Visualizing Program-Execution Data for Deployed Software∗

Total Page:16

File Type:pdf, Size:1020Kb

Visualizing Program-Execution Data for Deployed Software∗ Gammatella: Visualizing Program-Execution Data for Deployed Software∗ James A. Jones, Alessandro Orso, and Mary Jean Harrold College of Computing Georgia Institute of Technology {jjones,orso,harrold}@cc.gatech.edu Abstract 1 Introduction Software systems are often released with missing Developing reliable, safe, and efficient software is dif- functionality, errors, or incompatibilities that may ficult. Quality assurance tasks, such as testing, anal- result in failures in the field, inferior performances, ysis, and performance optimization, are often con- or, more generally, user dissatisfaction. In previous strained because of time-to-market pressures and be- work, some of the authors presented the Gamma ap- cause products must function in a number of vari- proach, whose goal is to improve software quality by able configurations. Consequently, released software augmenting software-engineering tasks with dynamic products may exhibit missing functionality, errors, in- information collected from deployed software. The compatibility with the running environment, security Gamma approach enables analyses that (1) rely on holes, or inferior performance and usability. actual field data instead of synthetic in-house data Many of these problems arise only when the soft- and (2) leverage the vast and heterogeneous resources ware runs in the users’ environments and cannot be of an entire user community instead of limited, and easily detected or investigated in-house. We believe, often homogeneous, in-house resources. and our previous research suggests, that software de- When monitoring a large number of deployed in- velopment can greatly benefit from augmenting anal- stances of a software product, however, a significant ysis and measurement tasks performed in-house with amount of data is collected. Such raw data are use- program-execution data—information, such as cover- less in the absence of suitable data-mining and vi- age data, exception-related information, and perfor- sualization techniques that support exploration and mance related data that is collected from deployed understanding of the data. In this paper, we present software while it is used in the field. We call this a new technique for collecting, storing, and visualiz- approach the Gamma approach.1 The Gamma ap- ing program-execution data gathered from deployed proach aims to improve software quality through con- instances of a software product. We also present a tinuous monitoring and analysis of software after de- prototype toolset, Gammatella, that implements ployment [6, 15, 17]. the technique. Finally, we show how the visualiza- Monitoring of a high number of deployed instances tion capabilities of Gammatella facilitate effective of a software product, however, can produce a huge investigation of several kinds of execution-related in- amount of program-execution data. For example, in formation in an interactive fashion, and discuss our a preliminary study that involved only a few users initial experience with a semi-public display of Gam- and only one system, we collected more than 1,000 matella. program-execution data in less than a month. If we multiply that number by a realistic number of users for an average system, it is easy to see that the quan- Keywords tities involved are on the order of millions of program- execution data per system. Gamma technology, software visualization, remote Furthermore, when collecting more and more kinds monitoring of program-execution data from the field, not only ∗An earlier version of the material presented in this paper 1We call the approach Gamma because it can be seen as appeared in the Proceedings of the ACM Symposium on Soft- the next phase after α-testing, performed in-house, and beta- ware Visualization (June, 2003) [16]. testing, performed in the field by a set of selected users. 1 does the size of the data grow, but also their com- tation and data-collection capabilities; and plexity: different kinds of data may have intricate • a case study that shows the feasibility of the ap- relationships and dependences that require such data proach. to be analyzed together to be understood. Such a huge and complex amount of data can- In the next section, we describe the new visual- not be analyzed manually. To be able to extract ization approach that we use to represent program- meaningful information about program behavior from execution data. Section 3 describes the components the raw data and exploit their potential, we need of the Gammatella toolset and discusses our setup suitable data-mining and visualization techniques. for and initial experience with a semi-public display of In particular, visualization techniques can be effec- Gammatella. Section 4 presents two applications of tive in transforming program-execution data into vi- our approach and a feasibility study performed using sual information that can be explored and under- the tool. Section 5 discusses related work. Finally, stood [2, 9, 20, 22, 24]. Section 6 presents some conclusions and discusses fu- In this paper, we present a new visualization ap- ture work. proach that can efficiently represent different kinds of program-execution data and that facilitates inves- tigation of the data to study the behavior of pro- 2 Visualization Technique grams in the field. The approach is defined for a con- text in which a number of instances of a program In this section, we describe the visualization approach are continuously monitored, and has the following that we defined to enable continuous monitoring and characteristics: (1) it provides a hierarchical view exploration of program-execution data collected from of the code, so that the user can navigate the pro- deployed software. gram at different levels of detail while studying the One goal of our work is to provide an interface program-execution data; (2) it is flexible in the kind that can scale to large programs and that can handle of program-execution data it can show for each exe- a number of executions by many users. To achieve cution; and (3) it accounts for a dynamic, constantly this goal, we defined a visualization approach that increasing, and possibly very large number of execu- provides: tions through the use of filters and summarizers. We also present a prototype toolset, Gam- • representation of software systems at different matella, that implements the visualization ap- levels of detail; proach and provides capabilities for instrumenting • use of coloring to represent program-execution the code, collecting program-execution data from the data; field, and storing and retrieving the data locally. • explicit representation and visualization of Finally, we report two possible applications of program-execution data about each execution our visualization technique—exception and profiling together with its properties; and analyses—and a feasibility study. In the study, we • capabilities for filtering and summarizing the Gammatella use , displayed on a semi-public dis- program-execution data in an interactive way. play in our lab, to collect, store, visualize, and in- vestigate program-execution data gathered from in- To minimize the interaction required by a user to stances of a real software system distributed to a set see all dimensions of the display, we chose to focus of users. The study shows how the visualization ca- Gammatella our attention on two-dimensional visualization tech- pabilities of let us effectively investi- niques rather than three-dimensional techniques. For gate several kinds of program-execution data in an example, in our approach, the user is not required to interactive fashion and get meaningful insights into rotate the display to reveal obscured features. Ob- the monitored program’s behavior. Our initial expe- Gammatella viously, a height dimension could be added to our rience with the semi-public display of visualization to let more variables be displayed. is also discussed. The main contributions of the paper are: 2.1 Representation Levels • a new visualization approach that facilitates vi- sualization of various kinds of program-execution To investigate the program-execution data efficiently, data and interactive study of a program’s behav- we must be able to view the data at different levels ior; of detail. In our visualization approach, we represent • a toolset, Gammatella, that implements the software systems at three different levels: statement visualization approach and provides instrumen- level, file level, and system level. 2 Statement level. The lowest level of representa- are especially effective in letting users spot unusual tion in our visualization is the statement level. At patterns in the represented data. Moreover, treemaps this level, the visualization represents source code, can efficiently encode information for large-sized pro- and each line of code is suitably colored (in cases grams: in a 1280x1024 display, treemaps can visual- where the information being represented does involve ize, on average, programs of more than 4,000 files [21]. coloring). Figure 1 shows an example of a colored set of statements in this view. For example, if we are In our development of the system-level view, we visualizing statement-coverage information, each line considered other visualization techniques such as of code is colored based on whether it was covered Stasko and Zhang’s Sunburst visualization [23] or by the considered execution(s) (e.g., gray if not cov- Lamping, Rao, and Pirolli’s Hyberbolic Tree visual- ered and green if covered). The statement level is the ization [12]. These techniques, however, focus more level at which users can get the most detail about on the hierarchical structure of the information they the code. However, directly viewing the code is not represent, and use a considerable amount of screen efficient for programs of non-trivial size. To allevi- space to represent such structure. For our applica- ate this problem, our visualization approach provides tion, the hierarchical structure of the program mod- representations at higher levels of abstraction. ules is less important than representing as much in- formation as possible at each level of the hierarchy. File level.
Recommended publications
  • SIGSOFT CFP-ICSE04.Qxd
    General Chair Richard N. Taylor Call for Participation University of California, Irvine [email protected] ACM SIGSOFT 2004 Program Chair Matthew B. Dwyer Twelfth International Symposium on the Kansas State University Foundations of Software Engineering FSE-12 [email protected] Newport Beach Program Committee Ken Anderson, U Colorado, Boulder, USA October 31 - November 5, 2004 Annie Antón, North Carolina State U, USA Hyatt Newporter Hotel, Newport Beach, California, USA Joanne Atlee, U Waterloo, Canada Prem Devanbu, U California, Davis, USA http://www.isr.uci.edu/FSE-12/ Mary Jean Harrold, Georgia Tech, USA John Hatcliff, Kansas State U, USA Jim Herbsleb, Carnegie Mellon U, USA SIGSOFT 2004 brings together researchers and practitioners from academia and industry to André van der Hoek, U California, Irvine, exchange new results related to both traditional and emerging fields of software engineer- USA ing. SIGSOFT 2004 will feature four workshops, one day of tutorials organized through the Paola Inverardi, U L'Aquila, Italy Educator's Grant Program (EGP), a student resarch forum with posters, along with FSE-12. Gregor Kiczales, U British Columbia, Canada Jeff Kramer, Imperial College London, UK FSE-12 will be held Tuesday-Thursday, November 2-4. We are pleased to announce the Shriram Krishnamurthi, Brown U, USA keynotes: Shinji Kusumoto, Osaka U, Japan Axel van Lamsweerde, U Catholique de Alexander L. Wolf, University of Colorado at Boulder, Tues. Nov. 2 Louvain, Belgium Bashar Nuseibeh, The Open U, UK Joe Marks, Director, Mitsubishi Electric Research Laboratories, Cambridge, Wed. Nov. 3 Mauro Pezzé, U Milano-Bicocca, Italy SIGSOFT Distinguished Research Award winner, Thur.
    [Show full text]
  • Improving Web Services Maintenance Through Regression Testing Divya Rohatgi, Prof
    Volume 3, Issue 5, May-2016, pp. 261-265 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Improving Web Services Maintenance through Regression Testing Divya Rohatgi, Prof. (Col) Gurmit Singh 1. Research Scholar, Computer Science and Engineering Department Sam Higginbottom Institute of Agriculture, Technology and Sciences Deemed University, Allahabad, India 2. Professor, Computer Science and Engineering Department Sam Higginbottom Institute of Agriculture, Technology and Sciences Deemed University, Allahabad, India Abstract: - Software maintenance is considered to be the most expensive activity in software development and is used to ensure quality to the product. Regression Testing is a part of software maintainers which is done every time the software is changed. For software like Web services which represent a class of Service oriented architectures this activity is a challenging task. Since web services incorporate business functionality thus maintaining proper quality is an important concern. Due to inherent distributed, heterogeneous and dynamic in nature, regression testing is difficult and time consuming activity. Thus in order to reduce maintenance cost we have to reduce regression testing cost. Thus in this paper, we have given a comprehensive study of regression testing of web services exploring the challenges, approaches and tools used for them to ensure proper quality and inherently reducing the maintenance costs. Keywords – Software Engineering, Software Maintenance, Regression Testing, Web Service. —————————— —————————— 1. INTRODUCTION implications deriving from the adoption of the standardized stack of technology underlying web In today’s growing and competitive scenario Service– services (e.g., SOAP, WSDL, UDDI, etc.); oriented architectures are having a crucial role in the way in which systems are developed and designed.
