Results 111 to 120 of about 26,866 (284)

Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts

open access: yes, 2017
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan   +2 more
core  

The Minimum Age of Criminal Responsibility Internationally—History, Systems and the Future

open access: yesCriminal Behaviour and Mental Health, EarlyView.
ABSTRACT Background In most countries, a criminal conviction requires evidence that the individual committed the act and that they had the mental capacity to understand what they were doing and that it was wrong. Youth, as an indicator of brain development, is one factor affecting criminal capacity.
Enys Delmage   +18 more
wiley   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

Correcting Errors in the Adsorbed Intermediates of CO2 Electroreduction

open access: yesCarbon Energy, EarlyView.
Flying over Jacob's ladder of density functional approximations: chemical accuracy in the DFT‐based modeling of CO2 reduction electrocatalysis can be approached with our simple semiempirical method to deconvolute and correct gas‐phase errors and adsorbed‐phase errors.
Ricardo Urrego‐Ortiz   +5 more
wiley   +1 more source

Environmental Dynamism and Supply Chain Responsiveness Nexus: Do Organisational Improvisation and Supply Chain Orientation Matter?

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The crucial role of environmental dynamism (ED) in achieving supply chain responsiveness (SCR) has become a controversial topic in extant literature. However, despite several empirical studies on environmental dynamism and supply chain responsiveness, inconsistent findings and underexplored areas leave supply chain managers less informed about
Alexander Otchere Fianko   +3 more
wiley   +1 more source

The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

open access: yesБезопасность информационных технологий, 2012
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak   +2 more
doaj  

Market Perceptions of ESG Reputational Risk in the US Pharmaceutical Industry

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Negative ESG‐related reputational events generate significant corporate risks, particularly within sensitive sectors such as the pharmaceutical industry. Using novel reputational data, this research investigates investor perceptions of the consequences of experienced ESG breaches among US pharmaceutical firms.
Erdinc Akyildirim   +3 more
wiley   +1 more source

Intergroup Contact With Refugees Shapes Levels of Social Fear of Crime

open access: yesEuropean Journal of Social Psychology, EarlyView.
ABSTRACT Intergroup contact affects how people see the world more broadly. Across four studies (Ntotal = 1,743), we tested whether valenced intergroup contact with refugees as a criminally stigmatized group affects social fear of crime mediated by prejudice.
Patrick F. Kotzur   +3 more
wiley   +1 more source

Differentiated policy implementation in food safety and animal welfare policymaking

open access: yesEuropean Policy Analysis, EarlyView.
Abstract Agri‐food policies are in the midst of far‐reaching transitions, including the transformation towards sustainable production and food consumption. The European Green Deal and Farm to Fork Strategy prioritize food safety and animal welfare issues, aiming to transform food systems towards more sustainability.
Giulia Bazzan, Colette S. Vogeler
wiley   +1 more source

Enhancing Two-Factor Authentication Security by Analyzing and Detecting SMS OTP-Interception Techniques in Android Malware

open access: yesIEEE Access
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy