Looking before Leaping: Creating a Software Registry
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj +1 more source
Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code [PDF]
Statistical language modeling techniques have successfully been applied to large source code corpora, yielding a variety of new software development tools, such as tools for code suggestion, improving readability, and API migration.
Rafael-Michael Karampatsis +4 more
semanticscholar +1 more source
C Source code Obfuscation using Hash Function and Encryption Algorithm
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj +1 more source
Secure source coding with a helper [PDF]
We consider a secure source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source X and wishes to transmit this source losslessly to Bob over a rate-limited link. A helper (Helen), observes an i.i.d. correlated source Y and can transmit information to Bob over a separate rate-
Ravi Tandon +2 more
openaire +2 more sources
Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh +2 more
doaj +1 more source
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo +6 more
core +2 more sources
Iterative joint design of source codes and multiresolution channel codes [PDF]
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core +1 more source
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu +3 more
doaj +1 more source
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova +3 more
doaj +1 more source
A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir +2 more
doaj +1 more source

