Options Matter: Documenting and Fixing Non-Reproducible Builds in Highly-Configurable Systems
GA Randrianaina, DE Khelladi… - 2024 IEEE/ACM 21st …, 2024 - ieeexplore.ieee.org
A critical aspect of software development, build reproducibility, ensures the dependability,
security, and maintainability of software systems. Although several factors, including the …
security, and maintainability of software systems. Although several factors, including the …
Automated program repair for variability bugs in software product line systems
Software product line (SPL) systems are widely employed to develop industrial projects. For
an SPL system, different products/variants are created by combining different subsets of the …
an SPL system, different products/variants are created by combining different subsets of the …
Semantic configuration model with natural transformations
V Wolfengagen, L Ismailova, S Kosikov… - Cognitive Systems …, 2024 - Elsevier
In the present work, efforts have been made to create a configuration-based approach to
knowledge extraction. The notion of granularity is developed, which allows fine-tuning the …
knowledge extraction. The notion of granularity is developed, which allows fine-tuning the …
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations
Software products have many configurations to meet different environments and diverse
needs. Building software with multiple software configurations typically incurs high costs in …
needs. Building software with multiple software configurations typically incurs high costs in …
Does Using Bazel Help Speed Up Continuous Integration Builds?
A long continuous integration (CI) build forces developers to wait for CI feedback before
starting subsequent development activities, leading to time wasted. In addition to a variety of …
starting subsequent development activities, leading to time wasted. In addition to a variety of …
A Holistic Approach for Security Configuration
P Stöckle - 2024 - mediatum.ub.tum.de
Zusammenfassung Problemdomäne Die Standardkonfiguration von Software ist aus
verschiedenen Grunden unsicherer als möglich, z. B. weil der Softwarehersteller bei der …
verschiedenen Grunden unsicherer als möglich, z. B. weil der Softwarehersteller bei der …
Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules
P Stöckle, M Sammereier, B Grobauer… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Insecure default values in software settings can be exploited by attackers to compromise the
system that runs the software. As a countermeasure, there exist security-configuration …
system that runs the software. As a countermeasure, there exist security-configuration …
[PDF][PDF] A Comprehensive Model of Software Configuration.
R Mahdavi Hezaveh - 2022 - repository.lib.ncsu.edu
ABSTRACT MAHDAVI HEZAVEH, REZVAN. A Comprehensive Model of Software
Configuration.(Under the direction of Dr. Laurie Williams). Using feature toggles is a …
Configuration.(Under the direction of Dr. Laurie Williams). Using feature toggles is a …
Subtree Hashing of Tests in Build Systems: Rust Tricorder
C Capitanu - 2023 - diva-portal.org
Software applications are built by teams of developers that constantly iterate over the
codebase. Software projects rely on a build system, which handles the management of …
codebase. Software projects rely on a build system, which handles the management of …
PyroBuildS: Enabling Efficient Exploration of Linux Configuration Space with Incremental Build
Software engineers are acutely aware that the build of software is an essential but resource-
intensive step in any software development process. This is especially true when building …
intensive step in any software development process. This is especially true when building …