Results 11 to 20 of about 253,484 (163)

Formal methods for safety-critical machine learning: a systematic literature review [PDF]

open access: yesFrontiers in Artificial Intelligence
IntroductionThe integration of Machine Learning (ML) systems into safety-critical domains heightens the need for rigorous safety guarantees. Traditional testing-based verification techniques are insufficient for fully capturing the complex, data-driven ...
Alexandra Newcomb, Omar Ochoa
doaj   +2 more sources

Decision Tree Algorithm-based API Misuse Detection [PDF]

open access: yesJisuanji kexue, 2022
Application programming interface(API) benefits to effectively improve software development efficiency by reusing existing software frameworks or libraries.However,many constraints must be satisfied to correctly use APIs,such as call order,exception ...
LI Kang-le, REN Zhi-lei, ZHOU Zhi-de, JIANG He
doaj   +1 more source

Method of Java Redundant Code Detection Based on Static Analysis and Knowledge Graph [PDF]

open access: yesJisuanji kexue, 2023
Redundant code is common in commercial and open source software,and its presence can increase memory footprint,affect code maintainability,and increase maintenance costs.Rapid type analysis algorithm is a common static analysis method in Java redundant ...
LIU Xinwei, TAO Chuanqi
doaj   +1 more source

Deep-learning cell-delay modeling for static timing analysis

open access: yesAin Shams Engineering Journal, 2023
Delay and transition timetables plus voltage waveforms are used to characterize standard cell delays. More accurate models explode cell library size and degrades design flow performance.
Waseem Raslan, Yehea Ismail
doaj   +1 more source

Software dataplane verification [PDF]

open access: yesCommunications of the ACM, 2015
The industry is in the mood for programmable networks, where an operator can dynamically deploy network functions on network devices, akin to how one deploys virtual machines on physical machines in a cloud environment. Such flexibility brings along the threat of unpredictable behavior and performance.
Dobrescu Mihai, Argyraki Katerina
openaire   +2 more sources

Method of Code Features Automated Extraction

open access: yesJisuanji kexue yu tansuo, 2021
The application of neural networks in software engineering has greatly eased the pressure of traditional method of extracting code features manually. Previous code feature extraction models usually regard code as natural language or heavily depend on the
SHI Zhicheng, ZHOU Yu
doaj   +1 more source

Particularities of Verification Processes for Distributed Informatics Applications [PDF]

open access: yesInformatică economică, 2013
This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing.
Ion IVAN   +3 more
doaj   +1 more source

SCVerify: Verification of Software Implementation Against Power Side-Channel Attacks

open access: yesJisuanji kexue yu tansuo, 2021
Power side-channel attacks, have become a serious threat to embedded computing devices in cyber-physical systems because of the ability of deducing secret data using statistical analysis.
ZHANG Jun
doaj   +1 more source

A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2020
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns.
N. Rezaee, H. Momeni
doaj   +1 more source

Research on Data Quality of Open Source Code Data

open access: yesJisuanji kexue yu tansuo, 2020
Code generation and bug prediction based on open source code data are the typical application fields in current intelligent software development. However, the existing researches mainly focus on diverse intelligent algorithms applied in different ...
BAO Panpan, TAO Chuanqi, HUANG Zhiqiu
doaj   +1 more source

Home - About - Disclaimer - Privacy