Software configuration engineering in practice interviews, survey, and systematic literature review

M Sayagh, N Kerzazi, B Adams… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Modern software applications are adapted to different situations (eg, memory limits,
enabling/disabling features, database credentials) by changing the values of configuration …

Challenges and opportunities: an in-depth empirical study on configuration error injection testing

W Li, Z Jia, S Li, Y Zhang, T Wang, E Xu… - Proceedings of the 30th …, 2021 - dl.acm.org
Configuration error injection testing (CEIT) could systematically evaluate software reliability
and diagnosability to runtime configuration errors. This paper explores the challenges and …

ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems

J Li, S Li, K Li, F Luo, H Yu, S Li, X Li - Proceedings of the 46th IEEE …, 2024 - dl.acm.org
A large-scale system contains a huge configuration space because of its large number of
configuration parameters. This leads to a combination explosion among configuration …

Automatic defect categorization based on fault triggering conditions

X **a, D Lo, X Wang, B Zhou - 2014 19th International …, 2014 - ieeexplore.ieee.org
Due to the complexity of software systems, defects are inevitable. Understanding the types of
defects could help developers to adopt measures in current and future software releases. In …

Colua: Automatically predicting configuration bug reports and extracting configuration options

W Wen, T Yu, JH Hayes - 2016 IEEE 27Th international …, 2016 - ieeexplore.ieee.org
Configuration bugs are among the dominant causes of software failures. Software
organizations often use bug tracking systems to manage bug reports collected from …

Hear Me Out: Supporting Citizens to Create Comprehensible Contributions on Urban Participation Platforms

M Borchers, D Soroko, N Tavanapour… - Proceedings of the ACM …, 2024 - dl.acm.org
Urbanization has increased societal tensions and led to the growth of citizen participation in
urban planning, which is often conducted in computer-supported environments and …