Results 1 to 10 of about 67 (67)

Linear Dependent Type Theory for Quantum Programming Languages [PDF]

open access: yesLogical Methods in Computer Science, 2022
Modern quantum programming languages integrate quantum resources and classical control. They must, on the one hand, be linearly typed to reflect the no-cloning property of quantum resources.
Peng Fu, Kohei Kishida, Peter Selinger
doaj   +1 more source

Location decision of low-altitude service station for transfer flight based on modified immune algorithm [PDF]

open access: yesPeerJ Computer Science, 2023
The location of Low-Altitude Flight Service Station (LAFSS) is a comprehensive decision work, and it is also a multi-objective optimization problem (MOOP) with constraints. As a swarm intelligence search algorithm for solving constrained MOOP, the Immune
Huaqun Chen   +5 more
doaj   +2 more sources

TCCCD: Triplet-Based Cross-Language Code Clone Detection

open access: yesApplied Sciences, 2023
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang   +3 more
doaj   +1 more source

Robot Programming from a Single Demonstration for High Precision Industrial Insertion

open access: yesSensors, 2023
We propose a novel approach for robotic industrial insertion tasks using the Programming by Demonstration technique. Our method allows robots to learn a high-precision task by observing human demonstration once, without requiring any prior knowledge of ...
Kaimeng Wang   +2 more
doaj   +1 more source

How to make unforgeable money in generalised probabilistic theories [PDF]

open access: yesQuantum, 2018
We discuss the possibility of creating money that is physically impossible to counterfeit. Of course, "physically impossible" is dependent on the theory that is a faithful description of nature.
John H. Selby, Jamie Sikora
doaj   +1 more source

Update on the state of play of Animal Health and Welfare and Environmental Impact of Animals derived from SCNT Cloning and their Offspring, and Food Safety of Products Obtained from those Animals [PDF]

open access: yesEFSA Journal, 2012
<p>The European Food Safety Authority (EFSA) received in December 2011, a request from the European Commission for an update on the possible scientific developments for cloning of farmed animals for food production purposes.
European Food Safety Authority
doaj   +1 more source

Pyrite cloning: a single tube and programmed reaction cloning with restriction enzymes [PDF]

open access: yesPlant Methods, 2018
Insertion of engineered DNA fragments into bacterial vectors is the foundation of recombinant DNA technology, yet existing methods are still laborious, require many steps, depend on specific vector configuration, or require expensive reagents.We have developed a method, called "Pyrite" cloning that combines the traditional restriction enzyme digestion ...
Matthew D. Fischer   +2 more
openaire   +5 more sources

Efficient Quantum Network Communication Using Optimized Entanglement Swapping Trees

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum network communication is challenging, as the no-cloning theorem in the quantum regime makes many classical techniques inapplicable; in particular, the direct transmission of qubit states over long distances is infeasible due to unrecoverable ...
Mohammad Ghaderibaneh   +3 more
doaj   +1 more source

Scalable Program Clone Search through Spectral Analysis

open access: yesProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applications in terms of reverse engineering, program clustering, malware lineage and software theft detection ...
Tristan Benoit   +2 more
openaire   +3 more sources

Secure the Clones [PDF]

open access: yesLogical Methods in Computer Science, 2012
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy