How can we find other repositories on GitHub that are functionally similar to a specific repository? While GitHub offers keyword-based search functionality, there is a lack of a tool that can perform query by example ...
详细信息
ISBN:
(纸本)9798350395693;9798350395686
How can we find other repositories on GitHub that are functionally similar to a specific repository? While GitHub offers keyword-based search functionality, there is a lack of a tool that can perform query by example to search and compare functionally similar repositories. To address this challenge, we present MetaSim: a search engine that finds similar GitHub repositories based on repository metadata features. MetaSim employs a customized technique to represent repository metadata in the embedding space for efficient indexing and searching. We construct a curated dataset of 267.6K public GitHub repositories to support our search engine. We evaluate our tool through a manual assessment on a set of 202 query by example repository and their corresponding matching pairs. Experiment results demonstrate that Readme alone can achieve high similarity precision (90.1%), which we define later. In contrast, the combined usage of Description, Topics, and Readme yields the best overall performance with similarity precision of 97.8%. To foster both research and practical applications, we open source our research artifacts through the MetaSim platform at https://***. The demonstration video of MetaSim is available at https://***/HnFnN3JclQw.
Aiming at the problem of communication redundancy and delay for grid information authentication in the existing consortium blockchain network, a new architecture for optimizing the broadcast path by controlling the to...
详细信息
Aiming at the problem of communication redundancy and delay for grid information authentication in the existing consortium blockchain network, a new architecture for optimizing the broadcast path by controlling the topology of the consortium blockchain by software defined networking (SDN) is proposed. First, the SDN controller can collect the information and status of nodes in the consortium blockchain network in real time, and make topology adjustments accordingly. Secondly, some existing practices reduce the redundancy and delay brought by the Gossip protocol, but also bring serious computational burden to the nodes. Therefore, our proposed architecture is divided into two layers. The task of adjusting the topology structure is assigned to the upper-SDN controller layer, and the normal operation of the consortium blockchain network is assigned to the lower-blockchain layer, which not only solves the problem of limited computing power of grid information authentication nodes, but also makes the consortium blockchain network flexible, stable and easy to expand. Finally, the simulation results show that the topology adjustment made by SDN effectively reduces the communication redundancy and delay brought by the Gossip protocol in the consortium blockchain network and improves the consensus efficiency.
Requirements change throughout the software development lifecycle, from requirement elicitation and analysis to software operation. software requirements can be traced back to their source and shown to depend on one a...
详细信息
This study presents a new method for classifying growth patterns of cultural elements, specifically focusing on hashtag popularity in social media. We use the Yule-Simon process as a baseline and apply Shape Dynamic T...
详细信息
In the mobile opportunity network, the forwarding mechanism with multiple copies is usually used to accelerate the spread of information, but it will also lead to the aggravation of network overload. How to reduce net...
详细信息
Aiming at the conducted interference generated during the operation of high-speed trains, a multi-channel online monitoring system for conducted interference applicable to highspeed trains is designed. The monitoring ...
详细信息
Subjects with limited application in the software industry like AI have recently received tremendous boon due to the development and raise of publicity of LLMs. LLM-powered software has a wide array of practical appli...
详细信息
Subjects with limited application in the software industry like AI have recently received tremendous boon due to the development and raise of publicity of LLMs. LLM-powered software has a wide array of practical applications that must be taught to softwareengineering students, so that they can be relevant in the field. The speed of technological change is extremely fast, and university curriculums must include those changes. Renewing and creating new methodologies and workshops is a difficult task to complete successfully in such a dynamic environment full of cutting-edge technologies. This paper aims to showcase our approach to using LLM-powered software for AI generated images, like Stable diffusion and code generation tools like ChatGPT in workshops for two relevant subjects - Analysis of software Requirements and Specifications, as well as Artificial Intelligence. A comparison between the different available LLMs that generate images is made, and the choice between them is explained. Student feedback is shown and a general positive and motivational impact is noted during and after the workshop. A brief introduction that covers the subjects where AI is applied is made. The proposed solutions for several uses of AI in the field of higher education, more specifically softwareengineering, are presented. Several workshops have been made and included in the curriculum. The results of their application have been noted and an analysis is made. More propositions on further development based on the gained experience, feedback and retrieved data are made. Conclusions are made on the application of AI in higher education and different ways to utilize such tools are presented.
In this paper, based on the existing mobile geographic information system developed a based on intelligent pension planning positioning software. This system integrates GIS, call center, virtual pension software syste...
详细信息
Bionic mechanical hands are playing an increasingly important role in the intelligent equipment industry. However, at this stage, the degrees of freedom of bionic mechanical hands are increasing, and their structures ...
详细信息
The Internet of Things (IoT) connects systems, software, cloud computing, activities and could provide new access points for cyber-attacks. Virus attacks and unauthorized downloading are the two main risks to IoT secu...
详细信息
暂无评论