Showing 41 - 60 results of 614 for search '"sources code"', query time: 0.08s Refine Results
  1. 41
  2. 42

    CVOTING: An Anonymous Ballot E-Voting System by Baghdad Science Journal

    Published 2018-03-01
    Subjects: “…e-voting, open source, code voting, QR code.…”
    Get full text
    Article
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47

    Software refactoring prediction evaluation method based on deep learning models by Yichi ZHANG, Yang ZHANG, Yanlei LI, Kun ZHENG, Wei LIU

    Published 2024-12-01
    Subjects: “…software engineering; deep learning; software refactoring; refactoring prediction; source code metrics…”
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55

    Quantization for Robust Distributed Coding by Xiaolin Wu, Abdul Bais, Nima Sarshar

    Published 2016-05-01
    “…A distributed source coding approach is proposed for robust data communications in sensor networks. …”
    Get full text
    Article
  16. 56

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article
  17. 57

    Vulnerability benchmark generation algorithm based on finite state machines by XIE Yuandong, YAN Xuexiong, ZHAO Guangsheng, ZHAO Xu, QIU Han

    Published 2025-06-01
    “…Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. …”
    Get full text
    Article
  18. 58

    THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY by V. I. Petrov

    Published 2017-03-01
    “…If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”
    Get full text
    Article
  19. 59

    Converting the Bliss Bibliographic Classification to SKOS RDF using Python RDFLib by Harry Bartholomew

    Published 2024-10-01
    “…This project focused on converting this source code into a SKOS RDF linked-data format using Python: first by parsing the source code, then using RDFLib to write the concepts, notation, relationships, and notes in RDF. …”
    Get full text
    Article
  20. 60

    A study on an efficient OSS inspection scheme based on encrypted GML by Seok-Joon Jang, Im-Yeong Lee, Daehee Seo, Su-Hyun Kim

    Published 2025-06-01
    “…Some services analyze source code and provide OSS-related data to solve these problems, a representative example being Blackduck. …”
    Get full text
    Article