Results 21 to 30 of about 3,402,194 (310)

Scalable Source Code Similarity Detection in Large Code Repositories [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj   +1 more source

Method of increasing the reliability of knowledge-oriented systems software through code reuse mechanisms

open access: yesSocial Development & Security, 2022
The issues of possibility of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems have been considered.
Serhii Osiievskyi   +5 more
doaj   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Reading the Source Code of Social Ties [PDF]

open access: yes, 2014
Though online social network research has exploded during the past years, not much thought has been given to the exploration of the nature of social links.
Aiello, Luca Maria   +2 more
core   +1 more source

A Comparative Study of Deep Learning-Based Vulnerability Detection System

open access: yesIEEE Access, 2019
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li   +5 more
doaj   +1 more source

Eye movements in code reading:relaxing the linear order [PDF]

open access: yes, 2015
—Code reading is an important skill in programming. Inspired by the linearity that people exhibit while natural lan-guage text reading, we designed local and global gaze-based mea-sures to characterize linearity (left-to-right and top-to-bottom) in ...
Bednarik, Roman   +7 more
core   +2 more sources

Academic Source Code Plagiarism Detection by Measuring Program Behavioral Similarity

open access: yesIEEE Access, 2021
Source code plagiarism is a long-standing issue in tertiary computer science education. Many source code plagiarism detection tools have been proposed to aid in the detection of source code plagiarism.
Hayden Cheers   +2 more
doaj   +1 more source

Diagnosing Errors in DbC Programs Using Constraint Programming [PDF]

open access: yes, 2005
Model-Based Diagnosis allows to determine why a correctly designed system does not work as it was expected. In this paper, we propose a methodology for software diagnosis which is based on the combination of Design by Contract, Model-Based Diagnosis ...
Borrego Núñez, Diana   +3 more
core   +1 more source

Identifying Plagiarised Programming Assignments with Detection Tool Consensus

open access: yesInformatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment
Hayden Cheers, Yuqing Lin, Weigen Yan
doaj   +1 more source

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

open access: yesIEEE Access, 2019
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy