{"id":"https://openalex.org/W7127267953","doi":"https://doi.org/10.48550/arxiv.2602.02235","title":"Agent-Based Software Artifact Evaluation","display_name":"Agent-Based Software Artifact Evaluation","publication_year":2026,"publication_date":"2026-02-02","ids":{"openalex":"https://openalex.org/W7127267953","doi":"https://doi.org/10.48550/arxiv.2602.02235"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.02235","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048151714","display_name":"Zhaonan Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wu, Zhaonan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124962764","display_name":"Yanjie Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao, Yanjie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Chen, Zhenpeng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Zhenpeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124872866","display_name":"Zheng Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124905481","display_name":"Haoyu Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Haoyu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5048151714"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.6193000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.6193000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.11069999635219574,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.06960000097751617,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.906499981880188},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.6011000275611877},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5733000040054321},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5285000205039978},{"id":"https://openalex.org/keywords/activity-based-costing","display_name":"Activity-based costing","score":0.43970000743865967},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3287999927997589},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3271999955177307}],"concepts":[{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.906499981880188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8198000192642212},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.6011000275611877},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5733000040054321},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5285000205039978},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.44920000433921814},{"id":"https://openalex.org/C164624739","wikidata":"https://www.wikidata.org/wiki/Q754331","display_name":"Activity-based costing","level":2,"score":0.43970000743865967},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35089999437332153},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3271999955177307},{"id":"https://openalex.org/C2988963302","wikidata":"https://www.wikidata.org/wiki/Q629206","display_name":"Program code","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.30149999260902405},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.28119999170303345},{"id":"https://openalex.org/C3018395757","wikidata":"https://www.wikidata.org/wiki/Q1379672","display_name":"Evaluation methods","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2574999928474426},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.2524999976158142}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.02235","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.02235","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.02235","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.02235","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Artifact":[0],"evaluation":[1,34,129,159],"has":[2,26],"been":[3],"adopted":[4],"in":[5],"the":[6,98,164],"Software":[7],"Engineering":[8],"(SE)":[9],"research":[10,17],"community":[11],"for":[12,103,161,186],"15":[13],"years,":[14],"substantially":[15],"improving":[16],"reproducibility":[18],"across":[19],"major":[20],"SE":[21,72],"conferences.":[22],"However,":[23],"this":[24,55],"success":[25],"introduced":[27],"a":[28,65],"growing":[29],"scalability":[30],"challenge,":[31],"as":[32],"artifact":[33,60,105,128,158,178],"relies":[35],"heavily":[36],"on":[37,68,149,179],"reviewers'":[38],"manual":[39],"execution":[40,80,84,89,119,141],"and":[41,74,86,113,145,181],"debugging,":[42],"leading":[43],"to":[44,122],"escalating":[45],"human":[46,157,184],"effort":[47],"amid":[48],"rapidly":[49],"increasing":[50],"paper":[51],"submissions.":[52],"To":[53],"address":[54],"problem,":[56],"we":[57,95],"investigate":[58],"automated":[59,104],"evaluation.":[61,106],"We":[62],"first":[63,99],"conduct":[64],"preliminary":[66],"study":[67],"artifacts":[69,152],"from":[70,88],"top-tier":[71],"conferences":[73],"identify":[75],"three":[76],"key":[77],"challenges:":[78],"perceiving":[79],"states,":[81],"maintaining":[82],"stable":[83],"environments,":[85],"recovering":[87],"errors.":[90],"Inspired":[91],"by":[92,116,169],"these":[93],"findings,":[94],"propose":[96],"ArtifactCopilot,":[97],"end-to-end":[100],"agent-based":[101],"framework":[102],"ArtifactCopilot":[107,155],"automates":[108],"environment":[109,124],"construction,":[110],"instruction":[111],"execution,":[112],"error":[114,146],"recovery":[115],"combining":[117],"an":[118,127],"normalization":[120],"strategy":[121],"ensure":[123],"stability":[125],"with":[126],"graph":[130],"that":[131,154],"transforms":[132],"README":[133],"documents":[134],"into":[135],"dependency-aware":[136],"command":[137],"graphs,":[138],"enabling":[139],"structured":[140],"planning,":[142],"execution-state":[143],"tracking,":[144],"recovery.":[147],"Evaluation":[148],"48":[150,190],"real-world":[151],"shows":[153],"matches":[156],"outcomes":[160],"85.42%":[162],"of":[163,189],"artifacts,":[165],"outperforming":[166],"Claude":[167],"Code":[168],"52.09":[170],"percentage":[171],"points,":[172],"while":[173],"costing":[174],"only":[175],"\\$0.091":[176],"per":[177],"average":[180],"requiring":[182],"zero":[183],"intervention":[185],"45":[187],"out":[188],"artifacts.":[191]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-04T00:00:00"}
