Results 111 to 120 of about 26,866 (284)
Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan +2 more
core
The Minimum Age of Criminal Responsibility Internationally—History, Systems and the Future
ABSTRACT Background In most countries, a criminal conviction requires evidence that the individual committed the act and that they had the mental capacity to understand what they were doing and that it was wrong. Youth, as an indicator of brain development, is one factor affecting criminal capacity.
Enys Delmage +18 more
wiley +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
Correcting Errors in the Adsorbed Intermediates of CO2 Electroreduction
Flying over Jacob's ladder of density functional approximations: chemical accuracy in the DFT‐based modeling of CO2 reduction electrocatalysis can be approached with our simple semiempirical method to deconvolute and correct gas‐phase errors and adsorbed‐phase errors.
Ricardo Urrego‐Ortiz +5 more
wiley +1 more source
ABSTRACT The crucial role of environmental dynamism (ED) in achieving supply chain responsiveness (SCR) has become a controversial topic in extant literature. However, despite several empirical studies on environmental dynamism and supply chain responsiveness, inconsistent findings and underexplored areas leave supply chain managers less informed about
Alexander Otchere Fianko +3 more
wiley +1 more source
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak +2 more
doaj
Market Perceptions of ESG Reputational Risk in the US Pharmaceutical Industry
ABSTRACT Negative ESG‐related reputational events generate significant corporate risks, particularly within sensitive sectors such as the pharmaceutical industry. Using novel reputational data, this research investigates investor perceptions of the consequences of experienced ESG breaches among US pharmaceutical firms.
Erdinc Akyildirim +3 more
wiley +1 more source
Intergroup Contact With Refugees Shapes Levels of Social Fear of Crime
ABSTRACT Intergroup contact affects how people see the world more broadly. Across four studies (Ntotal = 1,743), we tested whether valenced intergroup contact with refugees as a criminally stigmatized group affects social fear of crime mediated by prejudice.
Patrick F. Kotzur +3 more
wiley +1 more source
Differentiated policy implementation in food safety and animal welfare policymaking
Abstract Agri‐food policies are in the midst of far‐reaching transitions, including the transformation towards sustainable production and food consumption. The European Green Deal and Farm to Fork Strategy prioritize food safety and animal welfare issues, aiming to transform food systems towards more sustainability.
Giulia Bazzan, Colette S. Vogeler
wiley +1 more source
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk +2 more
doaj +1 more source

