Treffer 1 - 20
von 220.378
- 1
- 2
Seite in der Trefferliste auswählen
SkCoder: A Sketch-based Approach for Automatic Code Generation
Li, Jia ; Li, Yongmin ; Li, Ge ; et al.
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2023 IEEE/ACM 45th International Conference on. :2124-2135 May, 2023
Stack overflow's hidden nuances: How does zip code define user contribution?
Zolduoarrati, Elijah ; Licorish, Sherlock A․ ; Stanger, Nigel
In The Journal of Systems & Software May 2025 223
At the crossroads of numerical codes : behavioral and neurophysiological investigation of the automatic access to magnitude representation and integration
UCL - SSH/IPSY - Psychological Sciences Research Institute ; UCL - Faculté de psychologie et des sciences de l'éducation ; Crollen, Virginie ; et al.
Predicting Bugs by Monitoring Developers During Task Execution
Laudato, Gennaro ; Scalabrino, Simone ; Novielli, Nicole ; et al.
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2023 IEEE/ACM 45th International Conference on. :1-13 May, 2023
Slimmer Formal Proofs for Mathematical Libraries
de Lamarliere, Paul Geneau ; Melquiond, Guillaume ; Faissole, Florian
2023 IEEE 30th Symposium on Computer Arithmetic (ARITH) ARITH Computer Arithmetic (ARITH), 2023 IEEE 30th Symposium on. :32-35 Sep, 2023
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid
Nelaturu, K. ; Mavridou, A. ; Stachtiari, E. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 20(4):3110-3127 Aug, 2023
Differential Testing of Concurrent Classes
Terragni, Valerio ; Cheung, Shing-Chi
2025 IEEE Conference on Software Testing, Verification and Validation (ICST) Software Testing, Verification and Validation (ICST), 2025 IEEE Conference on. :255-266 Mar, 2025
Code as Policies: Language Model Programs for Embodied Control
Liang, Jacky ; Huang, Wenlong ; Xia, Fei ; et al.
2023 IEEE International Conference on Robotics and Automation (ICRA) Robotics and Automation (ICRA), 2023 IEEE International Conference on. :9493-9500 May, 2023
Evaluating large language model adaptation strategies for geospatial code generation
Zhu, Kaiyuan ; Zhu, Kaiyuan
To the BENEVOLENT SOCIETY.
London magazine: or, Gentleman's Monthly Intelligencer. Dec1769 Appendix, Vol. 38, p668-669. 2p.
Program Synthesis Through Learning the Input-Output Behavior of Commands
Lee, S. ; Nam, S.Y. ; Kim, J.
IEEE Access Access, IEEE. 10:63508-63521 2022
DASP: A Framework for Driving the Adoption of Software Security Practices
Larios-Vargas, E. ; Elazhary, O. ; Yousefi, S. ; et al.
IEEE Transactions on Software Engineering IIEEE Trans. Software Eng. Software Engineering, IEEE Transactions on. 49(4):2892-2919 Apr, 2023
RAMS: a VHDL-AMS code refactoring tool supporting high level analog synthesis
Kaiping Zeng ; Huss, S.A.
IEEE Computer Society Annual Symposium on VLSI: New Frontiers in VLSI Design (ISVLSI'05) VLSI VLSI, 2005. Proceedings. IEEE Computer Society Annual Symposium on. :266-267 2005
AmadeusGPT: a natural language interface for interactive animal behavioral analysis
Ye, Shaokai ; Lauer, Jessy ; Zhou, Mu ; et al.
Towards Fine-Grained Localization of Privacy Behaviors
Jain, Vijayanta ; Ghanavati, Sepideh ; Peddinti, Sai Teja ; et al.
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) EUROSP Security and Privacy (EuroS&P), 2023 IEEE 8th European Symposium on. :258-277 Jul, 2023
Programmer Cognition Failures as the Root Cause of Software Vulnerabilities: A Preliminary Review
Patel, Darsh ; Patel, Hetkumar ; Sultana, Kazi Zakia ; et al.
2023 Intermountain Engineering, Technology and Computing (IETC) Intermountain Engineering, Technology and Computing (IETC), 2023. :242-246 May, 2023
Nudging Software Developers Toward Secure Code
Fischer, F. ; Grossklags, J. ; Lipford, H.R. ; et al.
IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 20(2):76-79 Apr, 2022
Code as Policies: Language Model Programs for Embodied Control
Liang, Jacky ; Huang, Wenlong ; Xia, Fei ; et al.
Dieses Ergebnis kann Gästen nicht angezeigt werden.
Login für vollen Zugriff.
- 1
- 2