Showing 601 - 620 results of 26,141 for search '"code"', query time: 0.13s Refine Results
  1. 601
  2. 602
  3. 603
  4. 604
  5. 605

    Code-Switching and Community: Navigating Identity Through in-Group Language by Carolle BLEY

    Published 2025-03-01
    “…Abstract: Code-switching, the practice of alternating between languages or linguistic varieties within a conversation, plays a pivotal role in shaping individual and collective identities within linguistic communities. …”
    Get full text
    Article
  6. 606

    Generalized Toric Codes on Twisted Tori for Quantum Error Correction by Zijian Liang, Ke Liu, Hao Song, Yu-An Chen

    Published 2025-06-01
    “…The Kitaev toric code is widely considered one of the leading candidates for error correction in fault-tolerant quantum computation. …”
    Get full text
    Article
  7. 607

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  8. 608
  9. 609
  10. 610
  11. 611

    Research of fast decoding for longer constraint length convolutional codes by HUANG Xiao-ling, YANG Hua-long

    Published 2010-01-01
    Subjects: “…convolutional codes;decoding algorithm;particle swarm optimization;decoding performance…”
    Get full text
    Article
  12. 612

    New information triggers prospective codes to adapt for flexible navigation by Stephanie M. Prince, Sarah Danielle Cushing, Teema A. Yassine, Navya Katragadda, Tyler C. Roberts, Annabelle C. Singer

    Published 2025-05-01
    “…When mice did not adapt, prefrontal choice codes failed to switch. Prospective codes were dependent on the amount of behavioral adaptation needed; the new goal arm was represented more strongly when animals needed to change their behavior more. …”
    Get full text
    Article
  13. 613
  14. 614
  15. 615

    Using pseudo-AI submissions for detecting AI-generated code by Shariq Bashir

    Published 2025-05-01
    Subjects: “…programming code plagiarism detection…”
    Get full text
    Article
  16. 616

    Research on malicious code variants detection based on texture fingerprint by Xiao-guang HAN, UWu Q, AOXuan-xia Y, UOChang-you G, Fang ZHOU

    Published 2014-08-01
    “…The texture fingerprint of a malware is the set of texture fingerprints for each uncompressed gray-scale image block. The ma-licious code is mapped to uncompressed gray-scale image by integrating image analysis techniques and variants of mali-cious code detection technology. …”
    Get full text
    Article
  17. 617

    Some Coding Theorems for Nonadditive Generalized Mean-Value Entropies by Satish Kumar, Gurdas Ram, Vishal Gupta

    Published 2012-01-01
    “…The main instrument is the 𝑙(𝑛𝑖) function of the word lengths in obtaining the average length of the code.…”
    Get full text
    Article
  18. 618
  19. 619
  20. 620