This paper presents Megadiff, a dataset of source code diffs. It focuses on java, with strict inclusion criteria based on commit message and diff size. Megadiff contains 663 029 java diffs that can be used for researc...
详细信息
We study the evolution and impact of bloated dependencies in a single software ecosystem: java/Maven. Bloated dependencies are third-party libraries that are packaged in the application binary but are not needed to ru...
详细信息
Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the tra...
详细信息
Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the traditional assessment methods are difficult to meet the current needs, and the identification of subsidies gradually leads to problems such as huge labor consumption and complex and difficult identification process. In order to solve this problem, with the help of big data, a financial aid evaluation system for poor college students is designed. The front end of the system uses MyEclipse development tool, java programming language and JSP web page technology, adopts MVC mode, designs system function modules and builds big data analysis and evaluation model, and the back end uses MySQL database. The system mainly includes user registration, student information management, subsidy application, counselor information management, application approval and other functional modules. The application of this system can realize the scientificization and standardization of poverty identification, save a lot of time for teachers and students, improve the efficiency and quality of school work, and help solve the problems existing in college subsidies.
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to e...
详细信息
ISBN:
(纸本)9781728125350
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to ensure that the specific semantics of the source language, e.g. a modeling language or a domain-specific language, is reflected in the logs? How to expose logging concepts directly in the source language, so as to let developers specify what to log? This paper reports on our experience developing a concrete logging approach for ThingML, a textual modeling language built around asynchronous components, statecharts and a first-class action language, as well as a set of "compilers" targeting C, Go, java and javaScript.
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed A...
详细信息
ISBN:
(纸本)9781728117645
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed ARepair, the first automated program repair technique for faulty Alloy models. ARepair takes as input a faulty Alloy model and a set of tests that capture the desired model properties, and produces a fixed model that passes all tests. ARepair uses tests written for the recently introduced AUnit framework, which provides a notion of unit testing for Alloy models. In this paper, we describes our java implementation of ARepair, which is a command-line tool, released as an open-source project on GitHub. Our experimental results show that ARepair is able to fix 28 out of 38 real-world faulty models we collected.
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to thi...
详细信息
ISBN:
(纸本)9781728145389
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the software engineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
In this paper, we propose a type system to detect non-terminating stream operations in java programs using Stream API. java Stream API makes it possible to write programs processing data collections in a declarative m...
详细信息
Planning an efficient construction site layout increases safety and productivity of operations. As opposed to considering only confined construction sites, this paper optimizes site layout for linear infrastructure pr...
详细信息
ISBN:
(数字)9780784482421
ISBN:
(纸本)9780784482421
Planning an efficient construction site layout increases safety and productivity of operations. As opposed to considering only confined construction sites, this paper optimizes site layout for linear infrastructure projects in congested inner cities roads ( i. e., road maintenance). The construction site location of these projects dynamically changes as the work progresses. Therefore, selecting construction facilities locations ( CFL) is a major problem prior to organizing these facilities. The presented work optimizes CFL selection in inner-cities congested roads, using uniform-cost search ( UCS) as an optimization tool, through minimizing the ( 1) resources transportation cost, ( 2) land renting cost, and ( 3) facilities relocation cost. The proposed model is coded in java using NetBeans IDE 8.1 platform. A hypothetical case study with a solution space of 243 solutions was conducted to demonstrate the model's benefits. The model succeeded in finding the optimal CFL for road segments in under 1,100 milliseconds using an 8 GB RAM, 2.00 GHz machine.
This report describes the 2019 Competition on Software Verification (SV-COMP), the 8th edition of a series of comparative evaluations of fully automatic software verifiers for C programs, and now also for java program...
详细信息
ISBN:
(纸本)9783030175023;9783030175016
This report describes the 2019 Competition on Software Verification (SV-COMP), the 8th edition of a series of comparative evaluations of fully automatic software verifiers for C programs, and now also for java programs. The competition provides a snapshot of the current state of the art in the area, and has a strong focus on replicability of its results. The repository of benchmark verification tasks now supports a new, more flexible format for task definitions (based on YAML), which was a precondition for conveniently benchmarking java programs in the same controlled competition setting that was successfully applied in the previous years. The competition was based on 10 522 verification tasks for C programs and 368 verification tasks for java programs. Each verification task consisted of a program and a property (reachability, memory safety, overflows, termination). SV-COMP 2019 had 31 participating verification systems from 14 countries.
暂无评论