Technical TrackAPSEC 2022
Tue 6 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
15:00 - 16:00 | |||
15:00 60mTutorial | Process Mining for Software Engineers Tutorial Wil van der Aalst RWTH Aachen University, Germany |
Wed 7 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
10:30 - 11:00 | |||
11:00 - 12:00 | |||
11:00 60mKeynote | Machine Learning Systems Engineering: Retrospective of Five-Year Activities in Japan Keynotes Hiroshi Maruyama Preferred Networks |
13:00 - 14:00 | Empirical Studies 1SEIP - Software Engineering in Practice / Technical Track at Room1 Chair(s): Masateru Tsunoda Kindai University | ||
13:00 20mPaper | An Empirical Study on Multi-Source Cross-Project Defect Prediction Models Technical Track Xuanying Liu Beijing Jiaotong University, Zonghao Li Beijing Jiaotong University, Jiaqi Zou Beijing Jiaotong University, Haonan Tong Beijing Jiaotong University | ||
13:20 15mPaper | Refactoring Community Smells: An Empirical Study on the Software Practitioners of Bangladesh SEIP - Software Engineering in Practice Noshin Tahsin Institute of Information Technology, University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
13:35 20mPaper | How Libraries Evolve: A Survey of Two Industrial Companies and an Open-Source Community Technical Track Oleksandr Zaitsev Arolla, Univ. Lille, Inria, CNRS, Centrale Lille, UMR 9189 CRIStAL, F-59000 Lille, France, Stéphane Ducasse Inria; University of Lille; CNRS; Centrale Lille; CRIStAL, Nicolas Anquetil University of Lille, Lille, France, Arnaud Thiefaine Arolla |
13:00 - 14:00 | Machine Learning 1Technical Track at Room2 Chair(s): Syful Islam Nara Institute of Science and Technology | ||
13:00 20mPaper | Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking Technical Track | ||
13:20 20mPaper | Code Question Answering via Task-Adaptive Sequence-to-Sequence Pre-training Technical Track Tingrui Yu School of Software, Shanghai Jiao Tong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University |
13:00 - 14:00 | Model Checking 1Technical Track / ERA - Early Research Achievements at Room3 Chair(s): Hiroyuki Nakagawa Osaka University | ||
13:00 20mPaper | Bisection Value Iteration Technical Track | ||
13:20 20mPaper | Non-Intrusive Annotation-Based Domain-Specific Analysis to Certify Event-B Models Behaviours Technical Track Ismail Mendil INPT-ENSEEIHT/IRIT, Peter Rivière INPT-ENSEEIHT / IRIT, University of Toulouse, France, Yamine Ait Ameur IRIT/INPT-ENSEEIHT, Neeraj Singh INPT-ENSEEIHT / IRIT, University of Toulouse, France, Dominique Mery Université de Lorraine, LORIA, Philippe Palanque ICS-IRIT, Université Toulouse III Paul Sabatier | ||
13:40 15mPaper | Combining Model-Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAAL ERA - Early Research Achievements Saurabh Tiwari DA-IICT Gandhinagar, Parv Shah DA-IICT Gandhinagar, India, Eduard Paul Enoiu Mälardalen University |
14:30 - 15:40 | Migration and VisualizationTechnical Track / SEIP - Software Engineering in Practice / ERA - Early Research Achievements at Room1 Chair(s): Siripen Pongpaichet Mahidol University | ||
14:30 15mPaper | Unified program cross-architecture migration framework model SEIP - Software Engineering in Practice Zhou Minhao Hunan University, Zhe Quan Hunan University, Xin Huang AECC Hunan Aviation powerplant Research Institute | ||
14:45 20mPaper | Two-Stage Patch Synthesis for API Migration from Single API Usage Example Technical Track | ||
15:05 15mPaper | Visualizing Contributor Code Competency for PyPI Libraries: Preliminary Results ERA - Early Research Achievements Indira Febriyanti Universitas Muhammadiyah Surakarta, Raula Gaikovina Kula Nara Institute of Science and Technology, Ruksit Rojpaisarnkit Nara Institute of Science and Technology, Kanchanok Kannee Nara Institute of Science and Technology, Yusuf Sulistyo Nugroho Universitas Muhammadiyah Surakarta, Kenichi Matsumoto Nara Institute of Science and Technology | ||
15:20 15mPaper | Why Visualize Competitive Code? Preliminary Categories for Jupyter Notebooks ERA - Early Research Achievements Tasha Settewong Mahidol University, Natanon Ritta Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Kenichi Matsumoto Nara Institute of Science and Technology |
14:30 - 15:40 | |||
14:30 20mPaper | SysML Flow Model Technical Track | ||
14:50 20mPaper | Tuning SAT solvers for LTL Model Checking Technical Track Anissa Kheireddine LRDE, Etienne Renault LRDE, Souheib Baarir Université Paris Ouest Nanterre La Défense/LIP6 | ||
15:10 20mPaper | Bounded Model Checking of Synchronous Reactive Models in Ptolemy II Technical Track Xiaozhen Zhang Dalian University of Technology, Zhaoming Yang Dalian University of Technology, Hui Kong Huawei Technologies Co., Ltd., Weiqiang Kong Dalian University of Technology |
14:30 - 15:40 | |||
14:30 20mPaper | Toward a Better Alignment Between the Research and Practice of Code Search Engines Technical Track | ||
14:50 20mPaper | Multi-Perspective Alignment Mechanism for Code Search Technical Track | ||
15:10 20mPaper | Automated Generation of Bug Samples Based on Source Code Analysis Technical Track Tianming Zheng Shanghai Jiao Tong University, Zhixin Tong Shanghai Jiao Tong University, Yi-Ping You National Chiao Tung University, Yue Wu Shanghai Jiao Tong University |
Thu 8 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
09:00 - 10:00 | |||
09:00 60mKeynote | Improving Development of ML-Enabled Systems through Software Architecture Keynotes Grace Lewis Carnegie Mellon Software Engineering Institute |
13:00 - 14:30 | Smart ContractTechnical Track / ERA - Early Research Achievements at Room2 Chair(s): Yoshiki Higo Osaka University | ||
13:00 20mPaper | Grey-box Fuzzing Based on Execution Feedback for EOSIO Smart Contracts Technical Track Wenyin Li Hebei university, Meng Wang Hebei university, Bin Yu Xidian University, Yuhang Shi Xidian Univeristy, Mingxin Fu Xidian Univeristy, You Shao Xidian Univeristy | ||
13:20 15mPaper | SCAR: Smart Contract Alarm Ranking} ERA - Early Research Achievements | ||
13:35 20mPaper | Data Flow Reduction Based Test Case Generation for Smart Contracts Technical Track Shunhui Ji Hohai University, Shaoqing Zhu Hohai University, Pengcheng Zhang Hohai University, Hai Dong RMIT University | ||
13:55 20mPaper | A Reference Architecture for Blockchain-based Traceability Systems Using Domain-Driven Design and Microservices Technical Track Yanze Wang Nanjing University, Shanshan Li Nanjing University, Huikun Liu Nanjing University, He Zhang Nanjing University, Bo Pan Huawei Technologies Co., Ltd. |
13:00 - 14:30 | |||
13:00 20mPaper | Incremental Relational Topic Model for Duplicate Bug Report Detection Technical Track | ||
13:20 20mPaper | Multifaceted Hierarchical Report Identification for Non-Functional Bugs in Deep Learning Frameworks Technical Track Guoming Long Loughborough University, Tao Chen Loughborough University, Georgina Cosma Loughborough University | ||
13:40 20mPaper | Automatic Generation of Metamorphic Relations for a Cyber-Physical System-of-Systems Using Genetic Algorithm Technical Track Esther Cho Korea Advanced Institute of Science and Technology, Yong-Jun Shin Korea Advanced Institute of Science and Technology (KAIST), Sangwon Hyun Korea Advanced Institute of Science and Technology, Hansu Kim Korea Advanced Institute of Science and Technology, Doo-Hwan Bae Korea Advanced Institute of Science and Technology | ||
14:00 20mPaper | An approach for hazard analysis of multiple-cooperative systems considering dynamic configuration uncertainty Technical Track |
15:00 - 16:30 | Empirical Studies 2Technical Track at Room2 Chair(s): Yusuf Sulistyo Nugroho Universitas Muhammadiyah Surakarta | ||
15:00 20mPaper | Exploring Activity and Contributors on GitHub: Who, What, When, and Where Technical Track Xiaoya Xia East China Normal University, Zhenjie Weng East China Normal University, will wang , Shengyu Zhao Tongji University | ||
15:20 20mPaper | The Language of Programming: On the Vocabulary of Names Technical Track | ||
15:40 20mPaper | An Empirical Study of Predicting Fault-prone Components and their Evolution Technical Track | ||
16:00 20mPaper | Empirical Study of Co-Renamed Identifiers Technical Track Yuki Osumi Tokyo Institute of Technology, Naotaka Umekawa Tokyo Institute of Technology, Hitomi Komata Tokyo Institute of Technology, Shinpei Hayashi Tokyo Institute of Technology DOI Pre-print |
15:00 - 16:30 | Machine Learning 2Technical Track at Room3 Chair(s): Morakot Choetkiertikul Mahidol University, Thailand | ||
15:00 20mPaper | Retrieve-Guided Commit Message Generation with Semantic Similarity And Disparity Technical Track Zhihan Li School of Computer Science and Engineering, Central South University, Yi Cheng School of Computer Science and Engineering, Central South University, Haiyang Yang School of Computer Science and Engineering, Central South University, Li Kuang School of Computer Science and Engineering, Central South University, Lingyan Zhang School of Computer Science and Engineering, Central South University | ||
15:20 20mPaper | Systematic Analysis of Defect Specific Code Abstraction for Neural Program Repair Technical Track Kicheol Kim Sungkyunkwan University, Misoo Kim Sungkyunkwan University, Eunseok Lee Sungkyunkwan University | ||
15:40 20mPaper | NEGAR: Network Embedding Guided Architecture Recovery for Software Systems Technical Track Jiayi Chen State Key Lab for Novel Software Technology, Nanjing University, Zhixing Wang State Key Lab for Novel Software Technology, Nanjing University, yuchen jiang , Tian Zhang Nanjing University, Jun Pang University of Luxembourg, Minxue Pan Nanjing University, Nitsan Amit Hebrew University | ||
16:00 20mPaper | Goal-oriented Knowledge Reuse via Curriculum Evolution for Reinforcement Learning-based Adaptation Technical Track Jialong Li Waseda University, Japan, Mingyue Zhang Peking University, China, Zhenyu Mao Waseda University, Haiyan Zhao Peking University, Zhi Jin Peking University, Shinichi Honiden Waseda University / National Institute of Informatics, Japan, Kenji Tei Waseda University |
Fri 9 DecDisplayed time zone: Osaka, Sapporo, Tokyo change
09:20 - 10:30 | Review and Natural Language ProcessingTechnical Track / ERA - Early Research Achievements at Room1 Chair(s): Renuka Sindhgatta IBM Research AI | ||
09:20 15mPaper | A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews ERA - Early Research Achievements | ||
09:35 15mPaper | Preliminary Analysis of Review Method Selection Based on Bandit Algorithms ERA - Early Research Achievements Takuto Kudo Kindai University, Masateru Tsunoda Kindai University, Amjed Tahir Massey University, Kwabena Ebo Bennin Wageningen University and Research, Akito Monden Okayama University, Koji Toda Fukuoka Institute of Technology, Keitaro Nakasai National Institute of Technology, Kagoshima College, Kenichi Matsumoto Nara Institute of Science and Technology | ||
09:50 20mPaper | Reducing Syntactic Complexity for Information Extraction from Japanese Requirement Specifications Technical Track Maiko Onishi Ochanomizu University, Shinpei Ogata Shinshu University, Kozo Okano Shinshu University, Daisuke Bekki Ochanomizu University | ||
10:10 15mPaper | Quality assurance study with mismatched data in sentiment analysis ERA - Early Research Achievements Tinghui Ouyang National Institute of Advanced Industrial Science and Technology, Yoshiki Seo National Institute of Advanced Industrial Science and Technology, Yutaka Oiwa National Institute of Advanced Industrial Science and Technology |
09:20 - 10:30 | Microservices and WebERA - Early Research Achievements / Technical Track at Room2 Chair(s): Norihiro Yoshida Ritsumeikan University | ||
09:20 15mPaper | Testing for Event-Driven Microservices Based on Consumer-Driven Contracts and State Models ERA - Early Research Achievements Chu-Fei Wu National Taiwan Ocean University, Shang-Pin Ma National Taiwan Ocean University, An-Chi Shau National Taiwan Ocean University, Hang-Wei Yeh National Taiwan Ocean University | ||
09:35 15mPaper | Analyzing and Monitoring Kubernetes Microservices based on Distributed Tracing and Service Mesh ERA - Early Research Achievements Yu-Te Wang National Taiwan Ocean University, Shang-Pin Ma National Taiwan Ocean University, Yue-Jun Lai National Taiwan Ocean University, Yan-Cih Liang National Taiwan Ocean University | ||
09:50 15mPaper | Managing Complexity in Microservices Architecture: A Nested MultiTree Domain-Driven Approach ERA - Early Research Achievements Duc Minh Le Swinburne Vietnam, FPT University | ||
10:05 20mPaper | UTCache: Updatable Transactional Cache For Database-Driven Applications Technical Track |
09:20 - 10:30 | TestingERA - Early Research Achievements / SEIP - Software Engineering in Practice / Technical Track at Room3 Chair(s): Jihyun Lee Jeonbuk National University | ||
09:20 15mPaper | On the Usefulness of Crossover in Search-Based Test Case Generation: An Industrial Report SEIP - Software Engineering in Practice Changze Huang Ant Group, Hailian Zhou Ant Group, Hongbing Zhao Ant Group, Wenting Cai Ant Group, Zhi Quan (George) Zhou University of Wollongong, Australia, Mingyue Jiang Zhejiang Sci-Tech University | ||
09:35 15mPaper | eBAT: An Efficient Automated Web Application Testing Approach Based on Tester’s Behavior ERA - Early Research Achievements Fuad Mridha University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
09:50 20mPaper | NumFuzz: A Floating-Point Format Aware Fuzzer for Numerical Programs Technical Track Chenghu Ma National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xin Yi National University of Defense Technology, Guangsheng Fan National University of Defense Technology, Ji Wang College of Computer, National University of Defense Technology | ||
10:10 20mPaper | Detecting High Floating-Point Errors via Ranking Analysis Technical Track Zheng Wang National University of Defense Technology, Xin Yi National University of Defense Technology, Hengbiao Yu National University of Defense Technology, Banghu Yin National University of Defense Technology |
11:00 - 12:00 | |||
11:00 60mKeynote | On the Search for Effective Metamorphic Relations: Overview, Challenges and Opportunities Keynotes Shing-Chi Cheung Hong Kong University of Science and Technology |
13:00 - 14:00 | Source Code Analysis 2Technical Track / ERA - Early Research Achievements at Room1 Chair(s): Yoshiki Higo Osaka University | ||
13:00 20mPaper | Diff Feature Matching Network in Refactoring DetectionBest Paper Award Technical Track | ||
13:20 15mPaper | Reusing My Own Code: Preliminary Results for Competitive Coding in Jupyter Notebooks ERA - Early Research Achievements Natanon Ritta Mahidol University, Tasha Settewong Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Kenichi Matsumoto Nara Institute of Science and Technology | ||
13:35 20mPaper | An Experimental Comparison of Clone Detection Techniques using Java Bytecode Technical Track |
13:00 - 14:00 | Machine Learning 3Technical Track at Room2 Chair(s): Atul Gupta Indian Institute of Information Technology, Design and Manufacturing (IIITDM) | ||
13:00 20mPaper | Efficient Reinforcement Learning with Generalized-Reactivity Specifications Technical Track Chenyang Zhu , Yujie Cai Changzhou University, Can Hu changzhou university, Jia Bi University of Southampton | ||
13:20 20mPaper | Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies Technical Track | ||
13:40 20mPaper | DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning Technical Track Lwin Khin Shar Singapore Management University, Wei Minn Singapore Management University, Duong Ta Singapore Management University, Jiani Fan Nanyang Technological University, Lingxiao Jiang Singapore Management University, Daniel Lim Wai Kiat Singapore Management University |
13:00 - 14:00 | |||
