Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 81 - 100 results of 614 for search '"source code"', query time: 0.06s Refine Results
  1. 81

    GDBMiner: Mining Precise Input Grammars on (Almost) Any System by Eisele, Max, Hägele, Johannes, Huth, Christopher, Zeller, Andreas

    Published 2025-04-01
    “…However, current grammar mining tools place huge demands on the source code they are applied on, or are too imprecise, both preventing adoption in industrial practice. …”
    Get full text
    Article
  2. 82

    Encouraging reusability of computational research through Data-to-Knowledge Packages - A hydrological use case [version 2; peer review: 2 approved] by Markus Konkol, Sami Domisch, Astra Labuce, Vanessa Bremerich, Merret Buurman

    Published 2025-07-01
    “…The D2K-Package’s core is the reproducible basis composed of the data and source code on which an analysis is based. This core is designed such that the other components can be derived from it. …”
    Get full text
    Article
  3. 83

    Software Development Process Considerations in GNSS-Denied Navigation Project for Drones by Sebastian Rutkowski, Cezary Szczepański

    Published 2024-11-01
    “…The process was implemented in an environment where software developers were oriented to developing a source code only and who showed great reluctance to follow any formal process. …”
    Get full text
    Article
  4. 84

    A WEB-APPLICATION QUALITY EVALUATION METHOD BASED ON VULNERABILITY DETECTION by D. E. Onoshko, V. V. Bakhtizin

    Published 2018-05-01
    “…This article introduces a method of web-application quality evaluation based on static analysis of the source code. A model for SQL-injection vulnerability detection and a web-application quality model based on the results of vulnerability detection that extends the ISO/IEC 25010 quality model are described.…”
    Get full text
    Article
  5. 85

    The Effectiveness of Large Language Models in Transforming Unstructured Text to Standardized Formats by William Brach, Kristian Kostal, Michal Ries

    Published 2025-01-01
    “…For further information, source code, and associated resources, please refer to the source code repository (<uri>https://github.com/fiit-ba/text-to-cooklang</uri>).…”
    Get full text
    Article
  6. 86

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…Vulnerabilities in the source code are one of the main causes of potential threats in software-intensive systems. …”
    Get full text
    Article
  7. 87

    A WEB-APPLICATION QUALITY EVALUATION METHOD BASED ON VULNERABILITY DETECTION by D. E. Onoshko, V. V. Bakhtizin

    Published 2018-05-01
    “…This article introduces a method of web-application quality evaluation based on static analysis of the source code. A model for SQL-injection vulnerability detection and a web-application quality model based on the results of vulnerability detection that extends the ISO/IEC 25010 quality model are described.…”
    Get full text
    Article
  8. 88

    THE METHOD OF ACCESS ISOLATION IN OBJECT-ORIENTED SOFTWARE SYSTEM by A. F. Chipiga, A. A. Ereschenko, L. A. Alpeeva

    Published 2022-10-01
    “…During the software system's designing and development process it is suggested to define the basic access distinction rules between the objects of corresponding classes directly in the source code when defining the classes themselves and the classes' inheritance hierarchy. …”
    Get full text
    Article
  9. 89

    Factor Graphs for Navigation Applications: A Tutorial by Clark Taylor, Jason Gross

    Published 2024-07-01
    “…A brief survey of previous applications of factor graphs to navigation problems is also presented. Source code for the extended Kalman filter comparison and for generating the graphs in this paper is available at https://github.com/cntaylor/factorGraph2DsatelliteExample.…”
    Get full text
    Article
  10. 90

    REENGINEERING OF OPEN SOFTWARE SYSTEM OF 3D MODELING BRL-CAD by Stanislav Velykodniy

    Published 2019-09-01
    “…The present study summarizes the results of experimental studies; source code translation results are analyzed and summarized, the main one being the reduction in the complexity of creating open source software using the BRL-CAD example. …”
    Get full text
    Article
  11. 91

    SCUP-HPC: System for Constructing and Utilizing Provenance on High-Performance Computing Systems by Yuta Namiki, Takeo Hosomi, Hideyuki Tanushi, Akihiro Yamashita, Susumu Date

    Published 2025-01-01
    “…To ensure the reproducibility on an HPC system, the provenance must describe the following relationships: 1) executed programs and the corresponding job definition submitted to a workload manager, 2) the program and its source code, and 3) the program and its input/output files. …”
    Get full text
    Article
  12. 92

    Russian local trends in software development and implementation by D. S. Pashchenko

    Published 2018-04-01
    “…The expert’s panel reviewed the change in costs and efforts in software development projects connected with stricter requirements for collecting and storing personal data, evaluated import substitution of system and application software and determined the possibilities of using technologies, based on open-source code. The results of the study are accompanied by brief recommendations of the author.…”
    Get full text
    Article
  13. 93

    Spglib: a software library for crystal symmetry search by Atsushi Togo, Kohei Shinohara, Isao Tanaka

    Published 2024-12-01
    “…An iterative algorithm is employed to robustly identify space group types, tolerating a certain amount of distortion in the crystal structures. The source code is distributed under the 3-Clause BSD License, a permissive open-source software license. …”
    Get full text
    Article
  14. 94

    Powerlaw: a Python package for analysis of heavy-tailed distributions. by Jeff Alstott, Ed Bullmore, Dietmar Plenz

    Published 2014-01-01
    “…Notably, it also seeks to support a variety of user needs by being exhaustive in the options available to the user. The source code is publicly available and easily extensible.…”
    Get full text
    Article
  15. 95

    Software watermarking scheme with cloud computing constraints by Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU

    Published 2016-09-01
    “…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
    Get full text
    Article
  16. 96

    Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic by Marat Akhin, Vladimir Itsykson

    Published 2015-03-01
    “…A lot of different clone detection approaches have been proposed over the years to deal with this problem, but almost all of them do not consider semantic properties of the source code. We propose to reinforce traditional tree-based clone detection algorithms by using additional information about variable slices. …”
    Get full text
    Article
  17. 97

    LLVM-based Static Analysis Tool Using Type and Effect Systems by M. A. Belyaev, V. A. Tsesko

    Published 2011-12-01
    “…The approach taken is to research feasibility of designing instruments for static analysis by applying known type and effect system based algorithms for detecting defects to LLVM bitcode language and effectively to the original source code.…”
    Get full text
    Article
  18. 98

    Structural properties and static robustness of Linux software network by Ershen WANG, Yu LI, Chen HONG, Qinghua SUN, Chang LIU

    Published 2019-11-01
    “…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
    Get full text
    Article
  19. 99

    Numerical simulation of the crack 2D by the finite element incorporated the discontinuity by Nguyen Truong Giang

    Published 2008-07-01
    “…The elements employ discontinuous functions and the facture mechanics two dimensional asymptotic crack tip displacement fields. The Fortran source code of Cast3M applies these elements to a set of examples. …”
    Get full text
    Article
  20. 100

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article