rodhilton / jasomeView external linksLinks
JaSoMe (Java Source Metrics) - Object Oriented Metrics analyzer for Java code
☆34Mar 6, 2024Updated last year
Alternatives and similar repositories for jasome
Users that are interested in jasome are comparing it to the libraries listed below
Sorting:
- ☆10Aug 25, 2020Updated 5 years ago
- The implementation of Online Cross-Project JIT-SDP approaches proposed in the paper "Cross-Project Online Just-In-Time Software Defect Pr…☆11Feb 7, 2022Updated 4 years ago
- AST factorization: transformation AST of Kotlin source code to a vector☆11Oct 17, 2019Updated 6 years ago
- An extended version of Tool for Calculating Chidamber and Kemerer Java Metrics (and many other metrics)☆32Feb 2, 2026Updated last week
- CoREBench: Errors in Find, Grep, Make☆13Dec 10, 2015Updated 10 years ago
- This repo illustrates how to evaluate the artifacts in the paper Deep Just-in-Time Defect Prediction: How Far Are We? published in ISSTA'…☆37Nov 20, 2023Updated 2 years ago
- Java application written with javaparser framework for analyzing bad smells and class complexity☆16May 17, 2021Updated 4 years ago
- Experimental implementation of k-CFA and Pushdown k-CFA with optional Abstract Garbage Collection for LambdaJS and a subset of Scheme pro…☆30Nov 24, 2015Updated 10 years ago
- Dataset and code corresponding to Associating Natural Language Comment and Source Code Entities (AAAI 2020)☆20Oct 24, 2020Updated 5 years ago
- a Java front-end for Sketch synthesis tool☆20Jan 20, 2025Updated last year
- Artifacts and other data for "Code Vectors: Understanding Programs Through Embedded Abstraced Symbolic Traces"☆22Jun 5, 2020Updated 5 years ago
- ☆26Mar 26, 2024Updated last year
- System Dependence Graph generation from Java source code☆19Jun 11, 2019Updated 6 years ago
- Language-independent, search-based program repair -- just your cup of tea! ☕☆30Jul 9, 2024Updated last year
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- Detects smells and computes metrics of Java code☆188Mar 21, 2025Updated 10 months ago
- BugsJS benchmark framework and data files.☆30Nov 27, 2019Updated 6 years ago
- Code Analyst is a program that provides an integrated view of various indicators of code quality.☆14Oct 25, 2024Updated last year
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- Addressing the problem of predicting crime occurrence based on historic records☆11Nov 27, 2019Updated 6 years ago
- Nothing fancy. Just where I fight with python☆10Sep 24, 2018Updated 7 years ago
- Automatic Repair Framework that abstract repair tools and bug benchmarks☆72May 1, 2023Updated 2 years ago
- Tree-based Autofolding Software Summarization Algorithm☆43Jul 30, 2016Updated 9 years ago
- Code related to "Learning Continuous Semantic Representations of Symbolic Expressions" project.☆35Dec 8, 2016Updated 9 years ago
- Cross-Project Software Defect Prediction via Statement Semantic Learning and Maximum Mean Discrepancy☆10Jul 26, 2021Updated 4 years ago
- jSMPP server and client example using Spring Boot☆13Mar 24, 2023Updated 2 years ago
- PMD Plugin for the Eclipse IDE☆13Updated this week
- This projects mines maven central and creates a global dependency graph☆32Sep 1, 2022Updated 3 years ago
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Sequence-to-Sequence Learning for End-to-End Program Repair (IEEE TSE 2019). Open-science repo. http://arxiv.org/pdf/1901.01808☆86Jun 9, 2023Updated 2 years ago
- This repository reproduces the results in the paper "How expressive are transformers in spectral domain for graphs?"(published in TMLR)☆12Jul 10, 2022Updated 3 years ago
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Feb 17, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- ☆13May 25, 2024Updated last year
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- 《Ruby 基础教程(第5版)》☆10Jan 12, 2018Updated 8 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Feb 19, 2021Updated 4 years ago
- The official PyTorch implementation of "An Attentional Multi-scale Co-evolving Model for Dynamic Link Prediction" (TheWebConf'23)☆11May 4, 2023Updated 2 years ago
- ☆11Jan 7, 2025Updated last year