Write a Blog >>
ASE 2020
Mon 21 - Fri 25 September 2020 Melbourne, Australia
Tue 22 Sep 2020 10:40 - 10:45 at Koala - LBR + DS Poster (1) Chair(s): Kevin Lee

In software development, issue tracker systems are widely used to manage bug reports. In such a system, a bug report can be filed, diagnosed, assigned, and fixed. In the standard process, a bug can be resolved as \emph{fixed}, \emph{invalid}, \emph{duplicated} or \emph{won’t fix}. Although the above resolutions are well-defined and easy to understand, a bug report can end with a less known resolution, \emph{i.e.}, \emph{workaround}. Compared with other resolutions, the definition of workarounds is more ambiguous. Besides the problem that is reported in a bug report, the resolution of a workaround raises more questions. Some questions are important for users, especially those programmers who build their projects upon others (\emph{e.g.}, libraries). Although some early studies have been conducted to analyze API workarounds, many research questions on workarounds are still open. For example, which bugs are resolved as workarounds? Why is a bug report resolved as workarounds? What are the repairs of workarounds? In this experience paper, we conduct the first empirical study to explore the above research questions. In particular, we analyzed 221 real workarounds that were collected from Apache projects. Our results lead to ten findings and our answers to all the above questions. For example, we find that most bug reports are resolved as workarounds, because their problems arise across projects (38.01%) or reside in the environments (21.27%). Although the problems of some workarounds (37.56%) reside in the project where they are reported, they are difficult to be fixed fully and perfectly. Our findings are useful to understand workarounds and to improve software projects and issue trackers.

Tue 22 Sep
Times are displayed in time zone: (UTC) Coordinated Universal Time

10:20 - 11:20: LBR + DS Poster (1)Late Breaking Results / Doctoral Symposium at Koala
Chair(s): Kevin LeeDeakin University
10:20 - 10:25
Poster
Efficient Multiplex Symbolic Execution with Adaptive Search Strategy
Late Breaking Results
Tianqi ZhangNational University of Defense Technology, Yufeng ZhangCollege of Information Science and Engineering, Hunan University, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ziqi ShuaiNational University of Defense Technology, Ji WangNational University of Defense Technology
10:25 - 10:30
Poster
Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN
Late Breaking Results
Meixi LiuNational University of Defense Technology, Changsha, China, Weijiang HongNational University of Defense Technology, Changsha, China, Weiyu PanNational University of Defense Technology, Changsha, China, Chendong FengCollege of Computer, National University of Defense Technology, Changsha, China, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ji WangNational University of Defense Technology
10:30 - 10:35
Poster
Synthesizing Smart Solving Strategy for Symbolic Execution
Late Breaking Results
Zehua ChenNational University of Defense Technology, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ziqi ShuaiNational University of Defense Technology, Yufeng ZhangCollege of Information Science and Engineering, Hunan University, Weiyu PanNational University of Defense Technology, Changsha, China
10:35 - 10:40
Poster
Privacy Assessment of Android Clipboard
Late Breaking Results
Zach Wei WangThe University of Adelaide, Ruoxi SunThe University of Adelaide, Jason Minhui XueThe University of Adelaide, Damith C. RanasingheThe University of Adelaide
DOI
10:40 - 10:45
Poster
The Symptom, Cause and Repair of Workaround
Late Breaking Results
Daohan SongShanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University, Li JiaShanghai Jiao Tong University
10:45 - 10:50
Poster
Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems
Late Breaking Results
Han GaoSchool of Computer Science and Technology, Anhui University, Yi XuSchool of Computer Science and Technology, Anhui University, Xiao LiuSchool of Information Technology, Deakin University, Jia XuSchool of Computer Science and Technology, Anhui University, Tianxiang ChenSchool of Computer Science and Technology, Anhui University, Bowen ZhouSchool of Computer Science and Technology, Anhui University, Rui LiSchool of Information Technology, Deakin University, Xuejun LiSchool of Computer Science and Technology, Anhui University
10:50 - 10:55
Poster
Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation
Late Breaking Results
Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Bangalore, India, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture, Adam P. BurdenAccenture
10:55 - 11:00
Poster
Towards Programming and Verification for Activity-Oriented Smart Home Systems
Late Breaking Results
Xuansong LiSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Wei SongSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Xiangyu ZhangPurdue University, USA
11:00 - 11:05
Talk
Towards Robust Production Machine Learning Systems: Managing Dataset Shift
Doctoral Symposium
Hala AbdelkaderApplied Artificial Intelligence Institute, Deakin University
11:05 - 11:10
Talk
Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing
Doctoral Symposium
Anjana PereraMonash University
DOI Pre-print