期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
An Approach to Detect Structural Development Defects in Object-Oriented Programs
1
作者 Maxime Seraphin Gnagne Mouhamadou Dosso +1 位作者 Mamadou Diarra Souleymane Oumtanaga 《Open Journal of Applied Sciences》 2024年第2期494-510,共17页
Structural development defects essentially refer to code structure that violates object-oriented design principles. They make program maintenance challenging and deteriorate software quality over time. Various detecti... Structural development defects essentially refer to code structure that violates object-oriented design principles. They make program maintenance challenging and deteriorate software quality over time. Various detection approaches, ranging from traditional heuristic algorithms to machine learning methods, are used to identify these defects. Ensemble learning methods have strengthened the detection of these defects. However, existing approaches do not simultaneously exploit the capabilities of extracting relevant features from pre-trained models and the performance of neural networks for the classification task. Therefore, our goal has been to design a model that combines a pre-trained model to extract relevant features from code excerpts through transfer learning and a bagging method with a base estimator, a dense neural network, for defect classification. To achieve this, we composed multiple samples of the same size with replacements from the imbalanced dataset MLCQ1. For all the samples, we used the CodeT5-small variant to extract features and trained a bagging method with the neural network Roberta Classification Head to classify defects based on these features. We then compared this model to RandomForest, one of the ensemble methods that yields good results. Our experiments showed that the number of base estimators to use for bagging depends on the defect to be detected. Next, we observed that it was not necessary to use a data balancing technique with our model when the imbalance rate was 23%. Finally, for blob detection, RandomForest had a median MCC value of 0.36 compared to 0.12 for our method. However, our method was predominant in Long Method detection with a median MCC value of 0.53 compared to 0.42 for RandomForest. These results suggest that the performance of ensemble methods in detecting structural development defects is dependent on specific defects. 展开更多
关键词 Object-Oriented Programming Structural Development Defect Detection software maintenance Pre-Trained Models Features Extraction BAGGING Neural Network
在线阅读 下载PDF
Application Server Aging Model and Multi-Level Rejuvenation Strategy Using Semi-Markov Process 被引量:1
2
作者 ZHAO Tianhai QI Yong +3 位作者 SHEN Junyi HOU Di ZHENG Xiaomei LIU Liang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1209-1215,共7页
Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in ... Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in this paper including the application component reiuvenation and the application server system rejuvenation. The availability and maintenance cost functions are obtained by means of establishing the application server aging model and the boundary condition of the optimal rejuvenation time is analyzed. Theory analysis indicates that the two-level rejuvenation strategy is superior to the traditional single level one. Finally, evaluation experiments are carried out and numerical result shows that compared with the traditional rejuvenation policy, the rejuvenation strategy proposed in this paper can further increase availability of the application server and reduce maintenance cost. 展开更多
关键词 application server software rejuvenation RELIABILITY software maintenance
在线阅读 下载PDF
Static Analysis of Java Bytecode 被引量:1
3
作者 Jian\|jun Zhao Department of Computer Science and Engineering, Fukuoka Institute of Technology, Fukuoka 811 0295,Japan 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期383-390,共8页
Understanding control flows in a computer program is essential for many software engineering tasks such as testing, debugging, reverse engineering, and maintenance. In this paper ,we present a control flow analysis te... Understanding control flows in a computer program is essential for many software engineering tasks such as testing, debugging, reverse engineering, and maintenance. In this paper ,we present a control flow analysis technique to analyze the control flow in Java bytecode. To perform the analysis, we construct a control flow graph(CFG) for Java bytecode not only at the intraprocedural level but also at the interprocedural level. We also discuss some applications of a CFG in a maintenance environment for Java bytecode. 展开更多
关键词 Control flow analysis Java virtual machine software testing software maintenance.
