-
41
Mining relevant solutions for programming tasks from search engine results
Published 2023-08-01Subjects: Get full text
Article -
42
An Approach Based on Sum Product Networks for Code Smells Detection
Published 2025-06-01Subjects: Get full text
Article -
43
Generative-assisted multi-stage integrated network: Tackling extreme noise in image denoisingThe source code and trained models are made publicly available at:
Published 2025-06-01“…These findings underscore the potential of GainNet for real-world applications in aerospace imaging, autonomous navigation, and medical diagnostics. The source code and trained models are made publicly available at https://github.com/AVIP-laboratory/Generative-assisted_multi-stage_integrated_network.…”
Get full text
Article -
44
L’écriture collective du code source informatique
Published 2012-03-01Subjects: Get full text
Article -
45
Software refactoring prediction evaluation method based on deep learning models
Published 2024-12-01Subjects: “…software engineering; deep learning; software refactoring; refactoring prediction; source code metrics…”
Get full text
Article -
46
-
47
Open-Source Data Logger System for Real-Time Monitoring and Fault Detection in Bench Testing
Published 2024-12-01Subjects: “…open-source code…”
Get full text
Article -
48
A Comprehensive Content-Based Recommendation System for Programming Problems Through Multi-Faceted Code Analysis
Published 2025-01-01Subjects: Get full text
Article -
49
MODERN MEANS OF ELECTRONIC PROCESSING OF SOCIO-ECONOMIC INFORMATION
Published 2017-05-01Subjects: Get full text
Article -
50
Integrating multiple precision livestock technologies to advance rangeland grazing management
Published 2025-08-01Subjects: Get full text
Article -
51
Long short‐term memory on abstract syntax tree for SQL injection detection
Published 2021-04-01Subjects: Get full text
Article -
52
Sparse signal transmission under lossy wireless links based on double process of compressive sensing
Published 2017-04-01Subjects: Get full text
Article -
53
PREDICTION OF NOISE FROM TURBULENT FLOW FOR AIRFOIL
Published 2016-11-01Subjects: Get full text
Article -
54
Information-theoretic bounds for accuracy of letter encoding and pattern recognition via ensembles of datasets M.M. Lange 1, A.M. Lange 1
Published 2024-06-01Subjects: “…source coding…”
Get full text
Article -
55
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. …”
Get full text
Article -
56
Converting the Bliss Bibliographic Classification to SKOS RDF using Python RDFLib
Published 2024-10-01“…This project focused on converting this source code into a SKOS RDF linked-data format using Python: first by parsing the source code, then using RDFLib to write the concepts, notation, relationships, and notes in RDF. …”
Get full text
Article -
57
A study on an efficient OSS inspection scheme based on encrypted GML
Published 2025-06-01“…Some services analyze source code and provide OSS-related data to solve these problems, a representative example being Blackduck. …”
Get full text
Article -
58
A Cross-Project Defect Prediction Model Based on Deep Learning With Self-Attention
Published 2022-01-01“…However, traditional features lack sufficient semantic information of source code resulting in poor performance of the prediction models. …”
Get full text
Article -
59
THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY
Published 2017-03-01“…If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”
Get full text
Article -
60
Optimization for threat classification of various data types-based on ML model and LLM
Published 2025-07-01“…This study proposed an ML and LLM integrated framework that could effectively detect source code vulnerabilities using abstract syntax trees (AST). …”
Get full text
Article