Results 51 to 60 of about 12,796,570 (330)

A Comparative Study of Deep Learning-Based Vulnerability Detection System

open access: yesIEEE Access, 2019
Source code static analysis has been widely used to detect vulnerabilities in the development of software products. The vulnerability patterns purely based on human experts are laborious and error prone, which has motivated the use of machine learning ...
Zhen Li   +5 more
doaj   +1 more source

Reading the Source Code of Social Ties [PDF]

open access: yes, 2014
Though online social network research has exploded during the past years, not much thought has been given to the exploration of the nature of social links.
Aiello, Luca Maria   +2 more
core   +1 more source

Bi-LSTM-Based Neural Source Code Summarization

open access: yesApplied Sciences, 2022
Code summarization is a task that is often employed by software developers for fixing code or reusing code. Software documentation is essential when it comes to software maintenance. The highest cost in software development goes to maintenance because of
Sarah Aljumah, Lamia Berriche
doaj   +1 more source

Google Earth Engine Open-Source Code for Land Surface Temperature Estimation from the Landsat Series

open access: yesRemote Sensing, 2020
Land Surface Temperature (LST) is increasingly important for various studies assessing land surface conditions, e.g., studies of urban climate, evapotranspiration, and vegetation stress.
S. Ermida   +4 more
semanticscholar   +1 more source

Identifying Plagiarised Programming Assignments with Detection Tool Consensus

open access: yesInformatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment
Hayden Cheers, Yuqing Lin, Weigen Yan
doaj   +1 more source

Relating Developers’ Concepts and Artefact Vocabulary in a Financial Software Module [PDF]

open access: yes, 2011
Developers working on unfamiliar systems are challenged to accurately identify where and how high-level concepts are implemented in the source code. Without additional help, concept location can become a tedious, time-consuming and error-prone task.
Dilshener, Tezcan, Wermelinger, Michel
core   +1 more source

Scalable Source Code Similarity Detection in Large Code Repositories [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj   +1 more source

Gaussian source coding with spherical codes [PDF]

open access: yesIEEE Transactions on Information Theory, 2002
Summary: A fixed-rate shape-gain quantizer for the memoryless Gaussian source is proposed. The shape quantizer is constructed from wrapped spherical codes that map a sphere packing in \(\mathbb R^{k-1}\) onto a sphere in \(\mathbb R^k\), and the gain codebook is a globally optimal scalar quantizer.
Jon Hamkins, Kenneth Zeger
openaire   +1 more source

Backdoors in Neural Models of Source Code [PDF]

open access: yesInternational Conference on Pattern Recognition, 2020
Deep neural networks are vulnerable to a range of adversaries. A particularly pernicious class of vulnerabilities are backdoors, where model predictions diverge in the presence of subtle triggers in inputs. An attacker can implant a backdoor by poisoning
Goutham Ramakrishnan, Aws Albarghouthi
semanticscholar   +1 more source

Sequence-to-Sequence Learning-Based Conversion of Pseudo-Code to Source Code Using Neural Translation Approach

open access: yesIEEE Access, 2022
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy