Results 31 to 40 of about 11,357,928 (275)

Looking before Leaping: Creating a Software Registry

open access: yesJournal of Open Research Software, 2015
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj   +1 more source

DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS [PDF]

open access: yesApplied Computer Science, 2022
In the paper, the authors are presenting the outcome of web scraping software allowing for the automated classification of source code. The software system was prepared for a discussion forum for software developers to find fragments of source code ...
Marcin BADUROWICZ
doaj   +1 more source

Source Code

open access: yesMedienimpulse, 2011
„They say ev’rything can be replaced Yet ev’ry distance is not near “ Bob ...
Thomas Ballhausen, Lisa Leitenmüller
doaj   +1 more source

Automated Vulnerability Detection in Source Code Using Deep Representation Learning [PDF]

open access: yesInternational Conference on Machine Learning and Applications, 2018
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code.
Rebecca L. Russell   +7 more
semanticscholar   +1 more source

Backdoors in Neural Models of Source Code [PDF]

open access: yesInternational Conference on Pattern Recognition, 2020
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]

open access: yesE3S Web of Conferences, 2023
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir   +2 more
doaj   +1 more source

Deep Code-Comment Understanding and Assessment

open access: yesIEEE Access, 2019
Code comments are a key software component for program comprehension and software maintainability. High-quality code and comments are urgently needed by data-driven models widely used in tasks like code summarization.
Deze Wang   +5 more
doaj   +1 more source

Method of increasing the reliability of knowledge-oriented systems software through code reuse mechanisms

open access: yesSocial Development & Security, 2022
The issues of possibility of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems have been considered.
Serhii Osiievskyi   +5 more
doaj   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy