期刊文献+

软件源码上的数据挖掘应用综述 被引量:1

Survey on applications of software source code mining
下载PDF
导出
摘要 数据挖掘技术可以从大量的数据中发现某些有价值的知识。而将软件源码作为一种特殊的数据,在其上应用数据挖掘技术进行源码层次上的信息挖掘,已成为一个新颖而重要的课题。将对软件源码上的数据挖掘技术从各领域的应用、数据挖掘方法以及当前发展水平等主要方面展开介绍,并详细剖析当前此领域的制约因素,提出未来此领域的发展方向。 Data mining technology can find some valuable knowledge from large amounts of data. The software source code as a special kind of data is being mined by data mining technology in code level, which is a new and important topic. The authors introduced its applications in some fields, the data mining technology, and the current level of development, and then analyzed current restriction of the field. Finally, several directions on software source code mining application were concluded.
出处 《计算机应用》 CSCD 北大核心 2009年第9期2494-2498,2515,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(60873213) 国家863计划项目(2007AA01Z414) 北京市自然科学基金资助项目(4082018)
关键词 软件源码 数据挖掘 信息挖掘 源码挖掘 software source code data mining information mining source code mining
  • 相关文献

参考文献34

  • 1ENGLER D, CHEN D Y, HALLEM S, et al. Bugs as deviant behavior: A general approach to inferring errors in systems code [ J]. ACM SIGOPS Operating Systems Review, 2001, 35(5) : 57 -72.
  • 2LI ZHEN-MIN, ZHOU YUAN-YUAN. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code [ J]. ACM SIGSOFT Software Engineering Notes, 2005, 30(5): 306-315.
  • 3TAN LIN, ZHANG XIAO-LAN, MA XIAO, et al. AutolSES: Automatically inferring security specification and detecting violations [ C]// Proceedings of the 17th Conference on Security Symposium. Berkeley, CA: USENIX Association, 2008:379-394.
  • 4LI ZHEN-MIN, LU SHAN, MYAGMAR S, et al. CP-Miner: A tool for finding copy-paste and related bugs in operating system code [ C]//Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation. Berkeley, CA: USENIX Association, 2004:20-20.
  • 5LINDIG C. Mining patterns and violations using concept analysis [ R]. Saarbrticken, Germany: Saarland University, 2007.
  • 6TAN LIN, YUAN DING, KRISHNA G, et al. / * iComment: Bugs or bad comments? */ [ C]// SOSP'07: Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles. New York: ACM Press, 2007:145 - 158.
  • 7GANAPATHY V, KING D, JAEGER T, et al. Mining security-sensitive operations in legacy code using concept analysis [ C]// Proceedings of the 29th International Conference on Software Engineering. Washington, DC: IEEE Computer Society, 2007:458-467.
  • 8MARTIN E, XIE TAO. Understanding software application interfaces via string analysis [ C]//Proceedings of the 28th International Conference on Software Engineering. New York: ACM .Press, 2006:901-904.
  • 9WASYLKOWSKI A, ZELLER A, LINDIG C. Detecting object usage anomalies [ C]//Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York: ACM Press, 2007:35-44.
  • 10SHOHAM S, YAHAV E, FINK S, et al. Static specification mining using automata-based abstractions [ C]// Proceedings of the 2007 International Symposium on Software Testing and Analysis. New York: ACM Press, 2007:174 - 184.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部