Zobrazeno 1 - 10
of 1 686
pro vyhledávání: '"Bacchelli, A."'
Autor:
Xu, Jinwei, Zhang, He, Yang, Yanjin, Cheng, Zeru, Lyu, Jun, Liu, Bohan, Zhou, Xin, Yang, Lanxin, Bacchelli, Alberto, Chiam, Yin Kia, Chiew, Thiam Kian
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode has more quality and security issues than human-authored code (HaCode). It is common for LLMgCode to mix with
Externí odkaz:
http://arxiv.org/abs/2412.16525
Autor:
Rani, Pooja, Zellweger, Jonas, Kousadianos, Veronika, Cruz, Luis, Kehrer, Timo, Bacchelli, Alberto
As the energy footprint generated by software is increasing at an alarming rate, understanding how to develop energy-efficient applications has become a necessity. Previous work has introduced catalogs of coding practices, also known as energy patter
Externí odkaz:
http://arxiv.org/abs/2401.06482
Compliance with the European Union's Platform-to-Business (P2B) Regulation is challenging for online platforms, and assessing their compliance can be difficult for public authorities. This is partly due to the lack of automated tools for assessing th
Externí odkaz:
http://arxiv.org/abs/2312.14794
Autor:
Petrulio, Fernando, Ackermann, David, Fregnan, Enrico, Calikli, Gül, Castelluccio, Marco, Ledru, Sylvestre, Denizet, Calixte, Humphries, Emma, Bacchelli, Alberto
In the multi-commit development model, programmers complete tasks (e.g., implementing a feature) by organizing their work in several commits and packaging them into a commit-set. Analyzing data from developers using this model can be useful to tackle
Externí odkaz:
http://arxiv.org/abs/2209.03311
Autor:
Braz, Larissa, Bacchelli, Alberto
To avoid software vulnerabilities, organizations are shifting security to earlier stages of the software development, such as at code review time. In this paper, we aim to understand the developers' perspective on assessing software security during c
Externí odkaz:
http://arxiv.org/abs/2208.04261
The most popular code review tools (e.g., Gerrit and GitHub) present the files to review sorted in alphabetical order. Could this choice or, more generally, the relative position in which a file is presented bias the outcome of code reviews? We inves
Externí odkaz:
http://arxiv.org/abs/2208.04259
Background: Security regressions are vulnerabilities introduced in a previously unaffected software system. They often happen as a result of source code changes (e.g., a bug fix) and can have severe effects. Aims: To increase the understanding of sec
Externí odkaz:
http://arxiv.org/abs/2207.01942
Autor:
Maria Giuseppa Vitale, Cecilia Nasso, Beatrice Riccò, Alessandro Bocconi, Chiara Chiavelli, Cinzia Baldessari, Stefania Pipitone, Francesca Bacchelli, Laura Botticelli, Massimo Dominici, Roberto Sabbatini
Publikováno v:
Case Reports in Oncology, Vol 17, Iss 1, Pp 564-572 (2024)
Introduction: Vaginal cancer is a rare gynecologic malignancy. While in a localized disease, concurrent chemoradiation grants local control and better overall survival, in a metastatic setting, the management options are very limited. Furthermore, re
Externí odkaz:
https://doaj.org/article/8508f19a4fed4db78fdb8f4292f8f7b8
Autor:
Marta Viggiano, Fabiola Ceroni, Paola Visconti, Annio Posar, Maria Cristina Scaduto, Laura Sandoni, Irene Baravelli, Cinzia Cameli, Magali J. Rochat, Alessandra Maresca, Alessandro Vaisfeld, Davide Gentilini, Luciano Calzari, Valerio Carelli, Michael C. Zody, Elena Maestrini, Elena Bacchelli
Publikováno v:
npj Genomic Medicine, Vol 9, Iss 1, Pp 1-15 (2024)
Abstract Autism spectrum disorder (ASD) is a complex neurodevelopmental condition with a strong genetic component in which rare variants contribute significantly to risk. We performed whole genome and/or exome sequencing (WGS and WES) and SNP-array a
Externí odkaz:
https://doaj.org/article/9acf2625b96d4dc9b71c18093b1268fb
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previous research has shown that developers often miss even popular and easy-to-detect vulnerabilities during code review. Initial evidence suggests that a s
Externí odkaz:
http://arxiv.org/abs/2202.04586