovan Zepcevski, Geraldine French, Nicole Zepcevski, and Brian Poff, who supported me and loved me throughout it all. I also want to thank my friends: Tara Jenson, Holly and Aaron Adkins, Liz Brophey, Jennifer Nunnelee, Jen Parkos, Vonny and Justin Kleinman, Zsuzsi Bork, AJ Letournou, Jamie Stallman, Pete Daniels, and Megan Longo who kept me sane. I need to thank Lisa Needham for all her assistance. Without your help, I wouldn’t sound nearly as smart.
    [Show full text]
  • June 2006 (PDF)
    J UNE 2006 VOLUME 31 NUMBER 3 THE USENIX MAGAZINE OPINION Musings RIK FARROW Autonomic Computing—The Music of the Cubes MARK BURGESS SYSADMIN A Comparison of Disk Drives for Enterprise Computing KURT CHAN Disks from the Perspective of a File System MARSHALL KIRK MCKUSICK Introduction to ZFS TOM HAYNES Adding Full-Text Filesystem Search to Linux STEFAN BÜTTCHER AND CHARLES L.A. CLARKE SECURITY Netfilter’s Connection Tracking System PABLO NEIRA AYUSO Using Linux Live CDs for Penetration Testing MARKOS GOGOULOS AND DIOMIDIS SPINELLIS COLUMNS Practical Perl Tools:Car 10.0.0.54,Where Are You? DAVID BLANK-EDELMAN ISPadmin: Policy Enforcement ROBERT HASKINS VoIP Watch H EISON CHAK /dev/random ROBERT G. FERRELL BOOK REVIEWS Book Reviews ELIZABETH ZWICKY ET AL. USENIX NOTES Election Results SAGE Update STRATA ROSE CHALUP The Advanced Computing Systems Association Upcoming Events 2ND STEPS TO REDUCING UNWANTED TRAFFIC ON 7TH SYMPOSIUM ON OPERATING SYSTEMS DESIGN THE INTERNET WORKSHOP (SRUTI ’06) AND IMPLEMENTATION (OSDI ’06) JULY 6–7, 2006, SAN JOSE, CA, USA Sponsored by USENIX, in cooperation with ACM SIGOPS http://www.usenix.org/sruti06 NOVEMBER 6–8, 2006, SEATTLE, WA, USA http://www.usenix.org/osdi06 2006 LINUX KERNEL DEVELOPERS SUMMIT JULY 16–18, 2006, OTTAWA, ONTARIO, CANADA SECOND WORKSHOP ON HOT TOPICS IN SYSTEM http://www.usenix.org/kernel06 DEPENDABILITY (HOTDEP ’06) NOVEMBER 8, 2006, SEATTLE, WA, USA 15TH USENIX SECURITY SYMPOSIUM http://www.usenix.org/hotdep06 (SECURITY ’06) Paper submissions due: July 15, 2006 JULY 31–AUGUST 4, 2006, VANCOUVER, B.C., CANADA http://www.usenix.org/sec06 ACM/IFIP/USENIX 7TH INTERNATIONAL MIDDLEWARE CONFERENCE FIRST WORKSHOP ON HOT TOPICS IN SECURITY NOV.
    [Show full text]