期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
THE Z SPECIFICATION DEPENDENCE GRAPH
1
作者 WuFangjun YiTong 《Journal of Electronics(China)》 2005年第2期201-204,共4页
The lack of existing solutions makes it really hard to understand formal specification languages since the application domain for representations is useful for the purpose of carrying out certain software engineering ... The lack of existing solutions makes it really hard to understand formal specification languages since the application domain for representations is useful for the purpose of carrying out certain software engineering operations such as slicing and the computation of program metrics.A Z specification dependence graph is presented in this letter. It draws on the strengths of a range of earlier works and adapts them, if necessary, to the Z language. 展开更多
关键词 Program dependence graph(PDG) System dependence graph(SDG) Formal specification language
下载PDF
System Dependence Graph Construction for Aspect Oriented C++
2
作者 SHI Liang XU Baowen 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期555-560,共6页
This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach de... This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach decomposes aspect-oriented programs into three parts: component codes, aspect codes, and weaving codes. It constructs program dependence graphs (PDGs) for each part, and then connects the PDGs at call sites to form the complete AspectSDG. The AspectSDG can deal with advice precedence correctly, and represent the additional dependences caused by aspect codes. Based on this model, we introduce how to compute a static slice of an AspectC+ + program. 展开更多
关键词 program analysis system dependence graph ASPECT-ORIENTED slicing
下载PDF
Slicing Java Generic Programs Using Generic System Dependence Graph
3
作者 CHEN Lin1,2,XU Baowen1,2 1.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,Jiangsu China 2.Department of Computer Science and Technology,Nanjing University,Nanjing 210093,Jiangsu China 《Wuhan University Journal of Natural Sciences》 CAS 2009年第4期304-308,共5页
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for ... The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for Java generic programs based on the traditional system dependence graph to express dependences for parameterized type information. A novel slicing criterion and slicing algorithm for generic programs is proposed. The slices computed by the algorithm can help to understand relations between concepts and types for generic programs and can express the features of generic programs better. 展开更多
关键词 SLICING system dependence graph GENERICS program analysis
原文传递
Dependence Analysis Based on Dynamic Slicing for Debugging 被引量:2
4
作者 Chen Zhen qiang 1, Xu Bao wen 1,2 1 Department of Computer Science & Engineering, Southeast University, Nanjing 210096, China 2 State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期398-404,共7页
Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts of a program when debugging. Given a slicing criterion, the dynamic slice contains only those statements that actually a... Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts of a program when debugging. Given a slicing criterion, the dynamic slice contains only those statements that actually affect the variables in the slicing criterion. This paper proposes a dynamic slicing method based on static dependence analysis. It uses the program dependence graph and other static information to reduce the information needed to be traced during program execution. Thus, the efficiency is dramatically improved while the precision is not depressed. The slicing criterion is modified to fit for debugging. It consists of file name and the line number at which the statement is. 展开更多
关键词 program slice slicing criterion program dependence graph
下载PDF
NGDcrm:a numeric graph dependency-based conflict resolution method for knowledge graph 被引量:1
5
作者 Ma Jiangtao Wang Yanjun +1 位作者 Chen Xueting Qiao Yaqiong 《High Technology Letters》 EI CAS 2021年第2期153-162,共10页
Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of KG.Aiming at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a... Knowledge graph(KG)conflict resolution is to solve knowledge conflicts problem in the construction of KG.Aiming at the problem of KG conflict resolution,a KG conflict resolution algorithm NGDcrm is proposed,which is a numeric graph dependency-based conflict resolution method.NGDcrm utilizes the dependency graph to perform arithmetic calculation and predicate comparison of numerical entity knowledge in the KG.NGDcrm first uses a parallel segmentation method to segment the KG;then,it extracts the features of the KG according to KG embedding;finally,it uses numerical graph dependencies to detect and correct the wrong facts in the KG based on the extracted features.The experimental results on real data show that NGDcrm is better than the state-of-the-art knowledge conflict resolution method.Among them,the AUC value of NGDcrm on the DBpedia dataset is 15.4%higher than the state-of-the-art method. 展开更多
关键词 dependency graph knowledge conflict resolution knowledge graph(KG) numeric graph dependency(NGD)
下载PDF
TDLens:Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
6
作者 Rui Mei Hanbing Yan +2 位作者 Qinqin Wang Zhihui Han Zhuohang Lyu 《China Communications》 SCIE CSCD 2022年第10期102-115,共14页
To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in ne... To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in network traffic.Several studies have begun to focus on threat detection methods based on provenance data of host-level event tracing.On the other side,with the significant development of big data and artificial intelligence technologies,large-scale graph computing has been widely used.To this end,kinds of research try to bridge the gap between threat detection based on host log provenance data and graph algorithm,and propose the threat detection algorithm based on system provenance graph.These approaches usually generate the system provenance graph via tagging and tracking of system events,and then leverage the characteristics of the graph to conduct threat detection and attack investigation.For the purpose of deeply understanding the correctness,effectiveness,and efficiency of different graph-based threat detection algorithms,we pay attention to mainstream threat detection methods based on provenance graphs.We select and implement 5 state-of-the-art threat detection approaches among a large number of studies as evaluation objects for further analysis.To this end,we collect about 40GB of host-level raw log data in a real-world IT environment,and simulate 6 types of cyber attack scenarios in an isolated environment for malicious provenance data to build our evaluation datasets.The crosswise comparison and longitudinal assessment interpret in detail these detection approaches can detect which attack scenarios well and why.Our empirical evaluation provides a solid foundation for the improvement direction of the threat detection approach. 展开更多
关键词 cyber threat detection causality dependency graph data provenance
下载PDF
Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency
7
作者 Qiuyun Lyu Chenhao Ma +3 位作者 Yanzhao Shen Shaopeng Jiao Yipeng Sun Liqin Hu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1625-1647,共23页
Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more t... Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG. 展开更多
关键词 Smart contract vulnerability smart contract homogeneity contract dependency graph automated analysis
下载PDF
Qualia Role-Based Quantity Relation Extraction for Solving Algebra Story Problems
8
作者 Bin He Hao Meng +2 位作者 Zhejin Zhang Rui Liu Ting Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期403-419,共17页
A qualia role-based entity-dependency graph(EDG)is proposed to represent and extract quantity relations for solving algebra story problems stated in Chinese.Traditional neural solvers use end-to-end models to translat... A qualia role-based entity-dependency graph(EDG)is proposed to represent and extract quantity relations for solving algebra story problems stated in Chinese.Traditional neural solvers use end-to-end models to translate problem texts into math expressions,which lack quantity relation acquisition in sophisticated scenarios.To address the problem,the proposed method leverages EDG to represent quantity relations hidden in qualia roles of math objects.Algorithms were designed for EDG generation and quantity relation extraction for solving algebra story problems.Experimental result shows that the proposedmethod achieved an average accuracy of 82.2%on quantity relation extraction compared to 74.5%of baseline method.Another prompt learning result shows a 5%increase obtained in problem solving by injecting the extracted quantity relations into the baseline neural solvers. 展开更多
关键词 Quantity relation extraction algebra story problem solving qualia role entity dependency graph
下载PDF
Dynamic Slicing of Object Oriented Programs
9
作者 Jian\|jun Zhao Department of Computer Science and Engineering, Fukuoka Institute of Technology, Fukuoka 811 0295, Japan 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期391-397,共7页
Program slice has many applications such as program debugging, testing, maintenance, and complexity measurement. A static slice consists of all statements in program P that may effect the value of variable v a... Program slice has many applications such as program debugging, testing, maintenance, and complexity measurement. A static slice consists of all statements in program P that may effect the value of variable v at some point p , and a dynamic slice consists only of statements that influence the value of variable occurrence for specific program inputs. In this paper, we concern the problem of dynamic slicing of object oriented programs which, to our knowledge, has not been addressed in the literatures. To solve this problem, we present the dynamic object oriented dependence graph (DODG)which is an arc classified digraph to explicitly represent various dynamic dependence between statement instances for a particular execution of an object oriented program. Based on the DODG, we present a two phase backward algorithm for computing a dynamic slice of an object oriented program. 展开更多
关键词 program slicing dynamic dependence graph object oriented program SOFTWARE maintenance DEBUGGING testing
下载PDF
Structural Indexing for 3D Solid Digital Library 被引量:1
10
作者 Han Shui\|hua, Lu Zheng\|ding, Chen Chuan\|bo Department of Computer Engineering, Huazhong University of Science and Teclonogy, Wuhan 430074,Chian 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期438-442,共5页
In a very large digital library that support computer aided collaborative design, an indexing process is crucial whenever the retrieval process has to select among many possible designs. In this paper, we address the... In a very large digital library that support computer aided collaborative design, an indexing process is crucial whenever the retrieval process has to select among many possible designs. In this paper, we address the problem of retrieving important design and engineering information by structural indexing. A design is represented by a model dependency graph, therefor, the indexing problem is to determine whether a graph is present or absent in a database of model dependency graphs. we present a novel graph indexing method using polynomial characterization of a model dependency graph and on hashing. Such an approach is able to create an high efficient 3D solid digital library for retrieving and extracting solid geometric model and engineering information. 展开更多
关键词 digital library computer aided design model dependency graphs HASHING INDEXING
下载PDF
Compiler IR-Based Program Encoding Method for Software Defect Prediction
11
作者 Yong Chen Chao Xu +2 位作者 Jing Selena He Sheng Xiao Fanfan Shen 《Computers, Materials & Continua》 SCIE EI 2022年第9期5251-5272,共22页
With the continuous expansion of software applications,people’s requirements for software quality are increasing.Software defect prediction is an important technology to improve software quality.It often encodes the ... With the continuous expansion of software applications,people’s requirements for software quality are increasing.Software defect prediction is an important technology to improve software quality.It often encodes the software into several features and applies the machine learning method to build defect prediction classifiers,which can estimate the software areas is clean or buggy.However,the current encoding methods are mainly based on the traditional manual features or the AST of source code.Traditional manual features are difficult to reflect the deep semantics of programs,and there is a lot of noise information in AST,which affects the expression of semantic features.To overcome the above deficiencies,we combined with the Convolutional Neural Networks(CNN)and proposed a novel compiler Intermediate Representation(IR)based program encoding method for software defect prediction(CIR-CNN).Specifically,our program encoding method is based on the compiler IR,which can eliminate a large amount of noise information in the syntax structure of the source code and facilitate the acquisition of more accurate semantic information.Secondly,with the help of data flow analysis,a Data Dependency Graph(DDG)is constructed on the compiler IR,which helps to capture the deeper semantic information of the program.Finally,we use the widely used CNN model to build a software defect prediction model,which can increase the adaptive ability of the method.To evaluate the performance of the CIR-CNN,we use seven projects from PROMISE datasets to set up comparative experiments.The experiments results show that,in WPDP,with our CIR-CNN method,the prediction accuracy was improved by 12%for the AST-encoded CNN-based model and by 20.9%for the traditional features-based LR model,respectively.And in CPDP,the AST-encoded DBNbased model was improved by 9.1%and the traditional features-based TCA+model by 19.2%,respectively. 展开更多
关键词 Compiler IR CNN data dependency graph defect prediction
下载PDF
A PARALLELIZATION METHOD FOR DO-LOOP BASED ON EQUIVALENCE CLASSIFICIATION
12
作者 JIAN LIU XIAOMEI ZHU +1 位作者 WEI XIE GUOQIANG PENG (Dept. of Computer Science, Huazhong Lniv. of Sci. & Tech. Wruhan 430074, P.R. of China) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期397-402,共6页
In this paper, a new method for DO-loop parallelization based on the new collcept allocation-dependence and equivalence classification of iteration space is proposed. This method has many advantages: It is a general,... In this paper, a new method for DO-loop parallelization based on the new collcept allocation-dependence and equivalence classification of iteration space is proposed. This method has many advantages: It is a general,ullified method for DO-loop parallelization. It is used in coarse grain parallel partitioning on MINID and SPMD. While partitioning iteration space, it also does the does the partition and computation partition such that these partitions are independent each other. It can extract the potential parallelism of program accurately. Combining with task-level parallelization vectorization and pipeline,it can extract parallelism thoroughly. 展开更多
关键词 Allocation-dependence Equivalence classification of iteration space dependence link point dependence link graph.
