Results 41 to 50 of about 210,399 (315)
Automatic Code Annotation Generation Based on Multi-dimensional Heterogeneous Graph Structure [PDF]
The task of automatic code annotation generation has become a research hotspot considering code annotations can enhance the readability of source code and assist the software development process.While some researchers have exploited the sequence ...
RONG Keyao, XIONG Yun
doaj +1 more source
Synthesis Algorithm of Homology Detection Based on AHP [PDF]
Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work alone.
Baojiang Cui +5 more
doaj +1 more source
Target Code Selection by Tilling AST with the Use of Tree Pattern Pushdown Automaton [PDF]
A new and simple method for target code selection by tilling an abstract syntax tree is presented. As it is usual, tree patterns corresponding to target machine instructions are matched in the abstract syntax tree.
Janousek, Jan
core +1 more source
Revisiting Code Similarity Evaluation with Abstract Syntax Tree Edit Distance [PDF]
This paper revisits recent code similarity evaluation metrics, particularly focusing on the application of Abstract Syntax Tree (AST) editing distance in diverse programming languages. In particular, we explore the usefulness of these metrics and compare
Yewei Song +4 more
semanticscholar +1 more source
Smart Contract Vulnerability Detection Technology Based on Abstract Syntax Tree Embedding [PDF]
Currently, in deep learning-based smart contract vulnerability detection solutions, the direct use of bytecode or source code for textual sequence feature representation lacks a comprehensive understanding of program semantics.
XU Ying, FU Ziwei, ZHANG Wei, CHEN Yunfang
doaj +1 more source
Generalized vulnerability extrapolation using abstract syntax trees [PDF]
The discovery of vulnerabilities in source code is a key for securing computer systems. While specific types of security flaws can be identified automatically, in the general case the process of finding vulnerabilities cannot be automated and vulnerabilities are mainly discovered by manual analysis.
Fabian Yamaguchi +2 more
openaire +1 more source
Code Clone Detection Based on Program Vector Tree
Code cloning facilitates software development but also causes recurring bugs and software quality problems. Some types of code clones have very low similarity in literal, leading to difficulty of detection.
ZENG Jie, BEN Kerong, ZHANG Xian, LI Xiaowei, ZHOU Quan
doaj +1 more source
Comparison of Clang Abstract Syntax Trees using String Kernels [PDF]
Abstract Syntax Trees (ASTs) are intermediate representations widely used by compiler frameworks. One of their strengths is that they can be used to determine the similarity among a collection of programs. In this paper we propose a novel comparison method that converts ASTs into weighted strings in order to get similarity matrices and quantify the ...
Torres, Raul +3 more
openaire +1 more source
Barat - a front end for java [PDF]
This paper presents a front-end for Java, called Barat, that supports static analysis of Java programs. Barat builds a complete abstract syntax tree from Java source code files, enriched with name and type analysis information.
Bokowski, Boris, Spiegel, André
core +1 more source
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML [PDF]
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, we discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view.
Lampesberger, Harald
core +1 more source

