-
41
-
42
CVOTING: An Anonymous Ballot E-Voting System
Published 2018-03-01Subjects: “…e-voting, open source, code voting, QR code.…”
Get full text
Article -
43
Mining relevant solutions for programming tasks from search engine results
Published 2023-08-01Subjects: Get full text
Article -
44
An Approach Based on Sum Product Networks for Code Smells Detection
Published 2025-06-01Subjects: Get full text
Article -
45
Sparse signal transmission under lossy wireless links based on double process of compressive sensing
Published 2017-04-01Subjects: Get full text
Article -
46
L’écriture collective du code source informatique
Published 2012-03-01Subjects: Get full text
Article -
47
Software refactoring prediction evaluation method based on deep learning models
Published 2024-12-01Subjects: “…software engineering; deep learning; software refactoring; refactoring prediction; source code metrics…”
Get full text
Article -
48
Open-Source Data Logger System for Real-Time Monitoring and Fault Detection in Bench Testing
Published 2024-12-01Subjects: “…open-source code…”
Get full text
Article -
49
A Comprehensive Content-Based Recommendation System for Programming Problems Through Multi-Faceted Code Analysis
Published 2025-01-01Subjects: Get full text
Article -
50
MODERN MEANS OF ELECTRONIC PROCESSING OF SOCIO-ECONOMIC INFORMATION
Published 2017-05-01Subjects: Get full text
Article -
51
Information-theoretic bounds for accuracy of letter encoding and pattern recognition via ensembles of datasets M.M. Lange 1, A.M. Lange 1
Published 2024-06-01Subjects: “…source coding…”
Get full text
Article -
52
Integrating multiple precision livestock technologies to advance rangeland grazing management
Published 2025-08-01Subjects: Get full text
Article -
53
Long short‐term memory on abstract syntax tree for SQL injection detection
Published 2021-04-01Subjects: Get full text
Article -
54
PREDICTION OF NOISE FROM TURBULENT FLOW FOR AIRFOIL
Published 2016-11-01Subjects: Get full text
Article -
55
Quantization for Robust Distributed Coding
Published 2016-05-01“…A distributed source coding approach is proposed for robust data communications in sensor networks. …”
Get full text
Article -
56
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
57
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. …”
Get full text
Article -
58
THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY
Published 2017-03-01“…If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”
Get full text
Article -
59
Converting the Bliss Bibliographic Classification to SKOS RDF using Python RDFLib
Published 2024-10-01“…This project focused on converting this source code into a SKOS RDF linked-data format using Python: first by parsing the source code, then using RDFLib to write the concepts, notation, relationships, and notes in RDF. …”
Get full text
Article -
60
A study on an efficient OSS inspection scheme based on encrypted GML
Published 2025-06-01“…Some services analyze source code and provide OSS-related data to solve these problems, a representative example being Blackduck. …”
Get full text
Article