    [Show full text]
  • FINAL PROGRAM University of California, Irvine [email protected] Program Chair Matthew B
    General Chair Richard N. Taylor FINAL PROGRAM University of California, Irvine [email protected] Program Chair Matthew B. Dwyer ACM SIGSOFT 2004 University of Nebraska-Lincoln [email protected] Twelfth International Symposium on the Program Committee Ken Anderson, U Colorado, Boulder, USA Foundations of Software Engineering FSE-12 Annie Antón, North Carolina State U, USA Joanne Atlee, U Waterloo, Canada Prem Devanbu, U California, Davis, USA Mary Jean Harrold, Georgia Tech, USA John Hatcliff, Kansas State U, USA Jim Herbsleb, Carnegie Mellon U, USA André van der Hoek, U Calif., Irvine, USA Paola Inverardi, U L'Aquila, Italy Gregor Kiczales, U British Columbia, Canada Jeff Kramer, Imperial College London, UK Shriram Krishnamurthi, Brown U, USA Shinji Kusumoto, Osaka U, Japan Axel van Lamsweerde, U Catholique de Louvain, Belgium Bashar Nuseibeh, The Open U, UK Mauro Pezzé, U Milano-Bicocca, Italy Gian Pietro Picco, Politecnico di Milano, Italy David Rosenblum, U College London, UK Gregg Rothermel, U Nebraska-Lincoln, USA Wilhelm Schäfer, U Paderborn, Germany Douglas Schmidt, Vanderbilt U, USA Peri Tarr, IBM T.J. Watson, USA Frank Tip, IBM T.J. Watson, USA Willem C. Visser, NASA Ames, USA http://www.isr.uci.edu/FSE-12/ Student and Diversity Programs Co-Chairs October 31 - November 5, 2004 Educators Grant Program and Tutorials Hyatt Newporter Hotel, Newport Beach, California, USA Mary Jean Harrold Georgia Tech [email protected] Mary Lou Soffa SIGSOFT 2004 brings together researchers and practitioners from academia and industry to University of Virginia exchange new results related to both traditional and emerging fields of software engineering.
    [Show full text]
  • Curriculum Vitae James A
    Curriculum Vitae James A. Jones General Information Bio Highlights Professor Jones is perhaps best known for the creation of the influential Tarantula technique that spawned a new field of \spectra-based" fault localization. For this work, he was awarded the prestigious ACM SIGSOFT Award in 2015. Also, he is a recipient of the prestigious National Science Foundation Faculty Early Career Development (CAREER) Award, which recognizes outstanding research and excellent education. Jones's research contributions span the duration of his undergrad, professional, graduate, and professorial career. Throughout this time, Jones created tools and techniques for software analysis (static and dynamic), techniques to help manage test suites for safety-critical software systems, techniques to support several aspects of software debugging and comprehension, and has studied the ways that software behaves in order to better model and predict it. Jones received the Ph.D. in Computer Science at Georgia Tech, advised by Professor Mary Jean Harrold. At UC Irvine, Jones leads the Spider Lab (http://spideruci.org) and advises Ph.D., Masters, and undergraduate students to study and improve software development and maintenance processes. Jones is a regular author and reviewer for top-tier research conferences (e.g., ICSE, FSE, ISSTA, ASE) and has co-organized events such as the 1st Working Conference on Software Visualization (VISSOFT) and the 10th Workshop on Dynamic Analysis (WODA). Contact Information University of California, Irvine Bren School of Information and Computer Sciences Department of Informatics Institute for Software Research Spider Lab Research Group (http://spideruci.org) 5214 Bren Hall, Irvine, CA 92697-3440 +1 (949) 824-0942 +1 (949) 824-4056 [email protected] http://jamesajones.com http://spideruci.org Jones, James A.
