Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high severity impacts, many different approaches have been …
The constantly increasing number of disclosed security vulnerabilities have become an important concern in the software industry and in the field of cybersecurity, suggesting that …
Source code (Context) and its parsed abstract syntax tree (AST; Structure) are two complementary representations of the same computer program. Traditionally, designers of …
Recently SVMs using spatial pyramid matching (SPM) kernel have been highly successful in image classification. Despite its popularity, these nonlinear SVMs have a complexity O (n …
SM Nasehi, J Sillito, F Maurer… - 2012 28th IEEE …, 2012 - ieeexplore.ieee.org
Programmers learning how to use an API or a programming language often rely on code examples to support their learning activities. However, what makes for an effective ode …
n-gram statistical language model has been successfully applied to capture programming patterns to support code completion and suggestion. However, the approaches using n …
Energy consumption of mobile applications is nowadays a hot topic, given the widespread use of mobile devices. The high demand for features and improved user experience, given …
To improve software productivity, when constructing new software systems, programmers often reuse existing libraries or frameworks by invoking methods provided in their APIs …
TT Nguyen, HA Nguyen, NH Pham… - Proceedings of the 7th …, 2009 - dl.acm.org
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints …