Linkage of Similar Code Snippets Assessed in the Micro Benchmark Service jsPerf

Author(s):  
Kazuya Saiki ◽  
Akinori Ihara
Keyword(s):  
2021 ◽  
Vol 26 (6) ◽  
Author(s):  
Pooja Rani ◽  
Sebastiano Panichella ◽  
Manuel Leuenberger ◽  
Mohammad Ghafari ◽  
Oscar Nierstrasz

Abstract Context Previous studies have characterized code comments in various programming languages, showing how high quality of code comments is crucial to support program comprehension activities, and to improve the effectiveness of maintenance tasks. However, very few studies have focused on understanding developer practices to write comments. None of them has compared such developer practices to the standard comment guidelines to study the extent to which developers follow the guidelines. Objective Therefore, our goal is to investigate developer commenting practices and compare them to the comment guidelines. Method This paper reports the first empirical study investigating commenting practices in Pharo Smalltalk. First, we analyze class comment evolution over seven Pharo versions. Then, we quantitatively and qualitatively investigate the information types embedded in class comments. Finally, we study the adherence of developer commenting practices to the official class comment template over Pharo versions. Results Our results show that there is a rapid increase in class comments in the initial three Pharo versions, while in subsequent versions developers added comments to both new and old classes, thus maintaining a similar code to comment ratio. We furthermore found three times as many information types in class comments as those suggested by the template. However, the information types suggested by the template tend to be present more often than other types of information. Additionally, we find that a substantial proportion of comments follow the writing style of the template in writing these information types, but they are written and formatted in a non-uniform way. Conclusion The results suggest the need to standardize the commenting guidelines for formatting the text, and to provide headers for the different information types to ensure a consistent style and to identify the information easily. Given the importance of high-quality code comments, we draw numerous implications for developers and researchers to improve the support for comment quality assessment tools.


2014 ◽  
Vol 3 (2) ◽  
pp. 143-152 ◽  
Author(s):  
Naresh Babu Bynagari

This article seeks to foray into the nitty-gritty of integrated reasoning for code clone detection and how it is effectively carried out, given the amount of analytics usually associated with such activities. Detection of codes requires high-pitch familiarity with cloning systems and their workings. Hence, discovering similar code segments that are often regarded and seen as code imitations (clone) is not an easy responsibility. More especially, this very detection process might possess key purposes in the context of susceptibility findings, refactoring, and imitation detecting. Through the voyage of discovery this article intends to expose you to, you will realize that identical code segments, more often than not described as code clones, appear to be a serious duty, especially for large code bases <1; 2; 3; 4>. There are certain approaches and deep technicalities that this sort of detection is known for. Still, from the avalanche of resources that formed the bedrock of this article, one would discover the easiest formula to adopt in maneuvering such strenuous issues.


2020 ◽  
Vol 24 (3) ◽  
pp. 569-588
Author(s):  
Viktoriya L. Zavyalova

One key aspect of Englishes in the Kachruvian Expanding Circle concerns phonetic features as they commonly bear traits of speakers native languages. This article explores language contact phenomena that are likely to cause L1L2 phonological transfer, which underlies the phonetic specificity of English in East Asia. Drawing on the general theory of loan phonology, the author treats phonographic adaptation of English loanwords in East Asian languages compared to Russian, as a reliable source of data that supports research on the nature of phonetic variation in Chinese, Korean, Japanese, and Russian Englishes. The data were obtained through comparative analysis of English loanwords (200 for each language) selected from dictionary sources and speech samples from the Russian-Asian Corpus of English which was collected in earlier research. The findings confirm typological correlation of phonological transfer in loanword phonographic adaptation and in foreign language phonology. In both linguistic contexts, a crucial role is played by syllabic constraints, because being the fundamental unit of any phonological system, a syllable serves a domain of its segmental and suprasegmental features. Consequently, various resyllabification phenomena occur in English borrowings in the languages of East Asia whose phonological typology is distant from that of English; as a demonstration of this same conflict, the syllabic and, hence, rhythmic organization of East Asian Englishes tends to exhibit similar code-copying variation. The greater typological proximity of English and Russian syllable regulations leads to fewer manifestations of syllabic and rhythmic restructuring in both loanword adaptations and English spoken by native speakers of Russian.


Author(s):  
Xu Duan ◽  
Jingzheng Wu ◽  
Shouling Ji ◽  
Zhiqing Rui ◽  
Tianyue Luo ◽  
...  

With the explosive development of information technology, vulnerabilities have become one of the major threats to computer security. Most vulnerabilities with similar patterns can be detected effectively by static analysis methods. However, some vulnerable and non-vulnerable code is hardly distinguishable, resulting in low detection accuracy. In this paper, we define the accurate identification of vulnerabilities in similar code as a fine-grained vulnerability detection problem. We propose VulSniper which is designed to detect fine-grained vulnerabilities more effectively. In VulSniper, attention mechanism is used to capture the critical features of the vulnerabilities. Especially, we use bottom-up and top-down structures to learn the attention weights of different areas of the program. Moreover, in order to fully extract the semantic features of the program, we generate the code property graph, design a 144-dimensional vector to describe the relation between the nodes, and finally encode the program as a feature tensor. VulSniper achieves F1-scores of 80.6% and 73.3% on the two benchmark datasets, the SARD Buffer Error dataset and the SARD Resource Management Error dataset respectively, which are significantly higher than those of the state-of-the-art methods.


Author(s):  
Muniraju J

The target of this undertaking is to examine and comprehend the impact of utilizing retrofitting strategies on a structure against the seismic unique burden. The investigation is completed on four models of a G+4 building. Model 1 was not exposed to any seismic burden and was discovered to be protected against the arrangement load and live burden and its blend. Model 2 was exposed to dynamic seismic burden and its mix and the disappointment of primary individuals was noted. Accordingly retrofitting was done in the following two models. In Model 3 the structure was retrofitted with bracings were as in Model 4 section jacketing and in Model 5 shear divider were utilized. Boundaries like removal, time history, firmness and base shear were chosen subsequent to leading a careful writing audit. Time-frame of the structure was ascertain according to IS1893-2016, and Zone factor was chosen as 0.1 and 0.16 alongside significance factor as 1 and Soil type as II from a similar code. Then, at that point the same static examination and reaction range investigation was completed on Models 2,3,4 and 5 individually and there results were arranged. In light of the outcomes acquired for the given boundaries and dynamic stacking condition it was reasoned that retrofitting the structure will in general decrease the impacts of dynamic stacking on the design. Further it was noticed that retrofitting the structure with shear divider gave the best suitable outcomes. As it diminished the time-frame of the structure by 32.72% and furthermore lessen the sidelong relocation and story float in both X and Y heading by a decent edge.


Sign in / Sign up

Export Citation Format

Share Document