Results 1 to 10 of about 2,857,785 (170)

Secretory phospholipase A2: a biomarker of inflammation in autoimmune, bacterial and viral diseases

open access: yesМедицинская иммунология, 2022
Secretory phospholipases A2 (sPLA2) represent a large superfamily of enzymes with a molecular weight of 14-19 kDa, including 15 groups and more than 30 isoforms belonging to four types: secretory (sPLA2), cytosolic (cPLA2), calcium-independent (iPLA2 ...
S. P. Urazov   +9 more
doaj   +1 more source

A Data Flow Analysis Framework for Data Flow Subsumption

open access: yesCoRR, 2021
Data flow testing creates test requirements as definition-use (DU) associations, where a definition is a program location that assigns a value to a variable and a use is a location where that value is accessed. Data flow testing is expensive, largely because of the number of test requirements.
Marcos Lordello Chaim   +2 more
openaire   +2 more sources

Dynamic Information Flow Tracking: Taxonomy, Challenges, and Opportunities

open access: yesMicromachines, 2021
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage; prevent control data attacks and non-control data attacks at runtime; and analyze program performance.
Kejun Chen   +3 more
doaj   +1 more source

Dataflow approach to testing Java programs supported with DFC [PDF]

open access: yese-Informatica Software Engineering Journal, 2015
Code based (“white box”) approach to testing can be divided into two main types: control flow coverage and data flow coverage methods. Dataflow testing was introduced for structural programming languages and later adopted for object languages. Among many
Ilona Bluemke, Artur Rembiszewski
doaj   +1 more source

Data flow dissemination in a network

open access: yesQueueing Systems, 2023
We consider the following network model motivated, in particular, by blockchains and peer-to-peer live streaming. Data packet flows arrive at the network nodes and need to be disseminated to all other nodes. Packets are relayed through the network via links of finite capacity. A packet leaves the network when it is disseminated to all nodes.
Aditya Gopalan, Alexander L. Stolyar
openaire   +2 more sources

Data Flow Testing and Tools Review [PDF]

open access: yesمجلة التربية والعلم, 2023
Software engineering always strives to develop and identify software pitfalls and errors before publishing the software product, in testing the software. Bugs can appear during any stage of development or testing, even after the product has been released.
Abdullah H. Ali, Nada N. Saleem
doaj   +1 more source

Geographically Weighted Flow Cross K-Function for Network-Constrained Flow Data

open access: yesApplied Sciences, 2022
Network-constrained spatial flows are usually used to describe movements between two spatial places on a road network. The analysis of the spatial associations between different types of network-constrained spatial flows plays a key role in understanding
Weijie Zhang   +4 more
doaj   +1 more source

Exogenous Coordination for Building Fog-Based Cyber Physical Social Computing and Networking Systems

open access: yesIEEE Access, 2018
With the proliferation of smart embedded devices, cyber physical social computing and networking systems (CPSCN) are emerging as a next generation of social networks.
Nam Ky Giang   +2 more
doaj   +1 more source

More accurate cardinality estimation in data streams

open access: yesElectronics Letters, 2022
Many sketches based on estimator sharing have been proposed to estimate cardinality with huge flows in data streams. However, existing sketches suffer from large estimation errors due to allocating the same memory size for each estimator without ...
Jie Lu   +3 more
doaj   +1 more source

Influences of the Shadow Inventory on a Landslide Susceptibility Model

open access: yesISPRS International Journal of Geo-Information, 2018
A landslide inventory serves as the basis for assessing landslide susceptibility, hazard, and risk. It is generally prepared from optical imagery acquired from spaceborne or airborne platforms, in which shadows are inevitably found in mountainous areas ...
Cheng-Chien Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy