{"id":"https://openalex.org/W2460703577","doi":"https://doi.org/10.1109/icpc.2016.7503746","title":"STAC: A tool for Static Textual Analysis of Code","display_name":"STAC: A tool for Static Textual Analysis of Code","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2460703577","doi":"https://doi.org/10.1109/icpc.2016.7503746","mag":"2460703577"},"language":"en","primary_location":{"id":"doi:10.1109/icpc.2016.7503746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpc.2016.7503746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000543262","display_name":"Saket Khatiwada","orcid":null},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saket Khatiwada","raw_affiliation_strings":["Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003817304","display_name":"Michael H. Kelly","orcid":"https://orcid.org/0000-0003-3292-4358"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Kelly","raw_affiliation_strings":["Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037080307","display_name":"Anas Mahmoud","orcid":"https://orcid.org/0000-0001-8353-5286"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anas Mahmoud","raw_affiliation_strings":["Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA","institution_ids":["https://openalex.org/I121820613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000543262"],"corresponding_institution_ids":["https://openalex.org/I121820613"],"apc_list":null,"apc_paid":null,"fwci":3.3175,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.93110134,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8727247714996338},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.7057998776435852},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6756880879402161},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.6661456227302551},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.6112179160118103},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5999816656112671},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.561728835105896},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5313704013824463},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5187373757362366},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.5175487399101257},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.4988241195678711},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.455933541059494},{"id":"https://openalex.org/keywords/lemmatisation","display_name":"Lemmatisation","score":0.4182775616645813},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41625407338142395},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3557036519050598},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.26681220531463623},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.18862050771713257},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.1803487241268158},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13222628831863403}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8727247714996338},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.7057998776435852},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6756880879402161},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.6661456227302551},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.6112179160118103},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5999816656112671},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.561728835105896},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5313704013824463},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5187373757362366},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.5175487399101257},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.4988241195678711},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.455933541059494},{"id":"https://openalex.org/C161831844","wikidata":"https://www.wikidata.org/wiki/Q2554325","display_name":"Lemmatisation","level":2,"score":0.4182775616645813},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41625407338142395},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3557036519050598},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.26681220531463623},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.18862050771713257},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.1803487241268158},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13222628831863403},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icpc.2016.7503746","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpc.2016.7503746","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.lsu.edu:eecs_pubs-3598","is_oa":false,"landing_page_url":"https://repository.lsu.edu/eecs_pubs/2596","pdf_url":null,"source":{"id":"https://openalex.org/S4210169993","display_name":"Civil War Book Review","issn_l":"1528-6592","issn":["1528-6592"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315936","host_organization_name":"Louisiana State University","host_organization_lineage":["https://openalex.org/P4310315936"],"host_organization_lineage_names":["Louisiana State University"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1647671624","https://openalex.org/W2018844270","https://openalex.org/W2053552739","https://openalex.org/W2077155146","https://openalex.org/W2077537588","https://openalex.org/W2098162425","https://openalex.org/W2128737833","https://openalex.org/W6636915900"],"related_works":["https://openalex.org/W2390085541","https://openalex.org/W1975917686","https://openalex.org/W2969257295","https://openalex.org/W3162146186","https://openalex.org/W2763045826","https://openalex.org/W3177431742","https://openalex.org/W4300416799","https://openalex.org/W2282845548","https://openalex.org/W2082765019","https://openalex.org/W2137137834"],"abstract_inverted_index":{"Static":[0,57],"textual":[1,87,115],"analysis":[2,106],"techniques":[3],"have":[4],"been":[5,95],"recently":[6],"applied":[7],"to":[8,35,97,141,144],"process":[9,83],"and":[10,26,105,113,121,132],"synthesize":[11],"source":[12,90],"code.":[13,91,152],"The":[14],"underlying":[15],"tenet":[16],"is":[17,21,63,81,135],"that":[18,70],"important":[19,86],"information":[20,31,88],"embedded":[22],"in":[23,118],"code":[24,28,77,103,123,147],"identifiers":[25],"internal":[27],"comments.":[29],"Such":[30],"can":[32],"be":[33],"analyzed":[34],"provide":[36],"automatic":[37],"aid":[38],"for":[39,55,76,111],"several":[40],"software":[41],"engineering":[42],"activities.":[43],"To":[44],"facilitate":[45],"this":[46],"line":[47],"of":[48,60,84,102],"work,":[49],"we":[50],"present":[51],"STAC,":[52],"a":[53,66,72],"tool":[54,69],"supporting":[56],"Textual":[58],"Analysis":[59],"Code.":[61],"STAC":[62,108,134],"designed":[64],"as":[65,138],"light-weight":[67],"stand-alone":[68],"provides":[71,109],"practical":[73],"one-stop":[74],"solution":[75],"indexing.":[78],"Code":[79],"indexing":[80,93,148],"the":[82,100],"extracting":[85,112],"from":[89],"Accurate":[92],"has":[94],"found":[96,117],"significantly":[98],"influence":[99],"performance":[101],"retrieval":[104],"methods.":[107],"features":[110,126,149],"processing":[114],"patterns":[116],"Java,":[119],"C++,":[120],"C#":[122],"artifacts.":[124],"These":[125],"include":[127],"identifier":[128],"splitting,":[129],"stemming,":[130],"lemmatization,":[131],"spell-checking.":[133],"also":[136],"provided":[137],"an":[139],"API":[140],"help":[142],"researchers":[143],"integrate":[145],"basic":[146],"into":[150],"their":[151]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