13:00 20mPaper | Symbolic Execution of Floating-point Programs: How far are we? Technical Track Guofeng Zhang National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology | ||
13:20 20mPaper | Optimal Refinement-based Array Constraint Solving for Symbolic Execution Technical Track Meixi Liu National University of Defense Technology, Changsha, China, Ziqi Shuai National University of Defense Technology, Luyao Liu National University of Defense Technology, Kelin Ma National University of Defense Technology, Ke Ma | ||
13:40 20mPaper | Synergizing Symbolic Execution and Fuzzing By Function-level Selective Symbolization Technical Track Guofeng Zhang National University of Defense Technology, Zhenbang Chen National University of Defense Technology, Ziqi Shuai National University of Defense Technology, Yufeng Zhang Hunan University, Ji Wang College of Computer, National University of Defense Technology |
14:00 - 14:30 | |||
Accepted Papers
Call for Technical Research papers
The APSEC 2022 technical research track invites high quality submissions of papers describing original research studies and results in the discipline of software engineering. All accepted papers will be submitted to the IEEE-CS Digital Library in the APSEC 2022 conference proceedings.
For your paper to be published in the APSEC 2022 conference proceedings, at least one of the authors of the paper must register for the conference and confirm that she/he will present the paper online.
Topics relate to any aspect of software engineering that include, but are not limited to:
- Agile methodologies
- Cloud and Service-oriented Computing
- Component-based Software Engineering
- Configuration Management and Deployment
- Cooperative, Distributed, and Global Software Engineering
- Cyber-physical Systems and Internet of Things
- Debugging, Defect Prediction and Fault Localization
- DevOps and Container
- Embedded Real-time Systems
- Empirical Software Engineering
- Formal Methods
- Human Factors and Social Aspects of Software Engineering
- Middleware, Frameworks, and APIs
- Mobile and Ubiquitous Systems
- Model-driven and Domain-specific Engineering
- Open Source Development
- Parallel, Distributed, and Concurrent Systems
- Programming Languages and Systems
- Refactoring
- Requirements Engineering
- Reverse Engineering
- Search-based Software Engineering
- Security, Reliability, and Privacy
- Software Architecture, Modeling and Design
- Software Comprehension, Visualization, and Traceability
- Software Engineering Education
- Software Engineering Process and Standards
- Software Engineering for Smart Manufacturing
- Software Engineering Tools and Environments
- Software for Green and Sustainable Technologies
- Software Maintenance and Evolution
- Software Product-line Engineering
- Software Project Management
- Software Reuse
- Software Repository Mining and Data Analytics
- Testing, Verification, and Validation
- Web-based Software Engineering
Evaluation Criteria
Technical research papers must not be more than 10 pages. Submissions will be evaluated by at least three program committee members. The evaluation will focus on the novelty, originality, importance to the field, proper use of research methods, and presentation of the submissions.
Submission Instructions
Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop.
All submissions must be in English, and must come in A4 paper size PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option). Also, papers must comply with the IEEE Policy on Authorship. Submissions must be submitted electronically in PDF before the due date via EasyChair. The Chairs reserve the right to reject submissions (without reviews) that are not in compliance or out of scope for the conference.
IMPORTANT: The APSEC 2022 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Submissions must adhere to the following rules (largely reused from ASE 2017 double-blind instructions and SANER 2022 double-blind instructions). Please read carefully the APSEC 2022 double-blind instructions before preparing your paper.
