Results 51 to 60 of about 18,338 (256)
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source
VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis
Smart contracts have gained immense popularity in recent years as self-executing programs that operate on a blockchain. However, they are not immune to security flaws, which can result in significant financial losses.
Rexford Nii Ayitey Sosu +3 more
doaj +1 more source
Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?
ABSTRACT Background Just‐In‐Time (JIT) compilation plays a critical role in optimizing the performance of modern virtual machines (VMs). While the architecture of VMs–register‐based or stack‐based–has long been a subject of debate, empirical analysis focusing on JIT compilation performance is relatively sparse. Objective In this study, we aim to answer
Bohuslav Šimek +2 more
wiley +1 more source
Metamorphic Code Generation from LLVM IR Bytecode [PDF]
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks +4 more
core +3 more sources
Jumble Java Byte Code to Measure the Effectiveness of Unit Tests [PDF]
Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects.
Cleary, John G. +5 more
core +2 more sources
We assess five hypotheses about the interaction of structural coverage‐based and tester goal‐based objectives in search‐based test generation, focusing on coverage, goal attainment, fault detection, test suite size, test case length and the impact of search budget.
Afonso Fontes, Gregory Gay, Robert Feldt
wiley +1 more source
On the Performance of Bytecode Interpreters in Prolog [PDF]
The semantics and the recursive execution model of Prolog make it very natural to express language interpreters in form of AST (Abstract Syntax Tree) interpreters where the execution follows the tree representation of a program. An alternative implementation technique is that of bytecode interpreters.
Philipp Körner +2 more
openaire +2 more sources
This study presents an innovative automated KNIME workflow that integrates document parsing tools and large language models (LLMs) to streamline the extraction of key data from publications. Demonstrating high accuracy, the method enhances data processing efficiency and access, thereby supporting advancements in toxicological research and beyond ...
José Teófilo Moreira‐Filho +12 more
wiley +1 more source
Supporting Java programming in the Svace static analyzer
The paper is devoted to the works performed within the Svace static analysis tool to support Java language. First, the approach to intercept compilation process for transparently building the analyzer internal representation should be extended to cover ...
A. P. Merkulov +2 more
doaj +1 more source
Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network
With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses.
Yujian Zhang, Daifu Liu
doaj +1 more source

