Results 41 to 50 of about 11,579,038 (330)

Looking before Leaping: Creating a Software Registry

open access: yesJournal of Open Research Software, 2015
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj   +1 more source

DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS [PDF]

open access: yesApplied Computer Science, 2022
In the paper, the authors are presenting the outcome of web scraping software allowing for the automated classification of source code. The software system was prepared for a discussion forum for software developers to find fragments of source code ...
Marcin BADUROWICZ
doaj   +1 more source

Source Code

open access: yesMedienimpulse, 2011
„They say ev’rything can be replaced Yet ev’ry distance is not near “ Bob ...
Thomas Ballhausen, Lisa Leitenmüller
doaj   +1 more source

Assessment of Source Code Obfuscation Techniques [PDF]

open access: yes, 2016
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo   +6 more
core   +2 more sources

A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]

open access: yesE3S Web of Conferences, 2023
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir   +2 more
doaj   +1 more source

Iterative joint design of source codes and multiresolution channel codes [PDF]

open access: yes, 1997
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core   +1 more source

Automated Vulnerability Detection in Source Code Using Deep Representation Learning [PDF]

open access: yesInternational Conference on Machine Learning and Applications, 2018
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code.
Rebecca L. Russell   +7 more
semanticscholar   +1 more source

Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques

open access: yesBig Data and Cognitive Computing, 2022
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh   +2 more
doaj   +1 more source

Eye movements in code reading:relaxing the linear order [PDF]

open access: yes, 2015
—Code reading is an important skill in programming. Inspired by the linearity that people exhibit while natural lan-guage text reading, we designed local and global gaze-based mea-sures to characterize linearity (left-to-right and top-to-bottom) in ...
Bednarik, Roman   +7 more
core   +2 more sources

Backdoors in Neural Models of Source Code [PDF]

open access: yesInternational Conference on Pattern Recognition, 2020
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy