This paper will improve the fundamental ant colony optimization algorithm in the context of mobile robot path planning in response to its flaws, which include easy descent into a local optimum, a large number of infle...
详细信息
To address the issue of delay-sensitive data collection in wireless sensor networks (WSNs), autonomous aerial vehicles (AAVs) offer a promising solution due to their flexibility and maneuverability. We investigate the...
详细信息
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ...
详细信息
The rapid proliferation of connected vehicles has significantly expanded the attack surface of the Internet of Vehicles (IoV), introducing severe security risks. In such resource-constrained environments, developing l...
详细信息
To reduce key disagreement rate and increase key generation rate, this paper proposes a lightweight and robust shared secret key extraction scheme from atmospheric optical wireless channel. A conception of grouping sa...
详细信息
Privacy-preserving statistical analysis enables the data center to analyze datasets from multiple data owners, extracting valuable insights while safeguarding privacy. However, the observation of microdata involvement...
详细信息
From the perspective of state-channel interaction,standard quantum teleportation can be viewed as a communication process characterized by both input and output,functioning as a quantum depolarizing *** achieve a prec...
详细信息
From the perspective of state-channel interaction,standard quantum teleportation can be viewed as a communication process characterized by both input and output,functioning as a quantum depolarizing *** achieve a precise quantification of the quantumness introduced by this channel,we examine its uncertainties,which encompass both statedependent and state-independent ***,for qudit systems,we provide general formulas for these *** analyze the uncertainties associated with standard quantum teleportation when induced by isotropic states,Werner states,and X-states,and we elucidate the correlation between these uncertainties and the parameters of the specific mixed *** findings demonstrate the validity of quantifying these uncertainties.
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded *** address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor that...
详细信息
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded *** address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor that supports multiple different ***,due to constraints in cost and performance,the architecture of a multiple-ISA processor must be carefully optimized to meet the specific requirements of embedded *** exploring the RISC-V and ARM Thumb ISAs,this paper proposes RVAM16,which is an optimized multiple-ISA processor microarchitecture for embedded devices based on hardware binary translation *** results show that,when running non-native ARM Thumb programs,RVAM16 achieves a significant speedup of over 2.73×with less area and energy consumption compared to using hardware binary translation alone,reaching more than 70%of the performance of native RISC-V programs.
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scru...
详细信息
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scrutinize changes made to source code. However, in large-scale open-source projects, selecting the most suitable reviewers for a specific change can be a challenging task. To address this, we introduce the Code Context Based Reviewer Recommendation (CCB-RR), a model that leverages information from changesets to recommend the most suitable reviewers. The model takes into consideration the paths of modified files and the context derived from the changesets, including their titles and descriptions. Additionally, CCB-RR employs KeyBERT to extract the most relevant keywords and compare the semantic similarity across changesets. The model integrates the paths of modified files, keyword information, and the context of code changes to form a comprehensive picture of the changeset. We conducted extensive experiments on four open-source projects, demonstrating the effectiveness of CCB-RR. The model achieved a Top-1 accuracy of 60%, 55%, 51%, and 45% on the Android, OpenStack, QT, and LibreOffice projects respectively. For Mean Reciprocal Rank (MRR), CCB achieved 71%, 62%, 52%, and 68% on the same projects respectively, thereby highlighting its potential for practical application in code reviewer recommendation.
暂无评论