Results 31 to 40 of about 11,357,928 (275)
Looking before Leaping: Creating a Software Registry
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj +1 more source
DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS [PDF]
In the paper, the authors are presenting the outcome of web scraping software allowing for the automated classification of source code. The software system was prepared for a discussion forum for software developers to find fragments of source code ...
Marcin BADUROWICZ
doaj +1 more source
„They say ev’rything can be replaced Yet ev’ry distance is not near “ Bob ...
Thomas Ballhausen, Lisa Leitenmüller
doaj +1 more source
Automated Vulnerability Detection in Source Code Using Deep Representation Learning [PDF]
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code.
Rebecca L. Russell+7 more
semanticscholar +1 more source
Backdoors in Neural Models of Source Code [PDF]
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar +1 more source
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo+6 more
core +2 more sources
A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir+2 more
doaj +1 more source
Deep Code-Comment Understanding and Assessment
Code comments are a key software component for program comprehension and software maintainability. High-quality code and comments are urgently needed by data-driven models widely used in tasks like code summarization.
Deze Wang+5 more
doaj +1 more source
The issues of possibility of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems have been considered.
Serhii Osiievskyi+5 more
doaj +1 more source
Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh+2 more
doaj +1 more source