Source Code Summarization is the task of writing short, natural language descriptions of source code. The main use for these descriptions is in software documentation e.g. the one-sentence java method descriptions in ...
详细信息
Software is prone to security vulnerabilities. Program analysis tools to detect them have limited effectiveness in practice due to their reliance on human labeled specifications. Large language models (or LLMs) have s...
详细信息
Humans possess a large amount of, and almost limitless, visual memory, that assists them to remember pictures far better than words. This phenomenon has recently motivated the computer security researchers' in aca...
详细信息
ISBN:
(纸本)9781467396103
Humans possess a large amount of, and almost limitless, visual memory, that assists them to remember pictures far better than words. This phenomenon has recently motivated the computer security researchers' in academia and industry to design and develop graphical user identification systems (GUISs). Cognometric GUISs are more memorable than drawmetric GUISs, but takes more time to authenticate. None of the previously proposed GUISs combines the advantages of both cognometric and drawmetric systems. A signature personify a person and a graphical signature is easier to recall than other drawings. This paper proposes a new graphical Signature-based User Identification System named SUIS. It is based on a 2D grid technology, that is used to draw, digitize and store the signature for user identification. SUIS is categorized as both a cognometric and drawmetric system. Unlike other systems that use 2D grid: We take one cell in a grid as one pixel in the drawing; for signature matching, the signature drawn has to follow the same grid cells as the signature stored, independent of the sequence; and that the system is not based on any machine learning model. Increasing the number of grid cells increases the password space, and decreasing the size of the grid cell increases the precision of the signature. These characteristics makes SUIS: (1) Rigorous enough to be a password system, but easy enough to be usable. (2) Independent of the language and device used to draw the signature. (3) Efficient and practical to be used for online authentication systems. Currently we are developing a prototype tool in java to implement SUIS and will carry out a study with a large number of participants to evaluate the validity of SUIS.
The West java Back-arc (WJBT) in the northern part of the java area was subjected to numerous magnitudes of seismic events in the java Back-arc Thrust system, which are genetically related to the well-known subduction...
详细信息
This paper presents Megadiff, a dataset of source code diffs. It focuses on java, with strict inclusion criteria based on commit message and diff size. Megadiff contains 663 029 java diffs that can be used for researc...
详细信息
Parallel java environments present challenging problems for performance tools because of java's rich language system and its multi-level execution platform combined with the integration of native-code application ...
详细信息
ISBN:
(纸本)9781581133592
Parallel java environments present challenging problems for performance tools because of java's rich language system and its multi-level execution platform combined with the integration of native-code application libraries and parallel runtime software. In addition to the desire to provide robust performance measurement and analysis capabilities for the javalanguage itself, the coupling of different software execution contexts under a uniform performance model needs careful consideration of how events of interest are observed and how cross-context parallel execution information is linked. This paper relates our experience in extending the TAU performance system to a parallel java environment based on mpijava. We describe the complexities of the instrumentation model used, how performance measurements are made, and the overhead incurred. A parallel java application simulating the game of Life is used to show the performance system's capabilities.
This paper focuses on comments written in source programs. While comments can work for improving the readability of code, i.e., the quality of programs, there have also been concerns that comments can be added for com...
详细信息
ISBN:
(纸本)9781538621424
This paper focuses on comments written in source programs. While comments can work for improving the readability of code, i.e., the quality of programs, there have also been concerns that comments can be added for complicated source code in order to compensate for a lack of readability. That is to say, well-written comments might be associated with problematic parts to be refactored. This paper collected java methods (programs) from six popular open source products, and performs analyses on words which appear in their comments. Then, the paper shows that a method having a longer comments (more words) tends to be more change-prone and would be required more fixes after their releases.
Current verification condition (VC) generation algorithms, such as weakest preconditions, yield a VC whose size may be exponential in the size of the code fragment being checked. This paper describes a two-stage VC ge...
详细信息
ISBN:
(纸本)1581133367
Current verification condition (VC) generation algorithms, such as weakest preconditions, yield a VC whose size may be exponential in the size of the code fragment being checked. This paper describes a two-stage VC generation algorithm that generates compact VCs whose size is worst-case quadratic in the size of the source fragment, and is close to linear in practice. This two-stage VC generation algorithm has been implemented as part of the Extended Static Checker for java. It has allowed us to check large and complex methods that would otherwise be impossible to check due to time and space constraints.
We present a simple, general-purpose tool for visualising java data structures. The tool uses java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary java *** tool...
详细信息
We present a simple, general-purpose tool for visualising java data structures. The tool uses java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary java *** tool offers certain pedagogical advantages over other "heavy-weight" visualisation systems. Its simplicity and generality means that students are able to visualise their own data structures, rather than passively observing a limited range of "correct" visualisations prepared in advance by the *** tool supports an active, exploratory style of learning, and is ideally suited for use in CS1-level courses that introduce java references and arrays, as well as a range of CS2-level data structure material. Initial classroom results are encouraging.
暂无评论