Results 41 to 50 of about 78,045 (268)
ExCS: accelerating code search with code expansion
Efficiently searching and reusing code from expansive codebases is pivotal for enhancing developers’ productivity. In recent times, the emergence of deep learning-driven neural ranking models, characterized by their vast dimensions and intricate ...
Siwei Huang +3 more
doaj +1 more source
RAGdeterm: Deterministic retrieval-augmented generation for code generation
Large language models (LLMs) are increasingly used in software development, yet effective code generation requires reliable access to up-to-date project-specific source code. This paper introduces RAGdeterm, a deterministic Retrieval-Augmented Generation
A. Bochenek, J. Protasiewicz, W. Pedrycz
doaj +1 more source
Parallelization Strategies for Graph-Code-Based Similarity Search
The volume of multimedia assets in collections is growing exponentially, and the retrieval of information is becoming more complex. The indexing and retrieval of multimedia content is generally implemented by employing feature graphs.
Patrick Steinert +4 more
doaj +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Mélange fabric image retrieval based on soft similarity learning
Fabric image retrieval, a special case in Content Based Image Retrieval, has high potential application value in many fields. Compared with common image retrieval, fabric image retrieval has high requirements for results.
Jun Xiang, Ruru Pan, Weidong Gao
doaj +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Common Weakness Enumerations (CWEs) and Common Vulnerabilities and Exposures (CVEs) are open knowledge bases that provide definitions, descriptions, and samples of code vulnerabilities.
Alfred Asare Amoah, Yan Liu
doaj +1 more source
Deep Binary Representation for Efficient Image Retrieval
With the fast growing number of images uploaded every day, efficient content-based image retrieval becomes important. Hashing method, which means representing images in binary codes and using Hamming distance to judge similarity, is widely accepted for ...
Xuchao Lu +4 more
doaj +1 more source
STGI:a spatio-temporal grid index model for marine big data
Marine big data are characterized by a large amount and complex structures, which bring great challenges to data management and retrieval. Based on the GeoSOT Grid Code and the composite index structure of the MongoDB database, this paper proposes a ...
Tengteng Qu +8 more
doaj +1 more source
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch +13 more
wiley +1 more source

