Search results for "lähdekoodit"
showing 7 items of 7 documents
Multicriteria decision making taxonomy of code recommendation system challenges: a fuzzy-AHP analysis
2022
AbstractThe recommendation systems plays an important role in today’s life as it assist in reliable selection of common utilities. The code recommendation system is being used by the code databases (GitHub, source frog etc.) aiming to recommend the more appropriate code to the users. There are several factors that could negatively impact the performance of code recommendation systems (CRS). This study aims to empirically explore the challenges that could have critical impact on the performance of the CRS. Using systematic literature review and questionnaire survey approaches, 19 challenges were identified. Secondly, the investigated challenges were further prioritized using fuzzy-AHP analys…
Investigating Novice Developers’ Code Commenting Trends Using Machine Learning Techniques
2023
Code comments are considered an efficient way to document the functionality of a particular block of code. Code commenting is a common practice among developers to explain the purpose of the code in order to improve code comprehension and readability. Researchers investigated the effect of code comments on software development tasks and demonstrated the use of comments in several ways, including maintenance, reusability, bug detection, etc. Given the importance of code comments, it becomes vital for novice developers to brush up on their code commenting skills. In this study, we initially investigated what types of comments novice students document in their source code and further categoriz…
Symbolic analysis and atomistic model as a basis for a program comprehension methodology
2008
Erkki Laitila tutki väitöskirjassaan tietokoneohjelmien lähdekoodin automaattista tulkintaa. Hän kehitti ohjelmistojen ymmärtämistä palvelemaan symbolisen analyysin, jossa koodia simuloidaan haluttuina paloina ja tuloksena saadaan sen muuttamista tukevaa perustelutietoa.Laitilan kuvaama symbolinen analyysi on atomistisella mallilla, abstraktilla koneella ja tietämyksen keruulla täydennettynä yhtenäinen, usean automaatin muodostama ketju.- Syntynyt kokonaisuus on uusi mahdollisuus analysointiin, jossa ohjelman alustavaa tarkastelua, testausta ja oikeellisuuden arviointia voidaan tehdä aina niissä paloissa ja portaissa, jotka kulloinkin tuntuvat järkeviltä ja ovat kussakin ohjelmisto-organisa…
Source code of the dissertation "Open sourcing Digital Heritage : digital surrogates, museums and knowledge management in age of open networks"
2012
Sisältää väitöskirjan lähdeaineistot.
Korppi-opintotietojärjestelmän tietokantakyselyiden nopeuttaminen
2008
Sima – an Open-source Simulation Framework for Realistic Large-scale Individual-level Data Generation
2021
We propose a framework for realistic data generation and the simulation of complex systems and demonstrate its capabilities in a health domain example. The main use cases of the framework are predicting the development of variables of interest, evaluating the impact of interventions and policy decisions, and supporting statistical method development. We present the fundamentals of the framework by using rigorous mathematical definitions. The framework supports calibration to a real population as well as various manipulations and data collection processes. The freely available open-source implementation in R embraces efficient data structures, parallel computing, and fast random number gener…
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…