نتایج جستجو برای: identifying code
تعداد نتایج: 330700 فیلتر نتایج به سال:
Identifying repetitive code changes benefits developers, tool builders, and researchers. Tool builders can automate the popular code changes, thus improving the productivity of developers. Researchers would better understand the practice of code evolution, advancing existing code assistance tools even further. Developers would particularly benefit if such tools can learn and support repetitive ...
Contextualized in the teaching of computer programming Computing courses, this research investigates aspects and strategies for automatic source code assessment. Continuous on-time assessment codes produced by students is a challenging task teachers. The literature presents different methods code, mostly focusing on technical aspects, such as functional correctness error detection. This paper A...
Data mining is the process of extracting and analyzing the large datasets to find out various hidden relationship patterns and much other useful information. Random forest is an ensemble method which is widely used is application having large datasets because of its interesting features like handling imbalanced data, identifying variable importance and detecting error rate. For building random ...
Context. Software defect prediction aims to reduce the large costs involved with faults in a software system. A wide range of traditional software metrics have been evaluated as potential defect indicators. These traditional metrics are derived from the source code or from the software development process. Studies have shown that no metric clearly out performs another and identifying defect-pro...
in this paper, efforts are made to compare the safety of steel moment resistant frames designed according to different editions of the iranian code of practice for seismic resistant design of buildings. also, failure risk of a low and medium height frame which designed for high and low seismicity regions according to three editions of the code are evaluated. first, the testing cases were design...
beryllium chemical combination has a considerable effect on the design and fabrication of the241am9be neutron source. in this investigation the beryllium combinations were studied as a generator ofneutrons with various mass percentage, and the neutron yields were also calculated using the results of thealice and srim codes calculations per unit incident charge. the neutron yields of beryllium ...
Code coverage analysis provides metrics to quantify the degree of verification completeness. It also allows the designer to identify possible bugs or redundant code thus speeding verification. Many verification engineers report that the most time consuming area of code coverage analysis is the identification and documentation of intrinsically uncoverable expression cases. With manual inspection...
—Aiming at the problem of large overhead and low accuracy on the identification of obfuscated and malicious code, a new algorithm is proposed to detect malicious code by identifying multidimensional features based on ReliefF and Boosting techniques. After a disassembly analysis and static analysis for the clustered malicious code families, the algorithm extracts features from four dimensions: ...
Code implementing a crosscutting concern is often spread over many different parts of an application. Identifying such code automatically greatly improves both the maintainability and the evolvability of the application. First of all, it allows a developer to more easily find the places in the code that must be changed when the concern changes, and thus makes such changes less time consuming an...
Along with the development of RFID technology, RFID tag is used for identifying object in more and more areas. RFID becomes one of the most important technologies in application and development of Internet of Things. Currently, in the applications of Internet-Internet of things, one of the most important issues is that the information carried by tag code can't be shared in different tag code st...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید