Showing 141 - 160 results of 452 for search '(( code ((generation algorithm) OR (selection algorithm)) ) OR ( code encryption algorithm ))*', query time: 0.48s Refine Results
  1. 141
  2. 142
  3. 143
  4. 144
  5. 145
  6. 146
  7. 147
  8. 148
  9. 149
  10. 150

    Code snippet from “Netty/Buffer” Maven artefact. by Matthew Yit Hang Yeow (20721206)

    Published 2025
    “…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
  11. 151

    Greedy optimization algorithm. by Alexis Bénichou (19832361)

    Published 2024
    “…The horizontal orange dashed line indicates the codelength of the corresponding simple graph model without motifs (see Motif-free reference codes). (D) The algorithm is run a hundred times for each dyadic base model and the most compressing model is selected. …”
  12. 152

    Code snippet from “Apache Dubbo” GitHub project. by Matthew Yit Hang Yeow (20721206)

    Published 2025
    “…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
  13. 153
  14. 154
  15. 155

    Flowchart for GR codes. by R. Sakthivel (2589547)

    Published 2024
    “…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
  16. 156
  17. 157

    Mechanomics Code - JVT by Carlo Vittorio Cannistraci (5854046)

    Published 2025
    “…At the beginning of the code, there is a help section that explains how to use it.…”
  18. 158

    Evolutionary analysis of the <i>Strumpellin</i> coding sequences by Maximum Likelihood method. by Yusr Saadi-Ben Aoun (20469385)

    Published 2024
    “…Initial tree(s) for the heuristic search were obtained automatically by applying Neighbor-Join and BioNJ algorithms to a matrix of pairwise distances estimated using the Tamura 3 parameter model, and then selecting the topology with superior log likelihood value. …”
  19. 159
  20. 160