期刊文献+

一种基于LDA和静态分析的代码功能识别方法 被引量:3

Code function recognition approach based on LDA and static analysis
下载PDF
导出
摘要 近年来,随着代码复用技术不断成熟和Internet上开源项目不断丰富,软件开发人员的开发行为也逐渐发生了变化。如今,软件开发人员在编程过程中越来越多地依赖于开源软件项目提供的功能。然而,在软件复用活动中,由于开源项目文档的不全面以及代码结构的复杂性,软件开发人员往往只能片面地了解项目的某些功能点,使得复用效率不高。针对开源项目代码丰富而文档较少这一现状,提出了一种基于LDA(Latent Dirichlet Allocation)和静态分析的代码功能识别方法,对传统LDA方法进行了扩展,帮助软件开发人员更全面地了解项目的功能点,从而更好地支持代码复用活动。 In recent years, with the rapid development of code reuse technology and open source projects on Internet, software developers' programming activities are gradually changed. Today, software developers increasingly rely on the functions supplied by open source projects while they're programming. However, due to the lack of documents and the complexity of code structure, the efficiency of software reuse is not high. Software developers usually only learn small parts of project's functions instead of comprehensive understanding. In order to better support the activity of code reuse, a function recognition approach based on LDA and code static analysis technology, which is an extension of traditional LDA, is proposed to help developers better learn the functions of a project.
出处 《计算机工程与应用》 CSCD 2013年第15期27-31,47,共6页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(No.2011CB302604) 国家高技术研究发展计划(863)(No.2012AA011202) 国家自然科学基金(No.60931160444 No.61103024) 质检公益性行业科研专项(No.201210256) 广东省省部产学研结合项目(No.2010A090200031)
关键词 软件复用 代码 隐含狄利克雷分配(LDA) 静态分析 功能识别 software reuse source code Latent Dirichlet Allocation(LDA) static analysis function recognition
  • 相关文献

参考文献11

  • 1杨芙清,梅宏,李克勤.软件复用与软件构件技术[J].电子学报,1999,27(2):68-75. 被引量:513
  • 2Kuhn A, Ducasse S, Girba T.Semantic Clustering: identifying topics in source code[J].Information and Software Technology, 2007,49.
  • 3Kawaguchi S, Garg P K,Matsushita M,et al.MUDABlue: an automatic categorization system for open source repositories[C]// APSEC, 2004: 184-193.
  • 4Phan X, Nguyen L, Horiguchi S.Learning to classify short and sparse text & web with hidden topics from large-scale data collections[C]//Proceedings of 2008 WWW Conference, 2008 : 91-100.
  • 5Zavitsanos E,Paliouras G,Vouros G A.Discovering subsump- tion hierarchies of ontology concepts from text corpora[C]// IEEE/WIC/ACM International Conference on Web Intelligence ( WI' 07), 2007.
  • 6Zavitsanos E,Petridis S,Paliouras G,et al.Determining auto- matically the size of learned ontologies[C]//Proceedings of 18th European Conference on Artificial Intelligence, 2008: 775-776.
  • 7Baldi P F, Lopes C V, Linstead E J, et al.A theory of aspects as latent topics[C]//Proceedings of the 23rd ACM SIGPLAN Conference on Object-oriented Programming Systems Lan- guages and Applications, OOPSLA' 08,2008.
  • 8Maskeri G, Sarkar S,Heafield K.Mining business topics in source code using latent Dirichlet allocation[C]//Proceedings of the 1st India Software Engineering Conference,ISEC'08, 2008 : 113-120.
  • 9Griffiths T L, Steyvers M.Finding scientific topics[J].PNAS, 2004,101:5228-5235.
  • 10Heinrich G.Parameter estimation for text analysis[R/OL].2005. http ://www.arbylon.net/publications/text-est.pdf.

二级参考文献3

共引文献512

同被引文献51

  • 1Bettenburg N, Shang W, Ibrahim W, et al. An empirical study on inconsistent changes to code clones at release level [C] //Proc of the 16th Working Conference on Reverse Engi- neering. IEEE Press, 2009: 85-94.
  • 2Zibran M F, Roy C K. The road to software clone manage- ment: A survey [R]. Technical Report, The University of Saskatchewan, 2012: 1-66.
  • 3Saha R K, Asduzzaman M, Zibran M F, et al. Evaluating code clone genealogies at release level: An empirical study [C] //Proceedings of the 10th IEEE Working Conference on Source Code Analysis and Manipulation. Washington DC: IEEE Computer Society, 2010: 87-96.
  • 4Bakota T, Ferenc R, Gyimothy T. Clone smells in software evolution [C] //IEEE International Conference on Software Maintenance. Washington DC: IEEE Computer Society, 2007 : 24-33.
  • 5Saha R K, Roy C K, Schneider K A. An automatic framework for extracting and classifying near-miss clone genealogies [C] //27th IEEE International Conference on Software Main- tenance, ZO11 29-302.
  • 6Barbour L, Khomh F, Zou Y. Late propagation in software clones [C] //Proceedings of the 27th IEEE International Con- ference on Software Maintenance. Washington DC: IEEE Computer Society, 2011: 273-282.
  • 7Gode N, Koschke R. Incremental clone detection [C] //Pro- ceedings of the European Conference on Software Maintenance and Reengineering. Washington DC: IEEE Computer Society, 2009 : 219-228.
  • 8Duala-Ekoko E, Robillard M P. Tracking code clones in evol- ving software [C] //Proceedings of the 29th International Conference on Software Engineering. Washington DC: IEEE Computer Society, 2007 .. 158-167.
  • 9Grant S, Cordy J. Estimating the optimal number of latent con- cepts in source code analysis [C] //10th IEEE Working Conference on Source Code Analysis and Manipulation, 2010: 65-74.
  • 10Lukins S, Kraft N, Etzkorn L. Bug localization using latent Diriehlet allocation [J]. Information and Software Technolo- gy, 2010, 52 (9): 972-990.

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部