At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomp...
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomplish OCC,
This study explores a method integrating BERT and BiLSTM technologies aimed at enhancing the accuracy of sentiment recognition in online shopping reviews. Through detailed experimental validation, the fused model sign...
详细信息
Machine learning (ML) innovations have significantly advanced the field of defect prediction in software development, offering the potential for automated error detection across vast codebases. These advancements prom...
详细信息
ISBN:
(纸本)9798350365658
Machine learning (ML) innovations have significantly advanced the field of defect prediction in software development, offering the potential for automated error detection across vast codebases. These advancements promise to elevate software quality assurance by improving reliability and security. However, despite their benefits, existing defect prediction models are not without limitations, often failing to identify vulnerabilities or inaccurately flagging non-defective code segments as problematic. To overcome these shortcomings, this study introduces DPTester, a novel approach that diverges from traditional label-preserving transformations, aiming to more accurately mimic the complexities of real-world software development. Unlike previous methods, DPTester intentionally injects defects into source code to transform its semantics fundamentally. This methodology tests a defect prediction model's ability to identify and anticipate defects amidst semantic alterations. DPTester employs a two-step framework, consisting of automated test input and oracle generation. The initial phase generates test inputs by modifying conditional statements to induce potential defects. The subsequent phase evaluates the defect prediction models' performance using these inputs. A failure by a model to detect DPTester-introduced defects is considered an issue. Our evaluation of DPTester on two prominent defect prediction models, CodeT5+ and CodeBERT, involved the generation of 222,112 test inputs. This process demonstrated a 99% success rate in creating valid test scenarios. However, it exposed significant weaknesses in both models: CodeT5+ and CodeBERT's accuracy plummeted to 43% and 30%, respectively, when assessed against DPTester's complex test scenarios. Moreover, our analysis uncovered 144,104 and 98,574 prediction inconsistencies in CodeBERT and CodeT5+, respectively, underscoring the urgent need for model improvements to adeptly handle sophisticated testing landscapes. Furthermore
To better characterize the properties of surface-initiated polymers, simultaneous bulk-and surface-initiated polymerizations are usually carried out by assuming that the properties of the surface-initiated polymers re...
详细信息
To better characterize the properties of surface-initiated polymers, simultaneous bulk-and surface-initiated polymerizations are usually carried out by assuming that the properties of the surface-initiated polymers resemble those of the bulk-initiated polymers. Through a Monte Carlo simulation using a heterogeneous stochastic reaction model, it was discovered that the bulk-initiated polymers exhibit a higher molecular weight and a lower dispersity than the corresponding surface-initiated polymers, which indicates that the equivalent assumption is invalid. Furthermore, the molecular weight distributions of the two types of polymers are also different, suggesting different polymerization mechanisms. The results can be simply explained by the heterogeneous distributions of reactants in the system. This study is helpful to better understand surface-initiated polymerization.
Cross-modality person re-identification between visible and infrared images has become a research hotspot in the image retrieval field due to its potential application scenarios. Existing research usually designs loss...
详细信息
With good classification performance, digital medical image methods based on deep learning have received more and more attention. However, the problem of these methods is that the black-box characteristic of deep lear...
详细信息
Ridge regression (RR)-based methods aim to obtain a low-dimensional subspace for feature extraction. However, the subspace's dimensionality does not exceed the number of data categories, hence compromising its cap...
详细信息
In recent years, the accelerated advancement of Internet of Vehicles (IoV) technology has significantly enhanced user experiences by providing intelligent services such as multimedia entertainment and autonomous drivi...
详细信息
Cloud storage is now widely used, but its reliability has always been a major concern. Cloud block storage(CBS) is a famous type of cloud storage. It has the closest architecture to the underlying storage and can prov...
详细信息
Cloud storage is now widely used, but its reliability has always been a major concern. Cloud block storage(CBS) is a famous type of cloud storage. It has the closest architecture to the underlying storage and can provide interfaces for other types. Data modifications in CBS have potential risks such as null reference or data *** verification of these operations can improve the reliability of CBS to some extent. Although separation logic is a mainstream approach to verifying program correctness, the complex architecture of CBS creates some challenges for verifications. This paper develops a proof system based on separation logic for verifying the CBS data modifications. The proof system can represent the CBS architecture, describe the properties of the CBS system state, and specify the behavior of CBS data modifications. Using the interactive verification approach from Coq, the proof system is implemented as a verification tool. With this tool, the paper builds machine-checked proofs for the functional correctness of CBS data modifications. This work can thus analyze the reliability of cloud storage from a formal perspective.
key Point Analysis (KPA), the summarization of multiple arguments into a concise collection of key points, continues to be a significant and unresolved issue within the field of argument mining. Existing models adapt ...
详细信息
暂无评论