A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Model Checking C# Code: A Translation Approach
2010
2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion
Extracting model from source code helps to ensure the implementation in accord with design. The properties of interest can be checked on implemented system via the extracted model. ...
Previous approaches usually abstract the source at the level of intermediate language or assembly code. ...
EXTRACT CSP# MODEL FROM C# SOURCE CODE Currently we are building a module of PAT to automatically extract CSP# model from C# source code. ...
doi:10.1109/ssiri-c.2010.17
dblp:conf/ssiri/Zhu10
fatcat:jdltyxzvdjd2nihcjgj772ydaa
CoCoSum: Contextual Code Summarization with Multi-Relational Graph Neural Network
[article]
2021
arXiv
pre-print
Source code summaries are short natural language descriptions of code snippets that help developers better understand and maintain source code. ...
This paper explores two global contexts, namely intra-class and inter-class contexts, and proposes the model CoCoSUM: Contextual Code Summarization with Multi-Relational Graph Neural Networks. ...
INTRODUCTION Code summaries (i.e., source code comments) are short natural language descriptions of source code. ...
arXiv:2107.01933v1
fatcat:g4mdjrdpszf2xnwjq32quc3mna
Integrating Unnormalised Semi-structured Data Sources
[chapter]
2005
Lecture Notes in Computer Science
We introduce special functions to relate object identifiers used in the global data model to object identifiers in unnormalised data sources, and demonstrate how to use these functions in query processing ...
, update processing and integration of these data sources. ...
Their definition is comparable to the requirement of 3NF in the relational model. ...
doi:10.1007/11431855_32
fatcat:4hebu3j3jjduvn3p6vspmcyhmu
Improving reverse-engineering through the use of multiple knowledge sources
1995
Journal of Software Maintenance: Research and Practice
to operational code using a variety of knowledge source inputs: code, documents and user expertise. ...
Such tools range from source code analysers to semi-intelligent tools which seek to reconstruct system designs and specification documents from source code. ...
The DOCKET project consortium consisted of four industrial partners and two academic partners: Computer Logic (Greece), CRIAI (Italy), Software Engineering Service (Germany), SOGEI (Italy), UMIST (UK) ...
doi:10.1002/smr.4360070406
fatcat:vcf2vovwxbhsdl5fso7duiaytm
The INFOMIX system for advanced integration of incomplete and inconsistent data
2005
Proceedings of the 2005 ACM SIGMOD international conference on Management of data - SIGMOD '05
Each global relation is thus associated with a union of conjunctive queries (UCQs). Given a source database instance D, the semantics of I w.r.t. ...
We assume that both G and S are specified in the relational model: actually, S stems from a subset of XML which can be transformed back and forth into relational data. ...
doi:10.1145/1066157.1066286
dblp:conf/sigmod/LeoneGILTEFFGRLLRKNS05
fatcat:2ni77egqsnf6nidag5ulrlc2lu
Modular Specification and Checking of Structural Dependencies
[chapter]
2014
Lecture Notes in Computer Science
Checking a software's structural dependencies is a line of research on methods and tools for analyzing, modeling and checking the conformance of source code w.r.t. specifications of its intended static ...
Our approach is suited for modeling high-level as well as detailed low-level decisions related to the static structure and combines both in a single modeling formalism. ...
First, for each ensemble its extension along with the set of source code dependencies related to it (those that have the ensemble as source or target) is calculated; self-dependencies, i.e., source code ...
doi:10.1007/978-3-642-55099-7_6
fatcat:fxwieruvs5ar5chnxwu2poc464
Modular specification and checking of structural dependencies
2013
Proceedings of the 12th annual international conference on Aspect-oriented software development - AOSD '13
Checking a software's structural dependencies is a line of research on methods and tools for analyzing, modeling and checking the conformance of source code w.r.t. specifications of its intended static ...
Our approach is suited for modeling high-level as well as detailed low-level decisions related to the static structure and combines both in a single modeling formalism. ...
First, for each ensemble its extension along with the set of source code dependencies related to it (those that have the ensemble as source or target) is calculated; self-dependencies, i.e., source code ...
doi:10.1145/2451436.2451448
dblp:conf/aosd/MitschkeEMGB13
fatcat:p7y3ub6bnzawnadkd5ywalttcy
A meta-model of information systems to support reverse engineering
1994
Information and Software Technology
In particular, effective maintenance requires knowledge of not only the source code, but also user documentation, system design and knowledge of the business goals and objectives the system aims to support ...
Underpinning the DOCKET toolset is an organisational meta-model called the Global System Model. ...
Acknowledgements The authors wish to acknowledge the contributions made to the DOCKET project by members of the project consortium: Computer Logic R&D (Greece), CRIAI (Italy), Software Engineering Service ...
doi:10.1016/0950-5849(94)90084-1
fatcat:wzocoustrrejhldrqpj4mfgrua
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code
2011
2011 18th Working Conference on Reverse Engineering
of source code methods. ...
We explain how this view of the project history can give insight about the semantic architecture of the code, and we identify a number of patterns that characterize particular kinds of maintenance tasks ...
Vertical columns of circles indicate related source code methods in the traditional topic modelling sense, where two code fragments found in the same concept are likely to be highly conceptually related ...
doi:10.1109/wcre.2011.20
dblp:conf/wcre/GrantCS11
fatcat:4gf64fqybrcg3fnyykp6qahrka
eSCAPE: parallel global-scale landscape evolution model
2018
Journal of Open Source Software
A set of four examples is provided (eSCAPEdemo) and illustrates the main capabilities of the code from synthetic to regional applications as well as continental and global simulations. ...
The model is primarily designed to address problems related to geomorphology, hydrology, and stratigraphy, but it can also be used in related fields. eSCAPE accounts for both hillslope processes (soil ...
A set of four examples is provided (eSCAPEdemo) and illustrates the main capabilities of the code from synthetic to regional applications as well as continental and global simulations. ...
doi:10.21105/joss.00964
fatcat:ejjph4ugjncpbkh6az6pt2nozi
Lightweight lexical source model extraction
1996
ACM Transactions on Software Engineering and Methodology
It is flexible in that there are few constraints on the kinds of artifacts from which source models are extracted (e.g., we can extract from source code, structured data files, documentation, etc.). ...
Some useful kinds of information-source models-are well known: call graphs, file dependences, etc. Predicting every kind of source model that a software engineer may need is impossible. ...
For example, a global variable references source model extracted from over 7000 lines of TCL code is exact because a particular global variable construct, suitable for extraction with regular expressions ...
doi:10.1145/234426.234441
fatcat:lo4luewuzneblmqnegqxalwdte
KnowAugNet: Multi-Source Medical Knowledge Augmented Medication Prediction Network with Multi-Level Graph Contrastive Learning
[article]
2022
arXiv
pre-print
Finally, the augmented medical codes embedding vectors and the supervised medical codes embedding vectors are retrieved and input to the sequential learning network to capture the temporal relations of ...
Most existing studies focus on utilizing inherent relations between homogeneous codes of medical ontology graph to enhance their representations using supervised methods, and few studies pay attention ...
Declaration of Competing Interest Authors declare that there is no conflict of interest. ...
arXiv:2204.11736v2
fatcat:vvncqo2tejgwrbpo2cxpstqdt4
Creating Explicit Communication in SoC Models Using Interactive Re-Coding
2007
2007 Asia and South Pacific Design Automation Conference
In fact, our studies on industrial-size examples have shown that about 50% of the communication exploration time is spent on coding and re-coding of the initial specification model. ...
In this paper, we propose an efficient interactive approach to explicit communication creation by automating some of the common coding tasks in specification models for communication exploration. ...
In Section II, we discuss specification modeling goals, and a modeling example, followed by related work. ...
doi:10.1109/aspdac.2007.357791
dblp:conf/aspdac/ChandraiahPD07
fatcat:vp6ryiyjazf6zbyw7m4v4f3vma
Fast and accurate resource conflict simulation for performance analysis of multi-core systems
2011
2011 Design, Automation & Test in Europe
This work presents a SystemC-based simulation approach for fast performance analysis of parallel software components, using source code annotated with low-level timing properties. ...
In contrast to other source-level approaches for performance analysis, timing attributes obtained from binary code can be annotated even if compiler optimizations are used without requiring changes in ...
Relating Source Code and Binary Control Flow Save an exhaustive analysis of program semantics, compilergenerated debug information is the only way to relate source code and machine instructions of a program ...
doi:10.1109/date.2011.5763044
dblp:conf/date/StattelmannBR11
fatcat:5w3r4na3zjh2lmejjw6kezydvi
Formal Verification of Security Properties of Smart Card Embedded Source Code
[chapter]
2005
Lecture Notes in Computer Science
Caduceus enables the verification of an annotated C program and provides a validation process that we used to generate a high level formal model of the C source code. ...
The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and ...
This specification becomes the local model of the program. 2. a validation step: the soundness of the local model with respect to the source code is proved using a source code verification tool. ...
doi:10.1007/11526841_21
fatcat:erblq2aorravpdbj33gywmvxxi
« Previous
Showing results 1 — 15 out of 913,750 results