    [Show full text]
  • Automated Test Cases Prioritization for Self-Driving Cars in Virtual
    111 Automated Test Cases Prioritization for Self-driving Cars in Virtual Environments CHRISTIAN BIRCHLER, Zurich University of Applied Science, Switzerland SAJAD KHATIRI, Zurich University of Applied Science & Software Institute - USI, Lugano, Switzerland POURIA DERAKHSHANFAR, Delft University of Technology, Netherlands SEBASTIANO PANICHELLA, Zurich University of Applied Science, Switzerland ANNIBALE PANICHELLA, Delft University of Technology, Netherlands Testing with simulation environments help to identify critical failing scenarios emerging autonomous systems such as self-driving cars (SDCs) and are safer than in-field operational tests. However, these tests are very expensive and aretoo many to be run frequently within limited time constraints. In this paper, we investigate test case prioritization techniques to increase the ability to detect SDC regression faults with virtual tests earlier. Our approach, called SDC-Prioritizer, prioritizes virtual tests for SDCs according to static features of the roads used within the driving scenarios. These features are collected without running the tests and do not require past execution results. SDC-Prioritizer utilizes meta-heuristics to prioritize the test cases using diversity metrics (black-box heuristics) computed on these static features. Our empirical study conducted in the SDC domain shows that SDC-Prioritizer doubles the number of safety-critical failures that virtual tests can detect at the same level of execution time compared to baselines: random and greedy-based test case orderings. Furthermore, this meta-heuristic search performs statistically better than both baselines in terms of detecting safety-critical failures. SDC-Prioritizer effectively prioritize test cases for SDCs with a large improvement in fault detection while its overhead(upto 0.34% of the test execution cost) is negligible.
    [Show full text]
  • Mary Lou Soffa: Curriculum Vitae
    Mary Lou Soffa Department of Computer Science 421 Rice Hall Phone: (434) 982-2277 85 Engineer’s Way Fax: (434) 982-2214 P.O. Box 400740 Email: [email protected] University of Virginia Homepage: http://www.cs.virginia.edu/ Charlottesville, VA 22904 Research Interests Optimizing compilers, software engineering, program analysis, instruction level parallelism, program debugging and testing tools, software systems for the multi-core processors, testing cloud applications, testing for machine learning applications Education Ph.D. in Computer Science, University of Pittsburgh, 1977 M.S. in Mathematics, Ohio State University B.S. in Mathematics, University of Pittsburgh, Magna Cum Laude, Phi Beta Kappa Academic Employment Owen R.Cheatham Professor of Sciences, Department of Computer Science, University of Virginia, 2004-present Chair, Department of Computer Science, University of Virginia, 2004-2012 Professor, Department of Computer Science, University of Pittsburgh, 1990-2004 Graduate Dean in Arts and Sciences, University of Pittsburgh, 1991-1996 Visiting Associate Professor, Department of Electrical Engineering and Computer Science, University of California at Berkeley, 1987 Associate Professor, Department of Computer Science, University of Pittsburgh, 1983-1990 Assistant Professor, Department of Computer Science, University of Pittsburgh, 1977-1983 Honors/Awards SEAS Distinguished Faculty Award, 2020 NCWIT Harrold - Notkin Research and Mentoring Award, 2020 University of Virginia Research Award, 2020 Distinguished Paper, A Statistics-Based
    [Show full text]
  • Dissertation Towards Model-Based Regression
    DISSERTATION TOWARDS MODEL-BASED REGRESSION TEST SELECTION Submitted by Mohammed Al-Refai Department of Computer Science In partial fulfillment of the requirements For the Degree of Doctor of Philosophy Colorado State University Fort Collins, Colorado Summer 2019 Doctoral Committee: Advisor: Sudipto Ghosh Co-Advisor: Walter Cazzola James M. Bieman Indrakshi Ray Leo Vijayasarathy Copyright by Mohammed Al-Refai 2019 All Rights Reserved ABSTRACT TOWARDS MODEL-BASED REGRESSION TEST SELECTION Modern software development processes often use UML models to plan and manage the evolu- tion of software systems. Regression testing is important to ensure that the evolution or adaptation did not break existing functionality. Regression testing can be expensive and is performed with limited resources and under time constraints. Regression test selection (RTS) approaches are used to reduce the cost. RTS is performed by analyzing the changes made to a system at the code or model level. Existing model-based RTS approaches that use UML models have some limitations. They do not take into account the impact of changes to the inheritance hierarchy of the classes on test case selection. They use behavioral models to perform impact analysis and obtain traceability links between model elements and test cases. However, in practice, structural models such as class diagrams are most commonly used for designing and maintaining applications. Behavioral models are rarely used and even when they are used, they tend to be incomplete and lack fine-grained details needed to obtain the traceability links, which limits the applicability of the existing UML- based RTS approaches. The goal of this dissertation is to address these limitations and improve the applicability of model-based RTS in practice.
    [Show full text]
  • CRA-W Newletter October 2008 Final
    CRA-W Newsletter Summer-Fall 2008 Inside This Issue Highlight on DMP Alum Eileen Kraemer Alum News 2 Alums in the News 6 Eileen Kraemer is a Professor and the Head of the Computer Science Department at the University of Georgia. Her research Interview with Carla 8 interests are in visualization and interaction to support users Ellis engaged in complex tasks, such as the design and maintenance 15 Years of Provid- 10 of concurrent software and the use of biological databases and ing Distributed Re- analysis tools. She earned a BS in Biology from Hofstra Uni- search Experience versity in Hempstead, NY, and then studied Computer Science, earning an MS from Polytechnic University in Brooklyn, NY CRA-W Elects New 12 and a PhD from Georgia Tech's College of Computing. Prior Co-Chairs to joining the faculty at UGA, she was an Assistant Professor Missouri S&T MRO- 13 at Washington University in St. Louis. You can read more W Project about her at http://www.cs.uga.edu/~eileen News of Affiliated 14 Q: How did you become interested in visualization and interaction? Groups Upcoming Events and Prior to returning to grad school, I taught high school biology, chemistry, and physics. My experiences as a teacher taught me just how important it is to present people with the right Deadlines abstraction, model, or example to convey a complex concept, and that allowing learners to October 17-18, 2008: CRA- construct or interact with their own model or abstraction is critical to helping learners under- W Steering Committee mtg.
    [Show full text]
  • Source-Code Level Regression Test Selection: the Model-Driven Way
    Journal of Object Technology Published by AITO — Association Internationale pour les Technologies Objets http://www.jot.fm/ Source-Code Level Regression Test Selection: the Model-Driven Way Thibault B´eziersla Fosseabd Jean-Marie Mottubc Massimo Tisibd Gerson Suny´ebc a. ICAM, Nantes, France b. Naomod Team, LS2N (UMR CNRS 6004) c. Universit´ede Nantes d. IMT Atlantique Abstract In order to ensure that existing functionalities have not been impacted by recent program changes, test cases are regularly executed during regression testing (RT) phases. The RT time becomes problematic as the number of test cases is growing. Regression test selection (RTS) aims at running only the test cases that have been impacted by recent changes. RTS reduces the duration of regression testing and hence its cost. In this paper, we present a model-driven approach for RTS. Execution traces are gathered at runtime, and injected in a static source-code model. We use this resulting model to identify and select all the test cases that have been impacted by changes between two revisions of the program. Our MDE approach allows modularity in the granularity of changes considered. In addition, it offers better reusability than existing RTS techniques: the trace model is persistent and standardised. Furthermore, it enables more interoperability with other model-driven tools, enabling further analysis at different levels of abstraction (e.g., energy consumption). We evaluate our approach by applying it to four well-known open- source projects. Results show that our MDE proposal can effectively re- duce the execution time of RT, by up to 32 % in our case studies.
    [Show full text]
  • Empirical Studies of a Safe Regression Test Selection Technique
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering, Department CSE Journal Articles of 6-1998 Empirical Studies of a Safe Regression Test Selection Technique Gregg Rothermel University of Nebraska-Lincoln, [email protected] Mary Jean Harrold Ohio State University Follow this and additional works at: https://digitalcommons.unl.edu/csearticles Part of the Computer Sciences Commons Rothermel, Gregg and Harrold, Mary Jean, "Empirical Studies of a Safe Regression Test Selection Technique" (1998). CSE Journal Articles. 11. https://digitalcommons.unl.edu/csearticles/11 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Journal Articles by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 24, NO. 6, JUNE 1998 401 Empirical Studies of a Safe Regression Test Selection Technique Gregg Rothermel, Member, IEEE, and Mary Jean Harrold, Member, IEEE Abstract—Regression testing is an expensive testing procedure utilized to validate modified software. Regression test selection techniques attempt to reduce the cost of regression testing by selecting a subset of a program’s existing test suite. Safe regression test selection techniques select subsets that, under certain well-defined conditions, exclude no tests (from the original test suite) that if executed would reveal faults in the modified software. Many regression test selection techniques, including several safe techniques, have been proposed, but few have been subjected to empirical validation. This paper reports empirical studies on a particular safe regression test selection technique, in which the technique is compared to the alternative regression testing strategy of running all tests.
    [Show full text]
  • ICSE 2001 Advance Program
    23rd International Conference 2001 on Software Engineering Westin Harbour Castle Hotel Toronto, Ontario, Canada May 12–19, 2001 ICSE 2001 Advance Program http://www.csr.uvic.ca/icse2001/ 27th March, 2001 Association for Computing Machinery Special Interest Group on IEEE Computer Society a Software Engineering Technical Council on Special Interest Group on Software Engineering Programming Languages MESSAGE FROM THE CHAIRS Welcome to ICSE 2001 Software Engineering Week in Toronto! Today, the engineering of software profoundly impacts world economics. For example, the desperate demands by all information technology sectors to adapt their information systems to the web has generated a tremendous need for methods, tools, processes, and infrastructure to develop new and evolve existing applications efficiently and cost- effectively. ICSE 2001, the premier conference for software engineering, will feature the latest in- ventions, achievements, and experiences in software engineering research and prac- tice, and will give researchers, practitioners, and educators the opportunity to present, discuss, and learn. Hausi A. Müller The ICSE 2001 Software Engineering Week, May 11–20, 2001 consists of the main General Chair ICSE conference and over 50 tutorials, workshops, collocated conferences, and sympo- sia. The conference venue is the Westin Harbour Castle overlooking Lake Ontario in downtown Toronto, with restaurants, theaters, shopping, and plenty of other activities. The main ICSE 2001 program includes 47 technical papers, eight case-study reports, six education papers, an invited industry track, nine formal research demonstrations, and four panels. The program also contains six plenary sessions with outstanding invited key- note speakers. The main ICSE 2001 program also contains two new features: Challeng- es and Achievements in Software Engineering (CHASE), in which each session offers both research and industrial views of the same topic; and Frontiers of Software Practice (FoSP), which provides mini-tutorials on new and promising software technologies.
    [Show full text]
  • Trade-Offs in Continuous Integration:Assurance, Security, And
    Trade-Os in Continuous Integration: Assurance, Security, and Flexibility Michael Hilton Nicholas Nelson Timothy Tunnell Oregon State University, USA Oregon State University, USA University of Illinois, USA mhilton@cmu:edu nelsonni@oregonstate:edu tunnell2@illinois:edu Darko Marinov Danny Dig University of Illinois, USA Oregon State University, USA marinov@illinois:edu digd@oregonstate:edu 1 INTRODUCTION Continuous integration (CI) systems automate the compilation, ABSTRACT building, and testing of software. CI usage is widespread throughout Continuous integration (CI) systems automate the compilation, the software development industry. For example, the “State of Agile” building, and testing of software. Despite CI being a widely used industry survey [51], with 3,880 participants, found half of the activity in software engineering, we do not know what motivates respondents use CI. The “State of DevOps” report [33], a survey developers to use CI, and what barriers and unmet needs they face. of over 4,600 technical professionals from around the world, nds Without such knowledge, developers make easily avoidable errors, CI to be an indicator of “high performing IT organizations”. We tool builders invest in the wrong direction, and researchers miss previously reported [19] that 40% of the 34,000 most popular open- opportunities for improving the practice of CI. source projects on GitHub use CI, and the most popular projects We present a qualitative study of the barriers and needs devel- are more likely to use CI (70% of the top 500 projects). opers face when using CI. We conduct semi-structured interviews Despite the widespread adoption of CI, there are still many unan- with developers from dierent industries and development scales.
    [Show full text]