Skip to main content

Showing 1–37 of 37 results for author: Mezini, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11930  [pdf, other

    cs.SE cs.AI cs.CL

    A Critical Study of What Code-LLMs (Do Not) Learn

    Authors: Abhinav Anand, Shweta Verma, Krishna Narasimhan, Mira Mezini

    Abstract: Large Language Models trained on code corpora (code-LLMs) have demonstrated impressive performance in various coding assistance tasks. However, despite their increased size and training dataset, code-LLMs still have limitations such as suggesting codes with syntactic errors, variable misuse etc. Some studies argue that code-LLMs perform well on coding tasks because they use self-attention and hidd… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2405.18242  [pdf, other

    cs.PL

    Compiling with Arrays

    Authors: David Richter, Timon Böhler, Pascal Weisenburger, Mira Mezini

    Abstract: Linear algebra computations are foundational for neural networks and machine learning, often handled through arrays. While many functional programming languages feature lists and recursion, arrays in linear algebra demand constant-time access and bulk operations. To bridge this gap, some languages represent arrays as (eager) functions instead of lists. In this paper, we connect this idea to a form… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: to appear at ECOOP'24

  3. arXiv:2405.15578  [pdf, other

    cs.PL cs.DC

    Distributed Locking as a Data Type

    Authors: Julian Haas, Ragnar Mogk, Annette Bieniusa, Mira Mezini

    Abstract: Mixed-consistency programming models assist programmers in designing applications that provide high availability while still ensuring application-specific safety invariants. However, existing models often make specific system assumptions, such as building on a particular database system or having baked-in coordination strategies. This makes it difficult to apply these strategies in diverse setting… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  4. arXiv:2403.07808  [pdf

    cs.SE

    Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability

    Authors: Anna-Katharina Wickert, Michael Schlichtig, Marvin Vogel, Lukas Winter, Mira Mezini, Eric Bodden

    Abstract: Context: Static analyses are well-established to aid in understanding bugs or vulnerabilities during the development process or in large-scale studies. A low false-positive rate is essential for the adaption in practice and for precise results of empirical studies. Unfortunately, static analyses tend to report where a vulnerability manifests rather than the fix location. This can cause presumed fa… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 12 pages, 4 figures, accepted by the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), March 12-15, 2024, Rovaniemi, Finland at the research papers track

  5. arXiv:2402.08511  [pdf, other

    cs.AI

    Amplifying Exploration in Monte-Carlo Tree Search by Focusing on the Unknown

    Authors: Cedric Derstroff, Jannis Brugger, Jannis Blüml, Mira Mezini, Stefan Kramer, Kristian Kersting

    Abstract: Monte-Carlo tree search (MCTS) is an effective anytime algorithm with a vast amount of applications. It strategically allocates computational resources to focus on promising segments of the search tree, making it a very attractive search algorithm in large search spaces. However, it often expends its limited resources on reevaluating previously explored regions when they remain the most promising… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: 10 pages, 7 figures

  6. Towards Trustworthy AI Software Development Assistance

    Authors: Daniel Maninger, Krishna Narasimhan, Mira Mezini

    Abstract: It is expected that in the near future, AI software development assistants will play an important role in the software industry. However, current software development assistants tend to be unreliable, often producing incorrect, unsafe, or low-quality code. We seek to resolve these issues by introducing a holistic architecture for constructing, training, and using trustworthy AI software developmen… ▽ More

    Submitted 23 January, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

    Comments: 6 pages, 1 figure; to be published in New Ideas and Emerging Results (ICSE-NIER'24), April 14-20, 2024, Lisbon, Portugal; updated version to reflect the information provided by ACM

  7. Using Rewrite Strategies for Efficient Functional Automatic Differentiation

    Authors: Timon Böhler, David Richter, Mira Mezini

    Abstract: Automatic Differentiation (AD) has become a dominant technique in ML. AD frameworks have first been implemented for imperative languages using tapes. Meanwhile, functional implementations of AD have been developed, often based on dual numbers, which are close to the formal specification of differentiation and hence easier to prove correct. But these papers have focussed on correctness not efficien… ▽ More

    Submitted 7 July, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: to be published in FTfJP 2023

  8. UNGOML: Automated Classification of unsafe Usages in Go

    Authors: Anna-Katharina Wickert, Clemens Damke, Lars Baumgärtner, Eyke Hüllermeier, Mira Mezini

