102 Result(s)
-
Article
Analyzing and revivifying function signature inference using deep learning
Function signature plays an important role in binary analysis and security enhancement, with typical examples in bug finding and control-flow integrity enforcement. However, recovery of function signatures by ...
-
Article
Experimental comparison of features, analyses, and classifiers for Android malware detection
Android malware detection has been an active area of research. In the past decade, several machine learning-based approaches based on different types of features that may characterize Android malware behaviors...
-
Chapter
Supporting Collateral Evolution in Software Ecosystems
In modern software ecosystems, the source code implemented for software features is heavily dependent on the functions and data structures defined in the codebase with the supporting libraries. This mentioned ...
-
Article
Real world projects, real faults: evaluating spectrum based fault localization techniques on Python projects
Spectrum Based Fault Localization (SBFL) is a statistical approach to identify faulty code within a program given a program spectra (i.e., records of program elements executed by passing and failing test cases). ...
-
Article
On measuring network robustness for weighted networks
Network robustness measures how well network structure is strong and healthy when it is under attack, such as vertices joining and leaving. It has been widely used in many applications, such as information dif...
-
Article
AndroEvolve: automated Android API update with data flow analysis and variable denormalization
The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation; Android apps using deprecated APIs need to be updated to ensure the a...
-
Article
Open AccessLeg and arm adiposity is inversely associated with diastolic hypertension in young and middle-aged United States adults
We sought to determine the association between appendicular adiposity and hypertension, with the purpose of better understanding the role of body fat distribution on blood pressure (BP).
-
Article
An exploratory study on the repeatedly shared external links on Stack Overflow
On Stack Overflow, users reuse 11,926,354 external links to share the resources hosted outside the Stack Overflow website. The external links connect to the existing programming-related knowledge and extend th...
-
Article
Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges
Software development is a very broad activity that captures the entire life cycle of a software, which includes designing, programming, maintenance and so on. In this study, we focus on the maintenance-related...
-
Article
Out of sight, out of mind? How vulnerable dependencies affect open-source projects
Software developers often use open-source libraries in their project to improve development speed. However, such libraries may contain security vulnerabilities, and this has resulted in several high-profile in...
-
Article
An exploratory study on the introduction and removal of different types of technical debt in deep learning frameworks
To complete tasks faster, developers often have to sacrifice the quality of the software. Such compromised practice results in the increasing burden to developers in future development. The metaphor, technical...
-
Article
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls
Android has been the most popular smartphone system with multiple platform versions active in the market. To manage the application’s compatibility with one or more platform versions, Android allows apps to de...
-
Article
What makes a popular academic AI repository?
Many AI researchers are publishing code, data and other resources that accompany their papers in GitHub repositories. In this paper, we refer to these repositories as academic AI repositories. Our preliminary ...
-
Article
Open AccessImportant considerations when assessing the effect of essential fatty acids on cognitive performance
Over the past decade, there have been many studies determining the effect of dietary ω-3 and ω-6 fatty acids intake on cognitive performance; however, they have largely been inconsistent in their conclusions. ...
-
Article
Addressing psychosocial determinants and medication parameters in hypertension treatment models
-
Article
Deep code comment generation with hybrid lexical and syntactical information
During software maintenance, developers spend a lot of time understanding the source code. Existing studies show that code comments help developers comprehend programs and reduce additional time spent on readi...
-
Article
SIEVE: Helping developers sift wheat from chaff via cross-platform analysis
Software developers have benefited from various sources of knowledge such as forums, question-and-answer sites, and social media platforms to help them in various tasks. Extracting software-related knowledge f...
-
Article
Why reinventing the wheels? An empirical study on library reuse and re-implementation
Nowadays, with the rapid growth of open source software (OSS), library reuse becomes more and more popular since a large amount of third- party libraries are available to download and reuse. A deeper understan...
-
Article
Memory and resource leak defects and their repairs in Java projects
Despite huge software engineering efforts and programming language support, resource and memory leaks are still a troublesome issue, even in memory-managed languages such as Java. Understanding the properties ...
-
Article
Guest Editorial: Special Issue on Software Engineering for Mobile Applications