咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 29 篇 软件工程
    • 19 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 2 篇 控制科学与工程

主题

  • 37 篇 big code
  • 7 篇 machine learning
  • 4 篇 clone detection
  • 3 篇 program synthesi...
  • 3 篇 software reuse
  • 3 篇 distributed repr...
  • 3 篇 code search
  • 2 篇 automated progra...
  • 2 篇 software securit...
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 sequence-to-sequ...
  • 2 篇 code embeddings
  • 2 篇 regularization
  • 2 篇 statistical code...
  • 2 篇 code naturalness
  • 2 篇 learning represe...
  • 2 篇 noisy data
  • 2 篇 neural machine t...
  • 1 篇 partial program ...

机构

  • 3 篇 swiss fed inst t...
  • 3 篇 iowa state univ ...
  • 2 篇 fudan univ sch c...
  • 2 篇 tsinghua univ sc...
  • 2 篇 peking univ peop...
  • 2 篇 technion haifa
  • 2 篇 univ texas dalla...
  • 2 篇 swiss fed inst t...
  • 2 篇 singapore manage...
  • 2 篇 univ calif davis...
  • 2 篇 deepcode ag
  • 1 篇 columbia univers...
  • 1 篇 kth royal inst t...
  • 1 篇 alan turing inst...
  • 1 篇 univ politecn ca...
  • 1 篇 univ edinburgh s...
  • 1 篇 univ adelaide sc...
  • 1 篇 university of lu...
  • 1 篇 nyu ny 10003 usa
  • 1 篇 shandong univ pe...

作者

  • 5 篇 raychev veselin
  • 5 篇 vechev martin
  • 3 篇 krause andreas
  • 3 篇 devanbu premkuma...
  • 2 篇 kashyap vineeth
  • 2 篇 yahav eran
  • 2 篇 luo ping
  • 2 篇 zilberstein meit...
  • 2 篇 hoan anh nguyen
  • 2 篇 bielik pavol
  • 2 篇 levy omer
  • 2 篇 nguyen tien n.
  • 2 篇 alon uri
  • 2 篇 ortin francisco
  • 2 篇 akram junaid
  • 2 篇 hung phan
  • 2 篇 anh tuan nguyen
  • 1 篇 sun yizhe
  • 1 篇 fu zhiyi
  • 1 篇 hirschfeld rober...

语言

  • 36 篇 英文
  • 1 篇 其他
检索条件"主题词=Big code"
37 条 记 录,以下是1-10 订阅
排序:
SNCD: A fast and scalable distributed near-miss code clone detector for big code based on partial index
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 167卷
作者: Yang, Liming Zhao, Jun Xie, Rulin Ren, Yi Guan, Jianbo Li, Bao Ma, Jun Tan, Yusong Natl Univ Def Technol Coll Comp Sci & Technol 137 Yanwachi St Changsha 410073 Hunan Peoples R China
A number of techniques have been proposed over the years to detect clones for improving software maintenance, reusability or security. However, there is still a lack of language agnostic approaches with code granulari... 详细信息
来源: 评论
Scalable Taint Specification Inference with big code  2019
Scalable Taint Specification Inference with Big Code
收藏 引用
40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) part of ACM's Federated Computing Research Conference (FCRC)
作者: Chibotaru, Victor Bichsel, Benjamin Raychev, Veselin Vechev, Martin DeepCode AG Zurich Switzerland Swiss Fed Inst Technol Zurich Switzerland
We present a new scalable, semi-supervised method for inferring taint analysis specifications by learning from a large dataset of programs. Taint specifications capture the role of library APIs (source, sink, sanitize... 详细信息
来源: 评论
Predicting Program Properties from "big code"  15
Predicting Program Properties from "Big Code"
收藏 引用
42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 15)
作者: Raychev, Veselin Vechev, Martin Krause, Andreas Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland
We present a new approach for predicting program properties from massive codebases (aka "big code"). Our approach first learns a probabilistic model from existing data and then uses this model to predict pro... 详细信息
来源: 评论
A Survey of Machine Learning for big code and Naturalness
收藏 引用
ACM COMPUTING SURVEYS 2018年 第4期51卷 81-81页
作者: Allamanis, Miltiadis Barr, Earl T. Devanbu, Premkumar Sutton, Charles Microsoft Res 21 Stn Rd Cambridge CB1 2FB England UCL Dept Comp Sci Gower St London WC1E 6BT England Univ Calif Davis Dept Comp Sci Davis CA 95616 USA Univ Edinburgh Sch Informat Edinburgh EH8 9AB Midlothian Scotland Alan Turing Inst London England
Research at the intersection of machine learning, programming languages, and software engineering has recently taken important steps in proposing learnable probabilistic models of source code that exploit the abundanc... 详细信息
来源: 评论
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2020年 第1期50卷 22-46页
作者: Akram, Junaid Mumtaz, Majid Luo, Ping Tsinghua Univ Sch Software Key Lab Informat Syst Secur Beijing Peoples R China
Many techniques have been developed over the years to detect code clones in different software systems to maintain security measures. These techniques often require the source code to compare the subject system agains... 详细信息
来源: 评论
Deep Learning for Source code Modeling and Generation: Models, Applications, and Challenges
收藏 引用
ACM COMPUTING SURVEYS 2020年 第3期53卷 62-62页
作者: Le, Triet H. M. Chen, Hao Babar, Muhammad Ali Univ Adelaide Sch Comp Sci Adelaide SA 5005 Australia
Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation, and paragraph understanding are so prominent that ... 详细信息
来源: 评论
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2021年 第2期51卷 294-318页
作者: Akram, Junaid Luo, Ping Tsinghua Univ Sch Software Key Lab Informat Syst Secur Beijing Peoples R China
Vulnerability detection and exploit is becoming a very important part of security, especially in malware code delivery, hacking a system, efforts to create patches, improving the source code, or updating a software. V... 详细信息
来源: 评论
Learning the Relation Between code Features and code Transforms With Structured Prediction
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第7期49卷 3872-3900页
作者: Yu, Zhongxing Martinez, Matias Chen, Zimin Bissyande, Tegawende F. F. Monperrus, Martin Shandong Univ Jinan Peoples R China Univ Politecn Cataluna Barcelona Spain KTH Royal Inst Technol S-11428 Stockholm Sweden Univ Luxembourg L-4365 Esch Sur Alzette Luxembourg
To effectively guide the exploration of the code transform space for automated code evolution techniques, we present in this article the first approach for structurally predicting code transforms at the level of AST n... 详细信息
来源: 评论
code2vec: Learning Distributed Representations of code
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2019年 第POPL期3卷 1-29页
作者: Alon, Uri Zilberstein, Meital Levy, Omer Yahav, Eran Technion Haifa Israel Facebook AI Res Seattle WA USA
We present a neural model for representing snippets of code as continuous distributed vectors ("code embeddings"). The main idea is to represent a code snippet as a single fixed-length code vector, which can... 详细信息
来源: 评论
MUSYNTH: Program Synthesis via code Reuse and code Manipulation  9th
MUSYNTH: Program Synthesis via Code Reuse and Code Manipulat...
收藏 引用
9th International Symposium on Search Based Software Engineering (SSBSE)
作者: Kashyap, Vineeth Swords, Rebecca Schulte, Eric Melski, David GrammaTech Inc Ithaca NY 14850 USA
MUSYNTH takes a draft C program with "holes", a test suite, and optional simple hints-that together specify a desired functionality-and performs program synthesis to auto-complete the holes. First, MUSYNTH l... 详细信息
来源: 评论