Results 41 to 50 of about 210,399 (315)

Automatic Code Annotation Generation Based on Multi-dimensional Heterogeneous Graph Structure [PDF]

open access: yesJisuanji gongcheng, 2023
The task of automatic code annotation generation has become a research hotspot considering code annotations can enhance the readability of source code and assist the software development process.While some researchers have exploited the sequence ...
RONG Keyao, XIONG Yun
doaj   +1 more source

Synthesis Algorithm of Homology Detection Based on AHP [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2013
Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work alone.
Baojiang Cui   +5 more
doaj   +1 more source

Target Code Selection by Tilling AST with the Use of Tree Pattern Pushdown Automaton [PDF]

open access: yes, 2014
A new and simple method for target code selection by tilling an abstract syntax tree is presented. As it is usual, tree patterns corresponding to target machine instructions are matched in the abstract syntax tree.
Janousek, Jan
core   +1 more source

Revisiting Code Similarity Evaluation with Abstract Syntax Tree Edit Distance [PDF]

open access: yesAnnual Meeting of the Association for Computational Linguistics
This paper revisits recent code similarity evaluation metrics, particularly focusing on the application of Abstract Syntax Tree (AST) editing distance in diverse programming languages. In particular, we explore the usefulness of these metrics and compare
Yewei Song   +4 more
semanticscholar   +1 more source

Smart Contract Vulnerability Detection Technology Based on Abstract Syntax Tree Embedding [PDF]

open access: yesJisuanji gongcheng
Currently, in deep learning-based smart contract vulnerability detection solutions, the direct use of bytecode or source code for textual sequence feature representation lacks a comprehensive understanding of program semantics.
XU Ying, FU Ziwei, ZHANG Wei, CHEN Yunfang
doaj   +1 more source

Generalized vulnerability extrapolation using abstract syntax trees [PDF]

open access: yesProceedings of the 28th Annual Computer Security Applications Conference, 2012
The discovery of vulnerabilities in source code is a key for securing computer systems. While specific types of security flaws can be identified automatically, in the general case the process of finding vulnerabilities cannot be automated and vulnerabilities are mainly discovered by manual analysis.
Fabian Yamaguchi   +2 more
openaire   +1 more source

Code Clone Detection Based on Program Vector Tree

open access: yesJisuanji kexue yu tansuo, 2020
Code cloning facilitates software development but also causes recurring bugs and software quality problems. Some types of code clones have very low similarity in literal, leading to difficulty of detection.
ZENG Jie, BEN Kerong, ZHANG Xian, LI Xiaowei, ZHOU Quan
doaj   +1 more source

Comparison of Clang Abstract Syntax Trees using String Kernels [PDF]

open access: yes2018 International Conference on High Performance Computing & Simulation (HPCS), 2018
Abstract Syntax Trees (ASTs) are intermediate representations widely used by compiler frameworks. One of their strengths is that they can be used to determine the similarity among a collection of programs. In this paper we propose a novel comparison method that converts ASTs into weighted strings in order to get similarity matrices and quantify the ...
Torres, Raul   +3 more
openaire   +1 more source

Barat - a front end for java [PDF]

open access: yes, 1998
This paper presents a front-end for Java, called Barat, that supports static analysis of Java programs. Barat builds a complete abstract syntax tree from Java source code files, enriched with name and type analysis information.
Bokowski, Boris, Spiegel, André
core   +1 more source

A Grammatical Inference Approach to Language-Based Anomaly Detection in XML [PDF]

open access: yes, 2013
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, we discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view.
Lampesberger, Harald
core   +1 more source

Home - About - Disclaimer - Privacy