Language model-based code completion models have quickly grown in use, helping thousands of developers write code in many different programming languages. However, research on code completion models typically focuses ...
详细信息
ISBN:
(纸本)9798400706097
Language model-based code completion models have quickly grown in use, helping thousands of developers write code in many different programming languages. However, research on code completion models typically focuses on imperative languages such as Python and JavaScript, which results in a lack of representation for functional programming languages. Consequently, these models often perform poorly on functional languages such as Haskell. To investigate whether this can be alleviated, we evaluate the performance of two language models for code, CodeGPT and UniXcoder, on the functional programming language Haskell. We fine-tune and evaluate the models on Haskell functions sourced from a publicly accessible Haskell dataset on HuggingFace. Additionally, we manually evaluate the models using our novel translated HumanEval dataset. Our automatic evaluation shows that knowledge of imperative programming languages in the pre-training of LLMs may not transfer well to functional languages, but that code completion on functional languages is feasible. Consequently, this shows the need for more high-quality Haskell datasets. A manual evaluation on HumanEval-Haskell indicates CodeGPT frequently generates empty predictions and extra comments, while UniXcoder more often produces incomplete or incorrect predictions. Finally, we release HumanEval-Haskell, along with the fine-tuned models and all code required to reproduce our experiments on GitHub [41].
Web application security breaches frequently involve exploiting structured query language (SQL) injection vulnerabilities introduced by weaknesses in the coding style. Software engineers commonly lack the expertise an...
详细信息
ISBN:
(纸本)9781665476119
Web application security breaches frequently involve exploiting structured query language (SQL) injection vulnerabilities introduced by weaknesses in the coding style. Software engineers commonly lack the expertise and experience in implementing the functional programming principles of immutability, using pure functions, and reducing side effects to prevent vulnerabilities in their code. This study explores the changes web application developers can implement following the functional programming principles of immutability, using pure functions, and reducing side effects to reduce the presence of SQL injection vulnerabilities in web applications. The solution presented in this study, design strategies, supports the nascent design theory that applying the functional programming principles of immutability, using pure functions, and reducing side effects can reduce the presence of SQL injection vulnerabilities in web applications. When applied to an intentionally vulnerable web application, the design strategies developed through this study demonstrated effectiveness in reducing SQL injection vulnerabilities from web applications. This study contributes to the practice of software development by giving web application developers a new way to secure their web Applications.
In this paper we investigate the way in which the Gamma model, proposed by Banâtre and Le Metayer [1], might be supported in a functional language. We discuss the mechanism behind the model and examine the diffic...
详细信息
The architecture of a computer determines what programs are allowed to do and what the microarchitecture should implement. As security and safety become critical needs for an emergent class of highly-connected devices...
详细信息
ISBN:
(数字)9781665490054
ISBN:
(纸本)9781665490054
The architecture of a computer determines what programs are allowed to do and what the microarchitecture should implement. As security and safety become critical needs for an emergent class of highly-connected devices, the way computations are performed becomes a central concern, as it can directly allow or hamper the development of malicious software. In this work we investigate functional programming as an alternative foundation for computer architectures, starting from a formal calculus of structured combinators up to its implications on software and hardware design, resulting in the open-source, purely-functional fun instruction-set architecture.
functional languages have been the backbone of Galois' business for the past eight years. They have been very good for us, but not without their own share of challenges. In this talk, we shall stand back and exami...
详细信息
The variety of data is one of the important issues in the era of Big Data. The data are naturally organized in different formats and models, including structured data, semi-structured data, and unstructured data. Prio...
详细信息
Web application programming interfaces (APIs) security breaches frequently involve exploiting injection vulnerabilities introduced by weaknesses in the coding style, and software engineers commonly lack the expertise ...
详细信息
Web application programming interfaces (APIs) security breaches frequently involve exploiting injection vulnerabilities introduced by weaknesses in the coding style, and software engineers commonly lack the expertise and experience in the implementation of the functional programming principles of immutability, the use of pure functions, and the reduction of side effects to prevent vulnerabilities in their code. This Design Science Research (DSR) study explores the changes web application developers can implement following the functional programming principles of immutability, the use of pure functions, and the reduction of side effects to reduce the presence of injection vulnerabilities in web application APIs. The research design and method for this study followed the General Design Cycle (GDC) and established DSR patterns to develop a solution to a real-world problem and make a knowledge contribution in the form of adaptation by making novel use of existing knowledge in a new way. The artifact resulting from this study, design principles, supports the nascent design theory that applying the functional programming principles of pure functions, immutability, and removing side effects can remove injection vulnerabilities from web application APIs. When applied to the sample, an intentionally vulnerable web application, the design principles demonstrated effectiveness through established DSR evaluation methods to remove injection vulnerabilities from web application APIs. This study contributes to the practice of software development by giving web application developers a new way to secure their APIs.
Reproducing Kernel Hilbert Space (RKHS)-based methods are widely used in signal processing and machine learning applications. Yet, they suffer from a parameter selection issue: selecting the RKHS in which to operate (...
详细信息
A hierarchical and functional programming based on attribute grammar is presented. In this approach, programs are hierarchically decomposed into modules and each module is characterized by its inputs and outputs. A se...
详细信息
The involvement of functional programming is allowed to be determined in this research article. Therefore, the impact of language programming is an important factor that has an impactful role within functional program...
详细信息
暂无评论