Search Results - "code patterns"

Refine Results
  1. 1

    Enhanced Code Conversion Approach for the Integrated Cross-Platform Mobile Development (ICPMD) by El-Kassas, Wafaa S., Abdullah, Bassem A., Yousef, Ahmed H., Wahba, Ayman M.

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.11.2016
    Published in IEEE transactions on software engineering (01.11.2016)
    “…Mobile development companies aim to maximize the return on investments by making their mobile applications (Apps) available on different mobile platforms…”
    Get full text
    Journal Article
  2. 2

    Mining Semantic Loop Idioms by Allamanis, Miltiadis, Barr, Earl T., Bird, Christian, Devanbu, Premkumar, Marron, Mark, Sutton, Charles

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.07.2018
    Published in IEEE transactions on software engineering (01.07.2018)
    “…To write code, developers stitch together patterns, like API protocols or data structure traversals. Discovering these patterns can identify inconsistencies in…”
    Get full text
    Journal Article
  3. 3

    Sequential coding patterns: How to use them effectively in code recommendation by da Silva, Luiz Laerte Nunes, Kohwalter, Troy Costa, Plastino, Alexandre, Murta, Leonardo Gresta Paulino

    ISSN: 0950-5849, 1873-6025
    Published: Elsevier B.V 01.12.2021
    Published in Information and software technology (01.12.2021)
    “…Some programming constructs frequently appear together in different parts of the code, representing sequential coding patterns throughout the project. These…”
    Get full text
    Journal Article
  4. 4

    Advancements in automated program repair: a comprehensive review by Dikici, Sena, Bilgin, Turgay Tugay

    ISSN: 0219-1377, 0219-3116
    Published: London Springer London 01.06.2025
    Published in Knowledge and information systems (01.06.2025)
    “…This review paper presents a comprehensive examination of automated program repair (APR) and its significant contribution to the field of modern software…”
    Get full text
    Journal Article
  5. 5

    On the diversity and frequency of code related to mathematical formulas in real-world Java projects by Moseler, Oliver, Lemmer, Felix, Baltes, Sebastian, Diehl, Stephan

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.02.2021
    Published in The Journal of systems and software (01.02.2021)
    “…In this paper, the term formula code refers to fragments of source code that implement a mathematical formula. We present empirical studies that analyze the…”
    Get full text
    Journal Article
  6. 6

    E-APK: Energy pattern detection in decompiled android applications by Gregório, Nelson, Bispo, João, Fernandes, João Paulo, Queiroz de Medeiros, Sérgio

    ISSN: 2590-1184, 2590-1184
    Published: Elsevier Ltd 01.08.2023
    Published in Journal of computer languages (Online) (01.08.2023)
    “…Energy efficiency is a non-functional requirement that developers must consider, particularly when building software for battery-operated devices like mobile…”
    Get full text
    Journal Article
  7. 7

    Discovering Sequential Source Code Patterns in Software Engineering by BİRANT, Kökten, KIRNAPCI, Dilara

    ISSN: 2148-2446, 2148-2446
    Published: Düzce University 31.01.2022
    “…Discovering sequential patterns in source codes is an important issue in software engineering since it can provide useful knowledge to help in a variety of…”
    Get full text
    Journal Article
  8. 8

    Fuzzing MLIR Compilers with Custom Mutation Synthesis by Limpanukorn, Ben, Wang, Jiyuan, Kang, Hong Jin, Zhou, Zitong, Kim, Miryung

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Compiler technologies in deep learning and domain-specific hardware acceleration are increasingly adopting extensible compiler frameworks such as Multi-Level…”
    Get full text
    Conference Proceeding
  9. 9

    Model-Driven Fault Injection in Java Source Code by Rodrigues, Elder, Montecchi, Leonardo, Ceccarelli, Andrea

    ISSN: 2332-6549
    Published: IEEE 01.10.2020
    “…The injection of software faults in source code requires accurate knowledge of the programming language, both to craft faults and to identify injection…”
    Get full text
    Conference Proceeding
  10. 10

    On Twitter Bots Behaving Badly: A Manual and Automated Analysis of Python Code Patterns on GitHub by Daniel, Florian, Millimaggi, Andrea

    ISSN: 1540-9589, 1544-5976
    Published: Milan River Publishers 01.01.2020
    Published in Journal of web engineering (01.01.2020)
    “…Bots, i.e., algorithmically driven entities that behave like humans in on-line communications, are increasingly infiltrating social conversations on the Web…”
    Get full text
    Journal Article
  11. 11