Submission Link
Papers must be submitted through EasyChair:
https://easychair.org/my/conference?conf=apsec2022
Important Dates
Abstract Deadline: June 29, 2022- Abstract Deadline: July 13, 2022
Paper Deadline: July 6, 2022- Paper Deadline: July 20, 2022
Author Notification: Aug 15, 2022- Author Notification: Aug 25, 2022
- Camera Ready Deadline: Late October, 2022
Accepted Papers and Attendance Expectation
Accepted papers will not be permitted any additional page of content. But, we hope that the authors will reflect the reviewers’ comments as much as possible in the camera-ready version. After acceptance, the list of paper authors can not be changed under any circumstances, and the list of authors on camera-ready papers must be identical to those on submitted papers. After acceptance, paper titles can not be changed except by permission of the Program Co-Chairs, and only then when referees recommend a change for clarity or accuracy with paper content. If a submission is accepted, at least one author of the paper must register for APSEC 2022 and present the paper at the conference. If an accepted paper is not presented, the paper is removed from the proceedings.
Contact
Yoshiki Higo and Yunja Choi
APSEC 2022 Program Co-Chairs
APSEC 2022 Double-blind Instructions
IMPORTANT: The APSEC 2022 technical research track will use a double-blind reviewing process, which means that submissions must not reveal the authors’ identities. The authors must make every effort to honor the double-blind reviewing process. Submissions must adhere to the following rules (largely reused from ASE 2017 double-blind instructions and SANER 2022 double-blind instructions).
- Omit authors’ names and institutions from your title page.
- References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)
- There may be cases in which the current submission is a clear follow up of one of your previous work, and despite what recommended in the previous point, reviewers will clearly associate authorship of such a previous work to the current submission. In this case, you may decide to anonymize the reference itself at submission time. For example: “based on previous results [10]” .. where the reference is reported as “[10] Anonymous Authors. Omitted for double blind reviewing.” In doing so, however, please make sure that the APSEC 2022 submission is self-contained and its content can be reviewed and understood without accessing the previous paper.
- Do not include acknowledgements of people, grants, organizations, etc. that would give away your identity. You may, of course, add these acknowledgements in the camera-ready version.
- In general, aim to reduce the risk of accidental unblinding. For example, if you use an identifiable naming convention for your work, such as a project name, use a different name for your submission, which you may indicate has been changed for the purposes of double-blind reviewing. This includes names that may unblind individual authors and their institutions. For example, if your project is called GoogleDeveloperHelper, which makes it clear the work was done at Google, for the submission version, use the name DeveloperHelper or BigCompanyDeveloperHelper instead.
- Avoid revealing the institution affiliations of authors or at which the work was performed. For example, if the evaluation includes a user study conducted with undergraduates from the CS 101 class that you teach, you might say “The study participants consist of 200 students in an introductory CS course.” You can of course add the institutional information in the camera-ready. Similar suggestions apply for work conducted in specific organizations (e.g., industrial studies). In such cases, avoid mentioning the organization’s name. Instead, you may just refer to the organization as “Org” or “Company”, etc. When appropriate and when this does not help too much in revealing the company’s name, you might mention the context (e.g., financial organization, video game development company, etc.).
- APSEC 2022 believes in open science and that open science aids reproducibility and replicability. To improve these factors we encourage authors to consider disclosing the source code and datasets used within their paper, including extractors, survey data, etc. By sharing this information your contribution will be more impactful because others can follow up on your work and of course cite it. But please avoid linking directly to code repositories or tool deployments which can reveal your identity. Instead of doing so, please consider using Zenodo, Figshare, or other services that provide DOIs and allowing anonymous and semi-anonymous methods of archiving software and datasets. Archive.org is recommended for the dissemination of larger datasets. These datasets, anonymized through Zenodo and other services, should be linked within the paper itself. Instructions for double-blind friendly uploading of datasets is available here:
https://ineed.coffee/post/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance.html