Zobrazeno 1 - 10
of 2 914
pro vyhledávání: '"code analysis"'
Publikováno v:
Applied Computer Systems, Vol 29, Iss 1, Pp 98-111 (2024)
The primary expectation from a software system revolves around its functionality. However, as the software development process advances, equal emphasis is placed on the quality of the software system for non-functional attributes like maintainability
Externí odkaz:
https://doaj.org/article/9de3ff174c9f4675b3baa9ab11d89eb5
Autor:
Frantz, Miles Eugene
With the rise of development efforts, there has also been a rise in source code vulnerabilities. Advanced security tools have been created to identify these vulnerabilities throughout the lifetime of the developer's ecosystem and afterward, before th
Externí odkaz:
https://hdl.handle.net/10919/121100
Publikováno v:
IEEE Access, Vol 12, Pp 173647-173659 (2024)
The quality of modern software relies heavily on the effective use of static code analysis tools. To improve their usefulness, these tools should be evaluated using a framework that prioritizes collaboration, user-friendliness, and long-term sustaina
Externí odkaz:
https://doaj.org/article/e2009f2e1b79423fb89e96c292f8c36a
Autor:
Danilo Nikolic, Darko Stefanovic, Miroslav Nikolic, Dusanka Dakic, Miroslav Stefanovic, Sara Koprivica
Publikováno v:
IEEE Access, Vol 12, Pp 168229-168244 (2024)
The role of static code analysis in enhancing the quality of software codes is widely acknowledged. Static code analysis facilitates the examination of code for irregularities without program execution, which significantly impacts project quality. Fu
Externí odkaz:
https://doaj.org/article/21e641cd708b45edb9171fcf5efe97f8
Publikováno v:
IEEE Access, Vol 12, Pp 151955-151974 (2024)
Ensuring the security and safety of a real-time operating system (RTOS) is crucial for protecting against potential cyber-attacks. A robust system can provide reliable and uninterrupted operations in the system as well as protect sensitive data and c
Externí odkaz:
https://doaj.org/article/92fa876284c04c18b9402ddb9dd61338
Autor:
Hameeza Ahmed, Muhammad Fahim Ul Haque, Hashim Raza Khan, Ghalib Nadeem, Kamran Arshad, Khaled Assaleh, Paulo Cesar Santos
Publikováno v:
IEEE Access, Vol 12, Pp 121700-121711 (2024)
Compiler is a tool that converts the high-level language into assembly code after enabling relevant optimizations. The automatic selection of suitable optimizations from an ample optimization space is a non-trivial task mainly accomplished through ha
Externí odkaz:
https://doaj.org/article/b013f57bc5ba40f58291ca9339fdba28
Autor:
Philipp Haindl, Gerald Weinberger
Publikováno v:
IEEE Access, Vol 12, Pp 114146-114156 (2024)
In the realm of AI-enhanced programming education, there is growing interest in using such tools to help students understand good coding principles. This study investigates the impact of ChatGPT on code quality among part-time undergraduate students
Externí odkaz:
https://doaj.org/article/7634d012ba9848ea969965395c489e3a
Publikováno v:
IEEE Access, Vol 12, Pp 71746-71760 (2024)
In the evolving landscape of cybersecurity, the prevalence of malicious Visual Basic for Applications (VBA) macros embedded in Office documents presents a formidable challenge. These macros, while integral to automation, have become potent vehicles f
Externí odkaz:
https://doaj.org/article/99837f517dc74742a632851a1de499a3
Publikováno v:
Future Internet, Vol 16, Iss 11, p 416 (2024)
When developing a distributed application, several issues need to be handled, and software components should include some mechanisms to make their execution resilient when network faults, delays, or tampering occur. For example, synchronous calls rep
Externí odkaz:
https://doaj.org/article/cfbdfd2392fc456fbb047d0f9411a506
Publikováno v:
Российский технологический журнал, Vol 12, Iss 2 (2024)
Objectives. This paper examines the various approaches to analyzing the impact of software changes, and suggests a new method using function control flows. Impact analysis of software change can require the investment of a lot of time and competence
Externí odkaz:
https://doaj.org/article/983e4976609f444e83ba9787ca89ff6d