نتایج جستجو برای: identifying code

تعداد نتایج: 330700  

2013
Stas Negara Mihai Codoban Danny Dig Ralph E. Johnson

Identifying repetitive code changes benefits developers, tool builders, and researchers. Tool builders can automate the popular code changes, thus improving the productivity of developers. Researchers would better understand the practice of code evolution, advancing existing code assistance tools even further. Developers would particularly benefit if such tools can learn and support repetitive ...

Journal: :Brazilian Journal of Computers in Education 2021

Contextualized in the teaching of computer programming Computing courses, this research investigates aspects and strategies for automatic source code assessment. Continuous on-time assessment codes produced by students is a challenging task teachers. The literature presents different methods code, mostly focusing on technical aspects, such as functional correctness error detection. This paper A...

2015
Shikha Pathania Rajdeep Kaur

Data mining is the process of extracting and analyzing the large datasets to find out various hidden relationship patterns and much other useful information. Random forest is an ensemble method which is widely used is application having large datasets because of its interesting features like handling imbalanced data, identifying variable importance and detecting error rate. For building random ...

2015
THOMAS JOSHUA SHIPPEY

Context. Software defect prediction aims to reduce the large costs involved with faults in a software system. A wide range of traditional software metrics have been evaluated as potential defect indicators. These traditional metrics are derived from the source code or from the software development process. Studies have shown that no metric clearly out performs another and identifying defect-pro...

Journal: :journal of structural engineering and geo-techniques 2011
kiarash nasserasadi

in this paper, efforts are made to compare the safety of steel moment resistant frames designed according to different editions of the iranian code of practice for seismic resistant design of buildings. also, failure risk of a low and medium height frame which designed for high and low seismicity regions according to three editions of the code are evaluated. first, the testing cases were design...

Journal: :iranian journal of science and technology (sciences) 2009
m. haji-shafeieha

beryllium chemical combination has a considerable effect on the design and fabrication of the241am9be neutron source. in this investigation the beryllium combinations were studied as a generator ofneutrons with various mass percentage, and the neutron yields were also calculated using the results of thealice and srim codes calculations per unit incident charge. the neutron yields of beryllium ...

2004
Graeme D. Cunningham Julian A. B. Dines

Code coverage analysis provides metrics to quantify the degree of verification completeness. It also allows the designer to identify possible bugs or redundant code thus speeding verification. Many verification engineers report that the most time consuming area of code coverage analysis is the identification and documentation of intrinsically uncoverable expression cases. With manual inspection...

Journal: :JCM 2015
Yangxia Luo

—Aiming at the problem of large overhead and low accuracy on the identification of obfuscated and malicious code, a new algorithm is proposed to detect malicious code by identifying multidimensional features based on ReliefF and Boosting techniques. After a disassembly analysis and static analysis for the clustered malicious code families, the algorithm extracts features from four dimensions: ...

2004
Magiel Bruntink Arie van Deursen Tom Tourwé Remco van Engelen

Code implementing a crosscutting concern is often spread over many different parts of an application. Identifying such code automatically greatly improves both the maintainability and the evolvability of the application. First of all, it allows a developer to more easily find the places in the code that must be changed when the concern changes, and thus makes such changes less time consuming an...

Journal: :JNW 2012
Yulong Huang Zhihao Chen Jianqing Xi

Along with the development of RFID technology, RFID tag is used for identifying object in more and more areas. RFID becomes one of the most important technologies in application and development of Internet of Things. Currently, in the applications of Internet-Internet of things, one of the most important issues is that the information carried by tag code can't be shared in different tag code st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید