Showing 61 - 80 results of 614 for search '"sources code"', query time: 0.05s Refine Results
  1. 61

    Joint source–channel rate allocation with unequal error protection for space image transmission by Dan Dong, Shaohua Wu, Dongqing Li, Jian Jiao, Chanjuan Ding, Qinyu Zhang

    Published 2017-07-01
    “…In the traditional space image transmission system design, the source coding module and channel coding module are separated. …”
    Get full text
    Article
  2. 62

    Source Quantization and Coding over Noisy Channel Analysis by Runfeng Wang, Dan Song, Jinkai Ren, Lin Wang, Zhiping Xu

    Published 2024-11-01
    “…Recently, lossy source coding based on linear block code has been designed using the duality principle, i.e., the channel decoding algorithm is employed to realize the lossy source coding. …”
    Get full text
    Article
  3. 63

    A Cross-Project Defect Prediction Model Based on Deep Learning With Self-Attention by Wanzhi Wen, Ruinian Zhang, Chuyue Wang, Chenqiang Shen, Meng Yu, Suchuan Zhang, Xinxin Gao

    Published 2022-01-01
    “…However, traditional features lack sufficient semantic information of source code resulting in poor performance of the prediction models. …”
    Get full text
    Article
  4. 64

    Software watermarking scheme with cloud computing constraints by Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU

    Published 2016-09-01
    “…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
    Get full text
    Article
  5. 65

    Optimization for threat classification of various data types-based on ML model and LLM by Chaerim Hong, Taeyeon Oh

    Published 2025-07-01
    “…This study proposed an ML and LLM integrated framework that could effectively detect source code vulnerabilities using abstract syntax trees (AST). …”
    Get full text
    Article
  6. 66

    Finetuning Large Language Models for Vulnerability Detection by Aleksei Shestov, Rodion Levichev, Ravil Mussabayev, Evgeny Maslov, Pavel Zadorozhny, Anton Cheshkov, Rustam Mussabayev, Alymzhan Toleu, Gulmira Tolegen, Alexander Krassovitskiy

    Published 2025-01-01
    “…This demonstrates the potential for transfer learning by finetuning large pretrained language models for specialized source code analysis tasks.…”
    Get full text
    Article
  7. 67

    MAGECODE: Machine-Generated Code Detection Method Using Large Language Models by Hung Pham, Huyen Ha, van Tong, Dung Hoang, Duc Tran, Tuyen Ngoc Le

    Published 2024-01-01
    “…The model-based MGT methods often encounter difficulties when dealing with source code due to disparities in semantics compared to natural languages. …”
    Get full text
    Article
  8. 68

    GestUI: A Model-driven Method and Tool for Including Gesture-based Interaction in User Interfaces by Otto Parra, Sergio España, Oscar Pastor

    Published 2016-04-01
    “…As a result, gesture specifications are now being hard-coded by developers at the source code level that hinders their reusability and portability. …”
    Get full text
    Article
  9. 69

    Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells by Esraa Hamouda, Abeer El-Korany, Soha Makady

    Published 2025-01-01
    “…Furthermore, some machine learning classification models were evaluated on a subset of the source code features while ignoring significant features during classification. …”
    Get full text
    Article
  10. 70

    A New Energy-Efficient Data Transmission Scheme Based on DSC and Virtual MIMO for Wireless Sensor Network by Na Li, Liwen Zhang, Bing Li

    Published 2015-01-01
    “…DSC-MIMO compresses the source data using distributed source coding before transmitting, which is different from the existing communication schemes. …”
    Get full text
    Article
  11. 71

    A web-application vulnerability detection model by V. V. Bakhtizin, D. E. Onoshko

    Published 2019-06-01
    “…A web-application vulnerability detection model based on static analysis of source codes is proposed. Evaluation system used by the vulnerability detection model is described. …”
    Get full text
    Article
  12. 72

    Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism by CHEN Jinfu, HU Xinyi, CAI Saihua, MIN Xirun

    Published 2025-06-01
    “…A specific attention mechanism was designed that simultaneously analyzed both contract source code and bytecode, achieving bidirectional mapping and complementary enhancement between high-level semantic features in source code and low-level execution flows in bytecode, thereby enriching feature representation. …”
    Get full text
    Article
  13. 73

    Decoding the Source of Wealth Creation by Arpita Basak, A. Srihari Krishna

    Published 2020-10-01
    “…Especially, in the software sector where source code holds the key to wealth creation majority chose to keep it closed to mint wealth. …”
    Get full text
    Article
  14. 74

    Software Defect Prediction Based on Effective Fusion of Multiple Features by Chaozheng Zhang, Junhua Wu

    Published 2025-01-01
    “…Therefore, this paper proposes a software defect prediction model based on the effective fusion of multiple features, named DP-SSCT (Semantics, Source Code, and Tradition). The model integrates traditional features, source code features, and semantic features. …”
    Get full text
    Article
  15. 75

    Nonplanar Crack Growth Simulation of Multiple Cracks Using Finite Element Method by Yahya Ali Fageehi, Abdulnaser M. Alshoaibi

    Published 2020-01-01
    “…This analysis was performed by using the developed source code software written by Visual Fortran Language. …”
    Get full text
    Article
  16. 76

    A Novel Approach to Automate Complex Software Modularization Using a Fact Extraction System by Muhammad Zakir Khan, Rashid Naseem, Aamir Anwar, Ijaz Ul Haq, Ahmad Alturki, Syed Sajid Ullah, Suheer A. Al-Hadhrami

    Published 2022-01-01
    “…To this goal, information extraction tools use exact approaches to extract entities and their corresponding relationships from source code. Such exact approaches extract all features, including those that are less prominent and may not be significant for modularization. …”
    Get full text
    Article
  17. 77

    Predicting Fluid Properties in the MUFITS Reservoir Simulator with User-Supplied Modules by Andrey Afanasyev, Ivan Utkin

    Published 2021-01-01
    “…Furthermore, we supplement the article with the source code of two simple EoS-modules that can serve as templates in other modelling and software development efforts. …”
    Get full text
    Article
  18. 78

    A tool-supported approach to integrate cognitive indicators into the Visual Studio Code by Roger Vieira, Kleinner Farias

    Published 2025-06-01
    “…Addressing this crucial gap, CognIDE enriches VS Code by offering actionable contextual cues alongside dynamic source code. The evaluation of CognIDE, involving a survey with six industry professionals and in-depth interviews, examined its perceived utility, ease of use, and real-world applicability. …”
    Get full text
    Article
  19. 79

    Encouraging reusability of computational research through Data-to-Knowledge Packages - A hydrological use case [version 2; peer review: 2 approved] by Markus Konkol, Sami Domisch, Astra Labuce, Vanessa Bremerich, Merret Buurman

    Published 2025-07-01
    “…The D2K-Package’s core is the reproducible basis composed of the data and source code on which an analysis is based. This core is designed such that the other components can be derived from it. …”
    Get full text
    Article
  20. 80

    A WEB-APPLICATION QUALITY EVALUATION METHOD BASED ON VULNERABILITY DETECTION by D. E. Onoshko, V. V. Bakhtizin

    Published 2018-05-01
    “…This article introduces a method of web-application quality evaluation based on static analysis of the source code. A model for SQL-injection vulnerability detection and a web-application quality model based on the results of vulnerability detection that extends the ISO/IEC 25010 quality model are described.…”
    Get full text
    Article