    Abstract: The Go programming language offers strong protection from memory corruption. As an escape hatch of these protections, it provides the unsafe package. Previous studies identified that this unsafe package is frequently used in real-world code for several purposes, e.g., serialization or casting types. Due to the variety of these reasons, it may be possible to refactor specific usages to avoid potent… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 13 pages, accepted at the 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR 2023)

  9. arXiv:2305.11619  [pdf, other

    cs.SE cs.AI

    Towards Code Generation from BDD Test Case Specifications: A Vision

    Authors: Leon Chemnitz, David Reichenbach, Hani Aldebes, Mariam Naveed, Krishna Narasimhan, Mira Mezini

    Abstract: Automatic code generation has recently attracted large attention and is becoming more significant to the software development process. Solutions based on Machine Learning and Artificial Intelligence are being used to increase human and software efficiency in potent and innovative ways. In this paper, we aim to leverage these developments and introduce a novel approach to generating frontend compon… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: Accepted for publication at the International Conference on AI Engineering (CAIN) 2023

  10. A Direct-Style Effect Notation for Sequential and Parallel Programs

    Authors: David Richter, Timon Böhler, Pascal Weisenburger, Mira Mezini

    Abstract: Modeling sequential and parallel composition of effectful computations has been investigated in a variety of languages for a long time. In particular, the popular do-notation provides a lightweight effect embedding for any instance of a monad. Idiom bracket notation, on the other hand, provides an embedding for applicatives. First, while monads force effects to be executed sequentially, ignoring p… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: to be published in ECOOP23

  11. LoRe: A Programming Model for Verifiably Safe Local-First Software

    Authors: Julian Haas, Ragnar Mogk, Elena Yanakieva, Annette Bieniusa, Mira Mezini

    Abstract: Local-first software manages and processes private data locally while still enabling collaboration between multiple parties connected via partially unreliable networks. Such software typically involves interactions with users and the execution environment (the outside world). The unpredictability of such interactions paired with their decentralized nature make reasoning about the correctness of lo… ▽ More

    Submitted 19 October, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: This is the extended version of the work accepted at ECOOP 2023

    Journal ref: ACM Trans. Program. Lang. Syst. 46, 1, Article 2 (March 2024), 26 pages

  12. arXiv:2209.11103  [pdf, other

    cs.CR cs.SE

    To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild

    Authors: Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini

    Abstract: Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a misuse which may cause security vulnerabilities. As previous studies did not conduct a qualitative examination of the validity and severity of the findings, our objective was to understand the findings in more depth. We analyzed a set of 936 open-source Java applications for cryptographic misuses. Ou… ▽ More

    Submitted 24 March, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: 8 pages, published in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 09-11, 2022, Wuhan, China

  13. Dependently-Typed Data Plane Programming

    Authors: Matthias Eichholz, Eric Hayden Campbell, Matthias Krebs, Nate Foster, Mira Mezini

    Abstract: Programming languages like P4 enable specifying the behavior of network data planes in software. However, with increasingly powerful and complex applications running in the network, the risk of faults also increases. Hence, there is growing recognition of the need for methods and tools to statically verify the correctness of P4 code, especially as the language lacks basic safety guarantees. Type s… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: This version is the companion technical report for the submission to POPL'22

    ACM Class: D.3.1; D.2.4

  14. arXiv:2205.07780  [pdf, other

    cs.PL

    Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Version)

    Authors: David Richter, David Kretzler, Pascal Weisenburger, Guido Salvaneschi, Sebastian Faust, Mira Mezini

    Abstract: Decentralized applications (dApps) consist of smart contracts that run on blockchains and clients that model collaborating parties. dApps are used to model financial and legal business functionality. Today, contracts and clients are written as separate programs -- in different programming languages -- communicating via send and receive operations. This makes distributed program flow awkward to exp… ▽ More

    Submitted 15 May, 2023; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: This is the extended version including appendices of the paper to be published in TOPLAS; an extended abstract was published in ECOOP 2022

  15. arXiv:2204.06447  [pdf, ps, other

    cs.SE

    CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite

    Authors: Michael Schlichtig, Anna-Katharina Wickert, Stefan Krüger, Eric Bodden, Mira Mezini

    Abstract: Context: Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of ex… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 8 pages, accepted at the MSR 2022 Registered Reports Track as a In-Principal Acceptance (IPA)

  16. Python Crypto Misuses in the Wild

    Authors: Anna-Katharina Wickert, Lars Baumgärtner, Florian Breitfelder, Mira Mezini

