Skip to content

Instantly share code, notes, and snippets.

@bzz
Created December 13, 2019 20:44
Show Gist options
  • Save bzz/4feeec459bcd1ec21f919eaeb163ac7a to your computer and use it in GitHub Desktop.
Save bzz/4feeec459bcd1ec21f919eaeb163ac7a to your computer and use it in GitHub Desktop.
{"Title":"Establishing Benchmarks For Learning Program Representations","URL":"http://ceur-ws.org/Vol-2510/sattose2019_paper_14.pdf","Abstract":{"FirstLine":"Recent advances in the field of machine learning have shown great promise in solving","Rest":"various software engineering tasks. However, unlike machine learning techniques used in fields such as NLP (Natural Language Processing) where text …"}}
{"Title":"Adopting Program Synthesis for Test Amplification","URL":"https://www.researchgate.net/profile/Mehrdad_Abdi2/publication/337709673_Adopting_Program_Synthesis_for_Test_Amplification/links/5de65be6299bf10bc33bac44/Adopting-Program-Synthesis-for-Test-Amplification.pdf","Abstract":{"FirstLine":"Program synthesis is the task of enabling a computer system to automatically write","Rest":"program code based on user intent. Test amplification on the other hand is an emerging research area, where the goal is to generate new test cases from manually …"}}
{"Title":"Evaluating Semantic Representations of Source Code","URL":"https://arxiv.org/pdf/1910.05177","Abstract":{"FirstLine":"Learned representations of source code enable various software developer tools, eg, to","Rest":"detect bugs or to predict program properties. At the core of code representations often are word embeddings of identifier names in source code, because identifiers …"}}
{"Title":"Learning to Fuzz from Symbolic Execution with Application to Smart Contracts","URL":"https://files.sri.inf.ethz.ch/website/papers/ccs19-ilf.pdf","Abstract":{"FirstLine":"Fuzzing and symbolic execution are two complementary techniques for discovering software","Rest":"vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly select the right inputs. Symbolic execution is thorough but slow and …"}}
{"Title":"ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking","URL":"https://arxiv.org/pdf/1912.02972","Abstract":{"FirstLine":"Commit messages record code changes (eg, feature modifications and bug repairs) in","Rest":"natural language, and are useful for program comprehension. Due to the frequent updates of software and time cost, developers are generally unmotivated to write …"}}
{"Title":"Improving Bug Detection via Context-Based Code Representation Learning and Attention-Based Neural Networks","URL":"https://web.njit.edu/~davidsw/papers/oopsla19_id_201.pdf","Abstract":{"FirstLine":"• Rule-based bug detection. In this type of approaches, several programming rules are","Rest":"predefined to statically detect common programming flaws or defects. A popular example of this type of approaches is FindBugs [Hovemeyer and Pugh 2007]. While …"}}
{"Title":"Generating precise error specifications for C: a zero shot learning approach","URL":"https://dl.acm.org/ft_gateway.cfm?id=3360586\u0026type=pdf","Abstract":{"FirstLine":"In C programs, error specifications, which specify the value range that each function","Rest":"returns to indicate failures, are widely used to check and propagate errors for the sake of reliability and security. Various kinds of C analyzers employ error …"}}
{"Title":"CodeSearchNet Challenge: Evaluating the State of Semantic Code Search","URL":"https://arxiv.org/pdf/1909.09436","Abstract":{"FirstLine":"Semantic code search is the task of retrieving relevant code given a natural language","Rest":"query. While related to other information retrieval tasks, it requires bridging the gap between the language used in code (often abbreviated and highly technical) …"}}
{"Title":"Using Distributed Representation of Code for Bug Detection","URL":"https://arxiv.org/pdf/1911.12863","Abstract":{"FirstLine":"Recent advances in neural modeling for bug detection have been very promising. More","Rest":"specifically, using snippets of code to create continuous vectors or\\textit {embeddings} has been shown to be very good at method name prediction and …"}}
{"Title":"N-Grams as a Measure of Naturalness and Complexity","URL":"http://www.diva-portal.org/smash/get/diva2:1369387/FULLTEXT01.pdf","Abstract":{"FirstLine":"We live in a time where software is used everywhere. It is used even for creating other","Rest":"software by helping developers with writing or generating new code. To do this properly, metrics to measure software quality are being used to evaluate the final …"}}
{"Title":"Commit2Vec: Learning Distributed Representations of Code Changes","URL":"https://arxiv.org/pdf/1911.07605","Abstract":{"FirstLine":"Deep learning methods, which have found successful applications in fields like image","Rest":"classification and natural language processing, have recently been applied to source code analysis too, due to the enormous amount of freely available source …"}}
{"Title":"A machine learning based automatic folding of dynamically typed languages","URL":"https://dl.acm.org/citation.cfm?id=3342746","Abstract":{"FirstLine":"The popularity of dynamically typed languages has been growing strongly lately. Elegant","Rest":"syntax of such languages like javascript, python, PHP and ruby pays back when it comes to finding bugs in large codebases. The analysis is hindered by …"}}
{"Title":"Improve Language Modelling for Code Completion through Statement Level Language Model based on Statement Embedding Generated by BiLSTM","URL":"https://arxiv.org/pdf/1909.11503","Abstract":{"FirstLine":"Language models such as RNN, LSTM or other variants have been widely used as generative","Rest":"models in natural language processing. In last few years, taking source code as natural languages, parsing source code into a token sequence and using a …"}}
{"Title":"MACHINE LEARNING FOR CODE SYNTHESIS AND ANALYSIS","URL":"https://www.cs.colostate.edu/~steveko/wp/projects/KommruschResearchExam.pdf","Abstract":{"FirstLine":"Deep learning has been successfully applied to a wide array of problems due to its","Rest":"versatility and the variety of algorithms being developed. Deep learning for natural language processing makes use of recurrent networks, attention layers, copy …"}}
{"Title":"Relational Verification using Reinforcement Learning","URL":"https://www.cs.utexas.edu/~isil/oopsla19.pdf","Abstract":{"FirstLine":"Authors' addresses: Jia Chen, Department of Computer Science, University of Texas at","Rest":"Austin, Austin, Texas, 78712-0233, USA, jchen@ cs. utexas. edu; Jiayi Wei, Department of Computer Science, University of Texas at Austin, Austin, Texas, 78712 …"}}
{"Title":"Modeling Security Weaknesses to Enable Practical Run-time Defenses","URL":"https://kilthub.cmu.edu/ndownloader/files/17435732","Abstract":{"FirstLine":"Security weaknesses are sometimes caused by patterns in human behaviors. However, it can","Rest":"be difficult to identify such patterns in a practical, yet accurate way. In order to fix security weaknesses, it is crucial to identify them. Useful systems to …"}}
{"Title":"Encodings for Enumeration-Based Program Synthesis","URL":"https://link.springer.com/chapter/10.1007/978-3-030-30048-7_34","Abstract":{"FirstLine":"Program synthesis is the problem of finding a program that satisfies a given","Rest":"specification. Most program synthesizers are based on enumerating program candidates that satisfy the specification. Recently, several new tools for program …"}}
