نتایج جستجو برای: API approach
تعداد نتایج: 1301849 فیلتر نتایج به سال:
background : cockroaches mechanically spread pathogenic agents, however, little is known about their gut microbiota. identification of midgut microbial community helps targeting novel biological control strategies such as paratransgenesis. here the bacterial microbiota of periplaneta americana midgut, were identified and evaluated for finding proper paratransgenesis candidate. methods : midgut ...
Learning and remembering to use APIs are difficult. Several techniques have been proposed assist developers in using APIs. Most existing focus on recommending the right API methods call, but very few arguments. In this paper, we propose ARist, a novel automated argument recommendation approach which suggests arguments by predicting developers’ expectations when they define methods. To implement...
As the use of Application Programming Interfaces (APIs) is increasingly growing, their evolution becomes more challenging in terms service provided according to consumers’ needs. In this paper, we address role needs WAPIs and introduce a process mining pattern-based method support providers by analyzing understanding behavior, imprinted WAPI usage logs. We take position that WAPIs’ should be ma...
Empirical evidence indicates that developers face significant hurdles when the API elements necessary to implement a task are not accessible from the types they are working with. We propose an approach that leverages the structural relationships between API elements to make API methods or types not accessible from a given API type more discoverable. We implemented our approach as an extension t...
API level vulnerabilities of hardware security modules represent a serious threat, thus, discovering and patching security holes in APIs are important. In this paper, we argue and illustrate that the application of formal verification methods is a promising approach for API analysis. In particular, we propose an API verification method based on process algebra. The proposed method seems to be e...
Nowadays, software is widely applied to increase accuracy, efficiency, and convenience in various areas in our life. So, it is essential to use software in our recent computing environments. Despite of the valuable applications of software, malicious behaviors caused by vulnerability of software threaten our secure computing environments. So, it is important to identify and detect malicious beh...
With the growing size of Application Programming Interfaces (APIs), both API usability and API learning become more challenging. API learning resources are often crucial for helping developers learn an API, but they are distributed across different documents, which makes finding the necessary information more challenging. This work focuses on discovering relevant sections of tutorials for a giv...
API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of m...
Software systems often undergo significant changes in their life cycle, exposing increasingly complex API to their developers. Without methodical guidances, it is easy to become bogged down in a morass of complex API even for the professional software developers. This paper presents the Flow-Augmented Call Graph (FACG) for taming API complexity. Augmenting the call graph with control flow analy...
Most applications need to invoke some Application Programming Interfaces (APIs), e.g. JDK (Java Development Kit) API. When invoking those APIs, applications must follow some API constraints. Violation of these constraints will lead to some severe program defects. To detect this kind of defects, lots of static and dynamic approaches are explored, using formally described API constraints. While m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید