When writing source code, programmers have varying levels of freedom when it comes to the creation and use of identifiers. Do they habitually use the same identifiers, names that are different to those used by others?...
详细信息
In software development, technical debt (TD) refers to suboptimal implementation choices made by the developers to meet urgent deadlines and limited resources, posing challenges for future maintenance. Self-Admitted T...
详细信息
This paper presents Megadiff, a dataset of source code diffs. It focuses on java, with strict inclusion criteria based on commit message and diff size. Megadiff contains 663 029 java diffs that can be used for researc...
详细信息
We study the evolution and impact of bloated dependencies in a single software ecosystem: java/Maven. Bloated dependencies are third-party libraries that are packaged in the application binary but are not needed to ru...
详细信息
When a runtime exception occurs during the operation or performance test of a java Web application, it can not be confirmed detailed behavior and values until the occurrence of an exception from the limited log, there...
详细信息
In this paper, we propose a method to collect an execution trace to analyze the internal states of software with a planned amount of storage. The method uses separated data buffers to record the actual values used by ...
详细信息
Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the tra...
详细信息
Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the traditional assessment methods are difficult to meet the current needs, and the identification of subsidies gradually leads to problems such as huge labor consumption and complex and difficult identification process. In order to solve this problem, with the help of big data, a financial aid evaluation system for poor college students is designed. The front end of the system uses MyEclipse development tool, java programming language and JSP web page technology, adopts MVC mode, designs system function modules and builds big data analysis and evaluation model, and the back end uses MySQL database. The system mainly includes user registration, student information management, subsidy application, counselor information management, application approval and other functional modules. The application of this system can realize the scientificization and standardization of poverty identification, save a lot of time for teachers and students, improve the efficiency and quality of school work, and help solve the problems existing in college subsidies.
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to e...
详细信息
ISBN:
(纸本)9781728125350
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to ensure that the specific semantics of the source language, e.g. a modeling language or a domain-specific language, is reflected in the logs? How to expose logging concepts directly in the source language, so as to let developers specify what to log? This paper reports on our experience developing a concrete logging approach for ThingML, a textual modeling language built around asynchronous components, statecharts and a first-class action language, as well as a set of "compilers" targeting C, Go, java and javaScript.
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed A...
详细信息
ISBN:
(纸本)9781728117645
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed ARepair, the first automated program repair technique for faulty Alloy models. ARepair takes as input a faulty Alloy model and a set of tests that capture the desired model properties, and produces a fixed model that passes all tests. ARepair uses tests written for the recently introduced AUnit framework, which provides a notion of unit testing for Alloy models. In this paper, we describes our java implementation of ARepair, which is a command-line tool, released as an open-source project on GitHub. Our experimental results show that ARepair is able to fix 28 out of 38 real-world faulty models we collected.
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to thi...
详细信息
ISBN:
(纸本)9781728145389
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the software engineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
暂无评论