Semantics-based code search demonstration proposal Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user's specifications. The key words here are specifications and generate. We let users specify what they are lo... ...
Quebio was able to find methods correctly implementing the specified IO behaviors for 43 of the queries, significantly outperforming the existing semantics-based code search techniques. The average search time with Quebio was about 213 seconds for each query....
摘要: The primary goal of Automated Program Repair (APR) is to automatically fix buggy software, to reduce the manual bug-fix burden that presently rests on human developers. Existing APR techniques can be...关键词: Automated program repair Program synthesis Symbolic execution Patch overfitting ...
Random Search for Hyper-Parameter Optimization. J Mach Learn Res. 2012;13(null):281–305. https://dl.acm.org/doi/abs/10.5555/2188385.2188395. Turki H, Hadj Taieb MA, Ben Aouicha M. How knowledge-driven class generalization affects classical machine learning algorithms for mono-label supervised...
The autoencoder maps it to h (i.e., the hidden code) and attempts to reconstruct both x and the paraphrase embedding y. Fig. 3 Autoencoder Architecture Full size image Ontology matching The two components that we have presented were build in such a way so that they learn sentence ...
On the basis of utilizing the traditional best search engine, the code searching method correspondingly expands semantic information identification and sorting, defines a search range by configuring a crawler, improves the search efficiency and the precision accuracy, and considers user favor.刘通...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, and Roberto Zunino. 2008. Semantics-based de- sign for secure web services. IEEE Trans. Software Eng. 34, 1 (2008), 33-49.Massimo Barloletti, et. al.‖ Semantics-Based Design for Secure Web Services‖, IEEE Transactions on Software...
Multigranularity semantics based vulnerability search method for cross﹑latform binarybinary clonecross‐platformdeep neural networksemantic learningvulnerability detectionSemantic learning is a common method for binary vulnerability detection, which can analyze the assembly structure of the binary code. The ...
Because these methods typically use syntactic representations, i.e., source code, we know little about how the different methods explore their semantic spaces, which is relevant for assessing repair quality and understanding search dynamics. We propose an automated method based on program semantics, ...
Computer science A Transformation-Based Foundation for Semantics-Directed Code Generation ROCHESTER INSTITUTE OF TECHNOLOGY Axel SchreinerPengcheng Shi Nunes-HarwittArthurInterpreters and compilers are two different ways of implementing programming languages. An interpreter directly executes its program input. It...