Results 31 to 40 of about 6,692,619 (327)
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen +2 more
doaj +1 more source
Custom-tailored clone detection for IEC 61131-3 programming languages [PDF]
JSS: Special Issue on Clone ...
Kamil Rosiak +4 more
openaire +2 more sources
META-HEURISTIC CLONAL SELECTION ALGORITHM FOR OPTIMIZATION OF FOREST PLANNING
It is important to evaluate the application of new technologies in the field of computational science to forest science. The goal of this study was to test a different kind of metaheuristic, namely Clonal Selection Algorithm, in a forest planning problem.
Carlos Alberto Araújo Júnior +5 more
doaj +1 more source
MAGDA: A Mobile Agent based Grid Architecture [PDF]
Mobile agents mean both a technology and a programming paradigm. They allow for a flexible approach which can alleviate a number of issues present in distributed and Grid-based systems, by means of features such as migration, cloning, messaging and other
B. DI MARTINO +3 more
core +1 more source
Building a Cybersecurity Engineering Program? Begin by Cloning Your Computer Engineering Program [PDF]
The nation is facing an increasing need for a workforce trained in elements of cyber security. The demand for workers in computer and information technology occupations is well-documented. The Bureau of Labor Statistics has projected a 12 percent growth in the number of job offerings from 2018 to 2028[1].
Douglas Jacobson, Julie Rursch
openaire +2 more sources
Probabilistic theories with purification [PDF]
We investigate general probabilistic theories in which every mixed state has a purification, unique up to reversible channels on the purifying system. We show that the purification principle is equivalent to the existence of a reversible realization of ...
G. Chiribella +2 more
semanticscholar +1 more source
Harmfulness of Code Duplication - A Structured Review of the Evidence [PDF]
Duplication of code has long been thought to decrease changeability of systems, but recently doubts have been expressed whether this is true in general.
Hordijk, Wiebe +2 more
core +14 more sources
Detecting Clones Across Microsoft .NET Programming Languages [PDF]
The Microsoft .NET framework and its language family focus on multi-language development to support interoperability across several programming languages. The framework allows for the development of similar applications in different languages through the reuse of core libraries.
Farouq Al-Omari +3 more
openaire +1 more source
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [
Stijn Volckaert +2 more
semanticscholar +1 more source
Summary of Token-based Source Code Clone Detection Techniques [PDF]
Code cloning refers to the generation of similar or identical code during software development due to the reuse,modification,and refactoring of source code.Code cloning has a positive impact on improving software development efficiency and redu-cing ...
LIU Chunling, QI Xuyan, TANG Yonghe, SUN Xuekai, LI Qinghao, ZHANG Yu
doaj +1 more source

