Results 51 to 60 of about 18,338 (256)

The Myths of Blockchain Governance

open access: yesCorporate Governance: An International Review, Volume 34, Issue 1, Page 154-162, January 2026.
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley   +1 more source

VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis

open access: yesIET Software, 2023
Smart contracts have gained immense popularity in recent years as self-executing programs that operate on a blockchain. However, they are not immune to security flaws, which can result in significant financial losses.
Rexford Nii Ayitey Sosu   +3 more
doaj   +1 more source

Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1896-1910, November 2025.
ABSTRACT Background Just‐In‐Time (JIT) compilation plays a critical role in optimizing the performance of modern virtual machines (VMs). While the architecture of VMs–register‐based or stack‐based–has long been a subject of debate, empirical analysis focusing on JIT compilation performance is relatively sparse. Objective In this study, we aim to answer
Bohuslav Šimek   +2 more
wiley   +1 more source

Metamorphic Code Generation from LLVM IR Bytecode [PDF]

open access: yes, 2013
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks   +4 more
core   +3 more sources

Jumble Java Byte Code to Measure the Effectiveness of Unit Tests [PDF]

open access: yes, 2007
Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects.
Cleary, John G.   +5 more
core   +2 more sources

Exploring the Interaction of Code Coverage and Non‐Coverage Objectives in Search‐Based Test Generation

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 6-7, September‐November 2025.
We assess five hypotheses about the interaction of structural coverage‐based and tester goal‐based objectives in search‐based test generation, focusing on coverage, goal attainment, fault detection, test suite size, test case length and the impact of search budget.
Afonso Fontes, Gregory Gay, Robert Feldt
wiley   +1 more source

On the Performance of Bytecode Interpreters in Prolog [PDF]

open access: yes, 2021
The semantics and the recursive execution model of Prolog make it very natural to express language interpreters in form of AST (Abstract Syntax Tree) interpreters where the execution follows the tree representation of a program. An alternative implementation technique is that of bytecode interpreters.
Philipp Körner   +2 more
openaire   +2 more sources

Automating Data Extraction From Scientific Literature and General PDF Files Using Large Language Models and KNIME: An Application in Toxicology

open access: yesWIREs Computational Molecular Science, Volume 15, Issue 5, September/October 2025.
This study presents an innovative automated KNIME workflow that integrates document parsing tools and large language models (LLMs) to streamline the extraction of key data from publications. Demonstrating high accuracy, the method enhances data processing efficiency and access, thereby supporting advancements in toxicological research and beyond ...
José Teófilo Moreira‐Filho   +12 more
wiley   +1 more source

Supporting Java programming in the Svace static analyzer

open access: yesТруды Института системного программирования РАН, 2018
The paper is devoted to the works performed within the Svace static analysis tool to support Java language. First, the approach to intercept compilation process for transparently building the analyzer internal representation should be extended to cover ...
A. P. Merkulov   +2 more
doaj   +1 more source

Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network

open access: yesFuture Internet, 2022
With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses.
Yujian Zhang, Daifu Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy