Results 41 to 50 of about 12,701,026 (316)

DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS [PDF]

open access: yesApplied Computer Science, 2022
In the paper, the authors are presenting the outcome of web scraping software allowing for the automated classification of source code. The software system was prepared for a discussion forum for software developers to find fragments of source code ...
Marcin BADUROWICZ
doaj   +1 more source

Eye movements in code reading:relaxing the linear order [PDF]

open access: yes, 2015
—Code reading is an important skill in programming. Inspired by the linearity that people exhibit while natural lan-guage text reading, we designed local and global gaze-based mea-sures to characterize linearity (left-to-right and top-to-bottom) in ...
Bednarik, Roman   +7 more
core   +2 more sources

Semantic Robustness of Models of Source Code [PDF]

open access: yesIEEE International Conference on Software Analysis, Evolution, and Reengineering, 2020
Deep neural networks are vulnerable to adversarial examples-small input perturbations that result in incorrect predictions. We study this problem for models of source code, where we want the neural network to be robust to source-code modifications that ...
Goutham Ramakrishnan   +5 more
semanticscholar   +1 more source

Method of increasing the reliability of knowledge-oriented systems software through code reuse mechanisms

open access: yesSocial Development & Security, 2022
The issues of possibility of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems have been considered.
Serhii Osiievskyi   +5 more
doaj   +1 more source

Automated Vulnerability Detection in Source Code Using Deep Representation Learning [PDF]

open access: yesInternational Conference on Machine Learning and Applications, 2018
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code.
Rebecca L. Russell   +7 more
semanticscholar   +1 more source

Bi-LSTM-Based Neural Source Code Summarization

open access: yesApplied Sciences, 2022
Code summarization is a task that is often employed by software developers for fixing code or reusing code. Software documentation is essential when it comes to software maintenance. The highest cost in software development goes to maintenance because of
Sarah Aljumah, Lamia Berriche
doaj   +1 more source

Google Earth Engine Open-Source Code for Land Surface Temperature Estimation from the Landsat Series

open access: yesRemote Sensing, 2020
Land Surface Temperature (LST) is increasingly important for various studies assessing land surface conditions, e.g., studies of urban climate, evapotranspiration, and vegetation stress.
S. Ermida   +4 more
semanticscholar   +1 more source

Identifying Plagiarised Programming Assignments with Detection Tool Consensus

open access: yesInformatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment
Hayden Cheers, Yuqing Lin, Weigen Yan
doaj   +1 more source

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

open access: yesIEEE Access, 2019
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li   +3 more
doaj   +1 more source

Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation

open access: yesApplied Sciences, 2020
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy