nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative analysis of ML techniques for bug report classification
|
Laiq, Muhammad |
|
|
227 |
C |
p. |
artikel |
2 |
Architectural patterns for designing quantum artificial intelligence systems
|
Klymenko, Mykhailo |
|
|
227 |
C |
p. |
artikel |
3 |
CEGT: Smart contract vulnerability detection via Connectivity-Enhanced GCN-Transformer
|
Shang, Jiandong |
|
|
227 |
C |
p. |
artikel |
4 |
Demystifying issues, causes and solutions in LLM open-source projects
|
Cai, Yangxiao |
|
|
227 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
227 |
C |
p. |
artikel |
6 |
FMSans: An efficient approach for constraints removal and parallel analysis of feature models
|
Horcas, Jose-Miguel |
|
|
227 |
C |
p. |
artikel |
7 |
Identifying inconsistent software defect predictions with symmetry metamorphic relation pattern
|
Chan, Pak Yuen Patrick |
|
|
227 |
C |
p. |
artikel |
8 |
On the compressibility of large-scale source code datasets
|
Boffa, Antonio |
|
|
227 |
C |
p. |
artikel |
9 |
The qualitative factor in software testing: A systematic mapping study of qualitative methods
|
Ardic, Baris |
|
|
227 |
C |
p. |
artikel |
10 |
Transfer learning for software vulnerability prediction using Transformer models
|
Kalouptsoglou, Ilias |
|
|
227 |
C |
p. |
artikel |
11 |
VULOC: Vulnerability location framework based on assembly code slicing
|
Lv, Xinghang |
|
|
227 |
C |
p. |
artikel |