Results 41 to 50 of about 13,970 (291)
Static Slicing for Pervasive Programs [PDF]
Pervasive programs should be context-aware, which means that program functions should react according to changing environmental conditions. Slicing, as an important class of code analysis techniques, can clarify the dependence between program artifacts and observable system states to facilitate debugging, testing, and other analyses.
Chan, WK, Tse, TH, Lu, H
openaire +2 more sources
This paper presents MultiGLICE (Multi class Graph Neural Network with Program Slice), a model for static code analysis to detect security vulnerabilities.
Wesley de Kraker +2 more
doaj +1 more source
Program slicing is a useful analysis for aiding differentsoftware engineering activities. In the past decades, various notionsof program slices have been evolved as well as a number of methods tocompute them. By now program slicing has numerous applications insoftware maintenance, program comprehension, reverse engineering,program integration, and ...
Ákos Hajnal, István Forgács
openaire +2 more sources
In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon ...
Yan LI +4 more
doaj +3 more sources
The world faces numerous problems and two of them are global food shortages and the dwindling number of pollinating insects. Plant products that do not arise from pollination are plant galls, which as in the case of oak apples, can resemble fruits and be
Victor Benno Meyer-Rochow
doaj +1 more source
Towards Evaluating Size Reduction Techniques for Software Model Checking [PDF]
Formal verification techniques are widely used for detecting design flaws in software systems. Formal verification can be done by transforming an already implemented source code to a formal model and attempting to prove certain properties of the model (e.
Gyula Sallai +3 more
doaj +1 more source
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Fault localization approach for null pointer exception
A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the ...
Shu-juan JIANG +5 more
doaj +2 more sources
Research on 3D Weaving Process of Multi⁃axial Blade Preforms
In order to achieve the three-dimensional weaving of the multi-axial composite preform of composites, the microstructure of the multi-axial composite preform is studied, finding that there is a difference in the thickness of the single layer woven with ...
BIAN Jinshuai +5 more
doaj +1 more source

