Search Results - Traceable Code Patterns
-
1
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics
ISSN: 2661-8907, 2662-995X, 2661-8907Published: Singapore Springer Nature Singapore 01.09.2023Published in SN computer science (01.09.2023)“… In this study, we used some traceable patterns which can be automatically identified or extracted from the source code of functions or methods…”
Get full text
Journal Article -
2
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics
ISBN: 9780438313743, 0438313747Published: ProQuest Dissertations & Theses 01.01.2018“… The concept of traceable patterns is similar to design patterns, but they can be automatically recognized and extracted from source code…”
Get full text
Dissertation -
3
Towards a software vulnerability prediction model using traceable code patterns and software metrics
Published: IEEE 01.10.2017Published in 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.10.2017)“… The concept of traceable patterns is similar to design patterns but they can be automatically recognized and extracted from source code…”
Get full text
Conference Proceeding -
4
Traceable Federated Continual Learning
ISSN: 1063-6919Published: IEEE 16.06.2024Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (16.06.2024)“… In this paper, we propose a new paradigm, namely Traceable Federated Continual Learning (TFCL), aiming to cope with repetitive tasks by tracing and augmenting…”
Get full text
Conference Proceeding -
5
Projecting Trackable Thermal Patterns for Dynamic Computer Vision
ISSN: 1063-6919Published: IEEE 16.06.2024Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (16.06.2024)“…Adding artificial patterns to objects, like QR codes, can ease tasks such as object tracking, robot navigation, and conveying information (e.g…”
Get full text
Conference Proceeding -
6
A Deep Learning Approach to Predict Software Bugs Using Micro Patterns and Software Metrics
ISBN: 9798664731248Published: ProQuest Dissertations & Theses 01.01.2020“… Traceable code patterns are able to de- scribe code at a finer granularity level to measure quality…”
Get full text
Dissertation -
7
Traceable Optical Physical Unclonable Functions Based on Germanium Vacancy in Diamonds
ISSN: 1944-8252, 1944-8252Published: United States 21.08.2024Published in ACS applied materials & interfaces (21.08.2024)“… patterns that defy replication. However, the creation of traceable optical PUF tags remains a formidable challenge…”
Get more information
Journal Article -
8
Weak rotational property and its application
ISSN: 0925-1022, 1573-7586Published: New York Springer US 01.10.2023Published in Designs, codes, and cryptography (01.10.2023)“…With the rapid evolvement of cryptanalysis, attacks with multiple distinguishers have emerged gradually. Many new cryptanalytic methods such as multiple…”
Get full text
Journal Article -
9
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation
ISSN: 1051-8215, 1558-2205Published: New York, NY IEEE 01.10.2008Published in IEEE transactions on circuits and systems for video technology (01.10.2008)“… of the fingerprint code at the customer side, which produces the multimedia content contains a unique code…”
Get full text
Journal Article -
10
Tracets4J: A Traceable Unit Test Generation Dataset
ISSN: 2640-7574Published: IEEE 04.03.2025Published in Proceedings of the European Conference on Software Maintenance and Reengineering (04.03.2025)“…Automated test case generation enhances the efficiency and quality of software testing. Learning-based test case generation methods require an understanding of…”
Get full text
Conference Proceeding -
11
Robustness of Laser Speckles as Unique Traceable Markers of Metal Components
ISSN: 2673-6470, 2673-6470Published: Nicosia MDPI AG 2021Published in Digital (2021)“… In this paper, we investigate the use of image-plane laser speckles as a tool to acquire a unique code from the surface of the component and the ability to use this pattern as a secure component…”
Get full text
Journal Article -
12
A traceable content-adaptive fingerprinting for multimedia
ISBN: 0780385543, 9780780385542ISSN: 1522-4880Published: Piscataway NJ IEEE 2004Published in 2004 International Conference on Image Processing, 2004. ICIP '04 (2004)“…This paper presents a feasible system of multimedia fingerprinting. A c-TA code which can be constructed flexibly is used…”
Get full text
Conference Proceeding -
13
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Published: IEEE 01.08.2019Published in 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (01.08.2019)“… complexity or lines of code) which are not security-specific or some generic patterns known as nano-patterns…”
Get full text
Conference Proceeding -
14
A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities
ISSN: 0730-3157Published: IEEE 01.06.2016Published in Proceedings - International Computer Software & Applications Conference (01.06.2016)“…Software security plays a significant role in ensuring software quality. The goal of this study is to conduct a preliminary analysis to find hidden relationships between source code patterns and security defects…”
Get full text
Conference Proceeding Journal Article -
15
Detecting architecturally-relevant code smells in evolving software systems
ISBN: 9781450304450, 1450304451ISSN: 0270-5257Published: New York, NY, USA ACM 21.05.2011Published in 2011 33rd International Conference on Software Engineering (ICSE) (21.05.2011)“… A fundamental difficulty in this process is that developers are only equipped with static analysis techniques for the source code, which do not exploit traceable architectural information…”
Get full text
Conference Proceeding -
16
Ballistic Facial Trauma Reconstruction: Incidence and Practice Patterns in the Civilian Population
ISSN: 1536-3708, 1536-3708Published: United States 01.05.2023Published in Annals of plastic surgery (01.05.2023)“… All adults with the International Classification of Diseases, 10th Revision codes of severe nonfatal facial trauma from firearms requiring emergent surgery during 2016-2018 were included…”
Get more information
Journal Article -
17
Accurate 3D Reconstruction of Dynamic Objects by Spatial-Temporal Multiplexing and Motion-Induced Error Elimination
ISSN: 1057-7149, 1941-0042, 1941-0042Published: United States IEEE 2022Published in IEEE transactions on image processing (2022)“… Firstly, a structured-light multiplexing method is developed that only requires 3 patterns to achieve high-accuracy encoding…”
Get full text
Journal Article -
18
Customized 2D Barcode Sensing for Anti-Counterfeiting Application in Smart IoT with Fast Encoding and Information Hiding
ISSN: 1424-8220, 1424-8220Published: Basel MDPI AG 31.08.2020Published in Sensors (Basel, Switzerland) (31.08.2020)“… To tackle this challenge, customized 2D barcode is proposed to satisfy the requirements of the enterprise anti-counterfeiting certification…”
Get full text
Journal Article -
19
Phase variation in Mycobacterium tuberculosis glpK produces transiently heritable drug tolerance
ISSN: 1091-6490, 1091-6490Published: United States 24.09.2019Published in Proceedings of the National Academy of Sciences - PNAS (24.09.2019)“…The length and complexity of tuberculosis (TB) therapy, as well as the propensity of to develop drug resistance, are major barriers to global TB control…”
Get more information
Journal Article -
20
An Explainable Attention-Augmented LSTM Model for Robust Real-Time Detection of Driving Behavior Patterns and Road Anomalies in Smart Transportation Networks
ISSN: 0018-9456Published: IEEE 15.12.2025Published in IEEE transactions on instrumentation and measurement (15.12.2025)“…) network for real-time detection of driving behavior patterns and road anomalies. Unlike conventional anomaly detection approaches that treat smartphones only as data…”
Get full text
Journal Article