在线阅读 下载PDF
CHANN:A Hierarchical Neural Network for Clone Consistency Prediction
4
作者 Fan-Long Zhang Yu-Chen Chen +1 位作者 Siau-Cheng Khoo Wen-Chao Jiang 《Journal of Computer Science & Technology》 2025年第1期178-195,共18页
Modifying a code segment may give rise to a consistency issue when the code segment belongs to a clone group comprising closely similar code segments.Recent studies have demonstrated that such consistent changes can i... Modifying a code segment may give rise to a consistency issue when the code segment belongs to a clone group comprising closely similar code segments.Recent studies have demonstrated that such consistent changes can incur extra maintenance costs when clones are checked for consistency and introduce defects if developers forget to change clones consistently when needed.To address this problem,researchers have proposed an approach to predict clone consistency in advance with handcrafted attributes,notably using machine learning methods.Although these attributes can help predict clone consistency to some extent,the capability of such an approach is generally weak and unsatisfactory in practice.Such limitations in capability are especially severe at a project's infancy stage when there is not sufficient within-project data to model clone consistency behavior,and cross-project data have not been helpful in supporting prediction.In this paper,we propose the Clone Hierarchical Attention Neural Network(CHANN)to represent code clones and their evolution by adopting a hierarchical perspective of code,context,and code evolution,and thus enhancing the effectiveness of clone consistency prediction.To assess the effectiveness of CHANN,we conduct experiments on the dataset collected from eight open-source projects.The experimental results show that CHANN is highly effective in predicting clone consistency,and the precision,recall,and F-measure attained in prediction are around 82%.These findings support our hypothesis that the hierarchical neural network can help developers predict clone consistency effectively in the case of cross-project incubation when insufficient data are available at the early stage of software development. 展开更多
关键词 code clone clone consistent change clone consistency prediction software maintenance deep learning
原文传递
CCDive:A Deep Dive into Code Clone Detection Using Local Sequence Alignment
5
作者 Yasir Glani Luo Ping +1 位作者 Syed Asad Shah Lin Ke 《Tsinghua Science and Technology》 2025年第4期1435-1456,共22页
The rapid evolution of software development has accentuated the deficiencies of prevailing code clone detection techniques.As modern applications become more complex,traditional cloning tools often struggle to detect ... The rapid evolution of software development has accentuated the deficiencies of prevailing code clone detection techniques.As modern applications become more complex,traditional cloning tools often struggle to detect general and large-gap clones that undergo regular modification.Such challenges pose threats to software integrity,emphasizing the critical need for improved code cloning techniques.Observing the prevailing gap,we propose an innovative code clone dive(CCDive)code cloning technique,which is designed to detect an extensive range of clones,from direct clones to the often challenging large-gap clones,thoroughly covering different categories,such as very strongly Type-Ⅲ,strongly Type-Ⅲ,and moderate Type-Ⅲclones.In CCDive,the fusion of a level-by-level abstraction and an innovative similarity matching algorithm ensures the recognition of clones even when nearly half the original code in the chunk has been modified.Furthermore,by integrating the Smith–Waterman local sequence alignment,the capability of CCDive to spot exact code transformation locations can be enhanced.In a comprehensive evaluation,CCDive was compared with wellknown code cloning techniques.The efficacy of CCDive was measured using precision,recall,F1-score,accuracy,and efficiency.CCDive consistently surpassed other techniques in the precision,recall,F1-score,and accuracy metrics for both file-based and function-based clone detection.The robust performance of CCDive emphasizes its effectiveness,reliability,accuracy,and efficiency,making it well-suited for practical applications in the real world. 展开更多
关键词 clone detection software maintenance software security software reuse
原文传递
Runtime software architecture based on reflective middleware 被引量:18
6
作者 HUANGGang MEIHong YANGFuqing 《Science in China(Series F)》 2004年第5期555-576,共22页
There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to r... There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to reduce the great difficulty and cost of software maintenance and evolution. In this paper, runtime software architecture (RSA) based on reflective middleware is proposed to support architecture-based software maintenance and evolution. In this approach, the actual states and behaviors of the runtime system can be observed and manipulated in a consistent and understandable way through its architectural view. Being an accurate, up-to-date, semantic and operable view of SA, RSA looks components and connectors as white-box entities to accurately and thoroughly describe the runtime system, extends traditional architecture description languages to formally describe itself and naturally inherit plentiful semantics in traditional views of SA, and utilizes reflective middleware to observe and manipulate the runtime system. In order to demonstrate the feasibility of this approach, a reflective J2EE application server, called PKUAS, is implemented to observe and manipulate the components, connectors and constraints in the runtime system. Finally, the performance evaluation proves that making RSA explicit and operable at runtime has little effect on the runtime system. 展开更多
关键词 software architecture software maintenance software evolution reflective middleware.
原文传递
Code Smell Detection Based on Multi-dimensional Software Data and Complex Networks
7
作者 Heng Tong Cheng Zhang Futian Wang 《国际计算机前沿大会会议论文集》 2020年第2期490-505,共16页
Code smell is the product of improper design and operation,which may be introduced in many situations.It will cause serious problems for further software development and maintenance.Currently,most code smell detection... Code smell is the product of improper design and operation,which may be introduced in many situations.It will cause serious problems for further software development and maintenance.Currently,most code smell detection methods detect through a single type of software data.There are restrictions on detecting code smells with complex definitions and characteristics.In this paper,an approach of applying multi-dimensional software data is proposed.A complex network was built through structural data and historical version data,and code smell instances were determined by searching the network.We designed two smells detection strategies were designed and evaluated them in four open source projects.The results demonstrate that the proposed method has 23%and 15%higher F-measures on Shotgun Surgery and Parallel Inheritance Hierarchy than the existing mainstream detection ways.The code smell detection based on multi-dimensional software data and complex network is effective,and this method of processing multidimensional software data is also applicable for data-driven software research. 展开更多
关键词 Code smell Detection technique software refactoring software maintenance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部