Code search: A survey of techniques for finding code
L Di Grazia, M Pradel - ACM Computing Surveys, 2023 - dl.acm.org
The immense amounts of source code provide ample challenges and opportunities during
software development. To handle the size of code bases, developers commonly search for …
software development. To handle the size of code bases, developers commonly search for …
A novel neural source code representation based on abstract syntax tree
Exploiting machine learning techniques for analyzing programs has attracted much
attention. One key problem is how to represent code fragments well for follow-up analysis …
attention. One key problem is how to represent code fragments well for follow-up analysis …
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …
code. Consequently, the protection of computer systems critically depends on the rigorous …
[PDF][PDF] A survey on software clone detection research
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …
modifications is a well known code smell in software maintenance. Several studies show …
A language independent approach for detecting duplicated code
Code duplication is one of the factors that severely complicates the maintenance and
evolution of large software systems. Techniques for detecting duplicated code exist but rely …
evolution of large software systems. Techniques for detecting duplicated code exist but rely …
Semantics-based code search
SP Reiss - 2009 IEEE 31st International Conference on …, 2009 - ieeexplore.ieee.org
Our goal is to use the vast repositories of available open source code to generate specific
functions or classes that meet a user's specifications. The key words here are specifications …
functions or classes that meet a user's specifications. The key words here are specifications …
Wireframe-based UI design search through image autoencoder
UI design is an integral part of software development. For many developers who do not have
much UI design experience, exposing them to a large database of real-application UI …
much UI design experience, exposing them to a large database of real-application UI …
Mining internet-scale software repositories
Large repositories of source code create new challenges and opportunities for statistical
machine learning. Here we first develop an infrastructure for the automated crawling …
machine learning. Here we first develop an infrastructure for the automated crawling …
Generating robust parsers using island grammars
L Moonen - Proceedings eighth working conference on reverse …, 2001 - ieeexplore.ieee.org
Source model extraction, the automated extraction of information from system artifacts, is a
common phase in reverse engineering tools. One of the major challenges of this phase is …
common phase in reverse engineering tools. One of the major challenges of this phase is …
Specification matching of software components
AM Zaremski, JM Wing - ACM Transactions on Software Engineering …, 1997 - dl.acm.org
Specification matching is a way to compare two software components, based on
descriptions of the component's behaviors. In the context of software reuse and library …
descriptions of the component's behaviors. In the context of software reuse and library …