Clone-based code method usage pattern mining
WebAPI Usage Pattern Mining Abstract Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API... WebClone-based Code Method Usage Pattern Mining. In ICPC 2024(ERA). PDF Cite DOI Chenglong Zhou, Haoran Liu, Yuanliang Zhang, Zhipeng Xue, Qing Liao, JinJing Zhao, Ji Wang (2024). Deep Understanding of Runtime Configuration Intention. In IJSEKE. PDF Cite DOI Contact. [email protected] ...
Clone-based code method usage pattern mining
Did you know?
WebIn this paper, a clone method pair or true clone pair includes two methods with similar code. Each method in the clone method pair is called a clone peer of the other method. A non-clone method pair or false clone pair includes two methods implemented with dissimilar code, and each of the methods is called a non-clone peer of the other. III ...
WebNov 18, 2024 · In general, API usage pattern search approaches based on graph models are helpful for programmers to obtain suitable method sequences, whereas they have two key shortcomings. Firstly, existing graph models lack numerical relations between API elements such as the number of parameters. WebTable 1: Rules for Creating Call-order or Condition-checking Relations (p: paramter; vl: value literal; m: method; e: parameter or method; mc: method of concern; v-c: value-checking; s-c: state-checking; c-o: call-order) - "API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph"
WebFeb 22, 2024 · In this paper, a generic architecture of token-based code clone reuse method which assists software reuse is proposed. It detects type-1 i.e. exact clones and … WebClone-based Code Method Usage Pattern Mining When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief …
WebMay 17, 2024 · Clone-based code method usage pattern mining Abstract: When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage …
WebIn this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the code … オムロン p7s-14f-endWeb(this is relatively fast compared to pattern mining). 3.2 Pattern mining Our pattern mining tool is based on an extension of the existing FREQT tree mining algorithm [13]. As input it takes an abstract syntax tree (AST) repre-sentation of the source code, meaning that a mined pattern is an AST fragment that occurs frequently in the codebase. parnell tennisWebMay 5, 2024 · Six code clone detection techniques are based on text, token, tree, metric, graph, and hybrid to detect type-1, type-2, type-3, and type-4 clones. Our study is concluded with several studies that exist to detect the types 1–4 clones. There is a requirement of novel approach to develop to detect all four types of clones together. オムロン p7lf-dWebApr 14, 2024 · A defender can use binary code-based clone detectors to extract clone pairs and construct an SCG and TCG to describe the clone landscape. Then, the defender can use an appropriate source-code-to-binary-code mapping method (when source patches are known) or can compare the binary file before applying a patch and the … オムロン p7sa-14f-ndWebOct 20, 2024 · Clone-based code method usage pattern mining Pages 543–547 ABSTRACT References Comments ABSTRACT When programmers retrieve a code … オムロン p6b-y1WebSep 27, 2024 · However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief comment and few available usage examples. In this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the … オムロン p6bf-4bndWebtarget method from cloned code usage examples. Based on the usage examples of the target method and its cloned method, we can mine its usage pattern by frequent subsequence mining technology. To the best of our knowledge, we are the first to mining usage of general methods from their cloned code. This paper addressed two important … オムロン p2rfz-08-e