Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering 2015
DOI: 10.1145/2786805.2786869
|View full text |Cite
|
Sign up to set email alerts
|

Users beware: preference inconsistencies ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 23 publications
1
7
0
Order By: Relevance
“…However, the existing techniques [6], [8], [10], [11] analyze configuration APIs by conducting path-insensitive analysis, which can be somewhat inaccurate and miss incompatible configuration APIs without considering the if-conditions (e.g., Line 6 in Figure 2). Therefore, a path-sensitive analysis is necessary to obtain {A, X , F} by solving path constraints triggering configuration APIs with the constraint solver.…”
Section: B Confdroid Overviewmentioning
confidence: 99%
“…However, the existing techniques [6], [8], [10], [11] analyze configuration APIs by conducting path-insensitive analysis, which can be somewhat inaccurate and miss incompatible configuration APIs without considering the if-conditions (e.g., Line 6 in Figure 2). Therefore, a path-sensitive analysis is necessary to obtain {A, X , F} by solving path constraints triggering configuration APIs with the constraint solver.…”
Section: B Confdroid Overviewmentioning
confidence: 99%
“…Configurations are loaded by reading from an external file or database and storing parameter values in program variables. Mature projects have well-defined application programming interfaces (APIs) for loading configurations [2,12,38,39,40,41,42,43]. All projects evaluated in this paper have such APIs.…”
Section: Configurations and Their Usagementioning
confidence: 99%
“…Researchers have developed various tools to automatically check for errors in software configurations (e.g., [18], [19]). Unlike the configurations found in cloud instances, these tools are mainly geared towards configurations that are represented as key-value pairs, where each key consistently corresponds to a specific configuration parameter.…”
Section: Configuration Analysismentioning
confidence: 99%
“…Such keyvalue pairs can be directly used by the existing configuration analysis tools such as Encore [14] and ConfigV [21]. While existing studies on configuration analysis have mostly focused on configuration stores that do not require data extraction such as Windows Registry (e.g., [26]), or configurations with standard file formats such as XML or JSON (e.g., [19], [27]), most configuration files of cloud applications are kept in human-readable text files that do not use standard file formats. As discused in Sec.…”
Section: Extractionmentioning
confidence: 99%