Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), segmentation algorithm (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
code encryption » image encryption (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), segmentation algorithm (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
code encryption » image encryption (Expand Search)
-
141
-
142
-
143
-
144
-
145
-
146
-
147
-
148
-
149
-
150
Code snippet from “Netty/Buffer” Maven artefact.
Published 2025“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
-
151
Greedy optimization algorithm.
Published 2024“…The horizontal orange dashed line indicates the codelength of the corresponding simple graph model without motifs (see Motif-free reference codes). (D) The algorithm is run a hundred times for each dyadic base model and the most compressing model is selected. …”
-
152
Code snippet from “Apache Dubbo” GitHub project.
Published 2025“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
-
153
-
154
-
155
Flowchart for GR codes.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
156
-
157
Mechanomics Code - JVT
Published 2025“…At the beginning of the code, there is a help section that explains how to use it.…”
-
158
Evolutionary analysis of the <i>Strumpellin</i> coding sequences by Maximum Likelihood method.
Published 2024“…Initial tree(s) for the heuristic search were obtained automatically by applying Neighbor-Join and BioNJ algorithms to a matrix of pairwise distances estimated using the Tamura 3 parameter model, and then selecting the topology with superior log likelihood value. …”
-
159
-
160