{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T23:48:45Z","timestamp":1648770525931},"reference-count":56,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"crossref","award":["61872373","61872375","61672529","61702134"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2021,6]]},"abstract":" The runtime environment and workload of software are constantly changing, requiring users to make appropriate adjustments to accommodate these changes. The runtime configuration, however, as the interface for users to manipulate software behavior often requires domain-specific knowledge to understand. This usually results in users spending a considerable amount of time wading through document and user manuals trying to understand the runtime configuration. In this paper, we study the possibility of understanding the intention of runtime configuration options through their documents, even sometimes it is difficult for users to understand. Based on these studies, we classify the runtime configuration option\u2019s intention into six categories. Accordingly, we design runtime Configuration Intention Classifier (CIC), a supervised approach based on CNN to classify the runtime configuration option\u2019s intention according to its document. CIC integrates the features of runtime configuration names and descriptions according to different levels of granularity and predicts the intention of runtime configuration options accordingly. Extensive experiments show that our approach can achieve an accuracy of 85.6% and outperform nine comparative approaches by up to 16.6% over the dataset we customized. <\/jats:p>","DOI":"10.1142\/s0218194021500236","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:43:23Z","timestamp":1624333403000},"page":"775-802","source":"Crossref","is-referenced-by-count":0,"title":["Deep Understanding of Runtime Configuration Intention"],"prefix":"10.1142","volume":"31","author":[{"given":"Chenglong","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Changsha 410073, P. R. China"}]},{"given":"Haoran","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Changsha 410073, P. R. China"}]},{"given":"Yuanliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Changsha 410073, P. R. China"}]},{"given":"Zhipeng","family":"Xue","sequence":"additional","affiliation":[{"name":"College of Computer Science, National University of Defense Technology, Changsha 410073, P. R. China"}]},{"given":"Qing","family":"Liao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology, Shenzhen 518055, P. R. China"}]},{"given":"JinJing","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System, Beijing 100097, P. R. China"}]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"S0218194021500236BIB001","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409675"},{"key":"S0218194021500236BIB002","author":"Sayagh M.","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194021500236BIB003","volume-title":"Ovum Evaluates: Configuration Management","author":"Burrows C.","year":"1996"},{"key":"S0218194021500236BIB005","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"S0218194021500236BIB006","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"S0218194021500236BIB007","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"key":"S0218194021500236BIB015","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3128605"},{"key":"S0218194021500236BIB016","first-page":"295","volume-title":"SEKE","author":"Xu X.","year":"2017"},{"key":"S0218194021500236BIB017","first-page":"362","volume-title":"Proc. 28th ACM Joint Meeting on European Software Engineering Conf. and Symp. Foundations of Software Engineering","author":"Chen Q.","year":"2020"},{"key":"S0218194021500236BIB033","first-page":"559","volume-title":"17th USENIX Symp. Networked Systems Design and Implementation","author":"Lou C.","year":"2020"},{"key":"S0218194021500236BIB034","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962602"},{"key":"S0218194021500236BIB035","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025999"},{"key":"S0218194021500236BIB037","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12571-8_10"},{"key":"S0218194021500236BIB039","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"issue":"1","key":"S0218194021500236BIB041","first-page":"3389","volume":"15","author":"Fournier-Viger P.","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"S0218194021500236BIB042","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46131-1_8"},{"key":"S0218194021500236BIB044","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop C. M.","year":"2006"},{"key":"S0218194021500236BIB046","first-page":"1097","volume-title":"Advances in Neural Information Processing Systems","author":"Krizhevsky A.","year":"2012"},{"key":"S0218194021500236BIB049","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1052"},{"key":"S0218194021500236BIB051","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"S0218194021500236BIB052","first-page":"2267","volume-title":"Twenty-Ninth AAAI Conf. Artificial Intelligence","author":"Lai S.","year":"2015"},{"key":"S0218194021500236BIB053","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1995.10485899"},{"issue":"1","key":"S0218194021500236BIB054","first-page":"5","volume":"45","author":"Surhone L. M.","year":"2010","journal-title":"Mach. Learn."},{"key":"S0218194021500236BIB055","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"S0218194021500236BIB056","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"S0218194021500236BIB057","doi-asserted-by":"publisher","DOI":"10.1145\/2791577"},{"key":"S0218194021500236BIB058","first-page":"307","volume-title":"10th USENIX Symp. Operating Systems Design and Implementation","author":"Attariyan M.","year":"2012"},{"key":"S0218194021500236BIB059","first-page":"1","volume-title":"Proc. 2nd Workshop on Tackling Computer Systems Problems with Machine Learning Techniques","author":"Mickens J.","year":"2007"},{"key":"S0218194021500236BIB060","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"S0218194021500236BIB061","first-page":"349","volume-title":"Proc. 6th USENIX Symp. Networked Systems Design and Implementation","author":"Agarwal B.","year":"2009"},{"key":"S0218194021500236BIB063","first-page":"1","volume-title":"Proc. 6th USENIX Conf. Operating Systems Design and Implementation","author":"Wang H. J.","year":"2004"},{"key":"S0218194021500236BIB064","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209941"},{"key":"S0218194021500236BIB065","first-page":"1","volume-title":"Proc. 9th USENIX Conf. Operating Systems Design and Implementation","author":"Attariyan M.","year":"2010"},{"key":"S0218194021500236BIB066","first-page":"1","volume-title":"Proc. 2009 USENIX Annual Technical Conf.","author":"Su Y.-Y.","year":"2009"},{"issue":"1","key":"S0218194021500236BIB067","first-page":"27","volume":"36","author":"Attariyan M.","year":"2011","journal-title":"USENIX; login"},{"key":"S0218194021500236BIB068","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084244"},{"key":"S0218194021500236BIB069","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865962"},{"key":"S0218194021500236BIB070","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"S0218194021500236BIB071","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"S0218194021500236BIB072","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"key":"S0218194021500236BIB073","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00038"},{"key":"S0218194021500236BIB074","doi-asserted-by":"publisher","DOI":"10.1145\/3133888"},{"key":"S0218194021500236BIB075","first-page":"41","volume-title":"AAAI-98 Workshop on Learning for Text Categorization","volume":"752","author":"McCallum A.","year":"1998"},{"key":"S0218194021500236BIB076","doi-asserted-by":"publisher","DOI":"10.1212\/WNL.50.3_Suppl_3.S1"},{"key":"S0218194021500236BIB077","first-page":"90","volume-title":"Proc. 50th Annual Meeting of the Association for Computational Linguistics: Short Papers \u2014 Volume 2","author":"Wang S.","year":"2012"},{"key":"S0218194021500236BIB079","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.38"},{"key":"S0218194021500236BIB080","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240732"},{"key":"S0218194021500236BIB081","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167"},{"key":"S0218194021500236BIB082","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"S0218194021500236BIB083","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433204"},{"key":"S0218194021500236BIB084","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389272"},{"key":"S0218194021500236BIB085","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332513"},{"key":"S0218194021500236BIB086","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"S0218194021500236BIB087","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"S0218194021500236BIB088","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2014.46"},{"key":"S0218194021500236BIB089","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635915"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194021500236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:43:57Z","timestamp":1624333437000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194021500236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":56,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1142\/S0218194021500236"],"URL":"https:\/\/doi.org\/10.1142\/s0218194021500236","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}