Skip to main content

Showing 1–6 of 6 results for author: Gomes, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.17417  [pdf, other

    cs.SE

    How do annotations affect Java code readability?

    Authors: Eduardo Guerra, Everaldo Gomes, Jeferson Ferreira, Igor Wiese, Phyllipe Lima, Marco Gerosa, Paulo Meirelles

    Abstract: Context: Code annotations have gained widespread popularity in programming languages, offering developers the ability to attach metadata to code elements to define custom behaviors. Many modern frameworks and APIs use annotations to keep integration less verbose and located nearer to the corresponding code element. Despite these advantages, practitioners' anecdotal evidence suggests that annotatio… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

    Comments: Accepted to Empirical Software Engineering (EMSE) Journal

  2. arXiv:2302.09852  [pdf, other

    cs.CL cs.AI

    Unsupervised Layer-wise Score Aggregation for Textual OOD Detection

    Authors: Maxime Darrin, Guillaume Staerman, Eduardo Dadalto Câmara Gomes, Jackie CK Cheung, Pablo Piantanida, Pierre Colombo

    Abstract: Out-of-distribution (OOD) detection is a rapidly growing field due to new robustness and security requirements driven by an increased number of AI-based systems. Existing OOD textual detectors often rely on an anomaly score (e.g., Mahalanobis distance) computed on the embedding output of the last layer of the encoder. In this work, we observe that OOD detection performance varies greatly depending… ▽ More

    Submitted 21 February, 2024; v1 submitted 20 February, 2023; originally announced February 2023.

  3. arXiv:2211.13527  [pdf, other

    cs.CL

    Beyond Mahalanobis-Based Scores for Textual OOD Detection

    Authors: Pierre Colombo, Eduardo D. C. Gomes, Guillaume Staerman, Nathan Noiry, Pablo Piantanida

    Abstract: Deep learning methods have boosted the adoption of NLP systems in real-life applications. However, they turn out to be vulnerable to distribution shifts over time which may cause severe dysfunctions in production systems, urging practitioners to develop tools to detect out-of-distribution (OOD) samples through the lens of the neural network. In this paper, we introduce TRUSTED, a new OOD detector… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Journal ref: NeurIPS 2022

  4. arXiv:2203.07798  [pdf, other

    stat.ML cs.LG

    Igeood: An Information Geometry Approach to Out-of-Distribution Detection

    Authors: Eduardo Dadalto Camara Gomes, Florence Alberge, Pierre Duhamel, Pablo Piantanida

    Abstract: Reliable out-of-distribution (OOD) detection is fundamental to implementing safer modern machine learning (ML) systems. In this paper, we introduce Igeood, an effective method for detecting OOD samples. Igeood applies to any pre-trained neural network, works under various degrees of access to the ML model, does not require OOD samples or assumptions on the OOD data but can also benefit (if availab… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

    Comments: Accepted in ICLR 2022

  5. CADV: A software visualization approach for code annotations distribution

    Authors: Phyllipe Lima, Jorge Melegati, Everaldo Gomes, Nathalya Stefhany Pereira, Eduardo Guerra, Paulo Meirelles

    Abstract: Code annotations is a widely used feature in Java systems to configure custom metadata on programming elements. Their increasing presence creates the need for approaches to assess and comprehend their usage and distribution. In this context, software visualization has been studied and researched to improve program comprehension in different aspects. This study aimed at designing a software visuali… ▽ More

    Submitted 27 June, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: 53 pages

  6. arXiv:0907.2039  [pdf, ps, other

    cs.SE

    Refining interfaces: the case of the B method

    Authors: David Deharbe, Bruno E. G. Gomes, Anamaria M. Moreira

    Abstract: Model-driven design of software for safety-critical applications often relies on mathematically grounded techniques such as the B method. Such techniques consist in the successive applications of refinements to derive a concrete implementation from an abstract specification. Refinement theory defines verification conditions to guarantee that such operations preserve the intended behaviour of the… ▽ More

    Submitted 12 July, 2009; originally announced July 2009.

    Comments: 18 pages, submitted to ICFEM 2009

    ACM Class: D.2.4