Filters








32,496 Hits in 6.8 sec

Improving pattern tracking with a language-aware tree differencing algorithm

Nicolas Palix, Jean-Remy Falleri, Julia Lawall
2015 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER)  
Furthermore, they identify only additions and removals, but not the moving of a block of code from one part of a file to another.  ...  Code fragments of interest that fall within the added and removed regions of code have to be manually correlated across versions, which is tedious and error-prone.  ...  The main source of difficulty is GumTree's strategy for detecting moved fragments of code.  ... 
doi:10.1109/saner.2015.7081814 dblp:conf/wcre/PalixFL15 fatcat:peql74npu5c3nhs7rdqe6smlfm

Language-Independent Clone Detection Applied to Plagiarism Detection

Romain Brixtel, Mathieu Fontaine, Boris Lesner, Cyril Bazin, Romain Robbes
2010 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation  
For instance, the source code can be heavily changed at a superficial level (in an attempt to look genuine), yet be functionally very similar.  ...  Clone detection is usually applied in the context of detecting small-to medium scale fragments of duplicated code in large software systems.  ...  Back to the plagiarism detection, we assume that blocks of instructions (for example: functions or methods) can move without efforts across a source code but the instructions inside those blocks are constrainted  ... 
doi:10.1109/scam.2010.19 dblp:conf/scam/BrixtelFLBR10 fatcat:zlg2landj5hbvimbxef4qcdusa

Tracking performance across software revisions

Nagy Mostafa, Chandra Krintz
2009 Proceedings of the 7th International Conference on Principles and Practice of Programming in Java - PPPJ '09  
In this work, we investigate a framework for "performance-aware" repository and revision control for Java programs.  ...  Our system automatically tracks behavioral differences across revisions to provide developers with feedback as to how their change impacts performance of the application.  ...  Call-site information can also be used for measuring code coverage and anomaly detection [8] .  ... 
doi:10.1145/1596655.1596682 dblp:conf/pppj/MostafaK09 fatcat:42wq65qapjggljpcuz7fqnbxaq

Where do bugs come from?

Adrian Schröter, Thomas Zimmermann, Rahul Premraj, Andreas Zeller
2006 Software engineering notes  
In the current demonstration we present a new instrument that provides for each existing class in an analyzed system information related to the problems the class reveals.  ...  Whenever we detect that a file has been moved to another place we link the new name to the old one. Upon building the qualified name for any file we always look back at the first path in the chain.  ...  and different data flow analyses to search for patterns (for example, a detector could use a null pointer data flow analysis to propagate the null values across code and then verify if there are null  ... 
doi:10.1145/1218776.1218791 fatcat:mozzgocmaresjlelnzivbyzluu

Spork: Structured Merge for Java with Formatting Preservation

Simon Larsen, Jean-Remy Falleri, Benoit Baudry, Martin Monperrus
2022 IEEE Transactions on Software Engineering  
The highly parallel workflows of modern software development have made merging of source code a common activity for developers.  ...  Line-based merge is however a generalized technique for any text that cannot leverage the structured nature of source code, making merge conflicts a common occurrence.  ...  A heuristic lookahead mechanism built on top of the matching does however allow for limited move and update detection [23] .  ... 
doi:10.1109/tse.2022.3143766 fatcat:dgbhtiyzirbyrohtdwbqnkdqt4

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications

Wenyu Qu, Wei Huo, Lingyu Wang
2018 EAI Endorsed Transactions on Security and Safety  
Next, we combine the partial results obtained from different stages using a learning-based approach to further improve the detection accuracy.  ...  On the other hand, this is clearly a challenging task since signature-based detection mostly only works for known attacks, whereas anomaly detection is well known to suffer from inaccuracy.  ...  As mentioned previously, the score of all the features across the four stages are used as attributes for decision tree.  ... 
doi:10.4108/eai.11-12-2018.156032 fatcat:4rbyn3sgfnctboeft44ng5f7zu

Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance [article]

Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matthew Sutter, Adam G. Kimura
2021 IACR Cryptology ePrint Archive  
Flattening the netlist in this way allows for easier matching across equivalent designs.  ...  The control code will move progressively through the from small matching sets to larger sets. At each step, a system of the matching sets will be used to try to further reduce the search space.  ... 
dblp:journals/iacr/LiszewskiMDEJSK21 fatcat:3egaqqr4dbd4bkdud45z4nqmfm

Incremental Clone Detection

Nils Göde, Rainer Koschke
2009 2009 13th European Conference on Software Maintenance and Reengineering  
Another benefit is that the source code does not need to be compilable and the detection can be run in any stage during the development of a program.  ...  A single tree for all files ensures that clone pairs can be found across files. Before concatenation, a unique file terminator token is appended to the token string of each file.  ... 
doi:10.1109/csmr.2009.20 dblp:conf/csmr/GodeK09 fatcat:4gfzphznnjh5xprnbbyiej5p7u

An empirical evaluation of the usefulness of Tree Kernels for Commit-time Defect Detection in large software systems [article]

Hareem Sahar, Yuxin Liu, Abram Hindle, Denilson Barbosa
2021 arXiv   pre-print
Our approach represents source code as abstract syntax trees and uses tree kernels to estimate the similarity of the code with previous commits.  ...  Current defect detection approaches rely on metric-based models which are not very accurate and whose results are not directly useful for developers.  ...  Processing commits to extract methods The source code changes introduced by a commit are spread across one or multiple files.  ... 
arXiv:2106.10789v1 fatcat:mt34jucmqjemtnjp36iv6whb7q

Tracking Your Changes: A Language-Independent Approach

Gerardo Canfora, Luigi Cerulo, Massimiliano Di Penta
2009 IEEE Software  
The availability of powerful differencing algorithms is crucial to track the evolution of source code, for example with the purpose of monitoring clones or vulnerable statements.  ...  In this paper we present a language-independent approach to track the evolution of code fragments, based on a novel differencing algorithm, that overcomes limitations of the Unix diff.  ...  (a) Ability to identify moved lines on a set of 100 source code files.  ... 
doi:10.1109/ms.2009.26 fatcat:plxz3h77wref7angiy5pm7fud4

Static Analysis at GitHub

Timothy Clem, Patrick Thomson
2021 Queue  
The Semantic Code team at GitHub builds and operates a suite of technologies that power symbolic code navigation on github.com.  ...  required and almost immediate availability after code changes.  ...  The tooling in the Tree-sitter ecosystem allows fast iteration for grammar development and tree matching, making it possible to support new language syntax quickly or identify new constructs for code navigation  ... 
doi:10.1145/3487019.3487022 fatcat:hefktfkc65cd5hhna2nzoizqbi

Vdiff: a program differencing algorithm for Verilog hardware description language

Adam Duley, Chris Spandikow, Miryung Kim
2012 Automated Software Engineering : An International Journal  
This paper presents Vdiff, an instantiation of this position-independent differencing algorithm for Verilog HDL.  ...  We conducted a user study with eight hardware design experts to understand how the program differences identified by the experts match Vdiff's output. The study results  ...  Acknowledgements We thank Greg Gibeling and Derek Chiou for providing accesses to the RAMP repository and Adnan Aziz and anonymous reviewers for their detailed comments on our draft.  ... 
doi:10.1007/s10515-012-0107-6 fatcat:m4amwaijbfhxhmehbfjrsyzkuq

Detecting higher-level similarity patterns in programs

Hamid Abdul Basit, Stan Jarzabek
2005 Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE-13  
Several techniques have been proposed to detect the same or similar code fragments in software, so-called simple clones.  ...  Finally, we perform file clustering to detect those clusters of highly similar files that are likely to contribute to a design-level similarity pattern.  ...  ACKNOWLEDGEMENTS Many thanks are due to the following people for their invaluable support and guidance at different stages of the research and development: Bill Smyth, Simon Puglisi (for providing the  ... 
doi:10.1145/1081706.1081733 dblp:conf/sigsoft/BasitJ05 fatcat:bmjyfmuub5bq7ahx7nrhhiupwy

Detecting higher-level similarity patterns in programs

Hamid Abdul Basit, Stan Jarzabek
2005 Software engineering notes  
Several techniques have been proposed to detect the same or similar code fragments in software, so-called simple clones.  ...  Finally, we perform file clustering to detect those clusters of highly similar files that are likely to contribute to a design-level similarity pattern.  ...  ACKNOWLEDGEMENTS Many thanks are due to the following people for their invaluable support and guidance at different stages of the research and development: Bill Smyth, Simon Puglisi (for providing the  ... 
doi:10.1145/1095430.1081733 fatcat:oocmt4s5ujglrdo3gsl2e3bqf4

Burrows—Wheeler Compression [chapter]

Peter Fenwick
2003 Lossless Compression Handbook  
His inversion frequencies were really a substitute for move-to-front coding, whereas inversion coding applies at a much later stage of the process sequence.  ...  The context tree of PPM is thereby Effros [16] shows the equivalence of the context trees of PPM*, the suffix trees of some Burrows-Wheeler implementations, and the pattern-matching trees often used  ... 
doi:10.1016/b978-012620861-0/50008-5 fatcat:bmdaqour2fea3lqzco5k5im4ym
« Previous Showing results 1 — 15 out of 32,496 results