期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
一种简便实用的数字化仪采数程序
1
作者 张树贵 《地质灾害与环境保护》 1995年第2期60-64,共5页
一种简便实用的数字化仪采数程序张树贵(成都理工学院工程地质与建筑工程系,成都610059)在许多科研领域,人们常常需要对图形进行数字化,然后再进行计算机处理。过去传统的方法是利用座标纸人工读取数据,即读取图形的x,Y... 一种简便实用的数字化仪采数程序张树贵(成都理工学院工程地质与建筑工程系,成都610059)在许多科研领域,人们常常需要对图形进行数字化,然后再进行计算机处理。过去传统的方法是利用座标纸人工读取数据,即读取图形的x,Y座标,这种方法不仅费时、容易出错,... 展开更多
关键词 字化仪 采数程序 图形输入板
下载PDF
An oversampling approach for mining program specifications
2
作者 Deng CHEN Yan-duo ZHANG +5 位作者 Wei WEI Rong-cun WANG Xiao-lin LI Wei LIU Shi-xun WANG Rui ZHU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第6期737-754,共18页
Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data(object usage scena... Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data(object usage scenarios). Existing approaches resolve the problem by analyzing more programs, which may cause significant runtime overhead. In this paper, we propose an inheritance-based oversampling approach for object usage scenarios(OUSs). Our technique is based on the inheritance relationship in object-oriented programs. Given an object-oriented program p, generally, the OUSs that can be collected from a run of p are not more than the objects used during the run. With our technique, a maximum of n times more OUSs can be achieved, where n is the average number of super-classes of all general OUSs. To investigate the effect of our technique, we implement it in our previous prototype tool, ISpec Miner, and use the tool to mine protocols from several real-world programs. Experimental results show that our technique can collect 1.95 times more OUSs than general approaches. Additionally, accurate and complete API protocols are more likely to be achieved. Furthermore, our technique can mine API protocols for classes never even used in programs, which are valuable for validating software architectures, program documentation, and understanding. Although our technique will introduce some runtime overhead, it is trivial and acceptable. 展开更多
关键词 Object usage scenario API protocol mining Program temporal specification mining OVERSAMPLING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部