skip to main content
10.1145/2786805.2786852acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software

Published:30 August 2015Publication History

ABSTRACT

Configuration problems are not only prevalent, but also severely impair the reliability of today's system software. One fundamental reason is the ever-increasing complexity of configuration, reflected by the large number of configuration parameters ("knobs"). With hundreds of knobs, configuring system software to ensure high reliability and performance becomes a daunting, error-prone task. This paper makes a first step in understanding a fundamental question of configuration design: "do users really need so many knobs?" To provide the quantitatively answer, we study the configuration settings of real-world users, including thousands of customers of a commercial storage system (Storage-A), and hundreds of users of two widely-used open-source system software projects. Our study reveals a series of interesting findings to motivate software architects and developers to be more cautious and disciplined in configuration design. Motivated by these findings, we provide a few concrete, practical guidelines which can significantly reduce the configuration space. Take Storage-A as an example, the guidelines can remove 51.9% of its parameters and simplify 19.7% of the remaining ones with little impact on existing users. Also, we study the existing configuration navigation methods in the context of "too many knobs" to understand their effectiveness in dealing with the over-designed configuration, and to provide practices for building navigation support in system software.

References

  1. Apache HTTP Server Version 2.4 Documentation. http:// httpd.apache.org/docs/2.4/.Google ScholarGoogle Scholar
  2. Apache HTTP Server Version 2.4 Documentation (LogLevel Directive). http://httpd.apache.org/docs/2.4/mod/ core.html#loglevel.Google ScholarGoogle Scholar
  3. Cloudera Manager. http://www.cloudera.com/ content/cloudera/en/products-and-services/ cloudera-enterprise/cloudera-manager.html.Google ScholarGoogle Scholar
  4. Cox: A configuration navigation tool and library for a thousand of knobs. https://github.com/tianyin/cox.Google ScholarGoogle Scholar
  5. Database Administrators. http://dba.stackexchange. com/.Google ScholarGoogle Scholar
  6. MySQL 5.6 Reference Manual (Online Version). http:// dev.mysql.com/doc/refman/5.6/en/index.html.Google ScholarGoogle Scholar
  7. MySQL 5.6 Reference Manual (PDF Version). http:// downloads.mysql.com/docs/refman-5.6-en.pdf.Google ScholarGoogle Scholar
  8. Pro Webmasters. http://webmasters.stackexchange. com/.Google ScholarGoogle Scholar
  9. ServerFault. http://serverfault.com/.Google ScholarGoogle Scholar
  10. StackOverflow. http://stackoverflow.com/.Google ScholarGoogle Scholar
  11. The Apache Lucene Project. https://lucene.apache. org/.Google ScholarGoogle Scholar
  12. E. Anderson, M. Hobbs, K. Keeton, S. Spence, M. Uysal, and A. Veitch. Hippodrome: Running Circles Around Storage Administration. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST’02), Berkeley, CA, USA, January 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Attariyan, M. Chow, and J. Flinn. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI’12), Hollywood, CA, USA, October 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Attariyan and J. Flinn. Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI’10), Vancouver, BC, Canada, October 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Barrett, E. Kandogan, P. P. Maglio, E. Haber, L. A. Takayama, and M. Prabaker. Field Studies of Computer System Administrators: Analysis of System Management Tools and Practices. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW’04), Chicago, Illinois, USA, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. A. Barroso and U. Hölzle. The Datacenter as a Computer: An Introduction to the Design of Warehouse-scale Machines. Morgan and Claypool Publishers, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. S. Chase, D. C. Anderson, P. N. Thakar, A. M. Vahdat, and R. P. Doyle. Managing Energy and Server Resources in Hosting Centers. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP’01), Chateau Lake Louise, Banff, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Duan, V. Thummala, and S. Babu. Tuning Database Configuration Parameters with iTuned. In Proceedings of the 35th International Conference on Very Large Data Bases (VLDB’09), Lyon, France, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Dumlu, C. Yilmaz, M. B. Cohen, and A. Porter. Feedback driven adaptive combinatorial testing. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’11), Toronto, ON, Canada, July 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. S. Gunawi, M. Hao, T. Leesatapornwongsa, T. Patana-anake, T. Do, J. Adityatama, K. J. Eliazar, A. Laksono, J. F. Lukman, V. Martin, and A. D. Satria. What bugs live in the cloud? a study of 3000+ issues in cloud systems. In Proceedings of the 5th ACM Symposium on Cloud Computing (SoCC’14), Seattle, WA, USA, November 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. M. Haber and J. Bailey. Design Guidelines for System Administration Tools Developed through Ethnographic Field Study. In Proceedings of the 2007 ACM Conference on Human Interfaces to the Management of Information Technology (CHIMIT’07), Cambridge, MA, USA, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Henard, M. Papadakis, M. Harman, and Y. L. Traon. Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15), Firenze, Italy, May 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Henard, M. Papadakis, G. Perrouin, J. Klein, P. Heymans, and Y. L. Traon. Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering (TSE), 40(7):650–670, July 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Hervieu, B. Baudry, and A. Gotlieb. PACOGEN : Automatic Generation of Pairwise Test Configurations from Feature Models. In Proceedings of the 22nd IEEE International Symposium on Software Reliability Engineering (ISSRE’11), Hiroshima, Japan, November 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Hubaux, Y. Xiong, and K. Czarnecki. A User Survey of Configuration Challenges in Linux and eCos. In Proceedings of 6th International Workshop on Variability Modelling of Software-intensive Systems (VaMoS’12), Leipzig, Germany, January 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Jin, M. B. Cohen, X. Qu, and B. Robinson. PrefFinder: Getting the Right Preference in Configurable Software Systems (Supplementary Data). http://cse.unl.edu/ ~myra/artifacts/PrefFinder_2014/.Google ScholarGoogle Scholar
  27. D. Jin, M. B. Cohen, X. Qu, and B. Robinson. PrefFinder: Getting the Right Preference in Configurable Software Systems. In Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE’14), Västerås, Sweden, September 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Jin, X. Qu, M. B. Cohen, and B. Robinson. Configurations Everywhere: Implications for Testing and Debugging in Practice. In Proceedings of the 36th International Conference on Software Engineering (ICSE’14), Hyderabad, India, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. E. Kandogan and E. M. Haber. Security Administration Tools and Practices. Security and Usability, O’Reilly Media, Inc., August 2005.Google ScholarGoogle Scholar
  30. L. Keller, P. Upadhyaya, and G. Candea. ConfErr: A Tool for Assessing Resilience to Human Configuration Errors. In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’08), Anchorage, Alaska, USA, June 2008.Google ScholarGoogle ScholarCross RefCross Ref
  31. S. Kendrick. What Takes Us Down? USENIX ;login:, 37(5):37–45, October 2012.Google ScholarGoogle Scholar
  32. E. Kiciman and Y.-M. Wang. Discovering Correctness Constraints for Self-Management of System Configuration. In Proceedings of the 1st International Conference on Autonomic Computing (ICAC’04), New York, NY, USA, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. H. P. Kim, D. Marinov, S. Khurshid, and D. Batory. SPLat: Lightweight Dynamic Analysis for Reducing Combinatorics in Testing Configurable Systems. In Proceedings of the 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’13), Saint Petersburg, Russia, August 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Larsson and I. Crnkovic. Configuration Management for Component-based Systems. In Proceedings of the 23rd International Conference on Software Engineering (ICSE’01), Toronto, Ontario, Canada, May 2001.Google ScholarGoogle Scholar
  35. L. Y. Liang. Linkedin.com inaccessible on Thursday because of server misconfiguration. 2013. http://www. straitstimes.com/breaking-news/singapore/ story/linkedincom-inaccessible-thursdaybecause-server-misconfiguration-2013.Google ScholarGoogle Scholar
  36. S. Lohar, S. Amornborvornwong, A. Zisman, and J. Cleland-Huang. Improving Trace Accuracy through Data-Driven Configuration and Composition of Tracing Features. In Proceedings of the 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’13), Saint Petersburg, Russia, August 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. Michel, A. Hubaux, V. Ganesh, and P. Heymans. An SMT-based Approach to Automated Configuration. In Proceedings of the 10th International Workshop on Satisfiability Modulo Theories (SMT’12), Manchester, UK, June 2012.Google ScholarGoogle Scholar
  38. G. A. Miller. WordNet: A Lexical Database for English. Communications of the ACM, 38(11):39–41, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. S. Nadi, T. Berger, C. Kästner, and K. Czarnecki. Mining Configuration Constraints: Static Analyses and Empirical Results. In Proceedings of the 36th International Conference on Software Engineering (ICSE’14), Hyderabad, India, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. D. Oppenheimer, A. Ganapathi, and D. A. Patterson. Why Do Internet Services Fail, and What Can Be Done About It? In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS’03), Seattle, WA, USA, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. C. Perrow. Normal Accidents: Living with High-Risk Technologies. Basic Books, 1984.Google ScholarGoogle Scholar
  42. X. Qu, M. Acharya, and B. Robinson. Impact Analysis of Configuration Changes for Test Case Selection. In Proceedings of the 22nd IEEE International Symposium on Software Reliability Engineering (ISSRE’11), Hiroshima, Japan, November 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. X. Qu, M. B. Cohen, and G. Rothermel. Configuration-Aware Regression Testing: An Empirical Study of Sampling and Prioritization. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’08), Seattle, WA, USA, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. A. Rabkin and R. Katz. Precomputing Possible Configuration Error Diagnosis. In Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE’11), Lawrence, KS, USA, November 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. A. Rabkin and R. Katz. Static Extraction of Program Configuration Options. In Proceedings of the 33th International Conference on Software Engineering (ICSE’11), Honolulu, Hawaii, USA, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. A. Rabkin and R. Katz. How Hadoop Clusters Break. IEEE Software Magazine, 30(4):88–94, July 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. V. Ramachandran, M. Gupta, M. Sethi, and S. R. Chowdhury. Determining Configuration Parameter Dependencies via Analysis of Configuration Data from Multi-tiered Enterprise Applications. In Proceedings of the 6th International Conference on Autonomic Computing and Communications (ICAC’09), Barcelona, Spain, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. J. Reason. Human Error. Cambridge University Press, October 1990.Google ScholarGoogle Scholar
  49. E. Reisner, C. Song, K.-K. Ma, J. S. Foster, and A. Porter. Using Symbolic Evaluation to Understand Behavior in Configurable Software Systems. In Proceedings of the 32th International Conference on Software Engineering (ICSE’10), Cape Town, South Africa, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. B. Robinson and L. White. Testing of User-Configurable Software Systems Using Firewalls. In Proceedings of the 19th IEEE International Symposium on Software Reliability Engineering (ISSRE’08), Seattle/Redmond, WA, USA, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. A. S. Sayyad, J. Ingram, T. Menzies, and H. Ammar. Scalable Product Line Configuration: A Straw to Break the Camel’s Back. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE’13), November 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. A. S. Sayyad, T. Menzies, and H. Ammar. On the Value of User Preferences in Search-Based Software Engineering: A Case Study in Software Product Lines. In Proceedings of the 35th International Conference on Software Engineering (ICSE’13), San Francisco, CA, USA, May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Search Engine Watch. How Much is a Google Top Spot Worth? 2010. http://searchenginewatch.com/ article/2050861/How-Much-is-a-Google-Top-Spot-Worth.Google ScholarGoogle Scholar
  54. Search Engine Watch. 53% of Organic Search Clicks Go to First Link. 2012. http://searchenginewatch.com/ article/2050861/How-Much-is-a-Google-Top-Spot-Worth.Google ScholarGoogle Scholar
  55. C. Song, A. Porter, and J. S. Foster. iTree: Efficiently Discovering High-Coverage Configuration Using Interaction Trees. In Proceedings of the 34th International Conference on Software Engineering (ICSE’12), Zurich, Switzerland, June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. C. Song, A. Porter, and J. S. Foster. iTree: Efficiently Discovering High-Coverage Configuration Using Interaction Trees. IEEE Transactions on Software Engineering (TSE), 40(3):251–265, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. J. Spool. Do users change their settings? 2011. http://www. uie.com/brainsparks/2011/09/14/do-userschange-their-settings/.Google ScholarGoogle Scholar
  58. H. Srikanth, M. B. Cohen, and X. Qu. Reducing Field Failures in System Configurable Software: Cost-Based Prioritization. In Proceedings of the 20th IEEE International Symposium on Software Reliability Engineering (ISSRE’09), Mysuru, Karnataka, India, November 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Y. Sverdlik. Microsoft: Misconfigured Network Device Led to Azure Outage. http://www.datacenterdynamics. com/focus/archive/2012/07/microsoftmisconfigured-network-device-led-azure-outage, 2012.Google ScholarGoogle Scholar
  60. G. Tamura, R. Casallas, A. Cleve, and L. Duchien. QoS Contract Preservation through Dynamic Reconfiguration: A Formal Semantics Approach. Science of Computer Programming, 94(3):301–332, November 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. The Association of Support Professionals. Technical Support Cost Ratios. http://www.asponline.com/tscr.pdf, 2000.Google ScholarGoogle Scholar
  62. The Standish Group. Modernization: Clearing a Pathway to Success. 2010. https://www.standishgroup.com/ sample_research_files/Modernization.pdf.Google ScholarGoogle Scholar
  63. K. Thomas. Thanks, Amazon: The Cloud Crash Reveals Your Importance. 2002. http://www.pcworld.com/ article/226033/thanks_amazon_for_making_ possible_much_of_the_internet.html.Google ScholarGoogle Scholar
  64. N. F. Velasquez, S. Weisband, and A. Durcikova. Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model. In Proceedings of the 22nd Large Installation System Administration Conference (LISA’08), San Diego, CA, USA, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI’04), San Francisco, California, USA, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. T. Wang, M. Harman, Y. Jia, and J. Krinke. Searching for Better Configurations: A Rigorous Approach to Clone Evaluation. In Proceedings of the 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’13), Saint Petersburg, Russia, August 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In Proceedings of the 17th Large Installation Systems Administration Conference (LISA’03), San Diego, CA, USA, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. M. Welsh. What I Wish Systems Researchers Would Work On. 2013. http://matt-welsh.blogspot.com/2013/ 05/what-i-wish-systems-researchers-would.html.Google ScholarGoogle Scholar
  69. A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI’04), San Francisco, California, USA, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Y. Xiong, A. Hubaux, S. She, and K. Czarnecki. Generating Range Fixes for Software Configuration. In Proceedings of the 34th International Conference on Software Engineering (ICSE’12), Zurich, Switzerland, June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. Range Fixes: Interactive Error Resolution for Software Configuration. IEEE Transactions on Software Engineering (TSE), December 2014.Google ScholarGoogle Scholar
  72. T. Xu, J. Zhang, P. Huang, J. Zheng, T. Sheng, D. Yuan, Y. Zhou, and S. Pasupathy. Do Not Blame Users for Misconfigurations. In Proceedings of the 24th Symposium on Operating System Principles (SOSP’13), Farmington, PA, USA, November 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. T. Xu and Y. Zhou. Systems Approaches to Tackling Configuration Errors: A Survey. ACM Computing Surveys (CSUR), 47(4), July 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. C. Yilmaz, M. B. Cohen, and A. A. Porter. Covering Arrays for Efficient Fault Characterization in Complex Configuration Spaces. IEEE Transactions on Software Engineering (TSE), 32(1):1–15, January 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Z. Yin, X. Ma, J. Zheng, Y. Zhou, L. N. Bairavasundaram, and S. Pasupathy. An Empirical Study on Configuration Errors in Commercial and Open Source Systems. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP’11), Cascais, Portugal, October 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. D. Yuan, S. Park, and Y. Zhou. Characterizing Logging Practices in Open-Source Software. In Proceedings of the 34th International Conference on Software Engineering (ICSE’12), Zurich, Switzerland, June 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. D. Yuan, Y. Xie, R. Panigrahy, J. Yang, C. Verbowski, and A. Kumar. Context-based Online Configuration Error Detection. In Proceedings of 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. A. Zeller. Why Programs Fail: A Guide to Systematic Debugging (2nd Edition). Morgan Kaufmann Publishers, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. J. Zhang, L. Renganarayana, X. Zhang, N. Ge, V. Bala, T. Xu, and Y. Zhou. EnCore: Exploiting System Environment and Correlation Information for Misconfiguration Detection. In Proceedings of the 19th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS-XIX), Salt Lake City, UT, USA, March 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. S. Zhang and M. D. Ernst. Automated Diagnosis of Software Configuration Errors. In Proceedings of the 35th International Conference on Software Engineering (ICSE’13), San Francisco, CA, USA, May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. S. Zhang and M. D. Ernst. Which Configuration Option Should I Change? In Proceedings of the 36th Internationl Conference on Software Engineering (ICSE’14), Hyderabad, India, May 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. W. Zheng, R. Bianchini, and T. D. Nguyen. Automatic Configuration of Internet Services. In Proceedings of the 2nd EuroSys Conference (EuroSys’07), Lisbon, Portugal, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. W. Zheng, R. Bianchini, and T. D. Nguyen. MassConf: Automatic Configuration Tuning By Leveraging User Community Information. In Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering (ICPE’11), Karlsruhe, Germany, March 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering
      August 2015
      1068 pages
      ISBN:9781450336758
      DOI:10.1145/2786805

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 August 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate112of543submissions,21%

      Upcoming Conference

      FSE '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader