2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2015
DOI: 10.1109/scam.2015.7335419
|View full text |Cite
|
Sign up to set email alerts
|

Discovering likely mappings between APIs using text mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Different levels of abstraction delineate automatic approaches. Similarity of text description has been used to map old to new APIs [36], while others [30,32,38] use a syntactic view of programs to build a learned vector-space encoding [28] for migration given an initial parallel mapping. Although the embedding-based approach taken by API2Vec [32] is flexible, the resulting ambiguity is in fact a hindrance when performing migrations.…”
Section: Related Work 81 Library Migrationmentioning
confidence: 99%
“…Different levels of abstraction delineate automatic approaches. Similarity of text description has been used to map old to new APIs [36], while others [30,32,38] use a syntactic view of programs to build a learned vector-space encoding [28] for migration given an initial parallel mapping. Although the embedding-based approach taken by API2Vec [32] is flexible, the resulting ambiguity is in fact a hindrance when performing migrations.…”
Section: Related Work 81 Library Migrationmentioning
confidence: 99%
“…Similar approaches were tackling the problem of mapping between methods across different languages. The majority of these approaches employed information retrieval and natural language processing techniques to identify similar method usages in different languages [12], [13].…”
Section: Rmentioning
confidence: 99%
“…In recent years, many studies have shown how the migration rules can be extracted from source code (Kim et al 2007;Xing 2007;Schäfer et al 2008;Wu et al 2010;Nguyen et al 2010;Pandita et al 2015) and the commit history (Dagenais & Robillard 2008; S. Meng et al 2012;Teyton et al 2013;Hora et al 2014;Alrubaye & Mkaouer 2019). These approaches support the developers of client applications and help them update their systems to the latest versions of the external libraries without relying on the library developers to provide a set of migration rules.…”
Section: Introductionmentioning
confidence: 99%