Loading…
Thermoregulation model JOS-3 with new open source code
Takahashi, Yoshito, Nomoto, Akihisa, Yoda, Shu, Hisayama, Ryo, Ogata, Masayuki, Ozeki, Yoshiichi, Tanabe, Shin-ichi
Published in Energy and buildings (15.01.2021)
Published in Energy and buildings (15.01.2021)
Get full text
Journal Article
Loading…
Source code metrics: A systematic mapping study
Nuñez-Varela, Alberto S., Pérez-Gonzalez, Héctor G., Martínez-Perez, Francisco E., Soubervielle-Montalvo, Carlos
Published in The Journal of systems and software (01.06.2017)
Published in The Journal of systems and software (01.06.2017)
Get full text
Journal Article
Loading…
Loading…
A tertiary study on links between source code metrics and external quality attributes
Iftikhar, Umar, Ali, Nauman Bin, Börstler, Jürgen, Usman, Muhammad
Published in Information and software technology (01.01.2024)
Published in Information and software technology (01.01.2024)
Get full text
Journal Article
Loading…
Loading…
To automatically map source code entities to architectural modules with Naive Bayes
Olsson, Tobias, Ericsson, Morgan, Wingkvist, Anna
Published in The Journal of systems and software (01.01.2022)
Published in The Journal of systems and software (01.01.2022)
Get full text
Journal Article
Loading…
MetaSleepLearner: A Pilot Study on Fast Adaptation of Bio-Signals-Based Sleep Stage Classifier to New Individual Subject Using Meta-Learning
Banluesombatkul, Nannapas, Ouppaphan, Pichayoot, Leelaarporn, Pitshaporn, Lakhan, Payongkit, Chaitusaney, Busarakum, Jaimchariyatam, Nattapong, Chuangsuwanich, Ekapol, Chen, Wei, Phan, Huy, Dilokthanakul, Nat, Wilaiprasitporn, Theerawit
Published in IEEE journal of biomedical and health informatics (01.06.2021)
Published in IEEE journal of biomedical and health informatics (01.06.2021)
Get full text
Journal Article
Loading…
A Novel Vulnerability‐Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation
Chen, Jinfu, Zhou, Jiapeng, Lin, Wei, Towey, Dave, Cai, Saihua, Chen, Haibo, Chen, Jingyi, Yin, Yemin
Published in Journal of software : evolution and process (01.05.2025)
Published in Journal of software : evolution and process (01.05.2025)
Get full text
Journal Article
Loading…
Leveraging structural properties of source code graphs for just-in-time bug prediction
Nadim, Md, Mondal, Debajyoti, Roy, Chanchal K.
Published in Automated software engineering (01.05.2022)
Published in Automated software engineering (01.05.2022)
Get full text
Journal Article
Loading…
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Ceccato, Mariano, Di Penta, Massimiliano, Falcarin, Paolo, Ricca, Filippo, Torchiano, Marco, Tonella, Paolo
Published in Empirical software engineering : an international journal (01.08.2014)
Published in Empirical software engineering : an international journal (01.08.2014)
Get full text
Journal Article
Loading…
The Validity of the Energy Expenditure Criteria Based on Open Source Code through two Inertial Sensors
Martín-Martín, Jaime, Wang, Li, De-Torres, Irene, Escriche-Escuder, Adrian, González-Sánchez, Manuel, Muro-Culebras, Antonio, Roldán-Jiménez, Cristina, Ruiz-Muñoz, María, Mayoral-Cleries, Fermín, Biró, Attila, Tang, Wen, Nikolova, Borjanka, Salvatore, Alfredo, Cuesta-Vargas, Antonio I.
Published in Sensors (Basel, Switzerland) (26.03.2022)
Published in Sensors (Basel, Switzerland) (26.03.2022)
Get full text
Journal Article
Loading…
Evaluating source code summarization techniques: Replication and expansion
Eddy, Brian P., Robinson, Jeffrey A., Kraft, Nicholas A., Carver, Jeffrey C.
Published in 2013 21st International Conference on Program Comprehension (ICPC) (01.05.2013)
Published in 2013 21st International Conference on Program Comprehension (ICPC) (01.05.2013)
Get full text
Conference Proceeding
Loading…
Verifying Loot-box Probability Without Source-code Disclosure
Wang, Jing-Jie, Li, An-Jie, Fang, Ting-Yu, Hsiao, Hsu-Chun
Published in Proceedings of the annual Computer Security Applications Conference (09.12.2024)
Published in Proceedings of the annual Computer Security Applications Conference (09.12.2024)
Get full text
Conference Proceeding
Loading…
Extracting LPL privacy policy purposes from annotated web service source code
Hjerppe, Kalle, Ruohonen, Jukka, Leppänen, Ville
Published in Software and systems modeling (01.02.2023)
Published in Software and systems modeling (01.02.2023)
Get full text
Journal Article
Loading…
Temporal aware Mixed Attention-based Convolution and Transformer Network for cross-subject EEG emotion recognition
Si, Xiaopeng, Huang, Dong, Liang, Zhen, Sun, Yulin, Huang, He, Liu, Qile, Yang, Zhuobin, Ming, Dong
Published in Computers in biology and medicine (01.10.2024)
Published in Computers in biology and medicine (01.10.2024)
Get full text
Journal Article
Loading…
Modeling of water evaporation from a shrinking moist biomass slab subject to heating: Arrhenius approach versus equilibrium approach
Rahimi Borujerdi, Peyman, Shotorban, Babak, Mahalingam, Shankar, Weise, David R.
Published in International journal of heat and mass transfer (01.12.2019)
Published in International journal of heat and mass transfer (01.12.2019)
Get full text
Journal Article
Loading…
Development of Multi-Physics Workflow for the Analysis of Superconductive Cables Subject to Nuclear Heating
Casciello, Martina, Riva, Nicolo, Placido, Daniele, Hartwig, Zach, Segantin, Stefano, Savoldi, Laura
Published in IEEE transactions on applied superconductivity (01.08.2025)
Published in IEEE transactions on applied superconductivity (01.08.2025)
Get full text
Journal Article