The Internetware 2025 Tool Demonstration Track provides a unique opportunity to showcase innovative tools and artifacts at a well-established conference in its 16th edition, co-located with FSE 2025. This offers unparalleled visibility and the chance to engage with a diverse, interdisciplinary audience.
The track encourages valuable feedback and discussion, making it ideal for presenting both early prototypes and mature tools. With its broad and forward-looking scope, Internetware is the perfect platform to highlight impactful contributions in the dynamic world of Internet-based software.
We invite submissions presenting:
-
Early implementations of novel tools.
-
Mature prototypes with new and innovative features.
Submissions should include open-source code or data, and we encourage live demonstrations to improve the understanding of presented tools. Authors of regular research papers are welcome to submit complementary demonstration papers to extend their contributions further.
Topics of Interest
The Tool Demonstration Track welcomes submissions on a diverse range of research topics, emphasizing innovative tools and techniques aligned with the principles of Internetware. The topics of interest for the Tool Demonstration Track are the same as those of the Research Track.
Join us in Trondheim to shape the future of Internetware!
This program is tentative and subject to change.
Fri 20 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:30 | Opening & KeynoteResearch Track / Keynotes at Cosmos 3A Chair(s): Ge Li Peking University, Leonardo Montecchi Norwegian University of Science and Technology (NTNU), Mauro Pezzè University of Milano-Bicocca, William Chu Tunghai University, Cuiyun Gao Harbin Institute of Technology, Shenzhen | ||
09:00 10mDay opening | Opening Research Track | ||
09:10 20mOther | Photo Research Track | ||
09:30 60mKeynote | Keynote 1 (Zhi Jin) Keynotes Zhi Jin Peking University |
10:30 - 11:00 | Coffee BreakResearch Track | ||
10:30 30mBreak | Coffee Break Research Track |
11:00 - 13:00 | Keynote & Session1: Software Vulnerability and Security IResearch Track / Keynotes at Cosmos 3A Chair(s): William Chu Tunghai University | ||
11:00 60mKeynote | Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering Keynotes Leon Moonen Simula Research Laboratory & BI Norwegian Business School | ||
12:00 15mTalk | Towards understanding the security issues of Python programs Research Track Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University | ||
12:15 15mTalk | A Novel LLM Approach of Cybersecurity Threat Analysis and Response Research Track TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science | ||
12:30 15mTalk | Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection Research Track Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University | ||
12:45 15mTalk | Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps Research Track Pre-print |
13:00 - 14:00 | LunchResearch Track | ||
13:00 60mLunch | Lunch Research Track |
14:00 - 15:30 | Session2: AI for Software Engineering IResearch Track at Cosmos 3A Chair(s): Jialun Cao Hong Kong University of Science and Technology | ||
14:00 15mTalk | Code Retrieval with Mixture of Experts Prototype Learning Based on Classification Research Track Feng Ling School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Guoheng Huang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Jingchao Wang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Xiaochen Yuan Faculty of Applied Sciences, Macau Polytechnic University, Macau, China, Xuhang Chen School of Computer Science and Engineering, Huizhou University, Huizhou 516001, China, XueYong Zhang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Fanlong Zhang School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China, Chi-Man Pun Department of Computer and Information Science, University of Macau, Macau, China | ||
14:15 15mTalk | Issue Retrieval and Verification Enhanced Supplementary Code Comment Generation Research Track Yanzhen Zou Peking University, Xianlin Zhao Peking University, Xinglu Pan Peking University, Bing Xie Peking University | ||
14:30 15mTalk | CodeCleaner: Mitigating Data Contamination for LLM Benchmarking Research Track Jialun Cao Hong Kong University of Science and Technology, Songqiang Chen The Hong Kong University of Science and Technology, Wuqi Zhang Mega Labs, Hau Ching Lo The Hong Kong University of Science and Technology, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shing-Chi Cheung Hong Kong University of Science and Technology | ||
14:45 15mTalk | LASER:Script Execution by Autonomous Agents for On-demand Traffic Simulation Research Track Hao Gao Nanjing University, Jingyue Wang Nanjing University, Wenyang Fang Nanjing University, Jingwei Xu , Yunpeng Huang Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma Nanjing University | ||
15:00 15mTalk | Tech-ASan: Two-stage check for Address Sanitizer Research Track Yixuan Cao ShenZhen University, Yuhong Feng Shenzhen University, Huafeng Li Shenzhen University, Chongyi Huang Shenzhen University, Fangcao Jian Shenzhen University, Haoran Li Shenzhen University, Xu Wang Shenzhen University |
15:30 - 16:00 | Coffee BreakResearch Track | ||
15:30 30mBreak | Coffee Break Research Track |
16:00 - 17:30 | Session3: Software Testing and Quality AssuranceResearch Track / Tool Demonstration Track / New Idea Track at Cosmos 3A Chair(s): Yanjie Zhao Huazhong University of Science and Technology | ||
16:00 15mTalk | SRLRF: Fine-Grained Root Cause Analysis and Prediction for Compiler Optimization Defects Research Track Han Luo Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Xuanyan Zhu Nanjing University of Aeronautics and Astronautics, Jiayi Li Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics, Jiaqi Liu National Key Laborarory on Test Physics & Numerical Mathematics | ||
16:15 15mTalk | Revisit the Intuition of Mutation-Based Fault Localization in Real-world Programs Research Track Chenliang Xing Wuhan University, Gong Chen Wuhan University, Qi Xin Wuhan University, Xiaoyuan Xie Wuhan University | ||
16:30 15mTalk | Emerging Compiler Testing Based on Test Case Reuse Research Track Kelin Zhu School of Intelligent Software and Engineering, Nanjing University, Suzhou 215163, China, Yu Wang Nanjing University, Linzhang Wang State Key Laboratory for Novel Software Technology (Nanjing University, Nanjing 210023, China, Xuandong Li Nanjing University | ||
16:45 10mTalk | UITrans: Seamless UI Translation from Android to HarmonyOSBest Tool Demo Award Tool Demonstration Track Lina Gong Nanjing University of Aeronautics and Astronautic, Chen Wang Nanjing University of Aeronautics and Astronautics, Di Cui Xidian University, Yujun Huang Nanjing University of Aeronautics and Astronautics, Mingqiang Wei Nanjing University of Aeronautics and Astronautics | ||
16:55 10mTalk | Graph-based Data Augmentation for API Misuse Detection New Idea Track | ||
17:05 10mTalk | XR4PD: Augmented Reality for Visualising Problem Diagrams in Requirements Analysis New Idea Track Yang Hua Guangxi Normal University, Hongbin Xiao Guangxi Key Lab of Multi-Source Information Mining and Securit(Guangxi Normal University), Wenhao Wang Guangxi Normal University, Zhi Li Guangxi Normal University | ||
17:15 15mTalk | Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep Neural Networks Research Track Jingling Wang Nanjing University, Shuwei Qiu Nanjing University, Peng Wang Nanjing University, Jiyuan Song Nanjing University, Huayao Wu Nanjing University, Xintao Niu Nanjing University, Changhai Nie Nanjing University Pre-print Media Attached |
19:00 - 21:00 | |||
Sat 21 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 10:30 | |||
08:30 60mKeynote | Keynote 3: AutoCodeRover: from research on agentic AI-based Programming to Spinoff Acquisition Keynotes Abhik Roychoudhury National University of Singapore | ||
09:30 60mKeynote | Keynote 4: Active Inference for Distributed Intelligence in the Computing Continuum Image Keynotes Schahram Dustdar TU Wien |
10:30 - 11:00 | Coffee BreakResearch Track | ||
10:30 30mBreak | Coffee Break Research Track |
11:00 - 13:00 | Session4: Code Optimization and Software ArchitectureResearch Track at Cosmos 3A Chair(s): Changhai Nie Nanjing University | ||
11:00 15mTalk | Take Kernel Stack Overhead Out: eBPF-Enhanced Network Acceleration for Distributed Training within Ethernet Research Track Zhenyu Zhang School of Computer Science and Engineering, Sun Yat-sen University, Pengfei Chen Sun Yat-sen University, Guangba Yu School of Computer Science and Engineering, Sun Yat-sen University, Zilong He Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University | ||
11:15 15mTalk | Exploiting Booster Pass Chain for Compiler Phase Ordering Research Track yihan chen , Huanhuan Chen Nanjing University, Yuan Yao Nanjing University, Ping Yu Nanjing University, Feng Xu Nanjing University, Xiaoxing Ma Nanjing University | ||