{"Title":"Code Summarization with Abstract Syntax Tree","URL":"https://link.springer.com/chapter/10.1007/978-3-030-36802-9_69","Abstract":{"FirstLine":"Code summarization, which provides a high-level description of the function implemented","Rest":"by code, plays a vital role in software maintenance and code retrieval. Traditional approaches focus on retrieving similar code snippets to generate …"}}
{"Title":"Structural Language Models for Any-Code Generation","URL":"https://arxiv.org/pdf/1910.00577","Abstract":{"FirstLine":"We address the problem of Any-Code Generation (AnyGen)-generating code without any","Rest":"restriction on the vocabulary or structure. The state-of-the-art in this problem is the sequence-to-sequence (seq2seq) approach, which treats code as a sequence …"}}
{"Title":"Do People Prefer\" Natural\" code?","URL":"https://arxiv.org/pdf/1910.03704","Abstract":{"FirstLine":"Natural code is known to be very repetitive (much more so than natural language corpora);","Rest":"furthermore, this repetitiveness persists, even after accounting for the simpler syntax of code. However, programming languages are very expressive …"}}
{"Title":"AutoPandas: Neural-Backed Generators for Program Synthesis","URL":"https://people.eecs.berkeley.edu/~ksen/papers/autopandas2.pdf","Abstract":{"FirstLine":"Developers nowadays have to contend with a growing number of APIs. Many of these APIs are","Rest":"very useful to developers, increasing the ease of code re-use. API functions provide implementations of functionalities that are often more efficient …"}}
{"Title":"Generating Commit Messages from Git Diffs","URL":"https://arxiv.org/pdf/1911.11690","Abstract":{"FirstLine":"Commit messages aid developers in their understanding of a continuously evolving","Rest":"codebase. However, developers not always document code changes properly. Automatically generating commit messages would relieve this burden on developers …"}}
{"Title":"Learning Lenient Parsing \u0026 Typing via Indirect Supervision","URL":"https://arxiv.org/pdf/1910.05879","Abstract":{"FirstLine":"Both professional coders and teachers frequently deal with imperfect (fragmentary,","Rest":"incomplete, ill-formed) code. Such fragments are common in StackOverflow; students also frequently produce ill-formed code, for which instructors, TAs (or students …"}}
{"Title":"Code Generation from Supervised Code Embeddings","URL":"https://link.springer.com/chapter/10.1007/978-3-030-36808-1_42","Abstract":{"FirstLine":"Code generation, which generates source code from natural language, is beneficial for","Rest":"constructing smarter I ntegrated D evelopment E nvironments (IDEs), retrieving code more effectively and so on. Traditional approaches are based on matching …"}}
{"Title":"Перспективы применения нейронных сетей в суперкомпиляции и насыщении равенствами","URL":"https://keldysh.ru/abrau/2019/theses/35.pdf","Abstract":{"FirstLine":"Многие методы преобразования программ (включая суперкомпиляцию и насыщение равенствами)","Rest":"можно сформулировать в виде набора правил переписывания графов или термов, применяемых в некотором порядке …"}}
{"Title":"On Herb Compatibility Rule of Insomnia Based on Machine Learning Approaches","URL":"https://www.researchgate.net/profile/Fang_Hu6/publication/337157715_On_Herb_Compatibility_Rule_of_Insomnia_Based_on_Machine_Learning_Approaches/links/5dc8cd58458515143500741d/On-Herb-Compatibility-Rule-of-Insomnia-Based-on-Machine-Learning-Approaches.pdf","Abstract":{"FirstLine":"Recent research in machine learning has led to significant progress in various research","Rest":"fields. Especially, the knowledge discovery using this method in Traditional Chinese Medicine (TCM) has been becoming a hot topic. In this paper, we studied …"}}
{"Title":"Twin-Finder: Integrated Reasoning Engine for Pointer-related Code Clone Detection","URL":"https://arxiv.org/pdf/1911.00561","Abstract":{"FirstLine":"Detecting code clones is crucial in various software engineering tasks. In particular,","Rest":"code clone detection can have significant uses in the context of analyzing and fixing bugs in large scale applications. However, prior works, such as machine learning …"}}
{"Title":"Assessing the Generalizability of code2vec Token Embeddings","URL":"http://www.mysmu.edu/faculty/davidlo/papers/ase19-code2vec.pdf","Abstract":{"FirstLine":"Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic","Rest":"parsing, have benefited from the development of word embedding models. In particular, regardless of the training algorithms, the learned embeddings have …"}}
{"Title":"Class Name Recommendation based on Graph Embedding of Program Elements","URL":"https://kuri8ive.github.io/preprints/apsec2019.pdf","Abstract":{"FirstLine":"In software development, the quality of identifier names is important because it greatly","Rest":"affects program comprehension for developers. However, naming identifiers that appropriately represent the nature or behavior of program elements such as …"}}
{"Title":"Universal Approximation with Certified Networks","URL":"https://arxiv.org/pdf/1909.13846","Abstract":{"FirstLine":"Training neural networks to be certifiably robust is a powerful defense against","Rest":"adversarial attacks. However, while promising, state-of-the-art results with certified training are far from satisfactory. Currently, it is very difficult to train a neural network …"}}
{"Title":"Evaluating Lexical Approximation of Program Dependence","URL":"https://www.sciencedirect.com/science/article/pii/S016412121930233X","Abstract":{"FirstLine":"Complex dependence analysis typically provides an underpinning approximation of true","Rest":"program dependence. We investigate the effectiveness of using lexical information to approximate such dependence, introducing two new deletion …"}}
{"Title":"On The Quality of Identifiers in Test Code","URL":"https://www.inf.usi.ch/phd/lin/downloads/Lin2019c.pdf","Abstract":{"FirstLine":"Meaningful, expressive identifiers in source code can enhance the readability and reduce","Rest":"comprehension efforts. Over the past years, researchers have devoted considerable effort to understanding and improving the naming quality of identifiers …"}}
{"Title":"Software Vulnerability Discovery via Learning Multi-domain Knowledge Bases","URL":"https://ieeexplore.ieee.org/abstract/document/8906156/","Abstract":{"FirstLine":"Machine learning (ML) has great potential in automated code vulnerability discovery.","Rest":"However, automated discovery application driven by off-the-shelf machine learning tools often performs poorly due to the shortage of high-quality training data. The …"}}
{"Title":"Learning based Methods for Code Runtime Complexity Prediction","URL":"https://arxiv.org/pdf/1911.01155","Abstract":{"FirstLine":"Predicting the runtime complexity of a programming code is an arduous task. In fact, even","Rest":"for humans, it requires a subtle analysis and comprehensive knowledge of algorithms to predict time complexity with high fidelity, given any code. As per …"}}
{"Title":"DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage","URL":"https://arxiv.org/pdf/1910.06500","Abstract":{"FirstLine":"Recently deep learning-based approaches have shown great potential in the modeling of","Rest":"source code for various software engineering tasks. These techniques lack adequate generalization and resistance to acclimate the use of such models in a …"}}
{"Title":"Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits","URL":"https://arxiv.org/pdf/1911.07620","Abstract":{"FirstLine":"Public vulnerability databases such as CVE and NVD account for only 60% of security","Rest":"vulnerabilities present in open-source projects, and are known to suffer from inconsistent quality. Over the last two years, there has been considerable growth in …"}}
{"Title":"Personalized Code Recommendation","URL":"https://ieeexplore.ieee.org/abstract/document/8919008/","Abstract":{"FirstLine":"The current state-of-the-art methods in code recommendation mostly take the crowd-based","Rest":"approach. The basic idea is to collect and extract code patterns from a large pool of available source code and use those code patterns for recommendations …"}}
{"Title":"Linguistic Change in Open Source Software","URL":"https://ieeexplore.ieee.org/abstract/document/8918934/","Abstract":{"FirstLine":"In this paper, we seek to advance the state-of-the-art in code evolution analysis","Rest":"research and practice by statistically analyzing, interpreting, and formally describing the evolution of code lexicon in Open Source Software (OSS). The underlying …"}}
{"Title":"zkay: Specifying and Enforcing Data Privacy in Smart Contracts","URL":"https://files.sri.inf.ethz.ch/website/papers/ccs19-zkay.pdf","Abstract":{"FirstLine":"Privacy concerns of smart contracts are a major roadblock preventing their wider","Rest":"adoption. A promising approach to protect private data is hiding it with cryptographic primitives and then enforcing correctness of state updates by Non-Interactive Zero …"}}
{"Title":"Neural Program Synthesis By Self-Learning","URL":"https://arxiv.org/pdf/1910.05865","Abstract":{"FirstLine":"Neural inductive program synthesis is a task generating instructions that can produce","Rest":"desired outputs from given inputs. In this paper, we focus on the generation of a chunk of assembly code that can be executed to match a state change inside the …"}}
{"Title":"A Deep Learning Model for Source Code Generation","URL":"http://docs.udc.edu/seas/Faculty/Oladunni-A-Deep-Learning-Model-for-Source-Code-Generation.pdf","Abstract":{"FirstLine":"ABSTRACT Natural Language Processing (NLP) models have been used extensively to study","Rest":"relationship among words in a corpus. Inspired by models such as n-gram we developed a model for analyzing source code via its Abstract Syntax …"}}
{"Title":"Using Sequence-to-Sequence Learning for Repairing C Vulnerabilities","URL":"https://arxiv.org/pdf/1912.02015","Abstract":{"FirstLine":"Software vulnerabilities affect all businesses and research is being done to avoid,","Rest":"detect or repair them. In this article, we contribute a new technique for automatic vulnerability fixing. We present a system that uses the rich software development …"}}
{"Title":"Poster: Finding JavaScript Name Conflicts on the Web","URL":"https://dl.acm.org/citation.cfm?id=3363268","Abstract":{"FirstLine":"Including JavaScript code from many different hosts is a popular practice in developing","Rest":"web applications. For example, to include a social plugin like the Facebook Like button, a web developer needs to only include a script from facebook …"}}
{"Title":"Deep Transfer Learning for Source Code Modeling","URL":"https://arxiv.org/pdf/1910.05493","Abstract":{"FirstLine":"In recent years, deep learning models have shown great potential in source code modeling","Rest":"and analysis. Generally, deep learning-based approaches are problem-specific and data-hungry. A challenging issue of these approaches is that they …"}}
{"Title":"Intelligent Software Engineering in the Context of Agile Software Development: a Systematic Literature Review","URL":"https://www.sciencedirect.com/science/article/pii/S0950584919302587","Abstract":{"FirstLine":"Abstract CONTEXT: Intelligent Software Engineering (ISE) refers to the application of","Rest":"intelligent techniques to software engineering. We define an “intelligent technique” as a technique that explores data (from digital artifacts or domain experts) for …"}}
{"Title":"Imitation-Projected Programmatic Reinforcement Learning","URL":"https://deeplearn.org/arxiv/99210/imitation-projected-programmatic-reinforcement-learning","Abstract":{"FirstLine":"We study the problem of programmatic reinforcement learning, in which policies are","Rest":"represented as short programs in a symbolic language. Such programmatic policies can be more interpretable, generalizable, and amenable to formal verification than …"}}
{"Title":"Testing Neural Program Analyzers","URL":"https://www.researchgate.net/profile/Mohammad_Alipour9/publication/336220651_Testing_Neural_Program_Analyzers/links/5d94dadb458515c1d38ecdc4/Testing-Neural-Program-Analyzers.pdf","Abstract":{"FirstLine":"Deep neural networks have been increasingly used in software engineering and program","Rest":"analysis tasks. They usually take a program and make some predictions about it, eg, bug prediction. We call these models neural program analyzers. The …"}}
{"Title":"Keep It Simple: Graph Autoencoders Without Graph Convolutional Networks","URL":"https://arxiv.org/pdf/1910.00942","Abstract":{"FirstLine":"Graph autoencoders (AE) and variational autoencoders (VAE) recently emerged as powerful","Rest":"node embedding methods, with promising performances on challenging tasks such as link prediction and node clustering. Graph AE, VAE and most of their …"}}
{"Title":"Improving Textual Network Learning with Variational Homophilic Embeddings","URL":"https://arxiv.org/pdf/1909.13456","Abstract":{"FirstLine":"The performance of many network learning applications crucially hinges on the success of","Rest":"network embedding algorithms, which aim to encode rich network information into low-dimensional vertex-based vector representations. This paper …"}}
{"Title":"Translationese as a Language in\" Multilingual\" NMT","URL":"https://arxiv.org/pdf/1911.03823","Abstract":{"FirstLine":"Machine translation has an undesirable propensity to produce\" translationese\" artifacts,","Rest":"which can lead to higher BLEU scores while being liked less by human raters. Motivated by this, we model translationese and original (ie natural) text as …"}}
{"Title":"Towards a Model to Appraise and Suggest Identifier Names","URL":"https://ieeexplore.ieee.org/abstract/document/8918988/","Abstract":{"FirstLine":"Unknowingly, identifiers in the source code of a software system play a vital role in","Rest":"determining the quality of the system. Ambiguous and confusing identifier names lead developers to not only misunderstand the behavior of the code but also …"}}
{"Title":"Reducing Features to Improve Link Prediction Performance in Location Based Social Networks, Non-Monotonically Selected Subset from Feature Clusters","URL":"https://asonamdata.com/ASONAM2019_Proceedings/pdf/papers/139_0809_064.pdf","Abstract":{"FirstLine":"In most cases, feature sets available for machine learning algorithms require a feature","Rest":"engineering approach to pick the subset for optimal performance. During our link prediction research, we had observed the same challenge for features of …"}}
{"Title":"Recognizing lines of code violating company-specific coding guidelines using machine learning","URL":"https://link.springer.com/article/10.1007/s10664-019-09769-8","Abstract":{"FirstLine":"Software developers in big and medium-size companies are working with millions of lines","Rest":"of code in their codebases. Assuring the quality of this code has shifted from simple defect management to proactive assurance of internal code quality. Although …"}}
{"Title":"On the use of supervised machine learning for assessing schedulability: application to Ethernet TSN","URL":"https://dl.acm.org/citation.cfm?id=3356409","Abstract":{"FirstLine":"In this work, we ask if Machine Learning (ML) can provide a viable alternative to","Rest":"conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints. Otherwise said, can an algorithm learn …"}}
{"Title":"Code Generation as a Dual Task of Code Summarization","URL":"https://arxiv.org/pdf/1910.05923","Abstract":{"FirstLine":"Code summarization (CS) and code generation (CG) are two crucial tasks in the field of","Rest":"automatic software development. Various neural network-based approaches are proposed to solve these two tasks separately. However, there exists a specific …"}}
{"Title":"Why do they ask? An exploratory study of crowd discussions about Android application programming interface in stack overflow","URL":"https://link.springer.com/article/10.1007/s11771-019-4185-5","Abstract":{"FirstLine":"Nowadays, more and more Android developers prefer to seek help from Q\u0026A website like","Rest":"Stack Overflow, despite the rich official documentation. Several researches have studied the limitations of the official application programming …"}}
{"Title":"Programming by Predicates","URL":"http://cseweb.ucsd.edu/~hpeleg/predicates-actainformatica19.pdf","Abstract":{"FirstLine":"Program synthesis is the problem of computing from a specification a program that","Rest":"implements it. New and popular variations on the synthesis problem accept specifications in formats that are easier for the human synthesis user to provide: input …"}}
{"Title":"Merging Weak and Active Supervision for Semantic Parsing","URL":"https://arxiv.org/pdf/1911.12986","Abstract":{"FirstLine":"A semantic parser maps natural language commands (NLs) from the users to executable","Rest":"meaning representations (MRs), which are later executed in certain environment to obtain user-desired results. The fully-supervised training of such …"}}
{"Title":"Combining Program Analysis and Statistical Language Model for Code Statement Completion","URL":"https://arxiv.org/pdf/1911.07781","Abstract":{"FirstLine":"Automatic code completion helps improve developers' productivity in their programming","Rest":"tasks. A program contains instructions expressed via code statements, which are considered as the basic units of program execution. In this paper, we …"}}
{"Title":"Exploring Robust Neural Methods in Inductive Program Synhthesis","URL":"http://www.ourpropeller.com/RobustMethodsIPS.pdf","Abstract":{"FirstLine":"ABSTRACT Inductive Program Synthesis (IPS) is an attractive goal for AI researchers as it","Rest":"provides a solution to the problem of getting programs to write code. Recent work has shown that neural networks are efficient tools for improving the …"}}
{"Title":"Neural Relational Inference with Fast Modular Meta-learning","URL":"https://papers.nips.cc/paper/9353-neural-relational-inference-with-fast-modular-meta-learning.pdf","Abstract":{"FirstLine":"Graph neural networks (GNNs) are effective models for many dynamical systems consisting","Rest":"of entities and relations. Although most GNN applications assume a single type of entity and relation, many situations involve multiple types of interactions …"}}
{"Title":"Word Embedding Algorithms as Generalized Low Rank Models and their Canonical Form","URL":"https://arxiv.org/pdf/1911.02639","Abstract":{"FirstLine":"Word embedding algorithms produce very reliable feature representations of words that are","Rest":"used by neural network models across a constantly growing multitude of NLP tasks. As such, it is imperative for NLP practitioners to understand how their …"}}
{"Title":"Disentangling Interpretable Generative Parameters of Random and Real-World Graphs","URL":"https://arxiv.org/pdf/1910.05639","Abstract":{"FirstLine":"While a wide range of interpretable generative procedures for graphs exist, matching","Rest":"observed graph topologies with such procedures and choices for its parameters remains an open problem. Devising generative models that closely reproduce real …"}}
{"Title":"Online Robustness Training for Deep Reinforcement Learning","URL":"https://arxiv.org/pdf/1911.00887","Abstract":{"FirstLine":"In deep reinforcement learning (RL), adversarial attacks can trick an agent into unwanted","Rest":"states and disrupt training. We propose a system called Robust Student-DQN (RS-DQN), which permits online robustness training alongside Q networks …"}}
{"Title":"Automatic Unit Test Amplification For DevOps","URL":"https://tel.archives-ouvertes.fr/tel-02396530/document","Abstract":{"FirstLine":"Over the last decade, strong unit testing has become an essential component of any","Rest":"serious software project, whether in industry or academia. The agile development movement has contributed to this cultural change with the global dissemination of …"}}
{"Title":"Transferring Java Comments Based on Program Static Analysis","URL":"https://link.springer.com/chapter/10.1007/978-3-030-30952-7_64","Abstract":{"FirstLine":"In the process of software development and maintenance, code comments can help developers","Rest":"reduce the time of reading source code, and thus improve their work efficiency. For large Java software projects, comments tend to appear in front of the …"}}
{"Title":"LSC: Online Auto-Update Smart Contracts for Fortifying Blockchain-Based Log Systems","URL":"https://www.sciencedirect.com/science/article/pii/S0020025519309260","Abstract":{"FirstLine":"Smart contracts allow verifiable operations to be executed in blockchains, bringing new","Rest":"possibilities for trust establishment in trustless scenarios. However, smart contracts are cumbersome when used as security mechanisms in security scenarios …"}}
{"Title":"Deep Learning for Symbolic Mathematics","URL":"https://arxiv.org/pdf/1912.01412","Abstract":{"FirstLine":"Neural networks have a reputation for being better at solving statistical or approximate","Rest":"problems than at performing calculations or working with symbolic data. In this paper, we show that they can be surprisingly good at more elaborated tasks in …"}}
{"Title":"THE MOUNTAINS AS SACRED SPACES: CHURCH, PLACE, AND CULTURE IN NORTH CAROLINA APPALACHIAN MOUNTAIN POETRY ALANA D. DAGENHART","URL":"http://books.google.com/books?hl=en\u0026lr=lang_en\u0026id=ahHCDwAAQBAJ\u0026oi=fnd\u0026pg=PA45\u0026dq=%22Big+Code%22\u0026ots=SwNR2plkpl\u0026sig=K2L64NCMGMRRgJVxhNPGLwPnptc","Abstract":{"FirstLine":"… Alana D. Dagenhart 49 ly heard, but not understood by people, but “Indianssaid the","Rest":"peaks/were talking to each other in/the idiom that mountainsuse/across the mighty distances,/with giant syllables and rests,” as if some …"}}
{"Title":"Regularizing Variational Autoencoders for Molecular Graph Generation","URL":"https://link.springer.com/chapter/10.1007/978-3-030-36802-9_50","Abstract":{"FirstLine":"Deep generative models for graphs are promising for being able to sidestep expensive","Rest":"search procedures in the huge space of chemical compounds. However, incorporating complex and non-differentiable property metrics into a generative …"}}
{"Title":"Speech Recognition with Augmented Synthesized Speech","URL":"https://arxiv.org/pdf/1909.11699","Abstract":{"FirstLine":"Recent success of the Tacotron speech synthesis architecture and its variants in","Rest":"producing natural sounding multi-speaker synthesized speech has raised the exciting possibility of replacing expensive, manually transcribed, domain-specific …"}}
{"Title":"Type Safety with JSON Subschema","URL":"https://arxiv.org/pdf/1911.12651","Abstract":{"FirstLine":"JSON is a popular data format used pervasively in web APIs, cloud computing, NoSQL","Rest":"databases, and increasingly also machine learning. JSON Schema is a language for declaring the structure of valid JSON data. There are validators that can …"}}
{"Title":"Zoea--Composable Inductive Programming Without Limits","URL":"https://arxiv.org/pdf/1911.08286","Abstract":{"FirstLine":"Automatic generation of software from some form of specification has been a long standing","Rest":"goal of computer science research. To date successful results have been reported for the production of relatively small programs. This paper presents Zoea …"}}
{"Title":"A Survey of Compiler Testing","URL":"https://software-lab.org/publications/csur2019_compiler_testing.pdf","Abstract":{"FirstLine":"Compilers are important tools because they are a central piece of infrastructure for","Rest":"building other software. Virtually every program that runs on a computer, ranging from operating systems over web browsers to small scripts written by end-users, has …"}}
{"Title":"The Internet of Things and Machine Learning, Solutions for Urban Infrastructure Management","URL":"https://link.springer.com/chapter/10.1007/978-3-030-22044-0_13","Abstract":{"FirstLine":"Urban infrastructure management requires the ability to reason about a large-scale","Rest":"complex system: What is the state of the system? How can it be compactly represented and quantified? How is the system likely to evolve? Reasoning calls for …"}}
{"Title":"Beyond the Single Neuron Convex Barrier for Neural Network Certification","URL":"https://files.sri.inf.ethz.ch/website/papers/neurips19_krelu.pdf","Abstract":{"FirstLine":"We propose a new parametric framework, called k-ReLU, for computing precise and scalable","Rest":"convex relaxations used to certify neural networks. The key idea is to approximate the output of multiple ReLUs in a layer jointly instead of separately. This …"}}
{"Title":"Multi-Modal Attention Network Learning for Semantic Source Code Retrieval","URL":"https://arxiv.org/pdf/1909.13516","Abstract":{"FirstLine":"Code retrieval techniques and tools have been playing a key role in facilitating software","Rest":"developers to retrieve existing code fragments from available open-source repositories given a user query. Despite the existing efforts in improving the …"}}
{"Title":"Neural Speech Translation using Lattice Transformations and Graph Networks","URL":"https://www.aclweb.org/anthology/D19-5304.pdf","Abstract":{"FirstLine":"Speech translation systems usually follow a pipeline approach, using word lattices as an","Rest":"intermediate representation. However, previous work assume access to the original transcriptions used to train the ASR system, which can limit applicability in …"}}
{"Title":"Multimodal Machine Translation through Visuals and Speech","URL":"https://arxiv.org/pdf/1911.12798","Abstract":{"FirstLine":"Multimodal machine translation involves drawing information from more than one modality,","Rest":"based on the assumption that the additional modalities will contain useful alternative views of the input data. The most prominent tasks in this area are spoken …"}}
{"Title":"DLTPy: Deep Learning Type Inference of Python Function Signatures using Natural Language Context","URL":"https://arxiv.org/pdf/1912.00680","Abstract":{"FirstLine":"Due to the rise of machine learning, Python is an increasingly popular programming","Rest":"language. Python, however, is dynamically typed. Dynamic typing has shown to have drawbacks when a project grows, while at the same time it improves developer …"}}
{"Title":"Program Synthesis for Programmers","URL":"http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2019/PHD/PHD-2019-11.pdf","Abstract":{"FirstLine":"Recent years have seen great progress in automated synthesis techniques that can","Rest":"automatically generate code based on some intent expressed by the user, but communicating this intent remains a major challenge. When the expressed intent is …"}}
{"Title":"Enabling Efficient Parallelism for Applications with Dependences and Irregular Memory Accesses","URL":"https://etd.ohiolink.edu/!etd.send_file?accession=osu1563461701172592\u0026disposition=inline","Abstract":{"FirstLine":"Page 1. Enabling Efficient Parallelism for Applications with Dependences and","Rest":"IrregularMemory Accesses Dissertation Presented in Partial Fulfillment of the Requirements forthe Degree Doctor of Philosophy in the Graduate School of The Ohio State University …"}}
{"Title":"Embedding Symbolic Knowledge into Deep Networks","URL":"http://papers.nips.cc/paper/8676-embedding-symbolic-knowledge-into-deep-networks.pdf","Abstract":{"FirstLine":"In this work, we aim to leverage prior symbolic knowledge to improve the performance of","Rest":"deep models. We propose a graph embedding network that projects propositional formulae (and assignments) onto a manifold via an augmented Graph …"}}
{"Title":"Machine Learning On Complex Networks: Dynamical Fingerprints, Embeddings and Feature Engineering","URL":"https://dial.uclouvain.be/pr/boreal/object/boreal%3A222927/datastream/PDF_01/view","Abstract":{"FirstLine":"Complex networks emerge as a natural framework to describe real-life phenomena involving","Rest":"a group of entities and their interactions, ie, a social network. Furthermore, other problems involve a collection of networks, such as multi-layer, temporal, or …"}}
{"Title":"Coding as another language: a pedagogical approach for teaching computer science in early childhood","URL":"https://link.springer.com/article/10.1007/s40692-019-00147-3","Abstract":{"FirstLine":"Computer programming is an essential skill in the 21st century and new policies and","Rest":"frameworks aim at preparing students for computer science-related professions. Today, the development of new interfaces and block-programming languages …"}}
{"Title":"Novel positional encodings to enable tree-based transformers","URL":"http://papers.nips.cc/paper/9376-novel-positional-encodings-to-enable-tree-based-transformers.pdf","Abstract":{"FirstLine":"Neural models optimized for tree-based problems are of great value in tasks like SQL","Rest":"query extraction and program synthesis. On sequence-structured data, transformers have been shown to learn relationships across arbitrary pairs of positions more …"}}
{"Title":"Applications of Text Mining Techniques on Automated Software System Verification","URL":"https://prism.ucalgary.ca/bitstream/handle/1880/111013/ucalgary_2019_miryeganeh_nima.pdf?sequence=3\u0026isAllowed=y","Abstract":{"FirstLine":"Software Verification and Validation (V\u0026V) is an essential task in software engineering.","Rest":"Software systems are becoming larger and more complex and as a result, a manual V\u0026V process is getting more time-consuming and expensive. Text …"}}
{"Title":"Memory Augmented Recursive Neural Networks","URL":"https://arxiv.org/pdf/1911.01545","Abstract":{"FirstLine":"Recursive neural networks have shown an impressive performance for modeling compositional","Rest":"data compared to their recurrent counterparts. Although recursive neural networks are better at capturing long range dependencies, their …"}}
{"Title":"Concealment of iris features based on artificial noises","URL":"https://onlinelibrary.wiley.com/doi/pdf/10.4218/etrij.2019-0145","Abstract":{"FirstLine":"Although iris recognition verification is considered to be the safest method of biometric","Rest":"verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the security of iris recognition and …"}}
{"Title":"Abstraction Mechanism on Neural Machine Translation Models for Automated Program Repair","URL":"https://uwspace.uwaterloo.ca/bitstream/handle/10012/15119/Wei_Moshi.pdf?sequence=1","Abstract":{"FirstLine":"Bug fixing is a time-consuming task in software development. Automated bug repair tools","Rest":"are created to fix programs with little or no human effort. There are many existing tools based on the generate-and-validate (G\u0026V) approach, which is an …"}}
{"Title":"A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications","URL":"https://www.sciencedirect.com/science/article/pii/S0167739X19319703","Abstract":{"FirstLine":"The synergy between data security and high intensive computing has envisioned the way to","Rest":"robust anomaly detection schemes which in turn necessitates the need for efficient data analysis. Data clustering is one of the most important components of …"}}
{"Title":"Program Synthesis by Type-Guided Abstraction Refinement","URL":"https://arxiv.org/pdf/1911.04091","Abstract":{"FirstLine":"We consider the problem of type-directed component based synthesis where, given a set of","Rest":"(typed) components and a query type, the goal is to synthesize a term that inhabits the query. Classical approaches based on proof search in intuitionistic …"}}
{"Title":"A comparison of end-to-end models for long-form speech recognition","URL":"https://arxiv.org/pdf/1911.02242","Abstract":{"FirstLine":"End-to-end automatic speech recognition (ASR) models, including both attention-based","Rest":"models and the recurrent neural network transducer (RNN-T), have shown superior performance compared to conventional systems. However, previous studies …"}}
{"Title":"GPU Algorithm for Earliest Arrival Time Problem in Public Transport Networks","URL":"https://arxiv.org/pdf/1912.00966","Abstract":{"FirstLine":"Given a temporal graph G, a source vertex s, and a departure time at source vertex t_s,","Rest":"the earliest arrival time problem EAT is to start from s on or after t_s and reach all the vertices in G as early as possible. Ni et al. have proposed a parallel algorithm for …"}}
{"Title":"OSAIFU: A Source Code Factorizer on Android Studio","URL":"https://ieeexplore.ieee.org/abstract/document/8918942/","Abstract":{"FirstLine":"Programs written in the event-driven style that are typical of mobile and/or Web","Rest":"applications are not easy to read through. For the purpose of reducing the burden put on software developers, we propose a tool for supporting program understanding …"}}
{"Title":"Neural Attribution for Semantic Bug-Localization in Student Programs","URL":"http://www.iisc-seal.net/publications/neurips2019.pdf","Abstract":{"FirstLine":"Providing feedback is an integral part of teaching. Most open online courses on","Rest":"programming make use of automated grading systems to support programming assignments and give real-time feedback. These systems usually rely on test results …"}}
{"Title":"Marking Mechanism in Sequence-to-sequence Model for Mapping Language to Logical Form","URL":"https://ieeexplore.ieee.org/abstract/document/8919471/","Abstract":{"FirstLine":"Semantic parsing in Natural language processing (NLP) is a challenging task, which has","Rest":"been studied for many years. The main purpose is to model the language as a logical form like a machine translation task. Recently, an approach which uses a …"}}
{"Title":"Augmented Example-based Synthesis using Relational Perturbation Properties","URL":"https://www.cs.purdue.edu/homes/roopsha/papers/sketchax_popl20.pdf","Abstract":{"FirstLine":"Authors' addresses: Shengwei An, Purdue University, USA, an93@ purdue. edu; Rishabh","Rest":"Singh, Google Brain, USA, rising@ google. com; Sasa Misailovic, UIUC, USA, misailo@ illinois. edu; Roopsha Samanta, Purdue University, USA, roopsha …"}}
{"Title":"Compiler Auto-Vectorization with Imitation Learning","URL":"https://papers.nips.cc/paper/9604-compiler-auto-vectorization-with-imitation-learning.pdf","Abstract":{"FirstLine":"Modern microprocessors are equipped with single instruction multiple data (SIMD) or","Rest":"vector instruction sets which allow compilers to exploit fine-grained data level parallelism. To exploit this parallelism, compilers employ auto-vectorization …"}}
{"Title":"CPC: automatically classifying and propagating natural language comments via program analysis","URL":"https://rucore.libraries.rutgers.edu/rutgers-lib/61591/PDF/1/play/","Abstract":{"FirstLine":"Modern software systems usually contain enormous code comments which provide abundant","Rest":"information that have been lever-aged to help perform various software engineering tasks, such as bug detection, specification inference, and code …"}}
{"Title":"Deep Representation Learning for Code Smells Detection using Variational Auto-Encoder","URL":"https://ieeexplore.ieee.org/abstract/document/8851854/","Abstract":{"FirstLine":"Detecting code smells is an important research problem in the software maintenance. It","Rest":"assists the subsequent steps of the refactoring process so as to improve the quality of the software system. However, most of existing approaches …"}}
{"Title":"Formal Verification of Workflow Policies for Smart Contracts in Azure Blockchain","URL":"https://www.cs.utexas.edu/~ypwang/pubs/vstte19.pdf","Abstract":{"FirstLine":"Ensuring correctness of smart contracts is paramount to ensuring trust in","Rest":"blockchain-based systems. This paper studies the safety and security of smart contracts in the Azure Blockchain Workbench, an enterprise Blockchain-as-a-Service offering from …"}}
{"Title":"Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets","URL":"https://www.researchgate.net/profile/C_M_Khaled_Saifullah/publication/336881435_Learning_from_Examples_to_Find_Fully_Qualified_Names_of_API_Elements_in_Code_Snippets/links/5db895ba92851c81801492be/Learning-from-Examples-to-Find-Fully-Qualified-Names-of-API-Elements-in-Code-Snippets.pdf","Abstract":{"FirstLine":"Developers often reuse code snippets from online forums, such as Stack Overflow, to learn","Rest":"API usages of software frameworks or libraries. These code snippets often contain ambiguous undeclared external references. Such external references make …"}}
{"Title":"Selective Monitoring Without Delay for Probabilistic System","URL":"http://perso.eleves.ens-rennes.fr/people/julie.parreaux/Parreaux_rapportStageM1.pdf","Abstract":{"FirstLine":"Monitoring is an efficient tool to check correctness in runtime. A monitor observes the","Rest":"output produced by a Markov Chain and decides if the run is correct or faulty. A selective monitor chooses the observed letters with a policy. It skips letters to reduce …"}}
