Results 61 to 70 of about 11,579,038 (330)
Academic Source Code Plagiarism Detection by Measuring Program Behavioral Similarity
Source code plagiarism is a long-standing issue in tertiary computer science education. Many source code plagiarism detection tools have been proposed to aid in the detection of source code plagiarism.
Hayden Cheers+2 more
doaj +1 more source
The development of software projects consists of several stages, such as analysis and design. It also requires a set of skills that the software developer can use to work on the project, such as specifying the requirements and writing code.
Alfaroq O.M. Mohammed+2 more
doaj +1 more source
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human ...
Razvan Raducu+3 more
doaj +1 more source
ORB-SLAM2: An Open-Source SLAM System for Monocular, Stereo, and RGB-D Cameras [PDF]
We present ORB-SLAM2, a complete simultaneous localization and mapping (SLAM) system for monocular, stereo and RGB-D cameras, including map reuse, loop closing, and relocalization capabilities. The system works in real time on standard central processing
Raul Mur-Artal, J. D. Tardós
semanticscholar +1 more source
Implementation of an Arduino controller for temporary traffic regulation in one lane with semaphores [PDF]
The purpose of this article is to present the use of an Arduino controller for a road semaphore to regulate traffic in directions in one lane. An Arduino starter kit is used.
Julian Vasilev+4 more
doaj
Lossy joint source-channel coding in the finite blocklength regime [PDF]
This paper finds new tight finite-blocklength bounds for the best achievable lossy joint source-channel code rate, and demonstrates that joint source-channel code design brings considerable performance advantage over a separate one in the non-asymptotic ...
Kostina, Victoria, Verdú, Sergio
core +6 more sources
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue.
Runhao Li+3 more
doaj +1 more source
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language.
Uzzal Kumar Acharjee+5 more
doaj +1 more source
Semantic Source Code Models Using Identifier Embeddings
The emergence of online open source repositories in the recent years has led to an explosion in the volume of openly available source code, coupled with metadata that relate to a variety of software development activities.
Efstathiou, Vasiliki+1 more
core +1 more source
Multi-modal Attention Network Learning for Semantic Source Code Retrieval [PDF]
Code retrieval techniques and tools have been playing a key role in facilitating software developers to retrieve existing code fragments from available open-source repositories given a user query (e.g., a short natural language text describing the ...
Yao Wan+6 more
semanticscholar +1 more source