462 results on '"Gerardo, Canfora"'
Search Results
2. How do Hugging Face Models Document Datasets, Bias, and Licenses? An Empirical Study.
3. SBOM Ouverture: What We Need and What We Have.
4. An empirical investigation on the trade-off between smart contract readability and gas consumption.
5. An NLP-based Tool for Software Artifacts Analysis.
6. iSCREAM: a suite for Smart Contract REAdability assessMent.
7. Detecting Video Game-Specific Bad Smells in Unity Projects.
8. About the Robustness and Looseness of Yara Rules.
9. Repadiography: towards a visual support for triaging repackaged apps.
10. Ticket Tagger: Machine Learning Driven Issue Classification.
11. A Study on the Interplay between Pull Request Review and Continuous Integration Builds.
12. A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts.
13. SURF: summarizer of user reviews feedback.
14. How open source projects use static code analysis tools in continuous integration pipelines.
15. Android apps and user feedback: a dataset for software evolution and quality improvement.
16. Mobile Silent and Continuous Authentication using Apps Sequence.
17. s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables.
18. Ransomware at X-Rays.
19. Beacon-based context-aware architecture for crowd sensing public transportation scheduling and user habits.
20. DECA: development emails content analyzer.
21. ARdoc: app reviews development oriented classifier.
22. What would users change in my app? summarizing app reviews for recommending software changes.
23. A Methodology for Silent and Continuous Authentication in Mobile Environment.
24. How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis.
25. Silent and Continuous Authentication in Mobile Environment.
26. Exploring Mobile User Experience Through Code Quality Metrics.
27. Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection.
28. A systematic literature review of IoT time series anomaly detection solutions
29. Detecting Android malware using sequences of system calls.
30. Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications.
31. Mobile Malware Detection using Op-code Frequency Histograms.
32. Development Emails Content Analyzer: Intention Mining in Developer Discussions (T).
33. How can i improve my app? Classifying user reviews for software maintenance and evolution.
34. Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.
35. Composition-Malware: Building Android Malware at Run Time.
36. Mobile malware detection in the real world.
37. A Novel Classification Technique based on Formal Methods
38. How the evolution of emerging collaborations relates to code changes: an empirical study.
39. CODES: mining source code descriptions from developers discussions.
40. Automatic generation of release notes.
41. Recommending refactorings based on team co-maintenance patterns.
42. How Developers' Collaborations Identified from Different Sources Tell Us about Code Changes.
43. Detection of Malicious Web Pages Using System Calls Sequences.
44. An approach for restructuring text content.
45. YODA: young and newcomer developer assistant.
46. Migrating Android Applications towards Service-centric Architectures with Sip2Share.
47. A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones.
48. Multi-objective Cross-Project Defect Prediction.
49. An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks.
50. The Evolution of Project Inter-dependencies in a Software Ecosystem: The Case of Apache.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.