Results 31 to 40 of about 6,692,619 (327)

Secure the Clones [PDF]

open access: yesLogical Methods in Computer Science, 2012
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen   +2 more
doaj   +1 more source

Custom-tailored clone detection for IEC 61131-3 programming languages [PDF]

open access: yesJournal of Systems and Software, 2021
JSS: Special Issue on Clone ...
Kamil Rosiak   +4 more
openaire   +2 more sources

META-HEURISTIC CLONAL SELECTION ALGORITHM FOR OPTIMIZATION OF FOREST PLANNING

open access: yesRevista Árvore, 2018
It is important to evaluate the application of new technologies in the field of computational science to forest science. The goal of this study was to test a different kind of metaheuristic, namely Clonal Selection Algorithm, in a forest planning problem.
Carlos Alberto Araújo Júnior   +5 more
doaj   +1 more source

MAGDA: A Mobile Agent based Grid Architecture [PDF]

open access: yes, 2006
Mobile agents mean both a technology and a programming paradigm. They allow for a flexible approach which can alleviate a number of issues present in distributed and Grid-based systems, by means of features such as migration, cloning, messaging and other
B. DI MARTINO   +3 more
core   +1 more source

Building a Cybersecurity Engineering Program? Begin by Cloning Your Computer Engineering Program [PDF]

open access: yes2020 ASEE Virtual Annual Conference Content Access Proceedings, 2020
The nation is facing an increasing need for a workforce trained in elements of cyber security. The demand for workers in computer and information technology occupations is well-documented. The Bureau of Labor Statistics has projected a 12 percent growth in the number of job offerings from 2018 to 2028[1].
Douglas Jacobson, Julie Rursch
openaire   +2 more sources

Probabilistic theories with purification [PDF]

open access: yes, 2009
We investigate general probabilistic theories in which every mixed state has a purification, unique up to reversible channels on the purifying system. We show that the purification principle is equivalent to the existence of a reversible realization of ...
G. Chiribella   +2 more
semanticscholar   +1 more source

Harmfulness of Code Duplication - A Structured Review of the Evidence [PDF]

open access: yes, 2009
Duplication of code has long been thought to decrease changeability of systems, but recently doubts have been expressed whether this is true in general.
Hordijk, Wiebe   +2 more
core   +14 more sources

Detecting Clones Across Microsoft .NET Programming Languages [PDF]

open access: yes2012 19th Working Conference on Reverse Engineering, 2012
The Microsoft .NET framework and its language family focus on multi-language development to support interoperability across several programming languages. The framework allows for the development of similar applications in different languages through the reuse of core libraries.
Farouq Al-Omari   +3 more
openaire   +1 more source

Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution

open access: yesIEEE Transactions on Dependable and Secure Computing, 2016
In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [
Stijn Volckaert   +2 more
semanticscholar   +1 more source

Summary of Token-based Source Code Clone Detection Techniques [PDF]

open access: yesJisuanji kexue
Code cloning refers to the generation of similar or identical code during software development due to the reuse,modification,and refactoring of source code.Code cloning has a positive impact on improving software development efficiency and redu-cing ...
LIU Chunling, QI Xuyan, TANG Yonghe, SUN Xuekai, LI Qinghao, ZHANG Yu
doaj   +1 more source

Home - About - Disclaimer - Privacy