Security vulnerability repair is a difficult task that is in dire need of automation. Two groups of techniques have shown promise: (1) large code language models (LLMs) that have been pre-trained on source code for ta...
详细信息
Worked examples (solutions to typical programming problems presented as a source code in a certain language and are used to explain the topics from a programming class) are among the most popular types of learning con...
详细信息
The popularity of the java programming language has led to its wide adoption in cloud computing infrastructures. However, java applications running in untrusted clouds are vulnerable to various forms of privileged att...
详细信息
Despite its already widespread popularity, it continues to gain adoption. More and more developers and architects continue to adopt and apply the FaaS (Function as a Service) model in cloud solutions. The most extensi...
详细信息
In this study, we assess the efficacy of employing the ChatGPT language model to generate solutions for coding exercises within an undergraduate javaprogramming course. ChatGPT, a large-scale, deep learning-driven na...
详细信息
As a bug tracking and project management system, the ALICE experiment uses Jira Software, which provides a wide range of configuration options. Jira also allows one to significantly expand the basic functionality with...
详细信息
The article describes the Web Application Lego Toolkit (WALT), which is a template-oriented platform designed for the development of web applications of various degrees of complexity. Unlike some other platforms, whic...
详细信息
Mobile health (MH) technologies and electronic medical record represent a powerful solution which can help both patients and doctors in daily health monitoring and treatment, especially for patient's leaves in rur...
详细信息
Industry Foundation Classes(IFC) defines the standard exchange data format of building information model. For making it possible to serve the whole life cycle of structure, it is necessary to parse and save BIM inform...
详细信息
Two code fragments that are identical to each other and repeatedly being implemented in a software program are called code clones. Code clones are classified into four different type which are clone Type-1, clone Type...
详细信息
暂无评论