Internetware 2024
Wed 24 - Fri 26 July 2024 Macau, China

Internetware 2024, the 15th Asia-Pacific Symposium on Internetware, provides a forum for researchers and practitioners to discuss the trending software technologies in the Internet era. Internetware 2024 will be held July 24-26 in Macau, China.

Internetware 2024 Keynote

Keynote 1: Prof. Andreas Zeller: Advances in Language-Based Testing

Abstract: Generating test inputs (Fuzzing) for software gets much easier if one knows the input language of the software under test. In this talk, I present novel game-changing methods for (1) inferring complex input languages statically via symbolic analysis, enabling fuzzers to cover the full input space with 100% precision and recall; (2) specifying input languages, using novel combinations of grammars and constraints that cover syntax and semantics; (3) applying these techniques on highly complex input domains such as XML, allowing to exhaustively test business systems; and (4) automatically learning models from programs that fully replicate their input/output behavior, leveraging generated tests. Includes live demos!

图片名称 Bio: Andreas Zeller is faculty at the CISPA Helmholtz Center for Information Security and professor for Software Engineering at Saarland University. His research on automated debugging, mining software archives, specification mining, and security testing has won several awards for its impact in academia and industry. Zeller is an ACM Fellow, holds an ACM SIGSOFT Outstanding Research Award, and has won two ERC Advanced Grants, Europe’s highest funding for individual researchers.

Keynote 2: Prof. Tao Xie: Development of System Software Stack for RISC-V+AI Computility

Abstract: In recent years, the RISC-V open ISA has gained much progress rapidly and has become a focus of international technology competition. It has also become an effective way to consolidate industrial development consensus through open source and build a global industrial computility ecosystem. Although Nvidia’s GPUs and CUDA software ecosystem currently dominate the global AI computing market, the industry urgently hopes to establish a new software ecosystem to break through CUDA ecosystem barriers. A gradually formed consensus is to use RISC-V AI chips as a common ground, unite related companies and universities/research institutes to jointly develop ISA AI extension standards in an open source and open manner, and cooperate in the development of an open-source AI system software stack on top of these standards. This presentation discusses this direction, its significant opportunities, and the strategies for addressing the faced challenges.

Bio: Tao Xie, Peking University Chair Professor, Chair of the Department of Software Science and Engineering in the School of Computer Science at Peking University, a Deputy Director of the Key Lab of High Confidence Software Technologies, Ministry of Education. He was a Full Professor at the Department of Computer Science, the University of Illinois at Urbana-Champaign (UIUC), USA. He is a Foreign Member of Academia Europaea, and a Fellow of ACM, IEEE, AAAS, and China Computer Federation (CCF). He serves as Director of CCF Technical Committee of System Software (TCSS), Chair of RISC-V+AI Computility Ecosystem (RACE) Committee, and Chair of RISC-V International AI/ML SIG.

Keynote 3: Dr. Hongxia Yang: Edge GenAI: Pioneering the Next Phase of AI Evolution

Abstract: Edge AI is transforming artificial intelligence by enhancing cost efficiency, energy conservation, privacy, and personalized experiences. Our research focuses on edge-based Generative AI (GenAI), targeting specialized reasoning and planning applications to potentially surpass benchmarks set by industry leaders like OpenAI.
This presentation will spotlight three pivotal technologies essential for the success of edge Generative AI (GenAI): the Unified GenAI Distillation Paradigm, Low Resource Inference and Learning, and Multimodal Reasoning and Planning. We will introduce the Single-step Distillation (SiD), an innovative approach that transforms complex pretrained models into efficient generators. This method notably reduces computational demands by 60% through a score-matching loss minimization technique, representing a significant advancement in GenAI distillation paradigms. Addressing challenges in low-resource environments, we will unveil our novel LEGO architecture—comprising modular ‘LEGO blocks’ designed to build multiscale Transformers. This architecture significantly reduces GPU load and cuts sampling times by 60%. Additionally, we will discuss our strategies for Multimodal Large Language Models (MLLM), focusing on aligning model representations across diverse data modalities. Our leading method, InfiMM, utilizes smaller-scale models within the Flamingo architecture and incorporates autoregressive (AR) techniques in the Vision Language-connector to enhance performance across various modalities.
Join us to explore how these advancements are set to redefine edge GenAI, making it more accessible and effective for practical applications.

Bio: Dr. Hongxia Yang, with over 15 years of experience as an AI scientist, specializes in large-scale machine learning, data mining, and deep learning. Throughout her career, she has developed 10 significant algorithmic systems, improving the operations of various enterprises. Her research includes pre-trained models, big data analytics, and the practical deployment of large language model (LLM) systems in real settings. Dr. Yang has published more than 100 top-tier papers, amassed over 8,500 citations with an H-index of 41, and holds over 50 patents. She has received several awards, including the 2019 SAIL Award at the World Artificial Intelligence Conference and the 2020 National Science and Technology Progress Award, China’s top tech accolade. Named one of Forbes China’s Top 50 Women in Tech in 2022 and AI 2000 Most Influential Scholar Award in 2023-2024, Dr. Yang has held prominent roles at ByteDance US, Alibaba Group, Yahoo! Inc, and IBM T.J. Watson Research Center. She earned her PhD from Duke University and her B.S. from Nankai University.

Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 24 Jul

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:30 - 09:00
08:30
30m
Day opening
Opening
Research Track

09:00 - 10:00
09:00
60m
Keynote
Keynote 1: Advances in Language-Based Testing
Research Track
Andreas Zeller CISPA Helmholtz Center for Information Security
Pre-print
11:00 - 11:20
11:20 - 12:35
Session 1: AI for Software EngineeringResearch Track / Tool Demonstration Track / New Idea Track at Main Conference Room
Chair(s): Yongqiang Tian The Hong Kong University of Science and Technology
11:20
15m
Full-paper
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements
Research Track
Kuo Chi , Chuanyi Li Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University
11:35
15m
Full-paper
CRABS-former: Cross-Architecture Binary Code Similarity Detection based on Transformer
Research Track
Yuhong Feng Shenzhen University, Haoran Li Shenzhen University, Yixuan Cao ShenZhen University, Yufeng Wang ShenZhen University, Haiyue Feng College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China
11:50
15m
Full-paper
On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference
Research Track
Senrong Xu , Jiamei Shen , Yunfang Li , Yuan Yao Nanjing University, Ping Yu , Feng Xu Nanjing University, Xiaoxing Ma Nanjing University
12:05
15m
Full-paper
An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering Tasks
Research Track
Wenjun Liang Nanjing University of Aeronautics and Astronautics, China, Guanping Xiao Nanjing University of Aeronautics and Astronautics
12:20
15m
Full-paper
LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repair
Research Track
Xingpeng Liu , Hengzhu Liu , Xiaodong Yi , Ji Wang School of Computer, National University of Defense Technology, China
12:35 - 14:30
14:30 - 15:30
14:30
60m
Keynote
Keynote 3 : Edge GenAI: Pioneering the Next Phase of AI Evolution
Research Track
Hongxia Yang The Hong Kong Polytechnic University
15:30 - 15:50
15:50 - 16:50
Session 2: Software Testing and Quality AssuranceResearch Track / New Idea Track at Main Conference Room
Chair(s): Yepang Liu Southern University of Science and Technology
15:50
15m
Full-paper
Repairing Obsolete GUI Test Scripts for Android Applications with Exploration and Backtracking
Research Track
Ruihua Ji Nanjing University, Zhengxuan Qian , Zhong Li , Xiaoqing Zhu Nanjing University, Yu Pei The Hong Kong Polytechnic University, Minxue Pan Nanjing University, Tian Zhang Nanjing University
16:05
15m
Full-paper
Optimizing Search-Based Unit Test Generation with Large Language Models: An Empirical Study
Research Track
Danni Xiao , Yimeng Guo Nanjing University, Yanhui Li Nanjing University, Lin Chen Nanjing University
16:20
15m
Short-paper
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication
New Idea Track
Yin Wang , Ming Fan Xi'an Jiaotong University, Xicheng Zhang , Jifei Shi , Zhaoyu Qiu , Haijun Wang Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
16:35
15m
Full-paper
ObjTest: Object-Level Mutation for Testing Object Detection Systems
Research Track
Zixi Liu Nanjing University, Yang Feng Nanjing University, Jiali Xu , Baowen Xu
16:50 - 18:05
Session 3: Software Vulnerability and SecurityResearch Track at Main Conference Room
Chair(s): Cuiyun Gao Harbin Institute of Technology
16:50
15m
Full-paper
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software
Research Track
Junwei Zhang Zhejiang University, Zhongxin Liu Zhejiang University, Lingfeng Bao Zhejiang University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xing Hu Zhejiang University, Xin Xia Huawei Technologies
17:05
15m
Full-paper
MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention
Research Track
Cheng Weng , Yihao Qin , Bo Lin National University of Defense Technology, Pei Liu , Liqian Chen National University of Defense Technology, China
17:20
15m
Full-paper
Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study
Research Track
Yanzhong He Wuhan University of Technology, Guancheng Lin , Xiaoxue Ma City University of Hong Kong, Jacky Keung City University of Hong Kong, Cheng Tan Wuhan University of Technology, Wenhua Hu , Fuyang Li Wuhan University of Technology
17:35
15m
Full-paper
DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection
Research Track
17:50
15m
Full-paper
T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach
Research Track
Pei Liu , Bo Lin National University of Defense Technology, Yihao Qin National University of Defense Technology, Cheng Weng , Liqian Chen National University of Defense Technology, China
18:30 - 20:00
Conference Banquet Research Track at Banquet Hall

Thu 25 Jul

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:00
Session 4: Code Analysis and OptimizationResearch Track / New Idea Track at Main Conference Room
Chair(s): Yanlin Wang Sun Yat-sen University
09:00
15m
Full-paper
Structure-Sensitive Pointer Analysis for Multi-structure Objects
Research Track
Xun An Institute of Information Engineering, Chinese Academy of Sciences, Xiaoqi Jia Institute of Information Engineering, Chinese Academy of Sciences, Haichao Du Institute of Information Engineering, Chinese Academy of Sciences, Yamin Xie
09:15
15m
Short-paper
Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning
New Idea Track
09:30
15m
Full-paper
Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation
Research Track
Junwei Zeng Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Weiwei Li , Zhiqiu Huang Nanjing University of Aeronautics and Astronautics
09:45
15m
Full-paper
Accelerating Static Null Pointer Dereference Detection with Parallel Computing
Research Track
Runlin Xu National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Haifang Zhou National University of Defense Technology, Luohui Chen National University of Defense Technology, Ruyi Zhang , Yuanliang Zhang , Wei Xiao
10:00 - 11:00
Session 5: Software Modeling and DevelopmentResearch Track at Main Conference Room
Chair(s): Jingxuan Zhang Nanjing University of Aeronautics and Astronautics
10:00
15m
Full-paper
A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle Swarm
Research Track
Yunwei Dong Northwestern Polytechnical University, School of Computer Science and Engineering, Zeshan Li , Ruiheng Zhang , Rubing Huang Macau University of Science and Technology (M.U.S.T.), Tao Wang
10:15
15m
Full-paper
DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSL
Research Track
Jie Hu , Yaozhong Zhang , Xiujuan Qin , Lvlun Wei , Fangwe Chen , Shmuel Tyszberowicz The Academic College of Tel-Aviv Yaffo, Mingyue Zhang Southwest University, Bo Liu Southwest University
10:30
15m
Full-paper
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels
Research Track
Dong Yang , Hao Shi , Wei Dong National University of Defense Technology, Yanqi Dong , Yong Zhang
10:45
15m
Full-paper
CLUE: Customizing clustering techniques using machine learning for software modularization
Research Track
Fanyi Meng , Ying Wang Northeastern University, Chun Yong Chong Monash University Malaysia, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
11:00 - 11:20
11:20 - 12:20
Session 6: Code Generation and TransformationResearch Track at Main Conference Room
Chair(s): Jialun Cao Hong Kong University of Science and Technology
11:20
15m
Full-paper
RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening
Research Track
Yifan Li , Ensheng Shi Xi’an Jiaotong University, Dewu Zheng , Kefeng Duan , Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University
11:35
15m
Full-paper
Murphi2Chisel: A Protocol Compiler from Murphi to Chisel
Research Track
Cai Zhenghai , Yongjian Li Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China, Yongxin Zhao
11:50
15m
Full-paper
CCAF: Learning Code Change via AdapterFusion
Research Track
Wentao Zou , Zongwen Shen , Jidong Ge Nanjing University, Chuanyi Li Nanjing University, Bin Luo Nanjing University
12:05
15m
Full-paper
ExceRef: Automatically Refactoring for Exception Handling
Research Track
Yang Zhang Hebei University of Science and Technology, Yuan Xue
12:20 - 14:30
14:30 - 15:30
Session 7: Software Architecture and MicroservicesResearch Track / New Idea Track at Main Conference Room
Chair(s): Yilong Yang Beihang University
14:30
15m
Full-paper
Mono2MS: Deep Fusion of Multi-Source Features for Partitioning Monolith into Microservices
Research Track
Geng Chen , Chenlin Li , Shmuel Tyszberowicz The Academic College of Tel-Aviv Yaffo, Zhiming Liu Southwest University, Bo Liu Southwest University
14:45
15m
Full-paper
A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model
Research Track
Xiaojun Xu , ChengHao Cai , Xiuqi Yang Beijing Institute of Technology, Zhuofan Xu , Jingjing Hu , Jing Sun School of Computer Science, University of Auckland
15:00
15m
Short-paper
HGNN4Perf: Detecting Performance Optimization Opportunities via Hypergraph Neural Network
New Idea Track
Mingquan Fu , Minjie Wei , Minglang Qiao , Peng Ji , Zhihao Deng , Di Cui Xidian University, Yutong Zhao University of Central Missouri
15:15
15m
Full-paper
CTuner: Automatic NoSQL Database Tuning with Causal Reinforcement Learning
Research Track
Genting Mai Sun Yat-sen University, Zilong He Sun Yat-sen University, Guangba  Yu Sun Yat-sen University, Zhiming Chen Sun Yat-sen University, Pengfei Chen Sun Yat-sen University
15:30 - 15:50
15:50 - 16:50
Session 8: IoT and Edge ComputingResearch Track / New Idea Track at Main Conference Room
Chair(s): Ying Wang Northeastern University
15:50
15m
Full-paper
A Lightweight Dynamic QoS Optimization Strategy for Satellite IoT Networks
Research Track
Dongchao Ma , Xiaohe Zhao , Sitian Huang , Yu Zhang School of Information Technology, Ruiqi Wang School of Information Technology, Li Ma School of Information Technology
16:05
15m
Short-paper
Intelligent Interference Information Fusion for Security of UAV Forest Remote Sensing Image Detection
New Idea Track
16:20
15m
Full-paper
Energy-Aware Satellite-Ground Co-Inference via Layer-Wise Processing Schedule Optimization
Research Track
YijieChen , Qiyang Zhang , Ruolin Xing , Yuanzhe Li , Xiao Ma , Chaoxin Yu , Yiran Zhang , Ao Zhou , Shangguang Wang Beijing University of Posts and Telecommunications
16:35
15m
Full-paper
NEST: Node with Statistics Tree for IoT Data Persistence and Real-time Queries
Research Track
Jiahua Huang , Chun Cao State Key Laboratory for Novel Software Technology, Nanjing University, Jun Ma Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
18:30 - 21:00
Conference DinnerResearch Track at Macau Tower

Fri 26 Jul

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

09:00 - 10:00
Session 9: System Performance and Resource ManagementResearch Track at Main Conference Room
Chair(s): Ming Fan Xi'an Jiaotong University
09:00
15m
Full-paper
IOGuard: Software-Based I/O Page Fault Handling with One CPU Core
Research Track
Yiyuan Dong Shanghai Jiao Tong University, Zeyu Mi
09:15
15m
Full-paper
Global-State Aware Automatic NUMA Balancing
Research Track
09:30
15m
Full-paper
Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach
Research Track
09:45
15m
Full-paper
Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility
Research Track
Yifan Zhao Shanghai Jiao Tong University, Tong Xin , Mingkai Dong
10:00 - 11:00
Session 10: Software Reliability and MaintenanceResearch Track at Main Conference Room
Chair(s): Rubing Huang Macau University of Science and Technology (M.U.S.T.)
10:00
15m
Full-paper
Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm
Research Track
Sheng Han North Minzu University, Qiang Han North Minzu University, Yixin Qiao North Minzu University, Kehan Xue North Minzu University, Zhichao Shi North Minzu University
10:15
15m
Full-paper
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java
Research Track
Yi Hou Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zhijun Wang , Liuming Wang , Shuguang Chen , Yihan Wang , Lei Sang , Haijun Wang Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
10:30
15m
Full-paper
Mining Fix Patterns for System Interaction Bugs
Research Track
di liu , Yanyan Yan Nanjing University, Hongcheng Fan Nanjing University, Yang Feng Nanjing University
10:45
15m
Full-paper
Towards Life-long Software Self-validation in Production
Research Track
Daohan Qu , Chaoyi Zhao , Yanyan Jiang Nanjing University, Chang Xu Nanjing University
11:00 - 11:20
11:20 - 12:20
Session 11: Anomaly Detection and SecurityResearch Track at Main Conference Room
Chair(s): Yang Feng Nanjing University
11:20
15m
Full-paper
LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series
Research Track
Haoyang Zeng , Ningjiang Chen Guangxi University, Tao Deng
11:35
15m
Full-paper
CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP
Research Track
11:50
15m
Full-paper
A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems
Research Track
Chen Wang , Tao Huang , Min Li , Pengfei Chen Sun Yat-sen University, Zhiwen Chen
12:05
15m
Full-paper
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes
Research Track
Xiaoyu Yi , Guolei Li Shanghai Jiao Tong University, Wenkai Huang Shanghai Jiao Tong University, Xi Lin Shanghai Jiao Tong University, Jianhua Li Shanghai JiaoTong University, Yuchen Liu North Carolina State University
12:20 - 14:30
14:30 - 15:45
Session 12: Emerging Technologies and ApplicationsResearch Track at Main Conference Room
Chair(s): Jiachi Chen Sun Yat-sen University
14:30
15m
Full-paper
An Exploratory Study on God Header Files in Open-Source C Projects
Research Track
Yue Wang , Wenhui Chang , Yanzhen Zou Peking University, Bing Xie Peking University
14:45
15m
Full-paper
Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots
Research Track
15:00
15m
Full-paper
Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching
Research Track
Jiale Hao , Meng Wang Hebei university, Hong Zhang
15:15
15m
Full-paper
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain
Research Track
Kai Ma , Zhuo Wang , Yanjie Zhao , Haoyu Wang Huazhong University of Science and Technology
15:30
15m
Full-paper
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading
Research Track
Shijian Chen , Jiachi Chen Sun Yat-sen University, Jiangshan Yu Monash University, Xiapu Luo The Hong Kong Polytechnic University, Yanlin Wang Sun Yat-sen University
15:45 - 16:10
16:10 - 17:10
Session 13: Software Tools and DemonstrationsTool Demonstration Track at Main Conference Room
Chair(s): Qiang Han North Minzu University
16:10
12m
Demonstration
laTAPE: Location-Aware Programming and Executing Trigger-Action Rules
Tool Demonstration Track
Bei Deng , Bingkun Sun Fudan University, Liwei Shen
16:22
12m
Demonstration
MobileEdgeSim: A Tool for Simulating Microservice-Oriented Mobile Edge Computing
Tool Demonstration Track
Yuqi Zhao , Shiyu He , Qibo Li , Yuchen Pei , Zhentao Li , Yutao Ma Central China Normal University
16:34
12m
Demonstration
RM2EIS: A Tool for Auto-Generation of EIS from Requirements Model
Tool Demonstration Track
Yihui Jian , Yilong Yang Beihang University, Shaohong Zhu , Zhi Li Guangxi Normal University, Li Zhang Beihang University
16:46
12m
Demonstration
WACP: A Performance Profiling Tool for WebAssembly-Python Interoperability
Tool Demonstration Track
Yudan Long , Yuxin Su Sun Yat-sen University, Zigui Jiang Sun Yat-sen University
16:58
12m
Demonstration
VisRepo: A Visual Retrieval Tool for Large-Scale Open-Source Projects
Tool Demonstration Track
Xiaoqi Yue , Chao Liu Chongqing University, Neng Zhang Sun Yat-sen University, Haibo Hu Chongqing University, Xiaohong Zhang Chongqing University
17:10 - 17:30
17:10
20m
Day closing
Closing
Research Track

Accepted Papers

Title
A Bayesian LSTM Based Active Anomaly Detection Service for Large Online Systems
Research Track
Accelerating Static Null Pointer Dereference Detection with Parallel Computing
Research Track
A Lightweight Dynamic QoS Optimization Strategy for Satellite IoT Networks
Research Track
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements
Research Track
An Exploratory Evaluation of Large Language Models Using Empirical Software Engineering Tasks
Research Track
An Exploratory Study on God Header Files in Open-Source C Projects
Research Track
A Scenario Model-driven Task Planning Method for Unmanned Aerial Vehicle Swarm
Research Track
A Service-oriented Scheduling Combination Strategy on Cloud Platforms Based on A Dual-Layer QoS Evaluation Model
Research Track
CCAF: Learning Code Change via AdapterFusion
Research Track
CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP
Research Track
CLUE: Customizing clustering techniques using machine learning for software modularization
Research Track
CRABS-former: Cross-Architecture Binary Code Similarity Detection based on Transformer
Research Track
CTuner: Automatic NoSQL Database Tuning with Causal Reinforcement Learning
Research Track
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain
Research Track
Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation
Research Track
Developing Burr-XII NHPP-based software reliability growth model using Expectation Conditional Maximization Algorithm
Research Track
DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection
Research Track
DSL-MoLab: supporting model-based development of TDL-specific systems enabled by DSL
Research Track
Efficient Deadlock Detection in MPI Programs with Path Compression and Focus Matching
Research Track
Energy-Aware Satellite-Ground Co-Inference via Layer-Wise Processing Schedule Optimization
Research Track
Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study
Research Track
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java
Research Track
ExceRef: Automatically Refactoring for Exception Handling
Research Track
Global-State Aware Automatic NUMA Balancing
Research Track
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software
Research Track
IOGuard: Software-Based I/O Page Fault Handling with One CPU Core
Research Track
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes
Research Track
LLM-Enhanced Theorem Proving with Term Explanation and Tactic Parameter Repair
Research Track
LSTD-MTS: Anomaly Detection with Capturing Long-Term Spatio-Temporal Dependence for Multi-dimensional Time Series
Research Track
MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention
Research Track
Mining Fix Patterns for System Interaction Bugs
Research Track
Mono2MS: Deep Fusion of Multi-Source Features for Partitioning Monolith into Microservices
Research Track
Murphi2Chisel: A Protocol Compiler from Murphi to Chisel
Research Track
NEST: Node with Statistics Tree for IoT Data Persistence and Real-time Queries
Research Track
ObjTest: Object-Level Mutation for Testing Object Detection Systems
Research Track
On the Heterophily of Program Graphs: A Case Study of Graph-based Type Inference
Research Track
Optimizing Search-Based Unit Test Generation with Large Language Models: An Empirical Study
Research Track
Parer: Boosting EROFS Image Creation With Parallelism and Reproducibility
Research Track
Reduce Detection Latency of YOLOv5 to Prevent Real-Time Tracking Failures for Lightweight Robots
Research Track
Repairing Obsolete GUI Test Scripts for Android Applications with Exploration and Backtracking
Research Track
RepoMinCoder: Improving Repository-Level Code Generation Based on Information Loss Screening
Research Track
Resource-Aware Task Allocation on Mixed-Criticality Systems: a Task-Splitting Approach
Research Track
Structure-Sensitive Pointer Analysis for Multi-structure Objects
Research Track
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels
Research Track
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading
Research Track
Towards Life-long Software Self-validation in Production
Research Track
T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach
Research Track

Call for Papers

Internet is open, dynamic, and meets a constantly changing environment. These characteristics impose new requirements on software over internet. The goals or values of software paradigm is to better utilize hardware capabilities or runtime features, as well as to provide a more expressive and natural computing model from the perspective of application domain. In that sense, software paradigm can be considered as a reflection of the runtime environment and application domain. When the dominant network environment changed from Intranet to internet, software paradigm shifts from object-oriented to component-based and service-oriented. Therefore, software paradigm is very related to environment changes such as hardware and human itself. The new software paradigm is needed for Internet computer, and it is called as Internetware. Internetware is constructed by a set of autonomic software entities distributed over the Internet, and a set of connectors enabling the collaborating among these entities in various manners.

Current years, intelligent information fusion becomes important approach applied in an extensive computing field. Researchers also tend to utilize AI technologies to develop a series of automated tools for improving the efficiency and performance of ubiquitous computing in Internetware. Increased computational power, advanced machine learning techniques, and access to very large-scale data have led to a significant transition into the emergence of Large Language Models (LLMs). LLMs are blurring the line between human and machine-produced language, thus can be successfully applied in ubiquitous computing in Internetware. In the future human-cyber-physical ternary ubiquitous computing, there are a lot of new patterns and scenarios. LLMs can provide the good solutions for analyzing the data resources, hardware, and applications so that increasing the performance of ubiquitous computing in Internetware.

This symposium aims to provide an interactive forum where researchers and professionals from multiple disciplines and domains meet and exchange ideas to explore and address the challenges brought by Internetware.

Internetware 2024 will be held July 24-26 in Macau SAR, China. We solicit submissions describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research related to Internetware. Topics of interests include but are not limited to:

  • Novel software paradigm for Internetware
  • Modeling and implementation of Internetware
  • Research and Applications in Ubiquitous Operating Systems
  • Human Aspects in Ubiquitous Operating Systems
  • Human-Cyber-Physical ternary ubiquitous computing applied in Internetware
  • Artificial intelligence of things (AIoT)
  • Operating system and Internetware
  • Intelligent information fusion
  • Requirements engineering for Internetware
  • Software analysis, verification, and testing
  • Mining software repositories
  • Software dependability, trustworthiness and confidence
  • Software architecture and design
  • Crowd-based methods, techniques and tools for Internetware
  • Social-technical models and techniques
  • Software ecosystem practices and experiences
  • Software models and techniques for Internet-based systems such as Cloud Computing, Service Computing, Social computing, Mobile Internet, Internet of Things, and Cyber-Physical Systems
  • Software engineering for/with Big data
  • Software engineering for/with Artificial Intelligence

How to Submit

All submissions must not exceed 10 pages for all text, figures, tables, and references. All submissions must be in English and in PDF format. Submissions that do not comply with the above instructions will be desk rejected without review. Please use the ACM Primary Article Template (double column), as can be obtained from the ACM Proceedings Template pages.

Submissions to internetware 2024 conference that meet the above requirements can be made via the internetware 2024 submission site (https://internetware2024.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing.

Review and Evaluation Criteria

The Internetware 2024 conference will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

  • Authors’ names must be omitted from the submission.
  • All references to the author’s prior work should be in the third person.
  • While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to Internetware 2024.
  • During review, authors should not publicly use the submission title.

Internetware 2024 will follow the ACM SIGSOFT rules on Conflicts of Interest and Confidentiality of Submissions, and all authors, reviewers, organizers are expected to uphold the ACM Code of Conduct.