Results 61 to 70 of about 45,762 (323)
Towards a Reliable Identification of Deficient Code with a Combination of Software Metrics
Different challenges arise while detecting deficient software source code. Usually a large number of potentially problematic entities are identified when an individual software metric or individual quality aspect is used for the identification of ...
Tina Beranič +2 more
doaj +1 more source
Detection of code smells using machine learning techniques combined with data-balancing methods
Code smells are prevalent issues in software design that arise when implementation or design principles are violated. These issues manifest as symptoms or anomalies in the source code.
Nasraldeen Alnor Adam Khleel +1 more
doaj +1 more source
Automated Refactoring of Nested-IF Formulae in Spreadsheets
Spreadsheets are the most popular end-user programming software, where formulae act like programs and also have smells. One well recognized common smell of spreadsheet formulae is nest-IF expressions, which have low readability and high cognitive cost ...
Han, Shi +4 more
core +1 more source
Perception space - The final frontier [PDF]
Mapping the complex sensory behavior of animals, such as smell in bees, to relevant neural activity provides clues into how animals perceive and respond to the world through their ...
Brockmann, A, Chittka, L
core +3 more sources
A novel phthalocyanine (PC)‐based metal–organic framework (MOFs) is synthesized using ditopic PC linkers obtained through regioselective statistical condensation. The resulting MOF exhibits significant improvements in electronic absorption, thereby enhancing the material's performance in light harvesting and energy conversion.
Lukas S. Langer +12 more
wiley +1 more source
FedCSD: A Federated Learning Based Approach for Code-Smell Detection
Software quality is critical, as low quality, or “Code smell,” increases technical debt and maintenance costs. There is a timely need for a collaborative model that detects and manages code smells by learning from diverse and distributed ...
Sadi Alawadi +6 more
doaj +1 more source
Security Toolbox for Detecting Novel and Sophisticated Android Malware
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom +4 more
core +1 more source
This study uncovers the unexplored role of intermolecular interactions in multiphoton absorption in coordination polymers. By analyzing [Zn2tpda(DMA)2(DMF)0.3], it shows how the electronic coupling of the chromophores and confinement in the MOF enhance two‐and three‐photon absorption.
Simon Nicolas Deger +11 more
wiley +1 more source
Exploring Code Clones in Programmable Logic Controller Software
The reuse of code fragments by copying and pasting is widely practiced in software development and results in code clones. Cloning is considered an anti-pattern as it negatively affects program correctness and increases maintenance efforts.
Egyed, Alexander +3 more
core +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source

