An ensemble approach for annotating source code identifiers with part-of-speech tags

CD Newman, MJ Decker… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper presents an ensemble part-of-speech tagging approach for source code
identifiers. Ensemble tagging is a technique that uses machine-learning and the output from …

Automatic part-of-speech tagging for security vulnerability descriptions

S Yitagesu, X Zhang, Z Feng, X Li… - 2021 IEEE/ACM 18th …, 2021 - ieeexplore.ieee.org
In this paper, we study the problem of part-of-speech (POS) tagging for security vulnerability
descriptions (SVD). In contrast to newswire articles, SVD often contains a high-level natural …

Using consensual biterms from text structures of requirements and code to improve IR-based traceability recovery

H Gao, H Kuang, K Sun, X Ma, A Egyed… - Proceedings of the 37th …, 2022 - dl.acm.org
Traceability approves trace links among software artifacts based on whether two artifacts are
related by system functionalities. The traces are valuable for software development, but are …

Heterogeneous graph neural networks for software effort estimation

H Phan, A Jannesari - Proceedings of the 16th ACM/IEEE International …, 2022 - dl.acm.org
Background. Software effort can be measured by story point [35]. Story point estimation is
important in software projects' planning. Current approaches for automatically estimating …

DocFlow: Extracting Taint Specifications from Software Documentation

M Tileria, J Blasco, SK Dash - Proceedings of the 46th IEEE/ACM …, 2024 - dl.acm.org
Security practitioners routinely use static analysis to detect security problems and privacy
violations in Android apps. The soundness of these analyses depends on how the platform …

Hot question prediction in Stack Overflow

LX Zhao, L Zhang, J Jiang - IET Software, 2021 - Wiley Online Library
Stack Overflow is a very popular programming question and answer community. Some
questions become hot, and receive high views, which are of widespread concern to …

[HTML][HTML] Do names echo semantics? A large-scale study of identifiers used in C++'s named casts

CC Petrescu, S Smith, R Giavrimis, SK Dash - Journal of Systems and …, 2023 - Elsevier
Developers relax restrictions on a type to reuse methods with other types. While type casts
are prevalent, in weakly typed languages such as C++, they are also extremely permissive …

Designing artifact representation and automated pipeline for machine learning based Software Engineering

H Phan - 2024 - search.proquest.com
In recent times, the applications of Natural Language Processing (NLP) models have
inspired numerous researchers to propose various automated Software Engineering (SE) …

[PDF][PDF] Dual-Channel Software Analysis

CC Petrescu - 2024 - openresearch.surrey.ac.uk
The increasing complexity of modern software poses significant challenges for maintenance.
For instance, the Chromium browser, an open-source version of Chrome, consists of 27 …

[图书][B] Supporting the Maintenance of Identifier Names: a Holistic Approach to High-Quality Automated Identifier Naming

AS Peruma - 2022 - search.proquest.com
A considerable part of the source code is identifier names--unique lexical tokens that
provide information about entities, and entity interactions, within the code. Identifier names …