Results 51 to 60 of about 12,701,026 (316)
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed +2 more
doaj +1 more source
Backdoors in Neural Models of Source Code [PDF]
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar +1 more source
Scalable Source Code Similarity Detection in Large Code Repositories [PDF]
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj +1 more source
Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev +4 more
doaj
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee +5 more
doaj +1 more source
Deep Code-Comment Understanding and Assessment
Code comments are a key software component for program comprehension and software maintainability. High-quality code and comments are urgently needed by data-driven models widely used in tasks like code summarization.
Deze Wang +5 more
doaj +1 more source
Lossy joint source-channel coding in the finite blocklength regime [PDF]
This paper finds new tight finite-blocklength bounds for the best achievable lossy joint source-channel code rate, and demonstrates that joint source-channel code design brings considerable performance advantage over a separate one in the non-asymptotic ...
Kostina, Victoria, Verdú, Sergio
core +6 more sources
Multi-modal Attention Network Learning for Semantic Source Code Retrieval [PDF]
Code retrieval techniques and tools have been playing a key role in facilitating software developers to retrieve existing code fragments from available open-source repositories given a user query (e.g., a short natural language text describing the ...
Yao Wan +6 more
semanticscholar +1 more source
Generating Adversarial Examples for Holding Robustness of Source Code Processing Models
Automated processing, analysis, and generation of source code are among the key activities in software and system lifecycle. To this end, while deep learning (DL) exhibits a certain level of capability in handling these tasks, the current state-of-the ...
Huangzhao Zhang +5 more
semanticscholar +1 more source
A Comparative Study of Deep Learning-Based Vulnerability Detection System
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li +5 more
doaj +1 more source

