-
1
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01Subjects: Get full text
Article -
2
Sparse signal transmission under lossy wireless links based on double process of compressive sensing
Published 2017-04-01Subjects: Get full text
Article -
3
Information-theoretic bounds for accuracy of letter encoding and pattern recognition via ensembles of datasets M.M. Lange 1, A.M. Lange 1
Published 2024-06-01Subjects: “…source coding…”
Get full text
Article -
4
Detecting Source Code Plagiarism in Student Assignment Submissions Using Clustering Techniques
Published 2024-06-01Subjects: “…Source Code…”
Get full text
Article -
5
Feature dependence graph based source code loophole detection method
Published 2023-01-01Subjects: “…source code…”
Get full text
Article -
6
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: “…vulnerability detection for source code…”
Get full text
Article -
7
Software refactoring prediction evaluation method based on deep learning models
Published 2024-12-01Subjects: “…software engineering; deep learning; software refactoring; refactoring prediction; source code metrics…”
Get full text
Article -
8
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01Subjects: Get full text
Article -
9
MODERN MEANS OF ELECTRONIC PROCESSING OF SOCIO-ECONOMIC INFORMATION
Published 2017-05-01Subjects: Get full text
Article -
10
Improving source code suggestion with code embedding and enhanced convolutional long short‐term memory
Published 2021-06-01Subjects: Get full text
Article -
11
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01Subjects: Get full text
Article