Results 21 to 30 of about 3,402,194 (310)
Scalable Source Code Similarity Detection in Large Code Repositories [PDF]
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj +1 more source
The issues of possibility of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems have been considered.
Serhii Osiievskyi+5 more
doaj +1 more source
Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh+2 more
doaj +1 more source
Reading the Source Code of Social Ties [PDF]
Though online social network research has exploded during the past years, not much thought has been given to the exploration of the nature of social links.
Aiello, Luca Maria+2 more
core +1 more source
A Comparative Study of Deep Learning-Based Vulnerability Detection System
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li+5 more
doaj +1 more source
Eye movements in code reading:relaxing the linear order [PDF]
—Code reading is an important skill in programming. Inspired by the linearity that people exhibit while natural lan-guage text reading, we designed local and global gaze-based mea-sures to characterize linearity (left-to-right and top-to-bottom) in ...
Bednarik, Roman+7 more
core +2 more sources
Academic Source Code Plagiarism Detection by Measuring Program Behavioral Similarity
Source code plagiarism is a long-standing issue in tertiary computer science education. Many source code plagiarism detection tools have been proposed to aid in the detection of source code plagiarism.
Hayden Cheers+2 more
doaj +1 more source
Diagnosing Errors in DbC Programs Using Constraint Programming [PDF]
Model-Based Diagnosis allows to determine why a correctly designed system does not work as it was expected. In this paper, we propose a methodology for software diagnosis which is based on the combination of Design by Contract, Model-Based Diagnosis ...
Borrego Núñez, Diana+3 more
core +1 more source
Identifying Plagiarised Programming Assignments with Detection Tool Consensus
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment
Hayden Cheers, Yuqing Lin, Weigen Yan
doaj +1 more source
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li+3 more
doaj +1 more source