下载PDF
Automatic Circuit Extractor for HDL Description Using Program Slicing 被引量:1
13
作者 TunLi YangGuo Si-KunLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第5期718-728,共11页
Design extraction and reduction have been extensively used in modern VLSI design process. The extracted and reduced design can be efficiently processed by various applications, such as formal verification, simulation,... Design extraction and reduction have been extensively used in modern VLSI design process. The extracted and reduced design can be efficiently processed by various applications, such as formal verification, simulation, automatic test pattern generation (ATPG), etc. This paper presents a new circuit extraction method using program slicing technique, and develops an elegant theoretical basis based on program slicing for circuit extraction from Verilog description. The technique can obtain a chaining slice for given signals of interest. Compared with related researches, the main advantages of the method include that it is fine grain, it has no hardware description language (HDL) coding style limitation; it is precise and is capable of dealing with various Verilog constructions. The technique has been integrated with a commercial simulation environment and incorporated into a design process. The results of practical designs show the significant benefits of the approach. 展开更多
关键词 program slicing chaining slice process dependence graph circuit extraction VLSI functional verification
原文传递
Source Code Prioritization Using Forward Slicing for Exposing Critical Elements in a Program 被引量:1
14
作者 Mitrabinda Ray Kanhaiya lal Kumawat Durga Prasad Mohapatra 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第2期314-327,共14页
Even after thorough testing, a few bugs still remain in a program with moderate complexity. These residual bugs are randomly distributed throughout the code. We have noticed that bugs in some parts of a program cause ... Even after thorough testing, a few bugs still remain in a program with moderate complexity. These residual bugs are randomly distributed throughout the code. We have noticed that bugs in some parts of a program cause frequent and severe failures compared to those in other parts. Then, it is necessary to take a decision about what to test more and what to test less within the testing budget. It is possible to prioritize the methods and classes of an object-oriented program according to their potential to cause failures. For this, we propose a program metric called influence metric to find the influence of a program element on the source code. First, we represent the source code into an intermediate graph called extended system dependence graph. Then, forward slicing is applied on a node of the graph to get the influence of that node. The influence metric for a method m in a program shows the number of statements of the program which directly or indirectly use the result produced by method m. We compute the influence metric for a class c based on the influence metric of all its methods. As influence metric is computed statically, it does not show the expected behavior of a class at run time. It is already known that faults in highly executed parts tend to more failures. Therefore, we have considered operational profile to find the average execution time of a class in a system. Then, classes are prioritized in the source code based on influence metric and average execution time. The priority of an element indicates the potential of the element to cause failures. Once all program elements have been prioritized, the testing effort can be apportioned so that the elements causing frequent failures will be tested thoroughly. We have conducted experiments for two well-known case studies -- Library Management System and Trading Automation System -- and successfully identified critical elements in the source code of each case study. We have also conducted experiments to compare our scheme with a related scheme. The experimental studies justify that our approach is more accurate than the existing ones in exposing critical elements at the implementation level. 展开更多
关键词 program slice extended system dependence graph influence of a class test priority
原文传递
Detection of semantically similar code 被引量:1
15
作者 Tiantian WANG Kechao WANG +1 位作者 Xiaohong SU Peijun MA 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第6期996-1011,共16页
The traditional similar code detection approaches are limited in detecting semantically similar codes, impeding their applications in practice. In this paper, we have improved the traditional metrics-based approach as... The traditional similar code detection approaches are limited in detecting semantically similar codes, impeding their applications in practice. In this paper, we have improved the traditional metrics-based approach as well as the graph- based approach and presented a metrics-based and graph- based combined approach. First, source codes are represented as augmented system dependence graphs. Then, metrics- based candidate similar code extraction is performed to filter out most of the dissimilar code pairs so as to lower the computational complexity. After that, code normalization is performed on the candidate similar codes to remove code variations so as to detect similar code at the semantic level. Finally, program matching is performed on the normalized control dependence trees to output semantically similar codes. Experiment results show that our approach can detect similar codes with code variations, and it can be applied to large software. 展开更多
关键词 similar code detection system dependence graph code normalization semantically equivalent
原文传递
Solving Topological and Geometrical Constraints in Bridge Feature Model
16
作者 彭卫兵 宋亮亮 潘国帅 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第S1期228-233,共6页
The capacity that computer can solve more complex design problem was gradually increased. Bridge designs need a breakthrough in the current development limitations, and then become more intelligent and integrated. Thi... The capacity that computer can solve more complex design problem was gradually increased. Bridge designs need a breakthrough in the current development limitations, and then become more intelligent and integrated. This paper proposes a new parametric and feature-based computer aided design (CAD) models which can represent families of bridge objects, includes knowledge representation, three-dimensional geometric topology relationships. The realization of a family member is found by solving first the geometric constraints, and then the topological constraints. From the geometric solution, constraint equations are constructed. Topology solution is developed by feature dependencies graph between bridge objects. Finally, feature parameters are proposed to drive bridge design with feature parameters. Results from our implementation show that the method can help to facilitate bridge design. 展开更多
关键词 bridge intelligent design feature mapping feature dependence graph constraint equations
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部