Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Code search is all you need? improving code suggestions with code search
Modern integrated development environments (IDEs) provide various automated code
suggestion techniques (eg, code completion and code generation) to help developers …
suggestion techniques (eg, code completion and code generation) to help developers …
Go static: Contextualized logging statement generation
Logging practices have been extensively investigated to assist developers in writing
appropriate logging statements for documenting software behaviors. Although numerous …
appropriate logging statements for documenting software behaviors. Although numerous …
Logsd: Detecting anomalies from system logs through self-supervised learning and frequency-based masking
Log analysis is one of the main techniques that engineers use for troubleshooting large-
scale software systems. Over the years, many supervised, semi-supervised, and …
scale software systems. Over the years, many supervised, semi-supervised, and …
Studying Practitioners' Expectations on Clear Code Review Comments
The code review comment (CRC) is pivotal in the process of modern code review. It provides
reviewers with the opportunity to identify potential bugs, offer constructive feedback, and …
reviewers with the opportunity to identify potential bugs, offer constructive feedback, and …
Practitioners' Expectations on Log Anomaly Detection
Log anomaly detection has become a common practice for software engineers to analyze
software system behavior. Despite significant research efforts in log anomaly detection over …
software system behavior. Despite significant research efforts in log anomaly detection over …
On the inadequacy of open-source application logs for digital forensics
A Azahari, D Balzarotti - Forensic Science International: Digital …, 2024 - Elsevier
This study explores the challenges with utilizing application logs for incident response or
forensic analysis. Application logs have the potential to significantly enhance security …
forensic analysis. Application logs have the potential to significantly enhance security …
Discovery of timeline and crowd reaction of software vulnerability disclosures
Reusing third-party libraries increases productivity and saves time and costs for developers.
However, the downside is the presence of vulnerabilities in those libraries, which can lead to …
However, the downside is the presence of vulnerabilities in those libraries, which can lead to …
Learning from Mistakes: Understanding Ad-hoc Logs through Analyzing Accidental Commits
Developers often insert temporary" print" or" log" instructions into their code to help them
better understand runtime behavior, usually when the code is not behaving as they …
better understand runtime behavior, usually when the code is not behaving as they …
Automated Defects Detection and Fix in Logging Statement
Developers use logging statements to monitor software, but misleading logs can complicate
maintenance by obscuring actual activities. Existing research on logging quality issues is …
maintenance by obscuring actual activities. Existing research on logging quality issues is …
Easy over Hard: A Simple Baseline for Test Failures Causes Prediction
The test failure causes analysis is critical since it determines the subsequent way of
handling different types of bugs, which is the prerequisite to get the bugs properly analyzed …
handling different types of bugs, which is the prerequisite to get the bugs properly analyzed …