Suggested Topics within your search.
Suggested Topics within your search.
-
61
Generating Distractors for Code Completion Problems: Can LLM Assist Instructors?
Published 2025-05-01Get full text
Article -
62
Automated Assessment of Student Self-explanation During Source Code Comprehension
Published 2022-05-01Get full text
Article -
63
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Get full text
Article -
64
Constraints in code-switching: a case study from Basque and Spanish
Published 2025-01-01Get full text
Article -
65
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01Get full text
Article -
66
Deciphering the Strategic Codes of Organizing: Political Undertones in Orwell’s Animal Farm
Published 2024-04-01Get full text
Article -
67
Relationship of transposable elements with long non-coding RNAs and peptides in carcinogenesis
Published 2023-12-01Get full text
Article -
68
Received value flipping based sphere decoding algorithm for polar codes
Published 2024-12-01Get full text
Article -
69
Malicious code within model detection method based on model similarity
Published 2023-08-01Get full text
Article -
70
Roles of Non-Coding RNA in Anthracycline Cardiotoxicity: A Narrative Review
Published 2025-07-01Get full text
Article -
71
The Necessity of Using MRI as an Imaging Modality in Acute Code Stroke in Indonesia
Published 2025-04-01Get full text
Article -
72
Non-Coding RNAs in Diagnostic Pathology of High-Grade Central Osteosarcoma
Published 2025-05-01“…Consequently, there is a pressing need to further enhance diagnostic security. …”
Get full text
Article -
73
‘It’s bawdier in Greek’: A.C. Swinburne’s Subversions of the Hellenic Code
Published 2013-09-01Get full text
Article -
74
“Cheating, No Matter How You Try to Dress It up”. Newspaper Coverage of Polyamory, 1994–2023
Published 2025-08-01Get full text
Article -
75
Research on Sparse Code Multiple Access Detection Technology in Satellite Communication Systems
Published 2020-09-01Get full text
Article -
76
The Sabinus Code: A Contribution to the Discussion on Political Agitation on Roman Republican Coins
Published 2024-10-01Get full text
Article -
77
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01Get full text
Article -
78
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01Get full text
Article -
79
Design and application of coding method for crop production places based on GIS technology
Published 2009-01-01Get full text
Article -
80
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01Get full text
Article