Results 61 to 70 of about 168,901 (241)

Glymphatic Dysfunction Reflects Post‐Concussion Symptoms: Changes Within 1 Month and After 3 Months

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Mild traumatic brain injury (mTBI) may alter glymphatic function; however, its progression and variability remain obscure. This study examined glymphatic function following mTBI within 1 month and after 3 months post‐injury to determine whether variations in glymphatic function are associated with post‐traumatic symptom severity ...
Eunkyung Kim   +3 more
wiley   +1 more source

Mapping Bug Reports to Relevant Source Code Files Based on the Vector Space Model and Word Embedding

open access: yesIEEE Access, 2019
Although software bug localization in software maintenance and evolution is cumbersome and time-consuming, it is also very important, especially for large-scale software projects.
Guangliang Liu   +4 more
doaj   +1 more source

Machine Learning or Information Retrieval Techniques for Bug Triaging: Which is better? [PDF]

open access: yese-Informatica Software Engineering Journal, 2017
Bugs are the inevitable part of a software system. Nowadays, large software development projects even release beta versions of their products to gather bug reports from users.
Anjali Goyal, Neetu Sardana
doaj   +1 more source

How Effective are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection

open access: yes, 2020
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa   +9 more
core   +1 more source

Prognostic Implications of Sleep Architecture for Patients Admitted to the Intensive Care Unit With Status Epilepticus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu   +5 more
wiley   +1 more source

A Multidocument Summarization Technique for Informative Bug Summaries

open access: yesIEEE Access
To help developers grasp bug information, bug summaries should contain bug descriptions and information on the reproduction steps, environment, and solutions to be informative for developers.
Samal Mukhtar, Seonah Lee, Jueun Heo
doaj   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

We Don't Need Another Hero? The Impact of "Heroes" on Software Development

open access: yes, 2018
A software project has "Hero Developers" when 80% of contributions are delivered by 20% of the developers. Are such heroes a good idea? Are too many heroes bad for software quality?
Bier Norman   +7 more
core   +1 more source

Shared Genetic Effects and Antagonistic Pleiotropy Between Multiple Sclerosis and Common Cancers

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Epidemiologic studies have reported inconsistent altered cancer risk in individuals with multiple sclerosis (MS). Factors such as immune dysregulation, comorbidities, and disease‐modifying therapies may contribute to this variability.
Asli Buyukkurt   +5 more
wiley   +1 more source

Towards Vulnerability Discovery Using Staged Program Analysis

open access: yes, 2016
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy