Results 51 to 60 of about 12,701,026 (316)

The Influence of Code Retrieval from the Web on Programmer’s Skills, Meth-odologies, and Coding Behaviors

open access: yesمجلة المختار للعلوم, 2021
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed   +2 more
doaj   +1 more source

Backdoors in Neural Models of Source Code [PDF]

open access: yesInternational Conference on Pattern Recognition, 2020
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar   +1 more source

Scalable Source Code Similarity Detection in Large Code Repositories [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj   +1 more source

Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]

open access: yesИкономика и компютърни науки, 2021
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev   +4 more
doaj  

Sequence-to-Sequence Learning-Based Conversion of Pseudo-Code to Source Code Using Neural Translation Approach

open access: yesIEEE Access, 2022
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee   +5 more
doaj   +1 more source

Deep Code-Comment Understanding and Assessment

open access: yesIEEE Access, 2019
Code comments are a key software component for program comprehension and software maintainability. High-quality code and comments are urgently needed by data-driven models widely used in tasks like code summarization.
Deze Wang   +5 more
doaj   +1 more source

Lossy joint source-channel coding in the finite blocklength regime [PDF]

open access: yes, 2012
This paper finds new tight finite-blocklength bounds for the best achievable lossy joint source-channel code rate, and demonstrates that joint source-channel code design brings considerable performance advantage over a separate one in the non-asymptotic ...
Kostina, Victoria, Verdú, Sergio
core   +6 more sources

Multi-modal Attention Network Learning for Semantic Source Code Retrieval [PDF]

open access: yesInternational Conference on Automated Software Engineering, 2019
Code retrieval techniques and tools have been playing a key role in facilitating software developers to retrieve existing code fragments from available open-source repositories given a user query (e.g., a short natural language text describing the ...
Yao Wan   +6 more
semanticscholar   +1 more source

Generating Adversarial Examples for Holding Robustness of Source Code Processing Models

open access: yesAAAI Conference on Artificial Intelligence, 2020
Automated processing, analysis, and generation of source code are among the key activities in software and system lifecycle. To this end, while deep learning (DL) exhibits a certain level of capability in handling these tasks, the current state-of-the ...
Huangzhao Zhang   +5 more
semanticscholar   +1 more source

A Comparative Study of Deep Learning-Based Vulnerability Detection System

open access: yesIEEE Access, 2019
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy