Results 71 to 80 of about 37,485,858 (384)
Lexical Similarity Between Argument and Parameter Names: An Empirical Study
Identifiers chosen by programmers convey rich semantic information that could be exploited to enhance program analysis for various software engineering tasks, e.g., anomaly detection, argument recommendation, and code completion.
Guangjie Li +3 more
doaj +1 more source
Auditing gender in agricultural R&D organizations: gender mainstreaming in the CGIAR [PDF]
The CGIAR Systemwide Program on Participatory Research and Gender Analysis for Technology Development and Institutional Innovation (PRGA Program) conducted valuable work on gender mainstreaming in NARS in Africa, Asia and Latin American during its second
CGIAR Systemwide Program on Participatory Research and Gender Analysis for Technology Development and Institutional Innovation
core
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez +13 more
wiley +1 more source
Program state optimal method based on variable symbolic relation analysis
Program analysis is the prime method to program property analysis,which is widely used in the domain of parameter dependent relation,path coverage and test case generation,and a lot of progress has been made.Current program analysis is based on the ...
Xi GUO, Pan WANG
doaj
Optimized Data-Flow Integrity for Modern Compilers
Non-control-data attacks are those attacks that purely target and modify the non-control data of a program, such as boolean values, user input or configuration parameters, and leave the control flow of a program untouched. These attacks were considered a
Irene Diez-Franco +2 more
doaj +1 more source
Impact Analysis of School Garden Program to Overcome Malnutrition OfChildren [PDF]
The sustainable development goals (SDGs), one of thems ends hunger, achieves food security and improves nutrition, and encourages sustainable agriculture. Lack of fruit and vegetable consumption causes malnutrition.
Kuntariningsih, A. (Apri)
core
Termination Analysis by Learning Terminating Programs [PDF]
We present a novel approach to termination analysis. In a first step, the analysis uses a program as a black-box which exhibits only a finite set of sample traces. Each sample trace is infinite but can be represented by a finite lasso.
Heizmann, Matthias +2 more
core +1 more source
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
A Survey on Verification of Security and Safety in IoT Systems
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines. IoT provides automation and smart control across various domains, including home automation, healthcare, and automotive.
Lobna Abuserrieh, Manar H. Alalfi
doaj +1 more source
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source

