An ensemble approach for annotating source code identifiers with part-of-speech tags
This paper presents an ensemble part-of-speech tagging approach for source code
identifiers. Ensemble tagging is a technique that uses machine-learning and the output from …
identifiers. Ensemble tagging is a technique that uses machine-learning and the output from …
Automatic part-of-speech tagging for security vulnerability descriptions
In this paper, we study the problem of part-of-speech (POS) tagging for security vulnerability
descriptions (SVD). In contrast to newswire articles, SVD often contains a high-level natural …
descriptions (SVD). In contrast to newswire articles, SVD often contains a high-level natural …
Using consensual biterms from text structures of requirements and code to improve IR-based traceability recovery
Traceability approves trace links among software artifacts based on whether two artifacts are
related by system functionalities. The traces are valuable for software development, but are …
related by system functionalities. The traces are valuable for software development, but are …
Heterogeneous graph neural networks for software effort estimation
H Phan, A Jannesari - Proceedings of the 16th ACM/IEEE International …, 2022 - dl.acm.org
Background. Software effort can be measured by story point [35]. Story point estimation is
important in software projects' planning. Current approaches for automatically estimating …
important in software projects' planning. Current approaches for automatically estimating …
DocFlow: Extracting Taint Specifications from Software Documentation
Security practitioners routinely use static analysis to detect security problems and privacy
violations in Android apps. The soundness of these analyses depends on how the platform …
violations in Android apps. The soundness of these analyses depends on how the platform …
Hot question prediction in Stack Overflow
LX Zhao, L Zhang, J Jiang - IET Software, 2021 - Wiley Online Library
Stack Overflow is a very popular programming question and answer community. Some
questions become hot, and receive high views, which are of widespread concern to …
questions become hot, and receive high views, which are of widespread concern to …
[HTML][HTML] Do names echo semantics? A large-scale study of identifiers used in C++'s named casts
Developers relax restrictions on a type to reuse methods with other types. While type casts
are prevalent, in weakly typed languages such as C++, they are also extremely permissive …
are prevalent, in weakly typed languages such as C++, they are also extremely permissive …
Designing artifact representation and automated pipeline for machine learning based Software Engineering
H Phan - 2024 - search.proquest.com
In recent times, the applications of Natural Language Processing (NLP) models have
inspired numerous researchers to propose various automated Software Engineering (SE) …
inspired numerous researchers to propose various automated Software Engineering (SE) …
[PDF][PDF] Dual-Channel Software Analysis
CC Petrescu - 2024 - openresearch.surrey.ac.uk
The increasing complexity of modern software poses significant challenges for maintenance.
For instance, the Chromium browser, an open-source version of Chrome, consists of 27 …
For instance, the Chromium browser, an open-source version of Chrome, consists of 27 …
[图书][B] Supporting the Maintenance of Identifier Names: a Holistic Approach to High-Quality Automated Identifier Naming
AS Peruma - 2022 - search.proquest.com
A considerable part of the source code is identifier names--unique lexical tokens that
provide information about entities, and entity interactions, within the code. Identifier names …
provide information about entities, and entity interactions, within the code. Identifier names …