Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 121 - 140 results of 614 for search '"source code"', query time: 0.09s Refine Results
  1. 121

    Efficient preconditioning strategies for accelerating GMRES in block-structured nonlinear systems for image deblurring. by Rizwan Khalid, Shahbaz Ahmad, Mohamed Medani, Yahia Said, Iftikhar Ali

    Published 2025-01-01
    “…The preconditioned matrices' eigenvalues cluster around 1, indicating a beneficial spectral distribution. The source code is available at https://github.com/shahbaz1982/Precondition-Matrix.…”
    Get full text
    Article
  2. 122

    Attack signature generation by traceable dynamic taint analysis by Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG

    Published 2012-05-01
    “…Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack signature generation method based on an innovative traceable dynamic taint analysis framework was proposed.By monitoring the vulnerable process execution,the executing trace and the constrain conditions exactly related to input data exploiting the vulnerability was extracted.Finally,by restoring the execution context and supplementing the determinant statements an executable Turing machine signature was attained.A prototype system was implemented and evaluated with different attack samples,which proved that the proposed method was able to generate accurate attack signature fast.…”
    Get full text
    Article
  3. 123

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article
  4. 124

    An architecture as a code framework to manage documentation of IT projects by Christophe Gaie, Bertrand Florat, Steven Morvan

    Published 2025-01-01
    “…Design/methodology/approach – They provide a simple tool based on five complementary views, which should be detailed by the project team using a classic source code management platform. Findings – The proposed tool is open source and may be reused by any IT team in various project contexts and heterogeneous development methods. …”
    Get full text
    Article
  5. 125

    Measurement of schizophrenia symptoms through speech analysis from PANSS interview recordings by Michelle Worthington, Michelle Worthington, Georgios Efstathiadis, Vijay Yadav, Vijay Yadav, Isaac Galatzer-Levy, Isaac Galatzer-Levy, Isaac Galatzer-Levy, Alan Kott, Emanuel Pintilii, Tejendra Patel, Colin Sauder, Inder Kaul, Stephen Brannan, Anzar Abbas

    Published 2025-06-01
    “…Speech collection for digital phenotyping is often dependent on platforms built using closed-source code and associated with patient and clinician burden. …”
    Get full text
    Article
  6. 126

    Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting by Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu

    Published 2024-12-01
    “…For real-world attacks, the source code is typically unavailable, which poses a challenge for locating the COs thus reducing the effectiveness of many methods. …”
    Get full text
    Article
  7. 127

    Runtime Instrumentation of SystemC/TLM2 Interfaces for Fault Tolerance Requirements Verification in Software Cosimulation by Antonio da Silva, Pablo Parra, Óscar R. Polo, Sebastián Sánchez

    Published 2014-01-01
    “…This technique can be applied after the elaboration phase and needs neither source code modifications nor recompilation of the top level SystemC modules. …”
    Get full text
    Article
  8. 128

    Designing and Interpreting a Mathematical Programming Language by Hüseyin Pehlivan

    Published 2019-12-01
    “…In this article, a programming language that supports the use of mathematical function structures is designed and an interpreter, which can evaluate the source code written in this language, is developed. …”
    Get full text
    Article
  9. 129

    Selecting a Monitoring Technology for a Control System of Distributed Oil Production Facilities by Mykhaylo Lobur, Mykola Maliar

    Published 2024-06-01
    “…The important factors that determined the choice of this platform were the availability of the open source code and a large library of ready-made templates for displaying the well parameters in real time. …”
    Get full text
    Article
  10. 130

    Enhancing Constitutive Models for Soils: Adding the Capability to Model Nonlinear Small Strain in Shear by S. Seyedan, W. T. Sołowski

    Published 2019-01-01
    “…The validation simulations of the undrained triaxial tests on London Clay and Ham River sand with the upgraded constitutive models replicate the experiments clearly better than the base models, without any changes to existing model parameters and the core source code associated with the base model.…”
    Get full text
    Article
  11. 131

    Problems in Determining the Consumer Value of a Software Product by A. I. Semikalenova

    Published 2018-12-01
    “…Five stages of creating a software product are considered: pre-design planning, software design (architecture), writing the source code, building the executable program itself, and drafting software documentation for the final product. …”
    Get full text
    Article
  12. 132

    Exploring Gender Differences in Fatwa through Machine Learning by Emad Mohamed, Raheem Sarwar

    Published 2024-06-01
    “…We intend to share both the dataset and the source code openly with the research community.…”
    Get full text
    Article
  13. 133

    Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM by Shuangxi CHEN, Ruoyan ZHAO, Hui LIU, Chunming WU, Wei RUAN

    Published 2021-07-01
    “…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system.As one of the two core algorithms of virtual machine dynamic migration, Post-Copy algorithm has been a hot issue for scholars at home and abroad for its advantages of stable migration time and short migration downtime.The fault tolerance mechanism of virtual machine, the connection between the transfer mode of memory page and the page missing error during the migration process, and the source code of QEMU-KVM platform were studied.A fault tolerant method based on transaction synchronization was proposed to improve the stability of the Post-Copy migration algorithm.The experimental results show that the proposed algorithm can ensure the fast repair of deep end virtual machine failure, target virtual machine failure and network fault during the migration process, and solve the stability problem at a small cost.The method proposed effectively improves the stability of the Post-Copy migration algorithm, and provides reference for the future optimization research direction.…”
    Get full text
    Article
  14. 134

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  15. 135

    Uji Plagiarism pada Tugas Mahasiswa Menggunakan Algoritma Winnowing by Moh Sadly Ramli, Sugiarto Cokrowibowo, Muh Fahmi Rustan

    Published 2021-12-01
    “…In this study the authors used the winnowing algorithm to detect plagiarism in student assignments, namely programming source code, from the results of research conducted on 10 student assignments using the winnowing algorithm produced various similarity values as a percentage of similarity between two students tasks compared. …”
    Get full text
    Article
  16. 136

    eminus — Pythonic electronic structure theory by Wanja Timm Schulze, Sebastian Schwalbe, Kai Trepte, Stefanie Gräfe

    Published 2025-02-01
    “…The open-source idea offers the advantage of having a source code base that can be reviewed and modified by the community. …”
    Get full text
    Article
  17. 137

    Design of an open-source software system for water temperature monitoring by Joao E. M. Perea Martins

    Published 2025-09-01
    “…This article details the Arduino and the computer source code programs, and the satisfactory system results have motivated the work presentation.…”
    Get full text
    Article
  18. 138

    Hybrid Obfuscation Using Signals and Encryption by Bahare Hashemzade, Ali Maroosi

    Published 2018-01-01
    “…In this study, a new dispatcher was added to the source code to reconstruct the original control flow graph from the hidden one to solve the problem of the signal method. …”
    Get full text
    Article
  19. 139

    Numerical simulation of the flow rate effect on the evolution of a negatively buoyant water jet by Oumaima Eleuch, Noureddine Latrache, Sobhi Frikha, Abderrahmane Khechekhouche, Zied Driss

    Published 2020-12-01
    “…A finite volume discretization method using Open Source code given in Open Foam 2.3.0. was used to solve these equations. …”
    Get full text
    Article
  20. 140

    Using d2d for Writing XML by Markus Lepper, Baltasar Trancón y Widemann

    Published 2025-01-01
    “…All source texts are in the public domain; a publication on an open-source code repository is in preparation.…”
    Get full text
    Article