Results 241 to 250 of about 7,941 (270)
Some of the next articles are maybe not open access.

Type directed cloning for Object-Oriented programs

1996
Object-oriented programming encourages the use of small functions, dynamic dispatch (virtual functions), and inheritance for code reuse. As a result, such programs typically suffer from inferior performance. The problem is that polymorphic functions do not know the exact types of the data they operate on, and hence must use indirection to operate on ...
John Plevyak, Andrew A. Chien
openaire   +1 more source

Cloning and expression of the programmed cell death regulator Bad in the rat brain

Neuroscience Letters, 1998
The Bcl-2 family of proteins consists of both antagonists (e.g. Bcl-2) and agonists (e.g. Bax) that regulate apoptosis and compete through dimerization. In the present study we cloned the cDNA encoding the rat brain BAD, a distant member of the Bcl-2 family that was shown to promote cell death.
D'AGATA, VELIA MARIA   +4 more
openaire   +5 more sources

Clone-Slicer

Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018
In this paper, we presented a novel framework, Clone-Slicer, a domain-specific code clone detector for binary executables, that integrates program slicing and a deep learning based binary code clone modeling framework to improve the number of code clone detected.
Guru Venkataramani, Hongfa Xue, Tian Lan
openaire   +2 more sources

Heap cloning: Enabling dynamic symbolic execution of java programs [PDF]

open access: possible2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
The dynamic symbolic-execution technique can automatically perform symbolic execution of programs that use problematic features of Java, such as native methods. However, to compute precise symbolic execution, the technique requires manual effort to specify models for problematic code.
Mary Jean Harrold, Saswat Anand
openaire   +1 more source

Molecular cloning, expression and characterization of Pekin duck programmed death-1

Gene, 2019
Programmed death-1 (PD-1) has a pivotal role in the attenuation of adaptive immune responses and peripheral tolerance. Here we describe the identification of the Pekin duck programmed death-1 orthologue (duPD-1). The duPD-1 cDNA encodes a 283-amino acid polypeptide that has an amino acid identity of 70%, 32% and 31% with chicken, murine and human PD-1,
Qingxia Yao   +3 more
openaire   +3 more sources

POLLUX: a program for simulated cloning, mutagenesis and database searching of DNA constructs

Bioinformatics, 1991
Computer support for research in biotechnology has developed rapidly and has provided several tools to aid the researcher. This report describes the capabilities of new computer software developed in this laboratory to aid in the documentation and planning of experiments in molecular biology.
Henry E. Dayringer, Scott A. Sammons
openaire   +3 more sources

Induction machine fault detection using clone selection programming

Expert Systems with Applications, 2009
A clonal selection programming (CSP)-based fault detection system is developed for performing induction machine fault detection and analysis. Four feature vectors are extracted from power spectra of machine vibration signals. The extracted features are inputs of an CSP-based classifier for fault identification and classification.
Mingbo Zhao   +2 more
openaire   +2 more sources

Sampling code clones from program dependence graphs with GRAPLE

Proceedings of the 2nd International Workshop on Software Analytics, 2016
We present GRAPLE, a method to generate a representative sample of recurring (frequent) subgraphs of any directed labeled graph(s). GRAPLE is based on frequent subgraph mining, absorbing Markov chains, and Horvitz-Thompson estimation. It can be used to sample any kind of graph representation for programs.
Tim A. D. Henderson, Andy Podgurski
openaire   +2 more sources

Enhancing Quality of Code Clone Detection with Program Dependency Graph

2009 16th Working Conference on Reverse Engineering, 2009
At present, there are various kinds of code clone detection techniques. PDG-based detection is suitable to detect non-contiguous code clones meanwhile other detection techniques are not suited to detect them. However, there is a tendency that it cannot detect contiguous code clones unlike string-based or token-based technique.
Yoshiki Higo, Shinji Kusumoto
openaire   +2 more sources

30 Vitrification of Equine Embryos: Application in a Commercial Cloning Program

Reproduction, Fertility and Development, 2018
During a commercial horse cloning program, a critical point is the availability and maintenance of suitable recipient mares for a large quantity of embryo transfers. Usually, pregnancy rates and viable births off the breeding season decrease significantly, whereas the rate of in vitro embryo production remains constant.
G. Vichera   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy