Contents
Academic literature on the topic 'Abstract syntax tree (AST)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Abstract syntax tree (AST).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Abstract syntax tree (AST)"
Shen, Victor R. L. "Novel Code Plagiarism Detection Based on Abstract Syntax Tree and Fuzzy Petri Nets." International Journal of Engineering Education 1, no. 1 (2019): 46–56. http://dx.doi.org/10.14710/ijee.1.1.46-56.
Full textKaur, Amandeep, and Munish Saini. "Enhancing the Software Clone Detection in BigCloneBench." International Journal of Open Source Software and Processes 12, no. 3 (2021): 17–31. http://dx.doi.org/10.4018/ijossp.2021070102.
Full textLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Full textPonomarenko, G. S., and P. G. Klyucharev. "Detection of Obfuscated Javascript Code Based on Abstract Syntax Trees Coloring." Mathematics and Mathematical Modeling, no. 2 (June 9, 2020): 1–24. http://dx.doi.org/10.24108/mathm.0220.0000218.
Full textHosseinpour, Sahereh, Mir Mohammad Reza Alavi Milani, and Hüseyin Pehlivan. "A Step-by-Step Solution Methodology for Mathematical Expressions." Symmetry 10, no. 7 (2018): 285. http://dx.doi.org/10.3390/sym10070285.
Full textHan, KyungHyun, and Seong Oun Hwang. "Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens." Applied Sciences 10, no. 17 (2020): 6116. http://dx.doi.org/10.3390/app10176116.
Full textXu, Yingjie, Gengran Hu, Lin You, and Chengtang Cao. "A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability." Security and Communication Networks 2021 (August 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5798033.
Full textYang, Kang, Huiqun Yu, Guisheng Fan, and Xingguang Yang. "Graph embedding code prediction model integrating semantic features." Computer Science and Information Systems 17, no. 3 (2020): 907–26. http://dx.doi.org/10.2298/csis190908027y.
Full textZhou, Zhimin, and Zhongwen Chen. "Split Attention Pointer Network for Source Code Language Modeling." International Journal of Software Engineering and Knowledge Engineering 30, no. 09 (2020): 1221–44. http://dx.doi.org/10.1142/s0218194020500321.
Full textJi, Xiujuan, Lei Liu, and Jingwen Zhu. "Code Clone Detection with Hierarchical Attentive Graph Embedding." International Journal of Software Engineering and Knowledge Engineering 31, no. 06 (2021): 837–61. http://dx.doi.org/10.1142/s021819402150025x.
Full text