|
|
|
Jinghua Groppe, Sven Groppe, Daniel Senf and Ralf Möller
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent ways to...
ver más
|
|
|
|
|
|
|
Yongyao Jiang and Chaowei Yang
With recent advancements, large language models (LLMs) such as ChatGPT and Bard have shown the potential to disrupt many industries, from customer service to healthcare. Traditionally, humans interact with geospatial data through software (e.g., ArcGIS 1...
ver más
|
|
|
|
|
|
|
Junrong Wang, Chunlei He, Dianfu Fu, Kuang He and Junfeng Du
Fatigue failure caused by frequent tension and bending loads is a crucial safety concern for mooring chains used on floating structures in the oil and gas industry. The bending effect for a chain?s fatigue is usually not considered by existing fatigue an...
ver más
|
|
|
|
|
|
|
Dilanka Chandrasiri, Perampalam Gatheeshgar, Hadi Monsef Ahmadi and Lenganji Simwanda
In the construction domain, there is a growing emphasis on sustainability, resource efficiency, and energy optimisation. Light-gauge steel panels (LGSPs) stand out for their inherent advantages including lightweight construction and energy efficiency. Ho...
ver más
|
|
|
|
|
|
|
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo...
ver más
|
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Zikang Jin, Zonghan Yu, Fanshuo Meng, Wei Zhang, Jingzhi Cui, Xiaolong He, Yuedi Lei and Omer Musa
The parametric design method is widely utilized in the preliminary design stage for hypersonic vehicles; it ensures the fast iteration of configuration, generation, and optimization. This study proposes a novel parametric method for a wide-range, wing-mo...
ver más
|
|
|
|
|
|
|
Yahya Tashtoush, Noor Abu-El-Rub, Omar Darwish, Shorouq Al-Eidi, Dirar Darweesh and Ola Karajeh
Code readability and software complexity are considered essential components of software quality. They significantly impact software metrics, such as reusability and maintenance. The maintainability process consumes a high percentage of the software life...
ver más
|
|
|
|
|
|
|
Xi Chen, Lei Dong, Hong-Chang Li, Xin-Peng Yao, Peng Wang and Shuang Yao
Defects and errors in code are different in that they are not detected by editors or compilers but pose a potential risk to software operation. For safety-critical software such as airborne software, the code review process is necessary to ensure the pro...
ver más
|
|
|
|
|
|
|
Alessandro Midolo and Emiliano Tramontana
Sequential programs can benefit from parallel execution to improve their performance. When developing a parallel application, several techniques are employed to achieve the desired behavior: identifying parts that can run in parallel, synchronizing acces...
ver más
|
|
|
|