Results 31 to 40 of about 210,399 (315)
Code Search Engine for Bug Localization [PDF]
With the evolution and the increased complexity of software project,bug fixing is getting more difficult.During the bug fixing,developers need to spend a lot of time on bug localization and fixing.To evaluate this problem,this paper builds a bug-code ...
CHANG Jian-ming, BO Li-li, SUN Xiao-bing
doaj +1 more source
Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code Classification [PDF]
Code classification is a difficult issue in program understanding and automatic coding. Due to the elusive syntax and complicated semantics in programs, most existing studies use techniques based on abstract syntax tree (AST) and graph neural network ...
Guang Yang, Tiancheng Jin, Liang Dou
semanticscholar +1 more source
SCADE Model Checking Based on Program Transformation [PDF]
SCADE synchronization language is a common programming language for embedded system.It is often used to realize real-time embedded automatic control system in the research of equipment in aviation,aerospace,transportation and other safety critical fields.
RAN Dan, CHEN Zhe, SUN Yi, YANG Zhi-bin
doaj +1 more source
Accurate Extraction of Bug Fix Pattern Occurrences using Abstract Syntax Tree Analysis [PDF]
This manuscript presents an approach for studying the abundance of bug fix patterns. Bug fix patterns capture the knowledge on how to fix bugs, they are essential building blocks for research areas such as bug fix recommendation and automatic repair.
Matías Martínez +2 more
openalex +4 more sources
Explainable Comparison of Software Defect Prediction Models [PDF]
Software defect prediction has become an important research direction in software testing.The comprehensiveness of defect prediction directly affects the efficiency of testing and program operation.However,the existing defect prediction is based on ...
LI Huilai, YANG Bin, YU Xiuli, TANG Xiaomei
doaj +1 more source
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj +1 more source
JACLNet:Application of adaptive code length network in JavaScript malicious code detection.
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang +5 more
doaj +1 more source
Type-Directed Program Transformations for the Working Functional Programmer [PDF]
We present preliminary research on Deuce+, a set of tools integrating plain text editing with structural manipulation that brings the power of expressive and extensible type-directed program transformations to everyday, working programmers without a ...
Chugh, Ravi, Lubin, Justin
core +1 more source
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban +4 more
doaj +1 more source
Code Embedding Method Based on Neural Network [PDF]
There are many application scenarios for code analysis and research,such as code plagiarism detection and software vulnerability search.With the development of artificial intelligence,neural network technology has been widely used in code analysis and ...
SUN Xuekai, JIANG Liehui
doaj +1 more source

