Results 1 to 10 of about 3,402,095 (211)
Source code analysis dataset [PDF]
The data in this article pair source code with three artifacts from 108,568 projects downloaded from Github that have a redistributable license and at least 10 stars.
Ben Gelman+3 more
doaj +2 more sources
As artificial intelligence advances, source code completion assistants are becoming more advanced and powerful. Existing traditional assistants are no longer up to all the developers’ challenges.
Tilen Hliš+3 more
doaj +1 more source
In recent years, the use of deep learning in language models has gained much attention. Some research projects claim that they can generate text that can be interpreted as human writing, enabling new possibilities in many application areas.
Juan Cruz-Benito+3 more
doaj +1 more source
Code Flows: Visualizing Structural Evolution of Source Code [PDF]
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several ...
Auber, David,, Telea, Alexandru,
core +12 more sources
BIOPLAG: An Approach to Detect Programming Plagiarism
This paper creates an approach to the automatic detection of plagiarism in programming by combining the interdisciplinary knowledge from bioinformatics with techniques such as: tokens of programming language elements, tokens mapping in synthetic ...
KAIO P. GOMES+2 more
doaj +1 more source
Intellectual property rights in the era of Italian “artificial” public decisions: time to collapse?
Considering that the Public Administration may not be able to internally develop the technologies necessary for its digital transformation process, having to procure them on the private market, the exclusivity of copy-right could affirm an unprecedented ...
Massimo Farina
doaj +1 more source
Authorship Identification of Binary and Disassembled Codes Using NLP Methods
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors.
Aleksandr Romanov+3 more
doaj +1 more source
Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh+2 more
doaj +1 more source
Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law,
Bilal Al-Ahmad+8 more
doaj +1 more source
Automated Data-Processing Function Identification Using Deep Neural Network
The number of software vulnerabilities is increasing year by year. In the era of big data, data-processing software with many users is more concerned by hackers.
Hongyu Kuang+4 more
doaj +1 more source