The contact author for this artifact is Jordan Henkel [email protected].
See INSTALL.md.
See INSTALL.md.
See dataset/README.md.
Check out c2ocaml on GitHub!
Check out lsee on GitHub!
Check them out at hub.docker.com!
For these artifacts you should be able to match the output to either our included example outputs (see here, here, and here) or directly to the (updated) tables/charts in our paper.
Note: tables and charts were recently updated to include a fix for a bug found and patched during the creation of our artifact.
For this artifact we have generated a more comprehensive benchmark compared to the one we used in our initial submission. You can refer to the example-output.md file for expected output.
If you choose to run the end-to-end demo, you should see quite a bit of console output as transformed sources are generated and as traces are created. Finally, you should be able to see some results from an example python script written to query vectors learned from the open source project redis.
For this artifact you should simply see an output directory with our raw traces and vectors.
Some of these docker containers may create artifacts in mounted directories with wonky permissions. This is because the docker container doesn't know the user/group id (on the host) that should own the files it creates.
If you need to remove artifacts created by our tools and are running into permissions errors try using docker to remove those directories/files. Here's an example:
# Remove the transformed sources for redis
rm -rf ./c2ocaml/artifacts/redis
rm: cannot remove './c2ocaml/artifacts/redis': Permission denied
# Okay, let's mount it with docker and remove it that way
docker run -it --rm -v `pwd`/c2ocaml/artifacts:/mnt debian:stretch
> rm -rf /mnt/redis
> exit
# All good now! ./c2ocaml/artifacts/redis should be totally removed