getting your paper accepted (at issta 2008)

Post on 23-Jun-2015

1.425 Views

Category:

Business

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

In a scientific paper, which words should you use to get it accepted? This was presented in the ISSTA 2008 awards session.

TRANSCRIPT

ISSTA 2008 Awards

Andreas Zeller, PC Chair

or: how to get your paper accepted at ISSTA

Acceptance: Location

Acceptance: Location

Acceptance: Location

USA 41%

Acceptance: Location

USA 41% Israel 47%

Acceptance: Location

USA 41% Israel 47%

Sweden 75%

Acceptance: Topics

Acceptance: Topics

All papers 26%

Acceptance: Topics

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Distribution, Maintenance and Enhancement 2/6 = 33%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Distribution, Maintenance and Enhancement 2/6 = 33%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Distribution, Maintenance and Enhancement 2/6 = 33%

Static Analysis 11/25 = 44%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Distribution, Maintenance and Enhancement 2/6 = 33%

Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Software Testing 15/70 = 21%Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Software Testing 15/70 = 21%

Metrics 2/11 = 18%

Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Coding Tools and Techniques 1/6 = 17%

Software Testing 15/70 = 21%

Metrics 2/11 = 18%

Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Model-based Techniques 1/19 = 5%

Coding Tools and Techniques 1/6 = 17%

Software Testing 15/70 = 21%

Metrics 2/11 = 18%

Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Topics

Management 0/2 = 0%Model-based Techniques 1/19 = 5%

Coding Tools and Techniques 1/6 = 17%

Software Testing 15/70 = 21%

Metrics 2/11 = 18%

Debugging 4/18 = 22%

Software Design 1/4 = 25%

Programming Environments 1/3 = 33%

Requirements and Specifications 2/3 = 67%

Domain-Specific Techniques 3/4 = 75%

Distribution, Maintenance and Enhancement 2/6 = 33%

Empirical Studies 11/23 = 48%Static Analysis 11/25 = 44% Dynamic Analysis 13/29 = 45%

All papers 26%

Software Verification 8/30 = 27%

Acceptance: Words

• Extracted words from submitted papers

• Checked for words occurring only in accepted or rejected papers

• Considered only dictionary words

• Acronyms and proper nouns ignored

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

alert assembler assignable ates automat

backed beneath cap casting chip coincidental

corruption cryptographic cumbersome decidable defer delegate dent executive flavor fuzz getter

governmental hostile internals inverse

inverted marking nearby nullable obsolete opening

ordinal parenthesis plausible poll possessed

printing regenerate reversing sentinel sequent

s h e l l s i d e r s u p p r e s s t e r m i n a t o r

treating unused vulnerable writ

ACCEPTED

REJECTED

accommodate allocate anything attached auto

binding composite concentrate conformance

constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis

evident extreme formulation foundation gap guard

indices informally iterate manageable market

mutual navigate observable obviously percent

permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly

REJECTED

accommodate allocate anything attached auto

binding composite concentrate conformance

constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis

evident extreme formulation foundation gap guard

indices informally iterate manageable market

mutual navigate observable obviously percent

permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly

REJECTED

accommodate allocate anything attached auto

binding composite concentrate conformance

constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis

evident extreme formulation foundation gap guard

indices informally iterate manageable market

mutual navigate observable obviously percent

permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly

REJECTED

accommodate allocate anything attached auto

binding composite concentrate conformance

constrain continual convergence derivation differentiate dimensional dominated elaborate emphasis

evident extreme formulation foundation gap guard

indices informally iterate manageable market

mutual navigate observable obviously percent

permute probable provider quadratic reflecting risk scan sessions specially stochastic successor synchronous twenty unavailable unexpectedly

REJECTED

Fact

Fact Fiction

ACM SIGSOFTDistinguished Paper Awards

• Best paper award from ACM SIGSOFT

• Up to 10% of accepted papers can be considered

• Program committee selected two papers

AWARDED

acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick

AWARDED

acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick

AWARDED

acquainted acton adaptable astatic barely bimodal causality cheaply churn compete continuum converse cutoff dispose endeavor exotic forgivable grad grade inactive incidence indentation inefficiently leisure neutrality noisy objectively planetary preprint quantum realm reweave roller rover sparsely starvation stratified tease told undergo unidirectional unlocked unreadable unshared upcoming volunteer wheeled wisdom wove yardstick

AWARDED

Award Winners

Award Winners

Award Winners

top related