Results 61 to 70 of about 12,701,026 (316)

Empirical study of transformers for source code [PDF]

open access: yesESEC/SIGSOFT FSE, 2020
Initially developed for natural language processing (NLP), Transformers are now widely used for source code processing, due to the format similarity between source code and text.
Nadezhda Chirkova, Sergey Troshin
semanticscholar   +1 more source

Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment

open access: yesIEEE Access
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov   +3 more
doaj   +1 more source

Decomposing Monolithic to Microservices: Keyword Extraction and BFS Combination Method to Cluster Monolithic’s Classes

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
Microservices architecture is widely used because of the ease of maintaining its microservices, as opposed to encapsulating functionality in a monolithic, which may negatively impact the development process when the application continues to grow.
Siti Rochimah, Bintang Nuralamsyah
doaj   +1 more source

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

Recommendations for Datasets for Source Code Summarization [PDF]

open access: yesNorth American Chapter of the Association for Computational Linguistics, 2019
Source Code Summarization is the task of writing short, natural language descriptions of source code. The main use for these descriptions is in software documentation e.g. the one-sentence Java method descriptions in JavaDocs.
Alexander LeClair, Collin McMillan
semanticscholar   +1 more source

Patient Activation in Childhood, Adolescent, and Young Adult Cancer Survivors: Current Insights and Implications for Survivorship Care—A Systematic Review From the e‐QuoL Project

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Patient activation—encompassing knowledge, confidence, and skills in managing individual's health—is a cornerstone of person‐centered care. However, its significance among childhood, adolescent, and young adult cancer survivors (CAYACS) remains unexplored. This article examines the application of the 13‐item Patient Activation Measure (
Charlotte Demoor‐Goldschmidt   +12 more
wiley   +1 more source

An approach to software maintenance support using a syntactic source code analyser data base : this thesis is presented in a partial fulfillment of the requirements for the degree of Master of Arts in Computer Science at Massey University [PDF]

open access: yes, 1987
In this thesis, the development of a software maintenance tool called a syntactic source code analyser (SSCA) is summarised. An SSCA supports other maintenance tools which interact with source code by creating a data base of source information which has ...
Parkin, Peter Vivian
core  

Exploring Preferences for a Digital Single‐Session Intervention for Adolescent Siblings of Youth With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro   +10 more
wiley   +1 more source

Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review

open access: yesComputers
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez   +1 more
doaj   +1 more source

Semantic Source Code Models Using Identifier Embeddings

open access: yes, 2019
The emergence of online open source repositories in the recent years has led to an explosion in the volume of openly available source code, coupled with metadata that relate to a variety of software development activities.
Efstathiou, Vasiliki   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy