Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (28)
- University of Arkansas, Fayetteville (7)
- City University of New York (CUNY) (6)
- San Jose State University (2)
- Technological University Dublin (2)
-
- University of Tennessee, Knoxville (2)
- Western University (2)
- Bard College (1)
- Bowling Green State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Department of Primary Industries and Regional Development, Western Australia (1)
- Louisiana State University (1)
- Loyola University Chicago (1)
- Michigan Technological University (1)
- Murray State University (1)
- Nova Southeastern University (1)
- Olivet Nazarene University (1)
- Portland State University (1)
- Purdue University (1)
- Roger Williams University (1)
- United Arab Emirates University (1)
- University of Massachusetts Amherst (1)
- Keyword
-
- Deep learning (3)
- Machine learning (3)
- Python programming (3)
- Access (2)
- Compilers (2)
-
- Empirical Study (2)
- JavaScript (2)
- Mature Student (2)
- PAL (2)
- Post-Quantum Cryptography (2)
- Prediction (2)
- Programming (2)
- Programming languages (2)
- Software Engineering (2)
- Software engineering (2)
- Software evolution (2)
- Abusive Language (1)
- Academic achievement (1)
- Acoustic (1)
- Adversarial Robustness (1)
- Algorithmic complexity attacks (1)
- Algorithms (1)
- Applied computing (1)
- Asteroid detection (1)
- Asteroids (1)
- Astronomy (1)
- Automated reasoning (1)
- Aves (1)
- BERT (1)
- Beginner programming course (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (24)
- Computer Science and Computer Engineering Undergraduate Honors Theses (5)
- Doctoral Dissertations (3)
- Publications and Research (3)
- Articles (2)
-
- Dissertations and Theses Collection (Open Access) (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Open Educational Resources (2)
- All HCAS Student Capstones, Theses, and Dissertations (1)
- Arts & Sciences Faculty Publications (1)
- Computer Science: Faculty Publications and Other Works (1)
- Department of Electrical and Computer Engineering Faculty Publications (1)
- Dissertations and Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Honors College Theses (1)
- Honors Projects (1)
- International Journal for Research in Education (1)
- LSU Doctoral Dissertations (1)
- Master's Projects (1)
- Master's Theses (1)
- Mineta Transportation Institute (1)
- Research Collection School Of Accountancy (1)
- Research Collection Yong Pung How School Of Law (1)
- Resource management technical reports (1)
- Scholar Week 2016 - present (1)
- Senior Projects Spring 2022 (1)
- Theses and Dissertations (1)
- Publication Type
Articles 61 - 64 of 64
Full-Text Articles in Physical Sciences and Mathematics
Codematcher: Searching Code Based On Sequential Semantics Of Important Query Words, Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li
Codematcher: Searching Code Based On Sequential Semantics Of Important Query Words, Chao Liu, Xin Xia, David Lo, Zhiwei Liu, Ahmed E. Hassan, Shanping Li
Research Collection School Of Computing and Information Systems
To accelerate software development, developers frequently search and reuse existing code snippets from a large-scale codebase, e.g., GitHub. Over the years, researchers proposed many information retrieval (IR)-based models for code search, but they fail to connect the semantic gap between query and code. An early successful deep learning (DL)-based model DeepCS solved this issue by learning the relationship between pairs of code methods and corresponding natural language descriptions. Two major advantages of DeepCS are the capability of understanding irrelevant/noisy keywords and capturing sequential relationships between words in query and code. In this article, we proposed an IR-based model CodeMatcher that …
Poor Man’S Trace Cache: A Variable Delay Slot Architecture, Tino C. Moore
Poor Man’S Trace Cache: A Variable Delay Slot Architecture, Tino C. Moore
Dissertations, Master's Theses and Master's Reports
We introduce a novel fetch architecture called Poor Man’s Trace Cache (PMTC). PMTC constructs taken-path instruction traces via instruction replication in static code and inserts them after unconditional direct and select conditional direct control transfer instructions. These traces extend to the end of the cache line. Since available space for trace insertion may vary by the position of the control transfer instruction within the line, we refer to these fetch slots as variable delay slots. This approach ensures traces are fetched along with the control transfer instruction that initiated the trace. Branch, jump and return instruction semantics as well as …
Just-In-Time Defect Prediction On Javascript Projects: A Replication Study, Chao Ni, Xin Xia, David Lo, Xiaohu Yang, Ahmed E. Hassan
Just-In-Time Defect Prediction On Javascript Projects: A Replication Study, Chao Ni, Xin Xia, David Lo, Xiaohu Yang, Ahmed E. Hassan
Research Collection School Of Computing and Information Systems
Change-level defect prediction is widely referred to as just-in-time (JIT) defect prediction since it identifies a defect-inducing change at the check-in time, and researchers have proposed many approaches based on the language-independent change-level features. These approaches can be divided into two types: supervised approaches and unsupervised approaches, and their effectiveness has been verified on Java or C++ projects. However, whether the language-independent change-level features can effectively identify the defects of JavaScript projects is still unknown. Additionally, many researches have confirmed that supervised approaches outperform unsupervised approaches on Java or C++ projects when considering inspection effort. However, whether supervised JIT defect …
Taming The Data In The Internet Of Vehicles, Shahab Tayeb
Taming The Data In The Internet Of Vehicles, Shahab Tayeb
Mineta Transportation Institute
As an emerging field, the Internet of Vehicles (IoV) has a myriad of security vulnerabilities that must be addressed to protect system integrity. To stay ahead of novel attacks, cybersecurity professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, including Intrusion Detection System (IDSs), by implementing anomaly detection, which differentiates benign data packets from malicious ones. For an IDS to best predict anomalies, the model is trained on data that is typically pre-processed through normalization and feature selection/reduction. These pre-processing techniques play an important role in training a neural network to optimize …