getting your paper accepted (at issta 2008)
Post on 23-Jun-2015
1.425 Views
Preview:
DESCRIPTION
TRANSCRIPT
ISSTA 2008 Awards
Andreas Zeller, PC Chair
or: how to get your paper accepted at ISSTA
Acceptance: Location
Acceptance: Location
Acceptance: Location
USA 41%
Acceptance: Location
USA 41% Israel 47%
Acceptance: Location
USA 41% Israel 47%
Sweden 75%
Acceptance: Topics
Acceptance: Topics
All papers 26%
Acceptance: Topics
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Distribution, Maintenance and Enhancement 2/6 = 33%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Distribution, Maintenance and Enhancement 2/6 = 33%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Distribution, Maintenance and Enhancement 2/6 = 33%
Static Analysis 11/25 = 44%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Distribution, Maintenance and Enhancement 2/6 = 33%
Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Software Testing 15/70 = 21%Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Software Testing 15/70 = 21%
Metrics 2/11 = 18%
Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Coding Tools and Techniques 1/6 = 17%
Software Testing 15/70 = 21%
Metrics 2/11 = 18%
Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Model-based Techniques 1/19 = 5%
Coding Tools and Techniques 1/6 = 17%
Software Testing 15/70 = 21%
Metrics 2/11 = 18%
Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Topics
Management 0/2 = 0%Model-based Techniques 1/19 = 5%
Coding Tools and Techniques 1/6 = 17%
Software Testing 15/70 = 21%
Metrics 2/11 = 18%
Debugging 4/18 = 22%
Software Design 1/4 = 25%
Programming Environments 1/3 = 33%
Requirements and Specifications 2/3 = 67%
Domain-Specific Techniques 3/4 = 75%
Distribution, Maintenance and Enhancement 2/6 = 33%
Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%
All papers 26%
Software Verification 8/30 = 27%
Acceptance: Words
• Extracted words from submitted papers
• Checked for words occurring only in accepted or rejected papers
• Considered only dictionary words
• Acronyms and proper nouns ignored
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
alert assembler assignable ates automat
backed beneath cap casting chip coincidental
corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter
governmental hostile internals inverse
inverted marking nearby nullable obsolete opening
ordinal parenthesis plausible poll possessed
printing regenerate reversing sentinel sequent
s h e l l s i d e r s u p p r e s s t e r m i n a t o r
treating unused vulnerable writ
ACCEPTED
REJECTED
accommodate allocate anything attached auto
binding composite concentrate conformance
constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis
evident extreme formulation foundation gap guard
indices informally iterate manageable market
mutual navigate observable obviously percent
permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly
REJECTED
accommodate allocate anything attached auto
binding composite concentrate conformance
constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis
evident extreme formulation foundation gap guard
indices informally iterate manageable market
mutual navigate observable obviously percent
permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly
REJECTED
accommodate allocate anything attached auto
binding composite concentrate conformance
constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis
evident extreme formulation foundation gap guard
indices informally iterate manageable market
mutual navigate observable obviously percent
permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly
REJECTED
accommodate allocate anything attached auto
binding composite concentrate conformance
constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis
evident extreme formulation foundation gap guard
indices informally iterate manageable market
mutual navigate observable obviously percent
permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly
REJECTED
Fact
Fact Fiction
ACM SIGSOFTDistinguished Paper Awards
• Best paper award from ACM SIGSOFT
• Up to 10% of accepted papers can be considered
• Program committee selected two papers
AWARDED
acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick
AWARDED
acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick
AWARDED
acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick
AWARDED
Award Winners
Award Winners
Award Winners
top related