programming https://mag.uchicago.edu/tags/programming en Reliable source https://mag.uchicago.edu/reliable-source <div class="field field--name-field-letter-box-story-image field--type-image field--label-hidden field--item"> <img src="/sites/default/files/1511_Searcy_Reliable-source.jpg" width="1600" height="743" alt="Shan Lu" title="Shan Lu" typeof="foaf:Image" class="img-responsive" /> </div> <span><span lang="" about="/profile/mrsearcy" typeof="schema:Person" property="schema:name" datatype="">mrsearcy</span></span> <span>Thu, 11/19/2015 - 20:50</span> <div class="field field--name-field-caption field--type-text-long field--label-hidden field--item">Shan Lu. (Photo courtesy Department of Computer Science)     <img src="http://mag.uchicago.edu/sites/default/files/2015_Fall_Inquiry-cover.jpg" width="140" /><h5>This article originally appeared in the Fall 2015 issue of <em>Inquiry</em>, the biannual publication produced for University of Chicago Physical Sciences Division alumni and friends.</h5> <div class="issue-link" style="font-size: 13px; font-weight: normal;"><a href="../inquiry-archive" target="_self">VIEW ALL <em>INQUIRY</em> STORIES</a></div> <div class="issue-link" style="font-size: 13px; font-weight: normal;"><a href="http://mag.uchicago.edu/sites/default/files/Inquiry_Fall-2015.pdf" target="_blank">DOWNLOAD THE LATEST ISSUE (PDF)</a></div> <div class="issue-link" style="font-size: 13px; font-weight: normal;"><a href="http://physical-sciences.uchicago.edu/news/archive" target="_blank">READ ADDITIONAL PSD NEWS</a></div></div> <div class="field field--name-field-refauthors field--type-entity-reference field--label-visually_hidden"> <div class="field--label sr-only">Author</div> <div class="field__items"> <div class="field--item"> <div about="/author/maureen-searcy"> <a href="/author/maureen-searcy"> <div class="field field--name-name field--type-string field--label-hidden field--item">Maureen Searcy</div> </a> </div> </div> </div> </div> <div class="field field--name-field-refsource field--type-entity-reference field--label-hidden field--item"><a href="/publication-sources/inquiry" hreflang="en">Inquiry</a></div> <div class="field field--name-field-issue field--type-text field--label-hidden field--item"><p>Fall/15</p> </div> <div class="field field--name-field-subhead field--type-text-long field--label-hidden field--item">Women in computer science, a three-part story: <a class="more-link" href="#shan-lu">Shan Lu’s research</a> on software bugs, efforts to increase <a class="more-link" href="#gender-diversity">gender diversity</a> in the Department of Computer Science, and Grace Hopper’s “first” <a class="more-link" href="#computer-bug">computer bug</a>.</div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><a name="shan-lu"></a><a name="top"></a></p> <h2>Shan Lu finds your software bugs and kills them</h2> <p>Say you find a bug in your kitchen. You have three options: leave it be and try to forget about it, put it outside where it won’t bother you, or kill it. The same options exist for computer program bugs: ignore the problem, build a work-around, or fix the source code. But what if you have a million bugs? You call a professional, like associate professor <a href="https://people.cs.uchicago.edu/~shanlu/" target="_blank">Shan Lu</a>. Specializing in computer system robustness and reliability, she eradicates software bugs through program analysis and software engineering.</p> <p>When she started graduate school at the <a href="http://illinois.edu/" target="_blank">University of Illinois at Urbana-Champaign</a>, Lu had much less programming experience than many of her peers. “I had a lot of bugs in my programs,” says Lu, who joined the University in August 2014. But rather than a liability, her inexperience opened a door. She didn’t have an adviser at the time, and a professor who worked on software reliability asked if she’d like to join his group.</p> <h3>Pattern recognition</h3> <p>Understanding, detecting, mitigating, and fixing defects in today’s software is much more involved than it once was. “Thirty years ago, programs usually had a thousand lines of code,” says Lu. “It was still possible to read through every line and manually validate and correct.” Most programs are now too large and complicated to comb through the source code, and they often combine different components. “Software is not built by just one person.” So Lu builds programs to find bugs based on patterns and then, if possible, fix them automatically.</p> <p>A typical project for Lu involves choosing a large, mature, and open-source program and studying its defect database, which contains detailed user reports. She studies discussions between users and developers, patches, and reviews of patches and tries to identify a pattern in the types of mistakes developers make. She uses complex software to provide a large enough sample size to draw statistically significant conclusions.</p> <p>Once Lu generalizes a common problem and identifies a pattern—the most challenging part of the process—she can write a program to search code, identify that pattern, and, depending on the type of bug, automatically fix it. “When you fix a bug,” she adds, “you want to make sure you don’t introduce new ones.”</p> <p>Lu’s group ran one of these programs on 15 widely used Java and C/C++ applications. It found 150 previously undetected performance bugs. Lu submitted the report along with patches to fix the bugs, and 116 were immediately accepted by developers. The software was presented at the <a href="http://www.icse-conferences.org/" target="_blank">International Conference on Software Engineering</a> in May, winning the team a Distinguished Paper Award.</p> <h3>Depending on a digital world</h3> <p>The type of software dependability research Lu conducts affects much of our technologically developed lives, in both trivial and critical ways. Consider your smartphone or smartwatch. If its software is inefficient, your applications can become unresponsive and drain the battery. Now consider the equipment that delivers radiation therapy to cancer patients. A programming error can cause <a href="http://archive.wired.com/software/coolapps/news/2005/11/69355?currentPage=all" target="_blank">lethal malfunctions</a>—and has, Lu recalls.</p> <p>Between 1985 and 1987, the <a href="http://courses.cs.vt.edu/professionalism/Therac_25/Therac_1.html" target="_blank">Therac-25</a> radiation therapy machine ran software that contained a subtle bug called a race condition, which causes a device to attempt two or more operations at the same time, resulting in the wrong sequence of events. The machine delivered an overdose of radiation; five patients died and many others were injured. Bugs also have caused space rockets to explode (Mariner I, 1962; Ariane 5, 1996) and destroyed pipelines (trans-Siberian gas pipeline, 1982, rumored to have been caused by a CIA-planted bug, leading to the largest non-nuclear explosion in history).</p> <h3>Ivory to computer towers</h3> <p>Because of our dependence on computer systems, academic computer science and industry share a close relationship. Often breakthroughs are directly and immediately applied by corporations. When she was a student, Lu and her adviser developed a tool, filed a patent, and licensed it to <a href="http://www.intel.com/" target="_blank">Intel</a>. Her adviser created a start-up based on another technique they developed. While she doesn’t plan to begin her own company any time soon, she does expect to collaborate with industry.</p> <p>This melding of academia and entrepreneurship is reflected in recent changes to the <a href="https://www.cs.uchicago.edu/" target="_blank">computer science department</a>. In 2011 <a href="https://www.cs.uchicago.edu/directory/andrew-chien" target="_blank">Andrew Chien</a>, previously Intel’s vice president of research, joined the department as the William Eckhardt Distinguished Service Professor. While the department maintains its traditional focus on theory, says associate chair <a href="https://www.cs.uchicago.edu/directory/anne-rogers" target="_blank">Anne Rogers</a>, his appointment marked the beginning of an expansion of faculty members who work under the broad umbrella of systems.</p> <p>“The field is going to change, and very quickly,” says department chair <a href="https://www.cs.uchicago.edu/directory/todd-dupont-0" target="_blank">Todd Dupont</a>. Some recent hires come from industry, some from academia, and some have worked in both (see <a href="http://mag.uchicago.edu/science-medicine/science-nonfiction" target="_blank">"Science Nonfiction"</a>). The boundaries between the two areas are increasingly fluid, says Rogers, with advances in each driving the other.</p> <p>This relatively new attention to systems research is part of the reason Lu came to UChicago from an established program at the <a href="https://www.cs.wisc.edu/" target="_blank">University of Wisconsin–Madison</a>. “It almost feels like a start-up,” she says. “Everyone is energetic, with a ‘we’re doing this together’ feeling.” As a relatively junior faculty member, Lu has an opportunity to effect real change.<a name="gender-diversity"></a></p> <p><span style="font-family: 'Source Sans Pro', Georgia, serif; line-height: 14.99940013885498px;"><a class="more-link" style="color: black; transition: all 0.14s ease-in-out; -webkit-transition: all 0.14s ease-in-out; font-size: 10px; line-height: 14px;" href="#top">Return to top.</a></span></p> <p align="center"><img src="http://mag.uchicago.edu/sites/default/files/hr.png" /></p> <h2>Cascade effect:<br /> The path to gender diversity in computer science</h2> <p>Andrew Chien, a computer science professor who’s helped recruit more systems-focused faculty, has been intent on increasing the department’s diversity, making an effort to identify top-flight women in the field and inviting them to visit campus. Sometimes that visit has led to an appointment, as was the case for Shan Lu. In the past year, the department has hired two more women computer scientists—assistant professor <a href="https://www.cs.uchicago.edu/news/yanjing-li-join-cs-department-assistant-professor" target="_blank">Yanjing Li </a>and <a href="https://www.cs.uchicago.edu/news/diana-franklin-joins-cs" target="_blank">Diana Franklin</a>, director of computer science education at the <a href="http://cemse.uchicago.edu/" target="_blank">Center for Elementary Mathematics and Science Education</a>. Such additions may encourage more women to pursue a field in which they are still underrepresented.</p> <p>Lu feels surrounded and supported by women colleagues at UChicago, so it takes her a minute to remember ever feeling less at ease. But her years as an undergraduate at the <a href="http://en.ustc.edu.cn/" target="_blank">University of Science and Technology of China</a> were difficult. She began her course work with little programming experience—inexperience shared by her three female classmates. The 20 or so male computer science majors seemed to already have programming knowledge. “How can they already know so much,” Lu wondered, “and how can I possibly catch up?”</p> <p>The women banded together, helping each other narrow the gap, while the men moved forward from their head start. She wonders if women are deterred by the disparity in early exposure to computer science.</p> <p>Now as a professor, she makes a point of assuring her less experienced students—who tend to be women—that although they need to practice programming, they can still do well in her classes. Speed is important, but “there are many other skills that will determine if you’re successful,” Lu says. “Whether you’re organized, determined, or creative. You need to be a good thinker.”</p> <p>As a graduate student 10 years ago, Lu helped her adviser mentor two undergrads through the <a href="http://cra.org/cra-w/distributed-research-experiences-for-undergraduates-dreu/" target="_blank">Distributed Research Experiences for Undergraduates</a> program, sponsored by a woman-focused committee of the Computing Research Association. This summer she became a mentor herself, hosting two women computer science students from different cities for 10 weeks.</p> <p>Lu’s colleague, assistant professor <a href="http://people.cs.uchicago.edu/~hankhoffmann/" target="_blank">Hank Hoffmann</a>, also hosted women summer researchers through a different program. “We are hoping that a collective effort like this,” says Lu, “will contribute to increasing the percentage of women in computer science.”<a name="computer-bug"></a></p> <p><span style="font-family: 'Source Sans Pro', Georgia, serif; line-height: 14.99940013885498px;"><a class="more-link" style="color: black; transition: all 0.14s ease-in-out; -webkit-transition: all 0.14s ease-in-out; font-size: 10px; line-height: 14px;" href="#top">Return to top.</a></span></p> <p align="center"><img src="http://mag.uchicago.edu/sites/default/files/hr.png" /></p> <h2>Ento/etymology:<br /> The first computer bug</h2> <p>In 1947 Harvard’s computer lab was developing the Mark II for the US Navy when it shorted out. The culprit? <a href="http://www.computerhistory.org/tdih/September/9/" target="_blank">A moth trapped in the machine</a>. The team pulled it out and taped it to a logbook, noting, “First actual case of bug being found.” The phrase has been attributed to one of Mark II’s programmers, <a href="http://iq.intel.com/how-grace-hoppers-career-cracked-the-code-for-women-in-science/" target="_blank">Grace Hopper</a>, a computer science pioneer who retired from the Navy as a rear admiral.</p> <h5>[[{"type":"media","view_mode":"media_original","fid":"3129","attributes":{"alt":"","class":"media-image","height":"329","typeof":"foaf:Image","width":"500"}}]] In 1947 Harvard’s computer lab, run by Grace Hopper, pulled a moth from a malfunctioning Mark II. Though widely cited as the origin of “computer bug,” this tale is disputed. (Photo courtesy US Naval Historical Center)</h5> <p>This story has been widely cited as the origin of the term “computer bug,” but <a href="http://americanhistory.si.edu/profile/437" target="_blank">Peggy Kidwell</a>, who curated the exhibit at the Smithsonian where the logbook now resides, <a href="http://partners.nytimes.com/library/cyber/week/120497bug.html" target="_blank">disputes this claim</a>.</p> <p>By the time the Mark II was in development, usage of the word “bug” to mean flaw was common in technical circles, since at least the late 19th century, when Thomas Edison used it to describe problems with his inventions. Kidwell also notes that the logbook is not in Hopper’s handwriting.</p> <p>Still, Hopper often told the story at public appearances, included the term in programming books she authored, and illustrated Mark II flaws as insects. It’s fair to say, if she and her team didn’t coin the term, they certainly popularized it in the context of computers.</p> <p><span style="font-family: 'Source Sans Pro', Georgia, serif; line-height: 14.99940013885498px;"><a class="more-link" style="color: black; transition: all 0.14s ease-in-out; -webkit-transition: all 0.14s ease-in-out; font-size: 10px; line-height: 14px;" href="#top">Return to top.</a></span></p> </div> <div class="field field--name-field-reftopic field--type-entity-reference field--label-hidden field--item"><a href="/topics/science-medicine" hreflang="en">Science &amp; Medicine</a></div> <div class="field field--name-field-tags field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/tags/computer-science" hreflang="en">Computer science</a></div> <div class="field--item"><a href="/tags/diversity" hreflang="en">Diversity</a></div> <div class="field--item"><a href="/tags/programming" hreflang="en">programming</a></div> <div class="field--item"><a href="/tags/software" hreflang="en">software</a></div> </div> <div class="field field--name-field-refuchicago field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/physical-sciences-division" hreflang="en">Physical Sciences Division</a></div> </div> <span class="a2a_kit a2a_kit_size_32 addtoany_list" data-a2a-url="https://mag.uchicago.edu/reliable-source" data-a2a-title="Reliable source"><a class="a2a_button_facebook"></a><a class="a2a_button_twitter"></a><a class="a2a_button_google_plus"></a><a class="a2a_button_print"></a><a class="a2a_dd addtoany_share_save" href="https://www.addtoany.com/share#url=https%3A%2F%2Fmag.uchicago.edu%2Freliable-source&amp;title=Reliable%20source"></a></span> Fri, 20 Nov 2015 02:50:03 +0000 mrsearcy 5222 at https://mag.uchicago.edu