-
61
Joint source–channel rate allocation with unequal error protection for space image transmission
Published 2017-07-01“…In the traditional space image transmission system design, the source coding module and channel coding module are separated. …”
Get full text
Article -
62
Source Quantization and Coding over Noisy Channel Analysis
Published 2024-11-01“…Recently, lossy source coding based on linear block code has been designed using the duality principle, i.e., the channel decoding algorithm is employed to realize the lossy source coding. …”
Get full text
Article -
63
A Cross-Project Defect Prediction Model Based on Deep Learning With Self-Attention
Published 2022-01-01“…However, traditional features lack sufficient semantic information of source code resulting in poor performance of the prediction models. …”
Get full text
Article -
64
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
Get full text
Article -
65
Optimization for threat classification of various data types-based on ML model and LLM
Published 2025-07-01“…This study proposed an ML and LLM integrated framework that could effectively detect source code vulnerabilities using abstract syntax trees (AST). …”
Get full text
Article -
66
Finetuning Large Language Models for Vulnerability Detection
Published 2025-01-01“…This demonstrates the potential for transfer learning by finetuning large pretrained language models for specialized source code analysis tasks.…”
Get full text
Article -
67
MAGECODE: Machine-Generated Code Detection Method Using Large Language Models
Published 2024-01-01“…The model-based MGT methods often encounter difficulties when dealing with source code due to disparities in semantics compared to natural languages. …”
Get full text
Article -
68
GestUI: A Model-driven Method and Tool for Including Gesture-based Interaction in User Interfaces
Published 2016-04-01“…As a result, gesture specifications are now being hard-coded by developers at the source code level that hinders their reusability and portability. …”
Get full text
Article -
69
Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells
Published 2025-01-01“…Furthermore, some machine learning classification models were evaluated on a subset of the source code features while ignoring significant features during classification. …”
Get full text
Article -
70
A New Energy-Efficient Data Transmission Scheme Based on DSC and Virtual MIMO for Wireless Sensor Network
Published 2015-01-01“…DSC-MIMO compresses the source data using distributed source coding before transmitting, which is different from the existing communication schemes. …”
Get full text
Article -
71
A web-application vulnerability detection model
Published 2019-06-01“…A web-application vulnerability detection model based on static analysis of source codes is proposed. Evaluation system used by the vulnerability detection model is described. …”
Get full text
Article -
72
Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism
Published 2025-06-01“…A specific attention mechanism was designed that simultaneously analyzed both contract source code and bytecode, achieving bidirectional mapping and complementary enhancement between high-level semantic features in source code and low-level execution flows in bytecode, thereby enriching feature representation. …”
Get full text
Article -
73
Decoding the Source of Wealth Creation
Published 2020-10-01“…Especially, in the software sector where source code holds the key to wealth creation majority chose to keep it closed to mint wealth. …”
Get full text
Article -
74
Software Defect Prediction Based on Effective Fusion of Multiple Features
Published 2025-01-01“…Therefore, this paper proposes a software defect prediction model based on the effective fusion of multiple features, named DP-SSCT (Semantics, Source Code, and Tradition). The model integrates traditional features, source code features, and semantic features. …”
Get full text
Article -
75
Nonplanar Crack Growth Simulation of Multiple Cracks Using Finite Element Method
Published 2020-01-01“…This analysis was performed by using the developed source code software written by Visual Fortran Language. …”
Get full text
Article -
76
A Novel Approach to Automate Complex Software Modularization Using a Fact Extraction System
Published 2022-01-01“…To this goal, information extraction tools use exact approaches to extract entities and their corresponding relationships from source code. Such exact approaches extract all features, including those that are less prominent and may not be significant for modularization. …”
Get full text
Article -
77
Predicting Fluid Properties in the MUFITS Reservoir Simulator with User-Supplied Modules
Published 2021-01-01“…Furthermore, we supplement the article with the source code of two simple EoS-modules that can serve as templates in other modelling and software development efforts. …”
Get full text
Article -
78
A tool-supported approach to integrate cognitive indicators into the Visual Studio Code
Published 2025-06-01“…Addressing this crucial gap, CognIDE enriches VS Code by offering actionable contextual cues alongside dynamic source code. The evaluation of CognIDE, involving a survey with six industry professionals and in-depth interviews, examined its perceived utility, ease of use, and real-world applicability. …”
Get full text
Article -
79
Encouraging reusability of computational research through Data-to-Knowledge Packages - A hydrological use case [version 2; peer review: 2 approved]
Published 2025-07-01“…The D2K-Package’s core is the reproducible basis composed of the data and source code on which an analysis is based. This core is designed such that the other components can be derived from it. …”
Get full text
Article -
80
A WEB-APPLICATION QUALITY EVALUATION METHOD BASED ON VULNERABILITY DETECTION
Published 2018-05-01“…This article introduces a method of web-application quality evaluation based on static analysis of the source code. A model for SQL-injection vulnerability detection and a web-application quality model based on the results of vulnerability detection that extends the ISO/IEC 25010 quality model are described.…”
Get full text
Article