Results 41 to 50 of about 19,566 (235)
On-stack replacement, distilled [PDF]
On-stack replacement (OSR) is essential technology for adaptive optimization, allowing changes to code actively executing in a managed runtime. The engineering aspects of OSR are well-known among VM architects, with several implementations available to ...
Bhandari Abhilash +14 more
core +1 more source
Biomechanics‐Driven 3D Architecture Inference from Histology Using CellSqueeze3D
CellSqueeze3D reconstructs 3D cellular architecture from standard 2D histology images using biomechanical constraints and optimization. Validated on clinical datasets, it enables accurate tissue phenotyping, predicts gene mutations, and reveals significant correlations between nuclear‐cytoplasmic ratio entropy and tumor progression.
Yan Kong, Hui Lu
wiley +1 more source
ABSTRACT This paper examines the determinants of generative AI (GenAI) knowledge and usage among agricultural extension professionals. Drawing on survey data from agricultural extension personnel in Tennessee, we employ regression analyses and latent Dirichlet allocation (LDA) for topic modeling of open‐ended responses to study the knowledge and usage ...
Abdelaziz Lawani +3 more
wiley +1 more source
Dynamic Java program analysis using virtual machine modification
This article focuses on practical questions of performing program analysis for applications executed using interpreters and virtual machines. Using Dalvik virtual machine in Android operating system as target interpreter layer, we showcase the ...
M. . Ermakov, S. . Vartanov
doaj +1 more source
A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs [PDF]
Backtracking (i.e., reverse execution) helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by
Jooyong Yi
doaj +1 more source
VERIFICATION OF DYNAMIC MEMORY ALLOCATORS BASED ON SYMBOLIC PROGRAM EXECUTION [PDF]
Subject of Research. The paper presents the study of vulnerability exploitation techniques in the implementation of dynamic memory allocation algorithms (glibc library allocator): Poisoned Null-byte, Overlapped Chunks, Fastbin Attack, Unsafe Unlink ...
Andrey M. Dergachev +4 more
doaj +1 more source
Developing a Generic Debugger for Advanced-Dispatching Languages [PDF]
Programming-language research has introduced a considerable number of advanced-dispatching mechanisms in order to improve modularity. Advanced-dispatching mechanisms allow changing the behavior of a function without modifying their call sites and thus ...
Bockisch, Christoph, Yin, Haihan
core +1 more source
Bringing Back-in-Time Debugging Down to the Database
With back-in-time debuggers, developers can explore what happened before observable failures by following infection chains back to their root causes. While there are several such debuggers for object-oriented programming languages, we do not know of any ...
Perscheid, Michael +2 more
core +1 more source
An online learning control framework with a data cache pool based on a constant‐curvature model inspired neural network (CCMINN) model to obtain the inverse kinematics model of tendon‐actuated continuum manipulators is proposed. Combining the fast‐converging CCMINN with an online learning control framework enables high‐precision and highly robust ...
Jinyu Duan +5 more
wiley +1 more source
Réutilisation de code et modularité
Un programme informatique peut vite devenir un très long fichier et ainsi devenir peu commode à maintenir, notamment quand aucune stratégie n’a été mise en place afin de contrôler cette complexité.
William J. Turkel, Adam Crymble
doaj

