-
201
ESOMICS: ML-Based Timing Behavior Analysis for Efficient Mixed-Criticality System Design
Published 2024-01-01“…This article introduces ESOMICS, a novel scheme, to obtain appropriate WCET for LO modes, in which we propose an ML-based approach for WCET estimation based on the application’s source code analysis and the model training using a comprehensive data set. …”
Get full text
Article -
202
A general-purpose code for correlated sampling using batch statistics with MCNP6 for fixed-source problems [version 1; peer review: 2 approved]
Published 2024-03-01“…Background Correlated sampling can be applied with batch statistics using MCNP6’s tally fluctuation chart (TFC) to reduce the uncertainty of a difference of tallies between a base case and a perturbed case without modifying the source code. The cases are correlated if they are run with the same random number sequence. …”
Get full text
Article -
203
Robust sparse smooth principal component analysis for face reconstruction and recognition.
Published 2025-01-01“…Additionally, visualization of the generalized eigenfaces provides intuitive insights into how sparse and smooth constraints influence the feature extraction process. The data and source code from this study have been made publicly available on the GitHub repository: https://github.com/yuzhounh/RSSPCA.…”
Get full text
Article -
204
Result Assessment Tool (RAT): empowering search engine data analysis
Published 2025-07-01“…RAT Backend includes modules for collecting search results, extracting source code, and adding classifiers for automated analysis. …”
Get full text
Article -
205
Bayesian network structure learning by opposition-based learning
Published 2025-05-01“…Experimental results show that the proposed algorithm achieves better performances than other state-of-the-art structure learning algorithms when the sample size is 500. The source code of the paper can be found at this link: https://github.com/sunbaodan-hrbeu/paper_code .…”
Get full text
Article -
206
TIBA: A web application for the visual analysis of temporal occurrences, interactions, and transitions of animal behavior.
Published 2024-10-01“…The web application and usage instructions are available at tiba.inf.uni-konstanz.de. The source code is publicly available on GitHub: github.com/LSI-UniKonstanz/tiba.…”
Get full text
Article -
207
Trajectory-Based Road Autolabeling With Lidar-Camera Fusion in Winter Conditions
Published 2025-01-01“…Our method outperforms recent standalone camera- and lidar-based methods when evaluated with a challenging winter driving dataset, including countryside and suburban driving scenes. The source code is available at <uri>https://github.com/eerik98/lidar-camera-road-autolabeling.git</uri>. …”
Get full text
Article -
208
DEGNN: A Deep Learning-Based Method for Unmanned Aerial Vehicle Software Security Analysis
Published 2025-02-01“…The binary code similarity analysis method offers a way to analyze drone firmware lacking source code. This paper proposes DEGNN, a novel graph neural network for binary code similarity analysis. …”
Get full text
Article -
209
A Multilayer Residual Dendritic Neural Model for Predicting Stroke Prognosis
Published 2025-01-01“…Evaluations using one public and two private stroke prognosis datasets demonstrate that RDNM significantly outperforms original DNM and state-of-the-art deep-learning methods, highlighting its potential for clinical applications. Source code is available at <uri>https://github.com/jhc050998/RDNM</uri>.…”
Get full text
Article -
210
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
211
A Benchmark for Multi-Task Evaluation of Pretrained Models in Medical Report Generation
Published 2025-01-01“…Our findings indicate that medical foundation pre-trained models generally outperform other pre-trained models across all tasks, while natural domain pre-trained models exhibit superior performance in cross-modality tasks. Our source code is available at https://github.com/Reckless0/MT-Med.git.…”
Get full text
Article -
212
New experimental techniques for fracture testing of highly deformable materials
Published 2015-12-01“…A comparison with the open source code Ncorr and with some FEM results is also presented. …”
Get full text
Article -
213
AICOM-MP: an AI-based monkeypox detector for resource-constrained environments
Published 2024-12-01“…We have hosted AICOM-MP as a web service to allow universal access to monkeypox screening technology, and open-sourced both the source code and the dataset of AICOM-MP to allow health AI professionals to integrate AICOM-MP into their services.…”
Get full text
Article -
214
calibrar: An R package for fitting complex ecological models
Published 2025-03-01“…For more experienced users, calibrar allows the implementation of user‐defined objective functions. The package source code is fully accessible and can be installed directly from CRAN.…”
Get full text
Article -
215
Making JavaScript Render Decisions to Optimize Security-Oriented Crawler Process
Published 2024-01-01“…By utilizing a dataset containing the source code from the main pages of 17,160 websites, our experimental results demonstrate a 20% reduction in execution time compared to full JavaScript rendering, indicating an improvement in resource usage without any significant reduction in coverage. …”
Get full text
Article -
216
GestUI: A Model-driven Method and Tool for Including Gesture-based Interaction in User Interfaces
Published 2016-04-01“…As a result, gesture specifications are now being hard-coded by developers at the source code level that hinders their reusability and portability. …”
Get full text
Article -
217
Enhancing configuration security with heterogeneous read points
Published 2025-03-01“…Abstract Configuration files are widely used for customizing the status and behavior of cloud systems without modifying source code. The configurable system performs flexibly to meet different requirements. …”
Get full text
Article -
218
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…ARLClustering is now available on the CRAN repository, with its source code accessible on GitHub. It serves as a valuable tool for researchers and practitioners, not only enhancing community detection techniques in social network analysis but also introducing a novel approach to uncover hidden communities through experimental studies on real-world social network datasets.…”
Get full text
Article -
219
Taxi origin and destination demand prediction based on deep learning: a review
Published 2023-09-01“…Finally, we provide public datasets and open-source code, along with suggestions for future research directions.…”
Get full text
Article -
220
Sonic Boom Impact Assessment of European SST Concept for Milan to New York Supersonic Flight
Published 2025-05-01“…Aerodynamic numerical simulations were carried out using an open-source code to capture near-field pressure signatures at three critical mission points. …”
Get full text
Article