Search results for "koodit"
showing 9 items of 19 documents
Desiccation risk favours prevalence and diversity of tardigrade communities and influences their trophic structure in alpine ephemeral rock pools
2022
AbstractRock pools are ephemeral freshwater habitats characterized by their small size, well-defined boundaries, and periodic desiccation, making them ideal model systems to answer numerous ecological questions. Although there are numerous studies on rock pool fauna around the world, tardigrades have only rarely been recorded. We conducted the first tardigrade-focused study on rock pools by quantitatively extracting and classifying them from rock pools in the Italian Apennines. Rock pools were divided into three types, based on maximum duration of their inundation period. Following the patterns usually observed with rock pool invertebrates, we tested the hypothesis that desiccation has a ne…
Investigating Novice Developers’ Code Commenting Trends Using Machine Learning Techniques
2023
Code comments are considered an efficient way to document the functionality of a particular block of code. Code commenting is a common practice among developers to explain the purpose of the code in order to improve code comprehension and readability. Researchers investigated the effect of code comments on software development tasks and demonstrated the use of comments in several ways, including maintenance, reusability, bug detection, etc. Given the importance of code comments, it becomes vital for novice developers to brush up on their code commenting skills. In this study, we initially investigated what types of comments novice students document in their source code and further categoriz…
Symbolic analysis and atomistic model as a basis for a program comprehension methodology
2008
Erkki Laitila tutki väitöskirjassaan tietokoneohjelmien lähdekoodin automaattista tulkintaa. Hän kehitti ohjelmistojen ymmärtämistä palvelemaan symbolisen analyysin, jossa koodia simuloidaan haluttuina paloina ja tuloksena saadaan sen muuttamista tukevaa perustelutietoa.Laitilan kuvaama symbolinen analyysi on atomistisella mallilla, abstraktilla koneella ja tietämyksen keruulla täydennettynä yhtenäinen, usean automaatin muodostama ketju.- Syntynyt kokonaisuus on uusi mahdollisuus analysointiin, jossa ohjelman alustavaa tarkastelua, testausta ja oikeellisuuden arviointia voidaan tehdä aina niissä paloissa ja portaissa, jotka kulloinkin tuntuvat järkeviltä ja ovat kussakin ohjelmisto-organisa…
Source code of the dissertation "Open sourcing Digital Heritage : digital surrogates, museums and knowledge management in age of open networks"
2012
Sisältää väitöskirjan lähdeaineistot.
Kodväxling och polyfoni : en fallstudie i kodväxling mellan standardsvenska, edamål och finska
2002
Kun projekti tuli kuntaan : Euroopan sosiaalirahaston työllisyysprojekti ja viranomaisyhteistyö pienillä paikkakunnilla
2005
Korppi-opintotietojärjestelmän tietokantakyselyiden nopeuttaminen
2008
Sima – an Open-source Simulation Framework for Realistic Large-scale Individual-level Data Generation
2021
We propose a framework for realistic data generation and the simulation of complex systems and demonstrate its capabilities in a health domain example. The main use cases of the framework are predicting the development of variables of interest, evaluating the impact of interventions and policy decisions, and supporting statistical method development. We present the fundamentals of the framework by using rigorous mathematical definitions. The framework supports calibration to a real population as well as various manipulations and data collection processes. The freely available open-source implementation in R embraces efficient data structures, parallel computing, and fast random number gener…
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…