Advanced searches left 3/3

API - Arxiv

Summarized by Plex Scholar
Last Updated: 10 June 2022

* If you want to update the article please login/register

DocTer: Documentation Guided Fuzzing for Testing Deep Learning API Functions

"Input limitations are extremely useful for many software development tasks. " DL specific input constraints are included in the free form API documentation, which are not explicitly stated in the free form API documentation. To fill this gap, we developed and launched DocTer, which allows us to inspect API documentation in order to extract DL specific input constraints for DL API functions. In the form of dependency parse trees of API descriptions, DocTer's new algorithm automatically generates rules to extract API parameter constraints from syntactical structures. DocTer uses the constraints to ensure the automatic generation of valid and invalid inputs to test DL API functions. To show the value of the extracted constraints, DocTer uses the constraints to enable the automated generation of valid and invalid inputs to prove DL API functions. According to our analysis of three well-known DL libraries, DocTer's precision in extracting input constraints is 85. 4%. ".

Source link: https://arxiv.org/abs/2109.01002v2


Automated Test Generation for REST APIs: No Time to Rest Yet

"Modern web services routinely offer REST APIs to clients to access their features. " These APIs represent particular challenges and opportunities for automated testing, fueling the introduction of numerous methodologies and tools that produce test cases for API endpoints using various strategies. A set of ten state-of-the-art REST API testing devices that featured both researchers and practitioners was first identified, through a rigorous process. "We then applied these tools to a benchmark of 20 real-world open-source RESTful services and assessed their success in terms of code coverage achieved and unexpected failures triggered. ".

Source link: https://arxiv.org/abs/2204.08348v2


A Systematic Survey on Android API Usage for Data-Driven Analytics with Smartphones

"The Android OS includes various APIs to gather such device usage and sensor details for third-party developers. " Both Usage Statistics API and Accessibility Service API are two common Android APIs for gathering app usage data and are used for various academic purposes because they can gather fine-grained interaction data. Several limitations and future research directions of smartphone usage and sensor-driven analytics analysis are discussed, including the impact of changes in the Android API versions on study, data security, and device tracking, as well as the mitigation of reproducibility risks by standard data typology. ".

Source link: https://arxiv.org/abs/2104.11271v2


Federating and querying heterogeneous and distributed Web APIs and triple stores

"To ensure data integration and interoperability, we need to homogenize the data access modes and the underlying semantics of the dataset without editing or replicating the original data sources. " We present a federated data integration architecture within an enterprise environment that depends on an ontology-based data access protocol. According to our results review in terms of query response time, the majority of queries can be answered in under 1 second. ".

Source link: https://arxiv.org/abs/2206.01594v1


Plots.jl -- a user extendable plotting API for the julia programming language

"The goal of Plots. jl is to make it possible for the user to change the used library without having to touch the source code or having to learn yet another application programming language with different features. " A high reuse rate is achieved by working with a user-advanced recipe system that encourages users and package authors to create new plotting styles from existing ones. ".

Source link: https://arxiv.org/abs/2204.08775v2


Identifying and Characterizing Silently-Evolved Methods in the Android API

"The Android platform is undoubtedly one of the most popular industrial-scale software projects, with over 500,000 commits and more than 700 contributors. " The Android API is included in this bundle, and app developers heavily depend on this API to build their Android applications. App developers must continue to monitor API updates to ensure compatibility issues in their applications, due to the Android platform's high success and its API. Because app developers rely on the provided documentation to develop their applications, any changes to methods that are not properly documented can result in unexpected failures in the applications using these techniques. SEMs do exist in the Android API, according to our experimental findings, and 957 of the applications we reviewed have at least one SEM. According to these findings, we suggest that the Android platform developers should take steps to avoid releasing SEMs, particularly those involving semantic changes. ".

Source link: https://arxiv.org/abs/2205.15546v1


Survey on Tools and Techniques Detecting Microservice API Patterns

"Design patterns are widely understood that design patterns promote system design and maintenance in several aspects. " This paper examines the use of microservice API patterns in order to locate and catalog available tools to find and catalog microservice API patterns. In addition, the findings reveal deficiencies and opportunities for enhancements of quality assessment tools. Finally, the reader is given a route map to detection methods that can be used to mine MAPs.

Source link: https://arxiv.org/abs/2205.10133v1


Carbon Figures of Merit Knowledge Creation with a Hybrid Solution and Carbon Tables API

"The knowledge is obtained from tables in scientific PDF documents and stored in knowledge graphs, and in this work, an asynchronous REST API is described to accelerate the creation of Carbon figures of merit information, identified as Carbon Tables. " The merit knowledge creation solution's numbers are based on a hybrid strategy, in which heuristics and machine learning are integrated. ".

Source link: https://arxiv.org/abs/2205.09175v1


A Longitudinal Study of Cryptographic API -- a Decade of Android Malware

"Various system-based and third-party libraries for Android include cryptographic functionality, and previous studies mainly investigated the abuse of cryptographic APIs in benign applications. " However, the role of cryptographic API in Android malware has yet to be investigated. Our results reveal surprising trends and insights into how and why cryptography is used in Android malware. For example, we point out the widespread use of weak hash functions and the late change from insecure DES to AES.

Source link: https://arxiv.org/abs/2205.05573v2

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions