Search Results - "General and reference Cross-computing tools and techniques Empirical studies"

Refine Results
  1. 1

    Lost in Translation: A Study of Bugs Introduced by Large Language Models While Translating Code by Pan, Rangeet, Ibrahimzada, Ali Reza, Krishna, Rahul, Sankar, Divya, Wassi, Lambert Pougeum, Merler, Michele, Sobolev, Boris, Pavuluri, Raju, Sinha, Saurabh, Jabbarvand, Reyhaneh

    ISSN: 1558-1225
    Published: ACM 14.04.2024
    “…Code translation aims to convert source code from one programming language (PL) to another. Given the promising abilities of large language models (LLMs) in…”
    Get full text
    Conference Proceeding
  2. 2

    Grounded Theory in Software Engineering Research: A Critical Review and Guidelines by Stol, Klaas-Jan, Ralph, Paul, Fitzgerald, Brian

    ISSN: 1558-1225
    Published: ACM 01.05.2016
    “…Grounded Theory (GT) has proved an extremely useful research approach in several fields including medical sociology, nursing, education and management theory…”
    Get full text
    Conference Proceeding
  3. 3

    Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow by Zhang, Tianyi, Upadhyaya, Ganesha, Reinhardt, Anastasia, Rajan, Hridesh, Kim, Miryung

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…Programmers often consult an online Q&A forum such as Stack Overflow to learn new APIs. This paper presents an empirical study on the prevalence and severity…”
    Get full text
    Conference Proceeding
  4. 4

    What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs? by Gao, Shuzheng, Wen, Xin-Cheng, Gao, Cuiyun, Wang, Wenxuan, Zhang, Hongyu, Lyu, Michael R.

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Pre-trained models of source code have gained widespread popularity in many code intelligence tasks. Recently, with the scaling of the model and corpus size,…”
    Get full text
    Conference Proceeding
  5. 5

    An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair by Huang, Kai, Meng, Xiangxin, Zhang, Jian, Liu, Yang, Wang, Wenjie, Li, Shuhao, Zhang, Yuqing

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…The advent of large language models (LLMs) has opened up new opportunities for automated program repair (APR). In particular, some recent studies have explored…”
    Get full text
    Conference Proceeding
  6. 6

    Secure coding practices in Java: challenges and vulnerabilities by Meng, Na, Nagy, Stefan, Yao, Danfeng (Daphne), Zhuang, Wenjie, Argoty, Gustavo Arango

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…The Java platform and its third-party libraries provide useful features to facilitate secure coding. However, misusing them can cost developers time and…”
    Get full text
    Conference Proceeding
  7. 7

    Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting by Li, Tsz-On, Zong, Wenxi, Wang, Yibo, Tian, Haoye, Wang, Ying, Cheung, Shing-Chi, Kramer, Jeff

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Automated detection of software failures is an important but challenging software engineering task. It involves finding in a vast search space the…”
    Get full text
    Conference Proceeding
  8. 8

    Gamma: Revisiting Template-Based Automated Program Repair Via Mask Prediction by Zhang, Quanjun, Fang, Chunrong, Zhang, Tongke, Yu, Bowen, Sun, Weisong, Chen, Zhenyu

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Automated program repair (APR) aims to fix software bugs without manual debugging efforts and plays a crucial role in software development and maintenance…”
    Get full text
    Conference Proceeding
  9. 9

    How Many of All Bugs Do We Find? A Study of Static Bug Detectors by Habib, Andrew, Pradel, Michael

    ISSN: 2643-1572
    Published: ACM 03.09.2018
    “…Static bug detectors are becoming increasingly popular and are widely used by professional software developers. While most work on bug detectors focuses on…”
    Get full text
    Conference Proceeding
  10. 10

    How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study by Xia, Hao, Zhang, Yuan, Zhou, Yingtian, Chen, Xiaoting, Wang, Yang, Zhang, Xiangyu, Cui, Shuaishuai, Hong, Geng, Zhang, Xiaohan, Yang, Min, Yang, Zhemin

    ISSN: 1558-1225
    Published: ACM 01.10.2020
    “…As Android platform evolves in a fast pace, API-related compatibility issues become a significant challenge for developers. To handle an incompatible API…”
    Get full text
    Conference Proceeding
  11. 11

    A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned by Liu, Bingchang, Meng, Guozhu, Zou, Wei, Gong, Qi, Li, Feng, Lin, Min, Sun, Dandan, Huo, Wei, Zhang, Chao

    ISSN: 1558-1225
    Published: ACM 01.10.2020
    “…The number of vulnerabilities increases rapidly in recent years, due to advances in vulnerability discovery solutions. It enables a thorough analysis on the…”
    Get full text
    Conference Proceeding
  12. 12

    Assessing and Restoring Reproducibility of Jupyter Notebooks by Wang, Jiawei, KUO, Tzu-Yang, Li, Li, Zeller, Andreas

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Jupyter notebooks-documents that contain live code, equations, visualizations, and narrative text-now are among the most popular means to compute, present,…”
    Get full text
    Conference Proceeding
  13. 13

    Understanding and Detecting Callback Compatibility Issues for Android Applications by Huang, Huaxun, Wei, Lili, Liu, Yepang, Cheung, Shing-Chi

    ISSN: 2643-1572
    Published: ACM 01.09.2018
    “…The control flows of Android apps are largely driven by the protocols that govern how callback APIs are invoked in response to various events. When these…”
    Get full text
    Conference Proceeding
  14. 14

    An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code Models by Liu, Jiaxing, Sha, Chaofeng, Peng, Xin

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Pre-trained code models (e.g. CodeBERT and CodeT5) have demonstrated their code intelligence in various software engineering tasks, such as code summarization…”
    Get full text
    Conference Proceeding
  15. 15

    The Plastic Surgery Hypothesis in the Era of Large Language Models by Xia, Chunqiu Steven, Ding, Yifeng, Zhang, Lingming

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Automated Program Repair (APR) aspires to automatically generate patches for an input buggy program. Traditional APR tools typically focus on specific bug…”
    Get full text
    Conference Proceeding
  16. 16

    Characterizing and Detecting Bugs in WeChat Mini-Programs by Wang, Tao, Xu, Qingxin, Chang, Xiaoning, Dou, Wensheng, Zhu, Jiaxin, Xie, Jinhui, Deng, Yuetang, Yang, Jianbo, Yang, Jiaheng, Wei, Jun, Huang, Tao

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…Built on the WeChat social platform, WeChat Mini-Programs are widely used by more than 400 million users every day. Consequently, the reliability of…”
    Get full text
    Conference Proceeding
  17. 17

    Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks by Li, Zhenhao, Chen, Tse-Hsun, Shang, Weiyi

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Developers write logging statements to generate logs and record system execution behaviors to assist in debugging and software maintenance. However, deciding…”
    Get full text
    Conference Proceeding
  18. 18

    When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection by Wen, Xin-Cheng, Wang, Xinchen, Gao, Cuiyun, Wang, Shaohua, Liu, Yang, Gu, Zhaoquan

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…Automated code vulnerability detection has gained increasing attention in recent years. The deep learning (DL)-based methods, which implicitly learn vulnerable…”
    Get full text
    Conference Proceeding
  19. 19

    Understanding Transaction Bugs in Database Systems by Cui, Ziyu, Dou, Wensheng, Gao, Yu, Wang, Dong, Song, Jiansen, Zheng, Yingying, Wang, Tao, Yang, Rui, Xu, Kang, Hu, Yixin, Wei, Jun, Huang, Tao

    ISSN: 1558-1225
    Published: ACM 14.04.2024
    “…Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs…”
    Get full text
    Conference Proceeding
  20. 20

    On the Evaluation of Neural Code Translation: Taxonomy and Benchmark by Jiao, Mingsheng, Yu, Tingrui, Li, Xuan, Qiu, Guanjie, Gu, Xiaodong, Shen, Beijun

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “…In recent years, neural code translation has gained increasing attention. While most of the research focuses on improving model architectures and training…”
    Get full text
    Conference Proceeding