11:30 15mTalk | DeFS: A Decentralized and High-Performance File System for Consortium Systems Research Track Yitong Cheng Shanghai JiaoTong University, Shenglong Zhao Shanghai JiaoTong University, Yang Yu Shanghai Jiao Tong University, China, Zhichao Hua Shanghai Jiao Tong University | ||
11:45 15mTalk | Proteus: An Automatical High-Efficiency Framework for Generating Compact and Printable Shellcode on ARMv8 Research Track Jian Lin Information Engineering University, Guoan Liu Information Engineering University, Rui Chang Zhejiang University, Ruimin Wang Information Engineering University | ||
12:00 15mTalk | Modeling Go Concurrency: A Static Analysis Approach to Data Race Detection Research Track Fengjuan Gao Nanjing University of Science and Technology, Mumu Zhang Nanjing University, Zixiao Zhao Nanjing University, Yu Wang Nanjing University, Xuandong Li Nanjing University | ||
12:15 15mTalk | RABBIT: Managing Hierarchical Memory with Intelligent Tiering Aware Deduplication Research Track | ||
12:30 15mTalk | DPCapsule: A Decentralized Private Computing System With Self-Controlled Data Research Track Yitong Cheng Shanghai JiaoTong University, Yang Yu Shanghai Jiao Tong University, China, Zhichao Hua Shanghai Jiao Tong University | ||
12:45 15mTalk | MicroGuard:Non-Intrusive Dynamic Analysis for Inter-Service Access Control of Microservices Research Track Haoming Luo School of Computer Science and Engineering, Sun Yat-sen University, Wanqi Yang Sun Yat-Sen University, Pengfei Chen Sun Yat-sen University |
11:00 - 13:00 | Session7: AI for Software Engineering IIIResearch Track at Cosmos 3C Chair(s): Lina Gong Nanjing University of Aeronautics and Astronautic | ||
11:00 15mTalk | Brevity is the Soul of Wit: Condensing Code Changes to Improve Commit Message Generation Research Track Hongyu Kuang Nanjing University, Ning Zhang Nanjing University, Hui Gao Nanjing University, Xin Zhou Nanjing University, Wesley Assunção North Carolina State University, Xiaoxing Ma Nanjing University, Dong Shao Nanjing University, Guoping Rong Nanjing University, He Zhang Nanjing University | ||
11:15 15mTalk | DesDD: A Design-Enabled Framework with Dual-Layer Debugging for LLM-based Iterative API Orchestrating Research Track Zhuo Cheng Jiangxi normal University, Zhou Zou Jiangxi Normal University, Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing CSIRO's Data61, Wei Zhang Jiangxi Meteorological Disaster Emergency Early Warning Center, Jiangxi Meteorological Bureau, Shaochen Wang Jiangxi Normal Univesity, Xueting Yi Jiangxi Meteorological Disaster Emergency Early Warning Center, Jiangxi Meteorological Bureau, Huan Jin School of Information Engineering, Jiangxi University of Technology, Zhiping Liu College of Information Engineering, Gandong University, Zhaojin Lu Jiangxi Tellhow Animation College, Tellhow Group Co.,LTD | ||
11:30 15mTalk | AUCAD: Automated Construction of Alignment Dataset from Log-Related Issues for Enhancing LLM-based Log Generation Research Track Hao Zhang Nanjing University, Dongjun Yu Nanjing University, Lei Zhang Nanjing University, Guoping Rong Nanjing University, YongdaYu Nanjing University, Haifeng Shen Southern Cross University, He Zhang Nanjing University, Dong Shao Nanjing University, Hongyu Kuang Nanjing University | ||
11:45 15mTalk | Enhancement Report Approval Prediction: A Comparative Study of Large Language Models Research Track | ||
12:00 15mTalk | MetaCoder: Generating Code from Multiple Perspectives Research Track chen xin , Zhijie Jiang National University of Defense Technology, Yong Guo National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Si Zheng National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Shanshan Li National University of Defense Technology | ||
12:15 15mTalk | API-Repo: API-centric Repository-level Code Completion Research Track Zhihao Li State Key Laboratory for Novel Software and Technology, Nanjing University, Chuanyi Li Nanjing University, Changan Niu Software Institute, Nanjing University, Ying Yan State Key Laboratory for Novel Software and Technology, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University | ||
12:30 15mTalk | AdaptiveLLM: A Framework for Selecting Optimal Cost-Efficient LLM for Code-Generation Based on CoT Length Research Track Junhang Cheng Beihang University, Fang Liu Beihang University, Chengru Wu Beihang University, Li Zhang Beihang University | ||
12:45 15mTalk | Lightweight Probabilistic Coverage Metrics for Efficient Testing of Deep Neural Networks Research Track Yining Yin Nanjing University, Yang Feng Nanjing University, Shihao Weng Nanjing University, Xinyu Gao , Jia Liu Nanjing University, Zhihong Zhao Nanjing University |
13:00 - 14:00 | LunchResearch Track | ||
13:00 60mLunch | Lunch Research Track |
14:00 - 15:30 | Session5: Software Vulnerability and Security IINew Idea Track / Research Track at Cosmos 3A Chair(s): Chuanyi Li Nanjing University | ||
14:00 15mTalk | Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators Research Track Shenqianqian Zhang Key Laboratory of Cyberspace Security, Ministry of Education, Weiyu Dong Information Engineering University, Jian Lin Information Engineering University | ||
14:15 15mTalk | Line-level Semantic Structure Learning for Code Vulnerability Detection Research Track Ziliang Wang Peking University, Ge Li Peking University, Jia Li Peking University, Yihong Dong Peking University, Yingfei Xiong Peking University, Zhi Jin Peking University | ||
14:30 15mTalk | SLVHound: Static Detection of Session Lingering Vulnerabilities in Modern Java Web Applications Research Track Haining Meng SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Jie Lu SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Yongheng Huang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:45 15mTalk | Def-VAE: Identifying Adversarial Inputs with Robust Latent Representations Research Track Chengye Li Institute of Software, Chinese Academy of Sciences, Changshun Wu Université Grenoble Alpes, Rongjie Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:00 15mTalk | Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message Types Research Track Kunpeng Jian Institute of Information Engineering, Chinese Academy of Sciences, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Menghao Li Institute of Information Engineering, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
15:15 10mTalk | PriceSleuth: Detecting DeFi Price Manipulation Attacks in Smart Contracts Using LLM and Static Analysis New Idea Track Hao Wu Xi'an JiaoTong University, Haijun Wang Xi’an Jiaotong University, Shangwang Li Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University |
14:00 - 15:30 | Session8: Software Vulnerability and Security IIIResearch Track / New Idea Track / Tool Demonstration Track at Cosmos 3C Chair(s): Xiaoyuan Xie Wuhan University | ||
14:00 15mTalk | VDLS: A Vulnerability Detection Approach Based on Execution Path Selection Research Track Xuanyan Zhu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics, Jiayi Li Nanjing University of Aeronautics and Astronautics, Han Luo Nanjing University of Aeronautics and Astronautics, Jiaqi Liu National Key Laborarory on Test Physics & Numerical Mathematics | ||
14:15 15mTalk | Exploring Typo Squatting Threats in the Hugging Face Ecosystem Research Track Ningyuan Li Beijing University of Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Zehao Wu Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
14:30 15mTalk | Unraveling the Characterization and Propagation of Security Vulnerabilities in TensorFlow-based Deep Learning Software Supply Chain Research Track Yiren Zhou Nanjing University of Aeronautics and Astronautics, Lina Gong Nanjing University of Aeronautics and Astronautic, Tiantian Ma Nanjing University of Aeronautics and Astronautics File Attached | ||
14:45 15mTalk | Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks Research Track Wangchenlu Huang Beijing university of posts and telecommunications, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Tianxiang Wang China United Network Communications Group Corporation Limited, Yuhao Gao China United Network Communications Group Corporation Limited, Guosheng Xu Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology | ||
15:00 10mTalk | ETrace : Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis New Idea Track Chenyang Peng Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Yin Wu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University | ||
15:10 10mTalk | A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous Driving Tool Demonstration Track | ||
15:20 10mTalk | Software Reuse in the Generative AI Era: From Cargo Cult Towards Systematic PracticesBest New Idea Paper Award New Idea Track |
15:30 - 16:00 | Coffee BreakResearch Track | ||
15:30 30mBreak | Coffee Break Research Track |
16:00 - 17:30 | Session6: AI for Software Engineering IIResearch Track at Cosmos 3A Chair(s): Xing Hu Zhejiang University | ||
16:00 15mTalk | Beyond Isolated Changes: A Context-aware and Dependency-enhanced Code Change Detection Method Research Track Binghe Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Zijun Wang Northwest University, Mengjie Sun Xi’an Jiaotong University, Haijun Wang Xi’an Jiaotong University | ||
16:15 15mTalk | Orion: A Multi-Agent Framework for Optimizing RAG Systems through Specialized Agent Collaboration Research Track xianxing fang Xidian University, Liangru Xie Xidian University, Weibin Yang Xidian University, Tianyi Zhang Xidian University, Zhang Ruitao Xi’an Jiaotong-Liverpool University, Hao Wang Xidian University, Di Wu Norwegian University of Science and Technology, Yushan Pan Xi'an Jiaotong-Liverpool University | ||
16:30 15mTalk | GPT Store Mining and Analysis Research Track Dongxun Su Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Xinyi Hou Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
16:45 15mTalk | Mining Discriminative Issue Resolution Temporal Sequential Patterns in Open Source Software Repositories Research Track YaxinWang Nanjing University, Liang Wang Nanjing University, Hao Hu Nanjing University, Xianping Tao Nanjing University | ||
17:00 15mTalk | Generating SysML Behavior Models via Large Language Models: an Empirical Study Research Track Yuan Wang School of Software, Beihang University, Ning Ge School of Software, Beihang University, Jiangxi Liu Beihang University, Zhilong Cao Beihang University, Zheping Chen Beihang University, Chunming Hu Beihang University | ||
17:15 15mTalk | FIRE: Smart Contract Bytecode Function Identification via Graph-Refined Hybrid Feature Encoding Research Track |
16:00 - 17:30 | Session9: AloT & MicroservicesResearch Track / Tool Demonstration Track at Cosmos 3C Chair(s): Qingkai Shi Nanjing University | ||
16:00 15mTalk | EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System Research Track Bingkun Sun Fudan University, Jialin Ren Fudan University, Juntao Luo Fudan University, Liwei Shen Fudan University, Yongqiang Lu Fudan University, Qicai Chen Fudan University, China, Zhen Dong Fudan University, Xin Peng Fudan University | ||
16:15 15mTalk | Intelligent Traffic Engineering for IoT Networks: A Multi-Agent Deep Reinforcement Learning Approach Research Track liu ze song , zesong liu North China University of Technology, shanshan he North China University of Technology, Yuanhao Xi Liaoning Technical University, Ramin Yahyapour Liaoning Technical University | ||
16:30 15mTalk | Privacy-Preserving Authentication Scheme for V2G in social IoT Based on Certificateless Aggregate Signatures Research Track Zhuoqun Xia Changsha University of Science and Technology, Xin Wang Changsha University of Science and Technology | ||
16:45 15mTalk | To Split or to Merge? Exploring Multi-modal Data Flexibly for Failure Classification in Microservices Research Track Xiuhong Tan Changsha University of Science and Technology, China, Tongqing Zhou National University of Defense Technology, China, Yuan Yuan National University of Defense Technology, China, Shiming He Changsha University of Science and Technology, China, Yuqi Li National Supercomputer Center in Tianjin, Jian Zhang National Supercomputer Center in Tianjin | ||
17:00 15mTalk | Dynamic Microservice Resource Optimization Management Based on MAPE Loop Research Track Lu Wang Xidian University, Xu Fan Xidian University, Yaxiao Li , Quanwei Du Xidian University, Jialuo She Xidian University, Qingshan Li Xidian University | ||
17:15 10mTalk | Documenting Microservice Integration with MSAdoc Tool Demonstration Track |
19:00 - 19:30 | |||
20:00 - 22:00 | |||
Sun 22 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
09:00 - 10:30 | |||
09:00 50mKeynote | Invited Talk 1: Automated Testing and Safety Analysis of Deep Neural Networks Future of Internetware Workshop Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland |
10:30 - 11:00 | Coffee BreakResearch Track | ||
10:30 30mBreak | Coffee Break Research Track |
11:00 - 13:00 | |||
11:00 50mKeynote | Invited Talk 2: Efficient and Green Code LLMs: Happier Software Engineers, Happier Planet Future of Internetware Workshop David Lo Singapore Management University | ||
11:50 50mKeynote | Invited Talk 3: Reinventing Testing for Big Data and Heterogeneous Computing Future of Internetware Workshop Miryung Kim UCLA and Amazon Web Services |
13:00 - 14:00 | LunchResearch Track | ||
13:00 60mLunch | Lunch Research Track |
14:00 - 15:30 | |||
14:00 50mKeynote | Invited Talk 4: Combatting Software Sprawl with LLMs Future of Internetware Workshop Earl T. Barr University College London | ||
14:50 50mKeynote | Invited Talk 5: Empowering Cloud Intelligence (AIOps) with LLMs: Advances, Learnings, and Beyond Future of Internetware Workshop Dongmei Zhang Microsoft |
15:30 - 16:00 | Coffee BreakResearch Track | ||
15:30 30mBreak | Coffee Break Research Track |
16:00 - 17:30 | |||
16:00 50mKeynote | Invited Talk 6: TBD Future of Internetware Workshop Shin Hwei Tan Concordia University | ||
16:50 50mKeynote | Invited Talk 7: Testing Cyber-Physical Systems with AI Foundation Models Future of Internetware Workshop Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University |
Accepted Papers
Title | |
---|---|
A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous Driving Tool Demonstration Track | |
Documenting Microservice Integration with MSAdoc Tool Demonstration Track | |
UITrans: Seamless UI Translation from Android to HarmonyOSBest Tool Demo Award Tool Demonstration Track |
Call for Papers
The Internetware 2025 Tool Demonstration Track invites researchers and practitioners to present and explore the latest advancements, challenges, and practical experiences in the development of innovative tools, data, and artifacts across a broad range of fields. Submissions should focus on novel early-stage tool prototypes or new aspects of mature tools, ideally including open-sourced code/data and, optionally, live demonstrations. Authors of regular research papers are encouraged to submit complementary demonstration papers to further showcase and extend their contributions.
Best Tool Demo Award
The Internetware’25 Best Tool Demo Award will be presented to recognize authors for their efforts in creating and sharing outstanding tool demonstrations.
Formatting and Submission Guidelines
-
Submissions must not exceed 4 pages, including bibliography.
-
All submissions must be written in English and submitted in PDF format.
-
Submissions must use the ACM Sigconf template, available on the ACM Proceedings Template page with the following header: \documentclass[sigconf, review]{acmart} \acmConference[Internetware ’25 - Tool Demonstration Track]{2025 16th International Conference on Internetware, Tool Demonstration Track}{June 20–22, 2025}{Trondheim, Norway}
-
Papers must be submitted through the Internetware 2025 submission site by the deadlines provided.
-
The tool demonstration track does not follow a double-blind review process. If submitting a tool demo alongside a double-blind research paper, authors should inform the Tool Demonstration Track Chairs to ensure independent review processes.
Important Dates
-
Submission Deadline: March 17, 2025
-
Notification of Acceptance: April 7, 2025
-
Camera-Ready Submission Deadline: April 20, 2025
Note: All deadlines are in AoE (Anywhere on Earth, UTC-12).
Evaluation Criteria
Each submission will be evaluated on the following quality criteria:
-
Significance: The extent to which the contribution impacts the field of software engineering, including any assumptions made.
-
Novelty: The originality of the contributions compared to the state-of-the-art.
-
Presentation: The clarity of the writing, the quality of figures and tables, and adherence to the formatting guidelines.
-
Verifiability: The extent to which the submission provides sufficient detail to replicate or verify the innovation, including data, analysis, and tool functionality.
Tools and Data Availability
To promote replicability and transparency, submissions must make associated datasets publicly available. Tools should also be open-sourced whenever possible, and distributed under an open-source license. If public availability is not feasible, authors must clearly explain the reasons.
Authors are encouraged to provide their demonstration in an easily accessible format, such as:
-
Virtual machine images, software containers (e.g., Docker), or system configurations (e.g., Puppet, Ansible).
-
Screencasts highlighting the tool’s functionality and use. Links to these screencasts can be submitted as an appendix to accompany the paper.
Conference Attendance
If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper. The presentation is expected to be delivered in person.
We look forward to your submissions and seeing you at Internetware 2025!