Results 41 to 50 of about 11,579,038 (330)
Looking before Leaping: Creating a Software Registry
What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline? Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code ...
Alice Allen, Judy Schmidt
doaj +1 more source
DETECTION OF SOURCE CODE IN INTERNET TEXTS USING AUTOMATICALLY GENERATED MACHINE LEARNING MODELS [PDF]
In the paper, the authors are presenting the outcome of web scraping software allowing for the automated classification of source code. The software system was prepared for a discussion forum for software developers to find fragments of source code ...
Marcin BADUROWICZ
doaj +1 more source
„They say ev’rything can be replaced Yet ev’ry distance is not near “ Bob ...
Thomas Ballhausen, Lisa Leitenmüller
doaj +1 more source
Assessment of Source Code Obfuscation Techniques [PDF]
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify.
Basile, Cataldo+6 more
core +2 more sources
A methodology of automatic class diagrams generation from source code using Model-Driven Architecture and Machine Learning to achieve Energy Efficiency [PDF]
The automated generation of class diagrams is a crucial task in software engineering, facilitating the understanding, analysis, and documentation of complex software systems.
Sajji Abir+2 more
doaj +1 more source
Iterative joint design of source codes and multiresolution channel codes [PDF]
We propose an iterative design algorithm for jointly optimizing source and channel codes. The joint design combines channel-optimized vector quantization (COVQ) for the source code with rate-compatible punctured convolutional (RCPC) coding for the ...
Effros, Michelle, Goldsmith, Andrea
core +1 more source
Automated Vulnerability Detection in Source Code Using Deep Representation Learning [PDF]
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code.
Rebecca L. Russell+7 more
semanticscholar +1 more source
Locating Source Code Bugs in Software Information Systems Using Information Retrieval Techniques
Bug localization is the process through which the buggy source code files are located regarding a certain bug report. Bug localization is an overwhelming and time-consuming process.
Ali Alawneh+2 more
doaj +1 more source
Eye movements in code reading:relaxing the linear order [PDF]
—Code reading is an important skill in programming. Inspired by the linearity that people exhibit while natural lan-guage text reading, we designed local and global gaze-based mea-sures to characterize linearity (left-to-right and top-to-bottom) in ...
Bednarik, Roman+7 more
core +2 more sources
Backdoors in Neural Models of Source Code [PDF]
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar +1 more source