    Abstract: Background: Previous studies have shown that up to 99.59 % of the Java apps using crypto APIs misuse the API at least once. However, these studies have been conducted on Java and C, while empirical studies for other languages are missing. For example, a controlled user study with crypto tasks in Python has shown that 68.5 % of the professional developers write a secure solution for a crypto task.… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: 6 pages, to be published in the proceedings of the 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (ESEM 21), October 11-15, 2021, Bari Italy

    ACM Class: D.2.2

    Journal ref: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)

  17. arXiv:2108.09245  [pdf, other

    cs.SE

    Fex: Assisted Identification of Domain Features from C Programs

    Authors: Patrick Müller, Krishna Narasimhan, Mira Mezini

    Abstract: Modern software typically performs more than one functionality. These functionalities or features are not always organized in a way for modules representing these features to be used individually. Many software engineering approaches like programming language constructs, or product line visualization techniques have been proposed to organize projects as modules. Unfortunately, much legacy software… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  18. arXiv:2105.04950  [pdf, other

    cs.CR cs.SE

    Dealing with Variability in API Misuse Specification

    Authors: Rodrigo Bonifacio, Stefan Krüger, Krishna Narasimhan, Eric Bodden, Mira Mezini

    Abstract: APIs are the primary mechanism for developers to gain access to externally defined services and tools. However, previous research has revealed API misuses that violate the contract of APIs to be prevalent. Such misuses can have harmful consequences, especially in the context of cryptographic libraries. Various API misuse detectors have been proposed to address this issue including CogniCrypt, one… ▽ More

    Submitted 17 May, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

    Comments: 28 pages, 16 figures

    MSC Class: 68N19 ACM Class: D.2.1; D.3.3

  19. arXiv:2010.11242  [pdf, other

    cs.CR cs.SE

    Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild

    Authors: Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini

    Abstract: The Go programming language aims to provide memory and thread safety through measures such as automated memory management with garbage collection and a strict type system. However, it also offers a way of circumventing this safety net through the use of the unsafe package. While there are legitimate use cases for unsafe, developers must exercise caution to avoid introducing vulnerabilities like bu… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)

  20. arXiv:2010.04476  [pdf, other

    cs.SE

    Modular Collaborative Program Analysis in OPAL

    Authors: Dominik Helm, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini

    Abstract: Current approaches combining multiple static analyses deriving different, independent properties focus either on modularity or performance. Whereas declarative approaches facilitate modularity and automated, analysis-independent optimizations, imperative approaches foster manual, analysis-specific optimizations. In this paper, we present a novel approach to static analyses that leverages the mod… ▽ More

    Submitted 9 October, 2020; originally announced October 2020.

    Comments: Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Nov 2020

  21. ReactiFi: Reactive Programming of Wi-Fi Firmware on Mobile Devices

    Authors: Artur Sterz, Matthias Eichholz, Ragnar Mogk, Lars Baumgärtner, Pablo Graubner, Matthias Hollick, Mira Mezini, Bernd Freisleben

    Abstract: Network programmability will be required to handle future increased network traffic and constantly changing application needs. However, there is currently no way of using a high-level, easy to use programming language to program Wi-Fi firmware. This impedes rapid prototy** and deployment of novel network services/applications and hinders continuous performance optimization in Wi-Fi networks, sin… ▽ More

    Submitted 4 March, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Journal ref: The Art, Science, and Engineering of Programming, 2021, Vol. 5, Issue 2, Article 4

  22. arXiv:2006.05914  [pdf, other

    cs.CR cs.CY

    Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

    Authors: Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl

    Abstract: Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy, the so-called "Google/Apple Proposal", which we abbreviate by "GAP". We demonstrate that in real-world scenarios the current GAP design is vulnerable to (i) profiling and possibly de-anonymizing infected persons, and (ii) relay-based wormhole… ▽ More

    Submitted 6 November, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  23. Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy

    Authors: Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini

    Abstract: String obfuscation is an established technique used by proprietary, closed-source applications to protect intellectual property. Furthermore, it is also frequently used to hide spyware or malware in applications. In both cases, the techniques range from bit-manipulation over XOR operations to AES encryption. However, string obfuscation techniques/tools suffer from one shared weakness: They general… ▽ More

    Submitted 9 September, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: to appear in ASIA CCS 20, Taipei, Taiwan

  24. DTN7: An Open-Source Disruption-tolerant Networking Implementation of Bundle Protocol 7

    Authors: Alvar Penning, Lars Baumgärtner, Jonas Höchst, Artur Sterz, Mira Mezini, Bernd Freisleben

    Abstract: In disruption-tolerant networking (DTN), data is transmitted in a store-carry-forward fashion from network node to network node. In this paper, we present an open source DTN implementation, called DTN7, of the recently released Bundle Protocol Version 7 (draft version 13). DTN7 is written in Go and provides features like memory safety and concurrent execution. With its modular design and interchan… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: 18th International Conference on Ad Hoc Networks and Wireless (AdHoc-Now 2019)

    Journal ref: ADHOC-NOW 2019: Ad-Hoc, Mobile, and Wireless Networks pp 196-209

  25. Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City

    Authors: Lars Baumgärtner, Jonas Höchst, Patrick Lampe, Ragnar Mogk, Artur Sterz, Pascal Weisenburger, Mira Mezini, Bernd Freisleben

    Abstract: Currently, nearly four billion people live in urban areas. Since this trend is increasing, natural disasters or terrorist attacks in such areas affect an increasing number of people. While information and communication technology is crucial for the operation of urban infrastructures and the well-being of its inhabitants, current technology is quite vulnerable to disruptions of various kinds. In fu… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: 2019 IEEE Global Humanitarian Technology Conference (GHTC)

    Journal ref: 2019 IEEE Global Humanitarian Technology Conference (GHTC)

  26. arXiv:1907.02990  [pdf, ps, other

    cs.PL cs.DB

    Type-safe, Polyvariadic Event Correlation

    Authors: Oliver Bračevac, Guido Salvaneschi, Sebastian Erdweg, Mira Mezini

    Abstract: The pivotal role that event correlation technology plays in todays applications has lead to the emergence of different families of event correlation approaches with a multitude of specialized correlation semantics, including computation models that support the composition and extension of different semantics. However, type-safe embeddings of extensible and composable event patterns into statically… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

  27. arXiv:1906.07223  [pdf, other

    cs.PL

    How to Avoid Making a Billion-Dollar Mistake: Type-Safe Data Plane Programming with SafeP4

    Authors: Matthias Eichholz, Eric Campbell, Nate Foster, Guido Salvaneschi, Mira Mezini

    Abstract: The P4 programming language offers high-level, declarative abstractions that bring the flexibility of software to the domain of networking. Unfortunately, the main abstraction used to represent packet data in P4, namely header types, lacks basic safety guarantees. Over the last few years, experience with an increasing number of programs has shown the risks of the unsafe approach, which often leads… ▽ More

    Submitted 24 June, 2019; v1 submitted 17 June, 2019; originally announced June 2019.

    Comments: This version is the companion technical report for submission to ECOOP 2019. 26 Pages + 2 Reference pages + 10 pages of Appendices; 26 Figures

    ACM Class: D.3.1; D.2.4

  28. Comprehensive Multiparty Session Types

    Authors: Andi Bejleri, Elton Domnori, Malte Viering, Patrick Eugster, Mira Mezini

    Abstract: Multiparty session types (MST) are a well-established type theory that describes the interactive structure of a fixed number of components from a global point of view and type-checks the components through projection of the global type onto the participants of the session. They guarantee communicationsafety for a language of multiparty sessions (LMS), i.e., distributed, parallel components can exc… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

    Journal ref: The Art, Science, and Engineering of Programming, 2019, Vol. 3, Issue 3, Article 6

  29. arXiv:1712.00242  [pdf, other

    cs.SE

    A Systematic Evaluation of Static API-Misuse Detectors

    Authors: Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini

    Abstract: Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, i.e., violations of these constraints, may lead to software crashes, bugs, and vulnerabilities. Though researchers developed many API-misuse detectors over the last two decades, recent studies show that API misuses are still prevalent. Therefore, we need to un… ▽ More

    Submitted 13 March, 2018; v1 submitted 1 December, 2017; originally announced December 2017.

    Comments: Accepted for publication in IEEE Transactions on Software Engineering, March 12, 2018 Artifact page: http://www.st.informatik.tu-darmstadt.de/artifacts/mustudy/ 19 pages; 1 figure; 9 tables; 6 listings

  30. arXiv:1710.00564  [pdf, ps, other

    cs.SE

    CrySL: Validating Correct Usage of Cryptographic APIs

    Authors: Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini

    Abstract: Various studies have empirically shown that the majority of Java and Android apps misuse cryptographic libraries, causing devastating breaches of data security. Therefore, it is crucial to detect such misuses early in the development process. The fact that insecure usages are not the exception but the norm precludes approaches based on property inference and anomaly detection. In this paper, we… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 11 pages

  31. arXiv:1705.05828  [pdf, other

    cs.PL

    A Co-contextual Type Checker for Featherweight Java (incl. Proofs)

    Authors: Edlira Kuci, Sebastian Erdweg, Oliver Bračevac, Andi Bejleri, Mira Mezini

    Abstract: This paper addresses compositional and incremental type checking for object-oriented programming languages. Recent work achieved incremental type checking for structurally typed functional languages through co-contextual ty** rules, a constraint-based formulation that removes any context dependency for expression ty**s. However, that work does not cover key features of object-oriented language… ▽ More

    Submitted 23 May, 2018; v1 submitted 16 May, 2017; originally announced May 2017.

    Comments: 54 pages, 10 figures, ECOOP 2017

    MSC Class: 68N15 ACM Class: D.3.3; F.3.1; F.3.2

  32. arXiv:1602.00981  [pdf, other

    cs.PL

    CPL: A Core Language for Cloud Computing -- Technical Report

    Authors: Oliver Bračevac, Sebastian Erdweg, Guido Salvaneschi, Mira Mezini

    Abstract: Running distributed applications in the cloud involves deployment. That is, distribution and configuration of application services and middleware infrastructure. The considerable complexity of these tasks resulted in the emergence of declarative JSON-based domain-specific deployment languages to develop deployment programs. However, existing deployment programs unsafely compose artifacts written i… ▽ More

    Submitted 5 February, 2016; v1 submitted 2 February, 2016; originally announced February 2016.

    Comments: Technical report accompanying the MODULARITY '16 submission

  33. Abmash: Mashing Up Legacy Web Applications by Automated Imitation of Human Actions

    Authors: Alper Ortac, Martin Monperrus, Mira Mezini

    Abstract: Many business web-based applications do not offer applications programming interfaces (APIs) to enable other applications to access their data and functions in a programmatic manner. This makes their composition difficult (for instance to synchronize data between two applications). To address this challenge, this paper presents Abmash, an approach to facilitate the integration of such legacy web a… ▽ More

    Submitted 2 December, 2013; originally announced December 2013.

    Comments: Software: Practice and Experience (2013) -

    Journal ref: Software: Practice and Experience, Wiley, volume 45, 2013

  34. Detecting Missing Method Calls as Violations of the Majority Rule

    Authors: Martin Monperrus, Mira Mezini

    Abstract: When using object-oriented frameworks it is easy to overlook certain important method calls that are required at particular places in code. In this paper, we provide a comprehensive set of empirical facts on this problem, starting from traces of missing method calls in a bug repository. We propose a new system that searches for missing method calls in software based on the other method calls that… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Journal ref: ACM Transactions on Software Engineering and Methodology, 2013

  35. What Should Developers Be Aware Of? An Empirical Study on the Directives of API Documentation

    Authors: Martin Monperrus, Michael Eichberg, Elif Tekes, Mira Mezini

    Abstract: Application Programming Interfaces (API) are exposed to developers in order to reuse software libraries. API directives are natural-language statements in API documentation that make developers aware of constraints and guidelines related to the usage of an API. This paper presents the design and the results of an empirical study on the directives of API documentation of object-oriented libraries.… ▽ More

    Submitted 29 May, 2012; originally announced May 2012.

    Comments: Empirical Software Engineering (2011)

    Journal ref: Empirical Software Engineering, 2012

  36. Querying Source Code with Natural Language

    Authors: Markus Kimmig, Martin Monperrus, Mira Mezini

    Abstract: One common task of develo** or maintaining software is searching the source code for information like specific method calls or write accesses to certain fields. This kind of information is required to correctly implement new features and to solve bugs. This paper presents an approach for querying source code with natural language.

    Submitted 29 May, 2012; originally announced May 2012.

    Journal ref: 26th IEEE/ACM International Conference On Automated Software Engineering (2011) 376-379

  37. arXiv:1203.5188  [pdf, ps, other

    cs.SE cs.CL cs.IR

    Semi-Automatically Extracting FAQs to Improve Accessibility of Software Development Knowledge

    Authors: Stefan Henß, Martin Monperrus, Mira Mezini

    Abstract: Frequently asked questions (FAQs) are a popular way to document software development knowledge. As creating such documents is expensive, this paper presents an approach for automatically extracting FAQs from sources of software development discussion, such as mailing lists and Internet forums, by combining techniques of text mining and natural language processing. We apply the approach to popular… ▽ More

    Submitted 23 March, 2012; originally announced March 2012.

    Comments: ICSE - 34th International Conference on Software Engineering (2012)

    Journal ref: ICSE - 34th International Conference on Software Engineering, 2012