Results 41 to 50 of about 71,810 (321)
Towards Evaluating Size Reduction Techniques for Software Model Checking [PDF]
Formal verification techniques are widely used for detecting design flaws in software systems. Formal verification can be done by transforming an already implemented source code to a formal model and attempting to prove certain properties of the model (e.
Gyula Sallai +3 more
doaj +1 more source
Code extraction algorithms which unify slicing and concept assignment [PDF]
One approach to reverse engineering is to partially automate subcomponent extraction, improvement and subsequent recombination. Two previously proposed automated techniques for supporting this activity are slicing and concept assignment. However, neither
Binkley, D +3 more
core +4 more sources
Safe Concurrency Introduction through Slicing [PDF]
Traditional refactoring is about modifying the structure of existing code without changing its behaviour, but with the aim of making code easier to understand, modify, or reuse.
Bozó I. +4 more
core +2 more sources
In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon ...
Yan LI +4 more
doaj +3 more sources
The world faces numerous problems and two of them are global food shortages and the dwindling number of pollinating insects. Plant products that do not arise from pollination are plant galls, which as in the case of oak apples, can resemble fruits and be
Victor Benno Meyer-Rochow
doaj +1 more source
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
Higher-order lazy functional slicing [PDF]
Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is particularly useful in the areas of reverse engineering, program understanding,
Barbosa, L. S., Rodrigues, Nuno F.
core +3 more sources
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Symbiotic: Synergy of Instrumentation, Slicing, and Symbolic Execution - (Competition Contribution) [PDF]
Symbiotic is a tool for detection of bugs described by finite state machines in C programs. The tool combines three well-known techniques: instrumentation, program slicing, and symbolic execution.
Slabý Jiří +2 more
core +1 more source
Research on 3D Weaving Process of Multi⁃axial Blade Preforms
In order to achieve the three-dimensional weaving of the multi-axial composite preform of composites, the microstructure of the multi-axial composite preform is studied, finding that there is a difference in the thickness of the single layer woven with ...
BIAN Jinshuai +5 more
doaj +1 more source

