Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Inferring resource specifications from natural language API documentation
Typically, software libraries provide API documentation, through which developers can learn
how to use libraries correctly. However, developers may still write code inconsistent with API …
how to use libraries correctly. However, developers may still write code inconsistent with API …
Static specification mining using automata-based abstractions
We present a novel approach to client-side mining of temporal API specifications based on
static analysis. Specifically, we present an interprocedural analysis over a combined domain …
static analysis. Specifically, we present an interprocedural analysis over a combined domain …
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow inorder for these objects to work
properly. Aliasing makes itnotoriously difficult to check whether clients and implementations …
properly. Aliasing makes itnotoriously difficult to check whether clients and implementations …
Foundations of typestate-oriented programming
Typestate reflects how the legal operations on imperative objects can change at runtime as
their internal state changes. A typestate checker can statically ensure, for instance, that an …
their internal state changes. A typestate checker can statically ensure, for instance, that an …
Practical API protocol checking with access permissions
Reusable APIs often define usage protocols. We previously developed a sound modular
type system that checks compliance with typestate-based protocols while affording a great …
type system that checks compliance with typestate-based protocols while affording a great …
Discovering documentation for Java container classes
J Henkel, C Reichenbach… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Modern programs make extensive use of reusable software libraries. For example, we found
that 17% to 30% of the classes in a number of large Java applications use the container …
that 17% to 30% of the classes in a number of large Java applications use the container …
[PDF][PDF] Accumulation analysis
Acknowledgements Thanks to Max Willsey, Gus Smith, and the anonymous reviewers for
their 26 helpful feedback on early drafts. This research was supported in part by the National …
their 26 helpful feedback on early drafts. This research was supported in part by the National …
Inferring specifications for resources from natural language API documentation
Many software libraries, especially those commercial ones, provide API documentation in
natural languages to describe correct API usages. However, developers may still write code …
natural languages to describe correct API usages. However, developers may still write code …
Tzuyu: Learning stateful typestates
Behavioral models are useful for various software engineering tasks. They are, however,
often missing in practice. Thus, specification mining was proposed to tackle this problem …
often missing in practice. Thus, specification mining was proposed to tackle this problem …
Buginnings: identifying the origins of a bug
Information about the origins of a bug can be useful for many applications, such as the
computation of defect age and fault-proneness of code components. Although there exists …
computation of defect age and fault-proneness of code components. Although there exists …