Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Loading…
Loading…
Towards Detecting Inconsistent Comments in Java Source Code Automatically
Stulova, Nataliia, Blasi, Arianna, Gorla, Alessandra, Nierstrasz, Oscar
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2020)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2020)
Get full text
Conference Proceeding
Loading…
Loading…
Test Transplantation through Dynamic Test Slicing
Abdi, Mehrdad, Demeyer, Serge
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Get full text
Conference Proceeding
Loading…
Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection
Kuang, Hongyu, Yang, Feng, Zhang, Long, Tang, Gaigai, Yang, Lin
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Unboxing Default Argument Breaking Changes in Scikit Learn
Montandon, Joao Eduardo, Silva, Luciana Lourdes, Politowski, Cristiano, Boussaidi, Ghizlane El, Valente, Marco Tulio
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
PTLVD:Program Slicing and Transformer-based Line-level Vulnerability Detection System
Peng, Tao, Chen, Shixu, Zhu, Fei, Tang, Junwei, Liu, Junping, Hu, Xinrong
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Towards Understanding Developers' Machine-Learning Challenges: A Multi-Language Study on Stack Overflow
Hamidi, Alaleh, Antoniol, Giuliano, Khomh, Foutse, Penta, Massimiliano Di, Hamidi, Mohammad
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2021)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.09.2021)
Get full text
Conference Proceeding
Loading…
Loading…
Automating Test-Specific Refactoring Mining: A Mixed-Method Investigation
Martins, Luana, Costa, Heitor, Ribeiro, Marcio, Palomba, Fabio, Machado, Ivan
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Loading…
ACER: An AST-based Call Graph Generator Framework
Chen, Andrew, Yan, Yanfu, Poshyvanyk, Denys
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Calibrating Deep Learning-based Code Smell Detection using Human Feedback
Nanadani, Himesh, Saad, Mootez, Sharma, Tushar
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Symbolic Execution to Detect Semantic Merge Conflicts
Muylaert, Ward, Hartel, Johannes, De Roover, Coen
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (02.10.2023)
Get full text
Conference Proceeding
Loading…
Vulnerability Prediction Models: A Case Study on the Linux Kernel
Jimenez, Matthieu, Papadakis, Mike, Le Traon, Yves
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2016)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2016)
Get full text
Conference Proceeding
Loading…
Loading…
A preliminary evaluation on the relationship among architectural and test smells
De Stefano, Manuel, Pecorelli, Fabiano, Di Nucci, Dario, De Lucia, Andrea
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Get full text
Conference Proceeding
Loading…
Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication
Ikama, Aurel, Du, Vincent, Belias, Philippe, Muse, Biruk Asmare, Khomh, Foutse, Hamdaqa, Mohammad
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Published in Proceedings / IEEE International Working Conference on Source Code Analysis and Manipulation (01.10.2022)
Get full text
Conference Proceeding