نتایج جستجو برای: API approach

تعداد نتایج: 1301849  

Journal: :journal of arthropod-borne diseases 0
sanaz akbari 1department of microbiology, islamic azad university, damghan branch, damghan, iran. mohammadali oshaghi 2department of medical entomology and vector control, school of public health, tehran university of medical sciences, tehran, iran. saedehsadat hashemi-aghdam department of animal science, islamic azad university, damghan branch, damghan, iran. sara hajikhani department of pathology, school of public health, tehran university of medical sciences, tehran, iran. ghazaleh oshaghi department of nutrition, national nutrition and food technology research institute (nnftri), faculty of nutrition sciences and food technology, shahid beheshti university of medical sciences, tehran, iran. mohammadhasan shirazi department of pathology, school of public health, tehran university of medical sciences, tehran, iran.

background : cockroaches mechanically spread pathogenic agents, however, little is known about their gut microbiota. identification of midgut microbial community helps targeting novel biological control strategies such as paratransgenesis. here the bacterial microbiota of periplaneta americana midgut, were identified and evaluated for finding proper paratransgenesis candidate. methods : midgut ...

Journal: :Journal of Systems and Software 2023

Learning and remembering to use APIs are difficult. Several techniques have been proposed assist developers in using APIs. Most existing focus on recommending the right API methods call, but very few arguments. In this paper, we propose ARist, a novel automated argument recommendation approach which suggests arguments by predicting developers’ expectations when they define methods. To implement...

Journal: :Journal of Systems and Software 2023

As the use of Application Programming Interfaces (APIs) is increasingly growing, their evolution becomes more challenging in terms service provided according to consumers’ needs. In this paper, we address role needs WAPIs and introduce a process mining pattern-based method support providers by analyzing understanding behavior, imprinted WAPI usage logs. We take position that WAPIs’ should be ma...

2011
Ekwa Duala-Ekoko Martin P. Robillard

Empirical evidence indicates that developers face significant hurdles when the API elements necessary to implement a task are not accessible from the types they are working with. We propose an approach that leverages the structural relationships between API elements to make API methods or types not accessible from a given API type more discoverable. We implemented our approach as an extension t...

2007
Levente Buttyán Ta Vinh Thong

API level vulnerabilities of hardware security modules represent a serious threat, thus, discovering and patching security holes in APIs are important. In this paper, we argue and illustrate that the application of formal verification methods is a promising approach for API analysis. In particular, we propose an API verification method based on process algebra. The proposed method seems to be e...

2016
Hyun-il Lim

Nowadays, software is widely applied to increase accuracy, efficiency, and convenience in various areas in our life. So, it is essential to use software in our recent computing environments. Despite of the valuable applications of software, malicious behaviors caused by vulnerability of software threaten our secure computing environments. So, it is important to identify and detect malicious beh...

2013
Gayane Petrosyan

With the growing size of Application Programming Interfaces (APIs), both API usability and API learning become more challenging. API learning resources are often crucial for helping developers learn an API, but they are distributed across different documents, which makes finding the necessary information more challenging. This work focuses on discovering relevant sections of tutorials for a giv...

2013
Ziying Dai Xiaoguang Mao Yan Lei Yuhua Qi Rui Wang Bin Gu

API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of m...

2011
Qirun Zhang Wujie Zheng Michael R. Lyu

Software systems often undergo significant changes in their life cycle, exposing increasingly complex API to their developers. Without methodical guidances, it is easy to become bogged down in a morass of complex API even for the professional software developers. This paper presents the Flow-Augmented Call Graph (FACG) for taming API complexity. Augmenting the call graph with control flow analy...

2011
Fang Deng Haiwen Liu Jin Shao Qianxiang Wang

Most applications need to invoke some Application Programming Interfaces (APIs), e.g. JDK (Java Development Kit) API. When invoking those APIs, applications must follow some API constraints. Violation of these constraints will lead to some severe program defects. To detect this kind of defects, lots of static and dynamic approaches are explored, using formally described API constraints. While m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید