-
公开(公告)号:US20240338211A1
公开(公告)日:2024-10-10
申请号:US18131649
申请日:2023-04-06
摘要: Each of a plurality of portions of a source code base of an application is classified into an algorithm type in a predefined set of algorithm types. A code base model of the source code base is constructed, the code base model comprising a plurality of nodes connected by edges, a node in the plurality of nodes representing a classified portion in the plurality of portions. In response to a natural language query about the source code base, a natural language explanation of the classified portion is generated.
-
公开(公告)号:US12106095B2
公开(公告)日:2024-10-01
申请号:US18554899
申请日:2021-04-26
申请人: NANJING UNIVERSITY
摘要: A deep learning-based Java program internal annotation generation method and system is provided. The method includes acquiring items with a Stars number ranked in the top, and extracting corresponding internal annotations and method statement lists; obtaining an pair; selecting an annotation in a Verb-dobj form; obtaining a code context associated with a target code segment; preprocessing the annotation, the target code, and the context to obtain a triplet dataset; randomly dividing the constructed dataset into a training set, a validation set, and a test set, and constructing an encoder-decoder network at the same time; enabling the training set in division to be used for model training, performing evaluation on the validation set to obtain a model with the best effect on the validation set as a target model; and predicting data in the test set with the obtained target model to generate a predicted annotation.
-
公开(公告)号:US12061901B2
公开(公告)日:2024-08-13
申请号:US18123689
申请日:2023-03-20
发明人: Chetana Kadatoka , Anurag Mandloi , Buddhika Rathnayaka , Sriram Sundararajan , Avishekh Tewari , Anthony Wooten
摘要: Disclosed are approaches for enforcing requirements that documentation be up to date. In response to initiation of a build process for an application, a source-code file associated with the application is evaluated to determine an identifier and a location for a corresponding documentation file. A determination can be made regarding whether the documentation file exists at the location. Another determination can be made regarding whether each function specified in the source-code file has a corresponding entry in the documentation file. The build process can be halted in response to determining that at least one function specified in the source-code file fails to have the corresponding entry in the documentation file. If the build process is halted, a message can be displayed on the computing device, the message identifying the at least one function specified in the source-code file that fails to have the corresponding entry in the documentation file.
-
公开(公告)号:US20240256236A1
公开(公告)日:2024-08-01
申请号:US18162810
申请日:2023-02-01
申请人: Dell Products L.P.
发明人: Guoqiang Ma , Dazhi Dong , Daniel K O'Reilly, JR.
摘要: Techniques are disclosed for annotation-aware efficient application build management. For example, a system can include at least one processing device including a processor coupled to a memory, the at least one processing device being configured to perform the following steps: identifying a list of annotation processor files from a plurality of source code files to generate an annotation processor list; triggering annotation processing using one or more annotation processor files in the annotation processor list, while deferring compilation of remaining source code files in the plurality of source code files; and recompiling incrementally any output from the annotation processing and any of the remaining source code files that were updated from a previous compilation without triggering a full recompilation of the plurality of source code files.
-
公开(公告)号:US12050909B2
公开(公告)日:2024-07-30
申请号:US17968879
申请日:2022-10-19
申请人: S.T. Swimm Tech Ltd
发明人: Omer Rosenbaum , Saar Raz , Oren Toledano , Tom Ahi-Dror , Gilad Navot
IPC分类号: G06F8/73 , G06F16/33 , G06F16/93 , G06F21/62 , G06V30/226
CPC分类号: G06F8/73 , G06F16/3331 , G06F16/94 , G06F21/6209 , G06V30/226
摘要: A method for generating documentation text comprises: extracting, from a plurality of source files of a software program, a plurality of element identifiers, each identifying an element of the software program; selecting a set of selected element identifiers of the plurality of element identifiers according to a plurality of scores, each score computed for an element identifier of the plurality of element identifiers; and for each of the set of selected element identifiers: generating an element documentation text using a documentation template and a plurality of patterns identified in a plurality of usage instances where in each of the plurality of usage instances the selected element identifier exists in at least one of the plurality of source files; and adding the element documentation text to a repository of documentation text associated with the plurality of source files.
-
公开(公告)号:US12050681B2
公开(公告)日:2024-07-30
申请号:US17644706
申请日:2021-12-16
申请人: Virsec Systems, Inc.
发明人: Satya V. Gupta
CPC分类号: G06F21/54 , G06F8/73 , G06F21/554 , G06F21/556
摘要: Embodiments detect security vulnerabilities, e.g., backdoors, in applications. An embodiment reverses object code of a computer application to generate source code of the computer application. In turn, the generated source code is compared to trusted source code of the computer application to detect a security vulnerability in the object code of the computer application. Embodiments can take one or more protection actions, e.g., sending a notification or preventing execution of the object code, amongst other examples, in response to detecting the security vulnerability.
-
公开(公告)号:US12019992B2
公开(公告)日:2024-06-25
申请号:US17657530
申请日:2022-03-31
申请人: FUJITSU LIMITED
发明人: Mehdi Bahrami , Wei-Peng Chen
IPC分类号: G06F8/60 , G06F8/30 , G06F8/36 , G06F8/41 , G06F8/65 , G06F8/73 , G06F11/36 , G06F16/951 , G06F18/20 , G06F18/22 , G06F18/23213 , G06F40/166 , G06F40/211 , G06F40/216 , G06F40/242 , G06F40/30 , G06F40/40 , G06F40/44 , G06N3/04 , G06N3/08
CPC分类号: G06F40/30 , G06F8/30 , G06F8/36 , G06F8/42 , G06F8/436 , G06F8/65 , G06F8/73 , G06F11/3624 , G06F16/951 , G06F18/22 , G06F18/23213 , G06F18/285 , G06F40/166 , G06F40/211 , G06F40/216 , G06F40/242 , G06F40/40 , G06F40/44 , G06N3/04 , G06N3/08
摘要: According to an aspect of an embodiment, operations for code enrichment for training language models on tasks related to computer programming are provided. The operations include receiving source code data including a computer-executable code and a natural language (NL) text. The operations further include determining blocks of code from the computer-executable code. The operations further include extracting a set of features related to components of the source code data from the blocks of code. The extraction is performed by parsing the blocks of code using Abstract Syntax Tree (AST) data of the blocks of code. The operations further include revising the AST data. The operations further include updating the source code data based on the revised AST data and generating a dataset of NL and abstracted code features as training data based on the updated source code data and further training a language model on a sequence-to-sequence generation task.
-
8.
公开(公告)号:US20240192934A1
公开(公告)日:2024-06-13
申请号:US18064251
申请日:2022-12-10
发明人: Parag Naik , Anindya Saha , Vineet Gupta , Pramit Biswas , Makarand Kulkarni
摘要: Configurations of a system and a method for implementing a framework that optimizes the execution and deployment of operations in a computationally intensive software applications including varying complexity workloads, are described. In one aspect, a portable framework (PF) may transform an algorithmic routine developed via an IDE into an intermediate form. The PF may enable adding constraint definitions to the intermediate form of the algorithmic software routine. The PF may further enable or provision including constraint definitions, hardware architecture description and multiple optimization metrics to the intermediate form. Based on the constraint definitions, the hardware architecture description, and the multiple optimization metrics the PF may determine computing resources from multiple heterogenous hardware resources deployed on a hardware platform. The execution of the operations may be optimized by deploying the operations to be executed on the determined computing resources.
-
9.
公开(公告)号:US20240155024A1
公开(公告)日:2024-05-09
申请号:US18407244
申请日:2024-01-08
申请人: KONG INC.
发明人: Marco Palladino , Augusto Marietti
IPC分类号: H04L67/10 , G06F8/73 , H04L67/1004
CPC分类号: H04L67/10 , G06F8/73 , H04L67/1004 , H04L67/02
摘要: Disclosed embodiments are directed at systems, methods, and architecture for providing auto-documentation to APIs. The auto documentation plugin is architecturally placed between an API and a client thereof and parses API requests and responses in order to generate auto-documentation. In some embodiments, the auto-documentation plugin is used to update preexisting documentation after updates. In some embodiments, the auto-documentation plugin accesses an on-line documentation repository. In some embodiments, the auto-documentation plugin makes use of a machine learning model to determine how and which portions of an existing documentation file to update.
-
公开(公告)号:US11960881B2
公开(公告)日:2024-04-16
申请号:US16751257
申请日:2020-01-24
IPC分类号: G06F8/73 , G06F16/13 , G06F16/93 , G06F40/106 , G06F40/117 , G06F40/166
CPC分类号: G06F8/73 , G06F16/137 , G06F16/93 , G06F40/106 , G06F40/117 , G06F40/166
摘要: A system and method for simplifying the creation of documentation, and especially software documentation. A software application, referred to as a source metadata tagger and document compiler is used to add metadata to a final output document. This metadata contains identifiers that are associated with various source files. In this way, the system can easily determine which source file is being reviewed and/or flagged by the reviewer. This information can be used by the ticketing/notification system to create a work item for the appropriate developer or development group. This is vastly simpler than the current system, where human intervention is required to determine which source file is being flagged.
-
-
-
-
-
-
-
-
-