Results 31 to 40 of about 12,701,026 (316)

Looking before Leaping: Creating a Software Registry

open access: yesJournal of Open Research Software, 2015
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj   +1 more source

Intellectual property rights in the era of Italian “artificial” public decisions: time to collapse?

open access: yesRivista Italiana di Informatica e Diritto, 2023
Considering that the Public Administration may not be able to internally develop the technologies necessary for its digital transformation process, having to procure them on the private market, the exclusivity of copy-right could affirm an unprecedented ...
Massimo Farina
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

Polar codes for distributed source coding [PDF]

open access: yesElectronics Letters, 2013
A polar coding method to construct a distributed source coding scheme which can achieve any point on the dominant face of the Slepian‐Wolf rate region for sources with uniform marginals is proposed.
openaire   +6 more sources

A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]

open access: yesE3S Web of Conferences, 2023
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir   +2 more
doaj   +1 more source

Reading the Source Code of Social Ties [PDF]

open access: yes, 2014
Though online social network research has exploded during the past years, not much thought has been given to the exploration of the nature of social links.
Aiello, Luca Maria   +2 more
core   +1 more source

Deep Learning for Source Code Modeling and Generation [PDF]

open access: yesACM Computing Surveys, 2020
Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation, and paragraph understanding are so prominent that the potential of DL in Software ...
T. H. Le, Hao Chen, M. A. Babar
semanticscholar   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Iterative joint design of source codes and multiresolution channel codes [PDF]

open access: yes, 1997
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core   +1 more source

Automated Data-Processing Function Identification Using Deep Neural Network

open access: yesIEEE Access, 2020
The number of software vulnerabilities is increasing year by year. In the era of big data, data-processing software with many users is more concerned by hackers.
Hongyu Kuang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy