Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 181 - 200 results of 614 for search '"source code"', query time: 0.06s Refine Results
  1. 181

    ComplexityMeasures.jl: Scalable software to unify and accelerate entropy and complexity timeseries analysis. by George Datseris, Kristian Agasøster Haaga

    Published 2025-01-01
    “…The software provides 1638 measures with 3,841 lines of source code, averaging only 2.3 lines of code per exported quantity (version 3.7). …”
    Get full text
    Article
  2. 182

    Software preservation by Tadej Vodopivec

    Published 2011-01-01
    “…The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program – e.g. media response to it ...), where and how? …”
    Get full text
    Article
  3. 183

    A Transdisciplinary Approach to Confrontation Between Self and Other: Factors Influencing the Emergence and Acceptance of Translational Language in Target Language by Mohammad Reza Rezaeian Delouei

    Published 2022-02-01
    “…A translated text emerges as a third code via the source code being confronted by the target code (i.e. the confrontation between Self and Other). …”
    Get full text
    Article
  4. 184

    Let’s get it started: Eye tracking in VR with the Pupil Labs eye tracking add-on for the HTC Vive by Judith Josupeit

    Published 2023-06-01
    “…As add-on technology with all relevant source code available on GitHub, a high degree of freedom in preprocessing, visualizing, and analyzing eye tracking data in VR can be achieved. …”
    Get full text
    Article
  5. 185

    Multidimensional Small Baseline Subset (MSBAS) Software for Constrained and Unconstrained Deformation Analysis of Partially Coherent DInSAR and Speckle Offset Data by Sergey V. Samsonov

    Published 2024-12-01
    “…The manuscript serves as a comprehensive manual for the MSBAS Software Version 10. The source code is available.…”
    Get full text
    Article
  6. 186

    Assessing Evolution of Microservices Using Static Analysis by Amr S. Abdelfattah, Tomas Cerny, Jorge Yero Salazar, Xiaozhou Li, Davide Taibi, Eunjee Song

    Published 2024-11-01
    “…It focuses on two holistic viewpoints of inter-service interaction and data perspectives derived through static analysis of the system’s source code. The approach is demonstrated with a case study using established microservice system benchmarks.…”
    Get full text
    Article
  7. 187

    Establishing Performance Baselines for Secure Software Development by Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong

    Published 2025-01-01
    “…In this context, enterprise programmers often rely on open-source software from social platforms to accelerate application development. However, the source code on these platforms may not always be regularly updated or well-maintained, posing security risks. …”
    Get full text
    Article
  8. 188

    A Model-Driven Architecture Solution for Multi-Platform Mobile App Development by Ayoub Korchi, Mohamed Karim Khachouch, Younes Lakhrisi

    Published 2024-01-01
    “…Our approach leverages the Acceleo code generation tool to transform Platform Independent Models (PIMs) adhering to this metamodel into platform-specific source code. We demonstrate the effectiveness of our method through a case study, generating Android user interface code from a sample PIM. …”
    Get full text
    Article
  9. 189

    A CAE model-based secure deduplication method by Chunbo Wang, Guoying Zhang, Hui Qi, Bin Chen

    Published 2025-07-01
    “…Experiments conducted on the source code dataset indicate that the proposed approach yields superior deduplication efficiency, reduced model storage requirements, and a more uniform distribution.…”
    Get full text
    Article
  10. 190

    Searching for Similar Subgraphs in an Unweighted Undirected Graph by Computing Isomorphic Path Sets by Valentin Sysoev, Aleksandr Bykov

    Published 2024-03-01
    “…Graphs are highly successful models for both visualization and handling complex relationships, such as those represented in semantic networks or even source code of programs. One of the most important tasks in analyzing such data models is the problem of finding similar subgraphs. …”
    Get full text
    Article
  11. 191

    Light scalars within the CP $$ \mathcal{CP} $$ -conserving Aligned-two-Higgs-doublet model by Antonio M. Coutinho, Anirban Karan, Víctor Miralles, Antonio Pich

    Published 2025-02-01
    “…Depending on which new scalar (scalars) is (are) light, seven different scenarios may be considered. Using the open-source code HEPfit, which relies on Bayesian statistics, we perform global fits for all seven light-mass scenarios. …”
    Get full text
    Article
  12. 192

    mdciao: Accessible Analysis and Visualization of Molecular Dynamics Simulation Data. by Guillermo Pérez-Hernández, Peter W Hildebrand

    Published 2025-04-01
    “…Finally, the fully documented Python API allows users to include the basic or advanced mdciao functions in their analysis workflows, and provides numerous examples and Jupyter Notebook Tutorials. The source code is published under the GNU Lesser General Public License v3.0 or later and hosted on https://github.com/gph82/mdciao, and the documentation, including guides and examples, can be found at https://www.mdciao.org.…”
    Get full text
    Article
  13. 193

    Using a Bounded Model Checker for Test Generation: How to Kill Two Birds with One SMT-solver by Maxim Petrov, Kirill Gagarski, Mikhail Belyaev, Vladimir Itsykson

    Published 2014-12-01
    “…This process is very similar to the bounded model checking, which also has to deal with generating models from a source code, asserting logic properties in it and process the returned model. …”
    Get full text
    Article
  14. 194

    A Novel Solution for Seepage Problems Implemented in the Abaqus UEL Based on the Polygonal Scaled Boundary Finite Element Method by Yang Yang, Zongliang Zhang, Yelin Feng, Kun Wang

    Published 2022-01-01
    “…Hence, the proposed method is robust and accurate for solving steady-state and transient seepage problems. The developed UEL source code and the associated input files can be downloaded from GitHub.…”
    Get full text
    Article
  15. 195

    Multi-Band NIR Colorization via Dual-Teacher Color and Structure Distillation by Tae-Sung Park, Young-Min Jeong, Jong-Ok Kim

    Published 2025-01-01
    “…Our model retains color consistency and detailed structure information of objects. The source code and datasets will be available at <uri>https://github.com/ymin2570/Multi-Band-NIR-colorization/</uri>.…”
    Get full text
    Article
  16. 196

    IC2Bert: masked gene expression pretraining and supervised fine tuning for robust immune checkpoint blockade (ICB) response prediction by Seongyong Park, Seonkyu Kim, Peng Jiang

    Published 2025-08-01
    “…The IC2Bert model and its source code are publicly available on GitHub: https://github.com/data2intelligence/ic2bert .…”
    Get full text
    Article
  17. 197

    Semi-supervised contrastive learning variational autoencoder Integrating single-cell multimodal mosaic datasets by Zihao Wang, Zeyu Wu, Minghua Deng

    Published 2025-08-01
    “…The results demonstrate that, compared to state-of-the-art multimodal data integration methods, scGCM offers significant advantages in clustering accuracy and data consistency. The source code of scGCM can be accessed at https://github.com/closmouz/scCGM .…”
    Get full text
    Article
  18. 198

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  19. 199

    Eye-tracking en masse: Group user studies, lab infrastructure, and practices by Maria Bielikova, Martin Konopka, Jakub Simko, Robert Moro, Jozef Tvarozek, Patrik Hlavac, Eduard Kuric

    Published 2018-08-01
    “…With this paper, we also publish the source code and the documentation of our system to be re-used.…”
    Get full text
    Article
  20. 200

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Comprehensive experimental evaluations of the COCO2017 fog-augmented dataset indicate that the proposed algorithm surpasses current state-of-the-art techniques in various assessment metrics, including precision, recall, and mean average precision (mAP). Our source code is available at: https://github.com/PaTinLei/EOD.…”
    Get full text
    Article