In software development, issue tracker systems are widely used to manage bug reports. In such a system, a bug report can be filed, diagnosed, assigned, and fixed. In the standard process, a bug can be resolved as \emph{fixed}, \emph{invalid}, \emph{duplicated} or \emph{won’t fix}. Although the above resolutions are well-defined and easy to understand, a bug report can end with a less known resolution, \emph{i.e.}, \emph{workaround}. Compared with other resolutions, the definition of workarounds is more ambiguous. Besides the problem that is reported in a bug report, the resolution of a workaround raises more questions. Some questions are important for users, especially those programmers who build their projects upon others (\emph{e.g.}, libraries). Although some early studies have been conducted to analyze API workarounds, many research questions on workarounds are still open. For example, which bugs are resolved as workarounds? Why is a bug report resolved as workarounds? What are the repairs of workarounds? In this experience paper, we conduct the first empirical study to explore the above research questions. In particular, we analyzed 221 real workarounds that were collected from Apache projects. Our results lead to ten findings and our answers to all the above questions. For example, we find that most bug reports are resolved as workarounds, because their problems arise across projects (38.01%) or reside in the environments (21.27%). Although the problems of some workarounds (37.56%) reside in the project where they are reported, they are difficult to be fixed fully and perfectly. Our findings are useful to understand workarounds and to improve software projects and issue trackers.
Tue 22 SepDisplayed time zone: (UTC) Coordinated Universal Time change
10:20 - 11:20 | LBR + DS Poster (1)Late Breaking Results / Doctoral Symposium at Koala Chair(s): Kevin Lee Deakin University | ||
10:20 5mPoster | Efficient Multiplex Symbolic Execution with Adaptive Search Strategy Late Breaking Results Tianqi Zhang National University of Defense Technology, Yufeng Zhang College of Information Science and Engineering, Hunan University, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ziqi Shuai National University of Defense Technology, Ji Wang National University of Defense Technology | ||
10:25 5mPoster | Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN Late Breaking Results Meixi Liu National University of Defense Technology, Changsha, China, Weijiang Hong National University of Defense Technology, Changsha, China, Weiyu Pan National University of Defense Technology, Changsha, China, Chendong Feng College of Computer, National University of Defense Technology, Changsha, China, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ji Wang National University of Defense Technology | ||
10:30 5mPoster | Synthesizing Smart Solving Strategy for Symbolic Execution Late Breaking Results Zehua Chen National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ziqi Shuai National University of Defense Technology, Yufeng Zhang College of Information Science and Engineering, Hunan University, Weiyu Pan National University of Defense Technology, Changsha, China | ||
10:35 5mPoster | Privacy Assessment of Android Clipboard Late Breaking Results Wei (Zach) Wang The University of Adelaide, Ruoxi Sun The University of Adelaide, Jason Minhui Xue The University of Adelaide, Damith C. Ranasinghe The University of Adelaide DOI | ||
10:40 5mPoster | The Symptom, Cause and Repair of Workaround Late Breaking Results Daohan Song Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University, Li Jia Shanghai Jiao Tong University | ||
10:45 5mPoster | Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems Late Breaking Results Han Gao School of Computer Science and Technology, Anhui University, Yi Xu School of Computer Science and Technology, Anhui University, Xiao Liu School of Information Technology, Deakin University, Jia Xu School of Computer Science and Technology, Anhui University, Tianxiang Chen School of Computer Science and Technology, Anhui University, Bowen Zhou School of Computer Science and Technology, Anhui University, Rui Li School of Information Technology, Deakin University, Xuejun Li School of Computer Science and Technology, Anhui University | ||
10:50 5mPoster | Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation Late Breaking Results Rohit Mehra Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Bangalore, India, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture | ||
10:55 5mPoster | Towards Programming and Verification for Activity-Oriented Smart Home Systems Late Breaking Results Xuansong Li School of Computer Science and Engineering, Nanjing University of Science and Technology, Wei Song School of Computer Science and Engineering, Nanjing University of Science and Technology, Xiangyu Zhang Purdue University, USA | ||
11:00 5mTalk | Towards Robust Production Machine Learning Systems: Managing Dataset Shift Doctoral Symposium Hala Abdelkader Applied Artificial Intelligence Institute, Deakin University | ||
11:05 5mTalk | Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing Doctoral Symposium Anjana Perera Monash University DOI Pre-print |