Results 31 to 40 of about 210,399 (315)

Code Search Engine for Bug Localization [PDF]

open access: yesJisuanji kexue, 2021
With the evolution and the increased complexity of software project,bug fixing is getting more difficult.During the bug fixing,developers need to spend a lot of time on bug localization and fixing.To evaluate this problem,this paper builds a bug-code ...
CHANG Jian-ming, BO Li-li, SUN Xiao-bing
doaj   +1 more source

Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code Classification [PDF]

open access: yesInternational Conference on Software Engineering and Knowledge Engineering, 2023
Code classification is a difficult issue in program understanding and automatic coding. Due to the elusive syntax and complicated semantics in programs, most existing studies use techniques based on abstract syntax tree (AST) and graph neural network ...
Guang Yang, Tiancheng Jin, Liang Dou
semanticscholar   +1 more source

SCADE Model Checking Based on Program Transformation [PDF]

open access: yesJisuanji kexue, 2021
SCADE synchronization language is a common programming language for embedded system.It is often used to realize real-time embedded automatic control system in the research of equipment in aviation,aerospace,transportation and other safety critical fields.
RAN Dan, CHEN Zhe, SUN Yi, YANG Zhi-bin
doaj   +1 more source

Accurate Extraction of Bug Fix Pattern Occurrences using Abstract Syntax Tree Analysis [PDF]

open access: green, 2014
This manuscript presents an approach for studying the abundance of bug fix patterns. Bug fix patterns capture the knowledge on how to fix bugs, they are essential building blocks for research areas such as bug fix recommendation and automatic repair.
Matías Martínez   +2 more
openalex   +4 more sources

Explainable Comparison of Software Defect Prediction Models [PDF]

open access: yesJisuanji kexue, 2023
Software defect prediction has become an important research direction in software testing.The comprehensiveness of defect prediction directly affects the efficiency of testing and program operation.However,the existing defect prediction is based on ...
LI Huilai, YANG Bin, YU Xiuli, TANG Xiaomei
doaj   +1 more source

EtWExplorer: Multi-Priority Scheduling Path Exploration Technology Based on Abstract Syntax Tree Analysis

open access: yesApplied Sciences, 2022
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj   +1 more source

JACLNet:Application of adaptive code length network in JavaScript malicious code detection.

open access: yesPLoS ONE, 2022
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang   +5 more
doaj   +1 more source

Type-Directed Program Transformations for the Working Functional Programmer [PDF]

open access: yes, 2020
We present preliminary research on Deuce+, a set of tools integrating plain text editing with structural manipulation that brings the power of expressive and extensible type-directed program transformations to everyday, working programmers without a ...
Chugh, Ravi, Lubin, Justin
core   +1 more source

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis

open access: yesIEEE Access, 2022
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban   +4 more
doaj   +1 more source

Code Embedding Method Based on Neural Network [PDF]

open access: yesJisuanji kexue, 2023
There are many application scenarios for code analysis and research,such as code plagiarism detection and software vulnerability search.With the development of artificial intelligence,neural network technology has been widely used in code analysis and ...
SUN Xuekai, JIANG Liehui
doaj   +1 more source

Home - About - Disclaimer - Privacy