    Developing dynamic profiling and debugging support in OpenCL for FPGAs by Verma, Anshuman, Huiyang Zhou, Booth, Skip, King, Robbie, Coole, James, Keep, Andy, Marshall, John, Wu-chun Feng

    Published: IEEE 01.06.2017
    “…With FPGAs emerging as a promising accelerator for general-purpose computing, there is a strong demand to make them accessible to software developers. Recent…”
    Get full text
    Conference Proceeding
  12. 12

    Checking enforcement of integrity constraints in database applications based on code patterns by Zhang, Hongyu, Kuan Tan, Hee Beng, Zhang, Lu, Lin, Xi, Wang, Xiaoyin, Zhang, Chun, Mei, Hong

    ISSN: 0164-1212, 1873-1228
    Published: New York Elsevier Inc 01.12.2011
    Published in The Journal of systems and software (01.12.2011)
    “…► It is important to perform integrity constraint enforcement (ICE) for database applications. ► We define four patterns that characterize the structures of…”
    Get full text
    Journal Article
  13. 13

    Software Vulnerability Detection Tool Using Machine Learning Algorithms by Sharma, Niteesha, Reddy, G.Sekhar, Pittala, Ramesh Babu, Sharma, Khushi, Kumar, Sumit, Reddy, Keesara Pavankalyan

    ISBN: 9798331522322
    Published: IEEE 20.06.2025
    “…Modern techniques focus on software vulnerabilities because their grave security risks to computer systems present major threats to information protection…”
    Get full text
    Conference Proceeding
  14. 14

    Dynamic and Speculative Polyhedral Parallelization of Loop Nests Using Binary Code Patterns by Jimborean, Alexandra, Clauss, Philippe, Dollinger, Jean-François, Loechner, Vincent, Caamaño, Juan Manuel Martinez

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2013
    Published in Procedia computer science (2013)
    “…Speculative parallelization is a classic strategy for automatically parallelizing codes that cannot be handled at compile-time due to the use of dynamic data…”
    Get full text
    Journal Article
  15. 15

    Energy Refactorings for Android in the Large and in the Wild by Couto, Marco, Saraiva, Joao, Fernandes, Joao Paulo

    Published: IEEE 01.02.2020
    “…Improving the energy efficiency of mobile applications is a timely goal, as it can contribute to increase a device's usage time, which most often is powered by…”
    Get full text
    Conference Proceeding
  16. 16

    Analysis and Reduction of Supply Noise Fluctuations Induced by Embedded Via-Programming ROM by CHANG, Meng-Fan, YANG, Shu-Meng

    ISSN: 1063-8210, 1557-9999
    Published: New York, NY IEEE 01.06.2009
    “…Various input addresses and accessed code-patterns of a via-programming read only memory (ROM) cause substantial fluctuations in peak current and supply noise…”
    Get full text
    Journal Article
  17. 17

    Automatically generating natural language descriptions for object-related statement sequences by Xiaoran Wang, Pollock, Lori, Vijay-Shanker, K.

    Published: IEEE 01.02.2017
    “…Current source code analyses driving software maintenance tools treat methods as either a single unit or a set of individual statements or words. They often…”
    Get full text
    Conference Proceeding
  18. 18

    Privbench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android by Tebib, Mohammed EI Amin, Aktouf, Oum-El-Kheir, Andre, Pascal, Graa, Mariem

    ISSN: 2643-4202
    Published: IEEE 28.08.2024
    “…Security code smells are receiving increasing attention in the domain of Android app development. They serve as coding guidelines aimed at identifying…”
    Get full text
    Conference Proceeding
  19. 19

    A full code-patterns coverage high-speed embedded ROM using dynamic virtual guardian technique by Meng-Fan Chang, Lih-Yih Chiou, Wen, K.-A.

    ISSN: 0018-9200, 1558-173X
    Published: New York, NY IEEE 01.02.2006
    Published in IEEE journal of solid-state circuits (01.02.2006)
    “…Crosstalk between bitlines induces read failure and limits the coverage of applicable code-patterns for high-speed contact/via-programming read-only memories…”
    Get full text
    Journal Article
  20. 20

    Enhancing DataRaceBench for Evaluating Data Race Detection Tools by Verma, Gaurav, Shi, Yaying, Liao, Chunhua, Chapman, Barbara, Yan, Yonghong

    Published: IEEE 01.11.2020
    “…DataRaceBench is a dedicated benchmark suite to evaluate tools aimed to find data race bugs in OpenMP programs. Since its initial release in 2017,…”
    Get full text
    Conference Proceeding