{"Title":"Recommending Exception Handling Code","URL":"https://ieeexplore.ieee.org/abstract/document/8919036/","Abstract":{"FirstLine":"Exception handling is an advanced programming technique to prevent run-time errors or","Rest":"crashes for modern software systems. However, inexperienced programmers might fail to write proper exception handling code in their programs. In …"}}
{"Title":"Systems and methods for generating and using dynamic and localized route-based environmental information","URL":"https://patentimages.storage.googleapis.com/80/33/fa/4ca64b248964d8/US10408635.pdf","Abstract":{"FirstLine":"Methods, systems, and computer-readable media for generating localized environmental","Rest":"information along a route of travel are generally described, for example, to notify users of travel conditions along a specific route and/or to generate …"}}
{"Title":"Graph Enhanced Cross-Domain Text-to-SQL Generation","URL":"https://www.aclweb.org/anthology/D19-5319.pdf","Abstract":{"FirstLine":"Semantic parsing is a fundamental problem in natural language understanding, as it","Rest":"involves the mapping of natural language to structured forms such as executable queries or logic-like knowledge representations. Existing deep learning approaches …"}}
{"Title":"Software Engineering Meets Deep Learning: A Literature Review","URL":"https://arxiv.org/pdf/1909.11436","Abstract":{"FirstLine":"Deep learning (DL) is being used nowadays in many traditional software engineering (SE)","Rest":"problems and tasks, such as software documentation, defect prediction, and software testing. However, since the renaissance of DL techniques is …"}}
{"Title":"Efficient Graph Generation with Graph Recurrent Attention Networks","URL":"https://arxiv.org/pdf/1910.00760","Abstract":{"FirstLine":"We propose a new family of efficient and expressive deep generative models of graphs,","Rest":"called Graph Recurrent Attention Networks (GRANs). Our model generates graphs one block of nodes and associated edges at a time. The block size and …"}}
{"Title":"Does your code need comment?","URL":"https://onlinelibrary.wiley.com/doi/abs/10.1002/spe.2772","Abstract":{"FirstLine":"Code comments convey information about the programmers' intention in a more explicit but","Rest":"less rigorous manner than source code. This information can assist programmers in various tasks, such as code comprehension, reuse, and …"}}
{"Title":"Mode Personalization in Trip-Based Transit Routing","URL":"http://drops.dagstuhl.de/opus/volltexte/2019/11425/pdf/OASIcs-ATMOS-2019-13.pdf","Abstract":{"FirstLine":"We study the problem of finding bi-criteria Pareto optimal journeys in public transit","Rest":"networks. We extend the Trip-Based Public Transit Routing (TB) approach [Sascha Witt, 2015] to allow for users to select modes of interest at query time. As a first step …"}}
{"Title":"Combining Constraint Languages via Abstract Interpretation","URL":"http://hyc.io/papers/ictai2019.pdf","Abstract":{"FirstLine":"Constraint programming initially aims to be a declarative paradigm, but its quest for","Rest":"efficiency is mainly achieved through the development of ad-hoc algorithms, which are encapsulated in global constraints. In this paper, we explore the idea of …"}}
{"Title":"Efficient Precise Dynamic Data Race Detection for CPU and GPU","URL":"http://search.proquest.com/openview/30286d466b8904f517e5d16465a1c7df/1?pq-origsite=gscholar\u0026cbl=18750\u0026diss=y","Abstract":{"FirstLine":"Data races are notorious bugs. They introduce non-determinism in programs behavior,","Rest":"complicate programs semantics, making it challenging to debug parallel programs. To make parallel programming easier, efficient data race detection has …"}}
{"Title":"Efficient Scalable Thread-Safety-Violation Detection","URL":"http://people.cs.uchicago.edu/~cstjygpl/sosp19-tsvd.pdf","Abstract":{"FirstLine":"Concurrency bugs are hard to find, reproduce, and debug. They often escape rigorous","Rest":"in-house testing, but result in large-scale outages in production. Existing concurrencybug detection techniques unfortunately cannot be part of industry's …"}}
{"Title":"NeuroVectorizer: End-to-End Vectorization with Deep Reinforcement Learning","URL":"https://arxiv.org/pdf/1909.13639","Abstract":{"FirstLine":"One of the key challenges arising when compilers vectorize loops for today's","Rest":"SIMD-compatible architectures is whether to vectorize and/or interleave. Then, the compiler has to determine how many instructions to pack together and how many loop …"}}
{"Title":"Why is Developing Machine Learning Applications Challenging? A Study on Stack Overflow Posts","URL":"https://ieeexplore.ieee.org/abstract/document/8870187/","Abstract":{"FirstLine":"As smart and automated applications pervade our lives, an increasing number of software","Rest":"developers are required to incorporate machine learning (ML) techniques into application development. However, acquiring the ML skill set can be nontrivial …"}}
{"Title":"Towards Robust Direct Perception Networks for Automated Driving","URL":"https://arxiv.org/pdf/1909.13600","Abstract":{"FirstLine":"We consider the problem of engineering robust direct perception neural networks with","Rest":"output being regression. Such networks take high dimensional input image data, and they produce affordances such as the curvature of the upcoming road segment …"}}
{"Title":"Property Invariant Embedding for Automated Reasoning","URL":"https://arxiv.org/pdf/1911.12073","Abstract":{"FirstLine":"Automated reasoning and theorem proving have recently become major challenges for machine","Rest":"learning. In other domains, representations that are able to abstract over unimportant transformations, such as abstraction over translations and rotations in …"}}
{"Title":"Towards neural networks that provably know when they don't know","URL":"https://arxiv.org/pdf/1909.12180","Abstract":{"FirstLine":"It has recently been shown that ReLU networks produce arbitrarily over-confident","Rest":"predictions far away from the training data. Thus, ReLU networks do not know when they don't know. However, this is a highly important property in safety critical …"}}
{"Title":"Sequence Model Design for Code Completion in the Modern IDE","URL":"https://aye.science/aye-icse-2020.pdf","Abstract":{"FirstLine":"Code completion is a tremendously popular tool for coding assistance, implemented across","Rest":"a wide range of programming languages and environments. In An Empirical Investigation of Code Completion Usage by Professional Software Developers …"}}
{"Title":"Coda: An End-to-End Neural Program Decompiler","URL":"http://papers.nips.cc/paper/8628-coda-an-end-to-end-neural-program-decompiler.pdf","Abstract":{"FirstLine":"Reverse engineering of binary executables is a critical problem in the computer security","Rest":"domain. On the one hand, malicious parties may recover interpretable source codes from the software products to gain commercial advantages. On the …"}}
{"Title":"Parallel Iterative Edit Models for Local Sequence Transduction","URL":"https://arxiv.org/pdf/1910.02893","Abstract":{"FirstLine":"We present a Parallel Iterative Edit (PIE) model for the problem of local sequence","Rest":"transduction arising in tasks like Grammatical error correction (GEC). Recent approaches are based on the popular encoder-decoder (ED) model for sequence to …"}}
{"Title":"Graph normalizing flows","URL":"http://papers.nips.cc/paper/9510-graph-normalizing-flows.pdf","Abstract":{"FirstLine":"We introduce graph normalizing flows: a new, reversible graph neural network model for","Rest":"prediction and generation. On supervised tasks, graph normalizing flows perform similarly to message passing neural networks, but at a significantly reduced memory …"}}
{"Title":"Empirical Study of Fault Introduction Focusing on the Similarity among Local Variable Names","URL":"http://ceur-ws.org/Vol-2511/QuASoQ-01.pdf","Abstract":{"FirstLine":"Well-chosen variable names play significant roles in program comprehension and","Rest":"high-quality software development and maintenance. However, even though all variables have easyto-understand names, attention needs to be paid to the similarity …"}}
{"Title":"NutBaaS: A Blockchain-as-a-Service Platform","URL":"https://ieeexplore.ieee.org/iel7/6287639/6514899/08840920.pdf","Abstract":{"FirstLine":"Blockchain, originated from Bitcoin system, has drawn intense attention from the academic","Rest":"community because of its decentralization, persistency, anonymity and auditability. In the past decade, the blockchain technology has evolved and became …"}}
{"Title":"A (CO) ALGEBRAIC APPROACH TO PROGRAMMING AND VERIFYING COMPUTER NETWORKS","URL":"https://smolka.st/papers/phd-thesis.pdf","Abstract":{"FirstLine":"As computer networks have grown into some of the most complex and critical computing","Rest":"systems today, the means of configuring them have not kept up: they remain manual, low-level, and ad-hoc. This makes network operations expensive …"}}
{"Title":"Progressive Processing of System-Behavioral Query","URL":"https://engineering.case.edu/groups/xusheng-xiao/sites/engineering.case.edu.groups.xusheng-xiao/files/docs/acsac19-final143.pdf","Abstract":{"FirstLine":"System monitoring has recently emerged as an effective way to analyze and counter","Rest":"advanced cyber attacks. The monitoring data records a series of system events and provides a global view of system behaviors in an organization. Querying such data to …"}}
{"Title":"Inverse‐QSPR for de novo design: a review","URL":"https://onlinelibrary.wiley.com/doi/abs/10.1002/minf.201900087","Abstract":{"FirstLine":"The use of computer tools to solve chemistry‐related problems–chemoinformatics–has given","Rest":"rise to a large number of publications. Among all chemoinformatics techniques, the use of statistically based approaches for property predictions has …"}}
{"Title":"Semantic Preserving Generative Adversarial Models","URL":"https://arxiv.org/pdf/1910.02804","Abstract":{"FirstLine":"We introduce generative adversarial models in which the discriminator is replaced by a","Rest":"calibrated (non-differentiable) classifier repeatedly enhanced by domain relevant features. The role of the classifier is to prove that the actual and generated data differ …"}}
{"Title":"CLN2INV: Learning Loop Invariants with Continuous Logic Networks","URL":"https://arxiv.org/pdf/1909.11542","Abstract":{"FirstLine":"Program verification offers a framework for ensuring program correctness and therefore","Rest":"systematically eliminating different classes of bugs. Inferring loop invariants is one of the main challenges behind automated verification of real-world programs …"}}
{"Title":"Static Detection of Event-Driven Races in HTML5-Based Mobile Apps","URL":"https://link.springer.com/chapter/10.1007/978-3-030-35092-5_3","Abstract":{"FirstLine":"HTML5-based mobile apps are developed using standard web technologies such as HTML5, CSS,","Rest":"JavaScript, so they may also face with event-based races as web apps. The races in such mobile apps can be caused by various sources of …"}}
{"Title":"A Survey on Research of Code Comment Auto Generation","URL":"https://iopscience.iop.org/article/10.1088/1742-6596/1345/3/032010/pdf","Abstract":{"FirstLine":"A code comment is an explanation of the code. As an important part of software","Rest":"development process, code comment plays an important role in software maintenance, software reuse and other fields. Automatic generation of code …"}}
{"Title":"An Evalutation of Programming Language Models' performance on Software Defect Detection","URL":"https://arxiv.org/pdf/1909.10309","Abstract":{"FirstLine":"This dissertation presents an evaluation of several language models on software defect","Rest":"datasets. A language Model (LM)\" can provide word representation and probability indication of word sequences as the core component of an NLP system.\" …"}}
{"Title":"A Generative Model for Molecular Distance Geometry","URL":"https://arxiv.org/pdf/1909.11459","Abstract":{"FirstLine":"Computing equilibrium states for many-body systems, such as molecules, is a long-standing","Rest":"challenge. In the absence of methods for generating statistically independent samples, great computational effort is invested in simulating these …"}}
{"Title":"Méthodes d'apprentissage statistique pour le criblage virtuel de médicament Machine learning approaches for drug virtual screening","URL":"https://pdfs.semanticscholar.org/0aa6/8f2d263e230434606bb24eb132f636023012.pdf","Abstract":{"FirstLine":"Cystic Fibrosis (CF) is the most common genetic disease among Caucasians, affecting","Rest":"approximately one in 3500 birth [193], and one person in 25 is an asymptomatic heterozygote carrier. It is an autosomal recessive genetic disease …"}}
{"Title":"Four presumed gaps in the software engineering research community's knowledge","URL":"https://arxiv.org/pdf/1911.09971","Abstract":{"FirstLine":"Background: The state of the art in software engineering consists of a myriad of","Rest":"contributions and the gaps between them; it is difficult to characterize. Questions: In order to help understanding the state of the art, can we identify gaps in our …"}}
{"Title":"SoCodeCNN: Program Source Code for Visual CNN Classification Using Computer Vision Methodology","URL":"https://ieeexplore.ieee.org/iel7/6287639/8600701/08882216.pdf","Abstract":{"FirstLine":"Automated feature extraction from program source-code such that proper computing","Rest":"resources could be allocated to the program is very difficult given the current state of technology. Therefore, conventional methods call for skilled human intervention in …"}}
{"Title":"TreeGen: A Tree-Based Transformer Architecture for Code Generation","URL":"https://arxiv.org/pdf/1911.09983","Abstract":{"FirstLine":"A code generation system generates programming language code based on an input natural","Rest":"language description. State-of-the-art approaches rely on neural networks for code generation. However, these code generators suffer from two …"}}
{"Title":"Speech Sentiment Analysis via Pre-trained Features from End-to-end ASR Models","URL":"https://arxiv.org/pdf/1911.09762","Abstract":{"FirstLine":"In this paper, we propose to use pre-trained features from end-to-end ASR models to solve","Rest":"the speech sentiment analysis problem as a down-stream task. We show that end-to-end ASR features, which integrate both acoustic and text information from …"}}
{"Title":"ASTToken2Vec: An Embedding Method for Neural Code Completion","URL":"http://jssst.or.jp/files/user/taikai/2019/GENERAL/general2-2.pdf","Abstract":{"FirstLine":"Code completion systems help programmers to write code more efficiently and to reduce","Rest":"typographical errors by automatically suggesting the code fragment that the programmers likely to write next. This work attempts to increase prediction …"}}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment