Resultados de búsqueda - "source code"
Buscar alternativas:
- "source code" »
-
1
Source Coding and Channel Coding for Mobile Multimedia Communication
Publicado 2012Enlace del recursoNone
Electrónico Capítulo de libro -
2
Unintended effects of dependencies in source code on the flexibility of IT in organizations
Publicado 2018-09-01 Enlace del recurso
Artículo -
3
Supporting Source Code Annotations with Metadata-Aware Development Environment
Publicado 2019-09-01 Enlace del recurso
Artículo -
4
On the Applicability of the Pareto Principle to Source-Code Growth in Open Source Projects
Publicado 2023-09-01 Enlace del recurso
Artículo -
5
Go Source Code Vulnerability Detection Method Based on Graph Neural Network
Publicado 2025-06-01“…Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. …”With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on detecting concurrency vulnerabilities. In response to...
Enlace del recurso
Artículo -
6
Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment
Publicado 2025-01-01Materias: Enlace del recursoThe issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern generative models for text and source code creati...
Artículo -
7
Analysis of Methods and Tools for Detecting Sensitive Information in Source Code: Issues of Accuracy and Completeness
Publicado 2025-04-01Materias: Enlace del recursoIn the context of widespread adoption of DevOps practices and increasing software system complexity, the issue of sensitive information leakage – such as API keys, passwords, and tokens – directly from source code and configuration files is becoming critically important. Such leaks can result in ser...
Artículo -
8
-
9
-
10
New Deep Learning-Based Approach for Source Code Generation: Application to Computer Vision Systems
Publicado 2025-07-01Materias: Enlace del recursoDeep learning has enabled significant progress in source code generation, aiming to reduce the manual, error-prone, and time-consuming aspects of software development. While many existing models rely on recurrent neural networks (RNNs) with sequence-to-sequence architectures, these approaches strugg...
Artículo -
11
Video Communications Over Wireless Ad-Hoc Networks Using Source Coding Diversity and Multiple Paths
Publicado 2011Enlace del recursoNone
Electrónico Capítulo de libro -
12
CVOTING: An Anonymous Ballot E-Voting System
Publicado 2018-03-01Materias: “…e-voting, open source, code voting, QR code.…”One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such...
Enlace del recurso
Artículo -
13
MODERN MEANS OF ELECTRONIC PROCESSING OF SOCIO-ECONOMIC INFORMATION
Publicado 2017-05-01Materias: Enlace del recursoThe article analyzes most popular software packages for statistical analysis of economic information, identified their merits and demerits, developed recommendations for choice of statistical packages
Artículo -
14
PREDICTION OF NOISE FROM TURBULENT FLOW FOR AIRFOIL
Publicado 2016-11-01Materias: Enlace del recursoThe calculation of turbulent flow using LES model and prediction of sound generated by a rod-airfoil configuration was done using OpenFoam code and library libAcoustics. Good results are obtained for frequency and drag coefficients compared with results from experiment. The additional investigation...
Artículo -
15
Vulnerability benchmark generation algorithm based on finite state machines
Publicado 2025-06-01“…Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. …”The emergence and development of various source code vulnerability detection techniques led to the evaluation of these tools’ effectiveness becoming a critical issue. Source code vulnerability benchmarks were regarded as a basic basis for such evaluations. However, most of the existing benchmarks we...
Enlace del recurso
Artículo -
16
A study on an efficient OSS inspection scheme based on encrypted GML
Publicado 2025-06-01“…Some services analyze source code and provide OSS-related data to solve these problems, a representative example being Blackduck. …”The importance of Open Source Software (OSS) has increased in recent years. OSS is software that is jointly developed and maintained globally through open collaboration and knowledge sharing. OSS plays an important role, especially in the Information Technology (IT) field, by increasing the efficien...
Enlace del recurso
Artículo -
17
THE TECHNIQUE OF ANALYSIS OF SOFTWARE OF ON-BOARD COMPUTERS OF AIR VESSEL TO ABSENCE OF UNDECLARED CAPABILITIES BY SIGNATURE-HEURISTIC WAY
Publicado 2017-03-01“…If there are no software source codes the two approaches of code analysis are used: a structural static and dynamic analysis of the source code; signature-heuristic analysis of potentially dangerous operations. …”The article considers the issues of civil aviation aircraft onboard computers data safety. Information security undeclared capabilities stand for technical equipment or software possibilities, which are not mentioned in the documentation. Documentation and tests content requirements are imposed duri...
Enlace del recurso
Artículo -
18
-
19
-
20


