Results 31 to 40 of about 250,329 (273)

Unified Deep Semantic Search on Code

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
A tool that can search over large code corpus directly and list ranked snippets can prove to be an invaluable resource to programmers looking for similar code snippets using natural language queries. It must have a deep understanding of the semantics of source code and queries to evaluate their intent correctly.
Ashwin Patil   +4 more
openaire   +1 more source

An Efficient and Scalable Platform for Java Source Code Analysis Using Overlaid Graph Representations

open access: yesIEEE Access, 2020
Although source code programs are commonly written as textual information, they enclose syntactic and semantic information that is usually represented as graphs.
Oscar Rodriguez-Prieto   +2 more
doaj   +1 more source

Typestate-based semantic code search over partial programs [PDF]

open access: yesProceedings of the ACM international conference on Object oriented programming systems languages and applications, 2012
We present a novel code search approach for answering queries focused on API-usage with code showing how the API should be used. To construct a search index, we develop new techniques for statically mining and consolidating temporal API specifications from code snippets.
Alon Mishne, Sharon Shoham, Eran Yahav
openaire   +1 more source

Smart(Sampling)Augment: Optimal and Efficient Data Augmentation for Semantic Segmentation

open access: yesAlgorithms, 2022
Data augmentation methods enrich datasets with augmented data to improve the performance of neural networks. Recently, automated data augmentation methods have emerged, which automatically design augmentation strategies.
Misgana Negassi   +2 more
doaj   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Binary code similarity analysis based on naming function and common vector space

open access: yesScientific Reports, 2023
Binary code similarity analysis is widely used in the field of vulnerability search where source code may not be available to detect whether two binary functions are similar or not.
Bing Xia   +5 more
doaj   +1 more source

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

BlogForever D2.4: Weblog spider prototype and associated methodology [PDF]

open access: yes, 2013
The purpose of this document is to present the evaluation of different solutions for capturing blogs, established methodology and to describe the developed blog spider ...
Banos, V.   +6 more
core   +1 more source

Indicative coding of the actor’s performance in the Iraqi theater show

open access: yesالاكاديمي, 2016
Summary Search Alachtgalat process semantic encoding carried out by the actor inside the theater to deliver the intellectual sense, and social, as well as the aesthetic to the recipient, the fact that the code is the function is operated relationship in ...
Russil kadim oda
doaj   +1 more source

Analysis of Program Representations Based on Abstract Syntax Trees and Higher-Order Markov Chains for Source Code Classification Task

open access: yesFuture Internet, 2023
In this paper we consider the research and development of classifiers that are trained to predict the task solved by source code. Possible applications of such task detection algorithms include method name prediction, hardware–software partitioning ...
Artyom V. Gorchakov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy