Results 11 to 20 of about 210,399 (315)

Source Code Verification for Embedded Systems using Prolog [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST).
Frank Flederer   +3 more
doaj   +6 more sources

Initial Algebra Semantics for Cyclic Sharing Tree Structures [PDF]

open access: yesLogical Methods in Computer Science, 2010
Terms are a concise representation of tree structures. Since they can be naturally defined by an inductive type, they offer data structures in functional programming and mechanised reasoning with useful principles such as structural induction and ...
Makoto Hamana
doaj   +3 more sources

Abstract Syntax Tree Based Source Code Antiplagiarism System for Large Projects Set

open access: yesIEEE Access, 2020
The paper deals with the issue of detecting plagiarism in source code, which we unfortunately encounter when teaching subjects dealing with programming and software development.
Michal Duracik   +3 more
doaj   +2 more sources

Abstract Syntax Trees for SMILES

open access: gold, 2020
SMILES is the de facto standard for information exchange in cheminformatics. But despite this language’s prominent role, low-level tools and documentation remain sparse and incomplete. Recent articles here have highlighted the development of a SMILES grammar and a parser implementation in Rust.
Richard L. Apodaca
openalex   +2 more sources

Deep Learning With Customized Abstract Syntax Tree for Bug Localization

open access: yesIEEE Access, 2019
Given a bug report, bug localization technique can help developers automatically locate potential buggy files. Information retrieval and deep learning approaches have been applied in bug localization by extracting lexical features in bug reports and ...
Hongliang Liang   +3 more
doaj   +2 more sources

An Abstract Syntax Tree Encoding Method for Cross-Project Defect Prediction

open access: yesIEEE Access, 2019
In the last few years, with the development of deep learning theory, researchers have tried to introduce the method of artificial intelligence into the field of software defect prediction (SDP) to improve its prediction effect.
Ziyi Cai, Lu Lu, Shaojian Qiu
doaj   +2 more sources

Multi-Granularity Code Smell Detection using Deep Learning Method based on Abstract Syntax Tree

open access: bronzeInternational Conference on Software Engineering and Knowledge Engineering, 2021
—Code smell refers to poor design that is perceived to have a negative impact on readability and maintainability during software evolution, and it implies the possibility of refactoring.
Weiwei Xu
openalex   +2 more sources

A Model-Driven Parser Generator, from Abstract Syntax Trees to Abstract Syntax Graphs [PDF]

open access: green, 2012
Model-based parser generators decouple language specification from language processing. The model-driven approach avoids the limitations that conventional parser generators impose on the language designer. Conventional tools require the designed language grammar to conform to the specific kind of grammar supported by the particular parser generator ...
Luis Quesada   +2 more
openalex   +3 more sources

Development of Code Evaluation System based on Abstract Syntax Tree

open access: diamondJournal of Technical Education Science
Analyzing and evaluating student-generated code poses a big headache for programming education. Code evaluation is a delicate task requiring accuracy, efficiency, and error-checking.
Anh-Tu Phuong Nguyen, Van-Dung Hoang
openalex   +3 more sources

Plagiarism Detection in Software Projects Using Abstract Syntax Trees [PDF]

open access: goldProceedings II of the 29st Conference STUDENT EEICT 2023: Selected papers., 2023
Plagiarism is a hot topic in modern education andscience. It requires special attention since committing plagiarismis very easy with the use of the internet. This problem can befought against utilizing prevention or detection methods, whichhave been both used in this work.
Marek Szymutko, Pavel Šeda
openalex   +3 more sources

Home - About - Disclaimer - Privacy