咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 9 篇 软件工程
    • 7 篇 计算机科学与技术...
    • 1 篇 电气工程

主题

  • 9 篇 api misuse detec...
  • 2 篇 api usage model
  • 2 篇 api recommendati...
  • 1 篇 architectural co...
  • 1 篇 probabilistic gr...
  • 1 篇 automated progra...
  • 1 篇 api usage constr...
  • 1 篇 api usage graphs
  • 1 篇 empirical study
  • 1 篇 program structur...
  • 1 篇 software framewo...
  • 1 篇 events mining
  • 1 篇 intelligent tuto...
  • 1 篇 architectural ta...
  • 1 篇 codebases
  • 1 篇 knowledge graph
  • 1 篇 static code anal...
  • 1 篇 static analysis
  • 1 篇 document mining
  • 1 篇 api constraint e...

机构

  • 1 篇 beihang univ han...
  • 1 篇 beihang univ sta...
  • 1 篇 tech univ darmst...
  • 1 篇 fraunhofer iem p...
  • 1 篇 tech univ darmst...
  • 1 篇 paderborn univ p...
  • 1 篇 paderborn univ h...
  • 1 篇 paderborn univ h...
  • 1 篇 univ nebraska li...
  • 1 篇 cent south univ ...
  • 1 篇 rochester inst t...
  • 1 篇 nanjing univ aer...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ potsdam has...
  • 1 篇 rochester inst t...
  • 1 篇 univ nebraska de...

作者

  • 2 篇 mirakhorli mehdi
  • 2 篇 shokri ali
  • 1 篇 zhang lingyan
  • 1 篇 zhao rui
  • 1 篇 song myoungkyu
  • 1 篇 li li
  • 1 篇 narasimhan krish...
  • 1 篇 tian wentong
  • 1 篇 zhang yangqi
  • 1 篇 kuai zhirui
  • 1 篇 newar dip kiran ...
  • 1 篇 ma yunlong
  • 1 篇 zhang jingxuan
  • 1 篇 bodden eric
  • 1 篇 zhang zhiyang
  • 1 篇 li can
  • 1 篇 gao xiang
  • 1 篇 cergani ervina
  • 1 篇 shen bcijun
  • 1 篇 zcng hushuang

语言

  • 9 篇 英文
检索条件"主题词=API Misuse Detection"
9 条 记 录,以下是1-10 订阅
排序:
api misuse detection via Probabilistic Graphical Model  2024
API Misuse Detection via Probabilistic Graphical Model
收藏 引用
33rd ACM SIGSOFT International Conference on Software Testing and Analysis (ISSTA)
作者: Ma, Yunlong Tian, Wentong Gao, Xiang Sun, Hailong Li, Li Beihang Univ State Key Lab Complex & Crit Software Environm CC Beijing Peoples R China Beihang Univ Hangzhou Innovat Inst Beijing Peoples R China
api misuses can cause a range of issues in software development, including program crashes, bugs, and vulnerabilities. Different approaches have been developed to automatically detect api misuses by checking the progr... 详细信息
来源: 评论
Boosting api misuse detection via Integrating api Constraints from Multiple Sources  21
Boosting API Misuse Detection via Integrating API Constraint...
收藏 引用
IEEE/ACM 21st International Conference on Mining Software Repositories (MSR)
作者: Li, Can Zhang, Jingxuan Tang, Yixuan Li, Zhuhang Sun, Tianyue Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Jiangsu Peoples R China
In modern software development, developers access reusable functionality provided by third-party libraries through Application Programming Interfaces (apis). However, using apis requires developers to conform specific... 详细信息
来源: 评论
misuseHint: A Service for api misuse detection Based on Building Knowledge Graph from Documentation and Codebase
MisuseHint: A Service for API Misuse Detection Based on Buil...
收藏 引用
IEEE International Conference on Web Services (IEEE ICWS) / IEEE World Congress on Services (IEEE SERVICES)
作者: Liang, Qingmi Kuai, Zhirui Zhang, Yangqi Zhang, Zhiyang Kuang, Li Zhang, Lingyan Cent South Univ Sch Comp Sci & Engn Changsha Peoples R China
Developers often call apis to improve development efficiency, but they misuse apis due to lack of understanding of source code logic and other unavoidable reasons, resulting in serious consequences such as program cra... 详细信息
来源: 评论
On the Impact of Order Information in api Usage Patterns  13th
On the Impact of Order Information in API Usage Patterns
收藏 引用
13th International Conference on Software Technologies (ICSOFT)
作者: Cergani, Ervina Mezini, Mira Tech Univ Darmstadt Software Technol Grp Darmstadt Germany
Many approaches have been proposed for learning Application Programming Interface (api) usage patterns from code repositories. Depending on the underlying technique, the mined patterns may (1) be strictly sequential, ... 详细信息
来源: 评论
FUM - A Framework for api Usage constraint and misuse Classification  29
FUM - A Framework for API Usage constraint and Misuse Classi...
收藏 引用
29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Schlichtig, Michael Sassalla, Steffen Narasimhan, Krishna Bodden, Eric Paderborn Univ Heinz Nixdorf Inst Paderborn Germany Univ Potsdam Hasso Plattner Inst Potsdam Germany Tech Univ Darmstadt Darmstadt Germany Paderborn Univ Heinz Nixdoif Inst Paderborn Germany Fraunhofer IEM Paderborn Germany Paderborn Univ Paderborn Germany
Application Programming Interfaces (apis) are the primary mechanism that developers use to obtain access to third-party algorithms and services. Unfortunately, apis can be misused, which can have catastrophic conseque... 详细信息
来源: 评论
ArCode: A Tool for Supporting Comprehension and Implementation of Architectural Concerns  29
ArCode: A Tool for Supporting Comprehension and Implementati...
收藏 引用
29th IEEE/ACM International Conference on Program Comprehension (ICPC) / 18th IEEE/ACM International Conference on Mining Software Repositories (MSR)
作者: Shokri, Ali Mirakhorli, Mehdi Rochester Inst Technol Dept Software Engn Rochester NY 14623 USA
Integrated development environments (IDE) play an important role in supporting developers during program comprehension and completion. Many of these supportive features focus on low-level programming and debugging act... 详细信息
来源: 评论
Mining api Constraints from Library and Client to Detect api misuses  28
Mining API Constraints from Library and Client to Detect API...
收藏 引用
28th Asia-Pacific Software Engineering Conference (APSEC)
作者: Zcng, Hushuang Chen, Jingxin Shen, Bcijun Zhong, Hao Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai Peoples R China
Calling Application Programming Interfaces (apis) shall follow various constraints (e.g., call orders). If these constraints are violated, api misuses are introduced to code, and such misuses can cause severe bugs. To... 详细信息
来源: 评论
ArCode: Facilitating the Use of Application Frameworks to Implement Tactics and Patterns  18
ArCode: Facilitating the Use of Application Frameworks to Im...
收藏 引用
18th IEEE International Conference on Software Architecture (ICSA)
作者: Shokri, Ali Santos, Joanna C. S. Mirakhorli, Mehdi Rochester Inst Technol Rochester NY 14623 USA
Software designers and developers are increasingly relying on application frameworks as first-class design concepts. They instantiate the services that frameworks provide to implement various architectural tactics and... 详细信息
来源: 评论
SSDTutor: A feedback-driven intelligent tutoring system for secure software development
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2023年 第1期227卷
作者: Newar, Dip Kiran Pradhan Zhao, Rui Siy, Harvey Soh, Leen-Kiat Song, Myoungkyu Univ Nebraska Dept Comp Sci Omaha NE 68182 USA Univ Nebraska Lincoln Dept Comp Sci Lincoln NE 68588 USA
Application Programming Interfaces (apis) in cryptography typically impose concealed us-age constraints. The violations of these usage constraints can lead to software crashes or security vulnerabilities. Several prof... 详细信息
来源: 评论