Results 31 to 40 of about 12,796,570 (330)

Looking before Leaping: Creating a Software Registry

open access: yesJournal of Open Research Software, 2015
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj   +1 more source

Big Code != Big Vocabulary: Open-Vocabulary Models for Source Code [PDF]

open access: yesInternational Conference on Software Engineering, 2020
Statistical language modeling techniques have successfully been applied to large source code corpora, yielding a variety of new software development tools, such as tools for code suggestion, improving readability, and API migration.
Rafael-Michael Karampatsis   +4 more
semanticscholar   +1 more source

C Source code Obfuscation using Hash Function and Encryption Algorithm

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2023
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj   +1 more source

Secure source coding with a helper [PDF]

open access: yes2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009
We consider a secure source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source X and wishes to transmit this source losslessly to Bob over a rate-limited link. A helper (Helen), observes an i.i.d. correlated source Y and can transmit information to Bob over a separate rate-
Ravi Tandon   +2 more
openaire   +2 more sources

Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?

open access: yesData, 2022
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh   +2 more
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

Iterative joint design of source codes and multiresolution channel codes [PDF]

open access: yes, 1997
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core   +1 more source

Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation

open access: yesApplied Sciences, 2020
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu   +3 more
doaj   +1 more source

Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network

open access: yesFuture Internet, 2022
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova   +3 more
doaj   +1 more source

A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]

open access: yesE3S Web of Conferences, 2023
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy